blob: 8fee09ec10500e9bf134762365ca4d6e7fe86f81 [file] [log] [blame]
Yilin Yang19da6932019-12-10 13:39:28 +08001#!/usr/bin/env python3
Jon Salze60307f2014-08-05 16:20:00 +08002# -*- coding: utf-8 -*-
3# Copyright 2014 The Chromium OS Authors. All rights reserved.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08004# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
Jon Salze60307f2014-08-05 16:20:00 +08007
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08008"""Google Factory Tool.
9
You-Cheng Syu461ec032017-03-06 15:56:58 +080010This tool is intended to be used on factory assembly lines. It
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080011provides all of the Google required test functionality and must be run
12on each device as part of the assembly process.
13"""
14
Yilin Yang71e39412019-09-24 09:26:46 +080015from __future__ import print_function
16
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080017import logging
18import os
Jon Salz65266432012-07-30 19:02:49 +080019import pipes
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080020import re
21import sys
Peter Shihfdf17682017-05-26 11:38:39 +080022from tempfile import gettempdir
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080023import threading
Hung-Te Lin6bd16472012-06-20 16:26:47 +080024import time
Yilin Yange02d5722019-10-23 11:07:36 +080025import xmlrpc.client
Peter Shihfdf17682017-05-26 11:38:39 +080026
Wei-Han Chen0a3320e2016-04-23 01:32:07 +080027from cros.factory.gooftool.common import ExecFactoryPar
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080028from cros.factory.gooftool.common import Shell
Peter Shihfdf17682017-05-26 11:38:39 +080029from cros.factory.gooftool.core import Gooftool
30from cros.factory.gooftool import crosfw
Peter Shihfdf17682017-05-26 11:38:39 +080031from cros.factory.gooftool import report_upload
Yong Hong65bda312018-12-13 20:05:58 +080032from cros.factory.gooftool import vpd
Hung-Te Lin604e0c22015-11-24 15:17:07 +080033from cros.factory.hwid.v3 import hwid_utils
Yong Hong863d3262017-10-30 16:23:34 +080034from cros.factory.probe.functions import chromeos_firmware
Wei-Han Chen2ebb92d2016-01-12 14:51:41 +080035from cros.factory.test.env import paths
Peter Shihfdf17682017-05-26 11:38:39 +080036from cros.factory.test import event_log
Wei-Han Chenaff56232016-04-16 09:17:59 +080037from cros.factory.test.rules import phase
Hung-Te Lin3f096842016-01-13 17:37:06 +080038from cros.factory.test.rules.privacy import FilterDict
Philip Chen6ada02c2019-11-04 19:41:54 +000039from cros.factory.test import state
Peter Shihfdf17682017-05-26 11:38:39 +080040from cros.factory.utils import argparse_utils
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080041from cros.factory.utils.argparse_utils import CmdArg
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080042from cros.factory.utils.argparse_utils import ParseCmdline
Wei-Han Chenb34bdff2019-09-26 13:07:50 +080043from cros.factory.utils.argparse_utils import VERBOSITY_CMD_ARG
Peter Shihfdf17682017-05-26 11:38:39 +080044from cros.factory.utils.debug_utils import SetupLogging
Jon Salz40b9f822014-07-25 16:39:55 +080045from cros.factory.utils import file_utils
Peter Shih67c7c0f2018-02-26 11:23:59 +080046from cros.factory.utils.process_utils import Spawn
Wei-Han Chena5c01a02016-04-23 19:27:19 +080047from cros.factory.utils import sys_utils
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +080048from cros.factory.utils import time_utils
Joel Kitchingd3bc2662014-12-16 16:03:32 -080049from cros.factory.utils.type_utils import Error
Tammo Spalink86a61c62012-05-25 15:10:35 +080050
Tammo Spalink5c699832012-07-03 17:50:39 +080051
Tammo Spalink5c699832012-07-03 17:50:39 +080052# TODO(tammo): Replace calls to sys.exit with raise Exit, and maybe
53# treat that specially (as a smoot exit, as opposed to the more
54# verbose output for generic Error).
55
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080056_global_gooftool = None
57_gooftool_lock = threading.Lock()
Philip Chen04fb90b2019-11-06 12:10:33 -080058_has_fpmcu = None
Tammo Spalink5c699832012-07-03 17:50:39 +080059
Hung-Te Lin56b18402015-01-16 14:52:30 +080060
Ricky Lianga70a1202013-03-15 15:03:17 +080061def GetGooftool(options):
Peter Shihfdf17682017-05-26 11:38:39 +080062 global _global_gooftool # pylint: disable=global-statement
Ricky Lianga70a1202013-03-15 15:03:17 +080063
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080064 if _global_gooftool is None:
65 with _gooftool_lock:
Shen-En Shihc5d15d62017-08-04 13:02:59 +080066 if _global_gooftool is None:
67 project = getattr(options, 'project', None)
68 hwdb_path = getattr(options, 'hwdb_path', None)
69 _global_gooftool = Gooftool(hwid_version=3, project=project,
70 hwdb_path=hwdb_path)
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080071
72 return _global_gooftool
Ricky Lianga70a1202013-03-15 15:03:17 +080073
Philip Chen04fb90b2019-11-06 12:10:33 -080074def HasFpmcu():
75 global _has_fpmcu # pylint: disable=global-statement
76
77 if _has_fpmcu is None:
78 FPMCU_PATH = '/dev/cros_fp'
Philip Chen04fb90b2019-11-06 12:10:33 -080079 has_cros_config_fpmcu = False
Philip Chencf6642b2019-12-02 19:38:59 -080080 cros_config_output = Shell(['cros_config', '/fingerprint', 'board'])
81 if cros_config_output.success and cros_config_output.stdout:
Philip Chen04fb90b2019-11-06 12:10:33 -080082 has_cros_config_fpmcu = True
83
Alex Chou5b071392020-08-13 09:45:14 +080084 if not os.path.exists(FPMCU_PATH) and has_cros_config_fpmcu:
Philip Chen04fb90b2019-11-06 12:10:33 -080085 raise Error('FPMCU found in cros_config but missing in %s.' % FPMCU_PATH)
Philip Chen04fb90b2019-11-06 12:10:33 -080086
Alex Chou5b071392020-08-13 09:45:14 +080087 _has_fpmcu = has_cros_config_fpmcu
Philip Chen04fb90b2019-11-06 12:10:33 -080088
89 return _has_fpmcu
Hung-Te Lin56b18402015-01-16 14:52:30 +080090
Ting Shen18a06382016-08-30 16:18:21 +080091def Command(cmd_name, *args, **kwargs):
You-Cheng Syu8fc2a602017-12-22 17:05:05 +080092 """Decorator for commands in gooftool.
Ting Shen18a06382016-08-30 16:18:21 +080093
94 This is similar to argparse_utils.Command, but all gooftool commands
95 can be waived during `gooftool finalize` or `gooftool verify` using
Wei-Han Chen60c5d332017-01-05 17:15:10 +080096 --waive_list or --skip_list option.
