blob: 3b7de866c9bcdc77e3b15e43a28fde2bc8f739ee [file] [log] [blame]
Tim Windelschmidt6d33a432025-02-04 14:34:25 +01001// Copyright The Monogon Project Authors.
Mateusz Zalega43e21072021-10-08 18:05:29 +02002// SPDX-License-Identifier: Apache-2.0
Mateusz Zalega43e21072021-10-08 18:05:29 +02003
4// This package runs the installer image in a VM provided with an empty block
5// device. It then examines the installer console output and the blok device to
6// determine whether the installation process completed without issue.
Mateusz Zalegaedffbb52022-01-11 15:27:22 +01007package installer
Mateusz Zalega43e21072021-10-08 18:05:29 +02008
9import (
Serge Bazanskie2e03712021-12-17 12:47:03 +010010 "context"
Mateusz Zalega43e21072021-10-08 18:05:29 +020011 "fmt"
Mateusz Zalega43e21072021-10-08 18:05:29 +020012 "log"
13 "os"
Mateusz Zalega8cde8e72021-11-30 16:22:20 +010014 "path/filepath"
Mateusz Zalega43e21072021-10-08 18:05:29 +020015 "syscall"
16 "testing"
Serge Bazanski05cf33d2023-03-16 20:50:59 +010017 "time"
Mateusz Zalega43e21072021-10-08 18:05:29 +020018
Tim Windelschmidt2a1d1b22024-02-06 07:07:42 +010019 "github.com/bazelbuild/rules_go/go/runfiles"
20 "github.com/diskfs/go-diskfs"
Mateusz Zalega43e21072021-10-08 18:05:29 +020021 "github.com/diskfs/go-diskfs/disk"
22 "github.com/diskfs/go-diskfs/partition/gpt"
Lorenz Brun0b93c8d2021-11-09 03:58:40 +010023
Tim Windelschmidt2a1d1b22024-02-06 07:07:42 +010024 "source.monogon.dev/metropolis/proto/api"
25
Mateusz Zalega43e21072021-10-08 18:05:29 +020026 mctl "source.monogon.dev/metropolis/cli/metroctl/core"
Jan Schäre19d2792025-06-23 12:37:58 +000027 "source.monogon.dev/metropolis/installer/install"
Jan Schär5fdca562025-04-14 11:33:29 +000028 "source.monogon.dev/osbase/oci"
Jan Schäre19d2792025-06-23 12:37:58 +000029 "source.monogon.dev/osbase/oci/osimage"
Jan Schärc1b6df42025-03-20 08:52:18 +000030 "source.monogon.dev/osbase/structfs"
Jan Schär341cd422025-09-04 10:33:21 +020031 "source.monogon.dev/osbase/test/cmd"
Mateusz Zalega43e21072021-10-08 18:05:29 +020032)
33
Tim Windelschmidt82e6af72024-07-23 00:05:42 +000034var (
35 // These are filled by bazel at linking time with the canonical path of
36 // their corresponding file. Inside the init function we resolve it
37 // with the rules_go runfiles package to the real path.
38 xOvmfCodePath string
39 xOvmfVarsPath string
Tim Windelschmidt82e6af72024-07-23 00:05:42 +000040 xInstallerPath string
Jan Schär5fdca562025-04-14 11:33:29 +000041 xImagePath string
Tim Windelschmidt8f1efe92025-04-01 01:28:43 +020042 xQEMUPath string
Tim Windelschmidt82e6af72024-07-23 00:05:42 +000043)
44
45func init() {
46 var err error
47 for _, path := range []*string{
Tim Windelschmidt492434a2024-10-22 14:29:55 +020048 &xOvmfCodePath, &xOvmfVarsPath,
Jan Schär5fdca562025-04-14 11:33:29 +000049 &xInstallerPath, &xImagePath,
Tim Windelschmidt8f1efe92025-04-01 01:28:43 +020050 &xQEMUPath,
Tim Windelschmidt82e6af72024-07-23 00:05:42 +000051 } {
52 *path, err = runfiles.Rlocation(*path)
53 if err != nil {
54 panic(err)
55 }
56 }
Tim Windelschmidt4bd25e82025-07-11 19:36:28 +020057 // When running QEMU with snapshot=on set, QEMU creates a copy of the
58 // provided file in $TMPDIR. If $TMPDIR is set to /tmp, it will always
59 // be overridden to /var/tmp. This creates an issue for us, as the
60 // bazel tests only wire up /tmp, with /var/tmp being unaccessible
61 // because of permissions. Bazel provides $TEST_TMPDIR for this
62 // usecase, which we resolve to an absolute path and then override
63 // $TMPDIR.
