blob: 06be7721d07c55302a734330469d8040b8133234 [file] [log] [blame]
Mike Frysinger63bb3c72019-09-01 15:16:26 -04001#!/usr/bin/env python2
Jon Salze60307f2014-08-05 16:20:00 +08002# -*- coding: utf-8 -*-
3# Copyright 2014 The Chromium OS Authors. All rights reserved.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08004# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
Jon Salze60307f2014-08-05 16:20:00 +08007
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08008"""Google Factory Tool.
9
You-Cheng Syu461ec032017-03-06 15:56:58 +080010This tool is intended to be used on factory assembly lines. It
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080011provides all of the Google required test functionality and must be run
12on each device as part of the assembly process.
13"""
14
Yilin Yang71e39412019-09-24 09:26:46 +080015from __future__ import print_function
16
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080017import logging
18import os
Jon Salz65266432012-07-30 19:02:49 +080019import pipes
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080020import re
21import sys
Peter Shihfdf17682017-05-26 11:38:39 +080022from tempfile import gettempdir
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080023import threading
Hung-Te Lin6bd16472012-06-20 16:26:47 +080024import time
Jon Salza88b83b2013-05-27 20:00:35 +080025import xmlrpclib
Peter Shihfdf17682017-05-26 11:38:39 +080026
Peter Shihfdf17682017-05-26 11:38:39 +080027import factory_common # pylint: disable=unused-import
Wei-Han Chen0a3320e2016-04-23 01:32:07 +080028from cros.factory.gooftool.common import ExecFactoryPar
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080029from cros.factory.gooftool.common import Shell
Peter Shihfdf17682017-05-26 11:38:39 +080030from cros.factory.gooftool.core import Gooftool
31from cros.factory.gooftool import crosfw
Peter Shihfdf17682017-05-26 11:38:39 +080032from cros.factory.gooftool import report_upload
Yong Hong65bda312018-12-13 20:05:58 +080033from cros.factory.gooftool import vpd
Hung-Te Lin604e0c22015-11-24 15:17:07 +080034from cros.factory.hwid.v3 import hwid_utils
Yong Hong863d3262017-10-30 16:23:34 +080035from cros.factory.probe.functions import chromeos_firmware
Wei-Han Chen2ebb92d2016-01-12 14:51:41 +080036from cros.factory.test.env import paths
Peter Shihfdf17682017-05-26 11:38:39 +080037from cros.factory.test import event_log
Wei-Han Chenaff56232016-04-16 09:17:59 +080038from cros.factory.test.rules import phase
Hung-Te Lin3f096842016-01-13 17:37:06 +080039from cros.factory.test.rules.privacy import FilterDict
Philip Chen6ada02c2019-11-04 19:41:54 +000040from cros.factory.test import state
Peter Shihfdf17682017-05-26 11:38:39 +080041from cros.factory.utils import argparse_utils
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080042from cros.factory.utils.argparse_utils import CmdArg
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080043from cros.factory.utils.argparse_utils import ParseCmdline
Wei-Han Chenb34bdff2019-09-26 13:07:50 +080044from cros.factory.utils.argparse_utils import VERBOSITY_CMD_ARG
Peter Shihfdf17682017-05-26 11:38:39 +080045from cros.factory.utils.debug_utils import SetupLogging
Jon Salz40b9f822014-07-25 16:39:55 +080046from cros.factory.utils import file_utils
Peter Shih67c7c0f2018-02-26 11:23:59 +080047from cros.factory.utils.process_utils import Spawn
Wei-Han Chena5c01a02016-04-23 19:27:19 +080048from cros.factory.utils import sys_utils
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +080049from cros.factory.utils import time_utils
Joel Kitchingd3bc2662014-12-16 16:03:32 -080050from cros.factory.utils.type_utils import Error
Tammo Spalink86a61c62012-05-25 15:10:35 +080051
Tammo Spalink5c699832012-07-03 17:50:39 +080052
Tammo Spalink5c699832012-07-03 17:50:39 +080053# TODO(tammo): Replace calls to sys.exit with raise Exit, and maybe
54# treat that specially (as a smoot exit, as opposed to the more
55# verbose output for generic Error).
56
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080057_global_gooftool = None
58_gooftool_lock = threading.Lock()
Philip Chen04fb90b2019-11-06 12:10:33 -080059_has_fpmcu = None
Tammo Spalink5c699832012-07-03 17:50:39 +080060
Hung-Te Lin56b18402015-01-16 14:52:30 +080061
Ricky Lianga70a1202013-03-15 15:03:17 +080062def GetGooftool(options):
Peter Shihfdf17682017-05-26 11:38:39 +080063 global _global_gooftool # pylint: disable=global-statement
Ricky Lianga70a1202013-03-15 15:03:17 +080064
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080065 if _global_gooftool is None:
66 with _gooftool_lock:
Shen-En Shihc5d15d62017-08-04 13:02:59 +080067 if _global_gooftool is None:
68 project = getattr(options, 'project', None)
69 hwdb_path = getattr(options, 'hwdb_path', None)
70 _global_gooftool = Gooftool(hwid_version=3, project=project,
71 hwdb_path=hwdb_path)
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080072
73 return _global_gooftool
Ricky Lianga70a1202013-03-15 15:03:17 +080074
Philip Chen04fb90b2019-11-06 12:10:33 -080075def HasFpmcu():
76 global _has_fpmcu # pylint: disable=global-statement
77
78 if _has_fpmcu is None:
79 FPMCU_PATH = '/dev/cros_fp'
80 has_fpmcu_path = os.path.exists(FPMCU_PATH)
81 has_cros_config_fpmcu = False
82 if Shell(['cros_config', '/fingerprint', 'board']):
83 has_cros_config_fpmcu = True
84
85 if has_fpmcu_path is False and has_cros_config_fpmcu is True:
86 raise Error('FPMCU found in cros_config but missing in %s.' % FPMCU_PATH)
87 elif has_fpmcu_path is True and has_cros_config_fpmcu is False:
88 raise Error('FPMCU found in %s but missing in cros_config.' % FPMCU_PATH)
89
90 _has_fpmcu = has_fpmcu_path
91
92 return _has_fpmcu
Hung-Te Lin56b18402015-01-16 14:52:30 +080093
Ting Shen18a06382016-08-30 16:18:21 +080094def Command(cmd_name, *args, **kwargs):
You-Cheng Syu8fc2a602017-12-22 17:05:05 +080095 """Decorator for commands in gooftool.
Ting Shen18a06382016-08-30 16:18:21 +080096
97 This is similar to argparse_utils.Command, but all gooftool commands
98 can be waived during `gooftool finalize` or `gooftool verify` using
Wei-Han Chen60c5d332017-01-05 17:15:10 +080099 --waive_list or --skip_list option.
Ting Shen18a06382016-08-30 16:18:21 +0800100 """
101 def Decorate(fun):
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800102 def CommandWithWaiveSkipCheck(options):
Ting Shen18a06382016-08-30 16:18:21 +0800103 waive_list = vars(options).get('waive_list', [])
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800104 skip_list = vars(options).get('skip_list', [])
105 if phase.GetPhase() >= phase.PVT_DOGFOOD and (
106 waive_list != [] or skip_list != []):
Ting Shen18a06382016-08-30 16:18:21 +0800107 raise Error(
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800108 'waive_list and skip_list should be empty for phase %s' %
109 phase.GetPhase())
Ting Shen18a06382016-08-30 16:18:21 +0800110
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800111 if cmd_name not in skip_list:
112 try:
113 fun(options)
114 except Exception as e:
115 if cmd_name in waive_list:
116 logging.exception(e)
117 else:
118 raise
Ting Shen18a06382016-08-30 16:18:21 +0800119
120 return argparse_utils.Command(cmd_name, *args, **kwargs)(
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800121 CommandWithWaiveSkipCheck)
Ting Shen18a06382016-08-30 16:18:21 +0800122 return Decorate
123
124
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800125@Command('write_hwid',
126 CmdArg('hwid', metavar='HWID', help='HWID string'))
Andy Chengc92e6f92012-11-20 16:55:53 +0800127def WriteHWID(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800128 """Write specified HWID value into the system BB."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800129
Tammo Spalink95c43732012-07-25 15:57:14 -0700130 logging.info('writing hwid string %r', options.hwid)
Ricky Lianga70a1202013-03-15 15:03:17 +0800131 GetGooftool(options).WriteHWID(options.hwid)
Andy Cheng0465d132013-03-20 12:12:06 +0800132 event_log.Log('write_hwid', hwid=options.hwid)
Yilin Yang71e39412019-09-24 09:26:46 +0800133 print('Wrote HWID: %r' % options.hwid)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800134
135
Yong Hongc3765412017-12-26 23:12:15 +0800136@Command('read_hwid')
137def ReadHWID(options):
138 """Read the HWID string from GBB."""
139
140 logging.info('reading the hwid string')
Yilin Yang71e39412019-09-24 09:26:46 +0800141 print(GetGooftool(options).ReadHWID())
Yong Hongc3765412017-12-26 23:12:15 +0800142
143
Yong Hong5408f652017-07-11 19:20:25 +0800144_project_cmd_arg = CmdArg(
145 '--project', metavar='PROJECT',
146 default=None, help='Project name to test.')
Ricky Liang53390232013-03-08 15:37:57 +0800147
Tammo Spalink8fab5312012-05-28 18:33:30 +0800148_hwdb_path_cmd_arg = CmdArg(
149 '--hwdb_path', metavar='PATH',
Yong Hong5c6dcd52017-12-27 11:05:01 +0800150 default=hwid_utils.GetDefaultDataPath(),
Tammo Spalink8fab5312012-05-28 18:33:30 +0800151 help='Path to the HWID database.')
152
Tammo Spalink95c43732012-07-25 15:57:14 -0700153_hwid_status_list_cmd_arg = CmdArg(
Hung-Te Lin56b18402015-01-16 14:52:30 +0800154 '--status', nargs='*', default=['supported'],
155 help='allow only HWIDs with these status values')
Tammo Spalink95c43732012-07-25 15:57:14 -0700156
Jon Salzce124fb2012-10-02 17:42:03 +0800157_probe_results_cmd_arg = CmdArg(
Yong Hong55050c12018-02-27 18:19:47 +0800158 '--probe_results', metavar='RESULTS.json',
159 help=('Output from "hwid probe" (used instead of probing this system).'))
Jon Salzce124fb2012-10-02 17:42:03 +0800160
Ricky Liang53390232013-03-08 15:37:57 +0800161_device_info_cmd_arg = CmdArg(
Ricky Liangf89f73a2013-03-19 05:00:24 +0800162 '--device_info', metavar='DEVICE_INFO.yaml', default=None,
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800163 help='A dict of device info to use instead of fetching from shopfloor '
Ricky Liang53390232013-03-08 15:37:57 +0800164 'server.')
165
Jon Salzce124fb2012-10-02 17:42:03 +0800166_hwid_cmd_arg = CmdArg(
167 '--hwid', metavar='HWID',
Ricky Lianga70a1202013-03-15 15:03:17 +0800168 help='HWID to verify (instead of the currently set HWID of this system).')
Jon Salzce124fb2012-10-02 17:42:03 +0800169
Yong Hong68a0e0d2017-12-20 19:06:54 +0800170_hwid_run_vpd_cmd_arg = CmdArg(
171 '--hwid-run-vpd', action='store_true',
172 help=('Specify the hwid utility to obtain the vpd data by running the '
173 '`vpd` commandline tool.'))
174
175_hwid_vpd_data_file_cmd_arg = CmdArg(
176 '--hwid-vpd-data-file', metavar='FILE.json', type=str, default=None,
177 help=('Specify the hwid utility to obtain the vpd data from the specified '
178 'file.'))
179
Bernie Thompson3c11c872013-07-22 18:22:45 -0700180_rma_mode_cmd_arg = CmdArg(
181 '--rma_mode', action='store_true',
182 help='Enable RMA mode, do not check for deprecated components.')
Tammo Spalink95c43732012-07-25 15:57:14 -0700183
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800184_cros_core_cmd_arg = CmdArg(
185 '--cros_core', action='store_true',
186 help='Finalize for ChromeOS Core devices (may add or remove few test '
Hung-Te Lin53c49402017-07-26 13:10:58 +0800187 'items. For example, registration codes or firmware bitmap '
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800188 'locale settings).')
189
Yilun Lin599833f2017-12-22 14:07:46 +0800190_chromebox_cmd_arg = CmdArg(
191 '--chromebox', action='store_true', default=None,
192 help='Finalize for ChromeBox devices (may add or remove few test '
193 'items. For example, VerifyECKey).')
194
bowgotsai13820f42015-09-10 23:18:04 +0800195_enforced_release_channels_cmd_arg = CmdArg(
196 '--enforced_release_channels', nargs='*', default=None,
197 help='Enforced release image channels.')
198
Yilun Lin34f54802017-11-16 11:58:25 +0800199_ec_pubkey_path_cmd_arg = CmdArg(
200 '--ec_pubkey_path',
201 default=None,
202 help='Path to public key in vb2 format. Verify EC key with pubkey file.')
203
204_ec_pubkey_hash_cmd_arg = CmdArg(
205 '--ec_pubkey_hash',
206 default=None,
207 help='A string for public key hash. Verify EC key with the given hash.')
208
Hung-Te Lincdb96522016-04-15 16:51:10 +0800209_release_rootfs_cmd_arg = CmdArg(
210 '--release_rootfs', help='Location of release image rootfs partition.')
211
212_firmware_path_cmd_arg = CmdArg(
213 '--firmware_path', help='Location of firmware image partition.')
Ricky Liang43b879b2014-02-24 11:36:55 +0800214
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800215_shopfloor_url_args_cmd_arg = CmdArg(
216 '--shopfloor_url',
Earl Ou51182222016-09-09 12:16:48 +0800217 help='Shopfloor server url to be informed when wiping is done. '
218 'After wiping, a XML-RPC request will be sent to the '
219 'given url to indicate the completion of wiping.')
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800220
221_station_ip_cmd_arg = CmdArg(
222 '--station_ip',
223 help='IP of remote station')
224
225_station_port_cmd_arg = CmdArg(
226 '--station_port',
227 help='Port on remote station')
228
229_wipe_finish_token_cmd_arg = CmdArg(
230 '--wipe_finish_token',
231 help='Required token when notifying station after wipe finished')
232
Wei-Han Chenf3924112019-02-25 14:52:58 +0800233_keep_developer_mode_flag_after_clobber_state_cmd_arg = CmdArg(
234 # The argument name is super long because you should never use it by
235 # yourself when using command line tools.
236 '--keep_developer_mode_flag_after_clobber_state',
237 action='store_true', default=None,
238 help='After clobber-state, do not delete .developer_mode')
239
Ting Shen18a06382016-08-30 16:18:21 +0800240_waive_list_cmd_arg = CmdArg(
241 '--waive_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800242 help='A list of waived checks, separated by whitespace. '
243 'Each item should be a sub-command of gooftool. '
Ting Shen18a06382016-08-30 16:18:21 +0800244 'e.g. "gooftool verify --waive_list verify_tpm clear_gbb_flags".')
245
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800246_skip_list_cmd_arg = CmdArg(
247 '--skip_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800248 help='A list of skipped checks, separated by whitespace. '
249 'Each item should be a sub-command of gooftool. '
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800250 'e.g. "gooftool verify --skip_list verify_tpm clear_gbb_flags".')
251
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800252_rlz_embargo_end_date_offset_cmd_arg = CmdArg(
253 '--embargo_offset', type=int, default=7, choices=xrange(7, 15),
254 help='Change the offset of embargo end date, cannot less than 7 days or '
255 'more than 14 days.')
256
Marco Chena681b2e2018-08-31 11:41:41 +0800257_no_ectool_cmd_arg = CmdArg(
258 '--no_ectool', action='store_false', dest='has_ectool',
259 help='There is no ectool utility so tests rely on ectool should be '
260 'skipped.')
Tammo Spalink8fab5312012-05-28 18:33:30 +0800261
chuntsenaf1232f2019-03-20 15:45:54 +0800262_no_generate_mfg_date_cmd_arg = CmdArg(
263 '--no_generate_mfg_date', action='store_false', dest='generate_mfg_date',
264 help='Do not generate manufacturing date nor write mfg_date into VPD.')
265
266
Yilun Lin34f54802017-11-16 11:58:25 +0800267@Command(
268 'verify_ec_key',
269 _ec_pubkey_path_cmd_arg,
270 _ec_pubkey_hash_cmd_arg)
271def VerifyECKey(options):
272 """Verify EC key."""
273 return GetGooftool(options).VerifyECKey(
274 options.ec_pubkey_path, options.ec_pubkey_hash)
275
276
Hung-Te Line1d80f62016-03-31 14:58:13 +0800277@Command('verify_keys',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800278 _release_rootfs_cmd_arg,
279 _firmware_path_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800280def VerifyKeys(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800281 """Verify keys in firmware and SSD match."""
Hung-Te Line1d80f62016-03-31 14:58:13 +0800282 return GetGooftool(options).VerifyKeys(
Hung-Te Lincdb96522016-04-15 16:51:10 +0800283 options.release_rootfs, options.firmware_path)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800284
285
286@Command('set_fw_bitmap_locale')
Peter Shihfdf17682017-05-26 11:38:39 +0800287def SetFirmwareBitmapLocale(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800288 """Use VPD locale value to set firmware bitmap default language."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800289
Ricky Lianga70a1202013-03-15 15:03:17 +0800290 (index, locale) = GetGooftool(options).SetFirmwareBitmapLocale()
Andy Cheng2582d292012-12-04 17:38:28 +0800291 logging.info('Firmware bitmap initial locale set to %d (%s).',
292 index, locale)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800293
294
Hung-Te Line1d80f62016-03-31 14:58:13 +0800295@Command('verify_system_time',
Wei-Han Chen2790d2e2019-01-18 21:13:40 +0800296 _release_rootfs_cmd_arg,
297 _rma_mode_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800298def VerifySystemTime(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800299 """Verify system time is later than release filesystem creation time."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800300
Wei-Han Chen2790d2e2019-01-18 21:13:40 +0800301 return GetGooftool(options).VerifySystemTime(options.release_rootfs,
302 rma_mode=options.rma_mode)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800303
304
Hung-Te Line1d80f62016-03-31 14:58:13 +0800305@Command('verify_rootfs',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800306 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800307def VerifyRootFs(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800308 """Verify rootfs on SSD is valid by checking hash."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800309
Hung-Te Line1d80f62016-03-31 14:58:13 +0800310 return GetGooftool(options).VerifyRootFs(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800311
Hung-Te Lin56b18402015-01-16 14:52:30 +0800312
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800313@Command('verify_tpm')
Peter Shihfdf17682017-05-26 11:38:39 +0800314def VerifyTPM(options):
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800315 """Verify TPM is cleared."""
316
317 return GetGooftool(options).VerifyTPM()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800318
Hung-Te Lin56b18402015-01-16 14:52:30 +0800319
Hung-Te Lindd708d42014-07-11 17:05:01 +0800320@Command('verify_me_locked')
Peter Shihfdf17682017-05-26 11:38:39 +0800321def VerifyManagementEngineLocked(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800322 """Verify Management Engine is locked."""
Hung-Te Lindd708d42014-07-11 17:05:01 +0800323
324 return GetGooftool(options).VerifyManagementEngineLocked()
325
Hung-Te Lin56b18402015-01-16 14:52:30 +0800326
Marco Chena681b2e2018-08-31 11:41:41 +0800327@Command('verify_switch_wp',
328 _no_ectool_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800329def VerifyWPSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800330 """Verify hardware write protection switch is enabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800331
Marco Chena681b2e2018-08-31 11:41:41 +0800332 GetGooftool(options).VerifyWPSwitch(options.has_ectool)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800333
334
Hung-Te Lin53c49402017-07-26 13:10:58 +0800335@Command('verify_vpd')
336def VerifyVPD(options):
337 """Verify that VPD values are properly set.
Jon Salzadd90d32014-04-29 16:16:27 +0800338
Hung-Te Lin53c49402017-07-26 13:10:58 +0800339 Check if mandatory fields are set, and deprecated fields don't exist.
Jon Salzadd90d32014-04-29 16:16:27 +0800340 """
Hung-Te Lin53c49402017-07-26 13:10:58 +0800341 return GetGooftool(options).VerifyVPD()
Jon Salzadd90d32014-04-29 16:16:27 +0800342
343
bowgotsai13820f42015-09-10 23:18:04 +0800344@Command('verify_release_channel',
345 _enforced_release_channels_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800346def VerifyReleaseChannel(options):
bowgotsai529139c2015-05-30 01:39:49 +0800347 """Verify that release image channel is correct.
348
349 ChromeOS has four channels: canary, dev, beta and stable.
350 The last three channels support image auto-updates, checks
351 that release image channel is one of them.
352 """
bowgotsai13820f42015-09-10 23:18:04 +0800353 return GetGooftool(options).VerifyReleaseChannel(
354 options.enforced_release_channels)
bowgotsai529139c2015-05-30 01:39:49 +0800355
356
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800357@Command('write_protect')
Peter Shihfdf17682017-05-26 11:38:39 +0800358def EnableFwWp(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800359 """Enable then verify firmware write protection."""
Peter Shihfdf17682017-05-26 11:38:39 +0800360 del options # Unused.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800361
Yong Hongdad230a2017-08-30 22:25:19 +0800362 def WriteProtect(fw):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800363 """Calculate protection size, then invoke flashrom.
364
Yong Hongdad230a2017-08-30 22:25:19 +0800365 The region (offset and size) to write protect may be different per chipset
366 and firmware layout, so we have to read the WP_RO section from FMAP to
367 decide that.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800368 """
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800369 wp_section = 'WP_RO'
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800370
Yong Hongdad230a2017-08-30 22:25:19 +0800371 fmap_image = fw.GetFirmwareImage(
372 sections=(['FMAP'] if fw.target == crosfw.TARGET_MAIN else None))
373 if not fmap_image.has_section(wp_section):
374 raise Error('Could not find %s firmware section: %s' %
375 (fw.target.upper(), wp_section))
376
377 section_data = fw.GetFirmwareImage(
378 sections=[wp_section]).get_section_area(wp_section)
Peter Shihe6afab32018-09-11 17:16:48 +0800379 ro_offset, ro_size = section_data[0:2]
Yong Hongdad230a2017-08-30 22:25:19 +0800380
381 logging.debug('write protecting %s [off=%x size=%x]', fw.target.upper(),
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800382 ro_offset, ro_size)
Yong Hongdad230a2017-08-30 22:25:19 +0800383 crosfw.Flashrom(fw.target).EnableWriteProtection(ro_offset, ro_size)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800384
Yong Hongdad230a2017-08-30 22:25:19 +0800385 WriteProtect(crosfw.LoadMainFirmware())
Andy Cheng0465d132013-03-20 12:12:06 +0800386 event_log.Log('wp', fw='main')
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800387
388 # Some EC (mostly PD) does not support "RO NOW". Instead they will only set
389 # "RO_AT_BOOT" when you request to enable RO (These platforms consider
390 # --wp-range with right range identical to --wp-enable), and requires a
391 # 'ectool reboot_ec RO at-shutdown; reboot' to let the RO take effect.
Hung-Te Lin0d10b562016-12-28 10:58:07 +0800392 # After reboot, "flashrom -p host --wp-status" will return protected range.
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800393 # If you don't reboot, returned range will be (0, 0), and running command
394 # "ectool flashprotect" will not have RO_NOW.
395
Yong Hongdad230a2017-08-30 22:25:19 +0800396 for fw in [crosfw.LoadEcFirmware(), crosfw.LoadPDFirmware()]:
397 if fw.GetChipId() is None:
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800398 logging.warning('%s not write protected (seems there is no %s flash).',
Yong Hongdad230a2017-08-30 22:25:19 +0800399 fw.target.upper(), fw.target.upper())
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800400 continue
Yong Hongdad230a2017-08-30 22:25:19 +0800401 WriteProtect(fw)
402 event_log.Log('wp', fw=fw.target)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800403
404
405@Command('clear_gbb_flags')
Peter Shihfdf17682017-05-26 11:38:39 +0800406def ClearGBBFlags(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800407 """Zero out the GBB flags, in preparation for transition to release state.
408
409 No GBB flags are set in release/shipping state, but they are useful
Hung-Te Lin879cff42017-06-19 12:46:37 +0800410 for factory/development. See "futility gbb --flags" for details.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800411 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800412
Ricky Lianga70a1202013-03-15 15:03:17 +0800413 GetGooftool(options).ClearGBBFlags()
Andy Cheng0465d132013-03-20 12:12:06 +0800414 event_log.Log('clear_gbb_flags')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800415
416
Jon Salzaa3a30e2013-05-15 15:56:28 +0800417@Command('clear_factory_vpd_entries')
Peter Shihfdf17682017-05-26 11:38:39 +0800418def ClearFactoryVPDEntries(options):
Jon Salzaa3a30e2013-05-15 15:56:28 +0800419 """Clears factory.* items in the RW VPD."""
420 entries = GetGooftool(options).ClearFactoryVPDEntries()
421 event_log.Log('clear_factory_vpd_entries', entries=FilterDict(entries))
422
423
Mattias Nisslercca761b2015-04-15 21:53:04 +0200424@Command('generate_stable_device_secret')
Peter Shihfdf17682017-05-26 11:38:39 +0800425def GenerateStableDeviceSecret(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800426 """Generates a fresh stable device secret and stores it in the RO VPD."""
Mattias Nisslercca761b2015-04-15 21:53:04 +0200427 GetGooftool(options).GenerateStableDeviceSecret()
428 event_log.Log('generate_stable_device_secret')
429
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800430
Yves Arrouyeb49b31e2019-03-06 21:51:52 -0800431@Command('cr50_set_sn_bits_and_board_id')
432def Cr50SetSnBitsAndBoardId(options):
433 """Set the serial number bits, board id and flags on the Cr50 chip."""
434 GetGooftool(options).Cr50SetSnBitsAndBoardId()
435 event_log.Log('cr50_set_sn_bits_and_board_id')
Shen-En Shihd078a7c2017-08-04 13:33:49 +0800436
437
Marco Chen20c885d2018-10-04 17:22:03 +0800438@Command('cr50_disable_factory_mode')
Marco Chen44a666d2018-07-13 21:01:50 +0800439def Cr50DisableFactoryMode(options):
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800440 """Reset Cr50 state back to default state after RMA."""
Marco Chen44a666d2018-07-13 21:01:50 +0800441 return GetGooftool(options).Cr50DisableFactoryMode()
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800442
443
Earl Ou564a7872016-10-05 10:22:00 +0800444@Command('enable_release_partition',
445 CmdArg('--release_rootfs',
446 help=('path to the release rootfs device. If not specified, '
447 'the default (5th) partition will be used.')))
448def EnableReleasePartition(options):
449 """Enables a release image partition on the disk."""
450 GetGooftool(options).EnableReleasePartition(options.release_rootfs)
451
452
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800453@Command('wipe_in_place',
454 CmdArg('--fast', action='store_true',
Shun-Hsing Ou8d3c40a2015-10-08 18:16:08 +0800455 help='use non-secure but faster wipe method.'),
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800456 _shopfloor_url_args_cmd_arg,
457 _station_ip_cmd_arg,
458 _station_port_cmd_arg,
459 _wipe_finish_token_cmd_arg)
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800460def WipeInPlace(options):
461 """Start factory wipe directly without reboot."""
462
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800463 GetGooftool(options).WipeInPlace(options.fast,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800464 options.shopfloor_url,
465 options.station_ip,
466 options.station_port,
467 options.wipe_finish_token)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200468
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800469@Command('wipe_init',
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800470 CmdArg('--wipe_args', help='arguments for clobber-state'),
471 CmdArg('--state_dev', help='path to stateful partition device'),
472 CmdArg('--root_disk', help='path to primary device'),
473 CmdArg('--old_root', help='path to old root'),
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800474 _shopfloor_url_args_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800475 _release_rootfs_cmd_arg,
476 _station_ip_cmd_arg,
477 _station_port_cmd_arg,
Wei-Han Chenf3924112019-02-25 14:52:58 +0800478 _wipe_finish_token_cmd_arg,
479 _keep_developer_mode_flag_after_clobber_state_cmd_arg)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800480def WipeInit(options):
Wei-Han Chenf3924112019-02-25 14:52:58 +0800481 GetGooftool(options).WipeInit(
482 options.wipe_args,
483 options.shopfloor_url,
484 options.state_dev,
485 options.release_rootfs,
486 options.root_disk,
487 options.old_root,
488 options.station_ip,
489 options.station_port,
490 options.wipe_finish_token,
491 options.keep_developer_mode_flag_after_clobber_state)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800492
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800493@Command('verify',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800494 CmdArg('--no_write_protect', action='store_true',
495 help='Do not check write protection switch state.'),
Tammo Spalink95c43732012-07-25 15:57:14 -0700496 _hwid_status_list_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800497 _hwdb_path_cmd_arg,
Yong Hong5408f652017-07-11 19:20:25 +0800498 _project_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800499 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800500 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800501 _hwid_run_vpd_cmd_arg,
502 _hwid_vpd_data_file_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800503 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800504 _cros_core_cmd_arg,
Yilun Lin599833f2017-12-22 14:07:46 +0800505 _chromebox_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800506 _ec_pubkey_path_cmd_arg,
507 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800508 _release_rootfs_cmd_arg,
509 _firmware_path_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800510 _enforced_release_channels_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800511 _waive_list_cmd_arg,
Marco Chena681b2e2018-08-31 11:41:41 +0800512 _skip_list_cmd_arg,
513 _no_ectool_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800514def Verify(options):
515 """Verifies if whole factory process is ready for finalization.
516
517 This routine performs all the necessary checks to make sure the
518 device is ready to be finalized, but does not modify state. These
519 checks include dev switch, firmware write protection switch, hwid,
520 system time, keys, and root file system.
521 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800522
Hung-Te Lin6d827542012-07-19 11:50:41 +0800523 if not options.no_write_protect:
Ricky Lianga70a1202013-03-15 15:03:17 +0800524 VerifyWPSwitch(options)
Hung-Te Lindd708d42014-07-11 17:05:01 +0800525 VerifyManagementEngineLocked(options)
Ting Shen129fa6f2016-09-02 12:22:24 +0800526 VerifyHWID(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800527 VerifySystemTime(options)
Yilun Lin599833f2017-12-22 14:07:46 +0800528 if options.chromebox:
529 VerifyECKey(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800530 VerifyKeys(options)
531 VerifyRootFs(options)
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800532 VerifyTPM(options)
Hung-Te Lin53c49402017-07-26 13:10:58 +0800533 VerifyVPD(options)
bowgotsai529139c2015-05-30 01:39:49 +0800534 VerifyReleaseChannel(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800535
Hung-Te Lin56b18402015-01-16 14:52:30 +0800536
Jon Salzfe9036f2014-01-16 14:11:23 +0800537@Command('untar_stateful_files')
Hung-Te Lin388bce22014-06-03 19:56:40 +0800538def UntarStatefulFiles(unused_options):
Jon Salzfe9036f2014-01-16 14:11:23 +0800539 """Untars stateful files from stateful_files.tar.xz on stateful partition.
540
541 If that file does not exist (which should only be R30 and earlier),
542 this is a no-op.
543 """
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800544 # Path to stateful partition on device.
545 device_stateful_path = '/mnt/stateful_partition'
546 tar_file = os.path.join(device_stateful_path, 'stateful_files.tar.xz')
Jon Salzfe9036f2014-01-16 14:11:23 +0800547 if os.path.exists(tar_file):
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800548 Spawn(['tar', 'xf', tar_file], cwd=device_stateful_path,
Jon Salzfe9036f2014-01-16 14:11:23 +0800549 log=True, check_call=True)
550 else:
551 logging.warning('No stateful files at %s', tar_file)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800552
Jon Salz40b9f822014-07-25 16:39:55 +0800553
554@Command('log_source_hashes')
Peter Shihfdf17682017-05-26 11:38:39 +0800555def LogSourceHashes(options):
Jon Salz40b9f822014-07-25 16:39:55 +0800556 """Logs hashes of source files in the factory toolkit."""
Peter Shihfdf17682017-05-26 11:38:39 +0800557 del options # Unused.
Jon Salze60307f2014-08-05 16:20:00 +0800558 # WARNING: The following line is necessary to validate the integrity
559 # of the factory software. Do not remove or modify it.
560 #
561 # 警告:此行会验证工厂软件的完整性,禁止删除或修改。
Wei-Han Chena5c01a02016-04-23 19:27:19 +0800562 factory_par = sys_utils.GetRunningFactoryPythonArchivePath()
563 if factory_par:
564 event_log.Log(
565 'source_hashes',
566 **file_utils.HashPythonArchive(factory_par))
567 else:
568 event_log.Log(
569 'source_hashes',
Peter Shihad166772017-05-31 11:36:17 +0800570 **file_utils.HashSourceTree(os.path.join(paths.FACTORY_DIR, 'py')))
Jon Salz40b9f822014-07-25 16:39:55 +0800571
572
Tammo Spalink86a61c62012-05-25 15:10:35 +0800573@Command('log_system_details')
Peter Shihfdf17682017-05-26 11:38:39 +0800574def LogSystemDetails(options):
Tammo Spalink86a61c62012-05-25 15:10:35 +0800575 """Write miscellaneous system details to the event log."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800576
Ricky Liang43b879b2014-02-24 11:36:55 +0800577 event_log.Log('system_details', **GetGooftool(options).GetSystemDetails())
Tammo Spalink86a61c62012-05-25 15:10:35 +0800578
579
Jon Salza88b83b2013-05-27 20:00:35 +0800580def CreateReportArchiveBlob(*args, **kwargs):
581 """Creates a report archive and returns it as a blob.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800582
Jon Salza88b83b2013-05-27 20:00:35 +0800583 Args:
584 See CreateReportArchive.
Andy Cheng7a76cb82012-11-19 18:08:19 +0800585
Jon Salza88b83b2013-05-27 20:00:35 +0800586 Returns:
587 An xmlrpclib.Binary object containing a .tar.xz file.
588 """
Wei-Han Chen47416612016-09-14 17:41:52 +0800589 report_archive = CreateReportArchive(*args, **kwargs)
590 try:
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800591 return xmlrpclib.Binary(file_utils.ReadFile(report_archive))
Wei-Han Chen47416612016-09-14 17:41:52 +0800592 finally:
593 os.unlink(report_archive)
Jon Salza88b83b2013-05-27 20:00:35 +0800594
595
596def CreateReportArchive(device_sn=None, add_file=None):
597 """Creates a report archive in a temporary directory.
598
599 Args:
600 device_sn: The device serial number (optional).
601 add_file: A list of files to add (optional).
602
603 Returns:
604 Path to the archive.
605 """
Philip Chen6ada02c2019-11-04 19:41:54 +0000606 # Flush Testlog data to DATA_TESTLOG_DIR before creating a report archive.
607 result, reason = state.GetInstance().FlushTestlog(
608 uplink=False, local=True, timeout=10)
609 if not result:
610 logging.warning('Failed to flush testlog data: %s', reason)
611
Hung-Te Lin6bd16472012-06-20 16:26:47 +0800612 def NormalizeAsFileName(token):
613 return re.sub(r'\W+', '', token).strip()
Jon Salza88b83b2013-05-27 20:00:35 +0800614
615 target_name = '%s%s.tar.xz' % (
616 time.strftime('%Y%m%dT%H%M%SZ',
617 time.gmtime()),
Hung-Te Lin56b18402015-01-16 14:52:30 +0800618 ('' if device_sn is None else
619 '_' + NormalizeAsFileName(device_sn)))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800620 target_path = os.path.join(gettempdir(), target_name)
Jon Salza88b83b2013-05-27 20:00:35 +0800621
Tammo Spalink86a61c62012-05-25 15:10:35 +0800622 # Intentionally ignoring dotfiles in EVENT_LOG_DIR.
Andy Cheng0465d132013-03-20 12:12:06 +0800623 tar_cmd = 'cd %s ; tar cJf %s *' % (event_log.EVENT_LOG_DIR, target_path)
Peter Shihb4e49352017-05-25 17:35:11 +0800624 tar_cmd += ' %s' % paths.FACTORY_LOG_PATH
Philip Chen6ada02c2019-11-04 19:41:54 +0000625 tar_cmd += ' %s' % paths.DATA_TESTLOG_DIR
Jon Salza88b83b2013-05-27 20:00:35 +0800626 if add_file:
627 for f in add_file:
Jon Salz65266432012-07-30 19:02:49 +0800628 # Require absolute paths since the tar command may change the
629 # directory.
630 if not f.startswith('/'):
631 raise Error('Not an absolute path: %s' % f)
632 if not os.path.exists(f):
633 raise Error('File does not exist: %s' % f)
Wei-Han Chen4b755022017-01-04 10:51:52 +0800634 tar_cmd += ' %s' % pipes.quote(f)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800635 cmd_result = Shell(tar_cmd)
Jon Salzff88c022012-11-03 12:19:58 +0800636
637 if ((cmd_result.status == 1) and
638 all((x == '' or
639 'file changed as we read it' in x or
640 "Removing leading `/' from member names" in x)
641 for x in cmd_result.stderr.split('\n'))):
642 # That's OK. Make sure it's valid though.
Vic Yang85199e72013-01-28 14:33:11 +0800643 Spawn(['tar', 'tfJ', target_path], check_call=True, log=True,
Jon Salzff88c022012-11-03 12:19:58 +0800644 ignore_stdout=True)
645 elif not cmd_result.success:
Tammo Spalink86a61c62012-05-25 15:10:35 +0800646 raise Error('unable to tar event logs, cmd %r failed, stderr: %r' %
647 (tar_cmd, cmd_result.stderr))
Jon Salzff88c022012-11-03 12:19:58 +0800648
Jon Salza88b83b2013-05-27 20:00:35 +0800649 return target_path
650
651_upload_method_cmd_arg = CmdArg(
652 '--upload_method', metavar='METHOD:PARAM',
653 help=('How to perform the upload. METHOD should be one of '
654 '{ftp, shopfloor, ftps, cpfe}.'))
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800655_upload_max_retry_times_arg = CmdArg(
656 '--upload_max_retry_times', type=int, default=0,
657 help='Number of tries to upload. 0 to retry infinitely.')
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800658_upload_retry_interval_arg = CmdArg(
659 '--upload_retry_interval', type=int, default=None,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800660 help='Retry interval in seconds.')
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800661_upload_allow_fail_arg = CmdArg(
662 '--upload_allow_fail', action='store_true',
663 help='Continue finalize if report upload fails.')
Jon Salza88b83b2013-05-27 20:00:35 +0800664_add_file_cmd_arg = CmdArg(
665 '--add_file', metavar='FILE', action='append',
666 help='Extra file to include in report (must be an absolute path)')
667
Hung-Te Lin56b18402015-01-16 14:52:30 +0800668
Jon Salza88b83b2013-05-27 20:00:35 +0800669@Command('upload_report',
670 _upload_method_cmd_arg,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800671 _upload_max_retry_times_arg,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800672 _upload_retry_interval_arg,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800673 _upload_allow_fail_arg,
Jon Salza88b83b2013-05-27 20:00:35 +0800674 _add_file_cmd_arg)
675def UploadReport(options):
676 """Create a report containing key device details."""
Yong Hong65bda312018-12-13 20:05:58 +0800677 ro_vpd = vpd.VPDTool().GetAllData(partition=vpd.VPD_READONLY_PARTITION_NAME)
Jon Salza88b83b2013-05-27 20:00:35 +0800678 device_sn = ro_vpd.get('serial_number', None)
679 if device_sn is None:
680 logging.warning('RO_VPD missing device serial number')
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +0800681 device_sn = 'MISSING_SN_' + time_utils.TimedUUID()
chuntsena6da2be2019-08-14 17:11:55 +0800682 target_path = CreateReportArchive(device_sn, options.add_file)
Jon Salza88b83b2013-05-27 20:00:35 +0800683
Tammo Spalink86a61c62012-05-25 15:10:35 +0800684 if options.upload_method is None or options.upload_method == 'none':
685 logging.warning('REPORT UPLOAD SKIPPED (report left at %s)', target_path)
686 return
687 method, param = options.upload_method.split(':', 1)
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800688
689 if options.upload_retry_interval is not None:
690 retry_interval = options.upload_retry_interval
691 else:
692 retry_interval = report_upload.DEFAULT_RETRY_INTERVAL
693
Tammo Spalink86a61c62012-05-25 15:10:35 +0800694 if method == 'shopfloor':
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800695 report_upload.ShopFloorUpload(
696 target_path, param,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800697 'GRT' if options.command_name == 'finalize' else None,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800698 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800699 retry_interval=retry_interval,
700 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800701 elif method == 'ftp':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800702 report_upload.FtpUpload(target_path, 'ftp:' + param,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800703 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800704 retry_interval=retry_interval,
705 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800706 elif method == 'ftps':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800707 report_upload.CurlUrlUpload(target_path, '--ftp-ssl-reqd ftp:%s' % param,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800708 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800709 retry_interval=retry_interval,
710 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800711 elif method == 'cpfe':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800712 report_upload.CpfeUpload(target_path, pipes.quote(param),
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800713 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800714 retry_interval=retry_interval,
715 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800716 else:
Peter Shihbf6f22b2018-02-26 14:05:28 +0800717 raise Error('unknown report upload method %r' % method)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800718
719
720@Command('finalize',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800721 CmdArg('--no_write_protect', action='store_true',
722 help='Do not enable firmware write protection.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800723 CmdArg('--fast', action='store_true',
724 help='use non-secure but faster wipe method.'),
Yong Hongb2926bd2018-10-12 14:11:14 +0800725 _no_ectool_cmd_arg,
Shun-Hsing Oudb407d62015-11-11 11:03:59 +0800726 _shopfloor_url_args_cmd_arg,
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800727 _hwdb_path_cmd_arg,
Tammo Spalink95c43732012-07-25 15:57:14 -0700728 _hwid_status_list_cmd_arg,
Jon Salz65266432012-07-30 19:02:49 +0800729 _upload_method_cmd_arg,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800730 _upload_max_retry_times_arg,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800731 _upload_retry_interval_arg,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800732 _upload_allow_fail_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800733 _add_file_cmd_arg,
734 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800735 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800736 _hwid_run_vpd_cmd_arg,
737 _hwid_vpd_data_file_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800738 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800739 _cros_core_cmd_arg,
Yilun Lin599833f2017-12-22 14:07:46 +0800740 _chromebox_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800741 _ec_pubkey_path_cmd_arg,
742 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800743 _release_rootfs_cmd_arg,
744 _firmware_path_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800745 _enforced_release_channels_cmd_arg,
746 _station_ip_cmd_arg,
747 _station_port_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800748 _wipe_finish_token_cmd_arg,
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800749 _rlz_embargo_end_date_offset_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800750 _waive_list_cmd_arg,
chuntsenaf1232f2019-03-20 15:45:54 +0800751 _skip_list_cmd_arg,
Philip Chen04fb90b2019-11-06 12:10:33 -0800752 _no_generate_mfg_date_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800753def Finalize(options):
754 """Verify system readiness and trigger transition into release state.
755
Jon Salzaa3a30e2013-05-15 15:56:28 +0800756 This routine does the following:
757 - Verifies system state (see verify command)
Jon Salzfe9036f2014-01-16 14:11:23 +0800758 - Untars stateful_files.tar.xz, if it exists, in the stateful partition, to
759 initialize files such as the CRX cache
Jon Salzaa3a30e2013-05-15 15:56:28 +0800760 - Modifies firmware bitmaps to match locale
761 - Clears all factory-friendly flags from the GBB
762 - Removes factory-specific entries from RW_VPD (factory.*)
763 - Enables firmware write protection (cannot rollback after this)
Marco Chenecee04f2019-02-15 22:24:24 +0800764 - Initialize Fpmcu entropy
Jon Salzaa3a30e2013-05-15 15:56:28 +0800765 - Uploads system logs & reports
Earl Ou51182222016-09-09 12:16:48 +0800766 - Wipes the testing kernel, rootfs, and stateful partition
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800767 """
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800768 if not options.rma_mode:
769 # Write VPD values related to RLZ ping into VPD.
770 GetGooftool(options).WriteVPDForRLZPing(options.embargo_offset)
chuntsenaf1232f2019-03-20 15:45:54 +0800771 if options.generate_mfg_date:
772 GetGooftool(options).WriteVPDForMFGDate()
Yves Arrouyeb49b31e2019-03-06 21:51:52 -0800773 Cr50SetSnBitsAndBoardId(options)
Marco Chen44a666d2018-07-13 21:01:50 +0800774 Cr50DisableFactoryMode(options)
Marco Chen9d0631c2018-08-31 10:52:44 +0800775 Verify(options)
Jon Salz40b9f822014-07-25 16:39:55 +0800776 LogSourceHashes(options)
Jon Salzfe9036f2014-01-16 14:11:23 +0800777 UntarStatefulFiles(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800778 if options.cros_core:
779 logging.info('SetFirmwareBitmapLocale is skipped for ChromeOS Core device.')
780 else:
781 SetFirmwareBitmapLocale(options)
Jon Salzaa3a30e2013-05-15 15:56:28 +0800782 ClearFactoryVPDEntries(options)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200783 GenerateStableDeviceSecret(options)
Shen-En Shih3e079b22017-09-11 05:43:09 -0700784 ClearGBBFlags(options)
Hung-Te Lin6d827542012-07-19 11:50:41 +0800785 if options.no_write_protect:
786 logging.warn('WARNING: Firmware Write Protection is SKIPPED.')
Andy Cheng0465d132013-03-20 12:12:06 +0800787 event_log.Log('wp', fw='both', status='skipped')
Hung-Te Lin6d827542012-07-19 11:50:41 +0800788 else:
Wei-Han Chenba21f512016-10-14 18:52:33 +0800789 EnableFwWp(options)
Marco Chenecee04f2019-02-15 22:24:24 +0800790 FpmcuInitializeEntropy(options)
Jon Salza0f58e02012-05-29 19:33:39 +0800791 LogSystemDetails(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800792 UploadReport(options)
Earl Ou51182222016-09-09 12:16:48 +0800793
794 event_log.Log('wipe_in_place')
795 wipe_args = []
Earl Ou51182222016-09-09 12:16:48 +0800796 if options.shopfloor_url:
797 wipe_args += ['--shopfloor_url', options.shopfloor_url]
798 if options.fast:
799 wipe_args += ['--fast']
800 if options.station_ip:
801 wipe_args += ['--station_ip', options.station_ip]
802 if options.station_port:
803 wipe_args += ['--station_port', options.station_port]
804 if options.wipe_finish_token:
805 wipe_args += ['--wipe_finish_token', options.wipe_finish_token]
806 ExecFactoryPar('gooftool', 'wipe_in_place', *wipe_args)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800807
808
Ting Shen129fa6f2016-09-02 12:22:24 +0800809@Command('verify_hwid',
810 _probe_results_cmd_arg,
811 _hwdb_path_cmd_arg,
812 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800813 _hwid_run_vpd_cmd_arg,
814 _hwid_vpd_data_file_cmd_arg,
Ting Shen129fa6f2016-09-02 12:22:24 +0800815 _rma_mode_cmd_arg)
816def VerifyHWID(options):
Ricky Liangc662be32013-12-24 11:50:23 +0800817 """A simple wrapper that calls out to HWID utils to verify version 3 HWID.
Ricky Liang53390232013-03-08 15:37:57 +0800818
Ricky Liangc662be32013-12-24 11:50:23 +0800819 This is mainly for Gooftool to verify v3 HWID during finalize. For testing
820 and development purposes, please use `hwid` command.
Ricky Liang53390232013-03-08 15:37:57 +0800821 """
Yong Hongada8e0e2018-01-04 16:36:21 +0800822 database = GetGooftool(options).db
Yong Hong68a0e0d2017-12-20 19:06:54 +0800823
Yong Hongada8e0e2018-01-04 16:36:21 +0800824 encoded_string = options.hwid or GetGooftool(options).ReadHWID()
825
826 probed_results = hwid_utils.GetProbedResults(infile=options.probe_results)
Yong Hong2c39bf22018-01-24 22:24:11 +0800827 device_info = hwid_utils.GetDeviceInfo()
Yong Hong65bda312018-12-13 20:05:58 +0800828 vpd_data = hwid_utils.GetVPDData(run_vpd=options.hwid_run_vpd,
829 infile=options.hwid_vpd_data_file)
Ricky Liang53390232013-03-08 15:37:57 +0800830
Hung-Te Lin11052952015-03-18 13:48:59 +0800831 event_log.Log('probed_results', probed_results=FilterDict(probed_results))
Yong Hong65bda312018-12-13 20:05:58 +0800832 event_log.Log('vpd', vpd=FilterDict(vpd_data))
Ricky Liang53390232013-03-08 15:37:57 +0800833
Yong Hong2c39bf22018-01-24 22:24:11 +0800834 hwid_utils.VerifyHWID(database, encoded_string, probed_results,
Yong Hong65bda312018-12-13 20:05:58 +0800835 device_info, vpd_data, options.rma_mode)
Ricky Liang53390232013-03-08 15:37:57 +0800836
Ricky Liangc662be32013-12-24 11:50:23 +0800837 event_log.Log('verified_hwid', hwid=encoded_string)
Ricky Liang53390232013-03-08 15:37:57 +0800838
839
henryhsu44d793a2013-07-20 00:07:38 +0800840@Command('get_firmware_hash',
Marco Chence70b132018-05-03 23:43:39 +0800841 CmdArg('--file', required=True, metavar='FILE', help='Firmware File.'))
henryhsu44d793a2013-07-20 00:07:38 +0800842def GetFirmwareHash(options):
henryhsuf6f835c2013-07-20 20:49:25 +0800843 """Get firmware hash from a file"""
henryhsu44d793a2013-07-20 00:07:38 +0800844 if os.path.exists(options.file):
Cheng-Han Yang2c668ae2018-04-18 22:31:07 +0800845 value_dict = chromeos_firmware.CalculateFirmwareHashes(options.file)
846 for key, value in value_dict.iteritems():
Yilin Yang71e39412019-09-24 09:26:46 +0800847 print(' %s: %s' % (key, value))
henryhsu44d793a2013-07-20 00:07:38 +0800848 else:
849 raise Error('File does not exist: %s' % options.file)
850
henryhsuf6f835c2013-07-20 20:49:25 +0800851
Philip Chen04fb90b2019-11-06 12:10:33 -0800852@Command('fpmcu_initialize_entropy')
Marco Chenecee04f2019-02-15 22:24:24 +0800853def FpmcuInitializeEntropy(options):
854 """Initialze entropy of FPMCU."""
Philip Chen04fb90b2019-11-06 12:10:33 -0800855
856 if HasFpmcu():
Marco Chenecee04f2019-02-15 22:24:24 +0800857 GetGooftool(options).FpmcuInitializeEntropy()
Philip Chen04fb90b2019-11-06 12:10:33 -0800858 else:
859 logging.info('No FPS on this board.')
Marco Chenecee04f2019-02-15 22:24:24 +0800860
861
Peter Shihfdf17682017-05-26 11:38:39 +0800862def main():
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800863 """Run sub-command specified by the command line args."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800864
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800865 options = ParseCmdline(
Ting Shen129fa6f2016-09-02 12:22:24 +0800866 'Perform Google required factory tests.',
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800867 CmdArg('-l', '--log', metavar='PATH',
868 help='Write logs to this file.'),
Jon Salza4bea382012-10-29 13:00:34 +0800869 CmdArg('--suppress-event-logs', action='store_true',
870 help='Suppress event logging.'),
Wei-Han Chenaff56232016-04-16 09:17:59 +0800871 CmdArg('--phase', default=None,
872 help=('override phase for phase checking (defaults to the current '
873 'as returned by the "factory phase" command)')),
Wei-Han Chenb34bdff2019-09-26 13:07:50 +0800874 VERBOSITY_CMD_ARG)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800875 SetupLogging(options.verbosity, options.log)
Andy Cheng0465d132013-03-20 12:12:06 +0800876 event_log.SetGlobalLoggerDefaultPrefix('gooftool')
877 event_log.GetGlobalLogger().suppress = options.suppress_event_logs
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800878 logging.debug('gooftool options: %s', repr(options))
Wei-Han Chenaff56232016-04-16 09:17:59 +0800879
880 phase.OverridePhase(options.phase)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800881 try:
882 logging.debug('GOOFTOOL command %r', options.command_name)
883 options.command(options)
884 logging.info('GOOFTOOL command %r SUCCESS', options.command_name)
Peter Shih6674ecf2018-03-29 14:04:57 +0800885 except Error as e:
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800886 logging.exception(e)
887 sys.exit('GOOFTOOL command %r ERROR: %s' % (options.command_name, e))
Peter Shih6674ecf2018-03-29 14:04:57 +0800888 except Exception as e:
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800889 logging.exception(e)
890 sys.exit('UNCAUGHT RUNTIME EXCEPTION %s' % e)
891
892
893if __name__ == '__main__':
Peter Shihfdf17682017-05-26 11:38:39 +0800894 main()