blob: 4704f3531b75074732ac5876f501671bfb6e7206 [file] [log] [blame]
You-Cheng Syuf0f4be12017-12-05 16:33:53 +08001#!/usr/bin/env python
Jon Salze60307f2014-08-05 16:20:00 +08002# -*- coding: utf-8 -*-
3# Copyright 2014 The Chromium OS Authors. All rights reserved.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08004# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
Jon Salze60307f2014-08-05 16:20:00 +08007
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08008"""Google Factory Tool.
9
You-Cheng Syu461ec032017-03-06 15:56:58 +080010This tool is intended to be used on factory assembly lines. It
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080011provides all of the Google required test functionality and must be run
12on each device as part of the assembly process.
13"""
14
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080015import logging
16import os
Jon Salz65266432012-07-30 19:02:49 +080017import pipes
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080018import re
19import sys
Peter Shihfdf17682017-05-26 11:38:39 +080020from tempfile import gettempdir
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080021import threading
Hung-Te Lin6bd16472012-06-20 16:26:47 +080022import time
Jon Salza88b83b2013-05-27 20:00:35 +080023import xmlrpclib
Peter Shihfdf17682017-05-26 11:38:39 +080024
Peter Shihfdf17682017-05-26 11:38:39 +080025import factory_common # pylint: disable=unused-import
Wei-Han Chen0a3320e2016-04-23 01:32:07 +080026from cros.factory.gooftool.common import ExecFactoryPar
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080027from cros.factory.gooftool.common import Shell
Peter Shihfdf17682017-05-26 11:38:39 +080028from cros.factory.gooftool.core import Gooftool
29from cros.factory.gooftool import crosfw
Peter Shihfdf17682017-05-26 11:38:39 +080030from cros.factory.gooftool import report_upload
Hung-Te Lin604e0c22015-11-24 15:17:07 +080031from cros.factory.hwid.v3 import hwid_utils
Yong Hong863d3262017-10-30 16:23:34 +080032from cros.factory.probe.functions import chromeos_firmware
Wei-Han Chen2ebb92d2016-01-12 14:51:41 +080033from cros.factory.test.env import paths
Peter Shihfdf17682017-05-26 11:38:39 +080034from cros.factory.test import event_log
Wei-Han Chenaff56232016-04-16 09:17:59 +080035from cros.factory.test.rules import phase
Hung-Te Lin3f096842016-01-13 17:37:06 +080036from cros.factory.test.rules.privacy import FilterDict
Peter Shihfdf17682017-05-26 11:38:39 +080037from cros.factory.utils import argparse_utils
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080038from cros.factory.utils.argparse_utils import CmdArg
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080039from cros.factory.utils.argparse_utils import ParseCmdline
40from cros.factory.utils.argparse_utils import verbosity_cmd_arg
Peter Shihfdf17682017-05-26 11:38:39 +080041from cros.factory.utils.debug_utils import SetupLogging
Jon Salz40b9f822014-07-25 16:39:55 +080042from cros.factory.utils import file_utils
Yong Hongf008bd72017-12-22 04:46:27 +080043from cros.factory.utils import json_utils
Wei-Han Chena5c01a02016-04-23 19:27:19 +080044from cros.factory.utils import sys_utils
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +080045from cros.factory.utils import time_utils
Jon Salzff88c022012-11-03 12:19:58 +080046from cros.factory.utils.process_utils import Spawn
Joel Kitchingd3bc2662014-12-16 16:03:32 -080047from cros.factory.utils.type_utils import Error
Tammo Spalink86a61c62012-05-25 15:10:35 +080048
Tammo Spalink5c699832012-07-03 17:50:39 +080049
Tammo Spalink5c699832012-07-03 17:50:39 +080050# TODO(tammo): Replace calls to sys.exit with raise Exit, and maybe
51# treat that specially (as a smoot exit, as opposed to the more
52# verbose output for generic Error).
53
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080054_global_gooftool = None
55_gooftool_lock = threading.Lock()
Tammo Spalink5c699832012-07-03 17:50:39 +080056
Hung-Te Lin56b18402015-01-16 14:52:30 +080057
Ricky Lianga70a1202013-03-15 15:03:17 +080058def GetGooftool(options):
Peter Shihfdf17682017-05-26 11:38:39 +080059 global _global_gooftool # pylint: disable=global-statement
Ricky Lianga70a1202013-03-15 15:03:17 +080060
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080061 if _global_gooftool is None:
62 with _gooftool_lock:
Shen-En Shihc5d15d62017-08-04 13:02:59 +080063 if _global_gooftool is None:
64 project = getattr(options, 'project', None)
65 hwdb_path = getattr(options, 'hwdb_path', None)
66 _global_gooftool = Gooftool(hwid_version=3, project=project,
67 hwdb_path=hwdb_path)
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080068
69 return _global_gooftool
Ricky Lianga70a1202013-03-15 15:03:17 +080070
Hung-Te Lin56b18402015-01-16 14:52:30 +080071
Ting Shen18a06382016-08-30 16:18:21 +080072def Command(cmd_name, *args, **kwargs):
You-Cheng Syu8fc2a602017-12-22 17:05:05 +080073 """Decorator for commands in gooftool.
Ting Shen18a06382016-08-30 16:18:21 +080074
75 This is similar to argparse_utils.Command, but all gooftool commands
76 can be waived during `gooftool finalize` or `gooftool verify` using
Wei-Han Chen60c5d332017-01-05 17:15:10 +080077 --waive_list or --skip_list option.
