blob: 787c578a7bf392a038052c0589ee7b1f81f4f8fa [file] [log] [blame]
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08001#!/usr/bin/python
Jon Salze60307f2014-08-05 16:20:00 +08002# -*- coding: utf-8 -*-
3# Copyright 2014 The Chromium OS Authors. All rights reserved.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08004# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
Jon Salze60307f2014-08-05 16:20:00 +08007# pylint: disable=E1101
8
Tammo Spalink9a96b8a2012-04-03 11:10:41 +08009"""Google Factory Tool.
10
You-Cheng Syu461ec032017-03-06 15:56:58 +080011This tool is intended to be used on factory assembly lines. It
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080012provides all of the Google required test functionality and must be run
13on each device as part of the assembly process.
14"""
15
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080016import logging
17import os
Jon Salz65266432012-07-30 19:02:49 +080018import pipes
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080019import re
20import sys
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080021import threading
Hung-Te Lin6bd16472012-06-20 16:26:47 +080022import time
Jon Salza88b83b2013-05-27 20:00:35 +080023import xmlrpclib
Ricky Liang7905f272013-03-16 01:57:10 +080024import yaml
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080025
Andy Cheng2582d292012-12-04 17:38:28 +080026from tempfile import gettempdir
Tammo Spalink86a61c62012-05-25 15:10:35 +080027
Tammo Spalinka40293e2012-07-04 14:58:56 +080028import factory_common # pylint: disable=W0611
Tammo Spalink9a96b8a2012-04-03 11:10:41 +080029
Ricky Liang53390232013-03-08 15:37:57 +080030from cros.factory.gooftool import crosfw
Tammo Spalink01e11722012-07-24 10:17:54 -070031from cros.factory.gooftool import report_upload
Hung-Te Lin84c77fa2016-03-02 17:43:30 +080032from cros.factory.gooftool.core import Gooftool
Wei-Han Chen0a3320e2016-04-23 01:32:07 +080033from cros.factory.gooftool.common import ExecFactoryPar
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080034from cros.factory.gooftool.common import Shell
Ting Shen129fa6f2016-09-02 12:22:24 +080035from cros.factory.gooftool.probe import Probe
36from cros.factory.gooftool.probe import ReadRoVpd
henryhsu44d793a2013-07-20 00:07:38 +080037from cros.factory.gooftool.probe import CalculateFirmwareHashes
Hung-Te Lin604e0c22015-11-24 15:17:07 +080038from cros.factory.hwid.v3 import common
39from cros.factory.hwid.v3 import hwid_utils
Hung-Te Lin91492a12014-11-25 18:56:30 +080040from cros.factory.test import event_log
Wei-Han Chen2ebb92d2016-01-12 14:51:41 +080041from cros.factory.test.env import paths
Wei-Han Chenaff56232016-04-16 09:17:59 +080042from cros.factory.test.rules import phase
Hung-Te Lin3f096842016-01-13 17:37:06 +080043from cros.factory.test.rules.privacy import FilterDict
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080044from cros.factory.utils.argparse_utils import CmdArg
Hung-Te Lin03bf7ab2016-06-16 17:26:19 +080045from cros.factory.utils.argparse_utils import ParseCmdline
46from cros.factory.utils.argparse_utils import verbosity_cmd_arg
Ting Shen18a06382016-08-30 16:18:21 +080047from cros.factory.utils import argparse_utils
Jon Salz40b9f822014-07-25 16:39:55 +080048from cros.factory.utils import file_utils
Wei-Han Chena5c01a02016-04-23 19:27:19 +080049from cros.factory.utils import sys_utils
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +080050from cros.factory.utils import time_utils
Hung-Te Lin0e0f9362015-11-18 18:18:05 +080051from cros.factory.utils.debug_utils import SetupLogging
Jon Salzff88c022012-11-03 12:19:58 +080052from cros.factory.utils.process_utils import Spawn
Joel Kitchingd3bc2662014-12-16 16:03:32 -080053from cros.factory.utils.type_utils import Error
Tammo Spalink86a61c62012-05-25 15:10:35 +080054
Tammo Spalink5c699832012-07-03 17:50:39 +080055
Tammo Spalink5c699832012-07-03 17:50:39 +080056# TODO(tammo): Replace calls to sys.exit with raise Exit, and maybe
57# treat that specially (as a smoot exit, as opposed to the more
58# verbose output for generic Error).
59
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080060_global_gooftool = None
61_gooftool_lock = threading.Lock()
Tammo Spalink5c699832012-07-03 17:50:39 +080062
Hung-Te Lin56b18402015-01-16 14:52:30 +080063
Ricky Lianga70a1202013-03-15 15:03:17 +080064def GetGooftool(options):
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080065 global _global_gooftool # pylint: disable=W0603
Ricky Lianga70a1202013-03-15 15:03:17 +080066
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080067 if _global_gooftool is None:
68 with _gooftool_lock:
Ting Shen129fa6f2016-09-02 12:22:24 +080069 board = getattr(options, 'board', None)
70 hwdb_path = getattr(options, 'hwdb_path', None)
71 _global_gooftool = Gooftool(hwid_version=3, board=board,
72 hwdb_path=hwdb_path)
Cheng-Yi Chiang9fc121c2014-01-27 11:23:22 +080073
74 return _global_gooftool
Ricky Lianga70a1202013-03-15 15:03:17 +080075
Hung-Te Lin56b18402015-01-16 14:52:30 +080076
Ting Shen18a06382016-08-30 16:18:21 +080077def Command(cmd_name, *args, **kwargs):
78 """ Decorator for commands in gooftool.
79
80 This is similar to argparse_utils.Command, but all gooftool commands
81 can be waived during `gooftool finalize` or `gooftool verify` using
Wei-Han Chen60c5d332017-01-05 17:15:10 +080082 --waive_list or --skip_list option.
