| #!/bin/sh -u |
| # Copyright 2012 The ChromiumOS Authors |
| # Use of this source code is governed by a BSD-style license that can be |
| # found in the LICENSE file. |
| # |
| # A script to install from removable media to hard disk. |
| |
| # Fail if not running as root. |
| if [ "$(id -u)" -ne 0 ]; then |
| echo "chromeos-install must be run as root" |
| exit 1 |
| fi |
| |
| # Load functions and constants for chromeos-install. |
| # shellcheck source=../chromeos-common-script/share/chromeos-common.sh |
| . /usr/share/misc/chromeos-common.sh || exit 1 |
| # shellcheck source=../../scripts/lib/shflags/shflags |
| . /usr/share/misc/shflags || exit 1 |
| # shellcheck source=../chromeos-common-script/share/lvm-utils.sh |
| . /usr/share/misc/lvm-utils.sh || exit 1 |
| |
| # Source blocksize |
| SRC_BLKSIZE=512 |
| |
| # Copy the rootfs in chunks to optimize disk cache usage. |
| NUM_ROOTFS_CHUNKS=4 |
| |
| # Cached recovery key version read from flashrom. |
| RECOVERY_KEY_VERSION= |
| |
| # Helpful constants. |
| HARDWARE_DIAGNOSTICS_PATH=/tmp/hardware_diagnostics.log |
| TMPMNT=/tmp/install-mount-point |
| # Partition numbers that have assumptions about them. This list should be kept |
| # to a minimal. Check copy_partition for most special casing. |
| |
| # TODO(installer): Clean up all these flags. There are way too many flags in |
| # this script. |
| |
| DEFINE_string dst "" "Destination device" |
| DEFINE_boolean skip_dst_removable "${FLAGS_FALSE}" \ |
| "Skip check to ensure destination is not removable" |
| DEFINE_boolean skip_rootfs "${FLAGS_FALSE}" \ |
| "Skip installing the rootfs; Only set up partition table and clear and \ |
| reinstall the stateful partition." |
| DEFINE_boolean yes "${FLAGS_FALSE}" \ |
| "Answer yes to everything" |
| DEFINE_boolean preserve_stateful "${FLAGS_FALSE}" \ |
| "Don't create a new filesystem for the stateful partition. Be careful \ |
| using this option as this may make the stateful partition not mountable." |
| DEFINE_string payload_image "" "Path to a Chromium OS image to install onto \ |
| the device's hard drive" |
| DEFINE_string pmbr_code "" "Path to PMBR code to be installed" |
| DEFINE_string target_bios "" "Bios type to boot with (see postinst --bios)" |
| DEFINE_boolean debug "${FLAGS_FALSE}" "Show debug output" |
| DEFINE_boolean skip_postinstall "${FLAGS_FALSE}" \ |
| "Skip postinstall for situations where you're building for a \ |
| non-native arch. Note that this will probably break verity." |
| DEFINE_string lab_preserve_logs "" "Path to a file containing logs to be \ |
| preserved" |
| DEFINE_boolean storage_diags "${FLAGS_FALSE}" "Print storage diagnostic \ |
| information on failure" |
| DEFINE_boolean lvm_stateful "${FLAGS_FALSE}" "Create LVM-based stateful \ |
| partition" |
| DEFINE_boolean minimal_copy "${FLAGS_FALSE}" "Minimal copy of partitions." |
| DEFINE_boolean skip_gpt_creation "${FLAGS_FALSE}" "Skips creating the \ |
| GPT partition table." |
| |
| |
| # Parse command line |
| FLAGS "$@" || exit 1 |
| eval set -- "${FLAGS_ARGV}" |
| |
| die() { |
| echo "$*" >&2 |
| exit 1 |
| } |
| |
| fast_dd() { |
| # Usage: fast_dd <count> <seek> <skip> other dd args |
| # Note: <count> and <seek> are in units of SRC_BLKSIZE, while <skip> is in |
| # units of DST_BLKSIZE. |
| local user_count="$1" |
| local user_seek="$2" |
| local user_skip="$3" |
| local chunk_num="$4" |
| local total_chunks="$5" |
| shift 5 |
| |
| if ! "${BUSYBOX_DD_FOUND}"; then |
| # Provide some simple progress updates to the user. |
| # This was made available from coreutils version 8.24. |
| set -- "$@" status=progress |
| fi |
| # Find the largest block size that all the parameters are a factor of. |
| local block_size=$((2 * 1024 * 1024)) |
| while [ $(((user_count * SRC_BLKSIZE) % block_size)) -ne 0 ] || \ |
| [ $(((user_skip * SRC_BLKSIZE) % block_size)) -ne 0 ] || \ |
| [ $(((user_seek * DST_BLKSIZE) % block_size)) -ne 0 ]; do |
| |
| : $((block_size /= 2)) |
| done |
| |
| # Print a humble info line if the block size is not super, and complain more |
| # loudly if it's really small (and the partition is big). |
| if [ "${block_size}" -ne $((2 * 1024 * 1024)) ]; then |
| echo "DD with block size ${block_size}" |
| if [ "${block_size}" -lt $((128 * 1024)) ] && \ |
| [ $((user_count * SRC_BLKSIZE)) -gt $((128 * 1024 * 1024)) ]; then |
| echo |
| echo "WARNING: DOING A SLOW MISALIGNED dd OPERATION. PLEASE FIX" |
| echo "count=${user_count} seek=${user_seek} skip=${user_skip}" |
| echo "SRC_BLKSIZE=${SRC_BLKSIZE} DST_BLKSIZE=${DST_BLKSIZE}" |
| echo |
