[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[PATCH-for-8.0] tests/avocado: Add a quick test to boot Trusted Firmware
From: |
Philippe Mathieu-Daudé |
Subject: |
[PATCH-for-8.0] tests/avocado: Add a quick test to boot Trusted Firmware on SBSA-ref |
Date: |
Tue, 13 Dec 2022 16:50:25 +0100 |
This quick test boots TF-A on the SBSA-ref machine up to the
EDK2 banner.
It was helpful to catch an issue with Secure PTW fixed in
commit cead7fa4c0 ("target/arm: Two fixes for secure ptw").
Prebuilt flash volumes are included, with the build recipes
to reproduce.
Example of execution:
$ avocado --show=app,console run -t machine:sbsa-ref tests/avocado
(1/1)
tests/avocado/machine_aarch64_sbsaref.py:Aarch64SbsarefMachine.test_sbsaref_tfa_v2_8:
console: NOTICE: Booting Trusted Firmware
console: NOTICE: BL1: v2.7(release):v2.8-rc0
console: NOTICE: BL1: Built : 22:41:04, Nov 15 2022
console: NOTICE: BL1: Booting BL2
console: NOTICE: BL2: v2.5(release):v2.5-432-ga4ea20502
console: NOTICE: BL2: Built : 13:50:23, Sep 13 2021
console: NOTICE: BL1: Booting BL31
console: NOTICE: BL31: v2.5(release):v2.5-432-ga4ea20502
console: NOTICE: BL31: Built : 13:50:23, Sep 13 2021
console: UEFI firmware (version 1.0 built at 22:54:31 on Nov 15 2022)
console: QEMU SBSA-REF Machine
arm-virt 2.00 GHz
1.0 1024 MB RAM
PASS (1.73 s)
RESULTS : PASS 1 | ERROR 0 | FAIL 0 | SKIP 0 | WARN 0 | INTERRUPT 0 |
CANCEL 0
JOB TIME : 1.94 s
Signed-off-by: Philippe Mathieu-Daudé <philmd@linaro.org>
---
MAINTAINERS | 1 +
tests/avocado/machine_aarch64_sbsaref.py | 96 ++++++++++++++++++++++++
2 files changed, 97 insertions(+)
create mode 100644 tests/avocado/machine_aarch64_sbsaref.py
diff --git a/MAINTAINERS b/MAINTAINERS
index 6966490c94..ddc2340661 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -891,6 +891,7 @@ L: qemu-arm@nongnu.org
S: Maintained
F: hw/arm/sbsa-ref.c
F: docs/system/arm/sbsa.rst
+F: tests/avocado/machine_aarch64_sbsaref.py
Sharp SL-5500 (Collie) PDA
M: Peter Maydell <peter.maydell@linaro.org>
diff --git a/tests/avocado/machine_aarch64_sbsaref.py
b/tests/avocado/machine_aarch64_sbsaref.py
new file mode 100644
index 0000000000..b21e3cfc51
--- /dev/null
+++ b/tests/avocado/machine_aarch64_sbsaref.py
@@ -0,0 +1,96 @@
+# Functional test that boots a Linux kernel and checks the console
+#
+# SPDX-FileCopyrightText: 2022 Linaro Ltd.
