blob: 44b21f4907fb4162e94ac74fc81e44b82a5acb54 [file] [log] [blame]
You-Cheng Syuf0f4be12017-12-05 16:33:53 +08001#!/usr/bin/env python
Jon Salze60307f2014-08-05 16:20:00 +08002# -*- coding: utf-8 -*-
3# Copyright 2014 The Chromium OS Authors. All rights reserved.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08004# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
Jon Salze60307f2014-08-05 16:20:00 +08007
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08008"""Google Factory Tool.
9
You-Cheng Syu461ec032017-03-06 15:56:58 +080010This tool is intended to be used on factory assembly lines. It
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080011provides all of the Google required test functionality and must be run
12on each device as part of the assembly process.
13"""
14
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080015import logging
16import os
Jon Salz65266432012-07-30 19:02:49 +080017import pipes
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080018import re
19import sys
Peter Shihfdf17682017-05-26 11:38:39 +080020from tempfile import gettempdir
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080021import threading
Hung-Te Lin6bd16472012-06-20 16:26:47 +080022import time
Jon Salza88b83b2013-05-27 20:00:35 +080023import xmlrpclib
Peter Shihfdf17682017-05-26 11:38:39 +080024
Peter Shihfdf17682017-05-26 11:38:39 +080025import factory_common # pylint: disable=unused-import
Wei-Han Chen0a3320e2016-04-23 01:32:07 +080026from cros.factory.gooftool.common import ExecFactoryPar
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080027from cros.factory.gooftool.common import Shell
Peter Shihfdf17682017-05-26 11:38:39 +080028from cros.factory.gooftool.core import Gooftool
29from cros.factory.gooftool import crosfw
Peter Shihfdf17682017-05-26 11:38:39 +080030from cros.factory.gooftool import report_upload
Hung-Te Lin604e0c22015-11-24 15:17:07 +080031from cros.factory.hwid.v3 import hwid_utils
Yong Hong863d3262017-10-30 16:23:34 +080032from cros.factory.probe.functions import chromeos_firmware
Wei-Han Chen2ebb92d2016-01-12 14:51:41 +080033from cros.factory.test.env import paths
Peter Shihfdf17682017-05-26 11:38:39 +080034from cros.factory.test import event_log
Wei-Han Chenaff56232016-04-16 09:17:59 +080035from cros.factory.test.rules import phase
Hung-Te Lin3f096842016-01-13 17:37:06 +080036from cros.factory.test.rules.privacy import FilterDict
Peter Shihfdf17682017-05-26 11:38:39 +080037from cros.factory.utils import argparse_utils
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080038from cros.factory.utils.argparse_utils import CmdArg
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080039from cros.factory.utils.argparse_utils import ParseCmdline
40from cros.factory.utils.argparse_utils import verbosity_cmd_arg
Peter Shihfdf17682017-05-26 11:38:39 +080041from cros.factory.utils.debug_utils import SetupLogging
Jon Salz40b9f822014-07-25 16:39:55 +080042from cros.factory.utils import file_utils
Peter Shih67c7c0f2018-02-26 11:23:59 +080043from cros.factory.utils.process_utils import Spawn
Wei-Han Chena5c01a02016-04-23 19:27:19 +080044from cros.factory.utils import sys_utils
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +080045from cros.factory.utils import time_utils
Joel Kitchingd3bc2662014-12-16 16:03:32 -080046from cros.factory.utils.type_utils import Error
Tammo Spalink86a61c62012-05-25 15:10:35 +080047
Tammo Spalink5c699832012-07-03 17:50:39 +080048
Tammo Spalink5c699832012-07-03 17:50:39 +080049# TODO(tammo): Replace calls to sys.exit with raise Exit, and maybe
50# treat that specially (as a smoot exit, as opposed to the more
51# verbose output for generic Error).
52
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080053_global_gooftool = None
54_gooftool_lock = threading.Lock()
Tammo Spalink5c699832012-07-03 17:50:39 +080055
Hung-Te Lin56b18402015-01-16 14:52:30 +080056
Ricky Lianga70a1202013-03-15 15:03:17 +080057def GetGooftool(options):
Peter Shihfdf17682017-05-26 11:38:39 +080058 global _global_gooftool # pylint: disable=global-statement
Ricky Lianga70a1202013-03-15 15:03:17 +080059
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080060 if _global_gooftool is None:
61 with _gooftool_lock:
Shen-En Shihc5d15d62017-08-04 13:02:59 +080062 if _global_gooftool is None:
63 project = getattr(options, 'project', None)
64 hwdb_path = getattr(options, 'hwdb_path', None)
65 _global_gooftool = Gooftool(hwid_version=3, project=project,
66 hwdb_path=hwdb_path)
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080067
68 return _global_gooftool
Ricky Lianga70a1202013-03-15 15:03:17 +080069
Hung-Te Lin56b18402015-01-16 14:52:30 +080070
Ting Shen18a06382016-08-30 16:18:21 +080071def Command(cmd_name, *args, **kwargs):
You-Cheng Syu8fc2a602017-12-22 17:05:05 +080072 """Decorator for commands in gooftool.
Ting Shen18a06382016-08-30 16:18:21 +080073
74 This is similar to argparse_utils.Command, but all gooftool commands
75 can be waived during `gooftool finalize` or `gooftool verify` using
Wei-Han Chen60c5d332017-01-05 17:15:10 +080076 --waive_list or --skip_list option.
