blob: 7bddaee4f2afd78e807fb697f22dba1d505dce18 [file] [log] [blame]
// Copyright 2023 The Dawn & Tint Authors
//
// Redistribution and use in source and binary forms, with or without
// modification, are permitted provided that the following conditions are met:
//
// 1. Redistributions of source code must retain the above copyright notice, this
// list of conditions and the following disclaimer.
//
// 2. Redistributions in binary form must reproduce the above copyright notice,
// this list of conditions and the following disclaimer in the documentation
// and/or other materials provided with the distribution.
//
// 3. Neither the name of the copyright holder nor the names of its
// contributors may be used to endorse or promote products derived from
// this software without specific prior written permission.
//
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
// AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
// IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
// DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
// FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
// DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
// SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
// CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
// OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
// fuzz is a helper for running the tint fuzzer executables
package main
import (
"bytes"
"context"
"flag"
"fmt"
"io"
"log"
"os"
"os/exec"
"path/filepath"
"runtime"
"strings"
"sync/atomic"
"dawn.googlesource.com/dawn/tools/src/fileutils"
"dawn.googlesource.com/dawn/tools/src/glob"
"dawn.googlesource.com/dawn/tools/src/progressbar"
"dawn.googlesource.com/dawn/tools/src/term"
"dawn.googlesource.com/dawn/tools/src/transform"
"dawn.googlesource.com/dawn/tools/src/utils"
)
const (
wgslDictionaryRelPath = "src/tint/cmd/fuzz/wgsl/dictionary.txt"
)
func main() {
if err := run(); err != nil {
fmt.Println(err)
os.Exit(1)
}
}
func showUsage() {
fmt.Println(`
fuzz is a helper for running the tint fuzzer executables
fuzz can check that the corpus does not trigger any issues with the fuzzers, and
simplify running of the fuzzers locally.
usage:
fuzz [flags...]`)
flag.PrintDefaults()
fmt.Println(``)
os.Exit(1)
}
func run() error {
t := tool{}
check := false
build := ""
flag.BoolVar(&t.verbose, "verbose", false, "print additional output")
flag.BoolVar(&check, "check", false, "check that all the end-to-end test do not fail")
flag.StringVar(&t.filter, "filter", "", "filter the fuzzers run to those with this substring")
flag.StringVar(&t.corpus, "corpus", defaultCorpusDir(), "the corpus directory")
flag.StringVar(&build, "build", defaultBuildDir(), "the build directory")
flag.StringVar(&t.out, "out", "<tmp>", "the directory to hold generated test files")
flag.IntVar(&t.numProcesses, "j", runtime.NumCPU(), "number of concurrent fuzzers to run")
flag.Parse()
if t.numProcesses < 1 {
t.numProcesses = 1
}
if !fileutils.IsDir(build) {
return fmt.Errorf("build directory '%v' does not exist", build)
}
// Verify / create the output directory
if t.out == "" || t.out == "<tmp>" {
if tmp, err := os.MkdirTemp("", "tint_fuzz"); err == nil {
defer os.RemoveAll(tmp)
t.out = tmp
} else {
return err
}
}
if !fileutils.IsDir(t.out) {
return fmt.Errorf("output directory '%v' does not exist", t.out)
}
// Verify all of the fuzzer executables are present
for _, fuzzer := range []struct {
name string
path *string
}{
{"tint_wgsl_fuzzer", &t.wgslFuzzer},
} {
*fuzzer.path = filepath.Join(build, fuzzer.name)
if !fileutils.IsExe(*fuzzer.path) {
return fmt.Errorf("fuzzer not found at '%v'", *fuzzer.path)
}
}
// If --check was passed, then just ensure that all the files in the corpus
// directory don't upset the fuzzers
if check {
return t.check()
}
// Run the fuzzers
return t.run()
}
type tool struct {
verbose bool
filter string // filter fuzzers to those with this substring
corpus string // directory of test files
out string // where to emit new test files
wgslFuzzer string // path to tint_wgsl_fuzzer
numProcesses int // number of concurrent processes to spawn
}
// check() runs the fuzzers against all the .wgsl files under to the corpus directory,
// ensuring that the fuzzers do not error for the given file.
func (t tool) check() error {
wgslFiles, err := glob.Glob(filepath.Join(t.corpus, "**.wgsl"))
if err != nil {
return err
}
// Remove '*.expected.wgsl'
wgslFiles = transform.Filter(wgslFiles, func(s string) bool { return !strings.Contains(s, ".expected.") })
log.Printf("checking %v files...\n", len(wgslFiles))
remaining := transform.SliceToChan(wgslFiles)
var pb *progressbar.ProgressBar
if term.CanUseAnsiEscapeSequences() {
pb = progressbar.New(os.Stdout, nil)
defer pb.Stop()
}
var numDone uint32
routine := func() error {
for file := range remaining {
atomic.AddUint32(&numDone, 1)
if pb != nil {
pb.Update(progressbar.Status{
Total: len(wgslFiles),
Segments: []progressbar.Segment{
{Count: int(atomic.LoadUint32(&numDone))},
},
})
}
if out, err := exec.Command(t.wgslFuzzer, file).CombinedOutput(); err != nil {
_, fuzzer := filepath.Split(t.wgslFuzzer)
return fmt.Errorf("%v run with %v failed with %v\n\n%v", fuzzer, file, err, string(out))
}
}
return nil
}
if err = utils.RunConcurrent(t.numProcesses, routine); err != nil {
return err
}
log.Printf("done")
return nil
}
// run() runs the fuzzers across t.numProcesses processes.
// The fuzzers will use t.corpus as the seed directory.
// New cases are written to t.out.
// Blocks until a fuzzer errors, or the process is interrupted.
func (t tool) run() error {
ctx := utils.CancelOnInterruptContext(context.Background())
ctx, cancel := context.WithCancel(ctx)
defer cancel()
dictPath, err := filepath.Abs(filepath.Join(fileutils.DawnRoot(), wgslDictionaryRelPath))
if err != nil || !fileutils.IsFile(dictPath) {
return fmt.Errorf("failed to obtain the dictionary.txt path: %w", err)
}
args := []string{t.out, t.corpus,
"-dict=" + dictPath,
}
if t.verbose {
args = append(args, "--verbose")
}
if t.filter != "" {
args = append(args, "--filter="+t.filter)
}
fmt.Println("running", t.numProcesses, "fuzzer instances")
errs := make(chan error, t.numProcesses)
for i := 0; i < t.numProcesses; i++ {
go func() {
cmd := exec.CommandContext(ctx, t.wgslFuzzer, args...)
out := bytes.Buffer{}
cmd.Stdout = &out
cmd.Stderr = &out
if t.verbose {
cmd.Stdout = io.MultiWriter(&out, os.Stdout)
cmd.Stderr = io.MultiWriter(&out, os.Stderr)
}
if err := cmd.Run(); err != nil {
if ctxErr := ctx.Err(); ctxErr != nil {
errs <- ctxErr
} else {
_, fuzzer := filepath.Split(t.wgslFuzzer)
errs <- fmt.Errorf("%v failed with %v\n\n%v", fuzzer, err, out.String())
}
} else {
errs <- fmt.Errorf("fuzzer unexpectedly terminated without error:\n%v", out.String())
}
}()
}
for err := range errs {
return err
}
return nil
}
func defaultCorpusDir() string {
return filepath.Join(fileutils.DawnRoot(), "test/tint")
}
func defaultBuildDir() string {
return filepath.Join(fileutils.DawnRoot(), "out/active")
}