mirror of
https://github.com/u-boot/u-boot.git
synced 2024-12-11 13:43:27 +08:00
df33fd2889
This adds a test to make sure that all the ethernet interfaces have their addresses read properly. At the moment everything is read from the environment, but the next few commits will add additional sources. Signed-off-by: Sean Anderson <sean.anderson@seco.com> Reviewed-by: Simon Glass <sjg@chromium.org>
463 lines
12 KiB
C
463 lines
12 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/*
|
|
* Copyright (c) 2015 National Instruments
|
|
*
|
|
* (C) Copyright 2015
|
|
* Joe Hershberger <joe.hershberger@ni.com>
|
|
*/
|
|
|
|
#include <common.h>
|
|
#include <dm.h>
|
|
#include <env.h>
|
|
#include <fdtdec.h>
|
|
#include <log.h>
|
|
#include <malloc.h>
|
|
#include <net.h>
|
|
#include <asm/eth.h>
|
|
#include <dm/test.h>
|
|
#include <dm/device-internal.h>
|
|
#include <dm/uclass-internal.h>
|
|
#include <test/test.h>
|
|
#include <test/ut.h>
|
|
|
|
#define DM_TEST_ETH_NUM 4
|
|
|
|
static int dm_test_eth(struct unit_test_state *uts)
|
|
{
|
|
net_ping_ip = string_to_ip("1.1.2.2");
|
|
|
|
env_set("ethact", "eth@10002000");
|
|
ut_assertok(net_loop(PING));
|
|
ut_asserteq_str("eth@10002000", env_get("ethact"));
|
|
|
|
env_set("ethact", "eth@10003000");
|
|
ut_assertok(net_loop(PING));
|
|
ut_asserteq_str("eth@10003000", env_get("ethact"));
|
|
|
|
env_set("ethact", "eth@10004000");
|
|
ut_assertok(net_loop(PING));
|
|
ut_asserteq_str("eth@10004000", env_get("ethact"));
|
|
|
|
return 0;
|
|
}
|
|
DM_TEST(dm_test_eth, UT_TESTF_SCAN_FDT);
|
|
|
|
static int dm_test_eth_alias(struct unit_test_state *uts)
|
|
{
|
|
net_ping_ip = string_to_ip("1.1.2.2");
|
|
env_set("ethact", "eth0");
|
|
ut_assertok(net_loop(PING));
|
|
ut_asserteq_str("eth@10002000", env_get("ethact"));
|
|
|
|
env_set("ethact", "eth6");
|
|
ut_assertok(net_loop(PING));
|
|
ut_asserteq_str("eth@10004000", env_get("ethact"));
|
|
|
|
/* Expected to fail since eth1 is not defined in the device tree */
|
|
env_set("ethact", "eth1");
|
|
ut_assertok(net_loop(PING));
|
|
ut_asserteq_str("eth@10002000", env_get("ethact"));
|
|
|
|
env_set("ethact", "eth5");
|
|
ut_assertok(net_loop(PING));
|
|
ut_asserteq_str("eth@10003000", env_get("ethact"));
|
|
|
|
return 0;
|
|
}
|
|
DM_TEST(dm_test_eth_alias, UT_TESTF_SCAN_FDT);
|
|
|
|
static int dm_test_eth_prime(struct unit_test_state *uts)
|
|
{
|
|
net_ping_ip = string_to_ip("1.1.2.2");
|
|
|
|
/* Expected to be "eth@10003000" because of ethprime variable */
|
|
env_set("ethact", NULL);
|
|
env_set("ethprime", "eth5");
|
|
ut_assertok(net_loop(PING));
|
|
ut_asserteq_str("eth@10003000", env_get("ethact"));
|
|
|
|
/* Expected to be "eth@10002000" because it is first */
|
|
env_set("ethact", NULL);
|
|
env_set("ethprime", NULL);
|
|
ut_assertok(net_loop(PING));
|
|
ut_asserteq_str("eth@10002000", env_get("ethact"));
|
|
|
|
return 0;
|
|
}
|
|
DM_TEST(dm_test_eth_prime, UT_TESTF_SCAN_FDT);
|
|
|
|
/**
|
|
* This test case is trying to test the following scenario:
|
|
* - All ethernet devices are not probed
|
|
* - "ethaddr" for all ethernet devices are not set
|
|
* - "ethact" is set to a valid ethernet device name
|
|
*
|
|
* With Sandbox default test configuration, all ethernet devices are
|
|
* probed after power-up, so we have to manually create such scenario:
|
|
* - Remove all ethernet devices
|
|
* - Remove all "ethaddr" environment variables
|
|
* - Set "ethact" to the first ethernet device
|
|
*
|
|
* Do a ping test to see if anything goes wrong.
