Lower memory threshold for parse_tensor_op_fuzz
				
					
				
			This is needed because ASAN builds have additional checks with additional memory footprint so fuzzer that was at the borderline just below OOM threshold now OOMs. PiperOrigin-RevId: 343538697 Change-Id: I42672e103bdc95b65c5a8d37578fc4eb796050a0
This commit is contained in:
		
							parent
							
								
									2139560d99
								
							
						
					
					
						commit
						5abf12375e
					
				| @ -41,6 +41,8 @@ class FuzzParseTensor : public FuzzSession { | ||||
|     // remainder of the fuzzer testing. Of course, this duplicates some work
 | ||||
|     // but it's better than repeating the investigation whenever Autofuzz
 | ||||
|     // detects another similar OOM.
 | ||||
|     // After adding `-fsanitize=null` to ASAN (cl/317376103), the memory
 | ||||
|     // footprint increased, so we lower the maximum threshold to 2^18.
 | ||||
|     string as_string = string(reinterpret_cast<const char*>(data), size); | ||||
|     TensorProto proto; | ||||
|     if (!ParseProtoUnlimited(&proto, as_string)) { | ||||
| @ -53,7 +55,7 @@ class FuzzParseTensor : public FuzzSession { | ||||
|     } | ||||
|     TensorShape shape(proto.tensor_shape()); | ||||
|     const int64 num_elements = shape.num_elements(); | ||||
|     const int64 max_num_elements = 1 << 20; | ||||
|     const int64 max_num_elements = 1 << 18; | ||||
|     if (num_elements > max_num_elements) { | ||||
|       LOG(WARNING) << "Requiring a tensor with too many elements\n"; | ||||
|       return; | ||||
|  | ||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user