blob: ca074d2252b8cecbf2a36d4173790176e41931c6 [file] [log] [blame]
You-Cheng Syuf0f4be12017-12-05 16:33:53 +08001#!/usr/bin/env python
Jon Salze60307f2014-08-05 16:20:00 +08002# -*- coding: utf-8 -*-
3# Copyright 2014 The Chromium OS Authors. All rights reserved.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08004# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
Jon Salze60307f2014-08-05 16:20:00 +08007
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08008"""Google Factory Tool.
9
You-Cheng Syu461ec032017-03-06 15:56:58 +080010This tool is intended to be used on factory assembly lines. It
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080011provides all of the Google required test functionality and must be run
12on each device as part of the assembly process.
13"""
14
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080015import logging
16import os
Jon Salz65266432012-07-30 19:02:49 +080017import pipes
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080018import re
19import sys
Peter Shihfdf17682017-05-26 11:38:39 +080020from tempfile import gettempdir
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080021import threading
Hung-Te Lin6bd16472012-06-20 16:26:47 +080022import time
Jon Salza88b83b2013-05-27 20:00:35 +080023import xmlrpclib
Peter Shihfdf17682017-05-26 11:38:39 +080024
Ricky Liang7905f272013-03-16 01:57:10 +080025import yaml
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080026
Peter Shihfdf17682017-05-26 11:38:39 +080027import factory_common # pylint: disable=unused-import
Wei-Han Chen0a3320e2016-04-23 01:32:07 +080028from cros.factory.gooftool.common import ExecFactoryPar
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080029from cros.factory.gooftool.common import Shell
Peter Shihfdf17682017-05-26 11:38:39 +080030from cros.factory.gooftool.core import Gooftool
31from cros.factory.gooftool import crosfw
32from cros.factory.gooftool.probe import CalculateFirmwareHashes
Ting Shen129fa6f2016-09-02 12:22:24 +080033from cros.factory.gooftool.probe import Probe
34from cros.factory.gooftool.probe import ReadRoVpd
Peter Shihfdf17682017-05-26 11:38:39 +080035from cros.factory.gooftool import report_upload
Hung-Te Lin604e0c22015-11-24 15:17:07 +080036from cros.factory.hwid.v3 import common
37from cros.factory.hwid.v3 import hwid_utils
Wei-Han Chen2ebb92d2016-01-12 14:51:41 +080038from cros.factory.test.env import paths
Peter Shihfdf17682017-05-26 11:38:39 +080039from cros.factory.test import event_log
Wei-Han Chenaff56232016-04-16 09:17:59 +080040from cros.factory.test.rules import phase
Hung-Te Lin3f096842016-01-13 17:37:06 +080041from cros.factory.test.rules.privacy import FilterDict
Peter Shihfdf17682017-05-26 11:38:39 +080042from cros.factory.utils import argparse_utils
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080043from cros.factory.utils.argparse_utils import CmdArg
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080044from cros.factory.utils.argparse_utils import ParseCmdline
45from cros.factory.utils.argparse_utils import verbosity_cmd_arg
Peter Shihfdf17682017-05-26 11:38:39 +080046from cros.factory.utils.debug_utils import SetupLogging
Jon Salz40b9f822014-07-25 16:39:55 +080047from cros.factory.utils import file_utils
Wei-Han Chena5c01a02016-04-23 19:27:19 +080048from cros.factory.utils import sys_utils
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +080049from cros.factory.utils import time_utils
Jon Salzff88c022012-11-03 12:19:58 +080050from cros.factory.utils.process_utils import Spawn
Joel Kitchingd3bc2662014-12-16 16:03:32 -080051from cros.factory.utils.type_utils import Error
Tammo Spalink86a61c62012-05-25 15:10:35 +080052
Tammo Spalink5c699832012-07-03 17:50:39 +080053
Tammo Spalink5c699832012-07-03 17:50:39 +080054# TODO(tammo): Replace calls to sys.exit with raise Exit, and maybe
55# treat that specially (as a smoot exit, as opposed to the more
56# verbose output for generic Error).
57
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080058_global_gooftool = None
59_gooftool_lock = threading.Lock()
Tammo Spalink5c699832012-07-03 17:50:39 +080060
Hung-Te Lin56b18402015-01-16 14:52:30 +080061
Ricky Lianga70a1202013-03-15 15:03:17 +080062def GetGooftool(options):
Peter Shihfdf17682017-05-26 11:38:39 +080063 global _global_gooftool # pylint: disable=global-statement
Ricky Lianga70a1202013-03-15 15:03:17 +080064
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080065 if _global_gooftool is None:
66 with _gooftool_lock:
Shen-En Shihc5d15d62017-08-04 13:02:59 +080067 if _global_gooftool is None:
68 project = getattr(options, 'project', None)
69 hwdb_path = getattr(options, 'hwdb_path', None)
70 _global_gooftool = Gooftool(hwid_version=3, project=project,
71 hwdb_path=hwdb_path)
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080072
73 return _global_gooftool
Ricky Lianga70a1202013-03-15 15:03:17 +080074
Hung-Te Lin56b18402015-01-16 14:52:30 +080075
Ting Shen18a06382016-08-30 16:18:21 +080076def Command(cmd_name, *args, **kwargs):
77 """ Decorator for commands in gooftool.
78
79 This is similar to argparse_utils.Command, but all gooftool commands
80 can be waived during `gooftool finalize` or `gooftool verify` using
Wei-Han Chen60c5d332017-01-05 17:15:10 +080081 --waive_list or --skip_list option.
