diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 09:22:09 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 09:22:09 +0000 |
commit | 43a97878ce14b72f0981164f87f2e35e14151312 (patch) | |
tree | 620249daf56c0258faa40cbdcf9cfba06de2a846 /media/libaom/test | |
parent | Initial commit. (diff) | |
download | firefox-upstream.tar.xz firefox-upstream.zip |
Adding upstream version 110.0.1.upstream/110.0.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to '')
-rw-r--r-- | media/libaom/test/fuzztest/av1_fuzzer.cpp | 88 | ||||
-rw-r--r-- | media/libaom/test/fuzztest/moz.build | 48 | ||||
-rw-r--r-- | media/libaom/test_cmakeparser.py | 190 |
3 files changed, 326 insertions, 0 deletions
diff --git a/media/libaom/test/fuzztest/av1_fuzzer.cpp b/media/libaom/test/fuzztest/av1_fuzzer.cpp new file mode 100644 index 0000000000..a659446773 --- /dev/null +++ b/media/libaom/test/fuzztest/av1_fuzzer.cpp @@ -0,0 +1,88 @@ +/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ +/* vim: set ts=2 et sw=2 tw=80: */ +/* Copyright 2018 Google Inc. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. */ + +/* This file was originally imported from Google's oss-fuzz project at + * https://github.com/google/oss-fuzz/tree/master/projects/libaom */ + +#define DECODE_MODE 1 +#include "FuzzingInterface.h" + +#include <stdio.h> +#include <stdlib.h> +#include <string.h> +#include <memory> + +#include "aom/aom_decoder.h" +#include "aom/aomdx.h" +#include "aom_ports/mem_ops.h" +#include "common/ivfdec.h" + +static const char *const kIVFSignature = "DKIF"; + +static void close_file(FILE *file) { fclose(file); } + +void usage_exit(void) { exit(EXIT_FAILURE); } + +static int +LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { + std::unique_ptr<FILE, decltype(&close_file)> file( + fmemopen((void *)data, size, "rb"), &close_file); + + if (file == nullptr) { + return 0; + } + + char header[32]; + if (fread(header, 1, 32, file.get()) != 32) { + return 0; + } + + const AvxInterface *decoder = get_aom_decoder_by_name("av1"); + if (decoder == nullptr) { + return 0; + } + + aom_codec_ctx_t codec; +#if defined(DECODE_MODE) + const int threads = 1; +#elif defined(DECODE_MODE_threaded) + const int threads = 16; +#else +#error define one of DECODE_MODE or DECODE_MODE_threaded +#endif + aom_codec_dec_cfg_t cfg = {threads, 0, 0}; + if (aom_codec_dec_init(&codec, decoder->codec_interface(), &cfg, 0)) { + return 0; + } + + uint8_t *buffer = nullptr; + size_t buffer_size = 0; + size_t frame_size = 0; + while (!ivf_read_frame(file.get(), &buffer, &frame_size, &buffer_size, + nullptr)) { + const aom_codec_err_t err = + aom_codec_decode(&codec, buffer, frame_size, nullptr); + aom_codec_iter_t iter = nullptr; + aom_image_t *img = nullptr; + while ((img = aom_codec_get_frame(&codec, &iter)) != nullptr) { + } + } + aom_codec_destroy(&codec); + free(buffer); + return 0; +} + +MOZ_FUZZING_INTERFACE_RAW(nullptr, LLVMFuzzerTestOneInput, AV1Decode); diff --git a/media/libaom/test/fuzztest/moz.build b/media/libaom/test/fuzztest/moz.build new file mode 100644 index 0000000000..810286596f --- /dev/null +++ b/media/libaom/test/fuzztest/moz.build @@ -0,0 +1,48 @@ +# -*- Mode: python; indent-tabs-mode: nil; tab-width: 40 -*- +# vim: set filetype=python: +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. + +Library('FuzzingAOM') + +LOCAL_INCLUDES += [ + '/media/libaom/config', + '/third_party/aom', +] + +# We currently only support building on Linux for fuzzing here, as