blob: ed235ba327109c943c7d12d5f7906646876470c7 [file] [log] [blame]
Yilin Yang19da6932019-12-10 13:39:28 +08001#!/usr/bin/env python3
Jon Salze60307f2014-08-05 16:20:00 +08002# -*- coding: utf-8 -*-
3# Copyright 2014 The Chromium OS Authors. All rights reserved.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08004# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
Jon Salze60307f2014-08-05 16:20:00 +08007
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08008"""Google Factory Tool.
9
You-Cheng Syu461ec032017-03-06 15:56:58 +080010This tool is intended to be used on factory assembly lines. It
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080011provides all of the Google required test functionality and must be run
12on each device as part of the assembly process.
13"""
14
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080015import logging
16import os
Jon Salz65266432012-07-30 19:02:49 +080017import pipes
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080018import re
19import sys
Peter Shihfdf17682017-05-26 11:38:39 +080020from tempfile import gettempdir
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080021import threading
Hung-Te Lin6bd16472012-06-20 16:26:47 +080022import time
Yilin Yange02d5722019-10-23 11:07:36 +080023import xmlrpc.client
Peter Shihfdf17682017-05-26 11:38:39 +080024
Wei-Han Chen0a3320e2016-04-23 01:32:07 +080025from cros.factory.gooftool.common import ExecFactoryPar
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080026from cros.factory.gooftool.common import Shell
Peter Shihfdf17682017-05-26 11:38:39 +080027from cros.factory.gooftool.core import Gooftool
28from cros.factory.gooftool import crosfw
Peter Shihfdf17682017-05-26 11:38:39 +080029from cros.factory.gooftool import report_upload
Yong Hong65bda312018-12-13 20:05:58 +080030from cros.factory.gooftool import vpd
Hung-Te Lin604e0c22015-11-24 15:17:07 +080031from cros.factory.hwid.v3 import hwid_utils
Yong Hong863d3262017-10-30 16:23:34 +080032from cros.factory.probe.functions import chromeos_firmware
Wei-Han Chen2ebb92d2016-01-12 14:51:41 +080033from cros.factory.test.env import paths
Peter Shihfdf17682017-05-26 11:38:39 +080034from cros.factory.test import event_log
Wei-Han Chenaff56232016-04-16 09:17:59 +080035from cros.factory.test.rules import phase
Hung-Te Lin3f096842016-01-13 17:37:06 +080036from cros.factory.test.rules.privacy import FilterDict
Philip Chen6ada02c2019-11-04 19:41:54 +000037from cros.factory.test import state
Cheng Yueh14f50af2020-11-25 13:49:10 +080038from cros.factory.test.utils.cbi_utils import CbiEepromWpStatus
Peter Shihfdf17682017-05-26 11:38:39 +080039from cros.factory.utils import argparse_utils
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080040from cros.factory.utils.argparse_utils import CmdArg
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080041from cros.factory.utils.argparse_utils import ParseCmdline
Wei-Han Chenb34bdff2019-09-26 13:07:50 +080042from cros.factory.utils.argparse_utils import VERBOSITY_CMD_ARG
Peter Shihfdf17682017-05-26 11:38:39 +080043from cros.factory.utils.debug_utils import SetupLogging
Jon Salz40b9f822014-07-25 16:39:55 +080044from cros.factory.utils import file_utils
Peter Shih67c7c0f2018-02-26 11:23:59 +080045from cros.factory.utils.process_utils import Spawn
Wei-Han Chena5c01a02016-04-23 19:27:19 +080046from cros.factory.utils import sys_utils
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +080047from cros.factory.utils import time_utils
Joel Kitchingd3bc2662014-12-16 16:03:32 -080048from cros.factory.utils.type_utils import Error
Tammo Spalink86a61c62012-05-25 15:10:35 +080049
Tammo Spalink5c699832012-07-03 17:50:39 +080050
Tammo Spalink5c699832012-07-03 17:50:39 +080051# TODO(tammo): Replace calls to sys.exit with raise Exit, and maybe
52# treat that specially (as a smoot exit, as opposed to the more
53# verbose output for generic Error).
54
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080055_global_gooftool = None
56_gooftool_lock = threading.Lock()
Philip Chen04fb90b2019-11-06 12:10:33 -080057_has_fpmcu = None
Tammo Spalink5c699832012-07-03 17:50:39 +080058
Hung-Te Lin56b18402015-01-16 14:52:30 +080059
Ricky Lianga70a1202013-03-15 15:03:17 +080060def GetGooftool(options):
Peter Shihfdf17682017-05-26 11:38:39 +080061 global _global_gooftool # pylint: disable=global-statement
Ricky Lianga70a1202013-03-15 15:03:17 +080062
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080063 if _global_gooftool is None:
64 with _gooftool_lock:
Shen-En Shihc5d15d62017-08-04 13:02:59 +080065 if _global_gooftool is None:
66 project = getattr(options, 'project', None)
67 hwdb_path = getattr(options, 'hwdb_path', None)
68 _global_gooftool = Gooftool(hwid_version=3, project=project,
69 hwdb_path=hwdb_path)
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080070
71 return _global_gooftool
Ricky Lianga70a1202013-03-15 15:03:17 +080072
Philip Chen04fb90b2019-11-06 12:10:33 -080073def HasFpmcu():
74 global _has_fpmcu # pylint: disable=global-statement
75
76 if _has_fpmcu is None:
77 FPMCU_PATH = '/dev/cros_fp'
Philip Chen04fb90b2019-11-06 12:10:33 -080078 has_cros_config_fpmcu = False
Philip Chencf6642b2019-12-02 19:38:59 -080079 cros_config_output = Shell(['cros_config', '/fingerprint', 'board'])
80 if cros_config_output.success and cros_config_output.stdout:
Philip Chen04fb90b2019-11-06 12:10:33 -080081 has_cros_config_fpmcu = True
82
Alex Chou5b071392020-08-13 09:45:14 +080083 if not os.path.exists(FPMCU_PATH) and has_cros_config_fpmcu:
Philip Chen04fb90b2019-11-06 12:10:33 -080084 raise Error('FPMCU found in cros_config but missing in %s.' % FPMCU_PATH)
Philip Chen04fb90b2019-11-06 12:10:33 -080085
Alex Chou5b071392020-08-13 09:45:14 +080086 _has_fpmcu = has_cros_config_fpmcu
Philip Chen04fb90b2019-11-06 12:10:33 -080087
88 return _has_fpmcu
Hung-Te Lin56b18402015-01-16 14:52:30 +080089
Ting Shen18a06382016-08-30 16:18:21 +080090def Command(cmd_name, *args, **kwargs):
You-Cheng Syu8fc2a602017-12-22 17:05:05 +080091 """Decorator for commands in gooftool.
Ting Shen18a06382016-08-30 16:18:21 +080092
93 This is similar to argparse_utils.Command, but all gooftool commands
94 can be waived during `gooftool finalize` or `gooftool verify` using
Wei-Han Chen60c5d332017-01-05 17:15:10 +080095 --waive_list or --skip_list option.
