blob: e2db765d02e94fb8e03fa1cb404e6d1d8e175aad [file] [log] [blame]
You-Cheng Syuf0f4be12017-12-05 16:33:53 +08001#!/usr/bin/env python
Jon Salze60307f2014-08-05 16:20:00 +08002# -*- coding: utf-8 -*-
3# Copyright 2014 The Chromium OS Authors. All rights reserved.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08004# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
Jon Salze60307f2014-08-05 16:20:00 +08007
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08008"""Google Factory Tool.
9
You-Cheng Syu461ec032017-03-06 15:56:58 +080010This tool is intended to be used on factory assembly lines. It
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080011provides all of the Google required test functionality and must be run
12on each device as part of the assembly process.
13"""
14
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080015import logging
16import os
Jon Salz65266432012-07-30 19:02:49 +080017import pipes
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080018import re
19import sys
Peter Shihfdf17682017-05-26 11:38:39 +080020from tempfile import gettempdir
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080021import threading
Hung-Te Lin6bd16472012-06-20 16:26:47 +080022import time
Jon Salza88b83b2013-05-27 20:00:35 +080023import xmlrpclib
Peter Shihfdf17682017-05-26 11:38:39 +080024
Ricky Liang7905f272013-03-16 01:57:10 +080025import yaml
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080026
Peter Shihfdf17682017-05-26 11:38:39 +080027import factory_common # pylint: disable=unused-import
Wei-Han Chen0a3320e2016-04-23 01:32:07 +080028from cros.factory.gooftool.common import ExecFactoryPar
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080029from cros.factory.gooftool.common import Shell
Peter Shihfdf17682017-05-26 11:38:39 +080030from cros.factory.gooftool.core import Gooftool
31from cros.factory.gooftool import crosfw
Peter Shihfdf17682017-05-26 11:38:39 +080032from cros.factory.gooftool import report_upload
Hung-Te Lin604e0c22015-11-24 15:17:07 +080033from cros.factory.hwid.v3 import common
34from cros.factory.hwid.v3 import hwid_utils
Yong Hong863d3262017-10-30 16:23:34 +080035from cros.factory.probe.functions import chromeos_firmware
Wei-Han Chen2ebb92d2016-01-12 14:51:41 +080036from cros.factory.test.env import paths
Peter Shihfdf17682017-05-26 11:38:39 +080037from cros.factory.test import event_log
Wei-Han Chenaff56232016-04-16 09:17:59 +080038from cros.factory.test.rules import phase
Hung-Te Lin3f096842016-01-13 17:37:06 +080039from cros.factory.test.rules.privacy import FilterDict
Peter Shihfdf17682017-05-26 11:38:39 +080040from cros.factory.utils import argparse_utils
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080041from cros.factory.utils.argparse_utils import CmdArg
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080042from cros.factory.utils.argparse_utils import ParseCmdline
43from cros.factory.utils.argparse_utils import verbosity_cmd_arg
Peter Shihfdf17682017-05-26 11:38:39 +080044from cros.factory.utils.debug_utils import SetupLogging
Jon Salz40b9f822014-07-25 16:39:55 +080045from cros.factory.utils import file_utils
Wei-Han Chena5c01a02016-04-23 19:27:19 +080046from cros.factory.utils import sys_utils
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +080047from cros.factory.utils import time_utils
Jon Salzff88c022012-11-03 12:19:58 +080048from cros.factory.utils.process_utils import Spawn
Joel Kitchingd3bc2662014-12-16 16:03:32 -080049from cros.factory.utils.type_utils import Error
Tammo Spalink86a61c62012-05-25 15:10:35 +080050
Tammo Spalink5c699832012-07-03 17:50:39 +080051
Tammo Spalink5c699832012-07-03 17:50:39 +080052# TODO(tammo): Replace calls to sys.exit with raise Exit, and maybe
53# treat that specially (as a smoot exit, as opposed to the more
54# verbose output for generic Error).
55
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080056_global_gooftool = None
57_gooftool_lock = threading.Lock()
Tammo Spalink5c699832012-07-03 17:50:39 +080058
Hung-Te Lin56b18402015-01-16 14:52:30 +080059
Ricky Lianga70a1202013-03-15 15:03:17 +080060def GetGooftool(options):
Peter Shihfdf17682017-05-26 11:38:39 +080061 global _global_gooftool # pylint: disable=global-statement
Ricky Lianga70a1202013-03-15 15:03:17 +080062
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080063 if _global_gooftool is None:
64 with _gooftool_lock:
Shen-En Shihc5d15d62017-08-04 13:02:59 +080065 if _global_gooftool is None:
66 project = getattr(options, 'project', None)
67 hwdb_path = getattr(options, 'hwdb_path', None)
68 _global_gooftool = Gooftool(hwid_version=3, project=project,
69 hwdb_path=hwdb_path)
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080070
71 return _global_gooftool
Ricky Lianga70a1202013-03-15 15:03:17 +080072
Hung-Te Lin56b18402015-01-16 14:52:30 +080073
Ting Shen18a06382016-08-30 16:18:21 +080074def Command(cmd_name, *args, **kwargs):
75 """ Decorator for commands in gooftool.
76
77 This is similar to argparse_utils.Command, but all gooftool commands
78 can be waived during `gooftool finalize` or `gooftool verify` using
Wei-Han Chen60c5d332017-01-05 17:15:10 +080079 --waive_list or --skip_list option.
