From patchwork Wed Nov 11 23:29:58 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Heinrich Schuchardt X-Patchwork-Id: 1398600 X-Patchwork-Delegate: sjg@chromium.org Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=gmx.de Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; secure) header.d=gmx.net header.i=@gmx.net header.a=rsa-sha256 header.s=badeba3b8450 header.b=WK0ofLvx; dkim-atps=neutral Received: from phobos.denx.de (phobos.denx.de [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4CWgwF059kz9sPB for ; Thu, 12 Nov 2020 10:31:08 +1100 (AEDT) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 315D182540; Thu, 12 Nov 2020 00:30:44 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=gmx.de Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (1024-bit key; secure) header.d=gmx.net header.i=@gmx.net header.b="WK0ofLvx"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id E675882540; Thu, 12 Nov 2020 00:30:29 +0100 (CET) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,FREEMAIL_FROM,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.2 Received: from mout.gmx.net (mout.gmx.net [212.227.15.19]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 1CBD08250A for ; Thu, 12 Nov 2020 00:30:20 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=gmx.de Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=xypron.glpk@gmx.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1605137418; bh=5Ba4iJnF4cszM6AHmDCR7xuP1rE3Bbfa0Dkm+i1asec=; h=X-UI-Sender-Class:From:To:Cc:Subject:Date:In-Reply-To:References; b=WK0ofLvxrD3At8eOBLbnhTAyTWXf/Gh9QS+e2iY04pHFvDwvZFU6y11cA2nHoaksm 2K7kLqnVSItRYCmstU4WnkSWbtlbSg7o23e9SwlW7x9S4X0SiJYwyN4tL2QKeYeOYt 626ylVrJRDb86crtuIYzh3KWIq8WCCugBlLy6uAk= X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from LT02.fritz.box ([178.202.41.135]) by mail.gmx.com (mrgmx004 [212.227.17.184]) with ESMTPSA (Nemesis) id 1N17UW-1kAzQp4BBq-012V9F; Thu, 12 Nov 2020 00:30:18 +0100 From: Heinrich Schuchardt To: Simon Glass Cc: u-boot@lists.denx.de, Alexander Graf , Heinrich Schuchardt Subject: [PATCH v2 3/4] efi_selftest: implement exception test for sandbox Date: Thu, 12 Nov 2020 00:29:58 +0100 Message-Id: <20201111232959.11241-4-xypron.glpk@gmx.de> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20201111232959.11241-1-xypron.glpk@gmx.de> References: <20201111232959.11241-1-xypron.glpk@gmx.de> MIME-Version: 1.0 X-Provags-ID: V03:K1:zssFtLt0HI4CswZN9WqPd3ty8w+XwkALSyoXD+AFRFHtISkw+FU EQ2cl97KvYsKQMCcr6MiRKRZ4pbsr+Ke/1ldK82qwXtdUPNxgCwM2iUINmXilYfvS+/maxp RZyVmBsSDBYRPXLDG9hNds9oVpvmMwQ+LvLyPHdh18cEnmJ346nbL40/0Xk5Hjyrd8STd78 NHZ0OM0/d8df+NlREUUfg== X-UI-Out-Filterresults: notjunk:1;V03:K0:4HRgmULJBgA=:tkEXHnDEVRHnc8+fskVaM5 gr6brTwhixjDwFDmRc+DXb4yFPuqF27i/DfOzpS2Wz2758K2San6KazWtOdPCzHplZ1JjxW4y u36mZBjDnnDa6bYf4JFSxlCd13ErYpKvwI/vxnjBuXOQSDq7H5r4fOtBIgHvoyW5Qrb0L+JFc tyOxYM4OI+kxO5RM+DlYoVhG9mcG+DtRCo/HjpXwjv3UMVU7ANkKtbbQV9q+vOdq1ewvQTGlI WBomS/HqoHKeODDAXfHQVFL8rXGlsUGtRShjF5GgoM+OBL4KmosFdk69gV7AFc5RMprISBaw+ 2/7hTgyArCy13MNvUNhjoGwWGpe9Uj7B5EWsCpW1euPG2rZ7nyRzLWyOfIFSXxjM9gyXH19SB IcKU/ayLZd+Hz0EU0X7jANZwbOiQQM2QJ8yyFIdUIMc1ffOSxorCLpVMH9uONhioEZFAraeNn CmasEyWaTG002rtiFLnDYNv8HruAscmrNSN1WF5VmPN8e3TN2VjmjBZvj+kCv7Mrb2bMF8ulq oSk5uaFnAbItm/sBYWyZtfdWv0JHKcOXrKBw3qmtcIN2mrkXImZ2kL+N57DGrleX7nVSqTJeZ p5kkj90M0iZfc1VeSVkkien2XZGNfMS5kIacwl8gNW8eDZLRtFs2ij0+7Q+HXTtzNlA3wQRC7 IQhNeu7/b17CZRZopPTNHP5Q/YVw6ckjBsiWmfLclCy8olRvlVlgyMz0LUMZ+acWCik53MABu O/c0JQl9dYMxxIP9yVSF6x+GfQS42FkCNzAOF39jLJkXEKBnn/7+CRBt20iBgDB9oc3/ENTOU 3C8Vdb15MNj8/eoEggJ3bIbfr3qMsUKHiceOxMOaLtUP8uadsZSjFxyEVrYKU6l2GPaFpyRFr pt2jdkkJh2/vBiekm5Lw== X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.34 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.102.3 at phobos.denx.de X-Virus-Status: Clean Provide a unit test that causes an illegal instruction to occur. The test can be run with the following commands: => setenv efi_selftest exception => bootefi selftest This might be the output: Executing 'exception' EFI application triggers exception. Illegal instruction pc = 0x1444d016, pc_reloc = 0xffffaa078e8dd016 UEFI image [0x0000000000000000:0xffffffffffffffff] '/\selftest' UEFI image [0x000000001444b000:0x0000000014451fff] pc=0x2016 '/bug.efi' Resetting ... It would tell us that the exception was triggered by an instruction 0x2016 bytes after the load address of the binary with filename /bug.efi. Signed-off-by: Heinrich Schuchardt Reviewed-by: Simon Glass --- v2: no change --- lib/efi_selftest/efi_selftest_miniapp_exception.c | 2 ++ 1 file changed, 2 insertions(+) -- 2.28.0 diff --git a/lib/efi_selftest/efi_selftest_miniapp_exception.c b/lib/efi_selftest/efi_selftest_miniapp_exception.c index 63c63d75f1..59b7e5100a 100644 --- a/lib/efi_selftest/efi_selftest_miniapp_exception.c +++ b/lib/efi_selftest/efi_selftest_miniapp_exception.c @@ -33,6 +33,8 @@ efi_status_t EFIAPI efi_main(efi_handle_t handle, asm volatile (".word 0xe7f7defb\n"); #elif defined(CONFIG_RISCV) asm volatile (".word 0xffffffff\n"); +#elif defined(CONFIG_SANDBOX) + asm volatile (".word 0xffffffff\n"); #elif defined(CONFIG_X86) asm volatile (".word 0xffff\n"); #endif