summaryrefslogtreecommitdiff
path: root/package
diff options
context:
space:
mode:
authorWaldemar Brodkorb <wbx@openadk.org>2009-08-22 20:58:58 +0200
committerWaldemar Brodkorb <wbx@openadk.org>2009-08-22 20:58:58 +0200
commit361d29abbbbbc313d01ea95862742ad890ad6eea (patch)
tree96d04a83bf8a2f507b9df3156158fd60f5ff76f0 /package
parent5ea6a2557f7579a576c494fe288ff424e1a82604 (diff)
make lemote yeelong finally usable
- moved startup script for all targets to /start - add kernel patch to use /start - add cryptinit package - make an encrypted rootfilesystem as choice for lemote
Diffstat (limited to 'package')
-rw-r--r--package/Config.in1
-rw-r--r--package/Depends.mk1
-rw-r--r--package/Makefile1
-rwxr-xr-xpackage/base-files/extra/start (renamed from package/base-files/extra/init)1
-rw-r--r--package/cryptinit/Config.in6
-rw-r--r--package/cryptinit/Makefile42
-rw-r--r--package/cryptinit/files/initramfs_list17
-rw-r--r--package/cryptinit/src/cryptinit.c469
8 files changed, 537 insertions, 1 deletions
diff --git a/package/Config.in b/package/Config.in
index a563b9a75..84f66261d 100644
--- a/package/Config.in
+++ b/package/Config.in
@@ -9,6 +9,7 @@ menu "Basesystem"
source "package/base-files/Config.in"
source "package/busybox/Config.in"
source "package/cfgfs/Config.in"
+source "package/cryptinit/Config.in"
source "package/uclibc/Config.in"
source "package/glibc/Config.in"
source "package/eglibc/Config.in"
diff --git a/package/Depends.mk b/package/Depends.mk
index 50f659263..1c5a671e9 100644
--- a/package/Depends.mk
+++ b/package/Depends.mk
@@ -16,6 +16,7 @@ cbtt-compile: uclibc++-compile
endif
cbtt-compile: mysql-compile zlib-compile
collectd-compile: libpthread-compile
+cryptinit-compile: cryptsetup-compile
cryptsetup-compile: libgcrypt-compile popt-compile e2fsprogs-compile lvm-compile
ifeq (${ADK_COMPILE_CTORRENT_WITH_UCLIBCXX},y)
ctorrent-compile: uclibc++-compile
diff --git a/package/Makefile b/package/Makefile
index cb96c5adc..92bd53aea 100644
--- a/package/Makefile
+++ b/package/Makefile
@@ -33,6 +33,7 @@ package-$(ADK_COMPILE_AXTLS) += axtls
package-$(ADK_PACKAGE_BASH) += bash
package-$(ADK_COMPILE_BC) += bc
package-$(ADK_PACKAGE_CFGFS) += cfgfs
+package-$(ADK_PACKAGE_CRYPTINIT) += cryptinit
package-$(ADK_PACKAGE_BIGREQSPROTO) += bigreqsproto
package-$(ADK_COMPILE_BIND) += bind
package-$(ADK_PACKAGE_BINUTILS) += binutils
diff --git a/package/base-files/extra/init b/package/base-files/extra/start
index f8021f286..65f33e3d6 100755
--- a/package/base-files/extra/init
+++ b/package/base-files/extra/start
@@ -1,5 +1,4 @@
#!/bin/sh
-echo "Starting system"
export PATH=/bin:/sbin:/usr/bin:/usr/sbin
mount -nt proc proc /proc
size=$(awk '/MemTotal:/ { if ($2 > 16000) { print 4096 } else { print 2048 }}' /proc/meminfo)
diff --git a/package/cryptinit/Config.in b/package/cryptinit/Config.in
new file mode 100644
index 000000000..664186378
--- /dev/null
+++ b/package/cryptinit/Config.in
@@ -0,0 +1,6 @@
+config ADK_PACKAGE_CRYPTINIT
+ prompt "cryptinit............................. crypt initramfs application"
+ tristate
+ default n
+ help
+ For encrypted root filesystems and fast bootup.
diff --git a/package/cryptinit/Makefile b/package/cryptinit/Makefile
new file mode 100644
index 000000000..f186247f7
--- /dev/null
+++ b/package/cryptinit/Makefile
@@ -0,0 +1,42 @@
+# This file is part of the OpenADK project. OpenADK is copyrighted
+# material, please see the LICENCE file in the top-level directory.
+
+include ${TOPDIR}/rules.mk
+
+PKG_NAME:= cryptinit
+PKG_VERSION:= 1.0.2
+PKG_RELEASE:= 1
+PKG_DESCR:= init for encrypted rootfilesystem
+PKG_SECTION:= base
+
+WRKDIST= ${WRKDIR}/${PKG_NAME}-${PKG_VERSION}
+NO_DISTFILES:= 1
+
+include ${TOPDIR}/mk/package.mk
+
+$(eval $(call PKG_template,CRYPTINIT,${PKG_NAME},${PKG_VERSION}-${PKG_RELEASE},${PKG_DEPENDS},${PKG_DESCR},${PKG_SECTION}))
+
+BUILD_STYLE:= manual
+INSTALL_STYLE:= manual
+
+pre-configure:
+ mkdir -p ${WRKBUILD}
+
+do-build:
+ ${TARGET_CC} ${TCPPFLAGS} ${TCFLAGS} -c -o ${WRKBUILD}/cryptinit.o \
+ ./src/cryptinit.c
+ ( cd ${WRKBUILD}; \
+ ${TARGET_CC} -static -o cryptinit cryptinit.o \
+ ${STAGING_DIR}/usr/lib/libcryptsetup.a \
+ -L${STAGING_DIR}/lib -L${STAGING_DIR}/usr/lib \
+ -ldevmapper -lpthread \
+ ${STAGING_DIR}/usr/lib/libgcrypt.a \
+ ${STAGING_DIR}/usr/lib/libgpg-error.a \
+ -luuid -Wl,--rpath -Wl,${STAGING_DIR}/usr/lib \
+ );
+
+do-install:
+ $(CP) ./files/initramfs_list $(LINUX_DIR)
+ $(CP) ${WRKBUILD}/cryptinit $(LINUX_DIR)
+
+include ${TOPDIR}/mk/pkg-bottom.mk
diff --git a/package/cryptinit/files/initramfs_list b/package/cryptinit/files/initramfs_list
new file mode 100644
index 000000000..caa30ece3
--- /dev/null
+++ b/package/cryptinit/files/initramfs_list
@@ -0,0 +1,17 @@
+dir /dev 755 0 0
+dir /dev/mapper 755 0 0
+dir /proc 755 0 0
+dir /sys 755 0 0
+dir /mnt 755 0 0
+nod /dev/console 644 0 0 c 5 1
+nod /dev/tty 660 0 0 c 5 0
+nod /dev/tty0 600 0 0 c 4 0
+nod /dev/sda 644 0 0 b 8 0
+nod /dev/sda1 644 0 0 b 8 1
+nod /dev/sda2 644 0 0 b 8 2
+nod /dev/sda3 644 0 0 b 8 3
+nod /dev/sda4 644 0 0 b 8 4
+nod /dev/null 644 0 0 c 1 3
+nod /dev/mapper/control 644 0 0 c 10 62
+nod /dev/urandom 644 0 0 c 1 9
+file /init ./cryptinit 755 0 0
diff --git a/package/cryptinit/src/cryptinit.c b/package/cryptinit/src/cryptinit.c
new file mode 100644
index 000000000..b0d570846
--- /dev/null
+++ b/package/cryptinit/src/cryptinit.c
@@ -0,0 +1,469 @@
+/*
+ * cryptinit 1.0.2 - setup encrypted root/swap system using LUKS
+ *
+ * Copyright (C) 2009 Waldemar Brodkorb <mail@waldemar-brodkorb.de>
+ * Copyright (C) 2008 Phil Sutter <phil@nwl.cc>
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU General Public License
+ * as published by the Free Software Foundation; either version 2
+ * of the License, or (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * strongly based on ideas and work from Phil Sutter
