blob: 1078e9a33198193d9c4e640c5c60eb62420c963b [file] [log] [blame]
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08001#!/usr/bin/python
Jon Salze60307f2014-08-05 16:20:00 +08002# -*- coding: utf-8 -*-
3# Copyright 2014 The Chromium OS Authors. All rights reserved.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08004# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
Jon Salze60307f2014-08-05 16:20:00 +08007# pylint: disable=E1101
8
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08009"""Google Factory Tool.
10
You-Cheng Syu461ec032017-03-06 15:56:58 +080011This tool is intended to be used on factory assembly lines. It
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080012provides all of the Google required test functionality and must be run
13on each device as part of the assembly process.
14"""
15
Ricky Liang5b4568d2013-04-23 17:15:23 +080016import collections
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080017import logging
18import os
Jon Salz65266432012-07-30 19:02:49 +080019import pipes
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080020import re
21import sys
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080022import threading
Hung-Te Lin6bd16472012-06-20 16:26:47 +080023import time
Jon Salza88b83b2013-05-27 20:00:35 +080024import xmlrpclib
Ricky Liang7905f272013-03-16 01:57:10 +080025import yaml
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080026
Andy Cheng2582d292012-12-04 17:38:28 +080027from tempfile import gettempdir
Tammo Spalink86a61c62012-05-25 15:10:35 +080028
Tammo Spalinka40293e2012-07-04 14:58:56 +080029import factory_common # pylint: disable=W0611
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080030
Ricky Liang53390232013-03-08 15:37:57 +080031from cros.factory.gooftool import crosfw
Tammo Spalink01e11722012-07-24 10:17:54 -070032from cros.factory.gooftool import report_upload
Hung-Te Lin84c77fa2016-03-02 17:43:30 +080033from cros.factory.gooftool.core import Gooftool
Wei-Han Chen0a3320e2016-04-23 01:32:07 +080034from cros.factory.gooftool.common import ExecFactoryPar
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080035from cros.factory.gooftool.common import Shell
Ting Shen129fa6f2016-09-02 12:22:24 +080036from cros.factory.gooftool.probe import Probe
37from cros.factory.gooftool.probe import ReadRoVpd
henryhsu44d793a2013-07-20 00:07:38 +080038from cros.factory.gooftool.probe import CalculateFirmwareHashes
Hung-Te Lin604e0c22015-11-24 15:17:07 +080039from cros.factory.hwid.v3 import common
40from cros.factory.hwid.v3 import hwid_utils
Hung-Te Lin91492a12014-11-25 18:56:30 +080041from cros.factory.test import event_log
Wei-Han Chen2ebb92d2016-01-12 14:51:41 +080042from cros.factory.test.env import paths
Wei-Han Chenaff56232016-04-16 09:17:59 +080043from cros.factory.test.rules import phase
Hung-Te Lin3f096842016-01-13 17:37:06 +080044from cros.factory.test.rules.privacy import FilterDict
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080045from cros.factory.utils.argparse_utils import CmdArg
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080046from cros.factory.utils.argparse_utils import ParseCmdline
47from cros.factory.utils.argparse_utils import verbosity_cmd_arg
Ting Shen18a06382016-08-30 16:18:21 +080048from cros.factory.utils import argparse_utils
Jon Salz40b9f822014-07-25 16:39:55 +080049from cros.factory.utils import file_utils
Wei-Han Chena5c01a02016-04-23 19:27:19 +080050from cros.factory.utils import sys_utils
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +080051from cros.factory.utils import time_utils
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080052from cros.factory.utils.debug_utils import SetupLogging
Jon Salzff88c022012-11-03 12:19:58 +080053from cros.factory.utils.process_utils import Spawn
Joel Kitchingd3bc2662014-12-16 16:03:32 -080054from cros.factory.utils.type_utils import Error
Tammo Spalink86a61c62012-05-25 15:10:35 +080055
Tammo Spalink5c699832012-07-03 17:50:39 +080056
Tammo Spalink5c699832012-07-03 17:50:39 +080057# TODO(tammo): Replace calls to sys.exit with raise Exit, and maybe
58# treat that specially (as a smoot exit, as opposed to the more
59# verbose output for generic Error).
60
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080061_global_gooftool = None
62_gooftool_lock = threading.Lock()
Tammo Spalink5c699832012-07-03 17:50:39 +080063
Hung-Te Lin56b18402015-01-16 14:52:30 +080064
Ricky Lianga70a1202013-03-15 15:03:17 +080065def GetGooftool(options):
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080066 global _global_gooftool # pylint: disable=W0603
Ricky Lianga70a1202013-03-15 15:03:17 +080067
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080068 if _global_gooftool is None:
69 with _gooftool_lock:
Ting Shen129fa6f2016-09-02 12:22:24 +080070 board = getattr(options, 'board', None)
71 hwdb_path = getattr(options, 'hwdb_path', None)
72 _global_gooftool = Gooftool(hwid_version=3, board=board,
73 hwdb_path=hwdb_path)
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080074
75 return _global_gooftool
Ricky Lianga70a1202013-03-15 15:03:17 +080076
Hung-Te Lin56b18402015-01-16 14:52:30 +080077
Ting Shen18a06382016-08-30 16:18:21 +080078def Command(cmd_name, *args, **kwargs):
79 """ Decorator for commands in gooftool.
80
81 This is similar to argparse_utils.Command, but all gooftool commands
82 can be waived during `gooftool finalize` or `gooftool verify` using
Wei-Han Chen60c5d332017-01-05 17:15:10 +080083 --waive_list or --skip_list option.
