blob: f557893e12a19fc65f7ca997dc1d8327855cb98c [file] [log] [blame]
Mike Frysinger63bb3c72019-09-01 15:16:26 -04001#!/usr/bin/env python2
Jon Salze60307f2014-08-05 16:20:00 +08002# -*- coding: utf-8 -*-
3# Copyright 2014 The Chromium OS Authors. All rights reserved.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08004# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
Jon Salze60307f2014-08-05 16:20:00 +08007
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08008"""Google Factory Tool.
9
You-Cheng Syu461ec032017-03-06 15:56:58 +080010This tool is intended to be used on factory assembly lines. It
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080011provides all of the Google required test functionality and must be run
12on each device as part of the assembly process.
13"""
14
Yilin Yang71e39412019-09-24 09:26:46 +080015from __future__ import print_function
16
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080017import logging
18import os
Jon Salz65266432012-07-30 19:02:49 +080019import pipes
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080020import re
21import sys
Peter Shihfdf17682017-05-26 11:38:39 +080022from tempfile import gettempdir
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080023import threading
Hung-Te Lin6bd16472012-06-20 16:26:47 +080024import time
Jon Salza88b83b2013-05-27 20:00:35 +080025import xmlrpclib
Peter Shihfdf17682017-05-26 11:38:39 +080026
Yilin Yangea784662019-09-26 13:51:03 +080027from six import iteritems
28
Peter Shihfdf17682017-05-26 11:38:39 +080029import factory_common # pylint: disable=unused-import
Wei-Han Chen0a3320e2016-04-23 01:32:07 +080030from cros.factory.gooftool.common import ExecFactoryPar
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080031from cros.factory.gooftool.common import Shell
Peter Shihfdf17682017-05-26 11:38:39 +080032from cros.factory.gooftool.core import Gooftool
33from cros.factory.gooftool import crosfw
Peter Shihfdf17682017-05-26 11:38:39 +080034from cros.factory.gooftool import report_upload
Yong Hong65bda312018-12-13 20:05:58 +080035from cros.factory.gooftool import vpd
Hung-Te Lin604e0c22015-11-24 15:17:07 +080036from cros.factory.hwid.v3 import hwid_utils
Yong Hong863d3262017-10-30 16:23:34 +080037from cros.factory.probe.functions import chromeos_firmware
Wei-Han Chen2ebb92d2016-01-12 14:51:41 +080038from cros.factory.test.env import paths
Peter Shihfdf17682017-05-26 11:38:39 +080039from cros.factory.test import event_log
Wei-Han Chenaff56232016-04-16 09:17:59 +080040from cros.factory.test.rules import phase
Hung-Te Lin3f096842016-01-13 17:37:06 +080041from cros.factory.test.rules.privacy import FilterDict
Philip Chen6ada02c2019-11-04 19:41:54 +000042from cros.factory.test import state
Peter Shihfdf17682017-05-26 11:38:39 +080043from cros.factory.utils import argparse_utils
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080044from cros.factory.utils.argparse_utils import CmdArg
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080045from cros.factory.utils.argparse_utils import ParseCmdline
Wei-Han Chenb34bdff2019-09-26 13:07:50 +080046from cros.factory.utils.argparse_utils import VERBOSITY_CMD_ARG
Peter Shihfdf17682017-05-26 11:38:39 +080047from cros.factory.utils.debug_utils import SetupLogging
Jon Salz40b9f822014-07-25 16:39:55 +080048from cros.factory.utils import file_utils
Peter Shih67c7c0f2018-02-26 11:23:59 +080049from cros.factory.utils.process_utils import Spawn
Wei-Han Chena5c01a02016-04-23 19:27:19 +080050from cros.factory.utils import sys_utils
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +080051from cros.factory.utils import time_utils
Joel Kitchingd3bc2662014-12-16 16:03:32 -080052from cros.factory.utils.type_utils import Error
Tammo Spalink86a61c62012-05-25 15:10:35 +080053
Tammo Spalink5c699832012-07-03 17:50:39 +080054
Tammo Spalink5c699832012-07-03 17:50:39 +080055# TODO(tammo): Replace calls to sys.exit with raise Exit, and maybe
56# treat that specially (as a smoot exit, as opposed to the more
57# verbose output for generic Error).
58
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080059_global_gooftool = None
60_gooftool_lock = threading.Lock()
Philip Chen04fb90b2019-11-06 12:10:33 -080061_has_fpmcu = None
Tammo Spalink5c699832012-07-03 17:50:39 +080062
Hung-Te Lin56b18402015-01-16 14:52:30 +080063
Ricky Lianga70a1202013-03-15 15:03:17 +080064def GetGooftool(options):
Peter Shihfdf17682017-05-26 11:38:39 +080065 global _global_gooftool # pylint: disable=global-statement
Ricky Lianga70a1202013-03-15 15:03:17 +080066
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080067 if _global_gooftool is None:
68 with _gooftool_lock:
Shen-En Shihc5d15d62017-08-04 13:02:59 +080069 if _global_gooftool is None:
70 project = getattr(options, 'project', None)
71 hwdb_path = getattr(options, 'hwdb_path', None)
72 _global_gooftool = Gooftool(hwid_version=3, project=project,
73 hwdb_path=hwdb_path)
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080074
75 return _global_gooftool
Ricky Lianga70a1202013-03-15 15:03:17 +080076
Philip Chen04fb90b2019-11-06 12:10:33 -080077def HasFpmcu():
78 global _has_fpmcu # pylint: disable=global-statement
79
80 if _has_fpmcu is None:
81 FPMCU_PATH = '/dev/cros_fp'
82 has_fpmcu_path = os.path.exists(FPMCU_PATH)
83 has_cros_config_fpmcu = False
Wei-Han Chenc24cfbf2019-11-20 12:01:45 +080084 if Shell(['cros_config', '/fingerprint', 'board']).success:
Philip Chen04fb90b2019-11-06 12:10:33 -080085 has_cros_config_fpmcu = True
86
87 if has_fpmcu_path is False and has_cros_config_fpmcu is True:
88 raise Error('FPMCU found in cros_config but missing in %s.' % FPMCU_PATH)
89 elif has_fpmcu_path is True and has_cros_config_fpmcu is False:
90 raise Error('FPMCU found in %s but missing in cros_config.' % FPMCU_PATH)
91
92 _has_fpmcu = has_fpmcu_path
93
94 return _has_fpmcu
Hung-Te Lin56b18402015-01-16 14:52:30 +080095
Ting Shen18a06382016-08-30 16:18:21 +080096def Command(cmd_name, *args, **kwargs):
You-Cheng Syu8fc2a602017-12-22 17:05:05 +080097 """Decorator for commands in gooftool.
Ting Shen18a06382016-08-30 16:18:21 +080098
99 This is similar to argparse_utils.Command, but all gooftool commands
100 can be waived during `gooftool finalize` or `gooftool verify` using
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800101 --waive_list or --skip_list option.
Ting Shen18a06382016-08-30 16:18:21 +0800102 """
103 def Decorate(fun):
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800104 def CommandWithWaiveSkipCheck(options):
Ting Shen18a06382016-08-30 16:18:21 +0800105 waive_list = vars(options).get('waive_list', [])
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800106 skip_list = vars(options).get('skip_list', [])
107 if phase.GetPhase() >= phase.PVT_DOGFOOD and (
108 waive_list != [] or skip_list != []):
Ting Shen18a06382016-08-30 16:18:21 +0800109 raise Error(
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800110 'waive_list and skip_list should be empty for phase %s' %
111 phase.GetPhase())
Ting Shen18a06382016-08-30 16:18:21 +0800112
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800113 if cmd_name not in skip_list:
114 try:
115 fun(options)
116 except Exception as e:
117 if cmd_name in waive_list:
118 logging.exception(e)
119 else:
120 raise
Ting Shen18a06382016-08-30 16:18:21 +0800121
122 return argparse_utils.Command(cmd_name, *args, **kwargs)(
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800123 CommandWithWaiveSkipCheck)
Ting Shen18a06382016-08-30 16:18:21 +0800124 return Decorate
125
126
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800127@Command('write_hwid',
128 CmdArg('hwid', metavar='HWID', help='HWID string'))
Andy Chengc92e6f92012-11-20 16:55:53 +0800129def WriteHWID(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800130 """Write specified HWID value into the system BB."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800131
Tammo Spalink95c43732012-07-25 15:57:14 -0700132 logging.info('writing hwid string %r', options.hwid)
Ricky Lianga70a1202013-03-15 15:03:17 +0800133 GetGooftool(options).WriteHWID(options.hwid)
Andy Cheng0465d132013-03-20 12:12:06 +0800134 event_log.Log('write_hwid', hwid=options.hwid)
Yilin Yang71e39412019-09-24 09:26:46 +0800135 print('Wrote HWID: %r' % options.hwid)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800136
137
Yong Hongc3765412017-12-26 23:12:15 +0800138@Command('read_hwid')
139def ReadHWID(options):
140 """Read the HWID string from GBB."""
141
142 logging.info('reading the hwid string')
Yilin Yang71e39412019-09-24 09:26:46 +0800143 print(GetGooftool(options).ReadHWID())
Yong Hongc3765412017-12-26 23:12:15 +0800144
145
Yong Hong5408f652017-07-11 19:20:25 +0800146_project_cmd_arg = CmdArg(
147 '--project', metavar='PROJECT',
148 default=None, help='Project name to test.')
Ricky Liang53390232013-03-08 15:37:57 +0800149
Tammo Spalink8fab5312012-05-28 18:33:30 +0800150_hwdb_path_cmd_arg = CmdArg(
151 '--hwdb_path', metavar='PATH',
Yong Hong5c6dcd52017-12-27 11:05:01 +0800152 default=hwid_utils.GetDefaultDataPath(),
Tammo Spalink8fab5312012-05-28 18:33:30 +0800153 help='Path to the HWID database.')
154
Tammo Spalink95c43732012-07-25 15:57:14 -0700155_hwid_status_list_cmd_arg = CmdArg(
Hung-Te Lin56b18402015-01-16 14:52:30 +0800156 '--status', nargs='*', default=['supported'],
157 help='allow only HWIDs with these status values')
Tammo Spalink95c43732012-07-25 15:57:14 -0700158
Jon Salzce124fb2012-10-02 17:42:03 +0800159_probe_results_cmd_arg = CmdArg(
Yong Hong55050c12018-02-27 18:19:47 +0800160 '--probe_results', metavar='RESULTS.json',
161 help=('Output from "hwid probe" (used instead of probing this system).'))
Jon Salzce124fb2012-10-02 17:42:03 +0800162
Ricky Liang53390232013-03-08 15:37:57 +0800163_device_info_cmd_arg = CmdArg(
Ricky Liangf89f73a2013-03-19 05:00:24 +0800164 '--device_info', metavar='DEVICE_INFO.yaml', default=None,
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800165 help='A dict of device info to use instead of fetching from shopfloor '
Ricky Liang53390232013-03-08 15:37:57 +0800166 'server.')
167
Jon Salzce124fb2012-10-02 17:42:03 +0800168_hwid_cmd_arg = CmdArg(
169 '--hwid', metavar='HWID',
Ricky Lianga70a1202013-03-15 15:03:17 +0800170 help='HWID to verify (instead of the currently set HWID of this system).')
Jon Salzce124fb2012-10-02 17:42:03 +0800171
Yong Hong68a0e0d2017-12-20 19:06:54 +0800172_hwid_run_vpd_cmd_arg = CmdArg(
173 '--hwid-run-vpd', action='store_true',
174 help=('Specify the hwid utility to obtain the vpd data by running the '
175 '`vpd` commandline tool.'))
176
177_hwid_vpd_data_file_cmd_arg = CmdArg(
178 '--hwid-vpd-data-file', metavar='FILE.json', type=str, default=None,
179 help=('Specify the hwid utility to obtain the vpd data from the specified '
180 'file.'))
181
Bernie Thompson3c11c872013-07-22 18:22:45 -0700182_rma_mode_cmd_arg = CmdArg(
183 '--rma_mode', action='store_true',
184 help='Enable RMA mode, do not check for deprecated components.')
Tammo Spalink95c43732012-07-25 15:57:14 -0700185
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800186_cros_core_cmd_arg = CmdArg(
187 '--cros_core', action='store_true',
188 help='Finalize for ChromeOS Core devices (may add or remove few test '
Hung-Te Lin53c49402017-07-26 13:10:58 +0800189 'items. For example, registration codes or firmware bitmap '
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800190 'locale settings).')
191
Yilun Lin599833f2017-12-22 14:07:46 +0800192_chromebox_cmd_arg = CmdArg(
193 '--chromebox', action='store_true', default=None,
194 help='Finalize for ChromeBox devices (may add or remove few test '
195 'items. For example, VerifyECKey).')
196
bowgotsai13820f42015-09-10 23:18:04 +0800197_enforced_release_channels_cmd_arg = CmdArg(
198 '--enforced_release_channels', nargs='*', default=None,
199 help='Enforced release image channels.')
200
Yilun Lin34f54802017-11-16 11:58:25 +0800201_ec_pubkey_path_cmd_arg = CmdArg(
202 '--ec_pubkey_path',
203 default=None,
204 help='Path to public key in vb2 format. Verify EC key with pubkey file.')
205
206_ec_pubkey_hash_cmd_arg = CmdArg(
207 '--ec_pubkey_hash',
208 default=None,
209 help='A string for public key hash. Verify EC key with the given hash.')
210
Hung-Te Lincdb96522016-04-15 16:51:10 +0800211_release_rootfs_cmd_arg = CmdArg(
212 '--release_rootfs', help='Location of release image rootfs partition.')
213
214_firmware_path_cmd_arg = CmdArg(
215 '--firmware_path', help='Location of firmware image partition.')
