blob: a632694a6fed42454dc82bdeeb38e7a9aa5af286 [file] [log] [blame]
.. SPDX-License-Identifier: GPL-2.0+
.. toctree::
:maxdepth: 1
Binman Tests
============
.. contents::
:depth: 2
:local:
There is some material on writing tests in the main Binman documentation
(see :doc:`package/index`). This short guide is separate so people don't
feel they have to read as much.
Code and output is mostly included verbatim, which makes the doc longer, but
avoids its becoming confusing when the output or referenced code changes in the
future.
Purpose
-------
The main purpose of tests in Binman is to make sure that Binman actually does
what it is supposed to. Various people contribute code, refactoring is done
over time, but U-Boot users (developers, SoC vendors, board vendors) rely on
Binman producing images which function correctly. Without tests, a one-line
change could unintentionally break a corner-case and the problem might not be
noticed for months. Debugging an image-generation problem with a board you
don't have can be very hard.
A secondary purpose is productivity. U-Boot contributors are busy and often
have too much on their plate. Trying to figure out why their patch broke
some other vendor's workflow can be very time-consuming and frustrating. By
building in tests from the start, this is largely avoided. If your change has
full test coverage and doesn't break any test, all is well and no one can
complain.
A lessor purpose is to document what Binman actually does. If a test covers a
feature, it works. If there is no test coverage, no one can say for sure
whether it works in all expected situations, certainly not wihout manual
effort.
In fact, strictly speaking it isn't completely clear what 'works' even means in
the case where these is no test to cover the code. We are often left guessing
as to what the documentation means, what was actually intended, etc.
Finally, code-coverage helps to remove 'zombie code', copied from elsewhere
because it looks reasonable, but not actually needed. The same situation arises
in silicon-chip design, where a part of the chip is not validated. If it isn't
validated, it can be assumed not to work, either now or later, so it is best to
remove that logic to avoid it causing problems.
Setting up
----------
Binman tests use various utility programs. Most of these are documented in
:doc:`../build/gcc`. But some are SoC-specific. To fetch these, tell Binman to
fetch or build any missing tools:
.. code-block:: bash
$ binman tool -f missing
When this completes successfully, you can list the tools. You should see
something like this:
.. code-block:: bash
$ binman tool -l
Name Version Description Path
--------------- ----------- ------------------------- ------------------------------
bootgen ****** Bootg Xilinx Bootgen /home/sglass/.binman-tools/bootgen
bzip2 1.0.8 bzip2 compression /usr/bin/bzip2
cbfstool unknown Manipulate CBFS files /home/sglass/bin/cbfstool
fdt_add_pubkey unknown Generate image for U-Boot /home/sglass/bin/fdt_add_pubkey
fdtgrep unknown Grep devicetree files /home/sglass/bin/fdtgrep
fiptool v2.11.0(rele Manipulate ATF FIP files /home/sglass/.binman-tools/fiptool
futility v0.0.1-9f2e9 Chromium OS firmware utili /home/sglass/.binman-tools/futility
gzip 1.12 gzip compression /usr/bin/gzip
ifwitool unknown Manipulate Intel IFWI file /home/sglass/.binman-tools/ifwitool
lz4 v1.9.4 lz4 compression /usr/bin/lz4
lzma_alone 9.22 beta lzma_alone compression /usr/bin/lzma_alone
lzop v1.04 lzo compression /usr/bin/lzop
mkeficapsule 2024.10-rc5- mkeficapsule tool for gene /home/sglass/bin/mkeficapsule
mkimage 2024.10-rc5- Generate image for U-Boot /home/sglass/bin/mkimage
openssl 3.0.13 30 Ja openssl cryptography toolk /usr/bin/openssl
xz 5.4.5 xz compression /usr/bin/xz
zstd v1.5.5 zstd compression /usr/bin/zstd
The tools are written to ``~/.binman-tools`` so add that to your ``PATH``.
