Add test infrastructure and validation tooling
Ultraworked with [Sisyphus](https://github.com/code-yeongyu/oh-my-openagent) Co-authored-by: Sisyphus <clio-agent@sisyphuslabs.ai>
This commit is contained in:
@@ -0,0 +1,15 @@
|
||||
#TODO: Runtime validation requires redox-drm scheme daemon running on bare metal or QEMU
|
||||
|
||||
[source]
|
||||
# no external source — inline test program
|
||||
path = "source"
|
||||
|
||||
[build]
|
||||
template = "custom"
|
||||
dependencies = [
|
||||
"redox-drm",
|
||||
]
|
||||
script = """
|
||||
DYNAMIC_INIT
|
||||
cookbook_cargo
|
||||
"""
|
||||
@@ -0,0 +1,11 @@
|
||||
[package]
|
||||
name = "redox-drm-prime-test"
|
||||
version = "0.1.0"
|
||||
edition = "2021"
|
||||
description = "PRIME DMA-BUF test for redox-drm scheme"
|
||||
|
||||
[[bin]]
|
||||
name = "redox-drm-prime-test"
|
||||
path = "main.rs"
|
||||
|
||||
[dependencies]
|
||||
@@ -0,0 +1,413 @@
|
||||
use std::ffi::c_void;
|
||||
use std::fs::{File, OpenOptions};
|
||||
use std::io::{self, Read, Write};
|
||||
use std::mem::{size_of, MaybeUninit};
|
||||
use std::os::fd::AsRawFd;
|
||||
use std::process::ExitCode;
|
||||
use std::ptr::{self, NonNull};
|
||||
use std::slice;
|
||||
|
||||
const DRM_CARD_PATH: &str = "/scheme/drm/card0";
|
||||
const GEM_SIZE: usize = 4096;
|
||||
const MAGIC_PATTERN: [u8; 16] = *b"RBOS-PRIME-TEST!";
|
||||
|
||||
const DRM_IOCTL_BASE: usize = 0x00A0;
|
||||
const DRM_IOCTL_GEM_CREATE: usize = DRM_IOCTL_BASE + 26;
|
||||
const DRM_IOCTL_GEM_CLOSE: usize = DRM_IOCTL_BASE + 27;
|
||||
const DRM_IOCTL_GEM_MMAP: usize = DRM_IOCTL_BASE + 28;
|
||||
const DRM_IOCTL_PRIME_HANDLE_TO_FD: usize = DRM_IOCTL_BASE + 29;
|
||||
const DRM_IOCTL_PRIME_FD_TO_HANDLE: usize = DRM_IOCTL_BASE + 30;
|
||||
|
||||
const MAP_SHARED: i32 = 0x0001;
|
||||
const PROT_WRITE: i32 = 0x0002;
|
||||
const PROT_READ: i32 = 0x0004;
|
||||
const MAP_FAILED: isize = -1;
|
||||
|
||||
#[repr(C)]
|
||||
#[derive(Clone, Copy, Debug, Default)]
|
||||
struct GemCreateWire {
|
||||
size: u64,
|
||||
handle: u32,
|
||||
_pad: u32,
|
||||
}
|
||||
|
||||
#[repr(C)]
|
||||
#[derive(Clone, Copy, Debug, Default)]
|
||||
struct GemCloseWire {
|
||||
handle: u32,
|
||||
}
|
||||
|
||||
#[repr(C)]
|
||||
#[derive(Clone, Copy, Debug, Default)]
|
||||
struct GemMmapWire {
|
||||
handle: u32,
|
||||
_pad: u32,
|
||||
offset: u64,
|
||||
}
|
||||
|
||||
#[repr(C)]
|
||||
#[derive(Clone, Copy, Debug, Default)]
|
||||
struct PrimeHandleToFdWire {
|
||||
handle: u32,
|
||||
flags: u32,
|
||||
}
|
||||
|
||||
#[repr(C)]
|
||||
#[derive(Clone, Copy, Debug, Default)]
|
||||
struct PrimeHandleToFdResponseWire {
|
||||
fd: i32,
|
||||
_pad: u32,
|
||||
}
|
||||
|
||||
#[repr(C)]
|
||||
#[derive(Clone, Copy, Debug, Default)]
|
||||
struct PrimeFdToHandleWire {
|
||||
fd: i32,
|
||||
_pad: u32,
|
||||
}
|
||||
|
||||
#[repr(C)]
|
||||
#[derive(Clone, Copy, Debug, Default)]
|
||||
struct PrimeFdToHandleResponseWire {
|
||||
handle: u32,
|
||||
_pad: u32,
|
||||
}
|
||||
|
||||
unsafe extern "C" {
|
||||
fn mmap(
|
||||
addr: *mut c_void,
|
||||
len: usize,
|
||||
prot: i32,
|
||||
flags: i32,
|
||||
fd: i32,
|
||||
offset: isize,
|
||||
) -> *mut c_void;
|
||||
fn munmap(addr: *mut c_void, len: usize) -> i32;
|
||||
}
|
||||
|
||||
struct MappedRegion {
|
||||
ptr: NonNull<u8>,
|
||||
len: usize,
|
||||
}
|
||||
|
||||
impl MappedRegion {
|
||||
fn map(file: &File, len: usize, offset: u64) -> io::Result<Self> {
|
||||
let offset = isize::try_from(offset).map_err(|_| {
|
||||
io::Error::new(
|
||||
io::ErrorKind::InvalidInput,
|
||||
format!("mmap offset {offset} does not fit in isize"),
|
||||
)
|
||||
})?;
|
||||
|
||||
let ptr = unsafe {
|
||||
mmap(
|
||||
ptr::null_mut(),
|
||||
len,
|
||||
PROT_READ | PROT_WRITE,
|
