blob: c889d9bf965ecc6e75aa5ee07f74d894f2632518 [file] [log] [blame]
Yilin Yang19da6932019-12-10 13:39:28 +08001#!/usr/bin/env python3
Jon Salze60307f2014-08-05 16:20:00 +08002# -*- coding: utf-8 -*-
3# Copyright 2014 The Chromium OS Authors. All rights reserved.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08004# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
Jon Salze60307f2014-08-05 16:20:00 +08007
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08008"""Google Factory Tool.
9
You-Cheng Syu461ec032017-03-06 15:56:58 +080010This tool is intended to be used on factory assembly lines. It
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080011provides all of the Google required test functionality and must be run
12on each device as part of the assembly process.
13"""
14
Yilin Yang71e39412019-09-24 09:26:46 +080015from __future__ import print_function
16
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080017import logging
18import os
Jon Salz65266432012-07-30 19:02:49 +080019import pipes
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080020import re
21import sys
Peter Shihfdf17682017-05-26 11:38:39 +080022from tempfile import gettempdir
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080023import threading
Hung-Te Lin6bd16472012-06-20 16:26:47 +080024import time
Yilin Yange02d5722019-10-23 11:07:36 +080025import xmlrpc.client
Peter Shihfdf17682017-05-26 11:38:39 +080026
Wei-Han Chen0a3320e2016-04-23 01:32:07 +080027from cros.factory.gooftool.common import ExecFactoryPar
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080028from cros.factory.gooftool.common import Shell
Peter Shihfdf17682017-05-26 11:38:39 +080029from cros.factory.gooftool.core import Gooftool
30from cros.factory.gooftool import crosfw
Peter Shihfdf17682017-05-26 11:38:39 +080031from cros.factory.gooftool import report_upload
Yong Hong65bda312018-12-13 20:05:58 +080032from cros.factory.gooftool import vpd
Hung-Te Lin604e0c22015-11-24 15:17:07 +080033from cros.factory.hwid.v3 import hwid_utils
Yong Hong863d3262017-10-30 16:23:34 +080034from cros.factory.probe.functions import chromeos_firmware
Wei-Han Chen2ebb92d2016-01-12 14:51:41 +080035from cros.factory.test.env import paths
Peter Shihfdf17682017-05-26 11:38:39 +080036from cros.factory.test import event_log
Wei-Han Chenaff56232016-04-16 09:17:59 +080037from cros.factory.test.rules import phase
Hung-Te Lin3f096842016-01-13 17:37:06 +080038from cros.factory.test.rules.privacy import FilterDict
Philip Chen6ada02c2019-11-04 19:41:54 +000039from cros.factory.test import state
Peter Shihfdf17682017-05-26 11:38:39 +080040from cros.factory.utils import argparse_utils
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080041from cros.factory.utils.argparse_utils import CmdArg
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080042from cros.factory.utils.argparse_utils import ParseCmdline
Wei-Han Chenb34bdff2019-09-26 13:07:50 +080043from cros.factory.utils.argparse_utils import VERBOSITY_CMD_ARG
Peter Shihfdf17682017-05-26 11:38:39 +080044from cros.factory.utils.debug_utils import SetupLogging
Jon Salz40b9f822014-07-25 16:39:55 +080045from cros.factory.utils import file_utils
Peter Shih67c7c0f2018-02-26 11:23:59 +080046from cros.factory.utils.process_utils import Spawn
Wei-Han Chena5c01a02016-04-23 19:27:19 +080047from cros.factory.utils import sys_utils
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +080048from cros.factory.utils import time_utils
Joel Kitchingd3bc2662014-12-16 16:03:32 -080049from cros.factory.utils.type_utils import Error
Tammo Spalink86a61c62012-05-25 15:10:35 +080050
Tammo Spalink5c699832012-07-03 17:50:39 +080051
Tammo Spalink5c699832012-07-03 17:50:39 +080052# TODO(tammo): Replace calls to sys.exit with raise Exit, and maybe
53# treat that specially (as a smoot exit, as opposed to the more
54# verbose output for generic Error).
55
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080056_global_gooftool = None
57_gooftool_lock = threading.Lock()
Philip Chen04fb90b2019-11-06 12:10:33 -080058_has_fpmcu = None
Tammo Spalink5c699832012-07-03 17:50:39 +080059
Hung-Te Lin56b18402015-01-16 14:52:30 +080060
Ricky Lianga70a1202013-03-15 15:03:17 +080061def GetGooftool(options):
Peter Shihfdf17682017-05-26 11:38:39 +080062 global _global_gooftool # pylint: disable=global-statement
Ricky Lianga70a1202013-03-15 15:03:17 +080063
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080064 if _global_gooftool is None:
65 with _gooftool_lock:
Shen-En Shihc5d15d62017-08-04 13:02:59 +080066 if _global_gooftool is None:
67 project = getattr(options, 'project', None)
68 hwdb_path = getattr(options, 'hwdb_path', None)
69 _global_gooftool = Gooftool(hwid_version=3, project=project,
70 hwdb_path=hwdb_path)
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080071
72 return _global_gooftool
Ricky Lianga70a1202013-03-15 15:03:17 +080073
Philip Chen04fb90b2019-11-06 12:10:33 -080074def HasFpmcu():
75 global _has_fpmcu # pylint: disable=global-statement
76
77 if _has_fpmcu is None:
78 FPMCU_PATH = '/dev/cros_fp'
79 has_fpmcu_path = os.path.exists(FPMCU_PATH)
80 has_cros_config_fpmcu = False
Philip Chencf6642b2019-12-02 19:38:59 -080081 cros_config_output = Shell(['cros_config', '/fingerprint', 'board'])
82 if cros_config_output.success and cros_config_output.stdout:
Philip Chen04fb90b2019-11-06 12:10:33 -080083 has_cros_config_fpmcu = True
84
85 if has_fpmcu_path is False and has_cros_config_fpmcu is True:
86 raise Error('FPMCU found in cros_config but missing in %s.' % FPMCU_PATH)
Fei Shao0e4e2c62020-06-23 18:22:26 +080087 if has_fpmcu_path is True and has_cros_config_fpmcu is False:
Philip Chen04fb90b2019-11-06 12:10:33 -080088 raise Error('FPMCU found in %s but missing in cros_config.' % FPMCU_PATH)
89
90 _has_fpmcu = has_fpmcu_path
91
92 return _has_fpmcu
Hung-Te Lin56b18402015-01-16 14:52:30 +080093
Ting Shen18a06382016-08-30 16:18:21 +080094def Command(cmd_name, *args, **kwargs):
You-Cheng Syu8fc2a602017-12-22 17:05:05 +080095 """Decorator for commands in gooftool.
Ting Shen18a06382016-08-30 16:18:21 +080096
97 This is similar to argparse_utils.Command, but all gooftool commands
98 can be waived during `gooftool finalize` or `gooftool verify` using
Wei-Han Chen60c5d332017-01-05 17:15:10 +080099 --waive_list or --skip_list option.
Ting Shen18a06382016-08-30 16:18:21 +0800100 """
101 def Decorate(fun):
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800102 def CommandWithWaiveSkipCheck(options):
Ting Shen18a06382016-08-30 16:18:21 +0800103 waive_list = vars(options).get('waive_list', [])
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800104 skip_list = vars(options).get('skip_list', [])
105 if phase.GetPhase() >= phase.PVT_DOGFOOD and (
106 waive_list != [] or skip_list != []):
Ting Shen18a06382016-08-30 16:18:21 +0800107 raise Error(
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800108 'waive_list and skip_list should be empty for phase %s' %
109 phase.GetPhase())
Ting Shen18a06382016-08-30 16:18:21 +0800110
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800111 if cmd_name not in skip_list:
112 try:
113 fun(options)
114 except Exception as e:
115 if cmd_name in waive_list:
116 logging.exception(e)
117 else:
118 raise
Ting Shen18a06382016-08-30 16:18:21 +0800119
120 return argparse_utils.Command(cmd_name, *args, **kwargs)(
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800121 CommandWithWaiveSkipCheck)
Ting Shen18a06382016-08-30 16:18:21 +0800122 return Decorate
123
124
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800125@Command('write_hwid',
126 CmdArg('hwid', metavar='HWID', help='HWID string'))
Andy Chengc92e6f92012-11-20 16:55:53 +0800127def WriteHWID(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800128 """Write specified HWID value into the system BB."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800129
Tammo Spalink95c43732012-07-25 15:57:14 -0700130 logging.info('writing hwid string %r', options.hwid)
Ricky Lianga70a1202013-03-15 15:03:17 +0800131 GetGooftool(options).WriteHWID(options.hwid)
Andy Cheng0465d132013-03-20 12:12:06 +0800132 event_log.Log('write_hwid', hwid=options.hwid)
Yilin Yang71e39412019-09-24 09:26:46 +0800133 print('Wrote HWID: %r' % options.hwid)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800134
135
Yong Hongc3765412017-12-26 23:12:15 +0800136@Command('read_hwid')
137def ReadHWID(options):
138 """Read the HWID string from GBB."""
139
140 logging.info('reading the hwid string')
Yilin Yang71e39412019-09-24 09:26:46 +0800141 print(GetGooftool(options).ReadHWID())
Yong Hongc3765412017-12-26 23:12:15 +0800142
143
Yong Hong5408f652017-07-11 19:20:25 +0800144_project_cmd_arg = CmdArg(
145 '--project', metavar='PROJECT',
146 default=None, help='Project name to test.')
Ricky Liang53390232013-03-08 15:37:57 +0800147
Tammo Spalink8fab5312012-05-28 18:33:30 +0800148_hwdb_path_cmd_arg = CmdArg(
149 '--hwdb_path', metavar='PATH',
Yong Hong5c6dcd52017-12-27 11:05:01 +0800150 default=hwid_utils.GetDefaultDataPath(),
Tammo Spalink8fab5312012-05-28 18:33:30 +0800151 help='Path to the HWID database.')
152
Tammo Spalink95c43732012-07-25 15:57:14 -0700153_hwid_status_list_cmd_arg = CmdArg(
Hung-Te Lin56b18402015-01-16 14:52:30 +0800154 '--status', nargs='*', default=['supported'],
155 help='allow only HWIDs with these status values')
Tammo Spalink95c43732012-07-25 15:57:14 -0700156
Jon Salzce124fb2012-10-02 17:42:03 +0800157_probe_results_cmd_arg = CmdArg(
Yong Hong55050c12018-02-27 18:19:47 +0800158 '--probe_results', metavar='RESULTS.json',
159 help=('Output from "hwid probe" (used instead of probing this system).'))
Jon Salzce124fb2012-10-02 17:42:03 +0800160
Ricky Liang53390232013-03-08 15:37:57 +0800161_device_info_cmd_arg = CmdArg(
Ricky Liangf89f73a2013-03-19 05:00:24 +0800162 '--device_info', metavar='DEVICE_INFO.yaml', default=None,
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800163 help='A dict of device info to use instead of fetching from shopfloor '
Ricky Liang53390232013-03-08 15:37:57 +0800164 'server.')
165
Jon Salzce124fb2012-10-02 17:42:03 +0800166_hwid_cmd_arg = CmdArg(
167 '--hwid', metavar='HWID',
Ricky Lianga70a1202013-03-15 15:03:17 +0800168 help='HWID to verify (instead of the currently set HWID of this system).')
Jon Salzce124fb2012-10-02 17:42:03 +0800169
Yong Hong68a0e0d2017-12-20 19:06:54 +0800170_hwid_run_vpd_cmd_arg = CmdArg(
171 '--hwid-run-vpd', action='store_true',
172 help=('Specify the hwid utility to obtain the vpd data by running the '
173 '`vpd` commandline tool.'))
174
175_hwid_vpd_data_file_cmd_arg = CmdArg(
176 '--hwid-vpd-data-file', metavar='FILE.json', type=str, default=None,
177 help=('Specify the hwid utility to obtain the vpd data from the specified '
178 'file.'))
179
Bernie Thompson3c11c872013-07-22 18:22:45 -0700180_rma_mode_cmd_arg = CmdArg(
181 '--rma_mode', action='store_true',
182 help='Enable RMA mode, do not check for deprecated components.')
Tammo Spalink95c43732012-07-25 15:57:14 -0700183
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800184_cros_core_cmd_arg = CmdArg(
185 '--cros_core', action='store_true',
186 help='Finalize for ChromeOS Core devices (may add or remove few test '
Hung-Te Lin53c49402017-07-26 13:10:58 +0800187 'items. For example, registration codes or firmware bitmap '
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800188 'locale settings).')
189
Pin-Yen Lin215b7542020-05-05 09:45:37 +0800190_has_ec_pubkey_cmd_arg = CmdArg(
191 '--has_ec_pubkey', action='store_true', default=None,
192 help='The device has EC public key for EFS and need to run VerifyECKey.')
Yilun Lin599833f2017-12-22 14:07:46 +0800193
bowgotsai13820f42015-09-10 23:18:04 +0800194_enforced_release_channels_cmd_arg = CmdArg(
195 '--enforced_release_channels', nargs='*', default=None,
196 help='Enforced release image channels.')
197
Yilun Lin34f54802017-11-16 11:58:25 +0800198_ec_pubkey_path_cmd_arg = CmdArg(
199 '--ec_pubkey_path',
200 default=None,
201 help='Path to public key in vb2 format. Verify EC key with pubkey file.')
202
203_ec_pubkey_hash_cmd_arg = CmdArg(
204 '--ec_pubkey_hash',
205 default=None,
206 help='A string for public key hash. Verify EC key with the given hash.')
207
Hung-Te Lincdb96522016-04-15 16:51:10 +0800208_release_rootfs_cmd_arg = CmdArg(
209 '--release_rootfs', help='Location of release image rootfs partition.')
210
211_firmware_path_cmd_arg = CmdArg(
212 '--firmware_path', help='Location of firmware image partition.')
Ricky Liang43b879b2014-02-24 11:36:55 +0800213
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800214_shopfloor_url_args_cmd_arg = CmdArg(
215 '--shopfloor_url',
Earl Ou51182222016-09-09 12:16:48 +0800216 help='Shopfloor server url to be informed when wiping is done. '
217 'After wiping, a XML-RPC request will be sent to the '
218 'given url to indicate the completion of wiping.')
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800219
220_station_ip_cmd_arg = CmdArg(
221 '--station_ip',
222 help='IP of remote station')
223
224_station_port_cmd_arg = CmdArg(
225 '--station_port',
226 help='Port on remote station')
227
228_wipe_finish_token_cmd_arg = CmdArg(
229 '--wipe_finish_token',
230 help='Required token when notifying station after wipe finished')
231
Wei-Han Chenf3924112019-02-25 14:52:58 +0800232_keep_developer_mode_flag_after_clobber_state_cmd_arg = CmdArg(
233 # The argument name is super long because you should never use it by
234 # yourself when using command line tools.
235 '--keep_developer_mode_flag_after_clobber_state',
236 action='store_true', default=None,
237 help='After clobber-state, do not delete .developer_mode')
238
Ting Shen18a06382016-08-30 16:18:21 +0800239_waive_list_cmd_arg = CmdArg(
240 '--waive_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800241 help='A list of waived checks, separated by whitespace. '
242 'Each item should be a sub-command of gooftool. '
Ting Shen18a06382016-08-30 16:18:21 +0800243 'e.g. "gooftool verify --waive_list verify_tpm clear_gbb_flags".')
244
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800245_skip_list_cmd_arg = CmdArg(
246 '--skip_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800247 help='A list of skipped checks, separated by whitespace. '
248 'Each item should be a sub-command of gooftool. '
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800249 'e.g. "gooftool verify --skip_list verify_tpm clear_gbb_flags".')
250
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800251_test_umount_cmd_arg = CmdArg(
252 '--test_umount', action='store_true',
253 help='(For testing only) Only umount rootfs and stateful partition '
254 'instead of running full wiping and cutoff process.')
255
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800256_rlz_embargo_end_date_offset_cmd_arg = CmdArg(
Kevin Line4c64de2019-11-22 15:28:34 +0800257 '--embargo_offset', type=int, default=7, choices=list(range(7, 15)),
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800258 help='Change the offset of embargo end date, cannot less than 7 days or '
259 'more than 14 days.')
260
Marco Chena681b2e2018-08-31 11:41:41 +0800261_no_ectool_cmd_arg = CmdArg(
262 '--no_ectool', action='store_false', dest='has_ectool',
263 help='There is no ectool utility so tests rely on ectool should be '
264 'skipped.')
Tammo Spalink8fab5312012-05-28 18:33:30 +0800265
chuntsenaf1232f2019-03-20 15:45:54 +0800266_no_generate_mfg_date_cmd_arg = CmdArg(
267 '--no_generate_mfg_date', action='store_false', dest='generate_mfg_date',
268 help='Do not generate manufacturing date nor write mfg_date into VPD.')
269
270
Yilun Lin34f54802017-11-16 11:58:25 +0800271@Command(
272 'verify_ec_key',
273 _ec_pubkey_path_cmd_arg,
274 _ec_pubkey_hash_cmd_arg)
275def VerifyECKey(options):
276 """Verify EC key."""
277 return GetGooftool(options).VerifyECKey(
278 options.ec_pubkey_path, options.ec_pubkey_hash)
279
280
Hung-Te Line1d80f62016-03-31 14:58:13 +0800281@Command('verify_keys',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800282 _release_rootfs_cmd_arg,
283 _firmware_path_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800284def VerifyKeys(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800285 """Verify keys in firmware and SSD match."""
Hung-Te Line1d80f62016-03-31 14:58:13 +0800286 return GetGooftool(options).VerifyKeys(
Hung-Te Lincdb96522016-04-15 16:51:10 +0800287 options.release_rootfs, options.firmware_path)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800288
289
290@Command('set_fw_bitmap_locale')
Peter Shihfdf17682017-05-26 11:38:39 +0800291def SetFirmwareBitmapLocale(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800292 """Use VPD locale value to set firmware bitmap default language."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800293
Ricky Lianga70a1202013-03-15 15:03:17 +0800294 (index, locale) = GetGooftool(options).SetFirmwareBitmapLocale()
Andy Cheng2582d292012-12-04 17:38:28 +0800295 logging.info('Firmware bitmap initial locale set to %d (%s).',
296 index, locale)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800297
298
Hung-Te Line1d80f62016-03-31 14:58:13 +0800299@Command('verify_system_time',
Wei-Han Chen2790d2e2019-01-18 21:13:40 +0800300 _release_rootfs_cmd_arg,
301 _rma_mode_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800302def VerifySystemTime(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800303 """Verify system time is later than release filesystem creation time."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800304
Wei-Han Chen2790d2e2019-01-18 21:13:40 +0800305 return GetGooftool(options).VerifySystemTime(options.release_rootfs,
306 rma_mode=options.rma_mode)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800307
308
Hung-Te Line1d80f62016-03-31 14:58:13 +0800309@Command('verify_rootfs',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800310 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800311def VerifyRootFs(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800312 """Verify rootfs on SSD is valid by checking hash."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800313
Hung-Te Line1d80f62016-03-31 14:58:13 +0800314 return GetGooftool(options).VerifyRootFs(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800315
Hung-Te Lin56b18402015-01-16 14:52:30 +0800316
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800317@Command('verify_tpm')
Peter Shihfdf17682017-05-26 11:38:39 +0800318def VerifyTPM(options):
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800319 """Verify TPM is cleared."""
320
321 return GetGooftool(options).VerifyTPM()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800322
Hung-Te Lin56b18402015-01-16 14:52:30 +0800323
Hung-Te Lindd708d42014-07-11 17:05:01 +0800324@Command('verify_me_locked')
Peter Shihfdf17682017-05-26 11:38:39 +0800325def VerifyManagementEngineLocked(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800326 """Verify Management Engine is locked."""
Hung-Te Lindd708d42014-07-11 17:05:01 +0800327
328 return GetGooftool(options).VerifyManagementEngineLocked()
329
Hung-Te Lin56b18402015-01-16 14:52:30 +0800330
Marco Chena681b2e2018-08-31 11:41:41 +0800331@Command('verify_switch_wp',
332 _no_ectool_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800333def VerifyWPSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800334 """Verify hardware write protection switch is enabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800335
Marco Chena681b2e2018-08-31 11:41:41 +0800336 GetGooftool(options).VerifyWPSwitch(options.has_ectool)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800337
338
Hung-Te Lin53c49402017-07-26 13:10:58 +0800339@Command('verify_vpd')
340def VerifyVPD(options):
341 """Verify that VPD values are properly set.
Jon Salzadd90d32014-04-29 16:16:27 +0800342
Hung-Te Lin53c49402017-07-26 13:10:58 +0800343 Check if mandatory fields are set, and deprecated fields don't exist.
Jon Salzadd90d32014-04-29 16:16:27 +0800344 """
Hung-Te Lin53c49402017-07-26 13:10:58 +0800345 return GetGooftool(options).VerifyVPD()
Jon Salzadd90d32014-04-29 16:16:27 +0800346
347
bowgotsai13820f42015-09-10 23:18:04 +0800348@Command('verify_release_channel',
349 _enforced_release_channels_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800350def VerifyReleaseChannel(options):
bowgotsai529139c2015-05-30 01:39:49 +0800351 """Verify that release image channel is correct.
352
353 ChromeOS has four channels: canary, dev, beta and stable.
354 The last three channels support image auto-updates, checks
355 that release image channel is one of them.
356 """
bowgotsai13820f42015-09-10 23:18:04 +0800357 return GetGooftool(options).VerifyReleaseChannel(
358 options.enforced_release_channels)
bowgotsai529139c2015-05-30 01:39:49 +0800359
360
Wei-Han Chen0de7cfd2020-01-03 16:49:20 +0800361@Command('verify_cros_config')
362def VerifyCrosConfig(options):
363 """Verify entries in cros config make sense."""
