blob: 856477f1f7eef76a3e7febc1ec6ae33fb692d80c [file] [log] [blame]
Yilin Yang19da6932019-12-10 13:39:28 +08001#!/usr/bin/env python3
Jon Salze60307f2014-08-05 16:20:00 +08002# -*- coding: utf-8 -*-
3# Copyright 2014 The Chromium OS Authors. All rights reserved.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08004# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
Jon Salze60307f2014-08-05 16:20:00 +08007
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08008"""Google Factory Tool.
9
You-Cheng Syu461ec032017-03-06 15:56:58 +080010This tool is intended to be used on factory assembly lines. It
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080011provides all of the Google required test functionality and must be run
12on each device as part of the assembly process.
13"""
14
Yilin Yang71e39412019-09-24 09:26:46 +080015from __future__ import print_function
16
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080017import logging
18import os
Jon Salz65266432012-07-30 19:02:49 +080019import pipes
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080020import re
21import sys
Peter Shihfdf17682017-05-26 11:38:39 +080022from tempfile import gettempdir
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080023import threading
Hung-Te Lin6bd16472012-06-20 16:26:47 +080024import time
Yilin Yange02d5722019-10-23 11:07:36 +080025import xmlrpc.client
Peter Shihfdf17682017-05-26 11:38:39 +080026
Yilin Yangea784662019-09-26 13:51:03 +080027from six import iteritems
28
Wei-Han Chen0a3320e2016-04-23 01:32:07 +080029from cros.factory.gooftool.common import ExecFactoryPar
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080030from cros.factory.gooftool.common import Shell
Peter Shihfdf17682017-05-26 11:38:39 +080031from cros.factory.gooftool.core import Gooftool
32from cros.factory.gooftool import crosfw
Peter Shihfdf17682017-05-26 11:38:39 +080033from cros.factory.gooftool import report_upload
Yong Hong65bda312018-12-13 20:05:58 +080034from cros.factory.gooftool import vpd
Hung-Te Lin604e0c22015-11-24 15:17:07 +080035from cros.factory.hwid.v3 import hwid_utils
Yong Hong863d3262017-10-30 16:23:34 +080036from cros.factory.probe.functions import chromeos_firmware
Wei-Han Chen2ebb92d2016-01-12 14:51:41 +080037from cros.factory.test.env import paths
Peter Shihfdf17682017-05-26 11:38:39 +080038from cros.factory.test import event_log
Wei-Han Chenaff56232016-04-16 09:17:59 +080039from cros.factory.test.rules import phase
Hung-Te Lin3f096842016-01-13 17:37:06 +080040from cros.factory.test.rules.privacy import FilterDict
Philip Chen6ada02c2019-11-04 19:41:54 +000041from cros.factory.test import state
Peter Shihfdf17682017-05-26 11:38:39 +080042from cros.factory.utils import argparse_utils
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080043from cros.factory.utils.argparse_utils import CmdArg
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080044from cros.factory.utils.argparse_utils import ParseCmdline
Wei-Han Chenb34bdff2019-09-26 13:07:50 +080045from cros.factory.utils.argparse_utils import VERBOSITY_CMD_ARG
Peter Shihfdf17682017-05-26 11:38:39 +080046from cros.factory.utils.debug_utils import SetupLogging
Jon Salz40b9f822014-07-25 16:39:55 +080047from cros.factory.utils import file_utils
Peter Shih67c7c0f2018-02-26 11:23:59 +080048from cros.factory.utils.process_utils import Spawn
Wei-Han Chena5c01a02016-04-23 19:27:19 +080049from cros.factory.utils import sys_utils
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +080050from cros.factory.utils import time_utils
Joel Kitchingd3bc2662014-12-16 16:03:32 -080051from cros.factory.utils.type_utils import Error
Tammo Spalink86a61c62012-05-25 15:10:35 +080052
Tammo Spalink5c699832012-07-03 17:50:39 +080053
Tammo Spalink5c699832012-07-03 17:50:39 +080054# TODO(tammo): Replace calls to sys.exit with raise Exit, and maybe
55# treat that specially (as a smoot exit, as opposed to the more
56# verbose output for generic Error).
57
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080058_global_gooftool = None
59_gooftool_lock = threading.Lock()
Philip Chen04fb90b2019-11-06 12:10:33 -080060_has_fpmcu = None
Tammo Spalink5c699832012-07-03 17:50:39 +080061
Hung-Te Lin56b18402015-01-16 14:52:30 +080062
Ricky Lianga70a1202013-03-15 15:03:17 +080063def GetGooftool(options):
Peter Shihfdf17682017-05-26 11:38:39 +080064 global _global_gooftool # pylint: disable=global-statement
Ricky Lianga70a1202013-03-15 15:03:17 +080065
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080066 if _global_gooftool is None:
67 with _gooftool_lock:
Shen-En Shihc5d15d62017-08-04 13:02:59 +080068 if _global_gooftool is None:
69 project = getattr(options, 'project', None)
70 hwdb_path = getattr(options, 'hwdb_path', None)
71 _global_gooftool = Gooftool(hwid_version=3, project=project,
72 hwdb_path=hwdb_path)
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080073
74 return _global_gooftool
Ricky Lianga70a1202013-03-15 15:03:17 +080075
Philip Chen04fb90b2019-11-06 12:10:33 -080076def HasFpmcu():
77 global _has_fpmcu # pylint: disable=global-statement
78
79 if _has_fpmcu is None:
80 FPMCU_PATH = '/dev/cros_fp'
81 has_fpmcu_path = os.path.exists(FPMCU_PATH)
82 has_cros_config_fpmcu = False
Philip Chencf6642b2019-12-02 19:38:59 -080083 cros_config_output = Shell(['cros_config', '/fingerprint', 'board'])
84 if cros_config_output.success and cros_config_output.stdout:
Philip Chen04fb90b2019-11-06 12:10:33 -080085 has_cros_config_fpmcu = True
86
87 if has_fpmcu_path is False and has_cros_config_fpmcu is True:
88 raise Error('FPMCU found in cros_config but missing in %s.' % FPMCU_PATH)
89 elif has_fpmcu_path is True and has_cros_config_fpmcu is False:
90 raise Error('FPMCU found in %s but missing in cros_config.' % FPMCU_PATH)
91
92 _has_fpmcu = has_fpmcu_path
93
94 return _has_fpmcu
Hung-Te Lin56b18402015-01-16 14:52:30 +080095
Ting Shen18a06382016-08-30 16:18:21 +080096def Command(cmd_name, *args, **kwargs):
You-Cheng Syu8fc2a602017-12-22 17:05:05 +080097 """Decorator for commands in gooftool.
Ting Shen18a06382016-08-30 16:18:21 +080098
99 This is similar to argparse_utils.Command, but all gooftool commands
100 can be waived during `gooftool finalize` or `gooftool verify` using
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800101 --waive_list or --skip_list option.
