Index: test/unittests/wasm/module-decoder-unittest.cc |
diff --git a/test/unittests/wasm/module-decoder-unittest.cc b/test/unittests/wasm/module-decoder-unittest.cc |
index 39a66752d6d2f28688ae5d96589db07678c56ece..e3425cfe2422d1c0ad50a86f180a899dba9b5cc3 100644 |
--- a/test/unittests/wasm/module-decoder-unittest.cc |
+++ b/test/unittests/wasm/module-decoder-unittest.cc |
@@ -169,7 +169,6 @@ TEST_F(WasmModuleVerifyTest, OneGlobal) { |
EXPECT_OFF_END_FAILURE(data, 1, sizeof(data)); |
} |
- |
TEST_F(WasmModuleVerifyTest, ZeroGlobals) { |
static const byte data[] = { |
SECTION(GLOBALS, 1), // -- |
@@ -180,7 +179,6 @@ TEST_F(WasmModuleVerifyTest, ZeroGlobals) { |
if (result.val) delete result.val; |
} |
- |
static void AppendUint32v(std::vector<byte>& buffer, uint32_t val) { |
while (true) { |
uint32_t next = val >> 7; |
@@ -195,7 +193,6 @@ static void AppendUint32v(std::vector<byte>& buffer, uint32_t val) { |
} |
} |
- |
TEST_F(WasmModuleVerifyTest, NGlobals) { |
static const byte data[] = { |
NO_NAME, // name length |
@@ -245,7 +242,6 @@ TEST_F(WasmModuleVerifyTest, GlobalWithInvalidMemoryType) { |
EXPECT_FAILURE(data); |
} |
- |
TEST_F(WasmModuleVerifyTest, TwoGlobals) { |
static const byte data[] = { |
SECTION(GLOBALS, 7), |
@@ -285,7 +281,6 @@ TEST_F(WasmModuleVerifyTest, TwoGlobals) { |
EXPECT_OFF_END_FAILURE(data, 1, sizeof(data)); |
} |
- |
TEST_F(WasmModuleVerifyTest, OneSignature) { |
{ |
static const byte data[] = {SIGNATURES_SECTION_VOID_VOID}; |
@@ -299,7 +294,6 @@ TEST_F(WasmModuleVerifyTest, OneSignature) { |
} |
} |
- |
TEST_F(WasmModuleVerifyTest, MultipleSignatures) { |
static const byte data[] = { |
SECTION(SIGNATURES, 1 + SIZEOF_SIG_ENTRY_v_v + SIZEOF_SIG_ENTRY_x_x + |
@@ -327,7 +321,6 @@ TEST_F(WasmModuleVerifyTest, MultipleSignatures) { |
EXPECT_OFF_END_FAILURE(data, 1, sizeof(data)); |
} |
- |
TEST_F(WasmModuleVerifyTest, FunctionWithoutSig) { |
static const byte data[] = { |
SECTION(OLD_FUNCTIONS, 25), 1, |
@@ -349,7 +342,6 @@ TEST_F(WasmModuleVerifyTest, FunctionWithoutSig) { |
if (result.val) delete result.val; |
} |
- |
TEST_F(WasmModuleVerifyTest, OneEmptyVoidVoidFunction) { |
const int kCodeStartOffset = 49; |
const int kCodeEndOffset = kCodeStartOffset + 1; |
@@ -401,7 +393,6 @@ TEST_F(WasmModuleVerifyTest, OneEmptyVoidVoidFunction) { |
EXPECT_OFF_END_FAILURE(data, 16, sizeof(data)); |
} |
- |
TEST_F(WasmModuleVerifyTest, OneFunctionImported) { |
static const byte data[] = { |
// signatures |
@@ -467,7 +458,6 @@ TEST_F(WasmModuleVerifyTest, OneFunctionWithNopBody) { |
if (result.val) delete result.val; |
} |
- |
TEST_F(WasmModuleVerifyTest, OneFunctionWithNopBody_WithLocals) { |
static const byte kCodeStartOffset = 46; |
static const byte kCodeEndOffset = kCodeStartOffset + 1; |
@@ -505,7 +495,6 @@ TEST_F(WasmModuleVerifyTest, OneFunctionWithNopBody_WithLocals) { |
if (result.val) delete result.val; |
} |
- |
TEST_F(WasmModuleVerifyTest, OneGlobalOneFunctionWithNopBodyOneDataSegment) { |
static const byte kNameOffset = 49; |
static const byte kCodeStartOffset = 61; |
@@ -579,7 +568,6 @@ TEST_F(WasmModuleVerifyTest, OneGlobalOneFunctionWithNopBodyOneDataSegment) { |
