blob: 171757174211e4b48251c1c6d9269694bf129e1d [file] [log] [blame]
You-Cheng Syuf0f4be12017-12-05 16:33:53 +08001#!/usr/bin/env python
Jon Salze60307f2014-08-05 16:20:00 +08002# -*- coding: utf-8 -*-
3# Copyright 2014 The Chromium OS Authors. All rights reserved.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08004# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
Jon Salze60307f2014-08-05 16:20:00 +08007
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08008"""Google Factory Tool.
9
You-Cheng Syu461ec032017-03-06 15:56:58 +080010This tool is intended to be used on factory assembly lines. It
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080011provides all of the Google required test functionality and must be run
12on each device as part of the assembly process.
13"""
14
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080015import logging
16import os
Jon Salz65266432012-07-30 19:02:49 +080017import pipes
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080018import re
19import sys
Peter Shihfdf17682017-05-26 11:38:39 +080020from tempfile import gettempdir
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080021import threading
Hung-Te Lin6bd16472012-06-20 16:26:47 +080022import time
Jon Salza88b83b2013-05-27 20:00:35 +080023import xmlrpclib
Peter Shihfdf17682017-05-26 11:38:39 +080024
Peter Shihfdf17682017-05-26 11:38:39 +080025import factory_common # pylint: disable=unused-import
Wei-Han Chen0a3320e2016-04-23 01:32:07 +080026from cros.factory.gooftool.common import ExecFactoryPar
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080027from cros.factory.gooftool.common import Shell
Peter Shihfdf17682017-05-26 11:38:39 +080028from cros.factory.gooftool.core import Gooftool
29from cros.factory.gooftool import crosfw
Peter Shihfdf17682017-05-26 11:38:39 +080030from cros.factory.gooftool import report_upload
Yong Hong65bda312018-12-13 20:05:58 +080031from cros.factory.gooftool import vpd
Hung-Te Lin604e0c22015-11-24 15:17:07 +080032from cros.factory.hwid.v3 import hwid_utils
Yong Hong863d3262017-10-30 16:23:34 +080033from cros.factory.probe.functions import chromeos_firmware
Wei-Han Chen2ebb92d2016-01-12 14:51:41 +080034from cros.factory.test.env import paths
Peter Shihfdf17682017-05-26 11:38:39 +080035from cros.factory.test import event_log
Wei-Han Chenaff56232016-04-16 09:17:59 +080036from cros.factory.test.rules import phase
Hung-Te Lin3f096842016-01-13 17:37:06 +080037from cros.factory.test.rules.privacy import FilterDict
Peter Shihfdf17682017-05-26 11:38:39 +080038from cros.factory.utils import argparse_utils
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080039from cros.factory.utils.argparse_utils import CmdArg
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080040from cros.factory.utils.argparse_utils import ParseCmdline
41from cros.factory.utils.argparse_utils import verbosity_cmd_arg
Peter Shihfdf17682017-05-26 11:38:39 +080042from cros.factory.utils.debug_utils import SetupLogging
Jon Salz40b9f822014-07-25 16:39:55 +080043from cros.factory.utils import file_utils
Peter Shih67c7c0f2018-02-26 11:23:59 +080044from cros.factory.utils.process_utils import Spawn
Wei-Han Chena5c01a02016-04-23 19:27:19 +080045from cros.factory.utils import sys_utils
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +080046from cros.factory.utils import time_utils
Joel Kitchingd3bc2662014-12-16 16:03:32 -080047from cros.factory.utils.type_utils import Error
Tammo Spalink86a61c62012-05-25 15:10:35 +080048
Tammo Spalink5c699832012-07-03 17:50:39 +080049
Tammo Spalink5c699832012-07-03 17:50:39 +080050# TODO(tammo): Replace calls to sys.exit with raise Exit, and maybe
51# treat that specially (as a smoot exit, as opposed to the more
52# verbose output for generic Error).
53
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080054_global_gooftool = None
55_gooftool_lock = threading.Lock()
Tammo Spalink5c699832012-07-03 17:50:39 +080056
Hung-Te Lin56b18402015-01-16 14:52:30 +080057
Ricky Lianga70a1202013-03-15 15:03:17 +080058def GetGooftool(options):
Peter Shihfdf17682017-05-26 11:38:39 +080059 global _global_gooftool # pylint: disable=global-statement
Ricky Lianga70a1202013-03-15 15:03:17 +080060
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080061 if _global_gooftool is None:
62 with _gooftool_lock:
Shen-En Shihc5d15d62017-08-04 13:02:59 +080063 if _global_gooftool is None:
64 project = getattr(options, 'project', None)
65 hwdb_path = getattr(options, 'hwdb_path', None)
66 _global_gooftool = Gooftool(hwid_version=3, project=project,
67 hwdb_path=hwdb_path)
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080068
69 return _global_gooftool
Ricky Lianga70a1202013-03-15 15:03:17 +080070
Hung-Te Lin56b18402015-01-16 14:52:30 +080071
Ting Shen18a06382016-08-30 16:18:21 +080072def Command(cmd_name, *args, **kwargs):
You-Cheng Syu8fc2a602017-12-22 17:05:05 +080073 """Decorator for commands in gooftool.
Ting Shen18a06382016-08-30 16:18:21 +080074
75 This is similar to argparse_utils.Command, but all gooftool commands
76 can be waived during `gooftool finalize` or `gooftool verify` using
Wei-Han Chen60c5d332017-01-05 17:15:10 +080077 --waive_list or --skip_list option.
Ting Shen18a06382016-08-30 16:18:21 +080078 """
79 def Decorate(fun):
Wei-Han Chen60c5d332017-01-05 17:15:10 +080080 def CommandWithWaiveSkipCheck(options):
Ting Shen18a06382016-08-30 16:18:21 +080081 waive_list = vars(options).get('waive_list', [])
Wei-Han Chen60c5d332017-01-05 17:15:10 +080082 skip_list = vars(options).get('skip_list', [])
83 if phase.GetPhase() >= phase.PVT_DOGFOOD and (
84 waive_list != [] or skip_list != []):
Ting Shen18a06382016-08-30 16:18:21 +080085 raise Error(
Wei-Han Chen60c5d332017-01-05 17:15:10 +080086 'waive_list and skip_list should be empty for phase %s' %
87 phase.GetPhase())
Ting Shen18a06382016-08-30 16:18:21 +080088
Wei-Han Chen60c5d332017-01-05 17:15:10 +080089 if cmd_name not in skip_list:
90 try:
91 fun(options)
92 except Exception as e:
93 if cmd_name in waive_list:
94 logging.exception(e)
95 else:
96 raise
Ting Shen18a06382016-08-30 16:18:21 +080097
98 return argparse_utils.Command(cmd_name, *args, **kwargs)(
Wei-Han Chen60c5d332017-01-05 17:15:10 +080099 CommandWithWaiveSkipCheck)
Ting Shen18a06382016-08-30 16:18:21 +0800100 return Decorate
101
102
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800103@Command('write_hwid',
104 CmdArg('hwid', metavar='HWID', help='HWID string'))
Andy Chengc92e6f92012-11-20 16:55:53 +0800105def WriteHWID(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800106 """Write specified HWID value into the system BB."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800107
Tammo Spalink95c43732012-07-25 15:57:14 -0700108 logging.info('writing hwid string %r', options.hwid)
Ricky Lianga70a1202013-03-15 15:03:17 +0800109 GetGooftool(options).WriteHWID(options.hwid)
Andy Cheng0465d132013-03-20 12:12:06 +0800110 event_log.Log('write_hwid', hwid=options.hwid)
Tammo Spalink95c43732012-07-25 15:57:14 -0700111 print 'Wrote HWID: %r' % options.hwid
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800112
113
Yong Hongc3765412017-12-26 23:12:15 +0800114@Command('read_hwid')
115def ReadHWID(options):
116 """Read the HWID string from GBB."""
117
118 logging.info('reading the hwid string')
119 print GetGooftool(options).ReadHWID()
120
121
Yong Hong5408f652017-07-11 19:20:25 +0800122_project_cmd_arg = CmdArg(
123 '--project', metavar='PROJECT',
124 default=None, help='Project name to test.')
Ricky Liang53390232013-03-08 15:37:57 +0800125
Tammo Spalink8fab5312012-05-28 18:33:30 +0800126_hwdb_path_cmd_arg = CmdArg(
127 '--hwdb_path', metavar='PATH',
Yong Hong5c6dcd52017-12-27 11:05:01 +0800128 default=hwid_utils.GetDefaultDataPath(),
Tammo Spalink8fab5312012-05-28 18:33:30 +0800129 help='Path to the HWID database.')
130
Tammo Spalink95c43732012-07-25 15:57:14 -0700131_hwid_status_list_cmd_arg = CmdArg(
Hung-Te Lin56b18402015-01-16 14:52:30 +0800132 '--status', nargs='*', default=['supported'],
133 help='allow only HWIDs with these status values')
Tammo Spalink95c43732012-07-25 15:57:14 -0700134
Jon Salzce124fb2012-10-02 17:42:03 +0800135_probe_results_cmd_arg = CmdArg(
Yong Hong55050c12018-02-27 18:19:47 +0800136 '--probe_results', metavar='RESULTS.json',
137 help=('Output from "hwid probe" (used instead of probing this system).'))
Jon Salzce124fb2012-10-02 17:42:03 +0800138
Ricky Liang53390232013-03-08 15:37:57 +0800139_device_info_cmd_arg = CmdArg(
Ricky Liangf89f73a2013-03-19 05:00:24 +0800140 '--device_info', metavar='DEVICE_INFO.yaml', default=None,
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800141 help='A dict of device info to use instead of fetching from shopfloor '
Ricky Liang53390232013-03-08 15:37:57 +0800142 'server.')
143
Jon Salzce124fb2012-10-02 17:42:03 +0800144_hwid_cmd_arg = CmdArg(
145 '--hwid', metavar='HWID',
Ricky Lianga70a1202013-03-15 15:03:17 +0800146 help='HWID to verify (instead of the currently set HWID of this system).')
Jon Salzce124fb2012-10-02 17:42:03 +0800147
Yong Hong68a0e0d2017-12-20 19:06:54 +0800148_hwid_run_vpd_cmd_arg = CmdArg(
149 '--hwid-run-vpd', action='store_true',
150 help=('Specify the hwid utility to obtain the vpd data by running the '
151 '`vpd` commandline tool.'))
152
153_hwid_vpd_data_file_cmd_arg = CmdArg(
154 '--hwid-vpd-data-file', metavar='FILE.json', type=str, default=None,
155 help=('Specify the hwid utility to obtain the vpd data from the specified '
156 'file.'))
157
Bernie Thompson3c11c872013-07-22 18:22:45 -0700158_rma_mode_cmd_arg = CmdArg(
159 '--rma_mode', action='store_true',
160 help='Enable RMA mode, do not check for deprecated components.')
Tammo Spalink95c43732012-07-25 15:57:14 -0700161
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800162_cros_core_cmd_arg = CmdArg(
163 '--cros_core', action='store_true',
164 help='Finalize for ChromeOS Core devices (may add or remove few test '
Hung-Te Lin53c49402017-07-26 13:10:58 +0800165 'items. For example, registration codes or firmware bitmap '
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800166 'locale settings).')
167
Yilun Lin599833f2017-12-22 14:07:46 +0800168_chromebox_cmd_arg = CmdArg(
169 '--chromebox', action='store_true', default=None,
170 help='Finalize for ChromeBox devices (may add or remove few test '
171 'items. For example, VerifyECKey).')
172
bowgotsai13820f42015-09-10 23:18:04 +0800173_enforced_release_channels_cmd_arg = CmdArg(
174 '--enforced_release_channels', nargs='*', default=None,
175 help='Enforced release image channels.')
176
Yilun Lin34f54802017-11-16 11:58:25 +0800177_ec_pubkey_path_cmd_arg = CmdArg(
178 '--ec_pubkey_path',
179 default=None,
180 help='Path to public key in vb2 format. Verify EC key with pubkey file.')
181
182_ec_pubkey_hash_cmd_arg = CmdArg(
183 '--ec_pubkey_hash',
184 default=None,
185 help='A string for public key hash. Verify EC key with the given hash.')
186
Hung-Te Lincdb96522016-04-15 16:51:10 +0800187_release_rootfs_cmd_arg = CmdArg(
188 '--release_rootfs', help='Location of release image rootfs partition.')
189
190_firmware_path_cmd_arg = CmdArg(
191 '--firmware_path', help='Location of firmware image partition.')
Ricky Liang43b879b2014-02-24 11:36:55 +0800192
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800193_shopfloor_url_args_cmd_arg = CmdArg(
194 '--shopfloor_url',
Earl Ou51182222016-09-09 12:16:48 +0800195 help='Shopfloor server url to be informed when wiping is done. '
196 'After wiping, a XML-RPC request will be sent to the '
197 'given url to indicate the completion of wiping.')
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800198
199_station_ip_cmd_arg = CmdArg(
200 '--station_ip',
201 help='IP of remote station')
202
203_station_port_cmd_arg = CmdArg(
204 '--station_port',
205 help='Port on remote station')
206
207_wipe_finish_token_cmd_arg = CmdArg(
208 '--wipe_finish_token',
209 help='Required token when notifying station after wipe finished')
210
Ting Shen18a06382016-08-30 16:18:21 +0800211_waive_list_cmd_arg = CmdArg(
212 '--waive_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800213 help='A list of waived checks, separated by whitespace. '
214 'Each item should be a sub-command of gooftool. '
Ting Shen18a06382016-08-30 16:18:21 +0800215 'e.g. "gooftool verify --waive_list verify_tpm clear_gbb_flags".')
216
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800217_skip_list_cmd_arg = CmdArg(
218 '--skip_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800219 help='A list of skipped checks, separated by whitespace. '
220 'Each item should be a sub-command of gooftool. '
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800221 'e.g. "gooftool verify --skip_list verify_tpm clear_gbb_flags".')
222
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800223_rlz_embargo_end_date_offset_cmd_arg = CmdArg(
224 '--embargo_offset', type=int, default=7, choices=xrange(7, 15),
225 help='Change the offset of embargo end date, cannot less than 7 days or '
226 'more than 14 days.')
227
Marco Chena681b2e2018-08-31 11:41:41 +0800228_no_ectool_cmd_arg = CmdArg(
229 '--no_ectool', action='store_false', dest='has_ectool',
230 help='There is no ectool utility so tests rely on ectool should be '
231 'skipped.')
Tammo Spalink8fab5312012-05-28 18:33:30 +0800232
Yilun Lin34f54802017-11-16 11:58:25 +0800233@Command(
234 'verify_ec_key',
235 _ec_pubkey_path_cmd_arg,
236 _ec_pubkey_hash_cmd_arg)
237def VerifyECKey(options):
238 """Verify EC key."""
239 return GetGooftool(options).VerifyECKey(
240 options.ec_pubkey_path, options.ec_pubkey_hash)
241
242
Hung-Te Line1d80f62016-03-31 14:58:13 +0800243@Command('verify_keys',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800244 _release_rootfs_cmd_arg,
245 _firmware_path_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800246def VerifyKeys(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800247 """Verify keys in firmware and SSD match."""
Hung-Te Line1d80f62016-03-31 14:58:13 +0800248 return GetGooftool(options).VerifyKeys(
Hung-Te Lincdb96522016-04-15 16:51:10 +0800249 options.release_rootfs, options.firmware_path)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800250
251
252@Command('set_fw_bitmap_locale')
Peter Shihfdf17682017-05-26 11:38:39 +0800253def SetFirmwareBitmapLocale(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800254 """Use VPD locale value to set firmware bitmap default language."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800255
Ricky Lianga70a1202013-03-15 15:03:17 +0800256 (index, locale) = GetGooftool(options).SetFirmwareBitmapLocale()
Andy Cheng2582d292012-12-04 17:38:28 +0800257 logging.info('Firmware bitmap initial locale set to %d (%s).',
258 index, locale)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800259
260
Hung-Te Line1d80f62016-03-31 14:58:13 +0800261@Command('verify_system_time',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800262 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800263def VerifySystemTime(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800264 """Verify system time is later than release filesystem creation time."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800265
Hung-Te Lincdb96522016-04-15 16:51:10 +0800266 return GetGooftool(options).VerifySystemTime(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800267
268
Hung-Te Line1d80f62016-03-31 14:58:13 +0800269@Command('verify_rootfs',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800270 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800271def VerifyRootFs(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800272 """Verify rootfs on SSD is valid by checking hash."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800273
Hung-Te Line1d80f62016-03-31 14:58:13 +0800274 return GetGooftool(options).VerifyRootFs(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800275
Hung-Te Lin56b18402015-01-16 14:52:30 +0800276
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800277@Command('verify_tpm')
Peter Shihfdf17682017-05-26 11:38:39 +0800278def VerifyTPM(options):
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800279 """Verify TPM is cleared."""
280
281 return GetGooftool(options).VerifyTPM()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800282
Hung-Te Lin56b18402015-01-16 14:52:30 +0800283
Hung-Te Lindd708d42014-07-11 17:05:01 +0800284@Command('verify_me_locked')
Peter Shihfdf17682017-05-26 11:38:39 +0800285def VerifyManagementEngineLocked(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800286 """Verify Management Engine is locked."""
Hung-Te Lindd708d42014-07-11 17:05:01 +0800287
288 return GetGooftool(options).VerifyManagementEngineLocked()
289
Hung-Te Lin56b18402015-01-16 14:52:30 +0800290
Marco Chena681b2e2018-08-31 11:41:41 +0800291@Command('verify_switch_wp',
292 _no_ectool_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800293def VerifyWPSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800294 """Verify hardware write protection switch is enabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800295
Marco Chena681b2e2018-08-31 11:41:41 +0800296 GetGooftool(options).VerifyWPSwitch(options.has_ectool)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800297
298
Hung-Te Lin53c49402017-07-26 13:10:58 +0800299@Command('verify_vpd')
300def VerifyVPD(options):
301 """Verify that VPD values are properly set.
Jon Salzadd90d32014-04-29 16:16:27 +0800302
Hung-Te Lin53c49402017-07-26 13:10:58 +0800303 Check if mandatory fields are set, and deprecated fields don't exist.
Jon Salzadd90d32014-04-29 16:16:27 +0800304 """
Hung-Te Lin53c49402017-07-26 13:10:58 +0800305 return GetGooftool(options).VerifyVPD()
Jon Salzadd90d32014-04-29 16:16:27 +0800306
307
bowgotsai13820f42015-09-10 23:18:04 +0800308@Command('verify_release_channel',
309 _enforced_release_channels_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800310def VerifyReleaseChannel(options):
bowgotsai529139c2015-05-30 01:39:49 +0800311 """Verify that release image channel is correct.
312
313 ChromeOS has four channels: canary, dev, beta and stable.
314 The last three channels support image auto-updates, checks
315 that release image channel is one of them.
316 """
bowgotsai13820f42015-09-10 23:18:04 +0800317 return GetGooftool(options).VerifyReleaseChannel(
318 options.enforced_release_channels)
bowgotsai529139c2015-05-30 01:39:49 +0800319
320
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800321@Command('write_protect')
Peter Shihfdf17682017-05-26 11:38:39 +0800322def EnableFwWp(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800323 """Enable then verify firmware write protection."""
Peter Shihfdf17682017-05-26 11:38:39 +0800324 del options # Unused.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800325
Yong Hongdad230a2017-08-30 22:25:19 +0800326 def WriteProtect(fw):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800327 """Calculate protection size, then invoke flashrom.
328
Yong Hongdad230a2017-08-30 22:25:19 +0800329 The region (offset and size) to write protect may be different per chipset
330 and firmware layout, so we have to read the WP_RO section from FMAP to
331 decide that.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800332 """
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800333 wp_section = 'WP_RO'
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800334
Yong Hongdad230a2017-08-30 22:25:19 +0800335 fmap_image = fw.GetFirmwareImage(
336 sections=(['FMAP'] if fw.target == crosfw.TARGET_MAIN else None))
337 if not fmap_image.has_section(wp_section):
338 raise Error('Could not find %s firmware section: %s' %
339 (fw.target.upper(), wp_section))
340
341 section_data = fw.GetFirmwareImage(
342 sections=[wp_section]).get_section_area(wp_section)
Peter Shihe6afab32018-09-11 17:16:48 +0800343 ro_offset, ro_size = section_data[0:2]
Yong Hongdad230a2017-08-30 22:25:19 +0800344
345 logging.debug('write protecting %s [off=%x size=%x]', fw.target.upper(),
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800346 ro_offset, ro_size)
Yong Hongdad230a2017-08-30 22:25:19 +0800347 crosfw.Flashrom(fw.target).EnableWriteProtection(ro_offset, ro_size)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800348
Yong Hongdad230a2017-08-30 22:25:19 +0800349 WriteProtect(crosfw.LoadMainFirmware())
Andy Cheng0465d132013-03-20 12:12:06 +0800350 event_log.Log('wp', fw='main')
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800351
352 # Some EC (mostly PD) does not support "RO NOW". Instead they will only set
353 # "RO_AT_BOOT" when you request to enable RO (These platforms consider
354 # --wp-range with right range identical to --wp-enable), and requires a
355 # 'ectool reboot_ec RO at-shutdown; reboot' to let the RO take effect.
Hung-Te Lin0d10b562016-12-28 10:58:07 +0800356 # After reboot, "flashrom -p host --wp-status" will return protected range.
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800357 # If you don't reboot, returned range will be (0, 0), and running command
358 # "ectool flashprotect" will not have RO_NOW.
359
Yong Hongdad230a2017-08-30 22:25:19 +0800360 for fw in [crosfw.LoadEcFirmware(), crosfw.LoadPDFirmware()]:
361 if fw.GetChipId() is None:
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800362 logging.warning('%s not write protected (seems there is no %s flash).',
Yong Hongdad230a2017-08-30 22:25:19 +0800363 fw.target.upper(), fw.target.upper())
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800364 continue
Yong Hongdad230a2017-08-30 22:25:19 +0800365 WriteProtect(fw)
366 event_log.Log('wp', fw=fw.target)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800367
368
369@Command('clear_gbb_flags')
Peter Shihfdf17682017-05-26 11:38:39 +0800370def ClearGBBFlags(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800371 """Zero out the GBB flags, in preparation for transition to release state.
372
373 No GBB flags are set in release/shipping state, but they are useful
Hung-Te Lin879cff42017-06-19 12:46:37 +0800374 for factory/development. See "futility gbb --flags" for details.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800375 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800376
Ricky Lianga70a1202013-03-15 15:03:17 +0800377 GetGooftool(options).ClearGBBFlags()
Andy Cheng0465d132013-03-20 12:12:06 +0800378 event_log.Log('clear_gbb_flags')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800379
380
Jon Salzaa3a30e2013-05-15 15:56:28 +0800381@Command('clear_factory_vpd_entries')
Peter Shihfdf17682017-05-26 11:38:39 +0800382def ClearFactoryVPDEntries(options):
Jon Salzaa3a30e2013-05-15 15:56:28 +0800383 """Clears factory.* items in the RW VPD."""
384 entries = GetGooftool(options).ClearFactoryVPDEntries()
385 event_log.Log('clear_factory_vpd_entries', entries=FilterDict(entries))
386
387
Mattias Nisslercca761b2015-04-15 21:53:04 +0200388@Command('generate_stable_device_secret')
Peter Shihfdf17682017-05-26 11:38:39 +0800389def GenerateStableDeviceSecret(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800390 """Generates a fresh stable device secret and stores it in the RO VPD."""
Mattias Nisslercca761b2015-04-15 21:53:04 +0200391 GetGooftool(options).GenerateStableDeviceSecret()
392 event_log.Log('generate_stable_device_secret')
393
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800394
Yves Arrouyeb49b31e2019-03-06 21:51:52 -0800395@Command('cr50_set_sn_bits_and_board_id')
396def Cr50SetSnBitsAndBoardId(options):
397 """Set the serial number bits, board id and flags on the Cr50 chip."""
398 GetGooftool(options).Cr50SetSnBitsAndBoardId()
399 event_log.Log('cr50_set_sn_bits_and_board_id')
Shen-En Shihd078a7c2017-08-04 13:33:49 +0800400
401
Marco Chen20c885d2018-10-04 17:22:03 +0800402@Command('cr50_disable_factory_mode')
Marco Chen44a666d2018-07-13 21:01:50 +0800403def Cr50DisableFactoryMode(options):
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800404 """Reset Cr50 state back to default state after RMA."""
Marco Chen44a666d2018-07-13 21:01:50 +0800405 return GetGooftool(options).Cr50DisableFactoryMode()
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800406
407
Earl Ou564a7872016-10-05 10:22:00 +0800408@Command('enable_release_partition',
409 CmdArg('--release_rootfs',
410 help=('path to the release rootfs device. If not specified, '
411 'the default (5th) partition will be used.')))
412def EnableReleasePartition(options):
413 """Enables a release image partition on the disk."""
414 GetGooftool(options).EnableReleasePartition(options.release_rootfs)
415
416
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800417@Command('wipe_in_place',
418 CmdArg('--fast', action='store_true',
Shun-Hsing Ou8d3c40a2015-10-08 18:16:08 +0800419 help='use non-secure but faster wipe method.'),
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800420 _shopfloor_url_args_cmd_arg,
421 _station_ip_cmd_arg,
422 _station_port_cmd_arg,
423 _wipe_finish_token_cmd_arg)
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800424def WipeInPlace(options):
425 """Start factory wipe directly without reboot."""
426
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800427 GetGooftool(options).WipeInPlace(options.fast,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800428 options.shopfloor_url,
429 options.station_ip,
430 options.station_port,
431 options.wipe_finish_token)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200432
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800433@Command('wipe_init',
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800434 CmdArg('--wipe_args', help='arguments for clobber-state'),
435 CmdArg('--state_dev', help='path to stateful partition device'),
436 CmdArg('--root_disk', help='path to primary device'),
437 CmdArg('--old_root', help='path to old root'),
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800438 _shopfloor_url_args_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800439 _release_rootfs_cmd_arg,
440 _station_ip_cmd_arg,
441 _station_port_cmd_arg,
442 _wipe_finish_token_cmd_arg)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800443def WipeInit(options):
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800444 GetGooftool(options).WipeInit(options.wipe_args,
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800445 options.shopfloor_url,
446 options.state_dev,
447 options.release_rootfs,
448 options.root_disk,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800449 options.old_root,
450 options.station_ip,
451 options.station_port,
452 options.wipe_finish_token)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800453
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800454@Command('verify',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800455 CmdArg('--no_write_protect', action='store_true',
456 help='Do not check write protection switch state.'),
Tammo Spalink95c43732012-07-25 15:57:14 -0700457 _hwid_status_list_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800458 _hwdb_path_cmd_arg,
Yong Hong5408f652017-07-11 19:20:25 +0800459 _project_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800460 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800461 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800462 _hwid_run_vpd_cmd_arg,
463 _hwid_vpd_data_file_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800464 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800465 _cros_core_cmd_arg,
Yilun Lin599833f2017-12-22 14:07:46 +0800466 _chromebox_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800467 _ec_pubkey_path_cmd_arg,
468 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800469 _release_rootfs_cmd_arg,
470 _firmware_path_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800471 _enforced_release_channels_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800472 _waive_list_cmd_arg,
Marco Chena681b2e2018-08-31 11:41:41 +0800473 _skip_list_cmd_arg,
474 _no_ectool_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800475def Verify(options):
476 """Verifies if whole factory process is ready for finalization.
477
478 This routine performs all the necessary checks to make sure the
479 device is ready to be finalized, but does not modify state. These
480 checks include dev switch, firmware write protection switch, hwid,
481 system time, keys, and root file system.
482 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800483
Hung-Te Lin6d827542012-07-19 11:50:41 +0800484 if not options.no_write_protect:
Ricky Lianga70a1202013-03-15 15:03:17 +0800485 VerifyWPSwitch(options)
Hung-Te Lindd708d42014-07-11 17:05:01 +0800486 VerifyManagementEngineLocked(options)
Ting Shen129fa6f2016-09-02 12:22:24 +0800487 VerifyHWID(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800488 VerifySystemTime(options)
Yilun Lin599833f2017-12-22 14:07:46 +0800489 if options.chromebox:
490 VerifyECKey(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800491 VerifyKeys(options)
492 VerifyRootFs(options)
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800493 VerifyTPM(options)
Hung-Te Lin53c49402017-07-26 13:10:58 +0800494 VerifyVPD(options)
bowgotsai529139c2015-05-30 01:39:49 +0800495 VerifyReleaseChannel(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800496
Hung-Te Lin56b18402015-01-16 14:52:30 +0800497
Jon Salzfe9036f2014-01-16 14:11:23 +0800498@Command('untar_stateful_files')
Hung-Te Lin388bce22014-06-03 19:56:40 +0800499def UntarStatefulFiles(unused_options):
Jon Salzfe9036f2014-01-16 14:11:23 +0800500 """Untars stateful files from stateful_files.tar.xz on stateful partition.
501
502 If that file does not exist (which should only be R30 and earlier),
503 this is a no-op.
504 """
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800505 # Path to stateful partition on device.
506 device_stateful_path = '/mnt/stateful_partition'
507 tar_file = os.path.join(device_stateful_path, 'stateful_files.tar.xz')
Jon Salzfe9036f2014-01-16 14:11:23 +0800508 if os.path.exists(tar_file):
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800509 Spawn(['tar', 'xf', tar_file], cwd=device_stateful_path,
Jon Salzfe9036f2014-01-16 14:11:23 +0800510 log=True, check_call=True)
511 else:
512 logging.warning('No stateful files at %s', tar_file)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800513
Jon Salz40b9f822014-07-25 16:39:55 +0800514
515@Command('log_source_hashes')
Peter Shihfdf17682017-05-26 11:38:39 +0800516def LogSourceHashes(options):
Jon Salz40b9f822014-07-25 16:39:55 +0800517 """Logs hashes of source files in the factory toolkit."""
Peter Shihfdf17682017-05-26 11:38:39 +0800518 del options # Unused.
Jon Salze60307f2014-08-05 16:20:00 +0800519 # WARNING: The following line is necessary to validate the integrity
520 # of the factory software. Do not remove or modify it.
521 #
522 # 警告:此行会验证工厂软件的完整性,禁止删除或修改。
Wei-Han Chena5c01a02016-04-23 19:27:19 +0800523 factory_par = sys_utils.GetRunningFactoryPythonArchivePath()
524 if factory_par:
525 event_log.Log(
526 'source_hashes',
527 **file_utils.HashPythonArchive(factory_par))
528 else:
529 event_log.Log(
530 'source_hashes',
Peter Shihad166772017-05-31 11:36:17 +0800531 **file_utils.HashSourceTree(os.path.join(paths.FACTORY_DIR, 'py')))
Jon Salz40b9f822014-07-25 16:39:55 +0800532
533
Tammo Spalink86a61c62012-05-25 15:10:35 +0800534@Command('log_system_details')
Peter Shihfdf17682017-05-26 11:38:39 +0800535def LogSystemDetails(options):
Tammo Spalink86a61c62012-05-25 15:10:35 +0800536 """Write miscellaneous system details to the event log."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800537
Ricky Liang43b879b2014-02-24 11:36:55 +0800538 event_log.Log('system_details', **GetGooftool(options).GetSystemDetails())
Tammo Spalink86a61c62012-05-25 15:10:35 +0800539
540
Jon Salza88b83b2013-05-27 20:00:35 +0800541def CreateReportArchiveBlob(*args, **kwargs):
542 """Creates a report archive and returns it as a blob.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800543
Jon Salza88b83b2013-05-27 20:00:35 +0800544 Args:
545 See CreateReportArchive.
Andy Cheng7a76cb82012-11-19 18:08:19 +0800546
Jon Salza88b83b2013-05-27 20:00:35 +0800547 Returns:
548 An xmlrpclib.Binary object containing a .tar.xz file.
549 """
Wei-Han Chen47416612016-09-14 17:41:52 +0800550 report_archive = CreateReportArchive(*args, **kwargs)
551 try:
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800552 return xmlrpclib.Binary(file_utils.ReadFile(report_archive))
Wei-Han Chen47416612016-09-14 17:41:52 +0800553 finally:
554 os.unlink(report_archive)
Jon Salza88b83b2013-05-27 20:00:35 +0800555
556
557def CreateReportArchive(device_sn=None, add_file=None):
558 """Creates a report archive in a temporary directory.
559
560 Args:
561 device_sn: The device serial number (optional).
562 add_file: A list of files to add (optional).
563
564 Returns:
565 Path to the archive.
566 """
Hung-Te Lin6bd16472012-06-20 16:26:47 +0800567 def NormalizeAsFileName(token):
568 return re.sub(r'\W+', '', token).strip()
Jon Salza88b83b2013-05-27 20:00:35 +0800569
570 target_name = '%s%s.tar.xz' % (
571 time.strftime('%Y%m%dT%H%M%SZ',
572 time.gmtime()),
Hung-Te Lin56b18402015-01-16 14:52:30 +0800573 ('' if device_sn is None else
574 '_' + NormalizeAsFileName(device_sn)))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800575 target_path = os.path.join(gettempdir(), target_name)
Jon Salza88b83b2013-05-27 20:00:35 +0800576
Tammo Spalink86a61c62012-05-25 15:10:35 +0800577 # Intentionally ignoring dotfiles in EVENT_LOG_DIR.
Andy Cheng0465d132013-03-20 12:12:06 +0800578 tar_cmd = 'cd %s ; tar cJf %s *' % (event_log.EVENT_LOG_DIR, target_path)
Peter Shihb4e49352017-05-25 17:35:11 +0800579 tar_cmd += ' %s' % paths.FACTORY_LOG_PATH
Jon Salza88b83b2013-05-27 20:00:35 +0800580 if add_file:
581 for f in add_file:
Jon Salz65266432012-07-30 19:02:49 +0800582 # Require absolute paths since the tar command may change the
583 # directory.
584 if not f.startswith('/'):
585 raise Error('Not an absolute path: %s' % f)
586 if not os.path.exists(f):
587 raise Error('File does not exist: %s' % f)
Wei-Han Chen4b755022017-01-04 10:51:52 +0800588 tar_cmd += ' %s' % pipes.quote(f)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800589 cmd_result = Shell(tar_cmd)
Jon Salzff88c022012-11-03 12:19:58 +0800590
591 if ((cmd_result.status == 1) and
592 all((x == '' or
593 'file changed as we read it' in x or
594 "Removing leading `/' from member names" in x)
595 for x in cmd_result.stderr.split('\n'))):
596 # That's OK. Make sure it's valid though.
Vic Yang85199e72013-01-28 14:33:11 +0800597 Spawn(['tar', 'tfJ', target_path], check_call=True, log=True,
Jon Salzff88c022012-11-03 12:19:58 +0800598 ignore_stdout=True)
599 elif not cmd_result.success:
Tammo Spalink86a61c62012-05-25 15:10:35 +0800600 raise Error('unable to tar event logs, cmd %r failed, stderr: %r' %
601 (tar_cmd, cmd_result.stderr))
Jon Salzff88c022012-11-03 12:19:58 +0800602
Jon Salza88b83b2013-05-27 20:00:35 +0800603 return target_path
604
605_upload_method_cmd_arg = CmdArg(
606 '--upload_method', metavar='METHOD:PARAM',
607 help=('How to perform the upload. METHOD should be one of '
608 '{ftp, shopfloor, ftps, cpfe}.'))
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800609_upload_max_retry_times_arg = CmdArg(
610 '--upload_max_retry_times', type=int, default=0,
611 help='Number of tries to upload. 0 to retry infinitely.')
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800612_upload_retry_interval_arg = CmdArg(
613 '--upload_retry_interval', type=int, default=None,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800614 help='Retry interval in seconds.')
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800615_upload_allow_fail_arg = CmdArg(
616 '--upload_allow_fail', action='store_true',
617 help='Continue finalize if report upload fails.')
Jon Salza88b83b2013-05-27 20:00:35 +0800618_add_file_cmd_arg = CmdArg(
619 '--add_file', metavar='FILE', action='append',
620 help='Extra file to include in report (must be an absolute path)')
621
Hung-Te Lin56b18402015-01-16 14:52:30 +0800622
Jon Salza88b83b2013-05-27 20:00:35 +0800623@Command('upload_report',
624 _upload_method_cmd_arg,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800625 _upload_max_retry_times_arg,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800626 _upload_retry_interval_arg,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800627 _upload_allow_fail_arg,
Jon Salza88b83b2013-05-27 20:00:35 +0800628 _add_file_cmd_arg)
629def UploadReport(options):
630 """Create a report containing key device details."""
Yong Hong65bda312018-12-13 20:05:58 +0800631 ro_vpd = vpd.VPDTool().GetAllData(partition=vpd.VPD_READONLY_PARTITION_NAME)
Jon Salza88b83b2013-05-27 20:00:35 +0800632 device_sn = ro_vpd.get('serial_number', None)
633 if device_sn is None:
634 logging.warning('RO_VPD missing device serial number')
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +0800635 device_sn = 'MISSING_SN_' + time_utils.TimedUUID()
Jon Salza88b83b2013-05-27 20:00:35 +0800636 target_path = CreateReportArchive(device_sn)
637
Tammo Spalink86a61c62012-05-25 15:10:35 +0800638 if options.upload_method is None or options.upload_method == 'none':
639 logging.warning('REPORT UPLOAD SKIPPED (report left at %s)', target_path)
640 return
641 method, param = options.upload_method.split(':', 1)
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800642
643 if options.upload_retry_interval is not None:
644 retry_interval = options.upload_retry_interval
645 else:
646 retry_interval = report_upload.DEFAULT_RETRY_INTERVAL
647
Tammo Spalink86a61c62012-05-25 15:10:35 +0800648 if method == 'shopfloor':
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800649 report_upload.ShopFloorUpload(
650 target_path, param,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800651 'GRT' if options.command_name == 'finalize' else None,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800652 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800653 retry_interval=retry_interval,
654 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800655 elif method == 'ftp':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800656 report_upload.FtpUpload(target_path, 'ftp:' + param,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800657 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800658 retry_interval=retry_interval,
659 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800660 elif method == 'ftps':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800661 report_upload.CurlUrlUpload(target_path, '--ftp-ssl-reqd ftp:%s' % param,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800662 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800663 retry_interval=retry_interval,
664 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800665 elif method == 'cpfe':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800666 report_upload.CpfeUpload(target_path, pipes.quote(param),
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800667 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800668 retry_interval=retry_interval,
669 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800670 else:
Peter Shihbf6f22b2018-02-26 14:05:28 +0800671 raise Error('unknown report upload method %r' % method)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800672
673
674@Command('finalize',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800675 CmdArg('--no_write_protect', action='store_true',
676 help='Do not enable firmware write protection.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800677 CmdArg('--fast', action='store_true',
678 help='use non-secure but faster wipe method.'),
Yong Hongb2926bd2018-10-12 14:11:14 +0800679 _no_ectool_cmd_arg,
Shun-Hsing Oudb407d62015-11-11 11:03:59 +0800680 _shopfloor_url_args_cmd_arg,
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800681 _hwdb_path_cmd_arg,
Tammo Spalink95c43732012-07-25 15:57:14 -0700682 _hwid_status_list_cmd_arg,
Jon Salz65266432012-07-30 19:02:49 +0800683 _upload_method_cmd_arg,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800684 _upload_max_retry_times_arg,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800685 _upload_retry_interval_arg,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800686 _upload_allow_fail_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800687 _add_file_cmd_arg,
688 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800689 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800690 _hwid_run_vpd_cmd_arg,
691 _hwid_vpd_data_file_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800692 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800693 _cros_core_cmd_arg,
Yilun Lin599833f2017-12-22 14:07:46 +0800694 _chromebox_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800695 _ec_pubkey_path_cmd_arg,
696 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800697 _release_rootfs_cmd_arg,
698 _firmware_path_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800699 _enforced_release_channels_cmd_arg,
700 _station_ip_cmd_arg,
701 _station_port_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800702 _wipe_finish_token_cmd_arg,
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800703 _rlz_embargo_end_date_offset_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800704 _waive_list_cmd_arg,
705 _skip_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800706def Finalize(options):
707 """Verify system readiness and trigger transition into release state.
708
Jon Salzaa3a30e2013-05-15 15:56:28 +0800709 This routine does the following:
710 - Verifies system state (see verify command)
Jon Salzfe9036f2014-01-16 14:11:23 +0800711 - Untars stateful_files.tar.xz, if it exists, in the stateful partition, to
712 initialize files such as the CRX cache
Jon Salzaa3a30e2013-05-15 15:56:28 +0800713 - Modifies firmware bitmaps to match locale
714 - Clears all factory-friendly flags from the GBB
715 - Removes factory-specific entries from RW_VPD (factory.*)
716 - Enables firmware write protection (cannot rollback after this)
717 - Uploads system logs & reports
Earl Ou51182222016-09-09 12:16:48 +0800718 - Wipes the testing kernel, rootfs, and stateful partition
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800719 """
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800720 if not options.rma_mode:
721 # Write VPD values related to RLZ ping into VPD.
722 GetGooftool(options).WriteVPDForRLZPing(options.embargo_offset)
Yves Arrouyeb49b31e2019-03-06 21:51:52 -0800723 Cr50SetSnBitsAndBoardId(options)
Marco Chen44a666d2018-07-13 21:01:50 +0800724 Cr50DisableFactoryMode(options)
Marco Chen9d0631c2018-08-31 10:52:44 +0800725 Verify(options)
Jon Salz40b9f822014-07-25 16:39:55 +0800726 LogSourceHashes(options)
Jon Salzfe9036f2014-01-16 14:11:23 +0800727 UntarStatefulFiles(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800728 if options.cros_core:
729 logging.info('SetFirmwareBitmapLocale is skipped for ChromeOS Core device.')
730 else:
731 SetFirmwareBitmapLocale(options)
Jon Salzaa3a30e2013-05-15 15:56:28 +0800732 ClearFactoryVPDEntries(options)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200733 GenerateStableDeviceSecret(options)
Shen-En Shih3e079b22017-09-11 05:43:09 -0700734 ClearGBBFlags(options)
Hung-Te Lin6d827542012-07-19 11:50:41 +0800735 if options.no_write_protect:
736 logging.warn('WARNING: Firmware Write Protection is SKIPPED.')
Andy Cheng0465d132013-03-20 12:12:06 +0800737 event_log.Log('wp', fw='both', status='skipped')
Hung-Te Lin6d827542012-07-19 11:50:41 +0800738 else:
Wei-Han Chenba21f512016-10-14 18:52:33 +0800739 EnableFwWp(options)
Jon Salza0f58e02012-05-29 19:33:39 +0800740 LogSystemDetails(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800741 UploadReport(options)
Earl Ou51182222016-09-09 12:16:48 +0800742
743 event_log.Log('wipe_in_place')
744 wipe_args = []
Earl Ou51182222016-09-09 12:16:48 +0800745 if options.shopfloor_url:
746 wipe_args += ['--shopfloor_url', options.shopfloor_url]
747 if options.fast:
748 wipe_args += ['--fast']
749 if options.station_ip:
750 wipe_args += ['--station_ip', options.station_ip]
751 if options.station_port:
752 wipe_args += ['--station_port', options.station_port]
753 if options.wipe_finish_token:
754 wipe_args += ['--wipe_finish_token', options.wipe_finish_token]
755 ExecFactoryPar('gooftool', 'wipe_in_place', *wipe_args)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800756
757
Ting Shen129fa6f2016-09-02 12:22:24 +0800758@Command('verify_hwid',
759 _probe_results_cmd_arg,
760 _hwdb_path_cmd_arg,
761 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800762 _hwid_run_vpd_cmd_arg,
763 _hwid_vpd_data_file_cmd_arg,
Ting Shen129fa6f2016-09-02 12:22:24 +0800764 _rma_mode_cmd_arg)
765def VerifyHWID(options):
Ricky Liangc662be32013-12-24 11:50:23 +0800766 """A simple wrapper that calls out to HWID utils to verify version 3 HWID.
Ricky Liang53390232013-03-08 15:37:57 +0800767
Ricky Liangc662be32013-12-24 11:50:23 +0800768 This is mainly for Gooftool to verify v3 HWID during finalize. For testing
769 and development purposes, please use `hwid` command.
Ricky Liang53390232013-03-08 15:37:57 +0800770 """
Yong Hongada8e0e2018-01-04 16:36:21 +0800771 database = GetGooftool(options).db
Yong Hong68a0e0d2017-12-20 19:06:54 +0800772
Yong Hongada8e0e2018-01-04 16:36:21 +0800773 encoded_string = options.hwid or GetGooftool(options).ReadHWID()
774
775 probed_results = hwid_utils.GetProbedResults(infile=options.probe_results)
Yong Hong2c39bf22018-01-24 22:24:11 +0800776 device_info = hwid_utils.GetDeviceInfo()
Yong Hong65bda312018-12-13 20:05:58 +0800777 vpd_data = hwid_utils.GetVPDData(run_vpd=options.hwid_run_vpd,
778 infile=options.hwid_vpd_data_file)
Ricky Liang53390232013-03-08 15:37:57 +0800779
Hung-Te Lin11052952015-03-18 13:48:59 +0800780 event_log.Log('probed_results', probed_results=FilterDict(probed_results))
Yong Hong65bda312018-12-13 20:05:58 +0800781 event_log.Log('vpd', vpd=FilterDict(vpd_data))
Ricky Liang53390232013-03-08 15:37:57 +0800782
Yong Hong2c39bf22018-01-24 22:24:11 +0800783 hwid_utils.VerifyHWID(database, encoded_string, probed_results,
Yong Hong65bda312018-12-13 20:05:58 +0800784 device_info, vpd_data, options.rma_mode)
Ricky Liang53390232013-03-08 15:37:57 +0800785
Ricky Liangc662be32013-12-24 11:50:23 +0800786 event_log.Log('verified_hwid', hwid=encoded_string)
Ricky Liang53390232013-03-08 15:37:57 +0800787
788
henryhsu44d793a2013-07-20 00:07:38 +0800789@Command('get_firmware_hash',
Marco Chence70b132018-05-03 23:43:39 +0800790 CmdArg('--file', required=True, metavar='FILE', help='Firmware File.'))
henryhsu44d793a2013-07-20 00:07:38 +0800791def GetFirmwareHash(options):
henryhsuf6f835c2013-07-20 20:49:25 +0800792 """Get firmware hash from a file"""
henryhsu44d793a2013-07-20 00:07:38 +0800793 if os.path.exists(options.file):
Cheng-Han Yang2c668ae2018-04-18 22:31:07 +0800794 value_dict = chromeos_firmware.CalculateFirmwareHashes(options.file)
795 for key, value in value_dict.iteritems():
796 print ' %s: %s' % (key, value)
henryhsu44d793a2013-07-20 00:07:38 +0800797 else:
798 raise Error('File does not exist: %s' % options.file)
799
henryhsuf6f835c2013-07-20 20:49:25 +0800800
Peter Shihfdf17682017-05-26 11:38:39 +0800801def main():
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800802 """Run sub-command specified by the command line args."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800803
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800804 options = ParseCmdline(
Ting Shen129fa6f2016-09-02 12:22:24 +0800805 'Perform Google required factory tests.',
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800806 CmdArg('-l', '--log', metavar='PATH',
807 help='Write logs to this file.'),
Jon Salza4bea382012-10-29 13:00:34 +0800808 CmdArg('--suppress-event-logs', action='store_true',
809 help='Suppress event logging.'),
Wei-Han Chenaff56232016-04-16 09:17:59 +0800810 CmdArg('--phase', default=None,
811 help=('override phase for phase checking (defaults to the current '
812 'as returned by the "factory phase" command)')),
Tammo Spalink8fab5312012-05-28 18:33:30 +0800813 verbosity_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800814 SetupLogging(options.verbosity, options.log)
Andy Cheng0465d132013-03-20 12:12:06 +0800815 event_log.SetGlobalLoggerDefaultPrefix('gooftool')
816 event_log.GetGlobalLogger().suppress = options.suppress_event_logs
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800817 logging.debug('gooftool options: %s', repr(options))
Wei-Han Chenaff56232016-04-16 09:17:59 +0800818
819 phase.OverridePhase(options.phase)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800820 try:
821 logging.debug('GOOFTOOL command %r', options.command_name)
822 options.command(options)
823 logging.info('GOOFTOOL command %r SUCCESS', options.command_name)
Peter Shih6674ecf2018-03-29 14:04:57 +0800824 except Error as e:
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800825 logging.exception(e)
826 sys.exit('GOOFTOOL command %r ERROR: %s' % (options.command_name, e))
Peter Shih6674ecf2018-03-29 14:04:57 +0800827 except Exception as e:
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800828 logging.exception(e)
829 sys.exit('UNCAUGHT RUNTIME EXCEPTION %s' % e)
830
831
832if __name__ == '__main__':
Peter Shihfdf17682017-05-26 11:38:39 +0800833 main()