blob: f51abcc06678fd07eee4373d5feea8ec91dd1374 [file] [log] [blame]
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08001#!/usr/bin/python
Jon Salze60307f2014-08-05 16:20:00 +08002# -*- coding: utf-8 -*-
3# Copyright 2014 The Chromium OS Authors. All rights reserved.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08004# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
Jon Salze60307f2014-08-05 16:20:00 +08007
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08008"""Google Factory Tool.
9
You-Cheng Syu461ec032017-03-06 15:56:58 +080010This tool is intended to be used on factory assembly lines. It
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080011provides all of the Google required test functionality and must be run
12on each device as part of the assembly process.
13"""
14
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080015import logging
16import os
Jon Salz65266432012-07-30 19:02:49 +080017import pipes
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080018import re
19import sys
Peter Shihfdf17682017-05-26 11:38:39 +080020from tempfile import gettempdir
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080021import threading
Hung-Te Lin6bd16472012-06-20 16:26:47 +080022import time
Jon Salza88b83b2013-05-27 20:00:35 +080023import xmlrpclib
Peter Shihfdf17682017-05-26 11:38:39 +080024
Ricky Liang7905f272013-03-16 01:57:10 +080025import yaml
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080026
Peter Shihfdf17682017-05-26 11:38:39 +080027import factory_common # pylint: disable=unused-import
Wei-Han Chen0a3320e2016-04-23 01:32:07 +080028from cros.factory.gooftool.common import ExecFactoryPar
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080029from cros.factory.gooftool.common import Shell
Peter Shihfdf17682017-05-26 11:38:39 +080030from cros.factory.gooftool.core import Gooftool
31from cros.factory.gooftool import crosfw
32from cros.factory.gooftool.probe import CalculateFirmwareHashes
Ting Shen129fa6f2016-09-02 12:22:24 +080033from cros.factory.gooftool.probe import Probe
34from cros.factory.gooftool.probe import ReadRoVpd
Peter Shihfdf17682017-05-26 11:38:39 +080035from cros.factory.gooftool import report_upload
Hung-Te Lin604e0c22015-11-24 15:17:07 +080036from cros.factory.hwid.v3 import common
37from cros.factory.hwid.v3 import hwid_utils
Wei-Han Chen2ebb92d2016-01-12 14:51:41 +080038from cros.factory.test.env import paths
Peter Shihfdf17682017-05-26 11:38:39 +080039from cros.factory.test import event_log
Wei-Han Chenaff56232016-04-16 09:17:59 +080040from cros.factory.test.rules import phase
Hung-Te Lin3f096842016-01-13 17:37:06 +080041from cros.factory.test.rules.privacy import FilterDict
Peter Shihfdf17682017-05-26 11:38:39 +080042from cros.factory.utils import argparse_utils
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080043from cros.factory.utils.argparse_utils import CmdArg
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080044from cros.factory.utils.argparse_utils import ParseCmdline
45from cros.factory.utils.argparse_utils import verbosity_cmd_arg
Peter Shihfdf17682017-05-26 11:38:39 +080046from cros.factory.utils.debug_utils import SetupLogging
Jon Salz40b9f822014-07-25 16:39:55 +080047from cros.factory.utils import file_utils
Wei-Han Chena5c01a02016-04-23 19:27:19 +080048from cros.factory.utils import sys_utils
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +080049from cros.factory.utils import time_utils
Jon Salzff88c022012-11-03 12:19:58 +080050from cros.factory.utils.process_utils import Spawn
Joel Kitchingd3bc2662014-12-16 16:03:32 -080051from cros.factory.utils.type_utils import Error
Tammo Spalink86a61c62012-05-25 15:10:35 +080052
Tammo Spalink5c699832012-07-03 17:50:39 +080053
Tammo Spalink5c699832012-07-03 17:50:39 +080054# TODO(tammo): Replace calls to sys.exit with raise Exit, and maybe
55# treat that specially (as a smoot exit, as opposed to the more
56# verbose output for generic Error).
57
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080058_global_gooftool = None
59_gooftool_lock = threading.Lock()
Tammo Spalink5c699832012-07-03 17:50:39 +080060
Hung-Te Lin56b18402015-01-16 14:52:30 +080061
Ricky Lianga70a1202013-03-15 15:03:17 +080062def GetGooftool(options):
Peter Shihfdf17682017-05-26 11:38:39 +080063 global _global_gooftool # pylint: disable=global-statement
Ricky Lianga70a1202013-03-15 15:03:17 +080064
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080065 if _global_gooftool is None:
66 with _gooftool_lock:
Shen-En Shihc5d15d62017-08-04 13:02:59 +080067 if _global_gooftool is None:
68 project = getattr(options, 'project', None)
69 hwdb_path = getattr(options, 'hwdb_path', None)
70 _global_gooftool = Gooftool(hwid_version=3, project=project,
71 hwdb_path=hwdb_path)
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080072
73 return _global_gooftool
Ricky Lianga70a1202013-03-15 15:03:17 +080074
Hung-Te Lin56b18402015-01-16 14:52:30 +080075
Ting Shen18a06382016-08-30 16:18:21 +080076def Command(cmd_name, *args, **kwargs):
77 """ Decorator for commands in gooftool.
78
79 This is similar to argparse_utils.Command, but all gooftool commands
80 can be waived during `gooftool finalize` or `gooftool verify` using
Wei-Han Chen60c5d332017-01-05 17:15:10 +080081 --waive_list or --skip_list option.