Ting Shen18a06382016-08-30 16:18:21 +080080 """
81 def Decorate(fun):
Wei-Han Chen60c5d332017-01-05 17:15:10 +080082 def CommandWithWaiveSkipCheck(options):
Ting Shen18a06382016-08-30 16:18:21 +080083 waive_list = vars(options).get('waive_list', [])
Wei-Han Chen60c5d332017-01-05 17:15:10 +080084 skip_list = vars(options).get('skip_list', [])
85 if phase.GetPhase() >= phase.PVT_DOGFOOD and (
86 waive_list != [] or skip_list != []):
Ting Shen18a06382016-08-30 16:18:21 +080087 raise Error(
Wei-Han Chen60c5d332017-01-05 17:15:10 +080088 'waive_list and skip_list should be empty for phase %s' %
89 phase.GetPhase())
Ting Shen18a06382016-08-30 16:18:21 +080090
Wei-Han Chen60c5d332017-01-05 17:15:10 +080091 if cmd_name not in skip_list:
92 try:
93 fun(options)
94 except Exception as e:
95 if cmd_name in waive_list:
96 logging.exception(e)
97 else:
98 raise
Ting Shen18a06382016-08-30 16:18:21 +080099
100 return argparse_utils.Command(cmd_name, *args, **kwargs)(
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800101 CommandWithWaiveSkipCheck)
Ting Shen18a06382016-08-30 16:18:21 +0800102 return Decorate
103
104
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800105@Command('write_hwid',
106 CmdArg('hwid', metavar='HWID', help='HWID string'))
Andy Chengc92e6f92012-11-20 16:55:53 +0800107def WriteHWID(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800108 """Write specified HWID value into the system BB."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800109
Tammo Spalink95c43732012-07-25 15:57:14 -0700110 logging.info('writing hwid string %r', options.hwid)
Ricky Lianga70a1202013-03-15 15:03:17 +0800111 GetGooftool(options).WriteHWID(options.hwid)
Andy Cheng0465d132013-03-20 12:12:06 +0800112 event_log.Log('write_hwid', hwid=options.hwid)
Tammo Spalink95c43732012-07-25 15:57:14 -0700113 print 'Wrote HWID: %r' % options.hwid
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800114
115
Yong Hong5408f652017-07-11 19:20:25 +0800116_project_cmd_arg = CmdArg(
117 '--project', metavar='PROJECT',
118 default=None, help='Project name to test.')
Ricky Liang53390232013-03-08 15:37:57 +0800119
Tammo Spalink8fab5312012-05-28 18:33:30 +0800120_hwdb_path_cmd_arg = CmdArg(
121 '--hwdb_path', metavar='PATH',
Ricky Liangeede7922013-06-19 10:18:41 +0800122 default=common.DEFAULT_HWID_DATA_PATH,
Tammo Spalink8fab5312012-05-28 18:33:30 +0800123 help='Path to the HWID database.')
124
Tammo Spalink95c43732012-07-25 15:57:14 -0700125_hwid_status_list_cmd_arg = CmdArg(
Hung-Te Lin56b18402015-01-16 14:52:30 +0800126 '--status', nargs='*', default=['supported'],
127 help='allow only HWIDs with these status values')
Tammo Spalink95c43732012-07-25 15:57:14 -0700128
Jon Salzce124fb2012-10-02 17:42:03 +0800129_probe_results_cmd_arg = CmdArg(
130 '--probe_results', metavar='RESULTS.yaml',
Yong Hong863d3262017-10-30 16:23:34 +0800131 help=('Output from "gooftool probe" (used instead of '
Jon Salzce124fb2012-10-02 17:42:03 +0800132 'probing this system).'))
133
Ricky Liang53390232013-03-08 15:37:57 +0800134_device_info_cmd_arg = CmdArg(
Ricky Liangf89f73a2013-03-19 05:00:24 +0800135 '--device_info', metavar='DEVICE_INFO.yaml', default=None,
Ricky Liang53390232013-03-08 15:37:57 +0800136 help='A dict of device info to use instead of fetching from shopfllor '
137 'server.')
138
Jon Salzce124fb2012-10-02 17:42:03 +0800139_hwid_cmd_arg = CmdArg(
140 '--hwid', metavar='HWID',
Ricky Lianga70a1202013-03-15 15:03:17 +0800141 help='HWID to verify (instead of the currently set HWID of this system).')
Jon Salzce124fb2012-10-02 17:42:03 +0800142
Bernie Thompson3c11c872013-07-22 18:22:45 -0700143_rma_mode_cmd_arg = CmdArg(
144 '--rma_mode', action='store_true',
145 help='Enable RMA mode, do not check for deprecated components.')
Tammo Spalink95c43732012-07-25 15:57:14 -0700146
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800147_cros_core_cmd_arg = CmdArg(
148 '--cros_core', action='store_true',
149 help='Finalize for ChromeOS Core devices (may add or remove few test '
Hung-Te Lin53c49402017-07-26 13:10:58 +0800150 'items. For example, registration codes or firmware bitmap '
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800151 'locale settings).')
152
bowgotsai13820f42015-09-10 23:18:04 +0800153_enforced_release_channels_cmd_arg = CmdArg(
154 '--enforced_release_channels', nargs='*', default=None,
155 help='Enforced release image channels.')
156
Yilun Lin34f54802017-11-16 11:58:25 +0800157_ec_pubkey_path_cmd_arg = CmdArg(
158 '--ec_pubkey_path',
159 default=None,
160 help='Path to public key in vb2 format. Verify EC key with pubkey file.')
161
162_ec_pubkey_hash_cmd_arg = CmdArg(
163 '--ec_pubkey_hash',
164 default=None,
165 help='A string for public key hash. Verify EC key with the given hash.')
166
Hung-Te Lincdb96522016-04-15 16:51:10 +0800167_release_rootfs_cmd_arg = CmdArg(
168 '--release_rootfs', help='Location of release image rootfs partition.')
169
170_firmware_path_cmd_arg = CmdArg(
171 '--firmware_path', help='Location of firmware image partition.')
Ricky Liang43b879b2014-02-24 11:36:55 +0800172
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800173_shopfloor_url_args_cmd_arg = CmdArg(
174 '--shopfloor_url',
Earl Ou51182222016-09-09 12:16:48 +0800175 help='Shopfloor server url to be informed when wiping is done. '
176 'After wiping, a XML-RPC request will be sent to the '
177 'given url to indicate the completion of wiping.')