} |
} |
- |
TEST_F(WasmModuleVerifyTest, OneDataSegment) { |
const byte kDataSegmentSourceOffset = 30; |
const byte data[] = { |
@@ -617,7 +605,6 @@ TEST_F(WasmModuleVerifyTest, OneDataSegment) { |
EXPECT_OFF_END_FAILURE(data, 13, sizeof(data)); |
} |
- |
TEST_F(WasmModuleVerifyTest, TwoDataSegments) { |
const byte kDataSegment0SourceOffset = 30; |
const byte kDataSegment1SourceOffset = 30 + 8; |
@@ -704,7 +691,6 @@ TEST_F(WasmModuleVerifyTest, DataSegmentWithInvalidDest) { |
} |
} |
- |
// To make below tests for indirect calls much shorter. |
#define FUNCTION(sig_index, external) kDeclFunctionImport, SIG_INDEX(sig_index) |
@@ -728,7 +714,6 @@ TEST_F(WasmModuleVerifyTest, OneIndirectFunction) { |
if (result.val) delete result.val; |
} |
- |
TEST_F(WasmModuleVerifyTest, MultipleIndirectFunctions) { |
static const byte data[] = { |
// sig#0 ------------------------------------------------------- |
@@ -766,7 +751,6 @@ TEST_F(WasmModuleVerifyTest, MultipleIndirectFunctions) { |
if (result.val) delete result.val; |
} |
- |
TEST_F(WasmModuleVerifyTest, IndirectFunctionNoFunctions) { |
static const byte data[] = { |
// sig#0 ------------------------------------------------------- |
@@ -778,7 +762,6 @@ TEST_F(WasmModuleVerifyTest, IndirectFunctionNoFunctions) { |
EXPECT_FAILURE(data); |
} |
- |
TEST_F(WasmModuleVerifyTest, IndirectFunctionInvalidIndex) { |
static const byte data[] = { |
// sig#0 ------------------------------------------------------- |
@@ -792,10 +775,8 @@ TEST_F(WasmModuleVerifyTest, IndirectFunctionInvalidIndex) { |
EXPECT_FAILURE(data); |
} |
- |
class WasmSignatureDecodeTest : public TestWithZone {}; |
- |
TEST_F(WasmSignatureDecodeTest, Ok_v_v) { |
static const byte data[] = {SIG_ENTRY_v_v}; |
base::AccountingAllocator allocator; |
@@ -808,7 +789,6 @@ TEST_F(WasmSignatureDecodeTest, Ok_v_v) { |
EXPECT_EQ(0, sig->return_count()); |
} |
- |
TEST_F(WasmSignatureDecodeTest, Ok_t_v) { |
for (size_t i = 0; i < arraysize(kLocalTypes); i++) { |
LocalTypePair ret_type = kLocalTypes[i]; |
@@ -823,7 +803,6 @@ TEST_F(WasmSignatureDecodeTest, Ok_t_v) { |
} |
} |
- |
TEST_F(WasmSignatureDecodeTest, Ok_v_t) { |
for (size_t i = 0; i < arraysize(kLocalTypes); i++) { |
LocalTypePair param_type = kLocalTypes[i]; |
@@ -838,7 +817,6 @@ TEST_F(WasmSignatureDecodeTest, Ok_v_t) { |
} |
} |
- |
TEST_F(WasmSignatureDecodeTest, Ok_t_t) { |
for (size_t i = 0; i < arraysize(kLocalTypes); i++) { |
LocalTypePair ret_type = kLocalTypes[i]; |
@@ -857,7 +835,6 @@ TEST_F(WasmSignatureDecodeTest, Ok_t_t) { |
} |
} |
- |
TEST_F(WasmSignatureDecodeTest, Ok_i_tt) { |
for (size_t i = 0; i < arraysize(kLocalTypes); i++) { |
LocalTypePair p0_type = kLocalTypes[i]; |
@@ -877,7 +854,6 @@ TEST_F(WasmSignatureDecodeTest, Ok_i_tt) { |
} |
} |
- |
TEST_F(WasmSignatureDecodeTest, Fail_off_end) { |
byte data[256]; |
for (int p = 0; p <= 255; p = p + 1 + p * 3) { |
@@ -892,7 +868,6 @@ TEST_F(WasmSignatureDecodeTest, Fail_off_end) { |
} |
} |
- |
TEST_F(WasmSignatureDecodeTest, Fail_invalid_type) { |
byte kInvalidType = 76; |
for (size_t i = 0; i < SIZEOF_SIG_ENTRY_x_xx; i++) { |