Fuzzers: Avoid passing target backend as parameter

Changes various fuzz targets so that the target back-end language (HLSL,
MSL, SPIR-V or WGSL) is no longer passed as a command line argument, but
instead baked into the fuzzer's binary. This avoids a problem whereby a
ClusterFuzz bug reproducer does not use the required back-end command
line argument.

Change-Id: I64402a23391ca0f24c9d1ffd2aa2f218cc7106b1
Reviewed-on: https://dawn-review.googlesource.com/c/tint/+/63163
Kokoro: Kokoro <noreply+kokoro@google.com>
Reviewed-by: Ryan Harrison <rharrison@chromium.org>
Commit-Queue: Alastair Donaldson <afdx@google.com>
This commit is contained in:
Alastair Donaldson 2021-08-31 22:07:17 +00:00 committed by Tint LUCI CQ
parent 14ac047d45
commit 44a0adf9b4
19 changed files with 456 additions and 39 deletions

View File

@ -32,7 +32,7 @@ if (build_with_chromium) {
outputs = [ fuzzer_corpus_wgsl_dir ]
}
tint_ast_fuzzer_common_libfuzzer_options = [
tint_ast_fuzzer_libfuzzer_options = [
"cross_over=0",
"max_len=1000000",
"mutate_depth=1",
@ -40,7 +40,7 @@ if (build_with_chromium) {
"tint_mutation_batch_size=5",
]
tint_regex_fuzzer_common_libfuzzer_options = [
tint_regex_fuzzer_libfuzzer_options = [
"cross_over=0",
"max_len=100000",
"mutate_depth=1",
@ -96,19 +96,17 @@ if (build_with_chromium) {
}
fuzzer_test("tint_ast_wgsl_writer_fuzzer") {
sources = []
sources = [ "tint_ast_fuzzer/tint_ast_wgsl_writer_fuzzer.cc" ]
deps = [ "tint_ast_fuzzer:tint_ast_fuzzer" ]
libfuzzer_options = tint_ast_fuzzer_common_libfuzzer_options +
[ "tint_fuzzing_target=wgsl" ]
libfuzzer_options = tint_ast_fuzzer_libfuzzer_options
seed_corpus = fuzzer_corpus_wgsl_dir
seed_corpus_deps = [ ":tint_generate_wgsl_corpus" ]
}
fuzzer_test("tint_regex_wgsl_writer_fuzzer") {
sources = []
sources = [ "tint_regex_fuzzer/tint_regex_wgsl_writer_fuzzer.cc" ]
deps = [ "tint_regex_fuzzer:tint_regex_fuzzer" ]
libfuzzer_options = tint_regex_fuzzer_common_libfuzzer_options +
[ "tint_fuzzing_target=wgsl" ]
libfuzzer_options = tint_regex_fuzzer_libfuzzer_options
seed_corpus = fuzzer_corpus_wgsl_dir
seed_corpus_deps = [ ":tint_generate_wgsl_corpus" ]
}
@ -132,10 +130,9 @@ if (build_with_chromium) {
}
fuzzer_test("tint_ast_spv_writer_fuzzer") {
sources = []
sources = [ "tint_ast_fuzzer/tint_ast_spv_writer_fuzzer.cc" ]
deps = [ "tint_ast_fuzzer:tint_ast_fuzzer" ]
libfuzzer_options = tint_ast_fuzzer_common_libfuzzer_options +
[ "tint_fuzzing_target=spv" ]
libfuzzer_options = tint_ast_fuzzer_libfuzzer_options
seed_corpus = fuzzer_corpus_wgsl_dir
seed_corpus_deps = [ ":tint_generate_wgsl_corpus" ]
}
@ -165,10 +162,9 @@ if (build_with_chromium) {
}
fuzzer_test("tint_regex_spv_writer_fuzzer") {
sources = []
sources = [ "tint_regex_fuzzer/tint_regex_spv_writer_fuzzer.cc" ]
deps = [ "tint_regex_fuzzer:tint_regex_fuzzer" ]
libfuzzer_options = tint_regex_fuzzer_common_libfuzzer_options +
[ "tint_fuzzing_target=spv" ]
libfuzzer_options = tint_regex_fuzzer_libfuzzer_options
seed_corpus = fuzzer_corpus_wgsl_dir
seed_corpus_deps = [ ":tint_generate_wgsl_corpus" ]
}
@ -216,19 +212,17 @@ if (build_with_chromium) {
if (tint_build_wgsl_reader && tint_build_hlsl_writer) {
fuzzer_test("tint_ast_hlsl_writer_fuzzer") {
sources = []
sources = [ "tint_ast_fuzzer/tint_ast_hlsl_writer_fuzzer.cc" ]
deps = [ "tint_ast_fuzzer:tint_ast_fuzzer" ]
libfuzzer_options = tint_ast_fuzzer_common_libfuzzer_options +
[ "tint_fuzzing_target=hlsl" ]
libfuzzer_options = tint_ast_fuzzer_libfuzzer_options
seed_corpus = fuzzer_corpus_wgsl_dir
seed_corpus_deps = [ ":tint_generate_wgsl_corpus" ]
}
fuzzer_test("tint_regex_hlsl_writer_fuzzer") {
sources = []
sources = [ "tint_regex_fuzzer/tint_regex_hlsl_writer_fuzzer.cc" ]
deps = [ "tint_regex_fuzzer:tint_regex_fuzzer" ]
libfuzzer_options = tint_regex_fuzzer_common_libfuzzer_options +
[ "tint_fuzzing_target=hlsl" ]
libfuzzer_options = tint_regex_fuzzer_libfuzzer_options
seed_corpus = fuzzer_corpus_wgsl_dir
seed_corpus_deps = [ ":tint_generate_wgsl_corpus" ]
}
@ -244,19 +238,17 @@ if (build_with_chromium) {
if (tint_build_wgsl_reader && tint_build_msl_writer) {
fuzzer_test("tint_ast_msl_writer_fuzzer") {
sources = []
sources = [ "tint_ast_fuzzer/tint_ast_msl_writer_fuzzer.cc" ]
deps = [ "tint_ast_fuzzer:tint_ast_fuzzer" ]
libfuzzer_options = tint_ast_fuzzer_common_libfuzzer_options +
[ "tint_fuzzing_target=msl" ]
libfuzzer_options = tint_ast_fuzzer_libfuzzer_options
seed_corpus = fuzzer_corpus_wgsl_dir
seed_corpus_deps = [ ":tint_generate_wgsl_corpus" ]
}
fuzzer_test("tint_regex_msl_writer_fuzzer") {
sources = []
sources = [ "tint_regex_fuzzer/tint_regex_msl_writer_fuzzer.cc" ]
deps = [ "tint_regex_fuzzer:tint_regex_fuzzer" ]
libfuzzer_options = tint_regex_fuzzer_common_libfuzzer_options +
[ "tint_fuzzing_target=msl" ]
libfuzzer_options = tint_regex_fuzzer_libfuzzer_options
seed_corpus = fuzzer_corpus_wgsl_dir
seed_corpus_deps = [ ":tint_generate_wgsl_corpus" ]
}

