| // Copyright 2021 The ChromiumOS Authors |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| package intel |
| |
| import ( |
| "context" |
| "fmt" |
| "regexp" |
| "strconv" |
| "strings" |
| "time" |
| |
| "github.com/golang/protobuf/ptypes/empty" |
| |
| "go.chromium.org/tast-tests/cros/common/servo" |
| "go.chromium.org/tast-tests/cros/remote/tabletmode" |
| "go.chromium.org/tast-tests/cros/services/cros/security" |
| "go.chromium.org/tast/core/ctxutil" |
| "go.chromium.org/tast/core/dut" |
| "go.chromium.org/tast/core/errors" |
| "go.chromium.org/tast/core/rpc" |
| "go.chromium.org/tast/core/ssh" |
| "go.chromium.org/tast/core/testing" |
| "go.chromium.org/tast/core/testing/hwdep" |
| ) |
| |
| type s0ixCheckTestParams struct { |
| tabletMode bool |
| } |
| |
| func init() { |
| testing.AddTest(&testing.Test{ |
| Func: S0ixStabilityCheck, |
| LacrosStatus: testing.LacrosVariantUnneeded, |
| Desc: "Verifies S0ix stability with suspend-resume", |
| BugComponent: "b:157291", // ChromeOS > External > Intel |
| Contacts: []string{"intel.chrome.automation.team@intel.com", "pathan.jilani@intel.com"}, |
| SoftwareDeps: []string{"chrome"}, |
| ServiceDeps: []string{"tast.cros.security.BootLockboxService"}, |
| HardwareDeps: hwdep.D(hwdep.ChromeEC(), hwdep.FormFactor(hwdep.Convertible, hwdep.Detachable)), |
| Vars: []string{"servo"}, |
| Params: []testing.Param{{ |
| Name: "clamshell_mode", |
| Val: s0ixCheckTestParams{ |
| tabletMode: false, |
| }, |
| ExtraAttr: []string{"group:intel-sleep"}, |
| }, { |
| Name: "tablet_mode", |
| Val: s0ixCheckTestParams{ |
| tabletMode: true, |
| }, |
| ExtraAttr: []string{"group:intel-convertible"}, |
| }}, |
| }) |
| } |
| |
| func S0ixStabilityCheck(ctx context.Context, s *testing.State) { |
| ctxForCleanUp := ctx |
| ctx, cancel := ctxutil.Shorten(ctx, 15*time.Second) |
| defer cancel() |
| |
| dut := s.DUT() |
| servoSpec, _ := s.Var("servo") |
| pxy, err := servo.NewProxy(ctx, servoSpec, dut.KeyFile(), dut.KeyDir()) |
| if err != nil { |
| s.Fatal("Failed to connect to servo: ", err) |
| } |
| defer pxy.Close(ctxForCleanUp) |
| |
| testOpt := s.Param().(s0ixCheckTestParams) |
| |
| reC10Package := regexp.MustCompile(`C10 : ([A-Za-z0-9]+)`) |
| |
| const ( |
| slpS0File = "/sys/kernel/debug/pmc_core/slp_s0_residency_usec" |
| pkgCstateFile = "/sys/kernel/debug/pmc_core/package_cstate_show" |
| powerdConfigCmd = "check_powerd_config --suspend_to_idle; echo $?" |
| ) |
| |
| tmc := &tabletmode.ConvertibleModeControl{} |
| if err := tmc.InitControl(ctx, dut); err != nil { |
| s.Fatal("Failed to init TabletModeControl: ", err) |
| } |
| |
| if testOpt.tabletMode { |
| // Force DUT into tablet mode. |
| testing.ContextLog(ctx, "Put DUT into tablet mode") |
| if err := tmc.ForceTabletMode(ctx); err != nil { |
| s.Fatal("Failed to set DUT into tablet mode: ", err) |
| } |
| } |
| |
| cl, err := rpc.Dial(ctx, s.DUT(), s.RPCHint()) |
| if err != nil { |
| s.Fatal("Failed to connect to the RPC service on the DUT: ", err) |
| } |
| defer cl.Close(ctxForCleanUp) |
