blob: c8b2dab999ef83b329d2d5e6bafb481caa8c5ed6 [file] [log] [blame]
Yilin Yang19da6932019-12-10 13:39:28 +08001#!/usr/bin/env python3
Jon Salze60307f2014-08-05 16:20:00 +08002# -*- coding: utf-8 -*-
3# Copyright 2014 The Chromium OS Authors. All rights reserved.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08004# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
Jon Salze60307f2014-08-05 16:20:00 +08007
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08008"""Google Factory Tool.
9
You-Cheng Syu461ec032017-03-06 15:56:58 +080010This tool is intended to be used on factory assembly lines. It
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080011provides all of the Google required test functionality and must be run
12on each device as part of the assembly process.
13"""
14
Yilin Yang71e39412019-09-24 09:26:46 +080015from __future__ import print_function
16
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080017import logging
18import os
Jon Salz65266432012-07-30 19:02:49 +080019import pipes
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080020import re
21import sys
Peter Shihfdf17682017-05-26 11:38:39 +080022from tempfile import gettempdir
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080023import threading
Hung-Te Lin6bd16472012-06-20 16:26:47 +080024import time
Yilin Yange02d5722019-10-23 11:07:36 +080025import xmlrpc.client
Peter Shihfdf17682017-05-26 11:38:39 +080026
Wei-Han Chen0a3320e2016-04-23 01:32:07 +080027from cros.factory.gooftool.common import ExecFactoryPar
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080028from cros.factory.gooftool.common import Shell
Peter Shihfdf17682017-05-26 11:38:39 +080029from cros.factory.gooftool.core import Gooftool
30from cros.factory.gooftool import crosfw
Peter Shihfdf17682017-05-26 11:38:39 +080031from cros.factory.gooftool import report_upload
Yong Hong65bda312018-12-13 20:05:58 +080032from cros.factory.gooftool import vpd
Hung-Te Lin604e0c22015-11-24 15:17:07 +080033from cros.factory.hwid.v3 import hwid_utils
Yong Hong863d3262017-10-30 16:23:34 +080034from cros.factory.probe.functions import chromeos_firmware
Wei-Han Chen2ebb92d2016-01-12 14:51:41 +080035from cros.factory.test.env import paths
Peter Shihfdf17682017-05-26 11:38:39 +080036from cros.factory.test import event_log
Wei-Han Chenaff56232016-04-16 09:17:59 +080037from cros.factory.test.rules import phase
Hung-Te Lin3f096842016-01-13 17:37:06 +080038from cros.factory.test.rules.privacy import FilterDict
Philip Chen6ada02c2019-11-04 19:41:54 +000039from cros.factory.test import state
Peter Shihfdf17682017-05-26 11:38:39 +080040from cros.factory.utils import argparse_utils
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080041from cros.factory.utils.argparse_utils import CmdArg
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080042from cros.factory.utils.argparse_utils import ParseCmdline
Wei-Han Chenb34bdff2019-09-26 13:07:50 +080043from cros.factory.utils.argparse_utils import VERBOSITY_CMD_ARG
Peter Shihfdf17682017-05-26 11:38:39 +080044from cros.factory.utils.debug_utils import SetupLogging
Jon Salz40b9f822014-07-25 16:39:55 +080045from cros.factory.utils import file_utils
Peter Shih67c7c0f2018-02-26 11:23:59 +080046from cros.factory.utils.process_utils import Spawn
Wei-Han Chena5c01a02016-04-23 19:27:19 +080047from cros.factory.utils import sys_utils
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +080048from cros.factory.utils import time_utils
Joel Kitchingd3bc2662014-12-16 16:03:32 -080049from cros.factory.utils.type_utils import Error
Tammo Spalink86a61c62012-05-25 15:10:35 +080050
Tammo Spalink5c699832012-07-03 17:50:39 +080051
Tammo Spalink5c699832012-07-03 17:50:39 +080052# TODO(tammo): Replace calls to sys.exit with raise Exit, and maybe
53# treat that specially (as a smoot exit, as opposed to the more
54# verbose output for generic Error).
55
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080056_global_gooftool = None
57_gooftool_lock = threading.Lock()
Philip Chen04fb90b2019-11-06 12:10:33 -080058_has_fpmcu = None
Tammo Spalink5c699832012-07-03 17:50:39 +080059
Hung-Te Lin56b18402015-01-16 14:52:30 +080060
Ricky Lianga70a1202013-03-15 15:03:17 +080061def GetGooftool(options):
Peter Shihfdf17682017-05-26 11:38:39 +080062 global _global_gooftool # pylint: disable=global-statement
Ricky Lianga70a1202013-03-15 15:03:17 +080063
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080064 if _global_gooftool is None:
65 with _gooftool_lock:
Shen-En Shihc5d15d62017-08-04 13:02:59 +080066 if _global_gooftool is None:
67 project = getattr(options, 'project', None)
68 hwdb_path = getattr(options, 'hwdb_path', None)
69 _global_gooftool = Gooftool(hwid_version=3, project=project,
70 hwdb_path=hwdb_path)
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080071
72 return _global_gooftool
Ricky Lianga70a1202013-03-15 15:03:17 +080073
Philip Chen04fb90b2019-11-06 12:10:33 -080074def HasFpmcu():
75 global _has_fpmcu # pylint: disable=global-statement
76
77 if _has_fpmcu is None:
78 FPMCU_PATH = '/dev/cros_fp'
Philip Chen04fb90b2019-11-06 12:10:33 -080079 has_cros_config_fpmcu = False
Philip Chencf6642b2019-12-02 19:38:59 -080080 cros_config_output = Shell(['cros_config', '/fingerprint', 'board'])
81 if cros_config_output.success and cros_config_output.stdout:
Philip Chen04fb90b2019-11-06 12:10:33 -080082 has_cros_config_fpmcu = True
83
Alex Chou5b071392020-08-13 09:45:14 +080084 if not os.path.exists(FPMCU_PATH) and has_cros_config_fpmcu:
Philip Chen04fb90b2019-11-06 12:10:33 -080085 raise Error('FPMCU found in cros_config but missing in %s.' % FPMCU_PATH)
Philip Chen04fb90b2019-11-06 12:10:33 -080086
Alex Chou5b071392020-08-13 09:45:14 +080087 _has_fpmcu = has_cros_config_fpmcu
Philip Chen04fb90b2019-11-06 12:10:33 -080088
89 return _has_fpmcu
Hung-Te Lin56b18402015-01-16 14:52:30 +080090
Ting Shen18a06382016-08-30 16:18:21 +080091def Command(cmd_name, *args, **kwargs):
You-Cheng Syu8fc2a602017-12-22 17:05:05 +080092 """Decorator for commands in gooftool.
Ting Shen18a06382016-08-30 16:18:21 +080093
94 This is similar to argparse_utils.Command, but all gooftool commands
95 can be waived during `gooftool finalize` or `gooftool verify` using
Wei-Han Chen60c5d332017-01-05 17:15:10 +080096 --waive_list or --skip_list option.
