mirror of
https://github.com/AsahiLinux/u-boot
synced 2024-12-01 17:10:11 +00:00
2c02152a8e
Add support for dealing with string operands, including reading a string from memory into an environment variable and concatenating two strings. Signed-off-by: Simon Glass <sjg@chromium.org> Acked-by: Marek Behún <marek.behun@nic.cz>
384 lines
10 KiB
C
384 lines
10 KiB
C
// SPDX-License-Identifier: GPL-2.0+
|
|
/*
|
|
* Tests for setexpr command
|
|
*
|
|
* Copyright 2020 Google LLC
|
|
* Written by Simon Glass <sjg@chromium.org>
|
|
*/
|
|
|
|
#include <common.h>
|
|
#include <console.h>
|
|
#include <mapmem.h>
|
|
#include <dm/test.h>
|
|
#include <test/suites.h>
|
|
#include <test/ut.h>
|
|
|
|
#define BUF_SIZE 0x100
|
|
|
|
/* Declare a new mem test */
|
|
#define SETEXPR_TEST(_name, _flags) UNIT_TEST(_name, _flags, setexpr_test)
|
|
|
|
/* Test 'setexpr' command with simply setting integers */
|
|
static int setexpr_test_int(struct unit_test_state *uts)
|
|
{
|
|
u8 *buf;
|
|
|
|
buf = map_sysmem(0, BUF_SIZE);
|
|
memset(buf, '\xff', BUF_SIZE);
|
|
|
|
/* byte */
|
|
buf[0x0] = 0x12;
|
|
ut_assertok(run_command("setexpr.b fred 0", 0));
|
|
ut_asserteq_str("0", env_get("fred"));
|
|
ut_assertok(run_command("setexpr.b fred *0", 0));
|
|
ut_asserteq_str("12", env_get("fred"));
|
|
|
|
/* 16-bit */
|
|
*(short *)buf = 0x2345;
|
|
ut_assertok(run_command("setexpr.w fred 0", 0));
|
|
ut_asserteq_str("0", env_get("fred"));
|
|
ut_assertok(run_command("setexpr.w fred *0", 0));
|
|
ut_asserteq_str("2345", env_get("fred"));
|
|
|
|
/* 32-bit */
|
|
*(u32 *)buf = 0x3456789a;
|
|
ut_assertok(run_command("setexpr.l fred 0", 0));
|
|
ut_asserteq_str("0", env_get("fred"));
|
|
ut_assertok(run_command("setexpr.l fred *0", 0));
|
|
ut_asserteq_str("3456789a", env_get("fred"));
|
|
|
|
/* 64-bit */
|
|
*(u64 *)buf = 0x456789abcdef0123;
|
|
ut_assertok(run_command("setexpr.q fred 0", 0));
|
|
ut_asserteq_str("0", env_get("fred"));
|
|
ut_assertok(run_command("setexpr.q fred *0", 0));
|
|
ut_asserteq_str("456789abcdef0123", env_get("fred"));
|
|
|
|
/* default */
|
|
ut_assertok(run_command("setexpr fred 0", 0));
|
|
ut_asserteq_str("0", env_get("fred"));
|
|
ut_assertok(run_command("setexpr fred *0", 0));
|
|
ut_asserteq_str("cdef0123", env_get("fred"));
|
|
|
|
unmap_sysmem(buf);
|
|
|
|
return 0;
|
|
}
|
|
SETEXPR_TEST(setexpr_test_int, UT_TESTF_CONSOLE_REC);
|
|
|
|
/* Test 'setexpr' command with + operator */
|
|
static int setexpr_test_plus(struct unit_test_state *uts)
|
|
{
|
|
char *buf;
|
|
|
|
buf = map_sysmem(0, BUF_SIZE);
|
|
memset(buf, '\xff', BUF_SIZE);
|
|
|
|
/* byte */
|
|
buf[0x0] = 0x12;
|
|
buf[0x10] = 0x34;
|
|
ut_assertok(run_command("setexpr.b fred *0 + *10", 0));
|
|
ut_asserteq_str("46", env_get("fred"));
|
|
|
|
/* 16-bit */
|
|
*(short *)buf = 0x2345;
|
|
*(short *)(buf + 0x10) = 0xf012;
|
|
ut_assertok(run_command("setexpr.w fred *0 + *10", 0));
|
|
ut_asserteq_str("11357", env_get("fred"));
|
|
|
|
/* 32-bit */
|
|
*(u32 *)buf = 0x3456789a;
|
|
*(u32 *)(buf + 0x10) = 0xc3384235;
|
|
ut_assertok(run_command("setexpr.l fred *0 + *10", 0));
|
|
ut_asserteq_str("f78ebacf", env_get("fred"));
|
|
|
|
/* 64-bit */
|
|
*(u64 *)buf = 0x456789abcdef0123;
