FuzzFileAction {
array: ListViewArray {
dtype: List(
Extension(
ExtDType {
id: ExtID(
"example.ipv4",
),
storage_dtype: Bool(
Nullable,
),
metadata: None,
},
),
Nullable,
),
elements: ExtensionArray {
dtype: Extension(
ExtDType {
id: ExtID(
"example.ipv4",
),
storage_dtype: Bool(
Nullable,
),
metadata: None,
},
),
storage: BoolArray {
dtype: Bool(
Nullable,
),
bits: BitBuffer {
buffer: Buffer<u8> {
length: 1,
alignment: Alignment(
1,
),
as_slice: [3],
},
offset: 0,
len: 3,
},
validity: AllValid,
stats_set: ArrayStats {
inner: RwLock {
data: StatsSet {
values: [],
},
},
},
},
stats_set: ArrayStats {
inner: RwLock {
data: StatsSet {
values: [],
},
},
},
},
offsets: PrimitiveArray {
dtype: Primitive(
U16,
NonNullable,
),
buffer: Buffer<u8> {
length: 6,
alignment: Alignment(
2,
),
as_slice: [0, 0, 3, 0, 3, 0],
},
validity: NonNullable,
stats_set: ArrayStats {
inner: RwLock {
data: StatsSet {
values: [
(
IsSorted,
Exact(
ScalarValue(
Bool(
true,
),
),
),
),
],
},
},
},
},
sizes: PrimitiveArray {
dtype: Primitive(
U16,
NonNullable,
),
buffer: Buffer<u8> {
length: 6,
alignment: Alignment(
2,
),
as_slice: [3, 0, 0, 0, 0, 0],
},
validity: NonNullable,
stats_set: ArrayStats {
inner: RwLock {
data: StatsSet {
values: [],
},
},
},
},
is_zero_copy_to_list: true,
validity: AllValid,
stats_set: ArrayStats {
inner: RwLock {
data: StatsSet {
values: [],
},
},
},
},
projection_expr: None,
filter_expr: None,
compressor_strategy: Compact,
}
Fuzzing Crash Report
Analysis
Crash Location:
vortex-dtype/src/arrow.rs:262in theto_arrow_dtypefunctionError Message:
Stack Trace:
Root Cause: The fuzzer created an
ExtensionArraywith a custom extension type"example.ipv4". When the test tries to perform a comparison operation, it attempts to convert the extension type to Arrow format. However, theto_arrow_dtypefunction only supports known temporal extension types (viais_temporal_ext_type), and bails with an error for any other extension type ID.The issue is that the fuzzer can generate arbitrary extension type IDs, but the Arrow conversion code doesn't have a fallback strategy for unknown extension types (e.g., converting them to their storage type).
Debug Output
Summary
file_iocrash-4c9f9437bf8e76457bcc9aaa86d746fa96628f96Reproduction
Download the crash artifact:
io-fuzzing-crash-artifactsat: https://github.com/vortex-data/vortex/actions/runs/20531444854Reproduce locally:
# The artifact contains file_io/crash-4c9f9437bf8e76457bcc9aaa86d746fa96628f96 cargo +nightly fuzz run -D --sanitizer=none file_io file_io/crash-4c9f9437bf8e76457bcc9aaa86d746fa96628f96 -- -rss_limit_mb=0Auto-created by fuzzing workflow with Claude analysis