Ting Shen18a06382016-08-30 16:18:21 +080097 """
98 def Decorate(fun):
Wei-Han Chen60c5d332017-01-05 17:15:10 +080099 def CommandWithWaiveSkipCheck(options):
Ting Shen18a06382016-08-30 16:18:21 +0800100 waive_list = vars(options).get('waive_list', [])
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800101 skip_list = vars(options).get('skip_list', [])
102 if phase.GetPhase() >= phase.PVT_DOGFOOD and (
103 waive_list != [] or skip_list != []):
Ting Shen18a06382016-08-30 16:18:21 +0800104 raise Error(
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800105 'waive_list and skip_list should be empty for phase %s' %
106 phase.GetPhase())
Ting Shen18a06382016-08-30 16:18:21 +0800107
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800108 if cmd_name not in skip_list:
109 try:
110 fun(options)
111 except Exception as e:
112 if cmd_name in waive_list:
113 logging.exception(e)
114 else:
115 raise
Ting Shen18a06382016-08-30 16:18:21 +0800116
117 return argparse_utils.Command(cmd_name, *args, **kwargs)(
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800118 CommandWithWaiveSkipCheck)
Ting Shen18a06382016-08-30 16:18:21 +0800119 return Decorate
120
121
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800122@Command('write_hwid',
123 CmdArg('hwid', metavar='HWID', help='HWID string'))
Andy Chengc92e6f92012-11-20 16:55:53 +0800124def WriteHWID(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800125 """Write specified HWID value into the system BB."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800126
Tammo Spalink95c43732012-07-25 15:57:14 -0700127 logging.info('writing hwid string %r', options.hwid)
Ricky Lianga70a1202013-03-15 15:03:17 +0800128 GetGooftool(options).WriteHWID(options.hwid)
Andy Cheng0465d132013-03-20 12:12:06 +0800129 event_log.Log('write_hwid', hwid=options.hwid)
Yilin Yang71e39412019-09-24 09:26:46 +0800130 print('Wrote HWID: %r' % options.hwid)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800131
132
Yong Hongc3765412017-12-26 23:12:15 +0800133@Command('read_hwid')
134def ReadHWID(options):
135 """Read the HWID string from GBB."""
136
137 logging.info('reading the hwid string')
Yilin Yang71e39412019-09-24 09:26:46 +0800138 print(GetGooftool(options).ReadHWID())
Yong Hongc3765412017-12-26 23:12:15 +0800139
140
Yong Hong5408f652017-07-11 19:20:25 +0800141_project_cmd_arg = CmdArg(
142 '--project', metavar='PROJECT',
143 default=None, help='Project name to test.')
Ricky Liang53390232013-03-08 15:37:57 +0800144
Tammo Spalink8fab5312012-05-28 18:33:30 +0800145_hwdb_path_cmd_arg = CmdArg(
146 '--hwdb_path', metavar='PATH',
Yong Hong5c6dcd52017-12-27 11:05:01 +0800147 default=hwid_utils.GetDefaultDataPath(),
Tammo Spalink8fab5312012-05-28 18:33:30 +0800148 help='Path to the HWID database.')
149
Tammo Spalink95c43732012-07-25 15:57:14 -0700150_hwid_status_list_cmd_arg = CmdArg(
Hung-Te Lin56b18402015-01-16 14:52:30 +0800151 '--status', nargs='*', default=['supported'],
152 help='allow only HWIDs with these status values')
Tammo Spalink95c43732012-07-25 15:57:14 -0700153
Jon Salzce124fb2012-10-02 17:42:03 +0800154_probe_results_cmd_arg = CmdArg(
Yong Hong55050c12018-02-27 18:19:47 +0800155 '--probe_results', metavar='RESULTS.json',
156 help=('Output from "hwid probe" (used instead of probing this system).'))
Jon Salzce124fb2012-10-02 17:42:03 +0800157
Ricky Liang53390232013-03-08 15:37:57 +0800158_device_info_cmd_arg = CmdArg(
Ricky Liangf89f73a2013-03-19 05:00:24 +0800159 '--device_info', metavar='DEVICE_INFO.yaml', default=None,
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800160 help='A dict of device info to use instead of fetching from shopfloor '
Ricky Liang53390232013-03-08 15:37:57 +0800161 'server.')
162
Jon Salzce124fb2012-10-02 17:42:03 +0800163_hwid_cmd_arg = CmdArg(
164 '--hwid', metavar='HWID',
Ricky Lianga70a1202013-03-15 15:03:17 +0800165 help='HWID to verify (instead of the currently set HWID of this system).')
Jon Salzce124fb2012-10-02 17:42:03 +0800166
Yong Hong68a0e0d2017-12-20 19:06:54 +0800167_hwid_run_vpd_cmd_arg = CmdArg(
168 '--hwid-run-vpd', action='store_true',
169 help=('Specify the hwid utility to obtain the vpd data by running the '
170 '`vpd` commandline tool.'))
171
172_hwid_vpd_data_file_cmd_arg = CmdArg(
173 '--hwid-vpd-data-file', metavar='FILE.json', type=str, default=None,
174 help=('Specify the hwid utility to obtain the vpd data from the specified '
175 'file.'))
176
Cheng-Han Yang663763b2020-09-15 20:46:23 +0800177_no_write_protect_cmd_arg = CmdArg(
178 '--no_write_protect', action='store_true',
179 help='Do not enable firmware write protection.')
180
Bernie Thompson3c11c872013-07-22 18:22:45 -0700181_rma_mode_cmd_arg = CmdArg(
182 '--rma_mode', action='store_true',
183 help='Enable RMA mode, do not check for deprecated components.')
Tammo Spalink95c43732012-07-25 15:57:14 -0700184
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800185_cros_core_cmd_arg = CmdArg(
186 '--cros_core', action='store_true',
187 help='Finalize for ChromeOS Core devices (may add or remove few test '
Hung-Te Lin53c49402017-07-26 13:10:58 +0800188 'items. For example, registration codes or firmware bitmap '
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800189 'locale settings).')
190
Pin-Yen Lin215b7542020-05-05 09:45:37 +0800191_has_ec_pubkey_cmd_arg = CmdArg(
192 '--has_ec_pubkey', action='store_true', default=None,
193 help='The device has EC public key for EFS and need to run VerifyECKey.')
Yilun Lin599833f2017-12-22 14:07:46 +0800194
bowgotsai13820f42015-09-10 23:18:04 +0800195_enforced_release_channels_cmd_arg = CmdArg(
196 '--enforced_release_channels', nargs='*', default=None,
197 help='Enforced release image channels.')
198
Yilun Lin34f54802017-11-16 11:58:25 +0800199_ec_pubkey_path_cmd_arg = CmdArg(
200 '--ec_pubkey_path',
201 default=None,
202 help='Path to public key in vb2 format. Verify EC key with pubkey file.')
203
204_ec_pubkey_hash_cmd_arg = CmdArg(
205 '--ec_pubkey_hash',
206 default=None,
207 help='A string for public key hash. Verify EC key with the given hash.')
208
Hung-Te Lincdb96522016-04-15 16:51:10 +0800209_release_rootfs_cmd_arg = CmdArg(
210 '--release_rootfs', help='Location of release image rootfs partition.')
211
212_firmware_path_cmd_arg = CmdArg(
213 '--firmware_path', help='Location of firmware image partition.')
Ricky Liang43b879b2014-02-24 11:36:55 +0800214
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800215_shopfloor_url_args_cmd_arg = CmdArg(
216 '--shopfloor_url',
Earl Ou51182222016-09-09 12:16:48 +0800217 help='Shopfloor server url to be informed when wiping is done. '
218 'After wiping, a XML-RPC request will be sent to the '
219 'given url to indicate the completion of wiping.')
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800220
221_station_ip_cmd_arg = CmdArg(
222 '--station_ip',
223 help='IP of remote station')
224
225_station_port_cmd_arg = CmdArg(
226 '--station_port',
227 help='Port on remote station')
228
229_wipe_finish_token_cmd_arg = CmdArg(
230 '--wipe_finish_token',
231 help='Required token when notifying station after wipe finished')
232
Wei-Han Chenf3924112019-02-25 14:52:58 +0800233_keep_developer_mode_flag_after_clobber_state_cmd_arg = CmdArg(
234 # The argument name is super long because you should never use it by
235 # yourself when using command line tools.
