2021-01-12 16:23:48 +00:00
|
|
|
// Copyright 2021 The Tint Authors.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
#include "fuzzers/tint_common_fuzzer.h"
|
|
|
|
|
2021-09-22 14:37:46 +00:00
|
|
|
#include <cassert>
|
2021-06-07 08:07:11 +00:00
|
|
|
#include <cstring>
|
2021-08-05 15:52:58 +00:00
|
|
|
#include <fstream>
|
2021-01-12 16:23:48 +00:00
|
|
|
#include <memory>
|
2021-07-08 22:11:09 +00:00
|
|
|
#include <sstream>
|
2021-01-12 16:23:48 +00:00
|
|
|
#include <string>
|
|
|
|
#include <utility>
|
|
|
|
#include <vector>
|
|
|
|
|
2021-07-08 22:11:09 +00:00
|
|
|
#if TINT_BUILD_SPV_READER
|
|
|
|
#include "spirv-tools/libspirv.hpp"
|
|
|
|
#endif // TINT_BUILD_SPV_READER
|
|
|
|
|
2021-01-26 16:57:10 +00:00
|
|
|
#include "src/ast/module.h"
|
2021-06-24 18:10:46 +00:00
|
|
|
#include "src/diagnostic/formatter.h"
|
2021-01-26 16:57:10 +00:00
|
|
|
#include "src/program.h"
|
2021-08-05 15:52:58 +00:00
|
|
|
#include "src/utils/hash.h"
|
2021-01-26 16:57:10 +00:00
|
|
|
|
2021-01-12 16:23:48 +00:00
|
|
|
namespace tint {
|
|
|
|
namespace fuzzers {
|
|
|
|
|
2021-05-06 15:43:33 +00:00
|
|
|
namespace {
|
|
|
|
|
2021-10-20 05:01:03 +00:00
|
|
|
// A macro is used to avoid FATAL_ERROR creating its own stack frame. This leads
|
2021-10-19 20:58:43 +00:00
|
|
|
// to better de-duplication of bug reports, because ClusterFuzz only uses the
|
2021-10-20 05:01:03 +00:00
|
|
|
// top few stack frames for de-duplication, and a FATAL_ERROR stack frame
|
2021-10-19 20:58:43 +00:00
|
|
|
// provides no useful information.
|
2021-10-20 05:01:03 +00:00
|
|
|
#define FATAL_ERROR(diags, msg_string) \
|
2021-10-19 20:58:43 +00:00
|
|
|
do { \
|
|
|
|
std::string msg = msg_string; \
|
|
|
|
auto printer = tint::diag::Printer::create(stderr, true); \
|
|
|
|
if (!msg.empty()) { \
|
|
|
|
printer->write(msg + "\n", {diag::Color::kRed, true}); \
|
|
|
|
} \
|
|
|
|
tint::diag::Formatter().format(diags, printer.get()); \
|
|
|
|
__builtin_trap(); \
|
|
|
|
} while (false)
|
2021-03-25 11:40:07 +00:00
|
|
|
|
2021-07-08 22:11:09 +00:00
|
|
|
[[noreturn]] void TintInternalCompilerErrorReporter(
|
|
|
|
const tint::diag::List& diagnostics) {
|
2021-10-20 05:01:03 +00:00
|
|
|
FATAL_ERROR(diagnostics, "");
|
2021-05-05 21:12:22 +00:00
|
|
|
}
|
|
|
|
|
2021-10-20 05:01:03 +00:00
|
|
|
// Wrapping this in a macro so it can be a one-liner in the code, but not
|
|
|
|
// introducing another level in the stack trace. This will help with de-duping
|
|
|
|
// ClusterFuzz issues.