Ting Shen18a06382016-08-30 16:18:21 +080083 """
84 def Decorate(fun):
Wei-Han Chen60c5d332017-01-05 17:15:10 +080085 def CommandWithWaiveSkipCheck(options):
Ting Shen18a06382016-08-30 16:18:21 +080086 waive_list = vars(options).get('waive_list', [])
Wei-Han Chen60c5d332017-01-05 17:15:10 +080087 skip_list = vars(options).get('skip_list', [])
88 if phase.GetPhase() >= phase.PVT_DOGFOOD and (
89 waive_list != [] or skip_list != []):
Ting Shen18a06382016-08-30 16:18:21 +080090 raise Error(
Wei-Han Chen60c5d332017-01-05 17:15:10 +080091 'waive_list and skip_list should be empty for phase %s' %
92 phase.GetPhase())
Ting Shen18a06382016-08-30 16:18:21 +080093
Wei-Han Chen60c5d332017-01-05 17:15:10 +080094 if cmd_name not in skip_list:
95 try:
96 fun(options)
97 except Exception as e:
98 if cmd_name in waive_list:
99 logging.exception(e)
100 else:
101 raise
Ting Shen18a06382016-08-30 16:18:21 +0800102
103 return argparse_utils.Command(cmd_name, *args, **kwargs)(
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800104 CommandWithWaiveSkipCheck)
Ting Shen18a06382016-08-30 16:18:21 +0800105 return Decorate
106
107
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800108@Command('write_hwid',
109 CmdArg('hwid', metavar='HWID', help='HWID string'))
Andy Chengc92e6f92012-11-20 16:55:53 +0800110def WriteHWID(options):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800111 """Write specified HWID value into the system BB."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800112
Tammo Spalink95c43732012-07-25 15:57:14 -0700113 logging.info('writing hwid string %r', options.hwid)
Ricky Lianga70a1202013-03-15 15:03:17 +0800114 GetGooftool(options).WriteHWID(options.hwid)
Andy Cheng0465d132013-03-20 12:12:06 +0800115 event_log.Log('write_hwid', hwid=options.hwid)
Tammo Spalink95c43732012-07-25 15:57:14 -0700116 print 'Wrote HWID: %r' % options.hwid
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800117
118
Ricky Liang53390232013-03-08 15:37:57 +0800119_board_cmd_arg = CmdArg(
120 '--board', metavar='BOARD',
121 default=None, help='Board name to test.')
122
Tammo Spalink8fab5312012-05-28 18:33:30 +0800123_hwdb_path_cmd_arg = CmdArg(
124 '--hwdb_path', metavar='PATH',
Ricky Liangeede7922013-06-19 10:18:41 +0800125 default=common.DEFAULT_HWID_DATA_PATH,
Tammo Spalink8fab5312012-05-28 18:33:30 +0800126 help='Path to the HWID database.')
127
Tammo Spalink95c43732012-07-25 15:57:14 -0700128_hwid_status_list_cmd_arg = CmdArg(
Hung-Te Lin56b18402015-01-16 14:52:30 +0800129 '--status', nargs='*', default=['supported'],
130 help='allow only HWIDs with these status values')
Tammo Spalink95c43732012-07-25 15:57:14 -0700131
Jon Salzce124fb2012-10-02 17:42:03 +0800132_probe_results_cmd_arg = CmdArg(
133 '--probe_results', metavar='RESULTS.yaml',
Ricky Liangc662be32013-12-24 11:50:23 +0800134 help=('Output from "gooftool probe --include_vpd" (used instead of '
Jon Salzce124fb2012-10-02 17:42:03 +0800135 'probing this system).'))
136
Ricky Liang53390232013-03-08 15:37:57 +0800137_device_info_cmd_arg = CmdArg(
Ricky Liangf89f73a2013-03-19 05:00:24 +0800138 '--device_info', metavar='DEVICE_INFO.yaml', default=None,
Ricky Liang53390232013-03-08 15:37:57 +0800139 help='A dict of device info to use instead of fetching from shopfllor '
140 'server.')
141
Jon Salzce124fb2012-10-02 17:42:03 +0800142_hwid_cmd_arg = CmdArg(
143 '--hwid', metavar='HWID',
Ricky Lianga70a1202013-03-15 15:03:17 +0800144 help='HWID to verify (instead of the currently set HWID of this system).')
Jon Salzce124fb2012-10-02 17:42:03 +0800145
Bernie Thompson3c11c872013-07-22 18:22:45 -0700146_rma_mode_cmd_arg = CmdArg(
147 '--rma_mode', action='store_true',
148 help='Enable RMA mode, do not check for deprecated components.')
Tammo Spalink95c43732012-07-25 15:57:14 -0700149
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800150_cros_core_cmd_arg = CmdArg(
151 '--cros_core', action='store_true',
152 help='Finalize for ChromeOS Core devices (may add or remove few test '
153 'items. For example, branding verification or firmware bitmap '
154 'locale settings).')
155
bowgotsai13820f42015-09-10 23:18:04 +0800156_enforced_release_channels_cmd_arg = CmdArg(
157 '--enforced_release_channels', nargs='*', default=None,
158 help='Enforced release image channels.')
159
Hung-Te Lincdb96522016-04-15 16:51:10 +0800160_release_rootfs_cmd_arg = CmdArg(
161 '--release_rootfs', help='Location of release image rootfs partition.')
162
163_firmware_path_cmd_arg = CmdArg(
164 '--firmware_path', help='Location of firmware image partition.')
Ricky Liang43b879b2014-02-24 11:36:55 +0800165
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800166_shopfloor_url_args_cmd_arg = CmdArg(
167 '--shopfloor_url',
Earl Ou51182222016-09-09 12:16:48 +0800168 help='Shopfloor server url to be informed when wiping is done. '
169 'After wiping, a XML-RPC request will be sent to the '
170 'given url to indicate the completion of wiping.')
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800171
172_station_ip_cmd_arg = CmdArg(
173 '--station_ip',
174 help='IP of remote station')
175
176_station_port_cmd_arg = CmdArg(
177 '--station_port',
178 help='Port on remote station')
179
180_wipe_finish_token_cmd_arg = CmdArg(
181 '--wipe_finish_token',
182 help='Required token when notifying station after wipe finished')
183
Ting Shen18a06382016-08-30 16:18:21 +0800184_waive_list_cmd_arg = CmdArg(
185 '--waive_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu461ec032017-03-06 15:56:58 +0800186 help='A list of waived checks, separated by whitespace.'
Ting Shen18a06382016-08-30 16:18:21 +0800187 'Each item should be a sub-command of gooftool.'
188 'e.g. "gooftool verify --waive_list verify_tpm clear_gbb_flags".')
189
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800190_skip_list_cmd_arg = CmdArg(
191 '--skip_list', nargs='*', default=[], metavar='SUBCMD',
You-Cheng Syu461ec032017-03-06 15:56:58 +0800192 help='A list of skipped checks, separated by whitespace.'
