blob: ec8bfa5aec2a16b09aa29c318c4f088ecb075da5 [file] [log] [blame]
You-Cheng Syuf0f4be12017-12-05 16:33:53 +08001#!/usr/bin/env python
Jon Salze60307f2014-08-05 16:20:00 +08002# -*- coding: utf-8 -*-
3# Copyright 2014 The Chromium OS Authors. All rights reserved.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08004# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
Jon Salze60307f2014-08-05 16:20:00 +08007
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08008"""Google Factory Tool.
9
You-Cheng Syu461ec032017-03-06 15:56:58 +080010This tool is intended to be used on factory assembly lines. It
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080011provides all of the Google required test functionality and must be run
12on each device as part of the assembly process.
13"""
14
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080015import logging
16import os
Jon Salz65266432012-07-30 19:02:49 +080017import pipes
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080018import re
19import sys
Peter Shihfdf17682017-05-26 11:38:39 +080020from tempfile import gettempdir
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080021import threading
Hung-Te Lin6bd16472012-06-20 16:26:47 +080022import time
Jon Salza88b83b2013-05-27 20:00:35 +080023import xmlrpclib
Peter Shihfdf17682017-05-26 11:38:39 +080024
Ricky Liang7905f272013-03-16 01:57:10 +080025import yaml
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080026
Peter Shihfdf17682017-05-26 11:38:39 +080027import factory_common # pylint: disable=unused-import
Wei-Han Chen0a3320e2016-04-23 01:32:07 +080028from cros.factory.gooftool.common import ExecFactoryPar
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080029from cros.factory.gooftool.common import Shell
Peter Shihfdf17682017-05-26 11:38:39 +080030from cros.factory.gooftool.core import Gooftool
31from cros.factory.gooftool import crosfw
Peter Shihfdf17682017-05-26 11:38:39 +080032from cros.factory.gooftool import report_upload
Hung-Te Lin604e0c22015-11-24 15:17:07 +080033from cros.factory.hwid.v3 import common
34from cros.factory.hwid.v3 import hwid_utils
Yong Hong863d3262017-10-30 16:23:34 +080035from cros.factory.probe.functions import chromeos_firmware
Wei-Han Chen2ebb92d2016-01-12 14:51:41 +080036from cros.factory.test.env import paths
Peter Shihfdf17682017-05-26 11:38:39 +080037from cros.factory.test import event_log
Wei-Han Chenaff56232016-04-16 09:17:59 +080038from cros.factory.test.rules import phase
Hung-Te Lin3f096842016-01-13 17:37:06 +080039from cros.factory.test.rules.privacy import FilterDict
Peter Shihfdf17682017-05-26 11:38:39 +080040from cros.factory.utils import argparse_utils
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080041from cros.factory.utils.argparse_utils import CmdArg
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080042from cros.factory.utils.argparse_utils import ParseCmdline
43from cros.factory.utils.argparse_utils import verbosity_cmd_arg
Peter Shihfdf17682017-05-26 11:38:39 +080044from cros.factory.utils.debug_utils import SetupLogging
Jon Salz40b9f822014-07-25 16:39:55 +080045from cros.factory.utils import file_utils
Wei-Han Chena5c01a02016-04-23 19:27:19 +080046from cros.factory.utils import sys_utils
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +080047from cros.factory.utils import time_utils
Jon Salzff88c022012-11-03 12:19:58 +080048from cros.factory.utils.process_utils import Spawn
Joel Kitchingd3bc2662014-12-16 16:03:32 -080049from cros.factory.utils.type_utils import Error
Tammo Spalink86a61c62012-05-25 15:10:35 +080050
Tammo Spalink5c699832012-07-03 17:50:39 +080051
Tammo Spalink5c699832012-07-03 17:50:39 +080052# TODO(tammo): Replace calls to sys.exit with raise Exit, and maybe
53# treat that specially (as a smoot exit, as opposed to the more
54# verbose output for generic Error).
55
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080056_global_gooftool = None
57_gooftool_lock = threading.Lock()
Tammo Spalink5c699832012-07-03 17:50:39 +080058
Hung-Te Lin56b18402015-01-16 14:52:30 +080059
Ricky Lianga70a1202013-03-15 15:03:17 +080060def GetGooftool(options):
Peter Shihfdf17682017-05-26 11:38:39 +080061 global _global_gooftool # pylint: disable=global-statement
Ricky Lianga70a1202013-03-15 15:03:17 +080062
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080063 if _global_gooftool is None:
64 with _gooftool_lock:
Shen-En Shihc5d15d62017-08-04 13:02:59 +080065 if _global_gooftool is None:
66 project = getattr(options, 'project', None)
67 hwdb_path = getattr(options, 'hwdb_path', None)
68 _global_gooftool = Gooftool(hwid_version=3, project=project,
69 hwdb_path=hwdb_path)
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080070
71 return _global_gooftool
Ricky Lianga70a1202013-03-15 15:03:17 +080072
Hung-Te Lin56b18402015-01-16 14:52:30 +080073
Ting Shen18a06382016-08-30 16:18:21 +080074def Command(cmd_name, *args, **kwargs):
75 """ Decorator for commands in gooftool.
76
77 This is similar to argparse_utils.Command, but all gooftool commands
78 can be waived during `gooftool finalize` or `gooftool verify` using
Wei-Han Chen60c5d332017-01-05 17:15:10 +080079 --waive_list or --skip_list option.