Ting Shen18a06382016-08-30 16:18:21 +080082 """
83 def Decorate(fun):
Wei-Han Chen60c5d332017-01-05 17:15:10 +080084 def CommandWithWaiveSkipCheck(options):
Ting Shen18a06382016-08-30 16:18:21 +080085 waive_list = vars(options).get('waive_list', [])
Wei-Han Chen60c5d332017-01-05 17:15:10 +080086 skip_list = vars(options).get('skip_list', [])
87 if phase.GetPhase() >= phase.PVT_DOGFOOD and (
88 waive_list != [] or skip_list != []):
Ting Shen18a06382016-08-30 16:18:21 +080089 raise Error(
Wei-Han Chen60c5d332017-01-05 17:15:10 +080090 'waive_list and skip_list should be empty for phase %s' %
91 phase.GetPhase())
Ting Shen18a06382016-08-30 16:18:21 +080092
Wei-Han Chen60c5d332017-01-05 17:15:10 +080093 if cmd_name not in skip_list:
94 try:
95 fun(options)
96 except Exception as e:
97 if cmd_name in waive_list:
98 logging.exception(e)
99 else:
100 raise
Ting Shen18a06382016-08-30 16:18:21 +0800101
102 return argparse_utils.Command(cmd_name, *args, **kwargs)(
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800103 CommandWithWaiveSkipCheck)
Ting Shen18a06382016-08-30 16:18:21 +0800104 return Decorate
105
106
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800107@Command('write_hwid',
108 CmdArg('hwid', metavar='HWID', help='HWID string'))
Andy Chengc92e6f92012-11-20 16:55:53 +0800109def WriteHWID(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800110 """Write specified HWID value into the system BB."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800111
Tammo Spalink95c43732012-07-25 15:57:14 -0700112 logging.info('writing hwid string %r', options.hwid)
Ricky Lianga70a1202013-03-15 15:03:17 +0800113 GetGooftool(options).WriteHWID(options.hwid)
Andy Cheng0465d132013-03-20 12:12:06 +0800114 event_log.Log('write_hwid', hwid=options.hwid)
Tammo Spalink95c43732012-07-25 15:57:14 -0700115 print 'Wrote HWID: %r' % options.hwid
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800116
117
Yong Hong5408f652017-07-11 19:20:25 +0800118_project_cmd_arg = CmdArg(
119 '--project', metavar='PROJECT',
120 default=None, help='Project name to test.')
Ricky Liang53390232013-03-08 15:37:57 +0800121
Tammo Spalink8fab5312012-05-28 18:33:30 +0800122_hwdb_path_cmd_arg = CmdArg(
123 '--hwdb_path', metavar='PATH',
Ricky Liangeede7922013-06-19 10:18:41 +0800124 default=common.DEFAULT_HWID_DATA_PATH,
Tammo Spalink8fab5312012-05-28 18:33:30 +0800125 help='Path to the HWID database.')
126
Tammo Spalink95c43732012-07-25 15:57:14 -0700127_hwid_status_list_cmd_arg = CmdArg(
Hung-Te Lin56b18402015-01-16 14:52:30 +0800128 '--status', nargs='*', default=['supported'],
129 help='allow only HWIDs with these status values')
Tammo Spalink95c43732012-07-25 15:57:14 -0700130
Jon Salzce124fb2012-10-02 17:42:03 +0800131_probe_results_cmd_arg = CmdArg(
132 '--probe_results', metavar='RESULTS.yaml',
Ricky Liangc662be32013-12-24 11:50:23 +0800133 help=('Output from "gooftool probe --include_vpd" (used instead of '
Jon Salzce124fb2012-10-02 17:42:03 +0800134 'probing this system).'))
135
Ricky Liang53390232013-03-08 15:37:57 +0800136_device_info_cmd_arg = CmdArg(
Ricky Liangf89f73a2013-03-19 05:00:24 +0800137 '--device_info', metavar='DEVICE_INFO.yaml', default=None,
Ricky Liang53390232013-03-08 15:37:57 +0800138 help='A dict of device info to use instead of fetching from shopfllor '
139 'server.')
140
Jon Salzce124fb2012-10-02 17:42:03 +0800141_hwid_cmd_arg = CmdArg(
142 '--hwid', metavar='HWID',
Ricky Lianga70a1202013-03-15 15:03:17 +0800143 help='HWID to verify (instead of the currently set HWID of this system).')
Jon Salzce124fb2012-10-02 17:42:03 +0800144
Bernie Thompson3c11c872013-07-22 18:22:45 -0700145_rma_mode_cmd_arg = CmdArg(
146 '--rma_mode', action='store_true',
147 help='Enable RMA mode, do not check for deprecated components.')
Tammo Spalink95c43732012-07-25 15:57:14 -0700148
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800149_cros_core_cmd_arg = CmdArg(
150 '--cros_core', action='store_true',
151 help='Finalize for ChromeOS Core devices (may add or remove few test '
Hung-Te Lin53c49402017-07-26 13:10:58 +0800152 'items. For example, registration codes or firmware bitmap '
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800153 'locale settings).')
154
bowgotsai13820f42015-09-10 23:18:04 +0800155_enforced_release_channels_cmd_arg = CmdArg(
156 '--enforced_release_channels', nargs='*', default=None,
157 help='Enforced release image channels.')
158
Yilun Lin34f54802017-11-16 11:58:25 +0800159_ec_pubkey_path_cmd_arg = CmdArg(
160 '--ec_pubkey_path',
161 default=None,
162 help='Path to public key in vb2 format. Verify EC key with pubkey file.')
163
164_ec_pubkey_hash_cmd_arg = CmdArg(
165 '--ec_pubkey_hash',
166 default=None,
167 help='A string for public key hash. Verify EC key with the given hash.')
168
Hung-Te Lincdb96522016-04-15 16:51:10 +0800169_release_rootfs_cmd_arg = CmdArg(
170 '--release_rootfs', help='Location of release image rootfs partition.')
171
172_firmware_path_cmd_arg = CmdArg(
173 '--firmware_path', help='Location of firmware image partition.')
Ricky Liang43b879b2014-02-24 11:36:55 +0800174
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800175_shopfloor_url_args_cmd_arg = CmdArg(
176 '--shopfloor_url',
Earl Ou51182222016-09-09 12:16:48 +0800177 help='Shopfloor server url to be informed when wiping is done. '
178 'After wiping, a XML-RPC request will be sent to the '
179 'given url to indicate the completion of wiping.')
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800180
181_station_ip_cmd_arg = CmdArg(
182 '--station_ip',
183 help='IP of remote station')
184
185_station_port_cmd_arg = CmdArg(
186 '--station_port',
187 help='Port on remote station')
188
189_wipe_finish_token_cmd_arg = CmdArg(
190 '--wipe_finish_token',
191 help='Required token when notifying station after wipe finished')
192
Ting Shen18a06382016-08-30 16:18:21 +0800193_waive_list_cmd_arg = CmdArg(
194 '--waive_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu461ec032017-03-06 15:56:58 +0800195 help='A list of waived checks, separated by whitespace.'
