blob: 71d2aff6c7e469b86283e2515724d7d80287457a [file] [log] [blame]
You-Cheng Syuf0f4be12017-12-05 16:33:53 +08001#!/usr/bin/env python
Jon Salze60307f2014-08-05 16:20:00 +08002# -*- coding: utf-8 -*-
3# Copyright 2014 The Chromium OS Authors. All rights reserved.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08004# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
Jon Salze60307f2014-08-05 16:20:00 +08007
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08008"""Google Factory Tool.
9
You-Cheng Syu461ec032017-03-06 15:56:58 +080010This tool is intended to be used on factory assembly lines. It
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080011provides all of the Google required test functionality and must be run
12on each device as part of the assembly process.
13"""
14
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080015import logging
16import os
Jon Salz65266432012-07-30 19:02:49 +080017import pipes
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080018import re
19import sys
Peter Shihfdf17682017-05-26 11:38:39 +080020from tempfile import gettempdir
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080021import threading
Hung-Te Lin6bd16472012-06-20 16:26:47 +080022import time
Jon Salza88b83b2013-05-27 20:00:35 +080023import xmlrpclib
Peter Shihfdf17682017-05-26 11:38:39 +080024
Ricky Liang7905f272013-03-16 01:57:10 +080025import yaml
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080026
Peter Shihfdf17682017-05-26 11:38:39 +080027import factory_common # pylint: disable=unused-import
Wei-Han Chen0a3320e2016-04-23 01:32:07 +080028from cros.factory.gooftool.common import ExecFactoryPar
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080029from cros.factory.gooftool.common import Shell
Peter Shihfdf17682017-05-26 11:38:39 +080030from cros.factory.gooftool.core import Gooftool
31from cros.factory.gooftool import crosfw
Peter Shihfdf17682017-05-26 11:38:39 +080032from cros.factory.gooftool import report_upload
Hung-Te Lin604e0c22015-11-24 15:17:07 +080033from cros.factory.hwid.v3 import common
34from cros.factory.hwid.v3 import hwid_utils
Yong Hong863d3262017-10-30 16:23:34 +080035from cros.factory.probe.functions import chromeos_firmware
Wei-Han Chen2ebb92d2016-01-12 14:51:41 +080036from cros.factory.test.env import paths
Peter Shihfdf17682017-05-26 11:38:39 +080037from cros.factory.test import event_log
Wei-Han Chenaff56232016-04-16 09:17:59 +080038from cros.factory.test.rules import phase
Hung-Te Lin3f096842016-01-13 17:37:06 +080039from cros.factory.test.rules.privacy import FilterDict
Peter Shihfdf17682017-05-26 11:38:39 +080040from cros.factory.utils import argparse_utils
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080041from cros.factory.utils.argparse_utils import CmdArg
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080042from cros.factory.utils.argparse_utils import ParseCmdline
43from cros.factory.utils.argparse_utils import verbosity_cmd_arg
Peter Shihfdf17682017-05-26 11:38:39 +080044from cros.factory.utils.debug_utils import SetupLogging
Jon Salz40b9f822014-07-25 16:39:55 +080045from cros.factory.utils import file_utils
Wei-Han Chena5c01a02016-04-23 19:27:19 +080046from cros.factory.utils import sys_utils
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +080047from cros.factory.utils import time_utils
Jon Salzff88c022012-11-03 12:19:58 +080048from cros.factory.utils.process_utils import Spawn
Joel Kitchingd3bc2662014-12-16 16:03:32 -080049from cros.factory.utils.type_utils import Error
Tammo Spalink86a61c62012-05-25 15:10:35 +080050
Tammo Spalink5c699832012-07-03 17:50:39 +080051
Tammo Spalink5c699832012-07-03 17:50:39 +080052# TODO(tammo): Replace calls to sys.exit with raise Exit, and maybe
53# treat that specially (as a smoot exit, as opposed to the more
54# verbose output for generic Error).
55
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080056_global_gooftool = None
57_gooftool_lock = threading.Lock()
Tammo Spalink5c699832012-07-03 17:50:39 +080058
Hung-Te Lin56b18402015-01-16 14:52:30 +080059
Ricky Lianga70a1202013-03-15 15:03:17 +080060def GetGooftool(options):
Peter Shihfdf17682017-05-26 11:38:39 +080061 global _global_gooftool # pylint: disable=global-statement
Ricky Lianga70a1202013-03-15 15:03:17 +080062
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080063 if _global_gooftool is None:
64 with _gooftool_lock:
Shen-En Shihc5d15d62017-08-04 13:02:59 +080065 if _global_gooftool is None:
66 project = getattr(options, 'project', None)
67 hwdb_path = getattr(options, 'hwdb_path', None)
68 _global_gooftool = Gooftool(hwid_version=3, project=project,
69 hwdb_path=hwdb_path)
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080070
71 return _global_gooftool
Ricky Lianga70a1202013-03-15 15:03:17 +080072
Hung-Te Lin56b18402015-01-16 14:52:30 +080073
Ting Shen18a06382016-08-30 16:18:21 +080074def Command(cmd_name, *args, **kwargs):
You-Cheng Syu8fc2a602017-12-22 17:05:05 +080075 """Decorator for commands in gooftool.
Ting Shen18a06382016-08-30 16:18:21 +080076
77 This is similar to argparse_utils.Command, but all gooftool commands
78 can be waived during `gooftool finalize` or `gooftool verify` using
Wei-Han Chen60c5d332017-01-05 17:15:10 +080079 --waive_list or --skip_list option.