Ting Shen18a06382016-08-30 16:18:21 +080080 """
81 def Decorate(fun):
Wei-Han Chen60c5d332017-01-05 17:15:10 +080082 def CommandWithWaiveSkipCheck(options):
Ting Shen18a06382016-08-30 16:18:21 +080083 waive_list = vars(options).get('waive_list', [])
Wei-Han Chen60c5d332017-01-05 17:15:10 +080084 skip_list = vars(options).get('skip_list', [])
85 if phase.GetPhase() >= phase.PVT_DOGFOOD and (
86 waive_list != [] or skip_list != []):
Ting Shen18a06382016-08-30 16:18:21 +080087 raise Error(
Wei-Han Chen60c5d332017-01-05 17:15:10 +080088 'waive_list and skip_list should be empty for phase %s' %
89 phase.GetPhase())
Ting Shen18a06382016-08-30 16:18:21 +080090
Wei-Han Chen60c5d332017-01-05 17:15:10 +080091 if cmd_name not in skip_list:
92 try:
93 fun(options)
94 except Exception as e:
95 if cmd_name in waive_list:
96 logging.exception(e)
97 else:
98 raise
Ting Shen18a06382016-08-30 16:18:21 +080099
100 return argparse_utils.Command(cmd_name, *args, **kwargs)(
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800101 CommandWithWaiveSkipCheck)
Ting Shen18a06382016-08-30 16:18:21 +0800102 return Decorate
103
104
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800105@Command('write_hwid',
106 CmdArg('hwid', metavar='HWID', help='HWID string'))
Andy Chengc92e6f92012-11-20 16:55:53 +0800107def WriteHWID(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800108 """Write specified HWID value into the system BB."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800109
Tammo Spalink95c43732012-07-25 15:57:14 -0700110 logging.info('writing hwid string %r', options.hwid)
Ricky Lianga70a1202013-03-15 15:03:17 +0800111 GetGooftool(options).WriteHWID(options.hwid)
Andy Cheng0465d132013-03-20 12:12:06 +0800112 event_log.Log('write_hwid', hwid=options.hwid)
Tammo Spalink95c43732012-07-25 15:57:14 -0700113 print 'Wrote HWID: %r' % options.hwid
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800114
115
Yong Hong5408f652017-07-11 19:20:25 +0800116_project_cmd_arg = CmdArg(
117 '--project', metavar='PROJECT',
118 default=None, help='Project name to test.')
Ricky Liang53390232013-03-08 15:37:57 +0800119
Tammo Spalink8fab5312012-05-28 18:33:30 +0800120_hwdb_path_cmd_arg = CmdArg(
121 '--hwdb_path', metavar='PATH',
Ricky Liangeede7922013-06-19 10:18:41 +0800122 default=common.DEFAULT_HWID_DATA_PATH,
Tammo Spalink8fab5312012-05-28 18:33:30 +0800123 help='Path to the HWID database.')
124
Tammo Spalink95c43732012-07-25 15:57:14 -0700125_hwid_status_list_cmd_arg = CmdArg(
Hung-Te Lin56b18402015-01-16 14:52:30 +0800126 '--status', nargs='*', default=['supported'],
127 help='allow only HWIDs with these status values')
Tammo Spalink95c43732012-07-25 15:57:14 -0700128
Jon Salzce124fb2012-10-02 17:42:03 +0800129_probe_results_cmd_arg = CmdArg(
130 '--probe_results', metavar='RESULTS.yaml',
Yong Hong863d3262017-10-30 16:23:34 +0800131 help=('Output from "gooftool probe" (used instead of '
Jon Salzce124fb2012-10-02 17:42:03 +0800132 'probing this system).'))
133
Ricky Liang53390232013-03-08 15:37:57 +0800134_device_info_cmd_arg = CmdArg(
Ricky Liangf89f73a2013-03-19 05:00:24 +0800135 '--device_info', metavar='DEVICE_INFO.yaml', default=None,
Ricky Liang53390232013-03-08 15:37:57 +0800136 help='A dict of device info to use instead of fetching from shopfllor '
137 'server.')
138
Jon Salzce124fb2012-10-02 17:42:03 +0800139_hwid_cmd_arg = CmdArg(
140 '--hwid', metavar='HWID',
Ricky Lianga70a1202013-03-15 15:03:17 +0800141 help='HWID to verify (instead of the currently set HWID of this system).')
Jon Salzce124fb2012-10-02 17:42:03 +0800142
Bernie Thompson3c11c872013-07-22 18:22:45 -0700143_rma_mode_cmd_arg = CmdArg(
144 '--rma_mode', action='store_true',
145 help='Enable RMA mode, do not check for deprecated components.')
Tammo Spalink95c43732012-07-25 15:57:14 -0700146
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800147_cros_core_cmd_arg = CmdArg(
148 '--cros_core', action='store_true',
149 help='Finalize for ChromeOS Core devices (may add or remove few test '
Hung-Te Lin53c49402017-07-26 13:10:58 +0800150 'items. For example, registration codes or firmware bitmap '
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800151 'locale settings).')
152
bowgotsai13820f42015-09-10 23:18:04 +0800153_enforced_release_channels_cmd_arg = CmdArg(
154 '--enforced_release_channels', nargs='*', default=None,
155 help='Enforced release image channels.')
156
Yilun Lin34f54802017-11-16 11:58:25 +0800157_ec_pubkey_path_cmd_arg = CmdArg(
158 '--ec_pubkey_path',
159 default=None,
160 help='Path to public key in vb2 format. Verify EC key with pubkey file.')
161
162_ec_pubkey_hash_cmd_arg = CmdArg(
163 '--ec_pubkey_hash',
164 default=None,
165 help='A string for public key hash. Verify EC key with the given hash.')
166
Hung-Te Lincdb96522016-04-15 16:51:10 +0800167_release_rootfs_cmd_arg = CmdArg(
168 '--release_rootfs', help='Location of release image rootfs partition.')
169
170_firmware_path_cmd_arg = CmdArg(
171 '--firmware_path', help='Location of firmware image partition.')
Ricky Liang43b879b2014-02-24 11:36:55 +0800172
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800173_shopfloor_url_args_cmd_arg = CmdArg(
174 '--shopfloor_url',
Earl Ou51182222016-09-09 12:16:48 +0800175 help='Shopfloor server url to be informed when wiping is done. '
176 'After wiping, a XML-RPC request will be sent to the '
177 'given url to indicate the completion of wiping.')