236 '--keep_developer_mode_flag_after_clobber_state',
237 action='store_true', default=None,
238 help='After clobber-state, do not delete .developer_mode')
239
Ting Shen18a06382016-08-30 16:18:21 +0800240_waive_list_cmd_arg = CmdArg(
241 '--waive_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800242 help='A list of waived checks, separated by whitespace. '
243 'Each item should be a sub-command of gooftool. '
Ting Shen18a06382016-08-30 16:18:21 +0800244 'e.g. "gooftool verify --waive_list verify_tpm clear_gbb_flags".')
245
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800246_skip_list_cmd_arg = CmdArg(
247 '--skip_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800248 help='A list of skipped checks, separated by whitespace. '
249 'Each item should be a sub-command of gooftool. '
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800250 'e.g. "gooftool verify --skip_list verify_tpm clear_gbb_flags".')
251
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800252_test_umount_cmd_arg = CmdArg(
253 '--test_umount', action='store_true',
254 help='(For testing only) Only umount rootfs and stateful partition '
255 'instead of running full wiping and cutoff process.')
256
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800257_rlz_embargo_end_date_offset_cmd_arg = CmdArg(
Kevin Line4c64de2019-11-22 15:28:34 +0800258 '--embargo_offset', type=int, default=7, choices=list(range(7, 15)),
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800259 help='Change the offset of embargo end date, cannot less than 7 days or '
260 'more than 14 days.')
261
Marco Chena681b2e2018-08-31 11:41:41 +0800262_no_ectool_cmd_arg = CmdArg(
263 '--no_ectool', action='store_false', dest='has_ectool',
264 help='There is no ectool utility so tests rely on ectool should be '
265 'skipped.')
Tammo Spalink8fab5312012-05-28 18:33:30 +0800266
chuntsenaf1232f2019-03-20 15:45:54 +0800267_no_generate_mfg_date_cmd_arg = CmdArg(
268 '--no_generate_mfg_date', action='store_false', dest='generate_mfg_date',
269 help='Do not generate manufacturing date nor write mfg_date into VPD.')
270
Stimim Chenc9fbdfc2020-05-21 17:00:53 +0800271_enable_zero_touch_cmd_arg = CmdArg(
272 '--enable_zero_touch', action='store_true',
273 help='Set attested_device_id for zero-touch feature.')
274
chuntsenaf1232f2019-03-20 15:45:54 +0800275
Yilun Lin34f54802017-11-16 11:58:25 +0800276@Command(
277 'verify_ec_key',
278 _ec_pubkey_path_cmd_arg,
279 _ec_pubkey_hash_cmd_arg)
280def VerifyECKey(options):
281 """Verify EC key."""
282 return GetGooftool(options).VerifyECKey(
283 options.ec_pubkey_path, options.ec_pubkey_hash)
284
285
Philip Chen84c16262020-07-30 17:35:27 -0700286@Command('verify_fp_key')
287def VerifyFpKey(options):
288 """Verify fingerprint firmware key."""
289 return GetGooftool(options).VerifyFpKey()
290
291
Hung-Te Line1d80f62016-03-31 14:58:13 +0800292@Command('verify_keys',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800293 _release_rootfs_cmd_arg,
294 _firmware_path_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800295def VerifyKeys(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800296 """Verify keys in firmware and SSD match."""
Hung-Te Line1d80f62016-03-31 14:58:13 +0800297 return GetGooftool(options).VerifyKeys(
Hung-Te Lincdb96522016-04-15 16:51:10 +0800298 options.release_rootfs, options.firmware_path)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800299
300
301@Command('set_fw_bitmap_locale')
Peter Shihfdf17682017-05-26 11:38:39 +0800302def SetFirmwareBitmapLocale(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800303 """Use VPD locale value to set firmware bitmap default language."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800304
Ricky Lianga70a1202013-03-15 15:03:17 +0800305 (index, locale) = GetGooftool(options).SetFirmwareBitmapLocale()
Andy Cheng2582d292012-12-04 17:38:28 +0800306 logging.info('Firmware bitmap initial locale set to %d (%s).',
307 index, locale)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800308
309
Hung-Te Line1d80f62016-03-31 14:58:13 +0800310@Command('verify_system_time',
Wei-Han Chen2790d2e2019-01-18 21:13:40 +0800311 _release_rootfs_cmd_arg,
312 _rma_mode_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800313def VerifySystemTime(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800314 """Verify system time is later than release filesystem creation time."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800315
Wei-Han Chen2790d2e2019-01-18 21:13:40 +0800316 return GetGooftool(options).VerifySystemTime(options.release_rootfs,
317 rma_mode=options.rma_mode)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800318
319
Hung-Te Line1d80f62016-03-31 14:58:13 +0800320@Command('verify_rootfs',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800321 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800322def VerifyRootFs(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800323 """Verify rootfs on SSD is valid by checking hash."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800324
Hung-Te Line1d80f62016-03-31 14:58:13 +0800325 return GetGooftool(options).VerifyRootFs(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800326
Hung-Te Lin56b18402015-01-16 14:52:30 +0800327
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800328@Command('verify_tpm')
Peter Shihfdf17682017-05-26 11:38:39 +0800329def VerifyTPM(options):
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800330 """Verify TPM is cleared."""
331
332 return GetGooftool(options).VerifyTPM()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800333
Hung-Te Lin56b18402015-01-16 14:52:30 +0800334
Hung-Te Lindd708d42014-07-11 17:05:01 +0800335@Command('verify_me_locked')
Peter Shihfdf17682017-05-26 11:38:39 +0800336def VerifyManagementEngineLocked(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800337 """Verify Management Engine is locked."""
Hung-Te Lindd708d42014-07-11 17:05:01 +0800338
339 return GetGooftool(options).VerifyManagementEngineLocked()
340
Hung-Te Lin56b18402015-01-16 14:52:30 +0800341
Marco Chena681b2e2018-08-31 11:41:41 +0800342@Command('verify_switch_wp',
343 _no_ectool_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800344def VerifyWPSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800345 """Verify hardware write protection switch is enabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800346
Marco Chena681b2e2018-08-31 11:41:41 +0800347 GetGooftool(options).VerifyWPSwitch(options.has_ectool)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800348
349
Hung-Te Lin53c49402017-07-26 13:10:58 +0800350@Command('verify_vpd')
351def VerifyVPD(options):
352 """Verify that VPD values are properly set.
Jon Salzadd90d32014-04-29 16:16:27 +0800353
Hung-Te Lin53c49402017-07-26 13:10:58 +0800354 Check if mandatory fields are set, and deprecated fields don't exist.
Jon Salzadd90d32014-04-29 16:16:27 +0800355 """
Hung-Te Lin53c49402017-07-26 13:10:58 +0800356 return GetGooftool(options).VerifyVPD()
Jon Salzadd90d32014-04-29 16:16:27 +0800357
358
bowgotsai13820f42015-09-10 23:18:04 +0800359@Command('verify_release_channel',
360 _enforced_release_channels_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800361def VerifyReleaseChannel(options):
bowgotsai529139c2015-05-30 01:39:49 +0800362 """Verify that release image channel is correct.
363
364 ChromeOS has four channels: canary, dev, beta and stable.
365 The last three channels support image auto-updates, checks
366 that release image channel is one of them.
367 """
bowgotsai13820f42015-09-10 23:18:04 +0800368 return GetGooftool(options).VerifyReleaseChannel(
369 options.enforced_release_channels)
bowgotsai529139c2015-05-30 01:39:49 +0800370
371
Wei-Han Chen0de7cfd2020-01-03 16:49:20 +0800372@Command('verify_cros_config')
373def VerifyCrosConfig(options):
374 """Verify entries in cros config make sense."""