Ting Shen18a06382016-08-30 16:18:21 +080097 """
98 def Decorate(fun):
Wei-Han Chen60c5d332017-01-05 17:15:10 +080099 def CommandWithWaiveSkipCheck(options):
Ting Shen18a06382016-08-30 16:18:21 +0800100 waive_list = vars(options).get('waive_list', [])
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800101 skip_list = vars(options).get('skip_list', [])
102 if phase.GetPhase() >= phase.PVT_DOGFOOD and (
103 waive_list != [] or skip_list != []):
Ting Shen18a06382016-08-30 16:18:21 +0800104 raise Error(
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800105 'waive_list and skip_list should be empty for phase %s' %
106 phase.GetPhase())
Ting Shen18a06382016-08-30 16:18:21 +0800107
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800108 if cmd_name not in skip_list:
109 try:
110 fun(options)
111 except Exception as e:
112 if cmd_name in waive_list:
113 logging.exception(e)
114 else:
115 raise
Ting Shen18a06382016-08-30 16:18:21 +0800116
117 return argparse_utils.Command(cmd_name, *args, **kwargs)(
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800118 CommandWithWaiveSkipCheck)
Ting Shen18a06382016-08-30 16:18:21 +0800119 return Decorate
120
121
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800122@Command('write_hwid',
123 CmdArg('hwid', metavar='HWID', help='HWID string'))
Andy Chengc92e6f92012-11-20 16:55:53 +0800124def WriteHWID(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800125 """Write specified HWID value into the system BB."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800126
Tammo Spalink95c43732012-07-25 15:57:14 -0700127 logging.info('writing hwid string %r', options.hwid)
Ricky Lianga70a1202013-03-15 15:03:17 +0800128 GetGooftool(options).WriteHWID(options.hwid)
Andy Cheng0465d132013-03-20 12:12:06 +0800129 event_log.Log('write_hwid', hwid=options.hwid)
Yilin Yang71e39412019-09-24 09:26:46 +0800130 print('Wrote HWID: %r' % options.hwid)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800131
132
Yong Hongc3765412017-12-26 23:12:15 +0800133@Command('read_hwid')
134def ReadHWID(options):
135 """Read the HWID string from GBB."""
136
137 logging.info('reading the hwid string')
Yilin Yang71e39412019-09-24 09:26:46 +0800138 print(GetGooftool(options).ReadHWID())
Yong Hongc3765412017-12-26 23:12:15 +0800139
140
Yong Hong5408f652017-07-11 19:20:25 +0800141_project_cmd_arg = CmdArg(
142 '--project', metavar='PROJECT',
143 default=None, help='Project name to test.')
Ricky Liang53390232013-03-08 15:37:57 +0800144
Tammo Spalink8fab5312012-05-28 18:33:30 +0800145_hwdb_path_cmd_arg = CmdArg(
146 '--hwdb_path', metavar='PATH',
Yong Hong5c6dcd52017-12-27 11:05:01 +0800147 default=hwid_utils.GetDefaultDataPath(),
Tammo Spalink8fab5312012-05-28 18:33:30 +0800148 help='Path to the HWID database.')
149
Tammo Spalink95c43732012-07-25 15:57:14 -0700150_hwid_status_list_cmd_arg = CmdArg(
Hung-Te Lin56b18402015-01-16 14:52:30 +0800151 '--status', nargs='*', default=['supported'],
152 help='allow only HWIDs with these status values')
Tammo Spalink95c43732012-07-25 15:57:14 -0700153
Jon Salzce124fb2012-10-02 17:42:03 +0800154_probe_results_cmd_arg = CmdArg(
Yong Hong55050c12018-02-27 18:19:47 +0800155 '--probe_results', metavar='RESULTS.json',
156 help=('Output from "hwid probe" (used instead of probing this system).'))
Jon Salzce124fb2012-10-02 17:42:03 +0800157
Ricky Liang53390232013-03-08 15:37:57 +0800158_device_info_cmd_arg = CmdArg(
Ricky Liangf89f73a2013-03-19 05:00:24 +0800159 '--device_info', metavar='DEVICE_INFO.yaml', default=None,
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800160 help='A dict of device info to use instead of fetching from shopfloor '
Ricky Liang53390232013-03-08 15:37:57 +0800161 'server.')
162
Jon Salzce124fb2012-10-02 17:42:03 +0800163_hwid_cmd_arg = CmdArg(
164 '--hwid', metavar='HWID',
Ricky Lianga70a1202013-03-15 15:03:17 +0800165 help='HWID to verify (instead of the currently set HWID of this system).')
Jon Salzce124fb2012-10-02 17:42:03 +0800166
Yong Hong68a0e0d2017-12-20 19:06:54 +0800167_hwid_run_vpd_cmd_arg = CmdArg(
168 '--hwid-run-vpd', action='store_true',
169 help=('Specify the hwid utility to obtain the vpd data by running the '
170 '`vpd` commandline tool.'))
171
172_hwid_vpd_data_file_cmd_arg = CmdArg(
173 '--hwid-vpd-data-file', metavar='FILE.json', type=str, default=None,
174 help=('Specify the hwid utility to obtain the vpd data from the specified '
175 'file.'))
176
Bernie Thompson3c11c872013-07-22 18:22:45 -0700177_rma_mode_cmd_arg = CmdArg(
178 '--rma_mode', action='store_true',
179 help='Enable RMA mode, do not check for deprecated components.')
Tammo Spalink95c43732012-07-25 15:57:14 -0700180
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800181_cros_core_cmd_arg = CmdArg(
182 '--cros_core', action='store_true',
183 help='Finalize for ChromeOS Core devices (may add or remove few test '
Hung-Te Lin53c49402017-07-26 13:10:58 +0800184 'items. For example, registration codes or firmware bitmap '
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800185 'locale settings).')
186
Pin-Yen Lin215b7542020-05-05 09:45:37 +0800187_has_ec_pubkey_cmd_arg = CmdArg(
188 '--has_ec_pubkey', action='store_true', default=None,
189 help='The device has EC public key for EFS and need to run VerifyECKey.')
Yilun Lin599833f2017-12-22 14:07:46 +0800190
bowgotsai13820f42015-09-10 23:18:04 +0800191_enforced_release_channels_cmd_arg = CmdArg(
192 '--enforced_release_channels', nargs='*', default=None,
193 help='Enforced release image channels.')
194
Yilun Lin34f54802017-11-16 11:58:25 +0800195_ec_pubkey_path_cmd_arg = CmdArg(
196 '--ec_pubkey_path',
197 default=None,
198 help='Path to public key in vb2 format. Verify EC key with pubkey file.')
199
200_ec_pubkey_hash_cmd_arg = CmdArg(
201 '--ec_pubkey_hash',
202 default=None,
203 help='A string for public key hash. Verify EC key with the given hash.')
204
Hung-Te Lincdb96522016-04-15 16:51:10 +0800205_release_rootfs_cmd_arg = CmdArg(
206 '--release_rootfs', help='Location of release image rootfs partition.')
207
208_firmware_path_cmd_arg = CmdArg(
209 '--firmware_path', help='Location of firmware image partition.')
Ricky Liang43b879b2014-02-24 11:36:55 +0800210
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800211_shopfloor_url_args_cmd_arg = CmdArg(
212 '--shopfloor_url',
Earl Ou51182222016-09-09 12:16:48 +0800213 help='Shopfloor server url to be informed when wiping is done. '
214 'After wiping, a XML-RPC request will be sent to the '
215 'given url to indicate the completion of wiping.')
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800216
217_station_ip_cmd_arg = CmdArg(
218 '--station_ip',
219 help='IP of remote station')
220
221_station_port_cmd_arg = CmdArg(
222 '--station_port',
223 help='Port on remote station')
224
225_wipe_finish_token_cmd_arg = CmdArg(
226 '--wipe_finish_token',
227 help='Required token when notifying station after wipe finished')
228
Wei-Han Chenf3924112019-02-25 14:52:58 +0800229_keep_developer_mode_flag_after_clobber_state_cmd_arg = CmdArg(
230 # The argument name is super long because you should never use it by
231 # yourself when using command line tools.