Ting Shen18a06382016-08-30 16:18:21 +080096 """
97 def Decorate(fun):
Wei-Han Chen60c5d332017-01-05 17:15:10 +080098 def CommandWithWaiveSkipCheck(options):
Ting Shen18a06382016-08-30 16:18:21 +080099 waive_list = vars(options).get('waive_list', [])
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800100 skip_list = vars(options).get('skip_list', [])
101 if phase.GetPhase() >= phase.PVT_DOGFOOD and (
102 waive_list != [] or skip_list != []):
Ting Shen18a06382016-08-30 16:18:21 +0800103 raise Error(
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800104 'waive_list and skip_list should be empty for phase %s' %
105 phase.GetPhase())
Ting Shen18a06382016-08-30 16:18:21 +0800106
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800107 if cmd_name not in skip_list:
108 try:
109 fun(options)
110 except Exception as e:
111 if cmd_name in waive_list:
112 logging.exception(e)
113 else:
114 raise
Ting Shen18a06382016-08-30 16:18:21 +0800115
116 return argparse_utils.Command(cmd_name, *args, **kwargs)(
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800117 CommandWithWaiveSkipCheck)
Ting Shen18a06382016-08-30 16:18:21 +0800118 return Decorate
119
120
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800121@Command('write_hwid',
122 CmdArg('hwid', metavar='HWID', help='HWID string'))
Andy Chengc92e6f92012-11-20 16:55:53 +0800123def WriteHWID(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800124 """Write specified HWID value into the system BB."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800125
Tammo Spalink95c43732012-07-25 15:57:14 -0700126 logging.info('writing hwid string %r', options.hwid)
Ricky Lianga70a1202013-03-15 15:03:17 +0800127 GetGooftool(options).WriteHWID(options.hwid)
Andy Cheng0465d132013-03-20 12:12:06 +0800128 event_log.Log('write_hwid', hwid=options.hwid)
Yilin Yang71e39412019-09-24 09:26:46 +0800129 print('Wrote HWID: %r' % options.hwid)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800130
131
Yong Hongc3765412017-12-26 23:12:15 +0800132@Command('read_hwid')
133def ReadHWID(options):
134 """Read the HWID string from GBB."""
135
136 logging.info('reading the hwid string')
Yilin Yang71e39412019-09-24 09:26:46 +0800137 print(GetGooftool(options).ReadHWID())
Yong Hongc3765412017-12-26 23:12:15 +0800138
139
Yong Hong5408f652017-07-11 19:20:25 +0800140_project_cmd_arg = CmdArg(
141 '--project', metavar='PROJECT',
142 default=None, help='Project name to test.')
Ricky Liang53390232013-03-08 15:37:57 +0800143
Tammo Spalink8fab5312012-05-28 18:33:30 +0800144_hwdb_path_cmd_arg = CmdArg(
145 '--hwdb_path', metavar='PATH',
Yong Hong5c6dcd52017-12-27 11:05:01 +0800146 default=hwid_utils.GetDefaultDataPath(),
Tammo Spalink8fab5312012-05-28 18:33:30 +0800147 help='Path to the HWID database.')
148
Tammo Spalink95c43732012-07-25 15:57:14 -0700149_hwid_status_list_cmd_arg = CmdArg(
Hung-Te Lin56b18402015-01-16 14:52:30 +0800150 '--status', nargs='*', default=['supported'],
151 help='allow only HWIDs with these status values')
Tammo Spalink95c43732012-07-25 15:57:14 -0700152
Jon Salzce124fb2012-10-02 17:42:03 +0800153_probe_results_cmd_arg = CmdArg(
Yong Hong55050c12018-02-27 18:19:47 +0800154 '--probe_results', metavar='RESULTS.json',
155 help=('Output from "hwid probe" (used instead of probing this system).'))
Jon Salzce124fb2012-10-02 17:42:03 +0800156
Ricky Liang53390232013-03-08 15:37:57 +0800157_device_info_cmd_arg = CmdArg(
Ricky Liangf89f73a2013-03-19 05:00:24 +0800158 '--device_info', metavar='DEVICE_INFO.yaml', default=None,
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800159 help='A dict of device info to use instead of fetching from shopfloor '
Ricky Liang53390232013-03-08 15:37:57 +0800160 'server.')
161
Jon Salzce124fb2012-10-02 17:42:03 +0800162_hwid_cmd_arg = CmdArg(
163 '--hwid', metavar='HWID',
Ricky Lianga70a1202013-03-15 15:03:17 +0800164 help='HWID to verify (instead of the currently set HWID of this system).')
Jon Salzce124fb2012-10-02 17:42:03 +0800165
Yong Hong68a0e0d2017-12-20 19:06:54 +0800166_hwid_run_vpd_cmd_arg = CmdArg(
167 '--hwid-run-vpd', action='store_true',
168 help=('Specify the hwid utility to obtain the vpd data by running the '
169 '`vpd` commandline tool.'))
170
171_hwid_vpd_data_file_cmd_arg = CmdArg(
172 '--hwid-vpd-data-file', metavar='FILE.json', type=str, default=None,
173 help=('Specify the hwid utility to obtain the vpd data from the specified '
174 'file.'))
175
Cheng-Han Yang663763b2020-09-15 20:46:23 +0800176_no_write_protect_cmd_arg = CmdArg(
177 '--no_write_protect', action='store_true',
178 help='Do not enable firmware write protection.')
179
Bernie Thompson3c11c872013-07-22 18:22:45 -0700180_rma_mode_cmd_arg = CmdArg(
181 '--rma_mode', action='store_true',
182 help='Enable RMA mode, do not check for deprecated components.')
Tammo Spalink95c43732012-07-25 15:57:14 -0700183
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800184_cros_core_cmd_arg = CmdArg(
185 '--cros_core', action='store_true',
186 help='Finalize for ChromeOS Core devices (may add or remove few test '
Hung-Te Lin53c49402017-07-26 13:10:58 +0800187 'items. For example, registration codes or firmware bitmap '
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800188 'locale settings).')
189
Pin-Yen Lin215b7542020-05-05 09:45:37 +0800190_has_ec_pubkey_cmd_arg = CmdArg(
191 '--has_ec_pubkey', action='store_true', default=None,
192 help='The device has EC public key for EFS and need to run VerifyECKey.')
Yilun Lin599833f2017-12-22 14:07:46 +0800193
bowgotsai13820f42015-09-10 23:18:04 +0800194_enforced_release_channels_cmd_arg = CmdArg(
195 '--enforced_release_channels', nargs='*', default=None,
196 help='Enforced release image channels.')
197
Yilun Lin34f54802017-11-16 11:58:25 +0800198_ec_pubkey_path_cmd_arg = CmdArg(
199 '--ec_pubkey_path',
200 default=None,
201 help='Path to public key in vb2 format. Verify EC key with pubkey file.')
202
203_ec_pubkey_hash_cmd_arg = CmdArg(
204 '--ec_pubkey_hash',
205 default=None,
206 help='A string for public key hash. Verify EC key with the given hash.')
207
Hung-Te Lincdb96522016-04-15 16:51:10 +0800208_release_rootfs_cmd_arg = CmdArg(
209 '--release_rootfs', help='Location of release image rootfs partition.')
210
211_firmware_path_cmd_arg = CmdArg(
212 '--firmware_path', help='Location of firmware image partition.')
Ricky Liang43b879b2014-02-24 11:36:55 +0800213
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800214_shopfloor_url_args_cmd_arg = CmdArg(
215 '--shopfloor_url',
Earl Ou51182222016-09-09 12:16:48 +0800216 help='Shopfloor server url to be informed when wiping is done. '
217 'After wiping, a XML-RPC request will be sent to the '
218 'given url to indicate the completion of wiping.')
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800219
220_station_ip_cmd_arg = CmdArg(
221 '--station_ip',
222 help='IP of remote station')
223
224_station_port_cmd_arg = CmdArg(
225 '--station_port',
226 help='Port on remote station')
227
228_wipe_finish_token_cmd_arg = CmdArg(
229 '--wipe_finish_token',
230 help='Required token when notifying station after wipe finished')
231
Wei-Han Chenf3924112019-02-25 14:52:58 +0800232_keep_developer_mode_flag_after_clobber_state_cmd_arg = CmdArg(
233 # The argument name is super long because you should never use it by
234 # yourself when using command line tools.