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800178
179_station_ip_cmd_arg = CmdArg(
180 '--station_ip',
181 help='IP of remote station')
182
183_station_port_cmd_arg = CmdArg(
184 '--station_port',
185 help='Port on remote station')
186
187_wipe_finish_token_cmd_arg = CmdArg(
188 '--wipe_finish_token',
189 help='Required token when notifying station after wipe finished')
190
Ting Shen18a06382016-08-30 16:18:21 +0800191_waive_list_cmd_arg = CmdArg(
192 '--waive_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu461ec032017-03-06 15:56:58 +0800193 help='A list of waived checks, separated by whitespace.'
Ting Shen18a06382016-08-30 16:18:21 +0800194 'Each item should be a sub-command of gooftool.'
195 'e.g. "gooftool verify --waive_list verify_tpm clear_gbb_flags".')
196
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800197_skip_list_cmd_arg = CmdArg(
198 '--skip_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu461ec032017-03-06 15:56:58 +0800199 help='A list of skipped checks, separated by whitespace.'
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800200 'Each item should be a sub-command of gooftool.'
201 'e.g. "gooftool verify --skip_list verify_tpm clear_gbb_flags".')
202
Tammo Spalink8fab5312012-05-28 18:33:30 +0800203
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800204@Command('probe',
205 CmdArg('--comps', nargs='*',
206 help='List of keys from the component_db registry.'),
207 CmdArg('--no_vol', action='store_true',
Yong Hong863d3262017-10-30 16:23:34 +0800208 help='Do not probe volatile data.'))
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800209def RunProbe(options):
210 """Print yaml-formatted breakdown of probed device properties."""
Yong Hong863d3262017-10-30 16:23:34 +0800211 probed_result = GetGooftool(options).Probe(options.comps, not options.no_vol)
212 print yaml.dump(probed_result)
Ricky Liang53390232013-03-08 15:37:57 +0800213
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800214
Yong Hong863d3262017-10-30 16:23:34 +0800215@Command('verify_components')
Tammo Spalink214caf42012-05-28 10:45:00 +0800216def VerifyComponents(options):
Yong Hong863d3262017-10-30 16:23:34 +0800217 del options
218 msg = ('This command has already been deprecated, please use '
219 '`hwid verify-components` instead.')
220 print msg
221 sys.exit(1)
Tammo Spalink214caf42012-05-28 10:45:00 +0800222
223
Yilun Lin34f54802017-11-16 11:58:25 +0800224@Command(
225 'verify_ec_key',
226 _ec_pubkey_path_cmd_arg,
227 _ec_pubkey_hash_cmd_arg)
228def VerifyECKey(options):
229 """Verify EC key."""
230 return GetGooftool(options).VerifyECKey(
231 options.ec_pubkey_path, options.ec_pubkey_hash)
232
233
Hung-Te Line1d80f62016-03-31 14:58:13 +0800234@Command('verify_keys',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800235 _release_rootfs_cmd_arg,
236 _firmware_path_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800237def VerifyKeys(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800238 """Verify keys in firmware and SSD match."""
Hung-Te Line1d80f62016-03-31 14:58:13 +0800239 return GetGooftool(options).VerifyKeys(
Hung-Te Lincdb96522016-04-15 16:51:10 +0800240 options.release_rootfs, options.firmware_path)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800241
242
243@Command('set_fw_bitmap_locale')
Peter Shihfdf17682017-05-26 11:38:39 +0800244def SetFirmwareBitmapLocale(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800245 """Use VPD locale value to set firmware bitmap default language."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800246
Ricky Lianga70a1202013-03-15 15:03:17 +0800247 (index, locale) = GetGooftool(options).SetFirmwareBitmapLocale()
Andy Cheng2582d292012-12-04 17:38:28 +0800248 logging.info('Firmware bitmap initial locale set to %d (%s).',
249 index, locale)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800250
251
Hung-Te Line1d80f62016-03-31 14:58:13 +0800252@Command('verify_system_time',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800253 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800254def VerifySystemTime(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800255 """Verify system time is later than release filesystem creation time."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800256
Hung-Te Lincdb96522016-04-15 16:51:10 +0800257 return GetGooftool(options).VerifySystemTime(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800258
259
Hung-Te Line1d80f62016-03-31 14:58:13 +0800260@Command('verify_rootfs',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800261 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800262def VerifyRootFs(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800263 """Verify rootfs on SSD is valid by checking hash."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800264
Hung-Te Line1d80f62016-03-31 14:58:13 +0800265 return GetGooftool(options).VerifyRootFs(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800266
Hung-Te Lin56b18402015-01-16 14:52:30 +0800267
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800268@Command('verify_tpm')
Peter Shihfdf17682017-05-26 11:38:39 +0800269def VerifyTPM(options):
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800270 """Verify TPM is cleared."""
271
272 return GetGooftool(options).VerifyTPM()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800273
Hung-Te Lin56b18402015-01-16 14:52:30 +0800274
Hung-Te Lindd708d42014-07-11 17:05:01 +0800275@Command('verify_me_locked')
Peter Shihfdf17682017-05-26 11:38:39 +0800276def VerifyManagementEngineLocked(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800277 """Verify Management Engine is locked."""
Hung-Te Lindd708d42014-07-11 17:05:01 +0800278
279 return GetGooftool(options).VerifyManagementEngineLocked()
280
Hung-Te Lin56b18402015-01-16 14:52:30 +0800281
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800282@Command('verify_switch_wp')
Peter Shihfdf17682017-05-26 11:38:39 +0800283def VerifyWPSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800284 """Verify hardware write protection switch is enabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800285
Ricky Lianga70a1202013-03-15 15:03:17 +0800286 GetGooftool(options).VerifyWPSwitch()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800287
288
289@Command('verify_switch_dev')
Peter Shihfdf17682017-05-26 11:38:39 +0800290def VerifyDevSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800291 """Verify developer switch is disabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800292
Ricky Lianga70a1202013-03-15 15:03:17 +0800293 if GetGooftool(options).CheckDevSwitchForDisabling():
Hung-Te Lind7d34722012-07-26 16:48:35 +0800294 logging.warn('VerifyDevSwitch: No physical switch.')