Ting Shen18a06382016-08-30 16:18:21 +080080 """
81 def Decorate(fun):
Wei-Han Chen60c5d332017-01-05 17:15:10 +080082 def CommandWithWaiveSkipCheck(options):
Ting Shen18a06382016-08-30 16:18:21 +080083 waive_list = vars(options).get('waive_list', [])
Wei-Han Chen60c5d332017-01-05 17:15:10 +080084 skip_list = vars(options).get('skip_list', [])
85 if phase.GetPhase() >= phase.PVT_DOGFOOD and (
86 waive_list != [] or skip_list != []):
Ting Shen18a06382016-08-30 16:18:21 +080087 raise Error(
Wei-Han Chen60c5d332017-01-05 17:15:10 +080088 'waive_list and skip_list should be empty for phase %s' %
89 phase.GetPhase())
Ting Shen18a06382016-08-30 16:18:21 +080090
Wei-Han Chen60c5d332017-01-05 17:15:10 +080091 if cmd_name not in skip_list:
92 try:
93 fun(options)
94 except Exception as e:
95 if cmd_name in waive_list:
96 logging.exception(e)
97 else:
98 raise
Ting Shen18a06382016-08-30 16:18:21 +080099
100 return argparse_utils.Command(cmd_name, *args, **kwargs)(
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800101 CommandWithWaiveSkipCheck)
Ting Shen18a06382016-08-30 16:18:21 +0800102 return Decorate
103
104
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800105@Command('write_hwid',
106 CmdArg('hwid', metavar='HWID', help='HWID string'))
Andy Chengc92e6f92012-11-20 16:55:53 +0800107def WriteHWID(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800108 """Write specified HWID value into the system BB."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800109
Tammo Spalink95c43732012-07-25 15:57:14 -0700110 logging.info('writing hwid string %r', options.hwid)
Ricky Lianga70a1202013-03-15 15:03:17 +0800111 GetGooftool(options).WriteHWID(options.hwid)
Andy Cheng0465d132013-03-20 12:12:06 +0800112 event_log.Log('write_hwid', hwid=options.hwid)
Tammo Spalink95c43732012-07-25 15:57:14 -0700113 print 'Wrote HWID: %r' % options.hwid
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800114
115
Yong Hong5408f652017-07-11 19:20:25 +0800116_project_cmd_arg = CmdArg(
117 '--project', metavar='PROJECT',
118 default=None, help='Project name to test.')
Ricky Liang53390232013-03-08 15:37:57 +0800119
Tammo Spalink8fab5312012-05-28 18:33:30 +0800120_hwdb_path_cmd_arg = CmdArg(
121 '--hwdb_path', metavar='PATH',
Ricky Liangeede7922013-06-19 10:18:41 +0800122 default=common.DEFAULT_HWID_DATA_PATH,
Tammo Spalink8fab5312012-05-28 18:33:30 +0800123 help='Path to the HWID database.')
124
Tammo Spalink95c43732012-07-25 15:57:14 -0700125_hwid_status_list_cmd_arg = CmdArg(
Hung-Te Lin56b18402015-01-16 14:52:30 +0800126 '--status', nargs='*', default=['supported'],
127 help='allow only HWIDs with these status values')
Tammo Spalink95c43732012-07-25 15:57:14 -0700128
Jon Salzce124fb2012-10-02 17:42:03 +0800129_probe_results_cmd_arg = CmdArg(
130 '--probe_results', metavar='RESULTS.yaml',
Yong Hong863d3262017-10-30 16:23:34 +0800131 help=('Output from "gooftool probe" (used instead of '
Jon Salzce124fb2012-10-02 17:42:03 +0800132 'probing this system).'))
133
Ricky Liang53390232013-03-08 15:37:57 +0800134_device_info_cmd_arg = CmdArg(
Ricky Liangf89f73a2013-03-19 05:00:24 +0800135 '--device_info', metavar='DEVICE_INFO.yaml', default=None,
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800136 help='A dict of device info to use instead of fetching from shopfloor '
Ricky Liang53390232013-03-08 15:37:57 +0800137 'server.')
138
Jon Salzce124fb2012-10-02 17:42:03 +0800139_hwid_cmd_arg = CmdArg(
140 '--hwid', metavar='HWID',
Ricky Lianga70a1202013-03-15 15:03:17 +0800141 help='HWID to verify (instead of the currently set HWID of this system).')
Jon Salzce124fb2012-10-02 17:42:03 +0800142
Yong Hong68a0e0d2017-12-20 19:06:54 +0800143_hwid_run_vpd_cmd_arg = CmdArg(
144 '--hwid-run-vpd', action='store_true',
145 help=('Specify the hwid utility to obtain the vpd data by running the '
146 '`vpd` commandline tool.'))
147
148_hwid_vpd_data_file_cmd_arg = CmdArg(
149 '--hwid-vpd-data-file', metavar='FILE.json', type=str, default=None,
150 help=('Specify the hwid utility to obtain the vpd data from the specified '
151 'file.'))
152
Bernie Thompson3c11c872013-07-22 18:22:45 -0700153_rma_mode_cmd_arg = CmdArg(
154 '--rma_mode', action='store_true',
155 help='Enable RMA mode, do not check for deprecated components.')
Tammo Spalink95c43732012-07-25 15:57:14 -0700156
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800157_cros_core_cmd_arg = CmdArg(
158 '--cros_core', action='store_true',
159 help='Finalize for ChromeOS Core devices (may add or remove few test '
Hung-Te Lin53c49402017-07-26 13:10:58 +0800160 'items. For example, registration codes or firmware bitmap '
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800161 'locale settings).')
162
Yilun Lin599833f2017-12-22 14:07:46 +0800163_chromebox_cmd_arg = CmdArg(
164 '--chromebox', action='store_true', default=None,
165 help='Finalize for ChromeBox devices (may add or remove few test '
166 'items. For example, VerifyECKey).')
167
bowgotsai13820f42015-09-10 23:18:04 +0800168_enforced_release_channels_cmd_arg = CmdArg(
169 '--enforced_release_channels', nargs='*', default=None,
170 help='Enforced release image channels.')
171
Yilun Lin34f54802017-11-16 11:58:25 +0800172_ec_pubkey_path_cmd_arg = CmdArg(
173 '--ec_pubkey_path',
174 default=None,
175 help='Path to public key in vb2 format. Verify EC key with pubkey file.')
176
177_ec_pubkey_hash_cmd_arg = CmdArg(
178 '--ec_pubkey_hash',
179 default=None,
180 help='A string for public key hash. Verify EC key with the given hash.')