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800193 'Each item should be a sub-command of gooftool.'
194 'e.g. "gooftool verify --skip_list verify_tpm clear_gbb_flags".')
195
Tammo Spalink8fab5312012-05-28 18:33:30 +0800196
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800197@Command('probe',
198 CmdArg('--comps', nargs='*',
199 help='List of keys from the component_db registry.'),
Ricky Liangb30da672013-06-14 12:36:34 +0800200 CmdArg('--fast_fw_probe', action='store_true',
201 help='Do a fast probe for EC and main firmware versions only. '
202 'This implies --no_vol and --no_ic.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800203 CmdArg('--no_vol', action='store_true',
204 help='Do not probe volatile data.'),
205 CmdArg('--no_ic', action='store_true',
Jon Salz0f8a6842012-09-25 11:28:22 +0800206 help='Do not probe initial_config data.'),
207 CmdArg('--include_vpd', action='store_true',
208 help='Include VPD data in volatiles.'))
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800209def RunProbe(options):
210 """Print yaml-formatted breakdown of probed device properties."""
Ricky Lianga70a1202013-03-15 15:03:17 +0800211 print GetGooftool(options).Probe(
212 target_comp_classes=options.comps,
Ricky Liangb30da672013-06-14 12:36:34 +0800213 fast_fw_probe=options.fast_fw_probe,
Ricky Lianga70a1202013-03-15 15:03:17 +0800214 probe_volatile=not options.no_vol,
215 probe_initial_config=not options.no_ic,
216 probe_vpd=options.include_vpd).Encode()
Ricky Liang53390232013-03-08 15:37:57 +0800217
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800218
Tammo Spalink214caf42012-05-28 10:45:00 +0800219@Command('verify_components',
220 _hwdb_path_cmd_arg,
Tammo Spalink5c699832012-07-03 17:50:39 +0800221 CmdArg('target_comps', nargs='*'))
Tammo Spalink214caf42012-05-28 10:45:00 +0800222def VerifyComponents(options):
Andy Cheng8ece7382012-08-22 16:25:42 +0800223 """Verify that probeable components all match entries in the component_db.
Tammo Spalink214caf42012-05-28 10:45:00 +0800224
Tammo Spalink5c699832012-07-03 17:50:39 +0800225 Probe for each component class in the target_comps and verify
Tammo Spalink214caf42012-05-28 10:45:00 +0800226 that a corresponding match exists in the component_db -- make sure
227 that these components are present, that they have been approved, but
228 do not check against any specific BOM/HWID configurations.
229 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800230
Andy Chengc531e2f2012-10-15 19:09:17 +0800231 try:
Ricky Lianga70a1202013-03-15 15:03:17 +0800232 result = GetGooftool(options).VerifyComponents(
Andy Chengc531e2f2012-10-15 19:09:17 +0800233 options.target_comps)
234 except ValueError, e:
235 sys.exit(e)
236
Ricky Liang53390232013-03-08 15:37:57 +0800237 PrintVerifyComponentsResults(result)
238
239
240def PrintVerifyComponentsResults(result):
241 """Prints out the results of VerifyComponents method call.
242
243 Groups the results into two groups: 'matches' and 'errors', and prints out
244 their values.
245 """
Andy Chengc531e2f2012-10-15 19:09:17 +0800246 # group by matches and errors
Tammo Spalink214caf42012-05-28 10:45:00 +0800247 matches = []
Andy Chengc531e2f2012-10-15 19:09:17 +0800248 errors = []
249 for result_list in result.values():
250 for component_name, _, error in result_list:
251 if component_name:
252 matches.append(component_name)
Tammo Spalink214caf42012-05-28 10:45:00 +0800253 else:
Andy Chengc531e2f2012-10-15 19:09:17 +0800254 errors.append(error)
255
Andy Cheng228a8c92012-08-27 10:53:57 +0800256 if matches:
257 print 'found probeable components:\n %s' % '\n '.join(matches)
Tammo Spalink214caf42012-05-28 10:45:00 +0800258 if errors:
Andy Cheng228a8c92012-08-27 10:53:57 +0800259 print '\nerrors:\n %s' % '\n '.join(errors)
260 sys.exit('\ncomponent verification FAILURE')
Tammo Spalink214caf42012-05-28 10:45:00 +0800261 else:
Hung-Te Lin56b18402015-01-16 14:52:30 +0800262 print '\ncomponent verification SUCCESS'
Tammo Spalink214caf42012-05-28 10:45:00 +0800263
264
Hung-Te Line1d80f62016-03-31 14:58:13 +0800265@Command('verify_keys',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800266 _release_rootfs_cmd_arg,
267 _firmware_path_cmd_arg)
Tammo Spalink01e11722012-07-24 10:17:54 -0700268def VerifyKeys(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800269 """Verify keys in firmware and SSD match."""
Hung-Te Line1d80f62016-03-31 14:58:13 +0800270 return GetGooftool(options).VerifyKeys(
Hung-Te Lincdb96522016-04-15 16:51:10 +0800271 options.release_rootfs, options.firmware_path)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800272
273
274@Command('set_fw_bitmap_locale')
Tammo Spalink01e11722012-07-24 10:17:54 -0700275def SetFirmwareBitmapLocale(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800276 """Use VPD locale value to set firmware bitmap default language."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800277
Ricky Lianga70a1202013-03-15 15:03:17 +0800278 (index, locale) = GetGooftool(options).SetFirmwareBitmapLocale()
Andy Cheng2582d292012-12-04 17:38:28 +0800279 logging.info('Firmware bitmap initial locale set to %d (%s).',
280 index, locale)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800281
282
Hung-Te Line1d80f62016-03-31 14:58:13 +0800283@Command('verify_system_time',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800284 _release_rootfs_cmd_arg)
Tammo Spalink01e11722012-07-24 10:17:54 -0700285def VerifySystemTime(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800286 """Verify system time is later than release filesystem creation time."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800287
Hung-Te Lincdb96522016-04-15 16:51:10 +0800288 return GetGooftool(options).VerifySystemTime(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800289
290
Hung-Te Line1d80f62016-03-31 14:58:13 +0800291@Command('verify_rootfs',
Hung-Te Lincdb96522016-04-15 16:51:10 +0800292 _release_rootfs_cmd_arg)
Tammo Spalink01e11722012-07-24 10:17:54 -0700293def VerifyRootFs(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800294 """Verify rootfs on SSD is valid by checking hash."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800295
Hung-Te Line1d80f62016-03-31 14:58:13 +0800296 return GetGooftool(options).VerifyRootFs(options.release_rootfs)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800297
Hung-Te Lin56b18402015-01-16 14:52:30 +0800298
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800299@Command('verify_tpm')
300def VerifyTPM(options): # pylint: disable=W0613
301 """Verify TPM is cleared."""