Ting Shen18a06382016-08-30 16:18:21 +0800102 """
103 def Decorate(fun):
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800104 def CommandWithWaiveSkipCheck(options):
Ting Shen18a06382016-08-30 16:18:21 +0800105 waive_list = vars(options).get('waive_list', [])
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800106 skip_list = vars(options).get('skip_list', [])
107 if phase.GetPhase() >= phase.PVT_DOGFOOD and (
108 waive_list != [] or skip_list != []):
Ting Shen18a06382016-08-30 16:18:21 +0800109 raise Error(
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800110 'waive_list and skip_list should be empty for phase %s' %
111 phase.GetPhase())
Ting Shen18a06382016-08-30 16:18:21 +0800112
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800113 if cmd_name not in skip_list:
114 try:
115 fun(options)
116 except Exception as e:
117 if cmd_name in waive_list:
118 logging.exception(e)
119 else:
120 raise
Ting Shen18a06382016-08-30 16:18:21 +0800121
122 return argparse_utils.Command(cmd_name, *args, **kwargs)(
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800123 CommandWithWaiveSkipCheck)
Ting Shen18a06382016-08-30 16:18:21 +0800124 return Decorate
125
126
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800127@Command('write_hwid',
128 CmdArg('hwid', metavar='HWID', help='HWID string'))
Andy Chengc92e6f92012-11-20 16:55:53 +0800129def WriteHWID(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800130 """Write specified HWID value into the system BB."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800131
Tammo Spalink95c43732012-07-25 15:57:14 -0700132 logging.info('writing hwid string %r', options.hwid)
Ricky Lianga70a1202013-03-15 15:03:17 +0800133 GetGooftool(options).WriteHWID(options.hwid)
Andy Cheng0465d132013-03-20 12:12:06 +0800134 event_log.Log('write_hwid', hwid=options.hwid)
Yilin Yang71e39412019-09-24 09:26:46 +0800135 print('Wrote HWID: %r' % options.hwid)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800136
137
Yong Hongc3765412017-12-26 23:12:15 +0800138@Command('read_hwid')
139def ReadHWID(options):
140 """Read the HWID string from GBB."""
141
142 logging.info('reading the hwid string')
Yilin Yang71e39412019-09-24 09:26:46 +0800143 print(GetGooftool(options).ReadHWID())
Yong Hongc3765412017-12-26 23:12:15 +0800144
145
Yong Hong5408f652017-07-11 19:20:25 +0800146_project_cmd_arg = CmdArg(
147 '--project', metavar='PROJECT',
148 default=None, help='Project name to test.')
Ricky Liang53390232013-03-08 15:37:57 +0800149
Tammo Spalink8fab5312012-05-28 18:33:30 +0800150_hwdb_path_cmd_arg = CmdArg(
151 '--hwdb_path', metavar='PATH',
Yong Hong5c6dcd52017-12-27 11:05:01 +0800152 default=hwid_utils.GetDefaultDataPath(),
Tammo Spalink8fab5312012-05-28 18:33:30 +0800153 help='Path to the HWID database.')
154
Tammo Spalink95c43732012-07-25 15:57:14 -0700155_hwid_status_list_cmd_arg = CmdArg(
Hung-Te Lin56b18402015-01-16 14:52:30 +0800156 '--status', nargs='*', default=['supported'],
157 help='allow only HWIDs with these status values')
Tammo Spalink95c43732012-07-25 15:57:14 -0700158
Jon Salzce124fb2012-10-02 17:42:03 +0800159_probe_results_cmd_arg = CmdArg(
Yong Hong55050c12018-02-27 18:19:47 +0800160 '--probe_results', metavar='RESULTS.json',
161 help=('Output from "hwid probe" (used instead of probing this system).'))
Jon Salzce124fb2012-10-02 17:42:03 +0800162
Ricky Liang53390232013-03-08 15:37:57 +0800163_device_info_cmd_arg = CmdArg(
Ricky Liangf89f73a2013-03-19 05:00:24 +0800164 '--device_info', metavar='DEVICE_INFO.yaml', default=None,
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800165 help='A dict of device info to use instead of fetching from shopfloor '
Ricky Liang53390232013-03-08 15:37:57 +0800166 'server.')
167
Jon Salzce124fb2012-10-02 17:42:03 +0800168_hwid_cmd_arg = CmdArg(
169 '--hwid', metavar='HWID',
Ricky Lianga70a1202013-03-15 15:03:17 +0800170 help='HWID to verify (instead of the currently set HWID of this system).')
Jon Salzce124fb2012-10-02 17:42:03 +0800171
Yong Hong68a0e0d2017-12-20 19:06:54 +0800172_hwid_run_vpd_cmd_arg = CmdArg(
173 '--hwid-run-vpd', action='store_true',
174 help=('Specify the hwid utility to obtain the vpd data by running the '
175 '`vpd` commandline tool.'))
176
177_hwid_vpd_data_file_cmd_arg = CmdArg(
178 '--hwid-vpd-data-file', metavar='FILE.json', type=str, default=None,
179 help=('Specify the hwid utility to obtain the vpd data from the specified '
180 'file.'))
181
Bernie Thompson3c11c872013-07-22 18:22:45 -0700182_rma_mode_cmd_arg = CmdArg(
183 '--rma_mode', action='store_true',
184 help='Enable RMA mode, do not check for deprecated components.')
Tammo Spalink95c43732012-07-25 15:57:14 -0700185
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800186_cros_core_cmd_arg = CmdArg(
187 '--cros_core', action='store_true',
188 help='Finalize for ChromeOS Core devices (may add or remove few test '
Hung-Te Lin53c49402017-07-26 13:10:58 +0800189 'items. For example, registration codes or firmware bitmap '
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800190 'locale settings).')
191
Yilun Lin599833f2017-12-22 14:07:46 +0800192_chromebox_cmd_arg = CmdArg(
193 '--chromebox', action='store_true', default=None,
194 help='Finalize for ChromeBox devices (may add or remove few test '
195 'items. For example, VerifyECKey).')
196
bowgotsai13820f42015-09-10 23:18:04 +0800197_enforced_release_channels_cmd_arg = CmdArg(
198 '--enforced_release_channels', nargs='*', default=None,
199 help='Enforced release image channels.')
200
Yilun Lin34f54802017-11-16 11:58:25 +0800201_ec_pubkey_path_cmd_arg = CmdArg(
202 '--ec_pubkey_path',
203 default=None,
204 help='Path to public key in vb2 format. Verify EC key with pubkey file.')
205
206_ec_pubkey_hash_cmd_arg = CmdArg(
207 '--ec_pubkey_hash',
208 default=None,
209 help='A string for public key hash. Verify EC key with the given hash.')
210
Hung-Te Lincdb96522016-04-15 16:51:10 +0800211_release_rootfs_cmd_arg = CmdArg(
212 '--release_rootfs', help='Location of release image rootfs partition.')
213
214_firmware_path_cmd_arg = CmdArg(
215 '--firmware_path', help='Location of firmware image partition.')
Ricky Liang43b879b2014-02-24 11:36:55 +0800216
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800217_shopfloor_url_args_cmd_arg = CmdArg(
218 '--shopfloor_url',
Earl Ou51182222016-09-09 12:16:48 +0800219 help='Shopfloor server url to be informed when wiping is done. '
220 'After wiping, a XML-RPC request will be sent to the '
221 'given url to indicate the completion of wiping.')
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800222
223_station_ip_cmd_arg = CmdArg(
224 '--station_ip',
225 help='IP of remote station')
226
227_station_port_cmd_arg = CmdArg(
228 '--station_port',
229 help='Port on remote station')
230
231_wipe_finish_token_cmd_arg = CmdArg(
232 '--wipe_finish_token',
233 help='Required token when notifying station after wipe finished')
234
Wei-Han Chenf3924112019-02-25 14:52:58 +0800235_keep_developer_mode_flag_after_clobber_state_cmd_arg = CmdArg(
236 # The argument name is super long because you should never use it by
237 # yourself when using command line tools.