Ricky Liang43b879b2014-02-24 11:36:55 +0800216
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800217_shopfloor_url_args_cmd_arg = CmdArg(
218 '--shopfloor_url',
Earl Ou51182222016-09-09 12:16:48 +0800219 help='Shopfloor server url to be informed when wiping is done. '
220 'After wiping, a XML-RPC request will be sent to the '
221 'given url to indicate the completion of wiping.')
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800222
223_station_ip_cmd_arg = CmdArg(
224 '--station_ip',
225 help='IP of remote station')
226
227_station_port_cmd_arg = CmdArg(
228 '--station_port',
229 help='Port on remote station')
230
231_wipe_finish_token_cmd_arg = CmdArg(
232 '--wipe_finish_token',
233 help='Required token when notifying station after wipe finished')
234
Wei-Han Chenf3924112019-02-25 14:52:58 +0800235_keep_developer_mode_flag_after_clobber_state_cmd_arg = CmdArg(
236 # The argument name is super long because you should never use it by
237 # yourself when using command line tools.
238 '--keep_developer_mode_flag_after_clobber_state',
239 action='store_true', default=None,
240 help='After clobber-state, do not delete .developer_mode')
241
Ting Shen18a06382016-08-30 16:18:21 +0800242_waive_list_cmd_arg = CmdArg(
243 '--waive_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800244 help='A list of waived checks, separated by whitespace. '
245 'Each item should be a sub-command of gooftool. '
Ting Shen18a06382016-08-30 16:18:21 +0800246 'e.g. "gooftool verify --waive_list verify_tpm clear_gbb_flags".')
247
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800248_skip_list_cmd_arg = CmdArg(
249 '--skip_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800250 help='A list of skipped checks, separated by whitespace. '
251 'Each item should be a sub-command of gooftool. '
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800252 'e.g. "gooftool verify --skip_list verify_tpm clear_gbb_flags".')
253
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800254_rlz_embargo_end_date_offset_cmd_arg = CmdArg(
255 '--embargo_offset', type=int, default=7, choices=xrange(7, 15),
256 help='Change the offset of embargo end date, cannot less than 7 days or '
257 'more than 14 days.')
258
Marco Chena681b2e2018-08-31 11:41:41 +0800259_no_ectool_cmd_arg = CmdArg(
260 '--no_ectool', action='store_false', dest='has_ectool',
261 help='There is no ectool utility so tests rely on ectool should be '
262 'skipped.')
Tammo Spalink8fab5312012-05-28 18:33:30 +0800263
chuntsenaf1232f2019-03-20 15:45:54 +0800264_no_generate_mfg_date_cmd_arg = CmdArg(
265 '--no_generate_mfg_date', action='store_false', dest='generate_mfg_date',
266 help='Do not generate manufacturing date nor write mfg_date into VPD.')
267
268
Yilun Lin34f54802017-11-16 11:58:25 +0800269@Command(
270 'verify_ec_key',
271 _ec_pubkey_path_cmd_arg,
272 _ec_pubkey_hash_cmd_arg)
273def VerifyECKey(options):
274 """Verify EC key."""
275 return GetGooftool(options).VerifyECKey(
276 options.ec_pubkey_path, options.ec_pubkey_hash)
277
278
Hung-Te Line1d80f62016-03-31 14:58:13 +0800279@Command('verify_keys',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800280 _release_rootfs_cmd_arg,
281 _firmware_path_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800282def VerifyKeys(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800283 """Verify keys in firmware and SSD match."""
Hung-Te Line1d80f62016-03-31 14:58:13 +0800284 return GetGooftool(options).VerifyKeys(
Hung-Te Lincdb96522016-04-15 16:51:10 +0800285 options.release_rootfs, options.firmware_path)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800286
287
288@Command('set_fw_bitmap_locale')
Peter Shihfdf17682017-05-26 11:38:39 +0800289def SetFirmwareBitmapLocale(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800290 """Use VPD locale value to set firmware bitmap default language."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800291
Ricky Lianga70a1202013-03-15 15:03:17 +0800292 (index, locale) = GetGooftool(options).SetFirmwareBitmapLocale()
Andy Cheng2582d292012-12-04 17:38:28 +0800293 logging.info('Firmware bitmap initial locale set to %d (%s).',
294 index, locale)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800295
296
Hung-Te Line1d80f62016-03-31 14:58:13 +0800297@Command('verify_system_time',
Wei-Han Chen2790d2e2019-01-18 21:13:40 +0800298 _release_rootfs_cmd_arg,
299 _rma_mode_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800300def VerifySystemTime(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800301 """Verify system time is later than release filesystem creation time."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800302
Wei-Han Chen2790d2e2019-01-18 21:13:40 +0800303 return GetGooftool(options).VerifySystemTime(options.release_rootfs,
304 rma_mode=options.rma_mode)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800305
306
Hung-Te Line1d80f62016-03-31 14:58:13 +0800307@Command('verify_rootfs',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800308 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800309def VerifyRootFs(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800310 """Verify rootfs on SSD is valid by checking hash."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800311
Hung-Te Line1d80f62016-03-31 14:58:13 +0800312 return GetGooftool(options).VerifyRootFs(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800313
Hung-Te Lin56b18402015-01-16 14:52:30 +0800314
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800315@Command('verify_tpm')
Peter Shihfdf17682017-05-26 11:38:39 +0800316def VerifyTPM(options):
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800317 """Verify TPM is cleared."""
318
319 return GetGooftool(options).VerifyTPM()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800320
Hung-Te Lin56b18402015-01-16 14:52:30 +0800321
Hung-Te Lindd708d42014-07-11 17:05:01 +0800322@Command('verify_me_locked')
Peter Shihfdf17682017-05-26 11:38:39 +0800323def VerifyManagementEngineLocked(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800324 """Verify Management Engine is locked."""
Hung-Te Lindd708d42014-07-11 17:05:01 +0800325
326 return GetGooftool(options).VerifyManagementEngineLocked()
327
Hung-Te Lin56b18402015-01-16 14:52:30 +0800328
Marco Chena681b2e2018-08-31 11:41:41 +0800329@Command('verify_switch_wp',
330 _no_ectool_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800331def VerifyWPSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800332 """Verify hardware write protection switch is enabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800333
Marco Chena681b2e2018-08-31 11:41:41 +0800334 GetGooftool(options).VerifyWPSwitch(options.has_ectool)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800335
336
Hung-Te Lin53c49402017-07-26 13:10:58 +0800337@Command('verify_vpd')
338def VerifyVPD(options):
339 """Verify that VPD values are properly set.
Jon Salzadd90d32014-04-29 16:16:27 +0800340
Hung-Te Lin53c49402017-07-26 13:10:58 +0800341 Check if mandatory fields are set, and deprecated fields don't exist.
Jon Salzadd90d32014-04-29 16:16:27 +0800342 """
Hung-Te Lin53c49402017-07-26 13:10:58 +0800343 return GetGooftool(options).VerifyVPD()
Jon Salzadd90d32014-04-29 16:16:27 +0800344
345
bowgotsai13820f42015-09-10 23:18:04 +0800346@Command('verify_release_channel',
347 _enforced_release_channels_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800348def VerifyReleaseChannel(options):
bowgotsai529139c2015-05-30 01:39:49 +0800349 """Verify that release image channel is correct.
350
351 ChromeOS has four channels: canary, dev, beta and stable.
352 The last three channels support image auto-updates, checks
353 that release image channel is one of them.
354 """
bowgotsai13820f42015-09-10 23:18:04 +0800355 return GetGooftool(options).VerifyReleaseChannel(
356 options.enforced_release_channels)
bowgotsai529139c2015-05-30 01:39:49 +0800357
358
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800359@Command('write_protect')
Peter Shihfdf17682017-05-26 11:38:39 +0800360def EnableFwWp(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800361 """Enable then verify firmware write protection."""
Peter Shihfdf17682017-05-26 11:38:39 +0800362 del options # Unused.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800363
Yong Hongdad230a2017-08-30 22:25:19 +0800364 def WriteProtect(fw):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800365 """Calculate protection size, then invoke flashrom.
366
Yong Hongdad230a2017-08-30 22:25:19 +0800367 The region (offset and size) to write protect may be different per chipset
368 and firmware layout, so we have to read the WP_RO section from FMAP to
369 decide that.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800370 """
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800371 wp_section = 'WP_RO'
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800372
Yong Hongdad230a2017-08-30 22:25:19 +0800373 fmap_image = fw.GetFirmwareImage(
374 sections=(['FMAP'] if fw.target == crosfw.TARGET_MAIN else None))
375 if not fmap_image.has_section(wp_section):
376 raise Error('Could not find %s firmware section: %s' %
377 (fw.target.upper(), wp_section))
378
379 section_data = fw.GetFirmwareImage(
380 sections=[wp_section]).get_section_area(wp_section)
Peter Shihe6afab32018-09-11 17:16:48 +0800381 ro_offset, ro_size = section_data[0:2]
Yong Hongdad230a2017-08-30 22:25:19 +0800382
383 logging.debug('write protecting %s [off=%x size=%x]', fw.target.upper(),
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800384 ro_offset, ro_size)
Yong Hongdad230a2017-08-30 22:25:19 +0800385 crosfw.Flashrom(fw.target).EnableWriteProtection(ro_offset, ro_size)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800386
Philip Chendbb06202019-11-05 17:24:26 -0800387 if HasFpmcu():
388 # TODO(b/143991572): Implement enable_fpmcu_write_protection in gooftool.
389 cmd = os.path.join(
390 paths.FACTORY_DIR, 'sh', 'enable_fpmcu_write_protection.sh')
391 cmd_result = Shell(cmd)
392 if not cmd_result.success:
393 raise Error(
394 'Failed to enable FPMCU write protection, stdout=%r, stderr=%r' %
395 (cmd_result.stdout, cmd_result.stderr))
396
Yong Hongdad230a2017-08-30 22:25:19 +0800397 WriteProtect(crosfw.LoadMainFirmware())
Andy Cheng0465d132013-03-20 12:12:06 +0800398 event_log.Log('wp', fw='main')
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800399
400 # Some EC (mostly PD) does not support "RO NOW". Instead they will only set
401 # "RO_AT_BOOT" when you request to enable RO (These platforms consider
402 # --wp-range with right range identical to --wp-enable), and requires a
403 # 'ectool reboot_ec RO at-shutdown; reboot' to let the RO take effect.
Hung-Te Lin0d10b562016-12-28 10:58:07 +0800404 # After reboot, "flashrom -p host --wp-status" will return protected range.
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800405 # If you don't reboot, returned range will be (0, 0), and running command
406 # "ectool flashprotect" will not have RO_NOW.
407
Yong Hongdad230a2017-08-30 22:25:19 +0800408 for fw in [crosfw.LoadEcFirmware(), crosfw.LoadPDFirmware()]:
409 if fw.GetChipId() is None:
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800410 logging.warning('%s not write protected (seems there is no %s flash).',
Yong Hongdad230a2017-08-30 22:25:19 +0800411 fw.target.upper(), fw.target.upper())
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800412 continue
Yong Hongdad230a2017-08-30 22:25:19 +0800413 WriteProtect(fw)
414 event_log.Log('wp', fw=fw.target)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800415
416
417@Command('clear_gbb_flags')
Peter Shihfdf17682017-05-26 11:38:39 +0800418def ClearGBBFlags(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800419 """Zero out the GBB flags, in preparation for transition to release state.
420
421 No GBB flags are set in release/shipping state, but they are useful
Hung-Te Lin879cff42017-06-19 12:46:37 +0800422 for factory/development. See "futility gbb --flags" for details.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800423 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800424
Ricky Lianga70a1202013-03-15 15:03:17 +0800425 GetGooftool(options).ClearGBBFlags()
Andy Cheng0465d132013-03-20 12:12:06 +0800426 event_log.Log('clear_gbb_flags')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800427
428
Jon Salzaa3a30e2013-05-15 15:56:28 +0800429@Command('clear_factory_vpd_entries')
Peter Shihfdf17682017-05-26 11:38:39 +0800430def ClearFactoryVPDEntries(options):
Jon Salzaa3a30e2013-05-15 15:56:28 +0800431 """Clears factory.* items in the RW VPD."""
432 entries = GetGooftool(options).ClearFactoryVPDEntries()
433 event_log.Log('clear_factory_vpd_entries', entries=FilterDict(entries))
434
435
Mattias Nisslercca761b2015-04-15 21:53:04 +0200436@Command('generate_stable_device_secret')
Peter Shihfdf17682017-05-26 11:38:39 +0800437def GenerateStableDeviceSecret(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800438 """Generates a fresh stable device secret and stores it in the RO VPD."""
Mattias Nisslercca761b2015-04-15 21:53:04 +0200439 GetGooftool(options).GenerateStableDeviceSecret()
440 event_log.Log('generate_stable_device_secret')
441
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800442
Yves Arrouyeb49b31e2019-03-06 21:51:52 -0800443@Command('cr50_set_sn_bits_and_board_id')
444def Cr50SetSnBitsAndBoardId(options):
445 """Set the serial number bits, board id and flags on the Cr50 chip."""
446 GetGooftool(options).Cr50SetSnBitsAndBoardId()
447 event_log.Log('cr50_set_sn_bits_and_board_id')
Shen-En Shihd078a7c2017-08-04 13:33:49 +0800448
449
Marco Chen20c885d2018-10-04 17:22:03 +0800450@Command('cr50_disable_factory_mode')
Marco Chen44a666d2018-07-13 21:01:50 +0800451def Cr50DisableFactoryMode(options):
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800452 """Reset Cr50 state back to default state after RMA."""
Marco Chen44a666d2018-07-13 21:01:50 +0800453 return GetGooftool(options).Cr50DisableFactoryMode()
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800454
455
Earl Ou564a7872016-10-05 10:22:00 +0800456@Command('enable_release_partition',
457 CmdArg('--release_rootfs',
458 help=('path to the release rootfs device. If not specified, '
459 'the default (5th) partition will be used.')))
460def EnableReleasePartition(options):
461 """Enables a release image partition on the disk."""
462 GetGooftool(options).EnableReleasePartition(options.release_rootfs)
463
464
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800465@Command('wipe_in_place',
466 CmdArg('--fast', action='store_true',
Shun-Hsing Ou8d3c40a2015-10-08 18:16:08 +0800467 help='use non-secure but faster wipe method.'),
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800468 _shopfloor_url_args_cmd_arg,
469 _station_ip_cmd_arg,
470 _station_port_cmd_arg,
471 _wipe_finish_token_cmd_arg)
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800472def WipeInPlace(options):
473 """Start factory wipe directly without reboot."""
474
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800475 GetGooftool(options).WipeInPlace(options.fast,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800476 options.shopfloor_url,
477 options.station_ip,
478 options.station_port,
479 options.wipe_finish_token)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200480
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800481@Command('wipe_init',
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800482 CmdArg('--wipe_args', help='arguments for clobber-state'),
483 CmdArg('--state_dev', help='path to stateful partition device'),
484 CmdArg('--root_disk', help='path to primary device'),
485 CmdArg('--old_root', help='path to old root'),
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800486 _shopfloor_url_args_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800487 _release_rootfs_cmd_arg,
488 _station_ip_cmd_arg,
489 _station_port_cmd_arg,
Wei-Han Chenf3924112019-02-25 14:52:58 +0800490 _wipe_finish_token_cmd_arg,
491 _keep_developer_mode_flag_after_clobber_state_cmd_arg)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800492def WipeInit(options):
Wei-Han Chenf3924112019-02-25 14:52:58 +0800493 GetGooftool(options).WipeInit(
494 options.wipe_args,
495 options.shopfloor_url,
496 options.state_dev,
497 options.release_rootfs,
498 options.root_disk,
499 options.old_root,
500 options.station_ip,
501 options.station_port,
502 options.wipe_finish_token,
503 options.keep_developer_mode_flag_after_clobber_state)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800504
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800505@Command('verify',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800506 CmdArg('--no_write_protect', action='store_true',
507 help='Do not check write protection switch state.'),
Tammo Spalink95c43732012-07-25 15:57:14 -0700508 _hwid_status_list_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800509 _hwdb_path_cmd_arg,
Yong Hong5408f652017-07-11 19:20:25 +0800510 _project_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800511 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800512 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800513 _hwid_run_vpd_cmd_arg,
514 _hwid_vpd_data_file_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800515 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800516 _cros_core_cmd_arg,
Yilun Lin599833f2017-12-22 14:07:46 +0800517 _chromebox_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800518 _ec_pubkey_path_cmd_arg,
519 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800520 _release_rootfs_cmd_arg,
521 _firmware_path_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800522 _enforced_release_channels_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800523 _waive_list_cmd_arg,
Marco Chena681b2e2018-08-31 11:41:41 +0800524 _skip_list_cmd_arg,
525 _no_ectool_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800526def Verify(options):
527 """Verifies if whole factory process is ready for finalization.
528
529 This routine performs all the necessary checks to make sure the
530 device is ready to be finalized, but does not modify state. These
531 checks include dev switch, firmware write protection switch, hwid,
532 system time, keys, and root file system.
533 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800534
Hung-Te Lin6d827542012-07-19 11:50:41 +0800535 if not options.no_write_protect:
Ricky Lianga70a1202013-03-15 15:03:17 +0800536 VerifyWPSwitch(options)
Hung-Te Lindd708d42014-07-11 17:05:01 +0800537 VerifyManagementEngineLocked(options)
Ting Shen129fa6f2016-09-02 12:22:24 +0800538 VerifyHWID(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800539 VerifySystemTime(options)
Yilun Lin599833f2017-12-22 14:07:46 +0800540 if options.chromebox:
541 VerifyECKey(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800542 VerifyKeys(options)
543 VerifyRootFs(options)
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800544 VerifyTPM(options)
Hung-Te Lin53c49402017-07-26 13:10:58 +0800545 VerifyVPD(options)
bowgotsai529139c2015-05-30 01:39:49 +0800546 VerifyReleaseChannel(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800547
Hung-Te Lin56b18402015-01-16 14:52:30 +0800548
Jon Salzfe9036f2014-01-16 14:11:23 +0800549@Command('untar_stateful_files')
Hung-Te Lin388bce22014-06-03 19:56:40 +0800550def UntarStatefulFiles(unused_options):
Jon Salzfe9036f2014-01-16 14:11:23 +0800551 """Untars stateful files from stateful_files.tar.xz on stateful partition.
552
553 If that file does not exist (which should only be R30 and earlier),
554 this is a no-op.
555 """
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800556 # Path to stateful partition on device.
557 device_stateful_path = '/mnt/stateful_partition'
558 tar_file = os.path.join(device_stateful_path, 'stateful_files.tar.xz')
Jon Salzfe9036f2014-01-16 14:11:23 +0800559 if os.path.exists(tar_file):
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800560 Spawn(['tar', 'xf', tar_file], cwd=device_stateful_path,
Jon Salzfe9036f2014-01-16 14:11:23 +0800561 log=True, check_call=True)
562 else:
563 logging.warning('No stateful files at %s', tar_file)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800564
Jon Salz40b9f822014-07-25 16:39:55 +0800565
566@Command('log_source_hashes')
Peter Shihfdf17682017-05-26 11:38:39 +0800567def LogSourceHashes(options):
Jon Salz40b9f822014-07-25 16:39:55 +0800568 """Logs hashes of source files in the factory toolkit."""
Peter Shihfdf17682017-05-26 11:38:39 +0800569 del options # Unused.
Jon Salze60307f2014-08-05 16:20:00 +0800570 # WARNING: The following line is necessary to validate the integrity
571 # of the factory software. Do not remove or modify it.
572 #
573 # 警告:此行会验证工厂软件的完整性,禁止删除或修改。
Wei-Han Chena5c01a02016-04-23 19:27:19 +0800574 factory_par = sys_utils.GetRunningFactoryPythonArchivePath()
575 if factory_par:
576 event_log.Log(
577 'source_hashes',
578 **file_utils.HashPythonArchive(factory_par))
579 else:
580 event_log.Log(
581 'source_hashes',
Peter Shihad166772017-05-31 11:36:17 +0800582 **file_utils.HashSourceTree(os.path.join(paths.FACTORY_DIR, 'py')))
Jon Salz40b9f822014-07-25 16:39:55 +0800583
584
Tammo Spalink86a61c62012-05-25 15:10:35 +0800585@Command('log_system_details')
Peter Shihfdf17682017-05-26 11:38:39 +0800586def LogSystemDetails(options):
Tammo Spalink86a61c62012-05-25 15:10:35 +0800587 """Write miscellaneous system details to the event log."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800588
Ricky Liang43b879b2014-02-24 11:36:55 +0800589 event_log.Log('system_details', **GetGooftool(options).GetSystemDetails())
Tammo Spalink86a61c62012-05-25 15:10:35 +0800590
591
Jon Salza88b83b2013-05-27 20:00:35 +0800592def CreateReportArchiveBlob(*args, **kwargs):
593 """Creates a report archive and returns it as a blob.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800594
Jon Salza88b83b2013-05-27 20:00:35 +0800595 Args:
596 See CreateReportArchive.
Andy Cheng7a76cb82012-11-19 18:08:19 +0800597
Jon Salza88b83b2013-05-27 20:00:35 +0800598 Returns:
599 An xmlrpclib.Binary object containing a .tar.xz file.
600 """
Wei-Han Chen47416612016-09-14 17:41:52 +0800601 report_archive = CreateReportArchive(*args, **kwargs)
602 try:
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800603 return xmlrpclib.Binary(file_utils.ReadFile(report_archive))
Wei-Han Chen47416612016-09-14 17:41:52 +0800604 finally:
605 os.unlink(report_archive)
Jon Salza88b83b2013-05-27 20:00:35 +0800606
607
608def CreateReportArchive(device_sn=None, add_file=None):
609 """Creates a report archive in a temporary directory.
610
611 Args:
612 device_sn: The device serial number (optional).
613 add_file: A list of files to add (optional).
614
615 Returns:
616 Path to the archive.
617 """
Philip Chen6ada02c2019-11-04 19:41:54 +0000618 # Flush Testlog data to DATA_TESTLOG_DIR before creating a report archive.
619 result, reason = state.GetInstance().FlushTestlog(
620 uplink=False, local=True, timeout=10)
621 if not result:
622 logging.warning('Failed to flush testlog data: %s', reason)
623
Hung-Te Lin6bd16472012-06-20 16:26:47 +0800624 def NormalizeAsFileName(token):
625 return re.sub(r'\W+', '', token).strip()
Jon Salza88b83b2013-05-27 20:00:35 +0800626
627 target_name = '%s%s.tar.xz' % (
628 time.strftime('%Y%m%dT%H%M%SZ',
629 time.gmtime()),
Hung-Te Lin56b18402015-01-16 14:52:30 +0800630 ('' if device_sn is None else
631 '_' + NormalizeAsFileName(device_sn)))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800632 target_path = os.path.join(gettempdir(), target_name)
Jon Salza88b83b2013-05-27 20:00:35 +0800633
Tammo Spalink86a61c62012-05-25 15:10:35 +0800634 # Intentionally ignoring dotfiles in EVENT_LOG_DIR.
Andy Cheng0465d132013-03-20 12:12:06 +0800635 tar_cmd = 'cd %s ; tar cJf %s *' % (event_log.EVENT_LOG_DIR, target_path)
Peter Shihb4e49352017-05-25 17:35:11 +0800636 tar_cmd += ' %s' % paths.FACTORY_LOG_PATH
Philip Chen6ada02c2019-11-04 19:41:54 +0000637 tar_cmd += ' %s' % paths.DATA_TESTLOG_DIR
Jon Salza88b83b2013-05-27 20:00:35 +0800638 if add_file:
639 for f in add_file:
Jon Salz65266432012-07-30 19:02:49 +0800640 # Require absolute paths since the tar command may change the
641 # directory.
642 if not f.startswith('/'):
643 raise Error('Not an absolute path: %s' % f)
644 if not os.path.exists(f):
645 raise Error('File does not exist: %s' % f)
Wei-Han Chen4b755022017-01-04 10:51:52 +0800646 tar_cmd += ' %s' % pipes.quote(f)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800647 cmd_result = Shell(tar_cmd)
Jon Salzff88c022012-11-03 12:19:58 +0800648
649 if ((cmd_result.status == 1) and
650 all((x == '' or
651 'file changed as we read it' in x or
652 "Removing leading `/' from member names" in x)
653 for x in cmd_result.stderr.split('\n'))):
654 # That's OK. Make sure it's valid though.
Vic Yang85199e72013-01-28 14:33:11 +0800655 Spawn(['tar', 'tfJ', target_path], check_call=True, log=True,
Jon Salzff88c022012-11-03 12:19:58 +0800656 ignore_stdout=True)
657 elif not cmd_result.success:
Tammo Spalink86a61c62012-05-25 15:10:35 +0800658 raise Error('unable to tar event logs, cmd %r failed, stderr: %r' %
659 (tar_cmd, cmd_result.stderr))
Jon Salzff88c022012-11-03 12:19:58 +0800660
Jon Salza88b83b2013-05-27 20:00:35 +0800661 return target_path
662
663_upload_method_cmd_arg = CmdArg(
664 '--upload_method', metavar='METHOD:PARAM',
665 help=('How to perform the upload. METHOD should be one of '
666 '{ftp, shopfloor, ftps, cpfe}.'))
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800667_upload_max_retry_times_arg = CmdArg(
668 '--upload_max_retry_times', type=int, default=0,
669 help='Number of tries to upload. 0 to retry infinitely.')
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800670_upload_retry_interval_arg = CmdArg(
671 '--upload_retry_interval', type=int, default=None,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800672 help='Retry interval in seconds.')
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800673_upload_allow_fail_arg = CmdArg(
674 '--upload_allow_fail', action='store_true',
675 help='Continue finalize if report upload fails.')
Jon Salza88b83b2013-05-27 20:00:35 +0800676_add_file_cmd_arg = CmdArg(
677 '--add_file', metavar='FILE', action='append',
678 help='Extra file to include in report (must be an absolute path)')
679
Hung-Te Lin56b18402015-01-16 14:52:30 +0800680
Jon Salza88b83b2013-05-27 20:00:35 +0800681@Command('upload_report',
682 _upload_method_cmd_arg,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800683 _upload_max_retry_times_arg,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800684 _upload_retry_interval_arg,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800685 _upload_allow_fail_arg,
Jon Salza88b83b2013-05-27 20:00:35 +0800686 _add_file_cmd_arg)
687def UploadReport(options):
688 """Create a report containing key device details."""