|
|
*(u64 *)(buf + 0x10) = 0x4987328372849283;
|
|
ut_assertok(run_command("setexpr.q fred *0 + *10", 0));
|
|
ut_asserteq_str("8eeebc2f407393a6", env_get("fred"));
|
|
|
|
/* default */
|
|
ut_assertok(run_command("setexpr fred *0 + *10", 0));
|
|
ut_asserteq_str("1407393a6", env_get("fred"));
|
|
|
|
unmap_sysmem(buf);
|
|
|
|
return 0;
|
|
}
|
|
SETEXPR_TEST(setexpr_test_plus, UT_TESTF_CONSOLE_REC);
|
|
|
|
/* Test 'setexpr' command with other operators */
|
|
static int setexpr_test_oper(struct unit_test_state *uts)
|
|
{
|
|
char *buf;
|
|
|
|
buf = map_sysmem(0, BUF_SIZE);
|
|
memset(buf, '\xff', BUF_SIZE);
|
|
|
|
*(u32 *)buf = 0x1234;
|
|
*(u32 *)(buf + 0x10) = 0x560000;
|
|
|
|
/* Quote | to avoid confusing hush */
|
|
ut_assertok(run_command("setexpr fred *0 \"|\" *10", 0));
|
|
ut_asserteq_str("561234", env_get("fred"));
|
|
|
|
*(u32 *)buf = 0x561200;
|
|
*(u32 *)(buf + 0x10) = 0x1234;
|
|
|
|
/* Quote & to avoid confusing hush */
|
|
ut_assertok(run_command("setexpr.l fred *0 \"&\" *10", 0));
|
|
ut_asserteq_str("1200", env_get("fred"));
|
|
|
|
ut_assertok(run_command("setexpr.l fred *0 ^ *10", 0));
|
|
ut_asserteq_str("560034", env_get("fred"));
|
|
|
|
ut_assertok(run_command("setexpr.l fred *0 - *10", 0));
|
|
ut_asserteq_str("55ffcc", env_get("fred"));
|
|
|
|
ut_assertok(run_command("setexpr.l fred *0 * *10", 0));
|
|
ut_asserteq_str("61ebfa800", env_get("fred"));
|
|
|
|
ut_assertok(run_command("setexpr.l fred *0 / *10", 0));
|
|
ut_asserteq_str("4ba", env_get("fred"));
|
|
|
|
ut_assertok(run_command("setexpr.l fred *0 % *10", 0));
|
|
ut_asserteq_str("838", env_get("fred"));
|
|
|
|
unmap_sysmem(buf);
|
|
|
|
return 0;
|
|
}
|
|
SETEXPR_TEST(setexpr_test_oper, UT_TESTF_CONSOLE_REC);
|
|
|
|
/* Test 'setexpr' command with regex */
|
|
static int setexpr_test_regex(struct unit_test_state *uts)
|
|
{
|
|
char *buf, *val;
|
|
|
|
buf = map_sysmem(0, BUF_SIZE);
|
|
|
|
/* Single substitution */
|
|
ut_assertok(run_command("setenv fred 'this is a test'", 0));
|
|
ut_assertok(run_command("setexpr fred sub is us", 0));
|
|
val = env_get("fred");
|
|
ut_asserteq_str("thus is a test", val);
|
|
|
|
/* Global substitution */
|
|
ut_assertok(run_command("setenv fred 'this is a test'", 0));
|
|
ut_assertok(run_command("setexpr fred gsub is us", 0));
|
|
val = env_get("fred");
|
|
ut_asserteq_str("thus us a test", val);
|
|
|
|
/* Global substitution */
|
|
ut_assertok(run_command("setenv fred 'this is a test'", 0));
|
|
ut_assertok(run_command("setenv mary 'this is a test'", 0));
|
|
ut_assertok(run_command("setexpr fred gsub is us \"${mary}\"", 0));
|
|
val = env_get("fred");
|
|
ut_asserteq_str("thus us a test", val);
|
|
val = env_get("mary");
|
|
ut_asserteq_str("this is a test", val);
|
|
|
|
unmap_sysmem(buf);
|
|
|
|
return 0;
|
|
}
|
|
SETEXPR_TEST(setexpr_test_regex, UT_TESTF_CONSOLE_REC);
|
|
|
|
/* Test 'setexpr' command with regex replacement that expands the string */
|
|
static int setexpr_test_regex_inc(struct unit_test_state *uts)
|
|
{
|
|
char *buf, *val;
|
|
|
|
buf = map_sysmem(0, BUF_SIZE);
|
|
|
|
ut_assertok(run_command("setenv fred 'this is a test'", 0));
|
|
ut_assertok(run_command("setexpr fred gsub is much_longer_string", 0));
