blob: 0e0e564da741b96fa2ad1e77da4bcd4a3d9dc124 [file] [log] [blame]
Mike Frysinger63bb3c72019-09-01 15:16:26 -04001#!/usr/bin/env python2
Jon Salze60307f2014-08-05 16:20:00 +08002# -*- coding: utf-8 -*-
3# Copyright 2014 The Chromium OS Authors. All rights reserved.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08004# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
Jon Salze60307f2014-08-05 16:20:00 +08007
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08008"""Google Factory Tool.
9
You-Cheng Syu461ec032017-03-06 15:56:58 +080010This tool is intended to be used on factory assembly lines. It
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080011provides all of the Google required test functionality and must be run
12on each device as part of the assembly process.
13"""
14
Yilin Yang71e39412019-09-24 09:26:46 +080015from __future__ import print_function
16
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080017import logging
18import os
Jon Salz65266432012-07-30 19:02:49 +080019import pipes
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080020import re
21import sys
Peter Shihfdf17682017-05-26 11:38:39 +080022from tempfile import gettempdir
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080023import threading
Hung-Te Lin6bd16472012-06-20 16:26:47 +080024import time
Jon Salza88b83b2013-05-27 20:00:35 +080025import xmlrpclib
Peter Shihfdf17682017-05-26 11:38:39 +080026
Yilin Yangea784662019-09-26 13:51:03 +080027from six import iteritems
28
Peter Shihfdf17682017-05-26 11:38:39 +080029import factory_common # pylint: disable=unused-import
Wei-Han Chen0a3320e2016-04-23 01:32:07 +080030from cros.factory.gooftool.common import ExecFactoryPar
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080031from cros.factory.gooftool.common import Shell
Peter Shihfdf17682017-05-26 11:38:39 +080032from cros.factory.gooftool.core import Gooftool
33from cros.factory.gooftool import crosfw
Peter Shihfdf17682017-05-26 11:38:39 +080034from cros.factory.gooftool import report_upload
Yong Hong65bda312018-12-13 20:05:58 +080035from cros.factory.gooftool import vpd
Hung-Te Lin604e0c22015-11-24 15:17:07 +080036from cros.factory.hwid.v3 import hwid_utils
Yong Hong863d3262017-10-30 16:23:34 +080037from cros.factory.probe.functions import chromeos_firmware
Wei-Han Chen2ebb92d2016-01-12 14:51:41 +080038from cros.factory.test.env import paths
Peter Shihfdf17682017-05-26 11:38:39 +080039from cros.factory.test import event_log
Wei-Han Chenaff56232016-04-16 09:17:59 +080040from cros.factory.test.rules import phase
Hung-Te Lin3f096842016-01-13 17:37:06 +080041from cros.factory.test.rules.privacy import FilterDict
Philip Chen6ada02c2019-11-04 19:41:54 +000042from cros.factory.test import state
Peter Shihfdf17682017-05-26 11:38:39 +080043from cros.factory.utils import argparse_utils
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080044from cros.factory.utils.argparse_utils import CmdArg
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080045from cros.factory.utils.argparse_utils import ParseCmdline
Wei-Han Chenb34bdff2019-09-26 13:07:50 +080046from cros.factory.utils.argparse_utils import VERBOSITY_CMD_ARG
Peter Shihfdf17682017-05-26 11:38:39 +080047from cros.factory.utils.debug_utils import SetupLogging
Jon Salz40b9f822014-07-25 16:39:55 +080048from cros.factory.utils import file_utils
Peter Shih67c7c0f2018-02-26 11:23:59 +080049from cros.factory.utils.process_utils import Spawn
Wei-Han Chena5c01a02016-04-23 19:27:19 +080050from cros.factory.utils import sys_utils
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +080051from cros.factory.utils import time_utils
Joel Kitchingd3bc2662014-12-16 16:03:32 -080052from cros.factory.utils.type_utils import Error
Tammo Spalink86a61c62012-05-25 15:10:35 +080053
Tammo Spalink5c699832012-07-03 17:50:39 +080054
Tammo Spalink5c699832012-07-03 17:50:39 +080055# TODO(tammo): Replace calls to sys.exit with raise Exit, and maybe
56# treat that specially (as a smoot exit, as opposed to the more
57# verbose output for generic Error).
58
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080059_global_gooftool = None
60_gooftool_lock = threading.Lock()
Philip Chen04fb90b2019-11-06 12:10:33 -080061_has_fpmcu = None
Tammo Spalink5c699832012-07-03 17:50:39 +080062
Hung-Te Lin56b18402015-01-16 14:52:30 +080063
Ricky Lianga70a1202013-03-15 15:03:17 +080064def GetGooftool(options):
Peter Shihfdf17682017-05-26 11:38:39 +080065 global _global_gooftool # pylint: disable=global-statement
Ricky Lianga70a1202013-03-15 15:03:17 +080066
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080067 if _global_gooftool is None:
68 with _gooftool_lock:
Shen-En Shihc5d15d62017-08-04 13:02:59 +080069 if _global_gooftool is None:
70 project = getattr(options, 'project', None)
71 hwdb_path = getattr(options, 'hwdb_path', None)
72 _global_gooftool = Gooftool(hwid_version=3, project=project,
73 hwdb_path=hwdb_path)
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080074
75 return _global_gooftool
Ricky Lianga70a1202013-03-15 15:03:17 +080076
Philip Chen04fb90b2019-11-06 12:10:33 -080077def HasFpmcu():
78 global _has_fpmcu # pylint: disable=global-statement
79
80 if _has_fpmcu is None:
81 FPMCU_PATH = '/dev/cros_fp'
82 has_fpmcu_path = os.path.exists(FPMCU_PATH)
83 has_cros_config_fpmcu = False
Philip Chencf6642b2019-12-02 19:38:59 -080084 cros_config_output = Shell(['cros_config', '/fingerprint', 'board'])
85 if cros_config_output.success and cros_config_output.stdout:
Philip Chen04fb90b2019-11-06 12:10:33 -080086 has_cros_config_fpmcu = True
87
88 if has_fpmcu_path is False and has_cros_config_fpmcu is True:
89 raise Error('FPMCU found in cros_config but missing in %s.' % FPMCU_PATH)
90 elif has_fpmcu_path is True and has_cros_config_fpmcu is False:
91 raise Error('FPMCU found in %s but missing in cros_config.' % FPMCU_PATH)
92
93 _has_fpmcu = has_fpmcu_path
94
95 return _has_fpmcu
Hung-Te Lin56b18402015-01-16 14:52:30 +080096
Ting Shen18a06382016-08-30 16:18:21 +080097def Command(cmd_name, *args, **kwargs):
You-Cheng Syu8fc2a602017-12-22 17:05:05 +080098 """Decorator for commands in gooftool.
Ting Shen18a06382016-08-30 16:18:21 +080099
100 This is similar to argparse_utils.Command, but all gooftool commands
101 can be waived during `gooftool finalize` or `gooftool verify` using
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800102 --waive_list or --skip_list option.
