| Index: test/unittests/wasm/module-decoder-unittest.cc
|
| diff --git a/test/unittests/wasm/module-decoder-unittest.cc b/test/unittests/wasm/module-decoder-unittest.cc
|
| index 77d05d3b5c0c6d5f790bc24883cd2fed07f020d5..136b9f26acd800cec35335bb57accce9d8edc83a 100644
|
| --- a/test/unittests/wasm/module-decoder-unittest.cc
|
| +++ b/test/unittests/wasm/module-decoder-unittest.cc
|
| @@ -13,10 +13,18 @@ namespace internal {
|
| namespace wasm {
|
|
|
| #define EMPTY_FUNCTION(sig_index) 0, SIG_INDEX(sig_index), U16_LE(0)
|
| +#define EMPTY_FUNCTION_SIZE ((size_t)5)
|
| #define EMPTY_BODY 0
|
| +#define EMPTY_BODY_SIZE ((size_t)1)
|
| #define NOP_BODY 2, 0, kExprNop
|
| +#define NOP_BODY_SIZE ((size_t)3)
|
| #define VOID_VOID_SIG 0, kLocalVoid
|
| +#define VOID_VOID_SIG_SIZE ((size_t)2)
|
| #define INT_INT_SIG 1, kLocalI32, kLocalI32
|
| +#define INT_INT_SIG_SIZE ((size_t)3)
|
| +
|
| +#define SECTION(NAME, EXTRA_SIZE) \
|
| + U32V_1(WASM_SECTION_##NAME##_SIZE + (EXTRA_SIZE)), WASM_SECTION_##NAME
|
|
|
| #define EXPECT_VERIFIES(data) \
|
| do { \
|
| @@ -41,6 +49,15 @@ namespace wasm {
|
| } \
|
| } while (false)
|
|
|
| +static size_t SizeOfVarInt(size_t value) {
|
| + size_t size = 0;
|
| + do {
|
| + size++;
|
| + value = value >> 7;
|
| + } while (value > 0);
|
| + return size;
|
| +}
|
| +
|
| struct LocalTypePair {
|
| uint8_t code;
|
| LocalType type;
|
| @@ -74,7 +91,7 @@ class WasmModuleVerifyTest : public TestWithZone {
|
| TEST_F(WasmModuleVerifyTest, WrongMagic) {
|
| for (uint32_t x = 1; x; x <<= 1) {
|
| const byte data[] = {U32_LE(kWasmMagic ^ x), U32_LE(kWasmVersion),
|
| - kDeclEnd};
|
| + SECTION(END, 0)};
|
| ModuleResult result = DecodeModuleNoHeader(data, data + sizeof(data));
|
| EXPECT_FALSE(result.ok());
|
| if (result.val) delete result.val;
|
| @@ -84,7 +101,7 @@ TEST_F(WasmModuleVerifyTest, WrongMagic) {
|
| TEST_F(WasmModuleVerifyTest, WrongVersion) {
|
| for (uint32_t x = 1; x; x <<= 1) {
|
| const byte data[] = {U32_LE(kWasmMagic), U32_LE(kWasmVersion ^ x),
|
| - kDeclEnd};
|
| + SECTION(END, 0)};
|
| ModuleResult result = DecodeModuleNoHeader(data, data + sizeof(data));
|
| EXPECT_FALSE(result.ok());
|
| if (result.val) delete result.val;
|
| @@ -92,17 +109,18 @@ TEST_F(WasmModuleVerifyTest, WrongVersion) {
|
| }
|
|
|
| TEST_F(WasmModuleVerifyTest, DecodeEmpty) {
|
| - static const byte data[] = {kDeclEnd};
|
| + static const byte data[] = {SECTION(END, 0)};
|
| EXPECT_VERIFIES(data);
|
| }
|
|
|
| TEST_F(WasmModuleVerifyTest, OneGlobal) {
|
| static const byte data[] = {
|
| - kDeclGlobals,
|
| + SECTION(GLOBALS, 7), // --
|
| 1,
|
| - NAME_LENGTH(1), 'g', // name
|
| - kMemI32, // memory type
|
| - 0, // exported
|
| + NAME_LENGTH(1),
|
| + 'g', // name
|
| + kMemI32, // memory type
|
| + 0, // exported
|
| };
|
|
|
| {
|
| @@ -129,7 +147,8 @@ TEST_F(WasmModuleVerifyTest, OneGlobal) {
|
|
|
| TEST_F(WasmModuleVerifyTest, ZeroGlobals) {
|
| static const byte data[] = {
|
| - kDeclGlobals, 0, // declare 0 globals
|
| + SECTION(GLOBALS, 1), // --
|
| + 0, // declare 0 globals
|
| };
|
| ModuleResult result = DecodeModule(data, data + arraysize(data));
|
| EXPECT_TRUE(result.ok());
|
| @@ -161,8 +180,13 @@ TEST_F(WasmModuleVerifyTest, NGlobals) {
|
|
|
| for (uint32_t i = 0; i < 1000000; i = i * 13 + 1) {
|
| std::vector<byte> buffer;
|
| - buffer.push_back(kDeclGlobals);
|
| - AppendUint32v(buffer, i);
|
| + size_t size =
|
| + WASM_SECTION_GLOBALS_SIZE + SizeOfVarInt(i) + i * sizeof(data);
|
| + const byte globals[] = {U32V_5(size), WASM_SECTION_GLOBALS};
|
| + for (size_t g = 0; g != sizeof(globals); ++g) {
|
| + buffer.push_back(globals[g]);
|
| + }
|
| + AppendUint32v(buffer, i); // Number of globals.
