blob: 2fc9980f48e2b21cc41fd9419cbb64f5be704bb7 [file] [log] [blame]
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08001#!/usr/bin/python
Jon Salze60307f2014-08-05 16:20:00 +08002# -*- coding: utf-8 -*-
3# Copyright 2014 The Chromium OS Authors. All rights reserved.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08004# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
Jon Salze60307f2014-08-05 16:20:00 +08007
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08008"""Google Factory Tool.
9
You-Cheng Syu461ec032017-03-06 15:56:58 +080010This tool is intended to be used on factory assembly lines. It
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080011provides all of the Google required test functionality and must be run
12on each device as part of the assembly process.
13"""
14
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080015import logging
16import os
Jon Salz65266432012-07-30 19:02:49 +080017import pipes
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080018import re
19import sys
Peter Shihfdf17682017-05-26 11:38:39 +080020from tempfile import gettempdir
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080021import threading
Hung-Te Lin6bd16472012-06-20 16:26:47 +080022import time
Jon Salza88b83b2013-05-27 20:00:35 +080023import xmlrpclib
Peter Shihfdf17682017-05-26 11:38:39 +080024
Ricky Liang7905f272013-03-16 01:57:10 +080025import yaml
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080026
Peter Shihfdf17682017-05-26 11:38:39 +080027import factory_common # pylint: disable=unused-import
Wei-Han Chen0a3320e2016-04-23 01:32:07 +080028from cros.factory.gooftool.common import ExecFactoryPar
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080029from cros.factory.gooftool.common import Shell
Peter Shihfdf17682017-05-26 11:38:39 +080030from cros.factory.gooftool.core import Gooftool
31from cros.factory.gooftool import crosfw
32from cros.factory.gooftool.probe import CalculateFirmwareHashes
Ting Shen129fa6f2016-09-02 12:22:24 +080033from cros.factory.gooftool.probe import Probe
34from cros.factory.gooftool.probe import ReadRoVpd
Peter Shihfdf17682017-05-26 11:38:39 +080035from cros.factory.gooftool import report_upload
Hung-Te Lin604e0c22015-11-24 15:17:07 +080036from cros.factory.hwid.v3 import common
37from cros.factory.hwid.v3 import hwid_utils
Wei-Han Chen2ebb92d2016-01-12 14:51:41 +080038from cros.factory.test.env import paths
Peter Shihfdf17682017-05-26 11:38:39 +080039from cros.factory.test import event_log
Wei-Han Chenaff56232016-04-16 09:17:59 +080040from cros.factory.test.rules import phase
Hung-Te Lin3f096842016-01-13 17:37:06 +080041from cros.factory.test.rules.privacy import FilterDict
Peter Shihfdf17682017-05-26 11:38:39 +080042from cros.factory.utils import argparse_utils
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080043from cros.factory.utils.argparse_utils import CmdArg
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080044from cros.factory.utils.argparse_utils import ParseCmdline
45from cros.factory.utils.argparse_utils import verbosity_cmd_arg
Peter Shihfdf17682017-05-26 11:38:39 +080046from cros.factory.utils.debug_utils import SetupLogging
Jon Salz40b9f822014-07-25 16:39:55 +080047from cros.factory.utils import file_utils
Wei-Han Chena5c01a02016-04-23 19:27:19 +080048from cros.factory.utils import sys_utils
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +080049from cros.factory.utils import time_utils
Jon Salzff88c022012-11-03 12:19:58 +080050from cros.factory.utils.process_utils import Spawn
Joel Kitchingd3bc2662014-12-16 16:03:32 -080051from cros.factory.utils.type_utils import Error
Tammo Spalink86a61c62012-05-25 15:10:35 +080052
Tammo Spalink5c699832012-07-03 17:50:39 +080053
Tammo Spalink5c699832012-07-03 17:50:39 +080054# TODO(tammo): Replace calls to sys.exit with raise Exit, and maybe
55# treat that specially (as a smoot exit, as opposed to the more
56# verbose output for generic Error).
57
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080058_global_gooftool = None
59_gooftool_lock = threading.Lock()
Tammo Spalink5c699832012-07-03 17:50:39 +080060
Hung-Te Lin56b18402015-01-16 14:52:30 +080061
Ricky Lianga70a1202013-03-15 15:03:17 +080062def GetGooftool(options):
Peter Shihfdf17682017-05-26 11:38:39 +080063 global _global_gooftool # pylint: disable=global-statement
Ricky Lianga70a1202013-03-15 15:03:17 +080064
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080065 if _global_gooftool is None:
66 with _gooftool_lock:
Yong Hong5408f652017-07-11 19:20:25 +080067 project = getattr(options, 'project', None)
Ting Shen129fa6f2016-09-02 12:22:24 +080068 hwdb_path = getattr(options, 'hwdb_path', None)
Yong Hong5408f652017-07-11 19:20:25 +080069 _global_gooftool = Gooftool(hwid_version=3, project=project,
Ting Shen129fa6f2016-09-02 12:22:24 +080070 hwdb_path=hwdb_path)
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080071
72 return _global_gooftool
Ricky Lianga70a1202013-03-15 15:03:17 +080073
Hung-Te Lin56b18402015-01-16 14:52:30 +080074
Ting Shen18a06382016-08-30 16:18:21 +080075def Command(cmd_name, *args, **kwargs):
76 """ Decorator for commands in gooftool.
77
78 This is similar to argparse_utils.Command, but all gooftool commands
79 can be waived during `gooftool finalize` or `gooftool verify` using
Wei-Han Chen60c5d332017-01-05 17:15:10 +080080 --waive_list or --skip_list option.