|
|
|
|
#define CHECK_INSPECTOR(inspector) \
|
|
|
|
do { \
|
|
|
|
if (inspector.has_error()) { \
|
|
|
|
FATAL_ERROR(program->Diagnostics(), \
|
|
|
|
"Inspector failed: " + inspector.error()); \
|
|
|
|
} \
|
|
|
|
} while (false)
|
|
|
|
|
2021-07-08 22:11:09 +00:00
|
|
|
bool SPIRVToolsValidationCheck(const tint::Program& program,
|
2021-07-16 09:25:14 +00:00
|
|
|
const std::vector<uint32_t>& spirv) {
|
2021-07-08 22:11:09 +00:00
|
|
|
spvtools::SpirvTools tools(SPV_ENV_VULKAN_1_1);
|
|
|
|
const tint::diag::List& diags = program.Diagnostics();
|
|
|
|
tools.SetMessageConsumer([diags](spv_message_level_t, const char*,
|
|
|
|
const spv_position_t& pos, const char* msg) {
|
|
|
|
std::stringstream out;
|
|
|
|
out << "Unexpected spirv-val error:\n"
|
|
|
|
<< (pos.line + 1) << ":" << (pos.column + 1) << ": " << msg
|
|
|
|
<< std::endl;
|
|
|
|
|
|
|
|
auto printer = tint::diag::Printer::create(stderr, true);
|
|
|
|
printer->write(out.str(), {diag::Color::kYellow, false});
|
|
|
|
tint::diag::Formatter().format(diags, printer.get());
|
|
|
|
});
|
|
|
|
|
|
|
|
return tools.Validate(spirv.data(), spirv.size(),
|
|
|
|
spvtools::ValidatorOptions());
|
|
|
|
}
|
|
|
|
|
2021-05-06 15:43:33 +00:00
|
|
|
} // namespace
|
2021-04-28 15:35:43 +00:00
|
|
|
|
2021-09-22 14:37:46 +00:00
|
|
|
void GenerateSpirvOptions(DataBuilder* b, writer::spirv::Options* options) {
|
|
|
|
*options = b->build<writer::spirv::Options>();
|
2021-07-22 13:25:54 +00:00
|
|
|
}
|
|
|
|
|
2021-09-22 14:37:46 +00:00
|
|
|
void GenerateWgslOptions(DataBuilder* b, writer::wgsl::Options* options) {
|
|
|
|
*options = b->build<writer::wgsl::Options>();
|
2021-07-22 13:25:54 +00:00
|
|
|
}
|
|
|
|
|
2021-09-22 14:37:46 +00:00
|
|
|
void GenerateHlslOptions(DataBuilder* b, writer::hlsl::Options* options) {
|
|
|
|
*options = b->build<writer::hlsl::Options>();
|
2021-07-22 13:25:54 +00:00
|
|
|
}
|
|
|
|
|
2021-09-22 14:37:46 +00:00
|
|
|
void GenerateMslOptions(DataBuilder* b, writer::msl::Options* options) {
|
|
|
|
*options = b->build<writer::msl::Options>();
|
2021-07-22 13:25:54 +00:00
|
|
|
}
|
|
|
|
|
2021-01-12 16:23:48 +00:00
|
|
|
CommonFuzzer::CommonFuzzer(InputFormat input, OutputFormat output)
|
2021-09-30 18:58:32 +00:00
|
|
|
: input_(input), output_(output) {}
|
2021-01-18 19:48:54 +00:00
|
|
|
|
2021-01-12 16:23:48 +00:00
|
|
|
CommonFuzzer::~CommonFuzzer() = default;
|
|
|
|
|
|
|
|
int CommonFuzzer::Run(const uint8_t* data, size_t size) {
|
2021-03-25 11:40:07 +00:00
|
|
|
tint::SetInternalCompilerErrorReporter(&TintInternalCompilerErrorReporter);
|
|
|
|
|
2021-02-17 20:15:25 +00:00
|
|
|
Program program;
|
|
|
|
|
2021-07-08 22:11:09 +00:00
|
|
|
#if TINT_BUILD_SPV_READER
|
2021-07-16 09:25:14 +00:00
|
|
|
std::vector<uint32_t> spirv_input(size / sizeof(uint32_t));
|
2021-07-08 22:11:09 +00:00
|
|
|
|
|
|
|
#endif // TINT_BUILD_SPV_READER
|
|
|
|
|
2021-08-05 15:52:58 +00:00
|
|
|
#if TINT_BUILD_WGSL_READER || TINT_BUILD_SPV_READER
|
|
|
|
auto dump_input_data = [&](auto& content, const char* extension) {
|
|
|
|
size_t hash = utils::Hash(content);
|
|
|
|
auto filename = "fuzzer_input_" + std::to_string(hash) + extension; //