Ting Shen18a06382016-08-30 16:18:21 +080084 """
85 def Decorate(fun):
Wei-Han Chen60c5d332017-01-05 17:15:10 +080086 def CommandWithWaiveSkipCheck(options):
Ting Shen18a06382016-08-30 16:18:21 +080087 waive_list = vars(options).get('waive_list', [])
Wei-Han Chen60c5d332017-01-05 17:15:10 +080088 skip_list = vars(options).get('skip_list', [])
89 if phase.GetPhase() >= phase.PVT_DOGFOOD and (
90 waive_list != [] or skip_list != []):
Ting Shen18a06382016-08-30 16:18:21 +080091 raise Error(
Wei-Han Chen60c5d332017-01-05 17:15:10 +080092 'waive_list and skip_list should be empty for phase %s' %
93 phase.GetPhase())
Ting Shen18a06382016-08-30 16:18:21 +080094
Wei-Han Chen60c5d332017-01-05 17:15:10 +080095 if cmd_name not in skip_list:
96 try:
97 fun(options)
98 except Exception as e:
99 if cmd_name in waive_list:
100 logging.exception(e)
101 else:
102 raise
Ting Shen18a06382016-08-30 16:18:21 +0800103
104 return argparse_utils.Command(cmd_name, *args, **kwargs)(
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800105 CommandWithWaiveSkipCheck)
Ting Shen18a06382016-08-30 16:18:21 +0800106 return Decorate
107
108
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800109@Command('write_hwid',
110 CmdArg('hwid', metavar='HWID', help='HWID string'))
Andy Chengc92e6f92012-11-20 16:55:53 +0800111def WriteHWID(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800112 """Write specified HWID value into the system BB."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800113
Tammo Spalink95c43732012-07-25 15:57:14 -0700114 logging.info('writing hwid string %r', options.hwid)
Ricky Lianga70a1202013-03-15 15:03:17 +0800115 GetGooftool(options).WriteHWID(options.hwid)
Andy Cheng0465d132013-03-20 12:12:06 +0800116 event_log.Log('write_hwid', hwid=options.hwid)
Tammo Spalink95c43732012-07-25 15:57:14 -0700117 print 'Wrote HWID: %r' % options.hwid
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800118
119
Ricky Liang53390232013-03-08 15:37:57 +0800120_board_cmd_arg = CmdArg(
121 '--board', metavar='BOARD',
122 default=None, help='Board name to test.')
123
Tammo Spalink8fab5312012-05-28 18:33:30 +0800124_hwdb_path_cmd_arg = CmdArg(
125 '--hwdb_path', metavar='PATH',
Ricky Liangeede7922013-06-19 10:18:41 +0800126 default=common.DEFAULT_HWID_DATA_PATH,
Tammo Spalink8fab5312012-05-28 18:33:30 +0800127 help='Path to the HWID database.')
128
Tammo Spalink95c43732012-07-25 15:57:14 -0700129_hwid_status_list_cmd_arg = CmdArg(
Hung-Te Lin56b18402015-01-16 14:52:30 +0800130 '--status', nargs='*', default=['supported'],
131 help='allow only HWIDs with these status values')
Tammo Spalink95c43732012-07-25 15:57:14 -0700132
Jon Salzce124fb2012-10-02 17:42:03 +0800133_probe_results_cmd_arg = CmdArg(
134 '--probe_results', metavar='RESULTS.yaml',
Ricky Liangc662be32013-12-24 11:50:23 +0800135 help=('Output from "gooftool probe --include_vpd" (used instead of '
Jon Salzce124fb2012-10-02 17:42:03 +0800136 'probing this system).'))
137
Ricky Liang53390232013-03-08 15:37:57 +0800138_device_info_cmd_arg = CmdArg(
Ricky Liangf89f73a2013-03-19 05:00:24 +0800139 '--device_info', metavar='DEVICE_INFO.yaml', default=None,
Ricky Liang53390232013-03-08 15:37:57 +0800140 help='A dict of device info to use instead of fetching from shopfllor '
141 'server.')
142
Jon Salzce124fb2012-10-02 17:42:03 +0800143_hwid_cmd_arg = CmdArg(
144 '--hwid', metavar='HWID',
Ricky Lianga70a1202013-03-15 15:03:17 +0800145 help='HWID to verify (instead of the currently set HWID of this system).')
Jon Salzce124fb2012-10-02 17:42:03 +0800146
Bernie Thompson3c11c872013-07-22 18:22:45 -0700147_rma_mode_cmd_arg = CmdArg(
148 '--rma_mode', action='store_true',
149 help='Enable RMA mode, do not check for deprecated components.')
Tammo Spalink95c43732012-07-25 15:57:14 -0700150
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800151_cros_core_cmd_arg = CmdArg(
152 '--cros_core', action='store_true',
153 help='Finalize for ChromeOS Core devices (may add or remove few test '
154 'items. For example, branding verification or firmware bitmap '
155 'locale settings).')
156
bowgotsai13820f42015-09-10 23:18:04 +0800157_enforced_release_channels_cmd_arg = CmdArg(
158 '--enforced_release_channels', nargs='*', default=None,
159 help='Enforced release image channels.')
160
Hung-Te Lincdb96522016-04-15 16:51:10 +0800161_release_rootfs_cmd_arg = CmdArg(
162 '--release_rootfs', help='Location of release image rootfs partition.')
163
164_firmware_path_cmd_arg = CmdArg(
165 '--firmware_path', help='Location of firmware image partition.')
Ricky Liang43b879b2014-02-24 11:36:55 +0800166
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800167_shopfloor_url_args_cmd_arg = CmdArg(
168 '--shopfloor_url',
Earl Ou51182222016-09-09 12:16:48 +0800169 help='Shopfloor server url to be informed when wiping is done. '
170 'After wiping, a XML-RPC request will be sent to the '
171 'given url to indicate the completion of wiping.')
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800172
173_station_ip_cmd_arg = CmdArg(
174 '--station_ip',
175 help='IP of remote station')
176
177_station_port_cmd_arg = CmdArg(
178 '--station_port',
179 help='Port on remote station')
180
181_wipe_finish_token_cmd_arg = CmdArg(
182 '--wipe_finish_token',
183 help='Required token when notifying station after wipe finished')
184
Ting Shen18a06382016-08-30 16:18:21 +0800185_waive_list_cmd_arg = CmdArg(
186 '--waive_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu461ec032017-03-06 15:56:58 +0800187 help='A list of waived checks, separated by whitespace.'
Ting Shen18a06382016-08-30 16:18:21 +0800188 'Each item should be a sub-command of gooftool.'
189 'e.g. "gooftool verify --waive_list verify_tpm clear_gbb_flags".')
190
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800191_skip_list_cmd_arg = CmdArg(
192 '--skip_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu461ec032017-03-06 15:56:58 +0800193 help='A list of skipped checks, separated by whitespace.'