It's fine to have some of the tools elsewhere (e.g. ``~/bin``) so long as they
are up-to-date. This allows you use the version of the tools intended for
running tests.
Now you should be able to actually run the tests:
.. code-block:: bash
$ binman test
======================== Running binman tests ========================
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
........
----------------------------------------------------------------------
Ran 568 tests in 2.578s
OK
If this doesn't work, see if you can have some missing tools. Check that the
dependencies are all there as above. If it is very slow, try installing
concurrencytest so that the tests run in parallel.
The next thing to set up is code coverage, using the -T flag:
.. code-block:: bash
$ binman test -T
======================== Running binman tests ========================
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
........
----------------------------------------------------------------------
Ran 568 tests in 17.367s
OK
99%
Name Stmts Miss Cover
---------------------------------------------------------------------------
tools/binman/__init__.py 0 0 100%
tools/binman/bintool.py 263 0 100%
tools/binman/btool/bootgen.py 21 0 100%
tools/binman/btool/btool_gzip.py 5 0 100%
tools/binman/btool/bzip2.py 5 0 100%
tools/binman/btool/cbfstool.py 24 0 100%
tools/binman/btool/cst.py 15 4 73%
tools/binman/btool/fdt_add_pubkey.py 21 0 100%
tools/binman/btool/fdtgrep.py 26 0 100%
tools/binman/btool/fiptool.py 19 0 100%
tools/binman/btool/futility.py 19 0 100%
tools/binman/btool/ifwitool.py 22 0 100%
tools/binman/btool/lz4.py 22 0 100%
tools/binman/btool/lzma_alone.py 34 0 100%
tools/binman/btool/lzop.py 5 0 100%
tools/binman/btool/mkeficapsule.py 27 0 100%
tools/binman/btool/mkimage.py 23 0 100%
tools/binman/btool/openssl.py 42 0 100%
tools/binman/btool/xz.py 5 0 100%
tools/binman/btool/zstd.py 5 0 100%
tools/binman/cbfs_util.py 376 0 100%
tools/binman/cmdline.py 90 0 100%
tools/binman/control.py 409 0 100%
tools/binman/elf.py 241 0 100%
tools/binman/entry.py 548 0 100%
tools/binman/etype/alternates_fdt.py 58 0 100%
tools/binman/etype/atf_bl31.py 5 0 100%
tools/binman/etype/atf_fip.py 67 0 100%
tools/binman/etype/blob.py 49 0 100%
tools/binman/etype/blob_dtb.py 46 0 100%
tools/binman/etype/blob_ext.py 9 0 100%
tools/binman/etype/blob_ext_list.py 32 0 100%
tools/binman/etype/blob_named_by_arg.py 9 0 100%
tools/binman/etype/blob_phase.py 22 0 100%
tools/binman/etype/cbfs.py 101 0 100%
tools/binman/etype/collection.py 30 0 100%
tools/binman/etype/cros_ec_rw.py 5 0 100%
tools/binman/etype/efi_capsule.py 59 0 100%
tools/binman/etype/efi_empty_capsule.py 33 0 100%
tools/binman/etype/encrypted.py 34 0 100%
tools/binman/etype/fdtmap.py 62 0 100%
tools/binman/etype/files.py 35 0 100%
tools/binman/etype/fill.py 13 0 100%
tools/binman/etype/fit.py 311 0 100%
tools/binman/etype/fmap.py 37 0 100%
tools/binman/etype/gbb.py 37 0 100%
tools/binman/etype/image_header.py 53 0 100%
tools/binman/etype/intel_cmc.py 4 0 100%
tools/binman/etype/intel_descriptor.py 39 0 100%
