mirror of
				https://source.denx.de/u-boot/u-boot.git
				synced 2025-10-31 00:11:51 +01:00 
			
		
		
		
	Finish eliminating CamelCase from net.c and other failures Signed-off-by: Joe Hershberger <joe.hershberger@ni.com> Acked-by: Simon Glass <sjg@chromium.org>
		
			
				
	
	
		
			157 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			157 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * Copyright (c) 2015 National Instruments
 | |
|  *
 | |
|  * (C) Copyright 2015
 | |
|  * Joe Hershberger <joe.hershberger@ni.com>
 | |
|  *
 | |
|  * SPDX-License-Identifier:	GPL-2.0
 | |
|  */
 | |
| 
 | |
| #include <common.h>
 | |
| #include <dm.h>
 | |
| #include <dm/test.h>
 | |
| #include <dm/ut.h>
 | |
| #include <fdtdec.h>
 | |
| #include <malloc.h>
 | |
| #include <net.h>
 | |
| #include <asm/eth.h>
 | |
| 
 | |
| DECLARE_GLOBAL_DATA_PTR;
 | |
| 
 | |
| static int dm_test_eth(struct dm_test_state *dms)
 | |
| {
 | |
| 	net_ping_ip = string_to_ip("1.1.2.2");
 | |
| 
 | |
| 	setenv("ethact", "eth@10002000");
 | |
| 	ut_assertok(net_loop(PING));
 | |
| 	ut_asserteq_str("eth@10002000", getenv("ethact"));
 | |
| 
 | |
| 	setenv("ethact", "eth@10003000");
 | |
| 	ut_assertok(net_loop(PING));
 | |
| 	ut_asserteq_str("eth@10003000", getenv("ethact"));
 | |
| 
 | |
| 	setenv("ethact", "eth@10004000");
 | |
| 	ut_assertok(net_loop(PING));
 | |
| 	ut_asserteq_str("eth@10004000", getenv("ethact"));
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| DM_TEST(dm_test_eth, DM_TESTF_SCAN_FDT);
 | |
| 
 | |
| static int dm_test_eth_alias(struct dm_test_state *dms)
 | |
| {
 | |
| 	net_ping_ip = string_to_ip("1.1.2.2");
 | |
| 	setenv("ethact", "eth0");
 | |
| 	ut_assertok(net_loop(PING));
 | |
| 	ut_asserteq_str("eth@10002000", getenv("ethact"));
 | |
| 
 | |
| 	setenv("ethact", "eth1");
 | |
| 	ut_assertok(net_loop(PING));
 | |
| 	ut_asserteq_str("eth@10004000", getenv("ethact"));
 | |
| 
 | |
| 	/* Expected to fail since eth2 is not defined in the device tree */
 | |
| 	setenv("ethact", "eth2");
 | |
| 	ut_assertok(net_loop(PING));
 | |
| 	ut_asserteq_str("eth@10002000", getenv("ethact"));
 | |
| 
 | |
| 	setenv("ethact", "eth5");
 | |
| 	ut_assertok(net_loop(PING));
 | |
| 	ut_asserteq_str("eth@10003000", getenv("ethact"));
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| DM_TEST(dm_test_eth_alias, DM_TESTF_SCAN_FDT);
 | |
| 
 | |
| static int dm_test_eth_prime(struct dm_test_state *dms)
 | |
| {
 | |
| 	net_ping_ip = string_to_ip("1.1.2.2");
 | |
| 
 | |
| 	/* Expected to be "eth@10003000" because of ethprime variable */
 | |
| 	setenv("ethact", NULL);
 | |
| 	setenv("ethprime", "eth5");
 | |
| 	ut_assertok(net_loop(PING));
 | |
| 	ut_asserteq_str("eth@10003000", getenv("ethact"));
 | |
| 
 | |
| 	/* Expected to be "eth@10002000" because it is first */