232 '--keep_developer_mode_flag_after_clobber_state',
233 action='store_true', default=None,
234 help='After clobber-state, do not delete .developer_mode')
235
Ting Shen18a06382016-08-30 16:18:21 +0800236_waive_list_cmd_arg = CmdArg(
237 '--waive_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800238 help='A list of waived checks, separated by whitespace. '
239 'Each item should be a sub-command of gooftool. '
Ting Shen18a06382016-08-30 16:18:21 +0800240 'e.g. "gooftool verify --waive_list verify_tpm clear_gbb_flags".')
241
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800242_skip_list_cmd_arg = CmdArg(
243 '--skip_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800244 help='A list of skipped checks, separated by whitespace. '
245 'Each item should be a sub-command of gooftool. '
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800246 'e.g. "gooftool verify --skip_list verify_tpm clear_gbb_flags".')
247
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800248_test_umount_cmd_arg = CmdArg(
249 '--test_umount', action='store_true',
250 help='(For testing only) Only umount rootfs and stateful partition '
251 'instead of running full wiping and cutoff process.')
252
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800253_rlz_embargo_end_date_offset_cmd_arg = CmdArg(
Kevin Line4c64de2019-11-22 15:28:34 +0800254 '--embargo_offset', type=int, default=7, choices=list(range(7, 15)),
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800255 help='Change the offset of embargo end date, cannot less than 7 days or '
256 'more than 14 days.')
257
Marco Chena681b2e2018-08-31 11:41:41 +0800258_no_ectool_cmd_arg = CmdArg(
259 '--no_ectool', action='store_false', dest='has_ectool',
260 help='There is no ectool utility so tests rely on ectool should be '
261 'skipped.')
Tammo Spalink8fab5312012-05-28 18:33:30 +0800262
chuntsenaf1232f2019-03-20 15:45:54 +0800263_no_generate_mfg_date_cmd_arg = CmdArg(
264 '--no_generate_mfg_date', action='store_false', dest='generate_mfg_date',
265 help='Do not generate manufacturing date nor write mfg_date into VPD.')
266
Stimim Chenc9fbdfc2020-05-21 17:00:53 +0800267_enable_zero_touch_cmd_arg = CmdArg(
268 '--enable_zero_touch', action='store_true',
269 help='Set attested_device_id for zero-touch feature.')
270
chuntsenaf1232f2019-03-20 15:45:54 +0800271
Yilun Lin34f54802017-11-16 11:58:25 +0800272@Command(
273 'verify_ec_key',
274 _ec_pubkey_path_cmd_arg,
275 _ec_pubkey_hash_cmd_arg)
276def VerifyECKey(options):
277 """Verify EC key."""
278 return GetGooftool(options).VerifyECKey(
279 options.ec_pubkey_path, options.ec_pubkey_hash)
280
281
Hung-Te Line1d80f62016-03-31 14:58:13 +0800282@Command('verify_keys',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800283 _release_rootfs_cmd_arg,
284 _firmware_path_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800285def VerifyKeys(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800286 """Verify keys in firmware and SSD match."""
Hung-Te Line1d80f62016-03-31 14:58:13 +0800287 return GetGooftool(options).VerifyKeys(
Hung-Te Lincdb96522016-04-15 16:51:10 +0800288 options.release_rootfs, options.firmware_path)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800289
290
291@Command('set_fw_bitmap_locale')
Peter Shihfdf17682017-05-26 11:38:39 +0800292def SetFirmwareBitmapLocale(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800293 """Use VPD locale value to set firmware bitmap default language."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800294
Ricky Lianga70a1202013-03-15 15:03:17 +0800295 (index, locale) = GetGooftool(options).SetFirmwareBitmapLocale()
Andy Cheng2582d292012-12-04 17:38:28 +0800296 logging.info('Firmware bitmap initial locale set to %d (%s).',
297 index, locale)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800298
299
Hung-Te Line1d80f62016-03-31 14:58:13 +0800300@Command('verify_system_time',
Wei-Han Chen2790d2e2019-01-18 21:13:40 +0800301 _release_rootfs_cmd_arg,
302 _rma_mode_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800303def VerifySystemTime(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800304 """Verify system time is later than release filesystem creation time."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800305
Wei-Han Chen2790d2e2019-01-18 21:13:40 +0800306 return GetGooftool(options).VerifySystemTime(options.release_rootfs,
307 rma_mode=options.rma_mode)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800308
309
Hung-Te Line1d80f62016-03-31 14:58:13 +0800310@Command('verify_rootfs',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800311 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800312def VerifyRootFs(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800313 """Verify rootfs on SSD is valid by checking hash."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800314
Hung-Te Line1d80f62016-03-31 14:58:13 +0800315 return GetGooftool(options).VerifyRootFs(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800316
Hung-Te Lin56b18402015-01-16 14:52:30 +0800317
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800318@Command('verify_tpm')
Peter Shihfdf17682017-05-26 11:38:39 +0800319def VerifyTPM(options):
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800320 """Verify TPM is cleared."""
321
322 return GetGooftool(options).VerifyTPM()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800323
Hung-Te Lin56b18402015-01-16 14:52:30 +0800324
Hung-Te Lindd708d42014-07-11 17:05:01 +0800325@Command('verify_me_locked')
Peter Shihfdf17682017-05-26 11:38:39 +0800326def VerifyManagementEngineLocked(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800327 """Verify Management Engine is locked."""
Hung-Te Lindd708d42014-07-11 17:05:01 +0800328
329 return GetGooftool(options).VerifyManagementEngineLocked()
330
Hung-Te Lin56b18402015-01-16 14:52:30 +0800331
Marco Chena681b2e2018-08-31 11:41:41 +0800332@Command('verify_switch_wp',
333 _no_ectool_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800334def VerifyWPSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800335 """Verify hardware write protection switch is enabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800336
Marco Chena681b2e2018-08-31 11:41:41 +0800337 GetGooftool(options).VerifyWPSwitch(options.has_ectool)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800338
339
Hung-Te Lin53c49402017-07-26 13:10:58 +0800340@Command('verify_vpd')
341def VerifyVPD(options):
342 """Verify that VPD values are properly set.
Jon Salzadd90d32014-04-29 16:16:27 +0800343
Hung-Te Lin53c49402017-07-26 13:10:58 +0800344 Check if mandatory fields are set, and deprecated fields don't exist.
Jon Salzadd90d32014-04-29 16:16:27 +0800345 """
Hung-Te Lin53c49402017-07-26 13:10:58 +0800346 return GetGooftool(options).VerifyVPD()
Jon Salzadd90d32014-04-29 16:16:27 +0800347
348
bowgotsai13820f42015-09-10 23:18:04 +0800349@Command('verify_release_channel',
350 _enforced_release_channels_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800351def VerifyReleaseChannel(options):
bowgotsai529139c2015-05-30 01:39:49 +0800352 """Verify that release image channel is correct.
353
354 ChromeOS has four channels: canary, dev, beta and stable.
355 The last three channels support image auto-updates, checks
356 that release image channel is one of them.
357 """
bowgotsai13820f42015-09-10 23:18:04 +0800358 return GetGooftool(options).VerifyReleaseChannel(
359 options.enforced_release_channels)
bowgotsai529139c2015-05-30 01:39:49 +0800360
361
Wei-Han Chen0de7cfd2020-01-03 16:49:20 +0800362@Command('verify_cros_config')
363def VerifyCrosConfig(options):
364 """Verify entries in cros config make sense."""