Ting Shen18a06382016-08-30 16:18:21 +0800196 'Each item should be a sub-command of gooftool.'
197 'e.g. "gooftool verify --waive_list verify_tpm clear_gbb_flags".')
198
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800199_skip_list_cmd_arg = CmdArg(
200 '--skip_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu461ec032017-03-06 15:56:58 +0800201 help='A list of skipped checks, separated by whitespace.'
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800202 'Each item should be a sub-command of gooftool.'
203 'e.g. "gooftool verify --skip_list verify_tpm clear_gbb_flags".')
204
Tammo Spalink8fab5312012-05-28 18:33:30 +0800205
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800206@Command('probe',
207 CmdArg('--comps', nargs='*',
208 help='List of keys from the component_db registry.'),
Ricky Liangb30da672013-06-14 12:36:34 +0800209 CmdArg('--fast_fw_probe', action='store_true',
210 help='Do a fast probe for EC and main firmware versions only. '
211 'This implies --no_vol and --no_ic.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800212 CmdArg('--no_vol', action='store_true',
213 help='Do not probe volatile data.'),
214 CmdArg('--no_ic', action='store_true',
Jon Salz0f8a6842012-09-25 11:28:22 +0800215 help='Do not probe initial_config data.'),
216 CmdArg('--include_vpd', action='store_true',
217 help='Include VPD data in volatiles.'))
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800218def RunProbe(options):
219 """Print yaml-formatted breakdown of probed device properties."""
Ricky Lianga70a1202013-03-15 15:03:17 +0800220 print GetGooftool(options).Probe(
221 target_comp_classes=options.comps,
Ricky Liangb30da672013-06-14 12:36:34 +0800222 fast_fw_probe=options.fast_fw_probe,
Ricky Lianga70a1202013-03-15 15:03:17 +0800223 probe_volatile=not options.no_vol,
224 probe_initial_config=not options.no_ic,
225 probe_vpd=options.include_vpd).Encode()
Ricky Liang53390232013-03-08 15:37:57 +0800226
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800227
Tammo Spalink214caf42012-05-28 10:45:00 +0800228@Command('verify_components',
229 _hwdb_path_cmd_arg,
Tammo Spalink5c699832012-07-03 17:50:39 +0800230 CmdArg('target_comps', nargs='*'))
Tammo Spalink214caf42012-05-28 10:45:00 +0800231def VerifyComponents(options):
Andy Cheng8ece7382012-08-22 16:25:42 +0800232 """Verify that probeable components all match entries in the component_db.
Tammo Spalink214caf42012-05-28 10:45:00 +0800233
Tammo Spalink5c699832012-07-03 17:50:39 +0800234 Probe for each component class in the target_comps and verify
Tammo Spalink214caf42012-05-28 10:45:00 +0800235 that a corresponding match exists in the component_db -- make sure
236 that these components are present, that they have been approved, but
237 do not check against any specific BOM/HWID configurations.
238 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800239
Andy Chengc531e2f2012-10-15 19:09:17 +0800240 try:
Ricky Lianga70a1202013-03-15 15:03:17 +0800241 result = GetGooftool(options).VerifyComponents(
Andy Chengc531e2f2012-10-15 19:09:17 +0800242 options.target_comps)
243 except ValueError, e:
244 sys.exit(e)
245
Ricky Liang53390232013-03-08 15:37:57 +0800246 PrintVerifyComponentsResults(result)
247
248
249def PrintVerifyComponentsResults(result):
250 """Prints out the results of VerifyComponents method call.
251
252 Groups the results into two groups: 'matches' and 'errors', and prints out
253 their values.
254 """
Andy Chengc531e2f2012-10-15 19:09:17 +0800255 # group by matches and errors
Tammo Spalink214caf42012-05-28 10:45:00 +0800256 matches = []
Andy Chengc531e2f2012-10-15 19:09:17 +0800257 errors = []
258 for result_list in result.values():
259 for component_name, _, error in result_list:
260 if component_name:
261 matches.append(component_name)
Tammo Spalink214caf42012-05-28 10:45:00 +0800262 else:
Andy Chengc531e2f2012-10-15 19:09:17 +0800263 errors.append(error)
264
Andy Cheng228a8c92012-08-27 10:53:57 +0800265 if matches:
266 print 'found probeable components:\n %s' % '\n '.join(matches)
Tammo Spalink214caf42012-05-28 10:45:00 +0800267 if errors:
Andy Cheng228a8c92012-08-27 10:53:57 +0800268 print '\nerrors:\n %s' % '\n '.join(errors)
269 sys.exit('\ncomponent verification FAILURE')
Tammo Spalink214caf42012-05-28 10:45:00 +0800270 else:
Hung-Te Lin56b18402015-01-16 14:52:30 +0800271 print '\ncomponent verification SUCCESS'
Tammo Spalink214caf42012-05-28 10:45:00 +0800272
273
Yilun Lin34f54802017-11-16 11:58:25 +0800274@Command(
275 'verify_ec_key',
276 _ec_pubkey_path_cmd_arg,
277 _ec_pubkey_hash_cmd_arg)
278def VerifyECKey(options):
279 """Verify EC key."""
280 return GetGooftool(options).VerifyECKey(
281 options.ec_pubkey_path, options.ec_pubkey_hash)
282
283
Hung-Te Line1d80f62016-03-31 14:58:13 +0800284@Command('verify_keys',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800285 _release_rootfs_cmd_arg,
286 _firmware_path_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800287def VerifyKeys(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800288 """Verify keys in firmware and SSD match."""
