Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(6)

Side by Side Diff: src/trusted/validator_x86/testdata/32/mem_overflow.tf

Issue 10908137: (abandoned) Validator tests: convert hexes to TFs and run on bots (for prod. validator only) (Closed) Base URL: svn://svn.chromium.org/native_client/trunk/src/native_client
Patch Set: restore 'read overflow' and 'SegmentationError' Created 8 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
(Empty)
1 BITS: 32
2 OUTCOME: invalid
3
4 # To make test bundle-sized.
5 asm: nop; nop; nop; nop
6 hex: 90 90 90 90
7 nc_out: 22 > 20 (read overflow of 2 bytes)
8 nc_out: ErrorSegmentation
9
10 asm: nop; nop; nop; nop
11 hex: 90 90 90 90
12
13 asm: nop; nop; nop; nop
14 hex: 90 90 90 90
15
16 asm: nop; nop; nop; nop
17 hex: 90 90 90 90
18
19 asm: nop; nop; nop; nop
20 hex: 90 90 90 90
21
22 asm: nop; nop; nop; nop
23 hex: 90 90 90 90
24
25 asm: nop; nop; nop; nop
26 hex: 90 90 90 90
27
28
29 # Test if we fill in (zero) for memory overflow of instruction:
30 # 00000000: 03 1d 20 00 00 00 add %ebx, 0x20
31 asm: .byte 0x3; .byte 0x1d; and %al,(%eax)
32 hex: 03 1d 20 00
33
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698