302
303 return GetGooftool(options).VerifyTPM()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800304
Hung-Te Lin56b18402015-01-16 14:52:30 +0800305
Hung-Te Lindd708d42014-07-11 17:05:01 +0800306@Command('verify_me_locked')
307def VerifyManagementEngineLocked(options): # pylint: disable=W0613
You-Cheng Syu461ec032017-03-06 15:56:58 +0800308 """Verify Management Engine is locked."""
Hung-Te Lindd708d42014-07-11 17:05:01 +0800309
310 return GetGooftool(options).VerifyManagementEngineLocked()
311
Hung-Te Lin56b18402015-01-16 14:52:30 +0800312
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800313@Command('verify_switch_wp')
Andy Chengc92e6f92012-11-20 16:55:53 +0800314def VerifyWPSwitch(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800315 """Verify hardware write protection switch is enabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800316
Ricky Lianga70a1202013-03-15 15:03:17 +0800317 GetGooftool(options).VerifyWPSwitch()
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800318
319
320@Command('verify_switch_dev')
Tammo Spalink01e11722012-07-24 10:17:54 -0700321def VerifyDevSwitch(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800322 """Verify developer switch is disabled."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800323
Ricky Lianga70a1202013-03-15 15:03:17 +0800324 if GetGooftool(options).CheckDevSwitchForDisabling():
Hung-Te Lind7d34722012-07-26 16:48:35 +0800325 logging.warn('VerifyDevSwitch: No physical switch.')
Andy Cheng0465d132013-03-20 12:12:06 +0800326 event_log.Log('switch_dev', type='virtual switch')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800327
328
Jon Salzadd90d32014-04-29 16:16:27 +0800329@Command('verify_branding')
330def VerifyBranding(options): # pylint: disable=W0613
331 """Verify that branding fields are properly set.
332
333 customization_id, if set in the RO VPD, must be of the correct format.
334
335 rlz_brand_code must be set either in the RO VPD or OEM partition, and must
336 be of the correct format.
337 """
338 return GetGooftool(options).VerifyBranding()
339
340
bowgotsai13820f42015-09-10 23:18:04 +0800341@Command('verify_release_channel',
342 _enforced_release_channels_cmd_arg)
bowgotsai529139c2015-05-30 01:39:49 +0800343def VerifyReleaseChannel(options): # pylint: disable=W0613
344 """Verify that release image channel is correct.
345
346 ChromeOS has four channels: canary, dev, beta and stable.
347 The last three channels support image auto-updates, checks
348 that release image channel is one of them.
349 """
bowgotsai13820f42015-09-10 23:18:04 +0800350 return GetGooftool(options).VerifyReleaseChannel(
351 options.enforced_release_channels)
bowgotsai529139c2015-05-30 01:39:49 +0800352
353
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800354@Command('write_protect')
Tammo Spalink01e11722012-07-24 10:17:54 -0700355def EnableFwWp(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800356 """Enable then verify firmware write protection."""
357
Hung-Te Linb21c6682012-08-01 13:53:57 +0800358 def CalculateLegacyRange(fw_type, length, section_data,
359 section_name):
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800360 ro_size = length / 2
361 ro_a = int(section_data[0] / ro_size)
362 ro_b = int((section_data[0] + section_data[1] - 1) / ro_size)
363 if ro_a != ro_b:
Hung-Te Lin56b18402015-01-16 14:52:30 +0800364 raise Error('%s firmware section %s has illegal size' %
Hung-Te Linb21c6682012-08-01 13:53:57 +0800365 (fw_type, section_name))
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800366 ro_offset = ro_a * ro_size
367 return (ro_offset, ro_size)
368
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800369 def WriteProtect(fw_file_path, fw_type, legacy_section=None):
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800370 """Calculate protection size, then invoke flashrom.
371
372 Our supported chips only allow write protecting half their total
You-Cheng Syu461ec032017-03-06 15:56:58 +0800373 size, so we partition the flash chipset space accordingly.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800374 """
375 raw_image = open(fw_file_path, 'rb').read()
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800376 wp_section = 'WP_RO'
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800377 image = crosfw.FirmwareImage(raw_image)
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800378 if image.has_section(wp_section):
379 section_data = image.get_section_area(wp_section)
380 ro_offset = section_data[0]
381 ro_size = section_data[1]
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800382 elif legacy_section is not None and image.has_section(legacy_section):
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800383 section_data = image.get_section_area(legacy_section)
384 (ro_offset, ro_size) = CalculateLegacyRange(
Hung-Te Linb21c6682012-08-01 13:53:57 +0800385 fw_type, len(raw_image), section_data, legacy_section)
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800386 else:
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800387 raise Error('Could not find %s firmware section: %s %s' %
388 (fw_type, wp_section, legacy_section or ''))
Hung-Te Lin7ea39e82012-07-31 18:39:33 +0800389
390 logging.debug('write protecting %s [off=%x size=%x]', fw_type,
391 ro_offset, ro_size)
392 crosfw.Flashrom(fw_type).EnableWriteProtection(ro_offset, ro_size)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800393
394 WriteProtect(crosfw.LoadMainFirmware().GetFileName(), 'main', 'RO_SECTION')
Andy Cheng0465d132013-03-20 12:12:06 +0800395 event_log.Log('wp', fw='main')
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800396
397 # Some EC (mostly PD) does not support "RO NOW". Instead they will only set
398 # "RO_AT_BOOT" when you request to enable RO (These platforms consider
399 # --wp-range with right range identical to --wp-enable), and requires a
400 # 'ectool reboot_ec RO at-shutdown; reboot' to let the RO take effect.
Hung-Te Lin0d10b562016-12-28 10:58:07 +0800401 # After reboot, "flashrom -p host --wp-status" will return protected range.
Hung-Te Lind3b124c2016-10-20 22:22:31 +0800402 # If you don't reboot, returned range will be (0, 0), and running command
403 # "ectool flashprotect" will not have RO_NOW.
