1# Copyright (c) 2013 The Chromium OS Authors. All rights reserved. 2# Use of this source code is governed by a BSD-style license that can be 3# found in the LICENSE file. 4 5import logging 6 7from autotest_lib.client.common_lib import error 8from autotest_lib.server.cros import vboot_constants as vboot 9from autotest_lib.server.cros.faft.firmware_test import FirmwareTest 10 11 12class firmware_SelfSignedBoot(FirmwareTest): 13 """ 14 Servo based developer mode boot only test to Self signed Kernels. 15 16 This test requires a USB disk plugged-in, which contains a Chrome OS test 17 image (built by 'build_image test'). On runtime, this test first switches 18 DUT to dev mode. When dev_boot_usb=1 and dev_boot_signed_only=1, pressing 19 Ctrl-U on developer screen should not boot the USB disk(recovery mode boot 20 should work), and when USB image is resigned with SSD keys, pressing Ctrl-U 21 should boot to the USB disk. 22 """ 23 version = 1 24 NEEDS_SERVO_USB = True 25 26 def initialize(self, host, cmdline_args, ec_wp=None): 27 super(firmware_SelfSignedBoot, self).initialize(host, cmdline_args, 28 ec_wp=ec_wp) 29 self.switcher.setup_mode('dev') 30 self.setup_usbkey(usbkey=True, host=False) 31 32 self.original_dev_boot_usb = self.faft_client.system.get_dev_boot_usb() 33 logging.info('Original dev_boot_usb value: %s', 34 str(self.original_dev_boot_usb)) 35 36 self.usb_dev = self.get_usbdisk_path_on_dut() 37 if not self.usb_dev: 38 raise error.TestError("Unable to find USB disk") 39 40 def cleanup(self): 41 try: 42 self.faft_client.system.set_dev_boot_usb(self.original_dev_boot_usb) 43 self.disable_crossystem_selfsigned() 44 self.ensure_dev_internal_boot(self.original_dev_boot_usb) 45 self.resignimage_recoverykeys() 46 except Exception as e: 47 logging.error("Caught exception: %s", str(e)) 48 super(firmware_SelfSignedBoot, self).cleanup() 49 50 def resignimage_ssdkeys(self): 51 """Re-signing the USB image using the SSD keys.""" 52 self.faft_client.system.run_shell_command( 53 '/usr/share/vboot/bin/make_dev_ssd.sh --partitions %s -i %s' % 54 (self.KERNEL_MAP['a'], self.usb_dev)) 55 56 def resignimage_recoverykeys(self): 57 """Re-signing the USB image using the Recovery keys.""" 58 self.faft_client.system.run_shell_command( 59 '/usr/share/vboot/bin/make_dev_ssd.sh --partitions %s -i %s --recovery_key' 60 % (self.KERNEL_MAP['a'], self.usb_dev)) 61 62 def enable_crossystem_selfsigned(self): 63 """Enable dev_boot_signed_only + dev_boot_usb.""" 64 self.faft_client.system.run_shell_command( 65 'crossystem dev_boot_signed_only=1') 66 self.faft_client.system.run_shell_command('crossystem dev_boot_usb=1') 67 68 def disable_crossystem_selfsigned(self): 69 """Disable dev_boot_signed_only + dev_boot_usb.""" 70 self.faft_client.system.run_shell_command( 71 'crossystem dev_boot_signed_only=0') 72 self.faft_client.system.run_shell_command('crossystem dev_boot_usb=0') 73 74 def run_once(self): 75 """Runs a single iteration of the test.""" 76 if (self.faft_config.has_keyboard and 77 not self.check_ec_capability(['keyboard'])): 78 raise error.TestNAError("TEST IT MANUALLY! This test can't be " 79 "automated on non-Chrome-EC devices.") 80 81 logging.info("Expected developer mode, set dev_boot_usb and " 82 "dev_boot_signed_only to 1.") 83 self.check_state((self.checkers.dev_boot_usb_checker, False)) 84 self.enable_crossystem_selfsigned() 85 self.switcher.mode_aware_reboot() 86 87 logging.info("Expected internal disk boot, switch to recovery mode.") 88 self.check_state((self.checkers.dev_boot_usb_checker, False, 89 'Not internal disk boot, dev_boot_usb misbehaved')) 90 self.switcher.reboot_to_mode(to_mode='rec') 91 92 logging.info("Expected recovery boot and reboot.") 93 self.check_state((self.checkers.crossystem_checker, { 94 'mainfw_type': 'recovery', 95 'recovery_reason': vboot.RECOVERY_REASON['RO_MANUAL'], 96 })) 97 self.switcher.mode_aware_reboot() 98 99 logging.info("Expected internal disk boot, resign with SSD keys.") 100 self.check_state((self.checkers.dev_boot_usb_checker, False, 101 'Not internal disk boot, dev_boot_usb misbehaved')) 102 self.resignimage_ssdkeys() 103 self.switcher.simple_reboot() 104 self.switcher.bypass_dev_boot_usb() 105 self.switcher.wait_for_client() 106 107 logging.info("Expected USB boot.") 108 # After signing USB image with SSD developer keys, kernkey_vfy value 109 # is expected as 'sig' when booted in USB image. 110 self.check_state((self.checkers.dev_boot_usb_checker, (True, False), 111 'Device not booted from USB image properly.')) 112 self.switcher.mode_aware_reboot() 113 114 logging.info("Check and done.") 115 self.check_state((self.checkers.dev_boot_usb_checker, False)) 116