Andy Cheng0465d132013-03-20 12:12:06 +0800295 event_log.Log('switch_dev', type='virtual switch')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800296
297
Hung-Te Lin53c49402017-07-26 13:10:58 +0800298@Command('verify_vpd')
299def VerifyVPD(options):
300 """Verify that VPD values are properly set.
Jon Salzadd90d32014-04-29 16:16:27 +0800301
Hung-Te Lin53c49402017-07-26 13:10:58 +0800302 Check if mandatory fields are set, and deprecated fields don't exist.
Jon Salzadd90d32014-04-29 16:16:27 +0800303 """
Hung-Te Lin53c49402017-07-26 13:10:58 +0800304 return GetGooftool(options).VerifyVPD()
Jon Salzadd90d32014-04-29 16:16:27 +0800305
306
bowgotsai13820f42015-09-10 23:18:04 +0800307@Command('verify_release_channel',
308 _enforced_release_channels_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800309def VerifyReleaseChannel(options):
bowgotsai529139c2015-05-30 01:39:49 +0800310 """Verify that release image channel is correct.
311
312 ChromeOS has four channels: canary, dev, beta and stable.
313 The last three channels support image auto-updates, checks
314 that release image channel is one of them.
315 """
bowgotsai13820f42015-09-10 23:18:04 +0800316 return GetGooftool(options).VerifyReleaseChannel(
317 options.enforced_release_channels)
bowgotsai529139c2015-05-30 01:39:49 +0800318
319
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800320@Command('write_protect')
Peter Shihfdf17682017-05-26 11:38:39 +0800321def EnableFwWp(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800322 """Enable then verify firmware write protection."""
Peter Shihfdf17682017-05-26 11:38:39 +0800323 del options # Unused.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800324
Yong Hongdad230a2017-08-30 22:25:19 +0800325 def WriteProtect(fw):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800326 """Calculate protection size, then invoke flashrom.
327
Yong Hongdad230a2017-08-30 22:25:19 +0800328 The region (offset and size) to write protect may be different per chipset
329 and firmware layout, so we have to read the WP_RO section from FMAP to
330 decide that.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800331 """
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800332 wp_section = 'WP_RO'
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800333
Yong Hongdad230a2017-08-30 22:25:19 +0800334 fmap_image = fw.GetFirmwareImage(
335 sections=(['FMAP'] if fw.target == crosfw.TARGET_MAIN else None))
336 if not fmap_image.has_section(wp_section):
337 raise Error('Could not find %s firmware section: %s' %
338 (fw.target.upper(), wp_section))
339
340 section_data = fw.GetFirmwareImage(
341 sections=[wp_section]).get_section_area(wp_section)
342 ro_offset, ro_size = section_data[0 : 2]
343
344 logging.debug('write protecting %s [off=%x size=%x]', fw.target.upper(),
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800345 ro_offset, ro_size)
Yong Hongdad230a2017-08-30 22:25:19 +0800346 crosfw.Flashrom(fw.target).EnableWriteProtection(ro_offset, ro_size)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800347
Yong Hongdad230a2017-08-30 22:25:19 +0800348 WriteProtect(crosfw.LoadMainFirmware())
Andy Cheng0465d132013-03-20 12:12:06 +0800349 event_log.Log('wp', fw='main')
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800350
351 # Some EC (mostly PD) does not support "RO NOW". Instead they will only set
352 # "RO_AT_BOOT" when you request to enable RO (These platforms consider
353 # --wp-range with right range identical to --wp-enable), and requires a
354 # 'ectool reboot_ec RO at-shutdown; reboot' to let the RO take effect.
Hung-Te Lin0d10b562016-12-28 10:58:07 +0800355 # After reboot, "flashrom -p host --wp-status" will return protected range.
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800356 # If you don't reboot, returned range will be (0, 0), and running command
357 # "ectool flashprotect" will not have RO_NOW.
358
Yong Hongdad230a2017-08-30 22:25:19 +0800359 for fw in [crosfw.LoadEcFirmware(), crosfw.LoadPDFirmware()]:
360 if fw.GetChipId() is None:
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800361 logging.warning('%s not write protected (seems there is no %s flash).',
Yong Hongdad230a2017-08-30 22:25:19 +0800362 fw.target.upper(), fw.target.upper())
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800363 continue
Yong Hongdad230a2017-08-30 22:25:19 +0800364 WriteProtect(fw)
365 event_log.Log('wp', fw=fw.target)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800366
367
368@Command('clear_gbb_flags')
Peter Shihfdf17682017-05-26 11:38:39 +0800369def ClearGBBFlags(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800370 """Zero out the GBB flags, in preparation for transition to release state.
371
372 No GBB flags are set in release/shipping state, but they are useful
Hung-Te Lin879cff42017-06-19 12:46:37 +0800373 for factory/development. See "futility gbb --flags" for details.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800374 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800375
Ricky Lianga70a1202013-03-15 15:03:17 +0800376 GetGooftool(options).ClearGBBFlags()
Andy Cheng0465d132013-03-20 12:12:06 +0800377 event_log.Log('clear_gbb_flags')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800378
379
Jon Salzaa3a30e2013-05-15 15:56:28 +0800380@Command('clear_factory_vpd_entries')
Peter Shihfdf17682017-05-26 11:38:39 +0800381def ClearFactoryVPDEntries(options):
Jon Salzaa3a30e2013-05-15 15:56:28 +0800382 """Clears factory.* items in the RW VPD."""