Hung-Te Line1d80f62016-03-31 14:58:13 +0800289 return GetGooftool(options).VerifyKeys(
Hung-Te Lincdb96522016-04-15 16:51:10 +0800290 options.release_rootfs, options.firmware_path)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800291
292
293@Command('set_fw_bitmap_locale')
Peter Shihfdf17682017-05-26 11:38:39 +0800294def SetFirmwareBitmapLocale(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800295 """Use VPD locale value to set firmware bitmap default language."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800296
Ricky Lianga70a1202013-03-15 15:03:17 +0800297 (index, locale) = GetGooftool(options).SetFirmwareBitmapLocale()
Andy Cheng2582d292012-12-04 17:38:28 +0800298 logging.info('Firmware bitmap initial locale set to %d (%s).',
299 index, locale)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800300
301
Hung-Te Line1d80f62016-03-31 14:58:13 +0800302@Command('verify_system_time',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800303 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800304def VerifySystemTime(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800305 """Verify system time is later than release filesystem creation time."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800306
Hung-Te Lincdb96522016-04-15 16:51:10 +0800307 return GetGooftool(options).VerifySystemTime(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800308
309
Hung-Te Line1d80f62016-03-31 14:58:13 +0800310@Command('verify_rootfs',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800311 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800312def VerifyRootFs(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800313 """Verify rootfs on SSD is valid by checking hash."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800314
Hung-Te Line1d80f62016-03-31 14:58:13 +0800315 return GetGooftool(options).VerifyRootFs(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800316
Hung-Te Lin56b18402015-01-16 14:52:30 +0800317
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800318@Command('verify_tpm')
Peter Shihfdf17682017-05-26 11:38:39 +0800319def VerifyTPM(options):
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800320 """Verify TPM is cleared."""
321
322 return GetGooftool(options).VerifyTPM()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800323
Hung-Te Lin56b18402015-01-16 14:52:30 +0800324
Hung-Te Lindd708d42014-07-11 17:05:01 +0800325@Command('verify_me_locked')
Peter Shihfdf17682017-05-26 11:38:39 +0800326def VerifyManagementEngineLocked(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800327 """Verify Management Engine is locked."""
Hung-Te Lindd708d42014-07-11 17:05:01 +0800328
329 return GetGooftool(options).VerifyManagementEngineLocked()
330
Hung-Te Lin56b18402015-01-16 14:52:30 +0800331
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800332@Command('verify_switch_wp')
Peter Shihfdf17682017-05-26 11:38:39 +0800333def VerifyWPSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800334 """Verify hardware write protection switch is enabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800335
Ricky Lianga70a1202013-03-15 15:03:17 +0800336 GetGooftool(options).VerifyWPSwitch()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800337
338
339@Command('verify_switch_dev')
Peter Shihfdf17682017-05-26 11:38:39 +0800340def VerifyDevSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800341 """Verify developer switch is disabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800342
Ricky Lianga70a1202013-03-15 15:03:17 +0800343 if GetGooftool(options).CheckDevSwitchForDisabling():
Hung-Te Lind7d34722012-07-26 16:48:35 +0800344 logging.warn('VerifyDevSwitch: No physical switch.')
Andy Cheng0465d132013-03-20 12:12:06 +0800345 event_log.Log('switch_dev', type='virtual switch')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800346
347
Hung-Te Lin53c49402017-07-26 13:10:58 +0800348@Command('verify_vpd')
349def VerifyVPD(options):
350 """Verify that VPD values are properly set.
Jon Salzadd90d32014-04-29 16:16:27 +0800351
Hung-Te Lin53c49402017-07-26 13:10:58 +0800352 Check if mandatory fields are set, and deprecated fields don't exist.
Jon Salzadd90d32014-04-29 16:16:27 +0800353 """
Hung-Te Lin53c49402017-07-26 13:10:58 +0800354 return GetGooftool(options).VerifyVPD()
Jon Salzadd90d32014-04-29 16:16:27 +0800355
356
bowgotsai13820f42015-09-10 23:18:04 +0800357@Command('verify_release_channel',
358 _enforced_release_channels_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800359def VerifyReleaseChannel(options):
bowgotsai529139c2015-05-30 01:39:49 +0800360 """Verify that release image channel is correct.
361
362 ChromeOS has four channels: canary, dev, beta and stable.
363 The last three channels support image auto-updates, checks
364 that release image channel is one of them.
365 """
bowgotsai13820f42015-09-10 23:18:04 +0800366 return GetGooftool(options).VerifyReleaseChannel(
367 options.enforced_release_channels)
bowgotsai529139c2015-05-30 01:39:49 +0800368
369
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800370@Command('write_protect')
Peter Shihfdf17682017-05-26 11:38:39 +0800371def EnableFwWp(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800372 """Enable then verify firmware write protection."""
Peter Shihfdf17682017-05-26 11:38:39 +0800373 del options # Unused.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800374
Yong Hongdad230a2017-08-30 22:25:19 +0800375 def WriteProtect(fw):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800376 """Calculate protection size, then invoke flashrom.
377
Yong Hongdad230a2017-08-30 22:25:19 +0800378 The region (offset and size) to write protect may be different per chipset
379 and firmware layout, so we have to read the WP_RO section from FMAP to
380 decide that.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800381 """
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800382 wp_section = 'WP_RO'
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800383
Yong Hongdad230a2017-08-30 22:25:19 +0800384 fmap_image = fw.GetFirmwareImage(
385 sections=(['FMAP'] if fw.target == crosfw.TARGET_MAIN else None))
386 if not fmap_image.has_section(wp_section):
387 raise Error('Could not find %s firmware section: %s' %
388 (fw.target.upper(), wp_section))
389
390 section_data = fw.GetFirmwareImage(
391 sections=[wp_section]).get_section_area(wp_section)
392 ro_offset, ro_size = section_data[0 : 2]
393
394 logging.debug('write protecting %s [off=%x size=%x]', fw.target.upper(),
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800395 ro_offset, ro_size)
Yong Hongdad230a2017-08-30 22:25:19 +0800396 crosfw.Flashrom(fw.target).EnableWriteProtection(ro_offset, ro_size)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800397
Yong Hongdad230a2017-08-30 22:25:19 +0800398 WriteProtect(crosfw.LoadMainFirmware())
Andy Cheng0465d132013-03-20 12:12:06 +0800399 event_log.Log('wp', fw='main')
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800400
401 # Some EC (mostly PD) does not support "RO NOW". Instead they will only set
402 # "RO_AT_BOOT" when you request to enable RO (These platforms consider
403 # --wp-range with right range identical to --wp-enable), and requires a
404 # 'ectool reboot_ec RO at-shutdown; reboot' to let the RO take effect.
Hung-Te Lin0d10b562016-12-28 10:58:07 +0800405 # After reboot, "flashrom -p host --wp-status" will return protected range.
