2022-04-25 05:31:24 +00:00
|
|
|
// SPDX-License-Identifier: GPL-2.0+
|
|
|
|
/*
|
|
|
|
* Test for bootdev functions. All start with 'bootdev'
|
|
|
|
*
|
|
|
|
* Copyright 2021 Google LLC
|
|
|
|
* Written by Simon Glass <sjg@chromium.org>
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <common.h>
|
|
|
|
#include <bootdev.h>
|
|
|
|
#include <bootflow.h>
|
2022-07-30 21:52:34 +00:00
|
|
|
#include <bootmeth.h>
|
2022-04-25 05:31:24 +00:00
|
|
|
#include <bootstd.h>
|
|
|
|
#include <dm.h>
|
2022-07-30 21:52:36 +00:00
|
|
|
#ifdef CONFIG_SANDBOX
|
2022-07-30 21:52:22 +00:00
|
|
|
#include <asm/test.h>
|
2022-07-30 21:52:36 +00:00
|
|
|
#endif
|
2022-04-25 05:31:24 +00:00
|
|
|
#include <dm/lists.h>
|
|
|
|
#include <test/suites.h>
|
|
|
|
#include <test/ut.h>
|
|
|
|
#include "bootstd_common.h"
|
|
|
|
|
2022-07-30 21:52:16 +00:00
|
|
|
static int inject_response(struct unit_test_state *uts)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* The image being booted presents a menu of options:
|
|
|
|
*
|
|
|
|
* Fedora-Workstation-armhfp-31-1.9 Boot Options.
|
|
|
|
* 1: Fedora-Workstation-armhfp-31-1.9 (5.3.7-301.fc31.armv7hl)
|
|
|
|
* Enter choice:
|
|
|
|
*
|
|
|
|
* Provide input for this, to avoid waiting two seconds for a timeout.
|
|
|
|
*/
|
|
|
|
ut_asserteq(2, console_in_puts("1\n"));
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2022-04-25 05:31:24 +00:00
|
|
|
/* Check 'bootflow scan/list' commands */
|
|
|
|
static int bootflow_cmd(struct unit_test_state *uts)
|
|
|
|
{
|
|
|
|
console_record_reset_enable();
|
|
|
|
ut_assertok(run_command("bootdev select 1", 0));
|
|
|
|
ut_assert_console_end();
|
|
|
|
ut_assertok(run_command("bootflow scan -l", 0));
|
|
|
|
ut_assert_nextline("Scanning for bootflows in bootdev 'mmc1.bootdev'");
|
|
|
|
ut_assert_nextline("Seq Method State Uclass Part Name Filename");
|
|
|
|
ut_assert_nextlinen("---");
|
|
|
|
ut_assert_nextline(" 0 syslinux ready mmc 1 mmc1.bootdev.part_1 /extlinux/extlinux.conf");
|
|
|
|
ut_assert_nextlinen("---");
|
|
|
|
ut_assert_nextline("(1 bootflow, 1 valid)");
|
|
|
|
ut_assert_console_end();
|
|
|
|
|
|
|
|
ut_assertok(run_command("bootflow list", 0));
|
|
|
|
ut_assert_nextline("Showing bootflows for bootdev 'mmc1.bootdev'");
|
|
|
|
ut_assert_nextline("Seq Method State Uclass Part Name Filename");
|
|
|
|
ut_assert_nextlinen("---");
|
|
|
|
ut_assert_nextline(" 0 syslinux ready mmc 1 mmc1.bootdev.part_1 /extlinux/extlinux.conf");
|
|
|
|
ut_assert_nextlinen("---");
|
|
|
|
ut_assert_nextline("(1 bootflow, 1 valid)");
|
|
|
|
ut_assert_console_end();
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
BOOTSTD_TEST(bootflow_cmd, UT_TESTF_DM | UT_TESTF_SCAN_FDT);
|
|
|
|
|
|
|
|
/* Check 'bootflow scan' with a name / label / seq */
|
|
|
|
static int bootflow_cmd_label(struct unit_test_state *uts)
|
|
|
|
{
|
|
|
|
console_record_reset_enable();
