From 5ac329c8aa05496d7558f55d767db0762b5bf2a9 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Patrik=20H=C3=B6glund?= Date: Fri, 20 Sep 2019 07:51:13 +0200 Subject: [PATCH] Cap h264 fuzzer input to 200k. Verified it no longer times out on the input that spawned the bug. Bug: chromium:1005853 Change-Id: I5b0ab25aaefdc8b451b4d976b1c3b8f8d38f13e9 Reviewed-on: https://webrtc-review.googlesource.com/c/src/+/153840 Reviewed-by: Benjamin Wright Commit-Queue: Benjamin Wright Cr-Commit-Position: refs/heads/master@{#29260} --- test/fuzzers/h264_depacketizer_fuzzer.cc | 2 ++ 1 file changed, 2 insertions(+) diff --git a/test/fuzzers/h264_depacketizer_fuzzer.cc b/test/fuzzers/h264_depacketizer_fuzzer.cc index 2cefb1e1b3..9b6455b332 100644 --- a/test/fuzzers/h264_depacketizer_fuzzer.cc +++ b/test/fuzzers/h264_depacketizer_fuzzer.cc @@ -11,6 +11,8 @@ namespace webrtc { void FuzzOneInput(const uint8_t* data, size_t size) { + if (size > 200000) + return; RtpDepacketizerH264 depacketizer; RtpDepacketizer::ParsedPayload parsed_payload; depacketizer.Parse(&parsed_payload, data, size);