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800194 'Each item should be a sub-command of gooftool.'
195 'e.g. "gooftool verify --skip_list verify_tpm clear_gbb_flags".')
196
Tammo Spalink8fab5312012-05-28 18:33:30 +0800197
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800198@Command('probe',
199 CmdArg('--comps', nargs='*',
200 help='List of keys from the component_db registry.'),
Ricky Liangb30da672013-06-14 12:36:34 +0800201 CmdArg('--fast_fw_probe', action='store_true',
202 help='Do a fast probe for EC and main firmware versions only. '
203 'This implies --no_vol and --no_ic.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800204 CmdArg('--no_vol', action='store_true',
205 help='Do not probe volatile data.'),
206 CmdArg('--no_ic', action='store_true',
Jon Salz0f8a6842012-09-25 11:28:22 +0800207 help='Do not probe initial_config data.'),
208 CmdArg('--include_vpd', action='store_true',
209 help='Include VPD data in volatiles.'))
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800210def RunProbe(options):
211 """Print yaml-formatted breakdown of probed device properties."""
Ricky Lianga70a1202013-03-15 15:03:17 +0800212 print GetGooftool(options).Probe(
213 target_comp_classes=options.comps,
Ricky Liangb30da672013-06-14 12:36:34 +0800214 fast_fw_probe=options.fast_fw_probe,
Ricky Lianga70a1202013-03-15 15:03:17 +0800215 probe_volatile=not options.no_vol,
216 probe_initial_config=not options.no_ic,
217 probe_vpd=options.include_vpd).Encode()
Ricky Liang53390232013-03-08 15:37:57 +0800218
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800219
Tammo Spalink214caf42012-05-28 10:45:00 +0800220@Command('verify_components',
221 _hwdb_path_cmd_arg,
Tammo Spalink5c699832012-07-03 17:50:39 +0800222 CmdArg('target_comps', nargs='*'))
Tammo Spalink214caf42012-05-28 10:45:00 +0800223def VerifyComponents(options):
Andy Cheng8ece7382012-08-22 16:25:42 +0800224 """Verify that probeable components all match entries in the component_db.
Tammo Spalink214caf42012-05-28 10:45:00 +0800225
Tammo Spalink5c699832012-07-03 17:50:39 +0800226 Probe for each component class in the target_comps and verify
Tammo Spalink214caf42012-05-28 10:45:00 +0800227 that a corresponding match exists in the component_db -- make sure
228 that these components are present, that they have been approved, but
229 do not check against any specific BOM/HWID configurations.
230 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800231
Andy Chengc531e2f2012-10-15 19:09:17 +0800232 try:
Ricky Lianga70a1202013-03-15 15:03:17 +0800233 result = GetGooftool(options).VerifyComponents(
Andy Chengc531e2f2012-10-15 19:09:17 +0800234 options.target_comps)
235 except ValueError, e:
236 sys.exit(e)
237
Ricky Liang53390232013-03-08 15:37:57 +0800238 PrintVerifyComponentsResults(result)
239
240
241def PrintVerifyComponentsResults(result):
242 """Prints out the results of VerifyComponents method call.
243
244 Groups the results into two groups: 'matches' and 'errors', and prints out
245 their values.
246 """
Andy Chengc531e2f2012-10-15 19:09:17 +0800247 # group by matches and errors
Tammo Spalink214caf42012-05-28 10:45:00 +0800248 matches = []
Andy Chengc531e2f2012-10-15 19:09:17 +0800249 errors = []
250 for result_list in result.values():
251 for component_name, _, error in result_list:
252 if component_name:
253 matches.append(component_name)
Tammo Spalink214caf42012-05-28 10:45:00 +0800254 else:
Andy Chengc531e2f2012-10-15 19:09:17 +0800255 errors.append(error)
256
Andy Cheng228a8c92012-08-27 10:53:57 +0800257 if matches:
258 print 'found probeable components:\n %s' % '\n '.join(matches)
Tammo Spalink214caf42012-05-28 10:45:00 +0800259 if errors:
Andy Cheng228a8c92012-08-27 10:53:57 +0800260 print '\nerrors:\n %s' % '\n '.join(errors)
261 sys.exit('\ncomponent verification FAILURE')
Tammo Spalink214caf42012-05-28 10:45:00 +0800262 else:
Hung-Te Lin56b18402015-01-16 14:52:30 +0800263 print '\ncomponent verification SUCCESS'
Tammo Spalink214caf42012-05-28 10:45:00 +0800264
265
Hung-Te Line1d80f62016-03-31 14:58:13 +0800266@Command('verify_keys',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800267 _release_rootfs_cmd_arg,
268 _firmware_path_cmd_arg)
Tammo Spalink01e11722012-07-24 10:17:54 -0700269def VerifyKeys(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800270 """Verify keys in firmware and SSD match."""
Hung-Te Line1d80f62016-03-31 14:58:13 +0800271 return GetGooftool(options).VerifyKeys(
Hung-Te Lincdb96522016-04-15 16:51:10 +0800272 options.release_rootfs, options.firmware_path)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800273
274
275@Command('set_fw_bitmap_locale')
Tammo Spalink01e11722012-07-24 10:17:54 -0700276def SetFirmwareBitmapLocale(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800277 """Use VPD locale value to set firmware bitmap default language."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800278
Ricky Lianga70a1202013-03-15 15:03:17 +0800279 (index, locale) = GetGooftool(options).SetFirmwareBitmapLocale()
Andy Cheng2582d292012-12-04 17:38:28 +0800280 logging.info('Firmware bitmap initial locale set to %d (%s).',
281 index, locale)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800282
283
Hung-Te Line1d80f62016-03-31 14:58:13 +0800284@Command('verify_system_time',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800285 _release_rootfs_cmd_arg)
Tammo Spalink01e11722012-07-24 10:17:54 -0700286def VerifySystemTime(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800287 """Verify system time is later than release filesystem creation time."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800288
Hung-Te Lincdb96522016-04-15 16:51:10 +0800289 return GetGooftool(options).VerifySystemTime(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800290
291
Hung-Te Line1d80f62016-03-31 14:58:13 +0800292@Command('verify_rootfs',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800293 _release_rootfs_cmd_arg)
Tammo Spalink01e11722012-07-24 10:17:54 -0700294def VerifyRootFs(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800295 """Verify rootfs on SSD is valid by checking hash."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800296
Hung-Te Line1d80f62016-03-31 14:58:13 +0800297 return GetGooftool(options).VerifyRootFs(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800298
Hung-Te Lin56b18402015-01-16 14:52:30 +0800299
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800300@Command('verify_tpm')
301def VerifyTPM(options): # pylint: disable=W0613
302 """Verify TPM is cleared."""