Ting Shen18a06382016-08-30 16:18:21 +0800103 """
104 def Decorate(fun):
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800105 def CommandWithWaiveSkipCheck(options):
Ting Shen18a06382016-08-30 16:18:21 +0800106 waive_list = vars(options).get('waive_list', [])
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800107 skip_list = vars(options).get('skip_list', [])
108 if phase.GetPhase() >= phase.PVT_DOGFOOD and (
109 waive_list != [] or skip_list != []):
Ting Shen18a06382016-08-30 16:18:21 +0800110 raise Error(
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800111 'waive_list and skip_list should be empty for phase %s' %
112 phase.GetPhase())
Ting Shen18a06382016-08-30 16:18:21 +0800113
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800114 if cmd_name not in skip_list:
115 try:
116 fun(options)
117 except Exception as e:
118 if cmd_name in waive_list:
119 logging.exception(e)
120 else:
121 raise
Ting Shen18a06382016-08-30 16:18:21 +0800122
123 return argparse_utils.Command(cmd_name, *args, **kwargs)(
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800124 CommandWithWaiveSkipCheck)
Ting Shen18a06382016-08-30 16:18:21 +0800125 return Decorate
126
127
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800128@Command('write_hwid',
129 CmdArg('hwid', metavar='HWID', help='HWID string'))
Andy Chengc92e6f92012-11-20 16:55:53 +0800130def WriteHWID(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800131 """Write specified HWID value into the system BB."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800132
Tammo Spalink95c43732012-07-25 15:57:14 -0700133 logging.info('writing hwid string %r', options.hwid)
Ricky Lianga70a1202013-03-15 15:03:17 +0800134 GetGooftool(options).WriteHWID(options.hwid)
Andy Cheng0465d132013-03-20 12:12:06 +0800135 event_log.Log('write_hwid', hwid=options.hwid)
Yilin Yang71e39412019-09-24 09:26:46 +0800136 print('Wrote HWID: %r' % options.hwid)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800137
138
Yong Hongc3765412017-12-26 23:12:15 +0800139@Command('read_hwid')
140def ReadHWID(options):
141 """Read the HWID string from GBB."""
142
143 logging.info('reading the hwid string')
Yilin Yang71e39412019-09-24 09:26:46 +0800144 print(GetGooftool(options).ReadHWID())
Yong Hongc3765412017-12-26 23:12:15 +0800145
146
Yong Hong5408f652017-07-11 19:20:25 +0800147_project_cmd_arg = CmdArg(
148 '--project', metavar='PROJECT',
149 default=None, help='Project name to test.')
Ricky Liang53390232013-03-08 15:37:57 +0800150
Tammo Spalink8fab5312012-05-28 18:33:30 +0800151_hwdb_path_cmd_arg = CmdArg(
152 '--hwdb_path', metavar='PATH',
Yong Hong5c6dcd52017-12-27 11:05:01 +0800153 default=hwid_utils.GetDefaultDataPath(),
Tammo Spalink8fab5312012-05-28 18:33:30 +0800154 help='Path to the HWID database.')
155
Tammo Spalink95c43732012-07-25 15:57:14 -0700156_hwid_status_list_cmd_arg = CmdArg(
Hung-Te Lin56b18402015-01-16 14:52:30 +0800157 '--status', nargs='*', default=['supported'],
158 help='allow only HWIDs with these status values')
Tammo Spalink95c43732012-07-25 15:57:14 -0700159
Jon Salzce124fb2012-10-02 17:42:03 +0800160_probe_results_cmd_arg = CmdArg(
Yong Hong55050c12018-02-27 18:19:47 +0800161 '--probe_results', metavar='RESULTS.json',
162 help=('Output from "hwid probe" (used instead of probing this system).'))
Jon Salzce124fb2012-10-02 17:42:03 +0800163
Ricky Liang53390232013-03-08 15:37:57 +0800164_device_info_cmd_arg = CmdArg(
Ricky Liangf89f73a2013-03-19 05:00:24 +0800165 '--device_info', metavar='DEVICE_INFO.yaml', default=None,
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800166 help='A dict of device info to use instead of fetching from shopfloor '
Ricky Liang53390232013-03-08 15:37:57 +0800167 'server.')
168
Jon Salzce124fb2012-10-02 17:42:03 +0800169_hwid_cmd_arg = CmdArg(
170 '--hwid', metavar='HWID',
Ricky Lianga70a1202013-03-15 15:03:17 +0800171 help='HWID to verify (instead of the currently set HWID of this system).')
Jon Salzce124fb2012-10-02 17:42:03 +0800172
Yong Hong68a0e0d2017-12-20 19:06:54 +0800173_hwid_run_vpd_cmd_arg = CmdArg(
174 '--hwid-run-vpd', action='store_true',
175 help=('Specify the hwid utility to obtain the vpd data by running the '
176 '`vpd` commandline tool.'))
177
178_hwid_vpd_data_file_cmd_arg = CmdArg(
179 '--hwid-vpd-data-file', metavar='FILE.json', type=str, default=None,
180 help=('Specify the hwid utility to obtain the vpd data from the specified '
181 'file.'))
182
Bernie Thompson3c11c872013-07-22 18:22:45 -0700183_rma_mode_cmd_arg = CmdArg(
184 '--rma_mode', action='store_true',
185 help='Enable RMA mode, do not check for deprecated components.')
Tammo Spalink95c43732012-07-25 15:57:14 -0700186
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800187_cros_core_cmd_arg = CmdArg(
188 '--cros_core', action='store_true',
189 help='Finalize for ChromeOS Core devices (may add or remove few test '
Hung-Te Lin53c49402017-07-26 13:10:58 +0800190 'items. For example, registration codes or firmware bitmap '
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800191 'locale settings).')
192
Yilun Lin599833f2017-12-22 14:07:46 +0800193_chromebox_cmd_arg = CmdArg(
194 '--chromebox', action='store_true', default=None,
195 help='Finalize for ChromeBox devices (may add or remove few test '
196 'items. For example, VerifyECKey).')
197
bowgotsai13820f42015-09-10 23:18:04 +0800198_enforced_release_channels_cmd_arg = CmdArg(
199 '--enforced_release_channels', nargs='*', default=None,
200 help='Enforced release image channels.')
201
Yilun Lin34f54802017-11-16 11:58:25 +0800202_ec_pubkey_path_cmd_arg = CmdArg(
203 '--ec_pubkey_path',
204 default=None,
205 help='Path to public key in vb2 format. Verify EC key with pubkey file.')
206
207_ec_pubkey_hash_cmd_arg = CmdArg(
208 '--ec_pubkey_hash',
209 default=None,
210 help='A string for public key hash. Verify EC key with the given hash.')
211
Hung-Te Lincdb96522016-04-15 16:51:10 +0800212_release_rootfs_cmd_arg = CmdArg(
213 '--release_rootfs', help='Location of release image rootfs partition.')
214
215_firmware_path_cmd_arg = CmdArg(
216 '--firmware_path', help='Location of firmware image partition.')
Ricky Liang43b879b2014-02-24 11:36:55 +0800217
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800218_shopfloor_url_args_cmd_arg = CmdArg(
219 '--shopfloor_url',
Earl Ou51182222016-09-09 12:16:48 +0800220 help='Shopfloor server url to be informed when wiping is done. '
221 'After wiping, a XML-RPC request will be sent to the '
222 'given url to indicate the completion of wiping.')