181
Hung-Te Lincdb96522016-04-15 16:51:10 +0800182_release_rootfs_cmd_arg = CmdArg(
183 '--release_rootfs', help='Location of release image rootfs partition.')
184
185_firmware_path_cmd_arg = CmdArg(
186 '--firmware_path', help='Location of firmware image partition.')
Ricky Liang43b879b2014-02-24 11:36:55 +0800187
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800188_shopfloor_url_args_cmd_arg = CmdArg(
189 '--shopfloor_url',
Earl Ou51182222016-09-09 12:16:48 +0800190 help='Shopfloor server url to be informed when wiping is done. '
191 'After wiping, a XML-RPC request will be sent to the '
192 'given url to indicate the completion of wiping.')
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800193
194_station_ip_cmd_arg = CmdArg(
195 '--station_ip',
196 help='IP of remote station')
197
198_station_port_cmd_arg = CmdArg(
199 '--station_port',
200 help='Port on remote station')
201
202_wipe_finish_token_cmd_arg = CmdArg(
203 '--wipe_finish_token',
204 help='Required token when notifying station after wipe finished')
205
Ting Shen18a06382016-08-30 16:18:21 +0800206_waive_list_cmd_arg = CmdArg(
207 '--waive_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800208 help='A list of waived checks, separated by whitespace. '
209 'Each item should be a sub-command of gooftool. '
Ting Shen18a06382016-08-30 16:18:21 +0800210 'e.g. "gooftool verify --waive_list verify_tpm clear_gbb_flags".')
211
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800212_skip_list_cmd_arg = CmdArg(
213 '--skip_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800214 help='A list of skipped checks, separated by whitespace. '
215 'Each item should be a sub-command of gooftool. '
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800216 'e.g. "gooftool verify --skip_list verify_tpm clear_gbb_flags".')
217
Tammo Spalink8fab5312012-05-28 18:33:30 +0800218
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800219@Command('probe',
220 CmdArg('--comps', nargs='*',
221 help='List of keys from the component_db registry.'),
222 CmdArg('--no_vol', action='store_true',
Yong Hong863d3262017-10-30 16:23:34 +0800223 help='Do not probe volatile data.'))
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800224def RunProbe(options):
225 """Print yaml-formatted breakdown of probed device properties."""
Yong Hong863d3262017-10-30 16:23:34 +0800226 probed_result = GetGooftool(options).Probe(options.comps, not options.no_vol)
227 print yaml.dump(probed_result)
Ricky Liang53390232013-03-08 15:37:57 +0800228
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800229
Yong Hong863d3262017-10-30 16:23:34 +0800230@Command('verify_components')
Tammo Spalink214caf42012-05-28 10:45:00 +0800231def VerifyComponents(options):
Yong Hong863d3262017-10-30 16:23:34 +0800232 del options
233 msg = ('This command has already been deprecated, please use '
234 '`hwid verify-components` instead.')
235 print msg
236 sys.exit(1)
Tammo Spalink214caf42012-05-28 10:45:00 +0800237
238
Yilun Lin34f54802017-11-16 11:58:25 +0800239@Command(
240 'verify_ec_key',
241 _ec_pubkey_path_cmd_arg,
242 _ec_pubkey_hash_cmd_arg)
243def VerifyECKey(options):
244 """Verify EC key."""
245 return GetGooftool(options).VerifyECKey(
246 options.ec_pubkey_path, options.ec_pubkey_hash)
247
248
Hung-Te Line1d80f62016-03-31 14:58:13 +0800249@Command('verify_keys',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800250 _release_rootfs_cmd_arg,
251 _firmware_path_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800252def VerifyKeys(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800253 """Verify keys in firmware and SSD match."""
Hung-Te Line1d80f62016-03-31 14:58:13 +0800254 return GetGooftool(options).VerifyKeys(
Hung-Te Lincdb96522016-04-15 16:51:10 +0800255 options.release_rootfs, options.firmware_path)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800256
257
258@Command('set_fw_bitmap_locale')
Peter Shihfdf17682017-05-26 11:38:39 +0800259def SetFirmwareBitmapLocale(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800260 """Use VPD locale value to set firmware bitmap default language."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800261
Ricky Lianga70a1202013-03-15 15:03:17 +0800262 (index, locale) = GetGooftool(options).SetFirmwareBitmapLocale()
Andy Cheng2582d292012-12-04 17:38:28 +0800263 logging.info('Firmware bitmap initial locale set to %d (%s).',
264 index, locale)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800265
266
Hung-Te Line1d80f62016-03-31 14:58:13 +0800267@Command('verify_system_time',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800268 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800269def VerifySystemTime(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800270 """Verify system time is later than release filesystem creation time."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800271
Hung-Te Lincdb96522016-04-15 16:51:10 +0800272 return GetGooftool(options).VerifySystemTime(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800273
274
Hung-Te Line1d80f62016-03-31 14:58:13 +0800275@Command('verify_rootfs',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800276 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800277def VerifyRootFs(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800278 """Verify rootfs on SSD is valid by checking hash."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800279
Hung-Te Line1d80f62016-03-31 14:58:13 +0800280 return GetGooftool(options).VerifyRootFs(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800281
Hung-Te Lin56b18402015-01-16 14:52:30 +0800282
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800283@Command('verify_tpm')
Peter Shihfdf17682017-05-26 11:38:39 +0800284def VerifyTPM(options):
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800285 """Verify TPM is cleared."""
286
287 return GetGooftool(options).VerifyTPM()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800288
Hung-Te Lin56b18402015-01-16 14:52:30 +0800289
Hung-Te Lindd708d42014-07-11 17:05:01 +0800290@Command('verify_me_locked')
Peter Shihfdf17682017-05-26 11:38:39 +0800291def VerifyManagementEngineLocked(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800292 """Verify Management Engine is locked."""
