From: AKASHI Takahiro <takahiro.akashi@linaro.org>
To: u-boot@lists.denx.de
Subject: [PATCH 1/1] test: stabilize test_efi_secboot
Date: Thu, 7 May 2020 09:36:12 +0900 [thread overview]
Message-ID: <20200507003612.GE20621@laputa> (raw)
In-Reply-To: <20200504103326.88607-1-xypron.glpk@gmx.de>
Heinrich,
On Mon, May 04, 2020 at 12:33:26PM +0200, Heinrich Schuchardt wrote:
> When setting up the console via function efi_console_register() we call
> query_console_serial(). This functions sends an escape sequence to the
> terminal to query the display size. The response is another escape
> sequence.
>
> console.run_command_list() is looking for a regular expression '^==>'.
> If the escape sequence for the screen size precedes the prompt without a
> line break, no match is found.
>
> When efi_disk_register() is called before efi_console_register() this leads
> to a test failuere of the UEFI secure boot tests.
Why does the order of those calls affect test results?
> We can avoid the problem if the first UEFI command passed to
> u_boot_console.run_command_list() produces output. This patch achieves this
> by appending '; echo' to the first UEFI related command of the problematic
> tests.
It looks to be a workaround.
We'd better have another approach to fix the problem.
Otherwise, similar issues will occur again.
Thanks,
-Takahiro Akashi
> Signed-off-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
> ---
> test/py/tests/test_efi_secboot/test_authvar.py | 8 ++++----
> test/py/tests/test_efi_secboot/test_signed.py | 4 ++--
> test/py/tests/test_efi_secboot/test_unsigned.py | 6 +++---
> 3 files changed, 9 insertions(+), 9 deletions(-)
>
> diff --git a/test/py/tests/test_efi_secboot/test_authvar.py b/test/py/tests/test_efi_secboot/test_authvar.py
> index 55dcaa95f1..9912694a3e 100644
> --- a/test/py/tests/test_efi_secboot/test_authvar.py
> +++ b/test/py/tests/test_efi_secboot/test_authvar.py
> @@ -133,7 +133,7 @@ class TestEfiAuthVar(object):
> output = u_boot_console.run_command_list([
> 'host bind 0 %s' % disk_img,
> 'fatload host 0:1 4000000 PK.auth',
> - 'setenv -e -nv -bs -rt -at -i 4000000,$filesize PK',
> + 'setenv -e -nv -bs -rt -at -i 4000000,$filesize PK; echo',
> 'fatload host 0:1 4000000 KEK.auth',
> 'setenv -e -nv -bs -rt -at -i 4000000,$filesize KEK',
> 'fatload host 0:1 4000000 db.auth',
> @@ -174,7 +174,7 @@ class TestEfiAuthVar(object):
> output = u_boot_console.run_command_list([
> 'host bind 0 %s' % disk_img,
> 'fatload host 0:1 4000000 PK.auth',
> - 'setenv -e -nv -bs -rt -at -i 4000000,$filesize PK',
> + 'setenv -e -nv -bs -rt -at -i 4000000,$filesize PK; echo',
> 'fatload host 0:1 4000000 KEK.auth',
> 'setenv -e -nv -bs -rt -at -i 4000000,$filesize KEK',
> 'fatload host 0:1 4000000 db.auth',
> @@ -215,7 +215,7 @@ class TestEfiAuthVar(object):
> output = u_boot_console.run_command_list([
> 'host bind 0 %s' % disk_img,
> 'fatload host 0:1 4000000 PK.auth',
> - 'setenv -e -nv -bs -rt -at -i 4000000,$filesize PK',
> + 'setenv -e -nv -bs -rt -at -i 4000000,$filesize PK; echo',
> 'fatload host 0:1 4000000 KEK.auth',
> 'setenv -e -nv -bs -rt -at -i 4000000,$filesize KEK',
> 'fatload host 0:1 4000000 db.auth',
> @@ -249,7 +249,7 @@ class TestEfiAuthVar(object):
> output = u_boot_console.run_command_list([
> 'host bind 0 %s' % disk_img,
> 'fatload host 0:1 4000000 PK.auth',
> - 'setenv -e -nv -bs -rt -at -i 4000000,$filesize PK',
> + 'setenv -e -nv -bs -rt -at -i 4000000,$filesize PK; echo',
> 'fatload host 0:1 4000000 KEK.auth',
