blob: 9fcb46312ddf65050277d993b8ec33edcc08914a [file] [log] [blame]
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08001#!/usr/bin/python
Jon Salze60307f2014-08-05 16:20:00 +08002# -*- coding: utf-8 -*-
3# Copyright 2014 The Chromium OS Authors. All rights reserved.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08004# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
Jon Salze60307f2014-08-05 16:20:00 +08007# pylint: disable=E1101
8
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08009"""Google Factory Tool.
10
11This tool is indended to be used on factory assembly lines. It
12provides all of the Google required test functionality and must be run
13on each device as part of the assembly process.
14"""
15
Ricky Liang5b4568d2013-04-23 17:15:23 +080016import collections
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080017import logging
18import os
Jon Salz65266432012-07-30 19:02:49 +080019import pipes
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080020import re
21import sys
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080022import threading
Hung-Te Lin6bd16472012-06-20 16:26:47 +080023import time
Jon Salza88b83b2013-05-27 20:00:35 +080024import xmlrpclib
Ricky Liang7905f272013-03-16 01:57:10 +080025import yaml
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080026
Andy Cheng2582d292012-12-04 17:38:28 +080027from tempfile import gettempdir
Tammo Spalink86a61c62012-05-25 15:10:35 +080028
Tammo Spalinka40293e2012-07-04 14:58:56 +080029import factory_common # pylint: disable=W0611
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080030
Ricky Liang53390232013-03-08 15:37:57 +080031from cros.factory.gooftool import crosfw
Tammo Spalink01e11722012-07-24 10:17:54 -070032from cros.factory.gooftool import report_upload
Hung-Te Lin84c77fa2016-03-02 17:43:30 +080033from cros.factory.gooftool.core import Gooftool
Wei-Han Chen0a3320e2016-04-23 01:32:07 +080034from cros.factory.gooftool.common import ExecFactoryPar
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080035from cros.factory.gooftool.common import Shell
Ting Shen129fa6f2016-09-02 12:22:24 +080036from cros.factory.gooftool.probe import Probe
37from cros.factory.gooftool.probe import ReadRoVpd
henryhsu44d793a2013-07-20 00:07:38 +080038from cros.factory.gooftool.probe import CalculateFirmwareHashes
Hung-Te Lin604e0c22015-11-24 15:17:07 +080039from cros.factory.hwid.v3 import common
40from cros.factory.hwid.v3 import hwid_utils
Hung-Te Lin91492a12014-11-25 18:56:30 +080041from cros.factory.test import event_log
Wei-Han Chen2ebb92d2016-01-12 14:51:41 +080042from cros.factory.test.env import paths
Wei-Han Chenaff56232016-04-16 09:17:59 +080043from cros.factory.test.rules import phase
Hung-Te Lin3f096842016-01-13 17:37:06 +080044from cros.factory.test.rules.privacy import FilterDict
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080045from cros.factory.utils.argparse_utils import CmdArg
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080046from cros.factory.utils.argparse_utils import ParseCmdline
47from cros.factory.utils.argparse_utils import verbosity_cmd_arg
Ting Shen18a06382016-08-30 16:18:21 +080048from cros.factory.utils import argparse_utils
Jon Salz40b9f822014-07-25 16:39:55 +080049from cros.factory.utils import file_utils
Wei-Han Chena5c01a02016-04-23 19:27:19 +080050from cros.factory.utils import sys_utils
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +080051from cros.factory.utils import time_utils
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080052from cros.factory.utils.debug_utils import SetupLogging
Jon Salzff88c022012-11-03 12:19:58 +080053from cros.factory.utils.process_utils import Spawn
Joel Kitchingd3bc2662014-12-16 16:03:32 -080054from cros.factory.utils.type_utils import Error
Tammo Spalink86a61c62012-05-25 15:10:35 +080055
Tammo Spalink5c699832012-07-03 17:50:39 +080056
Tammo Spalink5c699832012-07-03 17:50:39 +080057# TODO(tammo): Replace calls to sys.exit with raise Exit, and maybe
58# treat that specially (as a smoot exit, as opposed to the more
59# verbose output for generic Error).
60
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080061_global_gooftool = None
62_gooftool_lock = threading.Lock()
Tammo Spalink5c699832012-07-03 17:50:39 +080063
Hung-Te Lin56b18402015-01-16 14:52:30 +080064
Ricky Lianga70a1202013-03-15 15:03:17 +080065def GetGooftool(options):
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080066 global _global_gooftool # pylint: disable=W0603
Ricky Lianga70a1202013-03-15 15:03:17 +080067
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080068 if _global_gooftool is None:
69 with _gooftool_lock:
Ting Shen129fa6f2016-09-02 12:22:24 +080070 board = getattr(options, 'board', None)
71 hwdb_path = getattr(options, 'hwdb_path', None)
72 _global_gooftool = Gooftool(hwid_version=3, board=board,
73 hwdb_path=hwdb_path)
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080074
75 return _global_gooftool
Ricky Lianga70a1202013-03-15 15:03:17 +080076
Hung-Te Lin56b18402015-01-16 14:52:30 +080077
Ting Shen18a06382016-08-30 16:18:21 +080078def Command(cmd_name, *args, **kwargs):
79 """ Decorator for commands in gooftool.
80
81 This is similar to argparse_utils.Command, but all gooftool commands
82 can be waived during `gooftool finalize` or `gooftool verify` using
83 --waive_list option.
