-
Notifications
You must be signed in to change notification settings - Fork 112
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
4 changed files
with
233 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,7 @@ | ||
# Copyright (C) 2023 Intel Corporation | ||
# Part of the Unified-Runtime Project, under the Apache License v2.0 with LLVM Exceptions. | ||
# See LICENSE.TXT | ||
# SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception | ||
|
||
add_fuzz_test(conformance | ||
urConformanceFuzz.cpp) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,142 @@ | ||
// Copyright (C) 2023 Intel Corporation | ||
// Part of the Unified-Runtime Project, under the Apache License v2.0 with LLVM Exceptions. | ||
// See LICENSE.TXT | ||
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception | ||
|
||
#include <cassert> | ||
#include <cstring> | ||
#include <vector> | ||
|
||
#include "ur_api.h" | ||
|
||
extern "C" int LLVMFuzzerTestOneInput(uint8_t *data, size_t size) { | ||
uint16_t platformCountFuzz; | ||
uint16_t deviceCountFuzz; | ||
uint8_t deviceTypeFuzz; | ||
uint32_t deviceAllocSizeFuzz; | ||
uint32_t hostAllocSizeFuzz; | ||
|
||
//// Parse fuzzer data | ||
// Make sure fuzzer data size is sufficient to store all variables | ||
if (size < sizeof(platformCountFuzz) + sizeof(deviceCountFuzz) + | ||
sizeof(deviceTypeFuzz) + sizeof(deviceAllocSizeFuzz) + | ||
sizeof(hostAllocSizeFuzz)) { | ||
return -1; | ||
} | ||
|
||
uint8_t *data_ptr = data; | ||
memcpy(&platformCountFuzz, data_ptr, sizeof(platformCountFuzz)); | ||
// Limit the max number of platforms to avoid allocating too much memory for a vector | ||
if (platformCountFuzz > 1024) { | ||
return -1; | ||
} | ||
data_ptr += sizeof(platformCountFuzz); | ||
|
||
memcpy(&deviceCountFuzz, data_ptr, sizeof(deviceCountFuzz)); | ||
data_ptr += sizeof(deviceCountFuzz); | ||
|
||
memcpy(&deviceTypeFuzz, data_ptr, sizeof(deviceTypeFuzz)); | ||
// Pass only integers which can be a valid device type | ||
if (deviceTypeFuzz > 7) { | ||
return -1; | ||
} | ||
data_ptr += sizeof(deviceTypeFuzz); | ||
|
||
memcpy(&deviceAllocSizeFuzz, data_ptr, sizeof(deviceAllocSizeFuzz)); | ||
// Limit the max size of allocations | ||
if (deviceAllocSizeFuzz > 1 * 1024 * 1024) { | ||
return -1; | ||
} | ||
data_ptr += sizeof(deviceAllocSizeFuzz); | ||
|
||
memcpy(&hostAllocSizeFuzz, data_ptr, sizeof(hostAllocSizeFuzz)); | ||
// Limit the max size of allocations | ||
if (hostAllocSizeFuzz > 1 * 1024 * 1024) { | ||
return -1; | ||
} | ||
|
||
//// API calls | ||
ur_result_t res = UR_RESULT_SUCCESS; | ||
|
||
res = urInit(0); | ||
if (res != UR_RESULT_SUCCESS) { | ||
return 0; | ||
} | ||
|
||
// Get valid platforms | ||
std::vector<ur_platform_handle_t> platforms; | ||
uint32_t platformCount = 0; | ||
|
||
res = urPlatformGet(platformCountFuzz, nullptr, &platformCount); | ||
if (res != UR_RESULT_SUCCESS) { | ||
return 0; | ||
} | ||
platformCount = platformCountFuzz % platformCount; | ||
platforms.resize(platformCount); | ||
res = urPlatformGet(platformCount, platforms.data(), nullptr); | ||
if (res != UR_RESULT_SUCCESS || platformCount == 0) { | ||
return 0; | ||
} | ||
|
||
// Get valid devices of a random platform | ||
ur_platform_handle_t hPlatform = | ||
platforms[platformCountFuzz % platforms.size()]; | ||
std::vector<ur_device_handle_t> devices; | ||
uint32_t deviceCount = 0; | ||
ur_device_type_t deviceType = static_cast<ur_device_type_t>(deviceTypeFuzz); | ||
|
||
res = urDeviceGet(hPlatform, deviceType, deviceCountFuzz, nullptr, | ||
&deviceCount); | ||
if (res != UR_RESULT_SUCCESS) { | ||
return 0; | ||
} | ||
deviceCount = deviceCountFuzz % deviceCount; | ||
devices.resize(deviceCount); | ||
res = urDeviceGet(hPlatform, deviceType, devices.size(), devices.data(), | ||
nullptr); | ||
if (res != UR_RESULT_SUCCESS || deviceCount == 0) { | ||
return 0; | ||
} | ||
|
||
// Test API | ||
ur_context_handle_t context; | ||
void *host_ptr = nullptr; | ||
void *device_ptr = nullptr; | ||
size_t usm_alloc_info_size = 0; | ||
ur_device_handle_t device = devices[deviceCountFuzz % devices.size()]; | ||
ur_usm_type_t device_type = UR_USM_TYPE_UNKNOWN; | ||
|
||
urContextCreate(devices.size(), devices.data(), nullptr, &context); | ||
urUSMHostAlloc(context, nullptr, nullptr, hostAllocSizeFuzz, &host_ptr); | ||
if (hostAllocSizeFuzz != 0) { | ||
memset(host_ptr, 'H', hostAllocSizeFuzz); | ||
} else { | ||
assert(host_ptr == nullptr); | ||
} | ||
urUSMDeviceAlloc(context, device, nullptr, nullptr, deviceAllocSizeFuzz, | ||
&device_ptr); | ||
urUSMGetMemAllocInfo(context, device_ptr, UR_USM_ALLOC_INFO_SIZE, | ||
sizeof(usm_alloc_info_size), | ||
static_cast<void *>(&usm_alloc_info_size), nullptr); | ||
if (deviceAllocSizeFuzz != 0) { | ||
assert(usm_alloc_info_size >= deviceAllocSizeFuzz); | ||
} else { | ||
assert(usm_alloc_info_size == 0); | ||
} | ||
urUSMGetMemAllocInfo(context, device_ptr, UR_USM_ALLOC_INFO_TYPE, | ||
sizeof(device_type), static_cast<void *>(&device_type), | ||
nullptr); | ||
if (deviceAllocSizeFuzz != 0) { | ||
assert(device_type == UR_USM_TYPE_DEVICE); | ||
} else { | ||
assert(device_type == UR_USM_TYPE_UNKNOWN); | ||
} | ||
|
||
urUSMFree(context, host_ptr); | ||
urUSMFree(context, device_ptr); | ||
urContextRelease(context); | ||
for (auto &device : devices) { | ||
urDeviceRelease(device); | ||
} | ||
return 0; | ||
} |