375 return GetGooftool(options).VerifyCrosConfig()
376
377
Stimim Chenc9fbdfc2020-05-21 17:00:53 +0800378@Command('verify-sn-bits',
379 _enable_zero_touch_cmd_arg)
Stimim Chen8aaa2952020-05-20 13:04:24 +0800380def VerifySnBits(options):
Stimim Chenc9fbdfc2020-05-21 17:00:53 +0800381 if options.enable_zero_touch:
382 GetGooftool(options).VerifySnBits()
Stimim Chen8aaa2952020-05-20 13:04:24 +0800383
384
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800385@Command('write_protect')
Peter Shihfdf17682017-05-26 11:38:39 +0800386def EnableFwWp(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800387 """Enable then verify firmware write protection."""
Peter Shihfdf17682017-05-26 11:38:39 +0800388 del options # Unused.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800389
Yong Hongdad230a2017-08-30 22:25:19 +0800390 def WriteProtect(fw):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800391 """Calculate protection size, then invoke flashrom.
392
Yong Hongdad230a2017-08-30 22:25:19 +0800393 The region (offset and size) to write protect may be different per chipset
394 and firmware layout, so we have to read the WP_RO section from FMAP to
395 decide that.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800396 """
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800397 wp_section = 'WP_RO'
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800398
Yong Hongdad230a2017-08-30 22:25:19 +0800399 fmap_image = fw.GetFirmwareImage(
400 sections=(['FMAP'] if fw.target == crosfw.TARGET_MAIN else None))
401 if not fmap_image.has_section(wp_section):
402 raise Error('Could not find %s firmware section: %s' %
403 (fw.target.upper(), wp_section))
404
405 section_data = fw.GetFirmwareImage(
406 sections=[wp_section]).get_section_area(wp_section)
Peter Shihe6afab32018-09-11 17:16:48 +0800407 ro_offset, ro_size = section_data[0:2]
Yong Hongdad230a2017-08-30 22:25:19 +0800408
409 logging.debug('write protecting %s [off=%x size=%x]', fw.target.upper(),
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800410 ro_offset, ro_size)
Yong Hongdad230a2017-08-30 22:25:19 +0800411 crosfw.Flashrom(fw.target).EnableWriteProtection(ro_offset, ro_size)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800412
Philip Chendbb06202019-11-05 17:24:26 -0800413 if HasFpmcu():
414 # TODO(b/143991572): Implement enable_fpmcu_write_protection in gooftool.
415 cmd = os.path.join(
416 paths.FACTORY_DIR, 'sh', 'enable_fpmcu_write_protection.sh')
417 cmd_result = Shell(cmd)
418 if not cmd_result.success:
419 raise Error(
420 'Failed to enable FPMCU write protection, stdout=%r, stderr=%r' %
421 (cmd_result.stdout, cmd_result.stderr))
422
Yong Hongdad230a2017-08-30 22:25:19 +0800423 WriteProtect(crosfw.LoadMainFirmware())
Andy Cheng0465d132013-03-20 12:12:06 +0800424 event_log.Log('wp', fw='main')
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800425
Fei Shao21be8242020-04-13 16:57:51 +0800426 # Some EC (mostly PD) does not support "RO_NOW". Instead they will only set
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800427 # "RO_AT_BOOT" when you request to enable RO (These platforms consider
428 # --wp-range with right range identical to --wp-enable), and requires a
429 # 'ectool reboot_ec RO at-shutdown; reboot' to let the RO take effect.
Hung-Te Lin0d10b562016-12-28 10:58:07 +0800430 # After reboot, "flashrom -p host --wp-status" will return protected range.
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800431 # If you don't reboot, returned range will be (0, 0), and running command
432 # "ectool flashprotect" will not have RO_NOW.
Fei Shao21be8242020-04-13 16:57:51 +0800433 # generic_common.test_list.json provides "EnableECWriteProtect" test group
434 # which can be run individually before finalization. Try that out if you're
435 # having trouble enabling RO_NOW flag.
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800436
Yong Hongdad230a2017-08-30 22:25:19 +0800437 for fw in [crosfw.LoadEcFirmware(), crosfw.LoadPDFirmware()]:
438 if fw.GetChipId() is None:
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800439 logging.warning('%s not write protected (seems there is no %s flash).',
Yong Hongdad230a2017-08-30 22:25:19 +0800440 fw.target.upper(), fw.target.upper())
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800441 continue
Yong Hongdad230a2017-08-30 22:25:19 +0800442 WriteProtect(fw)
443 event_log.Log('wp', fw=fw.target)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800444
445
446@Command('clear_gbb_flags')
Peter Shihfdf17682017-05-26 11:38:39 +0800447def ClearGBBFlags(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800448 """Zero out the GBB flags, in preparation for transition to release state.
449
450 No GBB flags are set in release/shipping state, but they are useful
Hung-Te Lin879cff42017-06-19 12:46:37 +0800451 for factory/development. See "futility gbb --flags" for details.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800452 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800453
Ricky Lianga70a1202013-03-15 15:03:17 +0800454 GetGooftool(options).ClearGBBFlags()
Andy Cheng0465d132013-03-20 12:12:06 +0800455 event_log.Log('clear_gbb_flags')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800456
457
Jon Salzaa3a30e2013-05-15 15:56:28 +0800458@Command('clear_factory_vpd_entries')
Peter Shihfdf17682017-05-26 11:38:39 +0800459def ClearFactoryVPDEntries(options):
Jon Salzaa3a30e2013-05-15 15:56:28 +0800460 """Clears factory.* items in the RW VPD."""
461 entries = GetGooftool(options).ClearFactoryVPDEntries()
462 event_log.Log('clear_factory_vpd_entries', entries=FilterDict(entries))
463
464
Mattias Nisslercca761b2015-04-15 21:53:04 +0200465@Command('generate_stable_device_secret')
Peter Shihfdf17682017-05-26 11:38:39 +0800466def GenerateStableDeviceSecret(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800467 """Generates a fresh stable device secret and stores it in the RO VPD."""
Mattias Nisslercca761b2015-04-15 21:53:04 +0200468 GetGooftool(options).GenerateStableDeviceSecret()
469 event_log.Log('generate_stable_device_secret')
470
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800471
Cheng-Han Yang24d42d92020-08-09 04:53:53 +0800472@Command('cr50_set_ro_hash')
473def Cr50SetROHash(options):
474 GetGooftool(options).Cr50SetROHash()
475 event_log.Log('cr50_set_ro_hash')
476
Stimim Chenda9e62c2020-05-14 15:43:18 +0800477@Command('cr50_set_sn_bits_and_board_id',
478 _rma_mode_cmd_arg)
Yves Arrouyeb49b31e2019-03-06 21:51:52 -0800479def Cr50SetSnBitsAndBoardId(options):
Wei-Han Chen66357592020-01-14 15:15:37 +0800480 """Deprecated: use Cr50WriteFlashInfo instead."""
481 logging.warning('This function is renamed to Cr50WriteFlashInfo')
482 Cr50WriteFlashInfo(options)
483
484
Stimim Chen60f7bb22020-04-07 21:02:47 +0800485@Command('cr50_write_flash_info',
Stimim Chenda9e62c2020-05-14 15:43:18 +0800486 _rma_mode_cmd_arg,
Stimim Chenc9fbdfc2020-05-21 17:00:53 +0800487 _enable_zero_touch_cmd_arg)
Wei-Han Chen66357592020-01-14 15:15:37 +0800488def Cr50WriteFlashInfo(options):
Yves Arrouyeb49b31e2019-03-06 21:51:52 -0800489 """Set the serial number bits, board id and flags on the Cr50 chip."""
