webrtc_m130/test/fuzzers/rtp_packetizer_av1_fuzzer.cc
Philipp Hancke 902bc24b6f iwyu test/fuzzers
Note that this needs to be done with a work directory that supports
fuzzer builds, otherwise IWYU will bail out with complaints about
find-bad-constructs and raw-ptr-plugin

Some manual work was required to resolve the TaskQueueFactory which
is forward-declared by environment which required a manual include
of the header file.

The DcSctp packet fuzzer was also updated use the
disable_checksum_verification option which was moved to the
DcSctpOptions struct.

vp9_encoder_references_fuzzer was trying to include libvpx includes
which had to be reverted.

BUG=webrtc:42226242

Change-Id: I9fdcf979e73fdee77106c4583faff21ca7abf19f
Reviewed-on: https://webrtc-review.googlesource.com/c/src/+/375840
Reviewed-by: Mirko Bonadei <mbonadei@webrtc.org>
Reviewed-by: Danil Chapovalov <danilchap@webrtc.org>
Commit-Queue: Philipp Hancke <phancke@meta.com>
Cr-Commit-Position: refs/heads/main@{#43873}
2025-02-11 12:04:42 -08:00

76 lines
3.1 KiB
C++

/*
* Copyright (c) 2019 The WebRTC project authors. All Rights Reserved.
*
* Use of this source code is governed by a BSD-style license
* that can be found in the LICENSE file in the root of the source
* tree. An additional intellectual property rights grant can be found
* in the file PATENTS. All contributing project authors may
* be found in the AUTHORS file in the root of the source tree.
*/
#include <stddef.h>
#include <stdint.h>
#include "api/array_view.h"
#include "api/video/video_frame_type.h"
#include "modules/rtp_rtcp/source/rtp_format.h"
#include "modules/rtp_rtcp/source/rtp_packet_to_send.h"
#include "modules/rtp_rtcp/source/rtp_packetizer_av1.h"
#include "rtc_base/checks.h"
#include "test/fuzzers/fuzz_data_helper.h"
namespace webrtc {
void FuzzOneInput(const uint8_t* data, size_t size) {
test::FuzzDataHelper fuzz_input(rtc::MakeArrayView(data, size));
RtpPacketizer::PayloadSizeLimits limits;
limits.max_payload_len = 1200;
// Read uint8_t to be sure reduction_lens are much smaller than
// max_payload_len and thus limits structure is valid.
limits.first_packet_reduction_len = fuzz_input.ReadOrDefaultValue<uint8_t>(0);
limits.last_packet_reduction_len = fuzz_input.ReadOrDefaultValue<uint8_t>(0);
limits.single_packet_reduction_len =
fuzz_input.ReadOrDefaultValue<uint8_t>(0);
const VideoFrameType kFrameTypes[] = {VideoFrameType::kVideoFrameKey,
VideoFrameType::kVideoFrameDelta};
VideoFrameType frame_type = fuzz_input.SelectOneOf(kFrameTypes);
// Main function under test: RtpPacketizerAv1's constructor.
// "even distribution" is transitional and still exercises the other code path
// so does not require another fuzzer.
RtpPacketizerAv1 packetizer(fuzz_input.ReadByteArray(fuzz_input.BytesLeft()),
limits, frame_type,
/*is_last_frame_in_picture=*/true,
/*even_distribution=*/true);
size_t num_packets = packetizer.NumPackets();
if (num_packets == 0) {
return;
}
// When packetization was successful, validate NextPacket function too.
// While at it, check that packets respect the payload size limits.
RtpPacketToSend rtp_packet(nullptr);
// Single packet.
if (num_packets == 1) {
RTC_CHECK(packetizer.NextPacket(&rtp_packet));
RTC_CHECK_LE(rtp_packet.payload_size(),
limits.max_payload_len - limits.single_packet_reduction_len);
return;
}
// First packet.
RTC_CHECK(packetizer.NextPacket(&rtp_packet));
RTC_CHECK_LE(rtp_packet.payload_size(),
limits.max_payload_len - limits.first_packet_reduction_len);
// Middle packets.
for (size_t i = 1; i < num_packets - 1; ++i) {
RTC_CHECK(packetizer.NextPacket(&rtp_packet))
<< "Failed to get packet#" << i;
RTC_CHECK_LE(rtp_packet.payload_size(), limits.max_payload_len)
<< "Packet #" << i << " exceeds it's limit";
}
// Last packet.
RTC_CHECK(packetizer.NextPacket(&rtp_packet));
RTC_CHECK_LE(rtp_packet.payload_size(),
limits.max_payload_len - limits.last_packet_reduction_len);
}
} // namespace webrtc