Ting Shen18a06382016-08-30 16:18:21 +080077 """
78 def Decorate(fun):
Wei-Han Chen60c5d332017-01-05 17:15:10 +080079 def CommandWithWaiveSkipCheck(options):
Ting Shen18a06382016-08-30 16:18:21 +080080 waive_list = vars(options).get('waive_list', [])
Wei-Han Chen60c5d332017-01-05 17:15:10 +080081 skip_list = vars(options).get('skip_list', [])
82 if phase.GetPhase() >= phase.PVT_DOGFOOD and (
83 waive_list != [] or skip_list != []):
Ting Shen18a06382016-08-30 16:18:21 +080084 raise Error(
Wei-Han Chen60c5d332017-01-05 17:15:10 +080085 'waive_list and skip_list should be empty for phase %s' %
86 phase.GetPhase())
Ting Shen18a06382016-08-30 16:18:21 +080087
Wei-Han Chen60c5d332017-01-05 17:15:10 +080088 if cmd_name not in skip_list:
89 try:
90 fun(options)
91 except Exception as e:
92 if cmd_name in waive_list:
93 logging.exception(e)
94 else:
95 raise
Ting Shen18a06382016-08-30 16:18:21 +080096
97 return argparse_utils.Command(cmd_name, *args, **kwargs)(
Wei-Han Chen60c5d332017-01-05 17:15:10 +080098 CommandWithWaiveSkipCheck)
Ting Shen18a06382016-08-30 16:18:21 +080099 return Decorate
100
101
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800102@Command('write_hwid',
103 CmdArg('hwid', metavar='HWID', help='HWID string'))
Andy Chengc92e6f92012-11-20 16:55:53 +0800104def WriteHWID(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800105 """Write specified HWID value into the system BB."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800106
Tammo Spalink95c43732012-07-25 15:57:14 -0700107 logging.info('writing hwid string %r', options.hwid)
Ricky Lianga70a1202013-03-15 15:03:17 +0800108 GetGooftool(options).WriteHWID(options.hwid)
Andy Cheng0465d132013-03-20 12:12:06 +0800109 event_log.Log('write_hwid', hwid=options.hwid)
Tammo Spalink95c43732012-07-25 15:57:14 -0700110 print 'Wrote HWID: %r' % options.hwid
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800111
112
Yong Hongc3765412017-12-26 23:12:15 +0800113@Command('read_hwid')
114def ReadHWID(options):
115 """Read the HWID string from GBB."""
116
117 logging.info('reading the hwid string')
118 print GetGooftool(options).ReadHWID()
119
120
Yong Hong5408f652017-07-11 19:20:25 +0800121_project_cmd_arg = CmdArg(
122 '--project', metavar='PROJECT',
123 default=None, help='Project name to test.')
Ricky Liang53390232013-03-08 15:37:57 +0800124
Tammo Spalink8fab5312012-05-28 18:33:30 +0800125_hwdb_path_cmd_arg = CmdArg(
126 '--hwdb_path', metavar='PATH',
Yong Hong5c6dcd52017-12-27 11:05:01 +0800127 default=hwid_utils.GetDefaultDataPath(),
Tammo Spalink8fab5312012-05-28 18:33:30 +0800128 help='Path to the HWID database.')
129
Tammo Spalink95c43732012-07-25 15:57:14 -0700130_hwid_status_list_cmd_arg = CmdArg(
Hung-Te Lin56b18402015-01-16 14:52:30 +0800131 '--status', nargs='*', default=['supported'],
132 help='allow only HWIDs with these status values')
Tammo Spalink95c43732012-07-25 15:57:14 -0700133
Jon Salzce124fb2012-10-02 17:42:03 +0800134_probe_results_cmd_arg = CmdArg(
Yong Hong55050c12018-02-27 18:19:47 +0800135 '--probe_results', metavar='RESULTS.json',
136 help=('Output from "hwid probe" (used instead of probing this system).'))
Jon Salzce124fb2012-10-02 17:42:03 +0800137
Ricky Liang53390232013-03-08 15:37:57 +0800138_device_info_cmd_arg = CmdArg(
Ricky Liangf89f73a2013-03-19 05:00:24 +0800139 '--device_info', metavar='DEVICE_INFO.yaml', default=None,
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800140 help='A dict of device info to use instead of fetching from shopfloor '
Ricky Liang53390232013-03-08 15:37:57 +0800141 'server.')
142
Jon Salzce124fb2012-10-02 17:42:03 +0800143_hwid_cmd_arg = CmdArg(
144 '--hwid', metavar='HWID',
Ricky Lianga70a1202013-03-15 15:03:17 +0800145 help='HWID to verify (instead of the currently set HWID of this system).')
Jon Salzce124fb2012-10-02 17:42:03 +0800146
Yong Hong68a0e0d2017-12-20 19:06:54 +0800147_hwid_run_vpd_cmd_arg = CmdArg(
148 '--hwid-run-vpd', action='store_true',
149 help=('Specify the hwid utility to obtain the vpd data by running the '
150 '`vpd` commandline tool.'))
151
152_hwid_vpd_data_file_cmd_arg = CmdArg(
153 '--hwid-vpd-data-file', metavar='FILE.json', type=str, default=None,
154 help=('Specify the hwid utility to obtain the vpd data from the specified '
155 'file.'))
156
Bernie Thompson3c11c872013-07-22 18:22:45 -0700157_rma_mode_cmd_arg = CmdArg(
158 '--rma_mode', action='store_true',
159 help='Enable RMA mode, do not check for deprecated components.')
Tammo Spalink95c43732012-07-25 15:57:14 -0700160
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800161_cros_core_cmd_arg = CmdArg(
162 '--cros_core', action='store_true',
163 help='Finalize for ChromeOS Core devices (may add or remove few test '
Hung-Te Lin53c49402017-07-26 13:10:58 +0800164 'items. For example, registration codes or firmware bitmap '
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800165 'locale settings).')
166
Yilun Lin599833f2017-12-22 14:07:46 +0800167_chromebox_cmd_arg = CmdArg(
168 '--chromebox', action='store_true', default=None,
169 help='Finalize for ChromeBox devices (may add or remove few test '
170 'items. For example, VerifyECKey).')
171
bowgotsai13820f42015-09-10 23:18:04 +0800172_enforced_release_channels_cmd_arg = CmdArg(
173 '--enforced_release_channels', nargs='*', default=None,
174 help='Enforced release image channels.')
175
Yilun Lin34f54802017-11-16 11:58:25 +0800176_ec_pubkey_path_cmd_arg = CmdArg(
177 '--ec_pubkey_path',
178 default=None,
179 help='Path to public key in vb2 format. Verify EC key with pubkey file.')