| fi |
| fi |
| |
| # Convert the block counts in their respective sizes into the common block |
| # size, and blast off. |
| local count_common=$((user_count * SRC_BLKSIZE / block_size)) |
| local seek_common=$((user_seek * DST_BLKSIZE / block_size)) |
| local skip_common=$((user_skip * SRC_BLKSIZE / block_size)) |
| |
| if [ "${total_chunks}" -ne 1 ]; then |
| # Divide the count by the number of chunks, rounding up. This is the |
| # chunk size. |
| local chunk_size=$(((count_common + total_chunks - 1) / total_chunks)) |
| |
| : $(( seek_common += chunk_size * (chunk_num - 1) )) |
| : $(( skip_common += chunk_size * (chunk_num - 1) )) |
| |
| if [ "${chunk_num}" -ne "${total_chunks}" ]; then |
| count_common="${chunk_size}" |
| else |
| : $(( count_common -= chunk_size * (chunk_num - 1) )) |
| fi |
| fi |
| |
| dd "$@" bs="${block_size}" seek="${seek_common}" skip="${skip_common}" \ |
| "count=${count_common}" |
| } |
| |
| # Update a specific partition in the destination device. |
| write_partition() { |
| local user_part="$1" |
| local user_count="$2" |
| local user_seek="$3" |
| local user_skip="$4" |
| local src="$5" |
| local dst="$6" |
| local chunk_num="$7" |
| local total_chunks="$8" |
| local cache_input="$9" |
| local src_part_size dst_part_size |
| |
| if [ "${user_count}" -eq 0 ]; then |
| echo "Skipping partition as it does not exist" |
| return 0 |
| fi |
| |
| src_part_size="$((user_count * SRC_BLKSIZE))" |
| dst_part_size="$(partsize "${dst}" "${user_part}")" |
| dst_part_size="$((dst_part_size * DST_BLKSIZE))" |
| if [ "${src_part_size}" -gt "${dst_part_size}" ]; then |
| # Limit the copy size to prevent overflow. |
| die "Error: Source size (${src_part_size}) is larger than destination " \ |
| "(${dst_part_size})." |
| fi |
| |
| # The "dd" command can be used to advise Linux to drop caches and we use |
| # this feature to maximize available cache for future transfers. We deal |
| # with the input and output block devices differently. Here's why: |
| # - For the input block device there are some cases where we know we'll |
| # want the input to stay in cache (because we're going to use it again) |
| # and other cases where we know we're done with it. Also note that we |
| # are likely running from the input block device, so it's good not to |
| # be too liberal about dropping the cache. |
| # - For the output block we never need the cache kept. We won't be reading |
| # it again. We can just tell Linux to drop the cache for the whole |
| # device each time. It should also be noted that it appears most |
| # efficient not to drop the cache on the output as part of the same "dd" |
| # doing the transfer (presumably it makes write buffers less efficient). |
| local dd_cache_arg=; |
| # The iflag is unsupported in older versions of "dd". |
| if ! "${cache_input}" && ! "${BUSYBOX_DD_FOUND}"; then |
| dd_cache_arg="iflag=nocache" |
| fi |
| |
| # dd_cache_arg intentionally not quoted to avoid adding empty arg if unset. |
| # shellcheck disable=SC2248 |
| fast_dd "${user_count}" "${user_seek}" "${user_skip}" \ |
| "${chunk_num}" "${total_chunks}" if="${src}" of="${dst}" conv=notrunc \ |
| ${dd_cache_arg} |
| |
| # Incantation to advise the kernel to drop cache on the whole dst. |
| # |
| # dd_cache_arg intentionally not quoted to avoid adding empty arg if unset. |
| # shellcheck disable=SC2248 |
| dd if="${dst}" ${dd_cache_arg} count=0 status=none |
| } |
| |
| # Find root partition of the block device that we are installing from |
| get_root_device() { |
| rootdev -s |
| } |
| |
| # Check for optional payload image |
| check_payload_image() { |
| if [ "${FLAGS_skip_rootfs}" -eq "${FLAGS_TRUE}" ]; then |
| # Usually this is used for partition setup. |
| SRC="" |
| ROOT="" |
| elif [ -z "${FLAGS_payload_image}" ]; then |
| # Find root partition of the root block device |
| SRC=$(get_block_dev_from_partition_dev "$(get_root_device)") |
| ROOT="" |
| else |
| if [ ! -e "${FLAGS_payload_image}" ]; then |
| die "Error: No payload image found at ${FLAGS_payload_image}" |
| fi |
| |
| # Needed to copy PMBR code off image |
| SRC="${FLAGS_payload_image}" |
| ROOT="$(mktemp -d)" |
| fi |
| } |
| |
| # Clean any mounts that might be present to avoid |
| # aliasing access to block devices. |
| prepare_disk() { |
| if [ -e /etc/init/cros-disks.conf ]; then |
| initctl stop cros-disks || true |
| fi |
| # Often times, nothing is mounted, so swallow the warnings. |
| umount -f /media/*/* 2>&1 | \ |
| grep -v -i -F \ |
| -e 'no mount point specified' \ |
| -e 'not mounted' \ |
| -e 'No such file or directory' \ |
| -e 'not found' || true |
| } |
| |
| # Like mount but keeps track of the current mounts so that they can be cleaned |
| # up automatically. |
| tracked_mount() { |
| local last_arg |
| eval last_arg=\$$# |
| MOUNTS="${last_arg}${MOUNTS:+ }${MOUNTS:-}" |
| mount "$@" |
| } |
| |
| # Unmount with tracking. |
| tracked_umount() { |
| # dash does not support ${//} expansions. |
| local new_mounts |
| for mount in ${MOUNTS}; do |
| if [ "${mount}" != "$1" ]; then |
| new_mounts="${new_mounts:-}${new_mounts+ }${mount}" |
| fi |
| done |
| MOUNTS=${new_mounts:-} |
| |
| umount "$1" |
| } |
| |
| # Create a loop device on the given file at a specified (sector) offset. |
| # Remember the loop device using the global variable LOOP_DEV. |
| # Invoke as: command |
| # Args: FILE OFFSET BLKSIZE |
| loop_offset_setup() { |
| local filename="$1" |
| local offset="$2" |
| local blocksize="$3" |
| |
| set -- |
| if [ "${blocksize}" -ne 512 ]; then |
| set -- "$@" -b "${blocksize}" |
| fi |
| |
| local losetup_path="losetup" |
| # For environments that use busybox, we expect a newer version of `losetup`` |
| # to be present in `/bin/losetup`. |
| # TODO(b/186151064): Change default from busybox losetup used in minios. |
| if "${BUSYBOX_LOSETUP_FOUND}"; then |
| losetup_path="/bin/losetup" |
| fi |
| |
| LOOP_DEV=$("${losetup_path}" -f "$@" --show -o $((offset * blocksize)) \ |
| "${filename}") |
| if [ -z "${LOOP_DEV}" ]; then |
| die "No free loop device. Free up a loop device or reboot. Exiting." |
| fi |
| |
| LOOPS="${LOOP_DEV}${LOOPS:+ }${LOOPS:-}" |
| } |
| |
| # Mount the existing loop device at the mountpoint in $TMPMNT. |
| # Args: optional 'rw'. If present, mount read-write, otherwise read-only. |
| mount_on_loop_dev() { |
| local rw_flag="${1:-}" |
| local mountopts="nosuid,nodev" |
| if [ "${rw_flag}" != "rw" ]; then |
| mountopts="${mountopts},ro,exec" |
| else |
| mountopts="${mountopts},rw,noexec,nosymfollow" |
| fi |
| tracked_mount -o "${mountopts}" "${LOOP_DEV}" "${TMPMNT}" |
| } |
| |
| # Unmount loop-mounted device. |
| umount_from_loop_dev() { |
| mount | grep -q " on ${TMPMNT} " && tracked_umount "${TMPMNT}" |
| } |
| |
| # Undo all mounts and loops and runs hw diagnostics on failure. |
| cleanup_on_failure() { |
| set +e |
| |
| if [ "${FLAGS_storage_diags}" -eq "${FLAGS_TRUE}" ]; then |
| # Generate the diagnostics log that can be used by a caller. |
| echo "Running a hw diagnostics test -- this might take a couple minutes." |
| badblocks -e 100 -sv "${DST}" 2>&1 | tee "${HARDWARE_DIAGNOSTICS_PATH}" |
| |
| if [ -f /usr/share/misc/storage-info-common.sh ]; then |
| # shellcheck source=../storage_info/share/storage-info-common.sh |
| . /usr/share/misc/storage-info-common.sh |
| # Run a few extra diagnostics with output to stdout. These will |
| # be stored as part of the recovery.log for recovery images. |
| get_storage_info |
| fi |
| fi |
| |
| cleanup |
| } |
| |
| deactivate_volume_group() { |
| # Suppress failures and fallback to default value. |
| set +e |
| |
| local vg="${1}" |
| local rc=0 |
| for _ in 1 2 3 4 5 6 7 8 9 10; do |
| vgchange -an "${vg}" |
| rc="$?" |
| if [ "${rc}" -eq "0" ]; then |
| break |
| fi |
| sleep 1 |
| done |
| |
| # Back to strict. |
| set -e |
| |
| return "${rc}" |
| } |
| |
| # Undo all mounts and loops. |
| cleanup() { |
| set +e |
| |
| local mount_point |
| for mount_point in ${MOUNTS:-}; do |
| umount "${mount_point}" || /bin/true |
| done |
| MOUNTS="" |
| |
| local loop_dev |
| for loop_dev in ${LOOPS:-}; do |
| losetup -d "${loop_dev}" || /bin/true |
| done |
| LOOPS="" |
| |
| if [ -n "${ROOT}" ]; then |
| rmdir "${ROOT}" |
| fi |
| } |
| |
| check_removable() { |
| if [ "${FLAGS_skip_dst_removable}" -eq "${FLAGS_TRUE}" ]; then |
| return |
| fi |
| |
| local removable |
| |
| if ! removable="$(cat "/sys/block/${DST#/dev/}/removable")"; then |
| die "Error: Invalid destination device (must be whole device): ${DST}" |
| fi |
| |
| if [ "${removable}" != "0" ]; then |
| die "Error: Attempt to install to a removeable device: ${DST}" |
| fi |
| } |
| |
| mkfs() { |
| local fs_sector_count="$1" |
| local device="$2" |
| local label="$3" |
| # We re-use $@ for our custom options below, so reset it. |
| set -- |
| |
| # Check if the kernel we are going to install support ext4 crypto. |
| if ext4_dir_encryption_supported; then |
| set -- "$@" -O encrypt |
| fi |
| |
| # Check if the kernel we are going to install support ext4 fs-verity. |
| if ext4_fsverity_supported; then |
| set -- "$@" -O verity |
| fi |
| |
| # Calculate the number of 4k sectors for the ext4 partition. |
| local num_4k_sectors |
| local sector_size=4096 |
| if [ "${DST_BLKSIZE}" -gt "${sector_size}" ]; then |
| num_4k_sectors=$(( fs_sector_count * (DST_BLKSIZE / sector_size) )) |
| else |
| num_4k_sectors=$(( fs_sector_count / (sector_size / DST_BLKSIZE) )) |
| fi |
| |
| mkfs.ext4 -F -b "${sector_size}" -L "${label}" "$@" "${device}" \ |
| "${num_4k_sectors}" |
| |
| } |
| |
| # Wipes and expands the stateful partition. |
| wipe_stateful() { |
| echo "Clearing the stateful partition..." |
| local vg_name |
| local stateful_size |
| # state options are stored in $@. |
| set -- |
| |
| DEV=$(make_partition_dev "${DST}" "${PARTITION_NUM_STATE}") |
| |
| # Zero out the first block of the stateful partition to ensure that |
| # mkfs/pvcreate don't get confused by existing state. |
| dd if=/dev/zero of="${DEV}" bs="${DST_BLKSIZE}" count=1 >/dev/null 2>&1 |
| |
| if [ "${FLAGS_lvm_stateful}" -eq "${FLAGS_TRUE}" ]; then |
| # Now we recreate the logical volume set up. |
| # Create physical volume on the partition. |
| echo "Creating physical volumes" |
| pvcreate -ff --yes "${DEV}" |
| |
| vg_name="$(generate_random_vg_name)" |
| if [ -z "${vg_name}" ]; then |
| die "Failed to generate valid volume group name" |
| fi |
| |
| echo "Creating volume group" |
| vgcreate -p 1 "${vg_name}" "${DEV}" |
| |
| vgchange -ay "${vg_name}" |
| |
| echo "Creating thinpool" |
| local thinpool_size |
| thinpool_size="$(get_thinpool_size "${DEV}")" |
| local thinpool_metadata_size |
| thinpool_metadata_size="$(get_thinpool_metadata_size \ |
| "${thinpool_size}")" |
| |
| lvcreate --zero n --size "${thinpool_size}M" --poolmetadatasize \ |
| "${thinpool_metadata_size}M" --thinpool "thinpool" "${vg_name}/thinpool" |
| |
| echo "Creating unencrypted volume" |
| local lv_size |
| lv_size="$(get_logical_volume_size "${DEV}")" |
| lvcreate --thin -V "${lv_size}M" -n "unencrypted" "${vg_name}/thinpool" |
| |
| stateful_size=$(( lv_size * 1024 * 1024 / DST_BLKSIZE )) |
| DEV="/dev/${vg_name}/unencrypted" |
| else |
| stateful_size="$(partsize "${DST}" "${PARTITION_NUM_STATE}")" |
| fi |
| |
| mkfs "${stateful_size}" "${DEV}" "H-STATE" |
| |
| # Need to synchronize before releasing device. |
| sync |
| if [ "${FLAGS_lvm_stateful}" -eq "${FLAGS_TRUE}" ]; then |
| deactivate_volume_group "${vg_name}" |
| fi |
| |
| # When the stateful partition is wiped the TPM ownership must be reset. |
| # This command will not work on Flex devices which do not support it. |
| # In that case the result will be ignored. |
| if [ "$(crossystem mainfw_type)" != "nonchrome" ]; then |
| crossystem clear_tpm_owner_request=1 |
| else |
| crossystem clear_tpm_owner_request=1 || true |
| fi |
| } |
| |
| # Install the stateful partition content |
| # Method handles copying data over to the stateful partition. This is done |
| # differently than other partitions due to the EXPAND option i.e. src partition |
| # and dst partitions are of different sizes. In addition, there are some special |
| # tweaks we do for stateful here for various workflows. |
| install_stateful() { |
| # In general, the system isn't allowed to depend on anything |
| # being in the stateful partition at startup. We make some |
| # exceptions for dev images + factory installed DLCs, as enumerated below: |
| # |
| # var_overlay |
| # These are included to support gmerge, and must be kept in |
| # sync with those listed in /etc/init/var-overlay.conf: |
| # db/pkg |
| # lib/portage |
| # These are included to support dlcservice preloading for testing from usb |
| # flash. |
| # cache/dlc-images |
| # |
| # dev_image |
| # This provides tools specifically chosen to be mounted at |
| # /usr/local as development only tools. |
| # |
| # dlc-factory-images |
| # Includes the factory installed DLC images. Will be removed post boot as |
| # the dlcservice daemon will move the factory installed images into the DLC |
| # cache directory. |
| # |
| # Every exception added makes the dev image different from |
| # the release image, which could mask bugs. Make sure every |
| # item you add here is well justified. |
| local dst_stateful_partition |
| local vg_name |
| |
| echo "Installing the stateful partition..." |
| if [ "${FLAGS_lvm_stateful}" -eq "${FLAGS_TRUE}" ]; then |
| dst_stateful_partition="$(make_partition_dev "${DST}" \ |
| "${PARTITION_NUM_STATE}")" |
| vg_name="$(get_volume_group "${dst_stateful_partition}")" |
| vgchange -ay "${vg_name}" |
| LOOP_DEV="/dev/${vg_name}/unencrypted" |
| else |
