# Copyright (c) 2012 The Chromium OS Authors. All rights reserved. # Use of this source code is governed by a BSD-style license that can be # found in the LICENSE file. import logging, os from autotest_lib.server import utils from autotest_lib.server.cros.faft.firmware_test import FirmwareTest from autotest_lib.client.common_lib import error class firmware_UpdateFirmwareDataKeyVersion(FirmwareTest): """ This test requires a USB test image plugged in. The firmware id should matches fwid of shellball chromeos-firmwareupdate, or user can provide a shellball to do this test. In this way, the client will be update with the given shellball first. On runtime, this test modifies shellball and runs autoupdate. Check firmware datakey version after boot with firmware B, and then recover firmware A and B to original shellball. """ version = 1 def resign_datakey_version(self, host): host.send_file(os.path.join(self.bindir, 'files/common.sh'), os.path.join(self.faft_client.updater.get_temp_path(), 'common.sh')) host.send_file(os.path.join(self.bindir, 'files/make_keys.sh'), os.path.join(self.faft_client.updater.get_temp_path(), 'make_keys.sh')) self.faft_client.system.run_shell_command('/bin/bash %s %s' % ( os.path.join(self.faft_client.updater.get_temp_path(), 'make_keys.sh'), self._update_version)) def check_firmware_datakey_version(self, expected_ver): actual_ver = self.faft_client.bios.get_datakey_version( 'b' if self.fw_vboot2 else 'a') actual_tpm_fwver = self.faft_client.tpm.get_firmware_datakey_version() if actual_ver != expected_ver or actual_tpm_fwver != expected_ver: raise error.TestFail( 'Firmware data key version should be %s,' 'but got (fwver, tpm_fwver) = (%s, %s).' % (expected_ver, actual_ver, actual_tpm_fwver)) else: logging.info( 'Update success, now datakey version is %s', actual_ver) def initialize(self, host, cmdline_args): dict_args = utils.args_to_dict(cmdline_args) self.use_shellball = dict_args.get('shellball', None) super(firmware_UpdateFirmwareDataKeyVersion, self).initialize( host, cmdline_args) self.backup_firmware() updater_path = self.setup_firmwareupdate_shellball(self.use_shellball) # Update firmware if needed if updater_path: self.set_hardware_write_protect(enable=False) self.faft_client.updater.run_factory_install() self.switcher.mode_aware_reboot() self.setup_usbkey(usbkey=True) self.switcher.setup_mode('normal') self._fwid = self.faft_client.updater.get_fwid() actual_ver = self.faft_client.bios.get_datakey_version('a') logging.info('Origin version is %s', actual_ver) self._update_version = actual_ver + 1 logging.info('Firmware version will update to version %s', self._update_version) self.resign_datakey_version(host) self.faft_client.updater.resign_firmware(1) self.faft_client.updater.repack_shellball('test') def cleanup(self): self.faft_client.updater.cleanup() self.restore_firmware() self.invalidate_firmware_setup() super(firmware_UpdateFirmwareDataKeyVersion, self).cleanup() def run_once(self): logging.info("Update firmware with new datakey version.") self.check_state((self.checkers.crossystem_checker, { 'fwid': self._fwid })) self.check_state((self.checkers.fw_tries_checker, 'A')) self.faft_client.updater.run_autoupdate('test') self.switcher.mode_aware_reboot() logging.info("Check firmware data key version and Rollback.") self.faft_client.updater.run_bootok('test') self.check_state((self.checkers.fw_tries_checker, 'B')) self.switcher.mode_aware_reboot() logging.info("Check firmware and TPM version, then recovery.") self.check_state((self.checkers.fw_tries_checker, 'B' if self.fw_vboot2 else 'A')) self.check_firmware_datakey_version(self._update_version) self.faft_client.updater.run_recovery() self.reboot_and_reset_tpm() logging.info("Check Rollback version.") self.check_state((self.checkers.crossystem_checker, { 'fwid': self._fwid })) self.check_state((self.checkers.fw_tries_checker, 'B' if self.fw_vboot2 else 'A')) self.check_firmware_datakey_version(self._update_version - 1)