blob: 90676e1ff3b53368bc28b96505d6620ba91280d1 [file] [log] [blame]
Fathi Boudra422bf772019-12-02 11:10:16 +02001#
Yeoreum Yun599c4562025-07-23 10:10:56 +01002# Copyright (c) 2019-2025 Arm Limited. All rights reserved.
Fathi Boudra422bf772019-12-02 11:10:16 +02003#
4# SPDX-License-Identifier: BSD-3-Clause
5#
Fathi Boudra422bf772019-12-02 11:10:16 +02006# Expect script for Trusted Firmware + EDK2 UART0
7#
8# Refer to handle-arguments.inc for the list of parameters.
9#
10
11source [file join [file dirname [info script]] handle-arguments.inc]
12
13# Trusted Firmware boot section
14source [file join [file dirname [info script]] trusted-firmware.inc]
15
Yeoreum Yun599c4562025-07-23 10:10:56 +010016expect_string "UEFI Interactive Shell" "EDK2 shell starting"
Fathi Boudra422bf772019-12-02 11:10:16 +020017
18expect {
19 "any other key to continue." {
20 send "\r"
21 }
Fathi Boudra422bf772019-12-02 11:10:16 +020022}
23
24expect {
25 "Shell>" {
26 send "fs0:\r"
27 }
Fathi Boudra422bf772019-12-02 11:10:16 +020028}
29
30expect {
31 "FS0:" {
Yeoreum Yun599c4562025-07-23 10:10:56 +010032 send "HelloWorld.efi\r"
Chris Kay78ea2c32022-11-15 12:24:24 +000033 message "Loading UEFI application"
Fathi Boudra422bf772019-12-02 11:10:16 +020034 }
Fathi Boudra422bf772019-12-02 11:10:16 +020035}
36
37expect {
Fathi Boudra422bf772019-12-02 11:10:16 +020038 "FS0:" {
Chris Kay78ea2c32022-11-15 12:24:24 +000039 message "UEFI application loaded"
Fathi Boudra422bf772019-12-02 11:10:16 +020040 }
Fathi Boudra422bf772019-12-02 11:10:16 +020041}
42
43exit_uart 0