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800406 # If you don't reboot, returned range will be (0, 0), and running command
407 # "ectool flashprotect" will not have RO_NOW.
408
Yong Hongdad230a2017-08-30 22:25:19 +0800409 for fw in [crosfw.LoadEcFirmware(), crosfw.LoadPDFirmware()]:
410 if fw.GetChipId() is None:
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800411 logging.warning('%s not write protected (seems there is no %s flash).',
Yong Hongdad230a2017-08-30 22:25:19 +0800412 fw.target.upper(), fw.target.upper())
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800413 continue
Yong Hongdad230a2017-08-30 22:25:19 +0800414 WriteProtect(fw)
415 event_log.Log('wp', fw=fw.target)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800416
417
418@Command('clear_gbb_flags')
Peter Shihfdf17682017-05-26 11:38:39 +0800419def ClearGBBFlags(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800420 """Zero out the GBB flags, in preparation for transition to release state.
421
422 No GBB flags are set in release/shipping state, but they are useful
Hung-Te Lin879cff42017-06-19 12:46:37 +0800423 for factory/development. See "futility gbb --flags" for details.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800424 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800425
Ricky Lianga70a1202013-03-15 15:03:17 +0800426 GetGooftool(options).ClearGBBFlags()
Andy Cheng0465d132013-03-20 12:12:06 +0800427 event_log.Log('clear_gbb_flags')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800428
429
Jon Salzaa3a30e2013-05-15 15:56:28 +0800430@Command('clear_factory_vpd_entries')
Peter Shihfdf17682017-05-26 11:38:39 +0800431def ClearFactoryVPDEntries(options):
Jon Salzaa3a30e2013-05-15 15:56:28 +0800432 """Clears factory.* items in the RW VPD."""
433 entries = GetGooftool(options).ClearFactoryVPDEntries()
434 event_log.Log('clear_factory_vpd_entries', entries=FilterDict(entries))
435
436
Mattias Nisslercca761b2015-04-15 21:53:04 +0200437@Command('generate_stable_device_secret')
Peter Shihfdf17682017-05-26 11:38:39 +0800438def GenerateStableDeviceSecret(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800439 """Generates a fresh stable device secret and stores it in the RO VPD."""
Mattias Nisslercca761b2015-04-15 21:53:04 +0200440 GetGooftool(options).GenerateStableDeviceSecret()
441 event_log.Log('generate_stable_device_secret')
442
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800443
Shen-En Shihd078a7c2017-08-04 13:33:49 +0800444@Command('cr50_set_board_id')
445def Cr50SetBoardId(options):
446 """Set the board id and flag in the Cr50 chip."""
447 GetGooftool(options).Cr50SetBoardId()
448 event_log.Log('cr50_set_board_id')
449
450
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800451@Command('cr50_reset_state')
452def Cr50ResetState(options):
453 """Reset Cr50 state back to default state after RMA."""
454 return GetGooftool(options).Cr50ResetState()
455
456
Earl Ou564a7872016-10-05 10:22:00 +0800457@Command('enable_release_partition',
458 CmdArg('--release_rootfs',
459 help=('path to the release rootfs device. If not specified, '
460 'the default (5th) partition will be used.')))
461def EnableReleasePartition(options):
462 """Enables a release image partition on the disk."""
463 GetGooftool(options).EnableReleasePartition(options.release_rootfs)
464
465
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800466@Command('wipe_in_place',
467 CmdArg('--fast', action='store_true',
Shun-Hsing Ou8d3c40a2015-10-08 18:16:08 +0800468 help='use non-secure but faster wipe method.'),
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800469 _shopfloor_url_args_cmd_arg,
470 _station_ip_cmd_arg,
471 _station_port_cmd_arg,
472 _wipe_finish_token_cmd_arg)
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800473def WipeInPlace(options):
474 """Start factory wipe directly without reboot."""
475
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800476 GetGooftool(options).WipeInPlace(options.fast,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800477 options.shopfloor_url,
478 options.station_ip,
479 options.station_port,
480 options.wipe_finish_token)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200481
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800482@Command('wipe_init',
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800483 CmdArg('--wipe_args', help='arguments for clobber-state'),
484 CmdArg('--state_dev', help='path to stateful partition device'),
485 CmdArg('--root_disk', help='path to primary device'),
486 CmdArg('--old_root', help='path to old root'),
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800487 _shopfloor_url_args_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800488 _release_rootfs_cmd_arg,
489 _station_ip_cmd_arg,
490 _station_port_cmd_arg,
491 _wipe_finish_token_cmd_arg)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800492def WipeInit(options):
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800493 GetGooftool(options).WipeInit(options.wipe_args,
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800494 options.shopfloor_url,
495 options.state_dev,
496 options.release_rootfs,
497 options.root_disk,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800498 options.old_root,
499 options.station_ip,
500 options.station_port,
501 options.wipe_finish_token)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800502
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800503@Command('verify',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800504 CmdArg('--no_write_protect', action='store_true',
505 help='Do not check write protection switch state.'),
Tammo Spalink95c43732012-07-25 15:57:14 -0700506 _hwid_status_list_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800507 _hwdb_path_cmd_arg,
Yong Hong5408f652017-07-11 19:20:25 +0800508 _project_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800509 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800510 _hwid_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800511 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800512 _cros_core_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800513 _ec_pubkey_path_cmd_arg,
514 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800515 _release_rootfs_cmd_arg,
516 _firmware_path_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800517 _enforced_release_channels_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800518 _waive_list_cmd_arg,
519 _skip_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800520def Verify(options):
521 """Verifies if whole factory process is ready for finalization.
522
523 This routine performs all the necessary checks to make sure the
524 device is ready to be finalized, but does not modify state. These
525 checks include dev switch, firmware write protection switch, hwid,
526 system time, keys, and root file system.
