barfab@chromium.org | b6d2993 | 2012-04-11 09:46:43 +0200 | [diff] [blame] | 1 | # Copyright (c) 2012 The Chromium OS Authors. All rights reserved. |
Tom Wai-Hong Tam | b8a58ef | 2011-10-11 23:53:10 -0700 | [diff] [blame] | 2 | # Use of this source code is governed by a BSD-style license that can be |
| 3 | # found in the LICENSE file. |
| 4 | |
| 5 | """Exposes the FAFTClient interface over XMLRPC. |
| 6 | |
| 7 | It launches a XMLRPC server and exposes the interface of FAFTClient object. |
| 8 | The FAFTClient object aggreates some useful functions of exisintg SAFT |
| 9 | libraries. |
| 10 | """ |
| 11 | |
barfab@chromium.org | b6d2993 | 2012-04-11 09:46:43 +0200 | [diff] [blame] | 12 | import functools, os, shutil, sys |
Tom Wai-Hong Tam | b8a58ef | 2011-10-11 23:53:10 -0700 | [diff] [blame] | 13 | from optparse import OptionParser |
| 14 | from SimpleXMLRPCServer import SimpleXMLRPCServer |
| 15 | |
| 16 | # Import libraries from SAFT. |
Tom Wai-Hong Tam | c1576b7 | 2011-11-08 11:36:16 +0800 | [diff] [blame] | 17 | sys.path.append('/usr/local/sbin/firmware/saft') |
barfab@chromium.org | b6d2993 | 2012-04-11 09:46:43 +0200 | [diff] [blame] | 18 | import cgpt_state, chromeos_interface, flashrom_handler, kernel_handler |
| 19 | import saft_flashrom_util, tpm_handler |
Tom Wai-Hong Tam | b8a58ef | 2011-10-11 23:53:10 -0700 | [diff] [blame] | 20 | |
| 21 | |
Tom Wai-Hong Tam | 0e680af | 2011-10-26 14:32:55 +0800 | [diff] [blame] | 22 | def allow_multiple_section_input(image_operator): |
| 23 | @functools.wraps(image_operator) |
| 24 | def wrapper(self, section): |
| 25 | if type(section) in (tuple, list): |
| 26 | for sec in section: |
| 27 | image_operator(self, sec) |
| 28 | else: |
| 29 | image_operator(self, section) |
| 30 | return wrapper |
| 31 | |
| 32 | |
Vic Yang | 13d22ec | 2012-06-18 15:12:47 +0800 | [diff] [blame] | 33 | class LazyFlashromHandlerProxy: |
| 34 | _loaded = False |
| 35 | _obj = None |
| 36 | |
| 37 | def __init__(self, *args, **kargs): |
| 38 | self._args = args |
| 39 | self._kargs = kargs |
| 40 | |
| 41 | def _load(self): |
| 42 | self._obj = flashrom_handler.FlashromHandler() |
| 43 | self._obj.init(*self._args, **self._kargs) |
| 44 | self._obj.new_image() |
| 45 | self._loaded = True |
| 46 | |
| 47 | def __getattr__(self, name): |
| 48 | if not self._loaded: |
| 49 | self._load() |
| 50 | return getattr(self._obj, name) |
| 51 | |
Tom Wai-Hong Tam | c1c4deb | 2012-07-26 14:28:11 +0800 | [diff] [blame] | 52 | def reload(self): |
| 53 | self._loaded = False |
| 54 | |
Vic Yang | 13d22ec | 2012-06-18 15:12:47 +0800 | [diff] [blame] | 55 | |
Tom Wai-Hong Tam | b8a58ef | 2011-10-11 23:53:10 -0700 | [diff] [blame] | 56 | class FAFTClient(object): |
| 57 | """A class of FAFT client which aggregates some useful functions of SAFT. |
| 58 | |
| 59 | This class can be exposed via a XMLRPC server such that its functions can |
| 60 | be accessed remotely. |
| 61 | |
| 62 | Attributes: |
| 63 | _chromeos_interface: An object to encapsulate OS services functions. |
Vic Yang | 59cac9c | 2012-05-21 15:28:42 +0800 | [diff] [blame] | 64 | _bios_handler: An object to automate BIOS flashrom testing. |
| 65 | _ec_handler: An object to automate EC flashrom testing. |
Tom Wai-Hong Tam | 23870e0 | 2012-08-24 16:15:34 +0800 | [diff] [blame] | 66 | _ec_image: An object to automate EC image for autest. |
Tom Wai-Hong Tam | b8a58ef | 2011-10-11 23:53:10 -0700 | [diff] [blame] | 67 | _kernel_handler: An object to provide kernel related actions. |
| 68 | _tpm_handler: An object to control TPM device. |
ctchang | c7e55ea | 2012-08-09 16:19:14 +0800 | [diff] [blame] | 69 | _temp_path: Path of a temp directory. |
| 70 | _keys_path: Path of a directory, keys/, in temp directory. |
| 71 | _work_path: Path of a directory, work/, in temp directory. |
Tom Wai-Hong Tam | b8a58ef | 2011-10-11 23:53:10 -0700 | [diff] [blame] | 72 | """ |
| 73 | |
| 74 | def __init__(self): |
| 75 | """Initialize the data attributes of this class.""" |
Tom Wai-Hong Tam | b8a58ef | 2011-10-11 23:53:10 -0700 | [diff] [blame] | 76 | # TODO(waihong): Move the explicit object.init() methods to the |
| 77 | # objects' constructors (ChromeOSInterface, FlashromHandler, |
| 78 | # KernelHandler, and TpmHandler). |
| 79 | self._chromeos_interface = chromeos_interface.ChromeOSInterface(False) |
Tom Wai-Hong Tam | 4895883 | 2011-12-30 10:16:57 +0800 | [diff] [blame] | 80 | # We keep the state of FAFT test in a permanent directory over reboots. |
Tom Wai-Hong Tam | 07278c2 | 2012-02-08 16:53:00 +0800 | [diff] [blame] | 81 | state_dir = '/var/tmp/faft' |
