Commit a69d83b60b9923784eaceccdb2dc07ca1e599494
1 parent
86840ae2
systematic exception test
git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@122 c046a42c-6fe2-441c-8c8c-71466251a162
Showing
1 changed file
with
93 additions
and
25 deletions
tests/testsig.c
... | ... | @@ -26,13 +26,15 @@ void alarm_handler(int sig) |
26 | 26 | #define REG_ESP ESP |
27 | 27 | #define REG_EIP EIP |
28 | 28 | #define REG_EFL EFL |
29 | +#define REG_TRAPNO TRAPNO | |
30 | +#define REG_ERR ERR | |
29 | 31 | #endif |
30 | 32 | |
31 | 33 | void dump_regs(struct ucontext *uc) |
32 | 34 | { |
33 | 35 | printf("EAX=%08x EBX=%08x ECX=%08x EDX=%08x\n" |
34 | 36 | "ESI=%08x EDI=%08x EBP=%08x ESP=%08x\n" |
35 | - "EFL=%08x EIP=%08x\n", | |
37 | + "EFL=%08x EIP=%08x trapno=%02x err=%08x\n", | |
36 | 38 | uc->uc_mcontext.gregs[REG_EAX], |
37 | 39 | uc->uc_mcontext.gregs[REG_EBX], |
38 | 40 | uc->uc_mcontext.gregs[REG_ECX], |
... | ... | @@ -42,7 +44,9 @@ void dump_regs(struct ucontext *uc) |
42 | 44 | uc->uc_mcontext.gregs[REG_EBP], |
43 | 45 | uc->uc_mcontext.gregs[REG_ESP], |
44 | 46 | uc->uc_mcontext.gregs[REG_EFL], |
45 | - uc->uc_mcontext.gregs[REG_EIP]); | |
47 | + uc->uc_mcontext.gregs[REG_EIP], | |
48 | + uc->uc_mcontext.gregs[REG_TRAPNO], | |
49 | + uc->uc_mcontext.gregs[REG_ERR]); | |
46 | 50 | } |
47 | 51 | |
48 | 52 | void sig_handler(int sig, siginfo_t *info, void *puc) |
... | ... | @@ -58,19 +62,22 @@ void sig_handler(int sig, siginfo_t *info, void *puc) |
58 | 62 | } |
59 | 63 | |
60 | 64 | int v1; |
65 | +int tab[2]; | |
61 | 66 | |
62 | 67 | int main(int argc, char **argv) |
63 | 68 | { |
64 | 69 | struct sigaction act; |
65 | - int i; | |
70 | + int val; | |
66 | 71 | |
72 | + act.sa_sigaction = sig_handler; | |
73 | + sigemptyset(&act.sa_mask); | |
74 | + act.sa_flags = SA_SIGINFO; | |
75 | + sigaction(SIGFPE, &act, NULL); | |
76 | + sigaction(SIGILL, &act, NULL); | |
77 | + sigaction(SIGSEGV, &act, NULL); | |
78 | + | |
67 | 79 | /* test division by zero reporting */ |
68 | 80 | if (setjmp(jmp_env) == 0) { |
69 | - act.sa_sigaction = sig_handler; | |
70 | - sigemptyset(&act.sa_mask); | |
71 | - act.sa_flags = SA_SIGINFO | SA_ONESHOT; | |
72 | - sigaction(SIGFPE, &act, NULL); | |
73 | - | |
74 | 81 | /* now divide by zero */ |
75 | 82 | v1 = 0; |
76 | 83 | v1 = 2 / v1; |
... | ... | @@ -78,33 +85,94 @@ int main(int argc, char **argv) |
78 | 85 | |
79 | 86 | /* test illegal instruction reporting */ |
80 | 87 | if (setjmp(jmp_env) == 0) { |
81 | - act.sa_sigaction = sig_handler; | |
82 | - sigemptyset(&act.sa_mask); | |
83 | - act.sa_flags = SA_SIGINFO | SA_ONESHOT; | |
84 | - sigaction(SIGILL, &act, NULL); | |
85 | - | |
86 | 88 | /* now execute an invalid instruction */ |
87 | 89 | asm volatile("ud2"); |
88 | 90 | } |
89 | 91 | |
90 | 92 | /* test SEGV reporting */ |
91 | 93 | if (setjmp(jmp_env) == 0) { |
92 | - act.sa_sigaction = sig_handler; | |
93 | - sigemptyset(&act.sa_mask); | |
94 | - act.sa_flags = SA_SIGINFO | SA_ONESHOT; | |