View File

@ -56,6 +56,7 @@ if (build_with_chromium) {
"mutator.h",
"node_id_map.cc",
"node_id_map.h",
"override_cli_params.h",
"probability_context.cc",
"probability_context.h",
"protobufs/tint_ast_fuzzer.h",

View File

@ -12,6 +12,14 @@
# See the License for the specific language governing permissions and
# limitations under the License.
function(add_tint_ast_fuzzer NAME)
add_executable(${NAME} ${NAME}.cc ${AST_FUZZER_SOURCES})
target_link_libraries(${NAME} libtint-fuzz libtint_ast_fuzzer)
tint_default_compile_options(${NAME})
target_compile_definitions(${NAME} PRIVATE CUSTOM_MUTATOR)
target_include_directories(${NAME} PRIVATE ${CMAKE_BINARY_DIR})
endfunction()
set(PROTOBUF_SOURCES ${CMAKE_CURRENT_SOURCE_DIR}/protobufs/tint_ast_fuzzer.proto)
file(MAKE_DIRECTORY ${CMAKE_CURRENT_BINARY_DIR}/protobufs)
@ -64,17 +72,20 @@ set(AST_FUZZER_SOURCES
cli.cc
cli.h
fuzzer.cc
override_cli_params.h
../tint_common_fuzzer.cc
../tint_common_fuzzer.h)
set_source_files_properties(fuzzer.cc PROPERTIES COMPILE_FLAGS -Wno-missing-prototypes)
# Add libfuzzer target.
add_executable(tint_ast_fuzzer ${AST_FUZZER_SOURCES})
target_link_libraries(tint_ast_fuzzer libtint-fuzz libtint_ast_fuzzer)
tint_default_compile_options(tint_ast_fuzzer)
target_compile_definitions(tint_ast_fuzzer PRIVATE CUSTOM_MUTATOR)
target_include_directories(tint_ast_fuzzer PRIVATE ${CMAKE_BINARY_DIR})
# Add libfuzzer targets.
# Targets back-ends according to command line arguments.
add_tint_ast_fuzzer(tint_ast_fuzzer)
# Targets back-ends individually.
add_tint_ast_fuzzer(tint_ast_hlsl_writer_fuzzer)
add_tint_ast_fuzzer(tint_ast_msl_writer_fuzzer)
add_tint_ast_fuzzer(tint_ast_spv_writer_fuzzer)
add_tint_ast_fuzzer(tint_ast_wgsl_writer_fuzzer)
# Add tests.
if (${TINT_BUILD_TESTS})

