blob: 46b78e706ca2a4e7e5feb28cacd13d54f4868108 [file] [log] [blame]
Alexander Gendin038cb022023-10-09 01:24:36 +00001// SPDX-License-Identifier: GPL-2.0+
2/*
3 * Tests for mbr command
4 *
5 * Copyright 2023 Matrox Video
6 * Written by Alex Gendin <agendin@matrox.com>
7 */
8
9#include <dm.h>
10#include <console.h>
11#include <dm/test.h>
12#include <mapmem.h>
13#include <part.h>
14#include <asm/global_data.h>
15#include <dm/device-internal.h>
16#include <dm/lists.h>
17#include <test/suites.h>
18#include <test/ut.h>
19
20DECLARE_GLOBAL_DATA_PTR;
21/*
22 * Requirements for running test manually:
23 * mmc6.img - File size needs to be at least 12 MiB
24 *
25 * Command to create mmc6.img:
26 * $ dd if=/dev/zero of=mmc6.img bs=12M count=1
27 *
28 * To run this test manually, place mmc6.img into the same directory as u-boot,
29 * then run:
30 * $ ./u-boot -Tc 'ut mbr'
31 *
32 * To run this test as part of U-Boot test:
33 * $ ./test/py/test.py --bd sandbox --build -k ut_dm -v
34 * Note: mmc6.img will be created by the test suit.
35 */
36
37static char * mbr_parts_header = "setenv mbr_parts '";
38static char * mbr_parts_p1 = "uuid_disk=0x12345678;name=p1,start=8M,bootable,size=1M,id=0x0e";
39static char * mbr_parts_p2 = ";name=p2,size=1M,id=0x0e";
40static char * mbr_parts_p3 = ";name=p3,size=1M,id=0x0e";
41static char * mbr_parts_p4 = ";name=p4,size=1M,id=0x0e";
42static char * mbr_parts_p5 = ";name=[ext],size=2M,id=0x05;name=p5,size=1M,id=0x0e";
43static char * mbr_parts_tail = "'";
44
45/*
46 * One MBR partition
47000001b0 00 00 00 00 00 00 00 00 78 56 34 12 00 00 80 05 |........xV4.....|
48000001c0 05 01 0e 25 24 01 00 40 00 00 00 08 00 00 00 00 |...%$..@........|
49000001d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
50000001e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
51000001f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 aa |..............U.|
52*/
53static unsigned mbr_cmp_start = 0x1B8;
54static unsigned mbr_cmp_size = 0x48;
55static unsigned char mbr_parts_ref_p1[] = {
56 0x78, 0x56, 0x34, 0x12, 0x00, 0x00, 0x80, 0x05,
570x05, 0x01, 0x0e, 0x25, 0x24, 0x01, 0x00, 0x40, 0x00, 0x00, 0x00, 0x08, 0x00, 0x00, 0x00, 0x00,
580x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
590x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
600x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x55, 0xaa
61};
62
63/*
64 * Two MBR partitions
65000001b0 00 00 00 00 00 00 00 00 78 56 34 12 00 00 80 05 |........xV4.....|
66000001c0 05 01 0e 25 24 01 00 40 00 00 00 08 00 00 00 25 |...%$..@.......%|
67000001d0 25 01 0e 46 05 01 00 48 00 00 00 08 00 00 00 00 |%..F...H........|
68000001e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