238 '--keep_developer_mode_flag_after_clobber_state',
239 action='store_true', default=None,
240 help='After clobber-state, do not delete .developer_mode')
241
Ting Shen18a06382016-08-30 16:18:21 +0800242_waive_list_cmd_arg = CmdArg(
243 '--waive_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800244 help='A list of waived checks, separated by whitespace. '
245 'Each item should be a sub-command of gooftool. '
Ting Shen18a06382016-08-30 16:18:21 +0800246 'e.g. "gooftool verify --waive_list verify_tpm clear_gbb_flags".')
247
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800248_skip_list_cmd_arg = CmdArg(
249 '--skip_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800250 help='A list of skipped checks, separated by whitespace. '
251 'Each item should be a sub-command of gooftool. '
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800252 'e.g. "gooftool verify --skip_list verify_tpm clear_gbb_flags".')
253
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800254_test_umount_cmd_arg = CmdArg(
255 '--test_umount', action='store_true',
256 help='(For testing only) Only umount rootfs and stateful partition '
257 'instead of running full wiping and cutoff process.')
258
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800259_rlz_embargo_end_date_offset_cmd_arg = CmdArg(
Kevin Line4c64de2019-11-22 15:28:34 +0800260 '--embargo_offset', type=int, default=7, choices=list(range(7, 15)),
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800261 help='Change the offset of embargo end date, cannot less than 7 days or '
262 'more than 14 days.')
263
Marco Chena681b2e2018-08-31 11:41:41 +0800264_no_ectool_cmd_arg = CmdArg(
265 '--no_ectool', action='store_false', dest='has_ectool',
266 help='There is no ectool utility so tests rely on ectool should be '
267 'skipped.')
Tammo Spalink8fab5312012-05-28 18:33:30 +0800268
chuntsenaf1232f2019-03-20 15:45:54 +0800269_no_generate_mfg_date_cmd_arg = CmdArg(
270 '--no_generate_mfg_date', action='store_false', dest='generate_mfg_date',
271 help='Do not generate manufacturing date nor write mfg_date into VPD.')
272
273
Yilun Lin34f54802017-11-16 11:58:25 +0800274@Command(
275 'verify_ec_key',
276 _ec_pubkey_path_cmd_arg,
277 _ec_pubkey_hash_cmd_arg)
278def VerifyECKey(options):
279 """Verify EC key."""
280 return GetGooftool(options).VerifyECKey(
281 options.ec_pubkey_path, options.ec_pubkey_hash)
282
283
Hung-Te Line1d80f62016-03-31 14:58:13 +0800284@Command('verify_keys',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800285 _release_rootfs_cmd_arg,
286 _firmware_path_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800287def VerifyKeys(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800288 """Verify keys in firmware and SSD match."""
Hung-Te Line1d80f62016-03-31 14:58:13 +0800289 return GetGooftool(options).VerifyKeys(
Hung-Te Lincdb96522016-04-15 16:51:10 +0800290 options.release_rootfs, options.firmware_path)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800291
292
293@Command('set_fw_bitmap_locale')
Peter Shihfdf17682017-05-26 11:38:39 +0800294def SetFirmwareBitmapLocale(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800295 """Use VPD locale value to set firmware bitmap default language."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800296
Ricky Lianga70a1202013-03-15 15:03:17 +0800297 (index, locale) = GetGooftool(options).SetFirmwareBitmapLocale()
Andy Cheng2582d292012-12-04 17:38:28 +0800298 logging.info('Firmware bitmap initial locale set to %d (%s).',
299 index, locale)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800300
301
Hung-Te Line1d80f62016-03-31 14:58:13 +0800302@Command('verify_system_time',
Wei-Han Chen2790d2e2019-01-18 21:13:40 +0800303 _release_rootfs_cmd_arg,
304 _rma_mode_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800305def VerifySystemTime(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800306 """Verify system time is later than release filesystem creation time."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800307
Wei-Han Chen2790d2e2019-01-18 21:13:40 +0800308 return GetGooftool(options).VerifySystemTime(options.release_rootfs,
309 rma_mode=options.rma_mode)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800310
311
Hung-Te Line1d80f62016-03-31 14:58:13 +0800312@Command('verify_rootfs',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800313 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800314def VerifyRootFs(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800315 """Verify rootfs on SSD is valid by checking hash."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800316
Hung-Te Line1d80f62016-03-31 14:58:13 +0800317 return GetGooftool(options).VerifyRootFs(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800318
Hung-Te Lin56b18402015-01-16 14:52:30 +0800319
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800320@Command('verify_tpm')
Peter Shihfdf17682017-05-26 11:38:39 +0800321def VerifyTPM(options):
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800322 """Verify TPM is cleared."""
323
324 return GetGooftool(options).VerifyTPM()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800325
Hung-Te Lin56b18402015-01-16 14:52:30 +0800326
Hung-Te Lindd708d42014-07-11 17:05:01 +0800327@Command('verify_me_locked')
Peter Shihfdf17682017-05-26 11:38:39 +0800328def VerifyManagementEngineLocked(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800329 """Verify Management Engine is locked."""
Hung-Te Lindd708d42014-07-11 17:05:01 +0800330
331 return GetGooftool(options).VerifyManagementEngineLocked()
332
Hung-Te Lin56b18402015-01-16 14:52:30 +0800333
Marco Chena681b2e2018-08-31 11:41:41 +0800334@Command('verify_switch_wp',
335 _no_ectool_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800336def VerifyWPSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800337 """Verify hardware write protection switch is enabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800338
Marco Chena681b2e2018-08-31 11:41:41 +0800339 GetGooftool(options).VerifyWPSwitch(options.has_ectool)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800340
341
Hung-Te Lin53c49402017-07-26 13:10:58 +0800342@Command('verify_vpd')
343def VerifyVPD(options):
344 """Verify that VPD values are properly set.
Jon Salzadd90d32014-04-29 16:16:27 +0800345
Hung-Te Lin53c49402017-07-26 13:10:58 +0800346 Check if mandatory fields are set, and deprecated fields don't exist.
Jon Salzadd90d32014-04-29 16:16:27 +0800347 """
Hung-Te Lin53c49402017-07-26 13:10:58 +0800348 return GetGooftool(options).VerifyVPD()
Jon Salzadd90d32014-04-29 16:16:27 +0800349
350
bowgotsai13820f42015-09-10 23:18:04 +0800351@Command('verify_release_channel',
352 _enforced_release_channels_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800353def VerifyReleaseChannel(options):
bowgotsai529139c2015-05-30 01:39:49 +0800354 """Verify that release image channel is correct.
355
356 ChromeOS has four channels: canary, dev, beta and stable.
357 The last three channels support image auto-updates, checks
358 that release image channel is one of them.
359 """
bowgotsai13820f42015-09-10 23:18:04 +0800360 return GetGooftool(options).VerifyReleaseChannel(
361 options.enforced_release_channels)
bowgotsai529139c2015-05-30 01:39:49 +0800362
363
Wei-Han Chen0de7cfd2020-01-03 16:49:20 +0800364@Command('verify_cros_config')
365def VerifyCrosConfig(options):
366 """Verify entries in cros config make sense."""