64 tmpDir, err := filepath.Abs(os.Getenv("TEST_TMPDIR"))
65 if err != nil {
66 panic(err)
67 }
68 os.Setenv("TMPDIR", tmpDir)
Tim Windelschmidt82e6af72024-07-23 00:05:42 +000069}
70
Mateusz Zalega8cde8e72021-11-30 16:22:20 +010071// Each variable in this block points to either a test dependency or a side
72// effect. These variables are initialized in TestMain using Bazel.
73var (
Mateusz Zalega8cde8e72021-11-30 16:22:20 +010074 // installerImage is a filesystem path pointing at the installer image that
75 // is generated during the test, and is removed afterwards.
76 installerImage string
Jan Schär4b888262025-05-13 09:12:03 +000077 bootPath string
Mateusz Zalega43e21072021-10-08 18:05:29 +020078)
79
Mateusz Zalegaf1234a92022-06-22 13:57:38 +020080// runQemu starts a new QEMU process, expecting the given output to appear
81// in any line printed. It returns true, if the expected string was found,
82// and false otherwise.
Serge Bazanskie2e03712021-12-17 12:47:03 +010083//
Mateusz Zalegaf1234a92022-06-22 13:57:38 +020084// QEMU is killed shortly after the string is found, or when the context is
85// cancelled.
Serge Bazanskie2e03712021-12-17 12:47:03 +010086func runQemu(ctx context.Context, args []string, expectedOutput string) (bool, error) {
Mateusz Zalega43e21072021-10-08 18:05:29 +020087 defaultArgs := []string{
88 "-machine", "q35", "-accel", "kvm", "-nographic", "-nodefaults",
89 "-m", "512",
90 "-smp", "2",
91 "-cpu", "host",
Tim Windelschmidt82e6af72024-07-23 00:05:42 +000092 "-drive", "if=pflash,format=raw,snapshot=on,file=" + xOvmfCodePath,
93 "-drive", "if=pflash,format=raw,readonly=on,file=" + xOvmfVarsPath,
Mateusz Zalega43e21072021-10-08 18:05:29 +020094 "-serial", "stdio",
95 "-no-reboot",
96 }
Mateusz Zalega43e21072021-10-08 18:05:29 +020097 qemuArgs := append(defaultArgs, args...)
Mateusz Zalegab838e052022-08-12 18:08:10 +020098 pf := cmd.TerminateIfFound(expectedOutput, nil)
Tim Windelschmidt8f1efe92025-04-01 01:28:43 +020099 return cmd.RunCommand(ctx, xQEMUPath, qemuArgs, pf)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200100}
101
Serge Bazanskie2e03712021-12-17 12:47:03 +0100102// runQemuWithInstaller runs the Metropolis Installer in a qemu, performing the
103// same search-through-std{out,err} as runQemu.
104func runQemuWithInstaller(ctx context.Context, args []string, expectedOutput string) (bool, error) {
Mateusz Zalega8cde8e72021-11-30 16:22:20 +0100105 args = append(args, "-drive", "if=virtio,format=raw,snapshot=on,cache=unsafe,file="+installerImage)
Serge Bazanskie2e03712021-12-17 12:47:03 +0100106 return runQemu(ctx, args, expectedOutput)
Lorenz Brun0b93c8d2021-11-09 03:58:40 +0100107}
108
Mateusz Zalega43e21072021-10-08 18:05:29 +0200109// getStorage creates a sparse file, given a size expressed in mebibytes, and
110// returns a path to that file. It may return an error.