180
181_ec_pubkey_hash_cmd_arg = CmdArg(
182 '--ec_pubkey_hash',
183 default=None,
184 help='A string for public key hash. Verify EC key with the given hash.')
185
Hung-Te Lincdb96522016-04-15 16:51:10 +0800186_release_rootfs_cmd_arg = CmdArg(
187 '--release_rootfs', help='Location of release image rootfs partition.')
188
189_firmware_path_cmd_arg = CmdArg(
190 '--firmware_path', help='Location of firmware image partition.')
Ricky Liang43b879b2014-02-24 11:36:55 +0800191
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800192_shopfloor_url_args_cmd_arg = CmdArg(
193 '--shopfloor_url',
Earl Ou51182222016-09-09 12:16:48 +0800194 help='Shopfloor server url to be informed when wiping is done. '
195 'After wiping, a XML-RPC request will be sent to the '
196 'given url to indicate the completion of wiping.')
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800197
198_station_ip_cmd_arg = CmdArg(
199 '--station_ip',
200 help='IP of remote station')
201
202_station_port_cmd_arg = CmdArg(
203 '--station_port',
204 help='Port on remote station')
205
206_wipe_finish_token_cmd_arg = CmdArg(
207 '--wipe_finish_token',
208 help='Required token when notifying station after wipe finished')
209
Ting Shen18a06382016-08-30 16:18:21 +0800210_waive_list_cmd_arg = CmdArg(
211 '--waive_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800212 help='A list of waived checks, separated by whitespace. '
213 'Each item should be a sub-command of gooftool. '
Ting Shen18a06382016-08-30 16:18:21 +0800214 'e.g. "gooftool verify --waive_list verify_tpm clear_gbb_flags".')
215
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800216_skip_list_cmd_arg = CmdArg(
217 '--skip_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800218 help='A list of skipped checks, separated by whitespace. '
219 'Each item should be a sub-command of gooftool. '
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800220 'e.g. "gooftool verify --skip_list verify_tpm clear_gbb_flags".')
221
Tammo Spalink8fab5312012-05-28 18:33:30 +0800222
Yilun Lin34f54802017-11-16 11:58:25 +0800223@Command(
224 'verify_ec_key',
225 _ec_pubkey_path_cmd_arg,
226 _ec_pubkey_hash_cmd_arg)
227def VerifyECKey(options):
228 """Verify EC key."""
229 return GetGooftool(options).VerifyECKey(
230 options.ec_pubkey_path, options.ec_pubkey_hash)
231
232
Hung-Te Line1d80f62016-03-31 14:58:13 +0800233@Command('verify_keys',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800234 _release_rootfs_cmd_arg,
235 _firmware_path_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800236def VerifyKeys(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800237 """Verify keys in firmware and SSD match."""
Hung-Te Line1d80f62016-03-31 14:58:13 +0800238 return GetGooftool(options).VerifyKeys(
Hung-Te Lincdb96522016-04-15 16:51:10 +0800239 options.release_rootfs, options.firmware_path)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800240
241
242@Command('set_fw_bitmap_locale')
Peter Shihfdf17682017-05-26 11:38:39 +0800243def SetFirmwareBitmapLocale(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800244 """Use VPD locale value to set firmware bitmap default language."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800245
Ricky Lianga70a1202013-03-15 15:03:17 +0800246 (index, locale) = GetGooftool(options).SetFirmwareBitmapLocale()
Andy Cheng2582d292012-12-04 17:38:28 +0800247 logging.info('Firmware bitmap initial locale set to %d (%s).',
248 index, locale)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800249
250
Hung-Te Line1d80f62016-03-31 14:58:13 +0800251@Command('verify_system_time',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800252 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800253def VerifySystemTime(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800254 """Verify system time is later than release filesystem creation time."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800255
Hung-Te Lincdb96522016-04-15 16:51:10 +0800256 return GetGooftool(options).VerifySystemTime(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800257
258
Hung-Te Line1d80f62016-03-31 14:58:13 +0800259@Command('verify_rootfs',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800260 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800261def VerifyRootFs(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800262 """Verify rootfs on SSD is valid by checking hash."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800263
Hung-Te Line1d80f62016-03-31 14:58:13 +0800264 return GetGooftool(options).VerifyRootFs(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800265
Hung-Te Lin56b18402015-01-16 14:52:30 +0800266
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800267@Command('verify_tpm')
Peter Shihfdf17682017-05-26 11:38:39 +0800268def VerifyTPM(options):
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800269 """Verify TPM is cleared."""
270
271 return GetGooftool(options).VerifyTPM()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800272
Hung-Te Lin56b18402015-01-16 14:52:30 +0800273
Hung-Te Lindd708d42014-07-11 17:05:01 +0800274@Command('verify_me_locked')
Peter Shihfdf17682017-05-26 11:38:39 +0800275def VerifyManagementEngineLocked(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800276 """Verify Management Engine is locked."""
Hung-Te Lindd708d42014-07-11 17:05:01 +0800277
278 return GetGooftool(options).VerifyManagementEngineLocked()
279
Hung-Te Lin56b18402015-01-16 14:52:30 +0800280
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800281@Command('verify_switch_wp')
Peter Shihfdf17682017-05-26 11:38:39 +0800282def VerifyWPSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800283 """Verify hardware write protection switch is enabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800284
Ricky Lianga70a1202013-03-15 15:03:17 +0800285 GetGooftool(options).VerifyWPSwitch()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800286
287
288@Command('verify_switch_dev')
Peter Shihfdf17682017-05-26 11:38:39 +0800289def VerifyDevSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800290 """Verify developer switch is disabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800291
Ricky Lianga70a1202013-03-15 15:03:17 +0800292 if GetGooftool(options).CheckDevSwitchForDisabling():
Hung-Te Lind7d34722012-07-26 16:48:35 +0800293 logging.warn('VerifyDevSwitch: No physical switch.')
