blob: b3d70515dc8da0f28ade44c218a45d0fd77dd0df [file] [log] [blame]
Simon Glassbace3d02011-10-03 19:26:45 +00001/*
Simon Glass6fb62072012-02-15 15:51:15 -08002 * Copyright (c) 2011-2012 The Chromium OS Authors.
Wolfgang Denk1a459662013-07-08 09:37:19 +02003 * SPDX-License-Identifier: GPL-2.0+
Simon Glassbace3d02011-10-03 19:26:45 +00004 */
5
6#include <common.h>
Simon Glass5c2859c2013-11-10 10:27:03 -07007#include <os.h>
Simon Glass70db4212012-02-15 15:51:16 -08008#include <asm/getopt.h>
Simon Glass4d94dfa2014-07-10 22:23:27 -06009#include <asm/io.h>
Simon Glass70db4212012-02-15 15:51:16 -080010#include <asm/sections.h>
Simon Glass6fb62072012-02-15 15:51:15 -080011#include <asm/state.h>
Simon Glassbace3d02011-10-03 19:26:45 +000012
Simon Glass808434c2013-11-10 10:26:59 -070013DECLARE_GLOBAL_DATA_PTR;
14
Simon Glass70db4212012-02-15 15:51:16 -080015int sandbox_early_getopt_check(void)
16{
17 struct sandbox_state *state = state_get_current();
Simon Glass7b3efc62013-12-03 16:43:23 -070018 struct sandbox_cmdline_option **sb_opt = __u_boot_sandbox_option_start;
Simon Glass70db4212012-02-15 15:51:16 -080019 size_t num_options = __u_boot_sandbox_option_count();
20 size_t i;
21 int max_arg_len, max_noarg_len;
22
23 /* parse_err will be a string of the faulting option */
24 if (!state->parse_err)
25 return 0;
26
27 if (strcmp(state->parse_err, "help")) {
28 printf("u-boot: error: failed while parsing option: %s\n"
29 "\ttry running with --help for more information.\n",
30 state->parse_err);
31 os_exit(1);
32 }
33
34 printf(
35 "u-boot, a command line test interface to U-Boot\n\n"
36 "Usage: u-boot [options]\n"
37 "Options:\n");
38
39 max_arg_len = 0;
40 for (i = 0; i < num_options; ++i)
41 max_arg_len = max(strlen(sb_opt[i]->flag), max_arg_len);
42 max_noarg_len = max_arg_len + 7;
43
44 for (i = 0; i < num_options; ++i) {
Simon Glass7b3efc62013-12-03 16:43:23 -070045 struct sandbox_cmdline_option *opt = sb_opt[i];
Simon Glass70db4212012-02-15 15:51:16 -080046
47 /* first output the short flag if it has one */
48 if (opt->flag_short >= 0x100)
49 printf(" ");
50 else
51 printf(" -%c, ", opt->flag_short);
52
53 /* then the long flag */
54 if (opt->has_arg)
Simon Glass70db4212012-02-15 15:51:16 -080055 printf("--%-*s <arg> ", max_arg_len, opt->flag);
Simon Glass6ebcab82013-11-10 10:26:58 -070056 else
57 printf("--%-*s", max_noarg_len, opt->flag);
Simon Glass70db4212012-02-15 15:51:16 -080058
59 /* finally the help text */
60 printf(" %s\n", opt->help);
61 }
62
63 os_exit(0);
64}
65
Simon Glass7b3efc62013-12-03 16:43:23 -070066static int sandbox_cmdline_cb_help(struct sandbox_state *state, const char *arg)
Simon Glass70db4212012-02-15 15:51:16 -080067{
68 /* just flag to sandbox_early_getopt_check to show usage */
69 return 1;
70}
Simon Glass7b3efc62013-12-03 16:43:23 -070071SANDBOX_CMDLINE_OPT_SHORT(help, 'h', 0, "Display help");
Simon Glass70db4212012-02-15 15:51:16 -080072
Simon Glassab4e07e2012-02-26 17:38:50 -050073int sandbox_main_loop_init(void)
74{
Simon Glass70db4212012-02-15 15:51:16 -080075 struct sandbox_state *state = state_get_current();
76