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800178
179_station_ip_cmd_arg = CmdArg(
180 '--station_ip',
181 help='IP of remote station')
182
183_station_port_cmd_arg = CmdArg(
184 '--station_port',
185 help='Port on remote station')
186
187_wipe_finish_token_cmd_arg = CmdArg(
188 '--wipe_finish_token',
189 help='Required token when notifying station after wipe finished')
190
Ting Shen18a06382016-08-30 16:18:21 +0800191_waive_list_cmd_arg = CmdArg(
192 '--waive_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu461ec032017-03-06 15:56:58 +0800193 help='A list of waived checks, separated by whitespace.'
Ting Shen18a06382016-08-30 16:18:21 +0800194 'Each item should be a sub-command of gooftool.'
195 'e.g. "gooftool verify --waive_list verify_tpm clear_gbb_flags".')
196
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800197_skip_list_cmd_arg = CmdArg(
198 '--skip_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu461ec032017-03-06 15:56:58 +0800199 help='A list of skipped checks, separated by whitespace.'
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800200 'Each item should be a sub-command of gooftool.'
201 'e.g. "gooftool verify --skip_list verify_tpm clear_gbb_flags".')
202
Tammo Spalink8fab5312012-05-28 18:33:30 +0800203
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800204@Command('probe',
205 CmdArg('--comps', nargs='*',
206 help='List of keys from the component_db registry.'),
207 CmdArg('--no_vol', action='store_true',
Yong Hong863d3262017-10-30 16:23:34 +0800208 help='Do not probe volatile data.'))
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800209def RunProbe(options):
210 """Print yaml-formatted breakdown of probed device properties."""
Yong Hong863d3262017-10-30 16:23:34 +0800211 probed_result = GetGooftool(options).Probe(options.comps, not options.no_vol)
212 print yaml.dump(probed_result)
Ricky Liang53390232013-03-08 15:37:57 +0800213
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800214
Yong Hong863d3262017-10-30 16:23:34 +0800215@Command('verify_components')
Tammo Spalink214caf42012-05-28 10:45:00 +0800216def VerifyComponents(options):
Yong Hong863d3262017-10-30 16:23:34 +0800217 del options
218 msg = ('This command has already been deprecated, please use '
219 '`hwid verify-components` instead.')
220 print msg
221 sys.exit(1)
Tammo Spalink214caf42012-05-28 10:45:00 +0800222
223
Yilun Lin34f54802017-11-16 11:58:25 +0800224@Command(
225 'verify_ec_key',
226 _ec_pubkey_path_cmd_arg,
227 _ec_pubkey_hash_cmd_arg)
228def VerifyECKey(options):
229 """Verify EC key."""
230 return GetGooftool(options).VerifyECKey(
231 options.ec_pubkey_path, options.ec_pubkey_hash)
232
233
Hung-Te Line1d80f62016-03-31 14:58:13 +0800234@Command('verify_keys',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800235 _release_rootfs_cmd_arg,
236 _firmware_path_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800237def VerifyKeys(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800238 """Verify keys in firmware and SSD match."""
Hung-Te Line1d80f62016-03-31 14:58:13 +0800239 return GetGooftool(options).VerifyKeys(
Hung-Te Lincdb96522016-04-15 16:51:10 +0800240 options.release_rootfs, options.firmware_path)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800241
242
243@Command('set_fw_bitmap_locale')
Peter Shihfdf17682017-05-26 11:38:39 +0800244def SetFirmwareBitmapLocale(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800245 """Use VPD locale value to set firmware bitmap default language."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800246
Ricky Lianga70a1202013-03-15 15:03:17 +0800247 (index, locale) = GetGooftool(options).SetFirmwareBitmapLocale()
Andy Cheng2582d292012-12-04 17:38:28 +0800248 logging.info('Firmware bitmap initial locale set to %d (%s).',
249 index, locale)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800250
251
Hung-Te Line1d80f62016-03-31 14:58:13 +0800252@Command('verify_system_time',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800253 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800254def VerifySystemTime(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800255 """Verify system time is later than release filesystem creation time."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800256
Hung-Te Lincdb96522016-04-15 16:51:10 +0800257 return GetGooftool(options).VerifySystemTime(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800258
259
Hung-Te Line1d80f62016-03-31 14:58:13 +0800260@Command('verify_rootfs',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800261 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800262def VerifyRootFs(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800263 """Verify rootfs on SSD is valid by checking hash."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800264
Hung-Te Line1d80f62016-03-31 14:58:13 +0800265 return GetGooftool(options).VerifyRootFs(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800266
Hung-Te Lin56b18402015-01-16 14:52:30 +0800267
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800268@Command('verify_tpm')
Peter Shihfdf17682017-05-26 11:38:39 +0800269def VerifyTPM(options):
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800270 """Verify TPM is cleared."""
271
272 return GetGooftool(options).VerifyTPM()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800273
Hung-Te Lin56b18402015-01-16 14:52:30 +0800274
Hung-Te Lindd708d42014-07-11 17:05:01 +0800275@Command('verify_me_locked')
Peter Shihfdf17682017-05-26 11:38:39 +0800276def VerifyManagementEngineLocked(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800277 """Verify Management Engine is locked."""
Hung-Te Lindd708d42014-07-11 17:05:01 +0800278
279 return GetGooftool(options).VerifyManagementEngineLocked()
280
Hung-Te Lin56b18402015-01-16 14:52:30 +0800281
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800282@Command('verify_switch_wp')
Peter Shihfdf17682017-05-26 11:38:39 +0800283def VerifyWPSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800284 """Verify hardware write protection switch is enabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800285
Ricky Lianga70a1202013-03-15 15:03:17 +0800286 GetGooftool(options).VerifyWPSwitch()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800287
288
289@Command('verify_switch_dev')
Peter Shihfdf17682017-05-26 11:38:39 +0800290def VerifyDevSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800291 """Verify developer switch is disabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800292
Ricky Lianga70a1202013-03-15 15:03:17 +0800293 if GetGooftool(options).CheckDevSwitchForDisabling():
Hung-Te Lind7d34722012-07-26 16:48:35 +0800294 logging.warn('VerifyDevSwitch: No physical switch.')