Ting Shen18a06382016-08-30 16:18:21 +080082 """
83 def Decorate(fun):
Wei-Han Chen60c5d332017-01-05 17:15:10 +080084 def CommandWithWaiveSkipCheck(options):
Ting Shen18a06382016-08-30 16:18:21 +080085 waive_list = vars(options).get('waive_list', [])
Wei-Han Chen60c5d332017-01-05 17:15:10 +080086 skip_list = vars(options).get('skip_list', [])
87 if phase.GetPhase() >= phase.PVT_DOGFOOD and (
88 waive_list != [] or skip_list != []):
Ting Shen18a06382016-08-30 16:18:21 +080089 raise Error(
Wei-Han Chen60c5d332017-01-05 17:15:10 +080090 'waive_list and skip_list should be empty for phase %s' %
91 phase.GetPhase())
Ting Shen18a06382016-08-30 16:18:21 +080092
Wei-Han Chen60c5d332017-01-05 17:15:10 +080093 if cmd_name not in skip_list:
94 try:
95 fun(options)
96 except Exception as e:
97 if cmd_name in waive_list:
98 logging.exception(e)
99 else:
100 raise
Ting Shen18a06382016-08-30 16:18:21 +0800101
102 return argparse_utils.Command(cmd_name, *args, **kwargs)(
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800103 CommandWithWaiveSkipCheck)
Ting Shen18a06382016-08-30 16:18:21 +0800104 return Decorate
105
106
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800107@Command('write_hwid',
108 CmdArg('hwid', metavar='HWID', help='HWID string'))
Andy Chengc92e6f92012-11-20 16:55:53 +0800109def WriteHWID(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800110 """Write specified HWID value into the system BB."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800111
Tammo Spalink95c43732012-07-25 15:57:14 -0700112 logging.info('writing hwid string %r', options.hwid)
Ricky Lianga70a1202013-03-15 15:03:17 +0800113 GetGooftool(options).WriteHWID(options.hwid)
Andy Cheng0465d132013-03-20 12:12:06 +0800114 event_log.Log('write_hwid', hwid=options.hwid)
Tammo Spalink95c43732012-07-25 15:57:14 -0700115 print 'Wrote HWID: %r' % options.hwid
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800116
117
Yong Hong5408f652017-07-11 19:20:25 +0800118_project_cmd_arg = CmdArg(
119 '--project', metavar='PROJECT',
120 default=None, help='Project name to test.')
Ricky Liang53390232013-03-08 15:37:57 +0800121
Tammo Spalink8fab5312012-05-28 18:33:30 +0800122_hwdb_path_cmd_arg = CmdArg(
123 '--hwdb_path', metavar='PATH',
Ricky Liangeede7922013-06-19 10:18:41 +0800124 default=common.DEFAULT_HWID_DATA_PATH,
Tammo Spalink8fab5312012-05-28 18:33:30 +0800125 help='Path to the HWID database.')
126
Tammo Spalink95c43732012-07-25 15:57:14 -0700127_hwid_status_list_cmd_arg = CmdArg(
Hung-Te Lin56b18402015-01-16 14:52:30 +0800128 '--status', nargs='*', default=['supported'],
129 help='allow only HWIDs with these status values')
Tammo Spalink95c43732012-07-25 15:57:14 -0700130
Jon Salzce124fb2012-10-02 17:42:03 +0800131_probe_results_cmd_arg = CmdArg(
132 '--probe_results', metavar='RESULTS.yaml',
Ricky Liangc662be32013-12-24 11:50:23 +0800133 help=('Output from "gooftool probe --include_vpd" (used instead of '
Jon Salzce124fb2012-10-02 17:42:03 +0800134 'probing this system).'))
135
Ricky Liang53390232013-03-08 15:37:57 +0800136_device_info_cmd_arg = CmdArg(
Ricky Liangf89f73a2013-03-19 05:00:24 +0800137 '--device_info', metavar='DEVICE_INFO.yaml', default=None,
Ricky Liang53390232013-03-08 15:37:57 +0800138 help='A dict of device info to use instead of fetching from shopfllor '
139 'server.')
140
Jon Salzce124fb2012-10-02 17:42:03 +0800141_hwid_cmd_arg = CmdArg(
142 '--hwid', metavar='HWID',
Ricky Lianga70a1202013-03-15 15:03:17 +0800143 help='HWID to verify (instead of the currently set HWID of this system).')
Jon Salzce124fb2012-10-02 17:42:03 +0800144
Bernie Thompson3c11c872013-07-22 18:22:45 -0700145_rma_mode_cmd_arg = CmdArg(
146 '--rma_mode', action='store_true',
147 help='Enable RMA mode, do not check for deprecated components.')
Tammo Spalink95c43732012-07-25 15:57:14 -0700148
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800149_cros_core_cmd_arg = CmdArg(
150 '--cros_core', action='store_true',
151 help='Finalize for ChromeOS Core devices (may add or remove few test '
Hung-Te Lin53c49402017-07-26 13:10:58 +0800152 'items. For example, registration codes or firmware bitmap '
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800153 'locale settings).')
154
bowgotsai13820f42015-09-10 23:18:04 +0800155_enforced_release_channels_cmd_arg = CmdArg(
156 '--enforced_release_channels', nargs='*', default=None,
157 help='Enforced release image channels.')
158
Hung-Te Lincdb96522016-04-15 16:51:10 +0800159_release_rootfs_cmd_arg = CmdArg(
160 '--release_rootfs', help='Location of release image rootfs partition.')
161
162_firmware_path_cmd_arg = CmdArg(
163 '--firmware_path', help='Location of firmware image partition.')
Ricky Liang43b879b2014-02-24 11:36:55 +0800164
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800165_shopfloor_url_args_cmd_arg = CmdArg(
166 '--shopfloor_url',
Earl Ou51182222016-09-09 12:16:48 +0800167 help='Shopfloor server url to be informed when wiping is done. '
168 'After wiping, a XML-RPC request will be sent to the '
169 'given url to indicate the completion of wiping.')
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800170
171_station_ip_cmd_arg = CmdArg(
172 '--station_ip',
173 help='IP of remote station')
174
175_station_port_cmd_arg = CmdArg(
176 '--station_port',
177 help='Port on remote station')
178
179_wipe_finish_token_cmd_arg = CmdArg(
180 '--wipe_finish_token',
181 help='Required token when notifying station after wipe finished')
182
Ting Shen18a06382016-08-30 16:18:21 +0800183_waive_list_cmd_arg = CmdArg(
184 '--waive_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu461ec032017-03-06 15:56:58 +0800185 help='A list of waived checks, separated by whitespace.'
Ting Shen18a06382016-08-30 16:18:21 +0800186 'Each item should be a sub-command of gooftool.'
187 'e.g. "gooftool verify --waive_list verify_tpm clear_gbb_flags".')
