mirror of
https://github.com/encounter/dawn-cmake.git
synced 2025-08-09 05:29:17 +00:00
The are replaced by Queue::OnSubmittedWorkDone. Only Queue::CreateFence is deprecated since all other fence-related calls require a fence to work. Also ports a number of uses of fences in test harness to use Queue::OnSubmittedWorkDone instead. Bug: chromium:1177476 Change-Id: I479415f72b08158a3484013e00db8facd11e6f33 Reviewed-on: https://dawn-review.googlesource.com/c/dawn/+/42660 Auto-Submit: Corentin Wallez <cwallez@chromium.org> Commit-Queue: Brandon Jones <bajones@chromium.org> Reviewed-by: Austin Eng <enga@chromium.org> Reviewed-by: Brandon Jones <bajones@chromium.org>
196 lines
7.2 KiB
C++
196 lines
7.2 KiB
C++
// Copyright 2019 The Dawn Authors
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
#include "DawnWireServerFuzzer.h"
|
|
|
|
#include "common/Assert.h"
|
|
#include "common/Log.h"
|
|
#include "common/SystemUtils.h"
|
|
#include "dawn/dawn_proc.h"
|
|
#include "dawn/webgpu_cpp.h"
|
|
#include "dawn_native/DawnNative.h"
|
|
#include "dawn_wire/WireServer.h"
|
|
#include "utils/SystemUtils.h"
|
|
|
|
#include <fstream>
|
|
#include <vector>
|
|
|
|
namespace {
|
|
|
|
class DevNull : public dawn_wire::CommandSerializer {
|
|
public:
|
|
size_t GetMaximumAllocationSize() const override {
|
|
// Some fuzzer bots have a 2GB allocation limit. Pick a value reasonably below that.
|
|
return 1024 * 1024 * 1024;
|
|
}
|
|
void* GetCmdSpace(size_t size) override {
|
|
if (size > buf.size()) {
|
|
buf.resize(size);
|
|
}
|
|
return buf.data();
|
|
}
|
|
bool Flush() override {
|
|
return true;
|
|
}
|
|
|
|
private:
|
|
std::vector<char> buf;
|
|
};
|
|
|
|
std::unique_ptr<dawn_native::Instance> sInstance;
|
|
WGPUProcDeviceCreateSwapChain sOriginalDeviceCreateSwapChain = nullptr;
|
|
|
|
std::string sInjectedErrorTestcaseOutDir;
|
|
uint64_t sOutputFileNumber = 0;
|
|
|
|
bool sCommandsComplete = false;
|
|
|
|
WGPUSwapChain ErrorDeviceCreateSwapChain(WGPUDevice device,
|
|
WGPUSurface surface,
|
|
const WGPUSwapChainDescriptor*) {
|
|
WGPUSwapChainDescriptor desc = {};
|
|
// A 0 implementation will trigger a swapchain creation error.
|
|
desc.implementation = 0;
|
|
return sOriginalDeviceCreateSwapChain(device, surface, &desc);
|
|
}
|
|
|
|
} // namespace
|
|
|
|
int DawnWireServerFuzzer::Initialize(int* argc, char*** argv) {
|
|
ASSERT(argc != nullptr && argv != nullptr);
|
|
|
|
// The first argument (the fuzzer binary) always stays the same.
|
|
int argcOut = 1;
|
|
|
|
for (int i = 1; i < *argc; ++i) {
|
|
constexpr const char kInjectedErrorTestcaseDirArg[] = "--injected-error-testcase-dir=";
|
|
if (strstr((*argv)[i], kInjectedErrorTestcaseDirArg) == (*argv)[i]) {
|
|
sInjectedErrorTestcaseOutDir = (*argv)[i] + strlen(kInjectedErrorTestcaseDirArg);
|
|
const char* sep = GetPathSeparator();
|
|
if (sInjectedErrorTestcaseOutDir.back() != *sep) {
|
|
sInjectedErrorTestcaseOutDir += sep;
|
|
}
|
|
// Log so that it's clear the fuzzer found the argument.
|
|
dawn::InfoLog() << "Generating injected errors, output dir is: \""
|
|
<< sInjectedErrorTestcaseOutDir << "\"";
|
|
continue;
|
|
}
|
|
|
|
// Move any unconsumed arguments to the next slot in the output array.
|
|
(*argv)[argcOut++] = (*argv)[i];
|
|
}
|
|
|
|
// Write the argument count
|
|
*argc = argcOut;
|
|
|
|
// TODO(crbug.com/1038952): The Instance must be static because destructing the vkInstance with
|
|
// Swiftshader crashes libFuzzer. When this is fixed, move this into Run so that error injection
|
|
// for adapter discovery can be fuzzed.
|
|
sInstance = std::make_unique<dawn_native::Instance>();
|
|
sInstance->DiscoverDefaultAdapters();
|
|
|
|
return 0;
|
|
}
|
|
|
|
int DawnWireServerFuzzer::Run(const uint8_t* data,
|
|
size_t size,
|
|
MakeDeviceFn MakeDevice,
|
|
bool supportsErrorInjection) {
|
|
bool didInjectError = false;
|
|
|
|
if (supportsErrorInjection) {
|
|
dawn_native::EnableErrorInjector();
|
|
|
|
// Clear the error injector since it has the previous run's call counts.
|
|
dawn_native::ClearErrorInjector();
|
|
|
|
// If we're outputing testcases with injected errors, we run the fuzzer on the original
|
|
// input data, and prepend injected errors to it. In the case, where we're NOT outputing,
|
|
// we use the first bytes as the injected error index.
|
|
if (sInjectedErrorTestcaseOutDir.empty() && size >= sizeof(uint64_t)) {
|
|
// Otherwise, use the first bytes as the injected error index.
|
|
dawn_native::InjectErrorAt(*reinterpret_cast<const uint64_t*>(data));
|
|
didInjectError = true;
|
|
|
|
data += sizeof(uint64_t);
|
|
size -= sizeof(uint64_t);
|
|
}
|
|
}
|
|
|
|
DawnProcTable procs = dawn_native::GetProcs();
|
|
|
|
// Swapchains receive a pointer to an implementation. The fuzzer will pass garbage in so we
|
|
// intercept calls to create swapchains and make sure they always return error swapchains.
|
|
// This is ok for fuzzing because embedders of dawn_wire would always define their own
|
|
// swapchain handling.
|
|
sOriginalDeviceCreateSwapChain = procs.deviceCreateSwapChain;
|
|
procs.deviceCreateSwapChain = ErrorDeviceCreateSwapChain;
|
|
|
|
dawnProcSetProcs(&procs);
|
|
|
|
wgpu::Device device = MakeDevice(sInstance.get());
|
|
if (!device) {
|
|
// We should only ever fail device creation if an error was injected.
|
|
ASSERT(didInjectError);
|
|
return 0;
|
|
}
|
|
|
|
DevNull devNull;
|
|
dawn_wire::WireServerDescriptor serverDesc = {};
|
|
serverDesc.procs = &procs;
|
|
serverDesc.serializer = &devNull;
|
|
|
|
std::unique_ptr<dawn_wire::WireServer> wireServer(new dawn_wire::WireServer(serverDesc));
|
|
wireServer->InjectDevice(device.Get(), 1, 0);
|
|
|
|
wireServer->HandleCommands(reinterpret_cast<const char*>(data), size);
|
|
|
|
// Wait for all previous commands before destroying the server.
|
|
// TODO(enga): Improve this when we improve/finalize how processing events happens.
|
|
{
|
|
device.GetQueue().OnSubmittedWorkDone(
|
|
0u, [](WGPUQueueWorkDoneStatus, void*) { sCommandsComplete = true; }, nullptr);
|
|
while (!sCommandsComplete) {
|
|
device.Tick();
|
|
utils::USleep(100);
|
|
}
|
|
}
|
|
|
|
wireServer = nullptr;
|
|
|
|
// If we support error injection, and an output directory was provided, output copies of the
|
|
// original testcase data, prepended with the injected error index.
|
|
if (supportsErrorInjection && !sInjectedErrorTestcaseOutDir.empty()) {
|
|
const uint64_t injectedCallCount = dawn_native::AcquireErrorInjectorCallCount();
|
|
|
|
auto WriteTestcase = [&](uint64_t i) {
|
|
std::ofstream outFile(
|
|
sInjectedErrorTestcaseOutDir + "injected_error_testcase_" +
|
|
std::to_string(sOutputFileNumber++),
|
|
std::ios_base::out | std::ios_base::binary | std::ios_base::trunc);
|
|
outFile.write(reinterpret_cast<const char*>(&i), sizeof(i));
|
|
outFile.write(reinterpret_cast<const char*>(data), size);
|
|
};
|
|
|
|
for (uint64_t i = 0; i < injectedCallCount; ++i) {
|
|
WriteTestcase(i);
|
|
}
|
|
|
|
// Also add a testcase where the injected error is so large no errors should occur.
|
|
WriteTestcase(std::numeric_limits<uint64_t>::max());
|
|
}
|
|
|
|
return 0;
|
|
}
|