169 lines
6.3 KiB
C++
169 lines
6.3 KiB
C++
/*
|
|
* Copyright (c) 2016, Alliance for Open Media. All rights reserved.
|
|
*
|
|
* This source code is subject to the terms of the BSD 2 Clause License and
|
|
* the Alliance for Open Media Patent License 1.0. If the BSD 2 Clause License
|
|
* was not distributed with this source code in the LICENSE file, you can
|
|
* obtain it at www.aomedia.org/license/software. If the Alliance for Open
|
|
* Media Patent License 1.0 was not distributed with this source code in the
|
|
* PATENTS file, you can obtain it at www.aomedia.org/license/patent.
|
|
*/
|
|
|
|
#include <cstdio>
|
|
#include <ostream>
|
|
#include <string>
|
|
|
|
#include "gtest/gtest.h"
|
|
#include "test/codec_factory.h"
|
|
#include "test/ivf_video_source.h"
|
|
#include "test/util.h"
|
|
#include "test/video_source.h"
|
|
|
|
namespace {
|
|
|
|
struct DecodeParam {
|
|
int threads;
|
|
const char *filename;
|
|
const char *res_filename; // If nullptr, the result filename is
|
|
// filename + ".res".
|
|
};
|
|
|
|
// Constructs result file name.
|
|
std::string GetResFilename(const DecodeParam ¶m) {
|
|
if (param.res_filename != nullptr) return param.res_filename;
|
|
const std::string filename = param.filename;
|
|
return filename + ".res";
|
|
}
|
|
|
|
std::ostream &operator<<(std::ostream &os, const DecodeParam &dp) {
|
|
return os << "threads: " << dp.threads << " file: " << dp.filename
|
|
<< " result file: " << GetResFilename(dp);
|
|
}
|
|
|
|
class InvalidFileTest : public ::libaom_test::DecoderTest,
|
|
public ::libaom_test::CodecTestWithParam<DecodeParam> {
|
|
protected:
|
|
InvalidFileTest() : DecoderTest(GET_PARAM(0)), res_file_(nullptr) {}
|
|
|
|
~InvalidFileTest() override {
|
|
if (res_file_ != nullptr) fclose(res_file_);
|
|
}
|
|
|
|
void OpenResFile(const std::string &res_file_name) {
|
|
res_file_ = libaom_test::OpenTestDataFile(res_file_name);
|
|
ASSERT_NE(res_file_, nullptr)
|
|
<< "Result file open failed. Filename: " << res_file_name;
|
|
}
|
|
|
|
void DecompressedFrameHook(const aom_image_t &img,
|
|
const unsigned int /*frame_number*/) override {
|
|
EXPECT_NE(img.fb_priv, nullptr);
|
|
}
|
|
|
|
bool HandleDecodeResult(const aom_codec_err_t res_dec,
|
|
const libaom_test::CompressedVideoSource &video,
|
|
libaom_test::Decoder *decoder) override {
|
|
EXPECT_NE(res_file_, nullptr);
|
|
int expected_res_dec = -1;
|
|
|
|
// Read integer result.
|
|
const int res = fscanf(res_file_, "%d", &expected_res_dec);
|
|
EXPECT_NE(res, EOF) << "Read result data failed";
|
|
|
|
if (expected_res_dec != -1) {
|
|
// Check results match.
|
|
const DecodeParam input = GET_PARAM(1);
|
|
if (input.threads > 1) {
|
|
// The serial decode check is too strict for tile-threaded decoding as
|
|
// there is no guarantee on the decode order nor which specific error
|
|
// will take precedence. Currently a tile-level error is not forwarded
|
|
// so the frame will simply be marked corrupt.
|
|
EXPECT_TRUE(res_dec == expected_res_dec ||
|
|
res_dec == AOM_CODEC_CORRUPT_FRAME)
|
|
<< "Results don't match: frame number = " << video.frame_number()
|
|
<< ". (" << decoder->DecodeError()
|
|
<< "). Expected: " << expected_res_dec << " or "
|
|
<< AOM_CODEC_CORRUPT_FRAME;
|
|
} else {
|
|
EXPECT_EQ(expected_res_dec, res_dec)
|
|
<< "Results don't match: frame number = " << video.frame_number()
|
|
<< ". (" << decoder->DecodeError() << ")";
|
|
}
|
|
}
|
|
|
|
return !HasFailure();
|
|
}
|
|
|
|
void HandlePeekResult(libaom_test::Decoder *const /*decoder*/,
|
|
libaom_test::CompressedVideoSource * /*video*/,
|
|
const aom_codec_err_t /*res_peek*/) override {}
|
|
|
|
void RunTest() {
|
|
const DecodeParam input = GET_PARAM(1);
|
|
aom_codec_dec_cfg_t cfg = { 0, 0, 0, !FORCE_HIGHBITDEPTH_DECODING };
|
|
cfg.threads = input.threads;
|
|
libaom_test::IVFVideoSource decode_video(input.filename);
|
|
decode_video.Init();
|
|
|
|
// The result file holds a list of expected integer results, one for each
|
|
// decoded frame. Any result that doesn't match the file's list will
|
|
// cause a test failure.