365 return GetGooftool(options).VerifyCrosConfig()
366
367
Stimim Chenc9fbdfc2020-05-21 17:00:53 +0800368@Command('verify-sn-bits',
369 _enable_zero_touch_cmd_arg)
Stimim Chen8aaa2952020-05-20 13:04:24 +0800370def VerifySnBits(options):
Stimim Chenc9fbdfc2020-05-21 17:00:53 +0800371 if options.enable_zero_touch:
372 GetGooftool(options).VerifySnBits()
Stimim Chen8aaa2952020-05-20 13:04:24 +0800373
374
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800375@Command('write_protect')
Peter Shihfdf17682017-05-26 11:38:39 +0800376def EnableFwWp(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800377 """Enable then verify firmware write protection."""
Peter Shihfdf17682017-05-26 11:38:39 +0800378 del options # Unused.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800379
Yong Hongdad230a2017-08-30 22:25:19 +0800380 def WriteProtect(fw):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800381 """Calculate protection size, then invoke flashrom.
382
Yong Hongdad230a2017-08-30 22:25:19 +0800383 The region (offset and size) to write protect may be different per chipset
384 and firmware layout, so we have to read the WP_RO section from FMAP to
385 decide that.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800386 """
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800387 wp_section = 'WP_RO'
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800388
Yong Hongdad230a2017-08-30 22:25:19 +0800389 fmap_image = fw.GetFirmwareImage(
390 sections=(['FMAP'] if fw.target == crosfw.TARGET_MAIN else None))
391 if not fmap_image.has_section(wp_section):
392 raise Error('Could not find %s firmware section: %s' %
393 (fw.target.upper(), wp_section))
394
395 section_data = fw.GetFirmwareImage(
396 sections=[wp_section]).get_section_area(wp_section)
Peter Shihe6afab32018-09-11 17:16:48 +0800397 ro_offset, ro_size = section_data[0:2]
Yong Hongdad230a2017-08-30 22:25:19 +0800398
399 logging.debug('write protecting %s [off=%x size=%x]', fw.target.upper(),
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800400 ro_offset, ro_size)
Yong Hongdad230a2017-08-30 22:25:19 +0800401 crosfw.Flashrom(fw.target).EnableWriteProtection(ro_offset, ro_size)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800402
Philip Chendbb06202019-11-05 17:24:26 -0800403 if HasFpmcu():
404 # TODO(b/143991572): Implement enable_fpmcu_write_protection in gooftool.
405 cmd = os.path.join(
406 paths.FACTORY_DIR, 'sh', 'enable_fpmcu_write_protection.sh')
407 cmd_result = Shell(cmd)
408 if not cmd_result.success:
409 raise Error(
410 'Failed to enable FPMCU write protection, stdout=%r, stderr=%r' %
411 (cmd_result.stdout, cmd_result.stderr))
412
Yong Hongdad230a2017-08-30 22:25:19 +0800413 WriteProtect(crosfw.LoadMainFirmware())
Andy Cheng0465d132013-03-20 12:12:06 +0800414 event_log.Log('wp', fw='main')
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800415
Fei Shao21be8242020-04-13 16:57:51 +0800416 # Some EC (mostly PD) does not support "RO_NOW". Instead they will only set
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800417 # "RO_AT_BOOT" when you request to enable RO (These platforms consider
418 # --wp-range with right range identical to --wp-enable), and requires a
419 # 'ectool reboot_ec RO at-shutdown; reboot' to let the RO take effect.
Hung-Te Lin0d10b562016-12-28 10:58:07 +0800420 # After reboot, "flashrom -p host --wp-status" will return protected range.
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800421 # If you don't reboot, returned range will be (0, 0), and running command
422 # "ectool flashprotect" will not have RO_NOW.
Fei Shao21be8242020-04-13 16:57:51 +0800423 # generic_common.test_list.json provides "EnableECWriteProtect" test group
424 # which can be run individually before finalization. Try that out if you're
425 # having trouble enabling RO_NOW flag.
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800426
Yong Hongdad230a2017-08-30 22:25:19 +0800427 for fw in [crosfw.LoadEcFirmware(), crosfw.LoadPDFirmware()]:
428 if fw.GetChipId() is None:
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800429 logging.warning('%s not write protected (seems there is no %s flash).',
Yong Hongdad230a2017-08-30 22:25:19 +0800430 fw.target.upper(), fw.target.upper())
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800431 continue
Yong Hongdad230a2017-08-30 22:25:19 +0800432 WriteProtect(fw)
433 event_log.Log('wp', fw=fw.target)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800434
435
436@Command('clear_gbb_flags')
Peter Shihfdf17682017-05-26 11:38:39 +0800437def ClearGBBFlags(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800438 """Zero out the GBB flags, in preparation for transition to release state.
439
440 No GBB flags are set in release/shipping state, but they are useful
Hung-Te Lin879cff42017-06-19 12:46:37 +0800441 for factory/development. See "futility gbb --flags" for details.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800442 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800443
Ricky Lianga70a1202013-03-15 15:03:17 +0800444 GetGooftool(options).ClearGBBFlags()
Andy Cheng0465d132013-03-20 12:12:06 +0800445 event_log.Log('clear_gbb_flags')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800446
447
Jon Salzaa3a30e2013-05-15 15:56:28 +0800448@Command('clear_factory_vpd_entries')
Peter Shihfdf17682017-05-26 11:38:39 +0800449def ClearFactoryVPDEntries(options):
Jon Salzaa3a30e2013-05-15 15:56:28 +0800450 """Clears factory.* items in the RW VPD."""
451 entries = GetGooftool(options).ClearFactoryVPDEntries()
452 event_log.Log('clear_factory_vpd_entries', entries=FilterDict(entries))
453
454
Mattias Nisslercca761b2015-04-15 21:53:04 +0200455@Command('generate_stable_device_secret')
Peter Shihfdf17682017-05-26 11:38:39 +0800456def GenerateStableDeviceSecret(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800457 """Generates a fresh stable device secret and stores it in the RO VPD."""
Mattias Nisslercca761b2015-04-15 21:53:04 +0200458 GetGooftool(options).GenerateStableDeviceSecret()
459 event_log.Log('generate_stable_device_secret')
460
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800461
Cheng-Han Yang24d42d92020-08-09 04:53:53 +0800462@Command('cr50_set_ro_hash')
463def Cr50SetROHash(options):
464 GetGooftool(options).Cr50SetROHash()
465 event_log.Log('cr50_set_ro_hash')
466
Stimim Chenda9e62c2020-05-14 15:43:18 +0800467@Command('cr50_set_sn_bits_and_board_id',
468 _rma_mode_cmd_arg)
Yves Arrouyeb49b31e2019-03-06 21:51:52 -0800469def Cr50SetSnBitsAndBoardId(options):
Wei-Han Chen66357592020-01-14 15:15:37 +0800470 """Deprecated: use Cr50WriteFlashInfo instead."""
471 logging.warning('This function is renamed to Cr50WriteFlashInfo')
472 Cr50WriteFlashInfo(options)
473
474
Stimim Chen60f7bb22020-04-07 21:02:47 +0800475@Command('cr50_write_flash_info',
Stimim Chenda9e62c2020-05-14 15:43:18 +0800476 _rma_mode_cmd_arg,
Stimim Chenc9fbdfc2020-05-21 17:00:53 +0800477 _enable_zero_touch_cmd_arg)
Wei-Han Chen66357592020-01-14 15:15:37 +0800478def Cr50WriteFlashInfo(options):
Yves Arrouyeb49b31e2019-03-06 21:51:52 -0800479 """Set the serial number bits, board id and flags on the Cr50 chip."""
