blob: 4b17f704f91e1c1044d5c5f0d584c0e50383e67f [file] [log] [blame]
#!/bin/bash
#
# Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
# Script to verify integrity of root file system for a GPT-based image
SCRIPT_ROOT=$(dirname $(readlink -f "$0"))
. "${SCRIPT_ROOT}/common.sh" || exit 1
# for partition layout functions
. "${BUILD_LIBRARY_DIR}/disk_layout_util.sh" || exit 1
# Script must be run inside the chroot.
restart_in_chroot_if_needed "$@"
. /usr/share/misc/chromeos-common.sh || exit 1
# Needed for partoffset and partsize calls
locate_gpt
DEFINE_string image "" "Device or an image path. Default: (empty)."
DEFINE_string image_type "usb" "Type of image we're building for."
# Parse command line.
FLAGS "$@" || exit 1
eval set -- "${FLAGS_ARGV}"
if [ -z $FLAGS_image ] ; then
die_notrace "Use --image to specify a device or an image file."
fi
# Turn path into an absolute path.
FLAGS_image=$(eval readlink -f ${FLAGS_image})
# Abort early if we can't find the image
if [ ! -b ${FLAGS_image} ] && [ ! -f $FLAGS_image ] ; then
die_notrace "No image found at $FLAGS_image"
fi
switch_to_strict_mode
get_partitions() {
local partition_num_kern_a="$(get_layout_partition_number \
"${FLAGS_image_type}" KERN-A)"
local partition_num_root_a="$(get_layout_partition_number \
"${FLAGS_image_type}" ROOT-A)"
if [ -b ${FLAGS_image} ] ; then
KERNEL_IMG=$(make_partition_dev "${FLAGS_image}" ${partition_num_kern_a})
ROOTFS_IMG=$(make_partition_dev "${FLAGS_image}" ${partition_num_root_a})
return
fi
KERNEL_IMG=$(mktemp)
ROOTFS_IMG=$(mktemp)
local kernel_offset=$(partoffset "${FLAGS_image}" ${partition_num_kern_a})
local kernel_count=$(partsize "${FLAGS_image}" ${partition_num_kern_a})
local rootfs_offset=$(partoffset "${FLAGS_image}" ${partition_num_root_a})
local rootfs_count=$(partsize "${FLAGS_image}" ${partition_num_root_a})
# TODO(tgao): use loop device to save 1GB in temp space
dd if="${FLAGS_image}" of=${KERNEL_IMG} bs=512 skip=${kernel_offset} \
count=${kernel_count} &>/dev/null
dd if="${FLAGS_image}" of=${ROOTFS_IMG} bs=512 skip=${rootfs_offset} \
count=${rootfs_count} &>/dev/null
}
cleanup() {
for i in ${KERNEL_IMG} ${ROOTFS_IMG}; do
if [ ! -b ${i} ]; then
rm -f ${i}
fi
done
}
get_partitions
# Logic below extracted from src/platform/installer/chromeos-setimage
DUMP_KERNEL_CONFIG=/usr/bin/dump_kernel_config
KERNEL_CONFIG=$(sudo "${DUMP_KERNEL_CONFIG}" "${KERNEL_IMG}")
kernel_cfg="$(echo "${KERNEL_CONFIG}" | sed -e 's/.*dm="\([^"]*\)".*/\1/g' |
cut -f2- -d,)"
rootfs_sectors=$(echo "${kernel_cfg}" | cut -f2 -d' ')
verity_algorithm=$(echo "${kernel_cfg}" | cut -f7 -d' ')
verity_salt=$(echo "${kernel_cfg}" | cut -f9 -d' ')
# Compute the rootfs hash tree
VERITY=/bin/verity
verity_cmd=(
"${VERITY}"
mode=create
"${verity_algorithm}"
payload="${ROOTFS_IMG}"
payload_blocks=$((rootfs_sectors / 8))
hashtree=/dev/null
"${verity_salt}"
)
echo "${verity_cmd[@]}"
table="vroot none ro,$(sudo "${verity_cmd[@]}")"
expected_hash=$(echo "${kernel_cfg}" | cut -f8 -d' ')
generated_hash=$(echo ${table} | cut -f2- -d, | cut -f8 -d' ')
cleanup
if [ "${expected_hash}" != "${generated_hash}" ]; then
warn "expected hash = ${expected_hash}"
warn "actual hash = ${generated_hash}"
die_notrace "Root filesystem has been modified unexpectedly!"
else
info "Root filesystem checksum match!"
fi