View File

@ -18,6 +18,7 @@
#include "fuzzers/tint_ast_fuzzer/cli.h"
#include "fuzzers/tint_ast_fuzzer/mt_rng.h"
#include "fuzzers/tint_ast_fuzzer/mutator.h"
#include "fuzzers/tint_ast_fuzzer/override_cli_params.h"
#include "fuzzers/tint_common_fuzzer.h"
#include "src/reader/wgsl/parser.h"
@ -34,6 +35,9 @@ extern "C" int LLVMFuzzerInitialize(int* argc, char*** argv) {
// Parse CLI parameters. `ParseCliParams` will call `exit` if some parameter
// is invalid.
cli_params = ParseCliParams(argc, *argv);
// For some fuzz targets it is desirable to force the values of certain CLI
// parameters after parsing.
OverrideCliParams(cli_params);
return 0;
}

View File

@ -0,0 +1,36 @@
// Copyright 2021 The Tint Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#ifndef FUZZERS_TINT_AST_FUZZER_OVERRIDE_CLI_PARAMS_H_
#define FUZZERS_TINT_AST_FUZZER_OVERRIDE_CLI_PARAMS_H_
#include "fuzzers/tint_ast_fuzzer/cli.h"
namespace tint {
namespace fuzzers {
namespace ast_fuzzer {
/// @brief Allows CLI parameters to be overridden.
///
/// This function allows fuzz targets to override particular CLI parameters,
/// for example forcing a particular back-end to be targeted.
///
/// @param cli_params - the parsed CLI parameters to be updated.
void OverrideCliParams(CliParams& cli_params);
} // namespace ast_fuzzer
} // namespace fuzzers
} // namespace tint
#endif // FUZZERS_TINT_AST_FUZZER_OVERRIDE_CLI_PARAMS_H_

View File

@ -0,0 +1,28 @@
// Copyright 2021 The Tint Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include "fuzzers/tint_ast_fuzzer/cli.h"
#include "fuzzers/tint_ast_fuzzer/override_cli_params.h"
namespace tint {
namespace fuzzers {
namespace ast_fuzzer {
void OverrideCliParams(CliParams& /*unused*/) {
// Leave the CLI parameters unchanged.
}
} // namespace ast_fuzzer
} // namespace fuzzers
} // namespace tint

View File

@ -0,0 +1,33 @@
// Copyright 2021 The Tint Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include <cassert>
#include "fuzzers/tint_ast_fuzzer/cli.h"
#include "fuzzers/tint_ast_fuzzer/override_cli_params.h"
namespace tint {
namespace fuzzers {
namespace ast_fuzzer {
void OverrideCliParams(CliParams& cli_params) {
assert(cli_params.fuzzing_target == FuzzingTarget::kAll &&
"The fuzzing target should not have been set by a CLI parameter: it "
"should have its default value.");
cli_params.fuzzing_target = FuzzingTarget::kHlsl;
}
} // namespace ast_fuzzer
} // namespace fuzzers
} // namespace tint

View File

@ -0,0 +1,33 @@
// Copyright 2021 The Tint Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include <cassert>
#include "fuzzers/tint_ast_fuzzer/cli.h"
#include "fuzzers/tint_ast_fuzzer/override_cli_params.h"
namespace tint {
namespace fuzzers {
namespace ast_fuzzer {
void OverrideCliParams(CliParams& cli_params) {
assert(cli_params.fuzzing_target == FuzzingTarget::kAll &&
"The fuzzing target should not have been set by a CLI parameter: it "
"should have its default value.");
cli_params.fuzzing_target = FuzzingTarget::kMsl;
}
} // namespace ast_fuzzer
} // namespace fuzzers
} // namespace tint

