-
Notifications
You must be signed in to change notification settings - Fork 399
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix router fuzz failure due to LengthLimitedReader
#3694
Fix router fuzz failure due to LengthLimitedReader
#3694
Conversation
👋 Thanks for assigning @joostjager as a reviewer! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It looks like the intention behind the assert was to check that all of data
was consumed (i.e. we should assert!(reader.is_empty())
, but it was previously broken. The old and suggested assert here are basically useless.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Re-request review after Matt's point has been addressed.
We recently switched the decode_msg macro in the router fuzz target from reading from a Cursor to reading from a slice. This caused a failure because the slice advances its pointer as it is being read from, so asserting that the length of the slice is equal to the length of the message that was read no longer works. Instead assert that the original fuzz data length is equal to the length of the message that was read.
a594449
to
0106264
Compare
🤦♀️ Thanks! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Assuming the fuzzer is not failing anymore...
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Same, we can fix it more if its still broken.
We recently switched the decode_msg macro in the router fuzz target from reading from a Cursor to reading from a slice. This caused a failure because the slice advances its pointer as it is being read from, so asserting that the length of the slice is equal to the length of the message that was read no longer works. Instead assert that the original fuzz data length is equal to the length of the message that was read.
Closes #3692