Stimim Chenc9fbdfc2020-05-21 17:00:53 +0800490 GetGooftool(options).Cr50WriteFlashInfo(
491 options.enable_zero_touch, options.rma_mode)
Wei-Han Chen66357592020-01-14 15:15:37 +0800492 event_log.Log('cr50_write_flash_info')
493
494
495@Command('cr50_write_whitelabel_flags')
496def Cr50WriteWhitelabelFlags(options):
497 GetGooftool(options).Cr50WriteWhitelabelFlags()
498 event_log.Log('cr50_write_whitelabel_flags')
Shen-En Shihd078a7c2017-08-04 13:33:49 +0800499
500
Marco Chen20c885d2018-10-04 17:22:03 +0800501@Command('cr50_disable_factory_mode')
Marco Chen44a666d2018-07-13 21:01:50 +0800502def Cr50DisableFactoryMode(options):
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800503 """Reset Cr50 state back to default state after RMA."""
Marco Chen44a666d2018-07-13 21:01:50 +0800504 return GetGooftool(options).Cr50DisableFactoryMode()
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800505
506
Cheng-Han Yang663763b2020-09-15 20:46:23 +0800507@Command('cr50_finalize',
508 _no_write_protect_cmd_arg,
509 _rma_mode_cmd_arg,
510 _enable_zero_touch_cmd_arg)
511def Cr50Finalize(options):
512 """Finalize steps for cr50."""
513 if options.no_write_protect:
514 logging.warning('SWWP is not enabled. Skip setting RO hash.')
515 elif options.rma_mode:
516 logging.warning('RMA mode. Skip setting RO hash.')
517 else:
518 Cr50SetROHash(options)
519 Cr50WriteFlashInfo(options)
520 Cr50DisableFactoryMode(options)
521
522
Earl Ou564a7872016-10-05 10:22:00 +0800523@Command('enable_release_partition',
524 CmdArg('--release_rootfs',
525 help=('path to the release rootfs device. If not specified, '
526 'the default (5th) partition will be used.')))
527def EnableReleasePartition(options):
528 """Enables a release image partition on the disk."""
529 GetGooftool(options).EnableReleasePartition(options.release_rootfs)
530
531
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800532@Command('wipe_in_place',
533 CmdArg('--fast', action='store_true',
Shun-Hsing Ou8d3c40a2015-10-08 18:16:08 +0800534 help='use non-secure but faster wipe method.'),
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800535 _shopfloor_url_args_cmd_arg,
536 _station_ip_cmd_arg,
537 _station_port_cmd_arg,
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800538 _wipe_finish_token_cmd_arg,
539 _test_umount_cmd_arg)
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800540def WipeInPlace(options):
541 """Start factory wipe directly without reboot."""
542
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800543 GetGooftool(options).WipeInPlace(options.fast,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800544 options.shopfloor_url,
545 options.station_ip,
546 options.station_port,
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800547 options.wipe_finish_token,
548 options.test_umount)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200549
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800550@Command('wipe_init',
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800551 CmdArg('--wipe_args', help='arguments for clobber-state'),
552 CmdArg('--state_dev', help='path to stateful partition device'),
553 CmdArg('--root_disk', help='path to primary device'),
554 CmdArg('--old_root', help='path to old root'),
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800555 _shopfloor_url_args_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800556 _release_rootfs_cmd_arg,
557 _station_ip_cmd_arg,
558 _station_port_cmd_arg,
Wei-Han Chenf3924112019-02-25 14:52:58 +0800559 _wipe_finish_token_cmd_arg,
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800560 _keep_developer_mode_flag_after_clobber_state_cmd_arg,
561 _test_umount_cmd_arg)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800562def WipeInit(options):
Wei-Han Chenf3924112019-02-25 14:52:58 +0800563 GetGooftool(options).WipeInit(
564 options.wipe_args,
565 options.shopfloor_url,
566 options.state_dev,
567 options.release_rootfs,
568 options.root_disk,
569 options.old_root,
570 options.station_ip,
571 options.station_port,
572 options.wipe_finish_token,
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800573 options.keep_developer_mode_flag_after_clobber_state,
574 options.test_umount)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800575
Stimim Chen8aaa2952020-05-20 13:04:24 +0800576
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800577@Command('verify',
Tammo Spalink95c43732012-07-25 15:57:14 -0700578 _hwid_status_list_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800579 _hwdb_path_cmd_arg,
Yong Hong5408f652017-07-11 19:20:25 +0800580 _project_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800581 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800582 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800583 _hwid_run_vpd_cmd_arg,
584 _hwid_vpd_data_file_cmd_arg,
Cheng-Han Yang663763b2020-09-15 20:46:23 +0800585 _no_write_protect_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800586 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800587 _cros_core_cmd_arg,
Pin-Yen Lin215b7542020-05-05 09:45:37 +0800588 _has_ec_pubkey_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800589 _ec_pubkey_path_cmd_arg,
590 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800591 _release_rootfs_cmd_arg,
592 _firmware_path_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800593 _enforced_release_channels_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800594 _waive_list_cmd_arg,
Marco Chena681b2e2018-08-31 11:41:41 +0800595 _skip_list_cmd_arg,
Stimim Chenc9fbdfc2020-05-21 17:00:53 +0800596 _no_ectool_cmd_arg,
597 _enable_zero_touch_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800598def Verify(options):
599 """Verifies if whole factory process is ready for finalization.
600
601 This routine performs all the necessary checks to make sure the
602 device is ready to be finalized, but does not modify state. These
603 checks include dev switch, firmware write protection switch, hwid,
604 system time, keys, and root file system.
605 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800606
Hung-Te Lin6d827542012-07-19 11:50:41 +0800607 if not options.no_write_protect:
Ricky Lianga70a1202013-03-15 15:03:17 +0800608 VerifyWPSwitch(options)
Hung-Te Lindd708d42014-07-11 17:05:01 +0800609 VerifyManagementEngineLocked(options)
Ting Shen129fa6f2016-09-02 12:22:24 +0800610 VerifyHWID(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800611 VerifySystemTime(options)
Pin-Yen Lin215b7542020-05-05 09:45:37 +0800612 if options.has_ec_pubkey:
Yilun Lin599833f2017-12-22 14:07:46 +0800613 VerifyECKey(options)
Philip Chen84c16262020-07-30 17:35:27 -0700614 if HasFpmcu():
615 VerifyFpKey(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800616 VerifyKeys(options)
617 VerifyRootFs(options)
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800618 VerifyTPM(options)
Hung-Te Lin53c49402017-07-26 13:10:58 +0800619 VerifyVPD(options)
bowgotsai529139c2015-05-30 01:39:49 +0800620 VerifyReleaseChannel(options)
Wei-Han Chen0de7cfd2020-01-03 16:49:20 +0800621 VerifyCrosConfig(options)
Stimim Chen8aaa2952020-05-20 13:04:24 +0800622 VerifySnBits(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800623
Hung-Te Lin56b18402015-01-16 14:52:30 +0800624
Jon Salzfe9036f2014-01-16 14:11:23 +0800625@Command('untar_stateful_files')
Hung-Te Lin388bce22014-06-03 19:56:40 +0800626def UntarStatefulFiles(unused_options):
Jon Salzfe9036f2014-01-16 14:11:23 +0800627 """Untars stateful files from stateful_files.tar.xz on stateful partition.
628
629 If that file does not exist (which should only be R30 and earlier),
630 this is a no-op.
631 """
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800632 # Path to stateful partition on device.