303
304 return GetGooftool(options).VerifyTPM()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800305
Hung-Te Lin56b18402015-01-16 14:52:30 +0800306
Hung-Te Lindd708d42014-07-11 17:05:01 +0800307@Command('verify_me_locked')
308def VerifyManagementEngineLocked(options): # pylint: disable=W0613
You-Cheng Syu461ec032017-03-06 15:56:58 +0800309 """Verify Management Engine is locked."""
Hung-Te Lindd708d42014-07-11 17:05:01 +0800310
311 return GetGooftool(options).VerifyManagementEngineLocked()
312
Hung-Te Lin56b18402015-01-16 14:52:30 +0800313
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800314@Command('verify_switch_wp')
Andy Chengc92e6f92012-11-20 16:55:53 +0800315def VerifyWPSwitch(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800316 """Verify hardware write protection switch is enabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800317
Ricky Lianga70a1202013-03-15 15:03:17 +0800318 GetGooftool(options).VerifyWPSwitch()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800319
320
321@Command('verify_switch_dev')
Tammo Spalink01e11722012-07-24 10:17:54 -0700322def VerifyDevSwitch(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800323 """Verify developer switch is disabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800324
Ricky Lianga70a1202013-03-15 15:03:17 +0800325 if GetGooftool(options).CheckDevSwitchForDisabling():
Hung-Te Lind7d34722012-07-26 16:48:35 +0800326 logging.warn('VerifyDevSwitch: No physical switch.')
Andy Cheng0465d132013-03-20 12:12:06 +0800327 event_log.Log('switch_dev', type='virtual switch')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800328
329
Jon Salzadd90d32014-04-29 16:16:27 +0800330@Command('verify_branding')
331def VerifyBranding(options): # pylint: disable=W0613
332 """Verify that branding fields are properly set.
333
334 customization_id, if set in the RO VPD, must be of the correct format.
335
336 rlz_brand_code must be set either in the RO VPD or OEM partition, and must
337 be of the correct format.
338 """
339 return GetGooftool(options).VerifyBranding()
340
341
bowgotsai13820f42015-09-10 23:18:04 +0800342@Command('verify_release_channel',
343 _enforced_release_channels_cmd_arg)
bowgotsai529139c2015-05-30 01:39:49 +0800344def VerifyReleaseChannel(options): # pylint: disable=W0613
345 """Verify that release image channel is correct.
346
347 ChromeOS has four channels: canary, dev, beta and stable.
348 The last three channels support image auto-updates, checks
349 that release image channel is one of them.
350 """
bowgotsai13820f42015-09-10 23:18:04 +0800351 return GetGooftool(options).VerifyReleaseChannel(
352 options.enforced_release_channels)
bowgotsai529139c2015-05-30 01:39:49 +0800353
354
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800355@Command('write_protect')
Tammo Spalink01e11722012-07-24 10:17:54 -0700356def EnableFwWp(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800357 """Enable then verify firmware write protection."""
358
Hung-Te Linb21c6682012-08-01 13:53:57 +0800359 def CalculateLegacyRange(fw_type, length, section_data,
360 section_name):
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800361 ro_size = length / 2
362 ro_a = int(section_data[0] / ro_size)
363 ro_b = int((section_data[0] + section_data[1] - 1) / ro_size)
364 if ro_a != ro_b:
Hung-Te Lin56b18402015-01-16 14:52:30 +0800365 raise Error('%s firmware section %s has illegal size' %
Hung-Te Linb21c6682012-08-01 13:53:57 +0800366 (fw_type, section_name))
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800367 ro_offset = ro_a * ro_size
368 return (ro_offset, ro_size)
369
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800370 def WriteProtect(fw_file_path, fw_type, legacy_section=None):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800371 """Calculate protection size, then invoke flashrom.
372
373 Our supported chips only allow write protecting half their total
You-Cheng Syu461ec032017-03-06 15:56:58 +0800374 size, so we partition the flash chipset space accordingly.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800375 """
376 raw_image = open(fw_file_path, 'rb').read()
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800377 wp_section = 'WP_RO'
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800378 image = crosfw.FirmwareImage(raw_image)
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800379 if image.has_section(wp_section):
380 section_data = image.get_section_area(wp_section)
381 ro_offset = section_data[0]
382 ro_size = section_data[1]
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800383 elif legacy_section is not None and image.has_section(legacy_section):
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800384 section_data = image.get_section_area(legacy_section)
385 (ro_offset, ro_size) = CalculateLegacyRange(
Hung-Te Linb21c6682012-08-01 13:53:57 +0800386 fw_type, len(raw_image), section_data, legacy_section)
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800387 else:
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800388 raise Error('Could not find %s firmware section: %s %s' %
389 (fw_type, wp_section, legacy_section or ''))
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800390
391 logging.debug('write protecting %s [off=%x size=%x]', fw_type,
392 ro_offset, ro_size)
393 crosfw.Flashrom(fw_type).EnableWriteProtection(ro_offset, ro_size)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800394
395 WriteProtect(crosfw.LoadMainFirmware().GetFileName(), 'main', 'RO_SECTION')
Andy Cheng0465d132013-03-20 12:12:06 +0800396 event_log.Log('wp', fw='main')
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800397
398 # Some EC (mostly PD) does not support "RO NOW". Instead they will only set
399 # "RO_AT_BOOT" when you request to enable RO (These platforms consider
400 # --wp-range with right range identical to --wp-enable), and requires a
401 # 'ectool reboot_ec RO at-shutdown; reboot' to let the RO take effect.