|
|
|
|
ut_assertok(run_command("bootflow scan -l mmc1", 0));
|
|
|
|
ut_assert_nextline("Scanning for bootflows in bootdev 'mmc1.bootdev'");
|
|
|
|
ut_assert_skip_to_line("(1 bootflow, 1 valid)");
|
|
|
|
ut_assert_console_end();
|
|
|
|
|
|
|
|
ut_assertok(run_command("bootflow scan -l mmc0.bootdev", 0));
|
|
|
|
ut_assert_nextline("Scanning for bootflows in bootdev 'mmc0.bootdev'");
|
|
|
|
ut_assert_skip_to_line("(0 bootflows, 0 valid)");
|
|
|
|
ut_assert_console_end();
|
|
|
|
|
|
|
|
ut_assertok(run_command("bootflow scan -l 0", 0));
|
|
|
|
ut_assert_nextline("Scanning for bootflows in bootdev 'mmc2.bootdev'");
|
|
|
|
ut_assert_skip_to_line("(0 bootflows, 0 valid)");
|
|
|
|
ut_assert_console_end();
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
BOOTSTD_TEST(bootflow_cmd_label, UT_TESTF_DM | UT_TESTF_SCAN_FDT);
|
|
|
|
|
|
|
|
/* Check 'bootflow scan/list' commands using all bootdevs */
|
|
|
|
static int bootflow_cmd_glob(struct unit_test_state *uts)
|
|
|
|
{
|
|
|
|
ut_assertok(bootstd_test_drop_bootdev_order(uts));
|
|
|
|
|
|
|
|
console_record_reset_enable();
|
2022-07-30 21:52:34 +00:00
|
|
|
ut_assertok(run_command("bootflow scan -lG", 0));
|
2022-04-25 05:31:24 +00:00
|
|
|
ut_assert_nextline("Scanning for bootflows in all bootdevs");
|
|
|
|
ut_assert_nextline("Seq Method State Uclass Part Name Filename");
|
|
|
|
ut_assert_nextlinen("---");
|
|
|
|
ut_assert_nextline("Scanning bootdev 'mmc2.bootdev':");
|
|
|
|
ut_assert_nextline("Scanning bootdev 'mmc1.bootdev':");
|
|
|
|
ut_assert_nextline(" 0 syslinux ready mmc 1 mmc1.bootdev.part_1 /extlinux/extlinux.conf");
|
|
|
|
ut_assert_nextline("Scanning bootdev 'mmc0.bootdev':");
|
|
|
|
ut_assert_nextline("No more bootdevs");
|
|
|
|
ut_assert_nextlinen("---");
|
|
|
|
ut_assert_nextline("(1 bootflow, 1 valid)");
|
|
|
|
ut_assert_console_end();
|
|
|
|
|
|
|
|
ut_assertok(run_command("bootflow list", 0));
|
|
|
|
ut_assert_nextline("Showing all bootflows");
|
|
|
|
ut_assert_nextline("Seq Method State Uclass Part Name Filename");
|
|
|
|
ut_assert_nextlinen("---");
|
|
|
|
ut_assert_nextline(" 0 syslinux ready mmc 1 mmc1.bootdev.part_1 /extlinux/extlinux.conf");
|
|
|
|
ut_assert_nextlinen("---");
|
|
|
|
ut_assert_nextline("(1 bootflow, 1 valid)");
|
|
|
|
ut_assert_console_end();
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
BOOTSTD_TEST(bootflow_cmd_glob, UT_TESTF_DM | UT_TESTF_SCAN_FDT);
|
|
|
|
|
|
|
|
/* Check 'bootflow scan -e' */
|
|
|
|
static int bootflow_cmd_scan_e(struct unit_test_state *uts)
|
|
|
|
{
|
|
|
|
ut_assertok(bootstd_test_drop_bootdev_order(uts));
|
|
|
|
|
|
|
|
console_record_reset_enable();
|
2022-07-30 21:52:34 +00:00
|
|
|
ut_assertok(run_command("bootflow scan -aleG", 0));
|
2022-04-25 05:31:24 +00:00
|
|
|
ut_assert_nextline("Scanning for bootflows in all bootdevs");
|
|
|
|
ut_assert_nextline("Seq Method State Uclass Part Name Filename");