||||
MAP_SHARED,
|
||||
file.as_raw_fd(),
|
||||
offset,
|
||||
)
|
||||
};
|
||||
|
||||
if ptr as isize == MAP_FAILED {
|
||||
return Err(io::Error::last_os_error());
|
||||
}
|
||||
|
||||
let ptr = NonNull::new(ptr.cast::<u8>())
|
||||
.ok_or_else(|| io::Error::other("mmap returned a null pointer"))?;
|
||||
|
||||
Ok(Self { ptr, len })
|
||||
}
|
||||
|
||||
fn as_slice(&self) -> &[u8] {
|
||||
unsafe { slice::from_raw_parts(self.ptr.as_ptr(), self.len) }
|
||||
}
|
||||
|
||||
fn as_mut_slice(&mut self) -> &mut [u8] {
|
||||
unsafe { slice::from_raw_parts_mut(self.ptr.as_ptr(), self.len) }
|
||||
}
|
||||
}
|
||||
|
||||
impl Drop for MappedRegion {
|
||||
fn drop(&mut self) {
|
||||
let _ = unsafe { munmap(self.ptr.as_ptr().cast::<c_void>(), self.len) };
|
||||
}
|
||||
}
|
||||
|
||||
fn main() -> ExitCode {
|
||||
match run() {
|
||||
Ok(()) => {
|
||||
println!("PASS: PRIME DMA-BUF test completed");
|
||||
ExitCode::SUCCESS
|
||||
}
|
||||
Err(err) => {
|
||||
println!("FAIL: PRIME DMA-BUF test aborted: {err}");
|
||||
ExitCode::FAILURE
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
fn run() -> io::Result<()> {
|
||||
let mut card = step("open /scheme/drm/card0", || open_card())?;
|
||||
|
||||
let gem = step("allocate GEM buffer", || {
|
||||
ioctl::<_, GemCreateWire>(
|
||||
&mut card,
|
||||
DRM_IOCTL_GEM_CREATE,
|
||||
&GemCreateWire {
|
||||
size: GEM_SIZE as u64,
|
||||
..GemCreateWire::default()
|
||||
},
|
||||
)
|
||||
})?;
|
||||
println!("info: created GEM handle {}", gem.handle);
|
||||
|
||||
let gem_map = step("request GEM mmap offset", || {
|
||||
ioctl::<_, GemMmapWire>(
|
||||
&mut card,
|
||||
DRM_IOCTL_GEM_MMAP,
|
||||
&GemMmapWire {
|
||||
handle: gem.handle,
|
||||
..GemMmapWire::default()
|
||||
},
|
||||
)
|
||||
})?;
|
||||
println!("info: GEM mmap offset/address {:#x}", gem_map.offset);
|
||||
|
||||
let mut gem_region = step("mmap GEM buffer", || {
|
||||
MappedRegion::map(&card, GEM_SIZE, gem_map.offset)
|
||||
})?;
|
||||
|
||||
step("write magic pattern into GEM buffer", || {
|
||||
let bytes = gem_region.as_mut_slice();
|
||||
bytes.fill(0);
|
||||
bytes[..MAGIC_PATTERN.len()].copy_from_slice(&MAGIC_PATTERN);
|
||||
Ok(())
|
||||
})?;
|
||||
|
||||
let export = step("export GEM handle via PRIME_HANDLE_TO_FD", || {
|
||||
ioctl::<_, PrimeHandleToFdResponseWire>(
|
||||
&mut card,
|
||||
DRM_IOCTL_PRIME_HANDLE_TO_FD,
|
||||
&PrimeHandleToFdWire {
|
||||
handle: gem.handle,
|
||||
flags: 0,
|
||||
},
|
||||
)
|
||||
})?;
|
||||
if export.fd < 0 {
|
||||
return Err(io::Error::other(format!(
|
||||
"scheme returned a negative PRIME fd token: {}",
|
||||
export.fd
|
||||
)));
|
||||
}
|
||||
println!("info: exported PRIME token {}", export.fd);
|
||||
|
||||
let dmabuf_path = format!("{DRM_CARD_PATH}/dmabuf/{}", export.fd);
|
||||
let dmabuf = step("open exported dmabuf node", || {
|
||||
OpenOptions::new()
|
||||
.read(true)
|
||||
.write(true)
|
||||
.open(&dmabuf_path)
|
||||
.map_err(|err| {
|
||||
io::Error::new(err.kind(), format!("failed to open {dmabuf_path}: {err}"))
|
||||
})
|
||||
})?;
|
||||
println!("info: dmabuf fd {}", dmabuf.as_raw_fd());
|
||||
|
||||
let dmabuf_region = step("mmap exported dmabuf fd", || {
|
||||
MappedRegion::map(&dmabuf, GEM_SIZE, 0)
|
||||
})?;
|
||||
|
||||
step("verify dmabuf mapping sees magic pattern", || {
|
||||
let observed = &dmabuf_region.as_slice()[..MAGIC_PATTERN.len()];
|
||||
if observed != MAGIC_PATTERN {
|
||||
return Err(io::Error::other(format!(
|
||||
"expected {:?}, observed {:?}",
|
||||
MAGIC_PATTERN, observed
|
||||
)));
|
||||
}
|
||||
Ok(())
|
||||
})?;
|
||||
|
||||
// The scheme's PRIME_FD_TO_HANDLE expects the opaque export token
|
||||
// (returned by PRIME_HANDLE_TO_FD), not the raw GEM handle.
