Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/1.1/patches/2223704/?format=api
{ "id": 2223704, "url": "http://patchwork.ozlabs.org/api/1.1/patches/2223704/?format=api", "web_url": "http://patchwork.ozlabs.org/project/uboot/patch/97e38b81f2e8f54ec819940d360849e4cf61b875.1776302806.git.daniel@makrotopia.org/", "project": { "id": 18, "url": "http://patchwork.ozlabs.org/api/1.1/projects/18/?format=api", "name": "U-Boot", "link_name": "uboot", "list_id": "u-boot.lists.denx.de", "list_email": "u-boot@lists.denx.de", "web_url": null, "scm_url": null, "webscm_url": null }, "msgid": "<97e38b81f2e8f54ec819940d360849e4cf61b875.1776302806.git.daniel@makrotopia.org>", "date": "2026-04-16T01:47:03", "name": "[v2,6/7] test: boot: add runtime unit test for fit_verity_build_cmdline()", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "9c3c48c193e3e8351523f4f3045f4f2c09b7edf4", "submitter": { "id": 64091, "url": "http://patchwork.ozlabs.org/api/1.1/people/64091/?format=api", "name": "Daniel Golle", "email": "daniel@makrotopia.org" }, "delegate": { "id": 3651, "url": "http://patchwork.ozlabs.org/api/1.1/users/3651/?format=api", "username": "trini", "first_name": "Tom", "last_name": "Rini", "email": "trini@ti.com" }, "mbox": "http://patchwork.ozlabs.org/project/uboot/patch/97e38b81f2e8f54ec819940d360849e4cf61b875.1776302806.git.daniel@makrotopia.org/mbox/", "series": [ { "id": 500065, "url": "http://patchwork.ozlabs.org/api/1.1/series/500065/?format=api", "web_url": "http://patchwork.ozlabs.org/project/uboot/list/?series=500065", "date": "2026-04-16T01:46:15", "name": "fit: dm-verity support", "version": 2, "mbox": "http://patchwork.ozlabs.org/series/500065/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2223704/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2223704/checks/", "tags": {}, "headers": { "Return-Path": "<u-boot-bounces@lists.denx.de>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de\n (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de;\n envelope-from=u-boot-bounces@lists.denx.de; receiver=patchwork.ozlabs.org)", "phobos.denx.de;\n dmarc=none (p=none dis=none) header.from=makrotopia.org", "phobos.denx.de;\n spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de", "phobos.denx.de; dmarc=none (p=none dis=none)\n header.from=makrotopia.org", "phobos.denx.de;\n spf=pass smtp.mailfrom=daniel@makrotopia.org" ], "Received": [ "from phobos.denx.de (phobos.denx.de\n [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fx19c6ztKz1yG9\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 16 Apr 2026 11:47:48 +1000 (AEST)", "from h2850616.stratoserver.net (localhost [IPv6:::1])\n\tby phobos.denx.de (Postfix) with ESMTP id D6E8084253;\n\tThu, 16 Apr 2026 03:47:24 +0200 (CEST)", "by phobos.denx.de (Postfix, from userid 109)\n id 8F1D184119; Thu, 16 Apr 2026 03:47:23 +0200 (CEST)", "from pidgin.makrotopia.org (pidgin.makrotopia.org\n [IPv6:2a07:2ec0:3002::65])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))\n (No client certificate requested)\n by phobos.denx.de (Postfix) with ESMTPS id 3C73384285\n for <u-boot@lists.denx.de>; Thu, 16 Apr 2026 03:47:20 +0200 (CEST)", "from local\n by pidgin.makrotopia.org with esmtpsa (TLS1.3:TLS_AES_256_GCM_SHA384:256)\n (Exim 4.99) (envelope-from <daniel@makrotopia.org>)\n id 1wDBox-000000006gX-12aW; Thu, 16 Apr 2026 01:47:07 +0000" ], "X-Spam-Checker-Version": "SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de", "X-Spam-Level": "", "X-Spam-Status": "No, score=-1.9 required=5.0 tests=BAYES_00,\n RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS autolearn=ham\n autolearn_force=no version=3.4.2", "Date": "Thu, 16 Apr 2026 02:47:03 +0100", "From": "Daniel Golle <daniel@makrotopia.org>", "To": "Tom Rini <trini@konsulko.com>, Simon Glass <sjg@chromium.org>,\n Quentin Schulz <quentin.schulz@cherry.de>,\n Kory Maincent <kory.maincent@bootlin.com>,\n Mattijs Korpershoek <mkorpershoek@kernel.org>, Peng Fan <peng.fan@nxp.com>,\n Heinrich Schuchardt <xypron.glpk@gmx.de>,\n Martin Schwan <m.schwan@phytec.de>,\n Daniel Golle <daniel@makrotopia.org>, Anshul Dalal <anshuld@ti.com>,\n Ilias Apalodimas <ilias.apalodimas@linaro.org>,\n Sughosh Ganu <sughosh.ganu@arm.com>,\n Aristo Chen <jj251510319013@gmail.com>,\n Ludwig Nussel <ludwig.nussel@siemens.com>,\n Benjamin ROBIN <dev@benjarobin.fr>,\n Marek Vasut <marek.vasut+renesas@mailbox.org>,\n James Hilliard <james.hilliard1@gmail.com>,\n Wolfgang Wallner <wolfgang.wallner@at.abb.com>,\n Kunihiko Hayashi <hayashi.kunihiko@socionext.com>,\n David Lechner <dlechner@baylibre.com>,\n Neil Armstrong <neil.armstrong@linaro.org>,\n Mayuresh Chitale <mchitale@ventanamicro.com>,\n Jonas Karlman <jonas@kwiboo.se>, Shiji Yang <yangshiji66@outlook.com>,\n Rasmus Villemoes <ravi@prevas.dk>,\n Francois Berder <fberder@outlook.fr>, u-boot@lists.denx.de", "Subject": "[PATCH v2 6/7] test: boot: add runtime unit test for\n fit_verity_build_cmdline()", "Message-ID": "\n <97e38b81f2e8f54ec819940d360849e4cf61b875.1776302806.git.daniel@makrotopia.org>", "References": "<cover.1776302805.git.daniel@makrotopia.org>", "MIME-Version": "1.0", "Content-Type": "text/plain; charset=utf-8", "Content-Disposition": "inline", "Content-Transfer-Encoding": "8bit", "In-Reply-To": "<cover.1776302805.git.daniel@makrotopia.org>", "X-BeenThere": "u-boot@lists.denx.de", "X-Mailman-Version": "2.1.39", "Precedence": "list", "List-Id": "U-Boot discussion <u-boot.lists.denx.de>", "List-Unsubscribe": "<https://lists.denx.de/options/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=unsubscribe>", "List-Archive": "<https://lists.denx.de/pipermail/u-boot/>", "List-Post": "<mailto:u-boot@lists.denx.de>", "List-Help": "<mailto:u-boot-request@lists.denx.de?subject=help>", "List-Subscribe": "<https://lists.denx.de/listinfo/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=subscribe>", "Errors-To": "u-boot-bounces@lists.denx.de", "Sender": "\"U-Boot\" <u-boot-bounces@lists.denx.de>", "X-Virus-Scanned": "clamav-milter 0.103.8 at phobos.denx.de", "X-Virus-Status": "Clean" }, "content": "Add test/boot/fit_verity.c with four tests that construct FIT blobs\nin memory and exercise fit_verity_build_cmdline().