|
|
const std::string res_filename = GetResFilename(input);
|
|
OpenResFile(res_filename);
|
|
|
|
ASSERT_NO_FATAL_FAILURE(RunLoop(&decode_video, cfg));
|
|
}
|
|
|
|
private:
|
|
FILE *res_file_;
|
|
};
|
|
|
|
TEST_P(InvalidFileTest, ReturnCode) { RunTest(); }
|
|
|
|
// If res_filename (the third field) is nullptr, then the result filename is
|
|
// filename + ".res" by default. Set res_filename to a string if the result
|
|
// filename differs from the default.
|
|
const DecodeParam kAV1InvalidFileTests[] = {
|
|
// { threads, filename, res_filename }
|
|
{ 1, "invalid-bug-1814.ivf", nullptr },
|
|
{ 1, "invalid-chromium-906381.ivf", nullptr },
|
|
{ 1, "invalid-google-142530197.ivf", nullptr },
|
|
{ 1, "invalid-google-142530197-1.ivf", nullptr },
|
|
{ 4, "invalid-oss-fuzz-9463.ivf", "invalid-oss-fuzz-9463.ivf.res.2" },
|
|
{ 1, "invalid-oss-fuzz-9720.ivf", nullptr },
|
|
{ 1, "invalid-oss-fuzz-10389.ivf", "invalid-oss-fuzz-10389.ivf.res.4" },
|
|
#if !defined(CHROMIUM) && !CONFIG_SIZE_LIMIT || \
|
|
(CONFIG_SIZE_LIMIT && DECODE_WIDTH_LIMIT >= 5120 && \
|
|
DECODE_HEIGHT_LIMIT >= 180)
|
|
{ 1, "invalid-oss-fuzz-11523.ivf", "invalid-oss-fuzz-11523.ivf.res.2" },
|
|
#endif
|
|
{ 4, "invalid-oss-fuzz-15363.ivf", nullptr },
|
|
{ 1, "invalid-oss-fuzz-16437.ivf", "invalid-oss-fuzz-16437.ivf.res.2" },
|
|
#if CONFIG_MAX_DECODE_PROFILE >= 1
|
|
{ 1, "invalid-oss-fuzz-24706.ivf", nullptr },
|
|
#endif
|
|
#if CONFIG_AV1_HIGHBITDEPTH
|
|
// These test vectors contain 10-bit or 12-bit video.
|
|
{ 1, "invalid-oss-fuzz-9288.ivf", nullptr },
|
|
{ 1, "invalid-oss-fuzz-9482.ivf", nullptr },
|
|
{ 1, "invalid-oss-fuzz-10061.ivf", nullptr },
|
|
{ 1, "invalid-oss-fuzz-10117-mc-buf-use-highbd.ivf", nullptr },
|
|
{ 1, "invalid-oss-fuzz-10227.ivf", nullptr },
|
|
{ 4, "invalid-oss-fuzz-10555.ivf", nullptr },
|
|
{ 1, "invalid-oss-fuzz-10705.ivf", nullptr },
|
|
#if CONFIG_CWG_C013
|
|
{ 1, "invalid-oss-fuzz-10723.ivf", "invalid-oss-fuzz-10723.ivf.res.3" },
|
|
#else
|
|
{ 1, "invalid-oss-fuzz-10723.ivf", "invalid-oss-fuzz-10723.ivf.res.2" },
|
|
#endif
|
|
{ 1, "invalid-oss-fuzz-10779.ivf", nullptr },
|
|
{ 1, "invalid-oss-fuzz-11477.ivf", nullptr },
|
|
{ 1, "invalid-oss-fuzz-11479.ivf", "invalid-oss-fuzz-11479.ivf.res.2" },
|
|
{ 1, "invalid-oss-fuzz-33030.ivf", nullptr },
|
|
#endif
|
|
};
|
|
|
|
AV1_INSTANTIATE_TEST_SUITE(InvalidFileTest,
|
|
::testing::ValuesIn(kAV1InvalidFileTests));
|
|
|
|
} // namespace
|