Ting Shen18a06382016-08-30 16:18:21 +080081 """
82 def Decorate(fun):
Wei-Han Chen60c5d332017-01-05 17:15:10 +080083 def CommandWithWaiveSkipCheck(options):
Ting Shen18a06382016-08-30 16:18:21 +080084 waive_list = vars(options).get('waive_list', [])
Wei-Han Chen60c5d332017-01-05 17:15:10 +080085 skip_list = vars(options).get('skip_list', [])
86 if phase.GetPhase() >= phase.PVT_DOGFOOD and (
87 waive_list != [] or skip_list != []):
Ting Shen18a06382016-08-30 16:18:21 +080088 raise Error(
Wei-Han Chen60c5d332017-01-05 17:15:10 +080089 'waive_list and skip_list should be empty for phase %s' %
90 phase.GetPhase())
Ting Shen18a06382016-08-30 16:18:21 +080091
Wei-Han Chen60c5d332017-01-05 17:15:10 +080092 if cmd_name not in skip_list:
93 try:
94 fun(options)
95 except Exception as e:
96 if cmd_name in waive_list:
97 logging.exception(e)
98 else:
99 raise
Ting Shen18a06382016-08-30 16:18:21 +0800100
101 return argparse_utils.Command(cmd_name, *args, **kwargs)(
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800102 CommandWithWaiveSkipCheck)
Ting Shen18a06382016-08-30 16:18:21 +0800103 return Decorate
104
105
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800106@Command('write_hwid',
107 CmdArg('hwid', metavar='HWID', help='HWID string'))
Andy Chengc92e6f92012-11-20 16:55:53 +0800108def WriteHWID(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800109 """Write specified HWID value into the system BB."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800110
Tammo Spalink95c43732012-07-25 15:57:14 -0700111 logging.info('writing hwid string %r', options.hwid)
Ricky Lianga70a1202013-03-15 15:03:17 +0800112 GetGooftool(options).WriteHWID(options.hwid)
Andy Cheng0465d132013-03-20 12:12:06 +0800113 event_log.Log('write_hwid', hwid=options.hwid)
Tammo Spalink95c43732012-07-25 15:57:14 -0700114 print 'Wrote HWID: %r' % options.hwid
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800115
116
Yong Hong5408f652017-07-11 19:20:25 +0800117_project_cmd_arg = CmdArg(
118 '--project', metavar='PROJECT',
119 default=None, help='Project name to test.')
Ricky Liang53390232013-03-08 15:37:57 +0800120
Tammo Spalink8fab5312012-05-28 18:33:30 +0800121_hwdb_path_cmd_arg = CmdArg(
122 '--hwdb_path', metavar='PATH',
Ricky Liangeede7922013-06-19 10:18:41 +0800123 default=common.DEFAULT_HWID_DATA_PATH,
Tammo Spalink8fab5312012-05-28 18:33:30 +0800124 help='Path to the HWID database.')
125
Tammo Spalink95c43732012-07-25 15:57:14 -0700126_hwid_status_list_cmd_arg = CmdArg(
Hung-Te Lin56b18402015-01-16 14:52:30 +0800127 '--status', nargs='*', default=['supported'],
128 help='allow only HWIDs with these status values')
Tammo Spalink95c43732012-07-25 15:57:14 -0700129
Jon Salzce124fb2012-10-02 17:42:03 +0800130_probe_results_cmd_arg = CmdArg(
131 '--probe_results', metavar='RESULTS.yaml',
Ricky Liangc662be32013-12-24 11:50:23 +0800132 help=('Output from "gooftool probe --include_vpd" (used instead of '
Jon Salzce124fb2012-10-02 17:42:03 +0800133 'probing this system).'))
134
Ricky Liang53390232013-03-08 15:37:57 +0800135_device_info_cmd_arg = CmdArg(
Ricky Liangf89f73a2013-03-19 05:00:24 +0800136 '--device_info', metavar='DEVICE_INFO.yaml', default=None,
Ricky Liang53390232013-03-08 15:37:57 +0800137 help='A dict of device info to use instead of fetching from shopfllor '
138 'server.')
139
Jon Salzce124fb2012-10-02 17:42:03 +0800140_hwid_cmd_arg = CmdArg(
141 '--hwid', metavar='HWID',
Ricky Lianga70a1202013-03-15 15:03:17 +0800142 help='HWID to verify (instead of the currently set HWID of this system).')
Jon Salzce124fb2012-10-02 17:42:03 +0800143
Bernie Thompson3c11c872013-07-22 18:22:45 -0700144_rma_mode_cmd_arg = CmdArg(
145 '--rma_mode', action='store_true',
146 help='Enable RMA mode, do not check for deprecated components.')
Tammo Spalink95c43732012-07-25 15:57:14 -0700147
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800148_cros_core_cmd_arg = CmdArg(
149 '--cros_core', action='store_true',
150 help='Finalize for ChromeOS Core devices (may add or remove few test '
Hung-Te Lin53c49402017-07-26 13:10:58 +0800151 'items. For example, registration codes or firmware bitmap '
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800152 'locale settings).')
153
bowgotsai13820f42015-09-10 23:18:04 +0800154_enforced_release_channels_cmd_arg = CmdArg(
155 '--enforced_release_channels', nargs='*', default=None,
156 help='Enforced release image channels.')
157
Hung-Te Lincdb96522016-04-15 16:51:10 +0800158_release_rootfs_cmd_arg = CmdArg(
159 '--release_rootfs', help='Location of release image rootfs partition.')
160
161_firmware_path_cmd_arg = CmdArg(
162 '--firmware_path', help='Location of firmware image partition.')
Ricky Liang43b879b2014-02-24 11:36:55 +0800163
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800164_shopfloor_url_args_cmd_arg = CmdArg(
165 '--shopfloor_url',
Earl Ou51182222016-09-09 12:16:48 +0800166 help='Shopfloor server url to be informed when wiping is done. '
167 'After wiping, a XML-RPC request will be sent to the '
168 'given url to indicate the completion of wiping.')
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800169
170_station_ip_cmd_arg = CmdArg(
171 '--station_ip',
172 help='IP of remote station')
173
174_station_port_cmd_arg = CmdArg(
175 '--station_port',
176 help='Port on remote station')
177
178_wipe_finish_token_cmd_arg = CmdArg(
179 '--wipe_finish_token',
180 help='Required token when notifying station after wipe finished')
181
Ting Shen18a06382016-08-30 16:18:21 +0800182_waive_list_cmd_arg = CmdArg(
183 '--waive_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu461ec032017-03-06 15:56:58 +0800184 help='A list of waived checks, separated by whitespace.'