|
||||
// In production, libdrm extracts the token via redox_fpath() on the dmabuf fd.
|
||||
let imported = step("import via PRIME_FD_TO_HANDLE using export token", || {
|
||||
ioctl::<_, PrimeFdToHandleResponseWire>(
|
||||
&mut card,
|
||||
DRM_IOCTL_PRIME_FD_TO_HANDLE,
|
||||
&PrimeFdToHandleWire {
|
||||
fd: export.fd,
|
||||
_pad: 0,
|
||||
},
|
||||
)
|
||||
})?;
|
||||
|
||||
step("verify imported handle matches original GEM handle", || {
|
||||
if imported.handle != gem.handle {
|
||||
return Err(io::Error::other(format!(
|
||||
"imported handle {} did not match original {}",
|
||||
imported.handle, gem.handle
|
||||
)));
|
||||
}
|
||||
Ok(())
|
||||
})?;
|
||||
|
||||
drop(dmabuf_region);
|
||||
drop(dmabuf);
|
||||
drop(gem_region);
|
||||
|
||||
step("close GEM handle", || {
|
||||
ioctl_no_response(
|
||||
&mut card,
|
||||
DRM_IOCTL_GEM_CLOSE,
|
||||
&GemCloseWire { handle: gem.handle },
|
||||
)
|
||||
})?;
|
||||
|
||||
test_stale_token_after_gem_close(&mut card)?;
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
fn test_stale_token_after_gem_close(card: &mut File) -> io::Result<()> {
|
||||
let gem2 = step("stale-token: allocate second GEM", || {
|
||||
ioctl::<_, GemCreateWire>(
|
||||
card,
|
||||
DRM_IOCTL_GEM_CREATE,
|
||||
&GemCreateWire {
|
||||
size: GEM_SIZE as u64,
|
||||
..GemCreateWire::default()
|
||||
},
|
||||
)
|
||||
})?;
|
||||
|
||||
let export2 = step("stale-token: export via PRIME_HANDLE_TO_FD", || {
|
||||
ioctl::<_, PrimeHandleToFdResponseWire>(
|
||||
card,
|
||||
DRM_IOCTL_PRIME_HANDLE_TO_FD,
|
||||
&PrimeHandleToFdWire {
|
||||
handle: gem2.handle,
|
||||
flags: 0,
|
||||
},
|
||||
)
|
||||
})?;
|
||||
assert!(export2.fd >= 0);
|
||||
|
||||
step("stale-token: close GEM before opening dmabuf", || {
|
||||
ioctl_no_response(
|
||||
card,
|
||||
DRM_IOCTL_GEM_CLOSE,
|
||||
&GemCloseWire {
|
||||
handle: gem2.handle,
|
||||
},
|
||||
)
|
||||
})?;
|
||||
|
||||
step(
|
||||
"stale-token: open dmabuf with stale token must fail",
|
||||
|| {
|
||||
let stale_path = format!("{DRM_CARD_PATH}/dmabuf/{}", export2.fd);
|
||||
match OpenOptions::new().read(true).write(true).open(&stale_path) {
|
||||
Ok(_) => Err(io::Error::other(
|
||||
"expected ENOENT for stale token, but open succeeded",
|
||||
)),
|
||||
Err(e) if e.kind() == io::ErrorKind::NotFound => Ok(()),
|
||||
Err(e) => Err(io::Error::other(format!("wrong error kind: {e}"))),
|
||||
}
|
||||
},
|
||||
)?;
|
||||
|
||||
step(
|
||||
"stale-token: PRIME_FD_TO_HANDLE with stale token must fail",
|
||||
|| match ioctl::<_, PrimeFdToHandleResponseWire>(
|
||||
card,
|
||||
DRM_IOCTL_PRIME_FD_TO_HANDLE,
|
||||
&PrimeFdToHandleWire {
|
||||
fd: export2.fd,
|
||||
_pad: 0,
|
||||
},
|
||||
) {
|
||||
Ok(_) => Err(io::Error::other(
|
||||
"expected ENOENT for stale token, but import succeeded",
|
||||
)),
|
||||
Err(e) if e.kind() == io::ErrorKind::NotFound => Ok(()),
