blob: ab0f4965fa91ce3cbaaa4e9d89d5bf3574063a40 [file] [log] [blame]
You-Cheng Syuf0f4be12017-12-05 16:33:53 +08001#!/usr/bin/env python
Jon Salze60307f2014-08-05 16:20:00 +08002# -*- coding: utf-8 -*-
3# Copyright 2014 The Chromium OS Authors. All rights reserved.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08004# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
Jon Salze60307f2014-08-05 16:20:00 +08007
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08008"""Google Factory Tool.
9
You-Cheng Syu461ec032017-03-06 15:56:58 +080010This tool is intended to be used on factory assembly lines. It
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080011provides all of the Google required test functionality and must be run
12on each device as part of the assembly process.
13"""
14
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080015import logging
16import os
Jon Salz65266432012-07-30 19:02:49 +080017import pipes
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080018import re
19import sys
Peter Shihfdf17682017-05-26 11:38:39 +080020from tempfile import gettempdir
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080021import threading
Hung-Te Lin6bd16472012-06-20 16:26:47 +080022import time
Jon Salza88b83b2013-05-27 20:00:35 +080023import xmlrpclib
Peter Shihfdf17682017-05-26 11:38:39 +080024
Peter Shihfdf17682017-05-26 11:38:39 +080025import factory_common # pylint: disable=unused-import
Wei-Han Chen0a3320e2016-04-23 01:32:07 +080026from cros.factory.gooftool.common import ExecFactoryPar
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080027from cros.factory.gooftool.common import Shell
Peter Shihfdf17682017-05-26 11:38:39 +080028from cros.factory.gooftool.core import Gooftool
29from cros.factory.gooftool import crosfw
Peter Shihfdf17682017-05-26 11:38:39 +080030from cros.factory.gooftool import report_upload
Hung-Te Lin604e0c22015-11-24 15:17:07 +080031from cros.factory.hwid.v3 import common
32from cros.factory.hwid.v3 import hwid_utils
Yong Hong863d3262017-10-30 16:23:34 +080033from cros.factory.probe.functions import chromeos_firmware
Wei-Han Chen2ebb92d2016-01-12 14:51:41 +080034from cros.factory.test.env import paths
Peter Shihfdf17682017-05-26 11:38:39 +080035from cros.factory.test import event_log
Wei-Han Chenaff56232016-04-16 09:17:59 +080036from cros.factory.test.rules import phase
Hung-Te Lin3f096842016-01-13 17:37:06 +080037from cros.factory.test.rules.privacy import FilterDict
Peter Shihfdf17682017-05-26 11:38:39 +080038from cros.factory.utils import argparse_utils
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080039from cros.factory.utils.argparse_utils import CmdArg
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080040from cros.factory.utils.argparse_utils import ParseCmdline
41from cros.factory.utils.argparse_utils import verbosity_cmd_arg
Peter Shihfdf17682017-05-26 11:38:39 +080042from cros.factory.utils.debug_utils import SetupLogging
Jon Salz40b9f822014-07-25 16:39:55 +080043from cros.factory.utils import file_utils
Yong Hongf008bd72017-12-22 04:46:27 +080044from cros.factory.utils import json_utils
Wei-Han Chena5c01a02016-04-23 19:27:19 +080045from cros.factory.utils import sys_utils
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +080046from cros.factory.utils import time_utils
Jon Salzff88c022012-11-03 12:19:58 +080047from cros.factory.utils.process_utils import Spawn
Joel Kitchingd3bc2662014-12-16 16:03:32 -080048from cros.factory.utils.type_utils import Error
Tammo Spalink86a61c62012-05-25 15:10:35 +080049
Tammo Spalink5c699832012-07-03 17:50:39 +080050
Tammo Spalink5c699832012-07-03 17:50:39 +080051# TODO(tammo): Replace calls to sys.exit with raise Exit, and maybe
52# treat that specially (as a smoot exit, as opposed to the more
53# verbose output for generic Error).
54
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080055_global_gooftool = None
56_gooftool_lock = threading.Lock()
Tammo Spalink5c699832012-07-03 17:50:39 +080057
Hung-Te Lin56b18402015-01-16 14:52:30 +080058
Ricky Lianga70a1202013-03-15 15:03:17 +080059def GetGooftool(options):
Peter Shihfdf17682017-05-26 11:38:39 +080060 global _global_gooftool # pylint: disable=global-statement
Ricky Lianga70a1202013-03-15 15:03:17 +080061
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080062 if _global_gooftool is None:
63 with _gooftool_lock:
Shen-En Shihc5d15d62017-08-04 13:02:59 +080064 if _global_gooftool is None:
65 project = getattr(options, 'project', None)
66 hwdb_path = getattr(options, 'hwdb_path', None)
67 _global_gooftool = Gooftool(hwid_version=3, project=project,
68 hwdb_path=hwdb_path)
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080069
70 return _global_gooftool
Ricky Lianga70a1202013-03-15 15:03:17 +080071
Hung-Te Lin56b18402015-01-16 14:52:30 +080072
Ting Shen18a06382016-08-30 16:18:21 +080073def Command(cmd_name, *args, **kwargs):
You-Cheng Syu8fc2a602017-12-22 17:05:05 +080074 """Decorator for commands in gooftool.
Ting Shen18a06382016-08-30 16:18:21 +080075
76 This is similar to argparse_utils.Command, but all gooftool commands
77 can be waived during `gooftool finalize` or `gooftool verify` using
Wei-Han Chen60c5d332017-01-05 17:15:10 +080078 --waive_list or --skip_list option.