Ting Shen18a06382016-08-30 16:18:21 +0800185 'Each item should be a sub-command of gooftool.'
186 'e.g. "gooftool verify --waive_list verify_tpm clear_gbb_flags".')
187
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800188_skip_list_cmd_arg = CmdArg(
189 '--skip_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu461ec032017-03-06 15:56:58 +0800190 help='A list of skipped checks, separated by whitespace.'
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800191 'Each item should be a sub-command of gooftool.'
192 'e.g. "gooftool verify --skip_list verify_tpm clear_gbb_flags".')
193
Tammo Spalink8fab5312012-05-28 18:33:30 +0800194
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800195@Command('probe',
196 CmdArg('--comps', nargs='*',
197 help='List of keys from the component_db registry.'),
Ricky Liangb30da672013-06-14 12:36:34 +0800198 CmdArg('--fast_fw_probe', action='store_true',
199 help='Do a fast probe for EC and main firmware versions only. '
200 'This implies --no_vol and --no_ic.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800201 CmdArg('--no_vol', action='store_true',
202 help='Do not probe volatile data.'),
203 CmdArg('--no_ic', action='store_true',
Jon Salz0f8a6842012-09-25 11:28:22 +0800204 help='Do not probe initial_config data.'),
205 CmdArg('--include_vpd', action='store_true',
206 help='Include VPD data in volatiles.'))
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800207def RunProbe(options):
208 """Print yaml-formatted breakdown of probed device properties."""
Ricky Lianga70a1202013-03-15 15:03:17 +0800209 print GetGooftool(options).Probe(
210 target_comp_classes=options.comps,
Ricky Liangb30da672013-06-14 12:36:34 +0800211 fast_fw_probe=options.fast_fw_probe,
Ricky Lianga70a1202013-03-15 15:03:17 +0800212 probe_volatile=not options.no_vol,
213 probe_initial_config=not options.no_ic,
214 probe_vpd=options.include_vpd).Encode()
Ricky Liang53390232013-03-08 15:37:57 +0800215
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800216
Tammo Spalink214caf42012-05-28 10:45:00 +0800217@Command('verify_components',
218 _hwdb_path_cmd_arg,
Tammo Spalink5c699832012-07-03 17:50:39 +0800219 CmdArg('target_comps', nargs='*'))
Tammo Spalink214caf42012-05-28 10:45:00 +0800220def VerifyComponents(options):
Andy Cheng8ece7382012-08-22 16:25:42 +0800221 """Verify that probeable components all match entries in the component_db.
Tammo Spalink214caf42012-05-28 10:45:00 +0800222
Tammo Spalink5c699832012-07-03 17:50:39 +0800223 Probe for each component class in the target_comps and verify
Tammo Spalink214caf42012-05-28 10:45:00 +0800224 that a corresponding match exists in the component_db -- make sure
225 that these components are present, that they have been approved, but
226 do not check against any specific BOM/HWID configurations.
227 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800228
Andy Chengc531e2f2012-10-15 19:09:17 +0800229 try:
Ricky Lianga70a1202013-03-15 15:03:17 +0800230 result = GetGooftool(options).VerifyComponents(
Andy Chengc531e2f2012-10-15 19:09:17 +0800231 options.target_comps)
232 except ValueError, e:
233 sys.exit(e)
234
Ricky Liang53390232013-03-08 15:37:57 +0800235 PrintVerifyComponentsResults(result)
236
237
238def PrintVerifyComponentsResults(result):
239 """Prints out the results of VerifyComponents method call.
240
241 Groups the results into two groups: 'matches' and 'errors', and prints out
242 their values.
243 """
Andy Chengc531e2f2012-10-15 19:09:17 +0800244 # group by matches and errors
Tammo Spalink214caf42012-05-28 10:45:00 +0800245 matches = []
Andy Chengc531e2f2012-10-15 19:09:17 +0800246 errors = []
247 for result_list in result.values():
248 for component_name, _, error in result_list:
249 if component_name:
250 matches.append(component_name)
Tammo Spalink214caf42012-05-28 10:45:00 +0800251 else:
Andy Chengc531e2f2012-10-15 19:09:17 +0800252 errors.append(error)
253
Andy Cheng228a8c92012-08-27 10:53:57 +0800254 if matches:
255 print 'found probeable components:\n %s' % '\n '.join(matches)
Tammo Spalink214caf42012-05-28 10:45:00 +0800256 if errors:
Andy Cheng228a8c92012-08-27 10:53:57 +0800257 print '\nerrors:\n %s' % '\n '.join(errors)
258 sys.exit('\ncomponent verification FAILURE')
Tammo Spalink214caf42012-05-28 10:45:00 +0800259 else:
Hung-Te Lin56b18402015-01-16 14:52:30 +0800260 print '\ncomponent verification SUCCESS'
Tammo Spalink214caf42012-05-28 10:45:00 +0800261
262
Hung-Te Line1d80f62016-03-31 14:58:13 +0800263@Command('verify_keys',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800264 _release_rootfs_cmd_arg,
265 _firmware_path_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800266def VerifyKeys(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800267 """Verify keys in firmware and SSD match."""
Hung-Te Line1d80f62016-03-31 14:58:13 +0800268 return GetGooftool(options).VerifyKeys(
Hung-Te Lincdb96522016-04-15 16:51:10 +0800269 options.release_rootfs, options.firmware_path)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800270
271
272@Command('set_fw_bitmap_locale')
Peter Shihfdf17682017-05-26 11:38:39 +0800273def SetFirmwareBitmapLocale(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800274 """Use VPD locale value to set firmware bitmap default language."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800275
Ricky Lianga70a1202013-03-15 15:03:17 +0800276 (index, locale) = GetGooftool(options).SetFirmwareBitmapLocale()
Andy Cheng2582d292012-12-04 17:38:28 +0800277 logging.info('Firmware bitmap initial locale set to %d (%s).',
278 index, locale)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800279
280
Hung-Te Line1d80f62016-03-31 14:58:13 +0800281@Command('verify_system_time',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800282 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800283def VerifySystemTime(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800284 """Verify system time is later than release filesystem creation time."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800285
Hung-Te Lincdb96522016-04-15 16:51:10 +0800286 return GetGooftool(options).VerifySystemTime(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800287
288
Hung-Te Line1d80f62016-03-31 14:58:13 +0800289@Command('verify_rootfs',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800290 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800291def VerifyRootFs(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800292 """Verify rootfs on SSD is valid by checking hash."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800293
Hung-Te Line1d80f62016-03-31 14:58:13 +0800294 return GetGooftool(options).VerifyRootFs(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800295
Hung-Te Lin56b18402015-01-16 14:52:30 +0800296
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800297@Command('verify_tpm')
Peter Shihfdf17682017-05-26 11:38:39 +0800298def VerifyTPM(options):
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800299 """Verify TPM is cleared."""