Hung-Te Lindd708d42014-07-11 17:05:01 +0800293
294 return GetGooftool(options).VerifyManagementEngineLocked()
295
Hung-Te Lin56b18402015-01-16 14:52:30 +0800296
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800297@Command('verify_switch_wp')
Peter Shihfdf17682017-05-26 11:38:39 +0800298def VerifyWPSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800299 """Verify hardware write protection switch is enabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800300
Ricky Lianga70a1202013-03-15 15:03:17 +0800301 GetGooftool(options).VerifyWPSwitch()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800302
303
304@Command('verify_switch_dev')
Peter Shihfdf17682017-05-26 11:38:39 +0800305def VerifyDevSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800306 """Verify developer switch is disabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800307
Ricky Lianga70a1202013-03-15 15:03:17 +0800308 if GetGooftool(options).CheckDevSwitchForDisabling():
Hung-Te Lind7d34722012-07-26 16:48:35 +0800309 logging.warn('VerifyDevSwitch: No physical switch.')
Andy Cheng0465d132013-03-20 12:12:06 +0800310 event_log.Log('switch_dev', type='virtual switch')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800311
312
Hung-Te Lin53c49402017-07-26 13:10:58 +0800313@Command('verify_vpd')
314def VerifyVPD(options):
315 """Verify that VPD values are properly set.
Jon Salzadd90d32014-04-29 16:16:27 +0800316
Hung-Te Lin53c49402017-07-26 13:10:58 +0800317 Check if mandatory fields are set, and deprecated fields don't exist.
Jon Salzadd90d32014-04-29 16:16:27 +0800318 """
Hung-Te Lin53c49402017-07-26 13:10:58 +0800319 return GetGooftool(options).VerifyVPD()
Jon Salzadd90d32014-04-29 16:16:27 +0800320
321
bowgotsai13820f42015-09-10 23:18:04 +0800322@Command('verify_release_channel',
323 _enforced_release_channels_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800324def VerifyReleaseChannel(options):
bowgotsai529139c2015-05-30 01:39:49 +0800325 """Verify that release image channel is correct.
326
327 ChromeOS has four channels: canary, dev, beta and stable.
328 The last three channels support image auto-updates, checks
329 that release image channel is one of them.
330 """
bowgotsai13820f42015-09-10 23:18:04 +0800331 return GetGooftool(options).VerifyReleaseChannel(
332 options.enforced_release_channels)
bowgotsai529139c2015-05-30 01:39:49 +0800333
334
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800335@Command('write_protect')
Peter Shihfdf17682017-05-26 11:38:39 +0800336def EnableFwWp(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800337 """Enable then verify firmware write protection."""
Peter Shihfdf17682017-05-26 11:38:39 +0800338 del options # Unused.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800339
Yong Hongdad230a2017-08-30 22:25:19 +0800340 def WriteProtect(fw):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800341 """Calculate protection size, then invoke flashrom.
342
Yong Hongdad230a2017-08-30 22:25:19 +0800343 The region (offset and size) to write protect may be different per chipset
344 and firmware layout, so we have to read the WP_RO section from FMAP to
345 decide that.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800346 """
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800347 wp_section = 'WP_RO'
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800348
Yong Hongdad230a2017-08-30 22:25:19 +0800349 fmap_image = fw.GetFirmwareImage(
350 sections=(['FMAP'] if fw.target == crosfw.TARGET_MAIN else None))
351 if not fmap_image.has_section(wp_section):
352 raise Error('Could not find %s firmware section: %s' %
353 (fw.target.upper(), wp_section))
354
355 section_data = fw.GetFirmwareImage(
356 sections=[wp_section]).get_section_area(wp_section)
357 ro_offset, ro_size = section_data[0 : 2]
358
359 logging.debug('write protecting %s [off=%x size=%x]', fw.target.upper(),
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800360 ro_offset, ro_size)
Yong Hongdad230a2017-08-30 22:25:19 +0800361 crosfw.Flashrom(fw.target).EnableWriteProtection(ro_offset, ro_size)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800362
Yong Hongdad230a2017-08-30 22:25:19 +0800363 WriteProtect(crosfw.LoadMainFirmware())
Andy Cheng0465d132013-03-20 12:12:06 +0800364 event_log.Log('wp', fw='main')
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800365
366 # Some EC (mostly PD) does not support "RO NOW". Instead they will only set
367 # "RO_AT_BOOT" when you request to enable RO (These platforms consider
368 # --wp-range with right range identical to --wp-enable), and requires a
369 # 'ectool reboot_ec RO at-shutdown; reboot' to let the RO take effect.
Hung-Te Lin0d10b562016-12-28 10:58:07 +0800370 # After reboot, "flashrom -p host --wp-status" will return protected range.
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800371 # If you don't reboot, returned range will be (0, 0), and running command
372 # "ectool flashprotect" will not have RO_NOW.
373
Yong Hongdad230a2017-08-30 22:25:19 +0800374 for fw in [crosfw.LoadEcFirmware(), crosfw.LoadPDFirmware()]:
375 if fw.GetChipId() is None:
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800376 logging.warning('%s not write protected (seems there is no %s flash).',
Yong Hongdad230a2017-08-30 22:25:19 +0800377 fw.target.upper(), fw.target.upper())
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800378 continue
Yong Hongdad230a2017-08-30 22:25:19 +0800379 WriteProtect(fw)
380 event_log.Log('wp', fw=fw.target)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800381
382
383@Command('clear_gbb_flags')
Peter Shihfdf17682017-05-26 11:38:39 +0800384def ClearGBBFlags(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800385 """Zero out the GBB flags, in preparation for transition to release state.
386
387 No GBB flags are set in release/shipping state, but they are useful
Hung-Te Lin879cff42017-06-19 12:46:37 +0800388 for factory/development. See "futility gbb --flags" for details.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800389 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800390
Ricky Lianga70a1202013-03-15 15:03:17 +0800391 GetGooftool(options).ClearGBBFlags()
Andy Cheng0465d132013-03-20 12:12:06 +0800392 event_log.Log('clear_gbb_flags')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800393
394
Jon Salzaa3a30e2013-05-15 15:56:28 +0800395@Command('clear_factory_vpd_entries')
Peter Shihfdf17682017-05-26 11:38:39 +0800396def ClearFactoryVPDEntries(options):
Jon Salzaa3a30e2013-05-15 15:56:28 +0800397 """Clears factory.* items in the RW VPD."""
