From 0d87f479510748b37414813f3b12573609783861 Mon Sep 17 00:00:00 2001 From: Dave Thaler Date: Fri, 27 May 2022 15:23:46 -0700 Subject: [PATCH] Fix code analysis warning Signed-off-by: Dave Thaler --- tests/libfuzzer/core_helper_fuzzer/libfuzz_harness.cpp | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/tests/libfuzzer/core_helper_fuzzer/libfuzz_harness.cpp b/tests/libfuzzer/core_helper_fuzzer/libfuzz_harness.cpp index 89e9bb4df9..e847d93c2d 100644 --- a/tests/libfuzzer/core_helper_fuzzer/libfuzz_harness.cpp +++ b/tests/libfuzzer/core_helper_fuzzer/libfuzz_harness.cpp @@ -335,8 +335,10 @@ fuzz_program( break; } case EBPF_ARGUMENT_TYPE_CONST_SIZE: { - // Put the supplied size into the argument. assert(arg_count > 0); + assert(argument[arg_count - 1] != 0); + + // Put the supplied size into the argument. uint8_t arg_size; if (!consume_data(&data_left, &data_left_size, (uint8_t*)&arg_size, sizeof(arg_size)) || (arg_size == 0) || (arg_size > MAX_BUFFER_SIZE)) { @@ -351,8 +353,10 @@ fuzz_program( break; } case EBPF_ARGUMENT_TYPE_CONST_SIZE_OR_ZERO: { - // Put the supplied size into the argument. assert(arg_count > 0); + assert(argument[arg_count - 1] != 0); + + // Put the supplied size into the argument. uint8_t arg_size; if (!consume_data(&data_left, &data_left_size, (uint8_t*)&arg_size, sizeof(arg_size)) || (arg_size > MAX_BUFFER_SIZE)) {