about summary refs log tree commit diff stats
path: root/subx/023check_operand_bounds.cc
diff options
context:
space:
mode:
authorKartik Agaram <vc@akkartik.com>2018-07-27 12:33:08 -0700
committerKartik Agaram <vc@akkartik.com>2018-07-27 12:35:49 -0700
commit4718a77ce26c02bac7cfe28637c2892091ac0075 (patch)
treeea3af5905138b2cdf09c55f64ba557fd434b54e2 /subx/023check_operand_bounds.cc
parent7a79dafad1f458030a9e53ad2e3f84861dac7f06 (diff)
downloadmu-4718a77ce26c02bac7cfe28637c2892091ac0075.tar.gz
4444
More tracing reorg.
Diffstat (limited to 'subx/023check_operand_bounds.cc')
-rw-r--r--subx/023check_operand_bounds.cc66
1 files changed, 66 insertions, 0 deletions
diff --git a/subx/023check_operand_bounds.cc b/subx/023check_operand_bounds.cc
new file mode 100644
index 00000000..c868603a
--- /dev/null
+++ b/subx/023check_operand_bounds.cc
@@ -0,0 +1,66 @@
+//:: Check that the different operands of an instruction aren't too large for their bitfields.
+
+:(scenario check_bitfield_sizes)
+% Hide_errors = true;
+== 0x1
+01/add 4/mod
++error: '4/mod' too large to fit in bitfield mod
+
+:(before "End Globals")
+map<string, uint32_t> Operand_bound;
+:(before "End One-time Setup")
+put(Operand_bound, "subop", 1<<3);
+put(Operand_bound, "mod", 1<<2);
+put(Operand_bound, "rm32", 1<<3);
+put(Operand_bound, "base", 1<<3);
+put(Operand_bound, "index", 1<<3);
+put(Operand_bound, "scale", 1<<2);
+put(Operand_bound, "r32", 1<<3);
+put(Operand_bound, "disp8", 1<<8);
+put(Operand_bound, "disp16", 1<<16);
+// no bound needed for disp32
+put(Operand_bound, "imm8", 1<<8);
+// no bound needed for imm32
+
+:(before "End One-time Setup")
+Transform.push_back(check_operand_bounds);
+:(code)
+void check_operand_bounds(/*const*/ program& p) {
+  trace(99, "transform") << "-- check operand bounds" << end();
+  if (p.segments.empty()) return;
+  const segment& code = p.segments.at(0);
+  for (int i = 0;  i < SIZE(code.lines);  ++i) {
+    const line& inst = code.lines.at(i);
+    for (int j = first_operand(inst);  j < SIZE(inst.words);  ++j)
+      check_operand_bounds(inst.words.at(j));
+    if (trace_contains_errors()) return;  // stop at the first mal-formed instruction
+  }
+}
+
+void check_operand_bounds(const word& w) {
+  for (map<string, uint32_t>::iterator p = Operand_bound.begin();  p != Operand_bound.end();  ++p) {
+    if (has_metadata(w, p->first)) {
+      int32_t x = parse_int(w.data);
+      if (x >= 0) {
+        if (static_cast<uint32_t>(x) >= p->second)
+          raise << "'" << w.original << "' too large to fit in bitfield " << p->first << '\n' << end();
+      }
+      else {
+        // hacky? assuming bound is a power of 2
+        if (x < -1*static_cast<int32_t>(p->second/2))
+          raise << "'" << w.original << "' too large to fit in bitfield " << p->first << '\n' << end();
+      }
+    }
+  }
+}
+
+int32_t parse_int(const string& s) {
+  istringstream in(s);
+  int32_t result = 0;
+  in >> std::hex >> result;
+  if (!in || !in.eof()) {
+    raise << "not a number: " << s << '\n' << end();
+    return 0;
+  }
+  return result;
+}