Add a bootmeth driver for sandbox, used for testing.

Signed-off-by: Simon Glass <s...@chromium.org>
---

(no changes since v1)

 boot/Kconfig            |  7 +++++
 boot/Makefile           |  1 +
 boot/bootmeth_sandbox.c | 67 +++++++++++++++++++++++++++++++++++++++++
 3 files changed, 75 insertions(+)
 create mode 100644 boot/bootmeth_sandbox.c

diff --git a/boot/Kconfig b/boot/Kconfig
index ebbd7427d7f..2862bd10710 100644
--- a/boot/Kconfig
+++ b/boot/Kconfig
@@ -339,6 +339,13 @@ config BOOTMETH_EFILOADER
 
          This provides a way to try out standard boot on an existing boot flow.
 
+config BOOTMETH_SANDBOX
+       def_bool y
+       depends on SANDBOX
+       help
+         This is a sandbox bootmeth driver used for testing. It always returns
+         -ENOTSUPP when attempting to boot.
+
 endif
 
 config LEGACY_IMAGE_FORMAT
diff --git a/boot/Makefile b/boot/Makefile
index 0bbda0e5364..a2722072753 100644
--- a/boot/Makefile
+++ b/boot/Makefile
@@ -31,6 +31,7 @@ obj-$(CONFIG_$(SPL_TPL_)BOOTSTD) += bootstd-uclass.o
 obj-$(CONFIG_$(SPL_TPL_)BOOTMETH_DISTRO) += bootmeth_distro.o
 obj-$(CONFIG_$(SPL_TPL_)BOOTMETH_DISTRO_PXE) += bootmeth_pxe.o
 obj-$(CONFIG_$(SPL_TPL_)BOOTMETH_EFILOADER) += bootmeth_efi.o
+obj-$(CONFIG_$(SPL_TPL_)BOOTMETH_SANDBOX) += bootmeth_sandbox.o
 ifdef CONFIG_$(SPL_TPL_)BOOTSTD
 obj-$(CONFIG_$(SPL_TPL_)CMD_BOOTEFI_BOOTMGR) += bootmeth_efi_mgr.o
 endif
diff --git a/boot/bootmeth_sandbox.c b/boot/bootmeth_sandbox.c
new file mode 100644
index 00000000000..928cd5ac6a5
--- /dev/null
+++ b/boot/bootmeth_sandbox.c
@@ -0,0 +1,67 @@
+// SPDX-License-Identifier: GPL-2.0+
+/*
+ * Bootmethod for sandbox testing
+ *
+ * Copyright 2021 Google LLC
+ * Written by Simon Glass <s...@chromium.org>
+ */
+
+#include <common.h>
+#include <bootdev.h>
+#include <bootflow.h>
+#include <bootmeth.h>
+#include <dm.h>
+
+static int sandbox_check(struct udevice *dev, struct bootflow_iter *iter)
+{
+       return 0;
+}
+
+static int sandbox_read_bootflow(struct udevice *dev, struct bootflow *bflow)
+{
+       /* pretend we are ready */
+       bflow->state = BOOTFLOWST_READY;
+
+       return 0;
+}
+
+static int sandbox_read_file(struct udevice *dev, struct bootflow *bflow,
+                            const char *file_path, ulong addr, ulong *sizep)
+{
+       return -ENOSYS;
+}
+
+static int sandbox_boot(struct udevice *dev, struct bootflow *bflow)
+{
+       /* always fail: see bootflow_iter_disable() */
+       return -ENOTSUPP;
+}
+
+static int sandbox_bootmeth_bind(struct udevice *dev)
+{
+       struct bootmeth_uc_plat *plat = dev_get_uclass_plat(dev);
+
+       plat->desc = "Sandbox boot for testing";
+
+       return 0;
+}
+
+static struct bootmeth_ops sandbox_bootmeth_ops = {
+       .check          = sandbox_check,
+       .read_bootflow  = sandbox_read_bootflow,
+       .read_file      = sandbox_read_file,
+       .boot           = sandbox_boot,
+};
+
+static const struct udevice_id sandbox_bootmeth_ids[] = {
+       { .compatible = "u-boot,sandbox-syslinux" },
+       { }
+};
+
+U_BOOT_DRIVER(bootmeth_sandbox) = {
+       .name           = "bootmeth_sandbox",
+       .id             = UCLASS_BOOTMETH,
+       .of_match       = sandbox_bootmeth_ids,
+       .ops            = &sandbox_bootmeth_ops,
+       .bind           = sandbox_bootmeth_bind,
+};
-- 
2.33.0.1079.g6e70778dc9-goog

Reply via email to