2017-04-12 10:48:38 +00:00
|
|
|
#!/bin/sh
|
|
|
|
# Shell functions for most initialization scripts
|
|
|
|
|
|
|
|
die() {
|
|
|
|
echo >&2 "$*";
|
|
|
|
exit 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
warn() {
|
|
|
|
echo >&2 "$*";
|
|
|
|
}
|
|
|
|
|
|
|
|
recovery() {
|
|
|
|
echo >&2 "!!!!! $*"
|
|
|
|
|
|
|
|
# Remove any temporary secret files that might be hanging around
|
|
|
|
# but recreate the directory so that new tools can use it.
|
2019-02-16 17:26:51 +00:00
|
|
|
shred -n 10 -z -u /tmp/secret/* 2> /dev/null
|
2017-04-12 10:48:38 +00:00
|
|
|
rm -rf /tmp/secret
|
|
|
|
mkdir -p /tmp/secret
|
2019-02-08 18:25:12 +00:00
|
|
|
|
|
|
|
# ensure /tmp/config exists for recovery scripts that depend on it
|
|
|
|
touch /tmp/config
|
|
|
|
|
2017-12-05 08:29:07 +00:00
|
|
|
if [ "$CONFIG_TPM" = y ]; then
|
|
|
|
tpm extend -ix 4 -ic recovery
|
|
|
|
fi
|
2017-04-12 10:48:38 +00:00
|
|
|
echo >&2 "!!!!! Starting recovery shell"
|
|
|
|
sleep 1
|
2018-04-10 19:39:05 +00:00
|
|
|
|
|
|
|
if [ -x /bin/setsid ]; then
|
|
|
|
exec /bin/setsid -c /bin/ash
|
|
|
|
else
|
|
|
|
exec /bin/ash
|
|
|
|
fi
|
2017-04-12 10:48:38 +00:00
|
|
|
}
|
|
|
|
|
2018-03-10 23:40:07 +00:00
|
|
|
pause_recovery() {
|
|
|
|
read -p 'Hit enter to proceed to recovery shell:'
|
|
|
|
recovery $*
|
|
|
|
}
|
2017-04-12 10:48:38 +00:00
|
|
|
|
|
|
|
pcrs() {
|
2018-03-12 01:27:19 +00:00
|
|
|
head -8 /sys/class/tpm/tpm0/pcrs
|
2017-04-12 10:48:38 +00:00
|
|
|
}
|
2017-04-29 17:40:34 +00:00
|
|
|
|
|
|
|
confirm_totp()
|
|
|
|
{
|
2017-07-18 17:44:02 +00:00
|
|
|
prompt="$1"
|
2017-04-29 17:40:34 +00:00
|
|
|
last_half=X
|
2017-07-18 17:44:02 +00:00
|
|
|
unset totp_confirm
|
2017-04-29 17:40:34 +00:00
|
|
|
|
|
|
|
while true; do
|
|
|
|
|
|
|
|
# update the TOTP code every thirty seconds
|
|
|
|
date=`date "+%Y-%m-%d %H:%M:%S"`
|
|
|
|
seconds=`date "+%s"`
|
|
|
|
half=`expr \( $seconds % 60 \) / 30`
|
2017-12-05 08:29:07 +00:00
|
|
|
if [ "$CONFIG_TPM" != y ]; then
|
2017-07-18 17:44:02 +00:00
|
|
|
TOTP="NO TPM"
|
|
|
|
elif [ "$half" != "$last_half" ]; then
|
2017-04-29 17:40:34 +00:00
|
|
|
last_half=$half;
|
|
|
|
TOTP=`unseal-totp` \
|
|
|
|
|| recovery "TOTP code generation failed"
|
|
|
|
fi
|
|
|
|
|
|
|
|
echo -n "$date $TOTP: "
|
|
|
|
|
|
|
|
# read the first character, non-blocking
|
|
|
|
read \
|
|
|
|
-t 1 \
|
|
|
|
-n 1 \
|
|
|
|
-s \
|
2017-07-18 17:44:02 +00:00
|
|
|
-p "$prompt" \
|
2017-04-29 17:40:34 +00:00
|
|
|
totp_confirm \
|
|
|
|
&& break
|
|
|
|
|
|
|
|
# nothing typed, redraw the line
|
|
|
|
echo -ne '\r'
|
|
|
|
done
|
|
|
|
|
|
|
|
# clean up with a newline
|
