Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(8)

Side by Side Diff: src/trusted/validator_x86/testdata/32/test-5.tf

Issue 10908137: (abandoned) Validator tests: convert hexes to TFs and run on bots (for prod. validator only) (Closed) Base URL: svn://svn.chromium.org/native_client/trunk/src/native_client
Patch Set: restore 'read overflow' and 'SegmentationError' Created 8 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
(Empty)
1 BITS: 32
2 OUTCOME: invalid
3
4 # test 5: a big chunk of code whose origin is not clear.
5 asm: lea 0x4(%esp),%ecx
6 hex: 8d 4c 24 04
7
8 asm: and $0xfffffff0,%esp
9 hex: 83 e4 f0
10
11 asm: pushl -0x4(%ecx)
12 hex: ff 71 fc
13
14 asm: push %ebp
15 hex: 55
16
17 asm: mov %esp,%ebp
18 hex: 89 e5
19
20 asm: push %ecx
21 hex: 51
22
23 asm: xchg %ax,%ax
24 hex: 66 90
25
26 asm: sub $0x24,%esp
27 hex: 83 ec 24
28
29 asm: mov %ecx,-0x18(%ebp)
30 hex: 89 4d e8
31
32 asm: movl $0xa,-0xc(%ebp)
33 hex: c7 45 f4 0a 00 00 00
34
35 asm: mov -0x18(%ebp),%eax
36 hex: 8b 45 e8
37
38 asm: cmpl $0x1,(%eax)
39 hex: 83 38 01
40
41 asm: jg .+45
42 hex: 7f 2b
43
44 asm: mov -0x18(%ebp),%edx
45 hex: 8b 55 e8
46
47 asm: mov 0x4(%edx),%eax
48 hex: 8b 42 04
49
50 asm: mov (%eax),%eax
51 hex: 8b 00
52
53 hex: 8d 76 00
54
55 asm: mov %eax,0x4(%esp)
56 hex: 89 44 24 04
57
58 asm: movl $0x8001454,(%esp)
59 hex: c7 04 24 54 14 00 08
60
61 asm: call .+709
62 hex: e8 c0 02 00 00
63
64 asm: movl $0x1,(%esp)
65 hex: c7 04 24 01 00 00 00
66
67 hex: 8d 74 26 00
68
69 asm: call .+453
70 hex: e8 c0 01 00 00
71 nc_out: JUMP TARGET out of range
72
73 asm: mov -0x18(%ebp),%edx
74 hex: 8b 55 e8
75
76 asm: mov 0x4(%edx),%eax
77 hex: 8b 42 04
78
79 asm: add $0x4,%eax
80 hex: 83 c0 04
81
82 asm: mov (%eax),%eax
83 hex: 8b 00
84
85 asm: mov %eax,(%esp)
86 hex: 89 04 24
87
88 asm: xchg %ax,%ax
89 hex: 66 90
90
91 hex: 8d 74 26 00
92
93 hex: 8d bc 27 00 00 00 00
94
95 asm: call .+2453
96 hex: e8 90 09 00 00
97
98 asm: mov %eax,-0x8(%ebp)
99 hex: 89 45 f8
100
101 asm: mov -0x18(%ebp),%eax
102 hex: 8b 45 e8
103
104 asm: cmpl $0x2,(%eax)
105 hex: 83 38 02
106
107 asm: jle .+39
108 hex: 7e 25
109
110 asm: mov -0x18(%ebp),%edx
111 hex: 8b 55 e8
112
113 asm: xchg %ax,%ax
114 hex: 66 90
115
116 asm: mov 0x4(%edx),%eax
117 hex: 8b 42 04
118
119 asm: add $0x8,%eax
120 hex: 83 c0 08
121
122 asm: mov (%eax),%eax
123 hex: 8b 00
124
125 asm: mov %eax,(%esp)
126 hex: 89 04 24
127
128 asm: call .+2421
129 hex: e8 70 09 00 00
130
131 asm: mov %eax,-0xc(%ebp)
132 hex: 89 45 f4
133
134 hex: 8d b6 00 00 00 00
135
136 hex: 8d bc 27 00 00 00 00
137
138 asm: mov -0xc(%ebp),%eax
139 hex: 8b 45 f4
140
141 asm: mov %eax,0x8002f28
142 hex: a3 28 2f 00 08
143
144 asm: jmp .+40
145 hex: eb 26
146
147 hex: 8d b6 00 00 00 00
148
149 asm: movl $0x3,0x8(%esp);
150 hex: c7 44 24 08 03 00 00 00
151
152 asm: movl $0x1,0x4(%esp);
153 hex: c7 44 24 04 01 00 00 00
154
155 asm: mov -0xc(%ebp),%eax
156 hex: 8b 45 f4
157
158 asm: mov %eax,(%esp)
159 hex: 89 04 24
160
161 asm: nop
162 hex: 90
163
164 hex: 8d 74 26 00
165
166 asm: call .+37
167 hex: e8 20 00 00 00
168
169 asm: cmpl $0x0,-0x8(%ebp)
170 hex: 83 7d f8 00
171
172 asm: setg %al
173 hex: 0f 9f c0
174
175 asm: subl $0x1,-0x8(%ebp)
176 hex: 83 6d f8 01
177
178 asm: test %al,%al
179 hex: 84 c0
180
181 hex: 8d 76 00
182
183 asm: jne .-48
184 hex: 75 ce
185
186 asm: movl $0x0,(%esp)
187 hex: c7 04 24 00 00 00 00
188
189 asm: xchg %ax,%ax
190 hex: 66 90
191
192 asm: call .+293
193 hex: e8 20 01 00 00
194 nc_out: JUMP TARGET out of range
195
196 asm: push %ebp
197 hex: 55
198
199 asm: mov %esp,%ebp
200 hex: 89 e5
201
202 asm: sub $0x1c,%esp
203 hex: 83 ec 1c
204
205 asm: cmpl $0x1,0x8(%ebp)
206 hex: 83 7d 08 01
207
208 asm: jne .+70
209 hex: 75 44
210
211 asm: mov 0xc(%ebp),%edx
212 hex: 8b 55 0c
213
214 asm: nop
215 hex: 90
216
217 asm: mov 0x8002f24(,%edx,4),%eax
218 hex: 8b 04 95 24 2f 00 08
219
220 asm: sub $0x1,%eax
221 hex: 83 e8 01
222
223 hex: 8d b6 00 00 00 00
224
225 asm: mov %eax,0x8002f24(,%edx,4)
226 hex: 89 04 95 24 2f 00 08
227
228 asm: mov 0x10(%ebp),%edx
229 hex: 8b 55 10
230
231 hex: 8d b6 00 00 00 00
232
233 asm: mov 0x8002f24(,%edx,4),%eax
234 hex: 8b 04 95 24 2f 00 08
235
236 asm: add $0x1,%eax
237 hex: 83 c0 01
238
239 hex: 8d b6 00 00 00 00
240
241 asm: mov %eax,0x8002f24(,%edx,4)
242 hex: 89 04 95 24 2f 00 08
243
244 hex: 00 00
245
246 hex: 8d b4 26 00 00 00 00
247
248 asm: mov 0x10(%ebp),%eax
249 hex: 8b 45 10
250
251 asm: mov 0xc(%ebp),%edx
252 hex: 8b 55 0c
253
254 asm: add %eax,%edx
255 hex: 01 c2
256
257 asm: mov $0x6,%eax
258 hex: b8 06 00 00 00
259
260 asm: sub %edx,%eax
261 hex: 29 d0
262
263 asm: hlt
264 hex: f4
265
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698