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800223
224_station_ip_cmd_arg = CmdArg(
225 '--station_ip',
226 help='IP of remote station')
227
228_station_port_cmd_arg = CmdArg(
229 '--station_port',
230 help='Port on remote station')
231
232_wipe_finish_token_cmd_arg = CmdArg(
233 '--wipe_finish_token',
234 help='Required token when notifying station after wipe finished')
235
Wei-Han Chenf3924112019-02-25 14:52:58 +0800236_keep_developer_mode_flag_after_clobber_state_cmd_arg = CmdArg(
237 # The argument name is super long because you should never use it by
238 # yourself when using command line tools.
239 '--keep_developer_mode_flag_after_clobber_state',
240 action='store_true', default=None,
241 help='After clobber-state, do not delete .developer_mode')
242
Ting Shen18a06382016-08-30 16:18:21 +0800243_waive_list_cmd_arg = CmdArg(
244 '--waive_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800245 help='A list of waived checks, separated by whitespace. '
246 'Each item should be a sub-command of gooftool. '
Ting Shen18a06382016-08-30 16:18:21 +0800247 'e.g. "gooftool verify --waive_list verify_tpm clear_gbb_flags".')
248
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800249_skip_list_cmd_arg = CmdArg(
250 '--skip_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800251 help='A list of skipped checks, separated by whitespace. '
252 'Each item should be a sub-command of gooftool. '
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800253 'e.g. "gooftool verify --skip_list verify_tpm clear_gbb_flags".')
254
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800255_test_umount_cmd_arg = CmdArg(
256 '--test_umount', action='store_true',
257 help='(For testing only) Only umount rootfs and stateful partition '
258 'instead of running full wiping and cutoff process.')
259
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800260_rlz_embargo_end_date_offset_cmd_arg = CmdArg(
Kevin Line4c64de2019-11-22 15:28:34 +0800261 '--embargo_offset', type=int, default=7, choices=list(range(7, 15)),
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800262 help='Change the offset of embargo end date, cannot less than 7 days or '
263 'more than 14 days.')
264
Marco Chena681b2e2018-08-31 11:41:41 +0800265_no_ectool_cmd_arg = CmdArg(
266 '--no_ectool', action='store_false', dest='has_ectool',
267 help='There is no ectool utility so tests rely on ectool should be '
268 'skipped.')
Tammo Spalink8fab5312012-05-28 18:33:30 +0800269
chuntsenaf1232f2019-03-20 15:45:54 +0800270_no_generate_mfg_date_cmd_arg = CmdArg(
271 '--no_generate_mfg_date', action='store_false', dest='generate_mfg_date',
272 help='Do not generate manufacturing date nor write mfg_date into VPD.')
273
274
Yilun Lin34f54802017-11-16 11:58:25 +0800275@Command(
276 'verify_ec_key',
277 _ec_pubkey_path_cmd_arg,
278 _ec_pubkey_hash_cmd_arg)
279def VerifyECKey(options):
280 """Verify EC key."""
281 return GetGooftool(options).VerifyECKey(
282 options.ec_pubkey_path, options.ec_pubkey_hash)
283
284
Hung-Te Line1d80f62016-03-31 14:58:13 +0800285@Command('verify_keys',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800286 _release_rootfs_cmd_arg,
287 _firmware_path_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800288def VerifyKeys(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800289 """Verify keys in firmware and SSD match."""
Hung-Te Line1d80f62016-03-31 14:58:13 +0800290 return GetGooftool(options).VerifyKeys(
Hung-Te Lincdb96522016-04-15 16:51:10 +0800291 options.release_rootfs, options.firmware_path)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800292
293
294@Command('set_fw_bitmap_locale')
Peter Shihfdf17682017-05-26 11:38:39 +0800295def SetFirmwareBitmapLocale(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800296 """Use VPD locale value to set firmware bitmap default language."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800297
Ricky Lianga70a1202013-03-15 15:03:17 +0800298 (index, locale) = GetGooftool(options).SetFirmwareBitmapLocale()
Andy Cheng2582d292012-12-04 17:38:28 +0800299 logging.info('Firmware bitmap initial locale set to %d (%s).',
300 index, locale)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800301
302
Hung-Te Line1d80f62016-03-31 14:58:13 +0800303@Command('verify_system_time',
Wei-Han Chen2790d2e2019-01-18 21:13:40 +0800304 _release_rootfs_cmd_arg,
305 _rma_mode_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800306def VerifySystemTime(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800307 """Verify system time is later than release filesystem creation time."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800308
Wei-Han Chen2790d2e2019-01-18 21:13:40 +0800309 return GetGooftool(options).VerifySystemTime(options.release_rootfs,
310 rma_mode=options.rma_mode)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800311
312
Hung-Te Line1d80f62016-03-31 14:58:13 +0800313@Command('verify_rootfs',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800314 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800315def VerifyRootFs(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800316 """Verify rootfs on SSD is valid by checking hash."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800317
Hung-Te Line1d80f62016-03-31 14:58:13 +0800318 return GetGooftool(options).VerifyRootFs(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800319
Hung-Te Lin56b18402015-01-16 14:52:30 +0800320
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800321@Command('verify_tpm')
Peter Shihfdf17682017-05-26 11:38:39 +0800322def VerifyTPM(options):
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800323 """Verify TPM is cleared."""
324
325 return GetGooftool(options).VerifyTPM()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800326
Hung-Te Lin56b18402015-01-16 14:52:30 +0800327
Hung-Te Lindd708d42014-07-11 17:05:01 +0800328@Command('verify_me_locked')
Peter Shihfdf17682017-05-26 11:38:39 +0800329def VerifyManagementEngineLocked(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800330 """Verify Management Engine is locked."""
Hung-Te Lindd708d42014-07-11 17:05:01 +0800331
332 return GetGooftool(options).VerifyManagementEngineLocked()
333
Hung-Te Lin56b18402015-01-16 14:52:30 +0800334
Marco Chena681b2e2018-08-31 11:41:41 +0800335@Command('verify_switch_wp',
336 _no_ectool_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800337def VerifyWPSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800338 """Verify hardware write protection switch is enabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800339
Marco Chena681b2e2018-08-31 11:41:41 +0800340 GetGooftool(options).VerifyWPSwitch(options.has_ectool)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800341
342
Hung-Te Lin53c49402017-07-26 13:10:58 +0800343@Command('verify_vpd')
344def VerifyVPD(options):
345 """Verify that VPD values are properly set.
Jon Salzadd90d32014-04-29 16:16:27 +0800346
Hung-Te Lin53c49402017-07-26 13:10:58 +0800347 Check if mandatory fields are set, and deprecated fields don't exist.
Jon Salzadd90d32014-04-29 16:16:27 +0800348 """
Hung-Te Lin53c49402017-07-26 13:10:58 +0800349 return GetGooftool(options).VerifyVPD()
Jon Salzadd90d32014-04-29 16:16:27 +0800350
351
bowgotsai13820f42015-09-10 23:18:04 +0800352@Command('verify_release_channel',
353 _enforced_release_channels_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800354def VerifyReleaseChannel(options):
bowgotsai529139c2015-05-30 01:39:49 +0800355 """Verify that release image channel is correct.
