blob: 8adf6e266ec56df9b41858b84bddfe96abc72f0d [file] [log] [blame]
Sathyajith M S7ead7dd2019-09-12 04:39:08 -05001*** Settings ***
2Documentation Test Non-maskable interrupt functionality.
3
Sathyajith M S3075ff32019-11-12 04:01:09 -06004Resource ../lib/bmc_redfish_resource.robot
5Resource ../lib/boot_utils.robot
6Resource ../lib/openbmc_ffdc.robot
7Resource ../lib/secureboot/secureboot.robot
8Resource ../lib/state_manager.robot
9Library ../lib/bmc_ssh_utils.py
10Library ../syslib/utils_os.py
Sathyajith M S7ead7dd2019-09-12 04:39:08 -050011
12Test Teardown FFDC On Test Case Fail
13Suite Teardown Redfish.Logout
14
Sathyajith M Sbeee32c2019-09-30 05:22:21 -050015
Sathyajith M S7ead7dd2019-09-12 04:39:08 -050016*** Test Cases ***
17
18Trigger NMI When OPAL/Host OS Is Not Up
Sathyajith M Sbeee32c2019-09-30 05:22:21 -050019 [Documentation] Verify return error code from Redfish
20 ... while injecting NMI when HOST OS is not up.
Sathyajith M S7ead7dd2019-09-12 04:39:08 -050021 [Tags] Trigger_NMI_When_OPAL/Host_OS_Is_Not_Up
22
Sathyajith M Sbeee32c2019-09-30 05:22:21 -050023 Redfish Power Off
24 Trigger NMI
25
26
27Trigger NMI When OPAL/Host OS Is Running And Secureboot Is Disabled
28 [Documentation] Verify valid return status code from Redfish
29 ... while injecting NMI, when HOST OS is running and
30 ... secureboot is disabled.
31 [Tags] Trigger_NMI_When_OPAL/Host_OS_Is_Running_And_Secureboot_Is_Disabled
32 [Setup] Test Setup Execution ${0}
33
34 Trigger NMI valid_status_codes=[${HTTP_OK}]
Sathyajith M S4898c502019-11-20 01:51:03 -060035 Verify Crash Dump Directory After NMI Inject
36
37
38*** Keywords ***
39
40Verify Crash Dump Directory After NMI Inject
41 [Documentation] Verification of crash dump directory after NMI inject.
42
Sathyajith M Sbeee32c2019-09-30 05:22:21 -050043 Wait Until Keyword Succeeds 10 min 1 min Is Host Rebooted
44 Is OS Booted
45 Wait Until Keyword Succeeds 1 min 10 sec Verify Crash Dump Directory
46
47
Sathyajith M Sbeee32c2019-09-30 05:22:21 -050048Test Setup Execution
49 [Documentation] Test setup execution.
50 [Arguments] ${secure_boot_mode}=${1}
51
52 # Description of argument(s):
53 # secure_boot_mode Secure boot -> Enable-1 or Disable-0.
54
Sathyajith M S7ead7dd2019-09-12 04:39:08 -050055 Redfish Power Off stack_mode=skip
Sathyajith M Sbeee32c2019-09-30 05:22:21 -050056 Set Auto Reboot ${1}
57 # Set and verify secure boot policy as disabled.
58 Set And Verify TPM Policy ${secure_boot_mode}
59 Redfish Power On
60 # Delete any pre-existing dump files.
61 OS Execute Command rm -rf /var/crash/*
George Keishing405d5372023-08-10 20:56:05 +053062 ${os_release_info}= utils.Get OS Release Info
Sathyajith M Sbeee32c2019-09-30 05:22:21 -050063 # Start crash dump utility on OS.
64 ${cmd}= Set Variable If
65 ... '${os_release_info['id']}' == 'ubuntu' kdump-config show kdumpctl start
66 OS Execute Command ${cmd} print_out=1
67
68
69Trigger NMI
70 [Documentation] Inject non-maskable interrupt Redfish URI.
71 [Arguments] ${valid_status_codes}=[${HTTP_INTERNAL_SERVER_ERROR}]
72
73 # Description of argument(s):
74 # valid_status_codes A list of status codes that the
75 # caller considers acceptable.
76 # See lib/redfish_plus.py for details.
77
Sathyajith M S7ead7dd2019-09-12 04:39:08 -050078 Redfish.Login
79 Redfish.Post ${SYSTEM_BASE_URI}Actions/ComputerSystem.Reset
Sathyajith M Sbeee32c2019-09-30 05:22:21 -050080 ... body={"ResetType": "Nmi"} valid_status_codes=${valid_status_codes}
81
Sathyajith M S4898c502019-11-20 01:51:03 -060082
Sathyajith M Sbeee32c2019-09-30 05:22:21 -050083Verify Crash Dump Directory
84 [Documentation] Verify that the crash dump directory is not empty.
85
86 # As per the requirement, there should be a crash dump file
87 # after successful NMI injection.
Sathyajith M S4898c502019-11-20 01:51:03 -060088
Sathyajith M Sbeee32c2019-09-30 05:22:21 -050089 ${output} ${stderr} ${rc}=
90 ... OS Execute Command ls -ltr /var/crash/* print_out=1