Index: src/trusted/validator_x86/testdata/32/mem_overflow.tf |
diff --git a/src/trusted/validator_x86/testdata/32/mem_overflow.tf b/src/trusted/validator_x86/testdata/32/mem_overflow.tf |
new file mode 100644 |
index 0000000000000000000000000000000000000000..ca6591cf676877b616b11aa386e5358950bcc6c4 |
--- /dev/null |
+++ b/src/trusted/validator_x86/testdata/32/mem_overflow.tf |
@@ -0,0 +1,33 @@ |
+BITS: 32 |
+OUTCOME: invalid |
+ |
+# To make test bundle-sized. |
+asm: nop; nop; nop; nop |
+hex: 90 90 90 90 |
+nc_out: 22 > 20 (read overflow of 2 bytes) |
+nc_out: ErrorSegmentation |
+ |
+asm: nop; nop; nop; nop |
+hex: 90 90 90 90 |
+ |
+asm: nop; nop; nop; nop |
+hex: 90 90 90 90 |
+ |
+asm: nop; nop; nop; nop |
+hex: 90 90 90 90 |
+ |
+asm: nop; nop; nop; nop |
+hex: 90 90 90 90 |
+ |
+asm: nop; nop; nop; nop |
+hex: 90 90 90 90 |
+ |
+asm: nop; nop; nop; nop |
+hex: 90 90 90 90 |
+ |
+ |
+# Test if we fill in (zero) for memory overflow of instruction: |
+# 00000000: 03 1d 20 00 00 00 add %ebx, 0x20 |
+asm: .byte 0x3; .byte 0x1d; and %al,(%eax) |
+hex: 03 1d 20 00 |
+ |