|
| for (uint32_t j = 0; j < i; j++) {
|
| buffer.insert(buffer.end(), data, data + sizeof(data));
|
| }
|
| @@ -173,12 +197,23 @@ TEST_F(WasmModuleVerifyTest, NGlobals) {
|
| }
|
| }
|
|
|
| +TEST_F(WasmModuleVerifyTest, GlobalWithInvalidNameOffset) {
|
| + static const byte data[] = {
|
| + SECTION(GLOBALS, 7),
|
| + 1, // declare one global
|
| + NO_NAME, // name offset
|
| + 33, // memory type
|
| + 0, // exported
|
| + };
|
| +
|
| + EXPECT_FAILURE(data);
|
| +}
|
|
|
| TEST_F(WasmModuleVerifyTest, GlobalWithInvalidMemoryType) {
|
| static const byte data[] = {
|
| - kDeclGlobals,
|
| + SECTION(GLOBALS, 7),
|
| 1, // declare one global
|
| - NO_NAME, // name length
|
| + NO_NAME, // name offset
|
| 33, // memory type
|
| 0, // exported
|
| };
|
| @@ -189,7 +224,7 @@ TEST_F(WasmModuleVerifyTest, GlobalWithInvalidMemoryType) {
|
|
|
| TEST_F(WasmModuleVerifyTest, TwoGlobals) {
|
| static const byte data[] = {
|
| - kDeclGlobals,
|
| + SECTION(GLOBALS, 13),
|
| 2,
|
| NO_NAME, // #0: name length
|
| kMemF32, // memory type
|
| @@ -229,12 +264,14 @@ TEST_F(WasmModuleVerifyTest, TwoGlobals) {
|
|
|
| TEST_F(WasmModuleVerifyTest, OneSignature) {
|
| {
|
| - static const byte data[] = {kDeclSignatures, 1, VOID_VOID_SIG};
|
| + static const byte data[] = {SECTION(SIGNATURES, 1 + VOID_VOID_SIG_SIZE), 1,
|
| + VOID_VOID_SIG};
|
| EXPECT_VERIFIES(data);
|
| }
|
|
|
| {
|
| - static const byte data[] = {kDeclSignatures, 1, INT_INT_SIG};
|
| + static const byte data[] = {SECTION(SIGNATURES, 1 + INT_INT_SIG_SIZE), 1,
|
| + INT_INT_SIG};
|
| EXPECT_VERIFIES(data);
|
| }
|
| }
|
| @@ -242,7 +279,7 @@ TEST_F(WasmModuleVerifyTest, OneSignature) {
|
|
|
| TEST_F(WasmModuleVerifyTest, MultipleSignatures) {
|
| static const byte data[] = {
|
| - kDeclSignatures,
|
| + SECTION(SIGNATURES, 10),
|
| 3,
|
| 0,
|
| kLocalVoid, // void -> void
|
| @@ -275,7 +312,7 @@ TEST_F(WasmModuleVerifyTest, MultipleSignatures) {
|
|
|
| TEST_F(WasmModuleVerifyTest, FunctionWithoutSig) {
|
| static const byte data[] = {
|
| - kDeclFunctions, 1,
|
| + SECTION(FUNCTIONS, 25), 1,
|
| // func#0 ------------------------------------------------------
|
| SIG_INDEX(0), // signature index
|
| NO_NAME, // name length
|
| @@ -296,15 +333,15 @@ TEST_F(WasmModuleVerifyTest, FunctionWithoutSig) {
|
|
|
|
|
| TEST_F(WasmModuleVerifyTest, OneEmptyVoidVoidFunction) {
|
| - const int kCodeStartOffset = 30;
|
| + const int kCodeStartOffset = 51;
|
| const int kCodeEndOffset = kCodeStartOffset + 1;
|
|
|
| static const byte data[] = {
|
| - kDeclSignatures, 1,
|
| + SECTION(SIGNATURES, 1 + VOID_VOID_SIG_SIZE), 1,
|
| // sig#0 -------------------------------------------------------
|
| VOID_VOID_SIG,
|
| // func#0 ------------------------------------------------------
|
| - kDeclFunctions, 1,
|
| + SECTION(FUNCTIONS, 19), 1,
|
| kDeclFunctionLocals | kDeclFunctionExport | kDeclFunctionName,
|
| SIG_INDEX(0), // signature index
|
| NAME_LENGTH(2), 'h', 'i', // name
|
| @@ -328,7 +365,7 @@ TEST_F(WasmModuleVerifyTest, OneEmptyVoidVoidFunction) {
|
|
|
| WasmFunction* function = &result.val->functions.back();
|
|
|
| - EXPECT_EQ(18, function->name_offset);
|
| + EXPECT_EQ(39, function->name_offset);
|
| EXPECT_EQ(2, function->name_length);
|
| EXPECT_EQ(kCodeStartOffset, function->code_start_offset);
|
| EXPECT_EQ(kCodeEndOffset, function->code_end_offset);
|
| @@ -344,15 +381,15 @@ TEST_F(WasmModuleVerifyTest, OneEmptyVoidVoidFunction) {
|
| if (result.val) delete result.val;
|
| }
|
|
|
| - EXPECT_OFF_END_FAILURE(data, 5, sizeof(data));
|
| + EXPECT_OFF_END_FAILURE(data, 16, sizeof(data));
|
| }
|
|
|
|
|
| TEST_F(WasmModuleVerifyTest, OneFunctionImported) {
|
| static const byte data[] = {
|
| - kDeclSignatures, 1,
|
| + SECTION(SIGNATURES, VOID_VOID_SIG_SIZE), 1,
|
| // sig#0 -------------------------------------------------------
|
| - VOID_VOID_SIG, kDeclFunctions, 1,
|
| + VOID_VOID_SIG, SECTION(FUNCTIONS, 6), 1,
|
| // func#0 ------------------------------------------------------
|
| kDeclFunctionImport, // no name, no locals, imported
|
| SIG_INDEX(0),
|
| @@ -379,14 +416,14 @@ TEST_F(WasmModuleVerifyTest, OneFunctionImported) {
|
| }
|
|
|
| TEST_F(WasmModuleVerifyTest, OneFunctionWithNopBody) {
|
| - static const byte kCodeStartOffset = 19;
|
| + static const byte kCodeStartOffset = 40;
|
| static const byte kCodeEndOffset = kCodeStartOffset + 1;
|
|
|
| static const byte data[] = {
|
| - kDeclSignatures, 1,
|
| + SECTION(SIGNATURES, 3), 1,
|
| // sig#0 -------------------------------------------------------
|
| 0, 0, // void -> void
|
| - kDeclFunctions, 1,
|
| + SECTION(FUNCTIONS, 7), 1,
|
| // func#0 ------------------------------------------------------
|
| 0, // no name, no locals
|
| 0, 0, // signature index
|
| @@ -416,14 +453,14 @@ TEST_F(WasmModuleVerifyTest, OneFunctionWithNopBody) {
|
|
|
|
|
| TEST_F(WasmModuleVerifyTest, OneFunctionWithNopBody_WithLocals) {
|
| - static const byte kCodeStartOffset = 27;