69000001f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 aa |..............U.|
70*/
71static unsigned char mbr_parts_ref_p2[] = {
72 0x78, 0x56, 0x34, 0x12, 0x00, 0x00, 0x80, 0x05,
730x05, 0x01, 0x0e, 0x25, 0x24, 0x01, 0x00, 0x40, 0x00, 0x00, 0x00, 0x08, 0x00, 0x00, 0x00, 0x25,
740x25, 0x01, 0x0e, 0x46, 0x05, 0x01, 0x00, 0x48, 0x00, 0x00, 0x00, 0x08, 0x00, 0x00, 0x00, 0x00,
750x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
760x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x55, 0xaa
77};
78
79/*
80 * Three MBR partitions
81000001b0 00 00 00 00 00 00 00 00 78 56 34 12 00 00 80 05 |........xV4.....|
82000001c0 05 01 0e 25 24 01 00 40 00 00 00 08 00 00 00 25 |...%$..@.......%|
83000001d0 25 01 0e 46 05 01 00 48 00 00 00 08 00 00 00 46 |%..F...H.......F|
84000001e0 06 01 0e 66 25 01 00 50 00 00 00 08 00 00 00 00 |...f%..P........|
85000001f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 aa |..............U.|
86*/
87static unsigned char mbr_parts_ref_p3[] = {
88 0x78, 0x56, 0x34, 0x12, 0x00, 0x00, 0x80, 0x05,
890x05, 0x01, 0x0e, 0x25, 0x24, 0x01, 0x00, 0x40, 0x00, 0x00, 0x00, 0x08, 0x00, 0x00, 0x00, 0x25,
900x25, 0x01, 0x0e, 0x46, 0x05, 0x01, 0x00, 0x48, 0x00, 0x00, 0x00, 0x08, 0x00, 0x00, 0x00, 0x46,
910x06, 0x01, 0x0e, 0x66, 0x25, 0x01, 0x00, 0x50, 0x00, 0x00, 0x00, 0x08, 0x00, 0x00, 0x00, 0x00,
920x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x55, 0xaa
93};
94
95/*
96 * Four MBR partitions
97000001b0 00 00 00 00 00 00 00 00 78 56 34 12 00 00 80 05 |........xV4.....|
98000001c0 05 01 0e 25 24 01 00 40 00 00 00 08 00 00 00 25 |...%$..@.......%|
99000001d0 25 01 0e 46 05 01 00 48 00 00 00 08 00 00 00 46 |%..F...H.......F|
100000001e0 06 01 0e 66 25 01 00 50 00 00 00 08 00 00 00 66 |...f%..P.......f|
101000001f0 26 01 0e 87 06 01 00 58 00 00 00 08 00 00 55 aa |&......X......U.|
102*/
103static unsigned char mbr_parts_ref_p4[] = {
104 0x78, 0x56, 0x34, 0x12, 0x00, 0x00, 0x80, 0x05,
1050x05, 0x01, 0x0e, 0x25, 0x24, 0x01, 0x00, 0x40, 0x00, 0x00, 0x00, 0x08, 0x00, 0x00, 0x00, 0x25,
1060x25, 0x01, 0x0e, 0x46, 0x05, 0x01, 0x00, 0x48, 0x00, 0x00, 0x00, 0x08, 0x00, 0x00, 0x00, 0x46,
1070x06, 0x01, 0x0e, 0x66, 0x25, 0x01, 0x00, 0x50, 0x00, 0x00, 0x00, 0x08, 0x00, 0x00, 0x00, 0x66,
1080x26, 0x01, 0x0e, 0x87, 0x06, 0x01, 0x00, 0x58, 0x00, 0x00, 0x00, 0x08, 0x00, 0x00, 0x55, 0xaa
109};
110
111/*
112 * Five MBR partitions
113000001b0 00 00 00 00 00 00 00 00 78 56 34 12 00 00 80 05 |........xV4.....|
114000001c0 05 01 0e 25 24 01 00 40 00 00 00 08 00 00 00 25 |...%$..@.......%|
115000001d0 25 01 0e 46 05 01 00 48 00 00 00 08 00 00 00 46 |%..F...H.......F|
116000001e0 06 01 0e 66 25 01 00 50 00 00 00 08 00 00 00 66 |...f%..P.......f|