|
|
val = env_get("fred");
|
|
ut_asserteq_str("thmuch_longer_string much_longer_string a test", val);
|
|
unmap_sysmem(buf);
|
|
|
|
return 0;
|
|
}
|
|
SETEXPR_TEST(setexpr_test_regex_inc, UT_TESTF_CONSOLE_REC);
|
|
|
|
/* Test setexpr_regex_sub() directly to check buffer usage */
|
|
static int setexpr_test_sub(struct unit_test_state *uts)
|
|
{
|
|
char *buf, *nbuf;
|
|
int i;
|
|
|
|
buf = map_sysmem(0, BUF_SIZE);
|
|
nbuf = map_sysmem(0x1000, BUF_SIZE);
|
|
|
|
/* Add a pattern so we can check the buffer limits */
|
|
memset(buf, '\xff', BUF_SIZE);
|
|
memset(nbuf, '\xff', BUF_SIZE);
|
|
for (i = BUF_SIZE; i < 0x1000; i++) {
|
|
buf[i] = i & 0xff;
|
|
nbuf[i] = i & 0xff;
|
|
}
|
|
strcpy(buf, "this is a test");
|
|
|
|
/*
|
|
* This is a regression test, since a bug was found in the use of
|
|
* memmove() in setexpr
|
|
*/
|
|
ut_assertok(setexpr_regex_sub(buf, BUF_SIZE, nbuf, BUF_SIZE, "is",
|
|
"us it is longer", true));
|
|
ut_asserteq_str("thus it is longer us it is longer a test", buf);
|
|
for (i = BUF_SIZE; i < 0x1000; i++) {
|
|
ut_assertf(buf[i] == (char)i,
|
|
"buf byte at %x should be %02x, got %02x)\n",
|
|
i, i & 0xff, (u8)buf[i]);
|
|
ut_assertf(nbuf[i] == (char)i,
|
|
"nbuf byte at %x should be %02x, got %02x)\n",
|
|
i, i & 0xff, (u8)nbuf[i]);
|
|
}
|
|
|
|
unmap_sysmem(buf);
|
|
|
|
return 0;
|
|
}
|
|
SETEXPR_TEST(setexpr_test_sub, UT_TESTF_CONSOLE_REC);
|
|
|
|
/* Test setexpr_regex_sub() with back references */
|
|
static int setexpr_test_backref(struct unit_test_state *uts)
|
|
{
|
|
char *buf, *nbuf;
|
|
int i;
|
|
|
|
buf = map_sysmem(0, BUF_SIZE);
|
|
nbuf = map_sysmem(0x1000, BUF_SIZE);
|
|
|
|
/* Add a pattern so we can check the buffer limits */
|
|
memset(buf, '\xff', BUF_SIZE);
|
|
memset(nbuf, '\xff', BUF_SIZE);
|
|
for (i = BUF_SIZE; i < 0x1000; i++) {
|
|
buf[i] = i & 0xff;
|
|
nbuf[i] = i & 0xff;
|
|
}
|
|
strcpy(buf, "this is surely a test is it? yes this is indeed a test");
|
|
|
|
/*
|
|
* This is a regression test, since a bug was found in the use of
|
|
* memmove() in setexpr
|
|
*/
|
|
ut_assertok(setexpr_regex_sub(buf, BUF_SIZE, nbuf, BUF_SIZE,
|
|
"(this) (is) (surely|indeed)",
|
|
"us \\1 \\2 \\3!", true));
|
|
ut_asserteq_str("us this is surely! a test is it? yes us this is indeed! a test",
|
|
buf);
|
|
|
|
/* The following checks fail at present due to a bug in setexpr */
|
|
return 0;
|
|
for (i = BUF_SIZE; i < 0x1000; i++) {
|
|
ut_assertf(buf[i] == (char)i,
|
|
"buf byte at %x should be %02x, got %02x)\n",
|
|
i, i & 0xff, (u8)buf[i]);
|
|
ut_assertf(nbuf[i] == (char)i,
|
|
"nbuf byte at %x should be %02x, got %02x)\n",
|
|
i, i & 0xff, (u8)nbuf[i]);
|
|
}
|
|
|
|
unmap_sysmem(buf);
|
|
|
|
return 0;
|
|
}
|
|
SETEXPR_TEST(setexpr_test_backref, UT_TESTF_CONSOLE_REC);
|
|
|
|
/* Test 'setexpr' command with setting strings */
|
|
static int setexpr_test_str(struct unit_test_state *uts)
|
|
{
|
|
ulong start_mem;
|
|
char *buf;
|
|
|
|
buf = map_sysmem(0, BUF_SIZE);
|
|
memset(buf, '\xff', BUF_SIZE);
|
|
|
|
/*
|
|
* Set 'fred' to the same length as we expect to get below, to avoid a
|
|
* new allocation in 'setexpr'. That way we can check for memory leaks.