383 entries = GetGooftool(options).ClearFactoryVPDEntries()
384 event_log.Log('clear_factory_vpd_entries', entries=FilterDict(entries))
385
386
Mattias Nisslercca761b2015-04-15 21:53:04 +0200387@Command('generate_stable_device_secret')
Peter Shihfdf17682017-05-26 11:38:39 +0800388def GenerateStableDeviceSecret(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800389 """Generates a fresh stable device secret and stores it in the RO VPD."""
Mattias Nisslercca761b2015-04-15 21:53:04 +0200390 GetGooftool(options).GenerateStableDeviceSecret()
391 event_log.Log('generate_stable_device_secret')
392
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800393
Shen-En Shihd078a7c2017-08-04 13:33:49 +0800394@Command('cr50_set_board_id')
395def Cr50SetBoardId(options):
396 """Set the board id and flag in the Cr50 chip."""
397 GetGooftool(options).Cr50SetBoardId()
398 event_log.Log('cr50_set_board_id')
399
400
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800401@Command('cr50_reset_state')
402def Cr50ResetState(options):
403 """Reset Cr50 state back to default state after RMA."""
404 return GetGooftool(options).Cr50ResetState()
405
406
Earl Ou564a7872016-10-05 10:22:00 +0800407@Command('enable_release_partition',
408 CmdArg('--release_rootfs',
409 help=('path to the release rootfs device. If not specified, '
410 'the default (5th) partition will be used.')))
411def EnableReleasePartition(options):
412 """Enables a release image partition on the disk."""
413 GetGooftool(options).EnableReleasePartition(options.release_rootfs)
414
415
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800416@Command('wipe_in_place',
417 CmdArg('--fast', action='store_true',
Shun-Hsing Ou8d3c40a2015-10-08 18:16:08 +0800418 help='use non-secure but faster wipe method.'),
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800419 _shopfloor_url_args_cmd_arg,
420 _station_ip_cmd_arg,
421 _station_port_cmd_arg,
422 _wipe_finish_token_cmd_arg)
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800423def WipeInPlace(options):
424 """Start factory wipe directly without reboot."""
425
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800426 GetGooftool(options).WipeInPlace(options.fast,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800427 options.shopfloor_url,
428 options.station_ip,
429 options.station_port,
430 options.wipe_finish_token)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200431
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800432@Command('wipe_init',
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800433 CmdArg('--wipe_args', help='arguments for clobber-state'),
434 CmdArg('--state_dev', help='path to stateful partition device'),
435 CmdArg('--root_disk', help='path to primary device'),
436 CmdArg('--old_root', help='path to old root'),
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800437 _shopfloor_url_args_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800438 _release_rootfs_cmd_arg,
439 _station_ip_cmd_arg,
440 _station_port_cmd_arg,
441 _wipe_finish_token_cmd_arg)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800442def WipeInit(options):
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800443 GetGooftool(options).WipeInit(options.wipe_args,
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800444 options.shopfloor_url,
445 options.state_dev,
446 options.release_rootfs,
447 options.root_disk,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800448 options.old_root,
449 options.station_ip,
450 options.station_port,
451 options.wipe_finish_token)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800452
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800453@Command('verify',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800454 CmdArg('--no_write_protect', action='store_true',
455 help='Do not check write protection switch state.'),
Tammo Spalink95c43732012-07-25 15:57:14 -0700456 _hwid_status_list_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800457 _hwdb_path_cmd_arg,
Yong Hong5408f652017-07-11 19:20:25 +0800458 _project_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800459 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800460 _hwid_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800461 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800462 _cros_core_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800463 _ec_pubkey_path_cmd_arg,
464 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800465 _release_rootfs_cmd_arg,
466 _firmware_path_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800467 _enforced_release_channels_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800468 _waive_list_cmd_arg,
469 _skip_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800470def Verify(options):
471 """Verifies if whole factory process is ready for finalization.
472
473 This routine performs all the necessary checks to make sure the
474 device is ready to be finalized, but does not modify state. These
475 checks include dev switch, firmware write protection switch, hwid,
476 system time, keys, and root file system.
477 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800478
Hung-Te Lin6d827542012-07-19 11:50:41 +0800479 if not options.no_write_protect:
Ricky Lianga70a1202013-03-15 15:03:17 +0800480 VerifyWPSwitch(options)
Hung-Te Lindd708d42014-07-11 17:05:01 +0800481 VerifyManagementEngineLocked(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800482 VerifyDevSwitch(options)
Ting Shen129fa6f2016-09-02 12:22:24 +0800483 VerifyHWID(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800484 VerifySystemTime(options)
485 VerifyKeys(options)
486 VerifyRootFs(options)
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800487 VerifyTPM(options)
Hung-Te Lin53c49402017-07-26 13:10:58 +0800488 VerifyVPD(options)
bowgotsai529139c2015-05-30 01:39:49 +0800489 VerifyReleaseChannel(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800490
Hung-Te Lin56b18402015-01-16 14:52:30 +0800491
Jon Salzfe9036f2014-01-16 14:11:23 +0800492@Command('untar_stateful_files')
Hung-Te Lin388bce22014-06-03 19:56:40 +0800493def UntarStatefulFiles(unused_options):
Jon Salzfe9036f2014-01-16 14:11:23 +0800494 """Untars stateful files from stateful_files.tar.xz on stateful partition.
495
496 If that file does not exist (which should only be R30 and earlier),
497 this is a no-op.
498 """
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800499 # Path to stateful partition on device.
500 device_stateful_path = '/mnt/stateful_partition'
501 tar_file = os.path.join(device_stateful_path, 'stateful_files.tar.xz')
Jon Salzfe9036f2014-01-16 14:11:23 +0800502 if os.path.exists(tar_file):
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800503 Spawn(['tar', 'xf', tar_file], cwd=device_stateful_path,
Jon Salzfe9036f2014-01-16 14:11:23 +0800504 log=True, check_call=True)
505 else:
506 logging.warning('No stateful files at %s', tar_file)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800507
Jon Salz40b9f822014-07-25 16:39:55 +0800508
509@Command('log_source_hashes')
Peter Shihfdf17682017-05-26 11:38:39 +0800510def LogSourceHashes(options):
Jon Salz40b9f822014-07-25 16:39:55 +0800511 """Logs hashes of source files in the factory toolkit."""