Hung-Te Lin0d10b562016-12-28 10:58:07 +0800402 # After reboot, "flashrom -p host --wp-status" will return protected range.
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800403 # If you don't reboot, returned range will be (0, 0), and running command
404 # "ectool flashprotect" will not have RO_NOW.
405
406 targets = [
407 ('EC', crosfw.TARGET_EC, crosfw.LoadEcFirmware, 'EC_RO'),
408 ('PD', crosfw.TARGET_PD, crosfw.LoadPDFirmware, None)]
409 for (name, fw_type, provider, legacy_section) in targets:
410 fw_file = provider().GetFileName()
411 if fw_file is None:
412 logging.warning('%s not write protected (seems there is no %s flash).',
413 name, name)
414 continue
415 WriteProtect(fw_file, fw_type, legacy_section)
416 event_log.Log('wp', fw=fw_type)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800417
418
419@Command('clear_gbb_flags')
Andy Chengc92e6f92012-11-20 16:55:53 +0800420def ClearGBBFlags(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800421 """Zero out the GBB flags, in preparation for transition to release state.
422
423 No GBB flags are set in release/shipping state, but they are useful
424 for factory/development. See "gbb_utility --flags" for details.
425 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800426
Ricky Lianga70a1202013-03-15 15:03:17 +0800427 GetGooftool(options).ClearGBBFlags()
Andy Cheng0465d132013-03-20 12:12:06 +0800428 event_log.Log('clear_gbb_flags')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800429
430
Jon Salzaa3a30e2013-05-15 15:56:28 +0800431@Command('clear_factory_vpd_entries')
432def ClearFactoryVPDEntries(options): # pylint: disable=W0613
433 """Clears factory.* items in the RW VPD."""
434 entries = GetGooftool(options).ClearFactoryVPDEntries()
435 event_log.Log('clear_factory_vpd_entries', entries=FilterDict(entries))
436
437
Mattias Nisslercca761b2015-04-15 21:53:04 +0200438@Command('generate_stable_device_secret')
439def GenerateStableDeviceSecret(options): # pylint: disable=W0613
You-Cheng Syu461ec032017-03-06 15:56:58 +0800440 """Generates a fresh stable device secret and stores it in the RO VPD."""
Mattias Nisslercca761b2015-04-15 21:53:04 +0200441 GetGooftool(options).GenerateStableDeviceSecret()
442 event_log.Log('generate_stable_device_secret')
443
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800444
Earl Ou564a7872016-10-05 10:22:00 +0800445@Command('enable_release_partition',
446 CmdArg('--release_rootfs',
447 help=('path to the release rootfs device. If not specified, '
448 'the default (5th) partition will be used.')))
449def EnableReleasePartition(options):
450 """Enables a release image partition on the disk."""
451 GetGooftool(options).EnableReleasePartition(options.release_rootfs)
452
453
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800454@Command('wipe_in_place',
455 CmdArg('--fast', action='store_true',
Shun-Hsing Ou8d3c40a2015-10-08 18:16:08 +0800456 help='use non-secure but faster wipe method.'),
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800457 _shopfloor_url_args_cmd_arg,
458 _station_ip_cmd_arg,
459 _station_port_cmd_arg,
460 _wipe_finish_token_cmd_arg)
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800461def WipeInPlace(options):
462 """Start factory wipe directly without reboot."""
463
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800464 GetGooftool(options).WipeInPlace(options.fast,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800465 options.shopfloor_url,
466 options.station_ip,
467 options.station_port,
468 options.wipe_finish_token)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200469
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800470@Command('wipe_init',
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800471 CmdArg('--wipe_args', help='arguments for clobber-state'),
472 CmdArg('--state_dev', help='path to stateful partition device'),
473 CmdArg('--root_disk', help='path to primary device'),
474 CmdArg('--old_root', help='path to old root'),
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800475 _shopfloor_url_args_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800476 _release_rootfs_cmd_arg,
477 _station_ip_cmd_arg,
478 _station_port_cmd_arg,
479 _wipe_finish_token_cmd_arg)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800480def WipeInit(options):
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800481 GetGooftool(options).WipeInit(options.wipe_args,
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800482 options.shopfloor_url,
483 options.state_dev,
484 options.release_rootfs,
485 options.root_disk,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800486 options.old_root,
487 options.station_ip,
488 options.station_port,
489 options.wipe_finish_token)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800490
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800491@Command('verify',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800492 CmdArg('--no_write_protect', action='store_true',
493 help='Do not check write protection switch state.'),
Tammo Spalink95c43732012-07-25 15:57:14 -0700494 _hwid_status_list_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800495 _hwdb_path_cmd_arg,
Ricky Lianga70a1202013-03-15 15:03:17 +0800496 _board_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800497 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800498 _hwid_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800499 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800500 _cros_core_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800501 _release_rootfs_cmd_arg,
502 _firmware_path_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800503 _enforced_release_channels_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800504 _waive_list_cmd_arg,
505 _skip_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800506def Verify(options):
507 """Verifies if whole factory process is ready for finalization.
508
509 This routine performs all the necessary checks to make sure the
510 device is ready to be finalized, but does not modify state. These
511 checks include dev switch, firmware write protection switch, hwid,
512 system time, keys, and root file system.
513 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800514
Hung-Te Lin6d827542012-07-19 11:50:41 +0800515 if not options.no_write_protect:
Ricky Lianga70a1202013-03-15 15:03:17 +0800516 VerifyWPSwitch(options)
Hung-Te Lindd708d42014-07-11 17:05:01 +0800517 VerifyManagementEngineLocked(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800518 VerifyDevSwitch(options)
Ting Shen129fa6f2016-09-02 12:22:24 +0800519 VerifyHWID(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800520 VerifySystemTime(options)
521 VerifyKeys(options)
522 VerifyRootFs(options)
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800523 VerifyTPM(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800524 if options.cros_core:
525 logging.info('VerifyBranding is skipped for ChromeOS Core device.')
526 else:
527 VerifyBranding(options)
bowgotsai529139c2015-05-30 01:39:49 +0800528 VerifyReleaseChannel(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800529
Hung-Te Lin56b18402015-01-16 14:52:30 +0800530
Jon Salzfe9036f2014-01-16 14:11:23 +0800531@Command('untar_stateful_files')
Hung-Te Lin388bce22014-06-03 19:56:40 +0800532def UntarStatefulFiles(unused_options):
Jon Salzfe9036f2014-01-16 14:11:23 +0800533 """Untars stateful files from stateful_files.tar.xz on stateful partition.