188
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800189_skip_list_cmd_arg = CmdArg(
190 '--skip_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu461ec032017-03-06 15:56:58 +0800191 help='A list of skipped checks, separated by whitespace.'
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800192 'Each item should be a sub-command of gooftool.'
193 'e.g. "gooftool verify --skip_list verify_tpm clear_gbb_flags".')
194
Tammo Spalink8fab5312012-05-28 18:33:30 +0800195
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800196@Command('probe',
197 CmdArg('--comps', nargs='*',
198 help='List of keys from the component_db registry.'),
Ricky Liangb30da672013-06-14 12:36:34 +0800199 CmdArg('--fast_fw_probe', action='store_true',
200 help='Do a fast probe for EC and main firmware versions only. '
201 'This implies --no_vol and --no_ic.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800202 CmdArg('--no_vol', action='store_true',
203 help='Do not probe volatile data.'),
204 CmdArg('--no_ic', action='store_true',
Jon Salz0f8a6842012-09-25 11:28:22 +0800205 help='Do not probe initial_config data.'),
206 CmdArg('--include_vpd', action='store_true',
207 help='Include VPD data in volatiles.'))
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800208def RunProbe(options):
209 """Print yaml-formatted breakdown of probed device properties."""
Ricky Lianga70a1202013-03-15 15:03:17 +0800210 print GetGooftool(options).Probe(
211 target_comp_classes=options.comps,
Ricky Liangb30da672013-06-14 12:36:34 +0800212 fast_fw_probe=options.fast_fw_probe,
Ricky Lianga70a1202013-03-15 15:03:17 +0800213 probe_volatile=not options.no_vol,
214 probe_initial_config=not options.no_ic,
215 probe_vpd=options.include_vpd).Encode()
Ricky Liang53390232013-03-08 15:37:57 +0800216
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800217
Tammo Spalink214caf42012-05-28 10:45:00 +0800218@Command('verify_components',
219 _hwdb_path_cmd_arg,
Tammo Spalink5c699832012-07-03 17:50:39 +0800220 CmdArg('target_comps', nargs='*'))
Tammo Spalink214caf42012-05-28 10:45:00 +0800221def VerifyComponents(options):
Andy Cheng8ece7382012-08-22 16:25:42 +0800222 """Verify that probeable components all match entries in the component_db.
Tammo Spalink214caf42012-05-28 10:45:00 +0800223
Tammo Spalink5c699832012-07-03 17:50:39 +0800224 Probe for each component class in the target_comps and verify
Tammo Spalink214caf42012-05-28 10:45:00 +0800225 that a corresponding match exists in the component_db -- make sure
226 that these components are present, that they have been approved, but
227 do not check against any specific BOM/HWID configurations.
228 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800229
Andy Chengc531e2f2012-10-15 19:09:17 +0800230 try:
Ricky Lianga70a1202013-03-15 15:03:17 +0800231 result = GetGooftool(options).VerifyComponents(
Andy Chengc531e2f2012-10-15 19:09:17 +0800232 options.target_comps)
233 except ValueError, e:
234 sys.exit(e)
235
Ricky Liang53390232013-03-08 15:37:57 +0800236 PrintVerifyComponentsResults(result)
237
238
239def PrintVerifyComponentsResults(result):
240 """Prints out the results of VerifyComponents method call.
241
242 Groups the results into two groups: 'matches' and 'errors', and prints out
243 their values.
244 """
Andy Chengc531e2f2012-10-15 19:09:17 +0800245 # group by matches and errors
Tammo Spalink214caf42012-05-28 10:45:00 +0800246 matches = []
Andy Chengc531e2f2012-10-15 19:09:17 +0800247 errors = []
248 for result_list in result.values():
249 for component_name, _, error in result_list:
250 if component_name:
251 matches.append(component_name)
Tammo Spalink214caf42012-05-28 10:45:00 +0800252 else:
Andy Chengc531e2f2012-10-15 19:09:17 +0800253 errors.append(error)
254
Andy Cheng228a8c92012-08-27 10:53:57 +0800255 if matches:
256 print 'found probeable components:\n %s' % '\n '.join(matches)
Tammo Spalink214caf42012-05-28 10:45:00 +0800257 if errors:
Andy Cheng228a8c92012-08-27 10:53:57 +0800258 print '\nerrors:\n %s' % '\n '.join(errors)
259 sys.exit('\ncomponent verification FAILURE')
Tammo Spalink214caf42012-05-28 10:45:00 +0800260 else:
Hung-Te Lin56b18402015-01-16 14:52:30 +0800261 print '\ncomponent verification SUCCESS'
Tammo Spalink214caf42012-05-28 10:45:00 +0800262
263
Hung-Te Line1d80f62016-03-31 14:58:13 +0800264@Command('verify_keys',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800265 _release_rootfs_cmd_arg,
266 _firmware_path_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800267def VerifyKeys(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800268 """Verify keys in firmware and SSD match."""
Hung-Te Line1d80f62016-03-31 14:58:13 +0800269 return GetGooftool(options).VerifyKeys(
Hung-Te Lincdb96522016-04-15 16:51:10 +0800270 options.release_rootfs, options.firmware_path)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800271
272
273@Command('set_fw_bitmap_locale')
Peter Shihfdf17682017-05-26 11:38:39 +0800274def SetFirmwareBitmapLocale(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800275 """Use VPD locale value to set firmware bitmap default language."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800276
Ricky Lianga70a1202013-03-15 15:03:17 +0800277 (index, locale) = GetGooftool(options).SetFirmwareBitmapLocale()
Andy Cheng2582d292012-12-04 17:38:28 +0800278 logging.info('Firmware bitmap initial locale set to %d (%s).',
279 index, locale)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800280
281
Hung-Te Line1d80f62016-03-31 14:58:13 +0800282@Command('verify_system_time',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800283 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800284def VerifySystemTime(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800285 """Verify system time is later than release filesystem creation time."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800286
Hung-Te Lincdb96522016-04-15 16:51:10 +0800287 return GetGooftool(options).VerifySystemTime(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800288
289
Hung-Te Line1d80f62016-03-31 14:58:13 +0800290@Command('verify_rootfs',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800291 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800292def VerifyRootFs(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800293 """Verify rootfs on SSD is valid by checking hash."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800294
Hung-Te Line1d80f62016-03-31 14:58:13 +0800295 return GetGooftool(options).VerifyRootFs(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800296
Hung-Te Lin56b18402015-01-16 14:52:30 +0800297
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800298@Command('verify_tpm')
Peter Shihfdf17682017-05-26 11:38:39 +0800299def VerifyTPM(options):
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800300 """Verify TPM is cleared."""