|
| + static const byte kCodeStartOffset = 48;
|
| static const byte kCodeEndOffset = kCodeStartOffset + 1;
|
|
|
| static const byte data[] = {
|
| - kDeclSignatures, 1,
|
| + SECTION(SIGNATURES, 3), 1,
|
| // sig#0 -------------------------------------------------------
|
| 0, 0, // void -> void
|
| - kDeclFunctions, 1,
|
| + SECTION(FUNCTIONS, 15), 1,
|
| // func#0 ------------------------------------------------------
|
| kDeclFunctionLocals, 0, 0, // signature index
|
| 1, 2, // local int32 count
|
| @@ -456,20 +493,21 @@ TEST_F(WasmModuleVerifyTest, OneFunctionWithNopBody_WithLocals) {
|
|
|
|
|
| TEST_F(WasmModuleVerifyTest, OneGlobalOneFunctionWithNopBodyOneDataSegment) {
|
| - static const byte kCodeStartOffset = 8 + 4 + 5 + 4 + 18;
|
| + static const byte kCodeStartOffset = 75;
|
| static const byte kCodeEndOffset = kCodeStartOffset + 3;
|
| - static const byte kDataSegmentSourceOffset = kCodeEndOffset + 6;
|
| + static const byte kDataSegmentSourceOffset = kCodeEndOffset + 20;
|
|
|
| static const byte data[] = {
|
| - kDeclMemory, 28, 28, 1,
|
| + SECTION(MEMORY, 3), 28, 28, 1,
|
| // global#0 --------------------------------------------------
|
| - kDeclGlobals, 1, 0, // name length
|
| - kMemU8, // memory type
|
| - 0, // exported
|
| + SECTION(GLOBALS, 7), 1,
|
| + 0, // name length
|
| + kMemU8, // memory type
|
| + 0, // exported
|
| // sig#0 -----------------------------------------------------
|
| - kDeclSignatures, 1, 0, 0, // void -> void
|
| + SECTION(SIGNATURES, 3), 1, 0, 0, // void -> void
|
| // func#0 ----------------------------------------------------
|
| - kDeclFunctions, 1, kDeclFunctionLocals | kDeclFunctionName, 0,
|
| + SECTION(FUNCTIONS, 20), 1, kDeclFunctionLocals | kDeclFunctionName, 0,
|
| 0, // signature index
|
| 2, 'h', 'i', // name
|
| 1, 2, // local int32 count
|
| @@ -481,11 +519,12 @@ TEST_F(WasmModuleVerifyTest, OneGlobalOneFunctionWithNopBodyOneDataSegment) {
|
| kExprNop, // func#0 body
|
| kExprNop, // func#0 body
|
| // segment#0 -------------------------------------------------
|
| - kDeclDataSegments, 1, U32V_3(0x8b3ae), // dest addr
|
| - U32V_1(5), // source size
|
| - 0, 1, 2, 3, 4, // data bytes
|
| + SECTION(DATA_SEGMENTS, 14), 1,
|
| + U32V_3(0x8b3ae), // dest addr
|
| + U32V_1(5), // source size
|
| + 0, 1, 2, 3, 4, // data bytes
|
| // rest ------------------------------------------------------
|
| - kDeclEnd,
|
| + SECTION(END, 0),
|
| };
|
|
|
| {
|
| @@ -504,7 +543,7 @@ TEST_F(WasmModuleVerifyTest, OneGlobalOneFunctionWithNopBodyOneDataSegment) {
|
|
|
| WasmFunction* function = &result.val->functions.back();
|
|
|
| - EXPECT_EQ(27, function->name_offset);
|
| + EXPECT_EQ(63, function->name_offset);
|
| EXPECT_EQ(2, function->name_length);
|
| EXPECT_EQ(kCodeStartOffset, function->code_start_offset);
|
| EXPECT_EQ(kCodeEndOffset, function->code_end_offset);
|
| @@ -525,13 +564,19 @@ TEST_F(WasmModuleVerifyTest, OneGlobalOneFunctionWithNopBodyOneDataSegment) {
|
|
|
|
|
| TEST_F(WasmModuleVerifyTest, OneDataSegment) {
|
| - const byte kDataSegmentSourceOffset = 8 + 10;
|
| + const byte kDataSegmentSourceOffset = 39;
|
| const byte data[] = {
|
| - kDeclMemory, 28, 28, 1,
|
| - kDeclDataSegments, 1,
|
| + SECTION(MEMORY, 3),
|
| + 28,
|
| + 28,
|
| + 1,
|
| + SECTION(DATA_SEGMENTS, 8),
|
| + 1,
|
| U32V_3(0x9bbaa), // dest addr
|
| U32V_1(3), // source size
|
| - 'a', 'b', 'c' // data bytes
|
| + 'a',
|
| + 'b',
|
| + 'c' // data bytes
|
| };
|
|
|
| {
|
| @@ -552,23 +597,39 @@ TEST_F(WasmModuleVerifyTest, OneDataSegment) {
|
| if (result.val) delete result.val;
|
| }
|
|
|
| - EXPECT_OFF_END_FAILURE(data, 5, sizeof(data));
|
| + EXPECT_OFF_END_FAILURE(data, 13, sizeof(data));
|
| }
|
|
|
|
|
| TEST_F(WasmModuleVerifyTest, TwoDataSegments) {
|
| - const byte kDataSegment0SourceOffset = 8 + 10;
|
| - const byte kDataSegment1SourceOffset = 8 + 10 + 8;
|
| + const byte kDataSegment0SourceOffset = 39;
|
| + const byte kDataSegment1SourceOffset = 39 + 8;
|
|
|
| const byte data[] = {
|
| - kDeclMemory, 28, 28, 1,
|
| - kDeclDataSegments, 2,
|
| - U32V_3(0x7ffee), // #0: dest addr
|
| - U32V_1(4), // source size
|
| - 1, 2, 3, 4, // data bytes
|
| - U32V_3(0x6ddcc), // #1: dest addr
|
| - U32V_1(10), // source size
|
| - 1, 2, 3, 4, 5, 6, 7, 8, 9, 10 // data bytes
|
| + SECTION(MEMORY, 3),
|
| + 28,
|
| + 28,
|
| + 1,
|
| + SECTION(DATA_SEGMENTS, 31),
|
| + 2, // segment count
|
| + U32V_3(0x7ffee), // #0: dest addr
|
| + U32V_1(4), // source size
|
| + 1,
|
| + 2,
|
| + 3,
|
| + 4, // data bytes
|
| + U32V_3(0x6ddcc), // #1: dest addr
|
| + U32V_1(10), // source size
|
| + 1,
|
| + 2,
|
| + 3,
|
| + 4,
|
| + 5,
|
| + 6,
|
| + 7,
|
| + 8,
|
| + 9,
|
| + 10 // data bytes
|
| };
|
|
|
| {
|
| @@ -594,10 +655,9 @@ TEST_F(WasmModuleVerifyTest, TwoDataSegments) {
|
| if (result.val) delete result.val;
|
| }
|
|
|
| - EXPECT_OFF_END_FAILURE(data, 5, sizeof(data));
|
| + EXPECT_OFF_END_FAILURE(data, 13, sizeof(data));
|