|
|
|
|
ut_assert_nextlinen("---");
|
|
|
|
ut_assert_nextline("Scanning bootdev 'mmc2.bootdev':");
|
|
|
|
ut_assert_nextline(" 0 syslinux media mmc 0 mmc2.bootdev.whole <NULL>");
|
|
|
|
ut_assert_nextline(" ** No partition found, err=-93");
|
|
|
|
ut_assert_nextline(" 1 efi media mmc 0 mmc2.bootdev.whole <NULL>");
|
|
|
|
ut_assert_nextline(" ** No partition found, err=-93");
|
|
|
|
|
|
|
|
ut_assert_nextline("Scanning bootdev 'mmc1.bootdev':");
|
|
|
|
ut_assert_nextline(" 2 syslinux media mmc 0 mmc1.bootdev.whole <NULL>");
|
|
|
|
ut_assert_nextline(" ** No partition found, err=-2");
|
|
|
|
ut_assert_nextline(" 3 efi media mmc 0 mmc1.bootdev.whole <NULL>");
|
|
|
|
ut_assert_nextline(" ** No partition found, err=-2");
|
|
|
|
ut_assert_nextline(" 4 syslinux ready mmc 1 mmc1.bootdev.part_1 /extlinux/extlinux.conf");
|
|
|
|
ut_assert_nextline(" 5 efi fs mmc 1 mmc1.bootdev.part_1 efi/boot/bootsbox.efi");
|
|
|
|
|
|
|
|
ut_assert_skip_to_line("Scanning bootdev 'mmc0.bootdev':");
|
|
|
|
ut_assert_skip_to_line(" 3f efi media mmc 0 mmc0.bootdev.whole <NULL>");
|
|
|
|
ut_assert_nextline(" ** No partition found, err=-93");
|
|
|
|
ut_assert_nextline("No more bootdevs");
|
|
|
|
ut_assert_nextlinen("---");
|
|
|
|
ut_assert_nextline("(64 bootflows, 1 valid)");
|
|
|
|
ut_assert_console_end();
|
|
|
|
|
|
|
|
ut_assertok(run_command("bootflow list", 0));
|
|
|
|
ut_assert_nextline("Showing all bootflows");
|
|
|
|
ut_assert_nextline("Seq Method State Uclass Part Name Filename");
|
|
|
|
ut_assert_nextlinen("---");
|
|
|
|
ut_assert_nextline(" 0 syslinux media mmc 0 mmc2.bootdev.whole <NULL>");
|
|
|
|
ut_assert_nextline(" 1 efi media mmc 0 mmc2.bootdev.whole <NULL>");
|
|
|
|
ut_assert_skip_to_line(" 4 syslinux ready mmc 1 mmc1.bootdev.part_1 /extlinux/extlinux.conf");
|
|
|
|
ut_assert_skip_to_line(" 3f efi media mmc 0 mmc0.bootdev.whole <NULL>");
|
|
|
|
ut_assert_nextlinen("---");
|
|
|
|
ut_assert_nextline("(64 bootflows, 1 valid)");
|
|
|
|
ut_assert_console_end();
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
BOOTSTD_TEST(bootflow_cmd_scan_e, UT_TESTF_DM | UT_TESTF_SCAN_FDT);
|
|
|
|
|
|
|
|
/* Check 'bootflow info' */
|
|
|
|
static int bootflow_cmd_info(struct unit_test_state *uts)
|
|
|
|
{
|
|
|
|
console_record_reset_enable();
|
|
|
|
ut_assertok(run_command("bootdev select 1", 0));
|
|
|
|
ut_assert_console_end();
|
|
|
|
ut_assertok(run_command("bootflow scan", 0));
|
|
|
|
ut_assert_console_end();
|
|
|
|
ut_assertok(run_command("bootflow select 0", 0));
|
|
|
|
ut_assert_console_end();
|
|
|
|
ut_assertok(run_command("bootflow info", 0));
|
|
|
|
ut_assert_nextline("Name: mmc1.bootdev.part_1");
|
|
|
|
ut_assert_nextline("Device: mmc1.bootdev");
|
|
|
|
ut_assert_nextline("Block dev: mmc1.blk");
|
|
|
|
ut_assert_nextline("Method: syslinux");
|
|
|
|
ut_assert_nextline("State: ready");
|
|
|
|