301
302 return GetGooftool(options).VerifyTPM()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800303
Hung-Te Lin56b18402015-01-16 14:52:30 +0800304
Hung-Te Lindd708d42014-07-11 17:05:01 +0800305@Command('verify_me_locked')
Peter Shihfdf17682017-05-26 11:38:39 +0800306def VerifyManagementEngineLocked(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800307 """Verify Management Engine is locked."""
Hung-Te Lindd708d42014-07-11 17:05:01 +0800308
309 return GetGooftool(options).VerifyManagementEngineLocked()
310
Hung-Te Lin56b18402015-01-16 14:52:30 +0800311
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800312@Command('verify_switch_wp')
Peter Shihfdf17682017-05-26 11:38:39 +0800313def VerifyWPSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800314 """Verify hardware write protection switch is enabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800315
Ricky Lianga70a1202013-03-15 15:03:17 +0800316 GetGooftool(options).VerifyWPSwitch()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800317
318
319@Command('verify_switch_dev')
Peter Shihfdf17682017-05-26 11:38:39 +0800320def VerifyDevSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800321 """Verify developer switch is disabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800322
Ricky Lianga70a1202013-03-15 15:03:17 +0800323 if GetGooftool(options).CheckDevSwitchForDisabling():
Hung-Te Lind7d34722012-07-26 16:48:35 +0800324 logging.warn('VerifyDevSwitch: No physical switch.')
Andy Cheng0465d132013-03-20 12:12:06 +0800325 event_log.Log('switch_dev', type='virtual switch')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800326
327
Hung-Te Lin53c49402017-07-26 13:10:58 +0800328@Command('verify_vpd')
329def VerifyVPD(options):
330 """Verify that VPD values are properly set.
Jon Salzadd90d32014-04-29 16:16:27 +0800331
Hung-Te Lin53c49402017-07-26 13:10:58 +0800332 Check if mandatory fields are set, and deprecated fields don't exist.
Jon Salzadd90d32014-04-29 16:16:27 +0800333 """
Hung-Te Lin53c49402017-07-26 13:10:58 +0800334 return GetGooftool(options).VerifyVPD()
Jon Salzadd90d32014-04-29 16:16:27 +0800335
336
bowgotsai13820f42015-09-10 23:18:04 +0800337@Command('verify_release_channel',
338 _enforced_release_channels_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800339def VerifyReleaseChannel(options):
bowgotsai529139c2015-05-30 01:39:49 +0800340 """Verify that release image channel is correct.
341
342 ChromeOS has four channels: canary, dev, beta and stable.
343 The last three channels support image auto-updates, checks
344 that release image channel is one of them.
345 """
bowgotsai13820f42015-09-10 23:18:04 +0800346 return GetGooftool(options).VerifyReleaseChannel(
347 options.enforced_release_channels)
bowgotsai529139c2015-05-30 01:39:49 +0800348
349
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800350@Command('write_protect')
Peter Shihfdf17682017-05-26 11:38:39 +0800351def EnableFwWp(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800352 """Enable then verify firmware write protection."""
Peter Shihfdf17682017-05-26 11:38:39 +0800353 del options # Unused.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800354
Hung-Te Linb21c6682012-08-01 13:53:57 +0800355 def CalculateLegacyRange(fw_type, length, section_data,
356 section_name):
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800357 ro_size = length / 2
358 ro_a = int(section_data[0] / ro_size)
359 ro_b = int((section_data[0] + section_data[1] - 1) / ro_size)
360 if ro_a != ro_b:
Hung-Te Lin56b18402015-01-16 14:52:30 +0800361 raise Error('%s firmware section %s has illegal size' %
Hung-Te Linb21c6682012-08-01 13:53:57 +0800362 (fw_type, section_name))
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800363 ro_offset = ro_a * ro_size
364 return (ro_offset, ro_size)
365
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800366 def WriteProtect(fw_file_path, fw_type, legacy_section=None):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800367 """Calculate protection size, then invoke flashrom.
368
369 Our supported chips only allow write protecting half their total
You-Cheng Syu461ec032017-03-06 15:56:58 +0800370 size, so we partition the flash chipset space accordingly.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800371 """
372 raw_image = open(fw_file_path, 'rb').read()
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800373 wp_section = 'WP_RO'
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800374 image = crosfw.FirmwareImage(raw_image)
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800375 if image.has_section(wp_section):
376 section_data = image.get_section_area(wp_section)
377 ro_offset = section_data[0]
378 ro_size = section_data[1]
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800379 elif legacy_section is not None and image.has_section(legacy_section):
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800380 section_data = image.get_section_area(legacy_section)
381 (ro_offset, ro_size) = CalculateLegacyRange(
Hung-Te Linb21c6682012-08-01 13:53:57 +0800382 fw_type, len(raw_image), section_data, legacy_section)
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800383 else:
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800384 raise Error('Could not find %s firmware section: %s %s' %
385 (fw_type, wp_section, legacy_section or ''))
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800386
387 logging.debug('write protecting %s [off=%x size=%x]', fw_type,
388 ro_offset, ro_size)
389 crosfw.Flashrom(fw_type).EnableWriteProtection(ro_offset, ro_size)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800390
391 WriteProtect(crosfw.LoadMainFirmware().GetFileName(), 'main', 'RO_SECTION')
Andy Cheng0465d132013-03-20 12:12:06 +0800392 event_log.Log('wp', fw='main')
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800393
394 # Some EC (mostly PD) does not support "RO NOW". Instead they will only set
395 # "RO_AT_BOOT" when you request to enable RO (These platforms consider
396 # --wp-range with right range identical to --wp-enable), and requires a
397 # 'ectool reboot_ec RO at-shutdown; reboot' to let the RO take effect.