| 82 | self._chromeos_interface.init(state_dir, log_file='/tmp/faft_log.txt') |
| 83 | os.chdir(state_dir) |
Tom Wai-Hong Tam | b8a58ef | 2011-10-11 23:53:10 -0700 | [diff] [blame] | 84 | |
Vic Yang | 13d22ec | 2012-06-18 15:12:47 +0800 | [diff] [blame] | 85 | self._bios_handler = LazyFlashromHandlerProxy( |
| 86 | saft_flashrom_util, |
Vic Yang | 59cac9c | 2012-05-21 15:28:42 +0800 | [diff] [blame] | 87 | self._chromeos_interface, |
| 88 | None, |
| 89 | '/usr/share/vboot/devkeys', |
| 90 | 'bios') |
Vic Yang | 59cac9c | 2012-05-21 15:28:42 +0800 | [diff] [blame] | 91 | |
Todd Broch | f2b1d01 | 2012-06-14 12:55:21 -0700 | [diff] [blame] | 92 | self._ec_handler = None |
| 93 | if not os.system("mosys ec info"): |
Vic Yang | 13d22ec | 2012-06-18 15:12:47 +0800 | [diff] [blame] | 94 | self._ec_handler = LazyFlashromHandlerProxy( |
| 95 | saft_flashrom_util, |
Todd Broch | f2b1d01 | 2012-06-14 12:55:21 -0700 | [diff] [blame] | 96 | self._chromeos_interface, |
Vic Yang | 13d22ec | 2012-06-18 15:12:47 +0800 | [diff] [blame] | 97 | 'ec_root_key.vpubk', |
Todd Broch | f2b1d01 | 2012-06-14 12:55:21 -0700 | [diff] [blame] | 98 | '/usr/share/vboot/devkeys', |
| 99 | 'ec') |
Todd Broch | f2b1d01 | 2012-06-14 12:55:21 -0700 | [diff] [blame] | 100 | |
Tom Wai-Hong Tam | b8a58ef | 2011-10-11 23:53:10 -0700 | [diff] [blame] | 101 | |
| 102 | self._kernel_handler = kernel_handler.KernelHandler() |
Tom Wai-Hong Tam | 07278c2 | 2012-02-08 16:53:00 +0800 | [diff] [blame] | 103 | # TODO(waihong): The dev_key_path is a new argument. We do that in |
| 104 | # order not to break the old image and still be able to run. |
| 105 | try: |
| 106 | self._kernel_handler.init(self._chromeos_interface, |
| 107 | dev_key_path='/usr/share/vboot/devkeys') |
| 108 | except: |
| 109 | # Copy the key to the current working directory. |
| 110 | shutil.copy('/usr/share/vboot/devkeys/kernel_data_key.vbprivk', '.') |
| 111 | self._kernel_handler.init(self._chromeos_interface) |
Tom Wai-Hong Tam | b8a58ef | 2011-10-11 23:53:10 -0700 | [diff] [blame] | 112 | |
| 113 | self._tpm_handler = tpm_handler.TpmHandler() |
| 114 | self._tpm_handler.init(self._chromeos_interface) |
| 115 | |
Tom Wai-Hong Tam | 4895883 | 2011-12-30 10:16:57 +0800 | [diff] [blame] | 116 | self._cgpt_state = cgpt_state.CgptState( |
Tom Wai-Hong Tam | ed2231c | 2012-07-27 14:39:46 +0800 | [diff] [blame] | 117 | 'SHORT', self._chromeos_interface, self.get_root_dev()) |
Tom Wai-Hong Tam | 4895883 | 2011-12-30 10:16:57 +0800 | [diff] [blame] | 118 | |
ctchang | c7e55ea | 2012-08-09 16:19:14 +0800 | [diff] [blame] | 119 | # Initialize temporary directory path |
| 120 | self._temp_path = '/var/tmp/faft/autest' |
| 121 | self._keys_path = os.path.join(self._temp_path, 'keys') |
| 122 | self._work_path = os.path.join(self._temp_path, 'work') |
| 123 | |
Tom Wai-Hong Tam | b8a58ef | 2011-10-11 23:53:10 -0700 | [diff] [blame] | 124 | |
Tom Wai-Hong Tam | e8f291a | 2011-12-08 22:03:53 +0800 | [diff] [blame] | 125 | def _dispatch(self, method, params): |
| 126 | """This _dispatch method handles string conversion especially. |
| 127 | |
| 128 | Since we turn off allow_dotted_names option. So any string conversion, |
| 129 | like str(FAFTClient.method), i.e. FAFTClient.method.__str__, failed |
| 130 | via XML RPC call. |
| 131 | """ |
| 132 | is_str = method.endswith('.__str__') |
| 133 | if is_str: |
| 134 | method = method.rsplit('.', 1)[0] |
| 135 | try: |
| 136 | func = getattr(self, method) |
| 137 | except AttributeError: |
| 138 | raise Exception('method "%s" is not supported' % method) |
| 139 | else: |
| 140 | if is_str: |
| 141 | return str(func) |
| 142 | else: |
| 143 | return func(*params) |
| 144 | |
| 145 | |
Tom Wai-Hong Tam | bea57b3 | 2011-09-02 18:27:47 +0800 | [diff] [blame] | 146 | def is_available(self): |
| 147 | """Function for polling the RPC server availability. |
| 148 | |
| 149 | Returns: |
| 150 | Always True. |
| 151 | """ |
| 152 | return True |
| 153 | |
| 154 | |
Tom Wai-Hong Tam | b8a58ef | 2011-10-11 23:53:10 -0700 | [diff] [blame] | 155 | def run_shell_command(self, command): |
| 156 | """Run shell command. |
| 157 | |
| 158 | Args: |
| 159 | command: A shell command to be run. |
| 160 | """ |
| 161 | self._chromeos_interface.log('Requesting run shell command') |
| 162 | self._chromeos_interface.run_shell_command(command) |
| 163 | |
| 164 | |
| 165 | def run_shell_command_get_output(self, command): |
| 166 | """Run shell command and get its console output. |
| 167 | |
| 168 | Args: |
| 169 | command: A shell command to be run. |
| 170 | |
| 171 | Returns: |
| 172 | A list of strings stripped of the newline characters. |