398 entries = GetGooftool(options).ClearFactoryVPDEntries()
399 event_log.Log('clear_factory_vpd_entries', entries=FilterDict(entries))
400
401
Mattias Nisslercca761b2015-04-15 21:53:04 +0200402@Command('generate_stable_device_secret')
Peter Shihfdf17682017-05-26 11:38:39 +0800403def GenerateStableDeviceSecret(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800404 """Generates a fresh stable device secret and stores it in the RO VPD."""
Mattias Nisslercca761b2015-04-15 21:53:04 +0200405 GetGooftool(options).GenerateStableDeviceSecret()
406 event_log.Log('generate_stable_device_secret')
407
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800408
Shen-En Shihd078a7c2017-08-04 13:33:49 +0800409@Command('cr50_set_board_id')
410def Cr50SetBoardId(options):
411 """Set the board id and flag in the Cr50 chip."""
412 GetGooftool(options).Cr50SetBoardId()
413 event_log.Log('cr50_set_board_id')
414
415
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800416@Command('cr50_reset_state')
417def Cr50ResetState(options):
418 """Reset Cr50 state back to default state after RMA."""
419 return GetGooftool(options).Cr50ResetState()
420
421
Earl Ou564a7872016-10-05 10:22:00 +0800422@Command('enable_release_partition',
423 CmdArg('--release_rootfs',
424 help=('path to the release rootfs device. If not specified, '
425 'the default (5th) partition will be used.')))
426def EnableReleasePartition(options):
427 """Enables a release image partition on the disk."""
428 GetGooftool(options).EnableReleasePartition(options.release_rootfs)
429
430
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800431@Command('wipe_in_place',
432 CmdArg('--fast', action='store_true',
Shun-Hsing Ou8d3c40a2015-10-08 18:16:08 +0800433 help='use non-secure but faster wipe method.'),
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800434 _shopfloor_url_args_cmd_arg,
435 _station_ip_cmd_arg,
436 _station_port_cmd_arg,
437 _wipe_finish_token_cmd_arg)
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800438def WipeInPlace(options):
439 """Start factory wipe directly without reboot."""
440
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800441 GetGooftool(options).WipeInPlace(options.fast,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800442 options.shopfloor_url,
443 options.station_ip,
444 options.station_port,
445 options.wipe_finish_token)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200446
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800447@Command('wipe_init',
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800448 CmdArg('--wipe_args', help='arguments for clobber-state'),
449 CmdArg('--state_dev', help='path to stateful partition device'),
450 CmdArg('--root_disk', help='path to primary device'),
451 CmdArg('--old_root', help='path to old root'),
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800452 _shopfloor_url_args_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800453 _release_rootfs_cmd_arg,
454 _station_ip_cmd_arg,
455 _station_port_cmd_arg,
456 _wipe_finish_token_cmd_arg)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800457def WipeInit(options):
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800458 GetGooftool(options).WipeInit(options.wipe_args,
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800459 options.shopfloor_url,
460 options.state_dev,
461 options.release_rootfs,
462 options.root_disk,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800463 options.old_root,
464 options.station_ip,
465 options.station_port,
466 options.wipe_finish_token)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800467
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800468@Command('verify',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800469 CmdArg('--no_write_protect', action='store_true',
470 help='Do not check write protection switch state.'),
Tammo Spalink95c43732012-07-25 15:57:14 -0700471 _hwid_status_list_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800472 _hwdb_path_cmd_arg,
Yong Hong5408f652017-07-11 19:20:25 +0800473 _project_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800474 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800475 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800476 _hwid_run_vpd_cmd_arg,
477 _hwid_vpd_data_file_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800478 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800479 _cros_core_cmd_arg,
Yilun Lin599833f2017-12-22 14:07:46 +0800480 _chromebox_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800481 _ec_pubkey_path_cmd_arg,
482 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800483 _release_rootfs_cmd_arg,
484 _firmware_path_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800485 _enforced_release_channels_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800486 _waive_list_cmd_arg,
487 _skip_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800488def Verify(options):
489 """Verifies if whole factory process is ready for finalization.
490
491 This routine performs all the necessary checks to make sure the
492 device is ready to be finalized, but does not modify state. These
493 checks include dev switch, firmware write protection switch, hwid,
494 system time, keys, and root file system.
495 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800496
Hung-Te Lin6d827542012-07-19 11:50:41 +0800497 if not options.no_write_protect:
Ricky Lianga70a1202013-03-15 15:03:17 +0800498 VerifyWPSwitch(options)
Hung-Te Lindd708d42014-07-11 17:05:01 +0800499 VerifyManagementEngineLocked(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800500 VerifyDevSwitch(options)
Ting Shen129fa6f2016-09-02 12:22:24 +0800501 VerifyHWID(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800502 VerifySystemTime(options)
Yilun Lin599833f2017-12-22 14:07:46 +0800503 if options.chromebox:
504 VerifyECKey(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800505 VerifyKeys(options)
506 VerifyRootFs(options)
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800507 VerifyTPM(options)
Hung-Te Lin53c49402017-07-26 13:10:58 +0800508 VerifyVPD(options)
bowgotsai529139c2015-05-30 01:39:49 +0800509 VerifyReleaseChannel(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800510
Hung-Te Lin56b18402015-01-16 14:52:30 +0800511
Jon Salzfe9036f2014-01-16 14:11:23 +0800512@Command('untar_stateful_files')
Hung-Te Lin388bce22014-06-03 19:56:40 +0800513def UntarStatefulFiles(unused_options):
Jon Salzfe9036f2014-01-16 14:11:23 +0800514 """Untars stateful files from stateful_files.tar.xz on stateful partition.
515
516 If that file does not exist (which should only be R30 and earlier),
517 this is a no-op.
518 """
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800519 # Path to stateful partition on device.