 | |
| 	setenv("ethact", NULL);
 | |
| 	setenv("ethprime", NULL);
 | |
| 	ut_assertok(net_loop(PING));
 | |
| 	ut_asserteq_str("eth@10002000", getenv("ethact"));
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| DM_TEST(dm_test_eth_prime, DM_TESTF_SCAN_FDT);
 | |
| 
 | |
| static int dm_test_eth_rotate(struct dm_test_state *dms)
 | |
| {
 | |
| 	char ethaddr[18];
 | |
| 
 | |
| 	/* Invalidate eth1's MAC address */
 | |
| 	net_ping_ip = string_to_ip("1.1.2.2");
 | |
| 	strcpy(ethaddr, getenv("eth1addr"));
 | |
| 	setenv("eth1addr", NULL);
 | |
| 
 | |
| 	/* Make sure that the default is to rotate to the next interface */
 | |
| 	setenv("ethact", "eth@10004000");
 | |
| 	ut_assertok(net_loop(PING));
 | |
| 	ut_asserteq_str("eth@10002000", getenv("ethact"));
 | |
| 
 | |
| 	/* If ethrotate is no, then we should fail on a bad MAC */
 | |
| 	setenv("ethact", "eth@10004000");
 | |
| 	setenv("ethrotate", "no");
 | |
| 	ut_asserteq(-EINVAL, net_loop(PING));
 | |
| 	ut_asserteq_str("eth@10004000", getenv("ethact"));
 | |
| 
 | |
| 	/* Restore the env */
 | |
| 	setenv("eth1addr", ethaddr);
 | |
| 	setenv("ethrotate", NULL);
 | |
| 
 | |
| 	/* Invalidate eth0's MAC address */
 | |
| 	strcpy(ethaddr, getenv("ethaddr"));
 | |
| 	setenv(".flags", "ethaddr");
 | |
| 	setenv("ethaddr", NULL);
 | |
| 
 | |
| 	/* Make sure we can skip invalid devices */
 | |
| 	setenv("ethact", "eth@10004000");
 | |
| 	ut_assertok(net_loop(PING));
 | |
| 	ut_asserteq_str("eth@10004000", getenv("ethact"));
 | |
| 
 | |
| 	/* Restore the env */
 | |
| 	setenv("ethaddr", ethaddr);
 | |
| 	setenv(".flags", NULL);
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| DM_TEST(dm_test_eth_rotate, DM_TESTF_SCAN_FDT);
 | |
| 
 | |
| static int dm_test_net_retry(struct dm_test_state *dms)
 | |
| {
 | |
| 	net_ping_ip = string_to_ip("1.1.2.2");
 | |
| 
 | |
| 	/*
 | |
| 	 * eth1 is disabled and netretry is yes, so the ping should succeed and
 | |
| 	 * the active device should be eth0
 | |
| 	 */
 | |
| 	sandbox_eth_disable_response(1, true);
 | |
| 	setenv("ethact", "eth@10004000");
 | |
| 	setenv("netretry", "yes");
 | |
| 	ut_assertok(net_loop(PING));
 | |
| 	ut_asserteq_str("eth@10002000", getenv("ethact"));
 | |
| 
 | |
| 	/*
 | |
| 	 * eth1 is disabled and netretry is no, so the ping should fail and the
 | |
| 	 * active device should be eth1
 | |
| 	 */
 | |
| 	setenv("ethact", "eth@10004000");
 | |
| 	setenv("netretry", "no");
 | |
| 	ut_asserteq(-ETIMEDOUT, net_loop(PING));
 | |
| 	ut_asserteq_str("eth@10004000", getenv("ethact"));
 | |
| 
 | |
| 	/* Restore the env */
 | |
| 	setenv("netretry", NULL);
 | |
| 	sandbox_eth_disable_response(1, false);
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| DM_TEST(dm_test_net_retry, DM_TESTF_SCAN_FDT);
 |