| 173 | """ |
| 174 | self._chromeos_interface.log( |
| 175 | 'Requesting run shell command and get its console output') |
| 176 | return self._chromeos_interface.run_shell_command_get_output(command) |
| 177 | |
| 178 | |
| 179 | def software_reboot(self): |
| 180 | """Request software reboot.""" |
| 181 | self._chromeos_interface.log('Requesting software reboot') |
| 182 | self._chromeos_interface.run_shell_command('reboot') |
| 183 | |
| 184 | |
Tom Wai-Hong Tam | 678ab15 | 2011-12-14 15:27:24 +0800 | [diff] [blame] | 185 | def get_platform_name(self): |
| 186 | """Get the platform name of the current system. |
| 187 | |
| 188 | Returns: |
| 189 | A string of the platform name. |
| 190 | """ |
| 191 | self._chromeos_interface.log('Requesting get platform name') |
| 192 | return self._chromeos_interface.run_shell_command_get_output( |
| 193 | 'mosys platform name')[0] |
| 194 | |
| 195 | |
Tom Wai-Hong Tam | b8a58ef | 2011-10-11 23:53:10 -0700 | [diff] [blame] | 196 | def get_crossystem_value(self, key): |
| 197 | """Get crossystem value of the requested key. |
| 198 | |
| 199 | Args: |
| 200 | key: A crossystem key. |
| 201 | |
| 202 | Returns: |
| 203 | A string of the requested crossystem value. |
| 204 | """ |
| 205 | self._chromeos_interface.log('Requesting get crossystem value') |
| 206 | return self._chromeos_interface.run_shell_command_get_output( |
| 207 | 'crossystem %s' % key)[0] |
| 208 | |
| 209 | |
Tom Wai-Hong Tam | cfda61f | 2011-11-02 17:41:01 +0800 | [diff] [blame] | 210 | def get_root_dev(self): |
| 211 | """Get the name of root device without partition number. |
| 212 | |
| 213 | Returns: |
| 214 | A string of the root device without partition number. |
| 215 | """ |
| 216 | self._chromeos_interface.log('Requesting get root device') |
| 217 | return self._chromeos_interface.get_root_dev() |
| 218 | |
| 219 | |
| 220 | def get_root_part(self): |
| 221 | """Get the name of root device with partition number. |
| 222 | |
| 223 | Returns: |
| 224 | A string of the root device with partition number. |
| 225 | """ |
| 226 | self._chromeos_interface.log('Requesting get root part') |
| 227 | return self._chromeos_interface.get_root_part() |
| 228 | |
| 229 | |
Tom Wai-Hong Tam | b8a58ef | 2011-10-11 23:53:10 -0700 | [diff] [blame] | 230 | def set_try_fw_b(self): |
| 231 | """Set 'Try Frimware B' flag in crossystem.""" |
| 232 | self._chromeos_interface.log('Requesting restart with firmware B') |
| 233 | self._chromeos_interface.cs.fwb_tries = 1 |
| 234 | |
| 235 | |
Tom Wai-Hong Tam | 76c7507 | 2011-10-25 18:00:12 +0800 | [diff] [blame] | 236 | def request_recovery_boot(self): |
| 237 | """Request running in recovery mode on the restart.""" |
| 238 | self._chromeos_interface.log('Requesting restart in recovery mode') |
| 239 | self._chromeos_interface.cs.request_recovery() |
| 240 | |
| 241 | |
Tom Wai-Hong Tam | 8c9eed6 | 2011-12-28 15:05:05 +0800 | [diff] [blame] | 242 | def get_gbb_flags(self): |
| 243 | """Get the GBB flags. |
| 244 | |
| 245 | Returns: |
| 246 | An integer of the GBB flags. |
| 247 | """ |
| 248 | self._chromeos_interface.log('Getting GBB flags') |
Vic Yang | 59cac9c | 2012-05-21 15:28:42 +0800 | [diff] [blame] | 249 | return self._bios_handler.get_gbb_flags() |
Tom Wai-Hong Tam | 8c9eed6 | 2011-12-28 15:05:05 +0800 | [diff] [blame] | 250 | |
| 251 | |
Tom Wai-Hong Tam | 81f7000 | 2011-12-13 12:29:46 +0800 | [diff] [blame] | 252 | def get_firmware_flags(self, section): |
| 253 | """Get the preamble flags of a firmware section. |
| 254 | |
| 255 | Args: |
| 256 | section: A firmware section, either 'a' or 'b'. |
| 257 | |
| 258 | Returns: |
| 259 | An integer of the preamble flags. |
| 260 | """ |
| 261 | self._chromeos_interface.log('Getting preamble flags of firmware %s' % |
| 262 | section) |
Vic Yang | 59cac9c | 2012-05-21 15:28:42 +0800 | [diff] [blame] | 263 | return self._bios_handler.get_section_flags(section) |
| 264 | |
| 265 | |
Vic Yang | 91b73cf | 2012-07-31 17:18:11 +0800 | [diff] [blame] | 266 | def set_firmware_flags(self, section, flags): |
| 267 | """Set the preamble flags of a firmware section. |
| 268 | |
| 269 | Args: |
| 270 | section: A firmware section, either 'a' or 'b'. |
| 271 | flags: An integer of preamble flags. |
| 272 | """ |
| 273 | self._chromeos_interface.log( |
| 274 | 'Setting preamble flags of firmware %s to %s' % (section, flags)) |
| 275 | version = self.get_firmware_version(section) |
| 276 | self._bios_handler.set_section_version(section, version, flags, |
| 277 | write_through=True) |
| 278 | |
| 279 | |