|
|
|
|
std::ofstream fout(filename, std::ios::binary);
|
|
|
|
fout.write(reinterpret_cast<const char*>(data),
|
|
|
|
static_cast<std::streamsize>(size));
|
|
|
|
std::cout << "Dumped input data to " << filename << std::endl;
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
2021-01-12 16:23:48 +00:00
|
|
|
switch (input_) {
|
|
|
|
#if TINT_BUILD_WGSL_READER
|
2021-02-19 19:04:18 +00:00
|
|
|
case InputFormat::kWGSL: {
|
2021-07-22 22:53:24 +00:00
|
|
|
// Clear any existing diagnostics, as these will hold pointers to file_,
|
|
|
|
// which we are about to release.
|
|
|
|
diagnostics_ = {};
|
2021-01-12 16:23:48 +00:00
|
|
|
std::string str(reinterpret_cast<const char*>(data), size);
|
2021-07-22 22:53:24 +00:00
|
|
|
file_ = std::make_unique<Source::File>("test.wgsl", str);
|
2021-08-05 15:52:58 +00:00
|
|
|
if (dump_input_) {
|
|
|
|
dump_input_data(str, ".wgsl");
|
|
|
|
}
|
2021-07-22 22:53:24 +00:00
|
|
|
program = reader::wgsl::Parse(file_.get());
|
2021-02-19 19:04:18 +00:00
|
|
|
break;
|
2021-01-12 16:23:48 +00:00
|
|
|
}
|
|
|
|
#endif // TINT_BUILD_WGSL_READER
|
|
|
|
#if TINT_BUILD_SPV_READER
|
2021-02-19 19:04:18 +00:00
|
|
|
case InputFormat::kSpv: {
|
2021-07-20 20:56:30 +00:00
|
|
|
// `spirv_input` has been initialized with the capacity to store `size /
|
|
|
|
// sizeof(uint32_t)` uint32_t values. If `size` is not a multiple of
|
|
|
|
// sizeof(uint32_t) then not all of `data` can be copied into
|
|
|
|
// `spirv_input`, and any trailing bytes are discarded.
|
2021-07-21 13:23:51 +00:00
|
|
|
std::memcpy(spirv_input.data(), data,
|
|
|
|
spirv_input.size() * sizeof(uint32_t));
|
2021-07-20 20:56:30 +00:00
|
|
|
if (spirv_input.empty()) {
|
|
|
|
return 0;
|
2021-01-12 16:23:48 +00:00
|
|
|
}
|
2021-08-05 15:52:58 +00:00
|
|
|
if (dump_input_) {
|
|
|
|
dump_input_data(spirv_input, ".spv");
|
|
|
|
}
|
2021-07-20 20:56:30 +00:00
|
|
|
program = reader::spirv::Parse(spirv_input);
|
2021-02-19 19:04:18 +00:00
|
|
|
break;
|
2021-01-12 16:23:48 +00:00
|
|
|
}
|
2021-07-08 22:11:09 +00:00
|
|
|
#endif // TINT_BUILD_SPV_READER
|
2021-01-12 16:23:48 +00:00
|
|
|
}
|
|
|
|
|
2021-01-26 16:57:10 +00:00
|
|
|
if (!program.IsValid()) {
|
2021-07-20 14:39:50 +00:00
|
|
|
diagnostics_ = program.Diagnostics();
|
2021-01-12 16:23:48 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2021-07-08 22:11:09 +00:00
|
|
|
#if TINT_BUILD_SPV_READER
|
|
|
|
if (input_ == InputFormat::kSpv &&
|
|
|
|
!SPIRVToolsValidationCheck(program, spirv_input)) {
|
2021-10-20 05:01:03 +00:00
|
|
|
FATAL_ERROR(
|
|
|
|
program.Diagnostics(),
|
|
|
|
"Fuzzing detected invalid input spirv not being caught by Tint");
|
2021-07-08 22:11:09 +00:00
|
|
|
}
|
|
|
|
#endif // TINT_BUILD_SPV_READER
|
|
|
|
|
2021-10-20 05:01:03 +00:00
|
|
|
RunInspector(&program);
|
2021-01-13 15:50:11 +00:00
|
|
|
|
2021-01-12 16:23:48 +00:00
|
|
|
if (transform_manager_) {
|
2021-09-30 18:58:32 +00:00
|
|
|
auto out = transform_manager_->Run(&program, *transform_inputs_);
|
2021-02-24 15:55:24 +00:00
|
|
|
if (!out.program.IsValid()) {
|
2021-06-24 11:27:36 +00:00
|
|
|
// Transforms can produce error messages for bad input.