235 '--keep_developer_mode_flag_after_clobber_state',
236 action='store_true', default=None,
237 help='After clobber-state, do not delete .developer_mode')
238
Ting Shen18a06382016-08-30 16:18:21 +0800239_waive_list_cmd_arg = CmdArg(
240 '--waive_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800241 help='A list of waived checks, separated by whitespace. '
242 'Each item should be a sub-command of gooftool. '
Ting Shen18a06382016-08-30 16:18:21 +0800243 'e.g. "gooftool verify --waive_list verify_tpm clear_gbb_flags".')
244
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800245_skip_list_cmd_arg = CmdArg(
246 '--skip_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800247 help='A list of skipped checks, separated by whitespace. '
248 'Each item should be a sub-command of gooftool. '
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800249 'e.g. "gooftool verify --skip_list verify_tpm clear_gbb_flags".')
250
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800251_test_umount_cmd_arg = CmdArg(
252 '--test_umount', action='store_true',
253 help='(For testing only) Only umount rootfs and stateful partition '
254 'instead of running full wiping and cutoff process.')
255
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800256_rlz_embargo_end_date_offset_cmd_arg = CmdArg(
Kevin Line4c64de2019-11-22 15:28:34 +0800257 '--embargo_offset', type=int, default=7, choices=list(range(7, 15)),
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800258 help='Change the offset of embargo end date, cannot less than 7 days or '
259 'more than 14 days.')
260
Marco Chena681b2e2018-08-31 11:41:41 +0800261_no_ectool_cmd_arg = CmdArg(
262 '--no_ectool', action='store_false', dest='has_ectool',
263 help='There is no ectool utility so tests rely on ectool should be '
264 'skipped.')
Tammo Spalink8fab5312012-05-28 18:33:30 +0800265
chuntsenaf1232f2019-03-20 15:45:54 +0800266_no_generate_mfg_date_cmd_arg = CmdArg(
267 '--no_generate_mfg_date', action='store_false', dest='generate_mfg_date',
268 help='Do not generate manufacturing date nor write mfg_date into VPD.')
269
Stimim Chenc9fbdfc2020-05-21 17:00:53 +0800270_enable_zero_touch_cmd_arg = CmdArg(
271 '--enable_zero_touch', action='store_true',
272 help='Set attested_device_id for zero-touch feature.')
273
Cheng Yueh14f50af2020-11-25 13:49:10 +0800274_cbi_eeprom_wp_status_cmd_arg = CmdArg(
275 '--cbi_eeprom_wp_status', type=str, default=CbiEepromWpStatus.Locked,
276 choices=CbiEepromWpStatus,
277 help='The expected status of CBI EEPROM after factory mode disabled.')
278
chuntsenaf1232f2019-03-20 15:45:54 +0800279
Yilun Lin34f54802017-11-16 11:58:25 +0800280@Command(
281 'verify_ec_key',
282 _ec_pubkey_path_cmd_arg,
283 _ec_pubkey_hash_cmd_arg)
284def VerifyECKey(options):
285 """Verify EC key."""
286 return GetGooftool(options).VerifyECKey(
287 options.ec_pubkey_path, options.ec_pubkey_hash)
288
289
Philip Chen84c16262020-07-30 17:35:27 -0700290@Command('verify_fp_key')
291def VerifyFpKey(options):
292 """Verify fingerprint firmware key."""
293 return GetGooftool(options).VerifyFpKey()
294
295
Hung-Te Line1d80f62016-03-31 14:58:13 +0800296@Command('verify_keys',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800297 _release_rootfs_cmd_arg,
298 _firmware_path_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800299def VerifyKeys(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800300 """Verify keys in firmware and SSD match."""
Hung-Te Line1d80f62016-03-31 14:58:13 +0800301 return GetGooftool(options).VerifyKeys(
Hung-Te Lincdb96522016-04-15 16:51:10 +0800302 options.release_rootfs, options.firmware_path)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800303
304
305@Command('set_fw_bitmap_locale')
Peter Shihfdf17682017-05-26 11:38:39 +0800306def SetFirmwareBitmapLocale(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800307 """Use VPD locale value to set firmware bitmap default language."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800308
Ricky Lianga70a1202013-03-15 15:03:17 +0800309 (index, locale) = GetGooftool(options).SetFirmwareBitmapLocale()
Andy Cheng2582d292012-12-04 17:38:28 +0800310 logging.info('Firmware bitmap initial locale set to %d (%s).',
311 index, locale)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800312
313
Hung-Te Line1d80f62016-03-31 14:58:13 +0800314@Command('verify_system_time',
Wei-Han Chen2790d2e2019-01-18 21:13:40 +0800315 _release_rootfs_cmd_arg,
316 _rma_mode_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800317def VerifySystemTime(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800318 """Verify system time is later than release filesystem creation time."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800319
Wei-Han Chen2790d2e2019-01-18 21:13:40 +0800320 return GetGooftool(options).VerifySystemTime(options.release_rootfs,
321 rma_mode=options.rma_mode)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800322
323
Hung-Te Line1d80f62016-03-31 14:58:13 +0800324@Command('verify_rootfs',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800325 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800326def VerifyRootFs(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800327 """Verify rootfs on SSD is valid by checking hash."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800328
Hung-Te Line1d80f62016-03-31 14:58:13 +0800329 return GetGooftool(options).VerifyRootFs(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800330
Hung-Te Lin56b18402015-01-16 14:52:30 +0800331
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800332@Command('verify_tpm')
Peter Shihfdf17682017-05-26 11:38:39 +0800333def VerifyTPM(options):
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800334 """Verify TPM is cleared."""
335
336 return GetGooftool(options).VerifyTPM()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800337
Hung-Te Lin56b18402015-01-16 14:52:30 +0800338
Hung-Te Lindd708d42014-07-11 17:05:01 +0800339@Command('verify_me_locked')
Peter Shihfdf17682017-05-26 11:38:39 +0800340def VerifyManagementEngineLocked(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800341 """Verify Management Engine is locked."""
Hung-Te Lindd708d42014-07-11 17:05:01 +0800342
343 return GetGooftool(options).VerifyManagementEngineLocked()
344
Hung-Te Lin56b18402015-01-16 14:52:30 +0800345
Marco Chena681b2e2018-08-31 11:41:41 +0800346@Command('verify_switch_wp',
347 _no_ectool_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800348def VerifyWPSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800349 """Verify hardware write protection switch is enabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800350
Marco Chena681b2e2018-08-31 11:41:41 +0800351 GetGooftool(options).VerifyWPSwitch(options.has_ectool)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800352
353
Hung-Te Lin53c49402017-07-26 13:10:58 +0800354@Command('verify_vpd')
355def VerifyVPD(options):
356 """Verify that VPD values are properly set.
Jon Salzadd90d32014-04-29 16:16:27 +0800357
Hung-Te Lin53c49402017-07-26 13:10:58 +0800358 Check if mandatory fields are set, and deprecated fields don't exist.
Jon Salzadd90d32014-04-29 16:16:27 +0800359 """
Hung-Te Lin53c49402017-07-26 13:10:58 +0800360 return GetGooftool(options).VerifyVPD()
Jon Salzadd90d32014-04-29 16:16:27 +0800361
362
bowgotsai13820f42015-09-10 23:18:04 +0800363@Command('verify_release_channel',
364 _enforced_release_channels_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800365def VerifyReleaseChannel(options):
bowgotsai529139c2015-05-30 01:39:49 +0800366 """Verify that release image channel is correct.
367
368 ChromeOS has four channels: canary, dev, beta and stable.
369 The last three channels support image auto-updates, checks
370 that release image channel is one of them.
371 """
bowgotsai13820f42015-09-10 23:18:04 +0800372 return GetGooftool(options).VerifyReleaseChannel(
373 options.enforced_release_channels)
bowgotsai529139c2015-05-30 01:39:49 +0800374
375
Wei-Han Chen0de7cfd2020-01-03 16:49:20 +0800376@Command('verify_cros_config')
377def VerifyCrosConfig(options):
378 """Verify entries in cros config make sense."""