Tom Wai-Hong Tam | 4e10b9f | 2012-09-06 16:23:02 +0800 | [diff] [blame^] | 280 | def get_firmware_sha(self, section): |
| 281 | """Get SHA1 hash of BIOS RW firmware section. |
| 282 | |
| 283 | Args: |
| 284 | section: A firmware section, either 'a' or 'b'. |
| 285 | flags: An integer of preamble flags. |
| 286 | """ |
| 287 | return self._bios_handler.get_section_sha(section) |
| 288 | |
| 289 | |
Vic Yang | 91b73cf | 2012-07-31 17:18:11 +0800 | [diff] [blame] | 290 | def get_EC_firmware_sha(self): |
Tom Wai-Hong Tam | 4e10b9f | 2012-09-06 16:23:02 +0800 | [diff] [blame^] | 291 | """Get SHA1 hash of EC RW firmware section.""" |
Vic Yang | 91b73cf | 2012-07-31 17:18:11 +0800 | [diff] [blame] | 292 | return self._ec_handler.get_section_sha('rw') |
| 293 | |
| 294 | |
Tom Wai-Hong Tam | c1c4deb | 2012-07-26 14:28:11 +0800 | [diff] [blame] | 295 | def reload_firmware(self): |
| 296 | """Reload the firmware image that may be changed.""" |
| 297 | self._bios_handler.reload() |
| 298 | |
| 299 | |
Vic Yang | 59cac9c | 2012-05-21 15:28:42 +0800 | [diff] [blame] | 300 | @allow_multiple_section_input |
| 301 | def corrupt_EC(self, section): |
| 302 | """Corrupt the requested EC section signature. |
| 303 | |
| 304 | Args: |
| 305 | section: A EC section, either 'a' or 'b'. |
| 306 | """ |
| 307 | self._chromeos_interface.log('Corrupting EC signature %s' % |
| 308 | section) |
Vic Yang | 37a5546 | 2012-06-29 14:00:28 +0800 | [diff] [blame] | 309 | self._ec_handler.corrupt_firmware(section, corrupt_all=True) |
Vic Yang | 59cac9c | 2012-05-21 15:28:42 +0800 | [diff] [blame] | 310 | |
| 311 | |
| 312 | @allow_multiple_section_input |
| 313 | def corrupt_EC_body(self, section): |
| 314 | """Corrupt the requested EC section body. |
| 315 | |
| 316 | Args: |
| 317 | section: An EC section, either 'a' or 'b'. |
| 318 | """ |
| 319 | self._chromeos_interface.log('Corrupting EC body %s' % |
| 320 | section) |
Vic Yang | 37a5546 | 2012-06-29 14:00:28 +0800 | [diff] [blame] | 321 | self._ec_handler.corrupt_firmware_body(section, corrupt_all=True) |
Vic Yang | 59cac9c | 2012-05-21 15:28:42 +0800 | [diff] [blame] | 322 | |
| 323 | |
| 324 | @allow_multiple_section_input |
| 325 | def restore_EC(self, section): |
| 326 | """Restore the previously corrupted EC section signature. |
| 327 | |
| 328 | Args: |
| 329 | section: An EC section, either 'a' or 'b'. |
| 330 | """ |
| 331 | self._chromeos_interface.log('Restoring EC signature %s' % |
| 332 | section) |
Vic Yang | 37a5546 | 2012-06-29 14:00:28 +0800 | [diff] [blame] | 333 | self._ec_handler.restore_firmware(section, restore_all=True) |
Vic Yang | 59cac9c | 2012-05-21 15:28:42 +0800 | [diff] [blame] | 334 | |
| 335 | |
| 336 | @allow_multiple_section_input |
| 337 | def restore_EC_body(self, section): |
| 338 | """Restore the previously corrupted EC section body. |
| 339 | |
| 340 | Args: |
| 341 | section: An EC section, either 'a' or 'b'. |
| 342 | """ |
| 343 | self._chromeos_interface.log('Restoring EC body %s' % |
| 344 | section) |
Vic Yang | 37a5546 | 2012-06-29 14:00:28 +0800 | [diff] [blame] | 345 | self._ec_handler.restore_firmware_body(section, restore_all=True) |
Tom Wai-Hong Tam | 81f7000 | 2011-12-13 12:29:46 +0800 | [diff] [blame] | 346 | |
| 347 | |
Tom Wai-Hong Tam | 0e680af | 2011-10-26 14:32:55 +0800 | [diff] [blame] | 348 | @allow_multiple_section_input |
Tom Wai-Hong Tam | b8a58ef | 2011-10-11 23:53:10 -0700 | [diff] [blame] | 349 | def corrupt_firmware(self, section): |
Tom Wai-Hong Tam | 9aea821 | 2011-12-12 15:08:45 +0800 | [diff] [blame] | 350 | """Corrupt the requested firmware section signature. |
Tom Wai-Hong Tam | b8a58ef | 2011-10-11 23:53:10 -0700 | [diff] [blame] | 351 | |
| 352 | Args: |
| 353 | section: A firmware section, either 'a' or 'b'. |
| 354 | """ |
Tom Wai-Hong Tam | 9aea821 | 2011-12-12 15:08:45 +0800 | [diff] [blame] | 355 | self._chromeos_interface.log('Corrupting firmware signature %s' % |
| 356 | section) |
Vic Yang | 59cac9c | 2012-05-21 15:28:42 +0800 | [diff] [blame] | 357 | self._bios_handler.corrupt_firmware(section) |
Tom Wai-Hong Tam | b8a58ef | 2011-10-11 23:53:10 -0700 | [diff] [blame] | 358 | |
| 359 | |
Tom Wai-Hong Tam | 0e680af | 2011-10-26 14:32:55 +0800 | [diff] [blame] | 360 | @allow_multiple_section_input |
Tom Wai-Hong Tam | 81f7000 | 2011-12-13 12:29:46 +0800 | [diff] [blame] | 361 | def corrupt_firmware_body(self, section): |
| 362 | """Corrupt the requested firmware section body. |
| 363 | |
| 364 | Args: |
| 365 | section: A firmware section, either 'a' or 'b'. |
| 366 | """ |
| 367 | self._chromeos_interface.log('Corrupting firmware body %s' % |
| 368 | section) |