404
405 targets = [
406 ('EC', crosfw.TARGET_EC, crosfw.LoadEcFirmware, 'EC_RO'),
407 ('PD', crosfw.TARGET_PD, crosfw.LoadPDFirmware, None)]
408 for (name, fw_type, provider, legacy_section) in targets:
409 fw_file = provider().GetFileName()
410 if fw_file is None:
411 logging.warning('%s not write protected (seems there is no %s flash).',
412 name, name)
413 continue
414 WriteProtect(fw_file, fw_type, legacy_section)
415 event_log.Log('wp', fw=fw_type)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800416
417
418@Command('clear_gbb_flags')
Andy Chengc92e6f92012-11-20 16:55:53 +0800419def ClearGBBFlags(options): # pylint: disable=W0613
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800420 """Zero out the GBB flags, in preparation for transition to release state.
421
422 No GBB flags are set in release/shipping state, but they are useful
423 for factory/development. See "gbb_utility --flags" for details.
424 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800425
Ricky Lianga70a1202013-03-15 15:03:17 +0800426 GetGooftool(options).ClearGBBFlags()
Andy Cheng0465d132013-03-20 12:12:06 +0800427 event_log.Log('clear_gbb_flags')
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800428
429
Jon Salzaa3a30e2013-05-15 15:56:28 +0800430@Command('clear_factory_vpd_entries')
431def ClearFactoryVPDEntries(options): # pylint: disable=W0613
432 """Clears factory.* items in the RW VPD."""
433 entries = GetGooftool(options).ClearFactoryVPDEntries()
434 event_log.Log('clear_factory_vpd_entries', entries=FilterDict(entries))
435
436
Mattias Nisslercca761b2015-04-15 21:53:04 +0200437@Command('generate_stable_device_secret')
438def GenerateStableDeviceSecret(options): # pylint: disable=W0613
You-Cheng Syu461ec032017-03-06 15:56:58 +0800439 """Generates a fresh stable device secret and stores it in the RO VPD."""
Mattias Nisslercca761b2015-04-15 21:53:04 +0200440 GetGooftool(options).GenerateStableDeviceSecret()
441 event_log.Log('generate_stable_device_secret')
442
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800443
Earl Ou564a7872016-10-05 10:22:00 +0800444@Command('enable_release_partition',
445 CmdArg('--release_rootfs',
446 help=('path to the release rootfs device. If not specified, '
447 'the default (5th) partition will be used.')))
448def EnableReleasePartition(options):
449 """Enables a release image partition on the disk."""
450 GetGooftool(options).EnableReleasePartition(options.release_rootfs)
451
452
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800453@Command('wipe_in_place',
454 CmdArg('--fast', action='store_true',
Shun-Hsing Ou8d3c40a2015-10-08 18:16:08 +0800455 help='use non-secure but faster wipe method.'),
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800456 _shopfloor_url_args_cmd_arg,
457 _station_ip_cmd_arg,
458 _station_port_cmd_arg,
459 _wipe_finish_token_cmd_arg)
Shun-Hsing Oucdc64e12015-01-14 22:07:33 +0800460def WipeInPlace(options):
461 """Start factory wipe directly without reboot."""
462
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800463 GetGooftool(options).WipeInPlace(options.fast,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800464 options.shopfloor_url,
465 options.station_ip,
466 options.station_port,
467 options.wipe_finish_token)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200468
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800469@Command('wipe_init',
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800470 CmdArg('--wipe_args', help='arguments for clobber-state'),
471 CmdArg('--state_dev', help='path to stateful partition device'),
472 CmdArg('--root_disk', help='path to primary device'),
473 CmdArg('--old_root', help='path to old root'),
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800474 _shopfloor_url_args_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800475 _release_rootfs_cmd_arg,
476 _station_ip_cmd_arg,
477 _station_port_cmd_arg,
478 _wipe_finish_token_cmd_arg)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800479def WipeInit(options):
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800480 GetGooftool(options).WipeInit(options.wipe_args,
Wei-Han Chen0a3320e2016-04-23 01:32:07 +0800481 options.shopfloor_url,
482 options.state_dev,
483 options.release_rootfs,
484 options.root_disk,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800485 options.old_root,
486 options.station_ip,
487 options.station_port,
488 options.wipe_finish_token)
Wei-Han Chen7dc6d132016-04-06 11:11:53 +0800489
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800490@Command('verify',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800491 CmdArg('--no_write_protect', action='store_true',
492 help='Do not check write protection switch state.'),
Tammo Spalink95c43732012-07-25 15:57:14 -0700493 _hwid_status_list_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800494 _hwdb_path_cmd_arg,
Ricky Lianga70a1202013-03-15 15:03:17 +0800495 _board_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800496 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800497 _hwid_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800498 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800499 _cros_core_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800500 _release_rootfs_cmd_arg,
501 _firmware_path_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800502 _enforced_release_channels_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800503 _waive_list_cmd_arg,
504 _skip_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800505def Verify(options):
506 """Verifies if whole factory process is ready for finalization.
507
508 This routine performs all the necessary checks to make sure the
509 device is ready to be finalized, but does not modify state. These
510 checks include dev switch, firmware write protection switch, hwid,
511 system time, keys, and root file system.
512 """
Andy Cheng7a76cb82012-11-19 18:08:19 +0800513
Hung-Te Lin6d827542012-07-19 11:50:41 +0800514 if not options.no_write_protect:
Ricky Lianga70a1202013-03-15 15:03:17 +0800515 VerifyWPSwitch(options)
Hung-Te Lindd708d42014-07-11 17:05:01 +0800516 VerifyManagementEngineLocked(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800517 VerifyDevSwitch(options)
Ting Shen129fa6f2016-09-02 12:22:24 +0800518 VerifyHWID(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800519 VerifySystemTime(options)
520 VerifyKeys(options)
521 VerifyRootFs(options)
Cheng-Yi Chiang676b5292013-06-18 12:05:33 +0800522 VerifyTPM(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800523 if options.cros_core:
524 logging.info('VerifyBranding is skipped for ChromeOS Core device.')