|
|
|
|
// Catch ICEs and errors from non transform systems.
|
2021-07-16 09:25:14 +00:00
|
|
|
for (const auto& diag : out.program.Diagnostics()) {
|
2021-06-24 11:27:36 +00:00
|
|
|
if (diag.severity > diag::Severity::Error ||
|
|
|
|
diag.system != diag::System::Transform) {
|
2021-10-20 05:01:03 +00:00
|
|
|
FATAL_ERROR(out.program.Diagnostics(),
|
|
|
|
"Fuzzing detected valid input program being transformed "
|
|
|
|
"into an invalid output program");
|
2021-06-24 11:27:36 +00:00
|
|
|
}
|
|
|
|
}
|
2021-01-12 16:23:48 +00:00
|
|
|
}
|
|
|
|
|
2021-01-26 16:57:10 +00:00
|
|
|
program = std::move(out.program);
|
2021-10-20 05:01:03 +00:00
|
|
|
RunInspector(&program);
|
2021-01-12 16:23:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
switch (output_) {
|
2021-07-12 21:07:41 +00:00
|
|
|
case OutputFormat::kWGSL: {
|
2021-01-12 16:23:48 +00:00
|
|
|
#if TINT_BUILD_WGSL_WRITER
|
2021-07-22 13:25:54 +00:00
|
|
|
auto result = writer::wgsl::Generate(&program, options_wgsl_);
|
2021-07-16 09:25:14 +00:00
|
|
|
generated_wgsl_ = std::move(result.wgsl);
|
2021-07-12 21:07:41 +00:00
|
|
|
if (!result.success) {
|
2021-10-20 05:01:03 +00:00
|
|
|
FATAL_ERROR(program.Diagnostics(),
|
2021-11-25 16:10:28 +00:00
|
|
|
"WGSL writer errored on validated input:\n" + result.error);
|
2021-07-12 21:07:41 +00:00
|
|
|
}
|
2021-01-12 16:23:48 +00:00
|
|
|
#endif // TINT_BUILD_WGSL_WRITER
|
|
|
|
break;
|
2021-07-12 21:07:41 +00:00
|
|
|
}
|
|
|
|
case OutputFormat::kSpv: {
|
2021-01-12 16:23:48 +00:00
|
|
|
#if TINT_BUILD_SPV_WRITER
|
2021-07-22 13:25:54 +00:00
|
|
|
auto result = writer::spirv::Generate(&program, options_spirv_);
|
2021-07-16 09:25:14 +00:00
|
|
|
generated_spirv_ = std::move(result.spirv);
|
2021-07-12 21:07:41 +00:00
|
|
|
if (!result.success) {
|
2021-11-25 16:10:28 +00:00
|
|
|
FATAL_ERROR(
|
|
|
|
program.Diagnostics(),
|
|
|
|
"SPIR-V writer errored on validated input:\n" + result.error);
|
2021-07-12 21:07:41 +00:00
|
|
|
}
|
2021-07-16 09:25:14 +00:00
|
|
|
if (!SPIRVToolsValidationCheck(program, generated_spirv_)) {
|
2021-10-20 05:01:03 +00:00
|
|
|
FATAL_ERROR(program.Diagnostics(),
|
|
|
|
"Fuzzing detected invalid spirv being emitted by Tint");
|
2021-07-12 21:07:41 +00:00
|
|
|
}
|
|
|
|
|
2021-01-12 16:23:48 +00:00
|
|
|