tools/binman/etype/intel_fit.py 12 0 100%
tools/binman/etype/intel_fit_ptr.py 17 0 100%
tools/binman/etype/intel_fsp.py 4 0 100%
tools/binman/etype/intel_fsp_m.py 4 0 100%
tools/binman/etype/intel_fsp_s.py 4 0 100%
tools/binman/etype/intel_fsp_t.py 4 0 100%
tools/binman/etype/intel_ifwi.py 67 0 100%
tools/binman/etype/intel_me.py 4 0 100%
tools/binman/etype/intel_mrc.py 6 0 100%
tools/binman/etype/intel_refcode.py 6 0 100%
tools/binman/etype/intel_vbt.py 4 0 100%
tools/binman/etype/intel_vga.py 4 0 100%
tools/binman/etype/mkimage.py 84 0 100%
tools/binman/etype/null.py 9 0 100%
tools/binman/etype/nxp_imx8mcst.py 78 59 24%
tools/binman/etype/nxp_imx8mimage.py 38 6 84%
tools/binman/etype/opensbi.py 5 0 100%
tools/binman/etype/powerpc_mpc85xx_bootpg_resetvec.py 6 0 100%
tools/binman/etype/pre_load.py 76 0 100%
tools/binman/etype/rockchip_tpl.py 5 0 100%
tools/binman/etype/scp.py 5 0 100%
tools/binman/etype/section.py 418 0 100%
tools/binman/etype/tee_os.py 31 0 100%
tools/binman/etype/text.py 21 0 100%
tools/binman/etype/ti_board_config.py 139 0 100%
tools/binman/etype/ti_dm.py 5 0 100%
tools/binman/etype/ti_secure.py 65 0 100%
tools/binman/etype/ti_secure_rom.py 117 0 100%
tools/binman/etype/u_boot.py 7 0 100%
tools/binman/etype/u_boot_dtb.py 9 0 100%
tools/binman/etype/u_boot_dtb_with_ucode.py 51 0 100%
tools/binman/etype/u_boot_elf.py 19 0 100%
tools/binman/etype/u_boot_env.py 27 0 100%
tools/binman/etype/u_boot_expanded.py 4 0 100%
tools/binman/etype/u_boot_img.py 7 0 100%
tools/binman/etype/u_boot_nodtb.py 7 0 100%
tools/binman/etype/u_boot_spl.py 8 0 100%
tools/binman/etype/u_boot_spl_bss_pad.py 14 0 100%
tools/binman/etype/u_boot_spl_dtb.py 9 0 100%
tools/binman/etype/u_boot_spl_elf.py 8 0 100%
tools/binman/etype/u_boot_spl_expanded.py 12 0 100%
tools/binman/etype/u_boot_spl_nodtb.py 8 0 100%
tools/binman/etype/u_boot_spl_pubkey_dtb.py 32 0 100%
tools/binman/etype/u_boot_spl_with_ucode_ptr.py 8 0 100%
tools/binman/etype/u_boot_tpl.py 8 0 100%
tools/binman/etype/u_boot_tpl_bss_pad.py 14 0 100%
tools/binman/etype/u_boot_tpl_dtb.py 9 0 100%
tools/binman/etype/u_boot_tpl_dtb_with_ucode.py 8 0 100%
tools/binman/etype/u_boot_tpl_elf.py 8 0 100%
tools/binman/etype/u_boot_tpl_expanded.py 12 0 100%
tools/binman/etype/u_boot_tpl_nodtb.py 8 0 100%
tools/binman/etype/u_boot_tpl_with_ucode_ptr.py 12 0 100%
tools/binman/etype/u_boot_ucode.py 33 0 100%
tools/binman/etype/u_boot_vpl.py 8 0 100%
tools/binman/etype/u_boot_vpl_bss_pad.py 14 0 100%
tools/binman/etype/u_boot_vpl_dtb.py 9 0 100%
tools/binman/etype/u_boot_vpl_elf.py 8 0 100%
tools/binman/etype/u_boot_vpl_expanded.py 12 0 100%
tools/binman/etype/u_boot_vpl_nodtb.py 8 0 100%
tools/binman/etype/u_boot_with_ucode_ptr.py 42 0 100%
tools/binman/etype/vblock.py 38 0 100%
tools/binman/etype/x86_reset16.py 7 0 100%
tools/binman/etype/x86_reset16_spl.py 7 0 100%
tools/binman/etype/x86_reset16_tpl.py 7 0 100%
tools/binman/etype/x86_start16.py 7 0 100%
tools/binman/etype/x86_start16_spl.py 7 0 100%
tools/binman/etype/x86_start16_tpl.py 7 0 100%
tools/binman/etype/x509_cert.py 71 0 100%
