Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update memory configuration during fuzzing #9567

Merged

Conversation

alexcrichton
Copy link
Member

This commit updates how the NormalMemoryConfig works during fuzzing. Previously this was either 0 or an arbitrary 32-bit number. This ended up not not handling cases such as 4GiB exactly which is 1 larger than the 32-bit range. Additionally 33+-bit numbers were never tested. This intends to expand our fuzz coverage here by most of the time using the default settings of Config and then otherwise selecting amongst an "interesting" set of numbers such as 0, powers of two, etc.

This commit updates how the `NormalMemoryConfig` works during fuzzing.
Previously this was either 0 or an arbitrary 32-bit number. This ended
up not not handling cases such as 4GiB exactly which is 1 larger than
the 32-bit range. Additionally 33+-bit numbers were never tested. This
intends to expand our fuzz coverage here by most of the time using the
default settings of `Config` and then otherwise selecting amongst an
"interesting" set of numbers such as 0, powers of two, etc.
@alexcrichton alexcrichton requested a review from a team as a code owner November 5, 2024 22:15
@alexcrichton alexcrichton requested review from fitzgen and removed request for a team November 5, 2024 22:15
@fitzgen fitzgen added this pull request to the merge queue Nov 5, 2024
Merged via the queue into bytecodealliance:main with commit cc6cf63 Nov 5, 2024
40 checks passed
@alexcrichton alexcrichton deleted the improve-fuzz-memory-config branch November 5, 2024 23:10
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants