| // Copyright 2021 The Dawn & Tint Authors | 
 | // | 
 | // Redistribution and use in source and binary forms, with or without | 
 | // modification, are permitted provided that the following conditions are met: | 
 | // | 
 | // 1. Redistributions of source code must retain the above copyright notice, this | 
 | //    list of conditions and the following disclaimer. | 
 | // | 
 | // 2. Redistributions in binary form must reproduce the above copyright notice, | 
 | //    this list of conditions and the following disclaimer in the documentation | 
 | //    and/or other materials provided with the distribution. | 
 | // | 
 | // 3. Neither the name of the copyright holder nor the names of its | 
 | //    contributors may be used to endorse or promote products derived from | 
 | //    this software without specific prior written permission. | 
 | // | 
 | // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" | 
 | // AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 
 | // IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE | 
 | // DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE | 
 | // FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | 
 | // DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR | 
 | // SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER | 
 | // CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, | 
 | // OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE | 
 | // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 
 |  | 
 | #include <cstddef> | 
 | #include <cstdint> | 
 |  | 
 | #include "src/tint/fuzzers/random_generator.h" | 
 | #include "src/tint/fuzzers/tint_ast_fuzzer/cli.h" | 
 | #include "src/tint/fuzzers/tint_ast_fuzzer/mutator.h" | 
 | #include "src/tint/fuzzers/tint_ast_fuzzer/override_cli_params.h" | 
 | #include "src/tint/fuzzers/tint_common_fuzzer.h" | 
 | #include "src/tint/fuzzers/transform_builder.h" | 
 | #include "src/tint/lang/wgsl/reader/reader.h" | 
 | #include "src/tint/lang/wgsl/writer/writer.h" | 
 | #include "testing/libfuzzer/libfuzzer_exports.h" | 
 |  | 
 | namespace tint::fuzzers::ast_fuzzer { | 
 | namespace { | 
 |  | 
 | CliParams cli_params{}; | 
 |  | 
 | extern "C" int LLVMFuzzerInitialize(int* argc, char*** argv) { | 
 |     // Parse CLI parameters. `ParseCliParams` will call `exit` if some parameter | 
 |     // is invalid. | 
 |     cli_params = ParseCliParams(argc, *argv); | 
 |     // For some fuzz targets it is desirable to force the values of certain CLI | 
 |     // parameters after parsing. | 
 |     OverrideCliParams(cli_params); | 
 |     return 0; | 
 | } | 
 |  | 
 | extern "C" size_t LLVMFuzzerCustomMutator(uint8_t* data, | 
 |                                           size_t size, | 
 |                                           size_t max_size, | 
 |                                           unsigned seed) { | 
 |     Source::File file("test.wgsl", {reinterpret_cast<char*>(data), size}); | 
 |     auto program = wgsl::reader::Parse(&file); | 
 |     if (!program.IsValid()) { | 
 |         std::cout << "Trying to mutate an invalid program:" << std::endl | 
 |                   << program.Diagnostics() << std::endl; | 
 |         return 0; | 
 |     } | 
 |  | 
 |     // Run the mutator. | 
 |     RandomGenerator generator(seed); | 
 |     ProbabilityContext probability_context(&generator); | 
 |     program = Mutate(std::move(program), &probability_context, cli_params.enable_all_mutations, | 
 |                      cli_params.mutation_batch_size, nullptr); | 
 |  | 
 |     if (!program.IsValid()) { | 
 |         std::cout << "Mutator produced invalid WGSL:" << std::endl | 
 |                   << "  seed: " << seed << std::endl | 
 |                   << program.Diagnostics() << std::endl; | 
 |         return 0; | 
 |     } | 
 |  | 
 |     auto result = wgsl::writer::Generate(program, wgsl::writer::Options()); | 
 |     if (result != Success) { | 
 |         std::cout << "Can't generate WGSL for a valid tint::Program:" << std::endl | 
 |                   << result.Failure() << std::endl; | 
 |         return 0; | 
 |     } | 
 |  | 
 |     if (result->wgsl.size() > max_size) { | 
 |         return 0; | 
 |     } | 
 |  | 
 |     // No need to worry about the \0 here. The reason is that if \0 is included by | 
 |     // developer by mistake, it will be considered a part of the string and will | 
 |     // cause all sorts of strange bugs. Thus, unless `data` below is used as a raw | 
 |     // C string, the \0 symbol should be ignored. | 
 |     std::memcpy(  // NOLINT - clang-tidy warns about lack of null termination. | 
 |         data, result->wgsl.data(), result->wgsl.size()); | 
 |     return result->wgsl.size(); | 
 | } | 
 |  | 
 | extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { | 
 |     if (size == 0) { | 
 |         return 0; | 
 |     } | 
 |  | 
 |     struct Target { | 
 |         FuzzingTarget fuzzing_target; | 
 |         OutputFormat output_format; | 
 |         const char* name; | 
 |     }; | 
 |  | 
 |     Target targets[] = {{FuzzingTarget::kWgsl, OutputFormat::kWGSL, "WGSL"}, | 
 |                         {FuzzingTarget::kHlsl, OutputFormat::kHLSL, "HLSL"}, | 
 |                         {FuzzingTarget::kMsl, OutputFormat::kMSL, "MSL"}, | 
 |                         {FuzzingTarget::kSpv, OutputFormat::kSpv, "SPV"}}; | 
 |  | 
 |     for (auto target : targets) { | 
 |         if ((target.fuzzing_target & cli_params.fuzzing_target) != target.fuzzing_target) { | 
 |             continue; | 
 |         } | 
 |  | 
 |         TransformBuilder tb(data, size); | 
 |         tb.AddTransform<tint::ast::transform::Robustness>(); | 
 |  | 
 |         CommonFuzzer fuzzer(InputFormat::kWGSL, target.output_format); | 
 |         fuzzer.SetTransformManager(tb.manager(), tb.data_map()); | 
 |  | 
 |         fuzzer.Run(data, size); | 
 |         if (fuzzer.HasErrors()) { | 
 |             std::cout << "Fuzzing " << target.name << " produced an error" << std::endl | 
 |                       << fuzzer.Diagnostics() << std::endl; | 
 |         } | 
 |     } | 
 |  | 
 |     return 0; | 
 | } | 
 |  | 
 | }  // namespace | 
 | }  // namespace tint::fuzzers::ast_fuzzer |