Andy Cheng0465d132013-03-20 12:12:06 +0800295 event_log.Log('switch_dev', type='virtual switch')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800296
297
Hung-Te Lin53c49402017-07-26 13:10:58 +0800298@Command('verify_vpd')
299def VerifyVPD(options):
300 """Verify that VPD values are properly set.
Jon Salzadd90d32014-04-29 16:16:27 +0800301
Hung-Te Lin53c49402017-07-26 13:10:58 +0800302 Check if mandatory fields are set, and deprecated fields don't exist.
Jon Salzadd90d32014-04-29 16:16:27 +0800303 """
Hung-Te Lin53c49402017-07-26 13:10:58 +0800304 return GetGooftool(options).VerifyVPD()
Jon Salzadd90d32014-04-29 16:16:27 +0800305
306
bowgotsai13820f42015-09-10 23:18:04 +0800307@Command('verify_release_channel',
308 _enforced_release_channels_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800309def VerifyReleaseChannel(options):
bowgotsai529139c2015-05-30 01:39:49 +0800310 """Verify that release image channel is correct.
311
312 ChromeOS has four channels: canary, dev, beta and stable.
313 The last three channels support image auto-updates, checks
314 that release image channel is one of them.
315 """
bowgotsai13820f42015-09-10 23:18:04 +0800316 return GetGooftool(options).VerifyReleaseChannel(
317 options.enforced_release_channels)
bowgotsai529139c2015-05-30 01:39:49 +0800318
319
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800320@Command('write_protect')
Peter Shihfdf17682017-05-26 11:38:39 +0800321def EnableFwWp(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800322 """Enable then verify firmware write protection."""
Peter Shihfdf17682017-05-26 11:38:39 +0800323 del options # Unused.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800324
Yong Hongdad230a2017-08-30 22:25:19 +0800325 def WriteProtect(fw):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800326 """Calculate protection size, then invoke flashrom.
327
Yong Hongdad230a2017-08-30 22:25:19 +0800328 The region (offset and size) to write protect may be different per chipset
329 and firmware layout, so we have to read the WP_RO section from FMAP to
330 decide that.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800331 """
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800332 wp_section = 'WP_RO'
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800333
Yong Hongdad230a2017-08-30 22:25:19 +0800334 fmap_image = fw.GetFirmwareImage(
335 sections=(['FMAP'] if fw.target == crosfw.TARGET_MAIN else None))
336 if not fmap_image.has_section(wp_section):
337 raise Error('Could not find %s firmware section: %s' %
338 (fw.target.upper(), wp_section))
339
340 section_data = fw.GetFirmwareImage(
341 sections=[wp_section]).get_section_area(wp_section)
342 ro_offset, ro_size = section_data[0 : 2]
343
344 logging.debug('write protecting %s [off=%x size=%x]', fw.target.upper(),
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800345 ro_offset, ro_size)
Yong Hongdad230a2017-08-30 22:25:19 +0800346 crosfw.Flashrom(fw.target).EnableWriteProtection(ro_offset, ro_size)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800347
Yong Hongdad230a2017-08-30 22:25:19 +0800348 WriteProtect(crosfw.LoadMainFirmware())
Andy Cheng0465d132013-03-20 12:12:06 +0800349 event_log.Log('wp', fw='main')
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800350
351 # Some EC (mostly PD) does not support "RO NOW". Instead they will only set
352 # "RO_AT_BOOT" when you request to enable RO (These platforms consider
353 # --wp-range with right range identical to --wp-enable), and requires a
354 # 'ectool reboot_ec RO at-shutdown; reboot' to let the RO take effect.
Hung-Te Lin0d10b562016-12-28 10:58:07 +0800355 # After reboot, "flashrom -p host --wp-status" will return protected range.
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800356 # If you don't reboot, returned range will be (0, 0), and running command
357 # "ectool flashprotect" will not have RO_NOW.
358
Yong Hongdad230a2017-08-30 22:25:19 +0800359 for fw in [crosfw.LoadEcFirmware(), crosfw.LoadPDFirmware()]:
360 if fw.GetChipId() is None:
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800361 logging.warning('%s not write protected (seems there is no %s flash).',
Yong Hongdad230a2017-08-30 22:25:19 +0800362 fw.target.upper(), fw.target.upper())
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800363 continue
Yong Hongdad230a2017-08-30 22:25:19 +0800364 WriteProtect(fw)
365 event_log.Log('wp', fw=fw.target)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800366
367
368@Command('clear_gbb_flags')
Peter Shihfdf17682017-05-26 11:38:39 +0800369def ClearGBBFlags(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800370 """Zero out the GBB flags, in preparation for transition to release state.
371
372 No GBB flags are set in release/shipping state, but they are useful
Hung-Te Lin879cff42017-06-19 12:46:37 +0800373 for factory/development. See "futility gbb --flags" for details.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800374 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800375
Ricky Lianga70a1202013-03-15 15:03:17 +0800376 GetGooftool(options).ClearGBBFlags()
Andy Cheng0465d132013-03-20 12:12:06 +0800377 event_log.Log('clear_gbb_flags')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800378
379
Jon Salzaa3a30e2013-05-15 15:56:28 +0800380@Command('clear_factory_vpd_entries')
Peter Shihfdf17682017-05-26 11:38:39 +0800381def ClearFactoryVPDEntries(options):
Jon Salzaa3a30e2013-05-15 15:56:28 +0800382 """Clears factory.* items in the RW VPD."""