111func getStorage(size int64) (string, error) {
Serge Bazanski05cf33d2023-03-16 20:50:59 +0100112 nodeStorageDir, err := os.MkdirTemp(os.Getenv("TEST_TMPDIR"), "storage")
113 if err != nil {
114 return "", err
115 }
116 nodeStorage := filepath.Join(nodeStorageDir, "stor.img")
Mateusz Zalega8cde8e72021-11-30 16:22:20 +0100117 image, err := os.Create(nodeStorage)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200118 if err != nil {
Mateusz Zalega8cde8e72021-11-30 16:22:20 +0100119 return "", fmt.Errorf("couldn't create the block device image at %q: %w", nodeStorage, err)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200120 }
121 if err := syscall.Ftruncate(int(image.Fd()), size*1024*1024); err != nil {
Mateusz Zalega8cde8e72021-11-30 16:22:20 +0100122 return "", fmt.Errorf("couldn't resize the block device image at %q: %w", nodeStorage, err)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200123 }
124 image.Close()
Mateusz Zalega8cde8e72021-11-30 16:22:20 +0100125 return nodeStorage, nil
Mateusz Zalega43e21072021-10-08 18:05:29 +0200126}
127
128// qemuDriveParam returns QEMU parameters required to run it with a
129// raw-format image at path.
130func qemuDriveParam(path string) []string {
131 return []string{"-drive", "if=virtio,format=raw,snapshot=off,cache=unsafe,file=" + path}
132}
133
134// checkEspContents verifies the presence of the EFI payload inside of image's
135// first partition. It returns nil on success.
136func checkEspContents(image *disk.Disk) error {
137 // Get the ESP.
138 fs, err := image.GetFilesystem(1)
139 if err != nil {
140 return fmt.Errorf("couldn't read the installer ESP: %w", err)
141 }
142 // Make sure the EFI payload exists by attempting to open it.
Jan Schär4b888262025-05-13 09:12:03 +0000143 efiPayload, err := fs.OpenFile("/"+bootPath, os.O_RDONLY)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200144 if err != nil {
Jan Schär4b888262025-05-13 09:12:03 +0000145 return fmt.Errorf("couldn't open the installer's EFI Payload at %q: %w", bootPath, err)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200146 }
147 efiPayload.Close()
148 return nil
149}
150
151func TestMain(m *testing.M) {
Serge Bazanski97783222021-12-14 16:04:26 +0100152 installerImage = filepath.Join(os.Getenv("TEST_TMPDIR"), "installer.img")
Mateusz Zalega8cde8e72021-11-30 16:22:20 +0100153
Jan Schärc1b6df42025-03-20 08:52:18 +0000154 installer, err := structfs.OSPathBlob(xInstallerPath)
Tim Windelschmidt2a1d1b22024-02-06 07:07:42 +0100155 if err != nil {
156 log.Fatal(err)
157 }
158
Jan Schär2963b682025-07-17 17:03:44 +0200159 image, err := oci.AsImage(oci.ReadLayout(xImagePath))
Tim Windelschmidt2a1d1b22024-02-06 07:07:42 +0100160 if err != nil {
161 log.Fatal(err)
162 }
163
Jan Schäre19d2792025-06-23 12:37:58 +0000164 osImage, err := osimage.Read(image)
Jan Schär4b888262025-05-13 09:12:03 +0000165 if err != nil {
166 log.Fatal(err)
167 }
Jan Schäre19d2792025-06-23 12:37:58 +0000168 bootPath, err = install.EFIBootPath(osImage.Config.ProductInfo.Architecture())
Jan Schär4b888262025-05-13 09:12:03 +0000169 if err != nil {
170 log.Fatal(err)
171 }
172
Mateusz Zalega43e21072021-10-08 18:05:29 +0200173 iargs := mctl.MakeInstallerImageArgs{
Jan Schärc1b6df42025-03-20 08:52:18 +0000174 Installer: installer,
Lorenz Brunad131882023-06-28 16:42:20 +0200175 TargetPath: installerImage,
176 NodeParams: &api.NodeParameters{},
Jan Schär5fdca562025-04-14 11:33:29 +0000177 Image: image,
Mateusz Zalega43e21072021-10-08 18:05:29 +0200178 }
179 if err := mctl.MakeInstallerImage(iargs); err != nil {
Mateusz Zalega8f72b5d2021-12-03 17:08:59 +0100180 log.Fatalf("Couldn't create the installer image at %q: %v", installerImage, err)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200181 }
182 // With common dependencies set up, run the tests.
