blob: 12976005e418eb2c92081cbdb7a2f6e90f698fd3 [file] [log] [blame]
Simon Glassfb1451b2022-04-24 23:31:24 -06001// SPDX-License-Identifier: GPL-2.0+
2/*
3 * Test for bootdev functions. All start with 'bootdev'
4 *
5 * Copyright 2021 Google LLC
6 * Written by Simon Glass <sjg@chromium.org>
7 */
8
9#include <common.h>
10#include <bootdev.h>
11#include <bootflow.h>
Simon Glass0917f772022-07-30 15:52:34 -060012#include <bootmeth.h>
Simon Glassfb1451b2022-04-24 23:31:24 -060013#include <bootstd.h>
Simon Glassd985f1d2023-01-06 08:52:41 -060014#include <cli.h>
Simon Glassfb1451b2022-04-24 23:31:24 -060015#include <dm.h>
Simon Glasse64c2952023-01-06 08:52:42 -060016#include <expo.h>
Simon Glass11361c52022-07-30 15:52:36 -060017#ifdef CONFIG_SANDBOX
Simon Glass2662b542022-07-30 15:52:22 -060018#include <asm/test.h>
Simon Glass11361c52022-07-30 15:52:36 -060019#endif
Simon Glassd985f1d2023-01-06 08:52:41 -060020#include <dm/device-internal.h>
Simon Glassfb1451b2022-04-24 23:31:24 -060021#include <dm/lists.h>
22#include <test/suites.h>
23#include <test/ut.h>
24#include "bootstd_common.h"
Simon Glasse64c2952023-01-06 08:52:42 -060025#include "../../boot/bootflow_internal.h"
26#include "../../boot/scene_internal.h"
Simon Glassfb1451b2022-04-24 23:31:24 -060027
Simon Glassd985f1d2023-01-06 08:52:41 -060028DECLARE_GLOBAL_DATA_PTR;
29
30extern U_BOOT_DRIVER(bootmeth_script);
31
Simon Glassf25f5752022-07-30 15:52:16 -060032static int inject_response(struct unit_test_state *uts)
33{
34 /*
35 * The image being booted presents a menu of options:
36 *
37 * Fedora-Workstation-armhfp-31-1.9 Boot Options.
38 * 1: Fedora-Workstation-armhfp-31-1.9 (5.3.7-301.fc31.armv7hl)
39 * Enter choice:
40 *
41 * Provide input for this, to avoid waiting two seconds for a timeout.
42 */
43 ut_asserteq(2, console_in_puts("1\n"));
44
45 return 0;
46}
47
Simon Glassfb1451b2022-04-24 23:31:24 -060048/* Check 'bootflow scan/list' commands */
49static int bootflow_cmd(struct unit_test_state *uts)
50{
51 console_record_reset_enable();
52 ut_assertok(run_command("bootdev select 1", 0));
53 ut_assert_console_end();
54 ut_assertok(run_command("bootflow scan -l", 0));
55 ut_assert_nextline("Scanning for bootflows in bootdev 'mmc1.bootdev'");
56 ut_assert_nextline("Seq Method State Uclass Part Name Filename");
57 ut_assert_nextlinen("---");
58 ut_assert_nextline(" 0 syslinux ready mmc 1 mmc1.bootdev.part_1 /extlinux/extlinux.conf");
59 ut_assert_nextlinen("---");
60 ut_assert_nextline("(1 bootflow, 1 valid)");
61 ut_assert_console_end();
62
63 ut_assertok(run_command("bootflow list", 0));
64 ut_assert_nextline("Showing bootflows for bootdev 'mmc1.bootdev'");
65 ut_assert_nextline("Seq Method State Uclass Part Name Filename");
66 ut_assert_nextlinen("---");
67 ut_assert_nextline(" 0 syslinux ready mmc 1 mmc1.bootdev.part_1 /extlinux/extlinux.conf");