> 'setenv -e -nv -bs -rt -at -i 4000000,$filesize KEK',
> 'fatload host 0:1 4000000 db.auth',
> diff --git a/test/py/tests/test_efi_secboot/test_signed.py b/test/py/tests/test_efi_secboot/test_signed.py
> index 584282b338..fc722ab506 100644
> --- a/test/py/tests/test_efi_secboot/test_signed.py
> +++ b/test/py/tests/test_efi_secboot/test_signed.py
> @@ -29,7 +29,7 @@ class TestEfiSignedImage(object):
> # Test Case 1a, run signed image if no db/dbx
> output = u_boot_console.run_command_list([
> 'host bind 0 %s' % disk_img,
> - 'efidebug boot add 1 HELLO1 host 0:1 /helloworld.efi.signed ""',
> + 'efidebug boot add 1 HELLO1 host 0:1 /helloworld.efi.signed ""; echo',
> 'efidebug boot next 1',
> 'bootefi bootmgr'])
> assert(re.search('Hello, world!', ''.join(output)))
> @@ -81,7 +81,7 @@ class TestEfiSignedImage(object):
> output = u_boot_console.run_command_list([
> 'host bind 0 %s' % disk_img,
> 'fatload host 0:1 4000000 db.auth',
> - 'setenv -e -nv -bs -rt -at -i 4000000,$filesize dbx',
> + 'setenv -e -nv -bs -rt -at -i 4000000,$filesize dbx; echo',
> 'fatload host 0:1 4000000 KEK.auth',
> 'setenv -e -nv -bs -rt -at -i 4000000,$filesize KEK',
> 'fatload host 0:1 4000000 PK.auth',
> diff --git a/test/py/tests/test_efi_secboot/test_unsigned.py b/test/py/tests/test_efi_secboot/test_unsigned.py
> index 22d849afb8..a4af845c51 100644
> --- a/test/py/tests/test_efi_secboot/test_unsigned.py
> +++ b/test/py/tests/test_efi_secboot/test_unsigned.py
> @@ -30,7 +30,7 @@ class TestEfiUnsignedImage(object):
> output = u_boot_console.run_command_list([
> 'host bind 0 %s' % disk_img,
> 'fatload host 0:1 4000000 KEK.auth',
> - 'setenv -e -nv -bs -rt -at -i 4000000,$filesize KEK',
> + 'setenv -e -nv -bs -rt -at -i 4000000,$filesize KEK; echo',
> 'fatload host 0:1 4000000 PK.auth',
> 'setenv -e -nv -bs -rt -at -i 4000000,$filesize PK'])
> assert(not re.search('Failed to set EFI variable', ''.join(output)))
> @@ -58,7 +58,7 @@ class TestEfiUnsignedImage(object):
> output = u_boot_console.run_command_list([
> 'host bind 0 %s' % disk_img,
> 'fatload host 0:1 4000000 db_hello.auth',
> - 'setenv -e -nv -bs -rt -at -i 4000000,$filesize db',
> + 'setenv -e -nv -bs -rt -at -i 4000000,$filesize db; echo',
> 'fatload host 0:1 4000000 KEK.auth',
> 'setenv -e -nv -bs -rt -at -i 4000000,$filesize KEK',
> 'fatload host 0:1 4000000 PK.auth',
> @@ -82,7 +82,7 @@ class TestEfiUnsignedImage(object):
> output = u_boot_console.run_command_list([
> 'host bind 0 %s' % disk_img,
> 'fatload host 0:1 4000000 db_hello.auth',
> - 'setenv -e -nv -bs -rt -at -i 4000000,$filesize dbx',
> + 'setenv -e -nv -bs -rt -at -i 4000000,$filesize dbx; echo',
> 'fatload host 0:1 4000000 KEK.auth',
> 'setenv -e -nv -bs -rt -at -i 4000000,$filesize KEK',
> 'fatload host 0:1 4000000 PK.auth',
> --
> 2.26.2
>
next prev parent reply other threads:[~2020-05-07 0:36 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-05-04 10:33 [PATCH 1/1] test: stabilize test_efi_secboot Heinrich Schuchardt
2020-05-07 0:36 ` AKASHI Takahiro [this message]
2020-05-07 21:14 ` Heinrich Schuchardt
2020-05-07 23:10 ` AKASHI Takahiro
2020-05-11 6:56 ` AKASHI Takahiro
2020-05-21 0:23 ` AKASHI Takahiro
2020-05-21 8:17 ` Heinrich Schuchardt
2020-05-21 9:55 ` AKASHI Takahiro
2020-05-22 6:13 ` Heinrich Schuchardt
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20200507003612.GE20621@laputa \
--to=takahiro.akashi@linaro.org \
--cc=u-boot@lists.denx.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox