blob: 5449c7acb08b8b4feb7132a61ac70e41d092e619 [file] [log] [blame]
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08001#!/usr/bin/python
Jon Salze60307f2014-08-05 16:20:00 +08002# -*- coding: utf-8 -*-
3# Copyright 2014 The Chromium OS Authors. All rights reserved.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08004# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
Jon Salze60307f2014-08-05 16:20:00 +08007# pylint: disable=E1101
8
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08009"""Google Factory Tool.
10
11This tool is indended to be used on factory assembly lines. It
12provides all of the Google required test functionality and must be run
13on each device as part of the assembly process.
14"""
15
Ricky Liang5b4568d2013-04-23 17:15:23 +080016import collections
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080017import logging
18import os
Jon Salz65266432012-07-30 19:02:49 +080019import pipes
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080020import re
21import sys
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080022import threading
Hung-Te Lin6bd16472012-06-20 16:26:47 +080023import time
Jon Salza88b83b2013-05-27 20:00:35 +080024import xmlrpclib
Ricky Liang7905f272013-03-16 01:57:10 +080025import yaml
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080026
Andy Cheng2582d292012-12-04 17:38:28 +080027from tempfile import gettempdir
Tammo Spalink86a61c62012-05-25 15:10:35 +080028
Tammo Spalinka40293e2012-07-04 14:58:56 +080029import factory_common # pylint: disable=W0611
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080030
Ricky Liang53390232013-03-08 15:37:57 +080031from cros.factory.gooftool import crosfw
Tammo Spalink01e11722012-07-24 10:17:54 -070032from cros.factory.gooftool import report_upload
Hung-Te Lin84c77fa2016-03-02 17:43:30 +080033from cros.factory.gooftool.core import Gooftool
Wei-Han Chen0a3320e2016-04-23 01:32:07 +080034from cros.factory.gooftool.common import ExecFactoryPar
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080035from cros.factory.gooftool.common import Shell
Ting Shen129fa6f2016-09-02 12:22:24 +080036from cros.factory.gooftool.probe import Probe
37from cros.factory.gooftool.probe import ReadRoVpd
henryhsu44d793a2013-07-20 00:07:38 +080038from cros.factory.gooftool.probe import CalculateFirmwareHashes
Hung-Te Lin604e0c22015-11-24 15:17:07 +080039from cros.factory.hwid.v3 import common
40from cros.factory.hwid.v3 import hwid_utils
Hung-Te Lin91492a12014-11-25 18:56:30 +080041from cros.factory.test import event_log
Wei-Han Chen2ebb92d2016-01-12 14:51:41 +080042from cros.factory.test.env import paths
Wei-Han Chenaff56232016-04-16 09:17:59 +080043from cros.factory.test.rules import phase
Hung-Te Lin3f096842016-01-13 17:37:06 +080044from cros.factory.test.rules.privacy import FilterDict
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080045from cros.factory.utils.argparse_utils import CmdArg
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080046from cros.factory.utils.argparse_utils import ParseCmdline
47from cros.factory.utils.argparse_utils import verbosity_cmd_arg
Ting Shen18a06382016-08-30 16:18:21 +080048from cros.factory.utils import argparse_utils
Jon Salz40b9f822014-07-25 16:39:55 +080049from cros.factory.utils import file_utils
Wei-Han Chena5c01a02016-04-23 19:27:19 +080050from cros.factory.utils import sys_utils
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +080051from cros.factory.utils import time_utils
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080052from cros.factory.utils.debug_utils import SetupLogging
Jon Salzff88c022012-11-03 12:19:58 +080053from cros.factory.utils.process_utils import Spawn
Joel Kitchingd3bc2662014-12-16 16:03:32 -080054from cros.factory.utils.type_utils import Error
Tammo Spalink86a61c62012-05-25 15:10:35 +080055
Tammo Spalink5c699832012-07-03 17:50:39 +080056
Tammo Spalink5c699832012-07-03 17:50:39 +080057# TODO(tammo): Replace calls to sys.exit with raise Exit, and maybe
58# treat that specially (as a smoot exit, as opposed to the more
59# verbose output for generic Error).
60
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080061_global_gooftool = None
62_gooftool_lock = threading.Lock()
Tammo Spalink5c699832012-07-03 17:50:39 +080063
Hung-Te Lin56b18402015-01-16 14:52:30 +080064
Ricky Lianga70a1202013-03-15 15:03:17 +080065def GetGooftool(options):
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080066 global _global_gooftool # pylint: disable=W0603
Ricky Lianga70a1202013-03-15 15:03:17 +080067
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080068 if _global_gooftool is None:
69 with _gooftool_lock:
Ting Shen129fa6f2016-09-02 12:22:24 +080070 board = getattr(options, 'board', None)
71 hwdb_path = getattr(options, 'hwdb_path', None)
72 _global_gooftool = Gooftool(hwid_version=3, board=board,
73 hwdb_path=hwdb_path)
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080074
75 return _global_gooftool
Ricky Lianga70a1202013-03-15 15:03:17 +080076
Hung-Te Lin56b18402015-01-16 14:52:30 +080077
Ting Shen18a06382016-08-30 16:18:21 +080078def Command(cmd_name, *args, **kwargs):
79 """ Decorator for commands in gooftool.
80
81 This is similar to argparse_utils.Command, but all gooftool commands
82 can be waived during `gooftool finalize` or `gooftool verify` using
83 --waive_list option.