527 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800528
Hung-Te Lin6d827542012-07-19 11:50:41 +0800529 if not options.no_write_protect:
Ricky Lianga70a1202013-03-15 15:03:17 +0800530 VerifyWPSwitch(options)
Hung-Te Lindd708d42014-07-11 17:05:01 +0800531 VerifyManagementEngineLocked(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800532 VerifyDevSwitch(options)
Ting Shen129fa6f2016-09-02 12:22:24 +0800533 VerifyHWID(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800534 VerifySystemTime(options)
Yilun Lin34f54802017-11-16 11:58:25 +0800535 VerifyECKey(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800536 VerifyKeys(options)
537 VerifyRootFs(options)
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800538 VerifyTPM(options)
Hung-Te Lin53c49402017-07-26 13:10:58 +0800539 VerifyVPD(options)
bowgotsai529139c2015-05-30 01:39:49 +0800540 VerifyReleaseChannel(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800541
Hung-Te Lin56b18402015-01-16 14:52:30 +0800542
Jon Salzfe9036f2014-01-16 14:11:23 +0800543@Command('untar_stateful_files')
Hung-Te Lin388bce22014-06-03 19:56:40 +0800544def UntarStatefulFiles(unused_options):
Jon Salzfe9036f2014-01-16 14:11:23 +0800545 """Untars stateful files from stateful_files.tar.xz on stateful partition.
546
547 If that file does not exist (which should only be R30 and earlier),
548 this is a no-op.
549 """
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800550 # Path to stateful partition on device.
551 device_stateful_path = '/mnt/stateful_partition'
552 tar_file = os.path.join(device_stateful_path, 'stateful_files.tar.xz')
Jon Salzfe9036f2014-01-16 14:11:23 +0800553 if os.path.exists(tar_file):
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800554 Spawn(['tar', 'xf', tar_file], cwd=device_stateful_path,
Jon Salzfe9036f2014-01-16 14:11:23 +0800555 log=True, check_call=True)
556 else:
557 logging.warning('No stateful files at %s', tar_file)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800558
Jon Salz40b9f822014-07-25 16:39:55 +0800559
560@Command('log_source_hashes')
Peter Shihfdf17682017-05-26 11:38:39 +0800561def LogSourceHashes(options):
Jon Salz40b9f822014-07-25 16:39:55 +0800562 """Logs hashes of source files in the factory toolkit."""
Peter Shihfdf17682017-05-26 11:38:39 +0800563 del options # Unused.
Jon Salze60307f2014-08-05 16:20:00 +0800564 # WARNING: The following line is necessary to validate the integrity
565 # of the factory software. Do not remove or modify it.
566 #
567 # 警告:此行会验证工厂软件的完整性,禁止删除或修改。
Wei-Han Chena5c01a02016-04-23 19:27:19 +0800568 factory_par = sys_utils.GetRunningFactoryPythonArchivePath()
569 if factory_par:
570 event_log.Log(
571 'source_hashes',
572 **file_utils.HashPythonArchive(factory_par))
573 else:
574 event_log.Log(
575 'source_hashes',
Peter Shihad166772017-05-31 11:36:17 +0800576 **file_utils.HashSourceTree(os.path.join(paths.FACTORY_DIR, 'py')))
Jon Salz40b9f822014-07-25 16:39:55 +0800577
578
Tammo Spalink86a61c62012-05-25 15:10:35 +0800579@Command('log_system_details')
Peter Shihfdf17682017-05-26 11:38:39 +0800580def LogSystemDetails(options):
Tammo Spalink86a61c62012-05-25 15:10:35 +0800581 """Write miscellaneous system details to the event log."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800582
Ricky Liang43b879b2014-02-24 11:36:55 +0800583 event_log.Log('system_details', **GetGooftool(options).GetSystemDetails())
Tammo Spalink86a61c62012-05-25 15:10:35 +0800584
585
Jon Salza88b83b2013-05-27 20:00:35 +0800586def CreateReportArchiveBlob(*args, **kwargs):
587 """Creates a report archive and returns it as a blob.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800588
Jon Salza88b83b2013-05-27 20:00:35 +0800589 Args:
590 See CreateReportArchive.
Andy Cheng7a76cb82012-11-19 18:08:19 +0800591
Jon Salza88b83b2013-05-27 20:00:35 +0800592 Returns:
593 An xmlrpclib.Binary object containing a .tar.xz file.
594 """
Wei-Han Chen47416612016-09-14 17:41:52 +0800595 report_archive = CreateReportArchive(*args, **kwargs)
596 try:
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800597 return xmlrpclib.Binary(file_utils.ReadFile(report_archive))
Wei-Han Chen47416612016-09-14 17:41:52 +0800598 finally:
599 os.unlink(report_archive)
Jon Salza88b83b2013-05-27 20:00:35 +0800600
601
602def CreateReportArchive(device_sn=None, add_file=None):
603 """Creates a report archive in a temporary directory.
604
605 Args:
606 device_sn: The device serial number (optional).
607 add_file: A list of files to add (optional).
608
609 Returns:
610 Path to the archive.
611 """
Hung-Te Lin6bd16472012-06-20 16:26:47 +0800612 def NormalizeAsFileName(token):
613 return re.sub(r'\W+', '', token).strip()
Jon Salza88b83b2013-05-27 20:00:35 +0800614
615 target_name = '%s%s.tar.xz' % (
616 time.strftime('%Y%m%dT%H%M%SZ',
617 time.gmtime()),
Hung-Te Lin56b18402015-01-16 14:52:30 +0800618 ('' if device_sn is None else
619 '_' + NormalizeAsFileName(device_sn)))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800620 target_path = os.path.join(gettempdir(), target_name)
Jon Salza88b83b2013-05-27 20:00:35 +0800621
Tammo Spalink86a61c62012-05-25 15:10:35 +0800622 # Intentionally ignoring dotfiles in EVENT_LOG_DIR.
Andy Cheng0465d132013-03-20 12:12:06 +0800623 tar_cmd = 'cd %s ; tar cJf %s *' % (event_log.EVENT_LOG_DIR, target_path)
Peter Shihb4e49352017-05-25 17:35:11 +0800624 tar_cmd += ' %s' % paths.FACTORY_LOG_PATH
Jon Salza88b83b2013-05-27 20:00:35 +0800625 if add_file:
626 for f in add_file:
Jon Salz65266432012-07-30 19:02:49 +0800627 # Require absolute paths since the tar command may change the
628 # directory.
