From patchwork Tue Nov 10 23:09:39 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Heinrich Schuchardt X-Patchwork-Id: 1397840 X-Patchwork-Delegate: sjg@chromium.org Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de (client-ip=85.214.62.61; helo=phobos.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=gmx.de Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; secure) header.d=gmx.net header.i=@gmx.net header.a=rsa-sha256 header.s=badeba3b8450 header.b=HdWZLVC8; dkim-atps=neutral Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4CW3Vx2sYJz9sRR for ; Wed, 11 Nov 2020 10:10:33 +1100 (AEDT) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 1A544824FD; Wed, 11 Nov 2020 00:10:04 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=gmx.de Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (1024-bit key; secure) header.d=gmx.net header.i=@gmx.net header.b="HdWZLVC8"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 60FFC822D2; Wed, 11 Nov 2020 00:09:58 +0100 (CET) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,FREEMAIL_FROM,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.2 Received: from mout.gmx.net (mout.gmx.net [212.227.17.21]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 660BF822C7 for ; Wed, 11 Nov 2020 00:09:52 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=gmx.de Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=xypron.glpk@gmx.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1605049790; bh=XmjAgdcGcURKOH0oSwimaYiNgcqD1vDO9p8gOykyDas=; h=X-UI-Sender-Class:From:To:Cc:Subject:Date:In-Reply-To:References; b=HdWZLVC8KpNLSHDCPiUm69I9iaOicvoIa/lE1/UUBjAWxvVnwLXwYLxFsiSSTNhne aT45YChvdW/hi9ZV6JftF6DSbMgzygBnqNCiHb6VYOjbr+92CrGyGxJUGTVN/Hfe1w ZCmdNm/cq70i6xjPy3DMgW79nxuA+o8pbPB0iu+s= X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from mcbin.fritz.box ([178.202.41.135]) by mail.gmx.com (mrgmx105 [212.227.17.174]) with ESMTPSA (Nemesis) id 1MGQj7-1kWqvb2UFp-00Gnzv; Wed, 11 Nov 2020 00:09:50 +0100 From: Heinrich Schuchardt To: Simon Glass Cc: Alexander Graf , u-boot@lists.denx.de, Heinrich Schuchardt Subject: [PATCH 2/3] cmd: sandbox: implement exception command Date: Wed, 11 Nov 2020 00:09:39 +0100 Message-Id: <20201110230940.6522-3-xypron.glpk@gmx.de> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20201110230940.6522-1-xypron.glpk@gmx.de> References: <20201110230940.6522-1-xypron.glpk@gmx.de> MIME-Version: 1.0 X-Provags-ID: V03:K1:ZjYP09yEVu2XkGtMlk5msHf5PXM7ABAA/bPBCmzKV3+Nw82X2QZ UMBNxKqIDiyUkzl6p1NZVJym8YXUWtIxjoi5m40ZToD0OtSdyzGzgizKf5KVFR/g8QUyjFN VAsYB0qRs9FVwZ+0XakV85tA2lVfV8La0BH7LdQBJPFTWqVdyErXZHD1SITJAWX0NSn3CZl VR2cUSc0nkxZF+ac4eRbQ== X-UI-Out-Filterresults: notjunk:1;V03:K0:LNm2Tdrjw3Q=:mwOLtjmCue/KqAWz19RLES hP2ozuwoPJxXVjKijuydFuxRDZbEPYLQdi7Sc1SP6NFo2MxHKM7YIhDqmiBk3SN4hwhDwhMgA tzVBL6ijfep885CmFX3523x1D6Si5BT5oTQ8SkDzeM49Ihl7GDcKdnw2reMH2jcPWuweI+rDd m88UZSGrU4WG84Z2PTn1uyBT16sM3Ix2efgrIBRh0JczBLxkAYx/T3r8oClk+VF8VvyYt0EGy /ccT42oJk0U2wHv02NobWlDYu8wYBnwX2Rc3c3xg6wNiOIG38QC33prnb5s7y2HCUxrKBgFCC I0CHOqc8VMBXL3TEBUMUXl3/sp5zWCtsnOtk4DwrVdtRQ/E3hlAKn+DuwgW9UiT3yTVVX+f0B d2gy/YkA+Mxh/n9oHDyr4vGX4+7lW6+oy59MVcCxeFHPvgZIGtSJkzoySh+iaTN4lXVisn2MO 