367 return GetGooftool(options).VerifyCrosConfig()
368
369
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800370@Command('write_protect')
Peter Shihfdf17682017-05-26 11:38:39 +0800371def EnableFwWp(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800372 """Enable then verify firmware write protection."""
Peter Shihfdf17682017-05-26 11:38:39 +0800373 del options # Unused.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800374
Yong Hongdad230a2017-08-30 22:25:19 +0800375 def WriteProtect(fw):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800376 """Calculate protection size, then invoke flashrom.
377
Yong Hongdad230a2017-08-30 22:25:19 +0800378 The region (offset and size) to write protect may be different per chipset
379 and firmware layout, so we have to read the WP_RO section from FMAP to
380 decide that.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800381 """
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800382 wp_section = 'WP_RO'
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800383
Yong Hongdad230a2017-08-30 22:25:19 +0800384 fmap_image = fw.GetFirmwareImage(
385 sections=(['FMAP'] if fw.target == crosfw.TARGET_MAIN else None))
386 if not fmap_image.has_section(wp_section):
387 raise Error('Could not find %s firmware section: %s' %
388 (fw.target.upper(), wp_section))
389
390 section_data = fw.GetFirmwareImage(
391 sections=[wp_section]).get_section_area(wp_section)
Peter Shihe6afab32018-09-11 17:16:48 +0800392 ro_offset, ro_size = section_data[0:2]
Yong Hongdad230a2017-08-30 22:25:19 +0800393
394 logging.debug('write protecting %s [off=%x size=%x]', fw.target.upper(),
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800395 ro_offset, ro_size)
Yong Hongdad230a2017-08-30 22:25:19 +0800396 crosfw.Flashrom(fw.target).EnableWriteProtection(ro_offset, ro_size)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800397
Philip Chendbb06202019-11-05 17:24:26 -0800398 if HasFpmcu():
399 # TODO(b/143991572): Implement enable_fpmcu_write_protection in gooftool.
400 cmd = os.path.join(
401 paths.FACTORY_DIR, 'sh', 'enable_fpmcu_write_protection.sh')
402 cmd_result = Shell(cmd)
403 if not cmd_result.success:
404 raise Error(
405 'Failed to enable FPMCU write protection, stdout=%r, stderr=%r' %
406 (cmd_result.stdout, cmd_result.stderr))
407
Yong Hongdad230a2017-08-30 22:25:19 +0800408 WriteProtect(crosfw.LoadMainFirmware())
Andy Cheng0465d132013-03-20 12:12:06 +0800409 event_log.Log('wp', fw='main')
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800410
Fei Shao21be8242020-04-13 16:57:51 +0800411 # Some EC (mostly PD) does not support "RO_NOW". Instead they will only set
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800412 # "RO_AT_BOOT" when you request to enable RO (These platforms consider
413 # --wp-range with right range identical to --wp-enable), and requires a
414 # 'ectool reboot_ec RO at-shutdown; reboot' to let the RO take effect.
Hung-Te Lin0d10b562016-12-28 10:58:07 +0800415 # After reboot, "flashrom -p host --wp-status" will return protected range.
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800416 # If you don't reboot, returned range will be (0, 0), and running command
417 # "ectool flashprotect" will not have RO_NOW.
Fei Shao21be8242020-04-13 16:57:51 +0800418 # generic_common.test_list.json provides "EnableECWriteProtect" test group
419 # which can be run individually before finalization. Try that out if you're
420 # having trouble enabling RO_NOW flag.
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800421
Yong Hongdad230a2017-08-30 22:25:19 +0800422 for fw in [crosfw.LoadEcFirmware(), crosfw.LoadPDFirmware()]:
423 if fw.GetChipId() is None:
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800424 logging.warning('%s not write protected (seems there is no %s flash).',
Yong Hongdad230a2017-08-30 22:25:19 +0800425 fw.target.upper(), fw.target.upper())
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800426 continue
Yong Hongdad230a2017-08-30 22:25:19 +0800427 WriteProtect(fw)
428 event_log.Log('wp', fw=fw.target)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800429
430
431@Command('clear_gbb_flags')
Peter Shihfdf17682017-05-26 11:38:39 +0800432def ClearGBBFlags(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800433 """Zero out the GBB flags, in preparation for transition to release state.
434
435 No GBB flags are set in release/shipping state, but they are useful
Hung-Te Lin879cff42017-06-19 12:46:37 +0800436 for factory/development. See "futility gbb --flags" for details.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800437 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800438
Ricky Lianga70a1202013-03-15 15:03:17 +0800439 GetGooftool(options).ClearGBBFlags()
Andy Cheng0465d132013-03-20 12:12:06 +0800440 event_log.Log('clear_gbb_flags')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800441
442
Jon Salzaa3a30e2013-05-15 15:56:28 +0800443@Command('clear_factory_vpd_entries')
Peter Shihfdf17682017-05-26 11:38:39 +0800444def ClearFactoryVPDEntries(options):
Jon Salzaa3a30e2013-05-15 15:56:28 +0800445 """Clears factory.* items in the RW VPD."""
446 entries = GetGooftool(options).ClearFactoryVPDEntries()
447 event_log.Log('clear_factory_vpd_entries', entries=FilterDict(entries))
448
449
Mattias Nisslercca761b2015-04-15 21:53:04 +0200450@Command('generate_stable_device_secret')
Peter Shihfdf17682017-05-26 11:38:39 +0800451def GenerateStableDeviceSecret(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800452 """Generates a fresh stable device secret and stores it in the RO VPD."""
Mattias Nisslercca761b2015-04-15 21:53:04 +0200453 GetGooftool(options).GenerateStableDeviceSecret()
454 event_log.Log('generate_stable_device_secret')
455
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800456
Yves Arrouyeb49b31e2019-03-06 21:51:52 -0800457@Command('cr50_set_sn_bits_and_board_id')
458def Cr50SetSnBitsAndBoardId(options):
Wei-Han Chen66357592020-01-14 15:15:37 +0800459 """Deprecated: use Cr50WriteFlashInfo instead."""
460 logging.warning('This function is renamed to Cr50WriteFlashInfo')
461 Cr50WriteFlashInfo(options)
462
463
Stimim Chen60f7bb22020-04-07 21:02:47 +0800464@Command('cr50_write_flash_info',
465 CmdArg('--expect_zero_touch', action='store_true',
466 help='zero touch feature is expected, the command will fail '
467 'immediately if required dependencies are not found.'))
Wei-Han Chen66357592020-01-14 15:15:37 +0800468def Cr50WriteFlashInfo(options):
Yves Arrouyeb49b31e2019-03-06 21:51:52 -0800469 """Set the serial number bits, board id and flags on the Cr50 chip."""
Stimim Chen60f7bb22020-04-07 21:02:47 +0800470 # The '--expect_zero_touch' argument is for testing purpose, therefore, the
471 # argument can only be specified by directly using `cr50_write_flash_info`
472 # subcommand. And the `expect_zero_touch` attribute won't exist when this
473 # function is invoked by other subcommands, e.g. `finalize`.
