2020-03-05 20:35:57 +00:00
|
|
|
// Copyright 2020 The Tint Authors.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
ast: Replace IsValid() with TINT_ASSERT()
The readers must not produce invalid ASTs.
If readers cannot produce a valid AST, then they should error instead.
If a reader does produce an invalid AST, this change catches this bad behavior early, significantly helping identify the root of the broken logic.
IsValid() made a bit more sense in the days where the AST was mutable, and was constructed by calling setters on the nodes to build up the tree.
In order to detect bad ASTs, IsValid() would have to perform an entire AST traversal and give a yes / no answer for the entire tree. Not only was this slow, an answer of 'no' didn't tell you *where* the AST was invalid, resulting in a lot of manual debugging.
Now that the AST is fully immutable, all child nodes need to be built before their parents. The AST node constructors now become a perfect place to perform pointer sanity checking.
The argument for attempting to catch and handle invalid ASTs is not a compelling one.
Invalid ASTs are invalid compiler behavior, not something that should ever happen with a correctly functioning compiler.
If this were to happen in production, the user would be utterly clueless to _why_ the program is invalid, or _how_ to fix it.
Attempting to handle invalid ASTs is just masking a much larger problem.
Let's just let the fuzzers do their job to catch any of these cases early.
Fixed: chromium:1185569
Change-Id: I6496426a3a9da9d42627d2c1ca23917bfd04cc5c
Reviewed-on: https://dawn-review.googlesource.com/c/tint/+/44048
Commit-Queue: Ben Clayton <bclayton@chromium.org>
Reviewed-by: David Neto <dneto@google.com>
2021-03-10 11:41:49 +00:00
|
|
|
#include "gtest/gtest-spi.h"
|
2020-11-13 21:58:28 +00:00
|
|
|
#include "src/ast/test_helper.h"
|
2020-03-05 20:35:57 +00:00
|
|
|
|
|
|
|
namespace tint {
|
|
|
|
namespace ast {
|
2020-03-26 15:31:43 +00:00
|
|
|
namespace {
|
2020-03-05 20:35:57 +00:00
|
|
|
|
2020-11-13 21:58:28 +00:00
|
|
|
using CallExpressionTest = TestHelper;
|
2020-03-05 20:35:57 +00:00
|
|
|
|
|
|
|
TEST_F(CallExpressionTest, Creation) {
|
2020-12-14 22:30:57 +00:00
|
|
|
auto* func = Expr("func");
|
2020-04-06 19:37:37 +00:00
|
|
|
ExpressionList params;
|
2020-12-14 22:30:57 +00:00
|
|
|
params.push_back(Expr("param1"));
|
|
|
|
params.push_back(Expr("param2"));
|
2020-03-05 20:35:57 +00:00
|
|
|
|
2020-12-14 22:30:57 +00:00
|
|
|
auto* stmt = create<CallExpression>(func, params);
|
|
|
|
EXPECT_EQ(stmt->func(), func);
|
2020-03-05 20:35:57 +00:00
|
|
|
|
2020-12-14 22:30:57 +00:00
|
|
|
const auto& vec = stmt->params();
|
2020-04-17 13:18:20 +00:00
|
|
|
ASSERT_EQ(vec.size(), 2u);
|
2020-11-16 16:41:47 +00:00
|
|
|
EXPECT_EQ(vec[0], params[0]);
|
|
|
|
EXPECT_EQ(vec[1], params[1]);
|
2020-03-05 20:35:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST_F(CallExpressionTest, Creation_WithSource) {
|
2020-12-14 22:30:57 +00:00
|
|
|
auto* func = Expr("func");
|
|
|
|
auto* stmt = create<CallExpression>(Source{Source::Location{20, 2}}, func,
|
|
|
|
ExpressionList{});
|
|
|
|
auto src = stmt->source();
|
2020-10-30 20:44:53 +00:00
|
|
|
EXPECT_EQ(src.range.begin.line, 20u);
|
|
|
|
EXPECT_EQ(src.range.begin.column, 2u);
|
2020-03-05 20:35:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST_F(CallExpressionTest, IsCall) {
|
2020-12-14 22:30:57 +00:00
|
|
|
auto* func = Expr("func");
|
|
|
|
auto* stmt = create<CallExpression>(func, ExpressionList{});
|
|
|
|
EXPECT_TRUE(stmt->Is<CallExpression>());
|
2020-03-05 20:35:57 +00:00
|
|
|
}
|
|
|
|
|
2021-04-15 17:47:23 +00:00
|
|
|
TEST_F(CallExpressionTest, Assert_Null_Function) {
|
ast: Replace IsValid() with TINT_ASSERT()
The readers must not produce invalid ASTs.