tools/binman/etype/xilinx_bootgen.py 72 0 100%
tools/binman/fip_util.py 202 0 100%
tools/binman/fmap_util.py 49 0 100%
tools/binman/image.py 181 0 100%
tools/binman/state.py 201 0 100%
---------------------------------------------------------------------------
TOTAL 5954 69 99%
To get a report in 'htmlcov/index.html', type: python3-coverage html
Coverage error: 99%, but should be 100%
ValueError: Test coverage failure
Unfortunately the run failed. As it suggests, create a report:
.. code-block:: bash
$ python3-coverage html
Wrote HTML report to htmlcov/index.html
If you open that file in the browser, you can see which files are not reaching
100% and click on them. Here is ``nxp_imx8mimage.py``, for example:
.. code-block:: python
43 # Generate mkimage configuration file similar to imx8mimage.cfg
44 # and pass it to mkimage to generate SPL image for us here.
45 cfg_fname = tools.get_output_filename('nxp.imx8mimage.cfg.%s' % uniq)
46 with open(cfg_fname, 'w') as outf:
47 print('ROM_VERSION v%d' % self.rom_version, file=outf)
48 print('BOOT_FROM %s' % self.boot_from, file=outf)
49 print('LOADER %s %#x' % (input_fname, self.loader_address), file=outf)
50
51 output_fname = tools.get_output_filename(f'cfg-out.{uniq}')
52 args = ['-d', input_fname, '-n', cfg_fname, '-T', 'imx8mimage',
53 output_fname]
54 if self.mkimage.run_cmd(*args) is not None:
55 return tools.read_file(output_fname)
56 else:
57 # Bintool is missing; just use the input data as the output
58 x self.record_missing_bintool(self.mkimage)
59 x return data
60
61 def SetImagePos(self, image_pos):
62 # Customized SoC specific SetImagePos which skips the mkimage etype
63 # implementation and removes the 0x48 offset introduced there. That
64 # offset is only used for uImage/fitImage, which is not the case in
65 # here.
66 upto = 0x00
67 for entry in super().GetEntries().values():
68 x entry.SetOffsetSize(upto, None)
69
70 # Give up if any entries lack a size
71 x if entry.size is None:
72 x return
73 x upto += entry.size
74
75 Entry_section.SetImagePos(self, image_pos)
Most of the file is covered, but the lines marked with ``x`` indicate missing
coverage. The will show up red in your browser.
What is a test?
---------------
A test is a function in ``ftest.py`` which uses an image description in
``tools/binman/test`` to perform some operations and exercise the code. Some
tests are just a few lines; some are more complicated.
Here is a simple test:
.. code-block:: python
def testSimple(self):
"""Test a simple binman with a single file"""
data = self._DoReadFile('005_simple.dts')
self.assertEqual(U_BOOT_DATA, data)
This test tells Binman to build an image using the description. Then it checks
that the resulting image looks correct. The image description is:
.. code-block:: devicetree
/dts-v1/;
/ {
#address-cells = <1>;
#size-cells = <1>;
binman {
u-boot {
};
};
};
As you will know from the Binman documentation, this says that there is
one image and it contains the U-Boot binary. So this test builds an image
consisting of a U-Boot binary, then checks that it does indeed have just a
U-Boot binary in it.