Andy Cheng0465d132013-03-20 12:12:06 +0800294 event_log.Log('switch_dev', type='virtual switch')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800295
296
Hung-Te Lin53c49402017-07-26 13:10:58 +0800297@Command('verify_vpd')
298def VerifyVPD(options):
299 """Verify that VPD values are properly set.
Jon Salzadd90d32014-04-29 16:16:27 +0800300
Hung-Te Lin53c49402017-07-26 13:10:58 +0800301 Check if mandatory fields are set, and deprecated fields don't exist.
Jon Salzadd90d32014-04-29 16:16:27 +0800302 """
Hung-Te Lin53c49402017-07-26 13:10:58 +0800303 return GetGooftool(options).VerifyVPD()
Jon Salzadd90d32014-04-29 16:16:27 +0800304
305
bowgotsai13820f42015-09-10 23:18:04 +0800306@Command('verify_release_channel',
307 _enforced_release_channels_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800308def VerifyReleaseChannel(options):
bowgotsai529139c2015-05-30 01:39:49 +0800309 """Verify that release image channel is correct.
310
311 ChromeOS has four channels: canary, dev, beta and stable.
312 The last three channels support image auto-updates, checks
313 that release image channel is one of them.
314 """
bowgotsai13820f42015-09-10 23:18:04 +0800315 return GetGooftool(options).VerifyReleaseChannel(
316 options.enforced_release_channels)
bowgotsai529139c2015-05-30 01:39:49 +0800317
318
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800319@Command('write_protect')
Peter Shihfdf17682017-05-26 11:38:39 +0800320def EnableFwWp(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800321 """Enable then verify firmware write protection."""
Peter Shihfdf17682017-05-26 11:38:39 +0800322 del options # Unused.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800323
Yong Hongdad230a2017-08-30 22:25:19 +0800324 def WriteProtect(fw):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800325 """Calculate protection size, then invoke flashrom.
326
Yong Hongdad230a2017-08-30 22:25:19 +0800327 The region (offset and size) to write protect may be different per chipset
328 and firmware layout, so we have to read the WP_RO section from FMAP to
329 decide that.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800330 """
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800331 wp_section = 'WP_RO'
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800332
Yong Hongdad230a2017-08-30 22:25:19 +0800333 fmap_image = fw.GetFirmwareImage(
334 sections=(['FMAP'] if fw.target == crosfw.TARGET_MAIN else None))
335 if not fmap_image.has_section(wp_section):
336 raise Error('Could not find %s firmware section: %s' %
337 (fw.target.upper(), wp_section))
338
339 section_data = fw.GetFirmwareImage(
340 sections=[wp_section]).get_section_area(wp_section)
341 ro_offset, ro_size = section_data[0 : 2]
342
343 logging.debug('write protecting %s [off=%x size=%x]', fw.target.upper(),
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800344 ro_offset, ro_size)
Yong Hongdad230a2017-08-30 22:25:19 +0800345 crosfw.Flashrom(fw.target).EnableWriteProtection(ro_offset, ro_size)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800346
Yong Hongdad230a2017-08-30 22:25:19 +0800347 WriteProtect(crosfw.LoadMainFirmware())
Andy Cheng0465d132013-03-20 12:12:06 +0800348 event_log.Log('wp', fw='main')
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800349
350 # Some EC (mostly PD) does not support "RO NOW". Instead they will only set
351 # "RO_AT_BOOT" when you request to enable RO (These platforms consider
352 # --wp-range with right range identical to --wp-enable), and requires a
353 # 'ectool reboot_ec RO at-shutdown; reboot' to let the RO take effect.
Hung-Te Lin0d10b562016-12-28 10:58:07 +0800354 # After reboot, "flashrom -p host --wp-status" will return protected range.
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800355 # If you don't reboot, returned range will be (0, 0), and running command
356 # "ectool flashprotect" will not have RO_NOW.
357
Yong Hongdad230a2017-08-30 22:25:19 +0800358 for fw in [crosfw.LoadEcFirmware(), crosfw.LoadPDFirmware()]:
359 if fw.GetChipId() is None:
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800360 logging.warning('%s not write protected (seems there is no %s flash).',
Yong Hongdad230a2017-08-30 22:25:19 +0800361 fw.target.upper(), fw.target.upper())
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800362 continue
Yong Hongdad230a2017-08-30 22:25:19 +0800363 WriteProtect(fw)
364 event_log.Log('wp', fw=fw.target)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800365
366
367@Command('clear_gbb_flags')
Peter Shihfdf17682017-05-26 11:38:39 +0800368def ClearGBBFlags(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800369 """Zero out the GBB flags, in preparation for transition to release state.
370
371 No GBB flags are set in release/shipping state, but they are useful
Hung-Te Lin879cff42017-06-19 12:46:37 +0800372 for factory/development. See "futility gbb --flags" for details.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800373 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800374
Ricky Lianga70a1202013-03-15 15:03:17 +0800375 GetGooftool(options).ClearGBBFlags()
Andy Cheng0465d132013-03-20 12:12:06 +0800376 event_log.Log('clear_gbb_flags')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800377
378
Jon Salzaa3a30e2013-05-15 15:56:28 +0800379@Command('clear_factory_vpd_entries')
Peter Shihfdf17682017-05-26 11:38:39 +0800380def ClearFactoryVPDEntries(options):
Jon Salzaa3a30e2013-05-15 15:56:28 +0800381 """Clears factory.* items in the RW VPD."""
382 entries = GetGooftool(options).ClearFactoryVPDEntries()
383 event_log.Log('clear_factory_vpd_entries', entries=FilterDict(entries))
384
385
Mattias Nisslercca761b2015-04-15 21:53:04 +0200386@Command('generate_stable_device_secret')
Peter Shihfdf17682017-05-26 11:38:39 +0800387def GenerateStableDeviceSecret(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800388 """Generates a fresh stable device secret and stores it in the RO VPD."""