356
357 ChromeOS has four channels: canary, dev, beta and stable.
358 The last three channels support image auto-updates, checks
359 that release image channel is one of them.
360 """
bowgotsai13820f42015-09-10 23:18:04 +0800361 return GetGooftool(options).VerifyReleaseChannel(
362 options.enforced_release_channels)
bowgotsai529139c2015-05-30 01:39:49 +0800363
364
Wei-Han Chen0de7cfd2020-01-03 16:49:20 +0800365@Command('verify_cros_config')
366def VerifyCrosConfig(options):
367 """Verify entries in cros config make sense."""
368 return GetGooftool(options).VerifyCrosConfig()
369
370
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800371@Command('write_protect')
Peter Shihfdf17682017-05-26 11:38:39 +0800372def EnableFwWp(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800373 """Enable then verify firmware write protection."""
Peter Shihfdf17682017-05-26 11:38:39 +0800374 del options # Unused.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800375
Yong Hongdad230a2017-08-30 22:25:19 +0800376 def WriteProtect(fw):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800377 """Calculate protection size, then invoke flashrom.
378
Yong Hongdad230a2017-08-30 22:25:19 +0800379 The region (offset and size) to write protect may be different per chipset
380 and firmware layout, so we have to read the WP_RO section from FMAP to
381 decide that.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800382 """
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800383 wp_section = 'WP_RO'
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800384
Yong Hongdad230a2017-08-30 22:25:19 +0800385 fmap_image = fw.GetFirmwareImage(
386 sections=(['FMAP'] if fw.target == crosfw.TARGET_MAIN else None))
387 if not fmap_image.has_section(wp_section):
388 raise Error('Could not find %s firmware section: %s' %
389 (fw.target.upper(), wp_section))
390
391 section_data = fw.GetFirmwareImage(
392 sections=[wp_section]).get_section_area(wp_section)
Peter Shihe6afab32018-09-11 17:16:48 +0800393 ro_offset, ro_size = section_data[0:2]
Yong Hongdad230a2017-08-30 22:25:19 +0800394
395 logging.debug('write protecting %s [off=%x size=%x]', fw.target.upper(),
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800396 ro_offset, ro_size)
Yong Hongdad230a2017-08-30 22:25:19 +0800397 crosfw.Flashrom(fw.target).EnableWriteProtection(ro_offset, ro_size)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800398
Philip Chendbb06202019-11-05 17:24:26 -0800399 if HasFpmcu():
400 # TODO(b/143991572): Implement enable_fpmcu_write_protection in gooftool.
401 cmd = os.path.join(
402 paths.FACTORY_DIR, 'sh', 'enable_fpmcu_write_protection.sh')
403 cmd_result = Shell(cmd)
404 if not cmd_result.success:
405 raise Error(
406 'Failed to enable FPMCU write protection, stdout=%r, stderr=%r' %
407 (cmd_result.stdout, cmd_result.stderr))
408
Yong Hongdad230a2017-08-30 22:25:19 +0800409 WriteProtect(crosfw.LoadMainFirmware())
Andy Cheng0465d132013-03-20 12:12:06 +0800410 event_log.Log('wp', fw='main')
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800411
412 # Some EC (mostly PD) does not support "RO NOW". Instead they will only set
413 # "RO_AT_BOOT" when you request to enable RO (These platforms consider
414 # --wp-range with right range identical to --wp-enable), and requires a
415 # 'ectool reboot_ec RO at-shutdown; reboot' to let the RO take effect.
Hung-Te Lin0d10b562016-12-28 10:58:07 +0800416 # After reboot, "flashrom -p host --wp-status" will return protected range.
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800417 # If you don't reboot, returned range will be (0, 0), and running command
418 # "ectool flashprotect" will not have RO_NOW.
419
Yong Hongdad230a2017-08-30 22:25:19 +0800420 for fw in [crosfw.LoadEcFirmware(), crosfw.LoadPDFirmware()]:
421 if fw.GetChipId() is None:
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800422 logging.warning('%s not write protected (seems there is no %s flash).',
Yong Hongdad230a2017-08-30 22:25:19 +0800423 fw.target.upper(), fw.target.upper())
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800424 continue
Yong Hongdad230a2017-08-30 22:25:19 +0800425 WriteProtect(fw)
426 event_log.Log('wp', fw=fw.target)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800427
428
429@Command('clear_gbb_flags')
Peter Shihfdf17682017-05-26 11:38:39 +0800430def ClearGBBFlags(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800431 """Zero out the GBB flags, in preparation for transition to release state.
432
433 No GBB flags are set in release/shipping state, but they are useful
Hung-Te Lin879cff42017-06-19 12:46:37 +0800434 for factory/development. See "futility gbb --flags" for details.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800435 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800436
Ricky Lianga70a1202013-03-15 15:03:17 +0800437 GetGooftool(options).ClearGBBFlags()
Andy Cheng0465d132013-03-20 12:12:06 +0800438 event_log.Log('clear_gbb_flags')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800439
440
Jon Salzaa3a30e2013-05-15 15:56:28 +0800441@Command('clear_factory_vpd_entries')
Peter Shihfdf17682017-05-26 11:38:39 +0800442def ClearFactoryVPDEntries(options):
Jon Salzaa3a30e2013-05-15 15:56:28 +0800443 """Clears factory.* items in the RW VPD."""
444 entries = GetGooftool(options).ClearFactoryVPDEntries()
445 event_log.Log('clear_factory_vpd_entries', entries=FilterDict(entries))
446
447
Mattias Nisslercca761b2015-04-15 21:53:04 +0200448@Command('generate_stable_device_secret')
Peter Shihfdf17682017-05-26 11:38:39 +0800449def GenerateStableDeviceSecret(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800450 """Generates a fresh stable device secret and stores it in the RO VPD."""
Mattias Nisslercca761b2015-04-15 21:53:04 +0200451 GetGooftool(options).GenerateStableDeviceSecret()
452 event_log.Log('generate_stable_device_secret')
453
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800454
Yves Arrouyeb49b31e2019-03-06 21:51:52 -0800455@Command('cr50_set_sn_bits_and_board_id')
456def Cr50SetSnBitsAndBoardId(options):
Wei-Han Chen66357592020-01-14 15:15:37 +0800457 """Deprecated: use Cr50WriteFlashInfo instead."""
458 logging.warning('This function is renamed to Cr50WriteFlashInfo')
459 Cr50WriteFlashInfo(options)
460
461
462@Command('cr50_write_flash_info')
463def Cr50WriteFlashInfo(options):
Yves Arrouyeb49b31e2019-03-06 21:51:52 -0800464 """Set the serial number bits, board id and flags on the Cr50 chip."""