520 device_stateful_path = '/mnt/stateful_partition'
521 tar_file = os.path.join(device_stateful_path, 'stateful_files.tar.xz')
Jon Salzfe9036f2014-01-16 14:11:23 +0800522 if os.path.exists(tar_file):
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800523 Spawn(['tar', 'xf', tar_file], cwd=device_stateful_path,
Jon Salzfe9036f2014-01-16 14:11:23 +0800524 log=True, check_call=True)
525 else:
526 logging.warning('No stateful files at %s', tar_file)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800527
Jon Salz40b9f822014-07-25 16:39:55 +0800528
529@Command('log_source_hashes')
Peter Shihfdf17682017-05-26 11:38:39 +0800530def LogSourceHashes(options):
Jon Salz40b9f822014-07-25 16:39:55 +0800531 """Logs hashes of source files in the factory toolkit."""
Peter Shihfdf17682017-05-26 11:38:39 +0800532 del options # Unused.
Jon Salze60307f2014-08-05 16:20:00 +0800533 # WARNING: The following line is necessary to validate the integrity
534 # of the factory software. Do not remove or modify it.
535 #
536 # 警告:此行会验证工厂软件的完整性,禁止删除或修改。
Wei-Han Chena5c01a02016-04-23 19:27:19 +0800537 factory_par = sys_utils.GetRunningFactoryPythonArchivePath()
538 if factory_par:
539 event_log.Log(
540 'source_hashes',
541 **file_utils.HashPythonArchive(factory_par))
542 else:
543 event_log.Log(
544 'source_hashes',
Peter Shihad166772017-05-31 11:36:17 +0800545 **file_utils.HashSourceTree(os.path.join(paths.FACTORY_DIR, 'py')))
Jon Salz40b9f822014-07-25 16:39:55 +0800546
547
Tammo Spalink86a61c62012-05-25 15:10:35 +0800548@Command('log_system_details')
Peter Shihfdf17682017-05-26 11:38:39 +0800549def LogSystemDetails(options):
Tammo Spalink86a61c62012-05-25 15:10:35 +0800550 """Write miscellaneous system details to the event log."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800551
Ricky Liang43b879b2014-02-24 11:36:55 +0800552 event_log.Log('system_details', **GetGooftool(options).GetSystemDetails())
Tammo Spalink86a61c62012-05-25 15:10:35 +0800553
554
Jon Salza88b83b2013-05-27 20:00:35 +0800555def CreateReportArchiveBlob(*args, **kwargs):
556 """Creates a report archive and returns it as a blob.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800557
Jon Salza88b83b2013-05-27 20:00:35 +0800558 Args:
559 See CreateReportArchive.
Andy Cheng7a76cb82012-11-19 18:08:19 +0800560
Jon Salza88b83b2013-05-27 20:00:35 +0800561 Returns:
562 An xmlrpclib.Binary object containing a .tar.xz file.
563 """
Wei-Han Chen47416612016-09-14 17:41:52 +0800564 report_archive = CreateReportArchive(*args, **kwargs)
565 try:
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800566 return xmlrpclib.Binary(file_utils.ReadFile(report_archive))
Wei-Han Chen47416612016-09-14 17:41:52 +0800567 finally:
568 os.unlink(report_archive)
Jon Salza88b83b2013-05-27 20:00:35 +0800569
570
571def CreateReportArchive(device_sn=None, add_file=None):
572 """Creates a report archive in a temporary directory.
573
574 Args:
575 device_sn: The device serial number (optional).
576 add_file: A list of files to add (optional).
577
578 Returns:
579 Path to the archive.
580 """
Hung-Te Lin6bd16472012-06-20 16:26:47 +0800581 def NormalizeAsFileName(token):
582 return re.sub(r'\W+', '', token).strip()
Jon Salza88b83b2013-05-27 20:00:35 +0800583
584 target_name = '%s%s.tar.xz' % (
585 time.strftime('%Y%m%dT%H%M%SZ',
586 time.gmtime()),
Hung-Te Lin56b18402015-01-16 14:52:30 +0800587 ('' if device_sn is None else
588 '_' + NormalizeAsFileName(device_sn)))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800589 target_path = os.path.join(gettempdir(), target_name)
Jon Salza88b83b2013-05-27 20:00:35 +0800590
Tammo Spalink86a61c62012-05-25 15:10:35 +0800591 # Intentionally ignoring dotfiles in EVENT_LOG_DIR.
Andy Cheng0465d132013-03-20 12:12:06 +0800592 tar_cmd = 'cd %s ; tar cJf %s *' % (event_log.EVENT_LOG_DIR, target_path)
Peter Shihb4e49352017-05-25 17:35:11 +0800593 tar_cmd += ' %s' % paths.FACTORY_LOG_PATH
Jon Salza88b83b2013-05-27 20:00:35 +0800594 if add_file:
595 for f in add_file:
Jon Salz65266432012-07-30 19:02:49 +0800596 # Require absolute paths since the tar command may change the
597 # directory.
598 if not f.startswith('/'):
599 raise Error('Not an absolute path: %s' % f)
600 if not os.path.exists(f):
601 raise Error('File does not exist: %s' % f)
Wei-Han Chen4b755022017-01-04 10:51:52 +0800602 tar_cmd += ' %s' % pipes.quote(f)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800603 cmd_result = Shell(tar_cmd)
Jon Salzff88c022012-11-03 12:19:58 +0800604
605 if ((cmd_result.status == 1) and
606 all((x == '' or
607 'file changed as we read it' in x or
608 "Removing leading `/' from member names" in x)
609 for x in cmd_result.stderr.split('\n'))):
610 # That's OK. Make sure it's valid though.
Vic Yang85199e72013-01-28 14:33:11 +0800611 Spawn(['tar', 'tfJ', target_path], check_call=True, log=True,
Jon Salzff88c022012-11-03 12:19:58 +0800612 ignore_stdout=True)
613 elif not cmd_result.success:
Tammo Spalink86a61c62012-05-25 15:10:35 +0800614 raise Error('unable to tar event logs, cmd %r failed, stderr: %r' %
615 (tar_cmd, cmd_result.stderr))
Jon Salzff88c022012-11-03 12:19:58 +0800616
Jon Salza88b83b2013-05-27 20:00:35 +0800617 return target_path
618
619_upload_method_cmd_arg = CmdArg(
620 '--upload_method', metavar='METHOD:PARAM',
621 help=('How to perform the upload. METHOD should be one of '
622 '{ftp, shopfloor, ftps, cpfe}.'))