633 device_stateful_path = '/mnt/stateful_partition'
634 tar_file = os.path.join(device_stateful_path, 'stateful_files.tar.xz')
Jon Salzfe9036f2014-01-16 14:11:23 +0800635 if os.path.exists(tar_file):
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800636 Spawn(['tar', 'xf', tar_file], cwd=device_stateful_path,
Jon Salzfe9036f2014-01-16 14:11:23 +0800637 log=True, check_call=True)
638 else:
639 logging.warning('No stateful files at %s', tar_file)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800640
Jon Salz40b9f822014-07-25 16:39:55 +0800641
642@Command('log_source_hashes')
Peter Shihfdf17682017-05-26 11:38:39 +0800643def LogSourceHashes(options):
Jon Salz40b9f822014-07-25 16:39:55 +0800644 """Logs hashes of source files in the factory toolkit."""
Peter Shihfdf17682017-05-26 11:38:39 +0800645 del options # Unused.
Jon Salze60307f2014-08-05 16:20:00 +0800646 # WARNING: The following line is necessary to validate the integrity
647 # of the factory software. Do not remove or modify it.
648 #
649 # 警告:此行会验证工厂软件的完整性,禁止删除或修改。
Wei-Han Chena5c01a02016-04-23 19:27:19 +0800650 factory_par = sys_utils.GetRunningFactoryPythonArchivePath()
651 if factory_par:
652 event_log.Log(
653 'source_hashes',
654 **file_utils.HashPythonArchive(factory_par))
655 else:
656 event_log.Log(
657 'source_hashes',
Peter Shihad166772017-05-31 11:36:17 +0800658 **file_utils.HashSourceTree(os.path.join(paths.FACTORY_DIR, 'py')))
Jon Salz40b9f822014-07-25 16:39:55 +0800659
660
Tammo Spalink86a61c62012-05-25 15:10:35 +0800661@Command('log_system_details')
Peter Shihfdf17682017-05-26 11:38:39 +0800662def LogSystemDetails(options):
Tammo Spalink86a61c62012-05-25 15:10:35 +0800663 """Write miscellaneous system details to the event log."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800664
Ricky Liang43b879b2014-02-24 11:36:55 +0800665 event_log.Log('system_details', **GetGooftool(options).GetSystemDetails())
Tammo Spalink86a61c62012-05-25 15:10:35 +0800666
667
Jon Salza88b83b2013-05-27 20:00:35 +0800668def CreateReportArchiveBlob(*args, **kwargs):
669 """Creates a report archive and returns it as a blob.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800670
Jon Salza88b83b2013-05-27 20:00:35 +0800671 Args:
672 See CreateReportArchive.
Andy Cheng7a76cb82012-11-19 18:08:19 +0800673
Jon Salza88b83b2013-05-27 20:00:35 +0800674 Returns:
Yilin Yange02d5722019-10-23 11:07:36 +0800675 An xmlrpc.client.Binary object containing a .tar.xz file.
Jon Salza88b83b2013-05-27 20:00:35 +0800676 """
Wei-Han Chen47416612016-09-14 17:41:52 +0800677 report_archive = CreateReportArchive(*args, **kwargs)
678 try:
Yilin Yangf6994c22019-12-09 16:17:21 +0800679 return xmlrpc.client.Binary(
680 file_utils.ReadFile(report_archive, encoding=None))
Wei-Han Chen47416612016-09-14 17:41:52 +0800681 finally:
682 os.unlink(report_archive)
Jon Salza88b83b2013-05-27 20:00:35 +0800683
684
685def CreateReportArchive(device_sn=None, add_file=None):
686 """Creates a report archive in a temporary directory.
687
688 Args:
689 device_sn: The device serial number (optional).
690 add_file: A list of files to add (optional).
691
692 Returns:
693 Path to the archive.
694 """
Philip Chen6ada02c2019-11-04 19:41:54 +0000695 # Flush Testlog data to DATA_TESTLOG_DIR before creating a report archive.
696 result, reason = state.GetInstance().FlushTestlog(
697 uplink=False, local=True, timeout=10)
698 if not result:
699 logging.warning('Failed to flush testlog data: %s', reason)
700
Hung-Te Lin6bd16472012-06-20 16:26:47 +0800701 def NormalizeAsFileName(token):
702 return re.sub(r'\W+', '', token).strip()
Jon Salza88b83b2013-05-27 20:00:35 +0800703
704 target_name = '%s%s.tar.xz' % (
705 time.strftime('%Y%m%dT%H%M%SZ',
706 time.gmtime()),
Hung-Te Lin56b18402015-01-16 14:52:30 +0800707 ('' if device_sn is None else
708 '_' + NormalizeAsFileName(device_sn)))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800709 target_path = os.path.join(gettempdir(), target_name)
Jon Salza88b83b2013-05-27 20:00:35 +0800710
Tammo Spalink86a61c62012-05-25 15:10:35 +0800711 # Intentionally ignoring dotfiles in EVENT_LOG_DIR.
Pi-Hsun Shih1f569a72019-12-26 11:23:56 +0800712 tar_cmd = 'cd %s ; tar cJf %s * -C /' % (event_log.EVENT_LOG_DIR, target_path)
Jongpil Jung23355a92019-12-31 14:38:29 +0900713 tar_files = [paths.FACTORY_LOG_PATH, paths.DATA_TESTLOG_DIR]
714 if add_file:
715 tar_files = tar_files + add_file
Pi-Hsun Shih1f569a72019-12-26 11:23:56 +0800716 for f in tar_files:
717 # Require absolute paths since we use -C / to change current directory to
718 # root.
719 if not f.startswith('/'):
720 raise Error('Not an absolute path: %s' % f)
721 if not os.path.exists(f):
722 raise Error('File does not exist: %s' % f)
723 tar_cmd += ' %s' % pipes.quote(f[1:])
Tammo Spalink86a61c62012-05-25 15:10:35 +0800724 cmd_result = Shell(tar_cmd)
Jon Salzff88c022012-11-03 12:19:58 +0800725
Hung-Te Lin3756c432020-01-16 11:30:46 +0800726 if cmd_result.status == 1:
727 # tar returns 1 when some files were changed during archiving,
728 # but that is expected for log files so should ignore such failure
729 # if the archive looks good.
Pi-Hsun Shih1f569a72019-12-26 11:23:56 +0800730 Spawn(['tar', 'tJf', target_path], check_call=True, log=True,
Jon Salzff88c022012-11-03 12:19:58 +0800731 ignore_stdout=True)
732 elif not cmd_result.success:
Tammo Spalink86a61c62012-05-25 15:10:35 +0800733 raise Error('unable to tar event logs, cmd %r failed, stderr: %r' %
734 (tar_cmd, cmd_result.stderr))
Jon Salzff88c022012-11-03 12:19:58 +0800735
Jon Salza88b83b2013-05-27 20:00:35 +0800736 return target_path
737
738_upload_method_cmd_arg = CmdArg(
739 '--upload_method', metavar='METHOD:PARAM',
740 help=('How to perform the upload. METHOD should be one of '
Kevin Line4c64de2019-11-22 15:28:34 +0800741 '{ftp, shopfloor, ftps, cpfe, smb}.'))
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800742_upload_max_retry_times_arg = CmdArg(
743 '--upload_max_retry_times', type=int, default=0,
744 help='Number of tries to upload. 0 to retry infinitely.')
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800745_upload_retry_interval_arg = CmdArg(
746 '--upload_retry_interval', type=int, default=None,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800747 help='Retry interval in seconds.')
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800748_upload_allow_fail_arg = CmdArg(
749 '--upload_allow_fail', action='store_true',
750 help='Continue finalize if report upload fails.')