Hung-Te Lin0d10b562016-12-28 10:58:07 +0800398 # After reboot, "flashrom -p host --wp-status" will return protected range.
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800399 # If you don't reboot, returned range will be (0, 0), and running command
400 # "ectool flashprotect" will not have RO_NOW.
401
402 targets = [
403 ('EC', crosfw.TARGET_EC, crosfw.LoadEcFirmware, 'EC_RO'),
404 ('PD', crosfw.TARGET_PD, crosfw.LoadPDFirmware, None)]
405 for (name, fw_type, provider, legacy_section) in targets:
406 fw_file = provider().GetFileName()
407 if fw_file is None:
408 logging.warning('%s not write protected (seems there is no %s flash).',
409 name, name)
410 continue
411 WriteProtect(fw_file, fw_type, legacy_section)
412 event_log.Log('wp', fw=fw_type)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800413
414
415@Command('clear_gbb_flags')
Peter Shihfdf17682017-05-26 11:38:39 +0800416def ClearGBBFlags(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800417 """Zero out the GBB flags, in preparation for transition to release state.
418
419 No GBB flags are set in release/shipping state, but they are useful
420 for factory/development. See "gbb_utility --flags" for details.
421 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800422
Ricky Lianga70a1202013-03-15 15:03:17 +0800423 GetGooftool(options).ClearGBBFlags()
Andy Cheng0465d132013-03-20 12:12:06 +0800424 event_log.Log('clear_gbb_flags')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800425
426
Jon Salzaa3a30e2013-05-15 15:56:28 +0800427@Command('clear_factory_vpd_entries')
Peter Shihfdf17682017-05-26 11:38:39 +0800428def ClearFactoryVPDEntries(options):
Jon Salzaa3a30e2013-05-15 15:56:28 +0800429 """Clears factory.* items in the RW VPD."""
430 entries = GetGooftool(options).ClearFactoryVPDEntries()
431 event_log.Log('clear_factory_vpd_entries', entries=FilterDict(entries))
432
433
Mattias Nisslercca761b2015-04-15 21:53:04 +0200434@Command('generate_stable_device_secret')
Peter Shihfdf17682017-05-26 11:38:39 +0800435def GenerateStableDeviceSecret(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800436 """Generates a fresh stable device secret and stores it in the RO VPD."""
Mattias Nisslercca761b2015-04-15 21:53:04 +0200437 GetGooftool(options).GenerateStableDeviceSecret()
438 event_log.Log('generate_stable_device_secret')
439
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800440
Shen-En Shihd078a7c2017-08-04 13:33:49 +0800441@Command('cr50_set_board_id')
442def Cr50SetBoardId(options):
443 """Set the board id and flag in the Cr50 chip."""
444 GetGooftool(options).Cr50SetBoardId()
445 event_log.Log('cr50_set_board_id')
446
447
Earl Ou564a7872016-10-05 10:22:00 +0800448@Command('enable_release_partition',
449 CmdArg('--release_rootfs',
450 help=('path to the release rootfs device. If not specified, '
451 'the default (5th) partition will be used.')))
452def EnableReleasePartition(options):
453 """Enables a release image partition on the disk."""
454 GetGooftool(options).EnableReleasePartition(options.release_rootfs)
455
456
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800457@Command('wipe_in_place',
458 CmdArg('--fast', action='store_true',
Shun-Hsing Ou8d3c40a2015-10-08 18:16:08 +0800459 help='use non-secure but faster wipe method.'),
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800460 _shopfloor_url_args_cmd_arg,
461 _station_ip_cmd_arg,
462 _station_port_cmd_arg,
463 _wipe_finish_token_cmd_arg)
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800464def WipeInPlace(options):
465 """Start factory wipe directly without reboot."""
466
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800467 GetGooftool(options).WipeInPlace(options.fast,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800468 options.shopfloor_url,
469 options.station_ip,
470 options.station_port,
471 options.wipe_finish_token)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200472
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800473@Command('wipe_init',
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800474 CmdArg('--wipe_args', help='arguments for clobber-state'),
475 CmdArg('--state_dev', help='path to stateful partition device'),
476 CmdArg('--root_disk', help='path to primary device'),
477 CmdArg('--old_root', help='path to old root'),
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800478 _shopfloor_url_args_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800479 _release_rootfs_cmd_arg,
480 _station_ip_cmd_arg,
481 _station_port_cmd_arg,
482 _wipe_finish_token_cmd_arg)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800483def WipeInit(options):
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800484 GetGooftool(options).WipeInit(options.wipe_args,
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800485 options.shopfloor_url,
486 options.state_dev,
487 options.release_rootfs,
488 options.root_disk,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800489 options.old_root,
490 options.station_ip,
491 options.station_port,
492 options.wipe_finish_token)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800493
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800494@Command('verify',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800495 CmdArg('--no_write_protect', action='store_true',
496 help='Do not check write protection switch state.'),
Tammo Spalink95c43732012-07-25 15:57:14 -0700497 _hwid_status_list_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800498 _hwdb_path_cmd_arg,
Yong Hong5408f652017-07-11 19:20:25 +0800499 _project_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800500 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800501 _hwid_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800502 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800503 _cros_core_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800504 _release_rootfs_cmd_arg,
505 _firmware_path_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800506 _enforced_release_channels_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800507 _waive_list_cmd_arg,
508 _skip_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800509def Verify(options):
510 """Verifies if whole factory process is ready for finalization.
511
512 This routine performs all the necessary checks to make sure the
513 device is ready to be finalized, but does not modify state. These
514 checks include dev switch, firmware write protection switch, hwid,
515 system time, keys, and root file system.
