diff options
author | qinxialei <xialeiqin@gmail.com> | 2020-10-29 11:26:59 +0800 |
---|---|---|
committer | qinxialei <xialeiqin@gmail.com> | 2020-10-29 11:26:59 +0800 |
commit | e8d277081293b6fb2a5d469616baaa7a06f52496 (patch) | |
tree | 1179bb07d3927d1837d4a90bd81b2034c4c696a9 /tests | |
download | libgav1-e8d277081293b6fb2a5d469616baaa7a06f52496.tar.gz libgav1-e8d277081293b6fb2a5d469616baaa7a06f52496.tar.bz2 libgav1-e8d277081293b6fb2a5d469616baaa7a06f52496.zip |
Import Upstream version 0.16.0
Diffstat (limited to 'tests')
-rw-r--r-- | tests/fuzzer/decoder_fuzzer.cc | 87 | ||||
-rw-r--r-- | tests/fuzzer/decoder_fuzzer_frame_parallel.cc | 139 | ||||
-rw-r--r-- | tests/fuzzer/fuzzer_temp_file.h | 148 | ||||
-rw-r--r-- | tests/fuzzer/obu_parser_fuzzer.cc | 89 |
4 files changed, 463 insertions, 0 deletions
diff --git a/tests/fuzzer/decoder_fuzzer.cc b/tests/fuzzer/decoder_fuzzer.cc new file mode 100644 index 0000000..236fd3c --- /dev/null +++ b/tests/fuzzer/decoder_fuzzer.cc @@ -0,0 +1,87 @@ +// Copyright 2020 The libgav1 Authors +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +#include <cstddef> +#include <cstdint> +#include <memory> +#include <vector> + +#include "examples/file_reader.h" +#include "examples/file_reader_constants.h" +#include "examples/file_reader_interface.h" +#include "src/gav1/decoder.h" +#include "tests/fuzzer/fuzzer_temp_file.h" + +namespace { + +#if defined(LIBGAV1_EXHAUSTIVE_FUZZING) +// Set a large upper bound to give more coverage of a single input; this value +// should be larger than most of the frame counts in the corpus. +constexpr int kMaxFrames = 100; +constexpr size_t kMaxDataSize = 400 * 1024; +#else +// Restrict the number of frames to improve fuzzer throughput. +constexpr int kMaxFrames = 5; +constexpr size_t kMaxDataSize = 200 * 1024; +#endif + +void Decode(const uint8_t* const data, const size_t size, + libgav1::Decoder* const decoder) { + decoder->EnqueueFrame(data, size, /*user_private_data=*/0, + /*buffer_private_data=*/nullptr); + const libgav1::DecoderBuffer* buffer; + decoder->DequeueFrame(&buffer); +} + +} // namespace + +// Always returns 0. Nonzero return values are reserved by libFuzzer for future +// use. +extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { + // Reject large chunks of data to improve fuzzer throughput. + if (size > kMaxDataSize) return 0; + + libgav1::Decoder decoder; + libgav1::DecoderSettings settings = {}; + // Use the low byte of the width to seed the number of threads. + // We use both nibbles of the lower byte as this results in values != 1 much + // more quickly than using the lower nibble alone. + settings.threads = (size >= 13) ? ((data[12] >> 4 | data[12]) & 0xF) + 1 : 1; + if (decoder.Init(&settings) != libgav1::kStatusOk) return 0; + + // Treat the input as a raw OBU stream. + Decode(data, size, &decoder); + + // Use the first frame from an IVF to bypass any read errors from the parser. + static constexpr size_t kIvfHeaderSize = + libgav1::kIvfFileHeaderSize + libgav1::kIvfFrameHeaderSize; + if (size >= kIvfHeaderSize) { + Decode(data + kIvfHeaderSize, size - kIvfHeaderSize, &decoder); + } + + FuzzerTemporaryFile tempfile(data, size); + auto file_reader = + libgav1::FileReader::Open(tempfile.filename(), /*error_tolerant=*/true); + if (file_reader == nullptr) return 0; + + std::vector<uint8_t> buffer; + int decoded_frames = 0; + do { + if (!file_reader->ReadTemporalUnit(&buffer, nullptr)) break; + Decode(buffer.data(), buffer.size(), &decoder); + if (++decoded_frames >= kMaxFrames) break; + } while (!file_reader->IsEndOfFile()); + + return 0; +} diff --git a/tests/fuzzer/decoder_fuzzer_frame_parallel.cc b/tests/fuzzer/decoder_fuzzer_frame_parallel.cc