Ting Shen18a06382016-08-30 16:18:21 +080079 """
80 def Decorate(fun):
Wei-Han Chen60c5d332017-01-05 17:15:10 +080081 def CommandWithWaiveSkipCheck(options):
Ting Shen18a06382016-08-30 16:18:21 +080082 waive_list = vars(options).get('waive_list', [])
Wei-Han Chen60c5d332017-01-05 17:15:10 +080083 skip_list = vars(options).get('skip_list', [])
84 if phase.GetPhase() >= phase.PVT_DOGFOOD and (
85 waive_list != [] or skip_list != []):
Ting Shen18a06382016-08-30 16:18:21 +080086 raise Error(
Wei-Han Chen60c5d332017-01-05 17:15:10 +080087 'waive_list and skip_list should be empty for phase %s' %
88 phase.GetPhase())
Ting Shen18a06382016-08-30 16:18:21 +080089
Wei-Han Chen60c5d332017-01-05 17:15:10 +080090 if cmd_name not in skip_list:
91 try:
92 fun(options)
93 except Exception as e:
94 if cmd_name in waive_list:
95 logging.exception(e)
96 else:
97 raise
Ting Shen18a06382016-08-30 16:18:21 +080098
99 return argparse_utils.Command(cmd_name, *args, **kwargs)(
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800100 CommandWithWaiveSkipCheck)
Ting Shen18a06382016-08-30 16:18:21 +0800101 return Decorate
102
103
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800104@Command('write_hwid',
105 CmdArg('hwid', metavar='HWID', help='HWID string'))
Andy Chengc92e6f92012-11-20 16:55:53 +0800106def WriteHWID(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800107 """Write specified HWID value into the system BB."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800108
Tammo Spalink95c43732012-07-25 15:57:14 -0700109 logging.info('writing hwid string %r', options.hwid)
Ricky Lianga70a1202013-03-15 15:03:17 +0800110 GetGooftool(options).WriteHWID(options.hwid)
Andy Cheng0465d132013-03-20 12:12:06 +0800111 event_log.Log('write_hwid', hwid=options.hwid)
Tammo Spalink95c43732012-07-25 15:57:14 -0700112 print 'Wrote HWID: %r' % options.hwid
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800113
114
Yong Hong5408f652017-07-11 19:20:25 +0800115_project_cmd_arg = CmdArg(
116 '--project', metavar='PROJECT',
117 default=None, help='Project name to test.')
Ricky Liang53390232013-03-08 15:37:57 +0800118
Tammo Spalink8fab5312012-05-28 18:33:30 +0800119_hwdb_path_cmd_arg = CmdArg(
120 '--hwdb_path', metavar='PATH',
Ricky Liangeede7922013-06-19 10:18:41 +0800121 default=common.DEFAULT_HWID_DATA_PATH,
Tammo Spalink8fab5312012-05-28 18:33:30 +0800122 help='Path to the HWID database.')
123
Tammo Spalink95c43732012-07-25 15:57:14 -0700124_hwid_status_list_cmd_arg = CmdArg(
Hung-Te Lin56b18402015-01-16 14:52:30 +0800125 '--status', nargs='*', default=['supported'],
126 help='allow only HWIDs with these status values')
Tammo Spalink95c43732012-07-25 15:57:14 -0700127
Jon Salzce124fb2012-10-02 17:42:03 +0800128_probe_results_cmd_arg = CmdArg(
129 '--probe_results', metavar='RESULTS.yaml',
Yong Hong863d3262017-10-30 16:23:34 +0800130 help=('Output from "gooftool probe" (used instead of '
Jon Salzce124fb2012-10-02 17:42:03 +0800131 'probing this system).'))
132
Ricky Liang53390232013-03-08 15:37:57 +0800133_device_info_cmd_arg = CmdArg(
Ricky Liangf89f73a2013-03-19 05:00:24 +0800134 '--device_info', metavar='DEVICE_INFO.yaml', default=None,
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800135 help='A dict of device info to use instead of fetching from shopfloor '
Ricky Liang53390232013-03-08 15:37:57 +0800136 'server.')
137
Jon Salzce124fb2012-10-02 17:42:03 +0800138_hwid_cmd_arg = CmdArg(
139 '--hwid', metavar='HWID',
Ricky Lianga70a1202013-03-15 15:03:17 +0800140 help='HWID to verify (instead of the currently set HWID of this system).')
Jon Salzce124fb2012-10-02 17:42:03 +0800141
Yong Hong68a0e0d2017-12-20 19:06:54 +0800142_hwid_run_vpd_cmd_arg = CmdArg(
143 '--hwid-run-vpd', action='store_true',
144 help=('Specify the hwid utility to obtain the vpd data by running the '
145 '`vpd` commandline tool.'))
146
147_hwid_vpd_data_file_cmd_arg = CmdArg(
148 '--hwid-vpd-data-file', metavar='FILE.json', type=str, default=None,
149 help=('Specify the hwid utility to obtain the vpd data from the specified '
150 'file.'))
151
Bernie Thompson3c11c872013-07-22 18:22:45 -0700152_rma_mode_cmd_arg = CmdArg(
153 '--rma_mode', action='store_true',
154 help='Enable RMA mode, do not check for deprecated components.')
Tammo Spalink95c43732012-07-25 15:57:14 -0700155
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800156_cros_core_cmd_arg = CmdArg(
157 '--cros_core', action='store_true',
158 help='Finalize for ChromeOS Core devices (may add or remove few test '
Hung-Te Lin53c49402017-07-26 13:10:58 +0800159 'items. For example, registration codes or firmware bitmap '
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800160 'locale settings).')
161
Yilun Lin599833f2017-12-22 14:07:46 +0800162_chromebox_cmd_arg = CmdArg(
163 '--chromebox', action='store_true', default=None,
164 help='Finalize for ChromeBox devices (may add or remove few test '
165 'items. For example, VerifyECKey).')
166
bowgotsai13820f42015-09-10 23:18:04 +0800167_enforced_release_channels_cmd_arg = CmdArg(
168 '--enforced_release_channels', nargs='*', default=None,
169 help='Enforced release image channels.')
170
Yilun Lin34f54802017-11-16 11:58:25 +0800171_ec_pubkey_path_cmd_arg = CmdArg(
172 '--ec_pubkey_path',
173 default=None,
174 help='Path to public key in vb2 format. Verify EC key with pubkey file.')
175
176_ec_pubkey_hash_cmd_arg = CmdArg(
177 '--ec_pubkey_hash',
178 default=None,
179 help='A string for public key hash. Verify EC key with the given hash.')
180
Hung-Te Lincdb96522016-04-15 16:51:10 +0800181_release_rootfs_cmd_arg = CmdArg(
182 '--release_rootfs', help='Location of release image rootfs partition.')
183
184_firmware_path_cmd_arg = CmdArg(
185 '--firmware_path', help='Location of firmware image partition.')