379 return GetGooftool(options).VerifyCrosConfig()
380
381
Stimim Chenc9fbdfc2020-05-21 17:00:53 +0800382@Command('verify-sn-bits',
383 _enable_zero_touch_cmd_arg)
Stimim Chen8aaa2952020-05-20 13:04:24 +0800384def VerifySnBits(options):
Stimim Chenc9fbdfc2020-05-21 17:00:53 +0800385 if options.enable_zero_touch:
386 GetGooftool(options).VerifySnBits()
Stimim Chen8aaa2952020-05-20 13:04:24 +0800387
388
Cheng Yueh14f50af2020-11-25 13:49:10 +0800389@Command(
390 'verify_cbi_eeprom_wp_status',
391 _cbi_eeprom_wp_status_cmd_arg,
392)
393def VerifyCBIEEPROMWPStatus(options):
394 """Verify CBI EEPROM status.
395
396 If cbi_eeprom_wp_status is Absent, CBI EEPROM must be absent. If
397 cbi_eeprom_wp_status is Locked, write protection must be on. Otherwise, write
398 protection must be off.
399 """
400
401 return GetGooftool(options).VerifyCBIEEPROMWPStatus(
402 options.cbi_eeprom_wp_status)
403
404
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800405@Command('write_protect')
Peter Shihfdf17682017-05-26 11:38:39 +0800406def EnableFwWp(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800407 """Enable then verify firmware write protection."""
Peter Shihfdf17682017-05-26 11:38:39 +0800408 del options # Unused.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800409
Yong Hongdad230a2017-08-30 22:25:19 +0800410 def WriteProtect(fw):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800411 """Calculate protection size, then invoke flashrom.
412
Yong Hongdad230a2017-08-30 22:25:19 +0800413 The region (offset and size) to write protect may be different per chipset
414 and firmware layout, so we have to read the WP_RO section from FMAP to
415 decide that.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800416 """
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800417 wp_section = 'WP_RO'
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800418
Yong Hongdad230a2017-08-30 22:25:19 +0800419 fmap_image = fw.GetFirmwareImage(
420 sections=(['FMAP'] if fw.target == crosfw.TARGET_MAIN else None))
421 if not fmap_image.has_section(wp_section):
422 raise Error('Could not find %s firmware section: %s' %
423 (fw.target.upper(), wp_section))
424
425 section_data = fw.GetFirmwareImage(
426 sections=[wp_section]).get_section_area(wp_section)
Peter Shihe6afab32018-09-11 17:16:48 +0800427 ro_offset, ro_size = section_data[0:2]
Yong Hongdad230a2017-08-30 22:25:19 +0800428
429 logging.debug('write protecting %s [off=%x size=%x]', fw.target.upper(),
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800430 ro_offset, ro_size)
Yong Hongdad230a2017-08-30 22:25:19 +0800431 crosfw.Flashrom(fw.target).EnableWriteProtection(ro_offset, ro_size)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800432
Philip Chendbb06202019-11-05 17:24:26 -0800433 if HasFpmcu():
434 # TODO(b/143991572): Implement enable_fpmcu_write_protection in gooftool.
435 cmd = os.path.join(
436 paths.FACTORY_DIR, 'sh', 'enable_fpmcu_write_protection.sh')
437 cmd_result = Shell(cmd)
438 if not cmd_result.success:
439 raise Error(
440 'Failed to enable FPMCU write protection, stdout=%r, stderr=%r' %
441 (cmd_result.stdout, cmd_result.stderr))
442
Yong Hongdad230a2017-08-30 22:25:19 +0800443 WriteProtect(crosfw.LoadMainFirmware())
Andy Cheng0465d132013-03-20 12:12:06 +0800444 event_log.Log('wp', fw='main')
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800445
Fei Shao21be8242020-04-13 16:57:51 +0800446 # Some EC (mostly PD) does not support "RO_NOW". Instead they will only set
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800447 # "RO_AT_BOOT" when you request to enable RO (These platforms consider
448 # --wp-range with right range identical to --wp-enable), and requires a
449 # 'ectool reboot_ec RO at-shutdown; reboot' to let the RO take effect.
Hung-Te Lin0d10b562016-12-28 10:58:07 +0800450 # After reboot, "flashrom -p host --wp-status" will return protected range.
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800451 # If you don't reboot, returned range will be (0, 0), and running command
452 # "ectool flashprotect" will not have RO_NOW.
Fei Shao21be8242020-04-13 16:57:51 +0800453 # generic_common.test_list.json provides "EnableECWriteProtect" test group
454 # which can be run individually before finalization. Try that out if you're
455 # having trouble enabling RO_NOW flag.
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800456
Yong Hongdad230a2017-08-30 22:25:19 +0800457 for fw in [crosfw.LoadEcFirmware(), crosfw.LoadPDFirmware()]:
458 if fw.GetChipId() is None:
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800459 logging.warning('%s not write protected (seems there is no %s flash).',
Yong Hongdad230a2017-08-30 22:25:19 +0800460 fw.target.upper(), fw.target.upper())
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800461 continue
Yong Hongdad230a2017-08-30 22:25:19 +0800462 WriteProtect(fw)
463 event_log.Log('wp', fw=fw.target)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800464
465
466@Command('clear_gbb_flags')
Peter Shihfdf17682017-05-26 11:38:39 +0800467def ClearGBBFlags(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800468 """Zero out the GBB flags, in preparation for transition to release state.
469
470 No GBB flags are set in release/shipping state, but they are useful
Hung-Te Lin879cff42017-06-19 12:46:37 +0800471 for factory/development. See "futility gbb --flags" for details.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800472 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800473
Ricky Lianga70a1202013-03-15 15:03:17 +0800474 GetGooftool(options).ClearGBBFlags()
Andy Cheng0465d132013-03-20 12:12:06 +0800475 event_log.Log('clear_gbb_flags')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800476
477
Jon Salzaa3a30e2013-05-15 15:56:28 +0800478@Command('clear_factory_vpd_entries')
Peter Shihfdf17682017-05-26 11:38:39 +0800479def ClearFactoryVPDEntries(options):
Jon Salzaa3a30e2013-05-15 15:56:28 +0800480 """Clears factory.* items in the RW VPD."""
481 entries = GetGooftool(options).ClearFactoryVPDEntries()
482 event_log.Log('clear_factory_vpd_entries', entries=FilterDict(entries))
483
484
Mattias Nisslercca761b2015-04-15 21:53:04 +0200485@Command('generate_stable_device_secret')
Peter Shihfdf17682017-05-26 11:38:39 +0800486def GenerateStableDeviceSecret(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800487 """Generates a fresh stable device secret and stores it in the RO VPD."""
Mattias Nisslercca761b2015-04-15 21:53:04 +0200488 GetGooftool(options).GenerateStableDeviceSecret()
489 event_log.Log('generate_stable_device_secret')
490
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800491
Cheng-Han Yang24d42d92020-08-09 04:53:53 +0800492@Command('cr50_set_ro_hash')
493def Cr50SetROHash(options):
494 GetGooftool(options).Cr50SetROHash()
495 event_log.Log('cr50_set_ro_hash')
496
Stimim Chenda9e62c2020-05-14 15:43:18 +0800497@Command('cr50_set_sn_bits_and_board_id',
498 _rma_mode_cmd_arg)
Yves Arrouyeb49b31e2019-03-06 21:51:52 -0800499def Cr50SetSnBitsAndBoardId(options):
Wei-Han Chen66357592020-01-14 15:15:37 +0800500 """Deprecated: use Cr50WriteFlashInfo instead."""