Test data
---------
Using real binaries (like ``u-boot.bin``) to test Binman would be quite tedious.
Every output file would be large and it would be hard to tell by looking at the
output (e.g. with a hex dump) if a particular entry contains ``u-boot.bin`` or
``u-boot-spl.bin`` or something else.
Binman gets around this by using simple placeholders. Here is the placeholder
for u-boot.bin:
.. code-block:: python
U_BOOT_DATA = b'1234'
This is just bytes. So the test above checks that the output image contains
these four bytes. This makes verification fast for Binman and very easy for
humans.
Even the devicetree is a placeholder:
.. code-block:: python
U_BOOT_DTB_DATA = b'udtb'
But for some tests you need to use the real devicetree. In that case you can
use ``_DoReadFileRealDtb()``. See ``testUpdateFdtAll()`` for an example of how
to check the devicetree updated by Binman.
Test structure
--------------
Each test is designed to test just one thing. Binman tests are named according
to what they are testing. Individually they don't do very much, but as a whole
they test every line of code in Binman.
So ``testSimple()`` is designed to check that Binman can build the
simplest-possible image that isn't completely empty.
Another type of test is one which checks error-handling, for example:
.. code-block:: python
def testFillNoSize(self):
"""Test for an fill entry type with no size"""
with self.assertRaises(ValueError) as e:
self._DoReadFile('070_fill_no_size.dts')
self.assertIn("'fill' entry is missing properties: size",
str(e.exception))
This test deliberately tries to provoke an error. The image description is:
.. code-block:: devicetree
// SPDX-License-Identifier: GPL-2.0+
/dts-v1/;
/ {
#address-cells = <1>;
#size-cells = <1>;
binman {
size = <16>;
fill {
fill-byte = [ff];
};
};
};
You can see that there is no size for the 'fill' entry, so we would expect
Binman to complain. The test checks that it actually does. It also checks the
error message produced by Binman. Sometimes you need to add several tests, each
with their own broken image description, in order to check all the error cases.
Sometimes you need to capture the console output of Binman, to check it is
correct. You can to this with ``test_util.capture_sys_output()``, for example:
.. code-block:: python
with test_util.capture_sys_output() as (_, stderr):
self._DoTestFile('071_gbb.dts', force_missing_bintools='futility',
entry_args=entry_args)
err = stderr.getvalue()
self.assertRegex(err, "Image 'image'.*missing bintools.*: futility")
The test collects the output and checks it with a regular expression. If you
need to see the test output (e.g. to debug it), you will have to remove that
capture line.
How to add a new test
---------------------
This section explains the process of writing a new test. It uses an example to
help with this, but your code will be different.
Generally you are adding a test because you are adding a new entry type
('etype'). So start by creating the shortest and simplest image-description you
can, which contains the new etype. Put it in a numbered file in
``tool/binman/test`` so that it comes last. All the numbers are unique and there
are no gaps.
Example from ``tools/binman/test/339_nxp_imx8.dts``:
.. code-block:: devicetree
// SPDX-License-Identifier: GPL-2.0+
/dts-v1/;
/ {
#address-cells = <1>;
#size-cells = <1>;
binman {
nxp-imx8mimage {
args; /* TODO: Needed by mkimage etype superclass */
nxp,boot-from = "sd";
nxp,rom-version = <1>;
nxp,loader-address = <0x10>;
};
};
};
Note that you should use tabs in the file, not spaces. You can see that this has
been cut down to the bare minimum, just enough to include the etype and the
arguments it needs. This is of course not a real image. It will not boot on
anything. But that's fine; we are just trying to test this one etype. Try not
to add any other sections and etypes unless they are absolutely essential for
your test to work. This helps others too: they don't need to understand the full
complexity of your etype just to read your test.