474 expect_zero_touch = getattr(options, 'expect_zero_touch', False)
475 GetGooftool(options).Cr50WriteFlashInfo(expect_zero_touch)
Wei-Han Chen66357592020-01-14 15:15:37 +0800476 event_log.Log('cr50_write_flash_info')
477
478
479@Command('cr50_write_whitelabel_flags')
480def Cr50WriteWhitelabelFlags(options):
481 GetGooftool(options).Cr50WriteWhitelabelFlags()
482 event_log.Log('cr50_write_whitelabel_flags')
Shen-En Shihd078a7c2017-08-04 13:33:49 +0800483
484
Marco Chen20c885d2018-10-04 17:22:03 +0800485@Command('cr50_disable_factory_mode')
Marco Chen44a666d2018-07-13 21:01:50 +0800486def Cr50DisableFactoryMode(options):
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800487 """Reset Cr50 state back to default state after RMA."""
Marco Chen44a666d2018-07-13 21:01:50 +0800488 return GetGooftool(options).Cr50DisableFactoryMode()
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800489
490
Earl Ou564a7872016-10-05 10:22:00 +0800491@Command('enable_release_partition',
492 CmdArg('--release_rootfs',
493 help=('path to the release rootfs device. If not specified, '
494 'the default (5th) partition will be used.')))
495def EnableReleasePartition(options):
496 """Enables a release image partition on the disk."""
497 GetGooftool(options).EnableReleasePartition(options.release_rootfs)
498
499
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800500@Command('wipe_in_place',
501 CmdArg('--fast', action='store_true',
Shun-Hsing Ou8d3c40a2015-10-08 18:16:08 +0800502 help='use non-secure but faster wipe method.'),
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800503 _shopfloor_url_args_cmd_arg,
504 _station_ip_cmd_arg,
505 _station_port_cmd_arg,
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800506 _wipe_finish_token_cmd_arg,
507 _test_umount_cmd_arg)
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800508def WipeInPlace(options):
509 """Start factory wipe directly without reboot."""
510
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800511 GetGooftool(options).WipeInPlace(options.fast,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800512 options.shopfloor_url,
513 options.station_ip,
514 options.station_port,
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800515 options.wipe_finish_token,
516 options.test_umount)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200517
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800518@Command('wipe_init',
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800519 CmdArg('--wipe_args', help='arguments for clobber-state'),
520 CmdArg('--state_dev', help='path to stateful partition device'),
521 CmdArg('--root_disk', help='path to primary device'),
522 CmdArg('--old_root', help='path to old root'),
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800523 _shopfloor_url_args_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800524 _release_rootfs_cmd_arg,
525 _station_ip_cmd_arg,
526 _station_port_cmd_arg,
Wei-Han Chenf3924112019-02-25 14:52:58 +0800527 _wipe_finish_token_cmd_arg,
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800528 _keep_developer_mode_flag_after_clobber_state_cmd_arg,
529 _test_umount_cmd_arg)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800530def WipeInit(options):
Wei-Han Chenf3924112019-02-25 14:52:58 +0800531 GetGooftool(options).WipeInit(
532 options.wipe_args,
533 options.shopfloor_url,
534 options.state_dev,
535 options.release_rootfs,
536 options.root_disk,
537 options.old_root,
538 options.station_ip,
539 options.station_port,
540 options.wipe_finish_token,
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800541 options.keep_developer_mode_flag_after_clobber_state,
542 options.test_umount)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800543
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800544@Command('verify',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800545 CmdArg('--no_write_protect', action='store_true',
546 help='Do not check write protection switch state.'),
Tammo Spalink95c43732012-07-25 15:57:14 -0700547 _hwid_status_list_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800548 _hwdb_path_cmd_arg,
Yong Hong5408f652017-07-11 19:20:25 +0800549 _project_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800550 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800551 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800552 _hwid_run_vpd_cmd_arg,
553 _hwid_vpd_data_file_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800554 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800555 _cros_core_cmd_arg,
Yilun Lin599833f2017-12-22 14:07:46 +0800556 _chromebox_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800557 _ec_pubkey_path_cmd_arg,
558 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800559 _release_rootfs_cmd_arg,
560 _firmware_path_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800561 _enforced_release_channels_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800562 _waive_list_cmd_arg,
Marco Chena681b2e2018-08-31 11:41:41 +0800563 _skip_list_cmd_arg,
564 _no_ectool_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800565def Verify(options):
566 """Verifies if whole factory process is ready for finalization.
567
568 This routine performs all the necessary checks to make sure the
569 device is ready to be finalized, but does not modify state. These
570 checks include dev switch, firmware write protection switch, hwid,
571 system time, keys, and root file system.
572 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800573
Hung-Te Lin6d827542012-07-19 11:50:41 +0800574 if not options.no_write_protect:
Ricky Lianga70a1202013-03-15 15:03:17 +0800575 VerifyWPSwitch(options)
Hung-Te Lindd708d42014-07-11 17:05:01 +0800576 VerifyManagementEngineLocked(options)
Ting Shen129fa6f2016-09-02 12:22:24 +0800577 VerifyHWID(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800578 VerifySystemTime(options)
Yilun Lin599833f2017-12-22 14:07:46 +0800579 if options.chromebox:
580 VerifyECKey(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800581 VerifyKeys(options)
582 VerifyRootFs(options)
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800583 VerifyTPM(options)
Hung-Te Lin53c49402017-07-26 13:10:58 +0800584 VerifyVPD(options)
bowgotsai529139c2015-05-30 01:39:49 +0800585 VerifyReleaseChannel(options)
Wei-Han Chen0de7cfd2020-01-03 16:49:20 +0800586 VerifyCrosConfig(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800587
Hung-Te Lin56b18402015-01-16 14:52:30 +0800588
Jon Salzfe9036f2014-01-16 14:11:23 +0800589@Command('untar_stateful_files')
Hung-Te Lin388bce22014-06-03 19:56:40 +0800590def UntarStatefulFiles(unused_options):
Jon Salzfe9036f2014-01-16 14:11:23 +0800591 """Untars stateful files from stateful_files.tar.xz on stateful partition.
592
593 If that file does not exist (which should only be R30 and earlier),
594 this is a no-op.
595 """
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800596 # Path to stateful partition on device.
597 device_stateful_path = '/mnt/stateful_partition'
598 tar_file = os.path.join(device_stateful_path, 'stateful_files.tar.xz')
Jon Salzfe9036f2014-01-16 14:11:23 +0800599 if os.path.exists(tar_file):
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800600 Spawn(['tar', 'xf', tar_file], cwd=device_stateful_path,
Jon Salzfe9036f2014-01-16 14:11:23 +0800601 log=True, check_call=True)
602 else:
603 logging.warning('No stateful files at %s', tar_file)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800604
Jon Salz40b9f822014-07-25 16:39:55 +0800605
606@Command('log_source_hashes')
Peter Shihfdf17682017-05-26 11:38:39 +0800607def LogSourceHashes(options):
Jon Salz40b9f822014-07-25 16:39:55 +0800608 """Logs hashes of source files in the factory toolkit."""
Peter Shihfdf17682017-05-26 11:38:39 +0800609 del options # Unused.
Jon Salze60307f2014-08-05 16:20:00 +0800610 # WARNING: The following line is necessary to validate the integrity
611 # of the factory software. Do not remove or modify it.