183 code := m.Run()
184 // Clean up.
Mateusz Zalega8cde8e72021-11-30 16:22:20 +0100185 os.Remove(installerImage)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200186 os.Exit(code)
187}
188
189func TestInstallerImage(t *testing.T) {
190 // This test examines the installer image, making sure that the GPT and the
191 // ESP contents are in order.
Mateusz Zalega8cde8e72021-11-30 16:22:20 +0100192 image, err := diskfs.OpenWithMode(installerImage, diskfs.ReadOnly)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200193 if err != nil {
Tim Windelschmidtd0d5d9d2025-03-26 22:07:11 +0100194 t.Fatalf("Couldn't open the installer image at %q: %s", installerImage, err)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200195 }
196 // Verify that GPT exists.
197 ti, err := image.GetPartitionTable()
Tim Windelschmidt33306eb2024-04-11 01:39:48 +0200198 if err != nil {
199 t.Fatalf("Couldn't read the installer image partition table: %s", err)
200 }
Mateusz Zalega43e21072021-10-08 18:05:29 +0200201 if ti.Type() != "gpt" {
Tim Windelschmidtd0d5d9d2025-03-26 22:07:11 +0100202 t.Fatal("Couldn't verify that the installer image contains a GPT.")
Mateusz Zalega43e21072021-10-08 18:05:29 +0200203 }
204 // Check that the first partition is likely to be a valid ESP.
205 pi := ti.GetPartitions()
206 esp := (pi[0]).(*gpt.Partition)
207 if esp.Start == 0 || esp.End == 0 {
Tim Windelschmidtd0d5d9d2025-03-26 22:07:11 +0100208 t.Fatal("The installer's ESP GPT entry looks off.")
Mateusz Zalega43e21072021-10-08 18:05:29 +0200209 }
210 // Verify that the image contains only one partition.
211 second := (pi[1]).(*gpt.Partition)
212 if second.Name != "" || second.Start != 0 || second.End != 0 {
Tim Windelschmidtd0d5d9d2025-03-26 22:07:11 +0100213 t.Fatal("It appears the installer image contains more than one partition.")
Mateusz Zalega43e21072021-10-08 18:05:29 +0200214 }
215 // Verify the ESP contents.
216 if err := checkEspContents(image); err != nil {
Tim Windelschmidtd0d5d9d2025-03-26 22:07:11 +0100217 t.Fatal(err)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200218 }
219}
220
221func TestNoBlockDevices(t *testing.T) {
Serge Bazanskie2e03712021-12-17 12:47:03 +0100222 ctx, ctxC := context.WithCancel(context.Background())
223 defer ctxC()
224
Mateusz Zalega43e21072021-10-08 18:05:29 +0200225 // No block devices are passed to QEMU aside from the install medium. Expect
226 // the installer to fail at the device probe stage rather than attempting to
227 // use the medium as the target device.
Tim Windelschmidt96e014e2024-09-10 02:26:13 +0200228 expectedOutput := "couldn't find a suitable block device"
Serge Bazanskie2e03712021-12-17 12:47:03 +0100229 result, err := runQemuWithInstaller(ctx, nil, expectedOutput)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200230 if err != nil {
Tim Windelschmidtd0d5d9d2025-03-26 22:07:11 +0100231 t.Fatal(err)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200232 }
Tim Windelschmidt885668a2024-04-19 00:01:06 +0200233 if !result {
Mateusz Zalega43e21072021-10-08 18:05:29 +0200234 t.Errorf("QEMU didn't produce the expected output %q", expectedOutput)
235 }
236}
237
238func TestBlockDeviceTooSmall(t *testing.T) {
Serge Bazanskie2e03712021-12-17 12:47:03 +0100239 ctx, ctxC := context.WithCancel(context.Background())
240 defer ctxC()
241
Mateusz Zalega43e21072021-10-08 18:05:29 +0200242 // Prepare the block device the installer will install to. This time the
243 // target device is too small to host a Metropolis installation.