|
|
|
echo
|
|
|
|
}
|
2017-07-04 23:49:14 +00:00
|
|
|
|
2017-12-06 08:04:27 +00:00
|
|
|
enable_usb()
|
2017-07-04 23:49:14 +00:00
|
|
|
{
|
2017-12-06 08:04:27 +00:00
|
|
|
if [ "$CONFIG_LINUX_USB_COMPANION_CONTROLLER" = y ]; then
|
|
|
|
if ! lsmod | grep -q uhci_hcd; then
|
|
|
|
insmod /lib/modules/uhci-hcd.ko \
|
|
|
|
|| die "uhci_hcd: module load failed"
|
|
|
|
fi
|
|
|
|
if ! lsmod | grep -q ohci_hcd; then
|
|
|
|
insmod /lib/modules/ohci-hcd.ko \
|
|
|
|
|| die "ohci_hcd: module load failed"
|
|
|
|
fi
|
|
|
|
if ! lsmod | grep -q ohci_pci; then
|
|
|
|
insmod /lib/modules/ohci-pci.ko \
|
|
|
|
|| die "ohci_pci: module load failed"
|
|
|
|
fi
|
2017-07-22 20:32:10 +00:00
|
|
|
fi
|
2017-07-04 23:49:14 +00:00
|
|
|
if ! lsmod | grep -q ehci_hcd; then
|
|
|
|
insmod /lib/modules/ehci-hcd.ko \
|
|
|
|
|| die "ehci_hcd: module load failed"
|
|
|
|
fi
|
|
|
|
if ! lsmod | grep -q ehci_pci; then
|
|
|
|
insmod /lib/modules/ehci-pci.ko \
|
|
|
|
|| die "ehci_pci: module load failed"
|
|
|
|
fi
|
|
|
|
if ! lsmod | grep -q xhci_hcd; then
|
|
|
|
insmod /lib/modules/xhci-hcd.ko \
|
2017-12-06 08:04:27 +00:00
|
|
|
|| die "xhci_hcd: module load failed"
|
2017-07-04 23:49:14 +00:00
|
|
|
fi
|
|
|
|
if ! lsmod | grep -q xhci_pci; then
|
|
|
|
insmod /lib/modules/xhci-pci.ko \
|
2017-12-06 08:04:27 +00:00
|
|
|
|| die "xhci_pci: module load failed"
|
2017-07-04 23:49:14 +00:00
|
|
|
sleep 2
|
|
|
|
fi
|
2017-12-06 08:04:27 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
confirm_gpg_card()
|
|
|
|
{
|
|
|
|
read \
|
|
|
|
-n 1 \
|
|
|
|
-p "Please confirm that your GPG card is inserted [Y/n]: " \
|
|
|
|
card_confirm
|
|
|
|
echo
|
|
|
|
|
|
|
|
if [ "$card_confirm" != "y" \
|
|
|
|
-a "$card_confirm" != "Y" \
|
|
|
|
-a -n "$card_confirm" ] \
|
|
|
|
; then
|
|
|
|
die "gpg card not confirmed"
|
|
|
|
fi
|
|
|
|
|
|
|
|
# setup the USB so we can reach the GPG card
|
|
|
|
enable_usb
|
2017-07-04 23:49:14 +00:00
|
|
|
|
2019-07-09 21:46:14 +00:00
|
|
|
echo -e "\nVerifying presence of GPG card...\n"
|
|
|
|
# ensure we don't exit without retrying
|
|
|
|
errexit=$(set -o | grep errexit | awk '{print $2}')
|
|
|
|
set +e
|
|
|
|
gpg --card-status > /dev/null
|
|
|
|
if [ $? -ne 0 ]; then
|
|
|
|
# prompt for reinsertion and try a second time
|
|
|
|
read -n1 -r -p \
|
|
|
|
"Can't access GPG key; remove and reinsert, then press Enter to retry. " \
|
|
|
|
ignored
|
|
|
|
# restore prev errexit state
|
|
|
|
if [ "$errexit" = "on" ]; then
|
|
|
|
set -e
|
|
|
|
fi
|
|
|
|
# retry card status
|
|
|
|
gpg --card-status > /dev/null \
|
|
|
|
|| die "gpg card read failed"
|
|
|
|