84 """
85 def Decorate(fun):
86 def CommandWithWaiveCheck(options):
87 waive_list = vars(options).get('waive_list', [])
88 if phase.GetPhase() >= phase.PVT_DOGFOOD and waive_list != []:
89 raise Error(
90 'waive_list should be empty for phase %s' % phase.GetPhase())
91
92 try:
93 fun(options)
94 except Exception as e:
95 if cmd_name in waive_list:
96 logging.exception(e)
97 else:
98 raise
99
100 return argparse_utils.Command(cmd_name, *args, **kwargs)(
101 CommandWithWaiveCheck)
102 return Decorate
103
104
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800105@Command('write_hwid',
106 CmdArg('hwid', metavar='HWID', help='HWID string'))
Andy Chengc92e6f92012-11-20 16:55:53 +0800107def WriteHWID(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800108 """Write specified HWID value into the system BB."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800109
Tammo Spalink95c43732012-07-25 15:57:14 -0700110 logging.info('writing hwid string %r', options.hwid)
Ricky Lianga70a1202013-03-15 15:03:17 +0800111 GetGooftool(options).WriteHWID(options.hwid)
Andy Cheng0465d132013-03-20 12:12:06 +0800112 event_log.Log('write_hwid', hwid=options.hwid)
Tammo Spalink95c43732012-07-25 15:57:14 -0700113 print 'Wrote HWID: %r' % options.hwid
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800114
115
Ricky Liang53390232013-03-08 15:37:57 +0800116_board_cmd_arg = CmdArg(
117 '--board', metavar='BOARD',
118 default=None, help='Board name to test.')
119
Tammo Spalink8fab5312012-05-28 18:33:30 +0800120_hwdb_path_cmd_arg = CmdArg(
121 '--hwdb_path', metavar='PATH',
Ricky Liangeede7922013-06-19 10:18:41 +0800122 default=common.DEFAULT_HWID_DATA_PATH,
Tammo Spalink8fab5312012-05-28 18:33:30 +0800123 help='Path to the HWID database.')
124
Tammo Spalink95c43732012-07-25 15:57:14 -0700125_hwid_status_list_cmd_arg = CmdArg(
Hung-Te Lin56b18402015-01-16 14:52:30 +0800126 '--status', nargs='*', default=['supported'],
127 help='allow only HWIDs with these status values')
Tammo Spalink95c43732012-07-25 15:57:14 -0700128
Jon Salzce124fb2012-10-02 17:42:03 +0800129_probe_results_cmd_arg = CmdArg(
130 '--probe_results', metavar='RESULTS.yaml',
Ricky Liangc662be32013-12-24 11:50:23 +0800131 help=('Output from "gooftool probe --include_vpd" (used instead of '
Jon Salzce124fb2012-10-02 17:42:03 +0800132 'probing this system).'))
133
Ricky Liang53390232013-03-08 15:37:57 +0800134_device_info_cmd_arg = CmdArg(
Ricky Liangf89f73a2013-03-19 05:00:24 +0800135 '--device_info', metavar='DEVICE_INFO.yaml', default=None,
Ricky Liang53390232013-03-08 15:37:57 +0800136 help='A dict of device info to use instead of fetching from shopfllor '
137 'server.')
138
Jon Salzce124fb2012-10-02 17:42:03 +0800139_hwid_cmd_arg = CmdArg(
140 '--hwid', metavar='HWID',
Ricky Lianga70a1202013-03-15 15:03:17 +0800141 help='HWID to verify (instead of the currently set HWID of this system).')
Jon Salzce124fb2012-10-02 17:42:03 +0800142
Bernie Thompson3c11c872013-07-22 18:22:45 -0700143_rma_mode_cmd_arg = CmdArg(
144 '--rma_mode', action='store_true',
145 help='Enable RMA mode, do not check for deprecated components.')
Tammo Spalink95c43732012-07-25 15:57:14 -0700146
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800147_cros_core_cmd_arg = CmdArg(
148 '--cros_core', action='store_true',
149 help='Finalize for ChromeOS Core devices (may add or remove few test '
150 'items. For example, branding verification or firmware bitmap '
151 'locale settings).')
152
bowgotsai13820f42015-09-10 23:18:04 +0800153_enforced_release_channels_cmd_arg = CmdArg(
154 '--enforced_release_channels', nargs='*', default=None,
155 help='Enforced release image channels.')
156
Hung-Te Lincdb96522016-04-15 16:51:10 +0800157_release_rootfs_cmd_arg = CmdArg(
158 '--release_rootfs', help='Location of release image rootfs partition.')
159
160_firmware_path_cmd_arg = CmdArg(
161 '--firmware_path', help='Location of firmware image partition.')
Ricky Liang43b879b2014-02-24 11:36:55 +0800162
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800163_shopfloor_url_args_cmd_arg = CmdArg(
164 '--shopfloor_url',
Earl Ou51182222016-09-09 12:16:48 +0800165 help='Shopfloor server url to be informed when wiping is done. '
166 'After wiping, a XML-RPC request will be sent to the '
167 'given url to indicate the completion of wiping.')
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800168
169_station_ip_cmd_arg = CmdArg(
170 '--station_ip',
171 help='IP of remote station')
172
173_station_port_cmd_arg = CmdArg(
174 '--station_port',
175 help='Port on remote station')
176
177_wipe_finish_token_cmd_arg = CmdArg(
178 '--wipe_finish_token',
179 help='Required token when notifying station after wipe finished')
180
Ting Shen18a06382016-08-30 16:18:21 +0800181_waive_list_cmd_arg = CmdArg(
182 '--waive_list', nargs='*', default=[], metavar='SUBCMD',
183 help='A list of waived checks, serperated by whitespace.'
184 'Each item should be a sub-command of gooftool.'
185 'e.g. "gooftool verify --waive_list verify_tpm clear_gbb_flags".')
186
Tammo Spalink8fab5312012-05-28 18:33:30 +0800187
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800188@Command('probe',
189 CmdArg('--comps', nargs='*',
190 help='List of keys from the component_db registry.'),
Ricky Liangb30da672013-06-14 12:36:34 +0800191 CmdArg('--fast_fw_probe', action='store_true',
192 help='Do a fast probe for EC and main firmware versions only. '
193 'This implies --no_vol and --no_ic.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800194 CmdArg('--no_vol', action='store_true',
195 help='Do not probe volatile data.'),
196 CmdArg('--no_ic', action='store_true',
Jon Salz0f8a6842012-09-25 11:28:22 +0800197 help='Do not probe initial_config data.'),
198 CmdArg('--include_vpd', action='store_true',
199 help='Include VPD data in volatiles.'))