525 else:
526 VerifyBranding(options)
bowgotsai529139c2015-05-30 01:39:49 +0800527 VerifyReleaseChannel(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800528
Hung-Te Lin56b18402015-01-16 14:52:30 +0800529
Jon Salzfe9036f2014-01-16 14:11:23 +0800530@Command('untar_stateful_files')
Hung-Te Lin388bce22014-06-03 19:56:40 +0800531def UntarStatefulFiles(unused_options):
Jon Salzfe9036f2014-01-16 14:11:23 +0800532 """Untars stateful files from stateful_files.tar.xz on stateful partition.
533
534 If that file does not exist (which should only be R30 and earlier),
535 this is a no-op.
536 """
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800537 # Path to stateful partition on device.
538 device_stateful_path = '/mnt/stateful_partition'
539 tar_file = os.path.join(device_stateful_path, 'stateful_files.tar.xz')
Jon Salzfe9036f2014-01-16 14:11:23 +0800540 if os.path.exists(tar_file):
Hung-Te Lin2333f3f2016-08-24 17:56:48 +0800541 Spawn(['tar', 'xf', tar_file], cwd=device_stateful_path,
Jon Salzfe9036f2014-01-16 14:11:23 +0800542 log=True, check_call=True)
543 else:
544 logging.warning('No stateful files at %s', tar_file)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800545
Jon Salz40b9f822014-07-25 16:39:55 +0800546
547@Command('log_source_hashes')
548def LogSourceHashes(options): # pylint: disable=W0613
549 """Logs hashes of source files in the factory toolkit."""
Jon Salze60307f2014-08-05 16:20:00 +0800550 # WARNING: The following line is necessary to validate the integrity
551 # of the factory software. Do not remove or modify it.
552 #
553 # 警告:此行会验证工厂软件的完整性,禁止删除或修改。
Wei-Han Chena5c01a02016-04-23 19:27:19 +0800554 factory_par = sys_utils.GetRunningFactoryPythonArchivePath()
555 if factory_par:
556 event_log.Log(
557 'source_hashes',
558 **file_utils.HashPythonArchive(factory_par))
559 else:
560 event_log.Log(
561 'source_hashes',
562 **file_utils.HashSourceTree(os.path.join(paths.FACTORY_PATH, 'py')))
Jon Salz40b9f822014-07-25 16:39:55 +0800563
564
Tammo Spalink86a61c62012-05-25 15:10:35 +0800565@Command('log_system_details')
Tammo Spalink01e11722012-07-24 10:17:54 -0700566def LogSystemDetails(options): # pylint: disable=W0613
Tammo Spalink86a61c62012-05-25 15:10:35 +0800567 """Write miscellaneous system details to the event log."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800568
Ricky Liang43b879b2014-02-24 11:36:55 +0800569 event_log.Log('system_details', **GetGooftool(options).GetSystemDetails())
Tammo Spalink86a61c62012-05-25 15:10:35 +0800570
571
Jon Salza88b83b2013-05-27 20:00:35 +0800572def CreateReportArchiveBlob(*args, **kwargs):
573 """Creates a report archive and returns it as a blob.
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800574
Jon Salza88b83b2013-05-27 20:00:35 +0800575 Args:
576 See CreateReportArchive.
Andy Cheng7a76cb82012-11-19 18:08:19 +0800577
Jon Salza88b83b2013-05-27 20:00:35 +0800578 Returns:
579 An xmlrpclib.Binary object containing a .tar.xz file.
580 """
Wei-Han Chen47416612016-09-14 17:41:52 +0800581 report_archive = CreateReportArchive(*args, **kwargs)
582 try:
583 with open(report_archive) as f:
584 return xmlrpclib.Binary(f.read())
585 finally:
586 os.unlink(report_archive)
Jon Salza88b83b2013-05-27 20:00:35 +0800587
588
589def CreateReportArchive(device_sn=None, add_file=None):
590 """Creates a report archive in a temporary directory.
591
592 Args:
593 device_sn: The device serial number (optional).
594 add_file: A list of files to add (optional).
595
596 Returns:
597 Path to the archive.
598 """
Hung-Te Lin6bd16472012-06-20 16:26:47 +0800599 def NormalizeAsFileName(token):
600 return re.sub(r'\W+', '', token).strip()
Jon Salza88b83b2013-05-27 20:00:35 +0800601
602 target_name = '%s%s.tar.xz' % (
603 time.strftime('%Y%m%dT%H%M%SZ',
604 time.gmtime()),
Hung-Te Lin56b18402015-01-16 14:52:30 +0800605 ('' if device_sn is None else
606 '_' + NormalizeAsFileName(device_sn)))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800607 target_path = os.path.join(gettempdir(), target_name)
Jon Salza88b83b2013-05-27 20:00:35 +0800608
Tammo Spalink86a61c62012-05-25 15:10:35 +0800609 # Intentionally ignoring dotfiles in EVENT_LOG_DIR.
Andy Cheng0465d132013-03-20 12:12:06 +0800610 tar_cmd = 'cd %s ; tar cJf %s *' % (event_log.EVENT_LOG_DIR, target_path)
Wei-Han Chen4b755022017-01-04 10:51:52 +0800611 tar_cmd += ' %s' % paths.GetFactoryLogPath()
Jon Salza88b83b2013-05-27 20:00:35 +0800612 if add_file:
613 for f in add_file:
Jon Salz65266432012-07-30 19:02:49 +0800614 # Require absolute paths since the tar command may change the
615 # directory.
616 if not f.startswith('/'):
617 raise Error('Not an absolute path: %s' % f)
618 if not os.path.exists(f):
619 raise Error('File does not exist: %s' % f)
Wei-Han Chen4b755022017-01-04 10:51:52 +0800620 tar_cmd += ' %s' % pipes.quote(f)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800621 cmd_result = Shell(tar_cmd)
Jon Salzff88c022012-11-03 12:19:58 +0800622
623 if ((cmd_result.status == 1) and
624 all((x == '' or
625 'file changed as we read it' in x or
626 "Removing leading `/' from member names" in x)
627 for x in cmd_result.stderr.split('\n'))):
628 # That's OK. Make sure it's valid though.
