Add test infrastructure and validation tooling

Ultraworked with [Sisyphus](https://github.com/code-yeongyu/oh-my-openagent)

Co-authored-by: Sisyphus <clio-agent@sisyphuslabs.ai>
This commit is contained in:
2026-04-17 00:05:04 +01:00
parent 36afba773a
commit 2c7659fe3a
5 changed files with 874 additions and 0 deletions
+141
View File
@@ -0,0 +1,141 @@
#!/usr/bin/env python3
"""Extract quirk entries from Linux kernel source and generate Red Bear OS TOML quirk files.
Usage:
python3 extract-linux-quirks.py /path/to/linux/drivers/pci/quirks.c
python3 extract-linux-quirks.py /path/to/linux/drivers/usb/core/quirks.c
Outputs TOML quirk entries to stdout that can be appended to files in
/etc/quirks.d/ or local/recipes/system/redbear-quirks/source/quirks.d/.
PCI mode: handler-name → flag mapping is heuristic (substring match). Output
requires manual review — the script may misinfer flags. USB table extraction is
direct and does not require review.
"""
import re
import sys
PCI_FLAG_MAP = {
"PCI_DEV_FLAGS_NO_D3": "no_d3cold",
"PCI_DEV_FLAGS_NO_ASPM": "no_aspm",
"PCI_DEV_FLAGS_NO_MSI": "no_msi",
"PCI_DEV_FLAGS_NO_MSIX": "no_msix",
"PCI_DEV_FLAGS_ASSIGN_BARS": "disable_bar_sizing",
"PCI_DEV_FLAGS_BROKEN_PM": "no_pm",
}
USB_FLAG_MAP = {
"USB_QUIRK_STRING_FETCH": "no_string_fetch",
"USB_QUIRK_NO_RESET_RESUME": "need_reset",
"USB_QUIRK_NO_SET_INTF": "no_set_config",
"USB_QUIRK_NO_LPM": "no_lpm",
"USB_QUIRK_NO_U1_U2": "no_u1u2",
"USB_QUIRK_DELAY_INIT": "reset_delay",
"USB_QUIRK_LINEAR_UFRAME_INTR_BINTERVAL": "bad_descriptor",
"USB_QUIRK_DISCONNECT_SUSPEND": "no_suspend",
}
PCI_FIXUP_RE = re.compile(
r'DECLARE_PCI_FIXUP_(?:FINAL|HEADER|EARLY|ENABLE|RESUME|LATE)\s*\(\s*'
r'(?:0x([0-9a-fA-F]+)|PCI_ANY_ID)\s*,\s*'
r'(?:0x([0-9a-fA-F]+)|PCI_ANY_ID)\s*,\s*'
r'(\w+)\s*\)'
)
DMI_MATCH_RE = re.compile(
r'DMI_MATCH\s*\(\s*DMI_([A-Z_]+)\s*,\s*"([^"]+)"\s*\)'
)
USB_QUIRK_TABLE_RE = re.compile(
r'\{\s*USB_DEVICE\s*\(\s*(?:0x([0-9a-fA-F]+)|USB_ANY_ID)\s*,\s*'
r'(?:0x([0-9a-fA-F]+)|USB_ANY_ID)\s*\)\s*,'
r'([^}]+)\}'
)
def extract_pci_fixups(source):
entries = []
for m in PCI_FIXUP_RE.finditer(source):
vendor = int(m.group(1), 16) if m.group(1) else 0xFFFF
device = int(m.group(2), 16) if m.group(2) else 0xFFFF
handler = m.group(3)
entries.append((vendor, device, handler))
return entries
def extract_usb_quirks(source):
entries = []
for m in USB_QUIRK_TABLE_RE.finditer(source):
vendor = int(m.group(1), 16) if m.group(1) else 0xFFFF
product = int(m.group(2), 16) if m.group(2) else 0xFFFF
flags_raw = m.group(3)
flags = []
for flag_name, toml_name in USB_FLAG_MAP.items():
if flag_name in flags_raw:
flags.append(toml_name)
entries.append((vendor, product, flags))
return entries
def format_pci_toml(entries):
lines = []
for vendor, device, flags in entries:
if not flags:
continue
lines.append("[[pci_quirk]]")
if vendor != 0xFFFF:
lines.append(f"vendor = 0x{vendor:04X}")
if device != 0xFFFF:
lines.append(f"device = 0x{device:04X}")
lines.append(f'flags = [{", ".join(f"\"{f}\"" for f in flags)}]')
lines.append("")
return "\n".join(lines)
def format_usb_toml(entries):
lines = []
for vendor, product, flags in entries:
if not flags:
continue
lines.append("[[usb_quirk]]")
if vendor != 0xFFFF:
lines.append(f"vendor = 0x{vendor:04X}")