Ting Shen18a06382016-08-30 16:18:21 +080078 """
79 def Decorate(fun):
Wei-Han Chen60c5d332017-01-05 17:15:10 +080080 def CommandWithWaiveSkipCheck(options):
Ting Shen18a06382016-08-30 16:18:21 +080081 waive_list = vars(options).get('waive_list', [])
Wei-Han Chen60c5d332017-01-05 17:15:10 +080082 skip_list = vars(options).get('skip_list', [])
83 if phase.GetPhase() >= phase.PVT_DOGFOOD and (
84 waive_list != [] or skip_list != []):
Ting Shen18a06382016-08-30 16:18:21 +080085 raise Error(
Wei-Han Chen60c5d332017-01-05 17:15:10 +080086 'waive_list and skip_list should be empty for phase %s' %
87 phase.GetPhase())
Ting Shen18a06382016-08-30 16:18:21 +080088
Wei-Han Chen60c5d332017-01-05 17:15:10 +080089 if cmd_name not in skip_list:
90 try:
91 fun(options)
92 except Exception as e:
93 if cmd_name in waive_list:
94 logging.exception(e)
95 else:
96 raise
Ting Shen18a06382016-08-30 16:18:21 +080097
98 return argparse_utils.Command(cmd_name, *args, **kwargs)(
Wei-Han Chen60c5d332017-01-05 17:15:10 +080099 CommandWithWaiveSkipCheck)
Ting Shen18a06382016-08-30 16:18:21 +0800100 return Decorate
101
102
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800103@Command('write_hwid',
104 CmdArg('hwid', metavar='HWID', help='HWID string'))
Andy Chengc92e6f92012-11-20 16:55:53 +0800105def WriteHWID(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800106 """Write specified HWID value into the system BB."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800107
Tammo Spalink95c43732012-07-25 15:57:14 -0700108 logging.info('writing hwid string %r', options.hwid)
Ricky Lianga70a1202013-03-15 15:03:17 +0800109 GetGooftool(options).WriteHWID(options.hwid)
Andy Cheng0465d132013-03-20 12:12:06 +0800110 event_log.Log('write_hwid', hwid=options.hwid)
Tammo Spalink95c43732012-07-25 15:57:14 -0700111 print 'Wrote HWID: %r' % options.hwid
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800112
113
Yong Hongc3765412017-12-26 23:12:15 +0800114@Command('read_hwid')
115def ReadHWID(options):
116 """Read the HWID string from GBB."""
117
118 logging.info('reading the hwid string')
119 print GetGooftool(options).ReadHWID()
120
121
Yong Hong5408f652017-07-11 19:20:25 +0800122_project_cmd_arg = CmdArg(
123 '--project', metavar='PROJECT',
124 default=None, help='Project name to test.')
Ricky Liang53390232013-03-08 15:37:57 +0800125
Tammo Spalink8fab5312012-05-28 18:33:30 +0800126_hwdb_path_cmd_arg = CmdArg(
127 '--hwdb_path', metavar='PATH',
Yong Hong5c6dcd52017-12-27 11:05:01 +0800128 default=hwid_utils.GetDefaultDataPath(),
Tammo Spalink8fab5312012-05-28 18:33:30 +0800129 help='Path to the HWID database.')
130
Tammo Spalink95c43732012-07-25 15:57:14 -0700131_hwid_status_list_cmd_arg = CmdArg(
Hung-Te Lin56b18402015-01-16 14:52:30 +0800132 '--status', nargs='*', default=['supported'],
133 help='allow only HWIDs with these status values')
Tammo Spalink95c43732012-07-25 15:57:14 -0700134
Jon Salzce124fb2012-10-02 17:42:03 +0800135_probe_results_cmd_arg = CmdArg(
136 '--probe_results', metavar='RESULTS.yaml',
Yong Hong863d3262017-10-30 16:23:34 +0800137 help=('Output from "gooftool probe" (used instead of '
Jon Salzce124fb2012-10-02 17:42:03 +0800138 'probing this system).'))
139
Ricky Liang53390232013-03-08 15:37:57 +0800140_device_info_cmd_arg = CmdArg(
Ricky Liangf89f73a2013-03-19 05:00:24 +0800141 '--device_info', metavar='DEVICE_INFO.yaml', default=None,
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800142 help='A dict of device info to use instead of fetching from shopfloor '
Ricky Liang53390232013-03-08 15:37:57 +0800143 'server.')
144
Jon Salzce124fb2012-10-02 17:42:03 +0800145_hwid_cmd_arg = CmdArg(
146 '--hwid', metavar='HWID',
Ricky Lianga70a1202013-03-15 15:03:17 +0800147 help='HWID to verify (instead of the currently set HWID of this system).')
Jon Salzce124fb2012-10-02 17:42:03 +0800148
Yong Hong68a0e0d2017-12-20 19:06:54 +0800149_hwid_run_vpd_cmd_arg = CmdArg(
150 '--hwid-run-vpd', action='store_true',
151 help=('Specify the hwid utility to obtain the vpd data by running the '
152 '`vpd` commandline tool.'))
153
154_hwid_vpd_data_file_cmd_arg = CmdArg(
155 '--hwid-vpd-data-file', metavar='FILE.json', type=str, default=None,
156 help=('Specify the hwid utility to obtain the vpd data from the specified '
157 'file.'))
158
Bernie Thompson3c11c872013-07-22 18:22:45 -0700159_rma_mode_cmd_arg = CmdArg(
160 '--rma_mode', action='store_true',
161 help='Enable RMA mode, do not check for deprecated components.')
Tammo Spalink95c43732012-07-25 15:57:14 -0700162
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800163_cros_core_cmd_arg = CmdArg(
164 '--cros_core', action='store_true',
165 help='Finalize for ChromeOS Core devices (may add or remove few test '
Hung-Te Lin53c49402017-07-26 13:10:58 +0800166 'items. For example, registration codes or firmware bitmap '
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800167 'locale settings).')
168
Yilun Lin599833f2017-12-22 14:07:46 +0800169_chromebox_cmd_arg = CmdArg(
170 '--chromebox', action='store_true', default=None,
171 help='Finalize for ChromeBox devices (may add or remove few test '
172 'items. For example, VerifyECKey).')
173
bowgotsai13820f42015-09-10 23:18:04 +0800174_enforced_release_channels_cmd_arg = CmdArg(
175 '--enforced_release_channels', nargs='*', default=None,
176 help='Enforced release image channels.')
177
Yilun Lin34f54802017-11-16 11:58:25 +0800178_ec_pubkey_path_cmd_arg = CmdArg(
179 '--ec_pubkey_path',
180 default=None,
181 help='Path to public key in vb2 format. Verify EC key with pubkey file.')
182
183_ec_pubkey_hash_cmd_arg = CmdArg(
184 '--ec_pubkey_hash',
185 default=None,
186 help='A string for public key hash. Verify EC key with the given hash.')