Mattias Nisslercca761b2015-04-15 21:53:04 +0200389 GetGooftool(options).GenerateStableDeviceSecret()
390 event_log.Log('generate_stable_device_secret')
391
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800392
Shen-En Shihd078a7c2017-08-04 13:33:49 +0800393@Command('cr50_set_board_id')
394def Cr50SetBoardId(options):
395 """Set the board id and flag in the Cr50 chip."""
396 GetGooftool(options).Cr50SetBoardId()
397 event_log.Log('cr50_set_board_id')
398
399
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800400@Command('cr50_reset_state')
401def Cr50ResetState(options):
402 """Reset Cr50 state back to default state after RMA."""
403 return GetGooftool(options).Cr50ResetState()
404
405
Earl Ou564a7872016-10-05 10:22:00 +0800406@Command('enable_release_partition',
407 CmdArg('--release_rootfs',
408 help=('path to the release rootfs device. If not specified, '
409 'the default (5th) partition will be used.')))
410def EnableReleasePartition(options):
411 """Enables a release image partition on the disk."""
412 GetGooftool(options).EnableReleasePartition(options.release_rootfs)
413
414
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800415@Command('wipe_in_place',
416 CmdArg('--fast', action='store_true',
Shun-Hsing Ou8d3c40a2015-10-08 18:16:08 +0800417 help='use non-secure but faster wipe method.'),
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800418 _shopfloor_url_args_cmd_arg,
419 _station_ip_cmd_arg,
420 _station_port_cmd_arg,
421 _wipe_finish_token_cmd_arg)
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800422def WipeInPlace(options):
423 """Start factory wipe directly without reboot."""
424
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800425 GetGooftool(options).WipeInPlace(options.fast,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800426 options.shopfloor_url,
427 options.station_ip,
428 options.station_port,
429 options.wipe_finish_token)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200430
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800431@Command('wipe_init',
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800432 CmdArg('--wipe_args', help='arguments for clobber-state'),
433 CmdArg('--state_dev', help='path to stateful partition device'),
434 CmdArg('--root_disk', help='path to primary device'),
435 CmdArg('--old_root', help='path to old root'),
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800436 _shopfloor_url_args_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800437 _release_rootfs_cmd_arg,
438 _station_ip_cmd_arg,
439 _station_port_cmd_arg,
440 _wipe_finish_token_cmd_arg)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800441def WipeInit(options):
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800442 GetGooftool(options).WipeInit(options.wipe_args,
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800443 options.shopfloor_url,
444 options.state_dev,
445 options.release_rootfs,
446 options.root_disk,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800447 options.old_root,
448 options.station_ip,
449 options.station_port,
450 options.wipe_finish_token)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800451
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800452@Command('verify',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800453 CmdArg('--no_write_protect', action='store_true',
454 help='Do not check write protection switch state.'),
Tammo Spalink95c43732012-07-25 15:57:14 -0700455 _hwid_status_list_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800456 _hwdb_path_cmd_arg,
Yong Hong5408f652017-07-11 19:20:25 +0800457 _project_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800458 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800459 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800460 _hwid_run_vpd_cmd_arg,
461 _hwid_vpd_data_file_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800462 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800463 _cros_core_cmd_arg,
Yilun Lin599833f2017-12-22 14:07:46 +0800464 _chromebox_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800465 _ec_pubkey_path_cmd_arg,
466 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800467 _release_rootfs_cmd_arg,
468 _firmware_path_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800469 _enforced_release_channels_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800470 _waive_list_cmd_arg,
471 _skip_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800472def Verify(options):
473 """Verifies if whole factory process is ready for finalization.
474
475 This routine performs all the necessary checks to make sure the
476 device is ready to be finalized, but does not modify state. These
477 checks include dev switch, firmware write protection switch, hwid,
478 system time, keys, and root file system.
479 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800480
Hung-Te Lin6d827542012-07-19 11:50:41 +0800481 if not options.no_write_protect:
Ricky Lianga70a1202013-03-15 15:03:17 +0800482 VerifyWPSwitch(options)
Hung-Te Lindd708d42014-07-11 17:05:01 +0800483 VerifyManagementEngineLocked(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800484 VerifyDevSwitch(options)
Ting Shen129fa6f2016-09-02 12:22:24 +0800485 VerifyHWID(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800486 VerifySystemTime(options)
Yilun Lin599833f2017-12-22 14:07:46 +0800487 if options.chromebox:
488 VerifyECKey(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800489 VerifyKeys(options)
490 VerifyRootFs(options)
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800491 VerifyTPM(options)
Hung-Te Lin53c49402017-07-26 13:10:58 +0800492 VerifyVPD(options)
bowgotsai529139c2015-05-30 01:39:49 +0800493 VerifyReleaseChannel(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800494
Hung-Te Lin56b18402015-01-16 14:52:30 +0800495
Jon Salzfe9036f2014-01-16 14:11:23 +0800496@Command('untar_stateful_files')
Hung-Te Lin388bce22014-06-03 19:56:40 +0800497def UntarStatefulFiles(unused_options):
Jon Salzfe9036f2014-01-16 14:11:23 +0800498 """Untars stateful files from stateful_files.tar.xz on stateful partition.
499
500 If that file does not exist (which should only be R30 and earlier),
501 this is a no-op.
502 """
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800503 # Path to stateful partition on device.
504 device_stateful_path = '/mnt/stateful_partition'
505 tar_file = os.path.join(device_stateful_path, 'stateful_files.tar.xz')
Jon Salzfe9036f2014-01-16 14:11:23 +0800506 if os.path.exists(tar_file):
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800507 Spawn(['tar', 'xf', tar_file], cwd=device_stateful_path,
Jon Salzfe9036f2014-01-16 14:11:23 +0800508 log=True, check_call=True)
509 else:
510 logging.warning('No stateful files at %s', tar_file)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800511
Jon Salz40b9f822014-07-25 16:39:55 +0800512
513@Command('log_source_hashes')
Peter Shihfdf17682017-05-26 11:38:39 +0800514def LogSourceHashes(options):
Jon Salz40b9f822014-07-25 16:39:55 +0800515 """Logs hashes of source files in the factory toolkit."""