244 imagePath, err := getStorage(64)
245 defer os.Remove(imagePath)
246 if err != nil {
Tim Windelschmidtd0d5d9d2025-03-26 22:07:11 +0100247 t.Fatal(err)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200248 }
249
250 // Run QEMU. Expect the installer to fail with a predefined error string.
Tim Windelschmidt96e014e2024-09-10 02:26:13 +0200251 expectedOutput := "couldn't find a suitable block device"
Serge Bazanskie2e03712021-12-17 12:47:03 +0100252 result, err := runQemuWithInstaller(ctx, qemuDriveParam(imagePath), expectedOutput)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200253 if err != nil {
Tim Windelschmidtd0d5d9d2025-03-26 22:07:11 +0100254 t.Fatal(err)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200255 }
Tim Windelschmidt885668a2024-04-19 00:01:06 +0200256 if !result {
Tim Windelschmidtd0d5d9d2025-03-26 22:07:11 +0100257 t.Fatalf("QEMU didn't produce the expected output %q", expectedOutput)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200258 }
259}
260
261func TestInstall(t *testing.T) {
Serge Bazanskie2e03712021-12-17 12:47:03 +0100262 ctx, ctxC := context.WithCancel(context.Background())
263 defer ctxC()
264
Mateusz Zalega43e21072021-10-08 18:05:29 +0200265 // Prepare the block device image the installer will install to.
Lorenz Brun35fcf032023-06-29 04:15:58 +0200266 // Needs enough storage for two 4096 MiB system partitions, a 384 MiB ESP
267 // and a 128 MiB data partition. In addition at the start and end we need
268 // 1MiB for GPT headers and alignment.
269 storagePath, err := getStorage(4096*2 + 384 + 128 + 2)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200270 defer os.Remove(storagePath)
271 if err != nil {
Tim Windelschmidtd0d5d9d2025-03-26 22:07:11 +0100272 t.Fatal(err)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200273 }
274
275 // Run QEMU. Expect the installer to succeed.
276 expectedOutput := "Installation completed"
Serge Bazanskie2e03712021-12-17 12:47:03 +0100277 result, err := runQemuWithInstaller(ctx, qemuDriveParam(storagePath), expectedOutput)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200278 if err != nil {
Tim Windelschmidtd0d5d9d2025-03-26 22:07:11 +0100279 t.Fatal(err)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200280 }
Tim Windelschmidt885668a2024-04-19 00:01:06 +0200281 if !result {
Tim Windelschmidtd0d5d9d2025-03-26 22:07:11 +0100282 t.Fatalf("QEMU didn't produce the expected output %q", expectedOutput)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200283 }
284
285 // Verify the resulting node image. Check whether the node GPT was created.
286 storage, err := diskfs.OpenWithMode(storagePath, diskfs.ReadOnly)
287 if err != nil {
Tim Windelschmidtd0d5d9d2025-03-26 22:07:11 +0100288 t.Fatalf("Couldn't open the resulting node image at %q: %s", storagePath, err)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200289 }
290 // Verify that GPT exists.
291 ti, err := storage.GetPartitionTable()
Tim Windelschmidt096654a2024-04-18 23:10:19 +0200292 if err != nil {
293 t.Fatalf("Couldn't read the installer image partition table: %s", err)
294 }
Mateusz Zalega43e21072021-10-08 18:05:29 +0200295 if ti.Type() != "gpt" {
Tim Windelschmidtd0d5d9d2025-03-26 22:07:11 +0100296 t.Fatal("Couldn't verify that the resulting node image contains a GPT.")
Mateusz Zalega43e21072021-10-08 18:05:29 +0200297 }
298 // Check that the first partition is likely to be a valid ESP.