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800200def RunProbe(options):
201 """Print yaml-formatted breakdown of probed device properties."""
Ricky Lianga70a1202013-03-15 15:03:17 +0800202 print GetGooftool(options).Probe(
203 target_comp_classes=options.comps,
Ricky Liangb30da672013-06-14 12:36:34 +0800204 fast_fw_probe=options.fast_fw_probe,
Ricky Lianga70a1202013-03-15 15:03:17 +0800205 probe_volatile=not options.no_vol,
206 probe_initial_config=not options.no_ic,
207 probe_vpd=options.include_vpd).Encode()
Ricky Liang53390232013-03-08 15:37:57 +0800208
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800209
Tammo Spalink214caf42012-05-28 10:45:00 +0800210@Command('verify_components',
211 _hwdb_path_cmd_arg,
Tammo Spalink5c699832012-07-03 17:50:39 +0800212 CmdArg('target_comps', nargs='*'))
Tammo Spalink214caf42012-05-28 10:45:00 +0800213def VerifyComponents(options):
Andy Cheng8ece7382012-08-22 16:25:42 +0800214 """Verify that probeable components all match entries in the component_db.
Tammo Spalink214caf42012-05-28 10:45:00 +0800215
Tammo Spalink5c699832012-07-03 17:50:39 +0800216 Probe for each component class in the target_comps and verify
Tammo Spalink214caf42012-05-28 10:45:00 +0800217 that a corresponding match exists in the component_db -- make sure
218 that these components are present, that they have been approved, but
219 do not check against any specific BOM/HWID configurations.
220 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800221
Andy Chengc531e2f2012-10-15 19:09:17 +0800222 try:
Ricky Lianga70a1202013-03-15 15:03:17 +0800223 result = GetGooftool(options).VerifyComponents(
Andy Chengc531e2f2012-10-15 19:09:17 +0800224 options.target_comps)
225 except ValueError, e:
226 sys.exit(e)
227
Ricky Liang53390232013-03-08 15:37:57 +0800228 PrintVerifyComponentsResults(result)
229
230
231def PrintVerifyComponentsResults(result):
232 """Prints out the results of VerifyComponents method call.
233
234 Groups the results into two groups: 'matches' and 'errors', and prints out
235 their values.
236 """
Andy Chengc531e2f2012-10-15 19:09:17 +0800237 # group by matches and errors
Tammo Spalink214caf42012-05-28 10:45:00 +0800238 matches = []
Andy Chengc531e2f2012-10-15 19:09:17 +0800239 errors = []
240 for result_list in result.values():
241 for component_name, _, error in result_list:
242 if component_name:
243 matches.append(component_name)
Tammo Spalink214caf42012-05-28 10:45:00 +0800244 else:
Andy Chengc531e2f2012-10-15 19:09:17 +0800245 errors.append(error)
246
Andy Cheng228a8c92012-08-27 10:53:57 +0800247 if matches:
248 print 'found probeable components:\n %s' % '\n '.join(matches)
Tammo Spalink214caf42012-05-28 10:45:00 +0800249 if errors:
Andy Cheng228a8c92012-08-27 10:53:57 +0800250 print '\nerrors:\n %s' % '\n '.join(errors)
251 sys.exit('\ncomponent verification FAILURE')
Tammo Spalink214caf42012-05-28 10:45:00 +0800252 else:
Hung-Te Lin56b18402015-01-16 14:52:30 +0800253 print '\ncomponent verification SUCCESS'
Tammo Spalink214caf42012-05-28 10:45:00 +0800254
255
Hung-Te Line1d80f62016-03-31 14:58:13 +0800256@Command('verify_keys',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800257 _release_rootfs_cmd_arg,
258 _firmware_path_cmd_arg)
Tammo Spalink01e11722012-07-24 10:17:54 -0700259def VerifyKeys(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800260 """Verify keys in firmware and SSD match."""
Hung-Te Line1d80f62016-03-31 14:58:13 +0800261 return GetGooftool(options).VerifyKeys(
Hung-Te Lincdb96522016-04-15 16:51:10 +0800262 options.release_rootfs, options.firmware_path)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800263
264
265@Command('set_fw_bitmap_locale')
Tammo Spalink01e11722012-07-24 10:17:54 -0700266def SetFirmwareBitmapLocale(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800267 """Use VPD locale value to set firmware bitmap default language."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800268
Ricky Lianga70a1202013-03-15 15:03:17 +0800269 (index, locale) = GetGooftool(options).SetFirmwareBitmapLocale()
Andy Cheng2582d292012-12-04 17:38:28 +0800270 logging.info('Firmware bitmap initial locale set to %d (%s).',
271 index, locale)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800272
273
Hung-Te Line1d80f62016-03-31 14:58:13 +0800274@Command('verify_system_time',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800275 _release_rootfs_cmd_arg)
Tammo Spalink01e11722012-07-24 10:17:54 -0700276def VerifySystemTime(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800277 """Verify system time is later than release filesystem creation time."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800278
Hung-Te Lincdb96522016-04-15 16:51:10 +0800279 return GetGooftool(options).VerifySystemTime(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800280
281
Hung-Te Line1d80f62016-03-31 14:58:13 +0800282@Command('verify_rootfs',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800283 _release_rootfs_cmd_arg)
Tammo Spalink01e11722012-07-24 10:17:54 -0700284def VerifyRootFs(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800285 """Verify rootfs on SSD is valid by checking hash."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800286
Hung-Te Line1d80f62016-03-31 14:58:13 +0800287 return GetGooftool(options).VerifyRootFs(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800288
Hung-Te Lin56b18402015-01-16 14:52:30 +0800289
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800290@Command('verify_tpm')
291def VerifyTPM(options): # pylint: disable=W0613
292 """Verify TPM is cleared."""