|
|
*/
|
|
static int dm_test_eth_act(struct unit_test_state *uts)
|
|
{
|
|
struct udevice *dev[DM_TEST_ETH_NUM];
|
|
const char *ethname[DM_TEST_ETH_NUM] = {"eth@10002000", "eth@10003000",
|
|
"sbe5", "eth@10004000"};
|
|
const char *addrname[DM_TEST_ETH_NUM] = {"ethaddr", "eth5addr",
|
|
"eth3addr", "eth6addr"};
|
|
char ethaddr[DM_TEST_ETH_NUM][18];
|
|
int i;
|
|
|
|
memset(ethaddr, '\0', sizeof(ethaddr));
|
|
net_ping_ip = string_to_ip("1.1.2.2");
|
|
|
|
/* Prepare the test scenario */
|
|
for (i = 0; i < DM_TEST_ETH_NUM; i++) {
|
|
ut_assertok(uclass_find_device_by_name(UCLASS_ETH,
|
|
ethname[i], &dev[i]));
|
|
ut_assertok(device_remove(dev[i], DM_REMOVE_NORMAL));
|
|
|
|
/* Invalidate MAC address */
|
|
strncpy(ethaddr[i], env_get(addrname[i]), 17);
|
|
/* Must disable access protection for ethaddr before clearing */
|
|
env_set(".flags", addrname[i]);
|
|
env_set(addrname[i], NULL);
|
|
}
|
|
|
|
/* Set ethact to "eth@10002000" */
|
|
env_set("ethact", ethname[0]);
|
|
|
|
/* Segment fault might happen if something is wrong */
|
|
ut_asserteq(-ENODEV, net_loop(PING));
|
|
|
|
for (i = 0; i < DM_TEST_ETH_NUM; i++) {
|
|
/* Restore the env */
|
|
env_set(".flags", addrname[i]);
|
|
env_set(addrname[i], ethaddr[i]);
|
|
|
|
/* Probe the device again */
|
|
ut_assertok(device_probe(dev[i]));
|
|
}
|
|
env_set(".flags", NULL);
|
|
env_set("ethact", NULL);
|
|
|
|
return 0;
|
|
}
|
|
DM_TEST(dm_test_eth_act, UT_TESTF_SCAN_FDT);
|
|
|
|
/* Ensure that all addresses are loaded properly */
|
|
static int dm_test_ethaddr(struct unit_test_state *uts)
|
|
{
|
|
static const char *const addr[] = {
|
|
"02:00:11:22:33:44",
|
|
"02:00:11:22:33:48", /* dsa slave */
|
|
"02:00:11:22:33:45",
|
|
"02:00:11:22:33:48", /* dsa master */
|
|
"02:00:11:22:33:46",
|
|
"02:00:11:22:33:47",
|
|
"02:00:11:22:33:48", /* dsa slave */
|
|
"02:00:11:22:33:49",
|
|
};
|
|
int i;
|
|
|
|
for (i = 0; i < ARRAY_SIZE(addr); i++) {
|
|
char addrname[10];
|
|
|
|
if (i)
|
|
snprintf(addrname, sizeof(addrname), "eth%daddr", i + 1);
|
|
else
|
|
strcpy(addrname, "ethaddr");
|
|
ut_asserteq_str(addr[i], env_get(addrname));
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
DM_TEST(dm_test_ethaddr, UT_TESTF_SCAN_FDT);
|
|
|
|
/* The asserts include a return on fail; cleanup in the caller */
|
|
static int _dm_test_eth_rotate1(struct unit_test_state *uts)
|
|
{
|
|
/* Make sure that the default is to rotate to the next interface */
|
|
env_set("ethact", "eth@10004000");
|
|
ut_assertok(net_loop(PING));
|
|
ut_asserteq_str("eth@10002000", env_get("ethact"));
|
|
|
|
/* If ethrotate is no, then we should fail on a bad MAC */
|
|
env_set("ethact", "eth@10004000");
|
|