Jon Salza88b83b2013-05-27 20:00:35 +0800751_add_file_cmd_arg = CmdArg(
752 '--add_file', metavar='FILE', action='append',
753 help='Extra file to include in report (must be an absolute path)')
754
Hung-Te Lin56b18402015-01-16 14:52:30 +0800755
Jon Salza88b83b2013-05-27 20:00:35 +0800756@Command('upload_report',
757 _upload_method_cmd_arg,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800758 _upload_max_retry_times_arg,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800759 _upload_retry_interval_arg,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800760 _upload_allow_fail_arg,
Jon Salza88b83b2013-05-27 20:00:35 +0800761 _add_file_cmd_arg)
762def UploadReport(options):
763 """Create a report containing key device details."""
Yong Hong65bda312018-12-13 20:05:58 +0800764 ro_vpd = vpd.VPDTool().GetAllData(partition=vpd.VPD_READONLY_PARTITION_NAME)
Jon Salza88b83b2013-05-27 20:00:35 +0800765 device_sn = ro_vpd.get('serial_number', None)
766 if device_sn is None:
767 logging.warning('RO_VPD missing device serial number')
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +0800768 device_sn = 'MISSING_SN_' + time_utils.TimedUUID()
chuntsena6da2be2019-08-14 17:11:55 +0800769 target_path = CreateReportArchive(device_sn, options.add_file)
Jon Salza88b83b2013-05-27 20:00:35 +0800770
Tammo Spalink86a61c62012-05-25 15:10:35 +0800771 if options.upload_method is None or options.upload_method == 'none':
772 logging.warning('REPORT UPLOAD SKIPPED (report left at %s)', target_path)
773 return
774 method, param = options.upload_method.split(':', 1)
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800775
776 if options.upload_retry_interval is not None:
777 retry_interval = options.upload_retry_interval
778 else:
779 retry_interval = report_upload.DEFAULT_RETRY_INTERVAL
780
Tammo Spalink86a61c62012-05-25 15:10:35 +0800781 if method == 'shopfloor':
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800782 report_upload.ShopFloorUpload(
783 target_path, param,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800784 'GRT' if options.command_name == 'finalize' else None,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800785 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800786 retry_interval=retry_interval,
787 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800788 elif method == 'ftp':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800789 report_upload.FtpUpload(target_path, 'ftp:' + param,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800790 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800791 retry_interval=retry_interval,
792 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800793 elif method == 'ftps':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800794 report_upload.CurlUrlUpload(target_path, '--ftp-ssl-reqd ftp:%s' % param,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800795 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800796 retry_interval=retry_interval,
797 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800798 elif method == 'cpfe':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800799 report_upload.CpfeUpload(target_path, pipes.quote(param),
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800800 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800801 retry_interval=retry_interval,
802 allow_fail=options.upload_allow_fail)
Kevin Line4c64de2019-11-22 15:28:34 +0800803 elif method == 'smb':
804 # param should be in form: <dest_path>.
805 report_upload.SmbUpload(target_path, 'smb:' + param,
806 max_retry_times=options.upload_max_retry_times,
807 retry_interval=retry_interval,
808 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800809 else:
Peter Shihbf6f22b2018-02-26 14:05:28 +0800810 raise Error('unknown report upload method %r' % method)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800811
812
813@Command('finalize',
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800814 CmdArg('--fast', action='store_true',
815 help='use non-secure but faster wipe method.'),
Yong Hongb2926bd2018-10-12 14:11:14 +0800816 _no_ectool_cmd_arg,
Shun-Hsing Oudb407d62015-11-11 11:03:59 +0800817 _shopfloor_url_args_cmd_arg,
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800818 _hwdb_path_cmd_arg,
Tammo Spalink95c43732012-07-25 15:57:14 -0700819 _hwid_status_list_cmd_arg,
Jon Salz65266432012-07-30 19:02:49 +0800820 _upload_method_cmd_arg,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800821 _upload_max_retry_times_arg,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800822 _upload_retry_interval_arg,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800823 _upload_allow_fail_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800824 _add_file_cmd_arg,
825 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800826 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800827 _hwid_run_vpd_cmd_arg,
828 _hwid_vpd_data_file_cmd_arg,
Cheng-Han Yang663763b2020-09-15 20:46:23 +0800829 _no_write_protect_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800830 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800831 _cros_core_cmd_arg,
Pin-Yen Lin215b7542020-05-05 09:45:37 +0800832 _has_ec_pubkey_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800833 _ec_pubkey_path_cmd_arg,
834 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800835 _release_rootfs_cmd_arg,
836 _firmware_path_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800837 _enforced_release_channels_cmd_arg,
838 _station_ip_cmd_arg,
839 _station_port_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800840 _wipe_finish_token_cmd_arg,
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800841 _rlz_embargo_end_date_offset_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800842 _waive_list_cmd_arg,
chuntsenaf1232f2019-03-20 15:45:54 +0800843 _skip_list_cmd_arg,
Stimim Chenc9fbdfc2020-05-21 17:00:53 +0800844 _no_generate_mfg_date_cmd_arg,
845 _enable_zero_touch_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800846def Finalize(options):
847 """Verify system readiness and trigger transition into release state.
848
Jon Salzaa3a30e2013-05-15 15:56:28 +0800849 This routine does the following:
850 - Verifies system state (see verify command)
Jon Salzfe9036f2014-01-16 14:11:23 +0800851 - Untars stateful_files.tar.xz, if it exists, in the stateful partition, to
852 initialize files such as the CRX cache
Jon Salzaa3a30e2013-05-15 15:56:28 +0800853 - Modifies firmware bitmaps to match locale
854 - Clears all factory-friendly flags from the GBB
855 - Removes factory-specific entries from RW_VPD (factory.*)
856 - Enables firmware write protection (cannot rollback after this)
Marco Chenecee04f2019-02-15 22:24:24 +0800857 - Initialize Fpmcu entropy
Jon Salzaa3a30e2013-05-15 15:56:28 +0800858 - Uploads system logs & reports
Earl Ou51182222016-09-09 12:16:48 +0800859 - Wipes the testing kernel, rootfs, and stateful partition
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800860 """
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800861 if not options.rma_mode:
862 # Write VPD values related to RLZ ping into VPD.
863 GetGooftool(options).WriteVPDForRLZPing(options.embargo_offset)
chuntsenaf1232f2019-03-20 15:45:54 +0800864 if options.generate_mfg_date:
865 GetGooftool(options).WriteVPDForMFGDate()
Cheng-Han Yang663763b2020-09-15 20:46:23 +0800866 Cr50Finalize(options)
Marco Chen9d0631c2018-08-31 10:52:44 +0800867 Verify(options)
Jon Salz40b9f822014-07-25 16:39:55 +0800868 LogSourceHashes(options)
Jon Salzfe9036f2014-01-16 14:11:23 +0800869 UntarStatefulFiles(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800870 if options.cros_core:
871 logging.info('SetFirmwareBitmapLocale is skipped for ChromeOS Core device.')
872 else:
873 SetFirmwareBitmapLocale(options)
Jon Salzaa3a30e2013-05-15 15:56:28 +0800874 ClearFactoryVPDEntries(options)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200875 GenerateStableDeviceSecret(options)
Shen-En Shih3e079b22017-09-11 05:43:09 -0700876 ClearGBBFlags(options)
Hung-Te Lin6d827542012-07-19 11:50:41 +0800877 if options.no_write_protect:
Pi-Hsun Shih1f569a72019-12-26 11:23:56 +0800878 logging.warning('WARNING: Firmware Write Protection is SKIPPED.')