if product != 0xFFFF:
lines.append(f"product = 0x{product:04X}")
lines.append(f'flags = [{", ".join(f"\"{f}\"" for f in flags)}]')
lines.append("")
return "\n".join(lines)
def main():
if len(sys.argv) < 2:
print(__doc__, file=sys.stderr)
sys.exit(1)
path = sys.argv[1]
with open(path) as f:
source = f.read()
if "usb_quirk" in source.lower() or "USB_QUIRK" in source:
entries = extract_usb_quirks(source)
print(format_usb_toml(entries))
else:
entries = extract_pci_fixups(source)
flags_map = PCI_FLAG_MAP
mapped = []
for vendor, device, handler in entries:
flags = []
for flag_name, toml_name in flags_map.items():
if flag_name.lower() in handler.lower():
flags.append(toml_name)
mapped.append((vendor, device, flags))
print("# WARNING: PCI handler-name → flag mapping is heuristic.")
print("# WARNING: Output requires manual review before committing.")
print("# USB table extraction is direct and does not need review.")
print(format_pci_toml(mapped))
if __name__ == "__main__":
main()
+294
View File
@@ -0,0 +1,294 @@
#!/usr/bin/env bash
# Validate the Red Bear OS Phase 1 desktop substrate (CONSOLE-TO-KDE-DESKTOP-PLAN v2.0).
#
# Modes:
# --guest Run inside a Red Bear OS guest
# --qemu [CONFIG] Boot CONFIG in QEMU and run the same checks automatically
set -euo pipefail
find_uefi_firmware() {
local candidates=(
"/usr/share/ovmf/x64/OVMF.4m.fd"
"/usr/share/OVMF/x64/OVMF.4m.fd"
"/usr/share/ovmf/x64/OVMF_CODE.4m.fd"
"/usr/share/OVMF/x64/OVMF_CODE.4m.fd"
"/usr/share/ovmf/OVMF.fd"
"/usr/share/OVMF/OVMF_CODE.fd"
"/usr/share/qemu/edk2-x86_64-code.fd"
)
local path
for path in "${candidates[@]}"; do
if [[ -f "$path" ]]; then
printf '%s\n' "$path"
return 0
fi
done
return 1
}
run_guest_checks() {
echo "=== Red Bear OS Phase 1 Desktop Substrate Test ==="
echo
local failures=0
require_path() {
local path="$1"
local message="$2"
if [ -e "$path" ]; then
echo " PASS $message"
else
echo " FAIL $message"
failures=$((failures + 1))
fi
}
require_command() {
local cmd="$1"
local message="$2"
if command -v "$cmd" >/dev/null 2>&1; then
echo " PASS $message"
else
echo " FAIL $message"
failures=$((failures + 1))
fi
}
echo "--- relibc POSIX API surface ---"
require_path /usr/include/sys/signalfd.h "sys/signalfd.h header present"
require_path /usr/include/sys/timerfd.h "sys/timerfd.h header present"
require_path /usr/include/sys/eventfd.h "sys/eventfd.h header present"
require_path /usr/lib/libwayland-client.so "libwayland-client.so present (relibc consumer)"
require_command wayland-scanner "wayland-scanner is installed"
echo
echo "--- evdevd input path ---"
require_command evdevd "evdevd command is installed"
require_path /scheme/evdev "/scheme/evdev exists"
if command -v redbear-phase3-input-check >/dev/null 2>&1; then
echo " NOTE redbear-phase3-input-check available (run manually for full input validation)"
fi
echo
echo "--- udev-shim device enumeration ---"
require_command udev-shim "udev-shim command is installed"
require_path /scheme/udev "/scheme/udev exists"
local libinput_found=false
for lib in /usr/lib/libinput.so /usr/lib/libinput.so.10 /usr/lib/libinput.so.*; do
if [ -e "$lib" ]; then
libinput_found=true
break
fi
done
if $libinput_found; then
echo " PASS libinput shared library present"