68 ut_assert_nextlinen("---");
69 ut_assert_nextline("(1 bootflow, 1 valid)");
70 ut_assert_console_end();
71
72 return 0;
73}
74BOOTSTD_TEST(bootflow_cmd, UT_TESTF_DM | UT_TESTF_SCAN_FDT);
75
76/* Check 'bootflow scan' with a name / label / seq */
77static int bootflow_cmd_label(struct unit_test_state *uts)
78{
79 console_record_reset_enable();
80 ut_assertok(run_command("bootflow scan -l mmc1", 0));
81 ut_assert_nextline("Scanning for bootflows in bootdev 'mmc1.bootdev'");
82 ut_assert_skip_to_line("(1 bootflow, 1 valid)");
83 ut_assert_console_end();
84
85 ut_assertok(run_command("bootflow scan -l mmc0.bootdev", 0));
86 ut_assert_nextline("Scanning for bootflows in bootdev 'mmc0.bootdev'");
87 ut_assert_skip_to_line("(0 bootflows, 0 valid)");
88 ut_assert_console_end();
89
90 ut_assertok(run_command("bootflow scan -l 0", 0));
91 ut_assert_nextline("Scanning for bootflows in bootdev 'mmc2.bootdev'");
92 ut_assert_skip_to_line("(0 bootflows, 0 valid)");
93 ut_assert_console_end();
94
95 return 0;
96}
97BOOTSTD_TEST(bootflow_cmd_label, UT_TESTF_DM | UT_TESTF_SCAN_FDT);
98
99/* Check 'bootflow scan/list' commands using all bootdevs */
100static int bootflow_cmd_glob(struct unit_test_state *uts)
101{
102 ut_assertok(bootstd_test_drop_bootdev_order(uts));
103
104 console_record_reset_enable();
Simon Glass0917f772022-07-30 15:52:34 -0600105 ut_assertok(run_command("bootflow scan -lG", 0));
Simon Glassfb1451b2022-04-24 23:31:24 -0600106 ut_assert_nextline("Scanning for bootflows in all bootdevs");
107 ut_assert_nextline("Seq Method State Uclass Part Name Filename");
108 ut_assert_nextlinen("---");
109 ut_assert_nextline("Scanning bootdev 'mmc2.bootdev':");
110 ut_assert_nextline("Scanning bootdev 'mmc1.bootdev':");
111 ut_assert_nextline(" 0 syslinux ready mmc 1 mmc1.bootdev.part_1 /extlinux/extlinux.conf");
112 ut_assert_nextline("Scanning bootdev 'mmc0.bootdev':");
113 ut_assert_nextline("No more bootdevs");
114 ut_assert_nextlinen("---");
115 ut_assert_nextline("(1 bootflow, 1 valid)");
116 ut_assert_console_end();
117
118 ut_assertok(run_command("bootflow list", 0));
119 ut_assert_nextline("Showing all bootflows");
120 ut_assert_nextline("Seq Method State Uclass Part Name Filename");
121 ut_assert_nextlinen("---");
122 ut_assert_nextline(" 0 syslinux ready mmc 1 mmc1.bootdev.part_1 /extlinux/extlinux.conf");
123 ut_assert_nextlinen("---");
124 ut_assert_nextline("(1 bootflow, 1 valid)");
125 ut_assert_console_end();
126
127 return 0;
128}
129BOOTSTD_TEST(bootflow_cmd_glob, UT_TESTF_DM | UT_TESTF_SCAN_FDT);
130
131/* Check 'bootflow scan -e' */
132static int bootflow_cmd_scan_e(struct unit_test_state *uts)
133{
134 ut_assertok(bootstd_test_drop_bootdev_order(uts));
135
136 console_record_reset_enable();
Simon Glass0917f772022-07-30 15:52:34 -0600137 ut_assertok(run_command("bootflow scan -aleG", 0));