Ricky Liang43b879b2014-02-24 11:36:55 +0800186
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800187_shopfloor_url_args_cmd_arg = CmdArg(
188 '--shopfloor_url',
Earl Ou51182222016-09-09 12:16:48 +0800189 help='Shopfloor server url to be informed when wiping is done. '
190 'After wiping, a XML-RPC request will be sent to the '
191 'given url to indicate the completion of wiping.')
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800192
193_station_ip_cmd_arg = CmdArg(
194 '--station_ip',
195 help='IP of remote station')
196
197_station_port_cmd_arg = CmdArg(
198 '--station_port',
199 help='Port on remote station')
200
201_wipe_finish_token_cmd_arg = CmdArg(
202 '--wipe_finish_token',
203 help='Required token when notifying station after wipe finished')
204
Ting Shen18a06382016-08-30 16:18:21 +0800205_waive_list_cmd_arg = CmdArg(
206 '--waive_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800207 help='A list of waived checks, separated by whitespace. '
208 'Each item should be a sub-command of gooftool. '
Ting Shen18a06382016-08-30 16:18:21 +0800209 'e.g. "gooftool verify --waive_list verify_tpm clear_gbb_flags".')
210
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800211_skip_list_cmd_arg = CmdArg(
212 '--skip_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu8fc2a602017-12-22 17:05:05 +0800213 help='A list of skipped checks, separated by whitespace. '
214 'Each item should be a sub-command of gooftool. '
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800215 'e.g. "gooftool verify --skip_list verify_tpm clear_gbb_flags".')
216
Tammo Spalink8fab5312012-05-28 18:33:30 +0800217
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800218@Command('probe',
219 CmdArg('--comps', nargs='*',
220 help='List of keys from the component_db registry.'),
221 CmdArg('--no_vol', action='store_true',
Yong Hong863d3262017-10-30 16:23:34 +0800222 help='Do not probe volatile data.'))
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800223def RunProbe(options):
Yong Hongf008bd72017-12-22 04:46:27 +0800224 """Print json-formatted breakdown of probed device properties."""
225 logging.warning('This sub-command is going to be deprecated by `probe` '
226 'command-line tool, please see `probe --help` for detail.')
Yong Hong863d3262017-10-30 16:23:34 +0800227 probed_result = GetGooftool(options).Probe(options.comps, not options.no_vol)
Yong Hongf008bd72017-12-22 04:46:27 +0800228 print json_utils.DumpStr(probed_result, pretty=True)
Ricky Liang53390232013-03-08 15:37:57 +0800229
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800230
Yong Hong863d3262017-10-30 16:23:34 +0800231@Command('verify_components')
Tammo Spalink214caf42012-05-28 10:45:00 +0800232def VerifyComponents(options):
Yong Hong863d3262017-10-30 16:23:34 +0800233 del options
234 msg = ('This command has already been deprecated, please use '
235 '`hwid verify-components` instead.')
236 print msg
237 sys.exit(1)
Tammo Spalink214caf42012-05-28 10:45:00 +0800238
239
Yilun Lin34f54802017-11-16 11:58:25 +0800240@Command(
241 'verify_ec_key',
242 _ec_pubkey_path_cmd_arg,
243 _ec_pubkey_hash_cmd_arg)
244def VerifyECKey(options):
245 """Verify EC key."""
246 return GetGooftool(options).VerifyECKey(
247 options.ec_pubkey_path, options.ec_pubkey_hash)
248
249
Hung-Te Line1d80f62016-03-31 14:58:13 +0800250@Command('verify_keys',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800251 _release_rootfs_cmd_arg,
252 _firmware_path_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800253def VerifyKeys(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800254 """Verify keys in firmware and SSD match."""
Hung-Te Line1d80f62016-03-31 14:58:13 +0800255 return GetGooftool(options).VerifyKeys(
Hung-Te Lincdb96522016-04-15 16:51:10 +0800256 options.release_rootfs, options.firmware_path)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800257
258
259@Command('set_fw_bitmap_locale')
Peter Shihfdf17682017-05-26 11:38:39 +0800260def SetFirmwareBitmapLocale(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800261 """Use VPD locale value to set firmware bitmap default language."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800262
Ricky Lianga70a1202013-03-15 15:03:17 +0800263 (index, locale) = GetGooftool(options).SetFirmwareBitmapLocale()
Andy Cheng2582d292012-12-04 17:38:28 +0800264 logging.info('Firmware bitmap initial locale set to %d (%s).',
265 index, locale)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800266
267
Hung-Te Line1d80f62016-03-31 14:58:13 +0800268@Command('verify_system_time',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800269 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800270def VerifySystemTime(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800271 """Verify system time is later than release filesystem creation time."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800272
Hung-Te Lincdb96522016-04-15 16:51:10 +0800273 return GetGooftool(options).VerifySystemTime(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800274
275
Hung-Te Line1d80f62016-03-31 14:58:13 +0800276@Command('verify_rootfs',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800277 _release_rootfs_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800278def VerifyRootFs(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800279 """Verify rootfs on SSD is valid by checking hash."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800280
Hung-Te Line1d80f62016-03-31 14:58:13 +0800281 return GetGooftool(options).VerifyRootFs(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800282
Hung-Te Lin56b18402015-01-16 14:52:30 +0800283
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800284@Command('verify_tpm')
Peter Shihfdf17682017-05-26 11:38:39 +0800285def VerifyTPM(options):
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800286 """Verify TPM is cleared."""
287
288 return GetGooftool(options).VerifyTPM()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800289
Hung-Te Lin56b18402015-01-16 14:52:30 +0800290
Hung-Te Lindd708d42014-07-11 17:05:01 +0800291@Command('verify_me_locked')
Peter Shihfdf17682017-05-26 11:38:39 +0800292def VerifyManagementEngineLocked(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800293 """Verify Management Engine is locked."""