629 if not f.startswith('/'):
630 raise Error('Not an absolute path: %s' % f)
631 if not os.path.exists(f):
632 raise Error('File does not exist: %s' % f)
Wei-Han Chen4b755022017-01-04 10:51:52 +0800633 tar_cmd += ' %s' % pipes.quote(f)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800634 cmd_result = Shell(tar_cmd)
Jon Salzff88c022012-11-03 12:19:58 +0800635
636 if ((cmd_result.status == 1) and
637 all((x == '' or
638 'file changed as we read it' in x or
639 "Removing leading `/' from member names" in x)
640 for x in cmd_result.stderr.split('\n'))):
641 # That's OK. Make sure it's valid though.
Vic Yang85199e72013-01-28 14:33:11 +0800642 Spawn(['tar', 'tfJ', target_path], check_call=True, log=True,
Jon Salzff88c022012-11-03 12:19:58 +0800643 ignore_stdout=True)
644 elif not cmd_result.success:
Tammo Spalink86a61c62012-05-25 15:10:35 +0800645 raise Error('unable to tar event logs, cmd %r failed, stderr: %r' %
646 (tar_cmd, cmd_result.stderr))
Jon Salzff88c022012-11-03 12:19:58 +0800647
Jon Salza88b83b2013-05-27 20:00:35 +0800648 return target_path
649
650_upload_method_cmd_arg = CmdArg(
651 '--upload_method', metavar='METHOD:PARAM',
652 help=('How to perform the upload. METHOD should be one of '
653 '{ftp, shopfloor, ftps, cpfe}.'))
654_add_file_cmd_arg = CmdArg(
655 '--add_file', metavar='FILE', action='append',
656 help='Extra file to include in report (must be an absolute path)')
657
Hung-Te Lin56b18402015-01-16 14:52:30 +0800658
Jon Salza88b83b2013-05-27 20:00:35 +0800659@Command('upload_report',
660 _upload_method_cmd_arg,
661 _add_file_cmd_arg)
662def UploadReport(options):
663 """Create a report containing key device details."""
Hung-Te Lin74346d72016-01-07 22:16:57 +0800664 ro_vpd = ReadRoVpd()
Jon Salza88b83b2013-05-27 20:00:35 +0800665 device_sn = ro_vpd.get('serial_number', None)
666 if device_sn is None:
667 logging.warning('RO_VPD missing device serial number')
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +0800668 device_sn = 'MISSING_SN_' + time_utils.TimedUUID()
Jon Salza88b83b2013-05-27 20:00:35 +0800669 target_path = CreateReportArchive(device_sn)
670
Tammo Spalink86a61c62012-05-25 15:10:35 +0800671 if options.upload_method is None or options.upload_method == 'none':
672 logging.warning('REPORT UPLOAD SKIPPED (report left at %s)', target_path)
673 return
674 method, param = options.upload_method.split(':', 1)
675 if method == 'shopfloor':
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800676 report_upload.ShopFloorUpload(
677 target_path, param,
678 'GRT' if options.command_name == 'finalize' else None)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800679 elif method == 'ftp':
Jay Kim360c1dd2012-06-25 10:58:11 -0700680 report_upload.FtpUpload(target_path, 'ftp:' + param)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800681 elif method == 'ftps':
682 report_upload.CurlUrlUpload(target_path, '--ftp-ssl-reqd ftp:%s' % param)
683 elif method == 'cpfe':
Shawn Nematbakhsh3404a092013-01-28 16:49:09 -0800684 report_upload.CpfeUpload(target_path, pipes.quote(param))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800685 else:
686 raise Error('unknown report upload method %r', method)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800687
688
689@Command('finalize',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800690 CmdArg('--no_write_protect', action='store_true',
691 help='Do not enable firmware write protection.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800692 CmdArg('--fast', action='store_true',
693 help='use non-secure but faster wipe method.'),
Shun-Hsing Oudb407d62015-11-11 11:03:59 +0800694 _shopfloor_url_args_cmd_arg,
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800695 _hwdb_path_cmd_arg,
Tammo Spalink95c43732012-07-25 15:57:14 -0700696 _hwid_status_list_cmd_arg,
Jon Salz65266432012-07-30 19:02:49 +0800697 _upload_method_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800698 _add_file_cmd_arg,
699 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800700 _hwid_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800701 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800702 _cros_core_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800703 _ec_pubkey_path_cmd_arg,
704 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800705 _release_rootfs_cmd_arg,
706 _firmware_path_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800707 _enforced_release_channels_cmd_arg,
708 _station_ip_cmd_arg,
709 _station_port_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800710 _wipe_finish_token_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800711 _waive_list_cmd_arg,
712 _skip_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800713def Finalize(options):
714 """Verify system readiness and trigger transition into release state.
715
Jon Salzaa3a30e2013-05-15 15:56:28 +0800716 This routine does the following:
717 - Verifies system state (see verify command)
Jon Salzfe9036f2014-01-16 14:11:23 +0800718 - Untars stateful_files.tar.xz, if it exists, in the stateful partition, to
719 initialize files such as the CRX cache
Jon Salzaa3a30e2013-05-15 15:56:28 +0800720 - Modifies firmware bitmaps to match locale
721 - Clears all factory-friendly flags from the GBB
722 - Removes factory-specific entries from RW_VPD (factory.*)
723 - Enables firmware write protection (cannot rollback after this)
724 - Uploads system logs & reports
Earl Ou51182222016-09-09 12:16:48 +0800725 - Wipes the testing kernel, rootfs, and stateful partition
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800726 """
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800727 Verify(options)
Shen-En Shih3e079b22017-09-11 05:43:09 -0700728 Cr50SetBoardId(options)
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800729 Cr50ResetState(options)
Jon Salz40b9f822014-07-25 16:39:55 +0800730 LogSourceHashes(options)
Jon Salzfe9036f2014-01-16 14:11:23 +0800731 UntarStatefulFiles(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800732 if options.cros_core:
733 logging.info('SetFirmwareBitmapLocale is skipped for ChromeOS Core device.')
734 else:
735 SetFirmwareBitmapLocale(options)
Jon Salzaa3a30e2013-05-15 15:56:28 +0800736 ClearFactoryVPDEntries(options)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200737 GenerateStableDeviceSecret(options)
Shen-En Shih3e079b22017-09-11 05:43:09 -0700738 ClearGBBFlags(options)
Hung-Te Lin6d827542012-07-19 11:50:41 +0800739 if options.no_write_protect:
740 logging.warn('WARNING: Firmware Write Protection is SKIPPED.')