If readers cannot produce a valid AST, then they should error instead.
If a reader does produce an invalid AST, this change catches this bad behavior early, significantly helping identify the root of the broken logic.
IsValid() made a bit more sense in the days where the AST was mutable, and was constructed by calling setters on the nodes to build up the tree.
In order to detect bad ASTs, IsValid() would have to perform an entire AST traversal and give a yes / no answer for the entire tree. Not only was this slow, an answer of 'no' didn't tell you *where* the AST was invalid, resulting in a lot of manual debugging.
Now that the AST is fully immutable, all child nodes need to be built before their parents. The AST node constructors now become a perfect place to perform pointer sanity checking.
The argument for attempting to catch and handle invalid ASTs is not a compelling one.
Invalid ASTs are invalid compiler behavior, not something that should ever happen with a correctly functioning compiler.
If this were to happen in production, the user would be utterly clueless to _why_ the program is invalid, or _how_ to fix it.
Attempting to handle invalid ASTs is just masking a much larger problem.
Let's just let the fuzzers do their job to catch any of these cases early.
Fixed: chromium:1185569
Change-Id: I6496426a3a9da9d42627d2c1ca23917bfd04cc5c
Reviewed-on: https://dawn-review.googlesource.com/c/tint/+/44048
Commit-Queue: Ben Clayton <bclayton@chromium.org>
Reviewed-by: David Neto <dneto@google.com>
2021-03-10 11:41:49 +00:00
|
|
|
EXPECT_FATAL_FAILURE(
|
|
|
|
{
|
|
|
|
ProgramBuilder b;
|
|
|
|
b.create<CallExpression>(nullptr, ExpressionList{});
|
|
|
|
},
|
|
|
|
"internal compiler error");
|
2020-03-05 20:35:57 +00:00
|
|
|
}
|
|
|
|
|
2021-04-15 17:47:23 +00:00
|
|
|
TEST_F(CallExpressionTest, Assert_Null_Param) {
|
ast: Replace IsValid() with TINT_ASSERT()
The readers must not produce invalid ASTs.
If readers cannot produce a valid AST, then they should error instead.
If a reader does produce an invalid AST, this change catches this bad behavior early, significantly helping identify the root of the broken logic.
IsValid() made a bit more sense in the days where the AST was mutable, and was constructed by calling setters on the nodes to build up the tree.
In order to detect bad ASTs, IsValid() would have to perform an entire AST traversal and give a yes / no answer for the entire tree. Not only was this slow, an answer of 'no' didn't tell you *where* the AST was invalid, resulting in a lot of manual debugging.
Now that the AST is fully immutable, all child nodes need to be built before their parents. The AST node constructors now become a perfect place to perform pointer sanity checking.
The argument for attempting to catch and handle invalid ASTs is not a compelling one.
Invalid ASTs are invalid compiler behavior, not something that should ever happen with a correctly functioning compiler.
If this were to happen in production, the user would be utterly clueless to _why_ the program is invalid, or _how_ to fix it.
Attempting to handle invalid ASTs is just masking a much larger problem.
Let's just let the fuzzers do their job to catch any of these cases early.
Fixed: chromium:1185569
Change-Id: I6496426a3a9da9d42627d2c1ca23917bfd04cc5c
Reviewed-on: https://dawn-review.googlesource.com/c/tint/+/44048
Commit-Queue: Ben Clayton <bclayton@chromium.org>
Reviewed-by: David Neto <dneto@google.com>
2021-03-10 11:41:49 +00:00
|
|
|
EXPECT_FATAL_FAILURE(
|
|
|
|
{
|
|
|
|
ProgramBuilder b;
|
|
|
|
ExpressionList params;
|
|
|
|
params.push_back(b.Expr("param1"));
|
|
|
|
params.push_back(nullptr);
|
|
|
|
params.push_back(b.Expr("param2"));
|
|
|
|
b.create<CallExpression>(b.Expr("func"), params);
|
|
|
|
},
|
|
|
|
"internal compiler error");
|
2020-03-05 20:35:57 +00:00
|
|
|
}
|
|
|
|
|
2021-04-15 17:47:23 +00:00
|
|
|
TEST_F(CallExpressionTest, Assert_DifferentProgramID_Function) {
|
|
|
|
EXPECT_FATAL_FAILURE(
|
|
|
|
{
|
|
|
|
ProgramBuilder b1;
|
|
|
|
ProgramBuilder b2;
|
|
|
|
b1.create<CallExpression>(b2.Expr("func"), ExpressionList{});
|
|
|
|
},
|
|
|
|
"internal compiler error");
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST_F(CallExpressionTest, Assert_DifferentProgramID_Param) {
|
|
|
|
EXPECT_FATAL_FAILURE(
|
|
|
|
{
|
|
|
|
ProgramBuilder b1;
|
|
|
|
ProgramBuilder b2;
|
|
|
|
b1.create<CallExpression>(b1.Expr("func"),
|
|
|
|
ExpressionList{b2.Expr("param1")});
|
|
|
|
},
|
|
|
|
"internal compiler error");
|
|
|
|
}
|
|
|
|
|
2020-03-05 20:35:57 +00:00
|
|
|
TEST_F(CallExpressionTest, ToStr_NoParams) {
|
2020-12-14 22:30:57 +00:00
|
|
|
auto* func = Expr("func");
|
|
|
|
auto* stmt = create<CallExpression>(func, ExpressionList{});
|
2021-01-29 11:22:40 +00:00
|
|
|
EXPECT_EQ(str(stmt), R"(Call[not set]{
|
|
|
|
Identifier[not set]{func}
|
|
|
|
(
|
|
|
|
)
|
|
|
|
}
|
2020-03-05 20:35:57 +00:00
|
|
|
)");
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST_F(CallExpressionTest, ToStr_WithParams) {
|
2020-12-14 22:30:57 +00:00
|
|
|
auto* func = Expr("func");
|
2020-04-06 19:37:37 +00:00
|
|
|
ExpressionList params;
|
2020-12-14 22:30:57 +00:00
|
|
|
params.push_back(Expr("param1"));
|
|
|
|
params.push_back(Expr("param2"));
|
2020-03-05 20:35:57 +00:00
|
|
|
|
2020-12-14 22:30:57 +00:00
|
|
|
auto* stmt = create<CallExpression>(func, params);
|
2021-01-29 11:22:40 +00:00
|
|
|
EXPECT_EQ(str(stmt), R"(Call[not set]{
|
|
|
|
Identifier[not set]{func}
|
|
|
|
(
|
|
|
|
Identifier[not set]{param1}
|
|
|
|
Identifier[not set]{param2}
|
|
|
|
)
|
|
|
|
}
|
2020-03-05 20:35:57 +00:00
|
|
|
)");
|
|
|
|
}
|
|
|
|
|
2020-03-26 15:31:43 +00:00
|
|
|
} // namespace
|
2020-03-05 20:35:57 +00:00
|
|
|
} // namespace ast
|
|
|
|
} // namespace tint
|