Wei-Han Chen66357592020-01-14 15:15:37 +0800465 GetGooftool(options).Cr50WriteFlashInfo()
466 event_log.Log('cr50_write_flash_info')
467
468
469@Command('cr50_write_whitelabel_flags')
470def Cr50WriteWhitelabelFlags(options):
471 GetGooftool(options).Cr50WriteWhitelabelFlags()
472 event_log.Log('cr50_write_whitelabel_flags')
Shen-En Shihd078a7c2017-08-04 13:33:49 +0800473
474
Marco Chen20c885d2018-10-04 17:22:03 +0800475@Command('cr50_disable_factory_mode')
Marco Chen44a666d2018-07-13 21:01:50 +0800476def Cr50DisableFactoryMode(options):
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800477 """Reset Cr50 state back to default state after RMA."""
Marco Chen44a666d2018-07-13 21:01:50 +0800478 return GetGooftool(options).Cr50DisableFactoryMode()
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800479
480
Earl Ou564a7872016-10-05 10:22:00 +0800481@Command('enable_release_partition',
482 CmdArg('--release_rootfs',
483 help=('path to the release rootfs device. If not specified, '
484 'the default (5th) partition will be used.')))
485def EnableReleasePartition(options):
486 """Enables a release image partition on the disk."""
487 GetGooftool(options).EnableReleasePartition(options.release_rootfs)
488
489
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800490@Command('wipe_in_place',
491 CmdArg('--fast', action='store_true',
Shun-Hsing Ou8d3c40a2015-10-08 18:16:08 +0800492 help='use non-secure but faster wipe method.'),
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800493 _shopfloor_url_args_cmd_arg,
494 _station_ip_cmd_arg,
495 _station_port_cmd_arg,
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800496 _wipe_finish_token_cmd_arg,
497 _test_umount_cmd_arg)
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800498def WipeInPlace(options):
499 """Start factory wipe directly without reboot."""
500
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800501 GetGooftool(options).WipeInPlace(options.fast,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800502 options.shopfloor_url,
503 options.station_ip,
504 options.station_port,
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800505 options.wipe_finish_token,
506 options.test_umount)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200507
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800508@Command('wipe_init',
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800509 CmdArg('--wipe_args', help='arguments for clobber-state'),
510 CmdArg('--state_dev', help='path to stateful partition device'),
511 CmdArg('--root_disk', help='path to primary device'),
512 CmdArg('--old_root', help='path to old root'),
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800513 _shopfloor_url_args_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800514 _release_rootfs_cmd_arg,
515 _station_ip_cmd_arg,
516 _station_port_cmd_arg,
Wei-Han Chenf3924112019-02-25 14:52:58 +0800517 _wipe_finish_token_cmd_arg,
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800518 _keep_developer_mode_flag_after_clobber_state_cmd_arg,
519 _test_umount_cmd_arg)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800520def WipeInit(options):
Wei-Han Chenf3924112019-02-25 14:52:58 +0800521 GetGooftool(options).WipeInit(
522 options.wipe_args,
523 options.shopfloor_url,
524 options.state_dev,
525 options.release_rootfs,
526 options.root_disk,
527 options.old_root,
528 options.station_ip,
529 options.station_port,
530 options.wipe_finish_token,
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800531 options.keep_developer_mode_flag_after_clobber_state,
532 options.test_umount)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800533
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800534@Command('verify',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800535 CmdArg('--no_write_protect', action='store_true',
536 help='Do not check write protection switch state.'),
Tammo Spalink95c43732012-07-25 15:57:14 -0700537 _hwid_status_list_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800538 _hwdb_path_cmd_arg,
Yong Hong5408f652017-07-11 19:20:25 +0800539 _project_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800540 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800541 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800542 _hwid_run_vpd_cmd_arg,
543 _hwid_vpd_data_file_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800544 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800545 _cros_core_cmd_arg,
Yilun Lin599833f2017-12-22 14:07:46 +0800546 _chromebox_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800547 _ec_pubkey_path_cmd_arg,
548 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800549 _release_rootfs_cmd_arg,
550 _firmware_path_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800551 _enforced_release_channels_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800552 _waive_list_cmd_arg,
Marco Chena681b2e2018-08-31 11:41:41 +0800553 _skip_list_cmd_arg,
554 _no_ectool_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800555def Verify(options):
556 """Verifies if whole factory process is ready for finalization.
557
558 This routine performs all the necessary checks to make sure the
559 device is ready to be finalized, but does not modify state. These
560 checks include dev switch, firmware write protection switch, hwid,
561 system time, keys, and root file system.
562 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800563
Hung-Te Lin6d827542012-07-19 11:50:41 +0800564 if not options.no_write_protect:
Ricky Lianga70a1202013-03-15 15:03:17 +0800565 VerifyWPSwitch(options)
Hung-Te Lindd708d42014-07-11 17:05:01 +0800566 VerifyManagementEngineLocked(options)
Ting Shen129fa6f2016-09-02 12:22:24 +0800567 VerifyHWID(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800568 VerifySystemTime(options)
Yilun Lin599833f2017-12-22 14:07:46 +0800569 if options.chromebox:
570 VerifyECKey(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800571 VerifyKeys(options)
572 VerifyRootFs(options)
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800573 VerifyTPM(options)
Hung-Te Lin53c49402017-07-26 13:10:58 +0800574 VerifyVPD(options)
bowgotsai529139c2015-05-30 01:39:49 +0800575 VerifyReleaseChannel(options)
Wei-Han Chen0de7cfd2020-01-03 16:49:20 +0800576 VerifyCrosConfig(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800577
Hung-Te Lin56b18402015-01-16 14:52:30 +0800578
Jon Salzfe9036f2014-01-16 14:11:23 +0800579@Command('untar_stateful_files')
Hung-Te Lin388bce22014-06-03 19:56:40 +0800580def UntarStatefulFiles(unused_options):
Jon Salzfe9036f2014-01-16 14:11:23 +0800581 """Untars stateful files from stateful_files.tar.xz on stateful partition.
582
583 If that file does not exist (which should only be R30 and earlier),
584 this is a no-op.
585 """
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800586 # Path to stateful partition on device.
587 device_stateful_path = '/mnt/stateful_partition'
588 tar_file = os.path.join(device_stateful_path, 'stateful_files.tar.xz')
Jon Salzfe9036f2014-01-16 14:11:23 +0800589 if os.path.exists(tar_file):
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800590 Spawn(['tar', 'xf', tar_file], cwd=device_stateful_path,
Jon Salzfe9036f2014-01-16 14:11:23 +0800591 log=True, check_call=True)
592 else:
593 logging.warning('No stateful files at %s', tar_file)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800594
Jon Salz40b9f822014-07-25 16:39:55 +0800595
596@Command('log_source_hashes')
Peter Shihfdf17682017-05-26 11:38:39 +0800597def LogSourceHashes(options):
Jon Salz40b9f822014-07-25 16:39:55 +0800598 """Logs hashes of source files in the factory toolkit."""
Peter Shihfdf17682017-05-26 11:38:39 +0800599 del options # Unused.
Jon Salze60307f2014-08-05 16:20:00 +0800600 # WARNING: The following line is necessary to validate the integrity
601 # of the factory software. Do not remove or modify it.