Hung-Te Lindd708d42014-07-11 17:05:01 +0800294
295 return GetGooftool(options).VerifyManagementEngineLocked()
296
Hung-Te Lin56b18402015-01-16 14:52:30 +0800297
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800298@Command('verify_switch_wp')
Peter Shihfdf17682017-05-26 11:38:39 +0800299def VerifyWPSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800300 """Verify hardware write protection switch is enabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800301
Ricky Lianga70a1202013-03-15 15:03:17 +0800302 GetGooftool(options).VerifyWPSwitch()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800303
304
305@Command('verify_switch_dev')
Peter Shihfdf17682017-05-26 11:38:39 +0800306def VerifyDevSwitch(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800307 """Verify developer switch is disabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800308
Ricky Lianga70a1202013-03-15 15:03:17 +0800309 if GetGooftool(options).CheckDevSwitchForDisabling():
Hung-Te Lind7d34722012-07-26 16:48:35 +0800310 logging.warn('VerifyDevSwitch: No physical switch.')
Andy Cheng0465d132013-03-20 12:12:06 +0800311 event_log.Log('switch_dev', type='virtual switch')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800312
313
Hung-Te Lin53c49402017-07-26 13:10:58 +0800314@Command('verify_vpd')
315def VerifyVPD(options):
316 """Verify that VPD values are properly set.
Jon Salzadd90d32014-04-29 16:16:27 +0800317
Hung-Te Lin53c49402017-07-26 13:10:58 +0800318 Check if mandatory fields are set, and deprecated fields don't exist.
Jon Salzadd90d32014-04-29 16:16:27 +0800319 """
Hung-Te Lin53c49402017-07-26 13:10:58 +0800320 return GetGooftool(options).VerifyVPD()
Jon Salzadd90d32014-04-29 16:16:27 +0800321
322
bowgotsai13820f42015-09-10 23:18:04 +0800323@Command('verify_release_channel',
324 _enforced_release_channels_cmd_arg)
Peter Shihfdf17682017-05-26 11:38:39 +0800325def VerifyReleaseChannel(options):
bowgotsai529139c2015-05-30 01:39:49 +0800326 """Verify that release image channel is correct.
327
328 ChromeOS has four channels: canary, dev, beta and stable.
329 The last three channels support image auto-updates, checks
330 that release image channel is one of them.
331 """
bowgotsai13820f42015-09-10 23:18:04 +0800332 return GetGooftool(options).VerifyReleaseChannel(
333 options.enforced_release_channels)
bowgotsai529139c2015-05-30 01:39:49 +0800334
335
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800336@Command('write_protect')
Peter Shihfdf17682017-05-26 11:38:39 +0800337def EnableFwWp(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800338 """Enable then verify firmware write protection."""
Peter Shihfdf17682017-05-26 11:38:39 +0800339 del options # Unused.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800340
Yong Hongdad230a2017-08-30 22:25:19 +0800341 def WriteProtect(fw):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800342 """Calculate protection size, then invoke flashrom.
343
Yong Hongdad230a2017-08-30 22:25:19 +0800344 The region (offset and size) to write protect may be different per chipset
345 and firmware layout, so we have to read the WP_RO section from FMAP to
346 decide that.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800347 """
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800348 wp_section = 'WP_RO'
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800349
Yong Hongdad230a2017-08-30 22:25:19 +0800350 fmap_image = fw.GetFirmwareImage(
351 sections=(['FMAP'] if fw.target == crosfw.TARGET_MAIN else None))
352 if not fmap_image.has_section(wp_section):
353 raise Error('Could not find %s firmware section: %s' %
354 (fw.target.upper(), wp_section))
355
356 section_data = fw.GetFirmwareImage(
357 sections=[wp_section]).get_section_area(wp_section)
358 ro_offset, ro_size = section_data[0 : 2]
359
360 logging.debug('write protecting %s [off=%x size=%x]', fw.target.upper(),
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800361 ro_offset, ro_size)
Yong Hongdad230a2017-08-30 22:25:19 +0800362 crosfw.Flashrom(fw.target).EnableWriteProtection(ro_offset, ro_size)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800363
Yong Hongdad230a2017-08-30 22:25:19 +0800364 WriteProtect(crosfw.LoadMainFirmware())
Andy Cheng0465d132013-03-20 12:12:06 +0800365 event_log.Log('wp', fw='main')
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800366
367 # Some EC (mostly PD) does not support "RO NOW". Instead they will only set
368 # "RO_AT_BOOT" when you request to enable RO (These platforms consider
369 # --wp-range with right range identical to --wp-enable), and requires a
370 # 'ectool reboot_ec RO at-shutdown; reboot' to let the RO take effect.
Hung-Te Lin0d10b562016-12-28 10:58:07 +0800371 # After reboot, "flashrom -p host --wp-status" will return protected range.
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800372 # If you don't reboot, returned range will be (0, 0), and running command
373 # "ectool flashprotect" will not have RO_NOW.
374
Yong Hongdad230a2017-08-30 22:25:19 +0800375 for fw in [crosfw.LoadEcFirmware(), crosfw.LoadPDFirmware()]:
376 if fw.GetChipId() is None:
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800377 logging.warning('%s not write protected (seems there is no %s flash).',
Yong Hongdad230a2017-08-30 22:25:19 +0800378 fw.target.upper(), fw.target.upper())
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800379 continue
Yong Hongdad230a2017-08-30 22:25:19 +0800380 WriteProtect(fw)
381 event_log.Log('wp', fw=fw.target)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800382
383
384@Command('clear_gbb_flags')
Peter Shihfdf17682017-05-26 11:38:39 +0800385def ClearGBBFlags(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800386 """Zero out the GBB flags, in preparation for transition to release state.
387
388 No GBB flags are set in release/shipping state, but they are useful
Hung-Te Lin879cff42017-06-19 12:46:37 +0800389 for factory/development. See "futility gbb --flags" for details.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800390 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800391
Ricky Lianga70a1202013-03-15 15:03:17 +0800392 GetGooftool(options).ClearGBBFlags()
Andy Cheng0465d132013-03-20 12:12:06 +0800393 event_log.Log('clear_gbb_flags')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800394
395
Jon Salzaa3a30e2013-05-15 15:56:28 +0800396@Command('clear_factory_vpd_entries')
Peter Shihfdf17682017-05-26 11:38:39 +0800397def ClearFactoryVPDEntries(options):
Jon Salzaa3a30e2013-05-15 15:56:28 +0800398 """Clears factory.* items in the RW VPD."""
399 entries = GetGooftool(options).ClearFactoryVPDEntries()
400 event_log.Log('clear_factory_vpd_entries', entries=FilterDict(entries))
401
402
Mattias Nisslercca761b2015-04-15 21:53:04 +0200403@Command('generate_stable_device_secret')
Peter Shihfdf17682017-05-26 11:38:39 +0800404def GenerateStableDeviceSecret(options):
You-Cheng Syu461ec032017-03-06 15:56:58 +0800405 """Generates a fresh stable device secret and stores it in the RO VPD."""
Mattias Nisslercca761b2015-04-15 21:53:04 +0200406 GetGooftool(options).GenerateStableDeviceSecret()
407 event_log.Log('generate_stable_device_secret')
408
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800409
Shen-En Shihd078a7c2017-08-04 13:33:49 +0800410@Command('cr50_set_board_id')
411def Cr50SetBoardId(options):
412 """Set the board id and flag in the Cr50 chip."""
413 GetGooftool(options).Cr50SetBoardId()
414 event_log.Log('cr50_set_board_id')
415
416
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800417@Command('cr50_reset_state')
418def Cr50ResetState(options):
419 """Reset Cr50 state back to default state after RMA."""
420 return GetGooftool(options).Cr50ResetState()
421
422
Earl Ou564a7872016-10-05 10:22:00 +0800423@Command('enable_release_partition',
424 CmdArg('--release_rootfs',
425 help=('path to the release rootfs device. If not specified, '
426 'the default (5th) partition will be used.')))
427def EnableReleasePartition(options):
428 """Enables a release image partition on the disk."""
429 GetGooftool(options).EnableReleasePartition(options.release_rootfs)
430
431
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800432@Command('wipe_in_place',
433 CmdArg('--fast', action='store_true',
Shun-Hsing Ou8d3c40a2015-10-08 18:16:08 +0800434 help='use non-secure but faster wipe method.'),
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800435 _shopfloor_url_args_cmd_arg,
436 _station_ip_cmd_arg,
437 _station_port_cmd_arg,
438 _wipe_finish_token_cmd_arg)
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800439def WipeInPlace(options):
440 """Start factory wipe directly without reboot."""
441
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800442 GetGooftool(options).WipeInPlace(options.fast,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800443 options.shopfloor_url,
444 options.station_ip,
445 options.station_port,
446 options.wipe_finish_token)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200447
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800448@Command('wipe_init',
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800449 CmdArg('--wipe_args', help='arguments for clobber-state'),
450 CmdArg('--state_dev', help='path to stateful partition device'),
451 CmdArg('--root_disk', help='path to primary device'),
452 CmdArg('--old_root', help='path to old root'),
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800453 _shopfloor_url_args_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800454 _release_rootfs_cmd_arg,
455 _station_ip_cmd_arg,
456 _station_port_cmd_arg,
457 _wipe_finish_token_cmd_arg)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800458def WipeInit(options):
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800459 GetGooftool(options).WipeInit(options.wipe_args,
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800460 options.shopfloor_url,
461 options.state_dev,
462 options.release_rootfs,
463 options.root_disk,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800464 options.old_root,
465 options.station_ip,
466 options.station_port,
467 options.wipe_finish_token)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800468
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800469@Command('verify',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800470 CmdArg('--no_write_protect', action='store_true',
471 help='Do not check write protection switch state.'),
Tammo Spalink95c43732012-07-25 15:57:14 -0700472 _hwid_status_list_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800473 _hwdb_path_cmd_arg,
Yong Hong5408f652017-07-11 19:20:25 +0800474 _project_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800475 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800476 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800477 _hwid_run_vpd_cmd_arg,
478 _hwid_vpd_data_file_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800479 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800480 _cros_core_cmd_arg,
Yilun Lin599833f2017-12-22 14:07:46 +0800481 _chromebox_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800482 _ec_pubkey_path_cmd_arg,
483 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800484 _release_rootfs_cmd_arg,
485 _firmware_path_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800486 _enforced_release_channels_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800487 _waive_list_cmd_arg,
488 _skip_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800489def Verify(options):
490 """Verifies if whole factory process is ready for finalization.
491
492 This routine performs all the necessary checks to make sure the
493 device is ready to be finalized, but does not modify state. These
494 checks include dev switch, firmware write protection switch, hwid,
495 system time, keys, and root file system.
496 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800497
Hung-Te Lin6d827542012-07-19 11:50:41 +0800498 if not options.no_write_protect:
Ricky Lianga70a1202013-03-15 15:03:17 +0800499 VerifyWPSwitch(options)
Hung-Te Lindd708d42014-07-11 17:05:01 +0800500 VerifyManagementEngineLocked(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800501 VerifyDevSwitch(options)
Ting Shen129fa6f2016-09-02 12:22:24 +0800502 VerifyHWID(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800503 VerifySystemTime(options)
Yilun Lin599833f2017-12-22 14:07:46 +0800504 if options.chromebox:
505 VerifyECKey(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800506 VerifyKeys(options)
507 VerifyRootFs(options)
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800508 VerifyTPM(options)
Hung-Te Lin53c49402017-07-26 13:10:58 +0800509 VerifyVPD(options)
bowgotsai529139c2015-05-30 01:39:49 +0800510 VerifyReleaseChannel(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800511
Hung-Te Lin56b18402015-01-16 14:52:30 +0800512
Jon Salzfe9036f2014-01-16 14:11:23 +0800513@Command('untar_stateful_files')
Hung-Te Lin388bce22014-06-03 19:56:40 +0800514def UntarStatefulFiles(unused_options):
Jon Salzfe9036f2014-01-16 14:11:23 +0800515 """Untars stateful files from stateful_files.tar.xz on stateful partition.
516
517 If that file does not exist (which should only be R30 and earlier),
518 this is a no-op.
519 """
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800520 # Path to stateful partition on device.