guarded +# in media/libaom/moz.build. More support can be added later if necessary. +if CONFIG['CPU_ARCH'] == 'x86_64': + LOCAL_INCLUDES += [ + '/media/libaom/config/linux/x64/', + '/media/libvpx/config/linux/x64/', + ] +elif CONFIG['CPU_ARCH'] == 'x86': + LOCAL_INCLUDES += [ + '/media/libaom/config/linux/ia32/', + '/media/libvpx/config/linux/ia32/', + ] +elif CONFIG['CPU_ARCH'] == 'arm': + LOCAL_INCLUDES += [ + '/media/libaom/config/linux/arm/', + '/media/libvpx/config/linux/arm/', + ] +elif CONFIG['CPU_ARCH'] == 'aarch64': + LOCAL_INCLUDES += [ + '/media/libaom/config/generic/', + '/media/libvpx/config/linux/arm64/', + ] + +SOURCES += [ + '/media/libvpx/libvpx/ivfdec.c', + '/third_party/aom/common/tools_common.c', + 'av1_fuzzer.cpp', +] + +# Ignore unused variables in the imported AV1 fuzzer +SOURCES['av1_fuzzer.cpp'].flags += ['-Wno-unused-variable'] + +include('/tools/fuzzing/libfuzzer-config.mozbuild') + +FINAL_LIBRARY = 'xul-gtest' diff --git a/media/libaom/test_cmakeparser.py b/media/libaom/test_cmakeparser.py new file mode 100644 index 0000000000..af68c33134 --- /dev/null +++ b/media/libaom/test_cmakeparser.py @@ -0,0 +1,190 @@ +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. +from pyparsing import ParseException +import unittest + +import cmakeparser as cp + +class TestCMakeParser(unittest.TestCase): + def test_arguments(self): + self.assertEqual(cp.arguments.parseString('1').asList(), ['1']) + self.assertEqual(cp.arguments.parseString('(1 2)').asList(), + ['(', '1', '2', ')']) + + def test_command(self): + self.assertEqual(cp.command.parseString('blah()').asList(), + [['blah', '(', ')']]) + self.assertEqual(cp.command.parseString('blah(1)').asList(), + [['blah', '(', '1', ')']]) + self.assertEqual(cp.command.parseString('blah(1 (2 3))').asList(), + [['blah', '(', '1', '(', '2', '3', ')', ')']]) + + def test_evaluate_boolean(self): + self.assertTrue(cp.evaluate_boolean({}, ['TRUE'])) + self.assertFalse(cp.evaluate_boolean({}, ['NOT', 'TRUE'])) + self.assertFalse(cp.evaluate_boolean({}, ['TRUE', 'AND', 'FALSE'])) + self.assertTrue(cp.evaluate_boolean({}, ['ABC', 'MATCHES', '^AB'])) + self.assertTrue(cp.evaluate_boolean({}, ['TRUE', 'OR', 'FALSE'])) + self.assertTrue(cp.evaluate_boolean({}, ['ABC', 'STREQUAL', 'ABC'])) + self.assertTrue(cp.evaluate_boolean({'ABC': '1'}, ['ABC'])) + self.assertFalse(cp.evaluate_boolean({'ABC': '0'}, ['${ABC}'])) + self.assertFalse(cp.evaluate_boolean({}, ['ABC'])) + self.assertFalse(cp.evaluate_boolean({}, ['${ABC}'])) + self.assertTrue(cp.evaluate_boolean({'YES_ABC': 1, 'VAL': 'ABC'}, + ['YES_${VAL}'])) + self.assertTrue(cp.evaluate_boolean({'ABC': 'DEF', 'DEF': 1}, + ['${ABC}'])) + self.assertTrue(cp.evaluate_boolean({}, ['FALSE', 'OR', '(', 'FALSE', 'OR', 'TRUE', ')'])) + self.assertFalse(cp.evaluate_boolean({}, ['FALSE', 'OR', '(', 'FALSE', 'AND', 'TRUE', ')'])) + + def test_foreach(self): + s = """ + set(STUFF A B C D E F) + foreach(item ${STUFF}) + set(YES_${item} 1) + endforeach () + """ + parsed = cp.cmake.parseString(s) + variables = {} + cp.evaluate(variables, [], parsed) + for k in ['A', 'B', 'C', 'D', 'E', 'F']: + self.assertEqual(variables['YES_%s' % k], '1') + + s = """ + set(STUFF "A;B;C;D;E;F") + foreach(item ${STUFF}) + set(${item} 1) + endforeach () + """ + parsed = cp.cmake.parseString(s) + variables = {} + cp.evaluate(variables, [], parsed) + for k in ['A', 'B', 'C', 'D', 'E', 'F']: + self.assertEqual(variables[k], '1') + + s = """ + set(STUFF D E F) + foreach(item