117000001f0 26 01 05 a7 26 01 00 58 00 00 00 10 00 00 55 aa |&...&..X......U.|
118*/
119static unsigned char mbr_parts_ref_p5[] = {
120 0x78, 0x56, 0x34, 0x12, 0x00, 0x00, 0x80, 0x05,
1210x05, 0x01, 0x0e, 0x25, 0x24, 0x01, 0x00, 0x40, 0x00, 0x00, 0x00, 0x08, 0x00, 0x00, 0x00, 0x25,
1220x25, 0x01, 0x0e, 0x46, 0x05, 0x01, 0x00, 0x48, 0x00, 0x00, 0x00, 0x08, 0x00, 0x00, 0x00, 0x46,
1230x06, 0x01, 0x0e, 0x66, 0x25, 0x01, 0x00, 0x50, 0x00, 0x00, 0x00, 0x08, 0x00, 0x00, 0x00, 0x66,
1240x26, 0x01, 0x05, 0xa7, 0x26, 0x01, 0x00, 0x58, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x55, 0xaa
125};
126static unsigned ebr_cmp_start = 0x1B8;
127static unsigned ebr_cmp_size = 0x48;
128/*
129 * EBR
13000b001b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 87 |................|
13100b001c0 07 01 0e a7 26 01 00 08 00 00 00 08 00 00 00 00 |....&...........|
13200b001d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
13300b001e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
13400b001f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 aa |..............U.|
135*/
136static unsigned char ebr_parts_ref_p5[] = {
137 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x87,
1380x07, 0x01, 0x0e, 0xa7, 0x26, 0x01, 0x00, 0x08, 0x00, 0x00, 0x00, 0x08, 0x00, 0x00, 0x00, 0x00,
1390x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
1400x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
1410x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x55, 0xaa
142};
143
144/* Fill write buffers with pseudo-random data */
145static void init_write_buffers(char *mbr_wb, size_t mbr_wb_size,
146 char *ebr_wb, size_t ebr_wb_size, unsigned seed)
147{
148 while (mbr_wb_size--) {
149 *mbr_wb++ = seed;
150 seed *= 43;
151 seed += 17 + mbr_wb_size/4;
152 }
153 while (ebr_wb_size--) {
154 *ebr_wb++ = seed;
155 seed *= 43;
156 seed += 17 + ebr_wb_size/4;
157 }
158}
159
160/* Build string with MBR partition(s) layout */
161static unsigned build_mbr_parts(char *buf, size_t buf_size, unsigned num_parts)
162{
163 size_t bytes_remaining, cur_str_size;
164 char * cur_buf;
165
166 if (!num_parts || num_parts > 5 || !buf)
167 return 1;
168
169 cur_buf = buf;
170 *cur_buf = '\0';
171 bytes_remaining = buf_size;
172
173 cur_str_size = sizeof(mbr_parts_header);
174 if (cur_str_size + 1 > bytes_remaining)
175 return 1;
176 strcat(cur_buf, mbr_parts_header);
177 bytes_remaining -= cur_str_size;
178
179 if (num_parts >= 1) {
180 cur_str_size = sizeof(mbr_parts_p1);
181 if (cur_str_size + 1 > bytes_remaining)
182 return 1;
183 strcat(cur_buf, mbr_parts_p1);
184 bytes_remaining -= cur_str_size;
185
186 if (num_parts >= 2) {
187 cur_str_size = sizeof(mbr_parts_p2);
188 if (cur_str_size + 1 > bytes_remaining)
189 return 1;