521 device_stateful_path = '/mnt/stateful_partition'
522 tar_file = os.path.join(device_stateful_path, 'stateful_files.tar.xz')
Jon Salzfe9036f2014-01-16 14:11:23 +0800523 if os.path.exists(tar_file):
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800524 Spawn(['tar', 'xf', tar_file], cwd=device_stateful_path,
Jon Salzfe9036f2014-01-16 14:11:23 +0800525 log=True, check_call=True)
526 else:
527 logging.warning('No stateful files at %s', tar_file)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800528
Jon Salz40b9f822014-07-25 16:39:55 +0800529
530@Command('log_source_hashes')
Peter Shihfdf17682017-05-26 11:38:39 +0800531def LogSourceHashes(options):
Jon Salz40b9f822014-07-25 16:39:55 +0800532 """Logs hashes of source files in the factory toolkit."""
Peter Shihfdf17682017-05-26 11:38:39 +0800533 del options # Unused.
Jon Salze60307f2014-08-05 16:20:00 +0800534 # WARNING: The following line is necessary to validate the integrity
535 # of the factory software. Do not remove or modify it.
536 #
537 # 警告:此行会验证工厂软件的完整性,禁止删除或修改。
Wei-Han Chena5c01a02016-04-23 19:27:19 +0800538 factory_par = sys_utils.GetRunningFactoryPythonArchivePath()
539 if factory_par:
540 event_log.Log(
541 'source_hashes',
542 **file_utils.HashPythonArchive(factory_par))
543 else:
544 event_log.Log(
545 'source_hashes',
Peter Shihad166772017-05-31 11:36:17 +0800546 **file_utils.HashSourceTree(os.path.join(paths.FACTORY_DIR, 'py')))
Jon Salz40b9f822014-07-25 16:39:55 +0800547
548
Tammo Spalink86a61c62012-05-25 15:10:35 +0800549@Command('log_system_details')
Peter Shihfdf17682017-05-26 11:38:39 +0800550def LogSystemDetails(options):
Tammo Spalink86a61c62012-05-25 15:10:35 +0800551 """Write miscellaneous system details to the event log."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800552
Ricky Liang43b879b2014-02-24 11:36:55 +0800553 event_log.Log('system_details', **GetGooftool(options).GetSystemDetails())
Tammo Spalink86a61c62012-05-25 15:10:35 +0800554
555
Jon Salza88b83b2013-05-27 20:00:35 +0800556def CreateReportArchiveBlob(*args, **kwargs):
557 """Creates a report archive and returns it as a blob.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800558
Jon Salza88b83b2013-05-27 20:00:35 +0800559 Args:
560 See CreateReportArchive.
Andy Cheng7a76cb82012-11-19 18:08:19 +0800561
Jon Salza88b83b2013-05-27 20:00:35 +0800562 Returns:
563 An xmlrpclib.Binary object containing a .tar.xz file.
564 """
Wei-Han Chen47416612016-09-14 17:41:52 +0800565 report_archive = CreateReportArchive(*args, **kwargs)
566 try:
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800567 return xmlrpclib.Binary(file_utils.ReadFile(report_archive))
Wei-Han Chen47416612016-09-14 17:41:52 +0800568 finally:
569 os.unlink(report_archive)
Jon Salza88b83b2013-05-27 20:00:35 +0800570
571
572def CreateReportArchive(device_sn=None, add_file=None):
573 """Creates a report archive in a temporary directory.
574
575 Args:
576 device_sn: The device serial number (optional).
577 add_file: A list of files to add (optional).
578
579 Returns:
580 Path to the archive.
581 """
Hung-Te Lin6bd16472012-06-20 16:26:47 +0800582 def NormalizeAsFileName(token):
583 return re.sub(r'\W+', '', token).strip()
Jon Salza88b83b2013-05-27 20:00:35 +0800584
585 target_name = '%s%s.tar.xz' % (
586 time.strftime('%Y%m%dT%H%M%SZ',
587 time.gmtime()),
Hung-Te Lin56b18402015-01-16 14:52:30 +0800588 ('' if device_sn is None else
589 '_' + NormalizeAsFileName(device_sn)))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800590 target_path = os.path.join(gettempdir(), target_name)
Jon Salza88b83b2013-05-27 20:00:35 +0800591
Tammo Spalink86a61c62012-05-25 15:10:35 +0800592 # Intentionally ignoring dotfiles in EVENT_LOG_DIR.
Andy Cheng0465d132013-03-20 12:12:06 +0800593 tar_cmd = 'cd %s ; tar cJf %s *' % (event_log.EVENT_LOG_DIR, target_path)
Peter Shihb4e49352017-05-25 17:35:11 +0800594 tar_cmd += ' %s' % paths.FACTORY_LOG_PATH
Jon Salza88b83b2013-05-27 20:00:35 +0800595 if add_file:
596 for f in add_file:
Jon Salz65266432012-07-30 19:02:49 +0800597 # Require absolute paths since the tar command may change the
598 # directory.
599 if not f.startswith('/'):
600 raise Error('Not an absolute path: %s' % f)
601 if not os.path.exists(f):
602 raise Error('File does not exist: %s' % f)
Wei-Han Chen4b755022017-01-04 10:51:52 +0800603 tar_cmd += ' %s' % pipes.quote(f)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800604 cmd_result = Shell(tar_cmd)
Jon Salzff88c022012-11-03 12:19:58 +0800605
606 if ((cmd_result.status == 1) and
607 all((x == '' or
608 'file changed as we read it' in x or
609 "Removing leading `/' from member names" in x)
610 for x in cmd_result.stderr.split('\n'))):
611 # That's OK. Make sure it's valid though.
Vic Yang85199e72013-01-28 14:33:11 +0800612 Spawn(['tar', 'tfJ', target_path], check_call=True, log=True,
Jon Salzff88c022012-11-03 12:19:58 +0800613 ignore_stdout=True)
614 elif not cmd_result.success:
Tammo Spalink86a61c62012-05-25 15:10:35 +0800615 raise Error('unable to tar event logs, cmd %r failed, stderr: %r' %
616 (tar_cmd, cmd_result.stderr))
Jon Salzff88c022012-11-03 12:19:58 +0800617
Jon Salza88b83b2013-05-27 20:00:35 +0800618 return target_path
619
620_upload_method_cmd_arg = CmdArg(
621 '--upload_method', metavar='METHOD:PARAM',
622 help=('How to perform the upload. METHOD should be one of '
623 '{ftp, shopfloor, ftps, cpfe}.'))
624_add_file_cmd_arg = CmdArg(
625 '--add_file', metavar='FILE', action='append',
626 help='Extra file to include in report (must be an absolute path)')
627
Hung-Te Lin56b18402015-01-16 14:52:30 +0800628
Jon Salza88b83b2013-05-27 20:00:35 +0800629@Command('upload_report',
630 _upload_method_cmd_arg,
631 _add_file_cmd_arg)
632def UploadReport(options):
633 """Create a report containing key device details."""
Yong Hong863d3262017-10-30 16:23:34 +0800634 ro_vpd = sys_utils.VPDTool().GetAllData(
635 partition=sys_utils.VPDTool.RO_PARTITION)
Jon Salza88b83b2013-05-27 20:00:35 +0800636 device_sn = ro_vpd.get('serial_number', None)
637 if device_sn is None:
638 logging.warning('RO_VPD missing device serial number')
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +0800639 device_sn = 'MISSING_SN_' + time_utils.TimedUUID()
Jon Salza88b83b2013-05-27 20:00:35 +0800640 target_path = CreateReportArchive(device_sn)
641
Tammo Spalink86a61c62012-05-25 15:10:35 +0800642 if options.upload_method is None or options.upload_method == 'none':
643 logging.warning('REPORT UPLOAD SKIPPED (report left at %s)', target_path)
644 return
645 method, param = options.upload_method.split(':', 1)
646 if method == 'shopfloor':
You-Cheng Syuf0f4be12017-12-05 16:33:53 +0800647 report_upload.ShopFloorUpload(
648 target_path, param,
649 'GRT' if options.command_name == 'finalize' else None)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800650 elif method == 'ftp':
Jay Kim360c1dd2012-06-25 10:58:11 -0700651 report_upload.FtpUpload(target_path, 'ftp:' + param)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800652 elif method == 'ftps':
653 report_upload.CurlUrlUpload(target_path, '--ftp-ssl-reqd ftp:%s' % param)
654 elif method == 'cpfe':
Shawn Nematbakhsh3404a092013-01-28 16:49:09 -0800655 report_upload.CpfeUpload(target_path, pipes.quote(param))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800656 else:
657 raise Error('unknown report upload method %r', method)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800658
659
660@Command('finalize',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800661 CmdArg('--no_write_protect', action='store_true',
662 help='Do not enable firmware write protection.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800663 CmdArg('--fast', action='store_true',
664 help='use non-secure but faster wipe method.'),
Shun-Hsing Oudb407d62015-11-11 11:03:59 +0800665 _shopfloor_url_args_cmd_arg,
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800666 _hwdb_path_cmd_arg,
Tammo Spalink95c43732012-07-25 15:57:14 -0700667 _hwid_status_list_cmd_arg,
Jon Salz65266432012-07-30 19:02:49 +0800668 _upload_method_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800669 _add_file_cmd_arg,
670 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800671 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800672 _hwid_run_vpd_cmd_arg,
673 _hwid_vpd_data_file_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800674 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800675 _cros_core_cmd_arg,
Yilun Lin599833f2017-12-22 14:07:46 +0800676 _chromebox_cmd_arg,
Yilun Lin34f54802017-11-16 11:58:25 +0800677 _ec_pubkey_path_cmd_arg,
678 _ec_pubkey_hash_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800679 _release_rootfs_cmd_arg,
680 _firmware_path_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800681 _enforced_release_channels_cmd_arg,
682 _station_ip_cmd_arg,
683 _station_port_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800684 _wipe_finish_token_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800685 _waive_list_cmd_arg,
686 _skip_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800687def Finalize(options):
688 """Verify system readiness and trigger transition into release state.
689
Jon Salzaa3a30e2013-05-15 15:56:28 +0800690 This routine does the following:
691 - Verifies system state (see verify command)
Jon Salzfe9036f2014-01-16 14:11:23 +0800692 - Untars stateful_files.tar.xz, if it exists, in the stateful partition, to
693 initialize files such as the CRX cache
Jon Salzaa3a30e2013-05-15 15:56:28 +0800694 - Modifies firmware bitmaps to match locale
695 - Clears all factory-friendly flags from the GBB
696 - Removes factory-specific entries from RW_VPD (factory.*)
697 - Enables firmware write protection (cannot rollback after this)
698 - Uploads system logs & reports
Earl Ou51182222016-09-09 12:16:48 +0800699 - Wipes the testing kernel, rootfs, and stateful partition
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800700 """
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800701 Verify(options)
Shen-En Shih3e079b22017-09-11 05:43:09 -0700702 Cr50SetBoardId(options)
Cheng-Han Yang08333af2017-12-18 17:22:38 +0800703 Cr50ResetState(options)
Jon Salz40b9f822014-07-25 16:39:55 +0800704 LogSourceHashes(options)
Jon Salzfe9036f2014-01-16 14:11:23 +0800705 UntarStatefulFiles(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800706 if options.cros_core:
707 logging.info('SetFirmwareBitmapLocale is skipped for ChromeOS Core device.')
708 else:
709 SetFirmwareBitmapLocale(options)
Jon Salzaa3a30e2013-05-15 15:56:28 +0800710 ClearFactoryVPDEntries(options)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200711 GenerateStableDeviceSecret(options)
Shen-En Shih3e079b22017-09-11 05:43:09 -0700712 ClearGBBFlags(options)
Hung-Te Lin6d827542012-07-19 11:50:41 +0800713 if options.no_write_protect:
714 logging.warn('WARNING: Firmware Write Protection is SKIPPED.')