623_add_file_cmd_arg = CmdArg(
624 '--add_file', metavar='FILE', action='append',
625 help='Extra file to include in report (must be an absolute path)')
626
Hung-Te Lin56b18402015-01-16 14:52:30 +0800627
Jon Salza88b83b2013-05-27 20:00:35 +0800628@Command('upload_report',
629 _upload_method_cmd_arg,
630 _add_file_cmd_arg)
631def UploadReport(options):
632 """Create a report containing key device details."""
Yong Hong863d3262017-10-30 16:23:34 +0800633 ro_vpd = sys_utils.VPDTool().GetAllData(
634 partition=sys_utils.VPDTool.RO_PARTITION)
Jon Salza88b83b2013-05-27 20:00:35 +0800635 device_sn = ro_vpd.get('serial_number', None)
636 if device_sn is None:
637 logging.warning('RO_VPD missing device serial number')
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +0800638 device_sn = 'MISSING_SN_' + time_utils.TimedUUID()
Jon Salza88b83b2013-05-27 20:00:35 +0800639 target_path = CreateReportArchive(device_sn)
640
Tammo Spalink86a61c62012-05-25 15:10:35 +0800641 if options.upload_method is None or options.upload_method == 'none':
642 logging.warning('REPORT UPLOAD SKIPPED (report left at %s)', target_path)
643 return
644 method, param = options.upload_method.split(':', 1)
645 if method == 'shopfloor':
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800646 report_upload.ShopFloorUpload(
647 target_path, param,
648 'GRT' if options.command_name == 'finalize' else None)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800649 elif method == 'ftp':
Jay Kim360c1dd2012-06-25 10:58:11 -0700650 report_upload.FtpUpload(target_path, 'ftp:' + param)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800651 elif method == 'ftps':
652 report_upload.CurlUrlUpload(target_path, '--ftp-ssl-reqd ftp:%s' % param)
653 elif method == 'cpfe':
Shawn Nematbakhsh3404a092013-01-28 16:49:09 -0800654 report_upload.CpfeUpload(target_path, pipes.quote(param))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800655 else:
656 raise Error('unknown report upload method %r', method)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800657
658
659@Command('finalize',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800660 CmdArg('--no_write_protect', action='store_true',
661 help='Do not enable firmware write protection.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800662 CmdArg('--fast', action='store_true',
663 help='use non-secure but faster wipe method.'),
Shun-Hsing Oudb407d62015-11-11 11:03:59 +0800664 _shopfloor_url_args_cmd_arg,
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800665 _hwdb_path_cmd_arg,
Tammo Spalink95c43732012-07-25 15:57:14 -0700666 _hwid_status_list_cmd_arg,
Jon Salz65266432012-07-30 19:02:49 +0800667 _upload_method_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800668 _add_file_cmd_arg,
669 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800670 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800671 _hwid_run_vpd_cmd_arg,
672 _hwid_vpd_data_file_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800673 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800674 _cros_core_cmd_arg,
Yilun Lin599833f2017-12-22 14:07:46 +0800675 _chromebox_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800676 _ec_pubkey_path_cmd_arg,
677 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800678 _release_rootfs_cmd_arg,
679 _firmware_path_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800680 _enforced_release_channels_cmd_arg,
681 _station_ip_cmd_arg,
682 _station_port_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800683 _wipe_finish_token_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800684 _waive_list_cmd_arg,
685 _skip_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800686def Finalize(options):
687 """Verify system readiness and trigger transition into release state.
688
Jon Salzaa3a30e2013-05-15 15:56:28 +0800689 This routine does the following:
690 - Verifies system state (see verify command)
Jon Salzfe9036f2014-01-16 14:11:23 +0800691 - Untars stateful_files.tar.xz, if it exists, in the stateful partition, to
692 initialize files such as the CRX cache
Jon Salzaa3a30e2013-05-15 15:56:28 +0800693 - Modifies firmware bitmaps to match locale
694 - Clears all factory-friendly flags from the GBB
695 - Removes factory-specific entries from RW_VPD (factory.*)
696 - Enables firmware write protection (cannot rollback after this)
697 - Uploads system logs & reports
Earl Ou51182222016-09-09 12:16:48 +0800698 - Wipes the testing kernel, rootfs, and stateful partition
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800699 """
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800700 Verify(options)
Shen-En Shih3e079b22017-09-11 05:43:09 -0700701 Cr50SetBoardId(options)
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800702 Cr50ResetState(options)
Jon Salz40b9f822014-07-25 16:39:55 +0800703 LogSourceHashes(options)
Jon Salzfe9036f2014-01-16 14:11:23 +0800704 UntarStatefulFiles(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800705 if options.cros_core:
706 logging.info('SetFirmwareBitmapLocale is skipped for ChromeOS Core device.')
707 else:
708 SetFirmwareBitmapLocale(options)
Jon Salzaa3a30e2013-05-15 15:56:28 +0800709 ClearFactoryVPDEntries(options)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200710 GenerateStableDeviceSecret(options)
Shen-En Shih3e079b22017-09-11 05:43:09 -0700711 ClearGBBFlags(options)
Hung-Te Lin6d827542012-07-19 11:50:41 +0800712 if options.no_write_protect:
713 logging.warn('WARNING: Firmware Write Protection is SKIPPED.')