| }
|
|
|
| -
|
| TEST_F(WasmModuleVerifyTest, DataSegmentWithInvalidDest) {
|
| const int source_size = 3;
|
|
|
| @@ -606,17 +666,17 @@ TEST_F(WasmModuleVerifyTest, DataSegmentWithInvalidDest) {
|
|
|
| for (int dest_addr = mem_size - source_size;
|
| dest_addr < mem_size + source_size; dest_addr++) {
|
| - byte data[] = {
|
| - kDeclMemory,
|
| - mem_pages,
|
| - mem_pages,
|
| - 1,
|
| - kDeclDataSegments,
|
| - 1,
|
| - U32V_3(dest_addr),
|
| - U32V_1(source_size),
|
| - 'a', 'b', 'c'
|
| - };
|
| + byte data[] = {SECTION(MEMORY, 3),
|
| + mem_pages,
|
| + mem_pages,
|
| + 1,
|
| + SECTION(DATA_SEGMENTS, 14),
|
| + 1,
|
| + U32V_3(dest_addr),
|
| + U32V_1(source_size),
|
| + 'a',
|
| + 'b',
|
| + 'c'};
|
|
|
| if (dest_addr <= (mem_size - source_size)) {
|
| EXPECT_VERIFIES(data);
|
| @@ -634,11 +694,11 @@ TEST_F(WasmModuleVerifyTest, DataSegmentWithInvalidDest) {
|
| TEST_F(WasmModuleVerifyTest, OneIndirectFunction) {
|
| static const byte data[] = {
|
| // sig#0 -------------------------------------------------------
|
| - kDeclSignatures, 1, 0, 0, // void -> void
|
| + SECTION(SIGNATURES, 3), 1, 0, 0, // void -> void
|
| // func#0 ------------------------------------------------------
|
| - kDeclFunctions, 1, FUNCTION(0, 0),
|
| + SECTION(FUNCTIONS, 4), 1, FUNCTION(0, 0),
|
| // indirect table ----------------------------------------------
|
| - kDeclFunctionTable, 1, U32V_1(0)};
|
| + SECTION(FUNCTION_TABLE, 2), 1, U32V_1(0)};
|
|
|
| ModuleResult result = DecodeModule(data, data + arraysize(data));
|
| EXPECT_TRUE(result.ok());
|
| @@ -655,15 +715,15 @@ TEST_F(WasmModuleVerifyTest, OneIndirectFunction) {
|
| TEST_F(WasmModuleVerifyTest, MultipleIndirectFunctions) {
|
| static const byte data[] = {
|
| // sig#0 -------------------------------------------------------
|
| - kDeclSignatures, 2, 0, 0, // void -> void
|
| - 0, kLocalI32, // void -> i32
|
| + SECTION(SIGNATURES, 5), 2, 0, 0, // void -> void
|
| + 0, kLocalI32, // void -> i32
|
| // func#0 ------------------------------------------------------
|
| - kDeclFunctions, 4, FUNCTION(0, 1), // --
|
| - FUNCTION(1, 1), // --
|
| - FUNCTION(0, 1), // --
|
| - FUNCTION(1, 1), // --
|
| + SECTION(FUNCTIONS, 13), 4, FUNCTION(0, 1), // --
|
| + FUNCTION(1, 1), // --
|
| + FUNCTION(0, 1), // --
|
| + FUNCTION(1, 1), // --
|
| // indirect table ----------------------------------------------
|
| - kDeclFunctionTable, 8,
|
| + SECTION(FUNCTION_TABLE, 9), 8,
|
| U32V_1(0), // --
|
| U32V_1(1), // --
|
| U32V_1(2), // --
|
| @@ -691,9 +751,9 @@ TEST_F(WasmModuleVerifyTest, MultipleIndirectFunctions) {
|
| TEST_F(WasmModuleVerifyTest, IndirectFunctionNoFunctions) {
|
| static const byte data[] = {
|
| // sig#0 -------------------------------------------------------
|
| - kDeclSignatures, 1, 0, 0, // void -> void
|
| + SECTION(SIGNATURES, 3), 1, 0, 0, // void -> void
|
| // indirect table ----------------------------------------------
|
| - kDeclFunctionTable, 1, 0, 0,
|
| + SECTION(FUNCTION_TABLE, 3), 1, 0, 0,
|
| };
|
|
|
| EXPECT_FAILURE(data);
|
| @@ -703,11 +763,11 @@ TEST_F(WasmModuleVerifyTest, IndirectFunctionNoFunctions) {
|
| TEST_F(WasmModuleVerifyTest, IndirectFunctionInvalidIndex) {
|
| static const byte data[] = {
|
| // sig#0 -------------------------------------------------------
|
| - kDeclSignatures, 1, 0, 0, // void -> void
|
| + SECTION(SIGNATURES, 3), 1, 0, 0, // void -> void
|
| // functions ---------------------------------------------------
|
| - kDeclFunctions, 1, FUNCTION(0, 1),
|
| + SECTION(FUNCTIONS, 4), 1, FUNCTION(0, 1),
|
| // indirect table ----------------------------------------------
|
| - kDeclFunctionTable, 1, 1, 0,
|
| + SECTION(FUNCTION_TABLE, 3), 1, 1, 0,
|
| };
|
|
|
| EXPECT_FAILURE(data);
|
| @@ -874,85 +934,84 @@ TEST_F(WasmFunctionVerifyTest, Ok_v_v_empty) {
|
| if (result.val) delete result.val;
|
| }
|
|
|
| -TEST_F(WasmModuleVerifyTest, UnknownSectionNoLen) {
|
| +TEST_F(WasmModuleVerifyTest, SectionWithoutNameLength) {
|
| + const byte data[] = {1};
|
| + EXPECT_FAILURE(data);
|
| +}
|
| +
|
| +TEST_F(WasmModuleVerifyTest, TheLoneliestOfValidModulesTheTrulyEmptyOne) {
|
| const byte data[] = {
|
| - kMaxModuleSectionCode, // unknown section without length.
|
| + 1, // Section size.
|
| + 0, // Empty section name.
|
| + // No section name, no content, nothing but sadness.
|
| };
|
| - EXPECT_FAILURE(data);
|
| + EXPECT_VERIFIES(data);
|
| }
|
|
|
| -TEST_F(WasmModuleVerifyTest, UnknownSectionEmpty) {
|
| - for (int i = 0; i < 255 - kMaxModuleSectionCode; ++i) {
|
| - const byte data[] = {
|
| - byte(kMaxModuleSectionCode + i), 0, // empty unknown section
|
| - };
|
| - ModuleResult result = DecodeModule(data, data + arraysize(data));
|
| - EXPECT_TRUE(result.ok());
|
| - if (result.val) delete result.val;
|
| - }
|
| +TEST_F(WasmModuleVerifyTest, OnlyUnknownSectionEmpty) {
|
| + const byte data[] = {
|
| + 5, // Section size.
|
| + 4, 'l', 'u', 'l', 'z', // unknown section.