Stimim Chenc9fbdfc2020-05-21 17:00:53 +0800480 GetGooftool(options).Cr50WriteFlashInfo(
481 options.enable_zero_touch, options.rma_mode)
Wei-Han Chen66357592020-01-14 15:15:37 +0800482 event_log.Log('cr50_write_flash_info')
483
484
485@Command('cr50_write_whitelabel_flags')
486def Cr50WriteWhitelabelFlags(options):
487 GetGooftool(options).Cr50WriteWhitelabelFlags()
488 event_log.Log('cr50_write_whitelabel_flags')
Shen-En Shihd078a7c2017-08-04 13:33:49 +0800489
490
Marco Chen20c885d2018-10-04 17:22:03 +0800491@Command('cr50_disable_factory_mode')
Marco Chen44a666d2018-07-13 21:01:50 +0800492def Cr50DisableFactoryMode(options):
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800493 """Reset Cr50 state back to default state after RMA."""
Marco Chen44a666d2018-07-13 21:01:50 +0800494 return GetGooftool(options).Cr50DisableFactoryMode()
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800495
496
Earl Ou564a7872016-10-05 10:22:00 +0800497@Command('enable_release_partition',
498 CmdArg('--release_rootfs',
499 help=('path to the release rootfs device. If not specified, '
500 'the default (5th) partition will be used.')))
501def EnableReleasePartition(options):
502 """Enables a release image partition on the disk."""
503 GetGooftool(options).EnableReleasePartition(options.release_rootfs)
504
505
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800506@Command('wipe_in_place',
507 CmdArg('--fast', action='store_true',
Shun-Hsing Ou8d3c40a2015-10-08 18:16:08 +0800508 help='use non-secure but faster wipe method.'),
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800509 _shopfloor_url_args_cmd_arg,
510 _station_ip_cmd_arg,
511 _station_port_cmd_arg,
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800512 _wipe_finish_token_cmd_arg,
513 _test_umount_cmd_arg)
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800514def WipeInPlace(options):
515 """Start factory wipe directly without reboot."""
516
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800517 GetGooftool(options).WipeInPlace(options.fast,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800518 options.shopfloor_url,
519 options.station_ip,
520 options.station_port,
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800521 options.wipe_finish_token,
522 options.test_umount)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200523
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800524@Command('wipe_init',
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800525 CmdArg('--wipe_args', help='arguments for clobber-state'),
526 CmdArg('--state_dev', help='path to stateful partition device'),
527 CmdArg('--root_disk', help='path to primary device'),
528 CmdArg('--old_root', help='path to old root'),
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800529 _shopfloor_url_args_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800530 _release_rootfs_cmd_arg,
531 _station_ip_cmd_arg,
532 _station_port_cmd_arg,
Wei-Han Chenf3924112019-02-25 14:52:58 +0800533 _wipe_finish_token_cmd_arg,
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800534 _keep_developer_mode_flag_after_clobber_state_cmd_arg,
535 _test_umount_cmd_arg)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800536def WipeInit(options):
Wei-Han Chenf3924112019-02-25 14:52:58 +0800537 GetGooftool(options).WipeInit(
538 options.wipe_args,
539 options.shopfloor_url,
540 options.state_dev,
541 options.release_rootfs,
542 options.root_disk,
543 options.old_root,
544 options.station_ip,
545 options.station_port,
546 options.wipe_finish_token,
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800547 options.keep_developer_mode_flag_after_clobber_state,
548 options.test_umount)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800549
Stimim Chen8aaa2952020-05-20 13:04:24 +0800550
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800551@Command('verify',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800552 CmdArg('--no_write_protect', action='store_true',
553 help='Do not check write protection switch state.'),
Tammo Spalink95c43732012-07-25 15:57:14 -0700554 _hwid_status_list_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800555 _hwdb_path_cmd_arg,
Yong Hong5408f652017-07-11 19:20:25 +0800556 _project_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800557 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800558 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800559 _hwid_run_vpd_cmd_arg,
560 _hwid_vpd_data_file_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800561 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800562 _cros_core_cmd_arg,
Pin-Yen Lin215b7542020-05-05 09:45:37 +0800563 _has_ec_pubkey_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800564 _ec_pubkey_path_cmd_arg,
565 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800566 _release_rootfs_cmd_arg,
567 _firmware_path_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800568 _enforced_release_channels_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800569 _waive_list_cmd_arg,
Marco Chena681b2e2018-08-31 11:41:41 +0800570 _skip_list_cmd_arg,
Stimim Chenc9fbdfc2020-05-21 17:00:53 +0800571 _no_ectool_cmd_arg,
572 _enable_zero_touch_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800573def Verify(options):
574 """Verifies if whole factory process is ready for finalization.
575
576 This routine performs all the necessary checks to make sure the
577 device is ready to be finalized, but does not modify state. These
578 checks include dev switch, firmware write protection switch, hwid,
579 system time, keys, and root file system.
580 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800581
Hung-Te Lin6d827542012-07-19 11:50:41 +0800582 if not options.no_write_protect:
Ricky Lianga70a1202013-03-15 15:03:17 +0800583 VerifyWPSwitch(options)
Hung-Te Lindd708d42014-07-11 17:05:01 +0800584 VerifyManagementEngineLocked(options)
Ting Shen129fa6f2016-09-02 12:22:24 +0800585 VerifyHWID(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800586 VerifySystemTime(options)
Pin-Yen Lin215b7542020-05-05 09:45:37 +0800587 if options.has_ec_pubkey:
Yilun Lin599833f2017-12-22 14:07:46 +0800588 VerifyECKey(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800589 VerifyKeys(options)
590 VerifyRootFs(options)
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800591 VerifyTPM(options)
Hung-Te Lin53c49402017-07-26 13:10:58 +0800592 VerifyVPD(options)
bowgotsai529139c2015-05-30 01:39:49 +0800593 VerifyReleaseChannel(options)
Wei-Han Chen0de7cfd2020-01-03 16:49:20 +0800594 VerifyCrosConfig(options)
Stimim Chen8aaa2952020-05-20 13:04:24 +0800595 VerifySnBits(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800596
Hung-Te Lin56b18402015-01-16 14:52:30 +0800597
Jon Salzfe9036f2014-01-16 14:11:23 +0800598@Command('untar_stateful_files')
Hung-Te Lin388bce22014-06-03 19:56:40 +0800599def UntarStatefulFiles(unused_options):
Jon Salzfe9036f2014-01-16 14:11:23 +0800600 """Untars stateful files from stateful_files.tar.xz on stateful partition.
601
602 If that file does not exist (which should only be R30 and earlier),
603 this is a no-op.
604 """
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800605 # Path to stateful partition on device.
606 device_stateful_path = '/mnt/stateful_partition'
607 tar_file = os.path.join(device_stateful_path, 'stateful_files.tar.xz')
Jon Salzfe9036f2014-01-16 14:11:23 +0800608 if os.path.exists(tar_file):
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800609 Spawn(['tar', 'xf', tar_file], cwd=device_stateful_path,
Jon Salzfe9036f2014-01-16 14:11:23 +0800610 log=True, check_call=True)
611 else:
612 logging.warning('No stateful files at %s', tar_file)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800613
Jon Salz40b9f822014-07-25 16:39:55 +0800614
615@Command('log_source_hashes')
Peter Shihfdf17682017-05-26 11:38:39 +0800616def LogSourceHashes(options):
Jon Salz40b9f822014-07-25 16:39:55 +0800617 """Logs hashes of source files in the factory toolkit."""