3rLU68s3EqS+20F/T4gL1SVsQVmZkChVg4roeqbdgb0aI+BkPBJVnbIYswAdlmsO32qQyfxdE 0PcZvE51KdkaO4tZds7bb8Pil5GQ6Xc27wSyx5uTWlviDXsqe4KxjUTrkVyIzA/q5VqMg7UKP iYNgMgCWFBl4JyxnVmOwyBgeomDj70k5fKIz4+zeIKupdsuT5adCpSkA3hPDeA4b5qpAEx+dW Kpstzin0oVvaqeWaQNZZ1VHlrHLweVJ263hR7VUV1mrlTRdz2ckM8WblEp6UOmaH0g5Ihc7Ga Imi1kMOgjsCx5AtU5b3HMVg3ukCbSUmbwqbPvb3jZD1zBu6iuFJw+Cs/0NY+C5wpHNZTFvn/6 /XWpbiGA+Txuxfp4xXisSELoDza0wh3Pmbe07H0JO+q1JURv3iDgD3pGpMlZ7eZaSaMPzMATh OUjr5EgUhlb1OrajGEKA== X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.34 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.102.3 at phobos.denx.de X-Virus-Status: Clean Implement the commands * exception undefined - execute an illegal instruction * exception sigsegv - cause a segment violation Here is a possible output: => exception undefined Illegal instruction pc = 0x55eb8d0a7575, pc_reloc = 0x57575 Resetting ... Signed-off-by: Heinrich Schuchardt Reviewed-by: Simon Glass --- cmd/Kconfig | 2 +- cmd/Makefile | 1 + cmd/sandbox/Makefile | 3 +++ cmd/sandbox/exception.c | 41 +++++++++++++++++++++++++++++++++++++++++ 4 files changed, 46 insertions(+), 1 deletion(-) create mode 100644 cmd/sandbox/Makefile create mode 100644 cmd/sandbox/exception.c -- 2.28.0 diff --git a/cmd/Kconfig b/cmd/Kconfig index 1595de999b..f9b72449c5 100644 --- a/cmd/Kconfig +++ b/cmd/Kconfig @@ -1682,7 +1682,7 @@ config CMD_EFIDEBUG config CMD_EXCEPTION bool "exception - raise exception" - depends on ARM || RISCV || X86 + depends on ARM || RISCV || SANDBOX || X86 help Enable the 'exception' command which allows to raise an exception. diff --git a/cmd/Makefile b/cmd/Makefile index dd86675bf2..5b3400a840 100644 --- a/cmd/Makefile +++ b/cmd/Makefile @@ -193,6 +193,7 @@ obj-$(CONFIG_CMD_AVB) += avb.o obj-$(CONFIG_ARM) += arm/ obj-$(CONFIG_RISCV) += riscv/ +obj-$(CONFIG_SANDBOX) += sandbox/ obj-$(CONFIG_X86) += x86/ obj-$(CONFIG_ARCH_MVEBU) += mvebu/ diff --git a/cmd/sandbox/Makefile b/cmd/sandbox/Makefile new file mode 100644 index 0000000000..24df023ece --- /dev/null +++ b/cmd/sandbox/Makefile @@ -0,0 +1,3 @@ +# SPDX-License-Identifier: GPL-2.0+ + +obj-$(CONFIG_CMD_EXCEPTION) += exception.o diff --git a/cmd/sandbox/exception.c b/cmd/sandbox/exception.c new file mode 100644 index 0000000000..1aa1d673ae --- /dev/null +++ b/cmd/sandbox/exception.c @@ -0,0 +1,41 @@ +// SPDX-License-Identifier: GPL-2.0+ +/* + * The 'exception' command can be used for testing exception handling. + * + * Copyright (c) 2020, Heinrich Schuchardt + */ + +#include +#include + +static int do_sigsegv(struct cmd_tbl *cmdtp, int flag, int argc, + char *const argv[]) +{ + u8 *ptr = NULL; + + *ptr = 0; + return CMD_RET_FAILURE; +} + +static int do_undefined(struct cmd_tbl *cmdtp, int flag, int argc, + char *const argv[]) +{ + asm volatile (".word 0xffff\n"); + return CMD_RET_FAILURE; +} + +static struct cmd_tbl cmd_sub[] = { + U_BOOT_CMD_MKENT(sigsegv, CONFIG_SYS_MAXARGS, 1, do_sigsegv, + "", ""), + U_BOOT_CMD_MKENT(undefined, CONFIG_SYS_MAXARGS, 1, do_undefined, + "", ""), +}; + +static char exception_help_text[] = + "\n" + " The following exceptions are available:\n" + " undefined - undefined instruction\n" + " sigsegv - illegal memory access\n" + ; + +#include