|
| + };
|
| + EXPECT_VERIFIES(data);
|
| }
|
|
|
| -TEST_F(WasmModuleVerifyTest, UnknownSectionOne) {
|
| - static const byte data[] = {
|
| - kMaxModuleSectionCode,
|
| - 1, // LEB128 1
|
| - 0, // one byte section
|
| +TEST_F(WasmModuleVerifyTest, OnlyUnknownSectionNonEmpty) {
|
| + const byte data[] = {
|
| + 10, // Section size.
|
| + 4, 'l', 'u', 'l', 'z', // unknown section.
|
| + // Section content:
|
| + 0xff, 0xff, 0xff, 0xff, 0xff,
|
| };
|
| - ModuleResult result = DecodeModule(data, data + arraysize(data));
|
| - EXPECT_TRUE(result.ok());
|
| - if (result.val) delete result.val;
|
| + EXPECT_VERIFIES(data);
|
| }
|
|
|
| -TEST_F(WasmModuleVerifyTest, UnknownSectionTen) {
|
| - static const byte data[] = {
|
| - kMaxModuleSectionCode,
|
| - 10, // LEB128 10
|
| - 1,
|
| - 2,
|
| - 3,
|
| - 4,
|
| - 5,
|
| - 6,
|
| - 7,
|
| - 8,
|
| - 9,
|
| - 10, // 10 byte section
|
| +TEST_F(WasmModuleVerifyTest, SignatureFollowedByEmptyUnknownSection) {
|
| + const byte data[] = {
|
| + SECTION(SIGNATURES, 1 + VOID_VOID_SIG_SIZE), 1, VOID_VOID_SIG,
|
| + // -----------------------------------------------------------
|
| + 5, // Section size.
|
| + 4, 'l', 'u', 'l', 'z', // unknown section.
|
| };
|
| - ModuleResult result = DecodeModule(data, data + arraysize(data));
|
| - EXPECT_TRUE(result.ok());
|
| - if (result.val) delete result.val;
|
| + EXPECT_VERIFIES(data);
|
| +}
|
| +
|
| +TEST_F(WasmModuleVerifyTest, SignatureFollowedByUnknownSection) {
|
| + const byte data[] = {
|
| + SECTION(SIGNATURES, 1 + VOID_VOID_SIG_SIZE), 1, VOID_VOID_SIG,
|
| + // -----------------------------------------------------------
|
| + 10, // Section size.
|
| + 4, 'l', 'u', 'l', 'z', // unknown section.
|
| + 0xff, 0xff, 0xff, 0xff, 0xff,
|
| + };
|
| + EXPECT_VERIFIES(data);
|
| +}
|
| +
|
| +TEST_F(WasmModuleVerifyTest, SignatureFollowedByUnknownSectionWithLongLEB) {
|
| + const byte data[] = {
|
| + SECTION(SIGNATURES, 1 + VOID_VOID_SIG_SIZE), 1, VOID_VOID_SIG,
|
| + // -----------------------------------------------------------
|
| + 0x85, 0x80, 0x80, 0x80, 0x00, // Section size: 1 but in a 5-byte LEB.
|
| + 4, 'l', 'u', 'l', 'z', // unknown section.
|
| + };
|
| + EXPECT_VERIFIES(data);
|
| }
|
|
|
| TEST_F(WasmModuleVerifyTest, UnknownSectionOverflow) {
|
| static const byte data[] = {
|
| - kMaxModuleSectionCode,
|
| - 11, // LEB128 11
|
| - 1,
|
| - 2,
|
| - 3,
|
| - 4,
|
| - 5,
|
| - 6,
|
| - 7,
|
| - 8,
|
| - 9,
|
| - 10, // 10 byte section
|
| + 13, // Section size.
|
| + 1, // Section name length.
|
| + '\0', // Section name.
|
| + 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, // 10 byte section
|
| };
|
| EXPECT_FAILURE(data);
|
| }
|
|
|
| TEST_F(WasmModuleVerifyTest, UnknownSectionUnderflow) {
|
| static const byte data[] = {
|
| - kMaxModuleSectionCode,
|
| - 0xff,
|
| - 0xff,
|
| - 0xff,
|
| - 0xff,
|
| - 0x0f, // LEB128 0xffffffff
|
| - 1,
|
| - 2,
|
| - 3,
|
| - 4, // 4 byte section
|
| + 0xff, 0xff, 0xff, 0xff, 0x0f, // Section size LEB128 0xffffffff
|
| + 1, '\0', // Section name and name length.
|
| + 1, 2, 3, 4, // 4 byte section
|
| };
|
| EXPECT_FAILURE(data);
|
| }
|
| @@ -960,26 +1019,20 @@ TEST_F(WasmModuleVerifyTest, UnknownSectionUnderflow) {
|
| TEST_F(WasmModuleVerifyTest, UnknownSectionLoop) {
|
| // Would infinite loop decoding if wrapping and allowed.
|
| static const byte data[] = {
|
| - kMaxModuleSectionCode,
|
| - 0xfa,
|
| - 0xff,
|
| - 0xff,
|
| - 0xff,
|
| - 0x0f, // LEB128 0xfffffffa
|
| - 1,
|
| - 2,
|
| - 3,
|
| - 4, // 4 byte section
|
| + 0xfa, 0xff, 0xff, 0xff, 0x0f, // Section size LEB128 0xfffffffa
|
| + 1, '\0', // Section name and name length.
|
| + 1, 2, 3, 4, // 4 byte section
|
| };
|
| EXPECT_FAILURE(data);
|
| }
|
|
|
| TEST_F(WasmModuleVerifyTest, UnknownSectionSkipped) {
|
| static const byte data[] = {
|
| - kMaxModuleSectionCode,
|
| - 1, // LEB128 1
|
| - 0, // one byte section
|
| - kDeclGlobals,
|
| + 3, // Section size.