383 entries = GetGooftool(options).ClearFactoryVPDEntries()
384 event_log.Log('clear_factory_vpd_entries', entries=FilterDict(entries))
385
386
Mattias Nisslercca761b2015-04-15 21:53:04 +0200387@Command('generate_stable_device_secret')
Peter Shihfdf17682017-05-26 11:38:39 +0800388def GenerateStableDeviceSecret(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800389 """Generates a fresh stable device secret and stores it in the RO VPD."""
Mattias Nisslercca761b2015-04-15 21:53:04 +0200390 GetGooftool(options).GenerateStableDeviceSecret()
391 event_log.Log('generate_stable_device_secret')
392
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800393
Shen-En Shihd078a7c2017-08-04 13:33:49 +0800394@Command('cr50_set_board_id')
395def Cr50SetBoardId(options):
396 """Set the board id and flag in the Cr50 chip."""
397 GetGooftool(options).Cr50SetBoardId()
398 event_log.Log('cr50_set_board_id')
399
400
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800401@Command('cr50_reset_state')
402def Cr50ResetState(options):
403 """Reset Cr50 state back to default state after RMA."""
404 return GetGooftool(options).Cr50ResetState()
405
406
Earl Ou564a7872016-10-05 10:22:00 +0800407@Command('enable_release_partition',
408 CmdArg('--release_rootfs',
409 help=('path to the release rootfs device. If not specified, '
410 'the default (5th) partition will be used.')))
411def EnableReleasePartition(options):
412 """Enables a release image partition on the disk."""
413 GetGooftool(options).EnableReleasePartition(options.release_rootfs)
414
415
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800416@Command('wipe_in_place',
417 CmdArg('--fast', action='store_true',
Shun-Hsing Ou8d3c40a2015-10-08 18:16:08 +0800418 help='use non-secure but faster wipe method.'),
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800419 _shopfloor_url_args_cmd_arg,
420 _station_ip_cmd_arg,
421 _station_port_cmd_arg,
422 _wipe_finish_token_cmd_arg)
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800423def WipeInPlace(options):
424 """Start factory wipe directly without reboot."""
425
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800426 GetGooftool(options).WipeInPlace(options.fast,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800427 options.shopfloor_url,
428 options.station_ip,
429 options.station_port,
430 options.wipe_finish_token)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200431
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800432@Command('wipe_init',
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800433 CmdArg('--wipe_args', help='arguments for clobber-state'),
434 CmdArg('--state_dev', help='path to stateful partition device'),
435 CmdArg('--root_disk', help='path to primary device'),
436 CmdArg('--old_root', help='path to old root'),
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800437 _shopfloor_url_args_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800438 _release_rootfs_cmd_arg,
439 _station_ip_cmd_arg,
440 _station_port_cmd_arg,
441 _wipe_finish_token_cmd_arg)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800442def WipeInit(options):
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800443 GetGooftool(options).WipeInit(options.wipe_args,
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800444 options.shopfloor_url,
445 options.state_dev,
446 options.release_rootfs,
447 options.root_disk,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800448 options.old_root,
449 options.station_ip,
450 options.station_port,
451 options.wipe_finish_token)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800452
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800453@Command('verify',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800454 CmdArg('--no_write_protect', action='store_true',
455 help='Do not check write protection switch state.'),
Tammo Spalink95c43732012-07-25 15:57:14 -0700456 _hwid_status_list_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800457 _hwdb_path_cmd_arg,
Yong Hong5408f652017-07-11 19:20:25 +0800458 _project_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800459 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800460 _hwid_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800461 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800462 _cros_core_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800463 _ec_pubkey_path_cmd_arg,
464 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800465 _release_rootfs_cmd_arg,
466 _firmware_path_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800467 _enforced_release_channels_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800468 _waive_list_cmd_arg,
469 _skip_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800470def Verify(options):
471 """Verifies if whole factory process is ready for finalization.
472
473 This routine performs all the necessary checks to make sure the
474 device is ready to be finalized, but does not modify state. These
475 checks include dev switch, firmware write protection switch, hwid,
476 system time, keys, and root file system.
477 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800478
Hung-Te Lin6d827542012-07-19 11:50:41 +0800479 if not options.no_write_protect:
Ricky Lianga70a1202013-03-15 15:03:17 +0800480 VerifyWPSwitch(options)
Hung-Te Lindd708d42014-07-11 17:05:01 +0800481 VerifyManagementEngineLocked(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800482 VerifyDevSwitch(options)
Ting Shen129fa6f2016-09-02 12:22:24 +0800483 VerifyHWID(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800484 VerifySystemTime(options)
Yilun Lin34f54802017-11-16 11:58:25 +0800485 VerifyECKey(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800486 VerifyKeys(options)
487 VerifyRootFs(options)
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800488 VerifyTPM(options)
Hung-Te Lin53c49402017-07-26 13:10:58 +0800489 VerifyVPD(options)
bowgotsai529139c2015-05-30 01:39:49 +0800490 VerifyReleaseChannel(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800491
Hung-Te Lin56b18402015-01-16 14:52:30 +0800492
Jon Salzfe9036f2014-01-16 14:11:23 +0800493@Command('untar_stateful_files')
Hung-Te Lin388bce22014-06-03 19:56:40 +0800494def UntarStatefulFiles(unused_options):
Jon Salzfe9036f2014-01-16 14:11:23 +0800495 """Untars stateful files from stateful_files.tar.xz on stateful partition.
496
497 If that file does not exist (which should only be R30 and earlier),
498 this is a no-op.
499 """
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800500 # Path to stateful partition on device.