\n\nSigned-off-by: Daniel Golle <daniel@makrotopia.org>\n---\nv2: new patch\n\n test/boot/Makefile | 1 +\n test/boot/fit_verity.c | 298 +++++++++++++++++++++++++++++++++++++++++\n test/cmd_ut.c | 2 +\n 3 files changed, 301 insertions(+)\n create mode 100644 test/boot/fit_verity.c", "diff": "diff --git a/test/boot/Makefile b/test/boot/Makefile\nindex 89538d4f0a6..d98f212b243 100644\n--- a/test/boot/Makefile\n+++ b/test/boot/Makefile\n@@ -15,6 +15,7 @@ endif\n ifdef CONFIG_SANDBOX\n obj-$(CONFIG_$(PHASE_)CMDLINE) += bootm.o\n endif\n+obj-$(CONFIG_$(PHASE_)FIT_VERITY) += fit_verity.o\n obj-$(CONFIG_MEASURED_BOOT) += measurement.o\n \n ifdef CONFIG_OF_LIVE\ndiff --git a/test/boot/fit_verity.c b/test/boot/fit_verity.c\nnew file mode 100644\nindex 00000000000..40c54998387\n--- /dev/null\n+++ b/test/boot/fit_verity.c\n@@ -0,0 +7,302 @@\n+// SPDX-License-Identifier: GPL-2.0+\n+/*\n+ * Tests for FIT dm-verity cmdline generation\n+ *\n+ * Copyright 2026 Daniel Golle <daniel@makrotopia.org>\n+ */\n+\n+#include <image.h>\n+#include <test/test.h>\n+#include <test/ut.h>\n+\n+#define FIT_VERITY_TEST(_name, _flags)\tUNIT_TEST(_name, _flags, fit_verity)\n+\n+/* FIT blob buffer size — generous to avoid FDT_ERR_NOSPACE */\n+#define FIT_BUF_SIZE\t4096\n+\n+/* Test digest (32 bytes = sha256) */\n+static const u8 test_digest[32] = {\n+\t0x8e, 0x67, 0x91, 0x63, 0x7f, 0x93, 0xcb, 0xb8,\n+\t0x1f, 0xc4, 0x52, 0x99, 0xe2, 0x03, 0xcb, 0xe8,\n+\t0x5c, 0xa2, 0xe4, 0x7a, 0x38, 0xf5, 0x05, 0x1b,\n+\t0xdd, 0xee, 0xce, 0x92, 0xd7, 0xb1, 0xc9, 0xf9,\n+};\n+\n+/* Test salt (32 bytes) */\n+static const u8 test_salt[32] = {\n+\t0xaa, 0x7b, 0x11, 0xf8, 0xdb, 0x8f, 0xe2, 0xe5,\n+\t0xbf, 0xd4, 0xec, 0xa1, 0xd1, 0x8a, 0x22, 0xb5,\n+\t0xde, 0x7e, 0xa3, 0x9d, 0x2e, 0x1b, 0x93, 0xbb,\n+\t0x72, 0x72, 0xce, 0x0c, 0x6c, 0xa3, 0xcc, 0x8e,\n+};\n+\n+/**\n+ * build_verity_fit() - construct a minimal FIT blob with dm-verity metadata\n+ * @buf:\t\toutput buffer (at least FIT_BUF_SIZE bytes)\n+ * @num_loadables:\tnumber of filesystem loadables to create (1 or 2)\n+ *\n+ * Builds a FIT blob containing:\n+ * - /images/rootfsN with type=\"filesystem\" and a dm-verity subnode\n+ * - /configurations/conf-1 referencing the loadable(s)\n+ *\n+ * Return: configuration node offset, or -ve on error\n+ */\n+static int build_verity_fit(void *buf, int num_loadables)\n+{\n+\tint images_node, conf_node, confs_node, img_node, verity_node;\n+\tfdt32_t val;\n+\tint ret, i;\n+\tchar name[32];\n+\t/*\n+\t * Build the loadables string list. FDT stringlists are concatenated\n+\t * NUL-terminated strings. E.g. \"rootfs0\\0rootfs1\\0\"\n+\t */\n+\tchar