190 strcat(cur_buf, mbr_parts_p2);
191 bytes_remaining -= cur_str_size;
192
193 if (num_parts >= 3) {
194 cur_str_size = sizeof(mbr_parts_p3);
195 if (cur_str_size + 1 > bytes_remaining)
196 return 1;
197 strcat(cur_buf, mbr_parts_p3);
198 bytes_remaining -= cur_str_size;
199
200 if (num_parts == 4) {
201 cur_str_size = sizeof(mbr_parts_p4);
202 if (cur_str_size + 1 > bytes_remaining)
203 return 1;
204 strcat(cur_buf, mbr_parts_p4);
205 bytes_remaining -= cur_str_size;
206
207 }
Alexander Gendin207fc532023-11-08 03:05:19 +0000208 else if (num_parts == 5) {
209 cur_str_size = sizeof(mbr_parts_p5);
210 if (cur_str_size + 1 > bytes_remaining)
211 return 1;
212 strcat(cur_buf, mbr_parts_p5);
213 bytes_remaining -= cur_str_size;
Alexander Gendin038cb022023-10-09 01:24:36 +0000214
Alexander Gendin207fc532023-11-08 03:05:19 +0000215 }
Alexander Gendin038cb022023-10-09 01:24:36 +0000216 }
217 }
218 }
219
220 cur_str_size = sizeof(mbr_parts_tail);
221 if (cur_str_size + 1 > bytes_remaining)
222 return 1;
223 strcat(cur_buf, mbr_parts_tail);
224
225 return 0;
226}
227
228static int mbr_test_run(struct unit_test_state *uts)
229{
230 struct blk_desc *mmc_dev_desc;
231 unsigned char mbr_wbuf[512], ebr_wbuf[512], rbuf[512];
232 char mbr_parts_buf[256];
233 ulong mbr_wa, ebr_wa, ra, ebr_blk, mbr_parts_max;
234 struct udevice *dev;
235 ofnode root, node;
236
237 /* Enable the mmc6 node for this test */
238 root = oftree_root(oftree_default());
239 node = ofnode_find_subnode(root, "mmc6");
240 ut_assert(ofnode_valid(node));
241 ut_assertok(lists_bind_fdt(gd->dm_root, node, &dev, NULL, false));
242
243 mbr_parts_max = sizeof('\0') + 2 +
244 strlen(mbr_parts_header) +
245 strlen(mbr_parts_p1) +
246 strlen(mbr_parts_p2) +
247 strlen(mbr_parts_p3) +
248 max(strlen(mbr_parts_p4), strlen(mbr_parts_p5)) +
249 strlen(mbr_parts_tail);
250 ut_assertf(sizeof(mbr_parts_buf) >= mbr_parts_max, "Buffer avail: %ld; buffer req: %ld\n",
251 sizeof(mbr_parts_buf), mbr_parts_max);
252
253 mbr_wa = map_to_sysmem(mbr_wbuf);
254 ebr_wa = map_to_sysmem(ebr_wbuf);
255 ra = map_to_sysmem(rbuf);
256 ebr_blk = (ulong)0xB00000 / 0x200;
257
258 /* Make sure mmc6 exists */
259 ut_asserteq(6, blk_get_device_by_str("mmc", "6", &mmc_dev_desc));
260 ut_assertok(console_record_reset_enable());
261 ut_assertok(run_commandf("mmc dev 6"));
262 ut_assert_nextline("switch to partitions #0, OK");
263 ut_assert_nextline("mmc6 is current device");
264 ut_assertok(ut_check_console_end(uts));
265
266 /* Make sure mmc6 is 12+ MiB in size */
267 ut_assertok(run_commandf("mmc read 0x%lx 0x%lx 1", ra, (ulong)0xBFFE00 / 0x200));
268
269 /* Test one MBR partition */
270 init_write_buffers(mbr_wbuf, sizeof(mbr_wbuf), ebr_wbuf, sizeof(ebr_wbuf), __LINE__);