env_set("ethrotate", "no");
|
|
ut_asserteq(-EINVAL, net_loop(PING));
|
|
ut_asserteq_str("eth@10004000", env_get("ethact"));
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int _dm_test_eth_rotate2(struct unit_test_state *uts)
|
|
{
|
|
/* Make sure we can skip invalid devices */
|
|
env_set("ethact", "eth@10004000");
|
|
ut_assertok(net_loop(PING));
|
|
ut_asserteq_str("eth@10004000", env_get("ethact"));
|
|
|
|
/* Make sure we can handle device name which is not eth# */
|
|
env_set("ethact", "sbe5");
|
|
ut_assertok(net_loop(PING));
|
|
ut_asserteq_str("sbe5", env_get("ethact"));
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int dm_test_eth_rotate(struct unit_test_state *uts)
|
|
{
|
|
char ethaddr[18];
|
|
int retval;
|
|
|
|
/* Set target IP to mock ping */
|
|
net_ping_ip = string_to_ip("1.1.2.2");
|
|
|
|
/* Invalidate eth1's MAC address */
|
|
memset(ethaddr, '\0', sizeof(ethaddr));
|
|
strncpy(ethaddr, env_get("eth6addr"), 17);
|
|
/* Must disable access protection for eth6addr before clearing */
|
|
env_set(".flags", "eth6addr");
|
|
env_set("eth6addr", NULL);
|
|
|
|
retval = _dm_test_eth_rotate1(uts);
|
|
|
|
/* Restore the env */
|
|
env_set("eth6addr", ethaddr);
|
|
env_set("ethrotate", NULL);
|
|
|
|
if (!retval) {
|
|
/* Invalidate eth0's MAC address */
|
|
strncpy(ethaddr, env_get("ethaddr"), 17);
|
|
/* Must disable access protection for ethaddr before clearing */
|
|
env_set(".flags", "ethaddr");
|
|
env_set("ethaddr", NULL);
|
|
|
|
retval = _dm_test_eth_rotate2(uts);
|
|
|
|
/* Restore the env */
|
|
env_set("ethaddr", ethaddr);
|
|
}
|
|
/* Restore the env */
|
|
env_set(".flags", NULL);
|
|
|
|
return retval;
|
|
}
|
|
DM_TEST(dm_test_eth_rotate, UT_TESTF_SCAN_FDT);
|
|
|
|
/* The asserts include a return on fail; cleanup in the caller */
|
|
static int _dm_test_net_retry(struct unit_test_state *uts)
|
|
{
|
|
/*
|
|
* eth1 is disabled and netretry is yes, so the ping should succeed and
|
|
* the active device should be eth0
|
|
*/
|
|
sandbox_eth_disable_response(1, true);
|
|
env_set("ethact", "lan1");
|
|
env_set("netretry", "yes");
|
|
sandbox_eth_skip_timeout();
|
|
ut_assertok(net_loop(PING));
|
|
ut_asserteq_str("eth@10002000", env_get("ethact"));
|
|
|
|
/*
|
|
* eth1 is disabled and netretry is no, so the ping should fail and the
|
|
* active device should be eth1
|
|
*/
|
|
env_set("ethact", "lan1");
|
|
env_set("netretry", "no");
|
|
sandbox_eth_skip_timeout();
|
|
ut_asserteq(-ENONET, net_loop(PING));
|
|
ut_asserteq_str("lan1", env_get("ethact"));
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int dm_test_net_retry(struct unit_test_state *uts)
|
|
{
|
|
int retval;
|
|
|
|
net_ping_ip = string_to_ip("1.1.2.2");