ut_assert_nextline("Partition: 1");
|
|
|
|
ut_assert_nextline("Subdir: (none)");
|
|
|
|
ut_assert_nextline("Filename: /extlinux/extlinux.conf");
|
|
|
|
ut_assert_nextlinen("Buffer: ");
|
|
|
|
ut_assert_nextline("Size: 253 (595 bytes)");
|
|
|
|
ut_assert_nextline("Error: 0");
|
|
|
|
ut_assert_console_end();
|
|
|
|
|
|
|
|
ut_assertok(run_command("bootflow info -d", 0));
|
|
|
|
ut_assert_nextline("Name: mmc1.bootdev.part_1");
|
|
|
|
ut_assert_skip_to_line("Error: 0");
|
|
|
|
ut_assert_nextline("Contents:");
|
|
|
|
ut_assert_nextline("%s", "");
|
|
|
|
ut_assert_nextline("# extlinux.conf generated by appliance-creator");
|
|
|
|
ut_assert_skip_to_line(" initrd /initramfs-5.3.7-301.fc31.armv7hl.img");
|
|
|
|
ut_assert_console_end();
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
BOOTSTD_TEST(bootflow_cmd_info, UT_TESTF_DM | UT_TESTF_SCAN_FDT);
|
|
|
|
|
|
|
|
/* Check 'bootflow scan -b' to boot the first available bootdev */
|
|
|
|
static int bootflow_scan_boot(struct unit_test_state *uts)
|
|
|
|
{
|
|
|
|
console_record_reset_enable();
|
2022-07-30 21:52:16 +00:00
|
|
|
ut_assertok(inject_response(uts));
|
2022-04-25 05:31:24 +00:00
|
|
|
ut_assertok(run_command("bootflow scan -b", 0));
|
|
|
|
ut_assert_nextline(
|
|
|
|
"** Booting bootflow 'mmc1.bootdev.part_1' with syslinux");
|
|
|
|
ut_assert_nextline("Ignoring unknown command: ui");
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We expect it to get through to boot although sandbox always returns
|
|
|
|
* -EFAULT as it cannot actually boot the kernel
|
|
|
|
*/
|
|
|
|
ut_assert_skip_to_line("sandbox: continuing, as we cannot run Linux");
|
|
|
|
ut_assert_nextline("Boot failed (err=-14)");
|
|
|
|
ut_assert_console_end();
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
BOOTSTD_TEST(bootflow_scan_boot, UT_TESTF_DM | UT_TESTF_SCAN_FDT);
|
|
|
|
|
|
|
|
/* Check iterating through available bootflows */
|
|
|
|
static int bootflow_iter(struct unit_test_state *uts)
|
|
|
|
{
|
|
|
|
struct bootflow_iter iter;
|
|
|
|
struct bootflow bflow;
|
|
|
|
|
|
|
|
bootstd_clear_glob();
|
|
|
|
|
|
|
|
/* The first device is mmc2.bootdev which has no media */
|
|
|
|
ut_asserteq(-EPROTONOSUPPORT,
|
2022-07-30 21:52:34 +00:00
|
|
|
bootflow_scan_first(&iter, BOOTFLOWF_ALL | BOOTFLOWF_SKIP_GLOBAL, &bflow));
|
2022-04-25 05:31:24 +00:00
|
|
|
ut_asserteq(2, iter.num_methods);
|
|
|
|
ut_asserteq(0, iter.cur_method);
|
|
|
|
ut_asserteq(0, iter.part);
|
|
|
|
ut_asserteq(0, iter.max_part);
|
|
|
|
ut_asserteq_str("syslinux", iter.method->name);
|
|
|
|
ut_asserteq(0, bflow.err);
|
|
|
|
|
|
|
|
/*
|
2022-07-30 21:52:34 +00:00
|
|
|
* This shows MEDIA even though there is none, since in
|
2022-04-25 05:31:24 +00:00
|
|
|
* bootdev_find_in_blk() we call part_get_info() which returns
|
|
|
|
* -EPROTONOSUPPORT. Ideally it would return -EEOPNOTSUPP and we would
|
|
|
|
* know.
