Skip to content

fuzzer performs unsafe shared memory accesses #24656

@mlugg

Description

@mlugg

Split from #24588.

The problem here is accurately explained by this comment in std.Build.Fuzz.sendUpdate:

zig/lib/std/Build/Fuzz.zig

Lines 248 to 251 in dcc3e6e

// TODO: this isn't sound! We need to do volatile reads of these bits rather than handing the
// buffer off to the kernel, because we might race with the fuzzer process[es]. This brings the
// whole mmap strategy into question. Incidentally, I wonder if post-writergate we could pass
// this data straight to the socket with sendfile...

To close this issue, the problem explained in that comment must be resolved.

Metadata

Metadata

Assignees

No one assigned

    Labels

    bugObserved behavior contradicts documented or intended behaviorfuzzing

    Type

    No type

    Projects

    No projects

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions