1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
|
/* Copyright 2022 The ChromiumOS Authors
* Use of this source code is governed by a BSD-style license that can be
* found in the LICENSE file.
*/
#include "test_util.h"
#include "flash.h"
#include "string.h"
#include "system.h"
#include "task.h"
#include "write_protect.h"
static bool write_protect_enabled;
test_static int test_write_protect(void)
{
TEST_EQ(write_protect_is_asserted(), write_protect_enabled, "%d");
return EC_SUCCESS;
}
test_static int test_ro_protection_enabled(void)
{
TEST_BITS_SET(crec_flash_get_protect(), EC_FLASH_PROTECT_RO_NOW);
return EC_SUCCESS;
}
test_static int test_system_is_locked(void)
{
if (!write_protect_is_asserted() ||
(~crec_flash_get_protect() & EC_FLASH_PROTECT_RO_NOW))
TEST_EQ(system_is_locked(), 0, "%d");
else
TEST_EQ(system_is_locked(), 1, "%d");
return EC_SUCCESS;
}
static void print_usage(void)
{
ccprintf("usage: runtest [wp_on|wp_off]\n");
}
void test_run_step(uint32_t state)
{
/*
* Step 1: Check if reported write protect and system_is_locked()
* output is correct. Since RO protection is not enabled at this point
* we expect system_is_locked() to return 0. If write protect is
* enabled then attempt to enable RO protection.
*/
if (state & TEST_STATE_MASK(TEST_STATE_STEP_1)) {
RUN_TEST(test_write_protect);
RUN_TEST(test_system_is_locked);
if (test_get_error_count())
test_reboot_to_next_step(TEST_STATE_FAILED);
else if (write_protect_enabled) {
ccprintf("Request RO protection at boot\n");
crec_flash_set_protect(EC_FLASH_PROTECT_RO_AT_BOOT,
EC_FLASH_PROTECT_RO_AT_BOOT);
test_reboot_to_next_step(TEST_STATE_STEP_2);
} else {
/* Write protect is disabled, nothing else to do */
test_reboot_to_next_step(TEST_STATE_PASSED);
}
}
/*
* Step 2: Check if hardware write protect is enabled, RO protection
* is enabled and system_is_locked() returns 1.
*/
else if (state & TEST_STATE_MASK(TEST_STATE_STEP_2)) {
/* Expect hardware write protect to be enabled */
write_protect_enabled = true;
RUN_TEST(test_write_protect);
RUN_TEST(test_ro_protection_enabled);
RUN_TEST(test_system_is_locked);
if (test_get_error_count())
test_reboot_to_next_step(TEST_STATE_FAILED);
else
test_reboot_to_next_step(TEST_STATE_PASSED);
}
}
int task_test(void *unused)
{
test_run_multistep();
return EC_SUCCESS;
}
void run_test(int argc, const char **argv)
{
test_reset();
if (IS_ENABLED(CONFIG_SYSTEM_UNLOCKED)) {
ccprintf("Please disable CONFIG_SYSTEM_UNLOCKED before "
"running this test\n");
test_fail();
return;
}
if (argc < 2) {
print_usage();
test_fail();
return;
}
if (strncmp(argv[1], "wp_on", 5) == 0)
write_protect_enabled = true;
else if (strncmp(argv[1], "wp_off", 6) == 0) {
write_protect_enabled = false;
if (IS_ENABLED(CONFIG_WP_ALWAYS)) {
ccprintf("Hardware write protect always enabled. "
"Please disable CONFIG_WP_ALWAYS before "
"running this test\n");
test_fail();
return;
}
} else {
print_usage();
test_fail();
return;
}
msleep(30); /* Wait for TASK_ID_TEST to initialize */
task_wake(TASK_ID_TEST);
}
|