501 logging.warning('This function is renamed to Cr50WriteFlashInfo')
502 Cr50WriteFlashInfo(options)
503
504
Stimim Chen60f7bb22020-04-07 21:02:47 +0800505@Command('cr50_write_flash_info',
Stimim Chenda9e62c2020-05-14 15:43:18 +0800506 _rma_mode_cmd_arg,
Stimim Chenc9fbdfc2020-05-21 17:00:53 +0800507 _enable_zero_touch_cmd_arg)
Wei-Han Chen66357592020-01-14 15:15:37 +0800508def Cr50WriteFlashInfo(options):
Yves Arrouyeb49b31e2019-03-06 21:51:52 -0800509 """Set the serial number bits, board id and flags on the Cr50 chip."""
Stimim Chenc9fbdfc2020-05-21 17:00:53 +0800510 GetGooftool(options).Cr50WriteFlashInfo(
511 options.enable_zero_touch, options.rma_mode)
Wei-Han Chen66357592020-01-14 15:15:37 +0800512 event_log.Log('cr50_write_flash_info')
513
514
515@Command('cr50_write_whitelabel_flags')
516def Cr50WriteWhitelabelFlags(options):
517 GetGooftool(options).Cr50WriteWhitelabelFlags()
518 event_log.Log('cr50_write_whitelabel_flags')
Shen-En Shihd078a7c2017-08-04 13:33:49 +0800519
520
Marco Chen20c885d2018-10-04 17:22:03 +0800521@Command('cr50_disable_factory_mode')
Marco Chen44a666d2018-07-13 21:01:50 +0800522def Cr50DisableFactoryMode(options):
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800523 """Reset Cr50 state back to default state after RMA."""
Marco Chen44a666d2018-07-13 21:01:50 +0800524 return GetGooftool(options).Cr50DisableFactoryMode()
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800525
526
Cheng-Han Yang663763b2020-09-15 20:46:23 +0800527@Command('cr50_finalize',
528 _no_write_protect_cmd_arg,
529 _rma_mode_cmd_arg,
530 _enable_zero_touch_cmd_arg)
531def Cr50Finalize(options):
532 """Finalize steps for cr50."""
533 if options.no_write_protect:
534 logging.warning('SWWP is not enabled. Skip setting RO hash.')
535 elif options.rma_mode:
536 logging.warning('RMA mode. Skip setting RO hash.')
537 else:
538 Cr50SetROHash(options)
539 Cr50WriteFlashInfo(options)
540 Cr50DisableFactoryMode(options)
541
542
Earl Ou564a7872016-10-05 10:22:00 +0800543@Command('enable_release_partition',
544 CmdArg('--release_rootfs',
545 help=('path to the release rootfs device. If not specified, '
546 'the default (5th) partition will be used.')))
547def EnableReleasePartition(options):
548 """Enables a release image partition on the disk."""
549 GetGooftool(options).EnableReleasePartition(options.release_rootfs)
550
551
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800552@Command('wipe_in_place',
553 CmdArg('--fast', action='store_true',
Shun-Hsing Ou8d3c40a2015-10-08 18:16:08 +0800554 help='use non-secure but faster wipe method.'),
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800555 _shopfloor_url_args_cmd_arg,
556 _station_ip_cmd_arg,
557 _station_port_cmd_arg,
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800558 _wipe_finish_token_cmd_arg,
559 _test_umount_cmd_arg)
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800560def WipeInPlace(options):
561 """Start factory wipe directly without reboot."""
562
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800563 GetGooftool(options).WipeInPlace(options.fast,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800564 options.shopfloor_url,
565 options.station_ip,
566 options.station_port,
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800567 options.wipe_finish_token,
568 options.test_umount)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200569
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800570@Command('wipe_init',
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800571 CmdArg('--wipe_args', help='arguments for clobber-state'),
572 CmdArg('--state_dev', help='path to stateful partition device'),
573 CmdArg('--root_disk', help='path to primary device'),
574 CmdArg('--old_root', help='path to old root'),
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800575 _shopfloor_url_args_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800576 _release_rootfs_cmd_arg,
577 _station_ip_cmd_arg,
578 _station_port_cmd_arg,
Wei-Han Chenf3924112019-02-25 14:52:58 +0800579 _wipe_finish_token_cmd_arg,
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800580 _keep_developer_mode_flag_after_clobber_state_cmd_arg,
581 _test_umount_cmd_arg)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800582def WipeInit(options):
Wei-Han Chenf3924112019-02-25 14:52:58 +0800583 GetGooftool(options).WipeInit(
584 options.wipe_args,
585 options.shopfloor_url,
586 options.state_dev,
587 options.release_rootfs,
588 options.root_disk,
589 options.old_root,
590 options.station_ip,
591 options.station_port,
592 options.wipe_finish_token,
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800593 options.keep_developer_mode_flag_after_clobber_state,
594 options.test_umount)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800595
Stimim Chen8aaa2952020-05-20 13:04:24 +0800596
Cheng Yueh14f50af2020-11-25 13:49:10 +0800597@Command(
598 'verify',
599 _hwid_status_list_cmd_arg,
600 _hwdb_path_cmd_arg,
601 _project_cmd_arg,
602 _probe_results_cmd_arg,
603 _hwid_cmd_arg,
604 _hwid_run_vpd_cmd_arg,
605 _hwid_vpd_data_file_cmd_arg,
606 _no_write_protect_cmd_arg,
607 _rma_mode_cmd_arg,
608 _cros_core_cmd_arg,
609 _has_ec_pubkey_cmd_arg,
610 _ec_pubkey_path_cmd_arg,
611 _ec_pubkey_hash_cmd_arg,
612 _release_rootfs_cmd_arg,
613 _firmware_path_cmd_arg,
614 _enforced_release_channels_cmd_arg,
615 _waive_list_cmd_arg,
616 _skip_list_cmd_arg,
617 _no_ectool_cmd_arg,
618 _enable_zero_touch_cmd_arg,
619 _cbi_eeprom_wp_status_cmd_arg,
620)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800621def Verify(options):
622 """Verifies if whole factory process is ready for finalization.
623
624 This routine performs all the necessary checks to make sure the
625 device is ready to be finalized, but does not modify state. These
626 checks include dev switch, firmware write protection switch, hwid,
627 system time, keys, and root file system.
628 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800629
Hung-Te Lin6d827542012-07-19 11:50:41 +0800630 if not options.no_write_protect:
Ricky Lianga70a1202013-03-15 15:03:17 +0800631 VerifyWPSwitch(options)
Hung-Te Lindd708d42014-07-11 17:05:01 +0800632 VerifyManagementEngineLocked(options)
Cheng Yueh14f50af2020-11-25 13:49:10 +0800633 VerifyCBIEEPROMWPStatus(options)
Ting Shen129fa6f2016-09-02 12:22:24 +0800634 VerifyHWID(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800635 VerifySystemTime(options)
Pin-Yen Lin215b7542020-05-05 09:45:37 +0800636 if options.has_ec_pubkey:
Yilun Lin599833f2017-12-22 14:07:46 +0800637 VerifyECKey(options)
Philip Chen84c16262020-07-30 17:35:27 -0700638 if HasFpmcu():
639 VerifyFpKey(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800640 VerifyKeys(options)
641 VerifyRootFs(options)
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800642 VerifyTPM(options)
Hung-Te Lin53c49402017-07-26 13:10:58 +0800643 VerifyVPD(options)
bowgotsai529139c2015-05-30 01:39:49 +0800644 VerifyReleaseChannel(options)
Wei-Han Chen0de7cfd2020-01-03 16:49:20 +0800645 VerifyCrosConfig(options)
Stimim Chen8aaa2952020-05-20 13:04:24 +0800646 VerifySnBits(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800647
Hung-Te Lin56b18402015-01-16 14:52:30 +0800648
Jon Salzfe9036f2014-01-16 14:11:23 +0800649@Command('untar_stateful_files')
Hung-Te Lin388bce22014-06-03 19:56:40 +0800650def UntarStatefulFiles(unused_options):
Jon Salzfe9036f2014-01-16 14:11:23 +0800651 """Untars stateful files from stateful_files.tar.xz on stateful partition.