Peter Shihfdf17682017-05-26 11:38:39 +0800516 del options # Unused.
Jon Salze60307f2014-08-05 16:20:00 +0800517 # WARNING: The following line is necessary to validate the integrity
518 # of the factory software. Do not remove or modify it.
519 #
520 # 警告:此行会验证工厂软件的完整性,禁止删除或修改。
Wei-Han Chena5c01a02016-04-23 19:27:19 +0800521 factory_par = sys_utils.GetRunningFactoryPythonArchivePath()
522 if factory_par:
523 event_log.Log(
524 'source_hashes',
525 **file_utils.HashPythonArchive(factory_par))
526 else:
527 event_log.Log(
528 'source_hashes',
Peter Shihad166772017-05-31 11:36:17 +0800529 **file_utils.HashSourceTree(os.path.join(paths.FACTORY_DIR, 'py')))
Jon Salz40b9f822014-07-25 16:39:55 +0800530
531
Tammo Spalink86a61c62012-05-25 15:10:35 +0800532@Command('log_system_details')
Peter Shihfdf17682017-05-26 11:38:39 +0800533def LogSystemDetails(options):
Tammo Spalink86a61c62012-05-25 15:10:35 +0800534 """Write miscellaneous system details to the event log."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800535
Ricky Liang43b879b2014-02-24 11:36:55 +0800536 event_log.Log('system_details', **GetGooftool(options).GetSystemDetails())
Tammo Spalink86a61c62012-05-25 15:10:35 +0800537
538
Jon Salza88b83b2013-05-27 20:00:35 +0800539def CreateReportArchiveBlob(*args, **kwargs):
540 """Creates a report archive and returns it as a blob.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800541
Jon Salza88b83b2013-05-27 20:00:35 +0800542 Args:
543 See CreateReportArchive.
Andy Cheng7a76cb82012-11-19 18:08:19 +0800544
Jon Salza88b83b2013-05-27 20:00:35 +0800545 Returns:
546 An xmlrpclib.Binary object containing a .tar.xz file.
547 """
Wei-Han Chen47416612016-09-14 17:41:52 +0800548 report_archive = CreateReportArchive(*args, **kwargs)
549 try:
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800550 return xmlrpclib.Binary(file_utils.ReadFile(report_archive))
Wei-Han Chen47416612016-09-14 17:41:52 +0800551 finally:
552 os.unlink(report_archive)
Jon Salza88b83b2013-05-27 20:00:35 +0800553
554
555def CreateReportArchive(device_sn=None, add_file=None):
556 """Creates a report archive in a temporary directory.
557
558 Args:
559 device_sn: The device serial number (optional).
560 add_file: A list of files to add (optional).
561
562 Returns:
563 Path to the archive.
564 """
Hung-Te Lin6bd16472012-06-20 16:26:47 +0800565 def NormalizeAsFileName(token):
566 return re.sub(r'\W+', '', token).strip()
Jon Salza88b83b2013-05-27 20:00:35 +0800567
568 target_name = '%s%s.tar.xz' % (
569 time.strftime('%Y%m%dT%H%M%SZ',
570 time.gmtime()),
Hung-Te Lin56b18402015-01-16 14:52:30 +0800571 ('' if device_sn is None else
572 '_' + NormalizeAsFileName(device_sn)))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800573 target_path = os.path.join(gettempdir(), target_name)
Jon Salza88b83b2013-05-27 20:00:35 +0800574
Tammo Spalink86a61c62012-05-25 15:10:35 +0800575 # Intentionally ignoring dotfiles in EVENT_LOG_DIR.
Andy Cheng0465d132013-03-20 12:12:06 +0800576 tar_cmd = 'cd %s ; tar cJf %s *' % (event_log.EVENT_LOG_DIR, target_path)
Peter Shihb4e49352017-05-25 17:35:11 +0800577 tar_cmd += ' %s' % paths.FACTORY_LOG_PATH
Jon Salza88b83b2013-05-27 20:00:35 +0800578 if add_file:
579 for f in add_file:
Jon Salz65266432012-07-30 19:02:49 +0800580 # Require absolute paths since the tar command may change the
581 # directory.
582 if not f.startswith('/'):
583 raise Error('Not an absolute path: %s' % f)
584 if not os.path.exists(f):
585 raise Error('File does not exist: %s' % f)
Wei-Han Chen4b755022017-01-04 10:51:52 +0800586 tar_cmd += ' %s' % pipes.quote(f)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800587 cmd_result = Shell(tar_cmd)
Jon Salzff88c022012-11-03 12:19:58 +0800588
589 if ((cmd_result.status == 1) and
590 all((x == '' or
591 'file changed as we read it' in x or
592 "Removing leading `/' from member names" in x)
593 for x in cmd_result.stderr.split('\n'))):
594 # That's OK. Make sure it's valid though.
Vic Yang85199e72013-01-28 14:33:11 +0800595 Spawn(['tar', 'tfJ', target_path], check_call=True, log=True,
Jon Salzff88c022012-11-03 12:19:58 +0800596 ignore_stdout=True)
597 elif not cmd_result.success:
Tammo Spalink86a61c62012-05-25 15:10:35 +0800598 raise Error('unable to tar event logs, cmd %r failed, stderr: %r' %
599 (tar_cmd, cmd_result.stderr))
Jon Salzff88c022012-11-03 12:19:58 +0800600
Jon Salza88b83b2013-05-27 20:00:35 +0800601 return target_path
602
603_upload_method_cmd_arg = CmdArg(
604 '--upload_method', metavar='METHOD:PARAM',
605 help=('How to perform the upload. METHOD should be one of '
606 '{ftp, shopfloor, ftps, cpfe}.'))
607_add_file_cmd_arg = CmdArg(
608 '--add_file', metavar='FILE', action='append',
609 help='Extra file to include in report (must be an absolute path)')
610
Hung-Te Lin56b18402015-01-16 14:52:30 +0800611
Jon Salza88b83b2013-05-27 20:00:35 +0800612@Command('upload_report',
613 _upload_method_cmd_arg,
614 _add_file_cmd_arg)
615def UploadReport(options):
616 """Create a report containing key device details."""