293
294 return GetGooftool(options).VerifyTPM()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800295
Hung-Te Lin56b18402015-01-16 14:52:30 +0800296
Hung-Te Lindd708d42014-07-11 17:05:01 +0800297@Command('verify_me_locked')
298def VerifyManagementEngineLocked(options): # pylint: disable=W0613
299 """Verify Managment Engine is locked."""
300
301 return GetGooftool(options).VerifyManagementEngineLocked()
302
Hung-Te Lin56b18402015-01-16 14:52:30 +0800303
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800304@Command('verify_switch_wp')
Andy Chengc92e6f92012-11-20 16:55:53 +0800305def VerifyWPSwitch(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800306 """Verify hardware write protection switch is enabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800307
Ricky Lianga70a1202013-03-15 15:03:17 +0800308 GetGooftool(options).VerifyWPSwitch()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800309
310
311@Command('verify_switch_dev')
Tammo Spalink01e11722012-07-24 10:17:54 -0700312def VerifyDevSwitch(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800313 """Verify developer switch is disabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800314
Ricky Lianga70a1202013-03-15 15:03:17 +0800315 if GetGooftool(options).CheckDevSwitchForDisabling():
Hung-Te Lind7d34722012-07-26 16:48:35 +0800316 logging.warn('VerifyDevSwitch: No physical switch.')
Andy Cheng0465d132013-03-20 12:12:06 +0800317 event_log.Log('switch_dev', type='virtual switch')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800318
319
Jon Salzadd90d32014-04-29 16:16:27 +0800320@Command('verify_branding')
321def VerifyBranding(options): # pylint: disable=W0613
322 """Verify that branding fields are properly set.
323
324 customization_id, if set in the RO VPD, must be of the correct format.
325
326 rlz_brand_code must be set either in the RO VPD or OEM partition, and must
327 be of the correct format.
328 """
329 return GetGooftool(options).VerifyBranding()
330
331
bowgotsai13820f42015-09-10 23:18:04 +0800332@Command('verify_release_channel',
333 _enforced_release_channels_cmd_arg)
bowgotsai529139c2015-05-30 01:39:49 +0800334def VerifyReleaseChannel(options): # pylint: disable=W0613
335 """Verify that release image channel is correct.
336
337 ChromeOS has four channels: canary, dev, beta and stable.
338 The last three channels support image auto-updates, checks
339 that release image channel is one of them.
340 """
bowgotsai13820f42015-09-10 23:18:04 +0800341 return GetGooftool(options).VerifyReleaseChannel(
342 options.enforced_release_channels)
bowgotsai529139c2015-05-30 01:39:49 +0800343
344
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800345@Command('write_protect')
Tammo Spalink01e11722012-07-24 10:17:54 -0700346def EnableFwWp(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800347 """Enable then verify firmware write protection."""
348
Hung-Te Linb21c6682012-08-01 13:53:57 +0800349 def CalculateLegacyRange(fw_type, length, section_data,
350 section_name):
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800351 ro_size = length / 2
352 ro_a = int(section_data[0] / ro_size)
353 ro_b = int((section_data[0] + section_data[1] - 1) / ro_size)
354 if ro_a != ro_b:
Hung-Te Lin56b18402015-01-16 14:52:30 +0800355 raise Error('%s firmware section %s has illegal size' %
Hung-Te Linb21c6682012-08-01 13:53:57 +0800356 (fw_type, section_name))
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800357 ro_offset = ro_a * ro_size
358 return (ro_offset, ro_size)
359
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800360 def WriteProtect(fw_file_path, fw_type, legacy_section=None):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800361 """Calculate protection size, then invoke flashrom.
362
363 Our supported chips only allow write protecting half their total
364 size, so we parition the flash chipset space accordingly.
365 """
366 raw_image = open(fw_file_path, 'rb').read()
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800367 wp_section = 'WP_RO'
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800368 image = crosfw.FirmwareImage(raw_image)
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800369 if image.has_section(wp_section):
370 section_data = image.get_section_area(wp_section)
371 ro_offset = section_data[0]
372 ro_size = section_data[1]
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800373 elif legacy_section is not None and image.has_section(legacy_section):
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800374 section_data = image.get_section_area(legacy_section)
375 (ro_offset, ro_size) = CalculateLegacyRange(
Hung-Te Linb21c6682012-08-01 13:53:57 +0800376 fw_type, len(raw_image), section_data, legacy_section)
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800377 else:
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800378 raise Error('Could not find %s firmware section: %s %s' %
379 (fw_type, wp_section, legacy_section or ''))
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800380
381 logging.debug('write protecting %s [off=%x size=%x]', fw_type,
382 ro_offset, ro_size)
383 crosfw.Flashrom(fw_type).EnableWriteProtection(ro_offset, ro_size)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800384
385 WriteProtect(crosfw.LoadMainFirmware().GetFileName(), 'main', 'RO_SECTION')
Andy Cheng0465d132013-03-20 12:12:06 +0800386 event_log.Log('wp', fw='main')
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800387
388 # Some EC (mostly PD) does not support "RO NOW". Instead they will only set
389 # "RO_AT_BOOT" when you request to enable RO (These platforms consider
390 # --wp-range with right range identical to --wp-enable), and requires a
391 # 'ectool reboot_ec RO at-shutdown; reboot' to let the RO take effect.
392 # After reboot, "flashrom --wp-status" will return right protected range.
393 # If you don't reboot, returned range will be (0, 0), and running command
394 # "ectool flashprotect" will not have RO_NOW.
395
396 targets = [
397 ('EC', crosfw.TARGET_EC, crosfw.LoadEcFirmware, 'EC_RO'),
398 ('PD', crosfw.TARGET_PD, crosfw.LoadPDFirmware, None)]
399 for (name, fw_type, provider, legacy_section) in targets:
400 fw_file = provider().GetFileName()
401 if fw_file is None:
402 logging.warning('%s not write protected (seems there is no %s flash).',
403 name, name)
404 continue
405 WriteProtect(fw_file, fw_type, legacy_section)
406 event_log.Log('wp', fw=fw_type)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800407
408
409@Command('clear_gbb_flags')
Andy Chengc92e6f92012-11-20 16:55:53 +0800410def ClearGBBFlags(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800411 """Zero out the GBB flags, in preparation for transition to release state.