Then create your test by adding a new function at the end of ``ftest.py``:
.. code-block:: python
def testNxpImx8Image(self):
"""Test that binman can produce an iMX8 image"""
self._DoTestFile('339_nxp_imx8.dts')
This uses the test file that you created. It doesn't check anything, it just
runs the image description through binman.
Let's run it:
.. code-block:: bash
$ binman test testNxpImx8Image
======================== Running binman tests ========================
.
----------------------------------------------------------------------
Ran 1 test in 0.242s
OK
So the test passes. It doesn't really do a lot, but it does exercise the etype.
The next step is to update it to actually check the output:
.. code-block:: python
def testNxpImx8Image(self):
"""Test that binman can produce an iMX8 image"""
data = self._DoReadFile('339_nxp_imx8.dts')
print('data', len(data))
The ``_DoReadFile()`` function is documented in the code. It returns the image
contents as the first part of a tuple.
Running this we see:
.. code-block:: bash
data 2200
So it is producing a little over 8K of data. Your etype will be different, but
in any case you can add Python code to check that this data is actually correct,
based on your knowledge of your etype. Note that you should not be checking
whether the external tools (called 'bintools' in Binman) are actually working,
since presumably they have their own tests. You just need to check that the
image seems reasonable, e.g. is not empty, contains the expected sections, etc.
When your etype does use a bintool, it also needs tests, but generally it will
be tested by virtue of the etype test. This is because your etype must call the
bintool to create the image. Sometimes you might need to add a test for a
bintool error-condition, though.
Finishing code coverage
-----------------------
The objective is to have test-coverage for every line of code that you add to
Binman. So how can you tell? First, get a coverage report as described above.
Look through the output for any files which are not at 100%. Add more test cases
(image descriptions and new functions in ``ftest.py``) until you have covered
each line.
In the above example, here are some possible steps:
#. The first red bit is where the ``mkimage`` call returns None. This can be
traced to ``Bintoolmkimage.mkimage()`` which calls
``Bintool.run_cmd_result()`` and ``None`` means that ``mkimage`` is missing.
So the etype has code to handle that case, but it is never used. You can
look for other examples of ``self.mkimage`` returning ``None`` - e.g.
``Entry_mkimage.BuildSectionData()`` does this. The clue for finding this is
that the ``nxp-imx8mimage`` etype is based on ``Entry_mkimage``:
.. code-block:: python
class Entry_nxp_imx8mimage(Entry_mkimage):
It must be tested somewhere...in this case ``testMkimage()`` doesn't do it,
but ``testMkimageMissing()`` immediately below that does. So you can create a
similar test, e.g.:
.. code-block:: python
def testNxpImx8ImageMkimageMissing(self):
"""Test that binman can produce an iMX8 image"""
with test_util.capture_sys_output() as (_, stderr):
self._DoTestFile('339_nxp_imx8.dts',
force_missing_bintools='mkimage')
err = stderr.getvalue()
self.assertRegex(err, "Image 'image'.*missing bintools.*: mkimage")
Note that this uses exactly the same image description as the first test.
It just checks what happens when the tool is missing. Checking the coverage
again, you will see that the first red bit has gone:
.. code-block:: bash
$ binman test -T
$ python3-coverage html
#. The second red bit is for ``SetImagePos()``. You can see that it is iterating
through the sub-entries inside the ``nxp-imx8mimage`` entry. In the case of
the 339 file, there are no such entries, so this code inside the for() loop
isn't used:
.. code-block:: python
def SetImagePos(self, image_pos):