271 ut_assertok(build_mbr_parts(mbr_parts_buf, sizeof(mbr_parts_buf), 1));
272 ut_assertok(run_commandf("write mmc 6:0 0x%lx 0 1", mbr_wa));
273 memset(rbuf, 0, sizeof(rbuf));
274 ut_assertok(run_commandf("read mmc 6:0 0x%lx 0 1", ra));
275 ut_assertok(memcmp(mbr_wbuf, rbuf, 512));
276 ut_assertok(run_commandf("write mmc 6:0 0x%lx 0x%lx 1", ebr_wa, ebr_blk));
277 memset(rbuf, 0, sizeof(rbuf));
278 ut_assertok(run_commandf("read mmc 6:0 0x%lx 0x%lx 1", ra, ebr_blk));
279 ut_assertok(memcmp(ebr_wbuf, rbuf, 512));
280 ut_assertok(console_record_reset_enable());
281 ut_assertf(0 == run_commandf(mbr_parts_buf), "Invalid partitions string: %s\n", mbr_parts_buf);
282 ut_assertok(run_commandf("mbr write mmc 6"));
283 ut_assert_nextline("MBR: write success!");
284 ut_assertok(run_commandf("mbr verify mmc 6"));
285 ut_assert_nextline("MBR: verify success!");
286 memset(rbuf, 0, sizeof(rbuf));
287 ut_assertok(run_commandf("read mmc 6:0 0x%lx 0x%lx 1", ra, ebr_blk));
288 ut_assertok(memcmp(ebr_wbuf, rbuf, 512));
289 ut_assertok(ut_check_console_end(uts));
290 /*
291 000001b0 00 00 00 00 00 00 00 00 78 56 34 12 00 00 80 05 |........xV4.....|
292 000001c0 05 01 0e 25 24 01 00 40 00 00 00 08 00 00 00 00 |...%$..@........|
293 000001d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
294 000001e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
295 000001f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 aa |..............U.|
296 */
297 memset(rbuf, 0, sizeof(rbuf));
298 ut_assertok(run_commandf("read mmc 6:0 0x%lx 0 1", ra));
299 for (unsigned i = 0; i < mbr_cmp_size; i++) {
300 ut_assertf(rbuf[mbr_cmp_start + i] == mbr_parts_ref_p1[i],
301 "1P MBR+0x%04X: expected 0x%02X, actual: 0x%02X\n",
302 mbr_cmp_start + i, mbr_parts_ref_p1[i], rbuf[mbr_cmp_start + i]);
303 }
304
305 /* Test two MBR partitions */
306 init_write_buffers(mbr_wbuf, sizeof(mbr_wbuf), ebr_wbuf, sizeof(ebr_wbuf), __LINE__);
307 ut_assertok(build_mbr_parts(mbr_parts_buf, sizeof(mbr_parts_buf), 2));
308 ut_assertok(run_commandf("write mmc 6:0 0x%lx 0 1", mbr_wa));
309 memset(rbuf, 0, sizeof(rbuf));
310 ut_assertok(run_commandf("read mmc 6:0 0x%lx 0 1", ra));
311 ut_assertok(memcmp(mbr_wbuf, rbuf, 512));
312 ut_assertok(run_commandf("write mmc 6:0 0x%lx 0x%lx 1", ebr_wa, ebr_blk));
313 memset(rbuf, 0, sizeof(rbuf));
314 ut_assertok(run_commandf("read mmc 6:0 0x%lx 0x%lx 1", ra, ebr_blk));
315 ut_assertok(memcmp(ebr_wbuf, rbuf, 512));
316 ut_assertok(console_record_reset_enable());
317 ut_assertf(0 == run_commandf(mbr_parts_buf), "Invalid partitions string: %s\n", mbr_parts_buf);
318 ut_assertok(run_commandf("mbr write mmc 6"));
319 ut_assert_nextline("MBR: write success!");