84 """
85 def Decorate(fun):
86 def CommandWithWaiveCheck(options):
87 waive_list = vars(options).get('waive_list', [])
88 if phase.GetPhase() >= phase.PVT_DOGFOOD and waive_list != []:
89 raise Error(
90 'waive_list should be empty for phase %s' % phase.GetPhase())
91
92 try:
93 fun(options)
94 except Exception as e:
95 if cmd_name in waive_list:
96 logging.exception(e)
97 else:
98 raise
99
100 return argparse_utils.Command(cmd_name, *args, **kwargs)(
101 CommandWithWaiveCheck)
102 return Decorate
103
104
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800105@Command('write_hwid',
106 CmdArg('hwid', metavar='HWID', help='HWID string'))
Andy Chengc92e6f92012-11-20 16:55:53 +0800107def WriteHWID(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800108 """Write specified HWID value into the system BB."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800109
Tammo Spalink95c43732012-07-25 15:57:14 -0700110 logging.info('writing hwid string %r', options.hwid)
Ricky Lianga70a1202013-03-15 15:03:17 +0800111 GetGooftool(options).WriteHWID(options.hwid)
Andy Cheng0465d132013-03-20 12:12:06 +0800112 event_log.Log('write_hwid', hwid=options.hwid)
Tammo Spalink95c43732012-07-25 15:57:14 -0700113 print 'Wrote HWID: %r' % options.hwid
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800114
115
Ricky Liang53390232013-03-08 15:37:57 +0800116_board_cmd_arg = CmdArg(
117 '--board', metavar='BOARD',
118 default=None, help='Board name to test.')
119
Tammo Spalink8fab5312012-05-28 18:33:30 +0800120_hwdb_path_cmd_arg = CmdArg(
121 '--hwdb_path', metavar='PATH',
Ricky Liangeede7922013-06-19 10:18:41 +0800122 default=common.DEFAULT_HWID_DATA_PATH,
Tammo Spalink8fab5312012-05-28 18:33:30 +0800123 help='Path to the HWID database.')
124
Tammo Spalink95c43732012-07-25 15:57:14 -0700125_hwid_status_list_cmd_arg = CmdArg(
Hung-Te Lin56b18402015-01-16 14:52:30 +0800126 '--status', nargs='*', default=['supported'],
127 help='allow only HWIDs with these status values')
Tammo Spalink95c43732012-07-25 15:57:14 -0700128
Jon Salzce124fb2012-10-02 17:42:03 +0800129_probe_results_cmd_arg = CmdArg(
130 '--probe_results', metavar='RESULTS.yaml',
Ricky Liangc662be32013-12-24 11:50:23 +0800131 help=('Output from "gooftool probe --include_vpd" (used instead of '
Jon Salzce124fb2012-10-02 17:42:03 +0800132 'probing this system).'))
133
Ricky Liang53390232013-03-08 15:37:57 +0800134_device_info_cmd_arg = CmdArg(
Ricky Liangf89f73a2013-03-19 05:00:24 +0800135 '--device_info', metavar='DEVICE_INFO.yaml', default=None,
Ricky Liang53390232013-03-08 15:37:57 +0800136 help='A dict of device info to use instead of fetching from shopfllor '
137 'server.')
138
Jon Salzce124fb2012-10-02 17:42:03 +0800139_hwid_cmd_arg = CmdArg(
140 '--hwid', metavar='HWID',
Ricky Lianga70a1202013-03-15 15:03:17 +0800141 help='HWID to verify (instead of the currently set HWID of this system).')
Jon Salzce124fb2012-10-02 17:42:03 +0800142
Bernie Thompson3c11c872013-07-22 18:22:45 -0700143_rma_mode_cmd_arg = CmdArg(
144 '--rma_mode', action='store_true',
145 help='Enable RMA mode, do not check for deprecated components.')
Tammo Spalink95c43732012-07-25 15:57:14 -0700146
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800147_cros_core_cmd_arg = CmdArg(
148 '--cros_core', action='store_true',
149 help='Finalize for ChromeOS Core devices (may add or remove few test '
150 'items. For example, branding verification or firmware bitmap '
151 'locale settings).')
152
bowgotsai13820f42015-09-10 23:18:04 +0800153_enforced_release_channels_cmd_arg = CmdArg(
154 '--enforced_release_channels', nargs='*', default=None,
155 help='Enforced release image channels.')
156
Hung-Te Lincdb96522016-04-15 16:51:10 +0800157_release_rootfs_cmd_arg = CmdArg(
158 '--release_rootfs', help='Location of release image rootfs partition.')
159
160_firmware_path_cmd_arg = CmdArg(
161 '--firmware_path', help='Location of firmware image partition.')
Ricky Liang43b879b2014-02-24 11:36:55 +0800162
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800163_cutoff_args_cmd_arg = CmdArg(
164 '--cutoff_args',
165 help='Battery cutoff arguments to be passed to battery_cutoff.sh '
166 'after wiping. Should be the following format: '
167 '[--method shutdown|reboot|battery_cutoff] '
168 '[--check-ac connect_ac|remove_ac] '
169 '[--min-battery-percent <minimum battery percentage>] '
170 '[--max-battery-percent <maximum battery percentage>] '
171 '[--min-battery-voltage <minimum battery voltage>] '
172 '[--max-battery-voltage <maximum battery voltage>]')
173
174_shopfloor_url_args_cmd_arg = CmdArg(
175 '--shopfloor_url',
Earl Ou51182222016-09-09 12:16:48 +0800176 help='Shopfloor server url to be informed when wiping is done. '
177 'After wiping, a XML-RPC request will be sent to the '
178 'given url to indicate the completion of wiping.')
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800179
180_station_ip_cmd_arg = CmdArg(
181 '--station_ip',
182 help='IP of remote station')
183
184_station_port_cmd_arg = CmdArg(
185 '--station_port',
186 help='Port on remote station')
187
188_wipe_finish_token_cmd_arg = CmdArg(
189 '--wipe_finish_token',
190 help='Required token when notifying station after wipe finished')
191
Ting Shen18a06382016-08-30 16:18:21 +0800192_waive_list_cmd_arg = CmdArg(
193 '--waive_list', nargs='*', default=[], metavar='SUBCMD',
194 help='A list of waived checks, serperated by whitespace.'
195 'Each item should be a sub-command of gooftool.'
196 'e.g. "gooftool verify --waive_list verify_tpm clear_gbb_flags".')