612 #
613 # 警告:此行会验证工厂软件的完整性,禁止删除或修改。
Wei-Han Chena5c01a02016-04-23 19:27:19 +0800614 factory_par = sys_utils.GetRunningFactoryPythonArchivePath()
615 if factory_par:
616 event_log.Log(
617 'source_hashes',
618 **file_utils.HashPythonArchive(factory_par))
619 else:
620 event_log.Log(
621 'source_hashes',
Peter Shihad166772017-05-31 11:36:17 +0800622 **file_utils.HashSourceTree(os.path.join(paths.FACTORY_DIR, 'py')))
Jon Salz40b9f822014-07-25 16:39:55 +0800623
624
Tammo Spalink86a61c62012-05-25 15:10:35 +0800625@Command('log_system_details')
Peter Shihfdf17682017-05-26 11:38:39 +0800626def LogSystemDetails(options):
Tammo Spalink86a61c62012-05-25 15:10:35 +0800627 """Write miscellaneous system details to the event log."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800628
Ricky Liang43b879b2014-02-24 11:36:55 +0800629 event_log.Log('system_details', **GetGooftool(options).GetSystemDetails())
Tammo Spalink86a61c62012-05-25 15:10:35 +0800630
631
Jon Salza88b83b2013-05-27 20:00:35 +0800632def CreateReportArchiveBlob(*args, **kwargs):
633 """Creates a report archive and returns it as a blob.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800634
Jon Salza88b83b2013-05-27 20:00:35 +0800635 Args:
636 See CreateReportArchive.
Andy Cheng7a76cb82012-11-19 18:08:19 +0800637
Jon Salza88b83b2013-05-27 20:00:35 +0800638 Returns:
Yilin Yange02d5722019-10-23 11:07:36 +0800639 An xmlrpc.client.Binary object containing a .tar.xz file.
Jon Salza88b83b2013-05-27 20:00:35 +0800640 """
Wei-Han Chen47416612016-09-14 17:41:52 +0800641 report_archive = CreateReportArchive(*args, **kwargs)
642 try:
Yilin Yangf6994c22019-12-09 16:17:21 +0800643 return xmlrpc.client.Binary(
644 file_utils.ReadFile(report_archive, encoding=None))
Wei-Han Chen47416612016-09-14 17:41:52 +0800645 finally:
646 os.unlink(report_archive)
Jon Salza88b83b2013-05-27 20:00:35 +0800647
648
649def CreateReportArchive(device_sn=None, add_file=None):
650 """Creates a report archive in a temporary directory.
651
652 Args:
653 device_sn: The device serial number (optional).
654 add_file: A list of files to add (optional).
655
656 Returns:
657 Path to the archive.
658 """
Philip Chen6ada02c2019-11-04 19:41:54 +0000659 # Flush Testlog data to DATA_TESTLOG_DIR before creating a report archive.
660 result, reason = state.GetInstance().FlushTestlog(
661 uplink=False, local=True, timeout=10)
662 if not result:
663 logging.warning('Failed to flush testlog data: %s', reason)
664
Hung-Te Lin6bd16472012-06-20 16:26:47 +0800665 def NormalizeAsFileName(token):
666 return re.sub(r'\W+', '', token).strip()
Jon Salza88b83b2013-05-27 20:00:35 +0800667
668 target_name = '%s%s.tar.xz' % (
669 time.strftime('%Y%m%dT%H%M%SZ',
670 time.gmtime()),
Hung-Te Lin56b18402015-01-16 14:52:30 +0800671 ('' if device_sn is None else
672 '_' + NormalizeAsFileName(device_sn)))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800673 target_path = os.path.join(gettempdir(), target_name)
Jon Salza88b83b2013-05-27 20:00:35 +0800674
Tammo Spalink86a61c62012-05-25 15:10:35 +0800675 # Intentionally ignoring dotfiles in EVENT_LOG_DIR.
Pi-Hsun Shih1f569a72019-12-26 11:23:56 +0800676 tar_cmd = 'cd %s ; tar cJf %s * -C /' % (event_log.EVENT_LOG_DIR, target_path)
Jongpil Jung23355a92019-12-31 14:38:29 +0900677 tar_files = [paths.FACTORY_LOG_PATH, paths.DATA_TESTLOG_DIR]
678 if add_file:
679 tar_files = tar_files + add_file
Pi-Hsun Shih1f569a72019-12-26 11:23:56 +0800680 for f in tar_files:
681 # Require absolute paths since we use -C / to change current directory to
682 # root.
683 if not f.startswith('/'):
684 raise Error('Not an absolute path: %s' % f)
685 if not os.path.exists(f):
686 raise Error('File does not exist: %s' % f)
687 tar_cmd += ' %s' % pipes.quote(f[1:])
Tammo Spalink86a61c62012-05-25 15:10:35 +0800688 cmd_result = Shell(tar_cmd)
Jon Salzff88c022012-11-03 12:19:58 +0800689
Hung-Te Lin3756c432020-01-16 11:30:46 +0800690 if cmd_result.status == 1:
691 # tar returns 1 when some files were changed during archiving,
692 # but that is expected for log files so should ignore such failure
693 # if the archive looks good.
Pi-Hsun Shih1f569a72019-12-26 11:23:56 +0800694 Spawn(['tar', 'tJf', target_path], check_call=True, log=True,
Jon Salzff88c022012-11-03 12:19:58 +0800695 ignore_stdout=True)
696 elif not cmd_result.success:
Tammo Spalink86a61c62012-05-25 15:10:35 +0800697 raise Error('unable to tar event logs, cmd %r failed, stderr: %r' %
698 (tar_cmd, cmd_result.stderr))
Jon Salzff88c022012-11-03 12:19:58 +0800699
Jon Salza88b83b2013-05-27 20:00:35 +0800700 return target_path
701
702_upload_method_cmd_arg = CmdArg(
703 '--upload_method', metavar='METHOD:PARAM',
704 help=('How to perform the upload. METHOD should be one of '
Kevin Line4c64de2019-11-22 15:28:34 +0800705 '{ftp, shopfloor, ftps, cpfe, smb}.'))
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800706_upload_max_retry_times_arg = CmdArg(
707 '--upload_max_retry_times', type=int, default=0,
708 help='Number of tries to upload. 0 to retry infinitely.')
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800709_upload_retry_interval_arg = CmdArg(
710 '--upload_retry_interval', type=int, default=None,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800711 help='Retry interval in seconds.')
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800712_upload_allow_fail_arg = CmdArg(
713 '--upload_allow_fail', action='store_true',
714 help='Continue finalize if report upload fails.')
Jon Salza88b83b2013-05-27 20:00:35 +0800715_add_file_cmd_arg = CmdArg(
716 '--add_file', metavar='FILE', action='append',
717 help='Extra file to include in report (must be an absolute path)')
718
Hung-Te Lin56b18402015-01-16 14:52:30 +0800719
Jon Salza88b83b2013-05-27 20:00:35 +0800720@Command('upload_report',
721 _upload_method_cmd_arg,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800722 _upload_max_retry_times_arg,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800723 _upload_retry_interval_arg,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800724 _upload_allow_fail_arg,
Jon Salza88b83b2013-05-27 20:00:35 +0800725 _add_file_cmd_arg)
726def UploadReport(options):
727 """Create a report containing key device details."""