Peter Shihfdf17682017-05-26 11:38:39 +0800512 del options # Unused.
Jon Salze60307f2014-08-05 16:20:00 +0800513 # WARNING: The following line is necessary to validate the integrity
514 # of the factory software. Do not remove or modify it.
515 #
516 # 警告:此行会验证工厂软件的完整性,禁止删除或修改。
Wei-Han Chena5c01a02016-04-23 19:27:19 +0800517 factory_par = sys_utils.GetRunningFactoryPythonArchivePath()
518 if factory_par:
519 event_log.Log(
520 'source_hashes',
521 **file_utils.HashPythonArchive(factory_par))
522 else:
523 event_log.Log(
524 'source_hashes',
Peter Shihad166772017-05-31 11:36:17 +0800525 **file_utils.HashSourceTree(os.path.join(paths.FACTORY_DIR, 'py')))
Jon Salz40b9f822014-07-25 16:39:55 +0800526
527
Tammo Spalink86a61c62012-05-25 15:10:35 +0800528@Command('log_system_details')
Peter Shihfdf17682017-05-26 11:38:39 +0800529def LogSystemDetails(options):
Tammo Spalink86a61c62012-05-25 15:10:35 +0800530 """Write miscellaneous system details to the event log."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800531
Ricky Liang43b879b2014-02-24 11:36:55 +0800532 event_log.Log('system_details', **GetGooftool(options).GetSystemDetails())
Tammo Spalink86a61c62012-05-25 15:10:35 +0800533
534
Jon Salza88b83b2013-05-27 20:00:35 +0800535def CreateReportArchiveBlob(*args, **kwargs):
536 """Creates a report archive and returns it as a blob.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800537
Jon Salza88b83b2013-05-27 20:00:35 +0800538 Args:
539 See CreateReportArchive.
Andy Cheng7a76cb82012-11-19 18:08:19 +0800540
Jon Salza88b83b2013-05-27 20:00:35 +0800541 Returns:
542 An xmlrpclib.Binary object containing a .tar.xz file.
543 """
Wei-Han Chen47416612016-09-14 17:41:52 +0800544 report_archive = CreateReportArchive(*args, **kwargs)
545 try:
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800546 return xmlrpclib.Binary(file_utils.ReadFile(report_archive))
Wei-Han Chen47416612016-09-14 17:41:52 +0800547 finally:
548 os.unlink(report_archive)
Jon Salza88b83b2013-05-27 20:00:35 +0800549
550
551def CreateReportArchive(device_sn=None, add_file=None):
552 """Creates a report archive in a temporary directory.
553
554 Args:
555 device_sn: The device serial number (optional).
556 add_file: A list of files to add (optional).
557
558 Returns:
559 Path to the archive.
560 """
Hung-Te Lin6bd16472012-06-20 16:26:47 +0800561 def NormalizeAsFileName(token):
562 return re.sub(r'\W+', '', token).strip()
Jon Salza88b83b2013-05-27 20:00:35 +0800563
564 target_name = '%s%s.tar.xz' % (
565 time.strftime('%Y%m%dT%H%M%SZ',
566 time.gmtime()),
Hung-Te Lin56b18402015-01-16 14:52:30 +0800567 ('' if device_sn is None else
568 '_' + NormalizeAsFileName(device_sn)))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800569 target_path = os.path.join(gettempdir(), target_name)
Jon Salza88b83b2013-05-27 20:00:35 +0800570
Tammo Spalink86a61c62012-05-25 15:10:35 +0800571 # Intentionally ignoring dotfiles in EVENT_LOG_DIR.
Andy Cheng0465d132013-03-20 12:12:06 +0800572 tar_cmd = 'cd %s ; tar cJf %s *' % (event_log.EVENT_LOG_DIR, target_path)
Peter Shihb4e49352017-05-25 17:35:11 +0800573 tar_cmd += ' %s' % paths.FACTORY_LOG_PATH
Jon Salza88b83b2013-05-27 20:00:35 +0800574 if add_file:
575 for f in add_file:
Jon Salz65266432012-07-30 19:02:49 +0800576 # Require absolute paths since the tar command may change the
577 # directory.
578 if not f.startswith('/'):
579 raise Error('Not an absolute path: %s' % f)
580 if not os.path.exists(f):
581 raise Error('File does not exist: %s' % f)
Wei-Han Chen4b755022017-01-04 10:51:52 +0800582 tar_cmd += ' %s' % pipes.quote(f)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800583 cmd_result = Shell(tar_cmd)
Jon Salzff88c022012-11-03 12:19:58 +0800584
585 if ((cmd_result.status == 1) and
586 all((x == '' or
587 'file changed as we read it' in x or
588 "Removing leading `/' from member names" in x)
589 for x in cmd_result.stderr.split('\n'))):
590 # That's OK. Make sure it's valid though.
Vic Yang85199e72013-01-28 14:33:11 +0800591 Spawn(['tar', 'tfJ', target_path], check_call=True, log=True,
Jon Salzff88c022012-11-03 12:19:58 +0800592 ignore_stdout=True)
593 elif not cmd_result.success:
Tammo Spalink86a61c62012-05-25 15:10:35 +0800594 raise Error('unable to tar event logs, cmd %r failed, stderr: %r' %
595 (tar_cmd, cmd_result.stderr))
Jon Salzff88c022012-11-03 12:19:58 +0800596
Jon Salza88b83b2013-05-27 20:00:35 +0800597 return target_path
598
599_upload_method_cmd_arg = CmdArg(
600 '--upload_method', metavar='METHOD:PARAM',
601 help=('How to perform the upload. METHOD should be one of '
602 '{ftp, shopfloor, ftps, cpfe}.'))