|
||||
Err(e) => Err(io::Error::other(format!("wrong error kind: {e}"))),
|
||||
},
|
||||
)
|
||||
}
|
||||
|
||||
fn open_card() -> io::Result<File> {
|
||||
OpenOptions::new()
|
||||
.read(true)
|
||||
.write(true)
|
||||
.open(DRM_CARD_PATH)
|
||||
.map_err(|err| io::Error::new(err.kind(), format!("failed to open {DRM_CARD_PATH}: {err}")))
|
||||
}
|
||||
|
||||
fn step<T, F>(name: &str, action: F) -> io::Result<T>
|
||||
where
|
||||
F: FnOnce() -> io::Result<T>,
|
||||
{
|
||||
match action() {
|
||||
Ok(value) => {
|
||||
println!("PASS: {name}");
|
||||
Ok(value)
|
||||
}
|
||||
Err(err) => {
|
||||
println!("FAIL: {name}: {err}");
|
||||
Err(err)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
fn ioctl<TReq, TResp>(file: &mut File, request: usize, payload: &TReq) -> io::Result<TResp>
|
||||
where
|
||||
TReq: Copy,
|
||||
TResp: Copy,
|
||||
{
|
||||
write_request(file, request, payload)?;
|
||||
read_plain(file)
|
||||
}
|
||||
|
||||
fn ioctl_no_response<TReq>(file: &mut File, request: usize, payload: &TReq) -> io::Result<()>
|
||||
where
|
||||
TReq: Copy,
|
||||
{
|
||||
write_request(file, request, payload)?;
|
||||
let mut ack = [0_u8; 1];
|
||||
file.read_exact(&mut ack)?;
|
||||
Ok(())
|
||||
}
|
||||
|
||||
fn write_request<TReq>(file: &mut File, request: usize, payload: &TReq) -> io::Result<()>
|
||||
where
|
||||
TReq: Copy,
|
||||
{
|
||||
let request = u64::try_from(request).map_err(|_| {
|
||||
io::Error::new(
|
||||
io::ErrorKind::InvalidInput,
|
||||
format!("request code {request} does not fit in u64"),
|
||||
)
|
||||
})?;
|
||||
|
||||
file.write_all(&request.to_le_bytes())?;
|
||||
file.write_all(as_bytes(payload))?;
|
||||
Ok(())
|
||||
}
|
||||
|
||||
fn read_plain<T>(file: &mut File) -> io::Result<T>
|
||||
where
|
||||
T: Copy,
|
||||
{
|
||||
let mut value = MaybeUninit::<T>::uninit();
|
||||
let buf = unsafe { slice::from_raw_parts_mut(value.as_mut_ptr().cast::<u8>(), size_of::<T>()) };
|
||||
file.read_exact(buf)?;
|
||||
Ok(unsafe { value.assume_init() })
|
||||
}
|
||||
|
||||
fn as_bytes<T>(value: &T) -> &[u8] {
|
||||
unsafe { slice::from_raw_parts((value as *const T).cast::<u8>(), size_of::<T>()) }
|
||||
}
|
||||
@@ -0,0 +1,141 @@
|
||||
#!/usr/bin/env python3
|
||||
"""Extract quirk entries from Linux kernel source and generate Red Bear OS TOML quirk files.
|
||||
|
||||
Usage:
|
||||
python3 extract-linux-quirks.py /path/to/linux/drivers/pci/quirks.c
|
||||
python3 extract-linux-quirks.py /path/to/linux/drivers/usb/core/quirks.c
|
||||
|
||||
Outputs TOML quirk entries to stdout that can be appended to files in
|
||||
/etc/quirks.d/ or local/recipes/system/redbear-quirks/source/quirks.d/.
|
||||
|
||||
PCI mode: handler-name → flag mapping is heuristic (substring match). Output
|
||||
requires manual review — the script may misinfer flags. USB table extraction is
|
||||
direct and does not require review.