Simon Glassfb1451b2022-04-24 23:31:24 -0600138 ut_assert_nextline("Scanning for bootflows in all bootdevs");
139 ut_assert_nextline("Seq Method State Uclass Part Name Filename");
140 ut_assert_nextlinen("---");
141 ut_assert_nextline("Scanning bootdev 'mmc2.bootdev':");
142 ut_assert_nextline(" 0 syslinux media mmc 0 mmc2.bootdev.whole <NULL>");
143 ut_assert_nextline(" ** No partition found, err=-93");
144 ut_assert_nextline(" 1 efi media mmc 0 mmc2.bootdev.whole <NULL>");
145 ut_assert_nextline(" ** No partition found, err=-93");
146
147 ut_assert_nextline("Scanning bootdev 'mmc1.bootdev':");
148 ut_assert_nextline(" 2 syslinux media mmc 0 mmc1.bootdev.whole <NULL>");
149 ut_assert_nextline(" ** No partition found, err=-2");
150 ut_assert_nextline(" 3 efi media mmc 0 mmc1.bootdev.whole <NULL>");
151 ut_assert_nextline(" ** No partition found, err=-2");
152 ut_assert_nextline(" 4 syslinux ready mmc 1 mmc1.bootdev.part_1 /extlinux/extlinux.conf");
153 ut_assert_nextline(" 5 efi fs mmc 1 mmc1.bootdev.part_1 efi/boot/bootsbox.efi");
154
155 ut_assert_skip_to_line("Scanning bootdev 'mmc0.bootdev':");
156 ut_assert_skip_to_line(" 3f efi media mmc 0 mmc0.bootdev.whole <NULL>");
157 ut_assert_nextline(" ** No partition found, err=-93");
158 ut_assert_nextline("No more bootdevs");
159 ut_assert_nextlinen("---");
160 ut_assert_nextline("(64 bootflows, 1 valid)");
161 ut_assert_console_end();
162
163 ut_assertok(run_command("bootflow list", 0));
164 ut_assert_nextline("Showing all bootflows");
165 ut_assert_nextline("Seq Method State Uclass Part Name Filename");
166 ut_assert_nextlinen("---");
167 ut_assert_nextline(" 0 syslinux media mmc 0 mmc2.bootdev.whole <NULL>");
168 ut_assert_nextline(" 1 efi media mmc 0 mmc2.bootdev.whole <NULL>");
169 ut_assert_skip_to_line(" 4 syslinux ready mmc 1 mmc1.bootdev.part_1 /extlinux/extlinux.conf");
170 ut_assert_skip_to_line(" 3f efi media mmc 0 mmc0.bootdev.whole <NULL>");
171 ut_assert_nextlinen("---");
172 ut_assert_nextline("(64 bootflows, 1 valid)");
173 ut_assert_console_end();
174
175 return 0;
176}
177BOOTSTD_TEST(bootflow_cmd_scan_e, UT_TESTF_DM | UT_TESTF_SCAN_FDT);
178
179/* Check 'bootflow info' */
180static int bootflow_cmd_info(struct unit_test_state *uts)
181{
182 console_record_reset_enable();
183 ut_assertok(run_command("bootdev select 1", 0));
184 ut_assert_console_end();
185 ut_assertok(run_command("bootflow scan", 0));
186 ut_assert_console_end();
187 ut_assertok(run_command("bootflow select 0", 0));
188 ut_assert_console_end();
189 ut_assertok(run_command("bootflow info", 0));
190 ut_assert_nextline("Name: mmc1.bootdev.part_1");
191 ut_assert_nextline("Device: mmc1.bootdev");
192 ut_assert_nextline("Block dev: mmc1.blk");
193 ut_assert_nextline("Method: syslinux");
194 ut_assert_nextline("State: ready");
195 ut_assert_nextline("Partition: 1");
196 ut_assert_nextline("Subdir: (none)");