197
Tammo Spalink8fab5312012-05-28 18:33:30 +0800198
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800199@Command('probe',
200 CmdArg('--comps', nargs='*',
201 help='List of keys from the component_db registry.'),
Ricky Liangb30da672013-06-14 12:36:34 +0800202 CmdArg('--fast_fw_probe', action='store_true',
203 help='Do a fast probe for EC and main firmware versions only. '
204 'This implies --no_vol and --no_ic.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800205 CmdArg('--no_vol', action='store_true',
206 help='Do not probe volatile data.'),
207 CmdArg('--no_ic', action='store_true',
Jon Salz0f8a6842012-09-25 11:28:22 +0800208 help='Do not probe initial_config data.'),
209 CmdArg('--include_vpd', action='store_true',
210 help='Include VPD data in volatiles.'))
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800211def RunProbe(options):
212 """Print yaml-formatted breakdown of probed device properties."""
Ricky Lianga70a1202013-03-15 15:03:17 +0800213 print GetGooftool(options).Probe(
214 target_comp_classes=options.comps,
Ricky Liangb30da672013-06-14 12:36:34 +0800215 fast_fw_probe=options.fast_fw_probe,
Ricky Lianga70a1202013-03-15 15:03:17 +0800216 probe_volatile=not options.no_vol,
217 probe_initial_config=not options.no_ic,
218 probe_vpd=options.include_vpd).Encode()
Ricky Liang53390232013-03-08 15:37:57 +0800219
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800220
Tammo Spalink214caf42012-05-28 10:45:00 +0800221@Command('verify_components',
222 _hwdb_path_cmd_arg,
Tammo Spalink5c699832012-07-03 17:50:39 +0800223 CmdArg('target_comps', nargs='*'))
Tammo Spalink214caf42012-05-28 10:45:00 +0800224def VerifyComponents(options):
Andy Cheng8ece7382012-08-22 16:25:42 +0800225 """Verify that probeable components all match entries in the component_db.
Tammo Spalink214caf42012-05-28 10:45:00 +0800226
Tammo Spalink5c699832012-07-03 17:50:39 +0800227 Probe for each component class in the target_comps and verify
Tammo Spalink214caf42012-05-28 10:45:00 +0800228 that a corresponding match exists in the component_db -- make sure
229 that these components are present, that they have been approved, but
230 do not check against any specific BOM/HWID configurations.
231 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800232
Andy Chengc531e2f2012-10-15 19:09:17 +0800233 try:
Ricky Lianga70a1202013-03-15 15:03:17 +0800234 result = GetGooftool(options).VerifyComponents(
Andy Chengc531e2f2012-10-15 19:09:17 +0800235 options.target_comps)
236 except ValueError, e:
237 sys.exit(e)
238
Ricky Liang53390232013-03-08 15:37:57 +0800239 PrintVerifyComponentsResults(result)
240
241
242def PrintVerifyComponentsResults(result):
243 """Prints out the results of VerifyComponents method call.
244
245 Groups the results into two groups: 'matches' and 'errors', and prints out
246 their values.
247 """
Andy Chengc531e2f2012-10-15 19:09:17 +0800248 # group by matches and errors
Tammo Spalink214caf42012-05-28 10:45:00 +0800249 matches = []
Andy Chengc531e2f2012-10-15 19:09:17 +0800250 errors = []
251 for result_list in result.values():
252 for component_name, _, error in result_list:
253 if component_name:
254 matches.append(component_name)
Tammo Spalink214caf42012-05-28 10:45:00 +0800255 else:
Andy Chengc531e2f2012-10-15 19:09:17 +0800256 errors.append(error)
257
Andy Cheng228a8c92012-08-27 10:53:57 +0800258 if matches:
259 print 'found probeable components:\n %s' % '\n '.join(matches)
Tammo Spalink214caf42012-05-28 10:45:00 +0800260 if errors:
Andy Cheng228a8c92012-08-27 10:53:57 +0800261 print '\nerrors:\n %s' % '\n '.join(errors)
262 sys.exit('\ncomponent verification FAILURE')
Tammo Spalink214caf42012-05-28 10:45:00 +0800263 else:
Hung-Te Lin56b18402015-01-16 14:52:30 +0800264 print '\ncomponent verification SUCCESS'
Tammo Spalink214caf42012-05-28 10:45:00 +0800265
266
Hung-Te Line1d80f62016-03-31 14:58:13 +0800267@Command('verify_keys',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800268 _release_rootfs_cmd_arg,
269 _firmware_path_cmd_arg)
Tammo Spalink01e11722012-07-24 10:17:54 -0700270def VerifyKeys(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800271 """Verify keys in firmware and SSD match."""
Hung-Te Line1d80f62016-03-31 14:58:13 +0800272 return GetGooftool(options).VerifyKeys(
Hung-Te Lincdb96522016-04-15 16:51:10 +0800273 options.release_rootfs, options.firmware_path)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800274
275
276@Command('set_fw_bitmap_locale')
Tammo Spalink01e11722012-07-24 10:17:54 -0700277def SetFirmwareBitmapLocale(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800278 """Use VPD locale value to set firmware bitmap default language."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800279
Ricky Lianga70a1202013-03-15 15:03:17 +0800280 (index, locale) = GetGooftool(options).SetFirmwareBitmapLocale()
Andy Cheng2582d292012-12-04 17:38:28 +0800281 logging.info('Firmware bitmap initial locale set to %d (%s).',
282 index, locale)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800283
284
Hung-Te Line1d80f62016-03-31 14:58:13 +0800285@Command('verify_system_time',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800286 _release_rootfs_cmd_arg)
Tammo Spalink01e11722012-07-24 10:17:54 -0700287def VerifySystemTime(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800288 """Verify system time is later than release filesystem creation time."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800289
Hung-Te Lincdb96522016-04-15 16:51:10 +0800290 return GetGooftool(options).VerifySystemTime(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800291
292
Hung-Te Line1d80f62016-03-31 14:58:13 +0800293@Command('verify_rootfs',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800294 _release_rootfs_cmd_arg)
Tammo Spalink01e11722012-07-24 10:17:54 -0700295def VerifyRootFs(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800296 """Verify rootfs on SSD is valid by checking hash."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800297
Hung-Te Line1d80f62016-03-31 14:58:13 +0800298 return GetGooftool(options).VerifyRootFs(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800299
Hung-Te Lin56b18402015-01-16 14:52:30 +0800300
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800301@Command('verify_tpm')
302def VerifyTPM(options): # pylint: disable=W0613
303 """Verify TPM is cleared."""