|
||||
"""
|
||||
|
||||
import re
|
||||
import sys
|
||||
|
||||
|
||||
PCI_FLAG_MAP = {
|
||||
"PCI_DEV_FLAGS_NO_D3": "no_d3cold",
|
||||
"PCI_DEV_FLAGS_NO_ASPM": "no_aspm",
|
||||
"PCI_DEV_FLAGS_NO_MSI": "no_msi",
|
||||
"PCI_DEV_FLAGS_NO_MSIX": "no_msix",
|
||||
"PCI_DEV_FLAGS_ASSIGN_BARS": "disable_bar_sizing",
|
||||
"PCI_DEV_FLAGS_BROKEN_PM": "no_pm",
|
||||
}
|
||||
|
||||
USB_FLAG_MAP = {
|
||||
"USB_QUIRK_STRING_FETCH": "no_string_fetch",
|
||||
"USB_QUIRK_NO_RESET_RESUME": "need_reset",
|
||||
"USB_QUIRK_NO_SET_INTF": "no_set_config",
|
||||
"USB_QUIRK_NO_LPM": "no_lpm",
|
||||
"USB_QUIRK_NO_U1_U2": "no_u1u2",
|
||||
"USB_QUIRK_DELAY_INIT": "reset_delay",
|
||||
"USB_QUIRK_LINEAR_UFRAME_INTR_BINTERVAL": "bad_descriptor",
|
||||
"USB_QUIRK_DISCONNECT_SUSPEND": "no_suspend",
|
||||
}
|
||||
|
||||
PCI_FIXUP_RE = re.compile(
|
||||
r'DECLARE_PCI_FIXUP_(?:FINAL|HEADER|EARLY|ENABLE|RESUME|LATE)\s*\(\s*'
|
||||
r'(?:0x([0-9a-fA-F]+)|PCI_ANY_ID)\s*,\s*'
|
||||
r'(?:0x([0-9a-fA-F]+)|PCI_ANY_ID)\s*,\s*'
|
||||
r'(\w+)\s*\)'
|
||||
)
|
||||
|
||||
DMI_MATCH_RE = re.compile(
|
||||
r'DMI_MATCH\s*\(\s*DMI_([A-Z_]+)\s*,\s*"([^"]+)"\s*\)'
|
||||
)
|
||||
|
||||
USB_QUIRK_TABLE_RE = re.compile(
|
||||
r'\{\s*USB_DEVICE\s*\(\s*(?:0x([0-9a-fA-F]+)|USB_ANY_ID)\s*,\s*'
|
||||
r'(?:0x([0-9a-fA-F]+)|USB_ANY_ID)\s*\)\s*,'
|
||||
r'([^}]+)\}'
|
||||
)
|
||||
|
||||
|
||||
def extract_pci_fixups(source):
|
||||
entries = []
|
||||
for m in PCI_FIXUP_RE.finditer(source):
|
||||
vendor = int(m.group(1), 16) if m.group(1) else 0xFFFF
|
||||
device = int(m.group(2), 16) if m.group(2) else 0xFFFF
|
||||
handler = m.group(3)
|
||||
entries.append((vendor, device, handler))
|
||||
return entries
|
||||
|
||||
|
||||
def extract_usb_quirks(source):
|
||||
entries = []
|
||||
for m in USB_QUIRK_TABLE_RE.finditer(source):
|
||||
vendor = int(m.group(1), 16) if m.group(1) else 0xFFFF
|
||||
product = int(m.group(2), 16) if m.group(2) else 0xFFFF
|
||||
flags_raw = m.group(3)
|
||||
flags = []
|
||||
for flag_name, toml_name in USB_FLAG_MAP.items():
|
||||
if flag_name in flags_raw:
|
||||
flags.append(toml_name)
|
||||
entries.append((vendor, product, flags))
|
||||
return entries
|
||||
|
||||
|
||||
def format_pci_toml(entries):
|
||||
lines = []
|
||||
for vendor, device, flags in entries:
|
||||
if not flags:
|
||||
continue
|
||||
lines.append("[[pci_quirk]]")
|
||||
if vendor != 0xFFFF:
|
||||
lines.append(f"vendor = 0x{vendor:04X}")
|
||||
if device != 0xFFFF:
|
||||
lines.append(f"device = 0x{device:04X}")
|
||||
lines.append(f'flags = [{", ".join(f"\"{f}\"" for f in flags)}]')
|
||||
lines.append("")
|
||||
return "\n".join(lines)
|
||||
|
||||
|
||||
def format_usb_toml(entries):
|
||||
lines = []
|
||||
for vendor, product, flags in entries:
|
||||
if not flags:
|
||||
continue
|
||||
lines.append("[[usb_quirk]]")
|
||||
if vendor != 0xFFFF:
|
||||
lines.append(f"vendor = 0x{vendor:04X}")
|
||||
if product != 0xFFFF:
|
||||
lines.append(f"product = 0x{product:04X}")
|
||||
lines.append(f'flags = [{", ".join(f"\"{f}\"" for f in flags)}]')
|
||||
lines.append("")
|
||||
return "\n".join(lines)
|
||||
|
||||
|
||||
def main():
|
||||
if len(sys.argv) < 2:
|
||||
print(__doc__, file=sys.stderr)
|
||||
sys.exit(1)
|
||||
|
||||
path = sys.argv[1]
|
||||
with open(path) as f:
|
||||
source = f.read()
|
||||
|
||||
if "usb_quirk" in source.lower() or "USB_QUIRK" in source:
|
||||
entries = extract_usb_quirks(source)
|
||||
print(format_usb_toml(entries))
|
||||
else:
|
||||
entries = extract_pci_fixups(source)
|
||||
flags_map = PCI_FLAG_MAP
|
||||
mapped = []
|
||||
for vendor, device, handler in entries:
|
||||
flags = []
|
||||
for flag_name, toml_name in flags_map.items():
|
||||
if flag_name.lower() in handler.lower():
|
||||
flags.append(toml_name)
|
||||
mapped.append((vendor, device, flags))
|
||||
print("# WARNING: PCI handler-name → flag mapping is heuristic.")