Vic Yang85199e72013-01-28 14:33:11 +0800629 Spawn(['tar', 'tfJ', target_path], check_call=True, log=True,
Jon Salzff88c022012-11-03 12:19:58 +0800630 ignore_stdout=True)
631 elif not cmd_result.success:
Tammo Spalink86a61c62012-05-25 15:10:35 +0800632 raise Error('unable to tar event logs, cmd %r failed, stderr: %r' %
633 (tar_cmd, cmd_result.stderr))
Jon Salzff88c022012-11-03 12:19:58 +0800634
Jon Salza88b83b2013-05-27 20:00:35 +0800635 return target_path
636
637_upload_method_cmd_arg = CmdArg(
638 '--upload_method', metavar='METHOD:PARAM',
639 help=('How to perform the upload. METHOD should be one of '
640 '{ftp, shopfloor, ftps, cpfe}.'))
641_add_file_cmd_arg = CmdArg(
642 '--add_file', metavar='FILE', action='append',
643 help='Extra file to include in report (must be an absolute path)')
644
Hung-Te Lin56b18402015-01-16 14:52:30 +0800645
Jon Salza88b83b2013-05-27 20:00:35 +0800646@Command('upload_report',
647 _upload_method_cmd_arg,
648 _add_file_cmd_arg)
649def UploadReport(options):
650 """Create a report containing key device details."""
Hung-Te Lin74346d72016-01-07 22:16:57 +0800651 ro_vpd = ReadRoVpd()
Jon Salza88b83b2013-05-27 20:00:35 +0800652 device_sn = ro_vpd.get('serial_number', None)
653 if device_sn is None:
654 logging.warning('RO_VPD missing device serial number')
Chun-Ta Lin53cbbd52016-06-08 21:42:19 +0800655 device_sn = 'MISSING_SN_' + time_utils.TimedUUID()
Jon Salza88b83b2013-05-27 20:00:35 +0800656 target_path = CreateReportArchive(device_sn)
657
Tammo Spalink86a61c62012-05-25 15:10:35 +0800658 if options.upload_method is None or options.upload_method == 'none':
659 logging.warning('REPORT UPLOAD SKIPPED (report left at %s)', target_path)
660 return
661 method, param = options.upload_method.split(':', 1)
662 if method == 'shopfloor':
663 report_upload.ShopFloorUpload(target_path, param)
664 elif method == 'ftp':
Jay Kim360c1dd2012-06-25 10:58:11 -0700665 report_upload.FtpUpload(target_path, 'ftp:' + param)
Tammo Spalink86a61c62012-05-25 15:10:35 +0800666 elif method == 'ftps':
667 report_upload.CurlUrlUpload(target_path, '--ftp-ssl-reqd ftp:%s' % param)
668 elif method == 'cpfe':
Shawn Nematbakhsh3404a092013-01-28 16:49:09 -0800669 report_upload.CpfeUpload(target_path, pipes.quote(param))
Tammo Spalink86a61c62012-05-25 15:10:35 +0800670 else:
671 raise Error('unknown report upload method %r', method)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800672
673
674@Command('finalize',
Hung-Te Lin6d827542012-07-19 11:50:41 +0800675 CmdArg('--no_write_protect', action='store_true',
676 help='Do not enable firmware write protection.'),
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800677 CmdArg('--fast', action='store_true',
678 help='use non-secure but faster wipe method.'),
Shun-Hsing Oudb407d62015-11-11 11:03:59 +0800679 _shopfloor_url_args_cmd_arg,
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800680 _hwdb_path_cmd_arg,
Tammo Spalink95c43732012-07-25 15:57:14 -0700681 _hwid_status_list_cmd_arg,
Jon Salz65266432012-07-30 19:02:49 +0800682 _upload_method_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800683 _add_file_cmd_arg,
Ricky Lianga70a1202013-03-15 15:03:17 +0800684 _board_cmd_arg,
Jon Salzce124fb2012-10-02 17:42:03 +0800685 _probe_results_cmd_arg,
Cheng-Yi Chiang406ad912013-11-14 16:51:33 +0800686 _hwid_cmd_arg,
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800687 _rma_mode_cmd_arg,
bowgotsai13820f42015-09-10 23:18:04 +0800688 _cros_core_cmd_arg,
Hung-Te Lincdb96522016-04-15 16:51:10 +0800689 _release_rootfs_cmd_arg,
690 _firmware_path_cmd_arg,
Wei-Han Chenbe1355a2016-04-24 19:31:03 +0800691 _enforced_release_channels_cmd_arg,
692 _station_ip_cmd_arg,
693 _station_port_cmd_arg,
Ting Shen18a06382016-08-30 16:18:21 +0800694 _wipe_finish_token_cmd_arg,
Wei-Han Chen60c5d332017-01-05 17:15:10 +0800695 _waive_list_cmd_arg,
696 _skip_list_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800697def Finalize(options):
698 """Verify system readiness and trigger transition into release state.
699
Jon Salzaa3a30e2013-05-15 15:56:28 +0800700 This routine does the following:
701 - Verifies system state (see verify command)
Jon Salzfe9036f2014-01-16 14:11:23 +0800702 - Untars stateful_files.tar.xz, if it exists, in the stateful partition, to
703 initialize files such as the CRX cache
Jon Salzaa3a30e2013-05-15 15:56:28 +0800704 - Modifies firmware bitmaps to match locale
705 - Clears all factory-friendly flags from the GBB
706 - Removes factory-specific entries from RW_VPD (factory.*)
707 - Enables firmware write protection (cannot rollback after this)
708 - Uploads system logs & reports
Earl Ou51182222016-09-09 12:16:48 +0800709 - Wipes the testing kernel, rootfs, and stateful partition
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800710 """
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800711 Verify(options)
Jon Salz40b9f822014-07-25 16:39:55 +0800712 LogSourceHashes(options)
Jon Salzfe9036f2014-01-16 14:11:23 +0800713 UntarStatefulFiles(options)
Chih-Yu Huang714dbc42015-07-21 16:42:16 +0800714 if options.cros_core:
715 logging.info('SetFirmwareBitmapLocale is skipped for ChromeOS Core device.')
716 else:
717 SetFirmwareBitmapLocale(options)
Ricky Lianga70a1202013-03-15 15:03:17 +0800718 ClearGBBFlags(options)
Jon Salzaa3a30e2013-05-15 15:56:28 +0800719 ClearFactoryVPDEntries(options)
Mattias Nisslercca761b2015-04-15 21:53:04 +0200720 GenerateStableDeviceSecret(options)
Hung-Te Lin6d827542012-07-19 11:50:41 +0800721 if options.no_write_protect:
722 logging.warn('WARNING: Firmware Write Protection is SKIPPED.')