Andy Cheng0465d132013-03-20 12:12:06 +0800879 event_log.Log('wp', fw='both', status='skipped')
Hung-Te Lin6d827542012-07-19 11:50:41 +0800880 else:
Wei-Han Chenba21f512016-10-14 18:52:33 +0800881 EnableFwWp(options)
Marco Chenecee04f2019-02-15 22:24:24 +0800882 FpmcuInitializeEntropy(options)
Jon Salza0f58e02012-05-29 19:33:39 +0800883 LogSystemDetails(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800884 UploadReport(options)
Earl Ou51182222016-09-09 12:16:48 +0800885
886 event_log.Log('wipe_in_place')
887 wipe_args = []
Earl Ou51182222016-09-09 12:16:48 +0800888 if options.shopfloor_url:
889 wipe_args += ['--shopfloor_url', options.shopfloor_url]
890 if options.fast:
891 wipe_args += ['--fast']
892 if options.station_ip:
893 wipe_args += ['--station_ip', options.station_ip]
894 if options.station_port:
895 wipe_args += ['--station_port', options.station_port]
896 if options.wipe_finish_token:
897 wipe_args += ['--wipe_finish_token', options.wipe_finish_token]
898 ExecFactoryPar('gooftool', 'wipe_in_place', *wipe_args)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800899
900
Ting Shen129fa6f2016-09-02 12:22:24 +0800901@Command('verify_hwid',
902 _probe_results_cmd_arg,
903 _hwdb_path_cmd_arg,
904 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800905 _hwid_run_vpd_cmd_arg,
906 _hwid_vpd_data_file_cmd_arg,
Ting Shen129fa6f2016-09-02 12:22:24 +0800907 _rma_mode_cmd_arg)
908def VerifyHWID(options):
Ricky Liangc662be32013-12-24 11:50:23 +0800909 """A simple wrapper that calls out to HWID utils to verify version 3 HWID.
Ricky Liang53390232013-03-08 15:37:57 +0800910
Ricky Liangc662be32013-12-24 11:50:23 +0800911 This is mainly for Gooftool to verify v3 HWID during finalize. For testing
912 and development purposes, please use `hwid` command.
Ricky Liang53390232013-03-08 15:37:57 +0800913 """
Yong Hongada8e0e2018-01-04 16:36:21 +0800914 database = GetGooftool(options).db
Yong Hong68a0e0d2017-12-20 19:06:54 +0800915
Yong Hongada8e0e2018-01-04 16:36:21 +0800916 encoded_string = options.hwid or GetGooftool(options).ReadHWID()
917
918 probed_results = hwid_utils.GetProbedResults(infile=options.probe_results)
Yong Hong2c39bf22018-01-24 22:24:11 +0800919 device_info = hwid_utils.GetDeviceInfo()
Yong Hong65bda312018-12-13 20:05:58 +0800920 vpd_data = hwid_utils.GetVPDData(run_vpd=options.hwid_run_vpd,
921 infile=options.hwid_vpd_data_file)
Ricky Liang53390232013-03-08 15:37:57 +0800922
Hung-Te Lin11052952015-03-18 13:48:59 +0800923 event_log.Log('probed_results', probed_results=FilterDict(probed_results))
Yong Hong65bda312018-12-13 20:05:58 +0800924 event_log.Log('vpd', vpd=FilterDict(vpd_data))
Ricky Liang53390232013-03-08 15:37:57 +0800925
Yong Hong2c39bf22018-01-24 22:24:11 +0800926 hwid_utils.VerifyHWID(database, encoded_string, probed_results,
Yong Hong65bda312018-12-13 20:05:58 +0800927 device_info, vpd_data, options.rma_mode)
Ricky Liang53390232013-03-08 15:37:57 +0800928
Ricky Liangc662be32013-12-24 11:50:23 +0800929 event_log.Log('verified_hwid', hwid=encoded_string)
Ricky Liang53390232013-03-08 15:37:57 +0800930
931
henryhsu44d793a2013-07-20 00:07:38 +0800932@Command('get_firmware_hash',
Marco Chence70b132018-05-03 23:43:39 +0800933 CmdArg('--file', required=True, metavar='FILE', help='Firmware File.'))
henryhsu44d793a2013-07-20 00:07:38 +0800934def GetFirmwareHash(options):
henryhsuf6f835c2013-07-20 20:49:25 +0800935 """Get firmware hash from a file"""
henryhsu44d793a2013-07-20 00:07:38 +0800936 if os.path.exists(options.file):
Cheng-Han Yang2c668ae2018-04-18 22:31:07 +0800937 value_dict = chromeos_firmware.CalculateFirmwareHashes(options.file)
Yilin Yang879fbda2020-05-14 13:52:30 +0800938 for key, value in value_dict.items():
Yilin Yang71e39412019-09-24 09:26:46 +0800939 print(' %s: %s' % (key, value))
henryhsu44d793a2013-07-20 00:07:38 +0800940 else:
941 raise Error('File does not exist: %s' % options.file)
942
henryhsuf6f835c2013-07-20 20:49:25 +0800943
Philip Chen04fb90b2019-11-06 12:10:33 -0800944@Command('fpmcu_initialize_entropy')
Marco Chenecee04f2019-02-15 22:24:24 +0800945def FpmcuInitializeEntropy(options):
946 """Initialze entropy of FPMCU."""
Philip Chen04fb90b2019-11-06 12:10:33 -0800947
948 if HasFpmcu():
Marco Chenecee04f2019-02-15 22:24:24 +0800949 GetGooftool(options).FpmcuInitializeEntropy()
Philip Chen04fb90b2019-11-06 12:10:33 -0800950 else:
951 logging.info('No FPS on this board.')
Marco Chenecee04f2019-02-15 22:24:24 +0800952
953
Peter Shihfdf17682017-05-26 11:38:39 +0800954def main():
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800955 """Run sub-command specified by the command line args."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800956
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800957 options = ParseCmdline(
Ting Shen129fa6f2016-09-02 12:22:24 +0800958 'Perform Google required factory tests.',
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800959 CmdArg('-l', '--log', metavar='PATH',
960 help='Write logs to this file.'),
Jon Salza4bea382012-10-29 13:00:34 +0800961 CmdArg('--suppress-event-logs', action='store_true',
962 help='Suppress event logging.'),
Wei-Han Chenaff56232016-04-16 09:17:59 +0800963 CmdArg('--phase', default=None,
964 help=('override phase for phase checking (defaults to the current '
965 'as returned by the "factory phase" command)')),
Wei-Han Chenb34bdff2019-09-26 13:07:50 +0800966 VERBOSITY_CMD_ARG)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800967 SetupLogging(options.verbosity, options.log)
Andy Cheng0465d132013-03-20 12:12:06 +0800968 event_log.SetGlobalLoggerDefaultPrefix('gooftool')
969 event_log.GetGlobalLogger().suppress = options.suppress_event_logs
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800970 logging.debug('gooftool options: %s', repr(options))
Wei-Han Chenaff56232016-04-16 09:17:59 +0800971
972 phase.OverridePhase(options.phase)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800973 try:
974 logging.debug('GOOFTOOL command %r', options.command_name)
975 options.command(options)
976 logging.info('GOOFTOOL command %r SUCCESS', options.command_name)
Peter Shih6674ecf2018-03-29 14:04:57 +0800977 except Error as e:
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800978 logging.exception(e)
979 sys.exit('GOOFTOOL command %r ERROR: %s' % (options.command_name, e))
Peter Shih6674ecf2018-03-29 14:04:57 +0800980 except Exception as e:
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800981 logging.exception(e)
982 sys.exit('UNCAUGHT RUNTIME EXCEPTION %s' % e)
983
984
985if __name__ == '__main__':
Peter Shihfdf17682017-05-26 11:38:39 +0800986 main()