501 device_stateful_path = '/mnt/stateful_partition'
502 tar_file = os.path.join(device_stateful_path, 'stateful_files.tar.xz')
Jon Salzfe9036f2014-01-16 14:11:23 +0800503 if os.path.exists(tar_file):
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800504 Spawn(['tar', 'xf', tar_file], cwd=device_stateful_path,
Jon Salzfe9036f2014-01-16 14:11:23 +0800505 log=True, check_call=True)
506 else:
507 logging.warning('No stateful files at %s', tar_file)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800508
Jon Salz40b9f822014-07-25 16:39:55 +0800509
510@Command('log_source_hashes')
Peter Shihfdf17682017-05-26 11:38:39 +0800511def LogSourceHashes(options):
Jon Salz40b9f822014-07-25 16:39:55 +0800512 """Logs hashes of source files in the factory toolkit."""
Peter Shihfdf17682017-05-26 11:38:39 +0800513 del options # Unused.
Jon Salze60307f2014-08-05 16:20:00 +0800514 # WARNING: The following line is necessary to validate the integrity
515 # of the factory software. Do not remove or modify it.
516 #
517 # 警告:此行会验证工厂软件的完整性,禁止删除或修改。
Wei-Han Chena5c01a02016-04-23 19:27:19 +0800518 factory_par = sys_utils.GetRunningFactoryPythonArchivePath()
519 if factory_par:
520 event_log.Log(
521 'source_hashes',
522 **file_utils.HashPythonArchive(factory_par))
523 else:
524 event_log.Log(
525 'source_hashes',
Peter Shihad166772017-05-31 11:36:17 +0800526 **file_utils.HashSourceTree(os.path.join(paths.FACTORY_DIR, 'py')))
Jon Salz40b9f822014-07-25 16:39:55 +0800527
528
Tammo Spalink86a61c62012-05-25 15:10:35 +0800529@Command('log_system_details')
Peter Shihfdf17682017-05-26 11:38:39 +0800530def LogSystemDetails(options):
Tammo Spalink86a61c62012-05-25 15:10:35 +0800531 """Write miscellaneous system details to the event log."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800532
Ricky Liang43b879b2014-02-24 11:36:55 +0800533 event_log.Log('system_details', **GetGooftool(options).GetSystemDetails())
Tammo Spalink86a61c62012-05-25 15:10:35 +0800534
535
Jon Salza88b83b2013-05-27 20:00:35 +0800536def CreateReportArchiveBlob(*args, **kwargs):
537 """Creates a report archive and returns it as a blob.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800538
Jon Salza88b83b2013-05-27 20:00:35 +0800539 Args:
540 See CreateReportArchive.
Andy Cheng7a76cb82012-11-19 18:08:19 +0800541
Jon Salza88b83b2013-05-27 20:00:35 +0800542 Returns:
543 An xmlrpclib.Binary object containing a .tar.xz file.
544 """
Wei-Han Chen47416612016-09-14 17:41:52 +0800545 report_archive = CreateReportArchive(*args, **kwargs)
546 try:
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800547 return xmlrpclib.Binary(file_utils.ReadFile(report_archive))
Wei-Han Chen47416612016-09-14 17:41:52 +0800548 finally:
549 os.unlink(report_archive)
Jon Salza88b83b2013-05-27 20:00:35 +0800550
551
552def CreateReportArchive(device_sn=None, add_file=None):
553 """Creates a report archive in a temporary directory.
554
555 Args:
556 device_sn: The device serial number (optional).
557 add_file: A list of files to add (optional).
558
559 Returns:
560 Path to the archive.
561 """
Hung-Te Lin6bd16472012-06-20 16:26:47 +0800562 def NormalizeAsFileName(token):
563 return re.sub(r'\W+', '', token).strip()
Jon Salza88b83b2013-05-27 20:00:35 +0800564
565 target_name = '%s%s.tar.xz' % (
566 time.strftime('%Y%m%dT%H%M%SZ',
567 time.gmtime()),
Hung-Te Lin56b18402015-01-16 14:52:30 +0800568 ('' if device_sn is None else
569 '_' + NormalizeAsFileName(device_sn)))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800570 target_path = os.path.join(gettempdir(), target_name)
Jon Salza88b83b2013-05-27 20:00:35 +0800571
Tammo Spalink86a61c62012-05-25 15:10:35 +0800572 # Intentionally ignoring dotfiles in EVENT_LOG_DIR.
Andy Cheng0465d132013-03-20 12:12:06 +0800573 tar_cmd = 'cd %s ; tar cJf %s *' % (event_log.EVENT_LOG_DIR, target_path)
Peter Shihb4e49352017-05-25 17:35:11 +0800574 tar_cmd += ' %s' % paths.FACTORY_LOG_PATH
Jon Salza88b83b2013-05-27 20:00:35 +0800575 if add_file:
576 for f in add_file:
Jon Salz65266432012-07-30 19:02:49 +0800577 # Require absolute paths since the tar command may change the
578 # directory.
579 if not f.startswith('/'):
580 raise Error('Not an absolute path: %s' % f)
581 if not os.path.exists(f):
582 raise Error('File does not exist: %s' % f)
Wei-Han Chen4b755022017-01-04 10:51:52 +0800583 tar_cmd += ' %s' % pipes.quote(f)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800584 cmd_result = Shell(tar_cmd)
Jon Salzff88c022012-11-03 12:19:58 +0800585
586 if ((cmd_result.status == 1) and
587 all((x == '' or
588 'file changed as we read it' in x or
589 "Removing leading `/' from member names" in x)
590 for x in cmd_result.stderr.split('\n'))):
591 # That's OK. Make sure it's valid though.
Vic Yang85199e72013-01-28 14:33:11 +0800592 Spawn(['tar', 'tfJ', target_path], check_call=True, log=True,
Jon Salzff88c022012-11-03 12:19:58 +0800593 ignore_stdout=True)
594 elif not cmd_result.success:
Tammo Spalink86a61c62012-05-25 15:10:35 +0800595 raise Error('unable to tar event logs, cmd %r failed, stderr: %r' %
596 (tar_cmd, cmd_result.stderr))
Jon Salzff88c022012-11-03 12:19:58 +0800597
Jon Salza88b83b2013-05-27 20:00:35 +0800598 return target_path
599
600_upload_method_cmd_arg = CmdArg(
601 '--upload_method', metavar='METHOD:PARAM',
602 help=('How to perform the upload. METHOD should be one of '
603 '{ftp, shopfloor, ftps, cpfe}.'))