| LOOP_DEV="$(make_partition_dev "${DST}" "${PARTITION_NUM_STATE}")" |
| fi |
| mount_on_loop_dev rw |
| |
| # Move log files listed in FLAGS_lab_preserve_logs from stateful_partition to |
| # a dedicated location. This flag is used to enable Autotest to collect log |
| # files before reimage deleting all prior logs. |
| if crossystem 'cros_debug?1' && [ -n "${FLAGS_lab_preserve_logs}" ]; then |
| local gatherme="${TMPMNT}/.gatherme" |
| touch "${gatherme}" |
| local prior_log_dir="${TMPMNT}/unencrypted/prior_logs" |
| mkdir -p "${prior_log_dir}" |
| local log_path |
| # shellcheck disable=SC2013 |
| for log_path in $(sed -e '/^#/ d' -e '/^$/ d' "${FLAGS_lab_preserve_logs}"); do |
| case "${log_path}" in |
| /dev/* | /sys/*) |
| ;; |
| /*) |
| echo "${log_path}" >> "${gatherme}" |
| continue |
| ;; |
| *) |
| log_path="${TMPMNT}/${log_path}" |
| ;; |
| esac |
| if [ -d "${log_path}" ]; then |
| cp -au -r --parents "${log_path}" "${prior_log_dir}" || true |
| elif [ -f "${log_path}" ]; then |
| cp -au "${log_path}" "${prior_log_dir}" || true |
| fi |
| done |
| fi |
| |
| # Whitelist files to copy onto the stateful partition. |
| # |
| # When adding to the whitelist, consider the need for related changes in |
| # src/platform/init/chromeos_startup, and in src/platform/dev/stateful_update. |
| # |
| local dirlist="unencrypted/cros-components/offline-demo-mode-resources |
| unencrypted/import_extensions |
| unencrypted/dlc-factory-images |
| unencrypted/flex_config" |
| |
| if crossystem 'cros_debug?1'; then |
| dirlist="${dirlist} |
| var_overlay/db/pkg |
| var_overlay/lib/portage |
| dev_image" |
| |
| local metadata_cmd="dlc_metadata_util --metadata_dir=${ROOT}/opt/google/dlc" |
| local dlc_list |
| if dlc_list=$(${metadata_cmd} --list --preload_allowed); then |
| for dlc_id in $(jq -nr --argjson list "${dlc_list}" '$list[]'); do |
| local metadata |
| if metadata=$(${metadata_cmd} --get --id="${dlc_id}"); then |
| local dlc_pkg |
| dlc_pkg="$(jq -nr --argjson metadata "${metadata}" \ |
| '$metadata."manifest"."package"')" |
| if [ -z "${dlc_pkg}" ] || [ "${dlc_pkg}" = "null" ]; then |
| dlc_pkg="package" |
| fi |
| printf 'Preloading DLC=%s\n' "${dlc_id}" |
| dirlist="${dirlist} |
| var_overlay/cache/dlc-images/${dlc_id}/${dlc_pkg}" |
| fi |
| done |
| fi |
| fi |
| |
| if crossystem 'devsw_boot?1' ; then |
| # This is a base build, and the dev switch was on when we booted; |
| # we assume it will be on for the next boot. We touch |
| # ".developer_mode" to avoid a pointless delay after reboot while |
| # chromeos_startup wipes an empty stateful partition. |
| # |
| # See chromeos_startup for the companion code that checks for this |
| # file. |
| # |
| touch "${TMPMNT}"/.developer_mode |
| fi |
| |
| if [ -n "${IS_RECOVERY_INSTALL-}" ] ; then |
| # This is a recovery install; write some recovery metrics to the stateful |
| # partition to be reported after next boot. See: |
| # init/upstart/send-recovery-metrics.conf |
| local recovery_histograms="${TMPMNT}/.recovery_histograms" |
| metrics_client -W "${recovery_histograms}" -e "Installer.Recovery.Reason" \ |
| "$(crossystem recovery_reason)" 255 |
| fi |
| |
| local dir |
| for dir in ${dirlist}; do |
| if [ ! -d "${ROOT}/mnt/stateful_partition/${dir}" ]; then |
| continue |
| fi |
| local parent |
| parent=$(dirname "${dir}") |
| mkdir -p "${TMPMNT}/${parent}" |
| # The target directory may already exist (eg. dev_image mounted from a |
| # separate volume), use the parent directory as destination for cp. |
| cp -au "${ROOT}/mnt/stateful_partition/${dir}" "${TMPMNT}/${parent}" |
| done |
| |
| umount_from_loop_dev |
| sync |
| if [ "${FLAGS_lvm_stateful}" -eq "${FLAGS_TRUE}" ]; then |
| deactivate_volume_group "${vg_name}" |
| fi |
| } |
| |
| # Get the recovery key version. |
| # Default value on failure is "1". |
| get_recovery_key_version() { |
| local tmpdir |
| tmpdir="$(mktemp -d)" |
| local tmpflash="${tmpdir}/flash" |
| local tmpflashparsed="${tmpdir}/flashparsed" |
| |
| # Suppress failures and fallback to default value. |
| set +e |
| |
| # Read the flashrom. |
| if ! flashrom -i GBB:"${tmpflash}" -r >&2; then |
| echo "Failed to read flashrom, defaulting to recovery key version=\"1\"" >&2 |
| # Default. |
| echo "1" |
| else |
| # If successful, continue to extract the key version. |
| futility show "${tmpflash}" > "${tmpflashparsed}" |
| local key_version |
| key_version="$(grep -A3 'Recovery Key:' "${tmpflashparsed}" \ |
| | grep 'Key Version:' \ |
| | grep -Eo '[0-9]+')" |
| echo "${key_version}" |
| fi |
| |
| # Cleanup tmp files and directory. |