+ * http://nwl.cc/cgi-bin/git/gitweb.cgi?p=initramfs-init.git;a=summary
+ * - used with cryptsetup 1.0.6 (needs a small cryptsetup-patch)
+ * - see comment at the end of file for a useful initramfs filelist
+ * - compile and link with following commands to get a static init
+ * gcc -Wall -c -o init.o cryptinit.c
+ * libtool --mode=link --tag=CC gcc -all-static -o init init.o \
+ * /usr/lib/libcryptsetup.la
+ */
+
+#include <errno.h>
+#include <fcntl.h>
+#include <stdarg.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <unistd.h>
+#include <libcryptsetup.h>
+#include <sys/mount.h>
+#include <sys/reboot.h>
+#include <sys/types.h>
+#include <sys/utsname.h>
+#include <sys/wait.h>
+
+#define HOSTNAME "linux"
+#define DOMAINNAME "foo.bar"
+
+#define CRYPT_SWAP_DEV "/dev/sda3"
+#define CRYPT_SWAP_NAME "swap"
+#define CRYPT_ROOT_DEV "/dev/sda2"
+#define CRYPT_ROOT_NAME "root"
+
+#define PROCPATH "/proc"
+#define SYSPATH "/sys"
+#define PROCFS "proc"
+#define SYSFS "sysfs"
+
+#define DEF_KERN_CONS "/dev/console"
+#define DEF_KERN_SWAP "/dev/mapper/swap"
+#define DEF_KERN_ROOT_SRC "/dev/mapper/root"
+#define DEF_KERN_ROOT_TGT "/mnt"
+#define DEF_KERN_ROOT_FS "xfs"
+#define DEF_KERN_INIT "/start"
+#define DEF_KERN_RUNLEVEL "3"
+
+#ifndef MS_MOVE
+#define MS_MOVE 8192
+#endif
+
+/* a structure for holding options to mount() a device */
+struct mntopts {
+ char *source;
+ char *target;
+ char *fstype;
+ unsigned long flags;
+};
+
+/* a structure for holding kernel boot parameters */
+struct commandline {
+ struct mntopts root;
+ char *init;
+ char *resume;
+ char *runlevel;
+ ushort do_resume;
+ ushort debug;
+};
+
+struct commandline cmdline;
+
+void debug_printf(const char *format, ...) {
+ va_list params;
+ if(cmdline.debug) {
+ va_start(params, format);
+ vprintf(format, params);
+ va_end(params);
+ }
+}
+
+void debug_msg(const char *s) {
+ if(cmdline.debug)
+ fputs(s, stderr);
+}
+
+void log_msg(const char *s) {
+ fputs(s, stdout);
+}
+
+/* logging function from cryptsetup library */
+static void cmdLineLog(int class, char *msg) {
+ switch(class) {
+ case CRYPT_LOG_NORMAL:
+ debug_msg(msg);
+ break;
+ case CRYPT_LOG_ERROR:
+ debug_msg(msg);
+ break;
+ default:
+ fprintf(stderr, "Internal error for msg: %s", msg);
+ break;
+ }
+}
+
+int switch_root(char *console, char *newroot, char *init, char *initarg) {
+
+ if (chdir(newroot)) {
+ fprintf(stderr,"bad newroot %s\n",newroot);
+ return 1;
+ }
+ /* Overmount / with newdir and chroot into it. The chdir is needed to
+ * recalculate "." and ".." links. */
+ if (mount(".", "/", NULL, MS_MOVE, NULL) || chroot(".") || chdir("/")) {
+ fprintf(stderr,"switch_root: error moving root\n");