|
||||
print("# WARNING: Output requires manual review before committing.")
|
||||
print("# USB table extraction is direct and does not need review.")
|
||||
print(format_pci_toml(mapped))
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
main()
|
||||
+294
@@ -0,0 +1,294 @@
|
||||
#!/usr/bin/env bash
|
||||
# Validate the Red Bear OS Phase 1 desktop substrate (CONSOLE-TO-KDE-DESKTOP-PLAN v2.0).
|
||||
#
|
||||
# Modes:
|
||||
# --guest Run inside a Red Bear OS guest
|
||||
# --qemu [CONFIG] Boot CONFIG in QEMU and run the same checks automatically
|
||||
|
||||
set -euo pipefail
|
||||
|
||||
find_uefi_firmware() {
|
||||
local candidates=(
|
||||
"/usr/share/ovmf/x64/OVMF.4m.fd"
|
||||
"/usr/share/OVMF/x64/OVMF.4m.fd"
|
||||
"/usr/share/ovmf/x64/OVMF_CODE.4m.fd"
|
||||
"/usr/share/OVMF/x64/OVMF_CODE.4m.fd"
|
||||
"/usr/share/ovmf/OVMF.fd"
|
||||
"/usr/share/OVMF/OVMF_CODE.fd"
|
||||
"/usr/share/qemu/edk2-x86_64-code.fd"
|
||||
)
|
||||
local path
|
||||
for path in "${candidates[@]}"; do
|
||||
if [[ -f "$path" ]]; then
|
||||
printf '%s\n' "$path"
|
||||
return 0
|
||||
fi
|
||||
done
|
||||
return 1
|
||||
}
|
||||
|
||||
run_guest_checks() {
|
||||
echo "=== Red Bear OS Phase 1 Desktop Substrate Test ==="
|
||||
echo
|
||||
|
||||
local failures=0
|
||||
|
||||
require_path() {
|
||||
local path="$1"
|
||||
local message="$2"
|
||||
if [ -e "$path" ]; then
|
||||
echo " PASS $message"
|
||||
else
|
||||
echo " FAIL $message"
|
||||
failures=$((failures + 1))
|
||||
fi
|
||||
}
|
||||
|
||||
require_command() {
|
||||
local cmd="$1"
|
||||
local message="$2"
|
||||
if command -v "$cmd" >/dev/null 2>&1; then
|
||||
echo " PASS $message"
|
||||
else
|
||||
echo " FAIL $message"
|
||||
failures=$((failures + 1))
|
||||
fi
|
||||
}
|
||||
|
||||
echo "--- relibc POSIX API surface ---"
|
||||
require_path /usr/include/sys/signalfd.h "sys/signalfd.h header present"
|
||||
require_path /usr/include/sys/timerfd.h "sys/timerfd.h header present"
|
||||
require_path /usr/include/sys/eventfd.h "sys/eventfd.h header present"
|
||||
require_path /usr/lib/libwayland-client.so "libwayland-client.so present (relibc consumer)"
|
||||
require_command wayland-scanner "wayland-scanner is installed"
|
||||
echo
|
||||
|
||||
echo "--- evdevd input path ---"
|
||||
require_command evdevd "evdevd command is installed"
|
||||
require_path /scheme/evdev "/scheme/evdev exists"
|
||||
if command -v redbear-phase3-input-check >/dev/null 2>&1; then
|
||||
echo " NOTE redbear-phase3-input-check available (run manually for full input validation)"
|
||||
fi
|
||||
echo
|
||||
|
||||
echo "--- udev-shim device enumeration ---"
|
||||
require_command udev-shim "udev-shim command is installed"
|
||||
require_path /scheme/udev "/scheme/udev exists"
|
||||
local libinput_found=false
|
||||
for lib in /usr/lib/libinput.so /usr/lib/libinput.so.10 /usr/lib/libinput.so.*; do
|
||||
if [ -e "$lib" ]; then
|
||||
libinput_found=true
|
||||
break
|
||||
fi
|
||||
done
|
||||
if $libinput_found; then
|
||||
echo " PASS libinput shared library present"
|
||||
else
|
||||
echo " FAIL libinput shared library not found"
|
||||
failures=$((failures + 1))
|
||||
fi
|
||||
echo
|
||||
|
||||
echo "--- firmware-loader ---"
|
||||
require_path /scheme/firmware "/scheme/firmware exists"
|
||||
require_path /lib/firmware "/lib/firmware directory exists"
|
||||
echo
|
||||
|
||||
echo "--- DRM/KMS ---"
|
||||
local drm_found=false
|
||||
if [ -e /usr/bin/redox-drm ] || command -v redox-drm >/dev/null 2>&1; then
|
||||
drm_found=true
|
