9de3773a5c
For debugging and dicoverability it is useful to be able to see a list of each event spy in a U-Boot ELF file. Add a script which shows this, along with the event type and the source location. This makes events a little easier to use than weak functions, for example. Add a basic sandbox test as well. We could provide a test for other boards, but for now, few use events. Signed-off-by: Simon Glass <sjg@chromium.org>
21 lines
863 B
Python
21 lines
863 B
Python
# SPDX-License-Identifier: GPL-2.0+
|
|
# Copyright 2021 Google LLC
|
|
# Written by Simon Glass <sjg@chromium.org>
|
|
|
|
import pytest
|
|
import re
|
|
import u_boot_utils as util
|
|
|
|
# This is only a partial test - coverting 64-bit sandbox. It does not test
|
|
# big-endian images, nor 32-bit images
|
|
@pytest.mark.boardspec('sandbox')
|
|
def test_event_dump(u_boot_console):
|
|
"""Test that the "help" command can be executed."""
|
|
cons = u_boot_console
|
|
sandbox = cons.config.build_dir + '/u-boot'
|
|
out = util.run_and_log(cons, ['scripts/event_dump.py', sandbox])
|
|
expect = '''.*Event type Id Source location
|
|
-------------------- ------------------------------ ------------------------------
|
|
EVT_MISC_INIT_F sandbox_misc_init_f .*arch/sandbox/cpu/start.c:'''
|
|
assert re.match(expect, out, re.MULTILINE) is not None
|