+# SPDX-FileContributor: Philippe Mathieu-Daudé <philmd@linaro.org>
+#
+# SPDX-License-Identifier: GPL-2.0-or-later
+
+import os
+import time
+
+from avocado.utils import archive
+
+from avocado_qemu import QemuSystemTest
+from avocado_qemu import wait_for_console_pattern
+from avocado_qemu import interrupt_interactive_console_until_pattern
+
+
+class Aarch64SbsarefMachine(QemuSystemTest):
+ """
+ :avocado: tags=arch:aarch64
+ :avocado: tags=machine:sbsa-ref
+ """
+
+ def test_sbsaref_tfa_v2_8(self):
+ """
+ :avocado: tags=cpu:cortex-a57
+
+ Flash volumes generated using:
+
+ - Arm GNU Toolchain version 10.3-2021.07
+ https://developer.arm.com/downloads/-/gnu-a
+ gcc version 10.3.1 20210621 (GNU Toolchain for the A-profile \
+ Architecture 10.3-2021.07 (arm-10.29))
+
+ - Trusted Firmware-A
+ https://github.com/ARM-software/arm-trusted-firmware/blob/v2.8.0/\
+ docs/plat/qemu-sbsa.rst
+
+ - Tianocore EDK II
+ https://github.com/tianocore/edk2/tree/0cb30c3f5e9b/
+ https://github.com/tianocore/edk2-non-osi/tree/61662e8596dd/
+ https://github.com/tianocore/edk2-platforms/tree/e2d7a3014b14/\
+ Platform/Qemu/SbsaQemu
+
+ The last URL contains the various build steps.
+ """
+
+ # Secure BootRom (TF-A code)
+ fs0_xz_url = ('https://fileserver.linaro.org/s/L7BcZXJk37pKfjR/'
+ 'download/SBSA_FLASH0.fd.xz')
+ fs0_xz_hash = 'a865247218af268974a34f8b64af3cfddb3b59de'
+ tar_xz_path = self.fetch_asset(fs0_xz_url, asset_hash=fs0_xz_hash)
+ archive.extract(tar_xz_path, self.workdir)
+ fs0_path = os.path.join(self.workdir, 'SBSA_FLASH0.fd')
+
+ # Non-secure rom (UEFI and EFI variables)
+ fs1_xz_url = ('https://fileserver.linaro.org/s/rNDQATTJnFCaoxb/'
+ 'download/SBSA_FLASH1.fd.xz')
+ fs1_xz_hash = 'b0ccf5498293d90a28c2f75a3b9906e1d65ad917'
+ tar_xz_path = self.fetch_asset(fs1_xz_url, asset_hash=fs1_xz_hash)
+ archive.extract(tar_xz_path, self.workdir)
+ fs1_path = os.path.join(self.workdir, 'SBSA_FLASH1.fd')
+
+ for path in [fs0_path, fs1_path]:
+ with open(path, 'ab+') as fd:
+ fd.truncate(256 << 20) # Expand volumes to 256MiB
+
+ self.vm.set_console()
+ self.vm.add_args('-cpu', 'cortex-a57',
+ '-drive', f'if=pflash,file={fs0_path},format=raw',
+ '-drive', f'if=pflash,file={fs1_path},format=raw')
+ self.vm.launch()
+
+ # TF-A boot sequence:
+ #
+ # https://github.com/ARM-software/arm-trusted-firmware/blob/v2.8.0/\
+ # docs/design/trusted-board-boot.rst#trusted-board-boot-sequence
+ # https://trustedfirmware-a.readthedocs.io/en/v2.8/\
+ # design/firmware-design.html#cold-boot
+
+ # AP Trusted ROM
+ wait_for_console_pattern(self, 'Booting Trusted Firmware')
+ wait_for_console_pattern(self, 'BL1: v2.7(release):v2.8-rc0')
+ wait_for_console_pattern(self, 'BL1: Booting BL2')
+
+ # Trusted Boot Firmware
+ wait_for_console_pattern(self, 'BL2: v2.5(release)')
+ wait_for_console_pattern(self, 'Booting BL31')
+
+ # EL3 Runtime Software
+ wait_for_console_pattern(self, 'BL31: v2.5(release)')
+
+ # Non-trusted Firmware
+ wait_for_console_pattern(self, 'UEFI firmware (version 1.0')
+ interrupt_interactive_console_until_pattern(self,
+ 'QEMU SBSA-REF Machine')
--
2.38.1
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- [PATCH-for-8.0] tests/avocado: Add a quick test to boot Trusted Firmware on SBSA-ref,
Philippe Mathieu-Daudé <=