516 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800517
Hung-Te Lin6d827542012-07-19 11:50:41 +0800518 if not options.no_write_protect:
Ricky Lianga70a1202013-03-15 15:03:17 +0800519 VerifyWPSwitch(options)
Hung-Te Lindd708d42014-07-11 17:05:01 +0800520 VerifyManagementEngineLocked(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800521 VerifyDevSwitch(options)
Ting Shen129fa6f2016-09-02 12:22:24 +0800522 VerifyHWID(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800523 VerifySystemTime(options)
524 VerifyKeys(options)
525 VerifyRootFs(options)
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800526 VerifyTPM(options)
Hung-Te Lin53c49402017-07-26 13:10:58 +0800527 VerifyVPD(options)
bowgotsai529139c2015-05-30 01:39:49 +0800528 VerifyReleaseChannel(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800529
Hung-Te Lin56b18402015-01-16 14:52:30 +0800530
Jon Salzfe9036f2014-01-16 14:11:23 +0800531@Command('untar_stateful_files')
Hung-Te Lin388bce22014-06-03 19:56:40 +0800532def UntarStatefulFiles(unused_options):
Jon Salzfe9036f2014-01-16 14:11:23 +0800533 """Untars stateful files from stateful_files.tar.xz on stateful partition.
534
535 If that file does not exist (which should only be R30 and earlier),
536 this is a no-op.
537 """
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800538 # Path to stateful partition on device.
539 device_stateful_path = '/mnt/stateful_partition'
540 tar_file = os.path.join(device_stateful_path, 'stateful_files.tar.xz')
Jon Salzfe9036f2014-01-16 14:11:23 +0800541 if os.path.exists(tar_file):
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800542 Spawn(['tar', 'xf', tar_file], cwd=device_stateful_path,
Jon Salzfe9036f2014-01-16 14:11:23 +0800543 log=True, check_call=True)
544 else:
545 logging.warning('No stateful files at %s', tar_file)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800546
Jon Salz40b9f822014-07-25 16:39:55 +0800547
548@Command('log_source_hashes')
Peter Shihfdf17682017-05-26 11:38:39 +0800549def LogSourceHashes(options):
Jon Salz40b9f822014-07-25 16:39:55 +0800550 """Logs hashes of source files in the factory toolkit."""
Peter Shihfdf17682017-05-26 11:38:39 +0800551 del options # Unused.
Jon Salze60307f2014-08-05 16:20:00 +0800552 # WARNING: The following line is necessary to validate the integrity
553 # of the factory software. Do not remove or modify it.
554 #
555 # 警告:此行会验证工厂软件的完整性,禁止删除或修改。
Wei-Han Chena5c01a02016-04-23 19:27:19 +0800556 factory_par = sys_utils.GetRunningFactoryPythonArchivePath()
557 if factory_par:
558 event_log.Log(
559 'source_hashes',
560 **file_utils.HashPythonArchive(factory_par))
561 else:
562 event_log.Log(
563 'source_hashes',
Peter Shihad166772017-05-31 11:36:17 +0800564 **file_utils.HashSourceTree(os.path.join(paths.FACTORY_DIR, 'py')))
Jon Salz40b9f822014-07-25 16:39:55 +0800565
566
Tammo Spalink86a61c62012-05-25 15:10:35 +0800567@Command('log_system_details')
Peter Shihfdf17682017-05-26 11:38:39 +0800568def LogSystemDetails(options):
Tammo Spalink86a61c62012-05-25 15:10:35 +0800569 """Write miscellaneous system details to the event log."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800570
Ricky Liang43b879b2014-02-24 11:36:55 +0800571 event_log.Log('system_details', **GetGooftool(options).GetSystemDetails())
Tammo Spalink86a61c62012-05-25 15:10:35 +0800572
573
Jon Salza88b83b2013-05-27 20:00:35 +0800574def CreateReportArchiveBlob(*args, **kwargs):
575 """Creates a report archive and returns it as a blob.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800576
Jon Salza88b83b2013-05-27 20:00:35 +0800577 Args:
578 See CreateReportArchive.
Andy Cheng7a76cb82012-11-19 18:08:19 +0800579
Jon Salza88b83b2013-05-27 20:00:35 +0800580 Returns:
581 An xmlrpclib.Binary object containing a .tar.xz file.
582 """
Wei-Han Chen47416612016-09-14 17:41:52 +0800583 report_archive = CreateReportArchive(*args, **kwargs)
584 try:
585 with open(report_archive) as f:
586 return xmlrpclib.Binary(f.read())
587 finally:
588 os.unlink(report_archive)
Jon Salza88b83b2013-05-27 20:00:35 +0800589
590
591def CreateReportArchive(device_sn=None, add_file=None):
592 """Creates a report archive in a temporary directory.
593
594 Args:
595 device_sn: The device serial number (optional).
596 add_file: A list of files to add (optional).
597
598 Returns:
599 Path to the archive.
600 """
Hung-Te Lin6bd16472012-06-20 16:26:47 +0800601 def NormalizeAsFileName(token):
602 return re.sub(r'\W+', '', token).strip()
Jon Salza88b83b2013-05-27 20:00:35 +0800603
604 target_name = '%s%s.tar.xz' % (
605 time.strftime('%Y%m%dT%H%M%SZ',
606 time.gmtime()),
Hung-Te Lin56b18402015-01-16 14:52:30 +0800607 ('' if device_sn is None else
608 '_' + NormalizeAsFileName(device_sn)))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800609 target_path = os.path.join(gettempdir(), target_name)
Jon Salza88b83b2013-05-27 20:00:35 +0800610
Tammo Spalink86a61c62012-05-25 15:10:35 +0800611 # Intentionally ignoring dotfiles in EVENT_LOG_DIR.
Andy Cheng0465d132013-03-20 12:12:06 +0800612 tar_cmd = 'cd %s ; tar cJf %s *' % (event_log.EVENT_LOG_DIR, target_path)
Peter Shihb4e49352017-05-25 17:35:11 +0800613 tar_cmd += ' %s' % paths.FACTORY_LOG_PATH
Jon Salza88b83b2013-05-27 20:00:35 +0800614 if add_file:
615 for f in add_file:
Jon Salz65266432012-07-30 19:02:49 +0800616 # Require absolute paths since the tar command may change the
617 # directory.
618 if not f.startswith('/'):
619 raise Error('Not an absolute path: %s' % f)
620 if not os.path.exists(f):
621 raise Error('File does not exist: %s' % f)
Wei-Han Chen4b755022017-01-04 10:51:52 +0800622 tar_cmd += ' %s' % pipes.quote(f)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800623 cmd_result = Shell(tar_cmd)
Jon Salzff88c022012-11-03 12:19:58 +0800624
625 if ((cmd_result.status == 1) and
626 all((x == '' or
627 'file changed as we read it' in x or
628 "Removing leading `/' from member names" in x)
629 for x in cmd_result.stderr.split('\n'))):
630 # That's OK. Make sure it's valid though.