|
| + 1,
|
| + '\0', // Section name: LEB128 1, string '\0'
|
| + 0, // one byte section
|
| + SECTION(GLOBALS, 7),
|
| 1,
|
| 0, // name length
|
| kMemI32, // memory type
|
| @@ -1003,131 +1056,167 @@ TEST_F(WasmModuleVerifyTest, UnknownSectionSkipped) {
|
| }
|
|
|
| TEST_F(WasmModuleVerifyTest, ImportTable_empty) {
|
| - static const byte data[] = {kDeclSignatures, 0, kDeclImportTable, 0};
|
| + static const byte data[] = {SECTION(SIGNATURES, 1), 0,
|
| + SECTION(IMPORT_TABLE, 1), 0};
|
| EXPECT_VERIFIES(data);
|
| }
|
|
|
| TEST_F(WasmModuleVerifyTest, ImportTable_nosigs) {
|
| - static const byte data[] = {kDeclImportTable, 0};
|
| + static const byte data[] = {SECTION(IMPORT_TABLE, 1), 0};
|
| EXPECT_FAILURE(data);
|
| }
|
|
|
| TEST_F(WasmModuleVerifyTest, ImportTable_invalid_sig) {
|
| static const byte data[] = {
|
| - kDeclSignatures, 0, kDeclImportTable, 1,
|
| - IMPORT_SIG_INDEX(0), // sig index
|
| - NAME_LENGTH(1), 'm', // module name
|
| - NAME_LENGTH(1), 'f', // function name
|
| + SECTION(SIGNATURES, 1), 0, SECTION(IMPORT_TABLE, 6), 1,
|
| + IMPORT_SIG_INDEX(0), // sig index
|
| + NAME_LENGTH(1), 'm', // module name
|
| + NAME_LENGTH(1), 'f', // function name
|
| };
|
| EXPECT_FAILURE(data);
|
| }
|
|
|
| TEST_F(WasmModuleVerifyTest, ImportTable_one_sig) {
|
| static const byte data[] = {
|
| - kDeclSignatures,
|
| + SECTION(SIGNATURES, 1 + VOID_VOID_SIG_SIZE),
|
| 1,
|
| VOID_VOID_SIG,
|
| - kDeclImportTable,
|
| + SECTION(IMPORT_TABLE, 6),
|
| 1, // --
|
| IMPORT_SIG_INDEX(0), // sig index
|
| - NAME_LENGTH(1), 'm', // module name
|
| - NAME_LENGTH(1), 'f', // function name
|
| + NAME_LENGTH(1),
|
| + 'm', // module name
|
| + NAME_LENGTH(1),
|
| + 'f', // function name
|
| };
|
| EXPECT_VERIFIES(data);
|
| }
|
|
|
| TEST_F(WasmModuleVerifyTest, ImportTable_invalid_module) {
|
| static const byte data[] = {
|
| - kDeclSignatures,
|
| + SECTION(SIGNATURES, 1 + VOID_VOID_SIG_SIZE),
|
| 1,
|
| VOID_VOID_SIG,
|
| - kDeclImportTable,
|
| + SECTION(IMPORT_TABLE, 6),
|
| 1, // --
|
| IMPORT_SIG_INDEX(0), // sig index
|
| NO_NAME, // module name
|
| - NAME_LENGTH(1), 'f' // function name
|
| + NAME_LENGTH(1),
|
| + 'f' // function name
|
| };
|
| EXPECT_FAILURE(data);
|
| }
|
|
|
| TEST_F(WasmModuleVerifyTest, ImportTable_off_end) {
|
| static const byte data[] = {
|
| - kDeclSignatures, 1, VOID_VOID_SIG, kDeclImportTable, 1,
|
| + SECTION(SIGNATURES, 1 + VOID_VOID_SIG_SIZE),
|
| + 1,
|
| + VOID_VOID_SIG,
|
| + SECTION(IMPORT_TABLE, 6),
|
| + 1,
|
| IMPORT_SIG_INDEX(0), // sig index
|
| - NAME_LENGTH(1), 'm', // module name
|
| - NAME_LENGTH(1), 'f', // function name
|
| + NAME_LENGTH(1),
|
| + 'm', // module name
|
| + NAME_LENGTH(1),
|
| + 'f', // function name
|
| };
|
|
|
| - EXPECT_OFF_END_FAILURE(data, 5, sizeof(data));
|
| + EXPECT_OFF_END_FAILURE(data, 16, sizeof(data));
|
| }
|
|
|
| TEST_F(WasmModuleVerifyTest, ExportTable_empty1) {
|
| - static const byte data[] = {kDeclSignatures, 1, VOID_VOID_SIG,
|
| - kDeclFunctions, 1, EMPTY_FUNCTION(0),
|
| - kDeclExportTable, 0};
|
| + static const byte data[] = {SECTION(SIGNATURES, 1 + VOID_VOID_SIG_SIZE),
|
| + 1,
|
| + VOID_VOID_SIG,
|
| + SECTION(FUNCTIONS, 1 + EMPTY_FUNCTION_SIZE),
|
| + 1,
|
| + EMPTY_FUNCTION(0),
|
| + SECTION(EXPORT_TABLE, 1),
|
| + 0};
|
| EXPECT_VERIFIES(data);
|
| }
|
|
|
| TEST_F(WasmModuleVerifyTest, ExportTable_empty2) {
|
| - static const byte data[] = {kDeclSignatures, 0, kDeclFunctions, 0,
|
| - kDeclExportTable, 0};
|
| + static const byte data[] = {SECTION(SIGNATURES, 1), 0,
|
| + SECTION(FUNCTIONS, 1), 0,
|
| + SECTION(EXPORT_TABLE, 1), 0};
|
| // TODO(titzer): current behavior treats empty functions section as missing.
|
| EXPECT_FAILURE(data);
|
| }
|
|
|
| TEST_F(WasmModuleVerifyTest, ExportTable_NoFunctions1) {
|
| - static const byte data[] = {kDeclSignatures, 0, kDeclExportTable, 0};
|
| + static const byte data[] = {SECTION(SIGNATURES, 1), 0,
|
| + SECTION(EXPORT_TABLE, 1), 0};
|
| EXPECT_FAILURE(data);
|
| }
|
|
|
| TEST_F(WasmModuleVerifyTest, ExportTable_NoFunctions2) {
|
| - static const byte data[] = {kDeclExportTable, 0};
|
| + static const byte data[] = {SECTION(EXPORT_TABLE, 1), 0};
|
| EXPECT_FAILURE(data);
|
| }
|
|
|
| TEST_F(WasmModuleVerifyTest, ExportTableOne) {
|
| static const byte data[] = {
|
| - kDeclSignatures, 1, // sigs
|
| - VOID_VOID_SIG, // --
|
| - kDeclFunctions, 1, // functions
|
| - EMPTY_FUNCTION(0), // --