300
301 return GetGooftool(options).VerifyTPM()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800302
Hung-Te Lin56b18402015-01-16 14:52:30 +0800303
Hung-Te Lindd708d42014-07-11 17:05:01 +0800304@Command('verify_me_locked')
Peter Shihfdf17682017-05-26 11:38:39 +0800305def VerifyManagementEngineLocked(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800306 """Verify Management Engine is locked."""
Hung-Te Lindd708d42014-07-11 17:05:01 +0800307
308 return GetGooftool(options).VerifyManagementEngineLocked()
309
Hung-Te Lin56b18402015-01-16 14:52:30 +0800310
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800311@Command('verify_switch_wp')
Peter Shihfdf17682017-05-26 11:38:39 +0800312def VerifyWPSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800313 """Verify hardware write protection switch is enabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800314
Ricky Lianga70a1202013-03-15 15:03:17 +0800315 GetGooftool(options).VerifyWPSwitch()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800316
317
318@Command('verify_switch_dev')
Peter Shihfdf17682017-05-26 11:38:39 +0800319def VerifyDevSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800320 """Verify developer switch is disabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800321
Ricky Lianga70a1202013-03-15 15:03:17 +0800322 if GetGooftool(options).CheckDevSwitchForDisabling():
Hung-Te Lind7d34722012-07-26 16:48:35 +0800323 logging.warn('VerifyDevSwitch: No physical switch.')
Andy Cheng0465d132013-03-20 12:12:06 +0800324 event_log.Log('switch_dev', type='virtual switch')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800325
326
Hung-Te Lin53c49402017-07-26 13:10:58 +0800327@Command('verify_vpd')
328def VerifyVPD(options):
329 """Verify that VPD values are properly set.
Jon Salzadd90d32014-04-29 16:16:27 +0800330
Hung-Te Lin53c49402017-07-26 13:10:58 +0800331 Check if mandatory fields are set, and deprecated fields don't exist.
Jon Salzadd90d32014-04-29 16:16:27 +0800332 """
Hung-Te Lin53c49402017-07-26 13:10:58 +0800333 return GetGooftool(options).VerifyVPD()
Jon Salzadd90d32014-04-29 16:16:27 +0800334
335
bowgotsai13820f42015-09-10 23:18:04 +0800336@Command('verify_release_channel',
337 _enforced_release_channels_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800338def VerifyReleaseChannel(options):
bowgotsai529139c2015-05-30 01:39:49 +0800339 """Verify that release image channel is correct.
340
341 ChromeOS has four channels: canary, dev, beta and stable.
342 The last three channels support image auto-updates, checks
343 that release image channel is one of them.
344 """
bowgotsai13820f42015-09-10 23:18:04 +0800345 return GetGooftool(options).VerifyReleaseChannel(
346 options.enforced_release_channels)
bowgotsai529139c2015-05-30 01:39:49 +0800347
348
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800349@Command('write_protect')
Peter Shihfdf17682017-05-26 11:38:39 +0800350def EnableFwWp(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800351 """Enable then verify firmware write protection."""
Peter Shihfdf17682017-05-26 11:38:39 +0800352 del options # Unused.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800353
Hung-Te Linb21c6682012-08-01 13:53:57 +0800354 def CalculateLegacyRange(fw_type, length, section_data,
355 section_name):
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800356 ro_size = length / 2
357 ro_a = int(section_data[0] / ro_size)
358 ro_b = int((section_data[0] + section_data[1] - 1) / ro_size)
359 if ro_a != ro_b:
Hung-Te Lin56b18402015-01-16 14:52:30 +0800360 raise Error('%s firmware section %s has illegal size' %
Hung-Te Linb21c6682012-08-01 13:53:57 +0800361 (fw_type, section_name))
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800362 ro_offset = ro_a * ro_size
363 return (ro_offset, ro_size)
364
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800365 def WriteProtect(fw_file_path, fw_type, legacy_section=None):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800366 """Calculate protection size, then invoke flashrom.
367
368 Our supported chips only allow write protecting half their total
You-Cheng Syu461ec032017-03-06 15:56:58 +0800369 size, so we partition the flash chipset space accordingly.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800370 """
371 raw_image = open(fw_file_path, 'rb').read()
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800372 wp_section = 'WP_RO'
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800373 image = crosfw.FirmwareImage(raw_image)
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800374 if image.has_section(wp_section):
375 section_data = image.get_section_area(wp_section)
376 ro_offset = section_data[0]
377 ro_size = section_data[1]
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800378 elif legacy_section is not None and image.has_section(legacy_section):
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800379 section_data = image.get_section_area(legacy_section)
380 (ro_offset, ro_size) = CalculateLegacyRange(
Hung-Te Linb21c6682012-08-01 13:53:57 +0800381 fw_type, len(raw_image), section_data, legacy_section)
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800382 else:
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800383 raise Error('Could not find %s firmware section: %s %s' %
384 (fw_type, wp_section, legacy_section or ''))
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800385
386 logging.debug('write protecting %s [off=%x size=%x]', fw_type,
387 ro_offset, ro_size)
388 crosfw.Flashrom(fw_type).EnableWriteProtection(ro_offset, ro_size)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800389
390 WriteProtect(crosfw.LoadMainFirmware().GetFileName(), 'main', 'RO_SECTION')
Andy Cheng0465d132013-03-20 12:12:06 +0800391 event_log.Log('wp', fw='main')
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800392
393 # Some EC (mostly PD) does not support "RO NOW". Instead they will only set
394 # "RO_AT_BOOT" when you request to enable RO (These platforms consider
395 # --wp-range with right range identical to --wp-enable), and requires a
396 # 'ectool reboot_ec RO at-shutdown; reboot' to let the RO take effect.
Hung-Te Lin0d10b562016-12-28 10:58:07 +0800397 # After reboot, "flashrom -p host --wp-status" will return protected range.
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800398 # If you don't reboot, returned range will be (0, 0), and running command
399 # "ectool flashprotect" will not have RO_NOW.
400
401 targets = [
402 ('EC', crosfw.TARGET_EC, crosfw.LoadEcFirmware, 'EC_RO'),
403 ('PD', crosfw.TARGET_PD, crosfw.LoadPDFirmware, None)]
404 for (name, fw_type, provider, legacy_section) in targets:
405 fw_file = provider().GetFileName()
406 if fw_file is None:
407 logging.warning('%s not write protected (seems there is no %s flash).',
408 name, name)
409 continue
410 WriteProtect(fw_file, fw_type, legacy_section)
411 event_log.Log('wp', fw=fw_type)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800412
413
414@Command('clear_gbb_flags')
Peter Shihfdf17682017-05-26 11:38:39 +0800415def ClearGBBFlags(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800416 """Zero out the GBB flags, in preparation for transition to release state.
417
418 No GBB flags are set in release/shipping state, but they are useful
419 for factory/development. See "gbb_utility --flags" for details.
420 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800421
Ricky Lianga70a1202013-03-15 15:03:17 +0800422 GetGooftool(options).ClearGBBFlags()
Andy Cheng0465d132013-03-20 12:12:06 +0800423 event_log.Log('clear_gbb_flags')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800424
425
Jon Salzaa3a30e2013-05-15 15:56:28 +0800426@Command('clear_factory_vpd_entries')
Peter Shihfdf17682017-05-26 11:38:39 +0800427def ClearFactoryVPDEntries(options):
Jon Salzaa3a30e2013-05-15 15:56:28 +0800428 """Clears factory.* items in the RW VPD."""
429 entries = GetGooftool(options).ClearFactoryVPDEntries()
430 event_log.Log('clear_factory_vpd_entries', entries=FilterDict(entries))
431
432
Mattias Nisslercca761b2015-04-15 21:53:04 +0200433@Command('generate_stable_device_secret')
Peter Shihfdf17682017-05-26 11:38:39 +0800434def GenerateStableDeviceSecret(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800435 """Generates a fresh stable device secret and stores it in the RO VPD."""
Mattias Nisslercca761b2015-04-15 21:53:04 +0200436 GetGooftool(options).GenerateStableDeviceSecret()
437 event_log.Log('generate_stable_device_secret')
438
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800439
Earl Ou564a7872016-10-05 10:22:00 +0800440@Command('enable_release_partition',
441 CmdArg('--release_rootfs',
442 help=('path to the release rootfs device. If not specified, '
443 'the default (5th) partition will be used.')))
444def EnableReleasePartition(options):
445 """Enables a release image partition on the disk."""
446 GetGooftool(options).EnableReleasePartition(options.release_rootfs)
447
448
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800449@Command('wipe_in_place',
450 CmdArg('--fast', action='store_true',
Shun-Hsing Ou8d3c40a2015-10-08 18:16:08 +0800451 help='use non-secure but faster wipe method.'),
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800452 _shopfloor_url_args_cmd_arg,
453 _station_ip_cmd_arg,
454 _station_port_cmd_arg,
455 _wipe_finish_token_cmd_arg)
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800456def WipeInPlace(options):
457 """Start factory wipe directly without reboot."""
458
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800459 GetGooftool(options).WipeInPlace(options.fast,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800460 options.shopfloor_url,
461 options.station_ip,
462 options.station_port,
463 options.wipe_finish_token)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200464
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800465@Command('wipe_init',
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800466 CmdArg('--wipe_args', help='arguments for clobber-state'),
467 CmdArg('--state_dev', help='path to stateful partition device'),
468 CmdArg('--root_disk', help='path to primary device'),
469 CmdArg('--old_root', help='path to old root'),
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800470 _shopfloor_url_args_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800471 _release_rootfs_cmd_arg,
472 _station_ip_cmd_arg,
473 _station_port_cmd_arg,
474 _wipe_finish_token_cmd_arg)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800475def WipeInit(options):
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800476 GetGooftool(options).WipeInit(options.wipe_args,
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800477 options.shopfloor_url,
478 options.state_dev,
479 options.release_rootfs,
480 options.root_disk,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800481 options.old_root,
482 options.station_ip,
483 options.station_port,
484 options.wipe_finish_token)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800485
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800486@Command('verify',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800487 CmdArg('--no_write_protect', action='store_true',
488 help='Do not check write protection switch state.'),
Tammo Spalink95c43732012-07-25 15:57:14 -0700489 _hwid_status_list_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800490 _hwdb_path_cmd_arg,
Yong Hong5408f652017-07-11 19:20:25 +0800491 _project_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800492 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800493 _hwid_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800494 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800495 _cros_core_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800496 _release_rootfs_cmd_arg,
497 _firmware_path_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800498 _enforced_release_channels_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800499 _waive_list_cmd_arg,
500 _skip_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800501def Verify(options):
502 """Verifies if whole factory process is ready for finalization.
503
504 This routine performs all the necessary checks to make sure the
505 device is ready to be finalized, but does not modify state. These
506 checks include dev switch, firmware write protection switch, hwid,
507 system time, keys, and root file system.