||||
fi
|
||||
if $drm_found; then
|
||||
echo " PASS redox-drm is installed"
|
||||
else
|
||||
echo " FAIL redox-drm not found"
|
||||
failures=$((failures + 1))
|
||||
fi
|
||||
if [ -e /scheme/drm ]; then
|
||||
echo " PASS /scheme/drm exists"
|
||||
else
|
||||
echo " FAIL /scheme/drm does not exist"
|
||||
failures=$((failures + 1))
|
||||
fi
|
||||
echo
|
||||
|
||||
echo "--- health check summary ---"
|
||||
if command -v redbear-info >/dev/null 2>&1; then
|
||||
local report
|
||||
report="$(redbear-info --json 2>/dev/null || true)"
|
||||
if [ -n "$report" ]; then
|
||||
local net_ok=false
|
||||
case "$report" in
|
||||
*'"networking"'*|*'"virtio_net_present"'*|*'"ip"'*) net_ok=true ;;
|
||||
esac
|
||||
if $net_ok; then
|
||||
echo " PASS networking state reported in redbear-info"
|
||||
else
|
||||
echo " FAIL networking state not reported in redbear-info"
|
||||
failures=$((failures + 1))
|
||||
fi
|
||||
local drm_reported=false
|
||||
case "$report" in
|
||||
*'scheme drm'*|*'/scheme/drm'*|*'"drm"'*) drm_reported=true ;;
|
||||
esac
|
||||
if $drm_reported; then
|
||||
echo " PASS DRM scheme reported in redbear-info"
|
||||
else
|
||||
echo " FAIL DRM scheme not reported in redbear-info"
|
||||
failures=$((failures + 1))
|
||||
fi
|
||||
local fw_reported=false
|
||||
case "$report" in
|
||||
*'scheme firmware'*|*'/scheme/firmware'*|*'"firmware"'*) fw_reported=true ;;
|
||||
esac
|
||||
if $fw_reported; then
|
||||
echo " PASS firmware scheme reported in redbear-info"
|
||||
else
|
||||
echo " FAIL firmware scheme not reported in redbear-info"
|
||||
failures=$((failures + 1))
|
||||
fi
|
||||
else
|
||||
echo " FAIL redbear-info --json returned empty"
|
||||
failures=$((failures + 1))
|
||||
fi
|
||||
else
|
||||
echo " FAIL redbear-info is not installed"
|
||||
failures=$((failures + 1))
|
||||
fi
|
||||
echo
|
||||
|
||||
echo "=== Phase 1 Desktop Substrate Test Complete ==="
|
||||
if [ "$failures" -gt 0 ]; then
|
||||
echo " $failures check(s) FAILED"
|
||||
return 1
|
||||
fi
|
||||
echo " All checks PASSED"
|
||||
return 0
|
||||
}
|
||||
|
||||
run_qemu_checks() {
|
||||
local config="$1"
|
||||
local firmware
|
||||
firmware="$(find_uefi_firmware)" || {
|
||||
echo "ERROR: no usable x86_64 UEFI firmware found" >&2
|
||||
exit 1
|
||||
}
|
||||
|
||||
local arch image extra
|
||||
arch="${ARCH:-$(uname -m)}"
|
||||
image="build/$arch/$config/harddrive.img"
|
||||
extra="build/$arch/$config/extra.img"
|
||||
|
||||
if [[ ! -f "$image" ]]; then
|
||||
echo "ERROR: missing image $image" >&2
|
||||
echo "Build it first with: ./local/scripts/build-redbear.sh $config" >&2
|
||||
exit 1
|
||||
fi
|
||||
|
||||
if [[ ! -f "$extra" ]]; then
|
||||
truncate -s 1g "$extra"
|
||||
fi
|
||||
|
||||
expect <<EOF
|
||||
log_user 1
|
||||
set timeout 300
|
||||
spawn qemu-system-x86_64 -name {Red Bear OS x86_64} -device qemu-xhci -smp 4 -m 2048 -bios $firmware -chardev stdio,id=debug,signal=off,mux=on -serial chardev:debug -mon chardev=debug -machine q35 -device ich9-intel-hda -device hda-output -device virtio-net,netdev=net0 -netdev user,id=net0 -object filter-dump,id=f1,netdev=net0,file=build/$arch/$config/network.pcap -nographic -vga none -drive file=$image,format=raw,if=none,id=drv0 -device nvme,drive=drv0,serial=NVME_SERIAL -drive file=$extra,format=raw,if=none,id=drv1 -device nvme,drive=drv1,serial=NVME_EXTRA -enable-kvm -cpu host
|
||||
expect "login:"
|
||||
send "root\r"
|
||||
expect "assword:"
|
||||
send "password\r"
|
||||
expect "Type 'help' for available commands."