652
653 If that file does not exist (which should only be R30 and earlier),
654 this is a no-op.
655 """
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800656 # Path to stateful partition on device.
657 device_stateful_path = '/mnt/stateful_partition'
658 tar_file = os.path.join(device_stateful_path, 'stateful_files.tar.xz')
Jon Salzfe9036f2014-01-16 14:11:23 +0800659 if os.path.exists(tar_file):
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800660 Spawn(['tar', 'xf', tar_file], cwd=device_stateful_path,
Jon Salzfe9036f2014-01-16 14:11:23 +0800661 log=True, check_call=True)
662 else:
663 logging.warning('No stateful files at %s', tar_file)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800664
Jon Salz40b9f822014-07-25 16:39:55 +0800665
666@Command('log_source_hashes')
Peter Shihfdf17682017-05-26 11:38:39 +0800667def LogSourceHashes(options):
Jon Salz40b9f822014-07-25 16:39:55 +0800668 """Logs hashes of source files in the factory toolkit."""
Peter Shihfdf17682017-05-26 11:38:39 +0800669 del options # Unused.
Jon Salze60307f2014-08-05 16:20:00 +0800670 # WARNING: The following line is necessary to validate the integrity
671 # of the factory software. Do not remove or modify it.
672 #
673 # 警告:此行会验证工厂软件的完整性,禁止删除或修改。
Wei-Han Chena5c01a02016-04-23 19:27:19 +0800674 factory_par = sys_utils.GetRunningFactoryPythonArchivePath()
675 if factory_par:
676 event_log.Log(
677 'source_hashes',
678 **file_utils.HashPythonArchive(factory_par))
679 else:
680 event_log.Log(
681 'source_hashes',
Peter Shihad166772017-05-31 11:36:17 +0800682 **file_utils.HashSourceTree(os.path.join(paths.FACTORY_DIR, 'py')))
Jon Salz40b9f822014-07-25 16:39:55 +0800683
684
Tammo Spalink86a61c62012-05-25 15:10:35 +0800685@Command('log_system_details')
Peter Shihfdf17682017-05-26 11:38:39 +0800686def LogSystemDetails(options):
Tammo Spalink86a61c62012-05-25 15:10:35 +0800687 """Write miscellaneous system details to the event log."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800688
Ricky Liang43b879b2014-02-24 11:36:55 +0800689 event_log.Log('system_details', **GetGooftool(options).GetSystemDetails())
Tammo Spalink86a61c62012-05-25 15:10:35 +0800690
691
Jon Salza88b83b2013-05-27 20:00:35 +0800692def CreateReportArchiveBlob(*args, **kwargs):
693 """Creates a report archive and returns it as a blob.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800694
Jon Salza88b83b2013-05-27 20:00:35 +0800695 Args:
696 See CreateReportArchive.
Andy Cheng7a76cb82012-11-19 18:08:19 +0800697
Jon Salza88b83b2013-05-27 20:00:35 +0800698 Returns:
Yilin Yange02d5722019-10-23 11:07:36 +0800699 An xmlrpc.client.Binary object containing a .tar.xz file.
Jon Salza88b83b2013-05-27 20:00:35 +0800700 """
Wei-Han Chen47416612016-09-14 17:41:52 +0800701 report_archive = CreateReportArchive(*args, **kwargs)
702 try:
Yilin Yangf6994c22019-12-09 16:17:21 +0800703 return xmlrpc.client.Binary(
704 file_utils.ReadFile(report_archive, encoding=None))
Wei-Han Chen47416612016-09-14 17:41:52 +0800705 finally:
706 os.unlink(report_archive)
Jon Salza88b83b2013-05-27 20:00:35 +0800707
708
709def CreateReportArchive(device_sn=None, add_file=None):
710 """Creates a report archive in a temporary directory.
711
712 Args:
713 device_sn: The device serial number (optional).
714 add_file: A list of files to add (optional).
715
716 Returns:
717 Path to the archive.
718 """
Philip Chen6ada02c2019-11-04 19:41:54 +0000719 # Flush Testlog data to DATA_TESTLOG_DIR before creating a report archive.
720 result, reason = state.GetInstance().FlushTestlog(
721 uplink=False, local=True, timeout=10)
722 if not result:
723 logging.warning('Failed to flush testlog data: %s', reason)
724
Hung-Te Lin6bd16472012-06-20 16:26:47 +0800725 def NormalizeAsFileName(token):
726 return re.sub(r'\W+', '', token).strip()
Jon Salza88b83b2013-05-27 20:00:35 +0800727
728 target_name = '%s%s.tar.xz' % (
729 time.strftime('%Y%m%dT%H%M%SZ',
730 time.gmtime()),
Hung-Te Lin56b18402015-01-16 14:52:30 +0800731 ('' if device_sn is None else
732 '_' + NormalizeAsFileName(device_sn)))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800733 target_path = os.path.join(gettempdir(), target_name)
Jon Salza88b83b2013-05-27 20:00:35 +0800734
Tammo Spalink86a61c62012-05-25 15:10:35 +0800735 # Intentionally ignoring dotfiles in EVENT_LOG_DIR.
Pi-Hsun Shih1f569a72019-12-26 11:23:56 +0800736 tar_cmd = 'cd %s ; tar cJf %s * -C /' % (event_log.EVENT_LOG_DIR, target_path)
Jongpil Jung23355a92019-12-31 14:38:29 +0900737 tar_files = [paths.FACTORY_LOG_PATH, paths.DATA_TESTLOG_DIR]
738 if add_file:
739 tar_files = tar_files + add_file
Pi-Hsun Shih1f569a72019-12-26 11:23:56 +0800740 for f in tar_files:
741 # Require absolute paths since we use -C / to change current directory to
742 # root.
743 if not f.startswith('/'):
744 raise Error('Not an absolute path: %s' % f)
745 if not os.path.exists(f):
746 raise Error('File does not exist: %s' % f)
747 tar_cmd += ' %s' % pipes.quote(f[1:])
Tammo Spalink86a61c62012-05-25 15:10:35 +0800748 cmd_result = Shell(tar_cmd)
Jon Salzff88c022012-11-03 12:19:58 +0800749
Hung-Te Lin3756c432020-01-16 11:30:46 +0800750 if cmd_result.status == 1:
751 # tar returns 1 when some files were changed during archiving,
752 # but that is expected for log files so should ignore such failure
753 # if the archive looks good.
Pi-Hsun Shih1f569a72019-12-26 11:23:56 +0800754 Spawn(['tar', 'tJf', target_path], check_call=True, log=True,
Jon Salzff88c022012-11-03 12:19:58 +0800755 ignore_stdout=True)
756 elif not cmd_result.success:
Tammo Spalink86a61c62012-05-25 15:10:35 +0800757 raise Error('unable to tar event logs, cmd %r failed, stderr: %r' %
758 (tar_cmd, cmd_result.stderr))
Jon Salzff88c022012-11-03 12:19:58 +0800759
Jon Salza88b83b2013-05-27 20:00:35 +0800760 return target_path
761
762_upload_method_cmd_arg = CmdArg(
763 '--upload_method', metavar='METHOD:PARAM',
764 help=('How to perform the upload. METHOD should be one of '
Kevin Line4c64de2019-11-22 15:28:34 +0800765 '{ftp, shopfloor, ftps, cpfe, smb}.'))
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800766_upload_max_retry_times_arg = CmdArg(
767 '--upload_max_retry_times', type=int, default=0,
768 help='Number of tries to upload. 0 to retry infinitely.')