197 ut_assert_nextline("Filename: /extlinux/extlinux.conf");
198 ut_assert_nextlinen("Buffer: ");
199 ut_assert_nextline("Size: 253 (595 bytes)");
Simon Glass2175e762023-01-06 08:52:33 -0600200 ut_assert_nextline("OS: Fedora-Workstation-armhfp-31-1.9 (5.3.7-301.fc31.armv7hl)");
Simon Glass24d8e1b2023-01-06 08:52:34 -0600201 ut_assert_nextline("Logo: (none)");
Simon Glassfb1451b2022-04-24 23:31:24 -0600202 ut_assert_nextline("Error: 0");
203 ut_assert_console_end();
204
205 ut_assertok(run_command("bootflow info -d", 0));
206 ut_assert_nextline("Name: mmc1.bootdev.part_1");
207 ut_assert_skip_to_line("Error: 0");
208 ut_assert_nextline("Contents:");
209 ut_assert_nextline("%s", "");
210 ut_assert_nextline("# extlinux.conf generated by appliance-creator");
211 ut_assert_skip_to_line(" initrd /initramfs-5.3.7-301.fc31.armv7hl.img");
212 ut_assert_console_end();
213
214 return 0;
215}
216BOOTSTD_TEST(bootflow_cmd_info, UT_TESTF_DM | UT_TESTF_SCAN_FDT);
217
218/* Check 'bootflow scan -b' to boot the first available bootdev */
219static int bootflow_scan_boot(struct unit_test_state *uts)
220{
221 console_record_reset_enable();
Simon Glassf25f5752022-07-30 15:52:16 -0600222 ut_assertok(inject_response(uts));
Simon Glassfb1451b2022-04-24 23:31:24 -0600223 ut_assertok(run_command("bootflow scan -b", 0));
224 ut_assert_nextline(
225 "** Booting bootflow 'mmc1.bootdev.part_1' with syslinux");
226 ut_assert_nextline("Ignoring unknown command: ui");
227
228 /*
229 * We expect it to get through to boot although sandbox always returns
230 * -EFAULT as it cannot actually boot the kernel
231 */
232 ut_assert_skip_to_line("sandbox: continuing, as we cannot run Linux");
233 ut_assert_nextline("Boot failed (err=-14)");
234 ut_assert_console_end();
235
236 return 0;
237}
238BOOTSTD_TEST(bootflow_scan_boot, UT_TESTF_DM | UT_TESTF_SCAN_FDT);
239
240/* Check iterating through available bootflows */
241static int bootflow_iter(struct unit_test_state *uts)
242{
243 struct bootflow_iter iter;
244 struct bootflow bflow;
245
246 bootstd_clear_glob();
247
248 /* The first device is mmc2.bootdev which has no media */
249 ut_asserteq(-EPROTONOSUPPORT,
Simon Glass0917f772022-07-30 15:52:34 -0600250 bootflow_scan_first(&iter, BOOTFLOWF_ALL | BOOTFLOWF_SKIP_GLOBAL, &bflow));
Simon Glassfb1451b2022-04-24 23:31:24 -0600251 ut_asserteq(2, iter.num_methods);
252 ut_asserteq(0, iter.cur_method);
253 ut_asserteq(0, iter.part);
254 ut_asserteq(0, iter.max_part);
255 ut_asserteq_str("syslinux", iter.method->name);
256 ut_asserteq(0, bflow.err);
257
258 /*
Simon Glass0917f772022-07-30 15:52:34 -0600259 * This shows MEDIA even though there is none, since in
Simon Glassfb1451b2022-04-24 23:31:24 -0600260 * bootdev_find_in_blk() we call part_get_info() which returns
261 * -EPROTONOSUPPORT. Ideally it would return -EEOPNOTSUPP and we would
262 * know.