412
413 No GBB flags are set in release/shipping state, but they are useful
414 for factory/development. See "gbb_utility --flags" for details.
415 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800416
Ricky Lianga70a1202013-03-15 15:03:17 +0800417 GetGooftool(options).ClearGBBFlags()
Andy Cheng0465d132013-03-20 12:12:06 +0800418 event_log.Log('clear_gbb_flags')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800419
420
Jon Salzaa3a30e2013-05-15 15:56:28 +0800421@Command('clear_factory_vpd_entries')
422def ClearFactoryVPDEntries(options): # pylint: disable=W0613
423 """Clears factory.* items in the RW VPD."""
424 entries = GetGooftool(options).ClearFactoryVPDEntries()
425 event_log.Log('clear_factory_vpd_entries', entries=FilterDict(entries))
426
427
Mattias Nisslercca761b2015-04-15 21:53:04 +0200428@Command('generate_stable_device_secret')
429def GenerateStableDeviceSecret(options): # pylint: disable=W0613
430 """Generates a a fresh stable device secret and stores it in the RO VPD."""
431 GetGooftool(options).GenerateStableDeviceSecret()
432 event_log.Log('generate_stable_device_secret')
433
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800434
Earl Ou564a7872016-10-05 10:22:00 +0800435@Command('enable_release_partition',
436 CmdArg('--release_rootfs',
437 help=('path to the release rootfs device. If not specified, '
438 'the default (5th) partition will be used.')))
439def EnableReleasePartition(options):
440 """Enables a release image partition on the disk."""
441 GetGooftool(options).EnableReleasePartition(options.release_rootfs)
442
443
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800444@Command('wipe_in_place',
445 CmdArg('--fast', action='store_true',
Shun-Hsing Ou8d3c40a2015-10-08 18:16:08 +0800446 help='use non-secure but faster wipe method.'),
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800447 _shopfloor_url_args_cmd_arg,
448 _station_ip_cmd_arg,
449 _station_port_cmd_arg,
450 _wipe_finish_token_cmd_arg)
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800451def WipeInPlace(options):
452 """Start factory wipe directly without reboot."""
453
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800454 GetGooftool(options).WipeInPlace(options.fast,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800455 options.shopfloor_url,
456 options.station_ip,
457 options.station_port,
458 options.wipe_finish_token)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200459
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800460@Command('wipe_init',
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800461 CmdArg('--wipe_args', help='arguments for clobber-state'),
462 CmdArg('--state_dev', help='path to stateful partition device'),
463 CmdArg('--root_disk', help='path to primary device'),
464 CmdArg('--old_root', help='path to old root'),
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800465 _shopfloor_url_args_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800466 _release_rootfs_cmd_arg,
467 _station_ip_cmd_arg,
468 _station_port_cmd_arg,
469 _wipe_finish_token_cmd_arg)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800470def WipeInit(options):
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800471 GetGooftool(options).WipeInit(options.wipe_args,
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800472 options.shopfloor_url,
473 options.state_dev,
474 options.release_rootfs,
475 options.root_disk,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800476 options.old_root,
477 options.station_ip,
478 options.station_port,
479 options.wipe_finish_token)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800480
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800481@Command('verify',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800482 CmdArg('--no_write_protect', action='store_true',
483 help='Do not check write protection switch state.'),
Tammo Spalink95c43732012-07-25 15:57:14 -0700484 _hwid_status_list_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800485 _hwdb_path_cmd_arg,
Ricky Lianga70a1202013-03-15 15:03:17 +0800486 _board_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800487 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800488 _hwid_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800489 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800490 _cros_core_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800491 _release_rootfs_cmd_arg,
492 _firmware_path_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800493 _enforced_release_channels_cmd_arg,
494 _waive_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800495def Verify(options):
496 """Verifies if whole factory process is ready for finalization.
497
498 This routine performs all the necessary checks to make sure the
499 device is ready to be finalized, but does not modify state. These
500 checks include dev switch, firmware write protection switch, hwid,
501 system time, keys, and root file system.
502 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800503
Hung-Te Lin6d827542012-07-19 11:50:41 +0800504 if not options.no_write_protect:
Ricky Lianga70a1202013-03-15 15:03:17 +0800505 VerifyWPSwitch(options)
Hung-Te Lindd708d42014-07-11 17:05:01 +0800506 VerifyManagementEngineLocked(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800507 VerifyDevSwitch(options)
Ting Shen129fa6f2016-09-02 12:22:24 +0800508 VerifyHWID(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800509 VerifySystemTime(options)
510 VerifyKeys(options)
511 VerifyRootFs(options)
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800512 VerifyTPM(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800513 if options.cros_core:
514 logging.info('VerifyBranding is skipped for ChromeOS Core device.')
515 else:
516 VerifyBranding(options)
bowgotsai529139c2015-05-30 01:39:49 +0800517 VerifyReleaseChannel(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800518
Hung-Te Lin56b18402015-01-16 14:52:30 +0800519
Jon Salzfe9036f2014-01-16 14:11:23 +0800520@Command('untar_stateful_files')
Hung-Te Lin388bce22014-06-03 19:56:40 +0800521def UntarStatefulFiles(unused_options):
Jon Salzfe9036f2014-01-16 14:11:23 +0800522 """Untars stateful files from stateful_files.tar.xz on stateful partition.
523
524 If that file does not exist (which should only be R30 and earlier),
525 this is a no-op.
526 """
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800527 # Path to stateful partition on device.