Yong Hong863d3262017-10-30 16:23:34 +0800617 ro_vpd = sys_utils.VPDTool().GetAllData(
618 partition=sys_utils.VPDTool.RO_PARTITION)
Jon Salza88b83b2013-05-27 20:00:35 +0800619 device_sn = ro_vpd.get('serial_number', None)
620 if device_sn is None:
621 logging.warning('RO_VPD missing device serial number')
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +0800622 device_sn = 'MISSING_SN_' + time_utils.TimedUUID()
Jon Salza88b83b2013-05-27 20:00:35 +0800623 target_path = CreateReportArchive(device_sn)
624
Tammo Spalink86a61c62012-05-25 15:10:35 +0800625 if options.upload_method is None or options.upload_method == 'none':
626 logging.warning('REPORT UPLOAD SKIPPED (report left at %s)', target_path)
627 return
628 method, param = options.upload_method.split(':', 1)
629 if method == 'shopfloor':
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800630 report_upload.ShopFloorUpload(
631 target_path, param,
632 'GRT' if options.command_name == 'finalize' else None)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800633 elif method == 'ftp':
Jay Kim360c1dd2012-06-25 10:58:11 -0700634 report_upload.FtpUpload(target_path, 'ftp:' + param)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800635 elif method == 'ftps':
636 report_upload.CurlUrlUpload(target_path, '--ftp-ssl-reqd ftp:%s' % param)
637 elif method == 'cpfe':
Shawn Nematbakhsh3404a092013-01-28 16:49:09 -0800638 report_upload.CpfeUpload(target_path, pipes.quote(param))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800639 else:
Peter Shihbf6f22b2018-02-26 14:05:28 +0800640 raise Error('unknown report upload method %r' % method)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800641
642
643@Command('finalize',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800644 CmdArg('--no_write_protect', action='store_true',
645 help='Do not enable firmware write protection.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800646 CmdArg('--fast', action='store_true',
647 help='use non-secure but faster wipe method.'),
Shun-Hsing Oudb407d62015-11-11 11:03:59 +0800648 _shopfloor_url_args_cmd_arg,
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800649 _hwdb_path_cmd_arg,
Tammo Spalink95c43732012-07-25 15:57:14 -0700650 _hwid_status_list_cmd_arg,
Jon Salz65266432012-07-30 19:02:49 +0800651 _upload_method_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800652 _add_file_cmd_arg,
653 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800654 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800655 _hwid_run_vpd_cmd_arg,
656 _hwid_vpd_data_file_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800657 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800658 _cros_core_cmd_arg,
Yilun Lin599833f2017-12-22 14:07:46 +0800659 _chromebox_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800660 _ec_pubkey_path_cmd_arg,
661 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800662 _release_rootfs_cmd_arg,
663 _firmware_path_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800664 _enforced_release_channels_cmd_arg,
665 _station_ip_cmd_arg,
666 _station_port_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800667 _wipe_finish_token_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800668 _waive_list_cmd_arg,
669 _skip_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800670def Finalize(options):
671 """Verify system readiness and trigger transition into release state.
672
Jon Salzaa3a30e2013-05-15 15:56:28 +0800673 This routine does the following:
674 - Verifies system state (see verify command)
Jon Salzfe9036f2014-01-16 14:11:23 +0800675 - Untars stateful_files.tar.xz, if it exists, in the stateful partition, to
676 initialize files such as the CRX cache
Jon Salzaa3a30e2013-05-15 15:56:28 +0800677 - Modifies firmware bitmaps to match locale
678 - Clears all factory-friendly flags from the GBB
679 - Removes factory-specific entries from RW_VPD (factory.*)
680 - Enables firmware write protection (cannot rollback after this)
681 - Uploads system logs & reports
Earl Ou51182222016-09-09 12:16:48 +0800682 - Wipes the testing kernel, rootfs, and stateful partition
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800683 """
Shen-En Shih3e079b22017-09-11 05:43:09 -0700684 Cr50SetBoardId(options)
Marco Chen896c3d72018-03-02 22:01:00 +0800685 Verify(options)
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800686 Cr50ResetState(options)
Jon Salz40b9f822014-07-25 16:39:55 +0800687 LogSourceHashes(options)
Jon Salzfe9036f2014-01-16 14:11:23 +0800688 UntarStatefulFiles(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800689 if options.cros_core:
690 logging.info('SetFirmwareBitmapLocale is skipped for ChromeOS Core device.')
691 else:
692 SetFirmwareBitmapLocale(options)
Jon Salzaa3a30e2013-05-15 15:56:28 +0800693 ClearFactoryVPDEntries(options)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200694 GenerateStableDeviceSecret(options)
Shen-En Shih3e079b22017-09-11 05:43:09 -0700695 ClearGBBFlags(options)
Hung-Te Lin6d827542012-07-19 11:50:41 +0800696 if options.no_write_protect:
697 logging.warn('WARNING: Firmware Write Protection is SKIPPED.')