187
Hung-Te Lincdb96522016-04-15 16:51:10 +0800188_release_rootfs_cmd_arg = CmdArg(
189 '--release_rootfs', help='Location of release image rootfs partition.')
190
191_firmware_path_cmd_arg = CmdArg(
192 '--firmware_path', help='Location of firmware image partition.')
Ricky Liang43b879b2014-02-24 11:36:55 +0800193
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800194_shopfloor_url_args_cmd_arg = CmdArg(
195 '--shopfloor_url',
Earl Ou51182222016-09-09 12:16:48 +0800196 help='Shopfloor server url to be informed when wiping is done. '
197 'After wiping, a XML-RPC request will be sent to the '
198 'given url to indicate the completion of wiping.')
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800199
200_station_ip_cmd_arg = CmdArg(
201 '--station_ip',
202 help='IP of remote station')
203
204_station_port_cmd_arg = CmdArg(
205 '--station_port',
206 help='Port on remote station')
207
208_wipe_finish_token_cmd_arg = CmdArg(
209 '--wipe_finish_token',
210 help='Required token when notifying station after wipe finished')
211
Ting Shen18a06382016-08-30 16:18:21 +0800212_waive_list_cmd_arg = CmdArg(
213 '--waive_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800214 help='A list of waived checks, separated by whitespace. '
215 'Each item should be a sub-command of gooftool. '
Ting Shen18a06382016-08-30 16:18:21 +0800216 'e.g. "gooftool verify --waive_list verify_tpm clear_gbb_flags".')
217
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800218_skip_list_cmd_arg = CmdArg(
219 '--skip_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800220 help='A list of skipped checks, separated by whitespace. '
221 'Each item should be a sub-command of gooftool. '
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800222 'e.g. "gooftool verify --skip_list verify_tpm clear_gbb_flags".')
223
Tammo Spalink8fab5312012-05-28 18:33:30 +0800224
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800225@Command('probe',
226 CmdArg('--comps', nargs='*',
227 help='List of keys from the component_db registry.'),
228 CmdArg('--no_vol', action='store_true',
Yong Hong863d3262017-10-30 16:23:34 +0800229 help='Do not probe volatile data.'))
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800230def RunProbe(options):
Yong Hongf008bd72017-12-22 04:46:27 +0800231 """Print json-formatted breakdown of probed device properties."""
232 logging.warning('This sub-command is going to be deprecated by `probe` '
233 'command-line tool, please see `probe --help` for detail.')
Yong Hong863d3262017-10-30 16:23:34 +0800234 probed_result = GetGooftool(options).Probe(options.comps, not options.no_vol)
Yong Hongf008bd72017-12-22 04:46:27 +0800235 print json_utils.DumpStr(probed_result, pretty=True)
Ricky Liang53390232013-03-08 15:37:57 +0800236
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800237
Yong Hong863d3262017-10-30 16:23:34 +0800238@Command('verify_components')
Tammo Spalink214caf42012-05-28 10:45:00 +0800239def VerifyComponents(options):
Yong Hong863d3262017-10-30 16:23:34 +0800240 del options
241 msg = ('This command has already been deprecated, please use '
242 '`hwid verify-components` instead.')
243 print msg
244 sys.exit(1)
Tammo Spalink214caf42012-05-28 10:45:00 +0800245
246
Yilun Lin34f54802017-11-16 11:58:25 +0800247@Command(
248 'verify_ec_key',
249 _ec_pubkey_path_cmd_arg,
250 _ec_pubkey_hash_cmd_arg)
251def VerifyECKey(options):
252 """Verify EC key."""
253 return GetGooftool(options).VerifyECKey(
254 options.ec_pubkey_path, options.ec_pubkey_hash)
255
256
Hung-Te Line1d80f62016-03-31 14:58:13 +0800257@Command('verify_keys',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800258 _release_rootfs_cmd_arg,
259 _firmware_path_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800260def VerifyKeys(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800261 """Verify keys in firmware and SSD match."""
Hung-Te Line1d80f62016-03-31 14:58:13 +0800262 return GetGooftool(options).VerifyKeys(
Hung-Te Lincdb96522016-04-15 16:51:10 +0800263 options.release_rootfs, options.firmware_path)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800264
265
266@Command('set_fw_bitmap_locale')
Peter Shihfdf17682017-05-26 11:38:39 +0800267def SetFirmwareBitmapLocale(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800268 """Use VPD locale value to set firmware bitmap default language."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800269
Ricky Lianga70a1202013-03-15 15:03:17 +0800270 (index, locale) = GetGooftool(options).SetFirmwareBitmapLocale()
Andy Cheng2582d292012-12-04 17:38:28 +0800271 logging.info('Firmware bitmap initial locale set to %d (%s).',
272 index, locale)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800273
274
Hung-Te Line1d80f62016-03-31 14:58:13 +0800275@Command('verify_system_time',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800276 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800277def VerifySystemTime(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800278 """Verify system time is later than release filesystem creation time."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800279
Hung-Te Lincdb96522016-04-15 16:51:10 +0800280 return GetGooftool(options).VerifySystemTime(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800281
282
Hung-Te Line1d80f62016-03-31 14:58:13 +0800283@Command('verify_rootfs',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800284 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800285def VerifyRootFs(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800286 """Verify rootfs on SSD is valid by checking hash."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800287
Hung-Te Line1d80f62016-03-31 14:58:13 +0800288 return GetGooftool(options).VerifyRootFs(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800289
Hung-Te Lin56b18402015-01-16 14:52:30 +0800290
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800291@Command('verify_tpm')
Peter Shihfdf17682017-05-26 11:38:39 +0800292def VerifyTPM(options):
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800293 """Verify TPM is cleared."""
294
295 return GetGooftool(options).VerifyTPM()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800296
Hung-Te Lin56b18402015-01-16 14:52:30 +0800297
Hung-Te Lindd708d42014-07-11 17:05:01 +0800298@Command('verify_me_locked')
Peter Shihfdf17682017-05-26 11:38:39 +0800299def VerifyManagementEngineLocked(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800300 """Verify Management Engine is locked."""