|
| - kDeclExportTable, 1, // exports
|
| - FUNC_INDEX(0), // --
|
| - NO_NAME // --
|
| + SECTION(SIGNATURES, 1 + VOID_VOID_SIG_SIZE),
|
| + 1, // sigs
|
| + VOID_VOID_SIG, // --
|
| + SECTION(FUNCTIONS, 1 + EMPTY_FUNCTION_SIZE),
|
| + 1, // functions
|
| + EMPTY_FUNCTION(0), // --
|
| + SECTION(EXPORT_TABLE, 7),
|
| + 1, // exports
|
| + FUNC_INDEX(0), // --
|
| + NO_NAME // --
|
| };
|
| EXPECT_VERIFIES(data);
|
| }
|
|
|
| TEST_F(WasmModuleVerifyTest, ExportTableTwo) {
|
| static const byte data[] = {
|
| - kDeclSignatures, 1, // sigs
|
| - VOID_VOID_SIG, // --
|
| - kDeclFunctions, 1, // functions
|
| - EMPTY_FUNCTION(0), // --
|
| - kDeclExportTable, 2, // exports
|
| - FUNC_INDEX(0), // --
|
| - NAME_LENGTH(4), 'n', 'a', 'm', 'e', // --
|
| - FUNC_INDEX(0), // --
|
| - NAME_LENGTH(3), 'n', 'o', 'm' // --
|
| + SECTION(SIGNATURES, 1 + VOID_VOID_SIG_SIZE),
|
| + 1, // sigs
|
| + VOID_VOID_SIG, // --
|
| + SECTION(FUNCTIONS, 1 + EMPTY_FUNCTION_SIZE),
|
| + 1, // functions
|
| + EMPTY_FUNCTION(0), // --
|
| + SECTION(EXPORT_TABLE, 12),
|
| + 2, // exports
|
| + FUNC_INDEX(0), // --
|
| + NAME_LENGTH(4),
|
| + 'n',
|
| + 'a',
|
| + 'm',
|
| + 'e', // --
|
| + FUNC_INDEX(0), // --
|
| + NAME_LENGTH(3),
|
| + 'n',
|
| + 'o',
|
| + 'm' // --
|
| };
|
| EXPECT_VERIFIES(data);
|
| }
|
|
|
| TEST_F(WasmModuleVerifyTest, ExportTableThree) {
|
| static const byte data[] = {
|
| - kDeclSignatures, 1, // sigs
|
| - VOID_VOID_SIG, // --
|
| - kDeclFunctions, 3, // functions
|
| - EMPTY_FUNCTION(0), // --
|
| - EMPTY_FUNCTION(0), // --
|
| - EMPTY_FUNCTION(0), // --
|
| - kDeclExportTable, 3, // exports
|
| - FUNC_INDEX(0), // --
|
| - NAME_LENGTH(1), 'a', // --
|
| - FUNC_INDEX(1), // --
|
| - NAME_LENGTH(1), 'b', // --
|
| - FUNC_INDEX(2), // --
|
| - NAME_LENGTH(1), 'c' // --
|
| + SECTION(SIGNATURES, 1 + VOID_VOID_SIG_SIZE),
|
| + 1, // sigs
|
| + VOID_VOID_SIG, // --
|
| + SECTION(FUNCTIONS, 1 + 3 * EMPTY_FUNCTION_SIZE),
|
| + 3, // functions
|
| + EMPTY_FUNCTION(0), // --
|
| + EMPTY_FUNCTION(0), // --
|
| + EMPTY_FUNCTION(0), // --
|
| + SECTION(EXPORT_TABLE, 10),
|
| + 3, // exports
|
| + FUNC_INDEX(0), // --
|
| + NAME_LENGTH(1),
|
| + 'a', // --
|
| + FUNC_INDEX(1), // --
|
| + NAME_LENGTH(1),
|
| + 'b', // --
|
| + FUNC_INDEX(2), // --
|
| + NAME_LENGTH(1),
|
| + 'c' // --
|
| };
|
| EXPECT_VERIFIES(data);
|
| }
|
| @@ -1135,15 +1224,20 @@ TEST_F(WasmModuleVerifyTest, ExportTableThree) {
|
| TEST_F(WasmModuleVerifyTest, ExportTableThreeOne) {
|
| for (int i = 0; i < 6; i++) {
|
| const byte data[] = {
|
| - kDeclSignatures, 1, // sigs
|
| - VOID_VOID_SIG, // --
|
| - kDeclFunctions, 3, // functions
|
| - EMPTY_FUNCTION(0), // --
|
| - EMPTY_FUNCTION(0), // --
|
| - EMPTY_FUNCTION(0), // --
|
| - kDeclExportTable, 1, // exports
|
| - FUNC_INDEX(i), // --
|
| - NAME_LENGTH(2), 'e', 'x', // --
|
| + SECTION(SIGNATURES, 1 + VOID_VOID_SIG_SIZE),
|
| + 1, // sigs
|
| + VOID_VOID_SIG, // --
|
| + SECTION(FUNCTIONS, 1 + 3 * EMPTY_FUNCTION_SIZE),
|
| + 3, // functions
|
| + EMPTY_FUNCTION(0), // --
|
| + EMPTY_FUNCTION(0), // --
|
| + EMPTY_FUNCTION(0), // --
|
| + SECTION(EXPORT_TABLE, 5),
|
| + 1, // exports
|
| + FUNC_INDEX(i), // --
|
| + NAME_LENGTH(2),
|
| + 'e',
|
| + 'x', // --
|
| };
|
|
|
| if (i < 3) {
|
| @@ -1156,16 +1250,19 @@ TEST_F(WasmModuleVerifyTest, ExportTableThreeOne) {
|
|
|
| TEST_F(WasmModuleVerifyTest, ExportTableOne_off_end) {
|
| static const byte data[] = {
|
| - kDeclSignatures, 1, // sigs
|
| - VOID_VOID_SIG, // --
|
| - kDeclFunctions, 1, // functions
|
| - EMPTY_FUNCTION(0), // --
|
| - kDeclExportTable, 1, // exports
|
| - FUNC_INDEX(0), // --
|
| - NO_NAME // --
|
| + SECTION(SIGNATURES, 1 + VOID_VOID_SIG_SIZE),
|
| + 1, // sigs
|
| + VOID_VOID_SIG, // --
|
| + SECTION(FUNCTIONS, 1 + EMPTY_FUNCTION_SIZE),
|
| + 1, // functions
|
| + EMPTY_FUNCTION(0), // --
|
| + SECTION(EXPORT_TABLE, 1 + 6),
|
| + 1, // exports
|
| + FUNC_INDEX(0), // --
|
| + NO_NAME // --
|
| };
|
|
|
| - for (int length = 13; length < sizeof(data); length++) {
|
| + for (int length = 33; length < sizeof(data); length++) {
|
| ModuleResult result = DecodeModule(data, data + length);
|
| EXPECT_FALSE(result.ok());
|
| if (result.val) delete result.val;
|
| @@ -1173,23 +1270,21 @@ TEST_F(WasmModuleVerifyTest, ExportTableOne_off_end) {
|
| }
|
|
|
| #define SIGNATURES_SECTION(count, ...) \
|
| - kDeclSignatures, U32V_1(count), __VA_ARGS__