| for p in "${tmpflash}" "${tmpflashparsed}"; do |
| unlink "${p}" |
| done |
| rmdir "${tmpdir}" |
| |
| # Back to strict. |
| set -e |
| } |
| |
| # Copy partition from src to dst (figures out partition offsets). Note, this |
| # has some special casing for rootfs, kernel, and stateful partitions. In |
| # addition, it only copies partitions that are equally sized over one another. |
| # $1 - Partition number we are copying to. |
| # $2 - src image |
| # $3 - dst image. |
| # $4 - chunk_num |
| # $5 - total_chunks |
| # $6 - cache_input |
| copy_partition() { |
| local part_num="$1" |
| local src="$2" |
| local dst="$3" |
| local chunk_num="$4" |
| local total_chunks="$5" |
| local cache_input="$6" |
| local part_size |
| local src_offset |
| local dst_offset |
| |
| part_size="$(partsize "${src}" "${part_num}")" |
| src_offset="$(partoffset "${src}" "${part_num}")" |
| dst_offset="$(partoffset "${dst}" "${part_num}")" |
| |
| local chunk_status="" |
| if [ "${total_chunks}" -ne 1 ]; then |
| chunk_status=", chunk ${chunk_num} of ${total_chunks}" |
| fi |
| |
| echo "Installing partition ${part_num} to ${dst}${chunk_status}" |
| |
| case "${part_num}" in |
| "") |
| echo "Error: Empty part_num is passed. Skip copying." |
| return |
| ;; |
| "${PARTITION_NUM_STATE:?}") |
| install_stateful |
| ;; |
| "${PARTITION_NUM_ROOT_A:?}"|"${PARTITION_NUM_ROOT_B:?}") |
| # Always copy from ROOT_A for rootfs partitions. |
| part_size=$(partsize "${src}" "${PARTITION_NUM_ROOT_A}") |
| src_offset=$(partoffset "${src}" "${PARTITION_NUM_ROOT_A}") |
| write_partition "${part_num}" "${part_size}" "${dst_offset}" \ |
| "${src_offset}" "${src}" "${dst}" "${chunk_num}" "${total_chunks}" \ |
| "${cache_input}" |
| ;; |
| "${PARTITION_NUM_KERN_A:?}"|"${PARTITION_NUM_KERN_B:?}") |
| # Use kernel B from the source into both kernel A and B in the destination. |
| part_size="$(partsize "${src}" "${PARTITION_NUM_KERN_B}")" |
| src_offset="$(partoffset "${src}" "${PARTITION_NUM_KERN_B}")" |
| write_partition "${part_num}" "${part_size}" "${dst_offset}" \ |
| "${src_offset}" "${src}" "${dst}" "${chunk_num}" "${total_chunks}" \ |
| "${cache_input}" |
| ;; |
| # If the disk layout doesn't have minios, these are set to an empty value. |
| "${PARTITION_NUM_MINIOS_A:-}"|"${PARTITION_NUM_MINIOS_B:-}") |
| # Choose to copy from A or B for miniOS partitions. |
| local src_part_num |
| if [ -n "${RECOVERY_KEY_VERSION}" ]; then |
| echo "Using cached recovery key version=\"${RECOVERY_KEY_VERSION}\"" |
| else |
| RECOVERY_KEY_VERSION=$(get_recovery_key_version) |
| echo "Using recovery key version=\"${RECOVERY_KEY_VERSION}\"" |
| fi |
| if [ "${RECOVERY_KEY_VERSION}" -eq "1" ]; then |
| src_part_num="${PARTITION_NUM_MINIOS_A}" |
| else |
| src_part_num="${PARTITION_NUM_MINIOS_B}" |
| fi |
| part_size=$(partsize "${src}" "${src_part_num}") |
| src_offset=$(partoffset "${src}" "${src_part_num}") |
| write_partition "${part_num}" "${part_size}" "${dst_offset}" \ |
| "${src_offset}" "${src}" "${dst}" "${chunk_num}" "${total_chunks}" \ |
| "${cache_input}" |
| ;; |
| *) |
| local src_part_size |
| local dst_part_size |
| src_part_size="$((part_size * SRC_BLKSIZE))" |
| dst_part_size="$(partsize "${dst}" "${part_num}")" |
| dst_part_size="$((dst_part_size * DST_BLKSIZE))" |
| if [ "${src_part_size}" -ne "${dst_part_size}" ] || \ |
| [ "${src_part_size}" -le 4096 ]; then |
| # We only copy partitions that are equally sized and greater than the |
| # min fs block size. This matches the build_image logic. |
| return |
| fi |
| write_partition "${part_num}" "${part_size}" "${dst_offset}" \ |
| "${src_offset}" "${src}" "${dst}" "${chunk_num}" "${total_chunks}" \ |
| "${cache_input}" |
| ;; |
| esac |
| } |
| |
| # Find our destination device. |
| # If the user hasn't selected a destination, |
| # we expect that the disk layout declares it for us. |
| check_dst() { |
| if [ -z "${DST}" ]; then |
| die "Error: can not determine destination device. Specify --dst yourself." |
| fi |
| |
| if [ ! -b "${DST}" ]; then |
| die "Error: Unable to find destination block device: ${DST}" |
| fi |
| |
| if [ "${DST}" = "${SRC}" ]; then |
| die "Error: src and dst are the same: ${SRC} = ${DST}" |
| fi |
| } |
| |
| # Gets the right PMBR (protective master boot record) code (either from |
| # FLAGS_pmbr_code, source or destination media) by printing the file path |
| # containing PMBR code in standard out. |
| get_pmbr_code() { |
| local pmbr_code="/tmp/gptmbr.bin" |
| |
| if [ -n "${FLAGS_pmbr_code}" ]; then |
| echo "${FLAGS_pmbr_code}" |
| else |
| # Steal the PMBR code from the source MBR to put on the dest MBR, for |
| # booting on legacy-BIOS devices. |
| dd bs="${DST_BLKSIZE}" count=1 if="${SRC}" of="${pmbr_code}" >/dev/null 2>&1 |
| echo "${pmbr_code}" |
| fi |
| } |
| |
| # Reload the system partitions after the partition table was modified (so the |
| # device nodes like /dev/sda1 can be accessed). |
| reload_partitions() { |
| # Reload the partition table on block devices only. |
| # On MTD, the ChromeOS kernel loads the partition table at boot time. |
| # |
| # In some cases, we may be racing with udev for access to the |
| # device leading to EBUSY when we reread the partition table. We |
| # avoid the conflict by using `udevadm settle`, so that udev goes |
| # first. cf. crbug.com/343681. |
| udevadm settle |
| /sbin/blockdev --rereadpt "${DST}" |
| } |
| |
| # Post partition copying work and special casing |
| do_post_install() { |
| set -- |
| if [ -n "${FLAGS_target_bios}" ]; then |
| set -- "$@" --bios "${FLAGS_target_bios}" |
| fi |
| local dst_rootfs |
| |
| dst_rootfs="$(make_partition_dev "${DST}" "${PARTITION_NUM_ROOT_A}")" |
| # Now run the postinstall script on one new rootfs. Note that even though |
| # we're passing the new destination partition number as an arg, the postinst |
| # script had better not try to access it, for the reasons we just gave. |
| # We can't run this if the target arch isn't the same as the host arch |
| if [ "${FLAGS_skip_postinstall}" -eq "${FLAGS_FALSE}" ]; then |
| sync |
| if [ -n "${FLAGS_payload_image}" ]; then |
| LOOP_DEV="${dst_rootfs}" |
| mount_on_loop_dev |
| IS_INSTALL="1" "${TMPMNT}/postinst" "${dst_rootfs}" "$@" |
| umount_from_loop_dev |
| else |
| IS_INSTALL="1" "/postinst" "${dst_rootfs}" "$@" |
| fi |
| fi |
| } |
| |
| ufs_init() { |
| local ufs_init_bin="/usr/sbin/factory_ufs" |
| if [ -x "${ufs_init_bin}" ]; then |
| ${ufs_init_bin} provision |
| fi |
| } |
| |
| main() { |
| # Be aggressive. |
| set -eu |
| if [ "${FLAGS_debug}" = "${FLAGS_TRUE}" ]; then |
| set -x |
| fi |
| |
| # On some systems (e.g. MiniOS or Flexor), we use utils from busybox. |
| # Those utils might be at an older version and don't support some |
| # flags, so we don't use them. This can be checked by looking at `dd` |
| # and `losetup` and whether it is coming from BusyBox or not. |
| BUSYBOX_DD_FOUND=false |
| if dd --version 2>&1 | grep -q "BusyBox"; then |
| BUSYBOX_DD_FOUND=true |
| fi |
| BUSYBOX_LOSETUP_FOUND=false |
| if losetup --version 2>&1 | grep -q "BusyBox"; then |
| BUSYBOX_LOSETUP_FOUND=true |
| fi |
| |
| check_payload_image |
| mkdir -p "${TMPMNT}" |
| |
| # We untrap on success and run cleanup ourselves. Otherwise, on any failure, |
| # run our custom trap method to gather any diagnostic data before cleaning up. |
| # Also, cleanup mounts if install is interrupted. |
| trap cleanup_on_failure INT TERM EXIT |
| |
| # Clean media browser mounts if they've popped up. |
| prepare_disk |
| locate_gpt |
| |
| # Special handling for payload_image. This is passed in for recovery images |
| # and USB installs. This is done first so we can read the gpt partition |
| # file below. |
| if [ -n "${FLAGS_payload_image}" ]; then |
| PARTITION_NUM_ROOT_A=$(cgpt find -n -l ROOT-A "${FLAGS_payload_image}") |
| PARTITION_NUM_STATE=$(cgpt find -n -l STATE "${FLAGS_payload_image}") |
| |
| SRC="${FLAGS_payload_image}" |
| # Mount files that are required to be referenced (when not already mounted). |
| loop_offset_setup "${SRC}" \ |
| "$(partoffset "${SRC}" "${PARTITION_NUM_ROOT_A}")" 512 |
| tracked_mount -o ro "${LOOP_DEV}" "${ROOT}" |
| loop_offset_setup "${SRC}" \ |
| "$(partoffset "${SRC}" "${PARTITION_NUM_STATE}")" 512 |
| tracked_mount -o ro "${LOOP_DEV}" "${ROOT}"/mnt/stateful_partition |
| fi |
| |
| # Reload the GPT helper functions and the image settings from target root. |
| # shellcheck disable=SC1091 |
| . "${ROOT}/usr/sbin/write_gpt.sh" |
| load_base_vars |
| |
| ufs_init |
| |
| DST=${FLAGS_dst:-$(get_fixed_dst_drive)} |
| check_dst |
| check_removable |
| |
| DST_BLKSIZE="$(blocksize "${DST}")" |
| |
| # Ask for confirmation to be sure. |
| echo "This will install from '${SRC}' to '${DST}'." |
| echo "This will erase all data at this destination: ${DST}" |
| local sure |
| if [ "${FLAGS_yes}" -eq "${FLAGS_FALSE}" ]; then |
| printf "Are you sure (y/N)? " |
| read -r sure |
| if [ "${sure}" != "y" ]; then |
| # Don't run diagnostics if the user explicitly bailed out. |
| trap - EXIT |
| cleanup |
| die "Ok, better safe than sorry; you answered '${sure}'." |
| fi |
| fi |
| |
| # For LVM partitions, the logical volumes/volume groups on the stateful |
| # partition may be active. Deactivate the partitions. |
| if [ "${FLAGS_lvm_stateful}" -eq "${FLAGS_TRUE}" ]; then |
| local dst_stateful |
| dst_stateful="$(make_partition_dev "${DST}" "${PARTITION_NUM_STATE}")" |
| local vg_name |
| vg_name="$(get_volume_group "${dst_stateful}")" |
| if [ -n "${vg_name}" ]; then |
| vgchange -an --force "${vg_name}" || true |
| fi |
| fi |
| |
| # Write the GPT using the board specific script. |
| if [ "${FLAGS_skip_gpt_creation}" -eq "${FLAGS_FALSE}" ]; then |
| write_base_table "${DST}" "$(get_pmbr_code)" |
| reload_partitions |
| fi |
| |
| if [ "${FLAGS_skip_rootfs}" -eq "${FLAGS_TRUE}" ]; then |
| echo "Clearing and reinstalling the stateful partition." |
| wipe_stateful |
| install_stateful |
| sync |
| cleanup |
| echo "Done installing partitions." |
| exit 0 |
| fi |
| |
| if [ "${FLAGS_preserve_stateful}" -eq "${FLAGS_FALSE}" ] && \ |
| [ -z "${FLAGS_lab_preserve_logs}" ]; then |
| wipe_stateful |
| fi |
| |
| # Older devices (pre disk_layout_v3.json) don't have these two variables set, |
| # but there is a switch case in copy_partition() that requires these be |
| # defined. So if they are not defined, we initialize them (to empty string) so |
| # the copy_partition() doesn't fail. |
| if [ "${PARTITION_NUM_MINIOS_A+set}" != "set" ]; then |
| PARTITION_NUM_MINIOS_A="" |
| fi |
| if [ "${PARTITION_NUM_MINIOS_B+set}" != "set" ]; then |
| PARTITION_NUM_MINIOS_B="" |
| fi |
| |
| # First do the easy ones. Do so in reverse order to have stateful |
| # get installed last. The order shouldn't matter but legacy behavior has |
| # us go in reverse order. |
| |
| # 12 |
| copy_partition "${PARTITION_NUM_EFI_SYSTEM:?}" "${SRC}" "${DST}" 1 1 false |
| |
| # Version 3 layout doesn't have RWFW partition anymore. |
| if [ "${PARTITION_NUM_RWFW+set}" = "set" ]; then |
| copy_partition "${PARTITION_NUM_RWFW}" "${SRC}" "${DST}" 1 1 false # 11 |
| fi |
| copy_partition "${PARTITION_NUM_OEM:?}" "${SRC}" "${DST}" 1 1 false # 8 |
| copy_partition "${PARTITION_NUM_ROOT_C:?}" "${SRC}" "${DST}" 1 1 false # 7 |
| copy_partition "${PARTITION_NUM_KERN_C:?}" "${SRC}" "${DST}" 1 1 false # 6 |
| # Cache the first read of KERN so the second is read from RAM. |
| # This is okay as they read from the same source. |
| if [ "${FLAGS_minimal_copy}" -eq "${FLAGS_TRUE}" ]; then |
| echo "Skipping copy of B kernel partition." |
| else |
| copy_partition "${PARTITION_NUM_KERN_B}" "${SRC}" "${DST}" 1 1 true # 4 |
| fi |
| copy_partition "${PARTITION_NUM_KERN_A}" "${SRC}" "${DST}" 1 1 false # 2 |
| |
| # We want to chunk up the root filesystem. We do this because we're |
| # going to read the source once and write it to the destination twice. |
| # If the rootfs is big and we don't have extra RAM, we can blow out |
| # the amount of free RAM and by the time we write the second |
| # destination we won't have the source cached. Doing it in chunks |
| # prevents this. |
| local chunk_num |
| for chunk_num in $(seq "${NUM_ROOTFS_CHUNKS}"); do |
| if [ "${FLAGS_minimal_copy}" -eq "${FLAGS_TRUE}" ]; then |
| echo "Skipping copy of B root partition." |
| else |
| copy_partition "${PARTITION_NUM_ROOT_B}" "${SRC}" "${DST}" \ |
| "${chunk_num}" "${NUM_ROOTFS_CHUNKS}" true # 5 |
| fi |
| copy_partition "${PARTITION_NUM_ROOT_A}" "${SRC}" "${DST}" \ |
| "${chunk_num}" "${NUM_ROOTFS_CHUNKS}" false # 3 |
| done |
| |
| # Second to last is stateful. |
| copy_partition "${PARTITION_NUM_STATE}" "${SRC}" "${DST}" 1 1 false # 1 |
| |
| # We want the MINIOS partitions be last just in case writing to other |
| # partitions fail at some point, we don't lose the ability to do recovery. |
| if [ -n "${PARTITION_NUM_MINIOS_A}" ]; then |
| # Cache the first read of MINIOS so the second is read from RAM. |
| # This is okay as they read from the same source. |
| copy_partition "${PARTITION_NUM_MINIOS_A}" "${SRC}" "${DST}" 1 1 true # 9 |
| fi |
| |
| if [ "${FLAGS_minimal_copy}" -eq "${FLAGS_TRUE}" ]; then |
| echo "Skipping copy of B miniOS partition." |
| elif [ -n "${PARTITION_NUM_MINIOS_B}" ]; then |
| copy_partition "${PARTITION_NUM_MINIOS_B}" "${SRC}" "${DST}" 1 1 false # 10 |
| fi |
| |
| do_post_install |
| |
| # Force data to disk before we declare done. |
| sync |
| cleanup |
| trap - EXIT |
| |
| echo "------------------------------------------------------------" |
| echo "" |
| echo "Installation to '${DST}' complete." |
| echo "Please shutdown, remove the USB device, cross your fingers, and reboot." |
| } |
| |
| main "$@" |