fi
|
|
|
|
# restore prev errexit state
|
|
|
|
if [ "$errexit" = "on" ]; then
|
|
|
|
set -e
|
|
|
|
fi
|
2017-07-04 23:49:14 +00:00
|
|
|
}
|
2017-07-08 20:59:37 +00:00
|
|
|
|
|
|
|
|
|
|
|
check_tpm_counter()
|
|
|
|
{
|
2018-06-19 19:27:27 +00:00
|
|
|
LABEL=${2:-3135106223}
|
2017-07-08 20:59:37 +00:00
|
|
|
# if the /boot.hashes file already exists, read the TPM counter ID
|
|
|
|
# from it.
|
|
|
|
if [ -r "$1" ]; then
|
|
|
|
TPM_COUNTER=`grep counter- "$1" | cut -d- -f2`
|
|
|
|
else
|
2018-06-19 19:27:27 +00:00
|
|
|
warn "$1 does not exist; creating new TPM counter"
|
2017-07-08 20:59:37 +00:00
|
|
|
read -s -p "TPM Owner password: " tpm_password
|
|
|
|
echo
|
|
|
|
tpm counter_create \
|
|
|
|
-pwdo "$tpm_password" \
|
|
|
|
-pwdc '' \
|
2018-05-09 21:25:43 +00:00
|
|
|
-la $LABEL \
|
2017-07-08 20:59:37 +00:00
|
|
|
| tee /tmp/counter \
|
|
|
|
|| die "Unable to create TPM counter"
|
|
|
|
TPM_COUNTER=`cut -d: -f1 < /tmp/counter`
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ -z "$TPM_COUNTER" ]; then
|
|
|
|
die "$1: TPM Counter not found?"
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
read_tpm_counter()
|
|
|
|
{
|
|
|
|
tpm counter_read -ix "$1" | tee "/tmp/counter-$1" \
|
|
|
|
|| die "Counter read failed"
|
|
|
|
}
|
|
|
|
|
|
|
|
increment_tpm_counter()
|
|
|
|
{
|
|
|
|
tpm counter_increment -ix "$1" -pwdc '' \
|
|
|
|
| tee /tmp/counter-$1 \
|
|
|
|
|| die "Counter increment failed"
|
|
|
|
}
|
|
|
|
|
|
|
|
check_config() {
|
|
|
|
if [ ! -d /tmp/kexec ]; then
|
|
|
|
mkdir /tmp/kexec \
|
|
|
|
|| die 'Failed to make kexec tmp dir'
|
|
|
|
else
|
|
|
|
rm -rf /tmp/kexec/* \
|
|
|
|
|| die 'Failed to empty kexec tmp dir'
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ ! -r $1/kexec.sig ]; then
|
|
|
|
return
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ `find $1/kexec*.txt | wc -l` -eq 0 ]; then
|
|
|
|
return
|
|
|
|
fi
|
|
|
|
|
2018-03-14 17:24:14 +00:00
|
|
|
if [ "$2" != "force" ]; then
|
|
|
|
if ! sha256sum `find $1/kexec*.txt` | gpgv $1/kexec.sig - ; then
|
|
|
|
die 'Invalid signature on kexec boot params'
|
|
|
|
fi
|
2017-07-08 20:59:37 +00:00
|
|
|
fi
|
|
|
|
|
|
|
|
echo "+++ Found verified kexec boot params"
|
|
|
|
cp $1/kexec*.txt /tmp/kexec \
|
|
|
|
|| die "Failed to copy kexec boot params to tmp"
|
|
|
|
}
|
2018-04-22 00:21:37 +00:00
|
|
|
|
|
|
|
preserve_rom() {
|
|
|
|
new_rom="$1"
|
|
|
|
old_files=`cbfs -t 50 -l 2>/dev/null | grep "^heads/"`
|
|
|
|
|
|
|
|
for old_file in `echo $old_files`; do
|
|
|
|
new_file=`cbfs -o $1 -l | grep -x $old_file`
|
|
|
|
if [ -z "$new_file" ]; then
|
|
|
|