304
305 return GetGooftool(options).VerifyTPM()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800306
Hung-Te Lin56b18402015-01-16 14:52:30 +0800307
Hung-Te Lindd708d42014-07-11 17:05:01 +0800308@Command('verify_me_locked')
309def VerifyManagementEngineLocked(options): # pylint: disable=W0613
310 """Verify Managment Engine is locked."""
311
312 return GetGooftool(options).VerifyManagementEngineLocked()
313
Hung-Te Lin56b18402015-01-16 14:52:30 +0800314
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800315@Command('verify_switch_wp')
Andy Chengc92e6f92012-11-20 16:55:53 +0800316def VerifyWPSwitch(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800317 """Verify hardware write protection switch is enabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800318
Ricky Lianga70a1202013-03-15 15:03:17 +0800319 GetGooftool(options).VerifyWPSwitch()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800320
321
322@Command('verify_switch_dev')
Tammo Spalink01e11722012-07-24 10:17:54 -0700323def VerifyDevSwitch(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800324 """Verify developer switch is disabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800325
Ricky Lianga70a1202013-03-15 15:03:17 +0800326 if GetGooftool(options).CheckDevSwitchForDisabling():
Hung-Te Lind7d34722012-07-26 16:48:35 +0800327 logging.warn('VerifyDevSwitch: No physical switch.')
Andy Cheng0465d132013-03-20 12:12:06 +0800328 event_log.Log('switch_dev', type='virtual switch')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800329
330
Jon Salzadd90d32014-04-29 16:16:27 +0800331@Command('verify_branding')
332def VerifyBranding(options): # pylint: disable=W0613
333 """Verify that branding fields are properly set.
334
335 customization_id, if set in the RO VPD, must be of the correct format.
336
337 rlz_brand_code must be set either in the RO VPD or OEM partition, and must
338 be of the correct format.
339 """
340 return GetGooftool(options).VerifyBranding()
341
342
bowgotsai13820f42015-09-10 23:18:04 +0800343@Command('verify_release_channel',
344 _enforced_release_channels_cmd_arg)
bowgotsai529139c2015-05-30 01:39:49 +0800345def VerifyReleaseChannel(options): # pylint: disable=W0613
346 """Verify that release image channel is correct.
347
348 ChromeOS has four channels: canary, dev, beta and stable.
349 The last three channels support image auto-updates, checks
350 that release image channel is one of them.
351 """
bowgotsai13820f42015-09-10 23:18:04 +0800352 return GetGooftool(options).VerifyReleaseChannel(
353 options.enforced_release_channels)
bowgotsai529139c2015-05-30 01:39:49 +0800354
355
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800356@Command('write_protect')
Tammo Spalink01e11722012-07-24 10:17:54 -0700357def EnableFwWp(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800358 """Enable then verify firmware write protection."""
359
Hung-Te Linb21c6682012-08-01 13:53:57 +0800360 def CalculateLegacyRange(fw_type, length, section_data,
361 section_name):
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800362 ro_size = length / 2
363 ro_a = int(section_data[0] / ro_size)
364 ro_b = int((section_data[0] + section_data[1] - 1) / ro_size)
365 if ro_a != ro_b:
Hung-Te Lin56b18402015-01-16 14:52:30 +0800366 raise Error('%s firmware section %s has illegal size' %
Hung-Te Linb21c6682012-08-01 13:53:57 +0800367 (fw_type, section_name))
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800368 ro_offset = ro_a * ro_size
369 return (ro_offset, ro_size)
370
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800371 def WriteProtect(fw_file_path, fw_type, legacy_section=None):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800372 """Calculate protection size, then invoke flashrom.
373
374 Our supported chips only allow write protecting half their total
375 size, so we parition the flash chipset space accordingly.
376 """
377 raw_image = open(fw_file_path, 'rb').read()
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800378 wp_section = 'WP_RO'
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800379 image = crosfw.FirmwareImage(raw_image)
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800380 if image.has_section(wp_section):
381 section_data = image.get_section_area(wp_section)
382 ro_offset = section_data[0]
383 ro_size = section_data[1]
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800384 elif legacy_section is not None and image.has_section(legacy_section):
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800385 section_data = image.get_section_area(legacy_section)
386 (ro_offset, ro_size) = CalculateLegacyRange(
Hung-Te Linb21c6682012-08-01 13:53:57 +0800387 fw_type, len(raw_image), section_data, legacy_section)
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800388 else:
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800389 raise Error('Could not find %s firmware section: %s %s' %
390 (fw_type, wp_section, legacy_section or ''))
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800391
392 logging.debug('write protecting %s [off=%x size=%x]', fw_type,
393 ro_offset, ro_size)
394 crosfw.Flashrom(fw_type).EnableWriteProtection(ro_offset, ro_size)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800395
396 WriteProtect(crosfw.LoadMainFirmware().GetFileName(), 'main', 'RO_SECTION')
Andy Cheng0465d132013-03-20 12:12:06 +0800397 event_log.Log('wp', fw='main')
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800398
399 # Some EC (mostly PD) does not support "RO NOW". Instead they will only set
400 # "RO_AT_BOOT" when you request to enable RO (These platforms consider
401 # --wp-range with right range identical to --wp-enable), and requires a
402 # 'ectool reboot_ec RO at-shutdown; reboot' to let the RO take effect.
403 # After reboot, "flashrom --wp-status" will return right protected range.
404 # If you don't reboot, returned range will be (0, 0), and running command
405 # "ectool flashprotect" will not have RO_NOW.
