(from https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32180)
Looks like eager allocation is used for Smile binary payload if using "raw"/native embedding.
Similar to #186, this should be only used for relatively short payloads to avoid potential for DoS by attacker specifying allegedly large data size but only sending minimal partial message (essentially just marker, length and maybe a bit or two)