Yong Hong65bda312018-12-13 20:05:58 +0800689 ro_vpd = vpd.VPDTool().GetAllData(partition=vpd.VPD_READONLY_PARTITION_NAME)
Jon Salza88b83b2013-05-27 20:00:35 +0800690 device_sn = ro_vpd.get('serial_number', None)
691 if device_sn is None:
692 logging.warning('RO_VPD missing device serial number')
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +0800693 device_sn = 'MISSING_SN_' + time_utils.TimedUUID()
chuntsena6da2be2019-08-14 17:11:55 +0800694 target_path = CreateReportArchive(device_sn, options.add_file)
Jon Salza88b83b2013-05-27 20:00:35 +0800695
Tammo Spalink86a61c62012-05-25 15:10:35 +0800696 if options.upload_method is None or options.upload_method == 'none':
697 logging.warning('REPORT UPLOAD SKIPPED (report left at %s)', target_path)
698 return
699 method, param = options.upload_method.split(':', 1)
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800700
701 if options.upload_retry_interval is not None:
702 retry_interval = options.upload_retry_interval
703 else:
704 retry_interval = report_upload.DEFAULT_RETRY_INTERVAL
705
Tammo Spalink86a61c62012-05-25 15:10:35 +0800706 if method == 'shopfloor':
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800707 report_upload.ShopFloorUpload(
708 target_path, param,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800709 'GRT' if options.command_name == 'finalize' else None,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800710 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800711 retry_interval=retry_interval,
712 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800713 elif method == 'ftp':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800714 report_upload.FtpUpload(target_path, 'ftp:' + param,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800715 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800716 retry_interval=retry_interval,
717 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800718 elif method == 'ftps':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800719 report_upload.CurlUrlUpload(target_path, '--ftp-ssl-reqd ftp:%s' % param,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800720 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800721 retry_interval=retry_interval,
722 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800723 elif method == 'cpfe':
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800724 report_upload.CpfeUpload(target_path, pipes.quote(param),
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800725 max_retry_times=options.upload_max_retry_times,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800726 retry_interval=retry_interval,
727 allow_fail=options.upload_allow_fail)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800728 else:
Peter Shihbf6f22b2018-02-26 14:05:28 +0800729 raise Error('unknown report upload method %r' % method)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800730
731
732@Command('finalize',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800733 CmdArg('--no_write_protect', action='store_true',
734 help='Do not enable firmware write protection.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800735 CmdArg('--fast', action='store_true',
736 help='use non-secure but faster wipe method.'),
Yong Hongb2926bd2018-10-12 14:11:14 +0800737 _no_ectool_cmd_arg,
Shun-Hsing Oudb407d62015-11-11 11:03:59 +0800738 _shopfloor_url_args_cmd_arg,
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800739 _hwdb_path_cmd_arg,
Tammo Spalink95c43732012-07-25 15:57:14 -0700740 _hwid_status_list_cmd_arg,
Jon Salz65266432012-07-30 19:02:49 +0800741 _upload_method_cmd_arg,
Cheng-Han Yang31a3bd92018-08-23 19:04:04 +0800742 _upload_max_retry_times_arg,
Cheng-Han Yang3d4b0c02018-08-23 18:24:14 +0800743 _upload_retry_interval_arg,
Cheng-Han Yangc1697e22018-08-24 15:22:39 +0800744 _upload_allow_fail_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800745 _add_file_cmd_arg,
746 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800747 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800748 _hwid_run_vpd_cmd_arg,
749 _hwid_vpd_data_file_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800750 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800751 _cros_core_cmd_arg,
Yilun Lin599833f2017-12-22 14:07:46 +0800752 _chromebox_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800753 _ec_pubkey_path_cmd_arg,
754 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800755 _release_rootfs_cmd_arg,
756 _firmware_path_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800757 _enforced_release_channels_cmd_arg,
758 _station_ip_cmd_arg,
759 _station_port_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800760 _wipe_finish_token_cmd_arg,
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800761 _rlz_embargo_end_date_offset_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800762 _waive_list_cmd_arg,
chuntsenaf1232f2019-03-20 15:45:54 +0800763 _skip_list_cmd_arg,
Philip Chen04fb90b2019-11-06 12:10:33 -0800764 _no_generate_mfg_date_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800765def Finalize(options):
766 """Verify system readiness and trigger transition into release state.
767
Jon Salzaa3a30e2013-05-15 15:56:28 +0800768 This routine does the following:
769 - Verifies system state (see verify command)
Jon Salzfe9036f2014-01-16 14:11:23 +0800770 - Untars stateful_files.tar.xz, if it exists, in the stateful partition, to
771 initialize files such as the CRX cache
Jon Salzaa3a30e2013-05-15 15:56:28 +0800772 - Modifies firmware bitmaps to match locale
773 - Clears all factory-friendly flags from the GBB
774 - Removes factory-specific entries from RW_VPD (factory.*)
775 - Enables firmware write protection (cannot rollback after this)
Marco Chenecee04f2019-02-15 22:24:24 +0800776 - Initialize Fpmcu entropy
Jon Salzaa3a30e2013-05-15 15:56:28 +0800777 - Uploads system logs & reports
Earl Ou51182222016-09-09 12:16:48 +0800778 - Wipes the testing kernel, rootfs, and stateful partition
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800779 """
Wei-Han Cheneb4f9a22018-03-09 14:52:23 +0800780 if not options.rma_mode:
781 # Write VPD values related to RLZ ping into VPD.
782 GetGooftool(options).WriteVPDForRLZPing(options.embargo_offset)
chuntsenaf1232f2019-03-20 15:45:54 +0800783 if options.generate_mfg_date:
784 GetGooftool(options).WriteVPDForMFGDate()
Yves Arrouyeb49b31e2019-03-06 21:51:52 -0800785 Cr50SetSnBitsAndBoardId(options)
Marco Chen44a666d2018-07-13 21:01:50 +0800786 Cr50DisableFactoryMode(options)
Marco Chen9d0631c2018-08-31 10:52:44 +0800787 Verify(options)
Jon Salz40b9f822014-07-25 16:39:55 +0800788 LogSourceHashes(options)
Jon Salzfe9036f2014-01-16 14:11:23 +0800789 UntarStatefulFiles(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800790 if options.cros_core:
791 logging.info('SetFirmwareBitmapLocale is skipped for ChromeOS Core device.')
792 else:
793 SetFirmwareBitmapLocale(options)
Jon Salzaa3a30e2013-05-15 15:56:28 +0800794 ClearFactoryVPDEntries(options)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200795 GenerateStableDeviceSecret(options)
Shen-En Shih3e079b22017-09-11 05:43:09 -0700796 ClearGBBFlags(options)
Hung-Te Lin6d827542012-07-19 11:50:41 +0800797 if options.no_write_protect:
798 logging.warn('WARNING: Firmware Write Protection is SKIPPED.')