Peter Shihfdf17682017-05-26 11:38:39 +0800618 del options # Unused.
Jon Salze60307f2014-08-05 16:20:00 +0800619 # WARNING: The following line is necessary to validate the integrity
620 # of the factory software. Do not remove or modify it.
621 #
622 # 警告:此行会验证工厂软件的完整性,禁止删除或修改。
Wei-Han Chena5c01a02016-04-23 19:27:19 +0800623 factory_par = sys_utils.GetRunningFactoryPythonArchivePath()
624 if factory_par:
625 event_log.Log(
626 'source_hashes',
627 **file_utils.HashPythonArchive(factory_par))
628 else:
629 event_log.Log(
630 'source_hashes',
Peter Shihad166772017-05-31 11:36:17 +0800631 **file_utils.HashSourceTree(os.path.join(paths.FACTORY_DIR, 'py')))
Jon Salz40b9f822014-07-25 16:39:55 +0800632
633
Tammo Spalink86a61c62012-05-25 15:10:35 +0800634@Command('log_system_details')
Peter Shihfdf17682017-05-26 11:38:39 +0800635def LogSystemDetails(options):
Tammo Spalink86a61c62012-05-25 15:10:35 +0800636 """Write miscellaneous system details to the event log."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800637
Ricky Liang43b879b2014-02-24 11:36:55 +0800638 event_log.Log('system_details', **GetGooftool(options).GetSystemDetails())
Tammo Spalink86a61c62012-05-25 15:10:35 +0800639
640
Jon Salza88b83b2013-05-27 20:00:35 +0800641def CreateReportArchiveBlob(*args, **kwargs):
642 """Creates a report archive and returns it as a blob.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800643
Jon Salza88b83b2013-05-27 20:00:35 +0800644 Args:
645 See CreateReportArchive.
Andy Cheng7a76cb82012-11-19 18:08:19 +0800646
Jon Salza88b83b2013-05-27 20:00:35 +0800647 Returns:
Yilin Yange02d5722019-10-23 11:07:36 +0800648 An xmlrpc.client.Binary object containing a .tar.xz file.
Jon Salza88b83b2013-05-27 20:00:35 +0800649 """
Wei-Han Chen47416612016-09-14 17:41:52 +0800650 report_archive = CreateReportArchive(*args, **kwargs)
651 try:
Yilin Yangf6994c22019-12-09 16:17:21 +0800652 return xmlrpc.client.Binary(
653 file_utils.ReadFile(report_archive, encoding=None))
Wei-Han Chen47416612016-09-14 17:41:52 +0800654 finally:
655 os.unlink(report_archive)
Jon Salza88b83b2013-05-27 20:00:35 +0800656
657
658def CreateReportArchive(device_sn=None, add_file=None):
659 """Creates a report archive in a temporary directory.
660
661 Args:
662 device_sn: The device serial number (optional).
663 add_file: A list of files to add (optional).
664
665 Returns:
666 Path to the archive.
667 """
Philip Chen6ada02c2019-11-04 19:41:54 +0000668 # Flush Testlog data to DATA_TESTLOG_DIR before creating a report archive.
669 result, reason = state.GetInstance().FlushTestlog(
670 uplink=False, local=True, timeout=10)
671 if not result:
672 logging.warning('Failed to flush testlog data: %s', reason)
673
Hung-Te Lin6bd16472012-06-20 16:26:47 +0800674 def NormalizeAsFileName(token):
675 return re.sub(r'\W+', '', token).strip()
Jon Salza88b83b2013-05-27 20:00:35 +0800676
677 target_name = '%s%s.tar.xz' % (
678 time.strftime('%Y%m%dT%H%M%SZ',
679 time.gmtime()),
Hung-Te Lin56b18402015-01-16 14:52:30 +0800680 ('' if device_sn is None else
681 '_' + NormalizeAsFileName(device_sn)))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800682 target_path = os.path.join(gettempdir(), target_name)
Jon Salza88b83b2013-05-27 20:00:35 +0800683
Tammo Spalink86a61c62012-05-25 15:10:35 +0800684 # Intentionally ignoring dotfiles in EVENT_LOG_DIR.
Pi-Hsun Shih1f569a72019-12-26 11:23:56 +0800685 tar_cmd = 'cd %s ; tar cJf %s * -C /' % (event_log.EVENT_LOG_DIR, target_path)
Jongpil Jung23355a92019-12-31 14:38:29 +0900686 tar_files = [paths.FACTORY_LOG_PATH, paths.DATA_TESTLOG_DIR]
687 if add_file:
688 tar_files = tar_files + add_file
Pi-Hsun Shih1f569a72019-12-26 11:23:56 +0800689 for f in tar_files:
690 # Require absolute paths since we use -C / to change current directory to
691 # root.
692 if not f.startswith('/'):
693 raise Error('Not an absolute path: %s' % f)
694 if not os.path.exists(f):
695 raise Error('File does not exist: %s' % f)
696 tar_cmd += ' %s' % pipes.quote(f[1:])
Tammo Spalink86a61c62012-05-25 15:10:35 +0800697 cmd_result = Shell(tar_cmd)
Jon Salzff88c022012-11-03 12:19:58 +0800698
Hung-Te Lin3756c432020-01-16 11:30:46 +0800699 if cmd_result.status == 1:
700 # tar returns 1 when some files were changed during archiving,
701 # but that is expected for log files so should ignore such failure
702 # if the archive looks good.
Pi-Hsun Shih1f569a72019-12-26 11:23:56 +0800703 Spawn(['tar', 'tJf', target_path], check_call=True, log=True,
Jon Salzff88c022012-11-03 12:19:58 +0800704 ignore_stdout=True)
705 elif not cmd_result.success:
Tammo Spalink86a61c62012-05-25 15:10:35 +0800706 raise Error('unable to tar event logs, cmd %r failed, stderr: %r' %
707 (tar_cmd, cmd_result.stderr))
Jon Salzff88c022012-11-03 12:19:58 +0800708
Jon Salza88b83b2013-05-27 20:00:35 +0800709 return target_path
710
711_upload_method_cmd_arg = CmdArg(
712 '--upload_method', metavar='METHOD:PARAM',
713 help=('How to perform the upload. METHOD should be one of '
Kevin Line4c64de2019-11-22 15:28:34 +0800714 '{ftp, shopfloor, ftps, cpfe, smb}.'))
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800715_upload_max_retry_times_arg = CmdArg(
716 '--upload_max_retry_times', type=int, default=0,
717 help='Number of tries to upload. 0 to retry infinitely.')
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800718_upload_retry_interval_arg = CmdArg(
719 '--upload_retry_interval', type=int, default=None,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800720 help='Retry interval in seconds.')
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800721_upload_allow_fail_arg = CmdArg(
722 '--upload_allow_fail', action='store_true',
723 help='Continue finalize if report upload fails.')
Jon Salza88b83b2013-05-27 20:00:35 +0800724_add_file_cmd_arg = CmdArg(
725 '--add_file', metavar='FILE', action='append',
726 help='Extra file to include in report (must be an absolute path)')
727
Hung-Te Lin56b18402015-01-16 14:52:30 +0800728
Jon Salza88b83b2013-05-27 20:00:35 +0800729@Command('upload_report',
730 _upload_method_cmd_arg,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800731 _upload_max_retry_times_arg,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800732 _upload_retry_interval_arg,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800733 _upload_allow_fail_arg,
Jon Salza88b83b2013-05-27 20:00:35 +0800734 _add_file_cmd_arg)
735def UploadReport(options):
736 """Create a report containing key device details."""