Hung-Te Lindd708d42014-07-11 17:05:01 +0800301
302 return GetGooftool(options).VerifyManagementEngineLocked()
303
Hung-Te Lin56b18402015-01-16 14:52:30 +0800304
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800305@Command('verify_switch_wp')
Peter Shihfdf17682017-05-26 11:38:39 +0800306def VerifyWPSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800307 """Verify hardware write protection switch is enabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800308
Ricky Lianga70a1202013-03-15 15:03:17 +0800309 GetGooftool(options).VerifyWPSwitch()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800310
311
312@Command('verify_switch_dev')
Peter Shihfdf17682017-05-26 11:38:39 +0800313def VerifyDevSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800314 """Verify developer switch is disabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800315
Ricky Lianga70a1202013-03-15 15:03:17 +0800316 if GetGooftool(options).CheckDevSwitchForDisabling():
Hung-Te Lind7d34722012-07-26 16:48:35 +0800317 logging.warn('VerifyDevSwitch: No physical switch.')
Andy Cheng0465d132013-03-20 12:12:06 +0800318 event_log.Log('switch_dev', type='virtual switch')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800319
320
Hung-Te Lin53c49402017-07-26 13:10:58 +0800321@Command('verify_vpd')
322def VerifyVPD(options):
323 """Verify that VPD values are properly set.
Jon Salzadd90d32014-04-29 16:16:27 +0800324
Hung-Te Lin53c49402017-07-26 13:10:58 +0800325 Check if mandatory fields are set, and deprecated fields don't exist.
Jon Salzadd90d32014-04-29 16:16:27 +0800326 """
Hung-Te Lin53c49402017-07-26 13:10:58 +0800327 return GetGooftool(options).VerifyVPD()
Jon Salzadd90d32014-04-29 16:16:27 +0800328
329
bowgotsai13820f42015-09-10 23:18:04 +0800330@Command('verify_release_channel',
331 _enforced_release_channels_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800332def VerifyReleaseChannel(options):
bowgotsai529139c2015-05-30 01:39:49 +0800333 """Verify that release image channel is correct.
334
335 ChromeOS has four channels: canary, dev, beta and stable.
336 The last three channels support image auto-updates, checks
337 that release image channel is one of them.
338 """
bowgotsai13820f42015-09-10 23:18:04 +0800339 return GetGooftool(options).VerifyReleaseChannel(
340 options.enforced_release_channels)
bowgotsai529139c2015-05-30 01:39:49 +0800341
342
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800343@Command('write_protect')
Peter Shihfdf17682017-05-26 11:38:39 +0800344def EnableFwWp(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800345 """Enable then verify firmware write protection."""
Peter Shihfdf17682017-05-26 11:38:39 +0800346 del options # Unused.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800347
Yong Hongdad230a2017-08-30 22:25:19 +0800348 def WriteProtect(fw):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800349 """Calculate protection size, then invoke flashrom.
350
Yong Hongdad230a2017-08-30 22:25:19 +0800351 The region (offset and size) to write protect may be different per chipset
352 and firmware layout, so we have to read the WP_RO section from FMAP to
353 decide that.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800354 """
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800355 wp_section = 'WP_RO'
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800356
Yong Hongdad230a2017-08-30 22:25:19 +0800357 fmap_image = fw.GetFirmwareImage(
358 sections=(['FMAP'] if fw.target == crosfw.TARGET_MAIN else None))
359 if not fmap_image.has_section(wp_section):
360 raise Error('Could not find %s firmware section: %s' %
361 (fw.target.upper(), wp_section))
362
363 section_data = fw.GetFirmwareImage(
364 sections=[wp_section]).get_section_area(wp_section)
365 ro_offset, ro_size = section_data[0 : 2]
366
367 logging.debug('write protecting %s [off=%x size=%x]', fw.target.upper(),
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800368 ro_offset, ro_size)
Yong Hongdad230a2017-08-30 22:25:19 +0800369 crosfw.Flashrom(fw.target).EnableWriteProtection(ro_offset, ro_size)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800370
Yong Hongdad230a2017-08-30 22:25:19 +0800371 WriteProtect(crosfw.LoadMainFirmware())
Andy Cheng0465d132013-03-20 12:12:06 +0800372 event_log.Log('wp', fw='main')
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800373
374 # Some EC (mostly PD) does not support "RO NOW". Instead they will only set
375 # "RO_AT_BOOT" when you request to enable RO (These platforms consider
376 # --wp-range with right range identical to --wp-enable), and requires a
377 # 'ectool reboot_ec RO at-shutdown; reboot' to let the RO take effect.
Hung-Te Lin0d10b562016-12-28 10:58:07 +0800378 # After reboot, "flashrom -p host --wp-status" will return protected range.
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800379 # If you don't reboot, returned range will be (0, 0), and running command
380 # "ectool flashprotect" will not have RO_NOW.
381
Yong Hongdad230a2017-08-30 22:25:19 +0800382 for fw in [crosfw.LoadEcFirmware(), crosfw.LoadPDFirmware()]:
383 if fw.GetChipId() is None:
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800384 logging.warning('%s not write protected (seems there is no %s flash).',
Yong Hongdad230a2017-08-30 22:25:19 +0800385 fw.target.upper(), fw.target.upper())
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800386 continue
Yong Hongdad230a2017-08-30 22:25:19 +0800387 WriteProtect(fw)
388 event_log.Log('wp', fw=fw.target)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800389
390
391@Command('clear_gbb_flags')
Peter Shihfdf17682017-05-26 11:38:39 +0800392def ClearGBBFlags(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800393 """Zero out the GBB flags, in preparation for transition to release state.
394
395 No GBB flags are set in release/shipping state, but they are useful
Hung-Te Lin879cff42017-06-19 12:46:37 +0800396 for factory/development. See "futility gbb --flags" for details.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800397 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800398
Ricky Lianga70a1202013-03-15 15:03:17 +0800399 GetGooftool(options).ClearGBBFlags()
Andy Cheng0465d132013-03-20 12:12:06 +0800400 event_log.Log('clear_gbb_flags')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800401
402
Jon Salzaa3a30e2013-05-15 15:56:28 +0800403@Command('clear_factory_vpd_entries')
Peter Shihfdf17682017-05-26 11:38:39 +0800404def ClearFactoryVPDEntries(options):
Jon Salzaa3a30e2013-05-15 15:56:28 +0800405 """Clears factory.* items in the RW VPD."""