|
|
|
|
*/
|
|
|
|
ut_asserteq(BOOTFLOWST_MEDIA, bflow.state);
|
|
|
|
|
|
|
|
ut_asserteq(-EPROTONOSUPPORT, bootflow_scan_next(&iter, &bflow));
|
|
|
|
ut_asserteq(2, iter.num_methods);
|
|
|
|
ut_asserteq(1, iter.cur_method);
|
|
|
|
ut_asserteq(0, iter.part);
|
|
|
|
ut_asserteq(0, iter.max_part);
|
|
|
|
ut_asserteq_str("efi", iter.method->name);
|
|
|
|
ut_asserteq(0, bflow.err);
|
|
|
|
ut_asserteq(BOOTFLOWST_MEDIA, bflow.state);
|
|
|
|
bootflow_free(&bflow);
|
|
|
|
|
|
|
|
/* The next device is mmc1.bootdev - at first we use the whole device */
|
|
|
|
ut_asserteq(-ENOENT, bootflow_scan_next(&iter, &bflow));
|
|
|
|
ut_asserteq(2, iter.num_methods);
|
|
|
|
ut_asserteq(0, iter.cur_method);
|
|
|
|
ut_asserteq(0, iter.part);
|
|
|
|
ut_asserteq(0x1e, iter.max_part);
|
|
|
|
ut_asserteq_str("syslinux", iter.method->name);
|
|
|
|
ut_asserteq(0, bflow.err);
|
|
|
|
ut_asserteq(BOOTFLOWST_MEDIA, bflow.state);
|
|
|
|
bootflow_free(&bflow);
|
|
|
|
|
|
|
|
ut_asserteq(-ENOENT, bootflow_scan_next(&iter, &bflow));
|
|
|
|
ut_asserteq(2, iter.num_methods);
|
|
|
|
ut_asserteq(1, iter.cur_method);
|
|
|
|
ut_asserteq(0, iter.part);
|
|
|
|
ut_asserteq(0x1e, iter.max_part);
|
|
|
|
ut_asserteq_str("efi", iter.method->name);
|
|
|
|
ut_asserteq(0, bflow.err);
|
|
|
|
ut_asserteq(BOOTFLOWST_MEDIA, bflow.state);
|
|
|
|
bootflow_free(&bflow);
|
|
|
|
|
|
|
|
/* Then more to partition 1 where we find something */
|
|
|
|
ut_assertok(bootflow_scan_next(&iter, &bflow));
|
|
|
|
ut_asserteq(2, iter.num_methods);
|
|
|
|
ut_asserteq(0, iter.cur_method);
|
|
|
|
ut_asserteq(1, iter.part);
|
|
|
|
ut_asserteq(0x1e, iter.max_part);
|
|
|
|
ut_asserteq_str("syslinux", iter.method->name);
|
|
|
|
ut_asserteq(0, bflow.err);
|
|
|
|
ut_asserteq(BOOTFLOWST_READY, bflow.state);
|
|
|
|
bootflow_free(&bflow);
|
|
|
|
|
|
|
|
ut_asserteq(-ENOENT, bootflow_scan_next(&iter, &bflow));
|
|
|
|
ut_asserteq(2, iter.num_methods);
|
|
|
|
ut_asserteq(1, iter.cur_method);
|
|
|
|
ut_asserteq(1, iter.part);
|
|
|
|
ut_asserteq(0x1e, iter.max_part);
|
|
|
|
ut_asserteq_str("efi", iter.method->name);
|
|
|
|
ut_asserteq(0, bflow.err);
|
|
|
|
ut_asserteq(BOOTFLOWST_FS, bflow.state);
|
|
|
|
bootflow_free(&bflow);
|
|
|
|
|
|
|
|
/* Then more to partition 2 which doesn't exist */
|
|
|
|
ut_asserteq(-ENOENT, bootflow_scan_next(&iter, &bflow));
|
|
|
|
ut_asserteq(2, iter.num_methods);
|
|
|
|
ut_asserteq(0, iter.cur_method);
|
|
|
|
ut_asserteq(2, iter.part);
|
|
|
|
ut_asserteq(0x1e, iter.max_part);
|
|
|
|
ut_asserteq_str("syslinux", iter.method->name);
|
|
|
|
ut_asserteq(0, bflow.err);
|
|
|
|
ut_asserteq(BOOTFLOWST_MEDIA, bflow.state);
|
|
|
|
bootflow_free(&bflow);
|
|
|
|
|
|
|
|
bootflow_iter_uninit(&iter);
|
|
|
|
|
|
|
|
ut_assert_console_end();
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
BOOTSTD_TEST(bootflow_iter, UT_TESTF_DM | UT_TESTF_SCAN_FDT);
|
|
|
|
|
2022-07-30 21:52:36 +00:00
|
|
|
#if defined(CONFIG_SANDBOX) && defined(CONFIG_BOOTMETH_GLOBAL)
|
2022-04-25 05:31:24 +00:00
|
|
|
/* Check using the system bootdev */
|
|
|
|
static int bootflow_system(struct unit_test_state *uts)
|
|
|
|
{
|
2022-07-30 21:52:28 +00:00
|
|
|
struct udevice *dev;
|
2022-04-25 05:31:24 +00:00
|
|
|
|
2022-07-30 21:52:28 +00:00
|
|
|
ut_assertok(uclass_get_device_by_name(UCLASS_BOOTMETH, "efi_mgr",
|
|
|
|
&dev));
|
2022-07-30 21:52:22 +00:00
|
|
|
sandbox_set_fake_efi_mgr_dev(dev, true);
|
2022-04-25 05:31:24 +00:00
|
|
|
|
|
|
|
/* We should get a single 'bootmgr' method right at the end */
|
|
|
|
bootstd_clear_glob();
|
|
|
|
console_record_reset_enable();
|
|
|
|
ut_assertok(run_command("bootflow scan -l", 0));
|
2022-07-30 21:52:27 +00:00
|
|
|
ut_assert_skip_to_line(
|
2022-07-30 21:52:28 +00:00
|
|
|
" 0 efi_mgr ready (none) 0 <NULL> <NULL>");
|
2022-07-30 21:52:27 +00:00
|
|
|
ut_assert_skip_to_line("No more bootdevs");
|
2022-07-30 21:52:29 +00:00
|
|
|
ut_assert_skip_to_line("(5 bootflows, 5 valid)");
|
2022-04-25 05:31:24 +00:00
|
|
|
ut_assert_console_end();
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2022-07-30 21:52:28 +00:00
|
|
|
BOOTSTD_TEST(bootflow_system, UT_TESTF_DM | UT_TESTF_SCAN_PDATA |
|
|
|
|
UT_TESTF_SCAN_FDT);
|
2022-07-30 21:52:36 +00:00
|
|
|
#endif
|
2022-04-25 05:31:24 +00:00
|
|
|
|
|
|
|
/* Check disabling a bootmethod if it requests it */
|
|
|
|
static int bootflow_iter_disable(struct unit_test_state *uts)
|
|
|
|
{
|
|
|
|
struct udevice *bootstd, *dev;
|
|
|
|
struct bootflow_iter iter;
|
|
|
|
struct bootflow bflow;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
/* Add the EFI bootmgr driver */
|
|
|
|
ut_assertok(uclass_first_device_err(UCLASS_BOOTSTD, &bootstd));
|
|
|
|
ut_assertok(device_bind_driver(bootstd, "bootmeth_sandbox", "sandbox",
|
|
|
|
&dev));
|
|
|
|
|
|
|
|
ut_assertok(bootstd_test_drop_bootdev_order(uts));
|
|
|
|
|
|
|
|
bootstd_clear_glob();
|
2022-07-30 21:52:16 +00:00
|
|
|
console_record_reset_enable();
|
|
|
|
ut_assertok(inject_response(uts));
|
2022-04-25 05:31:24 +00:00
|
|
|
ut_assertok(run_command("bootflow scan -lb", 0));
|
|
|
|
|
|
|
|
/* Try to boot the bootmgr flow, which will fail */
|
|
|
|
console_record_reset_enable();
|
|
|
|
ut_assertok(bootflow_scan_first(&iter, 0, &bflow));
|
|
|
|
ut_asserteq(3, iter.num_methods);
|
|
|
|
ut_asserteq_str("sandbox", iter.method->name);
|
2022-07-30 21:52:16 +00:00
|
|
|
ut_assertok(inject_response(uts));
|
2022-04-25 05:31:24 +00:00
|
|
|
ut_asserteq(-ENOTSUPP, bootflow_run_boot(&iter, &bflow));
|
|
|
|
|
|
|
|
ut_assert_skip_to_line("Boot method 'sandbox' failed and will not be retried");
|
|
|
|
ut_assert_console_end();
|
|
|
|
|
|
|
|
/* Check that the sandbox bootmeth has been removed */
|
|
|
|
ut_asserteq(2, iter.num_methods);
|
|
|
|
for (i = 0; i < iter.num_methods; i++)
|
|
|
|
ut_assert(strcmp("sandbox", iter.method_order[i]->name));
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
BOOTSTD_TEST(bootflow_iter_disable, UT_TESTF_DM | UT_TESTF_SCAN_FDT);
|
|
|
|
|
2022-07-30 21:52:34 +00:00
|
|
|
/* Check 'bootflow scan' with a bootmeth ordering including a global bootmeth */
|
|
|
|
static int bootflow_scan_glob_bootmeth(struct unit_test_state *uts)
|
|
|
|
{
|
2022-07-30 21:52:36 +00:00
|
|
|
if (!IS_ENABLED(CONFIG_BOOTMETH_GLOBAL))
|
|
|
|
return 0;
|
|
|
|
|
2022-07-30 21:52:34 +00:00
|
|
|
ut_assertok(bootstd_test_drop_bootdev_order(uts));
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Make sure that the -G flag makes the scan fail, since this is not
|
|
|
|
* supported when an ordering is provided
|
|
|
|
*/
|
|
|
|
console_record_reset_enable();
|
|
|
|
ut_assertok(bootmeth_set_order("efi firmware0"));
|
|
|
|
ut_assertok(run_command("bootflow scan -lG", 0));
|
|
|
|
ut_assert_nextline("Scanning for bootflows in all bootdevs");
|
|
|
|
ut_assert_nextline(
|
|
|
|
"Seq Method State Uclass Part Name Filename");
|
|
|
|
ut_assert_nextlinen("---");
|
|
|
|
ut_assert_nextlinen("---");
|
|
|
|
ut_assert_nextline("(0 bootflows, 0 valid)");
|
|
|
|
ut_assert_console_end();
|
|
|
|
|
|
|
|
ut_assertok(run_command("bootflow scan -l", 0));
|
|
|
|
ut_assert_nextline("Scanning for bootflows in all bootdevs");
|
|
|
|
ut_assert_nextline(
|
|
|
|
"Seq Method State Uclass Part Name Filename");
|
|
|
|
ut_assert_nextlinen("---");
|
|
|
|
ut_assert_nextline("Scanning global bootmeth 'firmware0':");
|
|
|
|
ut_assert_nextline("Scanning bootdev 'mmc2.bootdev':");
|
|
|
|
ut_assert_nextline("Scanning bootdev 'mmc1.bootdev':");
|
|
|
|
ut_assert_nextline("Scanning bootdev 'mmc0.bootdev':");
|
|
|
|
ut_assert_nextline("No more bootdevs");
|
|
|
|
ut_assert_nextlinen("---");
|
|
|
|
ut_assert_nextline("(0 bootflows, 0 valid)");
|
|
|
|
ut_assert_console_end();
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
BOOTSTD_TEST(bootflow_scan_glob_bootmeth, UT_TESTF_DM | UT_TESTF_SCAN_FDT);
|
|
|
|
|
2022-04-25 05:31:24 +00:00
|
|
|
/* Check 'bootflow boot' to boot a selected bootflow */
|
|
|
|
static int bootflow_cmd_boot(struct unit_test_state *uts)
|
|
|
|
{
|
|
|
|
console_record_reset_enable();
|
|
|
|
ut_assertok(run_command("bootdev select 1", 0));
|
|
|
|
ut_assert_console_end();
|
|
|
|
ut_assertok(run_command("bootflow scan", 0));
|
|
|
|
ut_assert_console_end();
|
|
|
|
ut_assertok(run_command("bootflow select 0", 0));
|
|
|
|
ut_assert_console_end();
|
2022-07-30 21:52:16 +00:00
|
|
|
|
|
|
|
ut_assertok(inject_response(uts));
|
2022-04-25 05:31:24 +00:00
|
|
|
ut_asserteq(1, run_command("bootflow boot", 0));
|
|
|
|
ut_assert_nextline(
|
|
|
|
"** Booting bootflow 'mmc1.bootdev.part_1' with syslinux");
|
|
|
|
ut_assert_nextline("Ignoring unknown command: ui");
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We expect it to get through to boot although sandbox always returns
|
|
|
|
* -EFAULT as it cannot actually boot the kernel
|
|
|
|
*/
|
|
|
|
ut_assert_skip_to_line("sandbox: continuing, as we cannot run Linux");
|
|
|
|
ut_assert_nextline("Boot failed (err=-14)");
|
|
|
|
ut_assert_console_end();
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
BOOTSTD_TEST(bootflow_cmd_boot, UT_TESTF_DM | UT_TESTF_SCAN_FDT);
|