77 /* Execute command if required */
78 if (state->cmd) {
Simon Glass39042d82013-04-20 08:42:48 +000079 run_command_list(state->cmd, -1, 0);
Simon Glassc5a62d42013-11-10 10:27:02 -070080 if (!state->interactive)
81 os_exit(state->exit_type);
Simon Glass70db4212012-02-15 15:51:16 -080082 }
83
Simon Glassab4e07e2012-02-26 17:38:50 -050084 return 0;
85}
86
Simon Glass7b3efc62013-12-03 16:43:23 -070087static int sandbox_cmdline_cb_command(struct sandbox_state *state,
88 const char *arg)
Simon Glass70db4212012-02-15 15:51:16 -080089{
90 state->cmd = arg;
91 return 0;
92}
Simon Glass7b3efc62013-12-03 16:43:23 -070093SANDBOX_CMDLINE_OPT_SHORT(command, 'c', 1, "Execute U-Boot command");
Simon Glass70db4212012-02-15 15:51:16 -080094
Simon Glass7b3efc62013-12-03 16:43:23 -070095static int sandbox_cmdline_cb_fdt(struct sandbox_state *state, const char *arg)
Simon Glassf828bf22013-04-20 08:42:41 +000096{
97 state->fdt_fname = arg;
98 return 0;
99}
Simon Glass7b3efc62013-12-03 16:43:23 -0700100SANDBOX_CMDLINE_OPT_SHORT(fdt, 'd', 1, "Specify U-Boot's control FDT");
Simon Glassf828bf22013-04-20 08:42:41 +0000101
Simon Glassc5a62d42013-11-10 10:27:02 -0700102static int sandbox_cmdline_cb_interactive(struct sandbox_state *state,
103 const char *arg)
104{
105 state->interactive = true;
106 return 0;
107}
108
109SANDBOX_CMDLINE_OPT_SHORT(interactive, 'i', 0, "Enter interactive mode");
110
Simon Glassbda77732014-02-27 13:26:16 -0700111static int sandbox_cmdline_cb_jump(struct sandbox_state *state,
112 const char *arg)
113{
Simon Glassab839dc2014-02-27 13:26:23 -0700114 /* Remember to delete this U-Boot image later */
115 state->jumped_fname = arg;
Simon Glassbda77732014-02-27 13:26:16 -0700116
117 return 0;
118}
119SANDBOX_CMDLINE_OPT_SHORT(jump, 'j', 1, "Jumped from previous U-Boot");
120
Simon Glass5c2859c2013-11-10 10:27:03 -0700121static int sandbox_cmdline_cb_memory(struct sandbox_state *state,
122 const char *arg)
123{
124 int err;
125
126 /* For now assume we always want to write it */
127 state->write_ram_buf = true;
128 state->ram_buf_fname = arg;
129
130 if (os_read_ram_buf(arg)) {
131 printf("Failed to read RAM buffer\n");
132 return err;
133 }
134
135 return 0;
136}
137SANDBOX_CMDLINE_OPT_SHORT(memory, 'm', 1,
138 "Read/write ram_buf memory contents from file");
139
Simon Glassab839dc2014-02-27 13:26:23 -0700140static int sandbox_cmdline_cb_rm_memory(struct sandbox_state *state,
141 const char *arg)
142{
143 state->ram_buf_rm = true;
144
145 return 0;
146}
147SANDBOX_CMDLINE_OPT(rm_memory, 0, "Remove memory file after reading");
148
Simon Glass1209e272013-11-10 10:27:04 -0700149static int sandbox_cmdline_cb_state(struct sandbox_state *state,
150 const char *arg)
151{
152 state->state_fname = arg;
153 return 0;
154}
155SANDBOX_CMDLINE_OPT_SHORT(state, 's', 1, "Specify the sandbox state FDT");
156
157static int sandbox_cmdline_cb_read(struct sandbox_state *state,
158 const char *arg)
159{
160 state->read_state = true;
161 return 0;
162}
163SANDBOX_CMDLINE_OPT_SHORT(read, 'r', 0, "Read the state FDT on startup");
164
165static int sandbox_cmdline_cb_write(struct sandbox_state *state,