Andy Cheng0465d132013-03-20 12:12:06 +0800723 event_log.Log('wp', fw='both', status='skipped')
Hung-Te Lin6d827542012-07-19 11:50:41 +0800724 else:
Wei-Han Chenba21f512016-10-14 18:52:33 +0800725 EnableFwWp(options)
Jon Salza0f58e02012-05-29 19:33:39 +0800726 LogSystemDetails(options)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800727 UploadReport(options)
Earl Ou51182222016-09-09 12:16:48 +0800728
729 event_log.Log('wipe_in_place')
730 wipe_args = []
Earl Ou51182222016-09-09 12:16:48 +0800731 if options.shopfloor_url:
732 wipe_args += ['--shopfloor_url', options.shopfloor_url]
733 if options.fast:
734 wipe_args += ['--fast']
735 if options.station_ip:
736 wipe_args += ['--station_ip', options.station_ip]
737 if options.station_port:
738 wipe_args += ['--station_port', options.station_port]
739 if options.wipe_finish_token:
740 wipe_args += ['--wipe_finish_token', options.wipe_finish_token]
741 ExecFactoryPar('gooftool', 'wipe_in_place', *wipe_args)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800742
743
Ting Shen129fa6f2016-09-02 12:22:24 +0800744@Command('verify_hwid',
745 _probe_results_cmd_arg,
746 _hwdb_path_cmd_arg,
747 _hwid_cmd_arg,
748 _rma_mode_cmd_arg)
749def VerifyHWID(options):
Ricky Liangc662be32013-12-24 11:50:23 +0800750 """A simple wrapper that calls out to HWID utils to verify version 3 HWID.
Ricky Liang53390232013-03-08 15:37:57 +0800751
Ricky Liangc662be32013-12-24 11:50:23 +0800752 This is mainly for Gooftool to verify v3 HWID during finalize. For testing
753 and development purposes, please use `hwid` command.
Ricky Liang53390232013-03-08 15:37:57 +0800754 """
Ricky Liangc662be32013-12-24 11:50:23 +0800755 db = GetGooftool(options).db
756 encoded_string = options.hwid or hwid_utils.GetHWIDString()
Ricky Liang7905f272013-03-16 01:57:10 +0800757 if options.probe_results:
Ricky Liangc662be32013-12-24 11:50:23 +0800758 probed_results = yaml.load(open(options.probe_results).read())
Ricky Liang7905f272013-03-16 01:57:10 +0800759 else:
Ricky Liangc662be32013-12-24 11:50:23 +0800760 probed_results = yaml.load(Probe(probe_vpd=True).Encode())
761 vpd = hwid_utils.GetVPD(probed_results)
Ricky Liang53390232013-03-08 15:37:57 +0800762
Hung-Te Lin11052952015-03-18 13:48:59 +0800763 event_log.Log('probed_results', probed_results=FilterDict(probed_results))
764 event_log.Log('vpd', vpd=FilterDict(vpd))
Ricky Liang53390232013-03-08 15:37:57 +0800765
Ricky Liangc662be32013-12-24 11:50:23 +0800766 hwid_utils.VerifyHWID(db, encoded_string, probed_results, vpd,
Hung-Te Lin56b18402015-01-16 14:52:30 +0800767 rma_mode=options.rma_mode)
Ricky Liang53390232013-03-08 15:37:57 +0800768
Ricky Liangc662be32013-12-24 11:50:23 +0800769 event_log.Log('verified_hwid', hwid=encoded_string)
Ricky Liang53390232013-03-08 15:37:57 +0800770
771
henryhsu44d793a2013-07-20 00:07:38 +0800772@Command('get_firmware_hash',
773 CmdArg('--file', metavar='FILE', help='Firmware File.'))
774def GetFirmwareHash(options):
henryhsuf6f835c2013-07-20 20:49:25 +0800775 """Get firmware hash from a file"""
henryhsu44d793a2013-07-20 00:07:38 +0800776 if os.path.exists(options.file):
777 hashes = CalculateFirmwareHashes(options.file)
778 for section, value_dict in hashes.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800779 print '%s:' % section
henryhsu44d793a2013-07-20 00:07:38 +0800780 for key, value in value_dict.iteritems():
Hung-Te Lin56b18402015-01-16 14:52:30 +0800781 print ' %s: %s' % (key, value)
henryhsu44d793a2013-07-20 00:07:38 +0800782 else:
783 raise Error('File does not exist: %s' % options.file)
784
henryhsuf6f835c2013-07-20 20:49:25 +0800785
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800786def Main():
787 """Run sub-command specified by the command line args."""
Andy Cheng7a76cb82012-11-19 18:08:19 +0800788
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800789 options = ParseCmdline(
Ting Shen129fa6f2016-09-02 12:22:24 +0800790 'Perform Google required factory tests.',
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800791 CmdArg('-l', '--log', metavar='PATH',
792 help='Write logs to this file.'),
Jon Salza4bea382012-10-29 13:00:34 +0800793 CmdArg('--suppress-event-logs', action='store_true',
794 help='Suppress event logging.'),
Wei-Han Chenaff56232016-04-16 09:17:59 +0800795 CmdArg('--phase', default=None,
796 help=('override phase for phase checking (defaults to the current '
797 'as returned by the "factory phase" command)')),
Tammo Spalink8fab5312012-05-28 18:33:30 +0800798 verbosity_cmd_arg)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800799 SetupLogging(options.verbosity, options.log)
Andy Cheng0465d132013-03-20 12:12:06 +0800800 event_log.SetGlobalLoggerDefaultPrefix('gooftool')
801 event_log.GetGlobalLogger().suppress = options.suppress_event_logs
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800802 logging.debug('gooftool options: %s', repr(options))
Wei-Han Chenaff56232016-04-16 09:17:59 +0800803
804 phase.OverridePhase(options.phase)
Tammo Spalink9a96b8a2012-04-03 11:10:41 +0800805 try:
806 logging.debug('GOOFTOOL command %r', options.command_name)
807 options.command(options)
808 logging.info('GOOFTOOL command %r SUCCESS', options.command_name)
809 except Error, e:
810 logging.exception(e)
811 sys.exit('GOOFTOOL command %r ERROR: %s' % (options.command_name, e))
812 except Exception, e:
813 logging.exception(e)
814 sys.exit('UNCAUGHT RUNTIME EXCEPTION %s' % e)
815
816
817if __name__ == '__main__':
818 Main()