508 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800509
Hung-Te Lin6d827542012-07-19 11:50:41 +0800510 if not options.no_write_protect:
Ricky Lianga70a1202013-03-15 15:03:17 +0800511 VerifyWPSwitch(options)
Hung-Te Lindd708d42014-07-11 17:05:01 +0800512 VerifyManagementEngineLocked(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800513 VerifyDevSwitch(options)
Ting Shen129fa6f2016-09-02 12:22:24 +0800514 VerifyHWID(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800515 VerifySystemTime(options)
516 VerifyKeys(options)
517 VerifyRootFs(options)
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800518 VerifyTPM(options)
Hung-Te Lin53c49402017-07-26 13:10:58 +0800519 VerifyVPD(options)
bowgotsai529139c2015-05-30 01:39:49 +0800520 VerifyReleaseChannel(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800521
Hung-Te Lin56b18402015-01-16 14:52:30 +0800522
Jon Salzfe9036f2014-01-16 14:11:23 +0800523@Command('untar_stateful_files')
Hung-Te Lin388bce22014-06-03 19:56:40 +0800524def UntarStatefulFiles(unused_options):
Jon Salzfe9036f2014-01-16 14:11:23 +0800525 """Untars stateful files from stateful_files.tar.xz on stateful partition.
526
527 If that file does not exist (which should only be R30 and earlier),
528 this is a no-op.
529 """
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800530 # Path to stateful partition on device.
531 device_stateful_path = '/mnt/stateful_partition'
532 tar_file = os.path.join(device_stateful_path, 'stateful_files.tar.xz')
Jon Salzfe9036f2014-01-16 14:11:23 +0800533 if os.path.exists(tar_file):
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800534 Spawn(['tar', 'xf', tar_file], cwd=device_stateful_path,
Jon Salzfe9036f2014-01-16 14:11:23 +0800535 log=True, check_call=True)
536 else:
537 logging.warning('No stateful files at %s', tar_file)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800538
Jon Salz40b9f822014-07-25 16:39:55 +0800539
540@Command('log_source_hashes')
Peter Shihfdf17682017-05-26 11:38:39 +0800541def LogSourceHashes(options):
Jon Salz40b9f822014-07-25 16:39:55 +0800542 """Logs hashes of source files in the factory toolkit."""
Peter Shihfdf17682017-05-26 11:38:39 +0800543 del options # Unused.
Jon Salze60307f2014-08-05 16:20:00 +0800544 # WARNING: The following line is necessary to validate the integrity
545 # of the factory software. Do not remove or modify it.
546 #
547 # 警告:此行会验证工厂软件的完整性,禁止删除或修改。
Wei-Han Chena5c01a02016-04-23 19:27:19 +0800548 factory_par = sys_utils.GetRunningFactoryPythonArchivePath()
549 if factory_par:
550 event_log.Log(
551 'source_hashes',
552 **file_utils.HashPythonArchive(factory_par))
553 else:
554 event_log.Log(
555 'source_hashes',
Peter Shihad166772017-05-31 11:36:17 +0800556 **file_utils.HashSourceTree(os.path.join(paths.FACTORY_DIR, 'py')))
Jon Salz40b9f822014-07-25 16:39:55 +0800557
558
Tammo Spalink86a61c62012-05-25 15:10:35 +0800559@Command('log_system_details')
Peter Shihfdf17682017-05-26 11:38:39 +0800560def LogSystemDetails(options):
Tammo Spalink86a61c62012-05-25 15:10:35 +0800561 """Write miscellaneous system details to the event log."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800562
Ricky Liang43b879b2014-02-24 11:36:55 +0800563 event_log.Log('system_details', **GetGooftool(options).GetSystemDetails())
Tammo Spalink86a61c62012-05-25 15:10:35 +0800564
565
Jon Salza88b83b2013-05-27 20:00:35 +0800566def CreateReportArchiveBlob(*args, **kwargs):
567 """Creates a report archive and returns it as a blob.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800568
Jon Salza88b83b2013-05-27 20:00:35 +0800569 Args:
570 See CreateReportArchive.
Andy Cheng7a76cb82012-11-19 18:08:19 +0800571
Jon Salza88b83b2013-05-27 20:00:35 +0800572 Returns:
573 An xmlrpclib.Binary object containing a .tar.xz file.
574 """
Wei-Han Chen47416612016-09-14 17:41:52 +0800575 report_archive = CreateReportArchive(*args, **kwargs)
576 try:
577 with open(report_archive) as f:
578 return xmlrpclib.Binary(f.read())
579 finally:
580 os.unlink(report_archive)
Jon Salza88b83b2013-05-27 20:00:35 +0800581
582
583def CreateReportArchive(device_sn=None, add_file=None):
584 """Creates a report archive in a temporary directory.
585
586 Args:
587 device_sn: The device serial number (optional).
588 add_file: A list of files to add (optional).
589
590 Returns:
591 Path to the archive.
592 """
Hung-Te Lin6bd16472012-06-20 16:26:47 +0800593 def NormalizeAsFileName(token):
594 return re.sub(r'\W+', '', token).strip()
Jon Salza88b83b2013-05-27 20:00:35 +0800595
596 target_name = '%s%s.tar.xz' % (
597 time.strftime('%Y%m%dT%H%M%SZ',
598 time.gmtime()),
Hung-Te Lin56b18402015-01-16 14:52:30 +0800599 ('' if device_sn is None else
600 '_' + NormalizeAsFileName(device_sn)))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800601 target_path = os.path.join(gettempdir(), target_name)
Jon Salza88b83b2013-05-27 20:00:35 +0800602
Tammo Spalink86a61c62012-05-25 15:10:35 +0800603 # Intentionally ignoring dotfiles in EVENT_LOG_DIR.
Andy Cheng0465d132013-03-20 12:12:06 +0800604 tar_cmd = 'cd %s ; tar cJf %s *' % (event_log.EVENT_LOG_DIR, target_path)
Peter Shihb4e49352017-05-25 17:35:11 +0800605 tar_cmd += ' %s' % paths.FACTORY_LOG_PATH
Jon Salza88b83b2013-05-27 20:00:35 +0800606 if add_file:
607 for f in add_file:
Jon Salz65266432012-07-30 19:02:49 +0800608 # Require absolute paths since the tar command may change the
609 # directory.
610 if not f.startswith('/'):
611 raise Error('Not an absolute path: %s' % f)
612 if not os.path.exists(f):
613 raise Error('File does not exist: %s' % f)
Wei-Han Chen4b755022017-01-04 10:51:52 +0800614 tar_cmd += ' %s' % pipes.quote(f)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800615 cmd_result = Shell(tar_cmd)
Jon Salzff88c022012-11-03 12:19:58 +0800616
617 if ((cmd_result.status == 1) and
618 all((x == '' or
619 'file changed as we read it' in x or
620 "Removing leading `/' from member names" in x)
621 for x in cmd_result.stderr.split('\n'))):
622 # That's OK. Make sure it's valid though.
Vic Yang85199e72013-01-28 14:33:11 +0800623 Spawn(['tar', 'tfJ', target_path], check_call=True, log=True,
Jon Salzff88c022012-11-03 12:19:58 +0800624 ignore_stdout=True)
625 elif not cmd_result.success:
Tammo Spalink86a61c62012-05-25 15:10:35 +0800626 raise Error('unable to tar event logs, cmd %r failed, stderr: %r' %
627 (tar_cmd, cmd_result.stderr))
Jon Salzff88c022012-11-03 12:19:58 +0800628
Jon Salza88b83b2013-05-27 20:00:35 +0800629 return target_path
630
631_upload_method_cmd_arg = CmdArg(
632 '--upload_method', metavar='METHOD:PARAM',
633 help=('How to perform the upload. METHOD should be one of '
634 '{ftp, shopfloor, ftps, cpfe}.'))
635_add_file_cmd_arg = CmdArg(
636 '--add_file', metavar='FILE', action='append',
637 help='Extra file to include in report (must be an absolute path)')
638
Hung-Te Lin56b18402015-01-16 14:52:30 +0800639
Jon Salza88b83b2013-05-27 20:00:35 +0800640@Command('upload_report',
641 _upload_method_cmd_arg,
642 _add_file_cmd_arg)
643def UploadReport(options):
644 """Create a report containing key device details."""
Hung-Te Lin74346d72016-01-07 22:16:57 +0800645 ro_vpd = ReadRoVpd()
Jon Salza88b83b2013-05-27 20:00:35 +0800646 device_sn = ro_vpd.get('serial_number', None)
647 if device_sn is None:
648 logging.warning('RO_VPD missing device serial number')
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +0800649 device_sn = 'MISSING_SN_' + time_utils.TimedUUID()
Jon Salza88b83b2013-05-27 20:00:35 +0800650 target_path = CreateReportArchive(device_sn)
651
Tammo Spalink86a61c62012-05-25 15:10:35 +0800652 if options.upload_method is None or options.upload_method == 'none':
653 logging.warning('REPORT UPLOAD SKIPPED (report left at %s)', target_path)
654 return
655 method, param = options.upload_method.split(':', 1)
656 if method == 'shopfloor':
657 report_upload.ShopFloorUpload(target_path, param)
658 elif method == 'ftp':
Jay Kim360c1dd2012-06-25 10:58:11 -0700659 report_upload.FtpUpload(target_path, 'ftp:' + param)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800660 elif method == 'ftps':
661 report_upload.CurlUrlUpload(target_path, '--ftp-ssl-reqd ftp:%s' % param)
662 elif method == 'cpfe':
Shawn Nematbakhsh3404a092013-01-28 16:49:09 -0800663 report_upload.CpfeUpload(target_path, pipes.quote(param))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800664 else:
665 raise Error('unknown report upload method %r', method)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800666
667
668@Command('finalize',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800669 CmdArg('--no_write_protect', action='store_true',
670 help='Do not enable firmware write protection.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800671 CmdArg('--fast', action='store_true',
672 help='use non-secure but faster wipe method.'),
Shun-Hsing Oudb407d62015-11-11 11:03:59 +0800673 _shopfloor_url_args_cmd_arg,
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800674 _hwdb_path_cmd_arg,
Tammo Spalink95c43732012-07-25 15:57:14 -0700675 _hwid_status_list_cmd_arg,
Jon Salz65266432012-07-30 19:02:49 +0800676 _upload_method_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800677 _add_file_cmd_arg,
678 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800679 _hwid_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800680 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800681 _cros_core_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800682 _release_rootfs_cmd_arg,
683 _firmware_path_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800684 _enforced_release_channels_cmd_arg,
685 _station_ip_cmd_arg,
686 _station_port_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800687 _wipe_finish_token_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800688 _waive_list_cmd_arg,
689 _skip_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800690def Finalize(options):
691 """Verify system readiness and trigger transition into release state.
692
Jon Salzaa3a30e2013-05-15 15:56:28 +0800693 This routine does the following:
694 - Verifies system state (see verify command)
Jon Salzfe9036f2014-01-16 14:11:23 +0800695 - Untars stateful_files.tar.xz, if it exists, in the stateful partition, to
696 initialize files such as the CRX cache
Jon Salzaa3a30e2013-05-15 15:56:28 +0800697 - Modifies firmware bitmaps to match locale
698 - Clears all factory-friendly flags from the GBB
699 - Removes factory-specific entries from RW_VPD (factory.*)
700 - Enables firmware write protection (cannot rollback after this)
701 - Uploads system logs & reports
Earl Ou51182222016-09-09 12:16:48 +0800702 - Wipes the testing kernel, rootfs, and stateful partition
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800703 """
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800704 Verify(options)
Jon Salz40b9f822014-07-25 16:39:55 +0800705 LogSourceHashes(options)
Jon Salzfe9036f2014-01-16 14:11:23 +0800706 UntarStatefulFiles(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800707 if options.cros_core:
708 logging.info('SetFirmwareBitmapLocale is skipped for ChromeOS Core device.')
709 else:
710 SetFirmwareBitmapLocale(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800711 ClearGBBFlags(options)
Jon Salzaa3a30e2013-05-15 15:56:28 +0800712 ClearFactoryVPDEntries(options)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200713 GenerateStableDeviceSecret(options)
Hung-Te Lin6d827542012-07-19 11:50:41 +0800714 if options.no_write_protect:
715 logging.warn('WARNING: Firmware Write Protection is SKIPPED.')
Andy Cheng0465d132013-03-20 12:12:06 +0800716 event_log.Log('wp', fw='both', status='skipped')
Hung-Te Lin6d827542012-07-19 11:50:41 +0800717 else:
Wei-Han Chenba21f512016-10-14 18:52:33 +0800718 EnableFwWp(options)
Jon Salza0f58e02012-05-29 19:33:39 +0800719 LogSystemDetails(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800720 UploadReport(options)
Earl Ou51182222016-09-09 12:16:48 +0800721
722 event_log.Log('wipe_in_place')
723 wipe_args = []
Earl Ou51182222016-09-09 12:16:48 +0800724 if options.shopfloor_url:
725 wipe_args += ['--shopfloor_url', options.shopfloor_url]
726 if options.fast:
727 wipe_args += ['--fast']
728 if options.station_ip:
729 wipe_args += ['--station_ip', options.station_ip]
730 if options.station_port:
731 wipe_args += ['--station_port', options.station_port]
732 if options.wipe_finish_token:
733 wipe_args += ['--wipe_finish_token', options.wipe_finish_token]
734 ExecFactoryPar('gooftool', 'wipe_in_place', *wipe_args)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800735
736
Ting Shen129fa6f2016-09-02 12:22:24 +0800737@Command('verify_hwid',
738 _probe_results_cmd_arg,
739 _hwdb_path_cmd_arg,
740 _hwid_cmd_arg,
741 _rma_mode_cmd_arg)
742def VerifyHWID(options):
Ricky Liangc662be32013-12-24 11:50:23 +0800743 """A simple wrapper that calls out to HWID utils to verify version 3 HWID.
Ricky Liang53390232013-03-08 15:37:57 +0800744
Ricky Liangc662be32013-12-24 11:50:23 +0800745 This is mainly for Gooftool to verify v3 HWID during finalize. For testing
746 and development purposes, please use `hwid` command.
Ricky Liang53390232013-03-08 15:37:57 +0800747 """
Ricky Liangc662be32013-12-24 11:50:23 +0800748 db = GetGooftool(options).db
749 encoded_string = options.hwid or hwid_utils.GetHWIDString()
Ricky Liang7905f272013-03-16 01:57:10 +0800750 if options.probe_results:
Ricky Liangc662be32013-12-24 11:50:23 +0800751 probed_results = yaml.load(open(options.probe_results).read())
Ricky Liang7905f272013-03-16 01:57:10 +0800752 else:
Ricky Liangc662be32013-12-24 11:50:23 +0800753 probed_results = yaml.load(Probe(probe_vpd=True).Encode())
754 vpd = hwid_utils.GetVPD(probed_results)
Ricky Liang53390232013-03-08 15:37:57 +0800755
Hung-Te Lin11052952015-03-18 13:48:59 +0800756 event_log.Log('probed_results', probed_results=FilterDict(probed_results))
757 event_log.Log('vpd', vpd=FilterDict(vpd))
Ricky Liang53390232013-03-08 15:37:57 +0800758
Ricky Liangc662be32013-12-24 11:50:23 +0800759 hwid_utils.VerifyHWID(db, encoded_string, probed_results, vpd,
Hung-Te Lin56b18402015-01-16 14:52:30 +0800760 rma_mode=options.rma_mode)
Ricky Liang53390232013-03-08 15:37:57 +0800761
Ricky Liangc662be32013-12-24 11:50:23 +0800762 event_log.Log('verified_hwid', hwid=encoded_string)
Ricky Liang53390232013-03-08 15:37:57 +0800763
764
henryhsu44d793a2013-07-20 00:07:38 +0800765@Command('get_firmware_hash',
766 CmdArg('--file', metavar='FILE', help='Firmware File.'))
767def GetFirmwareHash(options):
henryhsuf6f835c2013-07-20 20:49:25 +0800768 """Get firmware hash from a file"""
henryhsu44d793a2013-07-20 00:07:38 +0800769 if os.path.exists(options.file):
770 hashes = CalculateFirmwareHashes(options.file)
771 for section, value_dict in hashes.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800772 print '%s:' % section
henryhsu44d793a2013-07-20 00:07:38 +0800773 for key, value in value_dict.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800774 print ' %s: %s' % (key, value)
henryhsu44d793a2013-07-20 00:07:38 +0800775 else:
776 raise Error('File does not exist: %s' % options.file)
777
henryhsuf6f835c2013-07-20 20:49:25 +0800778
Peter Shihfdf17682017-05-26 11:38:39 +0800779def main():
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800780 """Run sub-command specified by the command line args."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800781
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800782 options = ParseCmdline(
Ting Shen129fa6f2016-09-02 12:22:24 +0800783 'Perform Google required factory tests.',
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800784 CmdArg('-l', '--log', metavar='PATH',
785 help='Write logs to this file.'),
Jon Salza4bea382012-10-29 13:00:34 +0800786 CmdArg('--suppress-event-logs', action='store_true',
787 help='Suppress event logging.'),
Wei-Han Chenaff56232016-04-16 09:17:59 +0800788 CmdArg('--phase', default=None,
789 help=('override phase for phase checking (defaults to the current '
790 'as returned by the "factory phase" command)')),
Tammo Spalink8fab5312012-05-28 18:33:30 +0800791 verbosity_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800792 SetupLogging(options.verbosity, options.log)
Andy Cheng0465d132013-03-20 12:12:06 +0800793 event_log.SetGlobalLoggerDefaultPrefix('gooftool')
794 event_log.GetGlobalLogger().suppress = options.suppress_event_logs
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800795 logging.debug('gooftool options: %s', repr(options))
Wei-Han Chenaff56232016-04-16 09:17:59 +0800796
797 phase.OverridePhase(options.phase)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800798 try:
799 logging.debug('GOOFTOOL command %r', options.command_name)
800 options.command(options)
801 logging.info('GOOFTOOL command %r SUCCESS', options.command_name)
802 except Error, e:
803 logging.exception(e)
804 sys.exit('GOOFTOOL command %r ERROR: %s' % (options.command_name, e))
805 except Exception, e:
806 logging.exception(e)
807 sys.exit('UNCAUGHT RUNTIME EXCEPTION %s' % e)
808
809
810if __name__ == '__main__':
Peter Shihfdf17682017-05-26 11:38:39 +0800811 main()