View File

@ -0,0 +1,33 @@
// Copyright 2021 The Tint Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include <cassert>
#include "fuzzers/tint_ast_fuzzer/cli.h"
#include "fuzzers/tint_ast_fuzzer/override_cli_params.h"
namespace tint {
namespace fuzzers {
namespace ast_fuzzer {
void OverrideCliParams(CliParams& cli_params) {
assert(cli_params.fuzzing_target == FuzzingTarget::kAll &&
"The fuzzing target should not have been set by a CLI parameter: it "
"should have its default value.");
cli_params.fuzzing_target = FuzzingTarget::kSpv;
}
} // namespace ast_fuzzer
} // namespace fuzzers
} // namespace tint

View File

@ -0,0 +1,33 @@
// Copyright 2021 The Tint Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include <cassert>
#include "fuzzers/tint_ast_fuzzer/cli.h"
#include "fuzzers/tint_ast_fuzzer/override_cli_params.h"
namespace tint {
namespace fuzzers {
namespace ast_fuzzer {
void OverrideCliParams(CliParams& cli_params) {
assert(cli_params.fuzzing_target == FuzzingTarget::kAll &&
"The fuzzing target should not have been set by a CLI parameter: it "
"should have its default value.");
cli_params.fuzzing_target = FuzzingTarget::kWgsl;
}
} // namespace ast_fuzzer
} // namespace fuzzers
} // namespace tint

View File

@ -28,6 +28,7 @@ if (build_with_chromium) {
"cli.cc",
"cli.h",
"fuzzer.cc",
"override_cli_params.h",
"wgsl_mutator.cc",
"wgsl_mutator.h",
]

View File

@ -12,6 +12,14 @@
# See the License for the specific language governing permissions and
# limitations under the License.
function(add_tint_regex_fuzzer NAME)
add_executable(${NAME} ${NAME}.cc ${REGEX_FUZZER_SOURCES})
target_link_libraries(${NAME} libtint-fuzz libtint_regex_fuzzer)
tint_default_compile_options(${NAME})
target_compile_definitions(${NAME} PRIVATE CUSTOM_MUTATOR)
target_include_directories(${NAME} PRIVATE ${CMAKE_BINARY_DIR})
endfunction()
set(LIBTINT_REGEX_FUZZER_SOURCES
util.h
wgsl_mutator.cc
@ -25,16 +33,20 @@ set(REGEX_FUZZER_SOURCES
cli.cc
cli.h
fuzzer.cc
override_cli_params.h
../tint_common_fuzzer.cc
../tint_common_fuzzer.h)
# Add libfuzzer target.
add_executable(tint_regex_fuzzer ${REGEX_FUZZER_SOURCES})
target_compile_options(tint_regex_fuzzer PRIVATE
-Wno-missing-prototypes)
target_link_libraries(tint_regex_fuzzer libtint-fuzz libtint_regex_fuzzer)
tint_default_compile_options(tint_regex_fuzzer)
target_compile_definitions(tint_regex_fuzzer PUBLIC CUSTOM_MUTATOR)
set_source_files_properties(fuzzer.cc PROPERTIES COMPILE_FLAGS -Wno-missing-prototypes)
# Add libfuzzer targets.
# Targets back-ends according to command line arguments.
add_tint_regex_fuzzer(tint_regex_fuzzer)
# Targets back-ends individually.
add_tint_regex_fuzzer(tint_regex_hlsl_writer_fuzzer)
add_tint_regex_fuzzer(tint_regex_msl_writer_fuzzer)
add_tint_regex_fuzzer(tint_regex_spv_writer_fuzzer)
add_tint_regex_fuzzer(tint_regex_wgsl_writer_fuzzer)
# Add tests.
if (${TINT_BUILD_TESTS})

View File

@ -18,6 +18,7 @@
#include "fuzzers/tint_common_fuzzer.h"
#include "fuzzers/tint_regex_fuzzer/cli.h"
#include "fuzzers/tint_regex_fuzzer/override_cli_params.h"
#include "fuzzers/tint_regex_fuzzer/util.h"
#include "fuzzers/tint_regex_fuzzer/wgsl_mutator.h"
@ -44,6 +45,9 @@ extern "C" int LLVMFuzzerInitialize(int* argc, char*** argv) {
// Parse CLI parameters. `ParseCliParams` will call `exit` if some parameter
// is invalid.
cli_params = ParseCliParams(argc, *argv);
// For some fuzz targets it is desirable to force the values of certain CLI
// parameters after parsing.
OverrideCliParams(cli_params);
return 0;
}