new file mode 100644 index 0000000..d1b1c54 --- /dev/null +++ b/tests/fuzzer/decoder_fuzzer_frame_parallel.cc @@ -0,0 +1,139 @@ +// Copyright 2020 The libgav1 Authors +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +#include <cstddef> +#include <cstdint> +#include <deque> +#include <memory> +#include <vector> + +#include "examples/file_reader.h" +#include "examples/file_reader_constants.h" +#include "examples/file_reader_interface.h" +#include "src/gav1/decoder.h" +#include "src/gav1/status_code.h" +#include "tests/fuzzer/fuzzer_temp_file.h" + +namespace { + +#if defined(LIBGAV1_EXHAUSTIVE_FUZZING) +// Set a large upper bound to give more coverage of a single input; this value +// should be larger than most of the frame counts in the corpus. +constexpr size_t kMaxDataSize = 400 * 1024; +#else +constexpr size_t kMaxDataSize = 200 * 1024; +#endif + +using InputBuffer = std::vector<uint8_t>; + +struct InputBuffers { + ~InputBuffers() { + for (auto& buffer : free_buffers) { + delete buffer; + } + } + std::deque<InputBuffer*> free_buffers; +}; + +void ReleaseInputBuffer(void* callback_private_data, + void* buffer_private_data) { + auto* const test = static_cast<InputBuffers*>(callback_private_data); + test->free_buffers.push_back(static_cast<InputBuffer*>(buffer_private_data)); +} + +} // namespace + +// Always returns 0. Nonzero return values are reserved by libFuzzer for future +// use. +extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { + // Reject large chunks of data to improve fuzzer throughput. + if (size > kMaxDataSize) return 0; + + // Note that |input_buffers| has to outlive the |decoder| object since the + // |release_input_buffer| callback could be called on the |decoder|'s + // destructor. + InputBuffers input_buffers; + + libgav1::Decoder decoder; + libgav1::DecoderSettings settings = {}; + // Use the 33 + low byte of the width to seed the number of threads. This + // ensures that we will trigger the frame parallel path in most cases. + // We use both nibbles of the lower byte as this results in values != 1 much + // more quickly than using the lower nibble alone. + settings.threads = + 33 + ((size >= 13) ? ((data[12] >> 4 | data[12]) & 0xF) + 1 : 1); + + settings.frame_parallel = true; + settings.blocking_dequeue = true; + settings.callback_private_data = &input_buffers; + settings.release_input_buffer = ReleaseInputBuffer; + if (decoder.Init(&settings) != libgav1::kStatusOk) return 0; + + FuzzerTemporaryFile tempfile(data, size); + auto file_reader = + libgav1::FileReader::Open(tempfile.filename(), /*error_tolerant=*/true); + if (file_reader == nullptr) return 0; + + InputBuffer* input_buffer = nullptr; + bool dequeue_finished = false; + + do { + if (input_buffer == nullptr && !file_reader->IsEndOfFile()) { + if (input_buffers.free_buffers.empty()) { + auto* const buffer = new (std::nothrow) InputBuffer(); + if (buffer == nullptr) { + break; + } + input_buffers.free_buffers.push_back(buffer); + } + input_buffer = input_buffers.free_buffers.front(); + input_buffers.free_buffers.pop_front(); + if (!file_reader->ReadTemporalUnit(input_buffer, nullptr)) { + break; + } + } + + if (input_buffer != nullptr) { + libgav1::StatusCode status = + decoder.EnqueueFrame(input_buffer->data(), input_buffer->size(), + /*user_private_data=*/0, + /*buffer_private_data=*/input_buffer); + if (status == libgav1::kStatusOk) { + input_buffer = nullptr; + // Continue to enqueue frames until we get a kStatusTryAgain status. + continue; + } + if (status != libgav1::kStatusTryAgain) { + break; + } + } + + const libgav1::DecoderBuffer* buffer; + libgav1::StatusCode status = decoder.DequeueFrame(&buffer); + if (status == libgav1::kStatusNothingToDequeue) { + dequeue_finished = true; + } else if (status == libgav1::kStatusOk) { + dequeue_finished = false; + } else { + break; + } + } while (input_buffer != nullptr || !file_reader->IsEndOfFile() || + !dequeue_finished); + + if (input_buffer != nullptr) { + input_buffers.free_buffers.push_back(input_buffer); + } + + return 0; +} diff --git a/tests/fuzzer/fuzzer_temp_file.h b/tests/fuzzer/fuzzer_temp_file.h new file mode 100644 index 0000000..5d12bbe --- /dev/null +++ b/tests/fuzzer/fuzzer_temp_file.h @@ -0,0 +1,148 @@ +/* + * Copyright 2020 Google Inc. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +#ifndef LIBGAV1_TESTS_FUZZER_FUZZER_TEMP_FILE_H_ +#define LIBGAV1_TESTS_FUZZER_FUZZER_TEMP_FILE_H_ + +// Adapter utility from fuzzer input to a temporary file, for fuzzing APIs that +// require a file instead of an input buffer. + +#include <limits.h> +#include <stdint.h> +#include <stdio.h> +#include <stdlib.h> +#include <string.h> +#include <unistd.h> + +// Pure-C interface for creating and cleaning up temporary files. + +static char* fuzzer_get_tmpfile_with_suffix(const uint8_t* data, size_t size, + const char* suffix) { + if (suffix == NULL) { // NOLINT (this could be a C compilation unit) + suffix = ""; + } + const size_t suffix_len = strlen(suffix); + if (suffix_len > INT_MAX) { // mkstemps takes int for suffixlen param + perror("Suffix too long"); + abort(); + } + +#ifdef __ANDROID__ + const char* leading_temp_path = + "/data/local/tmp/generate_temporary_file.XXXXXX"; +#else + const char* leading_temp_path = "/tmp/generate_temporary_file.XXXXXX"; +#endif + const size_t buffer_sz = strlen(leading_temp_path) + suffix_len + 1; + char* filename_buffer = + (char*)malloc(buffer_sz); // NOLINT (this could be a C compilation unit) + if (!filename_buffer) { + perror("Failed to allocate file name buffer."); + abort(); + } + + if (snprintf(filename_buffer, buffer_sz, "%s%s", leading_temp_path, suffix) >= + buffer_sz) { + perror("File name buffer too short."); + abort(); + } + + const int file_descriptor = mkstemps(filename_buffer, suffix_len); + if (file_descriptor < 0) { + perror("Failed to make temporary file."); + abort(); + } + FILE* file = fdopen(file_descriptor, "wb"); + if (!file) { + perror("Failed to open file descriptor."); + close(file_descriptor); + abort(); + } + const size_t bytes_written = fwrite(data, sizeof(uint8_t), size, file); + if (bytes_written < size) { + close(file_descriptor); + fprintf(stderr, "Failed to write all bytes to file (%zu out of %zu)", + bytes_written, size); + abort(); + } + fclose(file); + return filename_buffer; +} + +static char* fuzzer_get_tmpfile( + const uint8_t* data, + size_t size) { // NOLINT (people include this .inc file directly) + return fuzzer_get_tmpfile_with_suffix(data, size, NULL); // NOLINT +} + +static void fuzzer_release_tmpfile(char* filename) { + if (unlink(filename) != 0) { + perror("WARNING: Failed to delete temporary file."); + } + free(filename); +} + +// C++ RAII object for creating temporary files. + +#ifdef __cplusplus +class FuzzerTemporaryFile { + public: + FuzzerTemporaryFile(const uint8_t* data, size_t size) + : original_filename_(fuzzer_get_tmpfile(data, size)) { + filename_ = strdup(original_filename_); + if (!filename_) { + perror("Failed to allocate file name copy."); + abort(); + } + } + + FuzzerTemporaryFile(const uint8_t* data, size_t size, const char* suffix) + : original_filename_(fuzzer_get_tmpfile_with_suffix(data, size, suffix)) { + filename_ = strdup(original_filename_); + if (!filename_) { + perror("Failed to allocate file name copy."); + abort(); + } + } + + ~FuzzerTemporaryFile() { + free(filename_); + fuzzer_release_tmpfile(original_filename_); + } + + FuzzerTemporaryFile(const