| client := security.NewBootLockboxServiceClient(cl.Conn) |
| if _, err := client.NewChromeLogin(ctx, &empty.Empty{}); err != nil { |
| s.Fatal("Failed to start Chrome: ", err) |
| } |
| defer client.CloseChrome(ctxForCleanUp, &empty.Empty{}) |
| |
| defer func(ctx context.Context) { |
| testing.ContextLog(ctx, "Performing cleanup") |
| if !dut.Connected(ctx) { |
| waitCtx, cancel := context.WithTimeout(ctx, 2*time.Minute) |
| defer cancel() |
| if err := pxy.Servo().KeypressWithDuration(ctx, servo.PowerKey, servo.DurPress); err != nil { |
| s.Fatal("Failed to power normal press: ", err) |
| } |
| if err := dut.WaitConnect(waitCtx); err != nil { |
| if err := pxy.Servo().KeypressWithDuration(ctx, servo.PowerKey, servo.DurPress); err != nil { |
| s.Fatal("Failed to power normal press: ", err) |
| } |
| if err := dut.WaitConnect(waitCtx); err != nil { |
| s.Fatal("Failed to wait connect DUT: ", err) |
| } |
| } |
| } |
| testing.ContextLog(ctx, "Resetting tabletmode") |
| if err := tmc.Reset(ctx); err != nil { |
| s.Fatal("Failed to restore tabletmode to the original settings: ", err) |
| } |
| |
| if err := dut.Conn().CommandContext(ctx, "sh", "-c", "umount /var/lib/power_manager && restart powerd").Run(ssh.DumpLogOnError); err != nil { |
| s.Log("Failed to restore powerd settings: ", err) |
| } |
| |
| }(ctxForCleanUp) |
| |
| s.Log("Overriding system suspend_to_idle setting. THIS WILL BREAK SUSPEND ON HALF OF DEVICES. FIX THIS TEST") |
| if err := dut.Conn().CommandContext(ctx, "sh", "-c", fmt.Sprintf( |
| "mkdir -p /tmp/power_manager && "+ |
| "echo 1 > /tmp/power_manager/suspend_to_idle && "+ |
| "mount --bind /tmp/power_manager /var/lib/power_manager && "+ |
| "restart powerd"), |
| ).Run(ssh.DumpLogOnError); err != nil { |
| s.Fatal("Failed to set suspend to idle: ", err) |
| } |
| |
| configValue, err := dut.Conn().CommandContext(ctx, "bash", "-c", powerdConfigCmd).Output(ssh.DumpLogOnError) |
| if err != nil { |
| s.Fatalf("Failed to execute %s command: %v", powerdConfigCmd, err) |
| } |
| actualValue := strings.TrimSpace(string(configValue)) |
| const expectedValue = "0" |
| if actualValue != expectedValue { |
| s.Fatalf("Failed to be in S0ix state; expected PowerdConfig value %s; got %s", expectedValue, actualValue) |
| } |
| |
| slpOpSetPre, err := commandOutputString(ctx, dut, slpS0File) |
| if err != nil { |
| s.Fatal("Failed to get initial slp s0 value: ", err) |
| } |
| |
| pkgOpSetOutput, err := commandOutputString(ctx, dut, pkgCstateFile) |
| if err != nil { |
| s.Fatal("Failed to get initial PkgCstate value: ", err) |
| } |
| |
| matchSetPre := reC10Package.FindStringSubmatch(pkgOpSetOutput) |
| if matchSetPre == nil { |
| s.Fatal("Failed to match pre PkgCstate value: ", pkgOpSetOutput) |
| } |
| |
| pkgOpSetPre, err := strconv.ParseInt(matchSetPre[1], 0, 64) |
| if err != nil { |
| s.Fatal("Failed to convert string to integer: ", err) |
| } |
| |
| const ( |
| prematureWakePattern = "Premature wakes: 0" |
| suspendFailurePattern = "Suspend failures: 0" |
| firmwareLogErrorPattern = "Firmware log errors: 0" |