Yong Hong65bda312018-12-13 20:05:58 +0800737 ro_vpd = vpd.VPDTool().GetAllData(partition=vpd.VPD_READONLY_PARTITION_NAME)
Jon Salza88b83b2013-05-27 20:00:35 +0800738 device_sn = ro_vpd.get('serial_number', None)
739 if device_sn is None:
740 logging.warning('RO_VPD missing device serial number')
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +0800741 device_sn = 'MISSING_SN_' + time_utils.TimedUUID()
chuntsena6da2be2019-08-14 17:11:55 +0800742 target_path = CreateReportArchive(device_sn, options.add_file)
Jon Salza88b83b2013-05-27 20:00:35 +0800743
Tammo Spalink86a61c62012-05-25 15:10:35 +0800744 if options.upload_method is None or options.upload_method == 'none':
745 logging.warning('REPORT UPLOAD SKIPPED (report left at %s)', target_path)
746 return
747 method, param = options.upload_method.split(':', 1)
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800748
749 if options.upload_retry_interval is not None:
750 retry_interval = options.upload_retry_interval
751 else:
752 retry_interval = report_upload.DEFAULT_RETRY_INTERVAL
753
Tammo Spalink86a61c62012-05-25 15:10:35 +0800754 if method == 'shopfloor':
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800755 report_upload.ShopFloorUpload(
756 target_path, param,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800757 'GRT' if options.command_name == 'finalize' else None,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800758 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800759 retry_interval=retry_interval,
760 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800761 elif method == 'ftp':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800762 report_upload.FtpUpload(target_path, 'ftp:' + param,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800763 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800764 retry_interval=retry_interval,
765 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800766 elif method == 'ftps':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800767 report_upload.CurlUrlUpload(target_path, '--ftp-ssl-reqd ftp:%s' % param,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800768 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800769 retry_interval=retry_interval,
770 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800771 elif method == 'cpfe':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800772 report_upload.CpfeUpload(target_path, pipes.quote(param),
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800773 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800774 retry_interval=retry_interval,
775 allow_fail=options.upload_allow_fail)
Kevin Line4c64de2019-11-22 15:28:34 +0800776 elif method == 'smb':
777 # param should be in form: <dest_path>.
778 report_upload.SmbUpload(target_path, 'smb:' + param,
779 max_retry_times=options.upload_max_retry_times,
780 retry_interval=retry_interval,
781 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800782 else:
Peter Shihbf6f22b2018-02-26 14:05:28 +0800783 raise Error('unknown report upload method %r' % method)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800784
785
786@Command('finalize',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800787 CmdArg('--no_write_protect', action='store_true',
788 help='Do not enable firmware write protection.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800789 CmdArg('--fast', action='store_true',
790 help='use non-secure but faster wipe method.'),
Yong Hongb2926bd2018-10-12 14:11:14 +0800791 _no_ectool_cmd_arg,
Shun-Hsing Oudb407d62015-11-11 11:03:59 +0800792 _shopfloor_url_args_cmd_arg,
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800793 _hwdb_path_cmd_arg,
Tammo Spalink95c43732012-07-25 15:57:14 -0700794 _hwid_status_list_cmd_arg,
Jon Salz65266432012-07-30 19:02:49 +0800795 _upload_method_cmd_arg,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800796 _upload_max_retry_times_arg,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800797 _upload_retry_interval_arg,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800798 _upload_allow_fail_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800799 _add_file_cmd_arg,
800 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800801 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800802 _hwid_run_vpd_cmd_arg,
803 _hwid_vpd_data_file_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800804 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800805 _cros_core_cmd_arg,
Pin-Yen Lin215b7542020-05-05 09:45:37 +0800806 _has_ec_pubkey_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800807 _ec_pubkey_path_cmd_arg,
808 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800809 _release_rootfs_cmd_arg,
810 _firmware_path_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800811 _enforced_release_channels_cmd_arg,
812 _station_ip_cmd_arg,
813 _station_port_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800814 _wipe_finish_token_cmd_arg,
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800815 _rlz_embargo_end_date_offset_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800816 _waive_list_cmd_arg,
chuntsenaf1232f2019-03-20 15:45:54 +0800817 _skip_list_cmd_arg,
Stimim Chenc9fbdfc2020-05-21 17:00:53 +0800818 _no_generate_mfg_date_cmd_arg,
819 _enable_zero_touch_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800820def Finalize(options):
821 """Verify system readiness and trigger transition into release state.
822
Jon Salzaa3a30e2013-05-15 15:56:28 +0800823 This routine does the following:
824 - Verifies system state (see verify command)
Jon Salzfe9036f2014-01-16 14:11:23 +0800825 - Untars stateful_files.tar.xz, if it exists, in the stateful partition, to
826 initialize files such as the CRX cache
Jon Salzaa3a30e2013-05-15 15:56:28 +0800827 - Modifies firmware bitmaps to match locale
828 - Clears all factory-friendly flags from the GBB
829 - Removes factory-specific entries from RW_VPD (factory.*)
830 - Enables firmware write protection (cannot rollback after this)
Marco Chenecee04f2019-02-15 22:24:24 +0800831 - Initialize Fpmcu entropy
Jon Salzaa3a30e2013-05-15 15:56:28 +0800832 - Uploads system logs & reports
Earl Ou51182222016-09-09 12:16:48 +0800833 - Wipes the testing kernel, rootfs, and stateful partition
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800834 """
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800835 if not options.rma_mode:
836 # Write VPD values related to RLZ ping into VPD.
837 GetGooftool(options).WriteVPDForRLZPing(options.embargo_offset)
Cheng-Han Yang24d42d92020-08-09 04:53:53 +0800838 GetGooftool(options).Cr50SetROHash()
chuntsenaf1232f2019-03-20 15:45:54 +0800839 if options.generate_mfg_date:
840 GetGooftool(options).WriteVPDForMFGDate()
Wei-Han Chen66357592020-01-14 15:15:37 +0800841 Cr50WriteFlashInfo(options)
Marco Chen44a666d2018-07-13 21:01:50 +0800842 Cr50DisableFactoryMode(options)
Marco Chen9d0631c2018-08-31 10:52:44 +0800843 Verify(options)
Jon Salz40b9f822014-07-25 16:39:55 +0800844 LogSourceHashes(options)
Jon Salzfe9036f2014-01-16 14:11:23 +0800845 UntarStatefulFiles(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800846 if options.cros_core:
847 logging.info('SetFirmwareBitmapLocale is skipped for ChromeOS Core device.')
848 else:
849 SetFirmwareBitmapLocale(options)
Jon Salzaa3a30e2013-05-15 15:56:28 +0800850 ClearFactoryVPDEntries(options)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200851 GenerateStableDeviceSecret(options)
Shen-En Shih3e079b22017-09-11 05:43:09 -0700852 ClearGBBFlags(options)
Hung-Te Lin6d827542012-07-19 11:50:41 +0800853 if options.no_write_protect:
Pi-Hsun Shih1f569a72019-12-26 11:23:56 +0800854 logging.warning('WARNING: Firmware Write Protection is SKIPPED.')