406 entries = GetGooftool(options).ClearFactoryVPDEntries()
407 event_log.Log('clear_factory_vpd_entries', entries=FilterDict(entries))
408
409
Mattias Nisslercca761b2015-04-15 21:53:04 +0200410@Command('generate_stable_device_secret')
Peter Shihfdf17682017-05-26 11:38:39 +0800411def GenerateStableDeviceSecret(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800412 """Generates a fresh stable device secret and stores it in the RO VPD."""
Mattias Nisslercca761b2015-04-15 21:53:04 +0200413 GetGooftool(options).GenerateStableDeviceSecret()
414 event_log.Log('generate_stable_device_secret')
415
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800416
Shen-En Shihd078a7c2017-08-04 13:33:49 +0800417@Command('cr50_set_board_id')
418def Cr50SetBoardId(options):
419 """Set the board id and flag in the Cr50 chip."""
420 GetGooftool(options).Cr50SetBoardId()
421 event_log.Log('cr50_set_board_id')
422
423
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800424@Command('cr50_reset_state')
425def Cr50ResetState(options):
426 """Reset Cr50 state back to default state after RMA."""
427 return GetGooftool(options).Cr50ResetState()
428
429
Earl Ou564a7872016-10-05 10:22:00 +0800430@Command('enable_release_partition',
431 CmdArg('--release_rootfs',
432 help=('path to the release rootfs device. If not specified, '
433 'the default (5th) partition will be used.')))
434def EnableReleasePartition(options):
435 """Enables a release image partition on the disk."""
436 GetGooftool(options).EnableReleasePartition(options.release_rootfs)
437
438
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800439@Command('wipe_in_place',
440 CmdArg('--fast', action='store_true',
Shun-Hsing Ou8d3c40a2015-10-08 18:16:08 +0800441 help='use non-secure but faster wipe method.'),
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800442 _shopfloor_url_args_cmd_arg,
443 _station_ip_cmd_arg,
444 _station_port_cmd_arg,
445 _wipe_finish_token_cmd_arg)
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800446def WipeInPlace(options):
447 """Start factory wipe directly without reboot."""
448
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800449 GetGooftool(options).WipeInPlace(options.fast,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800450 options.shopfloor_url,
451 options.station_ip,
452 options.station_port,
453 options.wipe_finish_token)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200454
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800455@Command('wipe_init',
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800456 CmdArg('--wipe_args', help='arguments for clobber-state'),
457 CmdArg('--state_dev', help='path to stateful partition device'),
458 CmdArg('--root_disk', help='path to primary device'),
459 CmdArg('--old_root', help='path to old root'),
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800460 _shopfloor_url_args_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800461 _release_rootfs_cmd_arg,
462 _station_ip_cmd_arg,
463 _station_port_cmd_arg,
464 _wipe_finish_token_cmd_arg)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800465def WipeInit(options):
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800466 GetGooftool(options).WipeInit(options.wipe_args,
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800467 options.shopfloor_url,
468 options.state_dev,
469 options.release_rootfs,
470 options.root_disk,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800471 options.old_root,
472 options.station_ip,
473 options.station_port,
474 options.wipe_finish_token)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800475
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800476@Command('verify',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800477 CmdArg('--no_write_protect', action='store_true',
478 help='Do not check write protection switch state.'),
Tammo Spalink95c43732012-07-25 15:57:14 -0700479 _hwid_status_list_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800480 _hwdb_path_cmd_arg,
Yong Hong5408f652017-07-11 19:20:25 +0800481 _project_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800482 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800483 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800484 _hwid_run_vpd_cmd_arg,
485 _hwid_vpd_data_file_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800486 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800487 _cros_core_cmd_arg,
Yilun Lin599833f2017-12-22 14:07:46 +0800488 _chromebox_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800489 _ec_pubkey_path_cmd_arg,
490 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800491 _release_rootfs_cmd_arg,
492 _firmware_path_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800493 _enforced_release_channels_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800494 _waive_list_cmd_arg,
495 _skip_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800496def Verify(options):
497 """Verifies if whole factory process is ready for finalization.
498
499 This routine performs all the necessary checks to make sure the
500 device is ready to be finalized, but does not modify state. These
501 checks include dev switch, firmware write protection switch, hwid,
502 system time, keys, and root file system.
503 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800504
Hung-Te Lin6d827542012-07-19 11:50:41 +0800505 if not options.no_write_protect:
Ricky Lianga70a1202013-03-15 15:03:17 +0800506 VerifyWPSwitch(options)
Hung-Te Lindd708d42014-07-11 17:05:01 +0800507 VerifyManagementEngineLocked(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800508 VerifyDevSwitch(options)
Ting Shen129fa6f2016-09-02 12:22:24 +0800509 VerifyHWID(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800510 VerifySystemTime(options)
Yilun Lin599833f2017-12-22 14:07:46 +0800511 if options.chromebox:
512 VerifyECKey(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800513 VerifyKeys(options)
514 VerifyRootFs(options)
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800515 VerifyTPM(options)
Hung-Te Lin53c49402017-07-26 13:10:58 +0800516 VerifyVPD(options)
bowgotsai529139c2015-05-30 01:39:49 +0800517 VerifyReleaseChannel(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800518
Hung-Te Lin56b18402015-01-16 14:52:30 +0800519
Jon Salzfe9036f2014-01-16 14:11:23 +0800520@Command('untar_stateful_files')
Hung-Te Lin388bce22014-06-03 19:56:40 +0800521def UntarStatefulFiles(unused_options):
Jon Salzfe9036f2014-01-16 14:11:23 +0800522 """Untars stateful files from stateful_files.tar.xz on stateful partition.
523
524 If that file does not exist (which should only be R30 and earlier),
525 this is a no-op.
526 """
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800527 # Path to stateful partition on device.