528 device_stateful_path = '/mnt/stateful_partition'
529 tar_file = os.path.join(device_stateful_path, 'stateful_files.tar.xz')
Jon Salzfe9036f2014-01-16 14:11:23 +0800530 if os.path.exists(tar_file):
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800531 Spawn(['tar', 'xf', tar_file], cwd=device_stateful_path,
Jon Salzfe9036f2014-01-16 14:11:23 +0800532 log=True, check_call=True)
533 else:
534 logging.warning('No stateful files at %s', tar_file)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800535
Jon Salz40b9f822014-07-25 16:39:55 +0800536
537@Command('log_source_hashes')
538def LogSourceHashes(options): # pylint: disable=W0613
539 """Logs hashes of source files in the factory toolkit."""
Jon Salze60307f2014-08-05 16:20:00 +0800540 # WARNING: The following line is necessary to validate the integrity
541 # of the factory software. Do not remove or modify it.
542 #
543 # 警告:此行会验证工厂软件的完整性,禁止删除或修改。
Wei-Han Chena5c01a02016-04-23 19:27:19 +0800544 factory_par = sys_utils.GetRunningFactoryPythonArchivePath()
545 if factory_par:
546 event_log.Log(
547 'source_hashes',
548 **file_utils.HashPythonArchive(factory_par))
549 else:
550 event_log.Log(
551 'source_hashes',
552 **file_utils.HashSourceTree(os.path.join(paths.FACTORY_PATH, 'py')))
Jon Salz40b9f822014-07-25 16:39:55 +0800553
554
Tammo Spalink86a61c62012-05-25 15:10:35 +0800555@Command('log_system_details')
Tammo Spalink01e11722012-07-24 10:17:54 -0700556def LogSystemDetails(options): # pylint: disable=W0613
Tammo Spalink86a61c62012-05-25 15:10:35 +0800557 """Write miscellaneous system details to the event log."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800558
Ricky Liang43b879b2014-02-24 11:36:55 +0800559 event_log.Log('system_details', **GetGooftool(options).GetSystemDetails())
Tammo Spalink86a61c62012-05-25 15:10:35 +0800560
561
Jon Salza88b83b2013-05-27 20:00:35 +0800562def CreateReportArchiveBlob(*args, **kwargs):
563 """Creates a report archive and returns it as a blob.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800564
Jon Salza88b83b2013-05-27 20:00:35 +0800565 Args:
566 See CreateReportArchive.
Andy Cheng7a76cb82012-11-19 18:08:19 +0800567
Jon Salza88b83b2013-05-27 20:00:35 +0800568 Returns:
569 An xmlrpclib.Binary object containing a .tar.xz file.
570 """
Wei-Han Chen47416612016-09-14 17:41:52 +0800571 report_archive = CreateReportArchive(*args, **kwargs)
572 try:
573 with open(report_archive) as f:
574 return xmlrpclib.Binary(f.read())
575 finally:
576 os.unlink(report_archive)
Jon Salza88b83b2013-05-27 20:00:35 +0800577
578
579def CreateReportArchive(device_sn=None, add_file=None):
580 """Creates a report archive in a temporary directory.
581
582 Args:
583 device_sn: The device serial number (optional).
584 add_file: A list of files to add (optional).
585
586 Returns:
587 Path to the archive.
588 """
Hung-Te Lin6bd16472012-06-20 16:26:47 +0800589 def NormalizeAsFileName(token):
590 return re.sub(r'\W+', '', token).strip()
Jon Salza88b83b2013-05-27 20:00:35 +0800591
592 target_name = '%s%s.tar.xz' % (
593 time.strftime('%Y%m%dT%H%M%SZ',
594 time.gmtime()),
Hung-Te Lin56b18402015-01-16 14:52:30 +0800595 ('' if device_sn is None else
596 '_' + NormalizeAsFileName(device_sn)))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800597 target_path = os.path.join(gettempdir(), target_name)
Jon Salza88b83b2013-05-27 20:00:35 +0800598
Tammo Spalink86a61c62012-05-25 15:10:35 +0800599 # Intentionally ignoring dotfiles in EVENT_LOG_DIR.
Andy Cheng0465d132013-03-20 12:12:06 +0800600 tar_cmd = 'cd %s ; tar cJf %s *' % (event_log.EVENT_LOG_DIR, target_path)
Joel Kitching4b1b6c02016-05-10 14:34:30 +0800601 tar_cmd += ' --add-file %s' % paths.GetFactoryLogPath()
Jon Salza88b83b2013-05-27 20:00:35 +0800602 if add_file:
603 for f in add_file:
Jon Salz65266432012-07-30 19:02:49 +0800604 # Require absolute paths since the tar command may change the
605 # directory.
606 if not f.startswith('/'):
607 raise Error('Not an absolute path: %s' % f)
608 if not os.path.exists(f):
609 raise Error('File does not exist: %s' % f)
610 tar_cmd += ' --add-file %s' % pipes.quote(f)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800611 cmd_result = Shell(tar_cmd)
Jon Salzff88c022012-11-03 12:19:58 +0800612
613 if ((cmd_result.status == 1) and
614 all((x == '' or
615 'file changed as we read it' in x or
616 "Removing leading `/' from member names" in x)
617 for x in cmd_result.stderr.split('\n'))):
618 # That's OK. Make sure it's valid though.
Vic Yang85199e72013-01-28 14:33:11 +0800619 Spawn(['tar', 'tfJ', target_path], check_call=True, log=True,
Jon Salzff88c022012-11-03 12:19:58 +0800620 ignore_stdout=True)
621 elif not cmd_result.success:
Tammo Spalink86a61c62012-05-25 15:10:35 +0800622 raise Error('unable to tar event logs, cmd %r failed, stderr: %r' %
623 (tar_cmd, cmd_result.stderr))
Jon Salzff88c022012-11-03 12:19:58 +0800624
Jon Salza88b83b2013-05-27 20:00:35 +0800625 return target_path
626
627_upload_method_cmd_arg = CmdArg(
628 '--upload_method', metavar='METHOD:PARAM',
629 help=('How to perform the upload. METHOD should be one of '
630 '{ftp, shopfloor, ftps, cpfe}.'))