364 return GetGooftool(options).VerifyCrosConfig()
365
366
Stimim Chen8aaa2952020-05-20 13:04:24 +0800367@Command('verify-sn-bits')
368def VerifySnBits(options):
369 GetGooftool(options).VerifySnBits()
370
371
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800372@Command('write_protect')
Peter Shihfdf17682017-05-26 11:38:39 +0800373def EnableFwWp(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800374 """Enable then verify firmware write protection."""
Peter Shihfdf17682017-05-26 11:38:39 +0800375 del options # Unused.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800376
Yong Hongdad230a2017-08-30 22:25:19 +0800377 def WriteProtect(fw):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800378 """Calculate protection size, then invoke flashrom.
379
Yong Hongdad230a2017-08-30 22:25:19 +0800380 The region (offset and size) to write protect may be different per chipset
381 and firmware layout, so we have to read the WP_RO section from FMAP to
382 decide that.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800383 """
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800384 wp_section = 'WP_RO'
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800385
Yong Hongdad230a2017-08-30 22:25:19 +0800386 fmap_image = fw.GetFirmwareImage(
387 sections=(['FMAP'] if fw.target == crosfw.TARGET_MAIN else None))
388 if not fmap_image.has_section(wp_section):
389 raise Error('Could not find %s firmware section: %s' %
390 (fw.target.upper(), wp_section))
391
392 section_data = fw.GetFirmwareImage(
393 sections=[wp_section]).get_section_area(wp_section)
Peter Shihe6afab32018-09-11 17:16:48 +0800394 ro_offset, ro_size = section_data[0:2]
Yong Hongdad230a2017-08-30 22:25:19 +0800395
396 logging.debug('write protecting %s [off=%x size=%x]', fw.target.upper(),
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800397 ro_offset, ro_size)
Yong Hongdad230a2017-08-30 22:25:19 +0800398 crosfw.Flashrom(fw.target).EnableWriteProtection(ro_offset, ro_size)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800399
Philip Chendbb06202019-11-05 17:24:26 -0800400 if HasFpmcu():
401 # TODO(b/143991572): Implement enable_fpmcu_write_protection in gooftool.
402 cmd = os.path.join(
403 paths.FACTORY_DIR, 'sh', 'enable_fpmcu_write_protection.sh')
404 cmd_result = Shell(cmd)
405 if not cmd_result.success:
406 raise Error(
407 'Failed to enable FPMCU write protection, stdout=%r, stderr=%r' %
408 (cmd_result.stdout, cmd_result.stderr))
409
Yong Hongdad230a2017-08-30 22:25:19 +0800410 WriteProtect(crosfw.LoadMainFirmware())
Andy Cheng0465d132013-03-20 12:12:06 +0800411 event_log.Log('wp', fw='main')
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800412
Fei Shao21be8242020-04-13 16:57:51 +0800413 # Some EC (mostly PD) does not support "RO_NOW". Instead they will only set
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800414 # "RO_AT_BOOT" when you request to enable RO (These platforms consider
415 # --wp-range with right range identical to --wp-enable), and requires a
416 # 'ectool reboot_ec RO at-shutdown; reboot' to let the RO take effect.
Hung-Te Lin0d10b562016-12-28 10:58:07 +0800417 # After reboot, "flashrom -p host --wp-status" will return protected range.
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800418 # If you don't reboot, returned range will be (0, 0), and running command
419 # "ectool flashprotect" will not have RO_NOW.
Fei Shao21be8242020-04-13 16:57:51 +0800420 # generic_common.test_list.json provides "EnableECWriteProtect" test group
421 # which can be run individually before finalization. Try that out if you're
422 # having trouble enabling RO_NOW flag.
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800423
Yong Hongdad230a2017-08-30 22:25:19 +0800424 for fw in [crosfw.LoadEcFirmware(), crosfw.LoadPDFirmware()]:
425 if fw.GetChipId() is None:
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800426 logging.warning('%s not write protected (seems there is no %s flash).',
Yong Hongdad230a2017-08-30 22:25:19 +0800427 fw.target.upper(), fw.target.upper())
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800428 continue
Yong Hongdad230a2017-08-30 22:25:19 +0800429 WriteProtect(fw)
430 event_log.Log('wp', fw=fw.target)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800431
432
433@Command('clear_gbb_flags')
Peter Shihfdf17682017-05-26 11:38:39 +0800434def ClearGBBFlags(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800435 """Zero out the GBB flags, in preparation for transition to release state.
436
437 No GBB flags are set in release/shipping state, but they are useful
Hung-Te Lin879cff42017-06-19 12:46:37 +0800438 for factory/development. See "futility gbb --flags" for details.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800439 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800440
Ricky Lianga70a1202013-03-15 15:03:17 +0800441 GetGooftool(options).ClearGBBFlags()
Andy Cheng0465d132013-03-20 12:12:06 +0800442 event_log.Log('clear_gbb_flags')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800443
444
Jon Salzaa3a30e2013-05-15 15:56:28 +0800445@Command('clear_factory_vpd_entries')
Peter Shihfdf17682017-05-26 11:38:39 +0800446def ClearFactoryVPDEntries(options):
Jon Salzaa3a30e2013-05-15 15:56:28 +0800447 """Clears factory.* items in the RW VPD."""
448 entries = GetGooftool(options).ClearFactoryVPDEntries()
449 event_log.Log('clear_factory_vpd_entries', entries=FilterDict(entries))
450
451
Mattias Nisslercca761b2015-04-15 21:53:04 +0200452@Command('generate_stable_device_secret')
Peter Shihfdf17682017-05-26 11:38:39 +0800453def GenerateStableDeviceSecret(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800454 """Generates a fresh stable device secret and stores it in the RO VPD."""
Mattias Nisslercca761b2015-04-15 21:53:04 +0200455 GetGooftool(options).GenerateStableDeviceSecret()
456 event_log.Log('generate_stable_device_secret')
457
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800458
Stimim Chenda9e62c2020-05-14 15:43:18 +0800459@Command('cr50_set_sn_bits_and_board_id',
460 _rma_mode_cmd_arg)
Yves Arrouyeb49b31e2019-03-06 21:51:52 -0800461def Cr50SetSnBitsAndBoardId(options):
Wei-Han Chen66357592020-01-14 15:15:37 +0800462 """Deprecated: use Cr50WriteFlashInfo instead."""
463 logging.warning('This function is renamed to Cr50WriteFlashInfo')
464 Cr50WriteFlashInfo(options)
465
466
Stimim Chen60f7bb22020-04-07 21:02:47 +0800467@Command('cr50_write_flash_info',
Stimim Chenda9e62c2020-05-14 15:43:18 +0800468 _rma_mode_cmd_arg,
Stimim Chen60f7bb22020-04-07 21:02:47 +0800469 CmdArg('--expect_zero_touch', action='store_true',
470 help='zero touch feature is expected, the command will fail '
471 'immediately if required dependencies are not found.'))
Wei-Han Chen66357592020-01-14 15:15:37 +0800472def Cr50WriteFlashInfo(options):
Yves Arrouyeb49b31e2019-03-06 21:51:52 -0800473 """Set the serial number bits, board id and flags on the Cr50 chip."""
Stimim Chen60f7bb22020-04-07 21:02:47 +0800474 # The '--expect_zero_touch' argument is for testing purpose, therefore, the
475 # argument can only be specified by directly using `cr50_write_flash_info`
476 # subcommand. And the `expect_zero_touch` attribute won't exist when this
477 # function is invoked by other subcommands, e.g. `finalize`.