View File

@ -0,0 +1,36 @@
// Copyright 2021 The Tint Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#ifndef FUZZERS_TINT_REGEX_FUZZER_OVERRIDE_CLI_PARAMS_H_
#define FUZZERS_TINT_REGEX_FUZZER_OVERRIDE_CLI_PARAMS_H_
#include "fuzzers/tint_regex_fuzzer/cli.h"
namespace tint {
namespace fuzzers {
namespace regex_fuzzer {
/// @brief Allows CLI parameters to be overridden.
///
/// This function allows fuzz targets to override particular CLI parameters,
/// for example forcing a particular back-end to be targeted.
///
/// @param cli_params - the parsed CLI parameters to be updated.
void OverrideCliParams(CliParams& cli_params);
} // namespace regex_fuzzer
} // namespace fuzzers
} // namespace tint
#endif // FUZZERS_TINT_REGEX_FUZZER_OVERRIDE_CLI_PARAMS_H_

View File

@ -0,0 +1,28 @@
// Copyright 2021 The Tint Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include "fuzzers/tint_regex_fuzzer/cli.h"
#include "fuzzers/tint_regex_fuzzer/override_cli_params.h"
namespace tint {
namespace fuzzers {
namespace regex_fuzzer {
void OverrideCliParams(CliParams& /*unused*/) {
// Leave the CLI parameters unchanged.
}
} // namespace regex_fuzzer
} // namespace fuzzers
} // namespace tint

View File

@ -0,0 +1,33 @@
// Copyright 2021 The Tint Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include <cassert>
#include "fuzzers/tint_regex_fuzzer/cli.h"
#include "fuzzers/tint_regex_fuzzer/override_cli_params.h"
namespace tint {
namespace fuzzers {
namespace regex_fuzzer {
void OverrideCliParams(CliParams& cli_params) {
assert(cli_params.fuzzing_target == FuzzingTarget::kAll &&
"The fuzzing target should not have been set by a CLI parameter: it "
"should have its default value.");
cli_params.fuzzing_target = FuzzingTarget::kHlsl;
}
} // namespace regex_fuzzer
} // namespace fuzzers
} // namespace tint

View File

@ -0,0 +1,33 @@
// Copyright 2021 The Tint Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include <cassert>
#include "fuzzers/tint_regex_fuzzer/cli.h"
#include "fuzzers/tint_regex_fuzzer/override_cli_params.h"
namespace tint {
namespace fuzzers {
namespace regex_fuzzer {
void OverrideCliParams(CliParams& cli_params) {
assert(cli_params.fuzzing_target == FuzzingTarget::kAll &&
"The fuzzing target should not have been set by a CLI parameter: it "
"should have its default value.");
cli_params.fuzzing_target = FuzzingTarget::kMsl;
}
} // namespace regex_fuzzer
} // namespace fuzzers
} // namespace tint

View File

@ -0,0 +1,33 @@
// Copyright 2021 The Tint Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include <cassert>
#include "fuzzers/tint_regex_fuzzer/cli.h"
#include "fuzzers/tint_regex_fuzzer/override_cli_params.h"
namespace tint {
namespace fuzzers {
namespace regex_fuzzer {
void OverrideCliParams(CliParams& cli_params) {
assert(cli_params.fuzzing_target == FuzzingTarget::kAll &&
"The fuzzing target should not have been set by a CLI parameter: it "
"should have its default value.");
cli_params.fuzzing_target = FuzzingTarget::kSpv;
}
} // namespace regex_fuzzer
} // namespace fuzzers
} // namespace tint

View File

@ -0,0 +1,33 @@
// Copyright 2021 The Tint Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include <cassert>
#include "fuzzers/tint_regex_fuzzer/cli.h"
#include "fuzzers/tint_regex_fuzzer/override_cli_params.h"
namespace tint {
namespace fuzzers {
namespace regex_fuzzer {
void OverrideCliParams(CliParams& cli_params) {
assert(cli_params.fuzzing_target == FuzzingTarget::kAll &&
"The fuzzing target should not have been set by a CLI parameter: it "
"should have its default value.");
cli_params.fuzzing_target = FuzzingTarget::kWgsl;
}
} // namespace regex_fuzzer
} // namespace fuzzers
} // namespace tint