echo "+++ Adding $old_file to $1"
|
|
|
|
cbfs -t 50 -r $old_file >/tmp/rom.$$ \
|
|
|
|
|| die "Failed to read cbfs file from ROM"
|
|
|
|
cbfs -o $1 -a $old_file -f /tmp/rom.$$ \
|
|
|
|
|| die "Failed to write cbfs file to new ROM file"
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
}
|
2018-12-06 23:24:28 +00:00
|
|
|
replace_config() {
|
2018-12-06 23:41:20 +00:00
|
|
|
CONFIG_FILE=$1
|
|
|
|
CONFIG_OPTION=$2
|
|
|
|
NEW_SETTING=$3
|
2018-12-06 23:24:28 +00:00
|
|
|
|
2018-12-06 23:41:20 +00:00
|
|
|
touch $CONFIG_FILE
|
2018-12-06 23:24:28 +00:00
|
|
|
# first pull out the existing option from the global config and place in a tmp file
|
2018-12-06 23:41:20 +00:00
|
|
|
awk "gsub(\"^export ${CONFIG_OPTION}=.*\",\"export ${CONFIG_OPTION}=\\\"${NEW_SETTING}\\\"\")" /tmp/config > ${CONFIG_FILE}.tmp
|
|
|
|
awk "gsub(\"^${CONFIG_OPTION}=.*\",\"${CONFIG_OPTION}=\\\"${NEW_SETTING}\\\"\")" /tmp/config >> ${CONFIG_FILE}.tmp
|
2018-12-06 23:24:28 +00:00
|
|
|
|
|
|
|
# then copy any remaining settings from the existing config file, minus the option you changed
|
2018-12-07 00:10:10 +00:00
|
|
|
grep -v "^export ${CONFIG_OPTION}=" ${CONFIG_FILE} | grep -v "^${CONFIG_OPTION}=" >> ${CONFIG_FILE}.tmp || true
|
2018-12-07 00:51:43 +00:00
|
|
|
sort ${CONFIG_FILE}.tmp | uniq > ${CONFIG_FILE}
|
2019-02-22 01:17:16 +00:00
|
|
|
rm -f ${CONFIG_FILE}.tmp
|
2018-12-06 23:24:28 +00:00
|
|
|
}
|
|
|
|
combine_configs() {
|
2018-12-07 00:29:09 +00:00
|
|
|
cat /etc/config* > /tmp/config
|
2018-12-06 23:24:28 +00:00
|
|
|
}
|
2019-07-05 22:04:00 +00:00
|
|
|
|
|
|
|
update_checksums()
|
|
|
|
{
|
|
|
|
# clear screen
|
|
|
|
printf "\033c"
|
|
|
|
# ensure /boot mounted
|
|
|
|
if ! grep -q /boot /proc/mounts ; then
|
|
|
|
mount -o ro /boot \
|
|
|
|
|| recovery "Unable to mount /boot"
|
|
|
|
fi
|
|
|
|
# remount RW
|
|
|
|
mount -o rw,remount /boot
|
|
|
|
cd /boot
|
|
|
|
find ./ -type f ! -name '*kexec*' | xargs sha256sum > /boot/kexec_hashes.txt
|
|
|
|
if [ -e /boot/kexec_default_hashes.txt ]; then
|
|
|
|
DEFAULT_FILES=$(cat /boot/kexec_default_hashes.txt | cut -f3 -d ' ')
|
|
|
|
echo $DEFAULT_FILES | xargs sha256sum > /boot/kexec_default_hashes.txt
|
|
|
|
fi
|
|
|
|
# Remove any package trigger log files
|
|
|
|
# We don't need them after the user decides to sign
|
|
|
|
rm -f /boot/kexec_package_trigger*
|
|
|
|
|
|
|
|
# sign and auto-roll config counter
|
|
|
|
extparam=
|
|
|
|
if [ "$CONFIG_TPM" = "y" ]; then
|
|
|
|
extparam=-u
|
|
|
|
fi
|
2019-11-13 23:28:12 +00:00
|
|
|
if ! kexec-sign-config -p /boot $extparam ; then
|
|
|
|
echo "Failed to sign default config; press Enter to continue."