603_add_file_cmd_arg = CmdArg(
604 '--add_file', metavar='FILE', action='append',
605 help='Extra file to include in report (must be an absolute path)')
606
Hung-Te Lin56b18402015-01-16 14:52:30 +0800607
Jon Salza88b83b2013-05-27 20:00:35 +0800608@Command('upload_report',
609 _upload_method_cmd_arg,
610 _add_file_cmd_arg)
611def UploadReport(options):
612 """Create a report containing key device details."""
Yong Hong863d3262017-10-30 16:23:34 +0800613 ro_vpd = sys_utils.VPDTool().GetAllData(
614 partition=sys_utils.VPDTool.RO_PARTITION)
Jon Salza88b83b2013-05-27 20:00:35 +0800615 device_sn = ro_vpd.get('serial_number', None)
616 if device_sn is None:
617 logging.warning('RO_VPD missing device serial number')
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +0800618 device_sn = 'MISSING_SN_' + time_utils.TimedUUID()
Jon Salza88b83b2013-05-27 20:00:35 +0800619 target_path = CreateReportArchive(device_sn)
620
Tammo Spalink86a61c62012-05-25 15:10:35 +0800621 if options.upload_method is None or options.upload_method == 'none':
622 logging.warning('REPORT UPLOAD SKIPPED (report left at %s)', target_path)
623 return
624 method, param = options.upload_method.split(':', 1)
625 if method == 'shopfloor':
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800626 report_upload.ShopFloorUpload(
627 target_path, param,
628 'GRT' if options.command_name == 'finalize' else None)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800629 elif method == 'ftp':
Jay Kim360c1dd2012-06-25 10:58:11 -0700630 report_upload.FtpUpload(target_path, 'ftp:' + param)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800631 elif method == 'ftps':
632 report_upload.CurlUrlUpload(target_path, '--ftp-ssl-reqd ftp:%s' % param)
633 elif method == 'cpfe':
Shawn Nematbakhsh3404a092013-01-28 16:49:09 -0800634 report_upload.CpfeUpload(target_path, pipes.quote(param))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800635 else:
636 raise Error('unknown report upload method %r', method)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800637
638
639@Command('finalize',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800640 CmdArg('--no_write_protect', action='store_true',
641 help='Do not enable firmware write protection.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800642 CmdArg('--fast', action='store_true',
643 help='use non-secure but faster wipe method.'),
Shun-Hsing Oudb407d62015-11-11 11:03:59 +0800644 _shopfloor_url_args_cmd_arg,
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800645 _hwdb_path_cmd_arg,
Tammo Spalink95c43732012-07-25 15:57:14 -0700646 _hwid_status_list_cmd_arg,
Jon Salz65266432012-07-30 19:02:49 +0800647 _upload_method_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800648 _add_file_cmd_arg,
649 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800650 _hwid_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800651 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800652 _cros_core_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800653 _ec_pubkey_path_cmd_arg,
654 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800655 _release_rootfs_cmd_arg,
656 _firmware_path_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800657 _enforced_release_channels_cmd_arg,
658 _station_ip_cmd_arg,
659 _station_port_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800660 _wipe_finish_token_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800661 _waive_list_cmd_arg,
662 _skip_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800663def Finalize(options):
664 """Verify system readiness and trigger transition into release state.
665
Jon Salzaa3a30e2013-05-15 15:56:28 +0800666 This routine does the following:
667 - Verifies system state (see verify command)
Jon Salzfe9036f2014-01-16 14:11:23 +0800668 - Untars stateful_files.tar.xz, if it exists, in the stateful partition, to
669 initialize files such as the CRX cache
Jon Salzaa3a30e2013-05-15 15:56:28 +0800670 - Modifies firmware bitmaps to match locale
671 - Clears all factory-friendly flags from the GBB
672 - Removes factory-specific entries from RW_VPD (factory.*)
673 - Enables firmware write protection (cannot rollback after this)
674 - Uploads system logs & reports
Earl Ou51182222016-09-09 12:16:48 +0800675 - Wipes the testing kernel, rootfs, and stateful partition
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800676 """
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800677 Verify(options)
Shen-En Shih3e079b22017-09-11 05:43:09 -0700678 Cr50SetBoardId(options)
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800679 Cr50ResetState(options)
Jon Salz40b9f822014-07-25 16:39:55 +0800680 LogSourceHashes(options)
Jon Salzfe9036f2014-01-16 14:11:23 +0800681 UntarStatefulFiles(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800682 if options.cros_core:
683 logging.info('SetFirmwareBitmapLocale is skipped for ChromeOS Core device.')
684 else:
685 SetFirmwareBitmapLocale(options)
Jon Salzaa3a30e2013-05-15 15:56:28 +0800686 ClearFactoryVPDEntries(options)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200687 GenerateStableDeviceSecret(options)
Shen-En Shih3e079b22017-09-11 05:43:09 -0700688 ClearGBBFlags(options)
Hung-Te Lin6d827542012-07-19 11:50:41 +0800689 if options.no_write_protect:
690 logging.warn('WARNING: Firmware Write Protection is SKIPPED.')