Vic Yang | 59cac9c | 2012-05-21 15:28:42 +0800 | [diff] [blame] | 369 | self._bios_handler.corrupt_firmware_body(section) |
Tom Wai-Hong Tam | 81f7000 | 2011-12-13 12:29:46 +0800 | [diff] [blame] | 370 | |
| 371 | |
| 372 | @allow_multiple_section_input |
Tom Wai-Hong Tam | b8a58ef | 2011-10-11 23:53:10 -0700 | [diff] [blame] | 373 | def restore_firmware(self, section): |
Tom Wai-Hong Tam | 9aea821 | 2011-12-12 15:08:45 +0800 | [diff] [blame] | 374 | """Restore the previously corrupted firmware section signature. |
Tom Wai-Hong Tam | b8a58ef | 2011-10-11 23:53:10 -0700 | [diff] [blame] | 375 | |
| 376 | Args: |
| 377 | section: A firmware section, either 'a' or 'b'. |
| 378 | """ |
Tom Wai-Hong Tam | 9aea821 | 2011-12-12 15:08:45 +0800 | [diff] [blame] | 379 | self._chromeos_interface.log('Restoring firmware signature %s' % |
| 380 | section) |
Vic Yang | 59cac9c | 2012-05-21 15:28:42 +0800 | [diff] [blame] | 381 | self._bios_handler.restore_firmware(section) |
Tom Wai-Hong Tam | b8a58ef | 2011-10-11 23:53:10 -0700 | [diff] [blame] | 382 | |
| 383 | |
Tom Wai-Hong Tam | cfda61f | 2011-11-02 17:41:01 +0800 | [diff] [blame] | 384 | @allow_multiple_section_input |
Tom Wai-Hong Tam | 81f7000 | 2011-12-13 12:29:46 +0800 | [diff] [blame] | 385 | def restore_firmware_body(self, section): |
| 386 | """Restore the previously corrupted firmware section body. |
| 387 | |
| 388 | Args: |
| 389 | section: A firmware section, either 'a' or 'b'. |
| 390 | """ |
| 391 | self._chromeos_interface.log('Restoring firmware body %s' % |
| 392 | section) |
Vic Yang | 59cac9c | 2012-05-21 15:28:42 +0800 | [diff] [blame] | 393 | self._bios_handler.restore_firmware_body(section) |
Tom Wai-Hong Tam | 81f7000 | 2011-12-13 12:29:46 +0800 | [diff] [blame] | 394 | |
| 395 | |
Vic Yang | 91b73cf | 2012-07-31 17:18:11 +0800 | [diff] [blame] | 396 | def get_firmware_version(self, section): |
| 397 | """Retrieve firmware version of a section.""" |
| 398 | return self._bios_handler.get_section_version(section) |
| 399 | |
| 400 | |
Tom Wai-Hong Tam | 46d03b1 | 2012-02-08 12:02:17 +0800 | [diff] [blame] | 401 | def _modify_firmware_version(self, section, delta): |
| 402 | """Modify firmware version for the requested section, by adding delta. |
| 403 | |
| 404 | The passed in delta, a positive or a negative number, is added to the |
| 405 | original firmware version. |
| 406 | """ |
Vic Yang | 91b73cf | 2012-07-31 17:18:11 +0800 | [diff] [blame] | 407 | original_version = self.get_firmware_version(section) |
Tom Wai-Hong Tam | 46d03b1 | 2012-02-08 12:02:17 +0800 | [diff] [blame] | 408 | new_version = original_version + delta |
Vic Yang | 59cac9c | 2012-05-21 15:28:42 +0800 | [diff] [blame] | 409 | flags = self._bios_handler.get_section_flags(section) |
Tom Wai-Hong Tam | 46d03b1 | 2012-02-08 12:02:17 +0800 | [diff] [blame] | 410 | self._chromeos_interface.log( |
| 411 | 'Setting firmware section %s version from %d to %d' % ( |
| 412 | section, original_version, new_version)) |
Vic Yang | 59cac9c | 2012-05-21 15:28:42 +0800 | [diff] [blame] | 413 | self._bios_handler.set_section_version(section, new_version, flags, |
| 414 | write_through=True) |
Tom Wai-Hong Tam | 46d03b1 | 2012-02-08 12:02:17 +0800 | [diff] [blame] | 415 | |
| 416 | @allow_multiple_section_input |
| 417 | def move_firmware_backward(self, section): |
| 418 | """Decrement firmware version for the requested section.""" |
| 419 | self._modify_firmware_version(section, -1) |
| 420 | |
| 421 | |
| 422 | @allow_multiple_section_input |
| 423 | def move_firmware_forward(self, section): |
| 424 | """Increase firmware version for the requested section.""" |
| 425 | self._modify_firmware_version(section, 1) |
| 426 | |
ctchang | c7e55ea | 2012-08-09 16:19:14 +0800 | [diff] [blame] | 427 | def retrieve_firmware_version(self, section): |
| 428 | """Return firmware version.""" |
| 429 | return self._bios_handler.get_section_version(section) |
| 430 | |
| 431 | def retrieve_firmware_datakey_version(self, section): |
| 432 | """Return firmware data key version.""" |
| 433 | return self._bios_handler.get_section_datakey_version(section) |
| 434 | |
| 435 | def retrieve_kernel_subkey_version(self,section): |
| 436 | """Return kernel subkey version.""" |
| 437 | return self._bios_handler.get_section_kernel_subkey_version(section) |
Tom Wai-Hong Tam | 46d03b1 | 2012-02-08 12:02:17 +0800 | [diff] [blame] | 438 | |
Tom Wai-Hong Tam | 81f7000 | 2011-12-13 12:29:46 +0800 | [diff] [blame] | 439 | @allow_multiple_section_input |
Tom Wai-Hong Tam | cfda61f | 2011-11-02 17:41:01 +0800 | [diff] [blame] | 440 | def corrupt_kernel(self, section): |