|
|
|
|
retval = _dm_test_net_retry(uts);
|
|
|
|
/* Restore the env */
|
|
env_set("netretry", NULL);
|
|
sandbox_eth_disable_response(1, false);
|
|
|
|
return retval;
|
|
}
|
|
DM_TEST(dm_test_net_retry, UT_TESTF_SCAN_FDT);
|
|
|
|
static int sb_check_arp_reply(struct udevice *dev, void *packet,
|
|
unsigned int len)
|
|
{
|
|
struct eth_sandbox_priv *priv = dev_get_priv(dev);
|
|
struct ethernet_hdr *eth = packet;
|
|
struct arp_hdr *arp;
|
|
/* Used by all of the ut_assert macros */
|
|
struct unit_test_state *uts = priv->priv;
|
|
|
|
if (ntohs(eth->et_protlen) != PROT_ARP)
|
|
return 0;
|
|
|
|
arp = packet + ETHER_HDR_SIZE;
|
|
|
|
if (ntohs(arp->ar_op) != ARPOP_REPLY)
|
|
return 0;
|
|
|
|
/* This test would be worthless if we are not waiting */
|
|
ut_assert(arp_is_waiting());
|
|
|
|
/* Validate response */
|
|
ut_asserteq_mem(eth->et_src, net_ethaddr, ARP_HLEN);
|
|
ut_asserteq_mem(eth->et_dest, priv->fake_host_hwaddr, ARP_HLEN);
|
|
ut_assert(eth->et_protlen == htons(PROT_ARP));
|
|
|
|
ut_assert(arp->ar_hrd == htons(ARP_ETHER));
|
|
ut_assert(arp->ar_pro == htons(PROT_IP));
|
|
ut_assert(arp->ar_hln == ARP_HLEN);
|
|
ut_assert(arp->ar_pln == ARP_PLEN);
|
|
ut_asserteq_mem(&arp->ar_sha, net_ethaddr, ARP_HLEN);
|
|
ut_assert(net_read_ip(&arp->ar_spa).s_addr == net_ip.s_addr);
|
|
ut_asserteq_mem(&arp->ar_tha, priv->fake_host_hwaddr, ARP_HLEN);
|
|
ut_assert(net_read_ip(&arp->ar_tpa).s_addr ==
|
|
string_to_ip("1.1.2.4").s_addr);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int sb_with_async_arp_handler(struct udevice *dev, void *packet,
|
|
unsigned int len)
|
|
{
|
|
struct eth_sandbox_priv *priv = dev_get_priv(dev);
|
|
struct ethernet_hdr *eth = packet;
|
|
struct arp_hdr *arp = packet + ETHER_HDR_SIZE;
|
|
int ret;
|
|
|
|
/*
|
|
* If we are about to generate a reply to ARP, first inject a request
|
|
* from another host
|
|
*/
|
|
if (ntohs(eth->et_protlen) == PROT_ARP &&
|
|
ntohs(arp->ar_op) == ARPOP_REQUEST) {
|
|
/* Make sure sandbox_eth_recv_arp_req() knows who is asking */
|
|
priv->fake_host_ipaddr = string_to_ip("1.1.2.4");
|
|
|
|
ret = sandbox_eth_recv_arp_req(dev);
|
|
if (ret)
|
|
return ret;
|
|
}
|
|
|
|
sandbox_eth_arp_req_to_reply(dev, packet, len);
|
|
sandbox_eth_ping_req_to_reply(dev, packet, len);
|
|
|
|
return sb_check_arp_reply(dev, packet, len);
|
|
}
|
|
|
|
static int dm_test_eth_async_arp_reply(struct unit_test_state *uts)
|
|
{
|
|
net_ping_ip = string_to_ip("1.1.2.2");
|
|
|
|
sandbox_eth_set_tx_handler(0, sb_with_async_arp_handler);
|
|
/* Used by all of the ut_assert macros in the tx_handler */
|
|
sandbox_eth_set_priv(0, uts);
|
|
|
|
env_set("ethact", "eth@10002000");
|
|
ut_assertok(net_loop(PING));