320 ut_assertok(run_commandf("mbr verify mmc 6"));
321 ut_assert_nextline("MBR: verify success!");
322 memset(rbuf, 0, sizeof(rbuf));
323 ut_assertok(run_commandf("read mmc 6:0 0x%lx 0x%lx 1", ra, ebr_blk));
324 ut_assertok(memcmp(ebr_wbuf, rbuf, 512));
325 ut_assertok(ut_check_console_end(uts));
326 /*
327 000001b0 00 00 00 00 00 00 00 00 78 56 34 12 00 00 80 05 |........xV4.....|
328 000001c0 05 01 0e 25 24 01 00 40 00 00 00 08 00 00 00 25 |...%$..@.......%|
329 000001d0 25 01 0e 46 05 01 00 48 00 00 00 08 00 00 00 00 |%..F...H........|
330 000001e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
331 000001f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 aa |..............U.|
332 */
333 memset(rbuf, 0, sizeof(rbuf));
334 ut_assertok(run_commandf("read mmc 6:0 0x%lx 0 1", ra));
335 for (unsigned i = 0; i < mbr_cmp_size; i++) {
336 ut_assertf(rbuf[mbr_cmp_start + i] == mbr_parts_ref_p2[i],
337 "2P MBR+0x%04X: expected 0x%02X, actual: 0x%02X\n",
338 mbr_cmp_start + i, mbr_parts_ref_p2[i], rbuf[mbr_cmp_start + i]);
339 }
340
341 /* Test three MBR partitions */
342 init_write_buffers(mbr_wbuf, sizeof(mbr_wbuf), ebr_wbuf, sizeof(ebr_wbuf), __LINE__);
343 ut_assertok(build_mbr_parts(mbr_parts_buf, sizeof(mbr_parts_buf), 3));
344 ut_assertok(run_commandf("write mmc 6:0 0x%lx 0 1", mbr_wa));
345 memset(rbuf, 0, sizeof(rbuf));
346 ut_assertok(run_commandf("read mmc 6:0 0x%lx 0 1", ra));
347 ut_assertok(memcmp(mbr_wbuf, rbuf, 512));
348 ut_assertok(run_commandf("write mmc 6:0 0x%lx 0x%lx 1", ebr_wa, ebr_blk));
349 memset(rbuf, 0, sizeof(rbuf));
350 ut_assertok(run_commandf("read mmc 6:0 0x%lx 0x%lx 1", ra, ebr_blk));
351 ut_assertok(memcmp(ebr_wbuf, rbuf, 512));
352 ut_assertok(console_record_reset_enable());
353 ut_assertf(0 == run_commandf(mbr_parts_buf), "Invalid partitions string: %s\n", mbr_parts_buf);
354 ut_assertok(run_commandf("mbr write mmc 6"));
355 ut_assert_nextline("MBR: write success!");
356 ut_assertok(run_commandf("mbr verify mmc 6"));
357 ut_assert_nextline("MBR: verify success!");
358 memset(rbuf, 0, sizeof(rbuf));
359 ut_assertok(run_commandf("read mmc 6:0 0x%lx 0x%lx 1", ra, ebr_blk));
360 ut_assertok(memcmp(ebr_wbuf, rbuf, 512));
361 ut_assertok(ut_check_console_end(uts));
362 /*
363 000001b0 00 00 00 00 00 00 00 00 78 56 34 12 00 00 80 05 |........xV4.....|
364 000001c0 05 01 0e 25 24 01 00 40 00 00 00 08 00 00 00 25 |...%$..@.......%|
365 000001d0 25 01 0e 46 05 01 00 48 00 00 00 08 00 00 00 46 |%..F...H.......F|
366 000001e0 06 01 0e 66 25 01 00 50 00 00 00 08 00 00 00 00 |...f%..P........|
367 000001f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 aa |..............U.|
368 */
369 memset(rbuf, 0, sizeof(rbuf));