Vic Yang85199e72013-01-28 14:33:11 +0800631 Spawn(['tar', 'tfJ', target_path], check_call=True, log=True,
Jon Salzff88c022012-11-03 12:19:58 +0800632 ignore_stdout=True)
633 elif not cmd_result.success:
Tammo Spalink86a61c62012-05-25 15:10:35 +0800634 raise Error('unable to tar event logs, cmd %r failed, stderr: %r' %
635 (tar_cmd, cmd_result.stderr))
Jon Salzff88c022012-11-03 12:19:58 +0800636
Jon Salza88b83b2013-05-27 20:00:35 +0800637 return target_path
638
639_upload_method_cmd_arg = CmdArg(
640 '--upload_method', metavar='METHOD:PARAM',
641 help=('How to perform the upload. METHOD should be one of '
642 '{ftp, shopfloor, ftps, cpfe}.'))
643_add_file_cmd_arg = CmdArg(
644 '--add_file', metavar='FILE', action='append',
645 help='Extra file to include in report (must be an absolute path)')
646
Hung-Te Lin56b18402015-01-16 14:52:30 +0800647
Jon Salza88b83b2013-05-27 20:00:35 +0800648@Command('upload_report',
649 _upload_method_cmd_arg,
650 _add_file_cmd_arg)
651def UploadReport(options):
652 """Create a report containing key device details."""
Hung-Te Lin74346d72016-01-07 22:16:57 +0800653 ro_vpd = ReadRoVpd()
Jon Salza88b83b2013-05-27 20:00:35 +0800654 device_sn = ro_vpd.get('serial_number', None)
655 if device_sn is None:
656 logging.warning('RO_VPD missing device serial number')
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +0800657 device_sn = 'MISSING_SN_' + time_utils.TimedUUID()
Jon Salza88b83b2013-05-27 20:00:35 +0800658 target_path = CreateReportArchive(device_sn)
659
Tammo Spalink86a61c62012-05-25 15:10:35 +0800660 if options.upload_method is None or options.upload_method == 'none':
661 logging.warning('REPORT UPLOAD SKIPPED (report left at %s)', target_path)
662 return
663 method, param = options.upload_method.split(':', 1)
664 if method == 'shopfloor':
665 report_upload.ShopFloorUpload(target_path, param)
666 elif method == 'ftp':
Jay Kim360c1dd2012-06-25 10:58:11 -0700667 report_upload.FtpUpload(target_path, 'ftp:' + param)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800668 elif method == 'ftps':
669 report_upload.CurlUrlUpload(target_path, '--ftp-ssl-reqd ftp:%s' % param)
670 elif method == 'cpfe':
Shawn Nematbakhsh3404a092013-01-28 16:49:09 -0800671 report_upload.CpfeUpload(target_path, pipes.quote(param))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800672 else:
673 raise Error('unknown report upload method %r', method)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800674
675
676@Command('finalize',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800677 CmdArg('--no_write_protect', action='store_true',
678 help='Do not enable firmware write protection.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800679 CmdArg('--fast', action='store_true',
680 help='use non-secure but faster wipe method.'),
Shun-Hsing Oudb407d62015-11-11 11:03:59 +0800681 _shopfloor_url_args_cmd_arg,
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800682 _hwdb_path_cmd_arg,
Tammo Spalink95c43732012-07-25 15:57:14 -0700683 _hwid_status_list_cmd_arg,
Jon Salz65266432012-07-30 19:02:49 +0800684 _upload_method_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800685 _add_file_cmd_arg,
686 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800687 _hwid_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800688 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800689 _cros_core_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800690 _release_rootfs_cmd_arg,
691 _firmware_path_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800692 _enforced_release_channels_cmd_arg,
693 _station_ip_cmd_arg,
694 _station_port_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800695 _wipe_finish_token_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800696 _waive_list_cmd_arg,
697 _skip_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800698def Finalize(options):
699 """Verify system readiness and trigger transition into release state.
700
Jon Salzaa3a30e2013-05-15 15:56:28 +0800701 This routine does the following:
702 - Verifies system state (see verify command)
Jon Salzfe9036f2014-01-16 14:11:23 +0800703 - Untars stateful_files.tar.xz, if it exists, in the stateful partition, to
704 initialize files such as the CRX cache
Jon Salzaa3a30e2013-05-15 15:56:28 +0800705 - Modifies firmware bitmaps to match locale
706 - Clears all factory-friendly flags from the GBB
707 - Removes factory-specific entries from RW_VPD (factory.*)
708 - Enables firmware write protection (cannot rollback after this)
709 - Uploads system logs & reports
Earl Ou51182222016-09-09 12:16:48 +0800710 - Wipes the testing kernel, rootfs, and stateful partition
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800711 """
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800712 Verify(options)
Shen-En Shih3e079b22017-09-11 05:43:09 -0700713 Cr50SetBoardId(options)
Jon Salz40b9f822014-07-25 16:39:55 +0800714 LogSourceHashes(options)
Jon Salzfe9036f2014-01-16 14:11:23 +0800715 UntarStatefulFiles(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800716 if options.cros_core:
717 logging.info('SetFirmwareBitmapLocale is skipped for ChromeOS Core device.')
718 else:
719 SetFirmwareBitmapLocale(options)
Jon Salzaa3a30e2013-05-15 15:56:28 +0800720 ClearFactoryVPDEntries(options)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200721 GenerateStableDeviceSecret(options)
Shen-En Shih3e079b22017-09-11 05:43:09 -0700722 ClearGBBFlags(options)
Hung-Te Lin6d827542012-07-19 11:50:41 +0800723 if options.no_write_protect:
724 logging.warn('WARNING: Firmware Write Protection is SKIPPED.')
