blob: 10c24de6ea766a5a84b9a4a9f9ca6bdc902e1948 [file] [log] [blame]
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
import logging, os
from autotest_lib.server import utils
from autotest_lib.server.cros.faft.firmware_test import FirmwareTest
from autotest_lib.client.common_lib import error
class firmware_UpdateFirmwareDataKeyVersion(FirmwareTest):
"""
This test requires a USB test image plugged in. The firmware id
should matches fwid of shellball chromeos-firmwareupdate, or user can
provide a shellball to do this test. In this way, the client will be update
with the given shellball first. On runtime, this test modifies shellball
and runs autoupdate. Check firmware datakey version after boot with
firmware B, and then recover firmware A and B to original shellball.
"""
version = 1
def resign_datakey_version(self, host):
host.send_file(os.path.join(self.bindir,
'files/common.sh'),
os.path.join(self.faft_client.updater.get_temp_path(),
'common.sh'))
host.send_file(os.path.join(self.bindir,
'files/make_keys.sh'),
os.path.join(self.faft_client.updater.get_temp_path(),
'make_keys.sh'))
self.faft_client.system.run_shell_command('/bin/bash %s %s' % (
os.path.join(self.faft_client.updater.get_temp_path(),
'make_keys.sh'),
self._update_version))
def check_firmware_datakey_version(self, expected_ver):
actual_ver = self.faft_client.bios.get_datakey_version(
'b' if self.fw_vboot2 else 'a')
actual_tpm_fwver = self.faft_client.tpm.get_firmware_datakey_version()
if actual_ver != expected_ver or actual_tpm_fwver != expected_ver:
raise error.TestFail(
'Firmware data key version should be %s,'
'but got (fwver, tpm_fwver) = (%s, %s).'
% (expected_ver, actual_ver, actual_tpm_fwver))
else:
logging.info(
'Update success, now datakey version is %s', actual_ver)
def initialize(self, host, cmdline_args):
dict_args = utils.args_to_dict(cmdline_args)
shellball_path = dict_args.get('shellball', None)
super(firmware_UpdateFirmwareDataKeyVersion, self).initialize(
host, cmdline_args)
self.backup_firmware()
self.setup_firmwareupdate_shellball(shellball_path)
# Update firmware if needed
if shellball_path:
self.set_hardware_write_protect(enable=False)
self.faft_client.updater.run_factory_install()
self.switcher.mode_aware_reboot()
self.setup_usbkey(usbkey=True)
self.switcher.setup_mode('normal')
self._fwid = self.faft_client.updater.get_fwid()
actual_ver = self.faft_client.bios.get_datakey_version('a')
logging.info('Origin version is %s', actual_ver)
self._update_version = actual_ver + 1
logging.info('Firmware version will update to version %s',
self._update_version)
self.resign_datakey_version(host)
self.faft_client.updater.resign_firmware(1)
self.faft_client.updater.repack_shellball('test')
def cleanup(self):
self.faft_client.updater.cleanup()
self.restore_firmware()
self.invalidate_firmware_setup()
super(firmware_UpdateFirmwareDataKeyVersion, self).cleanup()
def run_once(self):
logging.info("Update firmware with new datakey version.")
self.check_state((self.checkers.crossystem_checker, {
'fwid': self._fwid
}))
self.check_state((self.checkers.fw_tries_checker, 'A'))
self.faft_client.updater.run_autoupdate('test')
self.switcher.mode_aware_reboot()
logging.info("Check firmware data key version and Rollback.")
self.faft_client.updater.run_bootok('test')
self.check_state((self.checkers.fw_tries_checker, 'B'))
self.switcher.mode_aware_reboot()
logging.info("Check firmware and TPM version, then recovery.")
self.check_state((self.checkers.fw_tries_checker,
'B' if self.fw_vboot2 else 'A'))
self.check_firmware_datakey_version(self._update_version)
self.faft_client.updater.run_recovery()
self.reboot_and_reset_tpm()
logging.info("Check Rollback version.")
self.check_state((self.checkers.crossystem_checker, {
'fwid': self._fwid
}))
self.check_state((self.checkers.fw_tries_checker,
'B' if self.fw_vboot2 else 'A'))
self.check_firmware_datakey_version(self._update_version - 1)