Andy Cheng0465d132013-03-20 12:12:06 +0800741 event_log.Log('wp', fw='both', status='skipped')
Hung-Te Lin6d827542012-07-19 11:50:41 +0800742 else:
Wei-Han Chenba21f512016-10-14 18:52:33 +0800743 EnableFwWp(options)
Jon Salza0f58e02012-05-29 19:33:39 +0800744 LogSystemDetails(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800745 UploadReport(options)
Earl Ou51182222016-09-09 12:16:48 +0800746
747 event_log.Log('wipe_in_place')
748 wipe_args = []
Earl Ou51182222016-09-09 12:16:48 +0800749 if options.shopfloor_url:
750 wipe_args += ['--shopfloor_url', options.shopfloor_url]
751 if options.fast:
752 wipe_args += ['--fast']
753 if options.station_ip:
754 wipe_args += ['--station_ip', options.station_ip]
755 if options.station_port:
756 wipe_args += ['--station_port', options.station_port]
757 if options.wipe_finish_token:
758 wipe_args += ['--wipe_finish_token', options.wipe_finish_token]
759 ExecFactoryPar('gooftool', 'wipe_in_place', *wipe_args)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800760
761
Ting Shen129fa6f2016-09-02 12:22:24 +0800762@Command('verify_hwid',
763 _probe_results_cmd_arg,
764 _hwdb_path_cmd_arg,
765 _hwid_cmd_arg,
766 _rma_mode_cmd_arg)
767def VerifyHWID(options):
Ricky Liangc662be32013-12-24 11:50:23 +0800768 """A simple wrapper that calls out to HWID utils to verify version 3 HWID.
Ricky Liang53390232013-03-08 15:37:57 +0800769
Ricky Liangc662be32013-12-24 11:50:23 +0800770 This is mainly for Gooftool to verify v3 HWID during finalize. For testing
771 and development purposes, please use `hwid` command.
Ricky Liang53390232013-03-08 15:37:57 +0800772 """
Ricky Liangc662be32013-12-24 11:50:23 +0800773 db = GetGooftool(options).db
774 encoded_string = options.hwid or hwid_utils.GetHWIDString()
Ricky Liang7905f272013-03-16 01:57:10 +0800775 if options.probe_results:
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800776 probed_results = yaml.load(file_utils.ReadFile(options.probe_results))
Ricky Liang7905f272013-03-16 01:57:10 +0800777 else:
Ricky Liangc662be32013-12-24 11:50:23 +0800778 probed_results = yaml.load(Probe(probe_vpd=True).Encode())
779 vpd = hwid_utils.GetVPD(probed_results)
Ricky Liang53390232013-03-08 15:37:57 +0800780
Hung-Te Lin11052952015-03-18 13:48:59 +0800781 event_log.Log('probed_results', probed_results=FilterDict(probed_results))
782 event_log.Log('vpd', vpd=FilterDict(vpd))
Ricky Liang53390232013-03-08 15:37:57 +0800783
Ricky Liangc662be32013-12-24 11:50:23 +0800784 hwid_utils.VerifyHWID(db, encoded_string, probed_results, vpd,
Hung-Te Lin56b18402015-01-16 14:52:30 +0800785 rma_mode=options.rma_mode)
Ricky Liang53390232013-03-08 15:37:57 +0800786
Ricky Liangc662be32013-12-24 11:50:23 +0800787 event_log.Log('verified_hwid', hwid=encoded_string)
Ricky Liang53390232013-03-08 15:37:57 +0800788
789
henryhsu44d793a2013-07-20 00:07:38 +0800790@Command('get_firmware_hash',
791 CmdArg('--file', metavar='FILE', help='Firmware File.'))
792def GetFirmwareHash(options):
henryhsuf6f835c2013-07-20 20:49:25 +0800793 """Get firmware hash from a file"""
henryhsu44d793a2013-07-20 00:07:38 +0800794 if os.path.exists(options.file):
795 hashes = CalculateFirmwareHashes(options.file)
796 for section, value_dict in hashes.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800797 print '%s:' % section
henryhsu44d793a2013-07-20 00:07:38 +0800798 for key, value in value_dict.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800799 print ' %s: %s' % (key, value)
henryhsu44d793a2013-07-20 00:07:38 +0800800 else:
801 raise Error('File does not exist: %s' % options.file)
802
henryhsuf6f835c2013-07-20 20:49:25 +0800803
Peter Shihfdf17682017-05-26 11:38:39 +0800804def main():
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800805 """Run sub-command specified by the command line args."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800806
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800807 options = ParseCmdline(
Ting Shen129fa6f2016-09-02 12:22:24 +0800808 'Perform Google required factory tests.',
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800809 CmdArg('-l', '--log', metavar='PATH',
810 help='Write logs to this file.'),
Jon Salza4bea382012-10-29 13:00:34 +0800811 CmdArg('--suppress-event-logs', action='store_true',
812 help='Suppress event logging.'),
Wei-Han Chenaff56232016-04-16 09:17:59 +0800813 CmdArg('--phase', default=None,
814 help=('override phase for phase checking (defaults to the current '
815 'as returned by the "factory phase" command)')),
Tammo Spalink8fab5312012-05-28 18:33:30 +0800816 verbosity_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800817 SetupLogging(options.verbosity, options.log)
Andy Cheng0465d132013-03-20 12:12:06 +0800818 event_log.SetGlobalLoggerDefaultPrefix('gooftool')
819 event_log.GetGlobalLogger().suppress = options.suppress_event_logs
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800820 logging.debug('gooftool options: %s', repr(options))
Wei-Han Chenaff56232016-04-16 09:17:59 +0800821
822 phase.OverridePhase(options.phase)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800823 try:
824 logging.debug('GOOFTOOL command %r', options.command_name)
825 options.command(options)
826 logging.info('GOOFTOOL command %r SUCCESS', options.command_name)
827 except Error, e:
828 logging.exception(e)
829 sys.exit('GOOFTOOL command %r ERROR: %s' % (options.command_name, e))
830 except Exception, e:
831 logging.exception(e)
832 sys.exit('UNCAUGHT RUNTIME EXCEPTION %s' % e)
833
834
835if __name__ == '__main__':
Peter Shihfdf17682017-05-26 11:38:39 +0800836 main()