Andy Cheng0465d132013-03-20 12:12:06 +0800714 event_log.Log('wp', fw='both', status='skipped')
Hung-Te Lin6d827542012-07-19 11:50:41 +0800715 else:
Wei-Han Chenba21f512016-10-14 18:52:33 +0800716 EnableFwWp(options)
Jon Salza0f58e02012-05-29 19:33:39 +0800717 LogSystemDetails(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800718 UploadReport(options)
Earl Ou51182222016-09-09 12:16:48 +0800719
720 event_log.Log('wipe_in_place')
721 wipe_args = []
Earl Ou51182222016-09-09 12:16:48 +0800722 if options.shopfloor_url:
723 wipe_args += ['--shopfloor_url', options.shopfloor_url]
724 if options.fast:
725 wipe_args += ['--fast']
726 if options.station_ip:
727 wipe_args += ['--station_ip', options.station_ip]
728 if options.station_port:
729 wipe_args += ['--station_port', options.station_port]
730 if options.wipe_finish_token:
731 wipe_args += ['--wipe_finish_token', options.wipe_finish_token]
732 ExecFactoryPar('gooftool', 'wipe_in_place', *wipe_args)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800733
734
Ting Shen129fa6f2016-09-02 12:22:24 +0800735@Command('verify_hwid',
736 _probe_results_cmd_arg,
737 _hwdb_path_cmd_arg,
738 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800739 _hwid_run_vpd_cmd_arg,
740 _hwid_vpd_data_file_cmd_arg,
Ting Shen129fa6f2016-09-02 12:22:24 +0800741 _rma_mode_cmd_arg)
742def VerifyHWID(options):
Ricky Liangc662be32013-12-24 11:50:23 +0800743 """A simple wrapper that calls out to HWID utils to verify version 3 HWID.
Ricky Liang53390232013-03-08 15:37:57 +0800744
Ricky Liangc662be32013-12-24 11:50:23 +0800745 This is mainly for Gooftool to verify v3 HWID during finalize. For testing
746 and development purposes, please use `hwid` command.
Ricky Liang53390232013-03-08 15:37:57 +0800747 """
Ricky Liangc662be32013-12-24 11:50:23 +0800748 db = GetGooftool(options).db
749 encoded_string = options.hwid or hwid_utils.GetHWIDString()
Ricky Liang7905f272013-03-16 01:57:10 +0800750 if options.probe_results:
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800751 probed_results = yaml.load(file_utils.ReadFile(options.probe_results))
Ricky Liang7905f272013-03-16 01:57:10 +0800752 else:
Yong Hong863d3262017-10-30 16:23:34 +0800753 probed_results = GetGooftool(options).Probe()
Yong Hong68a0e0d2017-12-20 19:06:54 +0800754
755 vpd = hwid_utils.GetVPDData(options.hwid_run_vpd, options.hwid_vpd_data_file)
Ricky Liang53390232013-03-08 15:37:57 +0800756
Hung-Te Lin11052952015-03-18 13:48:59 +0800757 event_log.Log('probed_results', probed_results=FilterDict(probed_results))
Yong Hong68a0e0d2017-12-20 19:06:54 +0800758 event_log.Log('vpd', vpd=FilterDict(vpd) if vpd is None else None)
Ricky Liang53390232013-03-08 15:37:57 +0800759
Yong Hong68a0e0d2017-12-20 19:06:54 +0800760 hwid_utils.VerifyHWID(db, encoded_string, probed_results, vpd=vpd,
Hung-Te Lin56b18402015-01-16 14:52:30 +0800761 rma_mode=options.rma_mode)
Ricky Liang53390232013-03-08 15:37:57 +0800762
Ricky Liangc662be32013-12-24 11:50:23 +0800763 event_log.Log('verified_hwid', hwid=encoded_string)
Ricky Liang53390232013-03-08 15:37:57 +0800764
765
henryhsu44d793a2013-07-20 00:07:38 +0800766@Command('get_firmware_hash',
767 CmdArg('--file', metavar='FILE', help='Firmware File.'))
768def GetFirmwareHash(options):
henryhsuf6f835c2013-07-20 20:49:25 +0800769 """Get firmware hash from a file"""
henryhsu44d793a2013-07-20 00:07:38 +0800770 if os.path.exists(options.file):
Yong Hong863d3262017-10-30 16:23:34 +0800771 hashes = chromeos_firmware.CalculateFirmwareHashes(options.file)
henryhsu44d793a2013-07-20 00:07:38 +0800772 for section, value_dict in hashes.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800773 print '%s:' % section
henryhsu44d793a2013-07-20 00:07:38 +0800774 for key, value in value_dict.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800775 print ' %s: %s' % (key, value)
henryhsu44d793a2013-07-20 00:07:38 +0800776 else:
777 raise Error('File does not exist: %s' % options.file)
778
henryhsuf6f835c2013-07-20 20:49:25 +0800779
Peter Shihfdf17682017-05-26 11:38:39 +0800780def main():
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800781 """Run sub-command specified by the command line args."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800782
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800783 options = ParseCmdline(
Ting Shen129fa6f2016-09-02 12:22:24 +0800784 'Perform Google required factory tests.',
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800785 CmdArg('-l', '--log', metavar='PATH',
786 help='Write logs to this file.'),
Jon Salza4bea382012-10-29 13:00:34 +0800787 CmdArg('--suppress-event-logs', action='store_true',
788 help='Suppress event logging.'),
Wei-Han Chenaff56232016-04-16 09:17:59 +0800789 CmdArg('--phase', default=None,
790 help=('override phase for phase checking (defaults to the current '
791 'as returned by the "factory phase" command)')),
Tammo Spalink8fab5312012-05-28 18:33:30 +0800792 verbosity_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800793 SetupLogging(options.verbosity, options.log)
Andy Cheng0465d132013-03-20 12:12:06 +0800794 event_log.SetGlobalLoggerDefaultPrefix('gooftool')
795 event_log.GetGlobalLogger().suppress = options.suppress_event_logs
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800796 logging.debug('gooftool options: %s', repr(options))
Wei-Han Chenaff56232016-04-16 09:17:59 +0800797
798 phase.OverridePhase(options.phase)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800799 try:
800 logging.debug('GOOFTOOL command %r', options.command_name)
801 options.command(options)
802 logging.info('GOOFTOOL command %r SUCCESS', options.command_name)
803 except Error, e:
804 logging.exception(e)
805 sys.exit('GOOFTOOL command %r ERROR: %s' % (options.command_name, e))
806 except Exception, e:
807 logging.exception(e)
808 sys.exit('UNCAUGHT RUNTIME EXCEPTION %s' % e)
809
810
811if __name__ == '__main__':
Peter Shihfdf17682017-05-26 11:38:39 +0800812 main()