| 441 | """Corrupt the requested kernel section. |
| 442 | |
| 443 | Args: |
| 444 | section: A kernel section, either 'a' or 'b'. |
| 445 | """ |
| 446 | self._chromeos_interface.log('Corrupting kernel %s' % section) |
| 447 | self._kernel_handler.corrupt_kernel(section) |
| 448 | |
| 449 | |
| 450 | @allow_multiple_section_input |
| 451 | def restore_kernel(self, section): |
| 452 | """Restore the requested kernel section (previously corrupted). |
| 453 | |
| 454 | Args: |
| 455 | section: A kernel section, either 'a' or 'b'. |
| 456 | """ |
| 457 | self._chromeos_interface.log('restoring kernel %s' % section) |
| 458 | self._kernel_handler.restore_kernel(section) |
| 459 | |
| 460 | |
Tom Wai-Hong Tam | 07278c2 | 2012-02-08 16:53:00 +0800 | [diff] [blame] | 461 | def _modify_kernel_version(self, section, delta): |
| 462 | """Modify kernel version for the requested section, by adding delta. |
| 463 | |
| 464 | The passed in delta, a positive or a negative number, is added to the |
| 465 | original kernel version. |
| 466 | """ |
| 467 | original_version = self._kernel_handler.get_version(section) |
| 468 | new_version = original_version + delta |
| 469 | self._chromeos_interface.log( |
| 470 | 'Setting kernel section %s version from %d to %d' % ( |
| 471 | section, original_version, new_version)) |
| 472 | self._kernel_handler.set_version(section, new_version) |
| 473 | |
| 474 | |
| 475 | @allow_multiple_section_input |
| 476 | def move_kernel_backward(self, section): |
| 477 | """Decrement kernel version for the requested section.""" |
| 478 | self._modify_kernel_version(section, -1) |
| 479 | |
| 480 | |
| 481 | @allow_multiple_section_input |
| 482 | def move_kernel_forward(self, section): |
| 483 | """Increase kernel version for the requested section.""" |
| 484 | self._modify_kernel_version(section, 1) |
| 485 | |
ctchang | cc88d11 | 2012-08-23 17:56:15 +0800 | [diff] [blame] | 486 | |
| 487 | def retrieve_kernel_version(self, section): |
| 488 | """Return kernel version.""" |
| 489 | return self._kernel_handler.get_version(section) |
| 490 | |
| 491 | |
| 492 | def retrieve_kernel_datakey_version(self, section): |
| 493 | """Return kernel datakey version.""" |
| 494 | return self._kernel_handler.get_datakey_version(section) |
| 495 | |
| 496 | |
Tom Wai-Hong Tam | 622d0ba | 2012-08-15 16:29:05 +0800 | [diff] [blame] | 497 | def diff_kernel_a_b(self): |
| 498 | """Compare kernel A with B. |
| 499 | |
| 500 | Returns: |
| 501 | True: if kernel A is different with B. |
| 502 | False: if kernel A is the same as B. |
| 503 | """ |
| 504 | rootdev = self._chromeos_interface.get_root_dev() |
| 505 | kernel_a = self._chromeos_interface.join_part(rootdev, '3') |
| 506 | kernel_b = self._chromeos_interface.join_part(rootdev, '5') |
| 507 | |
| 508 | # The signature (some kind of hash) for the kernel body is stored in |
| 509 | # the beginning. So compare the first 64KB (including header, preamble, |
| 510 | # and signature) should be enough to check them identical. |
| 511 | header_a = self._chromeos_interface.read_partition(kernel_a, 0x10000) |
| 512 | header_b = self._chromeos_interface.read_partition(kernel_b, 0x10000) |
| 513 | |
| 514 | return header_a != header_b |
Tom Wai-Hong Tam | 07278c2 | 2012-02-08 16:53:00 +0800 | [diff] [blame] | 515 | |
Tom Wai-Hong Tam | 23870e0 | 2012-08-24 16:15:34 +0800 | [diff] [blame] | 516 | |
| 517 | def setup_EC_image(self, ec_path): |
| 518 | """Setup the new EC image for later update. |
| 519 | |
| 520 | Args: |
| 521 | ec_path: The path of the EC image to be updated. |
| 522 | """ |
| 523 | self._ec_image = flashrom_handler.FlashromHandler() |
| 524 | self._ec_image.init(saft_flashrom_util, |
| 525 | self._chromeos_interface, |
| 526 | 'ec_root_key.vpubk', |
| 527 | '/usr/share/vboot/devkeys', |
| 528 | 'ec') |
| 529 | self._ec_image.new_image(ec_path) |
| 530 | |
| 531 | |
| 532 | def get_EC_image_sha(self): |
| 533 | """Get SHA1 hash of RW firmware section of the EC autest image.""" |
| 534 | return self._ec_image.get_section_sha('rw') |
| 535 | |
| 536 | |
| 537 | def update_EC_from_image(self, section, flags): |
| 538 | """Update EC via software sync design. |
| 539 | |
| 540 | It copys the RW section from the EC image, which is loaded by calling |
| 541 | setup_EC_image(), to the EC area of the specified RW section on the |
| 542 | current AP firmware. |
| 543 | |
| 544 | Args: |
| 545 | section: A firmware section on current BIOS, either 'a' or 'b'. |
| 546 | flags: An integer of preamble flags. |
| 547 | """ |
| 548 | blob = self._ec_image.get_section_body('rw') |
| 549 | self._bios_handler.set_section_ecbin(section, blob, |
| 550 | write_through=True) |
| 551 | self.set_firmware_flags(section, flags) |
| 552 | |
| 553 | |
Tom Wai-Hong Tam | b63bc74 | 2012-08-30 20:41:30 +0800 | [diff] [blame] | 554 | def dump_firmware(self, bios_path): |
| 555 | """Dump the current BIOS firmware to a file, specified by bios_path. |
| 556 | |
| 557 | Args: |
| 558 | bios_path: The path of the BIOS image to be written. |
| 559 | """ |
| 560 | self._bios_handler.dump_whole(bios_path) |
| 561 | |
| 562 | |
| 563 | def write_firmware(self, bios_path): |
| 564 | """Write the firmware from bios_path to the current system. |
| 565 | |
| 566 | Args: |
| 567 | bios_path: The path of the source BIOS image. |
| 568 | """ |
| 569 | self._bios_handler.new_image(bios_path) |
| 570 | self._bios_handler.write_whole() |
| 571 | |
| 572 | |
Tom Wai-Hong Tam | 23870e0 | 2012-08-24 16:15:34 +0800 | [diff] [blame] | 573 | def dump_EC_firmware(self, ec_path): |
| 574 | """Dump the current EC firmware to a file, specified by ec_path. |
| 575 | |
| 576 | Args: |
| 577 | ec_path: The path of the EC image to be written. |
| 578 | """ |
| 579 | self._ec_handler.dump_whole(ec_path) |
| 580 | |
| 581 | |
Tom Wai-Hong Tam | 4895883 | 2011-12-30 10:16:57 +0800 | [diff] [blame] | 582 | def run_cgpt_test_loop(self): |
| 583 | """Run the CgptState test loop. The tst logic is handled in the client. |
| 584 | |
| 585 | Returns: |
| 586 | 0: there are more cgpt tests to execute. |
| 587 | 1: no more CgptState test, finished. |
| 588 | """ |
| 589 | return self._cgpt_state.test_loop() |
| 590 | |
| 591 | |
| 592 | def set_cgpt_test_step(self, step): |
| 593 | """Set the CgptState test step. |
| 594 | |
| 595 | Args: |
| 596 | step: A test step number. |
| 597 | """ |
| 598 | self._cgpt_state.set_step(step) |
| 599 | |
| 600 | |
| 601 | def get_cgpt_test_step(self): |
| 602 | """Get the CgptState test step. |
| 603 | |
| 604 | Returns: |
| 605 | A test step number. |
| 606 | """ |
| 607 | return self._cgpt_state.get_step() |
| 608 | |
| 609 | |
ctchang | c7e55ea | 2012-08-09 16:19:14 +0800 | [diff] [blame] | 610 | def setup_firmwareupdate_temp_dir(self): |
| 611 | """Setup temporary directory. |
| 612 | |
| 613 | Devkeys are copied to _key_path. Then, shellball, |
| 614 | /usr/sbin/chromeos-firmwareupdate, is extracted to _work_path. |
| 615 | """ |
ctchang | 6b700df | 2012-08-20 13:48:07 +0800 | [diff] [blame] | 616 | |
| 617 | self.cleanup_firmwareupdate_temp_dir() |
| 618 | |
ctchang | c7e55ea | 2012-08-09 16:19:14 +0800 | [diff] [blame] | 619 | os.mkdir(self._temp_path) |
| 620 | os.chdir(self._temp_path) |
| 621 | |
| 622 | os.mkdir(self._work_path) |
| 623 | shutil.copytree('/usr/share/vboot/devkeys/', self._keys_path) |
| 624 | self.run_shell_command( |
| 625 | 'sh /usr/sbin/chromeos-firmwareupdate --sb_extract %s' |
| 626 | % self._work_path) |
| 627 | |
| 628 | |
| 629 | def retrieve_shellball_fwid(self): |
| 630 | """Retrieve shellball's fwid. |
| 631 | |
| 632 | This method should be called after setup_firmwareupdate_temp_dir. |
| 633 | |
| 634 | Returns: |
| 635 | Shellball's fwid. |
| 636 | """ |
| 637 | self.run_shell_command('dump_fmap -x %s %s' % |
| 638 | (os.path.join(self._work_path, 'bios.bin'), |
| 639 | 'RW_FWID_A')) |
| 640 | |
| 641 | [fwid] = self.run_shell_command_get_output( |
ctchang | cc88d11 | 2012-08-23 17:56:15 +0800 | [diff] [blame] | 642 | "cat RW_FWID_A | tr '\\0' '\\t' | cut -f1") |
ctchang | c7e55ea | 2012-08-09 16:19:14 +0800 | [diff] [blame] | 643 | |
| 644 | return fwid |
| 645 | |
| 646 | |
| 647 | def cleanup_firmwareupdate_temp_dir(self): |
| 648 | """Cleanup temporary directory.""" |
ctchang | 6b700df | 2012-08-20 13:48:07 +0800 | [diff] [blame] | 649 | if os.path.isdir(self._temp_path): |
| 650 | shutil.rmtree(self._temp_path) |
ctchang | c7e55ea | 2012-08-09 16:19:14 +0800 | [diff] [blame] | 651 | |
| 652 | |
| 653 | def repack_firmwareupdate_shellball(self, append): |
| 654 | """Repack shellball with new fwid. |
| 655 | |
| 656 | New fwid follows the rule: [orignal_fwid]-[append]. |
| 657 | |
| 658 | Args: |
| 659 | append: use for new fwid naming. |
| 660 | """ |
| 661 | shutil.copy('/usr/sbin/chromeos-firmwareupdate', '%s' % |
| 662 | os.path.join(self._temp_path, |
| 663 | 'chromeos-firmwareupdate-%s' % append)) |
| 664 | |
ctchang | 6b700df | 2012-08-20 13:48:07 +0800 | [diff] [blame] | 665 | self.run_shell_command('sh %s --sb_repack %s' % ( |
| 666 | os.path.join(self._temp_path, |
| 667 | 'chromeos-firmwareupdate-%s' % append), |
| 668 | self._work_path)) |
ctchang | c7e55ea | 2012-08-09 16:19:14 +0800 | [diff] [blame] | 669 | |
