blob: c20be11c99cc45814c5fec70b7c5105b64bb49a7 [file] [log] [blame] [edit]
# Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
from autotest_lib.server.cros.faftsequence import FAFTSequence
class firmware_CorruptBothFwSigAB(FAFTSequence):
"""
Servo based both firmware signature A and B corruption test.
This test requires a USB disk plugged-in, which contains a Chrome OS test
image (built by "build_image --test"). On runtime, this test corrupts
both firmware signature A and B. On next reboot, the firmware verification
fails and enters recovery mode. This test then checks the success of the
recovery boot.
"""
version = 1
def ensure_normal_boot(self):
"""Ensure normal boot this time.
If not, it may be a test failure during step 2 or 3, try to recover to
normal mode by recovering the firmware and rebooting.
"""
if not self.crossystem_checker(
{'mainfw_type': ('normal', 'developer')}):
self.run_faft_step({
'userspace_action': (self.faft_client.run_shell_command,
'chromeos-firmwareupdate --mode recovery')
})
def setup(self, dev_mode=False):
super(firmware_CorruptBothFwSigAB, self).setup()
self.assert_test_image_in_usb_disk()
self.setup_dev_mode(dev_mode)
self.servo.set('usb_mux_sel1', 'dut_sees_usbkey')
def cleanup(self):
self.ensure_normal_boot()
super(firmware_CorruptBothFwSigAB, self).cleanup()
def run_once(self, host=None, dev_mode=False):
self.register_faft_sequence((
{ # Step 1, corrupt both firmware signature A and B
'state_checker': (self.crossystem_checker, {
'mainfw_type': 'developer' if dev_mode else 'normal',
'recoverysw_boot': '0',
}),
'userspace_action': (self.faft_client.corrupt_firmware,
('a', 'b')),
'firmware_action': None if dev_mode else
self.wait_fw_screen_and_plug_usb,
'install_deps_after_boot': True,
},
{ # Step 2, expected recovery boot and set fwb_tries flag
'state_checker': (self.crossystem_checker, {
'mainfw_type': 'recovery',
'recovery_reason': (self.RECOVERY_REASON['RO_INVALID_RW'],
self.RECOVERY_REASON['RW_VERIFY_KEYBLOCK']),
'recoverysw_boot': '0',
}),
'userspace_action': self.faft_client.set_try_fw_b,
'firmware_action': None if dev_mode else
self.wait_fw_screen_and_plug_usb,
},
{ # Step 3, still expected recovery boot and restore firmware
'state_checker': (self.crossystem_checker, {
'mainfw_type': 'recovery',
'recovery_reason': (self.RECOVERY_REASON['RO_INVALID_RW'],
self.RECOVERY_REASON['RW_VERIFY_KEYBLOCK']),
'recoverysw_boot': '0',
}),
'userspace_action': (self.faft_client.restore_firmware,
('a', 'b')),
},
{ # Step 4, expected normal boot, done
'state_checker': (self.crossystem_checker, {
'mainfw_type': 'developer' if dev_mode else 'normal',
'recoverysw_boot': '0',
}),
},
))
self.run_faft_sequence()