diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 19:33:14 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 19:33:14 +0000 |
commit | 36d22d82aa202bb199967e9512281e9a53db42c9 (patch) | |
tree | 105e8c98ddea1c1e4784a60a5a6410fa416be2de /js/src/tests/non262/extensions/clone-errors.js | |
parent | Initial commit. (diff) | |
download | firefox-esr-36d22d82aa202bb199967e9512281e9a53db42c9.tar.xz firefox-esr-36d22d82aa202bb199967e9512281e9a53db42c9.zip |
Adding upstream version 115.7.0esr.upstream/115.7.0esr
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'js/src/tests/non262/extensions/clone-errors.js')
-rw-r--r-- | js/src/tests/non262/extensions/clone-errors.js | 110 |
1 files changed, 110 insertions, 0 deletions
diff --git a/js/src/tests/non262/extensions/clone-errors.js b/js/src/tests/non262/extensions/clone-errors.js new file mode 100644 index 0000000000..38e0e78a6f --- /dev/null +++ b/js/src/tests/non262/extensions/clone-errors.js @@ -0,0 +1,110 @@ +// |reftest| skip-if(!xulRuntime.shell) +// -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 4 -*- +// Any copyright is dedicated to the Public Domain. +// http://creativecommons.org/licenses/publicdomain/ + +function check(v) { + try { + serialize(v); + } catch (exc) { + return; + } + throw new Error("serializing " + JSON.stringify(v) + " should have failed with an exception"); +} + +// Unsupported object types. +check(this); +check(Math); +check(function () {}); +check(new Proxy({}, {})); + +// A failing getter. +check({get x() { throw new Error("fail"); }}); + +// Mismatched scopes. +for (let [write_scope, read_scope] of [['SameProcess', 'DifferentProcessForIndexedDB'], + ['SameProcess', 'DifferentProcess']]) +{ + var ab = new ArrayBuffer(12); + var buffer = serialize(ab, [ab], { scope: write_scope }); + var caught = false; + try { + deserialize(buffer, { scope: read_scope }); + } catch (exc) { + caught = true; + } + assertEq(caught, true, `${write_scope} clone buffer should not be deserializable as ${read_scope}`); +} + +// Extra data. This is not checked in #define FUZZING builds. +const fuzzing = getBuildConfiguration()['fuzzing-defined']; +const shouldThrow = fuzzing === false; + +var clone = serialize({foo: 7}, undefined, {scope: 'DifferentProcess'}); +deserialize(clone); +clone.clonebuffer = clone.clonebuffer + "\0\0\0\0\0\0\0\0"; +var exc = {message: 'no error'}; +try { + deserialize(clone); +} catch (e) { + exc = e; +} +if (shouldThrow) { + assertEq(exc.message.includes("bad serialized structured data"), true); + assertEq(exc.message.includes("extra data"), true); +} + +// Extra data between the main body and "tail" of the clone data. +function dumpData(data) { + data.forEach((x, i) => print(`[${i}] 0x${(i*8).toString(16)} : 0x${x.toString(16)}`)); +} + +function testInnerExtraData() { + const ab = new ArrayBuffer(8); + (new BigUint64Array(ab))[0] = 0xdeadbeefn; + const clone = serialize({ABC: 7, CBA: ab}, [ab], {scope: 'DifferentProcess'}); + + const data = [...new BigUint64Array(clone.arraybuffer)]; + dumpData(data); + + const fake = new ArrayBuffer(clone.arraybuffer.byteLength + 24); + const view = new BigUint64Array(fake); + view.set(new BigUint64Array(clone.arraybuffer), 0); + view[1] = view[1] & ~1n; // SCTAG_TRANSFER_MAP_HEADER with SCTAG_TM_UNREAD + view[5] += 24n; // Make space for another ArrayBuffer clone at the end + view[9] = 0xffff00030000000dn; // Change the constant 7 to 13 + view[16] = 0xfeeddeadbeef2dadn; // Change stored ArrayBuffer contents + view[17] = view[14]; // SCTAG_ARRAY_BUFFER_OBJECT_V2 + view[18] = view[15]; // 8 bytes long + view[19] = 0x1cedc0ffeen; // Content + + dumpData(view); + clone.arraybuffer = fake; + + let d; + let exc; + try { + d = deserialize(clone); + print(JSON.stringify(d)); + print(new BigUint64Array(d.CBA)[0].toString(16)); + } catch (e) { + exc = e; + } + + const fuzzing = getBuildConfiguration()['fuzzing-defined']; + const shouldThrow = fuzzing === false; + + if (shouldThrow) { + assertEq(Boolean(exc), true); + assertEq(exc.message.includes("extra data"), true); + print(`PASS with FUZZING: Found expected exception "${exc.message}"`); + } else { + assertEq(new BigUint64Array(d.CBA)[0].toString(16), "1cedc0ffee"); + assertEq(d.ABC, 13); + print("PASS without FUZZING"); + } +} + +testInnerExtraData(); + +reportCompare(0, 0, "ok"); |