406
407 targets = [
408 ('EC', crosfw.TARGET_EC, crosfw.LoadEcFirmware, 'EC_RO'),
409 ('PD', crosfw.TARGET_PD, crosfw.LoadPDFirmware, None)]
410 for (name, fw_type, provider, legacy_section) in targets:
411 fw_file = provider().GetFileName()
412 if fw_file is None:
413 logging.warning('%s not write protected (seems there is no %s flash).',
414 name, name)
415 continue
416 WriteProtect(fw_file, fw_type, legacy_section)
417 event_log.Log('wp', fw=fw_type)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800418
419
420@Command('clear_gbb_flags')
Andy Chengc92e6f92012-11-20 16:55:53 +0800421def ClearGBBFlags(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800422 """Zero out the GBB flags, in preparation for transition to release state.
423
424 No GBB flags are set in release/shipping state, but they are useful
425 for factory/development. See "gbb_utility --flags" for details.
426 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800427
Ricky Lianga70a1202013-03-15 15:03:17 +0800428 GetGooftool(options).ClearGBBFlags()
Andy Cheng0465d132013-03-20 12:12:06 +0800429 event_log.Log('clear_gbb_flags')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800430
431
Jon Salzaa3a30e2013-05-15 15:56:28 +0800432@Command('clear_factory_vpd_entries')
433def ClearFactoryVPDEntries(options): # pylint: disable=W0613
434 """Clears factory.* items in the RW VPD."""
435 entries = GetGooftool(options).ClearFactoryVPDEntries()
436 event_log.Log('clear_factory_vpd_entries', entries=FilterDict(entries))
437
438
Mattias Nisslercca761b2015-04-15 21:53:04 +0200439@Command('generate_stable_device_secret')
440def GenerateStableDeviceSecret(options): # pylint: disable=W0613
441 """Generates a a fresh stable device secret and stores it in the RO VPD."""
442 GetGooftool(options).GenerateStableDeviceSecret()
443 event_log.Log('generate_stable_device_secret')
444
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800445
Earl Ou564a7872016-10-05 10:22:00 +0800446@Command('enable_release_partition',
447 CmdArg('--release_rootfs',
448 help=('path to the release rootfs device. If not specified, '
449 'the default (5th) partition will be used.')))
450def EnableReleasePartition(options):
451 """Enables a release image partition on the disk."""
452 GetGooftool(options).EnableReleasePartition(options.release_rootfs)
453
454
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800455@Command('wipe_in_place',
456 CmdArg('--fast', action='store_true',
Shun-Hsing Ou8d3c40a2015-10-08 18:16:08 +0800457 help='use non-secure but faster wipe method.'),
Shun-Hsing Oudb407d62015-11-11 11:03:59 +0800458 _cutoff_args_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800459 _shopfloor_url_args_cmd_arg,
460 _station_ip_cmd_arg,
461 _station_port_cmd_arg,
462 _wipe_finish_token_cmd_arg)
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800463def WipeInPlace(options):
464 """Start factory wipe directly without reboot."""
465
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800466 GetGooftool(options).WipeInPlace(options.fast,
467 options.cutoff_args,
468 options.shopfloor_url,
469 options.station_ip,
470 options.station_port,
471 options.wipe_finish_token)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200472
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800473@Command('wipe_init',
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800474 CmdArg('--wipe_args', help='arguments for clobber-state'),
475 CmdArg('--state_dev', help='path to stateful partition device'),
476 CmdArg('--root_disk', help='path to primary device'),
477 CmdArg('--old_root', help='path to old root'),
478 _cutoff_args_cmd_arg,
479 _shopfloor_url_args_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800480 _release_rootfs_cmd_arg,
481 _station_ip_cmd_arg,
482 _station_port_cmd_arg,
483 _wipe_finish_token_cmd_arg)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800484def WipeInit(options):
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800485 GetGooftool(options).WipeInit(options.wipe_args,
486 options.cutoff_args,
487 options.shopfloor_url,
488 options.state_dev,
489 options.release_rootfs,
490 options.root_disk,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800491 options.old_root,
492 options.station_ip,
493 options.station_port,
494 options.wipe_finish_token)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800495
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800496@Command('verify',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800497 CmdArg('--no_write_protect', action='store_true',
498 help='Do not check write protection switch state.'),
Tammo Spalink95c43732012-07-25 15:57:14 -0700499 _hwid_status_list_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800500 _hwdb_path_cmd_arg,
Ricky Lianga70a1202013-03-15 15:03:17 +0800501 _board_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800502 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800503 _hwid_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800504 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800505 _cros_core_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800506 _release_rootfs_cmd_arg,
507 _firmware_path_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800508 _enforced_release_channels_cmd_arg,
509 _waive_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800510def Verify(options):
511 """Verifies if whole factory process is ready for finalization.
512
513 This routine performs all the necessary checks to make sure the
514 device is ready to be finalized, but does not modify state. These
515 checks include dev switch, firmware write protection switch, hwid,
516 system time, keys, and root file system.
517 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800518
Hung-Te Lin6d827542012-07-19 11:50:41 +0800519 if not options.no_write_protect:
Ricky Lianga70a1202013-03-15 15:03:17 +0800520 VerifyWPSwitch(options)
Hung-Te Lindd708d42014-07-11 17:05:01 +0800521 VerifyManagementEngineLocked(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800522 VerifyDevSwitch(options)
Ting Shen129fa6f2016-09-02 12:22:24 +0800523 VerifyHWID(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800524 VerifySystemTime(options)
525 VerifyKeys(options)
526 VerifyRootFs(options)
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800527 VerifyTPM(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800528 if options.cros_core:
529 logging.info('VerifyBranding is skipped for ChromeOS Core device.')
530 else:
531 VerifyBranding(options)
bowgotsai529139c2015-05-30 01:39:49 +0800532 VerifyReleaseChannel(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800533
Hung-Te Lin56b18402015-01-16 14:52:30 +0800534
Jon Salzfe9036f2014-01-16 14:11:23 +0800535@Command('untar_stateful_files')
Hung-Te Lin388bce22014-06-03 19:56:40 +0800536def UntarStatefulFiles(unused_options):
Jon Salzfe9036f2014-01-16 14:11:23 +0800537 """Untars stateful files from stateful_files.tar.xz on stateful partition.
538
539 If that file does not exist (which should only be R30 and earlier),
540 this is a no-op.
541 """
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800542 # Path to stateful partition on device.