else
echo " FAIL libinput shared library not found"
failures=$((failures + 1))
fi
echo
echo "--- firmware-loader ---"
require_path /scheme/firmware "/scheme/firmware exists"
require_path /lib/firmware "/lib/firmware directory exists"
echo
echo "--- DRM/KMS ---"
local drm_found=false
if [ -e /usr/bin/redox-drm ] || command -v redox-drm >/dev/null 2>&1; then
drm_found=true
fi
if $drm_found; then
echo " PASS redox-drm is installed"
else
echo " FAIL redox-drm not found"
failures=$((failures + 1))
fi
if [ -e /scheme/drm ]; then
echo " PASS /scheme/drm exists"
else
echo " FAIL /scheme/drm does not exist"
failures=$((failures + 1))
fi
echo
echo "--- health check summary ---"
if command -v redbear-info >/dev/null 2>&1; then
local report
report="$(redbear-info --json 2>/dev/null || true)"
if [ -n "$report" ]; then
local net_ok=false
case "$report" in
*'"networking"'*|*'"virtio_net_present"'*|*'"ip"'*) net_ok=true ;;
esac
if $net_ok; then
echo " PASS networking state reported in redbear-info"
else
echo " FAIL networking state not reported in redbear-info"
failures=$((failures + 1))
fi
local drm_reported=false
case "$report" in
*'scheme drm'*|*'/scheme/drm'*|*'"drm"'*) drm_reported=true ;;
esac
if $drm_reported; then
echo " PASS DRM scheme reported in redbear-info"
else
echo " FAIL DRM scheme not reported in redbear-info"
failures=$((failures + 1))
fi
local fw_reported=false
case "$report" in
*'scheme firmware'*|*'/scheme/firmware'*|*'"firmware"'*) fw_reported=true ;;
esac
if $fw_reported; then
echo " PASS firmware scheme reported in redbear-info"
else
echo " FAIL firmware scheme not reported in redbear-info"
failures=$((failures + 1))
fi
else
echo " FAIL redbear-info --json returned empty"
failures=$((failures + 1))
fi
else
echo " FAIL redbear-info is not installed"
failures=$((failures + 1))
fi
echo
echo "=== Phase 1 Desktop Substrate Test Complete ==="
if [ "$failures" -gt 0 ]; then
echo " $failures check(s) FAILED"
return 1
fi
echo " All checks PASSED"
return 0
}
run_qemu_checks() {
local config="$1"
local firmware
firmware="$(find_uefi_firmware)" || {
echo "ERROR: no usable x86_64 UEFI firmware found" >&2
exit 1
}
local arch image extra
arch="${ARCH:-$(uname -m)}"
image="build/$arch/$config/harddrive.img"
extra="build/$arch/$config/extra.img"
if [[ ! -f "$image" ]]; then
echo "ERROR: missing image $image" >&2
echo "Build it first with: ./local/scripts/build-redbear.sh $config" >&2
exit 1
fi
if [[ ! -f "$extra" ]]; then
truncate -s 1g "$extra"
fi
expect <<EOF
log_user 1
set timeout 300
spawn qemu-system-x86_64 -name {Red Bear OS x86_64} -device qemu-xhci -smp 4 -m 2048 -bios $firmware -chardev stdio,id=debug,signal=off,mux=on -serial chardev:debug -mon chardev=debug -machine q35 -device ich9-intel-hda -device hda-output -device virtio-net,netdev=net0 -netdev user,id=net0 -object filter-dump,id=f1,netdev=net0,file=build/$arch/$config/network.pcap -nographic -vga none -drive file=$image,format=raw,if=none,id=drv0 -device nvme,drive=drv0,serial=NVME_SERIAL -drive file=$extra,format=raw,if=none,id=drv1 -device nvme,drive=drv1,serial=NVME_EXTRA -enable-kvm -cpu host
expect "login:"
send "root\r"
expect "assword:"
send "password\r"
expect "Type 'help' for available commands."