#endif // TINT_BUILD_SPV_WRITER
|
|
|
|
break;
|
2021-07-12 21:07:41 +00:00
|
|
|
}
|
|
|
|
case OutputFormat::kHLSL: {
|
2021-01-12 16:23:48 +00:00
|
|
|
#if TINT_BUILD_HLSL_WRITER
|
2021-07-22 13:25:54 +00:00
|
|
|
auto result = writer::hlsl::Generate(&program, options_hlsl_);
|
2021-07-16 09:25:14 +00:00
|
|
|
generated_hlsl_ = std::move(result.hlsl);
|
2021-07-12 21:07:41 +00:00
|
|
|
if (!result.success) {
|
2021-10-20 05:01:03 +00:00
|
|
|
FATAL_ERROR(program.Diagnostics(),
|
2021-11-25 16:10:28 +00:00
|
|
|
"HLSL writer errored on validated input:\n" + result.error);
|
2021-07-12 21:07:41 +00:00
|
|
|
}
|
2021-01-12 16:23:48 +00:00
|
|
|
#endif // TINT_BUILD_HLSL_WRITER
|
|
|
|
break;
|
2021-07-12 21:07:41 +00:00
|
|
|
}
|
|
|
|
case OutputFormat::kMSL: {
|
2021-01-12 16:23:48 +00:00
|
|
|
#if TINT_BUILD_MSL_WRITER
|
2021-07-22 13:25:54 +00:00
|
|
|
auto result = writer::msl::Generate(&program, options_msl_);
|
2021-07-16 09:25:14 +00:00
|
|
|
generated_msl_ = std::move(result.msl);
|
2021-07-12 21:07:41 +00:00
|
|
|
if (!result.success) {
|
2021-10-20 05:01:03 +00:00
|
|
|
FATAL_ERROR(program.Diagnostics(),
|
2021-11-25 16:10:28 +00:00
|
|
|
"MSL writer errored on validated input:\n" + result.error);
|
2021-07-12 21:07:41 +00:00
|
|
|
}
|
2021-01-12 16:23:48 +00:00
|
|
|
#endif // TINT_BUILD_MSL_WRITER
|
|
|
|
break;
|
2021-07-12 21:07:41 +00:00
|
|
|
}
|
2021-01-12 16:23:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2021-10-20 05:01:03 +00:00
|
|
|
void CommonFuzzer::RunInspector(Program* program) {
|
|
|
|
inspector::Inspector inspector(program);
|
|
|
|
|
|
|
|
auto entry_points = inspector.GetEntryPoints();
|
|
|
|
CHECK_INSPECTOR(inspector);
|
|
|
|
|
|
|
|
auto constant_ids = inspector.GetConstantIDs();
|
|
|
|
CHECK_INSPECTOR(inspector);
|
|
|
|
|
|
|
|
auto constant_name_to_id = inspector.GetConstantNameToIdMap();
|
|
|
|
CHECK_INSPECTOR(inspector);
|
|
|
|
|
|
|
|
for (auto& ep : entry_points) {
|
2021-10-21 17:21:04 +00:00
|
|
|
inspector.GetRemappedNameForEntryPoint(ep.name);
|
2021-10-20 05:01:03 +00:00
|
|
|
CHECK_INSPECTOR(inspector);
|
|
|
|
|
2021-10-21 17:21:04 +00:00
|
|
|
inspector.GetStorageSize(ep.name);
|
2021-10-20 05:01:03 +00:00
|
|
|
CHECK_INSPECTOR(inspector);
|
|
|
|
|
2021-10-21 17:21:04 +00:00
|
|
|