+ return 2;
+ }
+
+ /* If a new console specified, redirect stdin/stdout/stderr to that. */
+ if (console) {
+ close(0);
+ if(open(console, O_RDWR) < 0) {
+ fprintf(stderr,"Bad console '%s'\n",console);
+ return 4;
+ }
+ dup2(0, 1);
+ dup2(0, 2);
+ }
+
+ log_msg("Starting Linux from encrypted root disk\n");
+ /* Exec real init. (This is why we must be pid 1.) */
+ execl(init, init, (char *)NULL);
+ fprintf(stderr,"Bad init '%s'\n",init);
+ return 3;
+}
+
+char *read_cmdline(void) {
+ FILE *fp;
+ int linelen, i;
+ char *str;
+
+ if((fp=fopen("/proc/cmdline","r")) == NULL) {
+ perror("fopen()");
+ return NULL;
+ }
+ linelen = 10;
+ str = calloc(linelen, sizeof(char));
+ for(i=0;(str[i]=fgetc(fp)) != EOF; i++) {
+ if(i>linelen-1) {
+ linelen += 10;
+ if((str=realloc(str, linelen)) == NULL) {
+ perror("realloc()");
+ return NULL;
+ }
+ }
+ }
+ str[i-1] = '\0'; /* substitutes \n for \0 */
+ fclose(fp);
+ return str;
+}
+
+int parse_cmdline(char *line) {
+ int tmpnum;
+ char *tmpstr, *lstr, *rstr, *idx;
+ char *invchars[1];
+
+ tmpstr = strtok(line, " ");
+ do {
+ if((idx=strchr(tmpstr, '=')) != NULL) {
+ rstr = idx + 1;
+ idx = '\0';
+ lstr = tmpstr;
+
+ if(!strncmp(lstr, "rootfstype", 10)) {
+ cmdline.root.fstype = rstr;
+
+ } else if(!strncmp(lstr, "root", 4)) {
+ cmdline.root.source = rstr;
+
+ } else if(!strncmp(lstr, "init", 4)) {
+ cmdline.init = rstr;
+
+ } else if(!strncmp(lstr, "resume", 6)) {
+ cmdline.resume = rstr;
+ }
+
+ } else if(!strncmp(tmpstr, "noresume", 8)) {
+ cmdline.do_resume = 0;
+
+ } else if(!strncmp(tmpstr, "debug", 5)) {
+ cmdline.debug=1;
+
+ } else if(strlen(tmpstr) == 1) {
+ tmpnum = (int)strtol(tmpstr, invchars, 10);
+ if(**invchars == '\0' && tmpnum >= 0) {
+ cmdline.runlevel = tmpstr;
+ }
+ } else {
+ if(cmdline.debug)
+ printf("unknown bootparam flag %s\n",tmpstr);
+ }
+ } while((tmpstr = strtok(NULL, " ")) != NULL);
+
+ debug_printf("\n Bootparams scanned:\n");
+ debug_printf("root\t%s\nrootfstype\t%s\ninit\t%s\nresume\t%s\ndo_resume\t%i\n",
+ cmdline.root.source,cmdline.root.fstype,cmdline.init,cmdline.resume,cmdline.do_resume);
+ debug_printf("debug\t%i\nrunlevel\t%s\n\n",
+ cmdline.debug,cmdline.runlevel);
+ return 0;
+}
+
+int get_cmdline() {
+ char *str;
+
+ /* first set some useful defaults */
+ cmdline.root.source = DEF_KERN_ROOT_SRC;
+ cmdline.root.target = DEF_KERN_ROOT_TGT;
+ cmdline.root.fstype = DEF_KERN_ROOT_FS;
+ cmdline.root.flags = MS_RDONLY;
+ cmdline.init = DEF_KERN_INIT;
+ cmdline.resume = DEF_KERN_SWAP;
+ cmdline.do_resume = 1;
+ cmdline.debug = 0;
+ cmdline.runlevel = DEF_KERN_RUNLEVEL;
+
+ /* read out cmdline from /proc */
+ str = read_cmdline();
+
+ /* parse the cmdline */