Andy Cheng0465d132013-03-20 12:12:06 +0800715 event_log.Log('wp', fw='both', status='skipped')
Hung-Te Lin6d827542012-07-19 11:50:41 +0800716 else:
Wei-Han Chenba21f512016-10-14 18:52:33 +0800717 EnableFwWp(options)
Jon Salza0f58e02012-05-29 19:33:39 +0800718 LogSystemDetails(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800719 UploadReport(options)
Earl Ou51182222016-09-09 12:16:48 +0800720
721 event_log.Log('wipe_in_place')
722 wipe_args = []
Earl Ou51182222016-09-09 12:16:48 +0800723 if options.shopfloor_url:
724 wipe_args += ['--shopfloor_url', options.shopfloor_url]
725 if options.fast:
726 wipe_args += ['--fast']
727 if options.station_ip:
728 wipe_args += ['--station_ip', options.station_ip]
729 if options.station_port:
730 wipe_args += ['--station_port', options.station_port]
731 if options.wipe_finish_token:
732 wipe_args += ['--wipe_finish_token', options.wipe_finish_token]
733 ExecFactoryPar('gooftool', 'wipe_in_place', *wipe_args)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800734
735
Ting Shen129fa6f2016-09-02 12:22:24 +0800736@Command('verify_hwid',
737 _probe_results_cmd_arg,
738 _hwdb_path_cmd_arg,
739 _hwid_cmd_arg,
Yong Hong68a0e0d2017-12-20 19:06:54 +0800740 _hwid_run_vpd_cmd_arg,
741 _hwid_vpd_data_file_cmd_arg,
Ting Shen129fa6f2016-09-02 12:22:24 +0800742 _rma_mode_cmd_arg)
743def VerifyHWID(options):
Ricky Liangc662be32013-12-24 11:50:23 +0800744 """A simple wrapper that calls out to HWID utils to verify version 3 HWID.
Ricky Liang53390232013-03-08 15:37:57 +0800745
Ricky Liangc662be32013-12-24 11:50:23 +0800746 This is mainly for Gooftool to verify v3 HWID during finalize. For testing
747 and development purposes, please use `hwid` command.
Ricky Liang53390232013-03-08 15:37:57 +0800748 """
Ricky Liangc662be32013-12-24 11:50:23 +0800749 db = GetGooftool(options).db
750 encoded_string = options.hwid or hwid_utils.GetHWIDString()
Ricky Liang7905f272013-03-16 01:57:10 +0800751 if options.probe_results:
Yong Hongf008bd72017-12-22 04:46:27 +0800752 probed_results = hwid_utils.GetProbedResults(infile=options.probe_results)
Ricky Liang7905f272013-03-16 01:57:10 +0800753 else:
Yong Hong863d3262017-10-30 16:23:34 +0800754 probed_results = GetGooftool(options).Probe()
Yong Hong68a0e0d2017-12-20 19:06:54 +0800755
756 vpd = hwid_utils.GetVPDData(options.hwid_run_vpd, options.hwid_vpd_data_file)
Ricky Liang53390232013-03-08 15:37:57 +0800757
Hung-Te Lin11052952015-03-18 13:48:59 +0800758 event_log.Log('probed_results', probed_results=FilterDict(probed_results))
Yong Hong68a0e0d2017-12-20 19:06:54 +0800759 event_log.Log('vpd', vpd=FilterDict(vpd) if vpd is None else None)
Ricky Liang53390232013-03-08 15:37:57 +0800760
Yong Hong68a0e0d2017-12-20 19:06:54 +0800761 hwid_utils.VerifyHWID(db, encoded_string, probed_results, vpd=vpd,
Hung-Te Lin56b18402015-01-16 14:52:30 +0800762 rma_mode=options.rma_mode)
Ricky Liang53390232013-03-08 15:37:57 +0800763
Ricky Liangc662be32013-12-24 11:50:23 +0800764 event_log.Log('verified_hwid', hwid=encoded_string)
Ricky Liang53390232013-03-08 15:37:57 +0800765
766
henryhsu44d793a2013-07-20 00:07:38 +0800767@Command('get_firmware_hash',
768 CmdArg('--file', metavar='FILE', help='Firmware File.'))
769def GetFirmwareHash(options):
henryhsuf6f835c2013-07-20 20:49:25 +0800770 """Get firmware hash from a file"""
henryhsu44d793a2013-07-20 00:07:38 +0800771 if os.path.exists(options.file):
Yong Hong863d3262017-10-30 16:23:34 +0800772 hashes = chromeos_firmware.CalculateFirmwareHashes(options.file)
henryhsu44d793a2013-07-20 00:07:38 +0800773 for section, value_dict in hashes.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800774 print '%s:' % section
henryhsu44d793a2013-07-20 00:07:38 +0800775 for key, value in value_dict.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800776 print ' %s: %s' % (key, value)
henryhsu44d793a2013-07-20 00:07:38 +0800777 else:
778 raise Error('File does not exist: %s' % options.file)
779
henryhsuf6f835c2013-07-20 20:49:25 +0800780
Peter Shihfdf17682017-05-26 11:38:39 +0800781def main():
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800782 """Run sub-command specified by the command line args."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800783
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800784 options = ParseCmdline(
Ting Shen129fa6f2016-09-02 12:22:24 +0800785 'Perform Google required factory tests.',
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800786 CmdArg('-l', '--log', metavar='PATH',
787 help='Write logs to this file.'),
Jon Salza4bea382012-10-29 13:00:34 +0800788 CmdArg('--suppress-event-logs', action='store_true',
789 help='Suppress event logging.'),
Wei-Han Chenaff56232016-04-16 09:17:59 +0800790 CmdArg('--phase', default=None,
791 help=('override phase for phase checking (defaults to the current '
792 'as returned by the "factory phase" command)')),
Tammo Spalink8fab5312012-05-28 18:33:30 +0800793 verbosity_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800794 SetupLogging(options.verbosity, options.log)
Andy Cheng0465d132013-03-20 12:12:06 +0800795 event_log.SetGlobalLoggerDefaultPrefix('gooftool')
796 event_log.GetGlobalLogger().suppress = options.suppress_event_logs
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800797 logging.debug('gooftool options: %s', repr(options))
Wei-Han Chenaff56232016-04-16 09:17:59 +0800798
799 phase.OverridePhase(options.phase)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800800 try:
801 logging.debug('GOOFTOOL command %r', options.command_name)
802 options.command(options)
803 logging.info('GOOFTOOL command %r SUCCESS', options.command_name)
804 except Error, e:
805 logging.exception(e)
806 sys.exit('GOOFTOOL command %r ERROR: %s' % (options.command_name, e))
807 except Exception, e:
808 logging.exception(e)
809 sys.exit('UNCAUGHT RUNTIME EXCEPTION %s' % e)
810
811
812if __name__ == '__main__':
Peter Shihfdf17682017-05-26 11:38:39 +0800813 main()