631_add_file_cmd_arg = CmdArg(
632 '--add_file', metavar='FILE', action='append',
633 help='Extra file to include in report (must be an absolute path)')
634
Hung-Te Lin56b18402015-01-16 14:52:30 +0800635
Jon Salza88b83b2013-05-27 20:00:35 +0800636@Command('upload_report',
637 _upload_method_cmd_arg,
638 _add_file_cmd_arg)
639def UploadReport(options):
640 """Create a report containing key device details."""
Hung-Te Lin74346d72016-01-07 22:16:57 +0800641 ro_vpd = ReadRoVpd()
Jon Salza88b83b2013-05-27 20:00:35 +0800642 device_sn = ro_vpd.get('serial_number', None)
643 if device_sn is None:
644 logging.warning('RO_VPD missing device serial number')
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +0800645 device_sn = 'MISSING_SN_' + time_utils.TimedUUID()
Jon Salza88b83b2013-05-27 20:00:35 +0800646 target_path = CreateReportArchive(device_sn)
647
Tammo Spalink86a61c62012-05-25 15:10:35 +0800648 if options.upload_method is None or options.upload_method == 'none':
649 logging.warning('REPORT UPLOAD SKIPPED (report left at %s)', target_path)
650 return
651 method, param = options.upload_method.split(':', 1)
652 if method == 'shopfloor':
653 report_upload.ShopFloorUpload(target_path, param)
654 elif method == 'ftp':
Jay Kim360c1dd2012-06-25 10:58:11 -0700655 report_upload.FtpUpload(target_path, 'ftp:' + param)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800656 elif method == 'ftps':
657 report_upload.CurlUrlUpload(target_path, '--ftp-ssl-reqd ftp:%s' % param)
658 elif method == 'cpfe':
Shawn Nematbakhsh3404a092013-01-28 16:49:09 -0800659 report_upload.CpfeUpload(target_path, pipes.quote(param))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800660 else:
661 raise Error('unknown report upload method %r', method)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800662
663
664@Command('finalize',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800665 CmdArg('--no_write_protect', action='store_true',
666 help='Do not enable firmware write protection.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800667 CmdArg('--fast', action='store_true',
668 help='use non-secure but faster wipe method.'),
Shun-Hsing Oudb407d62015-11-11 11:03:59 +0800669 _shopfloor_url_args_cmd_arg,
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800670 _hwdb_path_cmd_arg,
Tammo Spalink95c43732012-07-25 15:57:14 -0700671 _hwid_status_list_cmd_arg,
Jon Salz65266432012-07-30 19:02:49 +0800672 _upload_method_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800673 _add_file_cmd_arg,
Ricky Lianga70a1202013-03-15 15:03:17 +0800674 _board_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800675 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800676 _hwid_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800677 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800678 _cros_core_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800679 _release_rootfs_cmd_arg,
680 _firmware_path_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800681 _enforced_release_channels_cmd_arg,
682 _station_ip_cmd_arg,
683 _station_port_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800684 _wipe_finish_token_cmd_arg,
685 _waive_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800686def Finalize(options):
687 """Verify system readiness and trigger transition into release state.
688
Jon Salzaa3a30e2013-05-15 15:56:28 +0800689 This routine does the following:
690 - Verifies system state (see verify command)
Jon Salzfe9036f2014-01-16 14:11:23 +0800691 - Untars stateful_files.tar.xz, if it exists, in the stateful partition, to
692 initialize files such as the CRX cache
Jon Salzaa3a30e2013-05-15 15:56:28 +0800693 - Modifies firmware bitmaps to match locale
694 - Clears all factory-friendly flags from the GBB
695 - Removes factory-specific entries from RW_VPD (factory.*)
696 - Enables firmware write protection (cannot rollback after this)
697 - Uploads system logs & reports
Earl Ou51182222016-09-09 12:16:48 +0800698 - Wipes the testing kernel, rootfs, and stateful partition
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800699 """
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800700 Verify(options)
Jon Salz40b9f822014-07-25 16:39:55 +0800701 LogSourceHashes(options)
Jon Salzfe9036f2014-01-16 14:11:23 +0800702 UntarStatefulFiles(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800703 if options.cros_core:
704 logging.info('SetFirmwareBitmapLocale is skipped for ChromeOS Core device.')
705 else:
706 SetFirmwareBitmapLocale(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800707 ClearGBBFlags(options)
Jon Salzaa3a30e2013-05-15 15:56:28 +0800708 ClearFactoryVPDEntries(options)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200709 GenerateStableDeviceSecret(options)
Hung-Te Lin6d827542012-07-19 11:50:41 +0800710 if options.no_write_protect:
711 logging.warn('WARNING: Firmware Write Protection is SKIPPED.')
Andy Cheng0465d132013-03-20 12:12:06 +0800712 event_log.Log('wp', fw='both', status='skipped')
Hung-Te Lin6d827542012-07-19 11:50:41 +0800713 else:
Wei-Han Chenba21f512016-10-14 18:52:33 +0800714 EnableFwWp(options)
Jon Salza0f58e02012-05-29 19:33:39 +0800715 LogSystemDetails(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800716 UploadReport(options)
Earl Ou51182222016-09-09 12:16:48 +0800717
718 event_log.Log('wipe_in_place')
719 wipe_args = []
Earl Ou51182222016-09-09 12:16:48 +0800720 if options.shopfloor_url:
721 wipe_args += ['--shopfloor_url', options.shopfloor_url]
722 if options.fast:
723 wipe_args += ['--fast']
724 if options.station_ip:
725 wipe_args += ['--station_ip', options.station_ip]
726 if options.station_port:
727 wipe_args += ['--station_port', options.station_port]
728 if options.wipe_finish_token:
729 wipe_args += ['--wipe_finish_token', options.wipe_finish_token]
730 ExecFactoryPar('gooftool', 'wipe_in_place', *wipe_args)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800731
732
Ting Shen129fa6f2016-09-02 12:22:24 +0800733@Command('verify_hwid',
734 _probe_results_cmd_arg,
735 _hwdb_path_cmd_arg,
736 _hwid_cmd_arg,
737 _rma_mode_cmd_arg)
738def VerifyHWID(options):
Ricky Liangc662be32013-12-24 11:50:23 +0800739 """A simple wrapper that calls out to HWID utils to verify version 3 HWID.