|
|
*/
|
|
ut_assertok(env_set("fred", "x"));
|
|
start_mem = ut_check_free();
|
|
strcpy(buf, "hello");
|
|
ut_asserteq(1, run_command("setexpr.s fred 0", 0));
|
|
ut_assertok(ut_check_delta(start_mem));
|
|
|
|
start_mem = ut_check_free();
|
|
ut_assertok(env_set("fred", "12345"));
|
|
ut_assertok(run_command("setexpr.s fred *0", 0));
|
|
ut_asserteq_str("hello", env_get("fred"));
|
|
ut_assertok(ut_check_delta(start_mem));
|
|
|
|
unmap_sysmem(buf);
|
|
|
|
return 0;
|
|
}
|
|
SETEXPR_TEST(setexpr_test_str, UT_TESTF_CONSOLE_REC);
|
|
|
|
|
|
/* Test 'setexpr' command with concatenating strings */
|
|
static int setexpr_test_str_oper(struct unit_test_state *uts)
|
|
{
|
|
ulong start_mem;
|
|
char *buf;
|
|
|
|
buf = map_sysmem(0, BUF_SIZE);
|
|
memset(buf, '\xff', BUF_SIZE);
|
|
strcpy(buf, "hello");
|
|
strcpy(buf + 0x10, " there");
|
|
|
|
ut_assertok(console_record_reset_enable());
|
|
start_mem = ut_check_free();
|
|
ut_asserteq(1, run_command("setexpr.s fred *0 * *10", 0));
|
|
ut_assertok(ut_check_delta(start_mem));
|
|
ut_assert_nextline("invalid op");
|
|
ut_assert_console_end();
|
|
|
|
/*
|
|
* Set 'fred' to the same length as we expect to get below, to avoid a
|
|
* new allocation in 'setexpr'. That way we can check for memory leaks.
|
|
*/
|
|
ut_assertok(env_set("fred", "12345012345"));
|
|
start_mem = ut_check_free();
|
|
ut_assertok(run_command("setexpr.s fred *0 + *10", 0));
|
|
ut_asserteq_str("hello there", env_get("fred"));
|
|
ut_assertok(ut_check_delta(start_mem));
|
|
|
|
unmap_sysmem(buf);
|
|
|
|
return 0;
|
|
}
|
|
SETEXPR_TEST(setexpr_test_str_oper, UT_TESTF_CONSOLE_REC);
|
|
|
|
/* Test 'setexpr' command with a string that is too long */
|
|
static int setexpr_test_str_long(struct unit_test_state *uts)
|
|
{
|
|
const int size = 128 << 10; /* setexpr strings are a max of 64KB */
|
|
char *buf, *val;
|
|
|
|
buf = map_sysmem(0, size);
|
|
memset(buf, 'a', size);
|
|
|
|
/* String should be truncated to 64KB */
|
|
ut_assertok(run_command("setexpr.s fred *0", 0));
|
|
val = env_get("fred");
|
|
ut_asserteq(64 << 10, strlen(val));
|
|
|
|
unmap_sysmem(buf);
|
|
|
|
return 0;
|
|
}
|
|
SETEXPR_TEST(setexpr_test_str_long, UT_TESTF_CONSOLE_REC);
|
|
|
|
int do_ut_setexpr(struct cmd_tbl *cmdtp, int flag, int argc, char *const argv[])
|
|
{
|
|
struct unit_test *tests = ll_entry_start(struct unit_test,
|
|
setexpr_test);
|
|
const int n_ents = ll_entry_count(struct unit_test, setexpr_test);
|
|
|
|
return cmd_ut_category("cmd_setexpr", "cmd_mem_", tests, n_ents, argc,
|
|
argv);
|
|
}
|