263 */
264 ut_asserteq(BOOTFLOWST_MEDIA, bflow.state);
265
266 ut_asserteq(-EPROTONOSUPPORT, bootflow_scan_next(&iter, &bflow));
267 ut_asserteq(2, iter.num_methods);
268 ut_asserteq(1, iter.cur_method);
269 ut_asserteq(0, iter.part);
270 ut_asserteq(0, iter.max_part);
271 ut_asserteq_str("efi", iter.method->name);
272 ut_asserteq(0, bflow.err);
273 ut_asserteq(BOOTFLOWST_MEDIA, bflow.state);
274 bootflow_free(&bflow);
275
276 /* The next device is mmc1.bootdev - at first we use the whole device */
277 ut_asserteq(-ENOENT, bootflow_scan_next(&iter, &bflow));
278 ut_asserteq(2, iter.num_methods);
279 ut_asserteq(0, iter.cur_method);
280 ut_asserteq(0, iter.part);
281 ut_asserteq(0x1e, iter.max_part);
282 ut_asserteq_str("syslinux", iter.method->name);
283 ut_asserteq(0, bflow.err);
284 ut_asserteq(BOOTFLOWST_MEDIA, bflow.state);
285 bootflow_free(&bflow);
286
287 ut_asserteq(-ENOENT, bootflow_scan_next(&iter, &bflow));
288 ut_asserteq(2, iter.num_methods);
289 ut_asserteq(1, iter.cur_method);
290 ut_asserteq(0, iter.part);
291 ut_asserteq(0x1e, iter.max_part);
292 ut_asserteq_str("efi", iter.method->name);
293 ut_asserteq(0, bflow.err);
294 ut_asserteq(BOOTFLOWST_MEDIA, bflow.state);
295 bootflow_free(&bflow);
296
297 /* Then more to partition 1 where we find something */
298 ut_assertok(bootflow_scan_next(&iter, &bflow));
299 ut_asserteq(2, iter.num_methods);
300 ut_asserteq(0, iter.cur_method);
301 ut_asserteq(1, iter.part);
302 ut_asserteq(0x1e, iter.max_part);
303 ut_asserteq_str("syslinux", iter.method->name);
304 ut_asserteq(0, bflow.err);
305 ut_asserteq(BOOTFLOWST_READY, bflow.state);
306 bootflow_free(&bflow);
307
308 ut_asserteq(-ENOENT, bootflow_scan_next(&iter, &bflow));
309 ut_asserteq(2, iter.num_methods);
310 ut_asserteq(1, iter.cur_method);
311 ut_asserteq(1, iter.part);
312 ut_asserteq(0x1e, iter.max_part);
313 ut_asserteq_str("efi", iter.method->name);
314 ut_asserteq(0, bflow.err);
315 ut_asserteq(BOOTFLOWST_FS, bflow.state);
316 bootflow_free(&bflow);
317
318 /* Then more to partition 2 which doesn't exist */
319 ut_asserteq(-ENOENT, bootflow_scan_next(&iter, &bflow));
320 ut_asserteq(2, iter.num_methods);
321 ut_asserteq(0, iter.cur_method);
322 ut_asserteq(2, iter.part);
323 ut_asserteq(0x1e, iter.max_part);
324 ut_asserteq_str("syslinux", iter.method->name);
325 ut_asserteq(0, bflow.err);
326 ut_asserteq(BOOTFLOWST_MEDIA, bflow.state);
327 bootflow_free(&bflow);
328
329 bootflow_iter_uninit(&iter);
330
331 ut_assert_console_end();
332
333 return 0;
334}
335BOOTSTD_TEST(bootflow_iter, UT_TESTF_DM | UT_TESTF_SCAN_FDT);
336
Simon Glass11361c52022-07-30 15:52:36 -0600337#if defined(CONFIG_SANDBOX) && defined(CONFIG_BOOTMETH_GLOBAL)
Simon Glassfb1451b2022-04-24 23:31:24 -0600338/* Check using the system bootdev */
339static int bootflow_system(struct unit_test_state *uts)
340{
Simon Glassecb274c2023-01-17 10:47:23 -0700341 struct udevice *bootstd, *dev;
Simon Glassfb1451b2022-04-24 23:31:24 -0600342
Simon Glassae0bf222022-10-11 09:47:20 -0600343 if (!IS_ENABLED(CONFIG_CMD_BOOTEFI_BOOTMGR))
Simon Glassc43635b2022-10-20 18:22:49 -0600344 return -EAGAIN;
Simon Glassecb274c2023-01-17 10:47:23 -0700345 ut_assertok(uclass_first_device_err(UCLASS_BOOTSTD, &bootstd));