Yong Hong65bda312018-12-13 20:05:58 +0800728 ro_vpd = vpd.VPDTool().GetAllData(partition=vpd.VPD_READONLY_PARTITION_NAME)
Jon Salza88b83b2013-05-27 20:00:35 +0800729 device_sn = ro_vpd.get('serial_number', None)
730 if device_sn is None:
731 logging.warning('RO_VPD missing device serial number')
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +0800732 device_sn = 'MISSING_SN_' + time_utils.TimedUUID()
chuntsena6da2be2019-08-14 17:11:55 +0800733 target_path = CreateReportArchive(device_sn, options.add_file)
Jon Salza88b83b2013-05-27 20:00:35 +0800734
Tammo Spalink86a61c62012-05-25 15:10:35 +0800735 if options.upload_method is None or options.upload_method == 'none':
736 logging.warning('REPORT UPLOAD SKIPPED (report left at %s)', target_path)
737 return
738 method, param = options.upload_method.split(':', 1)
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800739
740 if options.upload_retry_interval is not None:
741 retry_interval = options.upload_retry_interval
742 else:
743 retry_interval = report_upload.DEFAULT_RETRY_INTERVAL
744
Tammo Spalink86a61c62012-05-25 15:10:35 +0800745 if method == 'shopfloor':
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800746 report_upload.ShopFloorUpload(
747 target_path, param,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800748 'GRT' if options.command_name == 'finalize' else None,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800749 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800750 retry_interval=retry_interval,
751 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800752 elif method == 'ftp':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800753 report_upload.FtpUpload(target_path, 'ftp:' + param,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800754 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800755 retry_interval=retry_interval,
756 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800757 elif method == 'ftps':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800758 report_upload.CurlUrlUpload(target_path, '--ftp-ssl-reqd ftp:%s' % param,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800759 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800760 retry_interval=retry_interval,
761 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800762 elif method == 'cpfe':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800763 report_upload.CpfeUpload(target_path, pipes.quote(param),
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800764 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800765 retry_interval=retry_interval,
766 allow_fail=options.upload_allow_fail)
Kevin Line4c64de2019-11-22 15:28:34 +0800767 elif method == 'smb':
768 # param should be in form: <dest_path>.
769 report_upload.SmbUpload(target_path, 'smb:' + param,
770 max_retry_times=options.upload_max_retry_times,
771 retry_interval=retry_interval,
772 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800773 else:
Peter Shihbf6f22b2018-02-26 14:05:28 +0800774 raise Error('unknown report upload method %r' % method)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800775
776
777@Command('finalize',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800778 CmdArg('--no_write_protect', action='store_true',
779 help='Do not enable firmware write protection.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800780 CmdArg('--fast', action='store_true',
781 help='use non-secure but faster wipe method.'),
Yong Hongb2926bd2018-10-12 14:11:14 +0800782 _no_ectool_cmd_arg,
Shun-Hsing Oudb407d62015-11-11 11:03:59 +0800783 _shopfloor_url_args_cmd_arg,
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800784 _hwdb_path_cmd_arg,
Tammo Spalink95c43732012-07-25 15:57:14 -0700785 _hwid_status_list_cmd_arg,
Jon Salz65266432012-07-30 19:02:49 +0800786 _upload_method_cmd_arg,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800787 _upload_max_retry_times_arg,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800788 _upload_retry_interval_arg,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800789 _upload_allow_fail_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800790 _add_file_cmd_arg,
791 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800792 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800793 _hwid_run_vpd_cmd_arg,
794 _hwid_vpd_data_file_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800795 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800796 _cros_core_cmd_arg,
Yilun Lin599833f2017-12-22 14:07:46 +0800797 _chromebox_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800798 _ec_pubkey_path_cmd_arg,
799 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800800 _release_rootfs_cmd_arg,
801 _firmware_path_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800802 _enforced_release_channels_cmd_arg,
803 _station_ip_cmd_arg,
804 _station_port_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800805 _wipe_finish_token_cmd_arg,
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800806 _rlz_embargo_end_date_offset_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800807 _waive_list_cmd_arg,
chuntsenaf1232f2019-03-20 15:45:54 +0800808 _skip_list_cmd_arg,
Philip Chen04fb90b2019-11-06 12:10:33 -0800809 _no_generate_mfg_date_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800810def Finalize(options):
811 """Verify system readiness and trigger transition into release state.
812
Jon Salzaa3a30e2013-05-15 15:56:28 +0800813 This routine does the following:
814 - Verifies system state (see verify command)
Jon Salzfe9036f2014-01-16 14:11:23 +0800815 - Untars stateful_files.tar.xz, if it exists, in the stateful partition, to
816 initialize files such as the CRX cache
Jon Salzaa3a30e2013-05-15 15:56:28 +0800817 - Modifies firmware bitmaps to match locale
818 - Clears all factory-friendly flags from the GBB
819 - Removes factory-specific entries from RW_VPD (factory.*)
820 - Enables firmware write protection (cannot rollback after this)
Marco Chenecee04f2019-02-15 22:24:24 +0800821 - Initialize Fpmcu entropy
Jon Salzaa3a30e2013-05-15 15:56:28 +0800822 - Uploads system logs & reports
Earl Ou51182222016-09-09 12:16:48 +0800823 - Wipes the testing kernel, rootfs, and stateful partition
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800824 """
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800825 if not options.rma_mode:
826 # Write VPD values related to RLZ ping into VPD.
827 GetGooftool(options).WriteVPDForRLZPing(options.embargo_offset)
chuntsenaf1232f2019-03-20 15:45:54 +0800828 if options.generate_mfg_date:
829 GetGooftool(options).WriteVPDForMFGDate()
Wei-Han Chen66357592020-01-14 15:15:37 +0800830 Cr50WriteFlashInfo(options)
Marco Chen44a666d2018-07-13 21:01:50 +0800831 Cr50DisableFactoryMode(options)
Marco Chen9d0631c2018-08-31 10:52:44 +0800832 Verify(options)
Jon Salz40b9f822014-07-25 16:39:55 +0800833 LogSourceHashes(options)
Jon Salzfe9036f2014-01-16 14:11:23 +0800834 UntarStatefulFiles(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800835 if options.cros_core:
836 logging.info('SetFirmwareBitmapLocale is skipped for ChromeOS Core device.')
837 else:
838 SetFirmwareBitmapLocale(options)
Jon Salzaa3a30e2013-05-15 15:56:28 +0800839 ClearFactoryVPDEntries(options)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200840 GenerateStableDeviceSecret(options)
Shen-En Shih3e079b22017-09-11 05:43:09 -0700841 ClearGBBFlags(options)
Hung-Te Lin6d827542012-07-19 11:50:41 +0800842 if options.no_write_protect:
Pi-Hsun Shih1f569a72019-12-26 11:23:56 +0800843 logging.warning('WARNING: Firmware Write Protection is SKIPPED.')