send "echo __READY__\r"
expect "__READY__"
send "test -e /usr/include/sys/signalfd.h && echo __SIGNAFD_OK__ || echo __SIGNAFD_FAIL__\r"
expect {
"__SIGNAFD_OK__" { }
"__SIGNAFD_FAIL__" { puts "FAIL: signalfd header missing"; exit 1 }
}
send "test -e /usr/include/sys/timerfd.h && echo __TIMERFD_OK__ || echo __TIMERFD_FAIL__\r"
expect {
"__TIMERFD_OK__" { }
"__TIMERFD_FAIL__" { puts "FAIL: timerfd header missing"; exit 1 }
}
send "test -e /usr/include/sys/eventfd.h && echo __EVENTFD_OK__ || echo __EVENTFD_FAIL__\r"
expect {
"__EVENTFD_OK__" { }
"__EVENTFD_FAIL__" { puts "FAIL: eventfd header missing"; exit 1 }
}
send "test -e /usr/lib/libwayland-client.so && echo __WAYLAND_LIB_OK__ || echo __WAYLAND_LIB_FAIL__\r"
expect {
"__WAYLAND_LIB_OK__" { }
"__WAYLAND_LIB_FAIL__" { puts "FAIL: libwayland-client missing"; exit 1 }
}
send "command -v evdevd && echo __EVDVD_OK__ || echo __EVDVD_FAIL__\r"
expect {
"__EVDVD_OK__" { }
"__EVDVD_FAIL__" { puts "FAIL: evdevd missing"; exit 1 }
}
send "test -e /scheme/evdev && echo __EVDEV_SCH_OK__ || echo __EVDEV_SCH_FAIL__\r"
expect {
"__EVDEV_SCH_OK__" { }
"__EVDEV_SCH_FAIL__" { puts "FAIL: /scheme/evdev missing"; exit 1 }
}
send "command -v udev-shim && echo __UDEV_OK__ || echo __UDEV_FAIL__\r"
expect {
"__UDEV_OK__" { }
"__UDEV_FAIL__" { puts "FAIL: udev-shim missing"; exit 1 }
}
send "test -e /scheme/udev && echo __UDEV_SCH_OK__ || echo __UDEV_SCH_FAIL__\r"
expect {
"__UDEV_SCH_OK__" { }
"__UDEV_SCH_FAIL__" { puts "FAIL: /scheme/udev missing"; exit 1 }
}
send "test -e /scheme/firmware && echo __FW_SCH_OK__ || echo __FW_SCH_FAIL__\r"
expect {
"__FW_SCH_OK__" { }
"__FW_SCH_FAIL__" { puts "FAIL: /scheme/firmware missing"; exit 1 }
}
send "test -e /lib/firmware && echo __FW_DIR_OK__ || echo __FW_DIR_FAIL__\r"
expect {
"__FW_DIR_OK__" { }
"__FW_DIR_FAIL__" { puts "FAIL: /lib/firmware missing"; exit 1 }
}
send "command -v redox-drm && echo __DRM_OK__ || echo __DRM_FAIL__\r"
expect {
"__DRM_OK__" { }
"__DRM_FAIL__" { puts "FAIL: redox-drm missing"; exit 1 }
}
send "test -e /scheme/drm && echo __DRM_SCH_OK__ || echo __DRM_SCH_FAIL__\r"
expect {
"__DRM_SCH_OK__" { }
"__DRM_SCH_FAIL__" { puts "FAIL: /scheme/drm missing"; exit 1 }
}
send "redbear-info --json\r"
expect "\"virtio_net_present\": true"
expect "scheme firmware is registered"
expect "scheme udev is registered"
send "echo __PHASE1_DONE__\r"
expect "__PHASE1_DONE__"
send "shutdown\r"
expect eof
EOF
}
usage() {
cat <<'USAGE'
Usage:
./local/scripts/test-phase1-desktop-substrate.sh --guest
./local/scripts/test-phase1-desktop-substrate.sh --qemu [redbear-wayland]
USAGE
}
case "${1:-}" in
--guest)
run_guest_checks
;;
--qemu)
run_qemu_checks "${2:-redbear-wayland}"
;;
*)
usage
exit 1
;;
esac