602 #
603 # 警告:此行会验证工厂软件的完整性,禁止删除或修改。
Wei-Han Chena5c01a02016-04-23 19:27:19 +0800604 factory_par = sys_utils.GetRunningFactoryPythonArchivePath()
605 if factory_par:
606 event_log.Log(
607 'source_hashes',
608 **file_utils.HashPythonArchive(factory_par))
609 else:
610 event_log.Log(
611 'source_hashes',
Peter Shihad166772017-05-31 11:36:17 +0800612 **file_utils.HashSourceTree(os.path.join(paths.FACTORY_DIR, 'py')))
Jon Salz40b9f822014-07-25 16:39:55 +0800613
614
Tammo Spalink86a61c62012-05-25 15:10:35 +0800615@Command('log_system_details')
Peter Shihfdf17682017-05-26 11:38:39 +0800616def LogSystemDetails(options):
Tammo Spalink86a61c62012-05-25 15:10:35 +0800617 """Write miscellaneous system details to the event log."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800618
Ricky Liang43b879b2014-02-24 11:36:55 +0800619 event_log.Log('system_details', **GetGooftool(options).GetSystemDetails())
Tammo Spalink86a61c62012-05-25 15:10:35 +0800620
621
Jon Salza88b83b2013-05-27 20:00:35 +0800622def CreateReportArchiveBlob(*args, **kwargs):
623 """Creates a report archive and returns it as a blob.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800624
Jon Salza88b83b2013-05-27 20:00:35 +0800625 Args:
626 See CreateReportArchive.
Andy Cheng7a76cb82012-11-19 18:08:19 +0800627
Jon Salza88b83b2013-05-27 20:00:35 +0800628 Returns:
629 An xmlrpclib.Binary object containing a .tar.xz file.
630 """
Wei-Han Chen47416612016-09-14 17:41:52 +0800631 report_archive = CreateReportArchive(*args, **kwargs)
632 try:
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800633 return xmlrpclib.Binary(file_utils.ReadFile(report_archive))
Wei-Han Chen47416612016-09-14 17:41:52 +0800634 finally:
635 os.unlink(report_archive)
Jon Salza88b83b2013-05-27 20:00:35 +0800636
637
638def CreateReportArchive(device_sn=None, add_file=None):
639 """Creates a report archive in a temporary directory.
640
641 Args:
642 device_sn: The device serial number (optional).
643 add_file: A list of files to add (optional).
644
645 Returns:
646 Path to the archive.
647 """
Philip Chen6ada02c2019-11-04 19:41:54 +0000648 # Flush Testlog data to DATA_TESTLOG_DIR before creating a report archive.
649 result, reason = state.GetInstance().FlushTestlog(
650 uplink=False, local=True, timeout=10)
651 if not result:
652 logging.warning('Failed to flush testlog data: %s', reason)
653
Hung-Te Lin6bd16472012-06-20 16:26:47 +0800654 def NormalizeAsFileName(token):
655 return re.sub(r'\W+', '', token).strip()
Jon Salza88b83b2013-05-27 20:00:35 +0800656
657 target_name = '%s%s.tar.xz' % (
658 time.strftime('%Y%m%dT%H%M%SZ',
659 time.gmtime()),
Hung-Te Lin56b18402015-01-16 14:52:30 +0800660 ('' if device_sn is None else
661 '_' + NormalizeAsFileName(device_sn)))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800662 target_path = os.path.join(gettempdir(), target_name)
Jon Salza88b83b2013-05-27 20:00:35 +0800663
Tammo Spalink86a61c62012-05-25 15:10:35 +0800664 # Intentionally ignoring dotfiles in EVENT_LOG_DIR.
Pi-Hsun Shih1f569a72019-12-26 11:23:56 +0800665 tar_cmd = 'cd %s ; tar cJf %s * -C /' % (event_log.EVENT_LOG_DIR, target_path)
Jongpil Jung23355a92019-12-31 14:38:29 +0900666 tar_files = [paths.FACTORY_LOG_PATH, paths.DATA_TESTLOG_DIR]
667 if add_file:
668 tar_files = tar_files + add_file
Pi-Hsun Shih1f569a72019-12-26 11:23:56 +0800669 for f in tar_files:
670 # Require absolute paths since we use -C / to change current directory to
671 # root.
672 if not f.startswith('/'):
673 raise Error('Not an absolute path: %s' % f)
674 if not os.path.exists(f):
675 raise Error('File does not exist: %s' % f)
676 tar_cmd += ' %s' % pipes.quote(f[1:])
Tammo Spalink86a61c62012-05-25 15:10:35 +0800677 cmd_result = Shell(tar_cmd)
Jon Salzff88c022012-11-03 12:19:58 +0800678
Hung-Te Lin3756c432020-01-16 11:30:46 +0800679 if cmd_result.status == 1:
680 # tar returns 1 when some files were changed during archiving,
681 # but that is expected for log files so should ignore such failure
682 # if the archive looks good.
Pi-Hsun Shih1f569a72019-12-26 11:23:56 +0800683 Spawn(['tar', 'tJf', target_path], check_call=True, log=True,
Jon Salzff88c022012-11-03 12:19:58 +0800684 ignore_stdout=True)
685 elif not cmd_result.success:
Tammo Spalink86a61c62012-05-25 15:10:35 +0800686 raise Error('unable to tar event logs, cmd %r failed, stderr: %r' %
687 (tar_cmd, cmd_result.stderr))
Jon Salzff88c022012-11-03 12:19:58 +0800688
Jon Salza88b83b2013-05-27 20:00:35 +0800689 return target_path
690
691_upload_method_cmd_arg = CmdArg(
692 '--upload_method', metavar='METHOD:PARAM',
693 help=('How to perform the upload. METHOD should be one of '
Kevin Line4c64de2019-11-22 15:28:34 +0800694 '{ftp, shopfloor, ftps, cpfe, smb}.'))
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800695_upload_max_retry_times_arg = CmdArg(
696 '--upload_max_retry_times', type=int, default=0,
697 help='Number of tries to upload. 0 to retry infinitely.')
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800698_upload_retry_interval_arg = CmdArg(
699 '--upload_retry_interval', type=int, default=None,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800700 help='Retry interval in seconds.')
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800701_upload_allow_fail_arg = CmdArg(
702 '--upload_allow_fail', action='store_true',
703 help='Continue finalize if report upload fails.')
Jon Salza88b83b2013-05-27 20:00:35 +0800704_add_file_cmd_arg = CmdArg(
705 '--add_file', metavar='FILE', action='append',
706 help='Extra file to include in report (must be an absolute path)')
707
Hung-Te Lin56b18402015-01-16 14:52:30 +0800708
Jon Salza88b83b2013-05-27 20:00:35 +0800709@Command('upload_report',
710 _upload_method_cmd_arg,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800711 _upload_max_retry_times_arg,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800712 _upload_retry_interval_arg,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800713 _upload_allow_fail_arg,
Jon Salza88b83b2013-05-27 20:00:35 +0800714 _add_file_cmd_arg)
715def UploadReport(options):
716 """Create a report containing key device details."""
