| # Copyright (c) 2011 The Chromium OS Authors. All rights reserved. |
| # Use of this source code is governed by a BSD-style license that can be |
| # found in the LICENSE file. |
| |
| from autotest_lib.server.cros.faftsequence import FAFTSequence |
| |
| |
| class firmware_CorruptBothFwSigAB(FAFTSequence): |
| """ |
| Servo based both firmware signature A and B corruption test. |
| |
| This test requires a USB disk plugged-in, which contains a Chrome OS test |
| image (built by "build_image --test"). On runtime, this test corrupts |
| both firmware signature A and B. On next reboot, the firmware verification |
| fails and enters recovery mode. This test then checks the success of the |
| recovery boot. |
| """ |
| version = 1 |
| |
| |
| def ensure_normal_boot(self): |
| """Ensure normal boot this time. |
| |
| If not, it may be a test failure during step 2 or 3, try to recover to |
| normal mode by recovering the firmware and rebooting. |
| """ |
| if not self.crossystem_checker( |
| {'mainfw_type': ('normal', 'developer')}): |
| self.run_faft_step({ |
| 'userspace_action': (self.faft_client.run_shell_command, |
| 'chromeos-firmwareupdate --mode recovery') |
| }) |
| |
| |
| def setup(self, dev_mode=False): |
| super(firmware_CorruptBothFwSigAB, self).setup() |
| self.assert_test_image_in_usb_disk() |
| self.setup_dev_mode(dev_mode) |
| self.servo.set('usb_mux_sel1', 'dut_sees_usbkey') |
| |
| |
| def cleanup(self): |
| self.ensure_normal_boot() |
| super(firmware_CorruptBothFwSigAB, self).cleanup() |
| |
| |
| def run_once(self, host=None, dev_mode=False): |
| self.register_faft_sequence(( |
| { # Step 1, corrupt both firmware signature A and B |
| 'state_checker': (self.crossystem_checker, { |
| 'mainfw_type': 'developer' if dev_mode else 'normal', |
| 'recoverysw_boot': '0', |
| }), |
| 'userspace_action': (self.faft_client.corrupt_firmware, |
| ('a', 'b')), |
| 'firmware_action': None if dev_mode else |
| self.wait_fw_screen_and_plug_usb, |
| 'install_deps_after_boot': True, |
| }, |
| { # Step 2, expected recovery boot and set fwb_tries flag |
| 'state_checker': (self.crossystem_checker, { |
| 'mainfw_type': 'recovery', |
| 'recovery_reason': (self.RECOVERY_REASON['RO_INVALID_RW'], |
| self.RECOVERY_REASON['RW_VERIFY_KEYBLOCK']), |
| 'recoverysw_boot': '0', |
| }), |
| 'userspace_action': self.faft_client.set_try_fw_b, |
| 'firmware_action': None if dev_mode else |
| self.wait_fw_screen_and_plug_usb, |
| }, |
| { # Step 3, still expected recovery boot and restore firmware |
| 'state_checker': (self.crossystem_checker, { |
| 'mainfw_type': 'recovery', |
| 'recovery_reason': (self.RECOVERY_REASON['RO_INVALID_RW'], |
| self.RECOVERY_REASON['RW_VERIFY_KEYBLOCK']), |
| 'recoverysw_boot': '0', |
| }), |
| 'userspace_action': (self.faft_client.restore_firmware, |
| ('a', 'b')), |
| }, |
| { # Step 4, expected normal boot, done |
| 'state_checker': (self.crossystem_checker, { |
| 'mainfw_type': 'developer' if dev_mode else 'normal', |
| 'recoverysw_boot': '0', |
| }), |
| }, |
| )) |
| self.run_faft_sequence() |