534
535 If that file does not exist (which should only be R30 and earlier),
536 this is a no-op.
537 """
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800538 # Path to stateful partition on device.
539 device_stateful_path = '/mnt/stateful_partition'
540 tar_file = os.path.join(device_stateful_path, 'stateful_files.tar.xz')
Jon Salzfe9036f2014-01-16 14:11:23 +0800541 if os.path.exists(tar_file):
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800542 Spawn(['tar', 'xf', tar_file], cwd=device_stateful_path,
Jon Salzfe9036f2014-01-16 14:11:23 +0800543 log=True, check_call=True)
544 else:
545 logging.warning('No stateful files at %s', tar_file)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800546
Jon Salz40b9f822014-07-25 16:39:55 +0800547
548@Command('log_source_hashes')
549def LogSourceHashes(options): # pylint: disable=W0613
550 """Logs hashes of source files in the factory toolkit."""
Jon Salze60307f2014-08-05 16:20:00 +0800551 # WARNING: The following line is necessary to validate the integrity
552 # of the factory software. Do not remove or modify it.
553 #
554 # 警告:此行会验证工厂软件的完整性,禁止删除或修改。
Wei-Han Chena5c01a02016-04-23 19:27:19 +0800555 factory_par = sys_utils.GetRunningFactoryPythonArchivePath()
556 if factory_par:
557 event_log.Log(
558 'source_hashes',
559 **file_utils.HashPythonArchive(factory_par))
560 else:
561 event_log.Log(
562 'source_hashes',
563 **file_utils.HashSourceTree(os.path.join(paths.FACTORY_PATH, 'py')))
Jon Salz40b9f822014-07-25 16:39:55 +0800564
565
Tammo Spalink86a61c62012-05-25 15:10:35 +0800566@Command('log_system_details')
Tammo Spalink01e11722012-07-24 10:17:54 -0700567def LogSystemDetails(options): # pylint: disable=W0613
Tammo Spalink86a61c62012-05-25 15:10:35 +0800568 """Write miscellaneous system details to the event log."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800569
Ricky Liang43b879b2014-02-24 11:36:55 +0800570 event_log.Log('system_details', **GetGooftool(options).GetSystemDetails())
Tammo Spalink86a61c62012-05-25 15:10:35 +0800571
572
Jon Salza88b83b2013-05-27 20:00:35 +0800573def CreateReportArchiveBlob(*args, **kwargs):
574 """Creates a report archive and returns it as a blob.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800575
Jon Salza88b83b2013-05-27 20:00:35 +0800576 Args:
577 See CreateReportArchive.
Andy Cheng7a76cb82012-11-19 18:08:19 +0800578
Jon Salza88b83b2013-05-27 20:00:35 +0800579 Returns:
580 An xmlrpclib.Binary object containing a .tar.xz file.
581 """
Wei-Han Chen47416612016-09-14 17:41:52 +0800582 report_archive = CreateReportArchive(*args, **kwargs)
583 try:
584 with open(report_archive) as f:
585 return xmlrpclib.Binary(f.read())
586 finally:
587 os.unlink(report_archive)
Jon Salza88b83b2013-05-27 20:00:35 +0800588
589
590def CreateReportArchive(device_sn=None, add_file=None):
591 """Creates a report archive in a temporary directory.
592
593 Args:
594 device_sn: The device serial number (optional).
595 add_file: A list of files to add (optional).
596
597 Returns:
598 Path to the archive.
599 """
Hung-Te Lin6bd16472012-06-20 16:26:47 +0800600 def NormalizeAsFileName(token):
601 return re.sub(r'\W+', '', token).strip()
Jon Salza88b83b2013-05-27 20:00:35 +0800602
603 target_name = '%s%s.tar.xz' % (
604 time.strftime('%Y%m%dT%H%M%SZ',
605 time.gmtime()),
Hung-Te Lin56b18402015-01-16 14:52:30 +0800606 ('' if device_sn is None else
607 '_' + NormalizeAsFileName(device_sn)))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800608 target_path = os.path.join(gettempdir(), target_name)
Jon Salza88b83b2013-05-27 20:00:35 +0800609
Tammo Spalink86a61c62012-05-25 15:10:35 +0800610 # Intentionally ignoring dotfiles in EVENT_LOG_DIR.
Andy Cheng0465d132013-03-20 12:12:06 +0800611 tar_cmd = 'cd %s ; tar cJf %s *' % (event_log.EVENT_LOG_DIR, target_path)
Wei-Han Chen4b755022017-01-04 10:51:52 +0800612 tar_cmd += ' %s' % paths.GetFactoryLogPath()
Jon Salza88b83b2013-05-27 20:00:35 +0800613 if add_file:
614 for f in add_file:
Jon Salz65266432012-07-30 19:02:49 +0800615 # Require absolute paths since the tar command may change the
616 # directory.
617 if not f.startswith('/'):
618 raise Error('Not an absolute path: %s' % f)
619 if not os.path.exists(f):
620 raise Error('File does not exist: %s' % f)
Wei-Han Chen4b755022017-01-04 10:51:52 +0800621 tar_cmd += ' %s' % pipes.quote(f)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800622 cmd_result = Shell(tar_cmd)
Jon Salzff88c022012-11-03 12:19:58 +0800623
624 if ((cmd_result.status == 1) and
625 all((x == '' or
626 'file changed as we read it' in x or
627 "Removing leading `/' from member names" in x)
628 for x in cmd_result.stderr.split('\n'))):
629 # That's OK. Make sure it's valid though.