543 device_stateful_path = '/mnt/stateful_partition'
544 tar_file = os.path.join(device_stateful_path, 'stateful_files.tar.xz')
Jon Salzfe9036f2014-01-16 14:11:23 +0800545 if os.path.exists(tar_file):
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800546 Spawn(['tar', 'xf', tar_file], cwd=device_stateful_path,
Jon Salzfe9036f2014-01-16 14:11:23 +0800547 log=True, check_call=True)
548 else:
549 logging.warning('No stateful files at %s', tar_file)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800550
Jon Salz40b9f822014-07-25 16:39:55 +0800551
552@Command('log_source_hashes')
553def LogSourceHashes(options): # pylint: disable=W0613
554 """Logs hashes of source files in the factory toolkit."""
Jon Salze60307f2014-08-05 16:20:00 +0800555 # WARNING: The following line is necessary to validate the integrity
556 # of the factory software. Do not remove or modify it.
557 #
558 # 警告:此行会验证工厂软件的完整性,禁止删除或修改。
Wei-Han Chena5c01a02016-04-23 19:27:19 +0800559 factory_par = sys_utils.GetRunningFactoryPythonArchivePath()
560 if factory_par:
561 event_log.Log(
562 'source_hashes',
563 **file_utils.HashPythonArchive(factory_par))
564 else:
565 event_log.Log(
566 'source_hashes',
567 **file_utils.HashSourceTree(os.path.join(paths.FACTORY_PATH, 'py')))
Jon Salz40b9f822014-07-25 16:39:55 +0800568
569
Tammo Spalink86a61c62012-05-25 15:10:35 +0800570@Command('log_system_details')
Tammo Spalink01e11722012-07-24 10:17:54 -0700571def LogSystemDetails(options): # pylint: disable=W0613
Tammo Spalink86a61c62012-05-25 15:10:35 +0800572 """Write miscellaneous system details to the event log."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800573
Ricky Liang43b879b2014-02-24 11:36:55 +0800574 event_log.Log('system_details', **GetGooftool(options).GetSystemDetails())
Tammo Spalink86a61c62012-05-25 15:10:35 +0800575
576
Jon Salza88b83b2013-05-27 20:00:35 +0800577def CreateReportArchiveBlob(*args, **kwargs):
578 """Creates a report archive and returns it as a blob.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800579
Jon Salza88b83b2013-05-27 20:00:35 +0800580 Args:
581 See CreateReportArchive.
Andy Cheng7a76cb82012-11-19 18:08:19 +0800582
Jon Salza88b83b2013-05-27 20:00:35 +0800583 Returns:
584 An xmlrpclib.Binary object containing a .tar.xz file.
585 """
Wei-Han Chen47416612016-09-14 17:41:52 +0800586 report_archive = CreateReportArchive(*args, **kwargs)
587 try:
588 with open(report_archive) as f:
589 return xmlrpclib.Binary(f.read())
590 finally:
591 os.unlink(report_archive)
Jon Salza88b83b2013-05-27 20:00:35 +0800592
593
594def CreateReportArchive(device_sn=None, add_file=None):
595 """Creates a report archive in a temporary directory.
596
597 Args:
598 device_sn: The device serial number (optional).
599 add_file: A list of files to add (optional).
600
601 Returns:
602 Path to the archive.
603 """
Hung-Te Lin6bd16472012-06-20 16:26:47 +0800604 def NormalizeAsFileName(token):
605 return re.sub(r'\W+', '', token).strip()
Jon Salza88b83b2013-05-27 20:00:35 +0800606
607 target_name = '%s%s.tar.xz' % (
608 time.strftime('%Y%m%dT%H%M%SZ',
609 time.gmtime()),
Hung-Te Lin56b18402015-01-16 14:52:30 +0800610 ('' if device_sn is None else
611 '_' + NormalizeAsFileName(device_sn)))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800612 target_path = os.path.join(gettempdir(), target_name)
Jon Salza88b83b2013-05-27 20:00:35 +0800613
Tammo Spalink86a61c62012-05-25 15:10:35 +0800614 # Intentionally ignoring dotfiles in EVENT_LOG_DIR.
Andy Cheng0465d132013-03-20 12:12:06 +0800615 tar_cmd = 'cd %s ; tar cJf %s *' % (event_log.EVENT_LOG_DIR, target_path)
Joel Kitching4b1b6c02016-05-10 14:34:30 +0800616 tar_cmd += ' --add-file %s' % paths.GetFactoryLogPath()
Jon Salza88b83b2013-05-27 20:00:35 +0800617 if add_file:
618 for f in add_file:
Jon Salz65266432012-07-30 19:02:49 +0800619 # Require absolute paths since the tar command may change the
620 # directory.
621 if not f.startswith('/'):
622 raise Error('Not an absolute path: %s' % f)
623 if not os.path.exists(f):
624 raise Error('File does not exist: %s' % f)
625 tar_cmd += ' --add-file %s' % pipes.quote(f)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800626 cmd_result = Shell(tar_cmd)
Jon Salzff88c022012-11-03 12:19:58 +0800627
628 if ((cmd_result.status == 1) and
629 all((x == '' or
630 'file changed as we read it' in x or
631 "Removing leading `/' from member names" in x)
632 for x in cmd_result.stderr.split('\n'))):
633 # That's OK. Make sure it's valid though.
Vic Yang85199e72013-01-28 14:33:11 +0800634 Spawn(['tar', 'tfJ', target_path], check_call=True, log=True,
Jon Salzff88c022012-11-03 12:19:58 +0800635 ignore_stdout=True)
636 elif not cmd_result.success:
Tammo Spalink86a61c62012-05-25 15:10:35 +0800637 raise Error('unable to tar event logs, cmd %r failed, stderr: %r' %
638 (tar_cmd, cmd_result.stderr))
Jon Salzff88c022012-11-03 12:19:58 +0800639
Jon Salza88b83b2013-05-27 20:00:35 +0800640 return target_path
641
642_upload_method_cmd_arg = CmdArg(
643 '--upload_method', metavar='METHOD:PARAM',
644 help=('How to perform the upload. METHOD should be one of '
645 '{ftp, shopfloor, ftps, cpfe}.'))