370 ut_assertok(run_commandf("read mmc 6:0 0x%lx 0 1", ra));
371 for (unsigned i = 0; i < mbr_cmp_size; i++) {
372 ut_assertf(rbuf[mbr_cmp_start + i] == mbr_parts_ref_p3[i],
373 "3P MBR+0x%04X: expected 0x%02X, actual: 0x%02X\n",
374 mbr_cmp_start + i, mbr_parts_ref_p3[i], rbuf[mbr_cmp_start + i]);
375 }
376
377 /* Test four MBR partitions */
378 init_write_buffers(mbr_wbuf, sizeof(mbr_wbuf), ebr_wbuf, sizeof(ebr_wbuf), __LINE__);
379 ut_assertok(build_mbr_parts(mbr_parts_buf, sizeof(mbr_parts_buf), 4));
380 ut_assertok(run_commandf("write mmc 6:0 0x%lx 0 1", mbr_wa));
381 memset(rbuf, 0, sizeof(rbuf));
382 ut_assertok(run_commandf("read mmc 6:0 0x%lx 0 1", ra));
383 ut_assertok(memcmp(mbr_wbuf, rbuf, 512));
384 ut_assertok(run_commandf("write mmc 6:0 0x%lx 0x%lx 1", ebr_wa, ebr_blk));
385 memset(rbuf, 0, sizeof(rbuf));
386 ut_assertok(run_commandf("read mmc 6:0 0x%lx 0x%lx 1", ra, ebr_blk));
387 ut_assertok(memcmp(ebr_wbuf, rbuf, 512));
388 ut_assertok(console_record_reset_enable());
389 ut_assertf(0 == run_commandf(mbr_parts_buf), "Invalid partitions string: %s\n", mbr_parts_buf);
390 ut_assertok(run_commandf("mbr write mmc 6"));
391 ut_assert_nextline("MBR: write success!");
392 ut_assertok(run_commandf("mbr verify mmc 6"));
393 ut_assert_nextline("MBR: verify success!");
394 memset(rbuf, 0, sizeof(rbuf));
395 ut_assertok(run_commandf("read mmc 6:0 0x%lx 0x%lx 1", ra, ebr_blk));
396 ut_assertok(memcmp(ebr_wbuf, rbuf, 512));
397 ut_assertok(ut_check_console_end(uts));
398 /*
399 000001b0 00 00 00 00 00 00 00 00 78 56 34 12 00 00 80 05 |........xV4.....|
400 000001c0 05 01 0e 25 24 01 00 40 00 00 00 08 00 00 00 25 |...%$..@.......%|
401 000001d0 25 01 0e 46 05 01 00 48 00 00 00 08 00 00 00 46 |%..F...H.......F|
402 000001e0 06 01 0e 66 25 01 00 50 00 00 00 08 00 00 00 66 |...f%..P.......f|
403 000001f0 26 01 0e 87 06 01 00 58 00 00 00 08 00 00 55 aa |&......X......U.|
404 */
405 memset(rbuf, 0, sizeof(rbuf));
406 ut_assertok(run_commandf("read mmc 6:0 0x%lx 0 1", ra));
407 for (unsigned i = 0; i < mbr_cmp_size; i++) {
408 ut_assertf(rbuf[mbr_cmp_start + i] == mbr_parts_ref_p4[i],
409 "4P MBR+0x%04X: expected 0x%02X, actual: 0x%02X\n",
410 mbr_cmp_start + i, mbr_parts_ref_p4[i], rbuf[mbr_cmp_start + i]);
411 }
412
413 /* Test five MBR partitions */
414 init_write_buffers(mbr_wbuf, sizeof(mbr_wbuf), ebr_wbuf, sizeof(ebr_wbuf), __LINE__);
415 ut_assertok(build_mbr_parts(mbr_parts_buf, sizeof(mbr_parts_buf), 5));
416 ut_assertok(run_commandf("write mmc 6:0 0x%lx 0 1", mbr_wa));
417 memset(rbuf, 0, sizeof(rbuf));
418 ut_assertok(run_commandf("read mmc 6:0 0x%lx 0 1", ra));
419 ut_assertok(memcmp(mbr_wbuf, rbuf, 512));
420 ut_assertok(run_commandf("write mmc 6:0 0x%lx 0x%lx 1", ebr_wa, ebr_blk));