166 const char *arg)
167{
168 state->write_state = true;
169 return 0;
170}
171SANDBOX_CMDLINE_OPT_SHORT(write, 'w', 0, "Write state FDT on exit");
172
173static int sandbox_cmdline_cb_ignore_missing(struct sandbox_state *state,
174 const char *arg)
175{
176 state->ignore_missing_state_on_read = true;
177 return 0;
178}
179SANDBOX_CMDLINE_OPT_SHORT(ignore_missing, 'n', 0,
180 "Ignore missing state on read");
181
Simon Glass7d95f2a2014-02-27 13:26:19 -0700182static int sandbox_cmdline_cb_show_lcd(struct sandbox_state *state,
183 const char *arg)
184{
185 state->show_lcd = true;
186 return 0;
187}
188SANDBOX_CMDLINE_OPT_SHORT(show_lcd, 'l', 0,
189 "Show the sandbox LCD display");
190
Simon Glassffb87902014-02-27 13:26:22 -0700191static const char *term_args[STATE_TERM_COUNT] = {
192 "raw-with-sigs",
193 "raw",
194 "cooked",
195};
196
197static int sandbox_cmdline_cb_terminal(struct sandbox_state *state,
198 const char *arg)
199{
200 int i;
201
202 for (i = 0; i < STATE_TERM_COUNT; i++) {
203 if (!strcmp(arg, term_args[i])) {
204 state->term_raw = i;
205 return 0;
206 }
207 }
208
209 printf("Unknown terminal setting '%s' (", arg);
210 for (i = 0; i < STATE_TERM_COUNT; i++)
211 printf("%s%s", i ? ", " : "", term_args[i]);
212 puts(")\n");
213
214 return 1;
215}
216SANDBOX_CMDLINE_OPT_SHORT(terminal, 't', 1,
217 "Set terminal to raw/cooked mode");
218
Simon Glassbace3d02011-10-03 19:26:45 +0000219int main(int argc, char *argv[])
220{
Simon Glass70db4212012-02-15 15:51:16 -0800221 struct sandbox_state *state;
Simon Glass4d94dfa2014-07-10 22:23:27 -0600222 gd_t data;
Simon Glass1209e272013-11-10 10:27:04 -0700223 int ret;
Simon Glass6fb62072012-02-15 15:51:15 -0800224
Simon Glass1209e272013-11-10 10:27:04 -0700225 ret = state_init();
226 if (ret)
227 goto err;
Simon Glass6fb62072012-02-15 15:51:15 -0800228
Simon Glass70db4212012-02-15 15:51:16 -0800229 state = state_get_current();
230 if (os_parse_args(state, argc, argv))
231 return 1;
232
Simon Glass1209e272013-11-10 10:27:04 -0700233 ret = sandbox_read_state(state, state->state_fname);
234 if (ret)
235 goto err;
236
Simon Glassab839dc2014-02-27 13:26:23 -0700237 /* Remove old memory file if required */
238 if (state->ram_buf_rm && state->ram_buf_fname)
239 os_unlink(state->ram_buf_fname);
240
Simon Glass4d94dfa2014-07-10 22:23:27 -0600241 memset(&data, '\0', sizeof(data));
242 gd = &data;
Simon Glass29afe9e2014-07-10 22:23:31 -0600243#ifdef CONFIG_SYS_MALLOC_F_LEN
244 gd->malloc_base = CONFIG_MALLOC_F_ADDR;
245#endif
Simon Glass4d94dfa2014-07-10 22:23:27 -0600246
Simon Glass808434c2013-11-10 10:26:59 -0700247 /* Do pre- and post-relocation init */
Simon Glassbace3d02011-10-03 19:26:45 +0000248 board_init_f(0);
Allen Martin8ec21bb2013-01-22 13:11:21 +0000249
Simon Glass808434c2013-11-10 10:26:59 -0700250 board_init_r(gd->new_gd, 0);
251
252 /* NOTREACHED - board_init_r() does not return */
Allen Martin8ec21bb2013-01-22 13:11:21 +0000253 return 0;
Simon Glass1209e272013-11-10 10:27:04 -0700254
255err:
256 printf("Error %d\n", ret);
257 return 1;
Simon Glassbace3d02011-10-03 19:26:45 +0000258}