Yong Hong65bda312018-12-13 20:05:58 +0800717 ro_vpd = vpd.VPDTool().GetAllData(partition=vpd.VPD_READONLY_PARTITION_NAME)
Jon Salza88b83b2013-05-27 20:00:35 +0800718 device_sn = ro_vpd.get('serial_number', None)
719 if device_sn is None:
720 logging.warning('RO_VPD missing device serial number')
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +0800721 device_sn = 'MISSING_SN_' + time_utils.TimedUUID()
chuntsena6da2be2019-08-14 17:11:55 +0800722 target_path = CreateReportArchive(device_sn, options.add_file)
Jon Salza88b83b2013-05-27 20:00:35 +0800723
Tammo Spalink86a61c62012-05-25 15:10:35 +0800724 if options.upload_method is None or options.upload_method == 'none':
725 logging.warning('REPORT UPLOAD SKIPPED (report left at %s)', target_path)
726 return
727 method, param = options.upload_method.split(':', 1)
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800728
729 if options.upload_retry_interval is not None:
730 retry_interval = options.upload_retry_interval
731 else:
732 retry_interval = report_upload.DEFAULT_RETRY_INTERVAL
733
Tammo Spalink86a61c62012-05-25 15:10:35 +0800734 if method == 'shopfloor':
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800735 report_upload.ShopFloorUpload(
736 target_path, param,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800737 'GRT' if options.command_name == 'finalize' else None,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800738 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800739 retry_interval=retry_interval,
740 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800741 elif method == 'ftp':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800742 report_upload.FtpUpload(target_path, 'ftp:' + param,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800743 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800744 retry_interval=retry_interval,
745 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800746 elif method == 'ftps':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800747 report_upload.CurlUrlUpload(target_path, '--ftp-ssl-reqd ftp:%s' % param,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800748 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800749 retry_interval=retry_interval,
750 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800751 elif method == 'cpfe':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800752 report_upload.CpfeUpload(target_path, pipes.quote(param),
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800753 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800754 retry_interval=retry_interval,
755 allow_fail=options.upload_allow_fail)
Kevin Line4c64de2019-11-22 15:28:34 +0800756 elif method == 'smb':
757 # param should be in form: <dest_path>.
758 report_upload.SmbUpload(target_path, 'smb:' + param,
759 max_retry_times=options.upload_max_retry_times,
760 retry_interval=retry_interval,
761 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800762 else:
Peter Shihbf6f22b2018-02-26 14:05:28 +0800763 raise Error('unknown report upload method %r' % method)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800764
765
766@Command('finalize',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800767 CmdArg('--no_write_protect', action='store_true',
768 help='Do not enable firmware write protection.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800769 CmdArg('--fast', action='store_true',
770 help='use non-secure but faster wipe method.'),
Yong Hongb2926bd2018-10-12 14:11:14 +0800771 _no_ectool_cmd_arg,
Shun-Hsing Oudb407d62015-11-11 11:03:59 +0800772 _shopfloor_url_args_cmd_arg,
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800773 _hwdb_path_cmd_arg,
Tammo Spalink95c43732012-07-25 15:57:14 -0700774 _hwid_status_list_cmd_arg,
Jon Salz65266432012-07-30 19:02:49 +0800775 _upload_method_cmd_arg,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800776 _upload_max_retry_times_arg,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800777 _upload_retry_interval_arg,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800778 _upload_allow_fail_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800779 _add_file_cmd_arg,
780 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800781 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800782 _hwid_run_vpd_cmd_arg,
783 _hwid_vpd_data_file_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800784 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800785 _cros_core_cmd_arg,
Yilun Lin599833f2017-12-22 14:07:46 +0800786 _chromebox_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800787 _ec_pubkey_path_cmd_arg,
788 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800789 _release_rootfs_cmd_arg,
790 _firmware_path_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800791 _enforced_release_channels_cmd_arg,
792 _station_ip_cmd_arg,
793 _station_port_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800794 _wipe_finish_token_cmd_arg,
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800795 _rlz_embargo_end_date_offset_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800796 _waive_list_cmd_arg,
chuntsenaf1232f2019-03-20 15:45:54 +0800797 _skip_list_cmd_arg,
Philip Chen04fb90b2019-11-06 12:10:33 -0800798 _no_generate_mfg_date_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800799def Finalize(options):
800 """Verify system readiness and trigger transition into release state.
801
Jon Salzaa3a30e2013-05-15 15:56:28 +0800802 This routine does the following:
803 - Verifies system state (see verify command)
Jon Salzfe9036f2014-01-16 14:11:23 +0800804 - Untars stateful_files.tar.xz, if it exists, in the stateful partition, to
805 initialize files such as the CRX cache
Jon Salzaa3a30e2013-05-15 15:56:28 +0800806 - Modifies firmware bitmaps to match locale
807 - Clears all factory-friendly flags from the GBB
808 - Removes factory-specific entries from RW_VPD (factory.*)
809 - Enables firmware write protection (cannot rollback after this)
Marco Chenecee04f2019-02-15 22:24:24 +0800810 - Initialize Fpmcu entropy
Jon Salzaa3a30e2013-05-15 15:56:28 +0800811 - Uploads system logs & reports
Earl Ou51182222016-09-09 12:16:48 +0800812 - Wipes the testing kernel, rootfs, and stateful partition
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800813 """
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800814 if not options.rma_mode:
815 # Write VPD values related to RLZ ping into VPD.
816 GetGooftool(options).WriteVPDForRLZPing(options.embargo_offset)
chuntsenaf1232f2019-03-20 15:45:54 +0800817 if options.generate_mfg_date:
818 GetGooftool(options).WriteVPDForMFGDate()
Wei-Han Chen66357592020-01-14 15:15:37 +0800819 Cr50WriteFlashInfo(options)
Marco Chen44a666d2018-07-13 21:01:50 +0800820 Cr50DisableFactoryMode(options)
Marco Chen9d0631c2018-08-31 10:52:44 +0800821 Verify(options)
Jon Salz40b9f822014-07-25 16:39:55 +0800822 LogSourceHashes(options)
Jon Salzfe9036f2014-01-16 14:11:23 +0800823 UntarStatefulFiles(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800824 if options.cros_core:
825 logging.info('SetFirmwareBitmapLocale is skipped for ChromeOS Core device.')
826 else:
827 SetFirmwareBitmapLocale(options)
Jon Salzaa3a30e2013-05-15 15:56:28 +0800828 ClearFactoryVPDEntries(options)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200829 GenerateStableDeviceSecret(options)
Shen-En Shih3e079b22017-09-11 05:43:09 -0700830 ClearGBBFlags(options)
Hung-Te Lin6d827542012-07-19 11:50:41 +0800831 if options.no_write_protect:
Pi-Hsun Shih1f569a72019-12-26 11:23:56 +0800832 logging.warning('WARNING: Firmware Write Protection is SKIPPED.')