646_add_file_cmd_arg = CmdArg(
647 '--add_file', metavar='FILE', action='append',
648 help='Extra file to include in report (must be an absolute path)')
649
Hung-Te Lin56b18402015-01-16 14:52:30 +0800650
Jon Salza88b83b2013-05-27 20:00:35 +0800651@Command('upload_report',
652 _upload_method_cmd_arg,
653 _add_file_cmd_arg)
654def UploadReport(options):
655 """Create a report containing key device details."""
Hung-Te Lin74346d72016-01-07 22:16:57 +0800656 ro_vpd = ReadRoVpd()
Jon Salza88b83b2013-05-27 20:00:35 +0800657 device_sn = ro_vpd.get('serial_number', None)
658 if device_sn is None:
659 logging.warning('RO_VPD missing device serial number')
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +0800660 device_sn = 'MISSING_SN_' + time_utils.TimedUUID()
Jon Salza88b83b2013-05-27 20:00:35 +0800661 target_path = CreateReportArchive(device_sn)
662
Tammo Spalink86a61c62012-05-25 15:10:35 +0800663 if options.upload_method is None or options.upload_method == 'none':
664 logging.warning('REPORT UPLOAD SKIPPED (report left at %s)', target_path)
665 return
666 method, param = options.upload_method.split(':', 1)
667 if method == 'shopfloor':
668 report_upload.ShopFloorUpload(target_path, param)
669 elif method == 'ftp':
Jay Kim360c1dd2012-06-25 10:58:11 -0700670 report_upload.FtpUpload(target_path, 'ftp:' + param)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800671 elif method == 'ftps':
672 report_upload.CurlUrlUpload(target_path, '--ftp-ssl-reqd ftp:%s' % param)
673 elif method == 'cpfe':
Shawn Nematbakhsh3404a092013-01-28 16:49:09 -0800674 report_upload.CpfeUpload(target_path, pipes.quote(param))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800675 else:
676 raise Error('unknown report upload method %r', method)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800677
678
679@Command('finalize',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800680 CmdArg('--no_write_protect', action='store_true',
681 help='Do not enable firmware write protection.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800682 CmdArg('--fast', action='store_true',
683 help='use non-secure but faster wipe method.'),
Shun-Hsing Ou8d3c40a2015-10-08 18:16:08 +0800684 _cutoff_args_cmd_arg,
Shun-Hsing Oudb407d62015-11-11 11:03:59 +0800685 _shopfloor_url_args_cmd_arg,
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800686 _hwdb_path_cmd_arg,
Tammo Spalink95c43732012-07-25 15:57:14 -0700687 _hwid_status_list_cmd_arg,
Jon Salz65266432012-07-30 19:02:49 +0800688 _upload_method_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800689 _add_file_cmd_arg,
Ricky Lianga70a1202013-03-15 15:03:17 +0800690 _board_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800691 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800692 _hwid_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800693 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800694 _cros_core_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800695 _release_rootfs_cmd_arg,
696 _firmware_path_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800697 _enforced_release_channels_cmd_arg,
698 _station_ip_cmd_arg,
699 _station_port_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800700 _wipe_finish_token_cmd_arg,
701 _waive_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800702def Finalize(options):
703 """Verify system readiness and trigger transition into release state.
704
Jon Salzaa3a30e2013-05-15 15:56:28 +0800705 This routine does the following:
706 - Verifies system state (see verify command)
Jon Salzfe9036f2014-01-16 14:11:23 +0800707 - Untars stateful_files.tar.xz, if it exists, in the stateful partition, to
708 initialize files such as the CRX cache
Jon Salzaa3a30e2013-05-15 15:56:28 +0800709 - Modifies firmware bitmaps to match locale
710 - Clears all factory-friendly flags from the GBB
711 - Removes factory-specific entries from RW_VPD (factory.*)
712 - Enables firmware write protection (cannot rollback after this)
713 - Uploads system logs & reports
Earl Ou51182222016-09-09 12:16:48 +0800714 - Wipes the testing kernel, rootfs, and stateful partition
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800715 """
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800716 Verify(options)
Jon Salz40b9f822014-07-25 16:39:55 +0800717 LogSourceHashes(options)
Jon Salzfe9036f2014-01-16 14:11:23 +0800718 UntarStatefulFiles(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800719 if options.cros_core:
720 logging.info('SetFirmwareBitmapLocale is skipped for ChromeOS Core device.')
721 else:
722 SetFirmwareBitmapLocale(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800723 ClearGBBFlags(options)
Jon Salzaa3a30e2013-05-15 15:56:28 +0800724 ClearFactoryVPDEntries(options)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200725 GenerateStableDeviceSecret(options)
Hung-Te Lin6d827542012-07-19 11:50:41 +0800726 if options.no_write_protect:
727 logging.warn('WARNING: Firmware Write Protection is SKIPPED.')
Andy Cheng0465d132013-03-20 12:12:06 +0800728 event_log.Log('wp', fw='both', status='skipped')
Hung-Te Lin6d827542012-07-19 11:50:41 +0800729 else:
Wei-Han Chenba21f512016-10-14 18:52:33 +0800730 EnableFwWp(options)
Jon Salza0f58e02012-05-29 19:33:39 +0800731 LogSystemDetails(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800732 UploadReport(options)
Earl Ou51182222016-09-09 12:16:48 +0800733
734 event_log.Log('wipe_in_place')
735 wipe_args = []
736 if options.cutoff_args:
737 wipe_args += ['--cutoff_args', options.cutoff_args]
738 if options.shopfloor_url:
739 wipe_args += ['--shopfloor_url', options.shopfloor_url]
740 if options.fast:
741 wipe_args += ['--fast']
742 if options.station_ip:
743 wipe_args += ['--station_ip', options.station_ip]
744 if options.station_port:
745 wipe_args += ['--station_port', options.station_port]
746 if options.wipe_finish_token:
747 wipe_args += ['--wipe_finish_token', options.wipe_finish_token]
748 ExecFactoryPar('gooftool', 'wipe_in_place', *wipe_args)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800749
750
Ting Shen129fa6f2016-09-02 12:22:24 +0800751@Command('verify_hwid',
752 _probe_results_cmd_arg,
753 _hwdb_path_cmd_arg,
754 _hwid_cmd_arg,
755 _rma_mode_cmd_arg)
756def VerifyHWID(options):
Ricky Liangc662be32013-12-24 11:50:23 +0800757 """A simple wrapper that calls out to HWID utils to verify version 3 HWID.