95 | - sigaction(SIGSEGV, &act, NULL); | |
96 | - | |
97 | 94 | /* now store in an invalid address */ |
98 | 95 | *(char *)0x1234 = 1; |
99 | 96 | } |
97 | + | |
98 | + /* test SEGV reporting */ | |
99 | + if (setjmp(jmp_env) == 0) { | |
100 | + /* read from an invalid address */ | |
101 | + v1 = *(char *)0x1234; | |
102 | + } | |
100 | 103 | |
101 | - act.sa_handler = alarm_handler; | |
102 | - sigemptyset(&act.sa_mask); | |
103 | - act.sa_flags = 0; | |
104 | - sigaction(SIGALRM, &act, NULL); | |
105 | - alarm(1); | |
106 | - for(i = 0;i < 2; i++) { | |
107 | - sleep(1); | |
104 | + printf("segment GPF exception:\n"); | |
105 | + if (setjmp(jmp_env) == 0) { | |
106 | + /* load an invalid segment */ | |
107 | + asm volatile ("movl %0, %%fs" : : "r" ((0x1234 << 3) | 0)); | |
108 | + } | |
109 | + | |
110 | + printf("INT exception:\n"); | |
111 | + if (setjmp(jmp_env) == 0) { | |
112 | + asm volatile ("int $0xfd"); | |
113 | + } | |
114 | + | |
115 | + printf("CLI exception:\n"); | |
116 | + if (setjmp(jmp_env) == 0) { | |
117 | + asm volatile ("cli"); | |
118 | + } | |
119 | + | |
120 | + printf("STI exception:\n"); | |
121 | + if (setjmp(jmp_env) == 0) { | |
122 | + asm volatile ("cli"); | |
123 | + } | |
124 | + | |
125 | + printf("INTO exception:\n"); | |
126 | + if (setjmp(jmp_env) == 0) { | |
127 | + /* overflow exception */ | |
128 | + asm volatile ("addl $1, %0 ; into" : : "r" (0x7fffffff)); | |
129 | + } | |
130 | + | |
131 | + printf("BOUND exception:\n"); | |
132 | + if (setjmp(jmp_env) == 0) { | |
133 | + /* bound exception */ | |
134 | + tab[0] = 1; | |
135 | + tab[1] = 10; | |
136 | + asm volatile ("bound %0, %1" : : "r" (11), "m" (tab)); | |
137 | + } | |
138 | + | |
139 | + printf("OUTB exception:\n"); | |
140 | + if (setjmp(jmp_env) == 0) { | |
141 | + asm volatile ("outb %%al, %%dx" : : "d" (0x4321), "a" (0)); | |
142 | + } | |
143 | + | |
144 | + printf("INB exception:\n"); | |
145 | + if (setjmp(jmp_env) == 0) { | |
146 | + asm volatile ("inb %%dx, %%al" : "=a" (val) : "d" (0x4321)); | |
108 | 147 | } |
148 | + | |
149 | + printf("REP OUTSB exception:\n"); | |
150 | + if (setjmp(jmp_env) == 0) { | |
151 | + asm volatile ("rep outsb" : : "d" (0x4321), "S" (tab), "c" (1)); | |
152 | + } | |
153 | + | |
154 | + printf("REP INSB exception:\n"); | |
155 | + if (setjmp(jmp_env) == 0) { | |
156 | + asm volatile ("rep insb" : : "d" (0x4321), "D" (tab), "c" (1)); | |
157 | + } | |
158 | + | |
159 | + printf("HLT exception:\n"); | |
160 | + if (setjmp(jmp_env) == 0) { | |
161 | + asm volatile ("hlt" : : "d" (0x4321), "D" (tab), "c" (1)); | |
162 | + } | |
163 | + | |
164 | +#if 0 | |
165 | + { | |
166 | + int i; | |
167 | + act.sa_handler = alarm_handler; | |
168 | + sigemptyset(&act.sa_mask); | |
169 | + act.sa_flags = 0; | |
170 | + sigaction(SIGALRM, &act, NULL); | |
171 | + alarm(1); | |
172 | + for(i = 0;i < 2; i++) { | |
173 | + sleep(1); | |
174 | + } | |
175 | + } | |
176 | +#endif | |
109 | 177 | return 0; |
110 | 178 | } | ... | ... |