528 device_stateful_path = '/mnt/stateful_partition'
529 tar_file = os.path.join(device_stateful_path, 'stateful_files.tar.xz')
Jon Salzfe9036f2014-01-16 14:11:23 +0800530 if os.path.exists(tar_file):
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800531 Spawn(['tar', 'xf', tar_file], cwd=device_stateful_path,
Jon Salzfe9036f2014-01-16 14:11:23 +0800532 log=True, check_call=True)
533 else:
534 logging.warning('No stateful files at %s', tar_file)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800535
Jon Salz40b9f822014-07-25 16:39:55 +0800536
537@Command('log_source_hashes')
Peter Shihfdf17682017-05-26 11:38:39 +0800538def LogSourceHashes(options):
Jon Salz40b9f822014-07-25 16:39:55 +0800539 """Logs hashes of source files in the factory toolkit."""
Peter Shihfdf17682017-05-26 11:38:39 +0800540 del options # Unused.
Jon Salze60307f2014-08-05 16:20:00 +0800541 # WARNING: The following line is necessary to validate the integrity
542 # of the factory software. Do not remove or modify it.
543 #
544 # 警告:此行会验证工厂软件的完整性,禁止删除或修改。
Wei-Han Chena5c01a02016-04-23 19:27:19 +0800545 factory_par = sys_utils.GetRunningFactoryPythonArchivePath()
546 if factory_par:
547 event_log.Log(
548 'source_hashes',
549 **file_utils.HashPythonArchive(factory_par))
550 else:
551 event_log.Log(
552 'source_hashes',
Peter Shihad166772017-05-31 11:36:17 +0800553 **file_utils.HashSourceTree(os.path.join(paths.FACTORY_DIR, 'py')))
Jon Salz40b9f822014-07-25 16:39:55 +0800554
555
Tammo Spalink86a61c62012-05-25 15:10:35 +0800556@Command('log_system_details')
Peter Shihfdf17682017-05-26 11:38:39 +0800557def LogSystemDetails(options):
Tammo Spalink86a61c62012-05-25 15:10:35 +0800558 """Write miscellaneous system details to the event log."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800559
Ricky Liang43b879b2014-02-24 11:36:55 +0800560 event_log.Log('system_details', **GetGooftool(options).GetSystemDetails())
Tammo Spalink86a61c62012-05-25 15:10:35 +0800561
562
Jon Salza88b83b2013-05-27 20:00:35 +0800563def CreateReportArchiveBlob(*args, **kwargs):
564 """Creates a report archive and returns it as a blob.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800565
Jon Salza88b83b2013-05-27 20:00:35 +0800566 Args:
567 See CreateReportArchive.
Andy Cheng7a76cb82012-11-19 18:08:19 +0800568
Jon Salza88b83b2013-05-27 20:00:35 +0800569 Returns:
570 An xmlrpclib.Binary object containing a .tar.xz file.
571 """
Wei-Han Chen47416612016-09-14 17:41:52 +0800572 report_archive = CreateReportArchive(*args, **kwargs)
573 try:
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800574 return xmlrpclib.Binary(file_utils.ReadFile(report_archive))
Wei-Han Chen47416612016-09-14 17:41:52 +0800575 finally:
576 os.unlink(report_archive)
Jon Salza88b83b2013-05-27 20:00:35 +0800577
578
579def CreateReportArchive(device_sn=None, add_file=None):
580 """Creates a report archive in a temporary directory.
581
582 Args:
583 device_sn: The device serial number (optional).
584 add_file: A list of files to add (optional).
585
586 Returns:
587 Path to the archive.
588 """
Hung-Te Lin6bd16472012-06-20 16:26:47 +0800589 def NormalizeAsFileName(token):
590 return re.sub(r'\W+', '', token).strip()
Jon Salza88b83b2013-05-27 20:00:35 +0800591
592 target_name = '%s%s.tar.xz' % (
593 time.strftime('%Y%m%dT%H%M%SZ',
594 time.gmtime()),
Hung-Te Lin56b18402015-01-16 14:52:30 +0800595 ('' if device_sn is None else
596 '_' + NormalizeAsFileName(device_sn)))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800597 target_path = os.path.join(gettempdir(), target_name)
Jon Salza88b83b2013-05-27 20:00:35 +0800598
Tammo Spalink86a61c62012-05-25 15:10:35 +0800599 # Intentionally ignoring dotfiles in EVENT_LOG_DIR.
Andy Cheng0465d132013-03-20 12:12:06 +0800600 tar_cmd = 'cd %s ; tar cJf %s *' % (event_log.EVENT_LOG_DIR, target_path)
Peter Shihb4e49352017-05-25 17:35:11 +0800601 tar_cmd += ' %s' % paths.FACTORY_LOG_PATH
Jon Salza88b83b2013-05-27 20:00:35 +0800602 if add_file:
603 for f in add_file:
Jon Salz65266432012-07-30 19:02:49 +0800604 # Require absolute paths since the tar command may change the
605 # directory.
606 if not f.startswith('/'):
607 raise Error('Not an absolute path: %s' % f)
608 if not os.path.exists(f):
609 raise Error('File does not exist: %s' % f)
Wei-Han Chen4b755022017-01-04 10:51:52 +0800610 tar_cmd += ' %s' % pipes.quote(f)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800611 cmd_result = Shell(tar_cmd)
Jon Salzff88c022012-11-03 12:19:58 +0800612
613 if ((cmd_result.status == 1) and
614 all((x == '' or
615 'file changed as we read it' in x or
616 "Removing leading `/' from member names" in x)
617 for x in cmd_result.stderr.split('\n'))):
618 # That's OK. Make sure it's valid though.
Vic Yang85199e72013-01-28 14:33:11 +0800619 Spawn(['tar', 'tfJ', target_path], check_call=True, log=True,
Jon Salzff88c022012-11-03 12:19:58 +0800620 ignore_stdout=True)
621 elif not cmd_result.success:
Tammo Spalink86a61c62012-05-25 15:10:35 +0800622 raise Error('unable to tar event logs, cmd %r failed, stderr: %r' %
623 (tar_cmd, cmd_result.stderr))
Jon Salzff88c022012-11-03 12:19:58 +0800624
Jon Salza88b83b2013-05-27 20:00:35 +0800625 return target_path
626
627_upload_method_cmd_arg = CmdArg(
628 '--upload_method', metavar='METHOD:PARAM',
629 help=('How to perform the upload. METHOD should be one of '
630 '{ftp, shopfloor, ftps, cpfe}.'))