|
||||
send "echo __READY__\r"
|
||||
expect "__READY__"
|
||||
send "test -e /usr/include/sys/signalfd.h && echo __SIGNAFD_OK__ || echo __SIGNAFD_FAIL__\r"
|
||||
expect {
|
||||
"__SIGNAFD_OK__" { }
|
||||
"__SIGNAFD_FAIL__" { puts "FAIL: signalfd header missing"; exit 1 }
|
||||
}
|
||||
send "test -e /usr/include/sys/timerfd.h && echo __TIMERFD_OK__ || echo __TIMERFD_FAIL__\r"
|
||||
expect {
|
||||
"__TIMERFD_OK__" { }
|
||||
"__TIMERFD_FAIL__" { puts "FAIL: timerfd header missing"; exit 1 }
|
||||
}
|
||||
send "test -e /usr/include/sys/eventfd.h && echo __EVENTFD_OK__ || echo __EVENTFD_FAIL__\r"
|
||||
expect {
|
||||
"__EVENTFD_OK__" { }
|
||||
"__EVENTFD_FAIL__" { puts "FAIL: eventfd header missing"; exit 1 }
|
||||
}
|
||||
send "test -e /usr/lib/libwayland-client.so && echo __WAYLAND_LIB_OK__ || echo __WAYLAND_LIB_FAIL__\r"
|
||||
expect {
|
||||
"__WAYLAND_LIB_OK__" { }
|
||||
"__WAYLAND_LIB_FAIL__" { puts "FAIL: libwayland-client missing"; exit 1 }
|
||||
}
|
||||
send "command -v evdevd && echo __EVDVD_OK__ || echo __EVDVD_FAIL__\r"
|
||||
expect {
|
||||
"__EVDVD_OK__" { }
|
||||
"__EVDVD_FAIL__" { puts "FAIL: evdevd missing"; exit 1 }
|
||||
}
|
||||
send "test -e /scheme/evdev && echo __EVDEV_SCH_OK__ || echo __EVDEV_SCH_FAIL__\r"
|
||||
expect {
|
||||
"__EVDEV_SCH_OK__" { }
|
||||
"__EVDEV_SCH_FAIL__" { puts "FAIL: /scheme/evdev missing"; exit 1 }
|
||||
}
|
||||
send "command -v udev-shim && echo __UDEV_OK__ || echo __UDEV_FAIL__\r"
|
||||
expect {
|
||||
"__UDEV_OK__" { }
|
||||
"__UDEV_FAIL__" { puts "FAIL: udev-shim missing"; exit 1 }
|
||||
}
|
||||
send "test -e /scheme/udev && echo __UDEV_SCH_OK__ || echo __UDEV_SCH_FAIL__\r"
|
||||
expect {
|
||||
"__UDEV_SCH_OK__" { }
|
||||
"__UDEV_SCH_FAIL__" { puts "FAIL: /scheme/udev missing"; exit 1 }
|
||||
}
|
||||
send "test -e /scheme/firmware && echo __FW_SCH_OK__ || echo __FW_SCH_FAIL__\r"
|
||||
expect {
|
||||
"__FW_SCH_OK__" { }
|
||||
"__FW_SCH_FAIL__" { puts "FAIL: /scheme/firmware missing"; exit 1 }
|
||||
}
|
||||
send "test -e /lib/firmware && echo __FW_DIR_OK__ || echo __FW_DIR_FAIL__\r"
|
||||
expect {
|
||||
"__FW_DIR_OK__" { }
|
||||
"__FW_DIR_FAIL__" { puts "FAIL: /lib/firmware missing"; exit 1 }
|
||||
}
|
||||
send "command -v redox-drm && echo __DRM_OK__ || echo __DRM_FAIL__\r"
|
||||
expect {
|
||||
"__DRM_OK__" { }
|
||||
"__DRM_FAIL__" { puts "FAIL: redox-drm missing"; exit 1 }
|
||||
}
|
||||
send "test -e /scheme/drm && echo __DRM_SCH_OK__ || echo __DRM_SCH_FAIL__\r"
|
||||
expect {
|
||||
"__DRM_SCH_OK__" { }
|
||||
"__DRM_SCH_FAIL__" { puts "FAIL: /scheme/drm missing"; exit 1 }
|
||||
}
|
||||
send "redbear-info --json\r"
|
||||
expect "\"virtio_net_present\": true"
|
||||
expect "scheme firmware is registered"
|
||||
expect "scheme udev is registered"
|
||||
send "echo __PHASE1_DONE__\r"
|
||||
expect "__PHASE1_DONE__"
|
||||
send "shutdown\r"
|
||||
expect eof
|
||||
EOF
|
||||
}
|
||||
|
||||
usage() {
|
||||
cat <<'USAGE'
|
||||
Usage:
|
||||
./local/scripts/test-phase1-desktop-substrate.sh --guest
|
||||
./local/scripts/test-phase1-desktop-substrate.sh --qemu [redbear-wayland]
|
||||
USAGE
|
||||
}
|
||||
|
||||
case "${1:-}" in
|
||||
--guest)
|
||||
run_guest_checks
|
||||
;;
|
||||
--qemu)
|
||||
run_qemu_checks "${2:-redbear-wayland}"
|
||||
;;
|
||||
*)
|
||||
usage
|
||||
exit 1
|
||||
;;
|
||||
esac
|
||||
Reference in New Issue
Block a user