blob: ce854df055845be0f13e2082b9c3912ccd854b27 [file] [log] [blame]
Fathi Boudra422bf772019-12-02 11:10:16 +02001#
Chris Kay3d2ae332022-11-15 11:32:03 +00002# Copyright (c) 2019-2022 Arm Limited. All rights reserved.
Fathi Boudra422bf772019-12-02 11:10:16 +02003#
4# SPDX-License-Identifier: BSD-3-Clause
5#
Fathi Boudra422bf772019-12-02 11:10:16 +02006# Expect script for Trusted Firmware + EDK2 UART0
7#
8# Refer to handle-arguments.inc for the list of parameters.
9#
10
11source [file join [file dirname [info script]] handle-arguments.inc]
12
13# Trusted Firmware boot section
14source [file join [file dirname [info script]] trusted-firmware.inc]
15
16# EDK2 section
17expect {
18 "UEFI firmware" {
19 puts "<<EDK2 starting>>"
20 }
Fathi Boudra422bf772019-12-02 11:10:16 +020021}
22
23expect {
24 "UEFI Interactive Shell" {
25 puts "<<EDK2 shell starting>>"
26 }
Fathi Boudra422bf772019-12-02 11:10:16 +020027}
28
29expect {
30 "any other key to continue." {
31 send "\r"
32 }
Fathi Boudra422bf772019-12-02 11:10:16 +020033}
34
35expect {
36 "Shell>" {
37 send "fs0:\r"
38 }
Fathi Boudra422bf772019-12-02 11:10:16 +020039}
40
41expect {
42 "FS0:" {
43 send "UefiInfo.efi\r"
44 puts "<<Loading UEFI application>>"
45 }
Fathi Boudra422bf772019-12-02 11:10:16 +020046}
47
48expect {
49 -re "Loading driver at .* UefiInfo.efi" {
50 puts "<<UEFI application is being loaded>>"
51 }
Fathi Boudra422bf772019-12-02 11:10:16 +020052}
53
54expect {
55 "FS0:" {
56 puts "<<UEFI application loaded>>"
57 }
Fathi Boudra422bf772019-12-02 11:10:16 +020058}
59
60exit_uart 0