A B C ${STUFF}) + set(${item} 1) + endforeach () + """ + parsed = cp.cmake.parseString(s) + variables = {} + cp.evaluate(variables, [], parsed) + for k in ['A', 'B', 'C', 'D', 'E', 'F']: + self.assertEqual(variables[k], '1') + + def test_list(self): + s = 'list(APPEND TEST 1 1 2 3 5 8 13)' + parsed = cp.cmake.parseString(s) + variables = {} + cache_variables = [] + cp.evaluate(variables, cache_variables, parsed) + self.assertEqual(variables['TEST'], '1 1 2 3 5 8 13') + self.assertEqual(len(cache_variables), 0) + + s = """ + set(TEST 1) + list(APPEND TEST 1 2 3 5 8 13) + """ + parsed = cp.cmake.parseString(s) + variables = {} + cache_variables = [] + cp.evaluate(variables, cache_variables, parsed) + self.assertEqual(variables['TEST'], '1 1 2 3 5 8 13') + self.assertEqual(len(cache_variables), 0) + + def test_malformed_input(self): + self.assertEqual(len(cp.cmake.parseString('func ((A)')), 0) + self.assertEqual(len(cp.cmake.parseString('cmd"arg"(arg2)')), 0) + self.assertRaises(ParseException, cp.command.parseString, 'func ((A)') + self.assertRaises(ParseException, cp.identifier.parseString, + '-asdlf') + self.assertEqual(cp.identifier.parseString('asd-lf')[0], 'asd') + self.assertRaises(ParseException, cp.quoted_argument.parseString, + 'blah"') + s = """ + " blah blah + blah + """ + self.assertRaises(ParseException, cp.quoted_argument.parseString, + s) + self.assertRaises(ParseException, cp.quoted_argument.parseString, + 'asdlf') + self.assertRaises(ParseException, cp.unquoted_argument.parseString, + '#asdflkj') + + def test_parse_if(self): + s = """ + if (A) + B() + elseif (C) + D() + elseif (E) + F() + else () + H() + endif () + I() + """ + parsed = cp.cmake.parseString(s) + self.assertEqual(len(parsed), 10) + end, conditions = cp.parse_if(parsed, 0) + self.assertEqual(parsed[end][0], 'endif') + self.assertEqual(len(conditions), 4) + self.assertEqual(conditions[0][0], ['A']) + self.assertEqual(conditions[0][1][0], parsed[1]) + self.assertEqual(conditions[1][0], ['C']) + self.assertEqual(conditions[1][1][0], parsed[3]) + self.assertEqual(conditions[2][0], ['E']) + self.assertEqual(conditions[2][1][0], parsed[5]) + self.assertEqual(conditions[3][0], ['TRUE']) + self.assertEqual(conditions[3][1][0], parsed[7]) + + def test_return(self): + s = """ + set(TEST 2) + if (true) + return() + endif () + set(TEST 3) + """ + parsed = cp.cmake.parseString(s) + variables = {} + cache_variables = [] + cp.evaluate(variables, cache_variables, parsed) + self.assertEqual(variables['TEST'], '2') + self.assertEqual(len(cache_variables), 0) + + def test_set(self): + s = """set(TEST 2)""" + parsed = cp.cmake.parseString(s) + variables = {} + cache_variables = [] + cp.evaluate(variables, cache_variables, parsed) + self.assertEqual(variables['TEST'], '2') + self.assertEqual(len(cache_variables), 0) + + s = """set(TEST 3 CACHE "documentation")""" + parsed = cp.cmake.parseString(s) + variables = {} + cache_variables = [] + cp.evaluate(variables, cache_variables, parsed) + self.assertEqual(variables['TEST'], '3') + self.assertTrue('TEST' in cache_variables) + + s = """set(TEST A B C D)""" + parsed = cp.cmake.parseString(s) + variables = {} + cp.evaluate(variables, [], parsed) + self.assertEqual(variables['TEST'], 'A B C D') + + s = """set(TEST ${TEST} E F G H)""" + parsed = cp.cmake.parseString(s) + cp.evaluate(variables, [], parsed) + self.assertEqual(variables['TEST'], 'A B C D E F G H') + + +if __name__ == '__main__': + unittest.main() |