# Customized SoC specific SetImagePos which skips the mkimage etype
# implementation and removes the 0x48 offset introduced there. That
# offset is only used for uImage/fitImage, which is not the case in
# here.
upto = 0x00
for entry in super().GetEntries().values():
entry.SetOffsetSize(upto, None)
# Give up if any entries lack a size
if entry.size is None:
return
upto += entry.size
Entry_section.SetImagePos(self, image_pos)
The solution is to add an entry, e.g. in ``340_nxp_imx8_non_empty.dts``:
.. code-block:: devicetree
// SPDX-License-Identifier: GPL-2.0+
/dts-v1/;
/ {
#address-cells = <1>;
#size-cells = <1>;
binman {
nxp-imx8mimage {
args; /* TODO: Needed by mkimage etype superclass */
nxp,boot-from = "sd";
nxp,rom-version = <1>;
nxp,loader-address = <0x10>;
u-boot {
};
};
};
};
Now write a little test to use it:
.. code-block:: python
def testNxpImx8ImageNonEmpty(self):
"""Test that binman can produce an iMX8 image with something in it"""
data = self._DoReadFile('340_nxp_imx8_non_empty.dts')
# check data here
With that, the second red bit goes away, because the for() loop is now used.
#. There is one more red bit left, the ``return`` in ``SetImagePos()``. The
above effort got the for() loop to be executed, but it doesn't cover the
``return``. It might have been copied from some other etype, e.g. the mkimage
one. See ``Entry_mkimage.SetImagePos()`` which contains the code:
.. code-block:: python
for entry in self.GetEntries().values():
entry.SetOffsetSize(upto, None)
# Give up if any entries lack a size
if entry.size is None:
return
upto += entry.size
But which test covers that code for mkimage? By figuring that out, you could
use a similar technique. One way to find out is to delete the two lines in
``Entry_mkimage`` which check for entry.size being None and returning, then
see what breaks with ``binman test``:
.. code-block:: bash
ERROR: binman.ftest.TestFunctional.testMkimageCollection (subunit.RemotedTestCase)
binman.ftest.TestFunctional.testMkimageCollection
----------------------------------------------------------------------
testtools.testresult.real._StringException: Traceback (most recent call last):
TypeError: unsupported operand type(s) for +=: 'int' and 'NoneType'
======================================================================
ERROR: binman.ftest.TestFunctional.testMkimageImage (subunit.RemotedTestCase)
binman.ftest.TestFunctional.testMkimageImage
----------------------------------------------------------------------
testtools.testresult.real._StringException: Traceback (most recent call last):
TypeError: unsupported operand type(s) for +=: 'int' and 'NoneType'
======================================================================
ERROR: binman.ftest.TestFunctional.testMkimageSpecial (subunit.RemotedTestCase)
binman.ftest.TestFunctional.testMkimageSpecial
----------------------------------------------------------------------
testtools.testresult.real._StringException: Traceback (most recent call last):
TypeError: unsupported operand type(s) for +=: 'int' and 'NoneType'
We can verify that you got the right test, by putting the lines back in and
getting coverage for just that test:
.. code-block:: bash
binman test -T testMkimageCollection
python3-coverage html
You will see a lot of red since we are seeing test coverage just for one
test, but if you look in ``mkimage.py`` at ``SetImagePos()`` you will see
that the ``return`` is covered (i.e. it is marked green).
Looking at the ``.dts`` files for each of these tests, none jumps out as
being relevant to our case. It seems that this code just isn't needed, so the
best solution is to delete those two lines from the function:
.. code-block:: python
def SetImagePos(self, image_pos):
# Customized SoC specific SetImagePos which skips the mkimage etype
# implementation and removes the 0x48 offset introduced there. That
# offset is only used for uImage/fitImage, which is not the case in
# here.
upto = 0x00
for entry in super().GetEntries().values():
entry.SetOffsetSize(upto, None)
upto += entry.size
Entry_section.SetImagePos(self, image_pos)
We should check the updated code on a real build, to make sure it really
isn't needed, of course.
Now, the test coverage is complete!
If we later discover a case where those lines are needed, we can add the
lines back, along with a test for this case.
Getting help
------------
If you are stuck and cannot work out how to add test coverage for your entry
type, ask on the U-Boot mailing list, cc ``Simon Glass <sjg@chromium.org>`` or
on irc ``sjg1``