604_add_file_cmd_arg = CmdArg(
605 '--add_file', metavar='FILE', action='append',
606 help='Extra file to include in report (must be an absolute path)')
607
Hung-Te Lin56b18402015-01-16 14:52:30 +0800608
Jon Salza88b83b2013-05-27 20:00:35 +0800609@Command('upload_report',
610 _upload_method_cmd_arg,
611 _add_file_cmd_arg)
612def UploadReport(options):
613 """Create a report containing key device details."""
Yong Hong863d3262017-10-30 16:23:34 +0800614 ro_vpd = sys_utils.VPDTool().GetAllData(
615 partition=sys_utils.VPDTool.RO_PARTITION)
Jon Salza88b83b2013-05-27 20:00:35 +0800616 device_sn = ro_vpd.get('serial_number', None)
617 if device_sn is None:
618 logging.warning('RO_VPD missing device serial number')
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +0800619 device_sn = 'MISSING_SN_' + time_utils.TimedUUID()
Jon Salza88b83b2013-05-27 20:00:35 +0800620 target_path = CreateReportArchive(device_sn)
621
Tammo Spalink86a61c62012-05-25 15:10:35 +0800622 if options.upload_method is None or options.upload_method == 'none':
623 logging.warning('REPORT UPLOAD SKIPPED (report left at %s)', target_path)
624 return
625 method, param = options.upload_method.split(':', 1)
626 if method == 'shopfloor':
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800627 report_upload.ShopFloorUpload(
628 target_path, param,
629 'GRT' if options.command_name == 'finalize' else None)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800630 elif method == 'ftp':
Jay Kim360c1dd2012-06-25 10:58:11 -0700631 report_upload.FtpUpload(target_path, 'ftp:' + param)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800632 elif method == 'ftps':
633 report_upload.CurlUrlUpload(target_path, '--ftp-ssl-reqd ftp:%s' % param)
634 elif method == 'cpfe':
Shawn Nematbakhsh3404a092013-01-28 16:49:09 -0800635 report_upload.CpfeUpload(target_path, pipes.quote(param))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800636 else:
637 raise Error('unknown report upload method %r', method)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800638
639
640@Command('finalize',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800641 CmdArg('--no_write_protect', action='store_true',
642 help='Do not enable firmware write protection.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800643 CmdArg('--fast', action='store_true',
644 help='use non-secure but faster wipe method.'),
Shun-Hsing Oudb407d62015-11-11 11:03:59 +0800645 _shopfloor_url_args_cmd_arg,
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800646 _hwdb_path_cmd_arg,
Tammo Spalink95c43732012-07-25 15:57:14 -0700647 _hwid_status_list_cmd_arg,
Jon Salz65266432012-07-30 19:02:49 +0800648 _upload_method_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800649 _add_file_cmd_arg,
650 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800651 _hwid_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800652 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800653 _cros_core_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800654 _ec_pubkey_path_cmd_arg,
655 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800656 _release_rootfs_cmd_arg,
657 _firmware_path_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800658 _enforced_release_channels_cmd_arg,
659 _station_ip_cmd_arg,
660 _station_port_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800661 _wipe_finish_token_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800662 _waive_list_cmd_arg,
663 _skip_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800664def Finalize(options):
665 """Verify system readiness and trigger transition into release state.
666
Jon Salzaa3a30e2013-05-15 15:56:28 +0800667 This routine does the following:
668 - Verifies system state (see verify command)
Jon Salzfe9036f2014-01-16 14:11:23 +0800669 - Untars stateful_files.tar.xz, if it exists, in the stateful partition, to
670 initialize files such as the CRX cache
Jon Salzaa3a30e2013-05-15 15:56:28 +0800671 - Modifies firmware bitmaps to match locale
672 - Clears all factory-friendly flags from the GBB
673 - Removes factory-specific entries from RW_VPD (factory.*)
674 - Enables firmware write protection (cannot rollback after this)
675 - Uploads system logs & reports
Earl Ou51182222016-09-09 12:16:48 +0800676 - Wipes the testing kernel, rootfs, and stateful partition
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800677 """
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800678 Verify(options)
Shen-En Shih3e079b22017-09-11 05:43:09 -0700679 Cr50SetBoardId(options)
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800680 Cr50ResetState(options)
Jon Salz40b9f822014-07-25 16:39:55 +0800681 LogSourceHashes(options)
Jon Salzfe9036f2014-01-16 14:11:23 +0800682 UntarStatefulFiles(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800683 if options.cros_core:
684 logging.info('SetFirmwareBitmapLocale is skipped for ChromeOS Core device.')
685 else:
686 SetFirmwareBitmapLocale(options)
Jon Salzaa3a30e2013-05-15 15:56:28 +0800687 ClearFactoryVPDEntries(options)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200688 GenerateStableDeviceSecret(options)
Shen-En Shih3e079b22017-09-11 05:43:09 -0700689 ClearGBBFlags(options)
Hung-Te Lin6d827542012-07-19 11:50:41 +0800690 if options.no_write_protect:
691 logging.warn('WARNING: Firmware Write Protection is SKIPPED.')