loadables[128];\n+\tint loadables_len = 0;\n+\n+\tret = fdt_create_empty_tree(buf, FIT_BUF_SIZE);\n+\tif (ret)\n+\t\treturn ret;\n+\n+\t/* /images */\n+\timages_node = fdt_add_subnode(buf, 0, \"images\");\n+\tif (images_node < 0)\n+\t\treturn images_node;\n+\n+\tfor (i = 0; i < num_loadables; i++) {\n+\t\tsnprintf(name, sizeof(name), \"rootfs%d\", i);\n+\n+\t\timg_node = fdt_add_subnode(buf, images_node, name);\n+\t\tif (img_node < 0)\n+\t\t\treturn img_node;\n+\n+\t\tret = fdt_setprop_string(buf, img_node, \"type\", \"filesystem\");\n+\t\tif (ret)\n+\t\t\treturn ret;\n+\n+\t\tverity_node = fdt_add_subnode(buf, img_node, \"dm-verity\");\n+\t\tif (verity_node < 0)\n+\t\t\treturn verity_node;\n+\n+\t\tret = fdt_setprop_string(buf, verity_node, \"algo\", \"sha256\");\n+\t\tif (ret)\n+\t\t\treturn ret;\n+\n+\t\tval = cpu_to_fdt32(4096);\n+\t\tret = fdt_setprop(buf, verity_node, \"data-block-size\",\n+\t\t\t\t &val, sizeof(val));\n+\t\tif (ret)\n+\t\t\treturn ret;\n+\n+\t\tret = fdt_setprop(buf, verity_node, \"hash-block-size\",\n+\t\t\t\t &val, sizeof(val));\n+\t\tif (ret)\n+\t\t\treturn ret;\n+\n+\t\tval = cpu_to_fdt32(100);\n+\t\tret = fdt_setprop(buf, verity_node, \"num-data-blocks\",\n+\t\t\t\t &val, sizeof(val));\n+\t\tif (ret)\n+\t\t\treturn ret;\n+\n+\t\tval = cpu_to_fdt32(100);\n+\t\tret = fdt_setprop(buf, verity_node, \"hash-start-block\",\n+\t\t\t\t &val, sizeof(val));\n+\t\tif (ret)\n+\t\t\treturn ret;\n+\n+\t\tret = fdt_setprop(buf, verity_node, \"digest\",\n+\t\t\t\t test_digest, sizeof(test_digest));\n+\t\tif (ret)\n+\t\t\treturn ret;\n+\n+\t\tret = fdt_setprop(buf, verity_node, \"salt\",\n+\t\t\t\t test_salt, sizeof(test_salt));\n+\t\tif (ret)\n+\t\t\treturn ret;\n+\n+\t\t/* Append to loadables stringlist */\n+\t\tloadables_len += snprintf(loadables + loadables_len,\n+\t\t\t\t\t sizeof(loadables) - loadables_len,\n+\t\t\t\t\t \"%s\", name) + 1;\n+\t}\n+\n+\t/* /configurations/conf-1 */\n+\tconfs_node = fdt_add_subnode(buf, 0, \"configurations\");\n+\tif (confs_node < 0)\n+\t\treturn confs_node;\n+\n+\tconf_node = fdt_add_subnode(buf, confs_node, \"conf-1\");\n+\tif (conf_node < 0)\n+\t\treturn conf_node;\n+\n+\tret = fdt_setprop(buf, conf_node, \"loadables\",\n+\t\t\t loadables, loadables_len);\n+\tif (ret)\n+\t\treturn ret;\n+\n+\treturn conf_node;\n+}\n+\n+/* Test: single dm-verity loadable produces correct cmdline fragments */\n+static int fit_verity_test_single(struct unit_test_state *uts)\n+{\n+\tchar buf[FIT_BUF_SIZE];\n+\tstruct bootm_headers images;\n+\tint conf_noffset;\n+\n+\tconf_noffset = build_verity_fit(buf, 1);\n+\tut_assert(conf_noffset >= 0);\n+\n+\tmemset(&images, 0, sizeof(images));\n+\tut_assertok(fit_verity_build_cmdline(buf, conf_noffset, &images));\n+\n+\t/* dm_mod_create should contain the target spec for rootfs0 */\n+\tut_assertnonnull(images.dm_mod_create);\n+\tut_assert(strstr(images.dm_mod_create, \"rootfs0,,,\"));\n+\tut_assert(strstr(images.dm_mod_create, \"verity 