|
| + SECTION(SIGNATURES, 1 + 3 * (count)), U32V_1(count), __VA_ARGS__
|
| #define FUNCTION_SIGNATURES_SECTION(count, ...) \
|
| - kDeclFunctionSignatures, U32V_1(count), __VA_ARGS__
|
| -#define FUNCTION_BODIES_SECTION(count, ...) \
|
| - kDeclFunctionBodies, U32V_1(count), __VA_ARGS__
|
| -#define NAMES_SECTION(count, ...) kDeclNames, U32V_1(count), __VA_ARGS__
|
| + SECTION(FUNCTION_SIGNATURES, 1 + (count)), U32V_1(count), __VA_ARGS__
|
|
|
| #define FOO_STRING 3, 'f', 'o', 'o'
|
| #define NO_LOCAL_NAMES 0
|
|
|
| -#define EMPTY_SIGNATURES_SECTION kDeclSignatures, 0
|
| -#define EMPTY_FUNCTION_SIGNATURES_SECTION kDeclFunctionSignatures, 0
|
| -#define EMPTY_FUNCTION_BODIES_SECTION kDeclFunctionBodies, 0
|
| -#define EMPTY_NAMES_SECTION kDeclNames, 0
|
| +#define EMPTY_SIGNATURES_SECTION SECTION(SIGNATURES, 1), 0
|
| +#define EMPTY_FUNCTION_SIGNATURES_SECTION SECTION(FUNCTION_SIGNATURES, 1), 0
|
| +#define EMPTY_FUNCTION_BODIES_SECTION SECTION(FUNCTION_BODIES, 1), 0
|
| +#define EMPTY_NAMES_SECTION SECTION(NAMES, 1), 0
|
|
|
| TEST_F(WasmModuleVerifyTest, FunctionSignatures_empty) {
|
| - static const byte data[] = {kDeclSignatures, 0, kDeclFunctionSignatures, 0};
|
| + static const byte data[] = {SECTION(SIGNATURES, 1), 0,
|
| + SECTION(FUNCTION_SIGNATURES, 1), 0};
|
| EXPECT_VERIFIES(data);
|
| }
|
|
|
| @@ -1207,30 +1302,34 @@ TEST_F(WasmModuleVerifyTest, FunctionBodies_empty) {
|
| }
|
|
|
| TEST_F(WasmModuleVerifyTest, FunctionBodies_one_empty) {
|
| - static const byte data[] = {SIGNATURES_SECTION(1, VOID_VOID_SIG),
|
| - FUNCTION_SIGNATURES_SECTION(1, 0),
|
| - FUNCTION_BODIES_SECTION(1, EMPTY_BODY)};
|
| + static const byte data[] = {
|
| + SIGNATURES_SECTION(1, VOID_VOID_SIG), FUNCTION_SIGNATURES_SECTION(1, 0),
|
| + SECTION(FUNCTION_BODIES, 1 + EMPTY_BODY_SIZE), 1, EMPTY_BODY};
|
| EXPECT_VERIFIES(data);
|
| }
|
|
|
| TEST_F(WasmModuleVerifyTest, FunctionBodies_one_nop) {
|
| - static const byte data[] = {SIGNATURES_SECTION(1, VOID_VOID_SIG),
|
| - FUNCTION_SIGNATURES_SECTION(1, 0),
|
| - FUNCTION_BODIES_SECTION(1, NOP_BODY)};
|
| + static const byte data[] = {
|
| + SIGNATURES_SECTION(1, VOID_VOID_SIG), FUNCTION_SIGNATURES_SECTION(1, 0),
|
| + SECTION(FUNCTION_BODIES, 1 + NOP_BODY_SIZE), 1, NOP_BODY};
|
| EXPECT_VERIFIES(data);
|
| }
|
|
|
| TEST_F(WasmModuleVerifyTest, FunctionBodies_count_mismatch1) {
|
| static const byte data[] = {SIGNATURES_SECTION(1, VOID_VOID_SIG),
|
| FUNCTION_SIGNATURES_SECTION(2, 0, 0),
|
| - FUNCTION_BODIES_SECTION(1, EMPTY_BODY)};
|
| + SECTION(FUNCTION_BODIES, 1 + EMPTY_BODY_SIZE), 1,
|
| + EMPTY_BODY};
|
| EXPECT_FAILURE(data);
|
| }
|
|
|
| TEST_F(WasmModuleVerifyTest, FunctionBodies_count_mismatch2) {
|
| static const byte data[] = {SIGNATURES_SECTION(1, VOID_VOID_SIG),
|
| FUNCTION_SIGNATURES_SECTION(1, 0),
|
| - FUNCTION_BODIES_SECTION(2, NOP_BODY, NOP_BODY)};
|
| + SECTION(FUNCTION_BODIES, 1 + 2 * NOP_BODY_SIZE),
|
| + 2,
|
| + NOP_BODY,
|
| + NOP_BODY};
|
| EXPECT_FAILURE(data);
|
| }
|
|
|
| @@ -1243,21 +1342,33 @@ TEST_F(WasmModuleVerifyTest, Names_empty) {
|
|
|
| TEST_F(WasmModuleVerifyTest, Names_one_empty) {
|
| static const byte data[] = {
|
| - SIGNATURES_SECTION(1, VOID_VOID_SIG), // --
|
| - FUNCTION_SIGNATURES_SECTION(1, 0), // --
|
| - FUNCTION_BODIES_SECTION(1, EMPTY_BODY), // --
|
| - NAMES_SECTION(1, FOO_STRING, NO_LOCAL_NAMES) // --
|
| + SIGNATURES_SECTION(1, VOID_VOID_SIG), // --
|
| + FUNCTION_SIGNATURES_SECTION(1, 0), // --
|
| + SECTION(FUNCTION_BODIES, 1 + EMPTY_BODY_SIZE),
|
| + 1,
|
| + EMPTY_BODY, // --
|
| + SECTION(NAMES, 1 + 5),
|
| + 1,
|
| + FOO_STRING,
|
| + NO_LOCAL_NAMES // --
|
| };
|
| EXPECT_VERIFIES(data);
|
| }
|
|
|
| TEST_F(WasmModuleVerifyTest, Names_two_empty) {
|
| static const byte data[] = {
|
| - SIGNATURES_SECTION(1, VOID_VOID_SIG), // --
|
| - FUNCTION_SIGNATURES_SECTION(2, 0, 0), // --
|
| - FUNCTION_BODIES_SECTION(2, EMPTY_BODY, EMPTY_BODY), // --
|
| - NAMES_SECTION(2, FOO_STRING, NO_LOCAL_NAMES, // --
|
| - FOO_STRING, NO_LOCAL_NAMES) // --
|
| + SIGNATURES_SECTION(1, VOID_VOID_SIG), // --
|
| + FUNCTION_SIGNATURES_SECTION(2, 0, 0), // --
|
| + SECTION(FUNCTION_BODIES, 1 + 2 * EMPTY_BODY_SIZE), // --
|
| + 2,
|
| + EMPTY_BODY,
|
| + EMPTY_BODY, // --
|
| + SECTION(NAMES, 1 + 10),
|
| + 2, // --
|
| + FOO_STRING,
|
| + NO_LOCAL_NAMES, // --
|
| + FOO_STRING,
|
| + NO_LOCAL_NAMES, // --
|
| };
|
| EXPECT_VERIFIES(data);
|
| }
|
|
|