Skip to content

Commit

Permalink
_content/doc/fuzz: correct typos
Browse files Browse the repository at this point in the history
Change-Id: I62e808f434b2ce0701da4d77f3b03e1d3cee00fc
GitHub-Last-Rev: 1b44a82
GitHub-Pull-Request: #133
Reviewed-on: https://go-review.googlesource.com/c/website/+/387314
Reviewed-by: Ian Lance Taylor <iant@google.com>
Reviewed-by: Daniel Martí <mvdan@mvdan.cc>
Run-TryBot: Daniel Martí <mvdan@mvdan.cc>
TryBot-Result: Gopher Robot <gobot@golang.org>
Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
Trust: Dmitri Shuralyov <dmitshur@google.com>
  • Loading branch information
jeremychase authored and dmitshur committed Mar 20, 2022
1 parent 13fd016 commit 9274736
Showing 1 changed file with 4 additions and 4 deletions.
8 changes: 4 additions & 4 deletions _content/doc/fuzz/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@ Below are rules that fuzz tests must follow.
arguments. There is no return value.
- There must be exactly one fuzz target per fuzz test.
- All [seed corpus](#glos-seed-corpus) entries must have types which are
identical to the [fuzzing arguments](#fuzzing-arguments), in the same order.
identical to the [fuzzing arguments](#glos-fuzzing-arguments), in the same order.
This is true for calls to
<code>[(\*testing.F).Add](https://pkg.go.dev/testing#F.Add)</code> and any
corpus files in the testdata/fuzz directory of the fuzz test.
Expand Down Expand Up @@ -119,7 +119,7 @@ The first lines indicate that the "baseline coverage" is gathered before
fuzzing begins.

To gather baseline coverage, the fuzzing engine executes both the [seed
corpus](#glos-seed-corpus) and the [generated corpus](#generated-corpus), to
corpus](#glos-seed-corpus) and the [generated corpus](#glos-generated-corpus), to
ensure that no errors occurred and to understand the code coverage the existing
corpus already provides.

Expand All @@ -137,7 +137,7 @@ the existing generated corpus can reach. It's typical for the number of new
interesting inputs to grow quickly at the start and eventually slow down, with
occasional bursts as new branches are discovered.

You should expect to see the "new intesting" number taper off over time as the
You should expect to see the "new interesting" number taper off over time as the
inputs in the corpus begin to cover more lines of the code, with occasional
bursts if the fuzzing engine finds a new code path.

Expand All @@ -148,7 +148,7 @@ A failure may occur while fuzzing for several reasons:
- A panic occurred in the code or the test.
- The fuzz target called `t.Fail`, either directly or through methods such as
`t.Error` or `t.Fatal`.
- A non-recoverable error occured, such as an `os.Exit` or stack overflow.
- A non-recoverable error occurred, such as an `os.Exit` or stack overflow.
- The fuzz target took too long to complete. Currently, the timeout for an
execution of a fuzz target is 1 second. This may fail due to a deadlock or
infinite loop, or from intended behavior in the code. This is one reason why
Expand Down

0 comments on commit 9274736

Please sign in to comment.