Andy Cheng0465d132013-03-20 12:12:06 +0800725 event_log.Log('wp', fw='both', status='skipped')
Hung-Te Lin6d827542012-07-19 11:50:41 +0800726 else:
Wei-Han Chenba21f512016-10-14 18:52:33 +0800727 EnableFwWp(options)
Jon Salza0f58e02012-05-29 19:33:39 +0800728 LogSystemDetails(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800729 UploadReport(options)
Earl Ou51182222016-09-09 12:16:48 +0800730
731 event_log.Log('wipe_in_place')
732 wipe_args = []
Earl Ou51182222016-09-09 12:16:48 +0800733 if options.shopfloor_url:
734 wipe_args += ['--shopfloor_url', options.shopfloor_url]
735 if options.fast:
736 wipe_args += ['--fast']
737 if options.station_ip:
738 wipe_args += ['--station_ip', options.station_ip]
739 if options.station_port:
740 wipe_args += ['--station_port', options.station_port]
741 if options.wipe_finish_token:
742 wipe_args += ['--wipe_finish_token', options.wipe_finish_token]
743 ExecFactoryPar('gooftool', 'wipe_in_place', *wipe_args)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800744
745
Ting Shen129fa6f2016-09-02 12:22:24 +0800746@Command('verify_hwid',
747 _probe_results_cmd_arg,
748 _hwdb_path_cmd_arg,
749 _hwid_cmd_arg,
750 _rma_mode_cmd_arg)
751def VerifyHWID(options):
Ricky Liangc662be32013-12-24 11:50:23 +0800752 """A simple wrapper that calls out to HWID utils to verify version 3 HWID.
Ricky Liang53390232013-03-08 15:37:57 +0800753
Ricky Liangc662be32013-12-24 11:50:23 +0800754 This is mainly for Gooftool to verify v3 HWID during finalize. For testing
755 and development purposes, please use `hwid` command.
Ricky Liang53390232013-03-08 15:37:57 +0800756 """
Ricky Liangc662be32013-12-24 11:50:23 +0800757 db = GetGooftool(options).db
758 encoded_string = options.hwid or hwid_utils.GetHWIDString()
Ricky Liang7905f272013-03-16 01:57:10 +0800759 if options.probe_results:
Ricky Liangc662be32013-12-24 11:50:23 +0800760 probed_results = yaml.load(open(options.probe_results).read())
Ricky Liang7905f272013-03-16 01:57:10 +0800761 else:
Ricky Liangc662be32013-12-24 11:50:23 +0800762 probed_results = yaml.load(Probe(probe_vpd=True).Encode())
763 vpd = hwid_utils.GetVPD(probed_results)
Ricky Liang53390232013-03-08 15:37:57 +0800764
Hung-Te Lin11052952015-03-18 13:48:59 +0800765 event_log.Log('probed_results', probed_results=FilterDict(probed_results))
766 event_log.Log('vpd', vpd=FilterDict(vpd))
Ricky Liang53390232013-03-08 15:37:57 +0800767
Ricky Liangc662be32013-12-24 11:50:23 +0800768 hwid_utils.VerifyHWID(db, encoded_string, probed_results, vpd,
Hung-Te Lin56b18402015-01-16 14:52:30 +0800769 rma_mode=options.rma_mode)
Ricky Liang53390232013-03-08 15:37:57 +0800770
Ricky Liangc662be32013-12-24 11:50:23 +0800771 event_log.Log('verified_hwid', hwid=encoded_string)
Ricky Liang53390232013-03-08 15:37:57 +0800772
773
henryhsu44d793a2013-07-20 00:07:38 +0800774@Command('get_firmware_hash',
775 CmdArg('--file', metavar='FILE', help='Firmware File.'))
776def GetFirmwareHash(options):
henryhsuf6f835c2013-07-20 20:49:25 +0800777 """Get firmware hash from a file"""
henryhsu44d793a2013-07-20 00:07:38 +0800778 if os.path.exists(options.file):
779 hashes = CalculateFirmwareHashes(options.file)
780 for section, value_dict in hashes.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800781 print '%s:' % section
henryhsu44d793a2013-07-20 00:07:38 +0800782 for key, value in value_dict.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800783 print ' %s: %s' % (key, value)
henryhsu44d793a2013-07-20 00:07:38 +0800784 else:
785 raise Error('File does not exist: %s' % options.file)
786
henryhsuf6f835c2013-07-20 20:49:25 +0800787
Peter Shihfdf17682017-05-26 11:38:39 +0800788def main():
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800789 """Run sub-command specified by the command line args."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800790
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800791 options = ParseCmdline(
Ting Shen129fa6f2016-09-02 12:22:24 +0800792 'Perform Google required factory tests.',
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800793 CmdArg('-l', '--log', metavar='PATH',
794 help='Write logs to this file.'),
Jon Salza4bea382012-10-29 13:00:34 +0800795 CmdArg('--suppress-event-logs', action='store_true',
796 help='Suppress event logging.'),
Wei-Han Chenaff56232016-04-16 09:17:59 +0800797 CmdArg('--phase', default=None,
798 help=('override phase for phase checking (defaults to the current '
799 'as returned by the "factory phase" command)')),
Tammo Spalink8fab5312012-05-28 18:33:30 +0800800 verbosity_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800801 SetupLogging(options.verbosity, options.log)
Andy Cheng0465d132013-03-20 12:12:06 +0800802 event_log.SetGlobalLoggerDefaultPrefix('gooftool')
803 event_log.GetGlobalLogger().suppress = options.suppress_event_logs
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800804 logging.debug('gooftool options: %s', repr(options))
Wei-Han Chenaff56232016-04-16 09:17:59 +0800805
806 phase.OverridePhase(options.phase)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800807 try:
808 logging.debug('GOOFTOOL command %r', options.command_name)
809 options.command(options)
810 logging.info('GOOFTOOL command %r SUCCESS', options.command_name)
811 except Error, e:
812 logging.exception(e)
813 sys.exit('GOOFTOOL command %r ERROR: %s' % (options.command_name, e))
814 except Exception, e:
815 logging.exception(e)
816 sys.exit('UNCAUGHT RUNTIME EXCEPTION %s' % e)
817
818
819if __name__ == '__main__':
Peter Shihfdf17682017-05-26 11:38:39 +0800820 main()