Andy Cheng0465d132013-03-20 12:12:06 +0800855 event_log.Log('wp', fw='both', status='skipped')
Hung-Te Lin6d827542012-07-19 11:50:41 +0800856 else:
Wei-Han Chenba21f512016-10-14 18:52:33 +0800857 EnableFwWp(options)
Marco Chenecee04f2019-02-15 22:24:24 +0800858 FpmcuInitializeEntropy(options)
Jon Salza0f58e02012-05-29 19:33:39 +0800859 LogSystemDetails(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800860 UploadReport(options)
Earl Ou51182222016-09-09 12:16:48 +0800861
862 event_log.Log('wipe_in_place')
863 wipe_args = []
Earl Ou51182222016-09-09 12:16:48 +0800864 if options.shopfloor_url:
865 wipe_args += ['--shopfloor_url', options.shopfloor_url]
866 if options.fast:
867 wipe_args += ['--fast']
868 if options.station_ip:
869 wipe_args += ['--station_ip', options.station_ip]
870 if options.station_port:
871 wipe_args += ['--station_port', options.station_port]
872 if options.wipe_finish_token:
873 wipe_args += ['--wipe_finish_token', options.wipe_finish_token]
874 ExecFactoryPar('gooftool', 'wipe_in_place', *wipe_args)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800875
876
Ting Shen129fa6f2016-09-02 12:22:24 +0800877@Command('verify_hwid',
878 _probe_results_cmd_arg,
879 _hwdb_path_cmd_arg,
880 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800881 _hwid_run_vpd_cmd_arg,
882 _hwid_vpd_data_file_cmd_arg,
Ting Shen129fa6f2016-09-02 12:22:24 +0800883 _rma_mode_cmd_arg)
884def VerifyHWID(options):
Ricky Liangc662be32013-12-24 11:50:23 +0800885 """A simple wrapper that calls out to HWID utils to verify version 3 HWID.
Ricky Liang53390232013-03-08 15:37:57 +0800886
Ricky Liangc662be32013-12-24 11:50:23 +0800887 This is mainly for Gooftool to verify v3 HWID during finalize. For testing
888 and development purposes, please use `hwid` command.
Ricky Liang53390232013-03-08 15:37:57 +0800889 """
Yong Hongada8e0e2018-01-04 16:36:21 +0800890 database = GetGooftool(options).db
Yong Hong68a0e0d2017-12-20 19:06:54 +0800891
Yong Hongada8e0e2018-01-04 16:36:21 +0800892 encoded_string = options.hwid or GetGooftool(options).ReadHWID()
893
894 probed_results = hwid_utils.GetProbedResults(infile=options.probe_results)
Yong Hong2c39bf22018-01-24 22:24:11 +0800895 device_info = hwid_utils.GetDeviceInfo()
Yong Hong65bda312018-12-13 20:05:58 +0800896 vpd_data = hwid_utils.GetVPDData(run_vpd=options.hwid_run_vpd,
897 infile=options.hwid_vpd_data_file)
Ricky Liang53390232013-03-08 15:37:57 +0800898
Hung-Te Lin11052952015-03-18 13:48:59 +0800899 event_log.Log('probed_results', probed_results=FilterDict(probed_results))
Yong Hong65bda312018-12-13 20:05:58 +0800900 event_log.Log('vpd', vpd=FilterDict(vpd_data))
Ricky Liang53390232013-03-08 15:37:57 +0800901
Yong Hong2c39bf22018-01-24 22:24:11 +0800902 hwid_utils.VerifyHWID(database, encoded_string, probed_results,
Yong Hong65bda312018-12-13 20:05:58 +0800903 device_info, vpd_data, options.rma_mode)
Ricky Liang53390232013-03-08 15:37:57 +0800904
Ricky Liangc662be32013-12-24 11:50:23 +0800905 event_log.Log('verified_hwid', hwid=encoded_string)
Ricky Liang53390232013-03-08 15:37:57 +0800906
907
henryhsu44d793a2013-07-20 00:07:38 +0800908@Command('get_firmware_hash',
Marco Chence70b132018-05-03 23:43:39 +0800909 CmdArg('--file', required=True, metavar='FILE', help='Firmware File.'))
henryhsu44d793a2013-07-20 00:07:38 +0800910def GetFirmwareHash(options):
henryhsuf6f835c2013-07-20 20:49:25 +0800911 """Get firmware hash from a file"""
henryhsu44d793a2013-07-20 00:07:38 +0800912 if os.path.exists(options.file):
Cheng-Han Yang2c668ae2018-04-18 22:31:07 +0800913 value_dict = chromeos_firmware.CalculateFirmwareHashes(options.file)
Yilin Yang879fbda2020-05-14 13:52:30 +0800914 for key, value in value_dict.items():
Yilin Yang71e39412019-09-24 09:26:46 +0800915 print(' %s: %s' % (key, value))
henryhsu44d793a2013-07-20 00:07:38 +0800916 else:
917 raise Error('File does not exist: %s' % options.file)
918
henryhsuf6f835c2013-07-20 20:49:25 +0800919
Philip Chen04fb90b2019-11-06 12:10:33 -0800920@Command('fpmcu_initialize_entropy')
Marco Chenecee04f2019-02-15 22:24:24 +0800921def FpmcuInitializeEntropy(options):
922 """Initialze entropy of FPMCU."""
Philip Chen04fb90b2019-11-06 12:10:33 -0800923
924 if HasFpmcu():
Marco Chenecee04f2019-02-15 22:24:24 +0800925 GetGooftool(options).FpmcuInitializeEntropy()
Philip Chen04fb90b2019-11-06 12:10:33 -0800926 else:
927 logging.info('No FPS on this board.')
Marco Chenecee04f2019-02-15 22:24:24 +0800928
929
Peter Shihfdf17682017-05-26 11:38:39 +0800930def main():
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800931 """Run sub-command specified by the command line args."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800932
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800933 options = ParseCmdline(
Ting Shen129fa6f2016-09-02 12:22:24 +0800934 'Perform Google required factory tests.',
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800935 CmdArg('-l', '--log', metavar='PATH',
936 help='Write logs to this file.'),
Jon Salza4bea382012-10-29 13:00:34 +0800937 CmdArg('--suppress-event-logs', action='store_true',
938 help='Suppress event logging.'),
Wei-Han Chenaff56232016-04-16 09:17:59 +0800939 CmdArg('--phase', default=None,
940 help=('override phase for phase checking (defaults to the current '
941 'as returned by the "factory phase" command)')),
Wei-Han Chenb34bdff2019-09-26 13:07:50 +0800942 VERBOSITY_CMD_ARG)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800943 SetupLogging(options.verbosity, options.log)
Andy Cheng0465d132013-03-20 12:12:06 +0800944 event_log.SetGlobalLoggerDefaultPrefix('gooftool')
945 event_log.GetGlobalLogger().suppress = options.suppress_event_logs
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800946 logging.debug('gooftool options: %s', repr(options))
Wei-Han Chenaff56232016-04-16 09:17:59 +0800947
948 phase.OverridePhase(options.phase)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800949 try:
950 logging.debug('GOOFTOOL command %r', options.command_name)
951 options.command(options)
952 logging.info('GOOFTOOL command %r SUCCESS', options.command_name)
Peter Shih6674ecf2018-03-29 14:04:57 +0800953 except Error as e:
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800954 logging.exception(e)
955 sys.exit('GOOFTOOL command %r ERROR: %s' % (options.command_name, e))
Peter Shih6674ecf2018-03-29 14:04:57 +0800956 except Exception as e:
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800957 logging.exception(e)
958 sys.exit('UNCAUGHT RUNTIME EXCEPTION %s' % e)
959
960
961if __name__ == '__main__':
Peter Shihfdf17682017-05-26 11:38:39 +0800962 main()