478 expect_zero_touch = getattr(options, 'expect_zero_touch', False)
Stimim Chenda9e62c2020-05-14 15:43:18 +0800479 GetGooftool(options).Cr50WriteFlashInfo(expect_zero_touch, options.rma_mode)
Wei-Han Chen66357592020-01-14 15:15:37 +0800480 event_log.Log('cr50_write_flash_info')
481
482
483@Command('cr50_write_whitelabel_flags')
484def Cr50WriteWhitelabelFlags(options):
485 GetGooftool(options).Cr50WriteWhitelabelFlags()
486 event_log.Log('cr50_write_whitelabel_flags')
Shen-En Shihd078a7c2017-08-04 13:33:49 +0800487
488
Marco Chen20c885d2018-10-04 17:22:03 +0800489@Command('cr50_disable_factory_mode')
Marco Chen44a666d2018-07-13 21:01:50 +0800490def Cr50DisableFactoryMode(options):
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800491 """Reset Cr50 state back to default state after RMA."""
Marco Chen44a666d2018-07-13 21:01:50 +0800492 return GetGooftool(options).Cr50DisableFactoryMode()
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800493
494
Earl Ou564a7872016-10-05 10:22:00 +0800495@Command('enable_release_partition',
496 CmdArg('--release_rootfs',
497 help=('path to the release rootfs device. If not specified, '
498 'the default (5th) partition will be used.')))
499def EnableReleasePartition(options):
500 """Enables a release image partition on the disk."""
501 GetGooftool(options).EnableReleasePartition(options.release_rootfs)
502
503
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800504@Command('wipe_in_place',
505 CmdArg('--fast', action='store_true',
Shun-Hsing Ou8d3c40a2015-10-08 18:16:08 +0800506 help='use non-secure but faster wipe method.'),
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800507 _shopfloor_url_args_cmd_arg,
508 _station_ip_cmd_arg,
509 _station_port_cmd_arg,
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800510 _wipe_finish_token_cmd_arg,
511 _test_umount_cmd_arg)
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800512def WipeInPlace(options):
513 """Start factory wipe directly without reboot."""
514
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800515 GetGooftool(options).WipeInPlace(options.fast,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800516 options.shopfloor_url,
517 options.station_ip,
518 options.station_port,
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800519 options.wipe_finish_token,
520 options.test_umount)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200521
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800522@Command('wipe_init',
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800523 CmdArg('--wipe_args', help='arguments for clobber-state'),
524 CmdArg('--state_dev', help='path to stateful partition device'),
525 CmdArg('--root_disk', help='path to primary device'),
526 CmdArg('--old_root', help='path to old root'),
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800527 _shopfloor_url_args_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800528 _release_rootfs_cmd_arg,
529 _station_ip_cmd_arg,
530 _station_port_cmd_arg,
Wei-Han Chenf3924112019-02-25 14:52:58 +0800531 _wipe_finish_token_cmd_arg,
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800532 _keep_developer_mode_flag_after_clobber_state_cmd_arg,
533 _test_umount_cmd_arg)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800534def WipeInit(options):
Wei-Han Chenf3924112019-02-25 14:52:58 +0800535 GetGooftool(options).WipeInit(
536 options.wipe_args,
537 options.shopfloor_url,
538 options.state_dev,
539 options.release_rootfs,
540 options.root_disk,
541 options.old_root,
542 options.station_ip,
543 options.station_port,
544 options.wipe_finish_token,
Meng-Huan Yu7a4f0f52020-01-07 20:11:01 +0800545 options.keep_developer_mode_flag_after_clobber_state,
546 options.test_umount)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800547
Stimim Chen8aaa2952020-05-20 13:04:24 +0800548
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800549@Command('verify',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800550 CmdArg('--no_write_protect', action='store_true',
551 help='Do not check write protection switch state.'),
Tammo Spalink95c43732012-07-25 15:57:14 -0700552 _hwid_status_list_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800553 _hwdb_path_cmd_arg,
Yong Hong5408f652017-07-11 19:20:25 +0800554 _project_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800555 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800556 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800557 _hwid_run_vpd_cmd_arg,
558 _hwid_vpd_data_file_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800559 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800560 _cros_core_cmd_arg,
Pin-Yen Lin215b7542020-05-05 09:45:37 +0800561 _has_ec_pubkey_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800562 _ec_pubkey_path_cmd_arg,
563 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800564 _release_rootfs_cmd_arg,
565 _firmware_path_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800566 _enforced_release_channels_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800567 _waive_list_cmd_arg,
Marco Chena681b2e2018-08-31 11:41:41 +0800568 _skip_list_cmd_arg,
569 _no_ectool_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800570def Verify(options):
571 """Verifies if whole factory process is ready for finalization.
572
573 This routine performs all the necessary checks to make sure the
574 device is ready to be finalized, but does not modify state. These
575 checks include dev switch, firmware write protection switch, hwid,
576 system time, keys, and root file system.
577 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800578
Hung-Te Lin6d827542012-07-19 11:50:41 +0800579 if not options.no_write_protect:
Ricky Lianga70a1202013-03-15 15:03:17 +0800580 VerifyWPSwitch(options)
Hung-Te Lindd708d42014-07-11 17:05:01 +0800581 VerifyManagementEngineLocked(options)
Ting Shen129fa6f2016-09-02 12:22:24 +0800582 VerifyHWID(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800583 VerifySystemTime(options)
Pin-Yen Lin215b7542020-05-05 09:45:37 +0800584 if options.has_ec_pubkey:
Yilun Lin599833f2017-12-22 14:07:46 +0800585 VerifyECKey(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800586 VerifyKeys(options)
587 VerifyRootFs(options)
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800588 VerifyTPM(options)
Hung-Te Lin53c49402017-07-26 13:10:58 +0800589 VerifyVPD(options)
bowgotsai529139c2015-05-30 01:39:49 +0800590 VerifyReleaseChannel(options)
Wei-Han Chen0de7cfd2020-01-03 16:49:20 +0800591 VerifyCrosConfig(options)
Stimim Chen8aaa2952020-05-20 13:04:24 +0800592 VerifySnBits(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800593
Hung-Te Lin56b18402015-01-16 14:52:30 +0800594
Jon Salzfe9036f2014-01-16 14:11:23 +0800595@Command('untar_stateful_files')
Hung-Te Lin388bce22014-06-03 19:56:40 +0800596def UntarStatefulFiles(unused_options):
Jon Salzfe9036f2014-01-16 14:11:23 +0800597 """Untars stateful files from stateful_files.tar.xz on stateful partition.
598
599 If that file does not exist (which should only be R30 and earlier),
600 this is a no-op.
601 """
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800602 # Path to stateful partition on device.
603 device_stateful_path = '/mnt/stateful_partition'
604 tar_file = os.path.join(device_stateful_path, 'stateful_files.tar.xz')
Jon Salzfe9036f2014-01-16 14:11:23 +0800605 if os.path.exists(tar_file):
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800606 Spawn(['tar', 'xf', tar_file], cwd=device_stateful_path,
Jon Salzfe9036f2014-01-16 14:11:23 +0800607 log=True, check_call=True)
608 else:
609 logging.warning('No stateful files at %s', tar_file)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800610
Jon Salz40b9f822014-07-25 16:39:55 +0800611
612@Command('log_source_hashes')
Peter Shihfdf17682017-05-26 11:38:39 +0800613def LogSourceHashes(options):
Jon Salz40b9f822014-07-25 16:39:55 +0800614 """Logs hashes of source files in the factory toolkit."""
Peter Shihfdf17682017-05-26 11:38:39 +0800615 del options # Unused.
Jon Salze60307f2014-08-05 16:20:00 +0800616 # WARNING: The following line is necessary to validate the integrity
617 # of the factory software. Do not remove or modify it.
618 #
619 # 警告:此行会验证工厂软件的完整性,禁止删除或修改。
Wei-Han Chena5c01a02016-04-23 19:27:19 +0800620 factory_par = sys_utils.GetRunningFactoryPythonArchivePath()
621 if factory_par:
622 event_log.Log(
623 'source_hashes',
624 **file_utils.HashPythonArchive(factory_par))
625 else:
626 event_log.Log(
627 'source_hashes',
Peter Shihad166772017-05-31 11:36:17 +0800628 **file_utils.HashSourceTree(os.path.join(paths.FACTORY_DIR, 'py')))
Jon Salz40b9f822014-07-25 16:39:55 +0800629
630
Tammo Spalink86a61c62012-05-25 15:10:35 +0800631@Command('log_system_details')
Peter Shihfdf17682017-05-26 11:38:39 +0800632def LogSystemDetails(options):
Tammo Spalink86a61c62012-05-25 15:10:35 +0800633 """Write miscellaneous system details to the event log."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800634
Ricky Liang43b879b2014-02-24 11:36:55 +0800635 event_log.Log('system_details', **GetGooftool(options).GetSystemDetails())
Tammo Spalink86a61c62012-05-25 15:10:35 +0800636
637
Jon Salza88b83b2013-05-27 20:00:35 +0800638def CreateReportArchiveBlob(*args, **kwargs):
639 """Creates a report archive and returns it as a blob.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800640
Jon Salza88b83b2013-05-27 20:00:35 +0800641 Args:
642 See CreateReportArchive.
Andy Cheng7a76cb82012-11-19 18:08:19 +0800643
Jon Salza88b83b2013-05-27 20:00:35 +0800644 Returns:
Yilin Yange02d5722019-10-23 11:07:36 +0800645 An xmlrpc.client.Binary object containing a .tar.xz file.
Jon Salza88b83b2013-05-27 20:00:35 +0800646 """
Wei-Han Chen47416612016-09-14 17:41:52 +0800647 report_archive = CreateReportArchive(*args, **kwargs)
648 try:
Yilin Yangf6994c22019-12-09 16:17:21 +0800649 return xmlrpc.client.Binary(
650 file_utils.ReadFile(report_archive, encoding=None))
Wei-Han Chen47416612016-09-14 17:41:52 +0800651 finally:
652 os.unlink(report_archive)
Jon Salza88b83b2013-05-27 20:00:35 +0800653
654
655def CreateReportArchive(device_sn=None, add_file=None):
656 """Creates a report archive in a temporary directory.
657
658 Args:
659 device_sn: The device serial number (optional).
660 add_file: A list of files to add (optional).
661
662 Returns:
663 Path to the archive.
664 """
Philip Chen6ada02c2019-11-04 19:41:54 +0000665 # Flush Testlog data to DATA_TESTLOG_DIR before creating a report archive.
666 result, reason = state.GetInstance().FlushTestlog(
667 uplink=False, local=True, timeout=10)
668 if not result:
669 logging.warning('Failed to flush testlog data: %s', reason)
670
Hung-Te Lin6bd16472012-06-20 16:26:47 +0800671 def NormalizeAsFileName(token):
672 return re.sub(r'\W+', '', token).strip()
Jon Salza88b83b2013-05-27 20:00:35 +0800673
674 target_name = '%s%s.tar.xz' % (
675 time.strftime('%Y%m%dT%H%M%SZ',
676 time.gmtime()),
Hung-Te Lin56b18402015-01-16 14:52:30 +0800677 ('' if device_sn is None else
678 '_' + NormalizeAsFileName(device_sn)))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800679 target_path = os.path.join(gettempdir(), target_name)
Jon Salza88b83b2013-05-27 20:00:35 +0800680
Tammo Spalink86a61c62012-05-25 15:10:35 +0800681 # Intentionally ignoring dotfiles in EVENT_LOG_DIR.
Pi-Hsun Shih1f569a72019-12-26 11:23:56 +0800682 tar_cmd = 'cd %s ; tar cJf %s * -C /' % (event_log.EVENT_LOG_DIR, target_path)
Jongpil Jung23355a92019-12-31 14:38:29 +0900683 tar_files = [paths.FACTORY_LOG_PATH, paths.DATA_TESTLOG_DIR]
684 if add_file:
685 tar_files = tar_files + add_file
Pi-Hsun Shih1f569a72019-12-26 11:23:56 +0800686 for f in tar_files:
687 # Require absolute paths since we use -C / to change current directory to
688 # root.
689 if not f.startswith('/'):
690 raise Error('Not an absolute path: %s' % f)
691 if not os.path.exists(f):
692 raise Error('File does not exist: %s' % f)
693 tar_cmd += ' %s' % pipes.quote(f[1:])
Tammo Spalink86a61c62012-05-25 15:10:35 +0800694 cmd_result = Shell(tar_cmd)
Jon Salzff88c022012-11-03 12:19:58 +0800695
Hung-Te Lin3756c432020-01-16 11:30:46 +0800696 if cmd_result.status == 1:
697 # tar returns 1 when some files were changed during archiving,
698 # but that is expected for log files so should ignore such failure
699 # if the archive looks good.
Pi-Hsun Shih1f569a72019-12-26 11:23:56 +0800700 Spawn(['tar', 'tJf', target_path], check_call=True, log=True,
Jon Salzff88c022012-11-03 12:19:58 +0800701 ignore_stdout=True)
702 elif not cmd_result.success:
Tammo Spalink86a61c62012-05-25 15:10:35 +0800703 raise Error('unable to tar event logs, cmd %r failed, stderr: %r' %
704 (tar_cmd, cmd_result.stderr))
Jon Salzff88c022012-11-03 12:19:58 +0800705
Jon Salza88b83b2013-05-27 20:00:35 +0800706 return target_path
707
708_upload_method_cmd_arg = CmdArg(
709 '--upload_method', metavar='METHOD:PARAM',
710 help=('How to perform the upload. METHOD should be one of '
Kevin Line4c64de2019-11-22 15:28:34 +0800711 '{ftp, shopfloor, ftps, cpfe, smb}.'))
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800712_upload_max_retry_times_arg = CmdArg(
713 '--upload_max_retry_times', type=int, default=0,
714 help='Number of tries to upload. 0 to retry infinitely.')
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800715_upload_retry_interval_arg = CmdArg(
716 '--upload_retry_interval', type=int, default=None,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800717 help='Retry interval in seconds.')
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800718_upload_allow_fail_arg = CmdArg(
719 '--upload_allow_fail', action='store_true',
720 help='Continue finalize if report upload fails.')
Jon Salza88b83b2013-05-27 20:00:35 +0800721_add_file_cmd_arg = CmdArg(
722 '--add_file', metavar='FILE', action='append',
723 help='Extra file to include in report (must be an absolute path)')
724
Hung-Te Lin56b18402015-01-16 14:52:30 +0800725
Jon Salza88b83b2013-05-27 20:00:35 +0800726@Command('upload_report',
727 _upload_method_cmd_arg,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800728 _upload_max_retry_times_arg,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800729 _upload_retry_interval_arg,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800730 _upload_allow_fail_arg,
Jon Salza88b83b2013-05-27 20:00:35 +0800731 _add_file_cmd_arg)
732def UploadReport(options):
733 """Create a report containing key device details."""
Yong Hong65bda312018-12-13 20:05:58 +0800734 ro_vpd = vpd.VPDTool().GetAllData(partition=vpd.VPD_READONLY_PARTITION_NAME)
Jon Salza88b83b2013-05-27 20:00:35 +0800735 device_sn = ro_vpd.get('serial_number', None)
736 if device_sn is None:
737 logging.warning('RO_VPD missing device serial number')
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +0800738 device_sn = 'MISSING_SN_' + time_utils.TimedUUID()
chuntsena6da2be2019-08-14 17:11:55 +0800739 target_path = CreateReportArchive(device_sn, options.add_file)
Jon Salza88b83b2013-05-27 20:00:35 +0800740
Tammo Spalink86a61c62012-05-25 15:10:35 +0800741 if options.upload_method is None or options.upload_method == 'none':
742 logging.warning('REPORT UPLOAD SKIPPED (report left at %s)', target_path)
743 return
744 method, param = options.upload_method.split(':', 1)
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800745
746 if options.upload_retry_interval is not None:
747 retry_interval = options.upload_retry_interval
748 else:
749 retry_interval = report_upload.DEFAULT_RETRY_INTERVAL
750
Tammo Spalink86a61c62012-05-25 15:10:35 +0800751 if method == 'shopfloor':
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800752 report_upload.ShopFloorUpload(
753 target_path, param,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800754 'GRT' if options.command_name == 'finalize' else None,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800755 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800756 retry_interval=retry_interval,
757 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800758 elif method == 'ftp':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800759 report_upload.FtpUpload(target_path, 'ftp:' + param,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800760 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800761 retry_interval=retry_interval,
762 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800763 elif method == 'ftps':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800764 report_upload.CurlUrlUpload(target_path, '--ftp-ssl-reqd ftp:%s' % param,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800765 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800766 retry_interval=retry_interval,
767 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800768 elif method == 'cpfe':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800769 report_upload.CpfeUpload(target_path, pipes.quote(param),
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800770 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800771 retry_interval=retry_interval,
772 allow_fail=options.upload_allow_fail)
Kevin Line4c64de2019-11-22 15:28:34 +0800773 elif method == 'smb':
774 # param should be in form: <dest_path>.
775 report_upload.SmbUpload(target_path, 'smb:' + param,
776 max_retry_times=options.upload_max_retry_times,
777 retry_interval=retry_interval,
778 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800779 else:
Peter Shihbf6f22b2018-02-26 14:05:28 +0800780 raise Error('unknown report upload method %r' % method)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800781
782
783@Command('finalize',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800784 CmdArg('--no_write_protect', action='store_true',
785 help='Do not enable firmware write protection.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800786 CmdArg('--fast', action='store_true',
787 help='use non-secure but faster wipe method.'),
Yong Hongb2926bd2018-10-12 14:11:14 +0800788 _no_ectool_cmd_arg,
Shun-Hsing Oudb407d62015-11-11 11:03:59 +0800789 _shopfloor_url_args_cmd_arg,
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800790 _hwdb_path_cmd_arg,
Tammo Spalink95c43732012-07-25 15:57:14 -0700791 _hwid_status_list_cmd_arg,
Jon Salz65266432012-07-30 19:02:49 +0800792 _upload_method_cmd_arg,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800793 _upload_max_retry_times_arg,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800794 _upload_retry_interval_arg,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800795 _upload_allow_fail_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800796 _add_file_cmd_arg,
797 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800798 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800799 _hwid_run_vpd_cmd_arg,
800 _hwid_vpd_data_file_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800801 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800802 _cros_core_cmd_arg,
Pin-Yen Lin215b7542020-05-05 09:45:37 +0800803 _has_ec_pubkey_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800804 _ec_pubkey_path_cmd_arg,
805 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800806 _release_rootfs_cmd_arg,
807 _firmware_path_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800808 _enforced_release_channels_cmd_arg,
809 _station_ip_cmd_arg,
810 _station_port_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800811 _wipe_finish_token_cmd_arg,
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800812 _rlz_embargo_end_date_offset_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800813 _waive_list_cmd_arg,
chuntsenaf1232f2019-03-20 15:45:54 +0800814 _skip_list_cmd_arg,
Philip Chen04fb90b2019-11-06 12:10:33 -0800815 _no_generate_mfg_date_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800816def Finalize(options):
817 """Verify system readiness and trigger transition into release state.
818
Jon Salzaa3a30e2013-05-15 15:56:28 +0800819 This routine does the following:
820 - Verifies system state (see verify command)
Jon Salzfe9036f2014-01-16 14:11:23 +0800821 - Untars stateful_files.tar.xz, if it exists, in the stateful partition, to
822 initialize files such as the CRX cache
Jon Salzaa3a30e2013-05-15 15:56:28 +0800823 - Modifies firmware bitmaps to match locale
824 - Clears all factory-friendly flags from the GBB
825 - Removes factory-specific entries from RW_VPD (factory.*)
826 - Enables firmware write protection (cannot rollback after this)
Marco Chenecee04f2019-02-15 22:24:24 +0800827 - Initialize Fpmcu entropy
Jon Salzaa3a30e2013-05-15 15:56:28 +0800828 - Uploads system logs & reports
Earl Ou51182222016-09-09 12:16:48 +0800829 - Wipes the testing kernel, rootfs, and stateful partition
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800830 """
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800831 if not options.rma_mode:
832 # Write VPD values related to RLZ ping into VPD.
833 GetGooftool(options).WriteVPDForRLZPing(options.embargo_offset)
chuntsenaf1232f2019-03-20 15:45:54 +0800834 if options.generate_mfg_date:
835 GetGooftool(options).WriteVPDForMFGDate()
Wei-Han Chen66357592020-01-14 15:15:37 +0800836 Cr50WriteFlashInfo(options)
Marco Chen44a666d2018-07-13 21:01:50 +0800837 Cr50DisableFactoryMode(options)
Marco Chen9d0631c2018-08-31 10:52:44 +0800838 Verify(options)
Jon Salz40b9f822014-07-25 16:39:55 +0800839 LogSourceHashes(options)
Jon Salzfe9036f2014-01-16 14:11:23 +0800840 UntarStatefulFiles(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800841 if options.cros_core:
842 logging.info('SetFirmwareBitmapLocale is skipped for ChromeOS Core device.')
843 else:
844 SetFirmwareBitmapLocale(options)
Jon Salzaa3a30e2013-05-15 15:56:28 +0800845 ClearFactoryVPDEntries(options)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200846 GenerateStableDeviceSecret(options)
Shen-En Shih3e079b22017-09-11 05:43:09 -0700847 ClearGBBFlags(options)
Hung-Te Lin6d827542012-07-19 11:50:41 +0800848 if options.no_write_protect:
Pi-Hsun Shih1f569a72019-12-26 11:23:56 +0800849 logging.warning('WARNING: Firmware Write Protection is SKIPPED.')