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800769_upload_retry_interval_arg = CmdArg(
770 '--upload_retry_interval', type=int, default=None,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800771 help='Retry interval in seconds.')
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800772_upload_allow_fail_arg = CmdArg(
773 '--upload_allow_fail', action='store_true',
774 help='Continue finalize if report upload fails.')
Jon Salza88b83b2013-05-27 20:00:35 +0800775_add_file_cmd_arg = CmdArg(
776 '--add_file', metavar='FILE', action='append',
777 help='Extra file to include in report (must be an absolute path)')
778
Hung-Te Lin56b18402015-01-16 14:52:30 +0800779
Jon Salza88b83b2013-05-27 20:00:35 +0800780@Command('upload_report',
781 _upload_method_cmd_arg,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800782 _upload_max_retry_times_arg,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800783 _upload_retry_interval_arg,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800784 _upload_allow_fail_arg,
Jon Salza88b83b2013-05-27 20:00:35 +0800785 _add_file_cmd_arg)
786def UploadReport(options):
787 """Create a report containing key device details."""
Yong Hong65bda312018-12-13 20:05:58 +0800788 ro_vpd = vpd.VPDTool().GetAllData(partition=vpd.VPD_READONLY_PARTITION_NAME)
Jon Salza88b83b2013-05-27 20:00:35 +0800789 device_sn = ro_vpd.get('serial_number', None)
790 if device_sn is None:
791 logging.warning('RO_VPD missing device serial number')
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +0800792 device_sn = 'MISSING_SN_' + time_utils.TimedUUID()
chuntsena6da2be2019-08-14 17:11:55 +0800793 target_path = CreateReportArchive(device_sn, options.add_file)
Jon Salza88b83b2013-05-27 20:00:35 +0800794
Tammo Spalink86a61c62012-05-25 15:10:35 +0800795 if options.upload_method is None or options.upload_method == 'none':
796 logging.warning('REPORT UPLOAD SKIPPED (report left at %s)', target_path)
797 return
798 method, param = options.upload_method.split(':', 1)
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800799
800 if options.upload_retry_interval is not None:
801 retry_interval = options.upload_retry_interval
802 else:
803 retry_interval = report_upload.DEFAULT_RETRY_INTERVAL
804
Tammo Spalink86a61c62012-05-25 15:10:35 +0800805 if method == 'shopfloor':
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800806 report_upload.ShopFloorUpload(
807 target_path, param,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800808 'GRT' if options.command_name == 'finalize' else None,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800809 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800810 retry_interval=retry_interval,
811 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800812 elif method == 'ftp':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800813 report_upload.FtpUpload(target_path, 'ftp:' + param,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800814 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800815 retry_interval=retry_interval,
816 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800817 elif method == 'ftps':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800818 report_upload.CurlUrlUpload(target_path, '--ftp-ssl-reqd ftp:%s' % param,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800819 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800820 retry_interval=retry_interval,
821 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800822 elif method == 'cpfe':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800823 report_upload.CpfeUpload(target_path, pipes.quote(param),
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800824 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800825 retry_interval=retry_interval,
826 allow_fail=options.upload_allow_fail)
Kevin Line4c64de2019-11-22 15:28:34 +0800827 elif method == 'smb':
828 # param should be in form: <dest_path>.
829 report_upload.SmbUpload(target_path, 'smb:' + param,
830 max_retry_times=options.upload_max_retry_times,
831 retry_interval=retry_interval,
832 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800833 else:
Peter Shihbf6f22b2018-02-26 14:05:28 +0800834 raise Error('unknown report upload method %r' % method)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800835
836
Cheng Yueh14f50af2020-11-25 13:49:10 +0800837@Command(
838 'finalize',
839 CmdArg('--fast', action='store_true',
840 help='use non-secure but faster wipe method.'),
841 _no_ectool_cmd_arg,
842 _shopfloor_url_args_cmd_arg,
843 _hwdb_path_cmd_arg,
844 _hwid_status_list_cmd_arg,
845 _upload_method_cmd_arg,
846 _upload_max_retry_times_arg,
847 _upload_retry_interval_arg,
848 _upload_allow_fail_arg,
849 _add_file_cmd_arg,
850 _probe_results_cmd_arg,
851 _hwid_cmd_arg,
852 _hwid_run_vpd_cmd_arg,
853 _hwid_vpd_data_file_cmd_arg,
854 _no_write_protect_cmd_arg,
855 _rma_mode_cmd_arg,
856 _cros_core_cmd_arg,
857 _has_ec_pubkey_cmd_arg,
858 _ec_pubkey_path_cmd_arg,
859 _ec_pubkey_hash_cmd_arg,
860 _release_rootfs_cmd_arg,
861 _firmware_path_cmd_arg,
862 _enforced_release_channels_cmd_arg,
863 _station_ip_cmd_arg,
864 _station_port_cmd_arg,
865 _wipe_finish_token_cmd_arg,
866 _rlz_embargo_end_date_offset_cmd_arg,
867 _waive_list_cmd_arg,
868 _skip_list_cmd_arg,
869 _no_generate_mfg_date_cmd_arg,
870 _enable_zero_touch_cmd_arg,
871 _cbi_eeprom_wp_status_cmd_arg,
872)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800873def Finalize(options):
874 """Verify system readiness and trigger transition into release state.
875
Jon Salzaa3a30e2013-05-15 15:56:28 +0800876 This routine does the following:
877 - Verifies system state (see verify command)
Jon Salzfe9036f2014-01-16 14:11:23 +0800878 - Untars stateful_files.tar.xz, if it exists, in the stateful partition, to
879 initialize files such as the CRX cache
Jon Salzaa3a30e2013-05-15 15:56:28 +0800880 - Modifies firmware bitmaps to match locale
881 - Clears all factory-friendly flags from the GBB
882 - Removes factory-specific entries from RW_VPD (factory.*)
883 - Enables firmware write protection (cannot rollback after this)
Marco Chenecee04f2019-02-15 22:24:24 +0800884 - Initialize Fpmcu entropy
Jon Salzaa3a30e2013-05-15 15:56:28 +0800885 - Uploads system logs & reports
Earl Ou51182222016-09-09 12:16:48 +0800886 - Wipes the testing kernel, rootfs, and stateful partition
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800887 """
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800888 if not options.rma_mode:
889 # Write VPD values related to RLZ ping into VPD.
890 GetGooftool(options).WriteVPDForRLZPing(options.embargo_offset)
chuntsenaf1232f2019-03-20 15:45:54 +0800891 if options.generate_mfg_date:
892 GetGooftool(options).WriteVPDForMFGDate()
Cheng-Han Yang663763b2020-09-15 20:46:23 +0800893 Cr50Finalize(options)
Marco Chen9d0631c2018-08-31 10:52:44 +0800894 Verify(options)
Jon Salz40b9f822014-07-25 16:39:55 +0800895 LogSourceHashes(options)
Jon Salzfe9036f2014-01-16 14:11:23 +0800896 UntarStatefulFiles(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800897 if options.cros_core:
898 logging.info('SetFirmwareBitmapLocale is skipped for ChromeOS Core device.')
899 else:
900 SetFirmwareBitmapLocale(options)
Jon Salzaa3a30e2013-05-15 15:56:28 +0800901 ClearFactoryVPDEntries(options)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200902 GenerateStableDeviceSecret(options)
Shen-En Shih3e079b22017-09-11 05:43:09 -0700903 ClearGBBFlags(options)
Hung-Te Lin6d827542012-07-19 11:50:41 +0800904 if options.no_write_protect:
Pi-Hsun Shih1f569a72019-12-26 11:23:56 +0800905 logging.warning('WARNING: Firmware Write Protection is SKIPPED.')