Andy Cheng0465d132013-03-20 12:12:06 +0800844 event_log.Log('wp', fw='both', status='skipped')
Hung-Te Lin6d827542012-07-19 11:50:41 +0800845 else:
Wei-Han Chenba21f512016-10-14 18:52:33 +0800846 EnableFwWp(options)
Marco Chenecee04f2019-02-15 22:24:24 +0800847 FpmcuInitializeEntropy(options)
Jon Salza0f58e02012-05-29 19:33:39 +0800848 LogSystemDetails(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800849 UploadReport(options)
Earl Ou51182222016-09-09 12:16:48 +0800850
851 event_log.Log('wipe_in_place')
852 wipe_args = []
Earl Ou51182222016-09-09 12:16:48 +0800853 if options.shopfloor_url:
854 wipe_args += ['--shopfloor_url', options.shopfloor_url]
855 if options.fast:
856 wipe_args += ['--fast']
857 if options.station_ip:
858 wipe_args += ['--station_ip', options.station_ip]
859 if options.station_port:
860 wipe_args += ['--station_port', options.station_port]
861 if options.wipe_finish_token:
862 wipe_args += ['--wipe_finish_token', options.wipe_finish_token]
863 ExecFactoryPar('gooftool', 'wipe_in_place', *wipe_args)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800864
865
Ting Shen129fa6f2016-09-02 12:22:24 +0800866@Command('verify_hwid',
867 _probe_results_cmd_arg,
868 _hwdb_path_cmd_arg,
869 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800870 _hwid_run_vpd_cmd_arg,
871 _hwid_vpd_data_file_cmd_arg,
Ting Shen129fa6f2016-09-02 12:22:24 +0800872 _rma_mode_cmd_arg)
873def VerifyHWID(options):
Ricky Liangc662be32013-12-24 11:50:23 +0800874 """A simple wrapper that calls out to HWID utils to verify version 3 HWID.
Ricky Liang53390232013-03-08 15:37:57 +0800875
Ricky Liangc662be32013-12-24 11:50:23 +0800876 This is mainly for Gooftool to verify v3 HWID during finalize. For testing
877 and development purposes, please use `hwid` command.
Ricky Liang53390232013-03-08 15:37:57 +0800878 """
Yong Hongada8e0e2018-01-04 16:36:21 +0800879 database = GetGooftool(options).db
Yong Hong68a0e0d2017-12-20 19:06:54 +0800880
Yong Hongada8e0e2018-01-04 16:36:21 +0800881 encoded_string = options.hwid or GetGooftool(options).ReadHWID()
882
883 probed_results = hwid_utils.GetProbedResults(infile=options.probe_results)
Yong Hong2c39bf22018-01-24 22:24:11 +0800884 device_info = hwid_utils.GetDeviceInfo()
Yong Hong65bda312018-12-13 20:05:58 +0800885 vpd_data = hwid_utils.GetVPDData(run_vpd=options.hwid_run_vpd,
886 infile=options.hwid_vpd_data_file)
Ricky Liang53390232013-03-08 15:37:57 +0800887
Hung-Te Lin11052952015-03-18 13:48:59 +0800888 event_log.Log('probed_results', probed_results=FilterDict(probed_results))
Yong Hong65bda312018-12-13 20:05:58 +0800889 event_log.Log('vpd', vpd=FilterDict(vpd_data))
Ricky Liang53390232013-03-08 15:37:57 +0800890
Yong Hong2c39bf22018-01-24 22:24:11 +0800891 hwid_utils.VerifyHWID(database, encoded_string, probed_results,
Yong Hong65bda312018-12-13 20:05:58 +0800892 device_info, vpd_data, options.rma_mode)
Ricky Liang53390232013-03-08 15:37:57 +0800893
Ricky Liangc662be32013-12-24 11:50:23 +0800894 event_log.Log('verified_hwid', hwid=encoded_string)
Ricky Liang53390232013-03-08 15:37:57 +0800895
896
henryhsu44d793a2013-07-20 00:07:38 +0800897@Command('get_firmware_hash',
Marco Chence70b132018-05-03 23:43:39 +0800898 CmdArg('--file', required=True, metavar='FILE', help='Firmware File.'))
henryhsu44d793a2013-07-20 00:07:38 +0800899def GetFirmwareHash(options):
henryhsuf6f835c2013-07-20 20:49:25 +0800900 """Get firmware hash from a file"""
henryhsu44d793a2013-07-20 00:07:38 +0800901 if os.path.exists(options.file):
Cheng-Han Yang2c668ae2018-04-18 22:31:07 +0800902 value_dict = chromeos_firmware.CalculateFirmwareHashes(options.file)
Yilin Yangea784662019-09-26 13:51:03 +0800903 for key, value in iteritems(value_dict):
Yilin Yang71e39412019-09-24 09:26:46 +0800904 print(' %s: %s' % (key, value))
henryhsu44d793a2013-07-20 00:07:38 +0800905 else:
906 raise Error('File does not exist: %s' % options.file)
907
henryhsuf6f835c2013-07-20 20:49:25 +0800908
Philip Chen04fb90b2019-11-06 12:10:33 -0800909@Command('fpmcu_initialize_entropy')
Marco Chenecee04f2019-02-15 22:24:24 +0800910def FpmcuInitializeEntropy(options):
911 """Initialze entropy of FPMCU."""
Philip Chen04fb90b2019-11-06 12:10:33 -0800912
913 if HasFpmcu():
Marco Chenecee04f2019-02-15 22:24:24 +0800914 GetGooftool(options).FpmcuInitializeEntropy()
Philip Chen04fb90b2019-11-06 12:10:33 -0800915 else:
916 logging.info('No FPS on this board.')
Marco Chenecee04f2019-02-15 22:24:24 +0800917
918
Peter Shihfdf17682017-05-26 11:38:39 +0800919def main():
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800920 """Run sub-command specified by the command line args."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800921
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800922 options = ParseCmdline(
Ting Shen129fa6f2016-09-02 12:22:24 +0800923 'Perform Google required factory tests.',
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800924 CmdArg('-l', '--log', metavar='PATH',
925 help='Write logs to this file.'),
Jon Salza4bea382012-10-29 13:00:34 +0800926 CmdArg('--suppress-event-logs', action='store_true',
927 help='Suppress event logging.'),
Wei-Han Chenaff56232016-04-16 09:17:59 +0800928 CmdArg('--phase', default=None,
929 help=('override phase for phase checking (defaults to the current '
930 'as returned by the "factory phase" command)')),
Wei-Han Chenb34bdff2019-09-26 13:07:50 +0800931 VERBOSITY_CMD_ARG)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800932 SetupLogging(options.verbosity, options.log)
Andy Cheng0465d132013-03-20 12:12:06 +0800933 event_log.SetGlobalLoggerDefaultPrefix('gooftool')
934 event_log.GetGlobalLogger().suppress = options.suppress_event_logs
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800935 logging.debug('gooftool options: %s', repr(options))
Wei-Han Chenaff56232016-04-16 09:17:59 +0800936
937 phase.OverridePhase(options.phase)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800938 try:
939 logging.debug('GOOFTOOL command %r', options.command_name)
940 options.command(options)
941 logging.info('GOOFTOOL command %r SUCCESS', options.command_name)
Peter Shih6674ecf2018-03-29 14:04:57 +0800942 except Error as e:
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800943 logging.exception(e)
944 sys.exit('GOOFTOOL command %r ERROR: %s' % (options.command_name, e))
Peter Shih6674ecf2018-03-29 14:04:57 +0800945 except Exception as e:
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800946 logging.exception(e)
947 sys.exit('UNCAUGHT RUNTIME EXCEPTION %s' % e)
948
949
950if __name__ == '__main__':
Peter Shihfdf17682017-05-26 11:38:39 +0800951 main()