| Index: src/trusted/validator_x86/testdata/32/mem_overflow.tf
|
| diff --git a/src/trusted/validator_x86/testdata/32/mem_overflow.tf b/src/trusted/validator_x86/testdata/32/mem_overflow.tf
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..ca6591cf676877b616b11aa386e5358950bcc6c4
|
| --- /dev/null
|
| +++ b/src/trusted/validator_x86/testdata/32/mem_overflow.tf
|
| @@ -0,0 +1,33 @@
|
| +BITS: 32
|
| +OUTCOME: invalid
|
| +
|
| +# To make test bundle-sized.
|
| +asm: nop; nop; nop; nop
|
| +hex: 90 90 90 90
|
| +nc_out: 22 > 20 (read overflow of 2 bytes)
|
| +nc_out: ErrorSegmentation
|
| +
|
| +asm: nop; nop; nop; nop
|
| +hex: 90 90 90 90
|
| +
|
| +asm: nop; nop; nop; nop
|
| +hex: 90 90 90 90
|
| +
|
| +asm: nop; nop; nop; nop
|
| +hex: 90 90 90 90
|
| +
|
| +asm: nop; nop; nop; nop
|
| +hex: 90 90 90 90
|
| +
|
| +asm: nop; nop; nop; nop
|
| +hex: 90 90 90 90
|
| +
|
| +asm: nop; nop; nop; nop
|
| +hex: 90 90 90 90
|
| +
|
| +
|
| +# Test if we fill in (zero) for memory overflow of instruction:
|
| +# 00000000: 03 1d 20 00 00 00 add %ebx, 0x20
|
| +asm: .byte 0x3; .byte 0x1d; and %al,(%eax)
|
| +hex: 03 1d 20 00
|
| +
|
|
|