| s0ixErrorPattern = "s0ix errors: 0" |
| ) |
| |
| suspendErrors := []string{prematureWakePattern, suspendFailurePattern, firmwareLogErrorPattern, s0ixErrorPattern} |
| |
| // Checks poll until no premature wake and/or suspend failures occurs with given poll timeout. |
| if testing.Poll(ctx, func(ctx context.Context) error { |
| stressOut, err := dut.Conn().CommandContext(ctx, "suspend_stress_test", "-c", "1").Output(ssh.DumpLogOnError) |
| if err != nil { |
| return errors.Wrap(err, "failed to execute suspend_stress_test command") |
| } |
| for _, errMsg := range suspendErrors { |
| if !strings.Contains(string(stressOut), errMsg) { |
| return errors.Errorf("failed was expecting %q, but got failures %s", errMsg, string(stressOut)) |
| } |
| } |
| return nil |
| }, &testing.PollOptions{ |
| Timeout: 15 * time.Second, |
| }); err != nil { |
| s.Fatal("Failed to perform suspend_stress_test: ", err) |
| } |
| |
| testing.ContextLog(ctx, "Executing suspend_stress_test command") |
| stressOut, err := dut.Conn().CommandContext(ctx, "suspend_stress_test", "-c", "10").Output(ssh.DumpLogOnError) |
| if err != nil { |
| s.Fatal("Failed to execute suspend_stress_test command: ", err) |
| } |
| |
| for _, errMsg := range suspendErrors { |
| if !strings.Contains(string(stressOut), errMsg) { |
| s.Fatalf("Failed was expecting %q, but got failures %s", errMsg, string(stressOut)) |
| } |
| } |
| |
| slpOpSetPost, err := commandOutputString(ctx, dut, slpS0File) |
| if err != nil { |
| s.Fatal("Failed to get slp s0 value after DUT suspend-resume: ", err) |
| } |
| |
| if slpOpSetPre == slpOpSetPost { |
| s.Fatalf("Failed SLP counter value must be different than the value %q noted most recently %q", slpOpSetPre, slpOpSetPost) |
| } |
| |
| if slpOpSetPost == "0" { |
| s.Fatalf("Unexpected SLP value, got: %q, want: non-zero", slpOpSetPost) |
| } |
| |
| pkgOpSetPostOutput, err := commandOutputString(ctx, dut, pkgCstateFile) |
| if err != nil { |
| s.Fatal("Failed to get PkgCstate value after DUT suspend-resume: ", err) |
| } |
| |
| matchSetPost := reC10Package.FindStringSubmatch(pkgOpSetPostOutput) |
| if matchSetPost == nil { |
| s.Fatal("Failed to match post PkgCstate value: ", pkgOpSetPostOutput) |
| } |
| |
| pkgOpSetPost, err := strconv.ParseInt(matchSetPost[1], 0, 64) |
| if err != nil { |
| s.Fatal("Failed to convert string to integer: ", err) |
| } |
| if pkgOpSetPre == pkgOpSetPost { |
| s.Fatalf("Failed Package C10 value %q must be different than value noted earlier %q", pkgOpSetPre, pkgOpSetPost) |
| } |
| |
| if pkgOpSetPost == 0 { |
| s.Fatal("Failed Package C10 should be non-zero") |
| } |
| } |
| |
| // commandOutputString if success returns output string of cmdFile, else returns error. |
| func commandOutputString(ctx context.Context, dut *dut.DUT, cmdFile string) (string, error) { |
| out, err := dut.Conn().CommandContext(ctx, "cat", cmdFile).Output(ssh.DumpLogOnError) |
| if err != nil { |
| return "", errors.Wrapf(err, "failed to execute 'cat %s' command", cmdFile) |
| } |
| return string(out), nil |
| } |