|
|
|
|
read
|
|
|
|
fi
|
2019-07-05 22:04:00 +00:00
|
|
|
|
|
|
|
# switch back to ro mode
|
|
|
|
mount -o ro,remount /boot
|
|
|
|
}
|
2019-08-19 22:07:22 +00:00
|
|
|
|
|
|
|
# detect and set /boot device
|
|
|
|
# mount /boot if successful
|
|
|
|
detect_boot_device()
|
|
|
|
{
|
|
|
|
# unmount /boot to be safe
|
|
|
|
umount /boot 2>/dev/null
|
|
|
|
|
|
|
|
# check $CONFIG_BOOT_DEV if set/valid
|
|
|
|
if [ -e "$CONFIG_BOOT_DEV" ]; then
|
2019-11-13 23:36:29 +00:00
|
|
|
if mount -o ro $CONFIG_BOOT_DEV /boot >/dev/null 2>&1; then
|
|
|
|
if ls -d /boot/grub* >/dev/null 2>&1; then
|
|
|
|
# CONFIG_BOOT_DEV is valid device and contains an installed OS
|
|
|
|
return 0
|
|
|
|
fi
|
2019-08-19 22:07:22 +00:00
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
# generate list of possible boot devices
|
|
|
|
fdisk -l | grep "Disk" | cut -f2 -d " " | cut -f1 -d ":" > /tmp/disklist
|
|
|
|
|
|
|
|
# filter out extraneous options
|
|
|
|
> /tmp/boot_device_list
|
|
|
|
for i in `cat /tmp/disklist`; do
|
|
|
|
# remove block device from list if numeric partitions exist, since not bootable
|
|
|
|
let DEV_NUM_PARTITIONS=`ls -1 $i* | wc -l`-1
|
|
|
|
if [ ${DEV_NUM_PARTITIONS} -eq 0 ]; then
|
|
|
|
echo $i >> /tmp/boot_device_list
|
|
|
|
else
|
|
|
|
ls $i* | tail -${DEV_NUM_PARTITIONS} >> /tmp/boot_device_list
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
# iterate thru possible options and check for grub dir
|
|
|
|
for i in `cat /tmp/boot_device_list`; do
|
|
|
|
umount /boot 2>/dev/null
|
2019-11-13 23:36:29 +00:00
|
|
|
if mount -o ro $i /boot >/dev/null 2>&1; then
|
|
|
|
if ls -d /boot/grub* >/dev/null 2>&1; then
|
|
|
|
CONFIG_BOOT_DEV="$i"
|
|
|
|
return 0
|
|
|
|
fi
|
2019-08-19 22:07:22 +00:00
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
# no valid boot device found
|
|
|
|
echo "Unable to locate /boot files on any mounted disk"
|
|
|
|
umount /boot 2>/dev/null
|
|
|
|
return 1
|
|
|
|
}
|