631_add_file_cmd_arg = CmdArg(
632 '--add_file', metavar='FILE', action='append',
633 help='Extra file to include in report (must be an absolute path)')
634
Hung-Te Lin56b18402015-01-16 14:52:30 +0800635
Jon Salza88b83b2013-05-27 20:00:35 +0800636@Command('upload_report',
637 _upload_method_cmd_arg,
638 _add_file_cmd_arg)
639def UploadReport(options):
640 """Create a report containing key device details."""
Yong Hong863d3262017-10-30 16:23:34 +0800641 ro_vpd = sys_utils.VPDTool().GetAllData(
642 partition=sys_utils.VPDTool.RO_PARTITION)
Jon Salza88b83b2013-05-27 20:00:35 +0800643 device_sn = ro_vpd.get('serial_number', None)
644 if device_sn is None:
645 logging.warning('RO_VPD missing device serial number')
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +0800646 device_sn = 'MISSING_SN_' + time_utils.TimedUUID()
Jon Salza88b83b2013-05-27 20:00:35 +0800647 target_path = CreateReportArchive(device_sn)
648
Tammo Spalink86a61c62012-05-25 15:10:35 +0800649 if options.upload_method is None or options.upload_method == 'none':
650 logging.warning('REPORT UPLOAD SKIPPED (report left at %s)', target_path)
651 return
652 method, param = options.upload_method.split(':', 1)
653 if method == 'shopfloor':
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800654 report_upload.ShopFloorUpload(
655 target_path, param,
656 'GRT' if options.command_name == 'finalize' else None)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800657 elif method == 'ftp':
Jay Kim360c1dd2012-06-25 10:58:11 -0700658 report_upload.FtpUpload(target_path, 'ftp:' + param)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800659 elif method == 'ftps':
660 report_upload.CurlUrlUpload(target_path, '--ftp-ssl-reqd ftp:%s' % param)
661 elif method == 'cpfe':
Shawn Nematbakhsh3404a092013-01-28 16:49:09 -0800662 report_upload.CpfeUpload(target_path, pipes.quote(param))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800663 else:
664 raise Error('unknown report upload method %r', method)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800665
666
667@Command('finalize',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800668 CmdArg('--no_write_protect', action='store_true',
669 help='Do not enable firmware write protection.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800670 CmdArg('--fast', action='store_true',
671 help='use non-secure but faster wipe method.'),
Shun-Hsing Oudb407d62015-11-11 11:03:59 +0800672 _shopfloor_url_args_cmd_arg,
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800673 _hwdb_path_cmd_arg,
Tammo Spalink95c43732012-07-25 15:57:14 -0700674 _hwid_status_list_cmd_arg,
Jon Salz65266432012-07-30 19:02:49 +0800675 _upload_method_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800676 _add_file_cmd_arg,
677 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800678 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800679 _hwid_run_vpd_cmd_arg,
680 _hwid_vpd_data_file_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800681 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800682 _cros_core_cmd_arg,
Yilun Lin599833f2017-12-22 14:07:46 +0800683 _chromebox_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800684 _ec_pubkey_path_cmd_arg,
685 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800686 _release_rootfs_cmd_arg,
687 _firmware_path_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800688 _enforced_release_channels_cmd_arg,
689 _station_ip_cmd_arg,
690 _station_port_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800691 _wipe_finish_token_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800692 _waive_list_cmd_arg,
693 _skip_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800694def Finalize(options):
695 """Verify system readiness and trigger transition into release state.
696
Jon Salzaa3a30e2013-05-15 15:56:28 +0800697 This routine does the following:
698 - Verifies system state (see verify command)
Jon Salzfe9036f2014-01-16 14:11:23 +0800699 - Untars stateful_files.tar.xz, if it exists, in the stateful partition, to
700 initialize files such as the CRX cache
Jon Salzaa3a30e2013-05-15 15:56:28 +0800701 - Modifies firmware bitmaps to match locale
702 - Clears all factory-friendly flags from the GBB
703 - Removes factory-specific entries from RW_VPD (factory.*)
704 - Enables firmware write protection (cannot rollback after this)
705 - Uploads system logs & reports
Earl Ou51182222016-09-09 12:16:48 +0800706 - Wipes the testing kernel, rootfs, and stateful partition
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800707 """
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800708 Verify(options)
Shen-En Shih3e079b22017-09-11 05:43:09 -0700709 Cr50SetBoardId(options)
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800710 Cr50ResetState(options)
Jon Salz40b9f822014-07-25 16:39:55 +0800711 LogSourceHashes(options)
Jon Salzfe9036f2014-01-16 14:11:23 +0800712 UntarStatefulFiles(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800713 if options.cros_core:
714 logging.info('SetFirmwareBitmapLocale is skipped for ChromeOS Core device.')
715 else:
716 SetFirmwareBitmapLocale(options)
Jon Salzaa3a30e2013-05-15 15:56:28 +0800717 ClearFactoryVPDEntries(options)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200718 GenerateStableDeviceSecret(options)
Shen-En Shih3e079b22017-09-11 05:43:09 -0700719 ClearGBBFlags(options)
Hung-Te Lin6d827542012-07-19 11:50:41 +0800720 if options.no_write_protect:
721 logging.warn('WARNING: Firmware Write Protection is SKIPPED.')