346 ut_assertok(device_bind(bootstd, DM_DRIVER_GET(bootmeth_efi_mgr),
347 "efi_mgr", 0, ofnode_null(), &dev));
348 ut_assertok(device_probe(dev));
Simon Glass2662b542022-07-30 15:52:22 -0600349 sandbox_set_fake_efi_mgr_dev(dev, true);
Simon Glassfb1451b2022-04-24 23:31:24 -0600350
Simon Glassfb1451b2022-04-24 23:31:24 -0600351 /* We should get a single 'bootmgr' method right at the end */
352 bootstd_clear_glob();
353 console_record_reset_enable();
354 ut_assertok(run_command("bootflow scan -l", 0));
Simon Glassc627cfc2022-07-30 15:52:27 -0600355 ut_assert_skip_to_line(
Simon Glassbd18b692022-07-30 15:52:28 -0600356 " 0 efi_mgr ready (none) 0 <NULL> <NULL>");
Simon Glassc627cfc2022-07-30 15:52:27 -0600357 ut_assert_skip_to_line("No more bootdevs");
Simon Glassecb274c2023-01-17 10:47:23 -0700358 ut_assert_skip_to_line("(2 bootflows, 2 valid)");
Simon Glassfb1451b2022-04-24 23:31:24 -0600359 ut_assert_console_end();
360
361 return 0;
362}
Simon Glassbd18b692022-07-30 15:52:28 -0600363BOOTSTD_TEST(bootflow_system, UT_TESTF_DM | UT_TESTF_SCAN_PDATA |
364 UT_TESTF_SCAN_FDT);
Simon Glass11361c52022-07-30 15:52:36 -0600365#endif
Simon Glassfb1451b2022-04-24 23:31:24 -0600366
367/* Check disabling a bootmethod if it requests it */
368static int bootflow_iter_disable(struct unit_test_state *uts)
369{
370 struct udevice *bootstd, *dev;
371 struct bootflow_iter iter;
372 struct bootflow bflow;
373 int i;
374
375 /* Add the EFI bootmgr driver */
376 ut_assertok(uclass_first_device_err(UCLASS_BOOTSTD, &bootstd));
377 ut_assertok(device_bind_driver(bootstd, "bootmeth_sandbox", "sandbox",
378 &dev));
379
Simon Glassfb1451b2022-04-24 23:31:24 -0600380 ut_assertok(bootstd_test_drop_bootdev_order(uts));
381
382 bootstd_clear_glob();
Simon Glassf25f5752022-07-30 15:52:16 -0600383 console_record_reset_enable();
384 ut_assertok(inject_response(uts));
Simon Glassfb1451b2022-04-24 23:31:24 -0600385 ut_assertok(run_command("bootflow scan -lb", 0));
386
387 /* Try to boot the bootmgr flow, which will fail */
388 console_record_reset_enable();
389 ut_assertok(bootflow_scan_first(&iter, 0, &bflow));
390 ut_asserteq(3, iter.num_methods);
391 ut_asserteq_str("sandbox", iter.method->name);
Simon Glassf25f5752022-07-30 15:52:16 -0600392 ut_assertok(inject_response(uts));
Simon Glassfb1451b2022-04-24 23:31:24 -0600393 ut_asserteq(-ENOTSUPP, bootflow_run_boot(&iter, &bflow));
394
395 ut_assert_skip_to_line("Boot method 'sandbox' failed and will not be retried");
396 ut_assert_console_end();
397
398 /* Check that the sandbox bootmeth has been removed */
399 ut_asserteq(2, iter.num_methods);
400 for (i = 0; i < iter.num_methods; i++)
401 ut_assert(strcmp("sandbox", iter.method_order[i]->name));
402
403 return 0;
404}
405BOOTSTD_TEST(bootflow_iter_disable, UT_TESTF_DM | UT_TESTF_SCAN_FDT);
406
Simon Glass0917f772022-07-30 15:52:34 -0600407/* Check 'bootflow scan' with a bootmeth ordering including a global bootmeth */
408static int bootflow_scan_glob_bootmeth(struct unit_test_state *uts)
409{
Simon Glass11361c52022-07-30 15:52:36 -0600410 if (!IS_ENABLED(CONFIG_BOOTMETH_GLOBAL))
Simon Glassc43635b2022-10-20 18:22:49 -0600411 return -EAGAIN;