299 pi := ti.GetPartitions()
300 esp := (pi[0]).(*gpt.Partition)
Jan Schäre19d2792025-06-23 12:37:58 +0000301 if esp.Name != install.ESPLabel || esp.Start == 0 || esp.End == 0 {
Tim Windelschmidtd0d5d9d2025-03-26 22:07:11 +0100302 t.Fatal("The node's ESP GPT entry looks off.")
Mateusz Zalega43e21072021-10-08 18:05:29 +0200303 }
304 // Verify the system partition's GPT entry.
305 system := (pi[1]).(*gpt.Partition)
Jan Schäre19d2792025-06-23 12:37:58 +0000306 if system.Name != install.SystemALabel || system.Start == 0 || system.End == 0 {
Tim Windelschmidtd0d5d9d2025-03-26 22:07:11 +0100307 t.Fatal("The node's system partition GPT entry looks off.")
Lorenz Brun35fcf032023-06-29 04:15:58 +0200308 }
309 // Verify the system partition's GPT entry.
310 systemB := (pi[2]).(*gpt.Partition)
Jan Schäre19d2792025-06-23 12:37:58 +0000311 if systemB.Name != install.SystemBLabel || systemB.Start == 0 || systemB.End == 0 {
Tim Windelschmidtd0d5d9d2025-03-26 22:07:11 +0100312 t.Fatal("The node's system partition GPT entry looks off.")
Mateusz Zalega43e21072021-10-08 18:05:29 +0200313 }
314 // Verify the data partition's GPT entry.
Lorenz Brun35fcf032023-06-29 04:15:58 +0200315 data := (pi[3]).(*gpt.Partition)
Jan Schäre19d2792025-06-23 12:37:58 +0000316 if data.Name != install.DataLabel || data.Start == 0 || data.End == 0 {
Tim Windelschmidtd0d5d9d2025-03-26 22:07:11 +0100317 t.Fatalf("The node's data partition GPT entry looks off: %+v", data)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200318 }
319 // Verify that there are no more partitions.
Lorenz Brun35fcf032023-06-29 04:15:58 +0200320 fourth := (pi[4]).(*gpt.Partition)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200321 if fourth.Name != "" || fourth.Start != 0 || fourth.End != 0 {
Tim Windelschmidtd0d5d9d2025-03-26 22:07:11 +0100322 t.Fatal("The resulting node image contains more partitions than expected.")
Mateusz Zalega43e21072021-10-08 18:05:29 +0200323 }
324 // Verify the ESP contents.
325 if err := checkEspContents(storage); err != nil {
Tim Windelschmidtd0d5d9d2025-03-26 22:07:11 +0100326 t.Fatal(err)
Mateusz Zalega43e21072021-10-08 18:05:29 +0200327 }
Serge Bazanskif9bdf312023-03-16 21:54:49 +0100328 storage.File.Close()
Lorenz Brun0b93c8d2021-11-09 03:58:40 +0100329 // Run QEMU again. Expect TestOS to launch successfully.
330 expectedOutput = "_TESTOS_LAUNCH_SUCCESS_"
Serge Bazanski05cf33d2023-03-16 20:50:59 +0100331 time.Sleep(time.Second)
Serge Bazanskie2e03712021-12-17 12:47:03 +0100332 result, err = runQemu(ctx, qemuDriveParam(storagePath), expectedOutput)
Lorenz Brun0b93c8d2021-11-09 03:58:40 +0100333 if err != nil {
Tim Windelschmidtd0d5d9d2025-03-26 22:07:11 +0100334 t.Fatal(err)
Lorenz Brun0b93c8d2021-11-09 03:58:40 +0100335 }
Tim Windelschmidt885668a2024-04-19 00:01:06 +0200336 if !result {
Tim Windelschmidtd0d5d9d2025-03-26 22:07:11 +0100337 t.Fatalf("QEMU didn't produce the expected output %q", expectedOutput)
Lorenz Brun0b93c8d2021-11-09 03:58:40 +0100338 }
Mateusz Zalega43e21072021-10-08 18:05:29 +0200339}