| 670 | args = ['-i'] |
| 671 | args.append('"s/TARGET_FWID=\\"\\(.*\\)\\"/TARGET_FWID=\\"\\1.%s\\"/g"' |
| 672 | % append) |
| 673 | args.append('%s' |
| 674 | % os.path.join(self._temp_path, |
| 675 | 'chromeos-firmwareupdate-%s' % append)) |
| 676 | cmd = 'sed %s' % ' '.join(args) |
| 677 | self.run_shell_command(cmd) |
| 678 | |
| 679 | args = ['-i'] |
| 680 | args.append('"s/TARGET_UNSTABLE=\\".*\\"/TARGET_UNSTABLE=\\"\\"/g"') |
| 681 | args.append('%s' |
| 682 | % os.path.join(self._temp_path, |
| 683 | 'chromeos-firmwareupdate-%s' % append)) |
| 684 | cmd = 'sed %s' % ' '.join(args) |
| 685 | self.run_shell_command(cmd) |
| 686 | |
| 687 | |
| 688 | def resign_firmware(self, version): |
| 689 | """Resign firmware with version. |
| 690 | |
| 691 | Args: |
| 692 | version: new firmware version number. |
| 693 | """ |
| 694 | args = [os.path.join(self._work_path, 'bios.bin')] |
| 695 | args.append(os.path.join(self._temp_path, 'output.bin')) |
| 696 | args.append(os.path.join(self._keys_path, 'firmware_data_key.vbprivk')) |
| 697 | args.append(os.path.join(self._keys_path, 'firmware.keyblock')) |
| 698 | args.append(os.path.join(self._keys_path, |
| 699 | 'dev_firmware_data_key.vbprivk')) |
| 700 | args.append(os.path.join(self._keys_path, 'dev_firmware.keyblock')) |
| 701 | args.append(os.path.join(self._keys_path, 'kernel_subkey.vbpubk')) |
| 702 | args.append('%d' % version) |
| 703 | args.append('1') |
| 704 | cmd = '/usr/share/vboot/bin/resign_firmwarefd.sh %s' % ' '.join(args) |
| 705 | self.run_shell_command(cmd) |
| 706 | |
| 707 | shutil.copyfile('%s' % os.path.join(self._temp_path, 'output.bin'), |
| 708 | '%s' % os.path.join(self._work_path, 'bios.bin')) |
| 709 | |
| 710 | |
| 711 | def run_firmware_autoupdate(self, append): |
| 712 | """Do firmwareupdate with autoupdate mode using new shellball. |
| 713 | |
| 714 | Args: |
| 715 | append: decide which shellball to use with format |
| 716 | chromeos-firmwareupdate-[append] |
| 717 | """ |
| 718 | self.run_shell_command( |
| 719 | '/bin/sh %s --mode autoupdate --noupdate_ec' |
| 720 | % os.path.join(self._temp_path, |
| 721 | 'chromeos-firmwareupdate-%s' % append)) |
| 722 | |
| 723 | |
| 724 | def run_firmware_bootok(self, append): |
| 725 | """Do bootok mode using new shellball. |
| 726 | |
| 727 | Copy firmware B to firmware A if reboot success. |
| 728 | """ |
| 729 | self.run_shell_command( |
| 730 | '/bin/sh %s --mode bootok' % os.path.join(self._temp_path, |
| 731 | 'chromeos-firmwareupdate-%s' % append)) |
| 732 | |
| 733 | |
| 734 | def run_firmware_recovery(self): |
| 735 | """Recovery to original shellball.""" |
| 736 | args = ['/usr/sbin/chromeos-firmwareupdate'] |
| 737 | args.append('--mode recovery') |
| 738 | args.append('--noupdate_ec') |
| 739 | cmd = '/bin/sh %s' % ' '.join(args) |
| 740 | self.run_shell_command(cmd) |
| 741 | |
| 742 | |
| 743 | def get_temp_path(self): |
| 744 | """Get temporary directory path.""" |
| 745 | return self._temp_path |
| 746 | |
| 747 | |
ctchang | cc88d11 | 2012-08-23 17:56:15 +0800 | [diff] [blame] | 748 | def get_keys_path(self): |
| 749 | """Get keys path in temporary directory.""" |
| 750 | return self._keys_path |
| 751 | |
| 752 | |
| 753 | def resign_kernel_with_keys(self, section, key_path=None): |
| 754 | """Resign kernel with temporary key.""" |
| 755 | self._kernel_handler.resign_kernel(section, key_path) |
| 756 | |
| 757 | |
Tom Wai-Hong Tam | bea57b3 | 2011-09-02 18:27:47 +0800 | [diff] [blame] | 758 | def cleanup(self): |
| 759 | """Cleanup for the RPC server. Currently nothing.""" |
| 760 | pass |
| 761 | |
| 762 | |
Tom Wai-Hong Tam | b8a58ef | 2011-10-11 23:53:10 -0700 | [diff] [blame] | 763 | def main(): |
| 764 | parser = OptionParser(usage='Usage: %prog [options]') |
| 765 | parser.add_option('--port', type='int', dest='port', default=9990, |
| 766 | help='port number of XMLRPC server') |
| 767 | (options, args) = parser.parse_args() |
| 768 | |
| 769 | faft_client = FAFTClient() |
| 770 | |
| 771 | # Launch the XMLRPC server to provide FAFTClient commands. |
Tom Wai-Hong Tam | 4a257e5 | 2011-11-12 08:36:22 +0800 | [diff] [blame] | 772 | server = SimpleXMLRPCServer(('localhost', options.port), allow_none=True, |
| 773 | logRequests=False) |
Tom Wai-Hong Tam | b8a58ef | 2011-10-11 23:53:10 -0700 | [diff] [blame] | 774 | server.register_introspection_functions() |
| 775 | server.register_instance(faft_client) |
| 776 | print 'XMLRPC Server: Serving FAFTClient on port %s' % options.port |
| 777 | server.serve_forever() |
| 778 | |
| 779 | |
| 780 | if __name__ == '__main__': |
| 781 | main() |