Andy Cheng0465d132013-03-20 12:12:06 +0800722 event_log.Log('wp', fw='both', status='skipped')
Hung-Te Lin6d827542012-07-19 11:50:41 +0800723 else:
Wei-Han Chenba21f512016-10-14 18:52:33 +0800724 EnableFwWp(options)
Jon Salza0f58e02012-05-29 19:33:39 +0800725 LogSystemDetails(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800726 UploadReport(options)
Earl Ou51182222016-09-09 12:16:48 +0800727
728 event_log.Log('wipe_in_place')
729 wipe_args = []
Earl Ou51182222016-09-09 12:16:48 +0800730 if options.shopfloor_url:
731 wipe_args += ['--shopfloor_url', options.shopfloor_url]
732 if options.fast:
733 wipe_args += ['--fast']
734 if options.station_ip:
735 wipe_args += ['--station_ip', options.station_ip]
736 if options.station_port:
737 wipe_args += ['--station_port', options.station_port]
738 if options.wipe_finish_token:
739 wipe_args += ['--wipe_finish_token', options.wipe_finish_token]
740 ExecFactoryPar('gooftool', 'wipe_in_place', *wipe_args)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800741
742
Ting Shen129fa6f2016-09-02 12:22:24 +0800743@Command('verify_hwid',
744 _probe_results_cmd_arg,
745 _hwdb_path_cmd_arg,
746 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800747 _hwid_run_vpd_cmd_arg,
748 _hwid_vpd_data_file_cmd_arg,
Ting Shen129fa6f2016-09-02 12:22:24 +0800749 _rma_mode_cmd_arg)
750def VerifyHWID(options):
Ricky Liangc662be32013-12-24 11:50:23 +0800751 """A simple wrapper that calls out to HWID utils to verify version 3 HWID.
Ricky Liang53390232013-03-08 15:37:57 +0800752
Ricky Liangc662be32013-12-24 11:50:23 +0800753 This is mainly for Gooftool to verify v3 HWID during finalize. For testing
754 and development purposes, please use `hwid` command.
Ricky Liang53390232013-03-08 15:37:57 +0800755 """
Ricky Liangc662be32013-12-24 11:50:23 +0800756 db = GetGooftool(options).db
Yong Hongc3765412017-12-26 23:12:15 +0800757 encoded_string = options.hwid or GetGooftool(options).ReadHWID()
Ricky Liang7905f272013-03-16 01:57:10 +0800758 if options.probe_results:
Yong Hongf008bd72017-12-22 04:46:27 +0800759 probed_results = hwid_utils.GetProbedResults(infile=options.probe_results)
Ricky Liang7905f272013-03-16 01:57:10 +0800760 else:
Yong Hong863d3262017-10-30 16:23:34 +0800761 probed_results = GetGooftool(options).Probe()
Yong Hong68a0e0d2017-12-20 19:06:54 +0800762
763 vpd = hwid_utils.GetVPDData(options.hwid_run_vpd, options.hwid_vpd_data_file)
Ricky Liang53390232013-03-08 15:37:57 +0800764
Hung-Te Lin11052952015-03-18 13:48:59 +0800765 event_log.Log('probed_results', probed_results=FilterDict(probed_results))
Yong Hong68a0e0d2017-12-20 19:06:54 +0800766 event_log.Log('vpd', vpd=FilterDict(vpd) if vpd is None else None)
Ricky Liang53390232013-03-08 15:37:57 +0800767
Yong Hong3a75e0e2017-12-26 22:12:12 +0800768 bom = hwid_utils.GenerateBOMFromProbedResults(db, probed_results)
769
770 hwid_utils.VerifyHWID(db, encoded_string, bom, vpd=vpd,
Hung-Te Lin56b18402015-01-16 14:52:30 +0800771 rma_mode=options.rma_mode)
Ricky Liang53390232013-03-08 15:37:57 +0800772
Ricky Liangc662be32013-12-24 11:50:23 +0800773 event_log.Log('verified_hwid', hwid=encoded_string)
Ricky Liang53390232013-03-08 15:37:57 +0800774
775
henryhsu44d793a2013-07-20 00:07:38 +0800776@Command('get_firmware_hash',
777 CmdArg('--file', metavar='FILE', help='Firmware File.'))
778def GetFirmwareHash(options):
henryhsuf6f835c2013-07-20 20:49:25 +0800779 """Get firmware hash from a file"""
henryhsu44d793a2013-07-20 00:07:38 +0800780 if os.path.exists(options.file):
Yong Hong863d3262017-10-30 16:23:34 +0800781 hashes = chromeos_firmware.CalculateFirmwareHashes(options.file)
henryhsu44d793a2013-07-20 00:07:38 +0800782 for section, value_dict in hashes.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800783 print '%s:' % section
henryhsu44d793a2013-07-20 00:07:38 +0800784 for key, value in value_dict.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800785 print ' %s: %s' % (key, value)
henryhsu44d793a2013-07-20 00:07:38 +0800786 else:
787 raise Error('File does not exist: %s' % options.file)
788
henryhsuf6f835c2013-07-20 20:49:25 +0800789
Peter Shihfdf17682017-05-26 11:38:39 +0800790def main():
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800791 """Run sub-command specified by the command line args."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800792
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800793 options = ParseCmdline(
Ting Shen129fa6f2016-09-02 12:22:24 +0800794 'Perform Google required factory tests.',
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800795 CmdArg('-l', '--log', metavar='PATH',
796 help='Write logs to this file.'),
Jon Salza4bea382012-10-29 13:00:34 +0800797 CmdArg('--suppress-event-logs', action='store_true',
798 help='Suppress event logging.'),
Wei-Han Chenaff56232016-04-16 09:17:59 +0800799 CmdArg('--phase', default=None,
800 help=('override phase for phase checking (defaults to the current '
801 'as returned by the "factory phase" command)')),
Tammo Spalink8fab5312012-05-28 18:33:30 +0800802 verbosity_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800803 SetupLogging(options.verbosity, options.log)
Andy Cheng0465d132013-03-20 12:12:06 +0800804 event_log.SetGlobalLoggerDefaultPrefix('gooftool')
805 event_log.GetGlobalLogger().suppress = options.suppress_event_logs
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800806 logging.debug('gooftool options: %s', repr(options))
Wei-Han Chenaff56232016-04-16 09:17:59 +0800807
808 phase.OverridePhase(options.phase)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800809 try:
810 logging.debug('GOOFTOOL command %r', options.command_name)
811 options.command(options)
812 logging.info('GOOFTOOL command %r SUCCESS', options.command_name)
813 except Error, e:
814 logging.exception(e)
815 sys.exit('GOOFTOOL command %r ERROR: %s' % (options.command_name, e))
816 except Exception, e:
817 logging.exception(e)
818 sys.exit('UNCAUGHT RUNTIME EXCEPTION %s' % e)
819
820
821if __name__ == '__main__':
Peter Shihfdf17682017-05-26 11:38:39 +0800822 main()