Simon Glass11361c52022-07-30 15:52:36 -0600412
Simon Glass0917f772022-07-30 15:52:34 -0600413 ut_assertok(bootstd_test_drop_bootdev_order(uts));
414
415 /*
416 * Make sure that the -G flag makes the scan fail, since this is not
417 * supported when an ordering is provided
418 */
419 console_record_reset_enable();
420 ut_assertok(bootmeth_set_order("efi firmware0"));
421 ut_assertok(run_command("bootflow scan -lG", 0));
422 ut_assert_nextline("Scanning for bootflows in all bootdevs");
423 ut_assert_nextline(
424 "Seq Method State Uclass Part Name Filename");
425 ut_assert_nextlinen("---");
426 ut_assert_nextlinen("---");
427 ut_assert_nextline("(0 bootflows, 0 valid)");
428 ut_assert_console_end();
429
430 ut_assertok(run_command("bootflow scan -l", 0));
431 ut_assert_nextline("Scanning for bootflows in all bootdevs");
432 ut_assert_nextline(
433 "Seq Method State Uclass Part Name Filename");
434 ut_assert_nextlinen("---");
435 ut_assert_nextline("Scanning global bootmeth 'firmware0':");
436 ut_assert_nextline("Scanning bootdev 'mmc2.bootdev':");
437 ut_assert_nextline("Scanning bootdev 'mmc1.bootdev':");
438 ut_assert_nextline("Scanning bootdev 'mmc0.bootdev':");
439 ut_assert_nextline("No more bootdevs");
440 ut_assert_nextlinen("---");
441 ut_assert_nextline("(0 bootflows, 0 valid)");
442 ut_assert_console_end();
443
444 return 0;
445}
446BOOTSTD_TEST(bootflow_scan_glob_bootmeth, UT_TESTF_DM | UT_TESTF_SCAN_FDT);
447
Simon Glassfb1451b2022-04-24 23:31:24 -0600448/* Check 'bootflow boot' to boot a selected bootflow */
449static int bootflow_cmd_boot(struct unit_test_state *uts)
450{
451 console_record_reset_enable();
452 ut_assertok(run_command("bootdev select 1", 0));
453 ut_assert_console_end();
454 ut_assertok(run_command("bootflow scan", 0));
455 ut_assert_console_end();
456 ut_assertok(run_command("bootflow select 0", 0));
457 ut_assert_console_end();
Simon Glassf25f5752022-07-30 15:52:16 -0600458
459 ut_assertok(inject_response(uts));
Simon Glassfb1451b2022-04-24 23:31:24 -0600460 ut_asserteq(1, run_command("bootflow boot", 0));
461 ut_assert_nextline(
462 "** Booting bootflow 'mmc1.bootdev.part_1' with syslinux");
463 ut_assert_nextline("Ignoring unknown command: ui");
464
465 /*
466 * We expect it to get through to boot although sandbox always returns
467 * -EFAULT as it cannot actually boot the kernel
468 */
469 ut_assert_skip_to_line("sandbox: continuing, as we cannot run Linux");
470 ut_assert_nextline("Boot failed (err=-14)");
471 ut_assert_console_end();
472
473 return 0;
474}
475BOOTSTD_TEST(bootflow_cmd_boot, UT_TESTF_DM | UT_TESTF_SCAN_FDT);
Simon Glassd985f1d2023-01-06 08:52:41 -0600476
Simon Glasse64c2952023-01-06 08:52:42 -0600477/**
478 * prep_mmc4_bootdev() - Set up the mmc4 bootdev so we can access a fake Armbian
479 *
480 * @uts: Unit test state
481 * Returns 0 on success, -ve on failure
482 */
483static int prep_mmc4_bootdev(struct unit_test_state *uts)
Simon Glassd985f1d2023-01-06 08:52:41 -0600484{
485 static const char *order[] = {"mmc2", "mmc1", "mmc4", NULL};
486 struct udevice *dev, *bootstd;
487 struct bootstd_priv *std;
488 const char **old_order;
Simon Glassd985f1d2023-01-06 08:52:41 -0600489 ofnode node;
490