1\"));\n+\tut_assert(strstr(images.dm_mod_create, \"/dev/fit0\"));\n+\tut_assert(strstr(images.dm_mod_create, \"4096 4096 100 100\"));\n+\tut_assert(strstr(images.dm_mod_create, \"sha256\"));\n+\t/* Check hex-encoded digest prefix */\n+\tut_assert(strstr(images.dm_mod_create, \"8e6791637f93cbb8\"));\n+\t/* Check hex-encoded salt prefix */\n+\tut_assert(strstr(images.dm_mod_create, \"aa7b11f8db8fe2e5\"));\n+\n+\t/* dm_mod_waitfor should reference /dev/fit0 */\n+\tut_assertnonnull(images.dm_mod_waitfor);\n+\tut_asserteq_str(\"/dev/fit0\", images.dm_mod_waitfor);\n+\n+\tfit_verity_free(&images);\n+\tut_assertnull(images.dm_mod_create);\n+\tut_assertnull(images.dm_mod_waitfor);\n+\n+\treturn 0;\n+}\n+\n+FIT_VERITY_TEST(fit_verity_test_single, 0);\n+\n+/* Test: FIT with no dm-verity subnode returns 0, pointers stay NULL */\n+static int fit_verity_test_no_verity(struct unit_test_state *uts)\n+{\n+\tchar buf[FIT_BUF_SIZE];\n+\tstruct bootm_headers images;\n+\tint conf_node, images_node, img_node, confs_node;\n+\tint ret;\n+\n+\tret = fdt_create_empty_tree(buf, FIT_BUF_SIZE);\n+\tut_assertok(ret);\n+\n+\timages_node = fdt_add_subnode(buf, 0, \"images\");\n+\tut_assert(images_node >= 0);\n+\n+\timg_node = fdt_add_subnode(buf, images_node, \"rootfs\");\n+\tut_assert(img_node >= 0);\n+\tut_assertok(fdt_setprop_string(buf, img_node, \"type\", \"filesystem\"));\n+\t/* No dm-verity subnode */\n+\n+\tconfs_node = fdt_add_subnode(buf, 0, \"configurations\");\n+\tut_assert(confs_node >= 0);\n+\tconf_node = fdt_add_subnode(buf, confs_node, \"conf-1\");\n+\tut_assert(conf_node >= 0);\n+\tut_assertok(fdt_setprop_string(buf, conf_node, \"loadables\", \"rootfs\"));\n+\n+\tmemset(&images, 0, sizeof(images));\n+\tut_asserteq(0, fit_verity_build_cmdline(buf, conf_node, &images));\n+\tut_assertnull(images.dm_mod_create);\n+\tut_assertnull(images.dm_mod_waitfor);\n+\n+\treturn 0;\n+}\n+\n+FIT_VERITY_TEST(fit_verity_test_no_verity, 0);\n+\n+/* Test: two dm-verity loadables produce combined cmdline */\n+static int fit_verity_test_two_loadables(struct unit_test_state *uts)\n+{\n+\tchar buf[FIT_BUF_SIZE];\n+\tstruct bootm_headers images;\n+\tint conf_noffset;\n+\n+\tconf_noffset = build_verity_fit(buf, 2);\n+\tut_assert(conf_noffset >= 0);\n+\n+\tmemset(&images, 0, sizeof(images));\n+\tut_assertok(fit_verity_build_cmdline(buf, conf_noffset, &images));\n+\n+\t/* Both targets should appear, separated by \";\" */\n+\tut_assertnonnull(images.dm_mod_create);\n+\tut_assert(strstr(images.dm_mod_create, \"rootfs0,,,\"));\n+\tut_assert(strstr(images.dm_mod_create, \";rootfs1,,,\"));\n+\tut_assert(strstr(images.dm_mod_create, \"/dev/fit0\"));\n+\tut_assert(strstr(images.dm_mod_create, \"/dev/fit1\"));\n+\n+\t/* dm_mod_waitfor should list both devices */\n+\tut_assertnonnull(images.dm_mod_waitfor);\n+\tut_assert(strstr(images.dm_mod_waitfor, \"/dev/fit0\"));\n+\tut_assert(strstr(images.dm_mod_waitfor, \"/dev/fit1\"));\n+\n+\tfit_verity_free(&images);\n+\treturn 