|
|
ut_asserteq_str("eth@10002000", env_get("ethact"));
|
|
|
|
sandbox_eth_set_tx_handler(0, NULL);
|
|
|
|
return 0;
|
|
}
|
|
|
|
DM_TEST(dm_test_eth_async_arp_reply, UT_TESTF_SCAN_FDT);
|
|
|
|
static int sb_check_ping_reply(struct udevice *dev, void *packet,
|
|
unsigned int len)
|
|
{
|
|
struct eth_sandbox_priv *priv = dev_get_priv(dev);
|
|
struct ethernet_hdr *eth = packet;
|
|
struct ip_udp_hdr *ip;
|
|
struct icmp_hdr *icmp;
|
|
/* Used by all of the ut_assert macros */
|
|
struct unit_test_state *uts = priv->priv;
|
|
|
|
if (ntohs(eth->et_protlen) != PROT_IP)
|
|
return 0;
|
|
|
|
ip = packet + ETHER_HDR_SIZE;
|
|
|
|
if (ip->ip_p != IPPROTO_ICMP)
|
|
return 0;
|
|
|
|
icmp = (struct icmp_hdr *)&ip->udp_src;
|
|
|
|
if (icmp->type != ICMP_ECHO_REPLY)
|
|
return 0;
|
|
|
|
/* This test would be worthless if we are not waiting */
|
|
ut_assert(arp_is_waiting());
|
|
|
|
/* Validate response */
|
|
ut_asserteq_mem(eth->et_src, net_ethaddr, ARP_HLEN);
|
|
ut_asserteq_mem(eth->et_dest, priv->fake_host_hwaddr, ARP_HLEN);
|
|
ut_assert(eth->et_protlen == htons(PROT_IP));
|
|
|
|
ut_assert(net_read_ip(&ip->ip_src).s_addr == net_ip.s_addr);
|
|
ut_assert(net_read_ip(&ip->ip_dst).s_addr ==
|
|
string_to_ip("1.1.2.4").s_addr);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int sb_with_async_ping_handler(struct udevice *dev, void *packet,
|
|
unsigned int len)
|
|
{
|
|
struct eth_sandbox_priv *priv = dev_get_priv(dev);
|
|
struct ethernet_hdr *eth = packet;
|
|
struct arp_hdr *arp = packet + ETHER_HDR_SIZE;
|
|
int ret;
|
|
|
|
/*
|
|
* If we are about to generate a reply to ARP, first inject a request
|
|
* from another host
|
|
*/
|
|
if (ntohs(eth->et_protlen) == PROT_ARP &&
|
|
ntohs(arp->ar_op) == ARPOP_REQUEST) {
|
|
/* Make sure sandbox_eth_recv_arp_req() knows who is asking */
|
|
priv->fake_host_ipaddr = string_to_ip("1.1.2.4");
|
|
|
|
ret = sandbox_eth_recv_ping_req(dev);
|
|
if (ret)
|
|
return ret;
|
|
}
|
|
|
|
sandbox_eth_arp_req_to_reply(dev, packet, len);
|
|
sandbox_eth_ping_req_to_reply(dev, packet, len);
|
|
|
|
return sb_check_ping_reply(dev, packet, len);
|
|
}
|
|
|
|
static int dm_test_eth_async_ping_reply(struct unit_test_state *uts)
|
|
{
|
|
net_ping_ip = string_to_ip("1.1.2.2");
|
|
|
|
sandbox_eth_set_tx_handler(0, sb_with_async_ping_handler);
|
|
/* Used by all of the ut_assert macros in the tx_handler */
|
|
sandbox_eth_set_priv(0, uts);
|
|
|
|
env_set("ethact", "eth@10002000");
|
|
ut_assertok(net_loop(PING));
|
|
ut_asserteq_str("eth@10002000", env_get("ethact"));
|
|
|
|
sandbox_eth_set_tx_handler(0, NULL);
|
|
|
|
return 0;
|
|
}
|
|
|
|
DM_TEST(dm_test_eth_async_ping_reply, UT_TESTF_SCAN_FDT);
|