Ricky Liang53390232013-03-08 15:37:57 +0800758
Ricky Liangc662be32013-12-24 11:50:23 +0800759 This is mainly for Gooftool to verify v3 HWID during finalize. For testing
760 and development purposes, please use `hwid` command.
Ricky Liang53390232013-03-08 15:37:57 +0800761 """
Ricky Liangc662be32013-12-24 11:50:23 +0800762 db = GetGooftool(options).db
763 encoded_string = options.hwid or hwid_utils.GetHWIDString()
Ricky Liang7905f272013-03-16 01:57:10 +0800764 if options.probe_results:
Ricky Liangc662be32013-12-24 11:50:23 +0800765 probed_results = yaml.load(open(options.probe_results).read())
Ricky Liang7905f272013-03-16 01:57:10 +0800766 else:
Ricky Liangc662be32013-12-24 11:50:23 +0800767 probed_results = yaml.load(Probe(probe_vpd=True).Encode())
768 vpd = hwid_utils.GetVPD(probed_results)
Ricky Liang53390232013-03-08 15:37:57 +0800769
Hung-Te Lin11052952015-03-18 13:48:59 +0800770 event_log.Log('probed_results', probed_results=FilterDict(probed_results))
771 event_log.Log('vpd', vpd=FilterDict(vpd))
Ricky Liang53390232013-03-08 15:37:57 +0800772
Ricky Liangc662be32013-12-24 11:50:23 +0800773 hwid_utils.VerifyHWID(db, encoded_string, probed_results, vpd,
Hung-Te Lin56b18402015-01-16 14:52:30 +0800774 rma_mode=options.rma_mode)
Ricky Liang53390232013-03-08 15:37:57 +0800775
Ricky Liangc662be32013-12-24 11:50:23 +0800776 event_log.Log('verified_hwid', hwid=encoded_string)
Ricky Liang53390232013-03-08 15:37:57 +0800777
778
Ricky Liang59611a62013-06-11 13:47:33 +0800779def ParseDecodedHWID(hwid):
780 """Parse the HWID object into a more compact dict.
781
782 Args:
783 hwid: A decoded HWID object.
784
785 Returns:
786 A dict containing the board name, the binary string, and the list of
787 components.
788 """
789 results = {}
790 results['board'] = hwid.database.board
791 results['binary_string'] = hwid.binary_string
792 results['components'] = collections.defaultdict(list)
793 components = hwid.bom.components
794 for comp_cls in sorted(components):
795 for (comp_name, probed_values, _) in sorted(components[comp_cls]):
796 if not probed_values:
797 db_components = hwid.database.components
798 probed_values = db_components.GetComponentAttributes(
799 comp_cls, comp_name).get('values')
800 results['components'][comp_cls].append(
801 {comp_name: probed_values if probed_values else None})
802 # Convert defaultdict to dict.
803 results['components'] = dict(results['components'])
804 return results
805
806
henryhsu44d793a2013-07-20 00:07:38 +0800807@Command('get_firmware_hash',
808 CmdArg('--file', metavar='FILE', help='Firmware File.'))
809def GetFirmwareHash(options):
henryhsuf6f835c2013-07-20 20:49:25 +0800810 """Get firmware hash from a file"""
henryhsu44d793a2013-07-20 00:07:38 +0800811 if os.path.exists(options.file):
812 hashes = CalculateFirmwareHashes(options.file)
813 for section, value_dict in hashes.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800814 print '%s:' % section
henryhsu44d793a2013-07-20 00:07:38 +0800815 for key, value in value_dict.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800816 print ' %s: %s' % (key, value)
henryhsu44d793a2013-07-20 00:07:38 +0800817 else:
818 raise Error('File does not exist: %s' % options.file)
819
henryhsuf6f835c2013-07-20 20:49:25 +0800820
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800821def Main():
822 """Run sub-command specified by the command line args."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800823
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800824 options = ParseCmdline(
Ting Shen129fa6f2016-09-02 12:22:24 +0800825 'Perform Google required factory tests.',
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800826 CmdArg('-l', '--log', metavar='PATH',
827 help='Write logs to this file.'),
Jon Salza4bea382012-10-29 13:00:34 +0800828 CmdArg('--suppress-event-logs', action='store_true',
829 help='Suppress event logging.'),
Wei-Han Chenaff56232016-04-16 09:17:59 +0800830 CmdArg('--phase', default=None,
831 help=('override phase for phase checking (defaults to the current '
832 'as returned by the "factory phase" command)')),
Tammo Spalink8fab5312012-05-28 18:33:30 +0800833 verbosity_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800834 SetupLogging(options.verbosity, options.log)
Andy Cheng0465d132013-03-20 12:12:06 +0800835 event_log.SetGlobalLoggerDefaultPrefix('gooftool')
836 event_log.GetGlobalLogger().suppress = options.suppress_event_logs
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800837 logging.debug('gooftool options: %s', repr(options))
Wei-Han Chenaff56232016-04-16 09:17:59 +0800838
839 phase.OverridePhase(options.phase)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800840 try:
841 logging.debug('GOOFTOOL command %r', options.command_name)
842 options.command(options)
843 logging.info('GOOFTOOL command %r SUCCESS', options.command_name)
844 except Error, e:
845 logging.exception(e)
846 sys.exit('GOOFTOOL command %r ERROR: %s' % (options.command_name, e))
847 except Exception, e:
848 logging.exception(e)
849 sys.exit('UNCAUGHT RUNTIME EXCEPTION %s' % e)
850
851
852if __name__ == '__main__':
853 Main()