0;\n+}\n+\n+FIT_VERITY_TEST(fit_verity_test_two_loadables, 0);\n+\n+/* Test: invalid block size (not power of two) returns -EINVAL */\n+static int fit_verity_test_bad_blocksize(struct unit_test_state *uts)\n+{\n+\tchar buf[FIT_BUF_SIZE];\n+\tstruct bootm_headers images;\n+\tint images_node, conf_node, confs_node, img_node, verity_node;\n+\tfdt32_t val;\n+\tint ret;\n+\n+\tret = fdt_create_empty_tree(buf, FIT_BUF_SIZE);\n+\tut_assertok(ret);\n+\n+\timages_node = fdt_add_subnode(buf, 0, \"images\");\n+\tut_assert(images_node >= 0);\n+\n+\timg_node = fdt_add_subnode(buf, images_node, \"rootfs\");\n+\tut_assert(img_node >= 0);\n+\tut_assertok(fdt_setprop_string(buf, img_node, \"type\", \"filesystem\"));\n+\n+\tverity_node = fdt_add_subnode(buf, img_node, \"dm-verity\");\n+\tut_assert(verity_node >= 0);\n+\n+\tut_assertok(fdt_setprop_string(buf, verity_node, \"algo\", \"sha256\"));\n+\n+\t/* 3000 is not a power of two */\n+\tval = cpu_to_fdt32(3000);\n+\tut_assertok(fdt_setprop(buf, verity_node, \"data-block-size\",\n+\t\t\t\t&val, sizeof(val)));\n+\tval = cpu_to_fdt32(4096);\n+\tut_assertok(fdt_setprop(buf, verity_node, \"hash-block-size\",\n+\t\t\t\t&val, sizeof(val)));\n+\n+\tval = cpu_to_fdt32(100);\n+\tut_assertok(fdt_setprop(buf, verity_node, \"num-data-blocks\",\n+\t\t\t\t&val, sizeof(val)));\n+\tut_assertok(fdt_setprop(buf, verity_node, \"hash-start-block\",\n+\t\t\t\t&val, sizeof(val)));\n+\n+\tut_assertok(fdt_setprop(buf, verity_node, \"digest\",\n+\t\t\t\ttest_digest, sizeof(test_digest)));\n+\tut_assertok(fdt_setprop(buf, verity_node, \"salt\",\n+\t\t\t\ttest_salt, sizeof(test_salt)));\n+\n+\tconfs_node = fdt_add_subnode(buf, 0, \"configurations\");\n+\tut_assert(confs_node >= 0);\n+\tconf_node = fdt_add_subnode(buf, confs_node, \"conf-1\");\n+\tut_assert(conf_node >= 0);\n+\tut_assertok(fdt_setprop_string(buf, conf_node, \"loadables\", \"rootfs\"));\n+\n+\tmemset(&images, 0, sizeof(images));\n+\tut_asserteq(-EINVAL, fit_verity_build_cmdline(buf, conf_node, &images));\n+\tut_assertnull(images.dm_mod_create);\n+\tut_assertnull(images.dm_mod_waitfor);\n+\n+\treturn 0;\n+}\n+\n+FIT_VERITY_TEST(fit_verity_test_bad_blocksize, 0);\ndiff --git a/test/cmd_ut.c b/test/cmd_ut.c\nindex 44e5fdfdaa6..d1b376f617c 100644\n--- a/test/cmd_ut.c\n+++ b/test/cmd_ut.c\n@@ -59,6 +59,7 @@ SUITE_DECL(env);\n SUITE_DECL(exit);\n SUITE_DECL(fdt);\n SUITE_DECL(fdt_overlay);\n+SUITE_DECL(fit_verity);\n SUITE_DECL(font);\n SUITE_DECL(hush);\n SUITE_DECL(lib);\n@@ -86,6 +87,7 @@ static struct suite suites[] = {\n \tSUITE(exit, \"shell exit and variables\"),\n \tSUITE(fdt, \"fdt command\"),\n \tSUITE(fdt_overlay, \"device tree overlays\"),\n+\tSUITE(fit_verity, \"FIT dm-verity cmdline generation\"),\n \tSUITE(font, \"font command\"),\n \tSUITE(hush, \"hush behaviour\"),\n \tSUITE(lib, \"library functions\"),\n", "prefixes": [ "v2", "6/7" ] }