Andy Cheng0465d132013-03-20 12:12:06 +0800906 event_log.Log('wp', fw='both', status='skipped')
Hung-Te Lin6d827542012-07-19 11:50:41 +0800907 else:
Wei-Han Chenba21f512016-10-14 18:52:33 +0800908 EnableFwWp(options)
Marco Chenecee04f2019-02-15 22:24:24 +0800909 FpmcuInitializeEntropy(options)
Jon Salza0f58e02012-05-29 19:33:39 +0800910 LogSystemDetails(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800911 UploadReport(options)
Earl Ou51182222016-09-09 12:16:48 +0800912
913 event_log.Log('wipe_in_place')
914 wipe_args = []
Earl Ou51182222016-09-09 12:16:48 +0800915 if options.shopfloor_url:
916 wipe_args += ['--shopfloor_url', options.shopfloor_url]
917 if options.fast:
918 wipe_args += ['--fast']
919 if options.station_ip:
920 wipe_args += ['--station_ip', options.station_ip]
921 if options.station_port:
922 wipe_args += ['--station_port', options.station_port]
923 if options.wipe_finish_token:
924 wipe_args += ['--wipe_finish_token', options.wipe_finish_token]
925 ExecFactoryPar('gooftool', 'wipe_in_place', *wipe_args)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800926
927
Ting Shen129fa6f2016-09-02 12:22:24 +0800928@Command('verify_hwid',
929 _probe_results_cmd_arg,
930 _hwdb_path_cmd_arg,
931 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800932 _hwid_run_vpd_cmd_arg,
933 _hwid_vpd_data_file_cmd_arg,
Ting Shen129fa6f2016-09-02 12:22:24 +0800934 _rma_mode_cmd_arg)
935def VerifyHWID(options):
Ricky Liangc662be32013-12-24 11:50:23 +0800936 """A simple wrapper that calls out to HWID utils to verify version 3 HWID.
Ricky Liang53390232013-03-08 15:37:57 +0800937
Ricky Liangc662be32013-12-24 11:50:23 +0800938 This is mainly for Gooftool to verify v3 HWID during finalize. For testing
939 and development purposes, please use `hwid` command.
Ricky Liang53390232013-03-08 15:37:57 +0800940 """
Yong Hongada8e0e2018-01-04 16:36:21 +0800941 database = GetGooftool(options).db
Yong Hong68a0e0d2017-12-20 19:06:54 +0800942
Yong Hongada8e0e2018-01-04 16:36:21 +0800943 encoded_string = options.hwid or GetGooftool(options).ReadHWID()
944
945 probed_results = hwid_utils.GetProbedResults(infile=options.probe_results)
Yong Hong2c39bf22018-01-24 22:24:11 +0800946 device_info = hwid_utils.GetDeviceInfo()
Yong Hong65bda312018-12-13 20:05:58 +0800947 vpd_data = hwid_utils.GetVPDData(run_vpd=options.hwid_run_vpd,
948 infile=options.hwid_vpd_data_file)
Ricky Liang53390232013-03-08 15:37:57 +0800949
Hung-Te Lin11052952015-03-18 13:48:59 +0800950 event_log.Log('probed_results', probed_results=FilterDict(probed_results))
Yong Hong65bda312018-12-13 20:05:58 +0800951 event_log.Log('vpd', vpd=FilterDict(vpd_data))
Ricky Liang53390232013-03-08 15:37:57 +0800952
Yong Hong2c39bf22018-01-24 22:24:11 +0800953 hwid_utils.VerifyHWID(database, encoded_string, probed_results,
Yong Hong65bda312018-12-13 20:05:58 +0800954 device_info, vpd_data, options.rma_mode)
Ricky Liang53390232013-03-08 15:37:57 +0800955
Ricky Liangc662be32013-12-24 11:50:23 +0800956 event_log.Log('verified_hwid', hwid=encoded_string)
Ricky Liang53390232013-03-08 15:37:57 +0800957
958
henryhsu44d793a2013-07-20 00:07:38 +0800959@Command('get_firmware_hash',
Marco Chence70b132018-05-03 23:43:39 +0800960 CmdArg('--file', required=True, metavar='FILE', help='Firmware File.'))
henryhsu44d793a2013-07-20 00:07:38 +0800961def GetFirmwareHash(options):
henryhsuf6f835c2013-07-20 20:49:25 +0800962 """Get firmware hash from a file"""
henryhsu44d793a2013-07-20 00:07:38 +0800963 if os.path.exists(options.file):
Cheng-Han Yang2c668ae2018-04-18 22:31:07 +0800964 value_dict = chromeos_firmware.CalculateFirmwareHashes(options.file)
Yilin Yang879fbda2020-05-14 13:52:30 +0800965 for key, value in value_dict.items():
Yilin Yang71e39412019-09-24 09:26:46 +0800966 print(' %s: %s' % (key, value))
henryhsu44d793a2013-07-20 00:07:38 +0800967 else:
968 raise Error('File does not exist: %s' % options.file)
969
henryhsuf6f835c2013-07-20 20:49:25 +0800970
Philip Chen04fb90b2019-11-06 12:10:33 -0800971@Command('fpmcu_initialize_entropy')
Marco Chenecee04f2019-02-15 22:24:24 +0800972def FpmcuInitializeEntropy(options):
973 """Initialze entropy of FPMCU."""
Philip Chen04fb90b2019-11-06 12:10:33 -0800974
975 if HasFpmcu():
Marco Chenecee04f2019-02-15 22:24:24 +0800976 GetGooftool(options).FpmcuInitializeEntropy()
Philip Chen04fb90b2019-11-06 12:10:33 -0800977 else:
978 logging.info('No FPS on this board.')
Marco Chenecee04f2019-02-15 22:24:24 +0800979
980
Peter Shihfdf17682017-05-26 11:38:39 +0800981def main():
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800982 """Run sub-command specified by the command line args."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800983
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800984 options = ParseCmdline(
Ting Shen129fa6f2016-09-02 12:22:24 +0800985 'Perform Google required factory tests.',
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800986 CmdArg('-l', '--log', metavar='PATH',
987 help='Write logs to this file.'),
Jon Salza4bea382012-10-29 13:00:34 +0800988 CmdArg('--suppress-event-logs', action='store_true',
989 help='Suppress event logging.'),
Wei-Han Chenaff56232016-04-16 09:17:59 +0800990 CmdArg('--phase', default=None,
991 help=('override phase for phase checking (defaults to the current '
992 'as returned by the "factory phase" command)')),
Wei-Han Chenb34bdff2019-09-26 13:07:50 +0800993 VERBOSITY_CMD_ARG)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800994 SetupLogging(options.verbosity, options.log)
Andy Cheng0465d132013-03-20 12:12:06 +0800995 event_log.SetGlobalLoggerDefaultPrefix('gooftool')
996 event_log.GetGlobalLogger().suppress = options.suppress_event_logs
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800997 logging.debug('gooftool options: %s', repr(options))
Wei-Han Chenaff56232016-04-16 09:17:59 +0800998
999 phase.OverridePhase(options.phase)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08001000 try:
1001 logging.debug('GOOFTOOL command %r', options.command_name)
1002 options.command(options)
1003 logging.info('GOOFTOOL command %r SUCCESS', options.command_name)
Peter Shih6674ecf2018-03-29 14:04:57 +08001004 except Error as e:
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08001005 logging.exception(e)
1006 sys.exit('GOOFTOOL command %r ERROR: %s' % (options.command_name, e))
Peter Shih6674ecf2018-03-29 14:04:57 +08001007 except Exception as e:
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08001008 logging.exception(e)
1009 sys.exit('UNCAUGHT RUNTIME EXCEPTION %s' % e)
1010
1011
1012if __name__ == '__main__':
Peter Shihfdf17682017-05-26 11:38:39 +08001013 main()