+ if(parse_cmdline(str))
+ return -1;
+
+ return 0;
+}
+
+void kmsg_log(int level) {
+ FILE *fd;
+
+ debug_msg("Finetune kernel log\n");
+ if((fd = fopen("/proc/sys/kernel/printk", "r+")) == NULL) {
+ perror("fopen()");
+ return;
+ }
+ fprintf(fd, "%d", level);
+ fclose(fd);
+}
+
+void do_resume(void) {
+ FILE *fd;
+
+ debug_msg("Running tuxonice-resume\n");
+ if((fd = fopen("/sys/power/tuxonice/do_resume", "a")) == NULL) {
+ return;
+ }
+ fprintf(fd, "1\n");
+ fclose(fd);
+}
+
+void do_halt(void) {
+ int pid;
+
+ /* run sync just to be sure */
+ sync();
+
+ /* fork to prevent a kernel panic while killing init */
+ if((pid=fork()) == 0) {
+ reboot(0x4321fedc);
+ _exit(0);
+ }
+ waitpid(pid, NULL, 0);
+}
+
+int do_mount(struct mntopts o) {
+ debug_printf("do_mount: mounting %s with fstype %s\n", o.source, o.fstype);
+ if(mount(o.source, o.target, o.fstype, o.flags, NULL)) {
+ perror("mount()");
+ debug_printf("do_mount: mounting %s with fstype %s\n failed", o.source, o.fstype);
+ return errno;
+ }
+ return 0;
+}
+
+int main(void) {
+ char errormsg[100];
+ int i;
+ int wrongpass;
+ char *pass;
+ struct utsname info;
+ int ret;
+ const char hostname[20] = HOSTNAME;
+ const char domainname[20] = DOMAINNAME;
+ struct crypt_options options;
+ struct interface_callbacks cmd_icb;
+
+ struct mntopts mopts[2] = {
+ { "proc", PROCPATH, PROCFS, 0 },
+ { "sysfs", SYSPATH, SYSFS, 0 }
+ };
+
+ /* need to set callback functions, log is required */
+ cmd_icb.yesDialog = NULL;
+ cmd_icb.log = cmdLineLog;
+
+ /* first try to mount needed virtual filesystems */
+ if(do_mount(mopts[0]) || do_mount(mopts[1])) {
+ fprintf(stderr, "Error mounting %s and %s\n",
+ PROCPATH, SYSPATH);
+ exit(errno);
+ }
+
+ /* get kernel command line */
+ if(get_cmdline() == -1) {
+ fprintf(stderr, "Failed to parse kernel commandline\n");
+ exit(errno);
+ }
+
+ /* keep kernel quiet while asking for password */
+ kmsg_log(0);
+
+ /* first unlock swap partition for resume */
+ memset(&options, 0, sizeof(struct crypt_options));
+ options.name = CRYPT_SWAP_NAME;
+ options.device = CRYPT_SWAP_DEV;
+ options.icb = &cmd_icb;
+
+ ret = uname(&info);
+ if (ret < 0)
+ fprintf(stderr, "Error calling uname\n");
+
+ /* security by obscurity */
+ printf("This is %s.%s (Linux %s %s)\n", hostname, domainname, info.machine, info.release);
+ printf("%s login: ", hostname);
+ fflush(stdout);
+ while(getchar() != '\n');
+ /* unlock swap */
+ debug_msg("Unlocking Swap\n");
+ for(i=0; i<3; i++) {
+ /* ask user for password */
+ if((pass=getpass("Password: ")) == NULL) {
+ perror("getpass()");
+ return errno;
+ }
+ options.passphrase = pass;
+ /* try to unlock swap */
+ if((wrongpass=crypt_luksOpen(&options))) {