Ricky Liang53390232013-03-08 15:37:57 +0800740
Ricky Liangc662be32013-12-24 11:50:23 +0800741 This is mainly for Gooftool to verify v3 HWID during finalize. For testing
742 and development purposes, please use `hwid` command.
Ricky Liang53390232013-03-08 15:37:57 +0800743 """
Ricky Liangc662be32013-12-24 11:50:23 +0800744 db = GetGooftool(options).db
745 encoded_string = options.hwid or hwid_utils.GetHWIDString()
Ricky Liang7905f272013-03-16 01:57:10 +0800746 if options.probe_results:
Ricky Liangc662be32013-12-24 11:50:23 +0800747 probed_results = yaml.load(open(options.probe_results).read())
Ricky Liang7905f272013-03-16 01:57:10 +0800748 else:
Ricky Liangc662be32013-12-24 11:50:23 +0800749 probed_results = yaml.load(Probe(probe_vpd=True).Encode())
750 vpd = hwid_utils.GetVPD(probed_results)
Ricky Liang53390232013-03-08 15:37:57 +0800751
Hung-Te Lin11052952015-03-18 13:48:59 +0800752 event_log.Log('probed_results', probed_results=FilterDict(probed_results))
753 event_log.Log('vpd', vpd=FilterDict(vpd))
Ricky Liang53390232013-03-08 15:37:57 +0800754
Ricky Liangc662be32013-12-24 11:50:23 +0800755 hwid_utils.VerifyHWID(db, encoded_string, probed_results, vpd,
Hung-Te Lin56b18402015-01-16 14:52:30 +0800756 rma_mode=options.rma_mode)
Ricky Liang53390232013-03-08 15:37:57 +0800757
Ricky Liangc662be32013-12-24 11:50:23 +0800758 event_log.Log('verified_hwid', hwid=encoded_string)
Ricky Liang53390232013-03-08 15:37:57 +0800759
760
Ricky Liang59611a62013-06-11 13:47:33 +0800761def ParseDecodedHWID(hwid):
762 """Parse the HWID object into a more compact dict.
763
764 Args:
765 hwid: A decoded HWID object.
766
767 Returns:
768 A dict containing the board name, the binary string, and the list of
769 components.
770 """
771 results = {}
772 results['board'] = hwid.database.board
773 results['binary_string'] = hwid.binary_string
774 results['components'] = collections.defaultdict(list)
775 components = hwid.bom.components
776 for comp_cls in sorted(components):
777 for (comp_name, probed_values, _) in sorted(components[comp_cls]):
778 if not probed_values:
779 db_components = hwid.database.components
780 probed_values = db_components.GetComponentAttributes(
781 comp_cls, comp_name).get('values')
782 results['components'][comp_cls].append(
783 {comp_name: probed_values if probed_values else None})
784 # Convert defaultdict to dict.
785 results['components'] = dict(results['components'])
786 return results
787
788
henryhsu44d793a2013-07-20 00:07:38 +0800789@Command('get_firmware_hash',
790 CmdArg('--file', metavar='FILE', help='Firmware File.'))
791def GetFirmwareHash(options):
henryhsuf6f835c2013-07-20 20:49:25 +0800792 """Get firmware hash from a file"""
henryhsu44d793a2013-07-20 00:07:38 +0800793 if os.path.exists(options.file):
794 hashes = CalculateFirmwareHashes(options.file)
795 for section, value_dict in hashes.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800796 print '%s:' % section
henryhsu44d793a2013-07-20 00:07:38 +0800797 for key, value in value_dict.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800798 print ' %s: %s' % (key, value)
henryhsu44d793a2013-07-20 00:07:38 +0800799 else:
800 raise Error('File does not exist: %s' % options.file)
801
henryhsuf6f835c2013-07-20 20:49:25 +0800802
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800803def Main():
804 """Run sub-command specified by the command line args."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800805
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800806 options = ParseCmdline(
Ting Shen129fa6f2016-09-02 12:22:24 +0800807 'Perform Google required factory tests.',
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800808 CmdArg('-l', '--log', metavar='PATH',
809 help='Write logs to this file.'),
Jon Salza4bea382012-10-29 13:00:34 +0800810 CmdArg('--suppress-event-logs', action='store_true',
811 help='Suppress event logging.'),
Wei-Han Chenaff56232016-04-16 09:17:59 +0800812 CmdArg('--phase', default=None,
813 help=('override phase for phase checking (defaults to the current '
814 'as returned by the "factory phase" command)')),
Tammo Spalink8fab5312012-05-28 18:33:30 +0800815 verbosity_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800816 SetupLogging(options.verbosity, options.log)
Andy Cheng0465d132013-03-20 12:12:06 +0800817 event_log.SetGlobalLoggerDefaultPrefix('gooftool')
818 event_log.GetGlobalLogger().suppress = options.suppress_event_logs
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800819 logging.debug('gooftool options: %s', repr(options))
Wei-Han Chenaff56232016-04-16 09:17:59 +0800820
821 phase.OverridePhase(options.phase)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800822 try:
823 logging.debug('GOOFTOOL command %r', options.command_name)
824 options.command(options)
825 logging.info('GOOFTOOL command %r SUCCESS', options.command_name)
826 except Error, e:
827 logging.exception(e)
828 sys.exit('GOOFTOOL command %r ERROR: %s' % (options.command_name, e))
829 except Exception, e:
830 logging.exception(e)
831 sys.exit('UNCAUGHT RUNTIME EXCEPTION %s' % e)
832
833
834if __name__ == '__main__':
835 Main()