• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1# Copyright (c) 2013 The Chromium OS Authors. All rights reserved.
2# Use of this source code is governed by a BSD-style license that can be
3# found in the LICENSE file.
4
5AUTHOR = "ChromeOS Team"
6NAME = "firmware_LockedME"
7PURPOSE = "Ensure the ME region is locked."
8ATTRIBUTES = "suite:faft_bios_ro_qual, suite:faft_bios_rw_qual"
9CRITERIA = "Fail if any part of the BIOS ME region is mutable from userspace"
10TIME = "SHORT"
11TEST_CATEGORY = "Security"
12TEST_CLASS = "firmware"
13TEST_TYPE = "client"
14
15DOC = """
16Intel x86 CPUs (Sandybridge and later) reserve a portion of the BIOS
17firmware image for use by the Intel Management Engine (ME). Intel
18requires that section of the BIOS flash to be mutable. The ME firmware
19itself determines whether or not the CPU can modify the ME region. During
20development, we often use an ME image that allows CPU updates. For
21production, we need to ensure that we do NOT allow CPU updates.
22
23This test PASSES if the CPU is unable to modify the ME region.
24
25This test FAILS if the CPU can modify the ME region, which means it should
26*always* fail on any pre-production image.
27
28Because the only way to be sure that the ME is locked is to try to change
29it, if the test fails and is interrupted before it can restore the original
30content, the DUT may stop functioning and will require reimaging via servo
31or Dediprog to restore it.
32
33This test is only meaningful to systems using Intel x86 CPUs, and then only
34Sandybrige models or later (not Pinetrail, for example)
35
36"""
37
38job.run_test('firmware_LockedME')
39