Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(385)

Side by Side Diff: autotest/hardware_TPMFirmware/hardware_TPMFirmware.py

Issue 3335010: vboot_reference: add hardware_TPMFirmware test case into vboot_reference repo (Closed) Base URL: ssh://git@gitrw.chromium.org:9222/vboot_reference.git
Patch Set: Created 10 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « autotest/hardware_TPMFirmware/control ('k') | autotest/hardware_TPMFirmware/src/Makefile » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 # Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file.
4
5 import logging, os, re, sys, shutil
6 from autotest_lib.client.bin import test, utils
7
8 class hardware_TPMFirmware(test.test):
9 """
10 Test of TPM functionality needed in firmware (client side of the test).
11 See also server/site_tests/hardware_TPMFirmwareServer.
12 """
13 version = 1
14 preserve_srcdir = True
15
16 # Cross-compiles TLCL test suite and other needed code.
17 # TODO(semenzato): tpm_takeownership is currently available by making
18 # tpm-tools an RDEPEND in the autotest ebuild. See that file for a
19 # better way.
20 def setup(self):
21 sysroot = os.environ['SYSROOT']
22 bin_path = os.path.join(sysroot, 'usr/sbin/tpm_takeownership')
23 shutil.copy(bin_path, self.bindir)
24 utils.make('-C %s' % self.srcdir)
25
26
27 # Runs a command, logs the output, and returns the exit status.
28 def tpm_run(self, cmd, ignore_status=False):
29 output = utils.run(cmd, ignore_status=ignore_status)
30 logging.info(output)
31 self.job.set_state("client_status", output.exit_status)
32
33
34 # Sets up the system (if it isn't already) to run the tpm binaries. This
35 # is mostly needed after a reboot. We don't rely on the system booting in
36 # any particular state.
37 def tpm_setup(self, with_tcsd=False):
38 utils.run('mknod /dev/tpm c 10 224', ignore_status=True)
39 utils.run('mknod /dev/tpm0 c 10 224', ignore_status=True)
40 utils.run('modprobe tpm_tis force=1 interrupts=0', ignore_status=True)
41
42 if (with_tcsd):
43 utils.run('/usr/sbin/tcsd')
44 else:
45 # It will be a problem if upstart automatically restarts tcsd.
46 utils.run('pkill tcsd', ignore_status=True)
47
48
49 def run_once(self, subtest='None'):
50 logging.info("Running TPM firmware client subtest %s", subtest)
51 if (subtest == 'setup'):
52 self.tpm_setup()
53 self.tpm_write_status(0)
54 elif (subtest == 'takeownership'):
55 self.tpm_setup(with_tcsd=True)
56 own_cmd = os.path.join(self.bindir, "tpm_takeownership -y -z")
57 self.tpm_run(own_cmd)
58 else:
59 self.tpm_setup()
60 cmd = os.path.join(self.srcdir, subtest)
61 self.tpm_run(cmd, ignore_status=True)
OLDNEW
« no previous file with comments | « autotest/hardware_TPMFirmware/control ('k') | autotest/hardware_TPMFirmware/src/Makefile » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698