FuzzerTemporaryFile& other) = delete; + FuzzerTemporaryFile operator=(const FuzzerTemporaryFile& other) = delete; + + FuzzerTemporaryFile(const FuzzerTemporaryFile&& other) = delete; + FuzzerTemporaryFile operator=(const FuzzerTemporaryFile&& other) = delete; + + const char* filename() const { return filename_; } + + // Returns a mutable pointer to the file name. Should be used sparingly, only + // in case the fuzzed API demands it or when making a mutable copy is + // inconvenient (e.g., in auto-generated code). + char* mutable_filename() const { return filename_; } + + private: + char* original_filename_; + + // A mutable copy of the original filename, returned by the accessor. This + // guarantees that the original filename can always be used to release the + // temporary path. + char* filename_; +}; +#endif // __cplusplus +#endif // LIBGAV1_TESTS_FUZZER_FUZZER_TEMP_FILE_H_ diff --git a/tests/fuzzer/obu_parser_fuzzer.cc b/tests/fuzzer/obu_parser_fuzzer.cc new file mode 100644 index 0000000..634a802 --- /dev/null +++ b/tests/fuzzer/obu_parser_fuzzer.cc @@ -0,0 +1,89 @@ +// Copyright 2020 The libgav1 Authors +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +#include <cstddef> +#include <cstdint> +#include <memory> +#include <vector> + +#include "examples/file_reader.h" +#include "examples/file_reader_constants.h" +#include "examples/file_reader_interface.h" +#include "src/buffer_pool.h" +#include "src/decoder_impl.h" +#include "src/decoder_state.h" +#include "src/internal_frame_buffer_list.h" +#include "src/obu_parser.h" +#include "tests/fuzzer/fuzzer_temp_file.h" + +namespace { + +#if defined(LIBGAV1_EXHAUSTIVE_FUZZING) +// Set a large upper bound to give more coverage of a single input; this value +// should be larger than most of the frame counts in the corpus. +constexpr int kMaxFrames = 100; +constexpr size_t kMaxDataSize = 400 * 1024; +#else +// Restrict the number of frames and obus to improve fuzzer throughput. +constexpr int kMaxFrames = 5; +constexpr size_t kMaxDataSize = 200 * 1024; +#endif + +inline void ParseObu(const uint8_t* const data, size_t size) { + libgav1::InternalFrameBufferList buffer_list; + libgav1::BufferPool buffer_pool(libgav1::OnInternalFrameBufferSizeChanged, + libgav1::GetInternalFrameBuffer, + libgav1::ReleaseInternalFrameBuffer, + &buffer_list); + libgav1::DecoderState decoder_state; + libgav1::ObuParser parser(data, size, 0, &buffer_pool, &decoder_state); + libgav1::RefCountedBufferPtr current_frame; + int parsed_frames = 0; + while (parser.HasData()) { + if (parser.ParseOneFrame(¤t_frame) != libgav1::kStatusOk) break; + if (++parsed_frames >= kMaxFrames) break; + } +} + +} // namespace + +extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { + // Reject large chunks of data to improve fuzzer throughput. + if (size > kMaxDataSize) return 0; + + // Treat the input as a raw OBU stream. + ParseObu(data, size); + + // Use the first frame from an IVF to bypass any read errors from the parser. + static constexpr size_t kIvfHeaderSize = + libgav1::kIvfFileHeaderSize + libgav1::kIvfFrameHeaderSize; + if (size >= kIvfHeaderSize) { + ParseObu(data + kIvfHeaderSize, size - kIvfHeaderSize); + } + + FuzzerTemporaryFile tempfile(data, size); + auto file_reader = + libgav1::FileReader::Open(tempfile.filename(), /*error_tolerant=*/true); + if (file_reader == nullptr) return 0; + + std::vector<uint8_t> buffer; + int parsed_frames = 0; + do { + if (!file_reader->ReadTemporalUnit(&buffer, nullptr)) break; + ParseObu(buffer.data(), buffer.size()); + if (++parsed_frames >= kMaxFrames) break; + } while (!file_reader->IsEndOfFile()); + + return 0; +} |