aboutsummaryrefslogtreecommitdiff
path: root/test/real_mode
diff options
context:
space:
mode:
authoriximeow <me@iximeow.net>2023-12-16 14:12:17 -0800
committeriximeow <me@iximeow.net>2023-12-16 14:44:07 -0800
commit4d2e196e616162726c6211abc46c043078425322 (patch)
tree5188c8b4bd59ce46872cb34422e4681ab461e65e /test/real_mode
parentfafbd6d37329e4b9fd862ed86767a943086334be (diff)
abnormal memory sizes for keylocker instructions are not bugs
new `does_not_decode_invalid_registers` fuzzer found other bugs! the 384-bit accesses for 128b keylocker instructions are an otherwise-unknown size and had a memory size of `BUG`. they are not bugs. give the memory size a real name.
Diffstat (limited to 'test/real_mode')
-rw-r--r--test/real_mode/mod.rs1
1 files changed, 1 insertions, 0 deletions
diff --git a/test/real_mode/mod.rs b/test/real_mode/mod.rs
index 7987e4a..1b1a378 100644
--- a/test/real_mode/mod.rs
+++ b/test/real_mode/mod.rs
@@ -17879,6 +17879,7 @@ fn test_real_mode() {
test_display(&[0xf3, 0x0f, 0x2c, 0xc1], "cvttss2si eax, xmm1");
test_display(&[0xf3, 0x0f, 0x2d, 0x01], "cvtss2si eax, dword [bx + di * 1]");
test_display(&[0xf3, 0x0f, 0x2d, 0xc1], "cvtss2si eax, xmm1");
+ test_display(&[0xf3, 0x0f, 0x38, 0xdd, 0x03], "aesdec128kl xmm0, m384b [bp + di * 1]");
test_display(&[0xf3, 0x0f, 0x38, 0xf6, 0x01], "adox eax, dword [bx + di * 1]");
test_display(&[0xf3, 0x0f, 0x38, 0xf6, 0xc1], "adox eax, ecx");
test_display(&[0xf3, 0x0f, 0x51, 0x01], "sqrtss xmm0, dword [bx + di * 1]");