Andy Cheng0465d132013-03-20 12:12:06 +0800833 event_log.Log('wp', fw='both', status='skipped')
Hung-Te Lin6d827542012-07-19 11:50:41 +0800834 else:
Wei-Han Chenba21f512016-10-14 18:52:33 +0800835 EnableFwWp(options)
Marco Chenecee04f2019-02-15 22:24:24 +0800836 FpmcuInitializeEntropy(options)
Jon Salza0f58e02012-05-29 19:33:39 +0800837 LogSystemDetails(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800838 UploadReport(options)
Earl Ou51182222016-09-09 12:16:48 +0800839
840 event_log.Log('wipe_in_place')
841 wipe_args = []
Earl Ou51182222016-09-09 12:16:48 +0800842 if options.shopfloor_url:
843 wipe_args += ['--shopfloor_url', options.shopfloor_url]
844 if options.fast:
845 wipe_args += ['--fast']
846 if options.station_ip:
847 wipe_args += ['--station_ip', options.station_ip]
848 if options.station_port:
849 wipe_args += ['--station_port', options.station_port]
850 if options.wipe_finish_token:
851 wipe_args += ['--wipe_finish_token', options.wipe_finish_token]
852 ExecFactoryPar('gooftool', 'wipe_in_place', *wipe_args)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800853
854
Ting Shen129fa6f2016-09-02 12:22:24 +0800855@Command('verify_hwid',
856 _probe_results_cmd_arg,
857 _hwdb_path_cmd_arg,
858 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800859 _hwid_run_vpd_cmd_arg,
860 _hwid_vpd_data_file_cmd_arg,
Ting Shen129fa6f2016-09-02 12:22:24 +0800861 _rma_mode_cmd_arg)
862def VerifyHWID(options):
Ricky Liangc662be32013-12-24 11:50:23 +0800863 """A simple wrapper that calls out to HWID utils to verify version 3 HWID.
Ricky Liang53390232013-03-08 15:37:57 +0800864
Ricky Liangc662be32013-12-24 11:50:23 +0800865 This is mainly for Gooftool to verify v3 HWID during finalize. For testing
866 and development purposes, please use `hwid` command.
Ricky Liang53390232013-03-08 15:37:57 +0800867 """
Yong Hongada8e0e2018-01-04 16:36:21 +0800868 database = GetGooftool(options).db
Yong Hong68a0e0d2017-12-20 19:06:54 +0800869
Yong Hongada8e0e2018-01-04 16:36:21 +0800870 encoded_string = options.hwid or GetGooftool(options).ReadHWID()
871
872 probed_results = hwid_utils.GetProbedResults(infile=options.probe_results)
Yong Hong2c39bf22018-01-24 22:24:11 +0800873 device_info = hwid_utils.GetDeviceInfo()
Yong Hong65bda312018-12-13 20:05:58 +0800874 vpd_data = hwid_utils.GetVPDData(run_vpd=options.hwid_run_vpd,
875 infile=options.hwid_vpd_data_file)
Ricky Liang53390232013-03-08 15:37:57 +0800876
Hung-Te Lin11052952015-03-18 13:48:59 +0800877 event_log.Log('probed_results', probed_results=FilterDict(probed_results))
Yong Hong65bda312018-12-13 20:05:58 +0800878 event_log.Log('vpd', vpd=FilterDict(vpd_data))
Ricky Liang53390232013-03-08 15:37:57 +0800879
Yong Hong2c39bf22018-01-24 22:24:11 +0800880 hwid_utils.VerifyHWID(database, encoded_string, probed_results,
Yong Hong65bda312018-12-13 20:05:58 +0800881 device_info, vpd_data, options.rma_mode)
Ricky Liang53390232013-03-08 15:37:57 +0800882
Ricky Liangc662be32013-12-24 11:50:23 +0800883 event_log.Log('verified_hwid', hwid=encoded_string)
Ricky Liang53390232013-03-08 15:37:57 +0800884
885
henryhsu44d793a2013-07-20 00:07:38 +0800886@Command('get_firmware_hash',
Marco Chence70b132018-05-03 23:43:39 +0800887 CmdArg('--file', required=True, metavar='FILE', help='Firmware File.'))
henryhsu44d793a2013-07-20 00:07:38 +0800888def GetFirmwareHash(options):
henryhsuf6f835c2013-07-20 20:49:25 +0800889 """Get firmware hash from a file"""
henryhsu44d793a2013-07-20 00:07:38 +0800890 if os.path.exists(options.file):
Cheng-Han Yang2c668ae2018-04-18 22:31:07 +0800891 value_dict = chromeos_firmware.CalculateFirmwareHashes(options.file)
Yilin Yangea784662019-09-26 13:51:03 +0800892 for key, value in iteritems(value_dict):
Yilin Yang71e39412019-09-24 09:26:46 +0800893 print(' %s: %s' % (key, value))
henryhsu44d793a2013-07-20 00:07:38 +0800894 else:
895 raise Error('File does not exist: %s' % options.file)
896
henryhsuf6f835c2013-07-20 20:49:25 +0800897
Philip Chen04fb90b2019-11-06 12:10:33 -0800898@Command('fpmcu_initialize_entropy')
Marco Chenecee04f2019-02-15 22:24:24 +0800899def FpmcuInitializeEntropy(options):
900 """Initialze entropy of FPMCU."""
Philip Chen04fb90b2019-11-06 12:10:33 -0800901
902 if HasFpmcu():
Marco Chenecee04f2019-02-15 22:24:24 +0800903 GetGooftool(options).FpmcuInitializeEntropy()
Philip Chen04fb90b2019-11-06 12:10:33 -0800904 else:
905 logging.info('No FPS on this board.')
Marco Chenecee04f2019-02-15 22:24:24 +0800906
907
Peter Shihfdf17682017-05-26 11:38:39 +0800908def main():
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800909 """Run sub-command specified by the command line args."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800910
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800911 options = ParseCmdline(
Ting Shen129fa6f2016-09-02 12:22:24 +0800912 'Perform Google required factory tests.',
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800913 CmdArg('-l', '--log', metavar='PATH',
914 help='Write logs to this file.'),
Jon Salza4bea382012-10-29 13:00:34 +0800915 CmdArg('--suppress-event-logs', action='store_true',
916 help='Suppress event logging.'),
Wei-Han Chenaff56232016-04-16 09:17:59 +0800917 CmdArg('--phase', default=None,
918 help=('override phase for phase checking (defaults to the current '
919 'as returned by the "factory phase" command)')),
Wei-Han Chenb34bdff2019-09-26 13:07:50 +0800920 VERBOSITY_CMD_ARG)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800921 SetupLogging(options.verbosity, options.log)
Andy Cheng0465d132013-03-20 12:12:06 +0800922 event_log.SetGlobalLoggerDefaultPrefix('gooftool')
923 event_log.GetGlobalLogger().suppress = options.suppress_event_logs
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800924 logging.debug('gooftool options: %s', repr(options))
Wei-Han Chenaff56232016-04-16 09:17:59 +0800925
926 phase.OverridePhase(options.phase)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800927 try:
928 logging.debug('GOOFTOOL command %r', options.command_name)
929 options.command(options)
930 logging.info('GOOFTOOL command %r SUCCESS', options.command_name)
Peter Shih6674ecf2018-03-29 14:04:57 +0800931 except Error as e:
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800932 logging.exception(e)
933 sys.exit('GOOFTOOL command %r ERROR: %s' % (options.command_name, e))
Peter Shih6674ecf2018-03-29 14:04:57 +0800934 except Exception as e:
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800935 logging.exception(e)
936 sys.exit('UNCAUGHT RUNTIME EXCEPTION %s' % e)
937
938
939if __name__ == '__main__':
Peter Shihfdf17682017-05-26 11:38:39 +0800940 main()