Andy Cheng0465d132013-03-20 12:12:06 +0800698 event_log.Log('wp', fw='both', status='skipped')
Hung-Te Lin6d827542012-07-19 11:50:41 +0800699 else:
Wei-Han Chenba21f512016-10-14 18:52:33 +0800700 EnableFwWp(options)
Jon Salza0f58e02012-05-29 19:33:39 +0800701 LogSystemDetails(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800702 UploadReport(options)
Earl Ou51182222016-09-09 12:16:48 +0800703
704 event_log.Log('wipe_in_place')
705 wipe_args = []
Earl Ou51182222016-09-09 12:16:48 +0800706 if options.shopfloor_url:
707 wipe_args += ['--shopfloor_url', options.shopfloor_url]
708 if options.fast:
709 wipe_args += ['--fast']
710 if options.station_ip:
711 wipe_args += ['--station_ip', options.station_ip]
712 if options.station_port:
713 wipe_args += ['--station_port', options.station_port]
714 if options.wipe_finish_token:
715 wipe_args += ['--wipe_finish_token', options.wipe_finish_token]
716 ExecFactoryPar('gooftool', 'wipe_in_place', *wipe_args)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800717
718
Ting Shen129fa6f2016-09-02 12:22:24 +0800719@Command('verify_hwid',
720 _probe_results_cmd_arg,
721 _hwdb_path_cmd_arg,
722 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800723 _hwid_run_vpd_cmd_arg,
724 _hwid_vpd_data_file_cmd_arg,
Ting Shen129fa6f2016-09-02 12:22:24 +0800725 _rma_mode_cmd_arg)
726def VerifyHWID(options):
Ricky Liangc662be32013-12-24 11:50:23 +0800727 """A simple wrapper that calls out to HWID utils to verify version 3 HWID.
Ricky Liang53390232013-03-08 15:37:57 +0800728
Ricky Liangc662be32013-12-24 11:50:23 +0800729 This is mainly for Gooftool to verify v3 HWID during finalize. For testing
730 and development purposes, please use `hwid` command.
Ricky Liang53390232013-03-08 15:37:57 +0800731 """
Yong Hongada8e0e2018-01-04 16:36:21 +0800732 database = GetGooftool(options).db
Yong Hong68a0e0d2017-12-20 19:06:54 +0800733
Yong Hongada8e0e2018-01-04 16:36:21 +0800734 encoded_string = options.hwid or GetGooftool(options).ReadHWID()
735
736 probed_results = hwid_utils.GetProbedResults(infile=options.probe_results)
Yong Hong2c39bf22018-01-24 22:24:11 +0800737 device_info = hwid_utils.GetDeviceInfo()
Yong Hongada8e0e2018-01-04 16:36:21 +0800738 vpd = hwid_utils.GetVPDData(run_vpd=options.hwid_run_vpd,
739 infile=options.hwid_vpd_data_file)
Ricky Liang53390232013-03-08 15:37:57 +0800740
Hung-Te Lin11052952015-03-18 13:48:59 +0800741 event_log.Log('probed_results', probed_results=FilterDict(probed_results))
Yong Hong68a0e0d2017-12-20 19:06:54 +0800742 event_log.Log('vpd', vpd=FilterDict(vpd) if vpd is None else None)
Ricky Liang53390232013-03-08 15:37:57 +0800743
Yong Hong2c39bf22018-01-24 22:24:11 +0800744 hwid_utils.VerifyHWID(database, encoded_string, probed_results,
745 device_info, vpd, options.rma_mode)
Ricky Liang53390232013-03-08 15:37:57 +0800746
Ricky Liangc662be32013-12-24 11:50:23 +0800747 event_log.Log('verified_hwid', hwid=encoded_string)
Ricky Liang53390232013-03-08 15:37:57 +0800748
749
henryhsu44d793a2013-07-20 00:07:38 +0800750@Command('get_firmware_hash',
751 CmdArg('--file', metavar='FILE', help='Firmware File.'))
752def GetFirmwareHash(options):
henryhsuf6f835c2013-07-20 20:49:25 +0800753 """Get firmware hash from a file"""
henryhsu44d793a2013-07-20 00:07:38 +0800754 if os.path.exists(options.file):
Yong Hong863d3262017-10-30 16:23:34 +0800755 hashes = chromeos_firmware.CalculateFirmwareHashes(options.file)
henryhsu44d793a2013-07-20 00:07:38 +0800756 for section, value_dict in hashes.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800757 print '%s:' % section
henryhsu44d793a2013-07-20 00:07:38 +0800758 for key, value in value_dict.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800759 print ' %s: %s' % (key, value)
henryhsu44d793a2013-07-20 00:07:38 +0800760 else:
761 raise Error('File does not exist: %s' % options.file)
762
henryhsuf6f835c2013-07-20 20:49:25 +0800763
Peter Shihfdf17682017-05-26 11:38:39 +0800764def main():
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800765 """Run sub-command specified by the command line args."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800766
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800767 options = ParseCmdline(
Ting Shen129fa6f2016-09-02 12:22:24 +0800768 'Perform Google required factory tests.',
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800769 CmdArg('-l', '--log', metavar='PATH',
770 help='Write logs to this file.'),
Jon Salza4bea382012-10-29 13:00:34 +0800771 CmdArg('--suppress-event-logs', action='store_true',
772 help='Suppress event logging.'),
Wei-Han Chenaff56232016-04-16 09:17:59 +0800773 CmdArg('--phase', default=None,
774 help=('override phase for phase checking (defaults to the current '
775 'as returned by the "factory phase" command)')),
Tammo Spalink8fab5312012-05-28 18:33:30 +0800776 verbosity_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800777 SetupLogging(options.verbosity, options.log)
Andy Cheng0465d132013-03-20 12:12:06 +0800778 event_log.SetGlobalLoggerDefaultPrefix('gooftool')
779 event_log.GetGlobalLogger().suppress = options.suppress_event_logs
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800780 logging.debug('gooftool options: %s', repr(options))
Wei-Han Chenaff56232016-04-16 09:17:59 +0800781
782 phase.OverridePhase(options.phase)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800783 try:
784 logging.debug('GOOFTOOL command %r', options.command_name)
785 options.command(options)
786 logging.info('GOOFTOOL command %r SUCCESS', options.command_name)
Peter Shih6674ecf2018-03-29 14:04:57 +0800787 except Error as e:
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800788 logging.exception(e)
789 sys.exit('GOOFTOOL command %r ERROR: %s' % (options.command_name, e))
Peter Shih6674ecf2018-03-29 14:04:57 +0800790 except Exception as e:
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800791 logging.exception(e)
792 sys.exit('UNCAUGHT RUNTIME EXCEPTION %s' % e)
793
794
795if __name__ == '__main__':
Peter Shihfdf17682017-05-26 11:38:39 +0800796 main()