Andy Cheng0465d132013-03-20 12:12:06 +0800850 event_log.Log('wp', fw='both', status='skipped')
Hung-Te Lin6d827542012-07-19 11:50:41 +0800851 else:
Wei-Han Chenba21f512016-10-14 18:52:33 +0800852 EnableFwWp(options)
Marco Chenecee04f2019-02-15 22:24:24 +0800853 FpmcuInitializeEntropy(options)
Jon Salza0f58e02012-05-29 19:33:39 +0800854 LogSystemDetails(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800855 UploadReport(options)
Earl Ou51182222016-09-09 12:16:48 +0800856
857 event_log.Log('wipe_in_place')
858 wipe_args = []
Earl Ou51182222016-09-09 12:16:48 +0800859 if options.shopfloor_url:
860 wipe_args += ['--shopfloor_url', options.shopfloor_url]
861 if options.fast:
862 wipe_args += ['--fast']
863 if options.station_ip:
864 wipe_args += ['--station_ip', options.station_ip]
865 if options.station_port:
866 wipe_args += ['--station_port', options.station_port]
867 if options.wipe_finish_token:
868 wipe_args += ['--wipe_finish_token', options.wipe_finish_token]
869 ExecFactoryPar('gooftool', 'wipe_in_place', *wipe_args)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800870
871
Ting Shen129fa6f2016-09-02 12:22:24 +0800872@Command('verify_hwid',
873 _probe_results_cmd_arg,
874 _hwdb_path_cmd_arg,
875 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800876 _hwid_run_vpd_cmd_arg,
877 _hwid_vpd_data_file_cmd_arg,
Ting Shen129fa6f2016-09-02 12:22:24 +0800878 _rma_mode_cmd_arg)
879def VerifyHWID(options):
Ricky Liangc662be32013-12-24 11:50:23 +0800880 """A simple wrapper that calls out to HWID utils to verify version 3 HWID.
Ricky Liang53390232013-03-08 15:37:57 +0800881
Ricky Liangc662be32013-12-24 11:50:23 +0800882 This is mainly for Gooftool to verify v3 HWID during finalize. For testing
883 and development purposes, please use `hwid` command.
Ricky Liang53390232013-03-08 15:37:57 +0800884 """
Yong Hongada8e0e2018-01-04 16:36:21 +0800885 database = GetGooftool(options).db
Yong Hong68a0e0d2017-12-20 19:06:54 +0800886
Yong Hongada8e0e2018-01-04 16:36:21 +0800887 encoded_string = options.hwid or GetGooftool(options).ReadHWID()
888
889 probed_results = hwid_utils.GetProbedResults(infile=options.probe_results)
Yong Hong2c39bf22018-01-24 22:24:11 +0800890 device_info = hwid_utils.GetDeviceInfo()
Yong Hong65bda312018-12-13 20:05:58 +0800891 vpd_data = hwid_utils.GetVPDData(run_vpd=options.hwid_run_vpd,
892 infile=options.hwid_vpd_data_file)
Ricky Liang53390232013-03-08 15:37:57 +0800893
Hung-Te Lin11052952015-03-18 13:48:59 +0800894 event_log.Log('probed_results', probed_results=FilterDict(probed_results))
Yong Hong65bda312018-12-13 20:05:58 +0800895 event_log.Log('vpd', vpd=FilterDict(vpd_data))
Ricky Liang53390232013-03-08 15:37:57 +0800896
Yong Hong2c39bf22018-01-24 22:24:11 +0800897 hwid_utils.VerifyHWID(database, encoded_string, probed_results,
Yong Hong65bda312018-12-13 20:05:58 +0800898 device_info, vpd_data, options.rma_mode)
Ricky Liang53390232013-03-08 15:37:57 +0800899
Ricky Liangc662be32013-12-24 11:50:23 +0800900 event_log.Log('verified_hwid', hwid=encoded_string)
Ricky Liang53390232013-03-08 15:37:57 +0800901
902
henryhsu44d793a2013-07-20 00:07:38 +0800903@Command('get_firmware_hash',
Marco Chence70b132018-05-03 23:43:39 +0800904 CmdArg('--file', required=True, metavar='FILE', help='Firmware File.'))
henryhsu44d793a2013-07-20 00:07:38 +0800905def GetFirmwareHash(options):
henryhsuf6f835c2013-07-20 20:49:25 +0800906 """Get firmware hash from a file"""
henryhsu44d793a2013-07-20 00:07:38 +0800907 if os.path.exists(options.file):
Cheng-Han Yang2c668ae2018-04-18 22:31:07 +0800908 value_dict = chromeos_firmware.CalculateFirmwareHashes(options.file)
Yilin Yang879fbda2020-05-14 13:52:30 +0800909 for key, value in value_dict.items():
Yilin Yang71e39412019-09-24 09:26:46 +0800910 print(' %s: %s' % (key, value))
henryhsu44d793a2013-07-20 00:07:38 +0800911 else:
912 raise Error('File does not exist: %s' % options.file)
913
henryhsuf6f835c2013-07-20 20:49:25 +0800914
Philip Chen04fb90b2019-11-06 12:10:33 -0800915@Command('fpmcu_initialize_entropy')
Marco Chenecee04f2019-02-15 22:24:24 +0800916def FpmcuInitializeEntropy(options):
917 """Initialze entropy of FPMCU."""
Philip Chen04fb90b2019-11-06 12:10:33 -0800918
919 if HasFpmcu():
Marco Chenecee04f2019-02-15 22:24:24 +0800920 GetGooftool(options).FpmcuInitializeEntropy()
Philip Chen04fb90b2019-11-06 12:10:33 -0800921 else:
922 logging.info('No FPS on this board.')
Marco Chenecee04f2019-02-15 22:24:24 +0800923
924
Peter Shihfdf17682017-05-26 11:38:39 +0800925def main():
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800926 """Run sub-command specified by the command line args."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800927
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800928 options = ParseCmdline(
Ting Shen129fa6f2016-09-02 12:22:24 +0800929 'Perform Google required factory tests.',
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800930 CmdArg('-l', '--log', metavar='PATH',
931 help='Write logs to this file.'),
Jon Salza4bea382012-10-29 13:00:34 +0800932 CmdArg('--suppress-event-logs', action='store_true',
933 help='Suppress event logging.'),
Wei-Han Chenaff56232016-04-16 09:17:59 +0800934 CmdArg('--phase', default=None,
935 help=('override phase for phase checking (defaults to the current '
936 'as returned by the "factory phase" command)')),
Wei-Han Chenb34bdff2019-09-26 13:07:50 +0800937 VERBOSITY_CMD_ARG)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800938 SetupLogging(options.verbosity, options.log)
Andy Cheng0465d132013-03-20 12:12:06 +0800939 event_log.SetGlobalLoggerDefaultPrefix('gooftool')
940 event_log.GetGlobalLogger().suppress = options.suppress_event_logs
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800941 logging.debug('gooftool options: %s', repr(options))
Wei-Han Chenaff56232016-04-16 09:17:59 +0800942
943 phase.OverridePhase(options.phase)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800944 try:
945 logging.debug('GOOFTOOL command %r', options.command_name)
946 options.command(options)
947 logging.info('GOOFTOOL command %r SUCCESS', options.command_name)
Peter Shih6674ecf2018-03-29 14:04:57 +0800948 except Error as e:
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800949 logging.exception(e)
950 sys.exit('GOOFTOOL command %r ERROR: %s' % (options.command_name, e))
Peter Shih6674ecf2018-03-29 14:04:57 +0800951 except Exception as e:
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800952 logging.exception(e)
953 sys.exit('UNCAUGHT RUNTIME EXCEPTION %s' % e)
954
955
956if __name__ == '__main__':
Peter Shihfdf17682017-05-26 11:38:39 +0800957 main()