inspector.GetResourceBindings(ep.name);
|
2021-10-20 05:01:03 +00:00
|
|
|
CHECK_INSPECTOR(inspector);
|
|
|
|
|
2021-10-21 17:21:04 +00:00
|
|
|
inspector.GetUniformBufferResourceBindings(ep.name);
|
2021-10-20 05:01:03 +00:00
|
|
|
CHECK_INSPECTOR(inspector);
|
|
|
|
|
2021-10-21 17:21:04 +00:00
|
|
|
inspector.GetStorageBufferResourceBindings(ep.name);
|
2021-10-20 05:01:03 +00:00
|
|
|
CHECK_INSPECTOR(inspector);
|
|
|
|
|
2021-10-21 17:21:04 +00:00
|
|
|
inspector.GetReadOnlyStorageBufferResourceBindings(ep.name);
|
2021-10-20 05:01:03 +00:00
|
|
|
CHECK_INSPECTOR(inspector);
|
|
|
|
|
2021-10-21 17:21:04 +00:00
|
|
|
inspector.GetSamplerResourceBindings(ep.name);
|
2021-10-20 05:01:03 +00:00
|
|
|
CHECK_INSPECTOR(inspector);
|
|
|
|
|
2021-10-21 17:21:04 +00:00
|
|
|
inspector.GetComparisonSamplerResourceBindings(ep.name);
|
2021-10-20 05:01:03 +00:00
|
|
|
CHECK_INSPECTOR(inspector);
|
|
|
|
|
2021-10-21 17:21:04 +00:00
|
|
|
inspector.GetSampledTextureResourceBindings(ep.name);
|
2021-10-20 05:01:03 +00:00
|
|
|
CHECK_INSPECTOR(inspector);
|
|
|
|
|
2021-10-21 17:21:04 +00:00
|
|
|
inspector.GetMultisampledTextureResourceBindings(ep.name);
|
2021-10-20 05:01:03 +00:00
|
|
|
CHECK_INSPECTOR(inspector);
|
|
|
|
|
2021-10-21 17:21:04 +00:00
|
|
|
inspector.GetWriteOnlyStorageTextureResourceBindings(ep.name);
|
2021-10-20 05:01:03 +00:00
|
|
|
CHECK_INSPECTOR(inspector);
|
|
|
|
|
2021-10-21 17:21:04 +00:00
|
|
|
inspector.GetDepthTextureResourceBindings(ep.name);
|
2021-10-20 05:01:03 +00:00
|
|
|
CHECK_INSPECTOR(inspector);
|
|
|
|
|
2021-10-21 17:21:04 +00:00
|
|
|
inspector.GetDepthMultisampledTextureResourceBindings(ep.name);
|
2021-10-20 05:01:03 +00:00
|
|
|
CHECK_INSPECTOR(inspector);
|
|
|
|
|
2021-10-21 17:21:04 +00:00
|
|
|
inspector.GetExternalTextureResourceBindings(ep.name);
|
2021-10-20 05:01:03 +00:00
|
|
|
CHECK_INSPECTOR(inspector);
|
|
|
|
|
2021-10-21 17:21:04 +00:00
|
|
|
inspector.GetSamplerTextureUses(ep.name);
|
2021-10-20 05:01:03 +00:00
|
|
|
CHECK_INSPECTOR(inspector);
|
|
|
|
|
2021-10-21 17:21:04 +00:00
|
|
|
inspector.GetWorkgroupStorageSize(ep.name);
|
2021-10-20 05:01:03 +00:00
|
|
|
CHECK_INSPECTOR(inspector);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-12 16:23:48 +00:00
|
|
|
} // namespace fuzzers
|
|
|
|
} // namespace tint
|