+ printf("Login incorrect\n");
+ crypt_get_error(errormsg, 99);
+ debug_printf("Error: %s\n", errormsg);
+ } else { /* success */
+ if(i > 0)
+ fprintf(stderr, "%i incorrect attempts\n",i);
+ break;
+ }
+ }
+
+ if(wrongpass) {
+ fprintf(stderr, "Panic - you are not allowed!\n");
+ sleep(3);
+ do_halt();
+ }
+
+ /* try to resume here */
+ if(cmdline.do_resume) {
+ debug_msg("Trying to resume from swap\n");
+ do_resume();
+ debug_msg("Resume failed, starting normal boot\n");
+ }
+
+ /* resume returned, starting normal boot */
+ options.name = CRYPT_ROOT_NAME;
+ options.device = CRYPT_ROOT_DEV;
+
+ /* unlock root device */
+ debug_msg("Unlocking Root\n");
+ if(crypt_luksOpen(&options)) {
+ perror("crypt_luksOpen()");
+ crypt_get_error(errormsg, 99);
+ debug_printf("Error: %s\n", errormsg);
+ }
+
+ /* mount root filesystem */
+ if(do_mount(cmdline.root)) {
+ puts("Error mounting root");
+ exit(errno);
+ }
+
+ kmsg_log(6);
+
+ /* no need for /sys anymore */
+ debug_msg("Unmounting /sys\n");
+ if(umount("/sys"))
+ perror("umount()");
+
+ /* no need for /proc anymore */
+ debug_msg("Unmounting /proc\n");
+ if(umount("/proc"))
+ perror("umount()");
+
+ /* remove password from RAM */
+ memset(pass, 0, strlen(pass)*sizeof(char));
+
+ debug_msg("Switching root\n");
+ switch_root(DEF_KERN_CONS, cmdline.root.target, cmdline.init, cmdline.runlevel);
+
+ return(0);
+}
+/*
+example initramfs file list:
+
+dir /dev 755 0 0
+dir /dev/mapper 755 0 0
+dir /proc 755 0 0
+dir /sys 755 0 0
+dir /mnt 755 0 0
+nod /dev/console 644 0 0 c 5 1
+nod /dev/tty 660 0 0 c 5 0
+nod /dev/tty0 600 0 0 c 4 0
+nod /dev/sda 644 0 0 b 8 0
+nod /dev/sda1 644 0 0 b 8 1
+nod /dev/sda2 644 0 0 b 8 2
+nod /dev/sda3 644 0 0 b 8 3
+nod /dev/sda4 644 0 0 b 8 4
+nod /dev/null 644 0 0 c 1 3
+nod /dev/mapper/control 644 0 0 c 10 62
+nod /dev/urandom 644 0 0 c 1 9
+file /init /usr/src/init 755 0 0
+
+cryptsetup patch:
+
+Index: lib/setup.c
+===================================================================
+--- lib/setup.c (revision 40)
++++ lib/setup.c (working copy)
+@@ -538,10 +538,17 @@
+ start:
+ mk=NULL;
+
+- if(get_key("Enter LUKS passphrase: ",&password,&passwordLen, 0, options->key_file, options->passphrase_fd, options->timeout, options->flags))
+- tries--;
+- else
+- tries = 0;
++ if(options->passphrase) {
++ password = NULL;
++ password = safe_alloc(512);
++ strcpy(password, options->passphrase);
++ passwordLen = strlen(password);
++ } else {
++ if(get_key("Enter LUKS passphrase: ",&password,&passwordLen, 0, options->key_file, options->passphrase_fd, options->timeout, options->flags))
++ tries--;
++ else
++ tries = 0;
++ }
+
+ if(!password) {
+ r = -EINVAL; goto out;
+*/