Vic Yang85199e72013-01-28 14:33:11 +0800630 Spawn(['tar', 'tfJ', target_path], check_call=True, log=True,
Jon Salzff88c022012-11-03 12:19:58 +0800631 ignore_stdout=True)
632 elif not cmd_result.success:
Tammo Spalink86a61c62012-05-25 15:10:35 +0800633 raise Error('unable to tar event logs, cmd %r failed, stderr: %r' %
634 (tar_cmd, cmd_result.stderr))
Jon Salzff88c022012-11-03 12:19:58 +0800635
Jon Salza88b83b2013-05-27 20:00:35 +0800636 return target_path
637
638_upload_method_cmd_arg = CmdArg(
639 '--upload_method', metavar='METHOD:PARAM',
640 help=('How to perform the upload. METHOD should be one of '
641 '{ftp, shopfloor, ftps, cpfe}.'))
642_add_file_cmd_arg = CmdArg(
643 '--add_file', metavar='FILE', action='append',
644 help='Extra file to include in report (must be an absolute path)')
645
Hung-Te Lin56b18402015-01-16 14:52:30 +0800646
Jon Salza88b83b2013-05-27 20:00:35 +0800647@Command('upload_report',
648 _upload_method_cmd_arg,
649 _add_file_cmd_arg)
650def UploadReport(options):
651 """Create a report containing key device details."""
Hung-Te Lin74346d72016-01-07 22:16:57 +0800652 ro_vpd = ReadRoVpd()
Jon Salza88b83b2013-05-27 20:00:35 +0800653 device_sn = ro_vpd.get('serial_number', None)
654 if device_sn is None:
655 logging.warning('RO_VPD missing device serial number')
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +0800656 device_sn = 'MISSING_SN_' + time_utils.TimedUUID()
Jon Salza88b83b2013-05-27 20:00:35 +0800657 target_path = CreateReportArchive(device_sn)
658
Tammo Spalink86a61c62012-05-25 15:10:35 +0800659 if options.upload_method is None or options.upload_method == 'none':
660 logging.warning('REPORT UPLOAD SKIPPED (report left at %s)', target_path)
661 return
662 method, param = options.upload_method.split(':', 1)
663 if method == 'shopfloor':
664 report_upload.ShopFloorUpload(target_path, param)
665 elif method == 'ftp':
Jay Kim360c1dd2012-06-25 10:58:11 -0700666 report_upload.FtpUpload(target_path, 'ftp:' + param)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800667 elif method == 'ftps':
668 report_upload.CurlUrlUpload(target_path, '--ftp-ssl-reqd ftp:%s' % param)
669 elif method == 'cpfe':
Shawn Nematbakhsh3404a092013-01-28 16:49:09 -0800670 report_upload.CpfeUpload(target_path, pipes.quote(param))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800671 else:
672 raise Error('unknown report upload method %r', method)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800673
674
675@Command('finalize',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800676 CmdArg('--no_write_protect', action='store_true',
677 help='Do not enable firmware write protection.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800678 CmdArg('--fast', action='store_true',
679 help='use non-secure but faster wipe method.'),
Shun-Hsing Oudb407d62015-11-11 11:03:59 +0800680 _shopfloor_url_args_cmd_arg,
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800681 _hwdb_path_cmd_arg,
Tammo Spalink95c43732012-07-25 15:57:14 -0700682 _hwid_status_list_cmd_arg,
Jon Salz65266432012-07-30 19:02:49 +0800683 _upload_method_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800684 _add_file_cmd_arg,
Ricky Lianga70a1202013-03-15 15:03:17 +0800685 _board_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800686 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800687 _hwid_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800688 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800689 _cros_core_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800690 _release_rootfs_cmd_arg,
691 _firmware_path_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800692 _enforced_release_channels_cmd_arg,
693 _station_ip_cmd_arg,
694 _station_port_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800695 _wipe_finish_token_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800696 _waive_list_cmd_arg,
697 _skip_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800698def Finalize(options):
699 """Verify system readiness and trigger transition into release state.
700
Jon Salzaa3a30e2013-05-15 15:56:28 +0800701 This routine does the following:
702 - Verifies system state (see verify command)
Jon Salzfe9036f2014-01-16 14:11:23 +0800703 - Untars stateful_files.tar.xz, if it exists, in the stateful partition, to
704 initialize files such as the CRX cache
Jon Salzaa3a30e2013-05-15 15:56:28 +0800705 - Modifies firmware bitmaps to match locale
706 - Clears all factory-friendly flags from the GBB
707 - Removes factory-specific entries from RW_VPD (factory.*)
708 - Enables firmware write protection (cannot rollback after this)
709 - Uploads system logs & reports
Earl Ou51182222016-09-09 12:16:48 +0800710 - Wipes the testing kernel, rootfs, and stateful partition
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800711 """
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800712 Verify(options)
Jon Salz40b9f822014-07-25 16:39:55 +0800713 LogSourceHashes(options)
Jon Salzfe9036f2014-01-16 14:11:23 +0800714 UntarStatefulFiles(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800715 if options.cros_core:
716 logging.info('SetFirmwareBitmapLocale is skipped for ChromeOS Core device.')
717 else:
718 SetFirmwareBitmapLocale(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800719 ClearGBBFlags(options)
Jon Salzaa3a30e2013-05-15 15:56:28 +0800720 ClearFactoryVPDEntries(options)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200721 GenerateStableDeviceSecret(options)
Hung-Te Lin6d827542012-07-19 11:50:41 +0800722 if options.no_write_protect:
723 logging.warn('WARNING: Firmware Write Protection is SKIPPED.')
Andy Cheng0465d132013-03-20 12:12:06 +0800724 event_log.Log('wp', fw='both', status='skipped')
Hung-Te Lin6d827542012-07-19 11:50:41 +0800725 else:
Wei-Han Chenba21f512016-10-14 18:52:33 +0800726 EnableFwWp(options)
Jon Salza0f58e02012-05-29 19:33:39 +0800727 LogSystemDetails(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800728 UploadReport(options)
Earl Ou51182222016-09-09 12:16:48 +0800729
730 event_log.Log('wipe_in_place')
731 wipe_args = []
Earl Ou51182222016-09-09 12:16:48 +0800732 if options.shopfloor_url:
733 wipe_args += ['--shopfloor_url', options.shopfloor_url]
734 if options.fast:
735 wipe_args += ['--fast']
736 if options.station_ip:
737 wipe_args += ['--station_ip', options.station_ip]
738 if options.station_port:
739 wipe_args += ['--station_port', options.station_port]
740 if options.wipe_finish_token:
741 wipe_args += ['--wipe_finish_token', options.wipe_finish_token]
742 ExecFactoryPar('gooftool', 'wipe_in_place', *wipe_args)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800743
744
Ting Shen129fa6f2016-09-02 12:22:24 +0800745@Command('verify_hwid',
746 _probe_results_cmd_arg,
747 _hwdb_path_cmd_arg,
748 _hwid_cmd_arg,
749 _rma_mode_cmd_arg)
750def VerifyHWID(options):
Ricky Liangc662be32013-12-24 11:50:23 +0800751 """A simple wrapper that calls out to HWID utils to verify version 3 HWID.