421 memset(rbuf, 0, sizeof(rbuf));
422 ut_assertok(run_commandf("read mmc 6:0 0x%lx 0x%lx 1", ra, ebr_blk));
423 ut_assertok(memcmp(ebr_wbuf, rbuf, 512));
424 ut_assertok(console_record_reset_enable());
425 ut_assertf(0 == run_commandf(mbr_parts_buf), "Invalid partitions string: %s\n", mbr_parts_buf);
426 ut_assertf(0 == run_commandf("mbr write mmc 6"), "Invalid partitions string: %s\n", mbr_parts_buf);
427 ut_assert_nextline("MBR: write success!");
428 ut_assertok(run_commandf("mbr verify mmc 6"));
429 ut_assert_nextline("MBR: verify success!");
430 ut_assertok(ut_check_console_end(uts));
431 /*
432 000001b0 00 00 00 00 00 00 00 00 78 56 34 12 00 00 80 05 |........xV4.....|
433 000001c0 05 01 0e 25 24 01 00 40 00 00 00 08 00 00 00 25 |...%$..@.......%|
434 000001d0 25 01 0e 46 05 01 00 48 00 00 00 08 00 00 00 46 |%..F...H.......F|
435 000001e0 06 01 0e 66 25 01 00 50 00 00 00 08 00 00 00 66 |...f%..P.......f|
436 000001f0 26 01 05 a7 26 01 00 58 00 00 00 10 00 00 55 aa |&...&..X......U.|
437 */
438 memset(rbuf, 0, sizeof(rbuf));
439 ut_assertok(run_commandf("read mmc 6:0 0x%lx 0 1", ra));
440 for (unsigned i = 0; i < mbr_cmp_size; i++) {
441 ut_assertf(rbuf[mbr_cmp_start + i] == mbr_parts_ref_p5[i],
442 "5P MBR+0x%04X: expected 0x%02X, actual: 0x%02X\n",
443 mbr_cmp_start + i, mbr_parts_ref_p5[i], rbuf[mbr_cmp_start + i]);
444 }
445 /*
446 00b001b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 87 |................|
447 00b001c0 07 01 0e a7 26 01 00 08 00 00 00 08 00 00 00 00 |....&...........|
448 00b001d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
449 00b001e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
450 00b001f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 aa |..............U.|
451 */
452 memset(rbuf, 0, sizeof(rbuf));
453 ut_assertok(run_commandf("read mmc 6:0 0x%lx 0x%lx 1", ra, ebr_blk));
454 for (unsigned i = 0; i < ebr_cmp_size; i++) {
455 ut_assertf(rbuf[ebr_cmp_start + i] == ebr_parts_ref_p5[i],
456 "5P EBR+0x%04X: expected 0x%02X, actual: 0x%02X\n",
457 ebr_cmp_start + i, ebr_parts_ref_p5[i], rbuf[ebr_cmp_start + i]);
458 }
459
460 return 0;
461}
462
463/* Declare mbr test */
464UNIT_TEST(mbr_test_run, UT_TESTF_CONSOLE_REC, mbr_test);
465
466int do_ut_mbr(struct cmd_tbl *cmdtp, int flag, int argc, char *const argv[])
467{
468 struct unit_test *tests = UNIT_TEST_SUITE_START(mbr_test);
469 const int n_ents = UNIT_TEST_SUITE_COUNT(mbr_test);
470
471 return cmd_ut_category("mbr", "mbr_test_", tests, n_ents, argc, argv);
472}
473
474static int dm_test_cmd_mbr(struct unit_test_state *uts)
475{
476 return mbr_test_run(uts);
477}
478
479DM_TEST(dm_test_cmd_mbr, UT_TESTF_SCAN_FDT | UT_TESTF_CONSOLE_REC);