491 /* Enable the mmc4 node since we need a second bootflow */
492 node = ofnode_path("/mmc4");
493 ut_assertok(lists_bind_fdt(gd->dm_root, node, &dev, NULL, false));
494
495 /* Enable the script bootmeth too */
496 ut_assertok(uclass_first_device_err(UCLASS_BOOTSTD, &bootstd));
497 ut_assertok(device_bind(bootstd, DM_DRIVER_REF(bootmeth_script),
498 "bootmeth_script", 0, ofnode_null(), &dev));
499
500 /* Change the order to include mmc4 */
501 std = dev_get_priv(bootstd);
502 old_order = std->bootdev_order;
503 std->bootdev_order = order;
504
505 console_record_reset_enable();
506 ut_assertok(run_command("bootflow scan", 0));
507 ut_assert_console_end();
508
509 /* Restore the order used by the device tree */
510 std->bootdev_order = old_order;
511
Simon Glasse64c2952023-01-06 08:52:42 -0600512 return 0;
513}
514
515/* Check 'bootflow menu' to select a bootflow */
516static int bootflow_cmd_menu(struct unit_test_state *uts)
517{
518 char prev[3];
519
520 ut_assertok(prep_mmc4_bootdev(uts));
521
Simon Glassd985f1d2023-01-06 08:52:41 -0600522 /* Add keypresses to move to and select the second one in the list */
523 prev[0] = CTL_CH('n');
524 prev[1] = '\r';
525 prev[2] = '\0';
526 ut_asserteq(2, console_in_puts(prev));
527
528 ut_assertok(run_command("bootflow menu", 0));
529 ut_assert_nextline("Selected: Armbian");
530 ut_assert_console_end();
531
532 return 0;
533}
534BOOTSTD_TEST(bootflow_cmd_menu, UT_TESTF_DM | UT_TESTF_SCAN_FDT);
Simon Glasse64c2952023-01-06 08:52:42 -0600535
536/**
537 * check_font() - Check that the font size for an item matches expectations
538 *
539 * @uts: Unit test state
540 * @scn: Scene containing the text object
541 * @id: ID of the text object
542 * Returns 0 on success, -ve on failure
543 */
544static int check_font(struct unit_test_state *uts, struct scene *scn, uint id,
545 int font_size)
546{
547 struct scene_obj_txt *txt;
548
549 txt = scene_obj_find(scn, id, SCENEOBJT_TEXT);
550 ut_assertnonnull(txt);
551
552 ut_asserteq(font_size, txt->font_size);
553
554 return 0;
555}
556
557/* Check themes work with a bootflow menu */
558static int bootflow_menu_theme(struct unit_test_state *uts)
559{
560 const int font_size = 30;
561 struct scene *scn;
562 struct expo *exp;
563 ofnode node;
564 int i;
565
566 ut_assertok(prep_mmc4_bootdev(uts));
567
568 ut_assertok(bootflow_menu_new(&exp));
569 node = ofnode_path("/bootstd/theme");
570 ut_assert(ofnode_valid(node));
571 ut_assertok(bootflow_menu_apply_theme(exp, node));
572
573 scn = expo_lookup_scene_id(exp, MAIN);
574 ut_assertnonnull(scn);
575
576 /*
577 * Check that the txt objects have the correct font size from the
578 * device tree node: bootstd/theme
579 *
580 * Check both menu items, since there are two bootflows
581 */
582 ut_assertok(check_font(uts, scn, OBJ_PROMPT, font_size));
583 ut_assertok(check_font(uts, scn, OBJ_POINTER, font_size));
584 for (i = 0; i < 2; i++) {
585 ut_assertok(check_font(uts, scn, ITEM_DESC + i, font_size));
586 ut_assertok(check_font(uts, scn, ITEM_KEY + i, font_size));
587 ut_assertok(check_font(uts, scn, ITEM_LABEL + i, font_size));
588 }
589
590 expo_destroy(exp);
591
592 return 0;
593}
594BOOTSTD_TEST(bootflow_menu_theme, UT_TESTF_DM | UT_TESTF_SCAN_FDT);