Andy Cheng0465d132013-03-20 12:12:06 +0800799 event_log.Log('wp', fw='both', status='skipped')
Hung-Te Lin6d827542012-07-19 11:50:41 +0800800 else:
Wei-Han Chenba21f512016-10-14 18:52:33 +0800801 EnableFwWp(options)
Marco Chenecee04f2019-02-15 22:24:24 +0800802 FpmcuInitializeEntropy(options)
Jon Salza0f58e02012-05-29 19:33:39 +0800803 LogSystemDetails(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800804 UploadReport(options)
Earl Ou51182222016-09-09 12:16:48 +0800805
806 event_log.Log('wipe_in_place')
807 wipe_args = []
Earl Ou51182222016-09-09 12:16:48 +0800808 if options.shopfloor_url:
809 wipe_args += ['--shopfloor_url', options.shopfloor_url]
810 if options.fast:
811 wipe_args += ['--fast']
812 if options.station_ip:
813 wipe_args += ['--station_ip', options.station_ip]
814 if options.station_port:
815 wipe_args += ['--station_port', options.station_port]
816 if options.wipe_finish_token:
817 wipe_args += ['--wipe_finish_token', options.wipe_finish_token]
818 ExecFactoryPar('gooftool', 'wipe_in_place', *wipe_args)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800819
820
Ting Shen129fa6f2016-09-02 12:22:24 +0800821@Command('verify_hwid',
822 _probe_results_cmd_arg,
823 _hwdb_path_cmd_arg,
824 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800825 _hwid_run_vpd_cmd_arg,
826 _hwid_vpd_data_file_cmd_arg,
Ting Shen129fa6f2016-09-02 12:22:24 +0800827 _rma_mode_cmd_arg)
828def VerifyHWID(options):
Ricky Liangc662be32013-12-24 11:50:23 +0800829 """A simple wrapper that calls out to HWID utils to verify version 3 HWID.
Ricky Liang53390232013-03-08 15:37:57 +0800830
Ricky Liangc662be32013-12-24 11:50:23 +0800831 This is mainly for Gooftool to verify v3 HWID during finalize. For testing
832 and development purposes, please use `hwid` command.
Ricky Liang53390232013-03-08 15:37:57 +0800833 """
Yong Hongada8e0e2018-01-04 16:36:21 +0800834 database = GetGooftool(options).db
Yong Hong68a0e0d2017-12-20 19:06:54 +0800835
Yong Hongada8e0e2018-01-04 16:36:21 +0800836 encoded_string = options.hwid or GetGooftool(options).ReadHWID()
837
838 probed_results = hwid_utils.GetProbedResults(infile=options.probe_results)
Yong Hong2c39bf22018-01-24 22:24:11 +0800839 device_info = hwid_utils.GetDeviceInfo()
Yong Hong65bda312018-12-13 20:05:58 +0800840 vpd_data = hwid_utils.GetVPDData(run_vpd=options.hwid_run_vpd,
841 infile=options.hwid_vpd_data_file)
Ricky Liang53390232013-03-08 15:37:57 +0800842
Hung-Te Lin11052952015-03-18 13:48:59 +0800843 event_log.Log('probed_results', probed_results=FilterDict(probed_results))
Yong Hong65bda312018-12-13 20:05:58 +0800844 event_log.Log('vpd', vpd=FilterDict(vpd_data))
Ricky Liang53390232013-03-08 15:37:57 +0800845
Yong Hong2c39bf22018-01-24 22:24:11 +0800846 hwid_utils.VerifyHWID(database, encoded_string, probed_results,
Yong Hong65bda312018-12-13 20:05:58 +0800847 device_info, vpd_data, options.rma_mode)
Ricky Liang53390232013-03-08 15:37:57 +0800848
Ricky Liangc662be32013-12-24 11:50:23 +0800849 event_log.Log('verified_hwid', hwid=encoded_string)
Ricky Liang53390232013-03-08 15:37:57 +0800850
851
henryhsu44d793a2013-07-20 00:07:38 +0800852@Command('get_firmware_hash',
Marco Chence70b132018-05-03 23:43:39 +0800853 CmdArg('--file', required=True, metavar='FILE', help='Firmware File.'))
henryhsu44d793a2013-07-20 00:07:38 +0800854def GetFirmwareHash(options):
henryhsuf6f835c2013-07-20 20:49:25 +0800855 """Get firmware hash from a file"""
henryhsu44d793a2013-07-20 00:07:38 +0800856 if os.path.exists(options.file):
Cheng-Han Yang2c668ae2018-04-18 22:31:07 +0800857 value_dict = chromeos_firmware.CalculateFirmwareHashes(options.file)
Yilin Yangea784662019-09-26 13:51:03 +0800858 for key, value in iteritems(value_dict):
Yilin Yang71e39412019-09-24 09:26:46 +0800859 print(' %s: %s' % (key, value))
henryhsu44d793a2013-07-20 00:07:38 +0800860 else:
861 raise Error('File does not exist: %s' % options.file)
862
henryhsuf6f835c2013-07-20 20:49:25 +0800863
Philip Chen04fb90b2019-11-06 12:10:33 -0800864@Command('fpmcu_initialize_entropy')
Marco Chenecee04f2019-02-15 22:24:24 +0800865def FpmcuInitializeEntropy(options):
866 """Initialze entropy of FPMCU."""
Philip Chen04fb90b2019-11-06 12:10:33 -0800867
868 if HasFpmcu():
Marco Chenecee04f2019-02-15 22:24:24 +0800869 GetGooftool(options).FpmcuInitializeEntropy()
Philip Chen04fb90b2019-11-06 12:10:33 -0800870 else:
871 logging.info('No FPS on this board.')
Marco Chenecee04f2019-02-15 22:24:24 +0800872
873
Peter Shihfdf17682017-05-26 11:38:39 +0800874def main():
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800875 """Run sub-command specified by the command line args."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800876
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800877 options = ParseCmdline(
Ting Shen129fa6f2016-09-02 12:22:24 +0800878 'Perform Google required factory tests.',
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800879 CmdArg('-l', '--log', metavar='PATH',
880 help='Write logs to this file.'),
Jon Salza4bea382012-10-29 13:00:34 +0800881 CmdArg('--suppress-event-logs', action='store_true',
882 help='Suppress event logging.'),
Wei-Han Chenaff56232016-04-16 09:17:59 +0800883 CmdArg('--phase', default=None,
884 help=('override phase for phase checking (defaults to the current '
885 'as returned by the "factory phase" command)')),
Wei-Han Chenb34bdff2019-09-26 13:07:50 +0800886 VERBOSITY_CMD_ARG)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800887 SetupLogging(options.verbosity, options.log)
Andy Cheng0465d132013-03-20 12:12:06 +0800888 event_log.SetGlobalLoggerDefaultPrefix('gooftool')
889 event_log.GetGlobalLogger().suppress = options.suppress_event_logs
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800890 logging.debug('gooftool options: %s', repr(options))
Wei-Han Chenaff56232016-04-16 09:17:59 +0800891
892 phase.OverridePhase(options.phase)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800893 try:
894 logging.debug('GOOFTOOL command %r', options.command_name)
895 options.command(options)
896 logging.info('GOOFTOOL command %r SUCCESS', options.command_name)
Peter Shih6674ecf2018-03-29 14:04:57 +0800897 except Error as e:
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800898 logging.exception(e)
899 sys.exit('GOOFTOOL command %r ERROR: %s' % (options.command_name, e))
Peter Shih6674ecf2018-03-29 14:04:57 +0800900 except Exception as e:
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800901 logging.exception(e)
902 sys.exit('UNCAUGHT RUNTIME EXCEPTION %s' % e)
903
904
905if __name__ == '__main__':
Peter Shihfdf17682017-05-26 11:38:39 +0800906 main()