Andy Cheng0465d132013-03-20 12:12:06 +0800692 event_log.Log('wp', fw='both', status='skipped')
Hung-Te Lin6d827542012-07-19 11:50:41 +0800693 else:
Wei-Han Chenba21f512016-10-14 18:52:33 +0800694 EnableFwWp(options)
Jon Salza0f58e02012-05-29 19:33:39 +0800695 LogSystemDetails(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800696 UploadReport(options)
Earl Ou51182222016-09-09 12:16:48 +0800697
698 event_log.Log('wipe_in_place')
699 wipe_args = []
Earl Ou51182222016-09-09 12:16:48 +0800700 if options.shopfloor_url:
701 wipe_args += ['--shopfloor_url', options.shopfloor_url]
702 if options.fast:
703 wipe_args += ['--fast']
704 if options.station_ip:
705 wipe_args += ['--station_ip', options.station_ip]
706 if options.station_port:
707 wipe_args += ['--station_port', options.station_port]
708 if options.wipe_finish_token:
709 wipe_args += ['--wipe_finish_token', options.wipe_finish_token]
710 ExecFactoryPar('gooftool', 'wipe_in_place', *wipe_args)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800711
712
Ting Shen129fa6f2016-09-02 12:22:24 +0800713@Command('verify_hwid',
714 _probe_results_cmd_arg,
715 _hwdb_path_cmd_arg,
716 _hwid_cmd_arg,
717 _rma_mode_cmd_arg)
718def VerifyHWID(options):
Ricky Liangc662be32013-12-24 11:50:23 +0800719 """A simple wrapper that calls out to HWID utils to verify version 3 HWID.
Ricky Liang53390232013-03-08 15:37:57 +0800720
Ricky Liangc662be32013-12-24 11:50:23 +0800721 This is mainly for Gooftool to verify v3 HWID during finalize. For testing
722 and development purposes, please use `hwid` command.
Ricky Liang53390232013-03-08 15:37:57 +0800723 """
Ricky Liangc662be32013-12-24 11:50:23 +0800724 db = GetGooftool(options).db
725 encoded_string = options.hwid or hwid_utils.GetHWIDString()
Ricky Liang7905f272013-03-16 01:57:10 +0800726 if options.probe_results:
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800727 probed_results = yaml.load(file_utils.ReadFile(options.probe_results))
Ricky Liang7905f272013-03-16 01:57:10 +0800728 else:
Yong Hong863d3262017-10-30 16:23:34 +0800729 probed_results = GetGooftool(options).Probe()
Ricky Liangc662be32013-12-24 11:50:23 +0800730 vpd = hwid_utils.GetVPD(probed_results)
Ricky Liang53390232013-03-08 15:37:57 +0800731
Hung-Te Lin11052952015-03-18 13:48:59 +0800732 event_log.Log('probed_results', probed_results=FilterDict(probed_results))
733 event_log.Log('vpd', vpd=FilterDict(vpd))
Ricky Liang53390232013-03-08 15:37:57 +0800734
Ricky Liangc662be32013-12-24 11:50:23 +0800735 hwid_utils.VerifyHWID(db, encoded_string, probed_results, vpd,
Hung-Te Lin56b18402015-01-16 14:52:30 +0800736 rma_mode=options.rma_mode)
Ricky Liang53390232013-03-08 15:37:57 +0800737
Ricky Liangc662be32013-12-24 11:50:23 +0800738 event_log.Log('verified_hwid', hwid=encoded_string)
Ricky Liang53390232013-03-08 15:37:57 +0800739
740
henryhsu44d793a2013-07-20 00:07:38 +0800741@Command('get_firmware_hash',
742 CmdArg('--file', metavar='FILE', help='Firmware File.'))
743def GetFirmwareHash(options):
henryhsuf6f835c2013-07-20 20:49:25 +0800744 """Get firmware hash from a file"""
henryhsu44d793a2013-07-20 00:07:38 +0800745 if os.path.exists(options.file):
Yong Hong863d3262017-10-30 16:23:34 +0800746 hashes = chromeos_firmware.CalculateFirmwareHashes(options.file)
henryhsu44d793a2013-07-20 00:07:38 +0800747 for section, value_dict in hashes.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800748 print '%s:' % section
henryhsu44d793a2013-07-20 00:07:38 +0800749 for key, value in value_dict.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800750 print ' %s: %s' % (key, value)
henryhsu44d793a2013-07-20 00:07:38 +0800751 else:
752 raise Error('File does not exist: %s' % options.file)
753
henryhsuf6f835c2013-07-20 20:49:25 +0800754
Peter Shihfdf17682017-05-26 11:38:39 +0800755def main():
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800756 """Run sub-command specified by the command line args."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800757
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800758 options = ParseCmdline(
Ting Shen129fa6f2016-09-02 12:22:24 +0800759 'Perform Google required factory tests.',
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800760 CmdArg('-l', '--log', metavar='PATH',
761 help='Write logs to this file.'),
Jon Salza4bea382012-10-29 13:00:34 +0800762 CmdArg('--suppress-event-logs', action='store_true',
763 help='Suppress event logging.'),
Wei-Han Chenaff56232016-04-16 09:17:59 +0800764 CmdArg('--phase', default=None,
765 help=('override phase for phase checking (defaults to the current '
766 'as returned by the "factory phase" command)')),
Tammo Spalink8fab5312012-05-28 18:33:30 +0800767 verbosity_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800768 SetupLogging(options.verbosity, options.log)
Andy Cheng0465d132013-03-20 12:12:06 +0800769 event_log.SetGlobalLoggerDefaultPrefix('gooftool')
770 event_log.GetGlobalLogger().suppress = options.suppress_event_logs
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800771 logging.debug('gooftool options: %s', repr(options))
Wei-Han Chenaff56232016-04-16 09:17:59 +0800772
773 phase.OverridePhase(options.phase)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800774 try:
775 logging.debug('GOOFTOOL command %r', options.command_name)
776 options.command(options)
777 logging.info('GOOFTOOL command %r SUCCESS', options.command_name)
778 except Error, e:
779 logging.exception(e)
780 sys.exit('GOOFTOOL command %r ERROR: %s' % (options.command_name, e))
781 except Exception, e:
782 logging.exception(e)
783 sys.exit('UNCAUGHT RUNTIME EXCEPTION %s' % e)
784
785
786if __name__ == '__main__':
Peter Shihfdf17682017-05-26 11:38:39 +0800787 main()