Andy Cheng0465d132013-03-20 12:12:06 +0800691 event_log.Log('wp', fw='both', status='skipped')
Hung-Te Lin6d827542012-07-19 11:50:41 +0800692 else:
Wei-Han Chenba21f512016-10-14 18:52:33 +0800693 EnableFwWp(options)
Jon Salza0f58e02012-05-29 19:33:39 +0800694 LogSystemDetails(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800695 UploadReport(options)
Earl Ou51182222016-09-09 12:16:48 +0800696
697 event_log.Log('wipe_in_place')
698 wipe_args = []
Earl Ou51182222016-09-09 12:16:48 +0800699 if options.shopfloor_url:
700 wipe_args += ['--shopfloor_url', options.shopfloor_url]
701 if options.fast:
702 wipe_args += ['--fast']
703 if options.station_ip:
704 wipe_args += ['--station_ip', options.station_ip]
705 if options.station_port:
706 wipe_args += ['--station_port', options.station_port]
707 if options.wipe_finish_token:
708 wipe_args += ['--wipe_finish_token', options.wipe_finish_token]
709 ExecFactoryPar('gooftool', 'wipe_in_place', *wipe_args)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800710
711
Ting Shen129fa6f2016-09-02 12:22:24 +0800712@Command('verify_hwid',
713 _probe_results_cmd_arg,
714 _hwdb_path_cmd_arg,
715 _hwid_cmd_arg,
716 _rma_mode_cmd_arg)
717def VerifyHWID(options):
Ricky Liangc662be32013-12-24 11:50:23 +0800718 """A simple wrapper that calls out to HWID utils to verify version 3 HWID.
Ricky Liang53390232013-03-08 15:37:57 +0800719
Ricky Liangc662be32013-12-24 11:50:23 +0800720 This is mainly for Gooftool to verify v3 HWID during finalize. For testing
721 and development purposes, please use `hwid` command.
Ricky Liang53390232013-03-08 15:37:57 +0800722 """
Ricky Liangc662be32013-12-24 11:50:23 +0800723 db = GetGooftool(options).db
724 encoded_string = options.hwid or hwid_utils.GetHWIDString()
Ricky Liang7905f272013-03-16 01:57:10 +0800725 if options.probe_results:
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800726 probed_results = yaml.load(file_utils.ReadFile(options.probe_results))
Ricky Liang7905f272013-03-16 01:57:10 +0800727 else:
Yong Hong863d3262017-10-30 16:23:34 +0800728 probed_results = GetGooftool(options).Probe()
Ricky Liangc662be32013-12-24 11:50:23 +0800729 vpd = hwid_utils.GetVPD(probed_results)
Ricky Liang53390232013-03-08 15:37:57 +0800730
Hung-Te Lin11052952015-03-18 13:48:59 +0800731 event_log.Log('probed_results', probed_results=FilterDict(probed_results))
732 event_log.Log('vpd', vpd=FilterDict(vpd))
Ricky Liang53390232013-03-08 15:37:57 +0800733
Ricky Liangc662be32013-12-24 11:50:23 +0800734 hwid_utils.VerifyHWID(db, encoded_string, probed_results, vpd,
Hung-Te Lin56b18402015-01-16 14:52:30 +0800735 rma_mode=options.rma_mode)
Ricky Liang53390232013-03-08 15:37:57 +0800736
Ricky Liangc662be32013-12-24 11:50:23 +0800737 event_log.Log('verified_hwid', hwid=encoded_string)
Ricky Liang53390232013-03-08 15:37:57 +0800738
739
henryhsu44d793a2013-07-20 00:07:38 +0800740@Command('get_firmware_hash',
741 CmdArg('--file', metavar='FILE', help='Firmware File.'))
742def GetFirmwareHash(options):
henryhsuf6f835c2013-07-20 20:49:25 +0800743 """Get firmware hash from a file"""
henryhsu44d793a2013-07-20 00:07:38 +0800744 if os.path.exists(options.file):
Yong Hong863d3262017-10-30 16:23:34 +0800745 hashes = chromeos_firmware.CalculateFirmwareHashes(options.file)
henryhsu44d793a2013-07-20 00:07:38 +0800746 for section, value_dict in hashes.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800747 print '%s:' % section
henryhsu44d793a2013-07-20 00:07:38 +0800748 for key, value in value_dict.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800749 print ' %s: %s' % (key, value)
henryhsu44d793a2013-07-20 00:07:38 +0800750 else:
751 raise Error('File does not exist: %s' % options.file)
752
henryhsuf6f835c2013-07-20 20:49:25 +0800753
Peter Shihfdf17682017-05-26 11:38:39 +0800754def main():
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800755 """Run sub-command specified by the command line args."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800756
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800757 options = ParseCmdline(
Ting Shen129fa6f2016-09-02 12:22:24 +0800758 'Perform Google required factory tests.',
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800759 CmdArg('-l', '--log', metavar='PATH',
760 help='Write logs to this file.'),
Jon Salza4bea382012-10-29 13:00:34 +0800761 CmdArg('--suppress-event-logs', action='store_true',
762 help='Suppress event logging.'),
Wei-Han Chenaff56232016-04-16 09:17:59 +0800763 CmdArg('--phase', default=None,
764 help=('override phase for phase checking (defaults to the current '
765 'as returned by the "factory phase" command)')),
Tammo Spalink8fab5312012-05-28 18:33:30 +0800766 verbosity_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800767 SetupLogging(options.verbosity, options.log)
Andy Cheng0465d132013-03-20 12:12:06 +0800768 event_log.SetGlobalLoggerDefaultPrefix('gooftool')
769 event_log.GetGlobalLogger().suppress = options.suppress_event_logs
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800770 logging.debug('gooftool options: %s', repr(options))
Wei-Han Chenaff56232016-04-16 09:17:59 +0800771
772 phase.OverridePhase(options.phase)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800773 try:
774 logging.debug('GOOFTOOL command %r', options.command_name)
775 options.command(options)
776 logging.info('GOOFTOOL command %r SUCCESS', options.command_name)
777 except Error, e:
778 logging.exception(e)
779 sys.exit('GOOFTOOL command %r ERROR: %s' % (options.command_name, e))
780 except Exception, e:
781 logging.exception(e)
782 sys.exit('UNCAUGHT RUNTIME EXCEPTION %s' % e)
783
784
785if __name__ == '__main__':
Peter Shihfdf17682017-05-26 11:38:39 +0800786 main()