Ricky Liang53390232013-03-08 15:37:57 +0800752
Ricky Liangc662be32013-12-24 11:50:23 +0800753 This is mainly for Gooftool to verify v3 HWID during finalize. For testing
754 and development purposes, please use `hwid` command.
Ricky Liang53390232013-03-08 15:37:57 +0800755 """
Ricky Liangc662be32013-12-24 11:50:23 +0800756 db = GetGooftool(options).db
757 encoded_string = options.hwid or hwid_utils.GetHWIDString()
Ricky Liang7905f272013-03-16 01:57:10 +0800758 if options.probe_results:
Ricky Liangc662be32013-12-24 11:50:23 +0800759 probed_results = yaml.load(open(options.probe_results).read())
Ricky Liang7905f272013-03-16 01:57:10 +0800760 else:
Ricky Liangc662be32013-12-24 11:50:23 +0800761 probed_results = yaml.load(Probe(probe_vpd=True).Encode())
762 vpd = hwid_utils.GetVPD(probed_results)
Ricky Liang53390232013-03-08 15:37:57 +0800763
Hung-Te Lin11052952015-03-18 13:48:59 +0800764 event_log.Log('probed_results', probed_results=FilterDict(probed_results))
765 event_log.Log('vpd', vpd=FilterDict(vpd))
Ricky Liang53390232013-03-08 15:37:57 +0800766
Ricky Liangc662be32013-12-24 11:50:23 +0800767 hwid_utils.VerifyHWID(db, encoded_string, probed_results, vpd,
Hung-Te Lin56b18402015-01-16 14:52:30 +0800768 rma_mode=options.rma_mode)
Ricky Liang53390232013-03-08 15:37:57 +0800769
Ricky Liangc662be32013-12-24 11:50:23 +0800770 event_log.Log('verified_hwid', hwid=encoded_string)
Ricky Liang53390232013-03-08 15:37:57 +0800771
772
Ricky Liang59611a62013-06-11 13:47:33 +0800773def ParseDecodedHWID(hwid):
774 """Parse the HWID object into a more compact dict.
775
776 Args:
777 hwid: A decoded HWID object.
778
779 Returns:
780 A dict containing the board name, the binary string, and the list of
781 components.
782 """
783 results = {}
784 results['board'] = hwid.database.board
785 results['binary_string'] = hwid.binary_string
786 results['components'] = collections.defaultdict(list)
787 components = hwid.bom.components
788 for comp_cls in sorted(components):
789 for (comp_name, probed_values, _) in sorted(components[comp_cls]):
790 if not probed_values:
791 db_components = hwid.database.components
792 probed_values = db_components.GetComponentAttributes(
793 comp_cls, comp_name).get('values')
794 results['components'][comp_cls].append(
795 {comp_name: probed_values if probed_values else None})
796 # Convert defaultdict to dict.
797 results['components'] = dict(results['components'])
798 return results
799
800
henryhsu44d793a2013-07-20 00:07:38 +0800801@Command('get_firmware_hash',
802 CmdArg('--file', metavar='FILE', help='Firmware File.'))
803def GetFirmwareHash(options):
henryhsuf6f835c2013-07-20 20:49:25 +0800804 """Get firmware hash from a file"""
henryhsu44d793a2013-07-20 00:07:38 +0800805 if os.path.exists(options.file):
806 hashes = CalculateFirmwareHashes(options.file)
807 for section, value_dict in hashes.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800808 print '%s:' % section
henryhsu44d793a2013-07-20 00:07:38 +0800809 for key, value in value_dict.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800810 print ' %s: %s' % (key, value)
henryhsu44d793a2013-07-20 00:07:38 +0800811 else:
812 raise Error('File does not exist: %s' % options.file)
813
henryhsuf6f835c2013-07-20 20:49:25 +0800814
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800815def Main():
816 """Run sub-command specified by the command line args."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800817
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800818 options = ParseCmdline(
Ting Shen129fa6f2016-09-02 12:22:24 +0800819 'Perform Google required factory tests.',
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800820 CmdArg('-l', '--log', metavar='PATH',
821 help='Write logs to this file.'),
Jon Salza4bea382012-10-29 13:00:34 +0800822 CmdArg('--suppress-event-logs', action='store_true',
823 help='Suppress event logging.'),
Wei-Han Chenaff56232016-04-16 09:17:59 +0800824 CmdArg('--phase', default=None,
825 help=('override phase for phase checking (defaults to the current '
826 'as returned by the "factory phase" command)')),
Tammo Spalink8fab5312012-05-28 18:33:30 +0800827 verbosity_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800828 SetupLogging(options.verbosity, options.log)
Andy Cheng0465d132013-03-20 12:12:06 +0800829 event_log.SetGlobalLoggerDefaultPrefix('gooftool')
830 event_log.GetGlobalLogger().suppress = options.suppress_event_logs
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800831 logging.debug('gooftool options: %s', repr(options))
Wei-Han Chenaff56232016-04-16 09:17:59 +0800832
833 phase.OverridePhase(options.phase)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800834 try:
835 logging.debug('GOOFTOOL command %r', options.command_name)
836 options.command(options)
837 logging.info('GOOFTOOL command %r SUCCESS', options.command_name)
838 except Error, e:
839 logging.exception(e)
840 sys.exit('GOOFTOOL command %r ERROR: %s' % (options.command_name, e))
841 except Exception, e:
842 logging.exception(e)
843 sys.exit('UNCAUGHT RUNTIME EXCEPTION %s' % e)
844
845
846if __name__ == '__main__':
847 Main()