2014-07-17 00:27:33 +00:00
|
|
|
#!/bin/sh
|
|
|
|
echo "Qubes initramfs script here:"
|
|
|
|
|
2015-03-21 03:14:01 +00:00
|
|
|
mkdir -p /proc /sys /dev
|
|
|
|
mount -t proc proc /proc
|
|
|
|
mount -t sysfs sysfs /sys
|
|
|
|
mount -t devtmpfs devtmpfs /dev
|
|
|
|
|
Disable scrubbing memory pages during initial balloon down
Balloon driver scrub memory page before giving it back to the
hypervisor. Normally this is a good thing, to avoid leaking VM's memory
data into Xen and other domains. But during initial startup when maxmem
is bigger than initial memory, on HVM and PVH, Populate-on-Demand (PoD) is in use.
This means every page on initial balloon down needs to be first mapped
by Xen into VM's memory (as it wasn't populated before - and in fact
didn't have any data), scrubbed by the kernel and then given back to
Xen. This is great waste of time. Such operation with default settings
(initial memory 400M, maxmem 4000M) can take few seconds, delaying every
VM startup (including DispVM). In extreme situation, when running inside
nested virtualization, the effect is much worse.
Avoid this problem by disabling memory scrubbing during initial boot,
and re-enable it as soon as user space kicks in - in initramfs, before
mounting root filesystem, to be sure it's enabled before memory contains
any kind of secrets.
This commit handle only one case - when kernel in managed by the VM
itself. It is critical to enable initramfs module whenever
xen_scrub_pages=0 kernel option is given, so make them depend on the
same condition and ship them in the same package.
Fixes QubesOS/qubes-issues#1963
2019-01-18 22:53:20 +00:00
|
|
|
if [ -w /sys/devices/system/xen_memory/xen_memory0/scrub_pages ]; then
|
|
|
|
# re-enable xen-balloon pages scrubbing, after initial balloon down
|
|
|
|
echo 1 > /sys/devices/system/xen_memory/xen_memory0/scrub_pages
|
|
|
|
fi
|
|
|
|
|
2014-07-17 00:27:33 +00:00
|
|
|
if [ -e /dev/mapper/dmroot ] ; then
|
2015-03-22 02:25:01 +00:00
|
|
|
echo "Qubes: FATAL error: /dev/mapper/dmroot already exists?!"
|
2014-07-17 00:27:33 +00:00
|
|
|
fi
|
|
|
|
|
2018-02-21 18:52:56 +00:00
|
|
|
/sbin/modprobe xenblk || /sbin/modprobe xen-blkfront || echo "Qubes: Cannot load Xen Block Frontend..."
|
2014-07-17 00:27:33 +00:00
|
|
|
|
2016-09-04 13:13:44 +00:00
|
|
|
die() {
|
|
|
|
echo "$@" >&2
|
|
|
|
exit 1
|
|
|
|
}
|
2015-11-25 02:38:51 +00:00
|
|
|
|
2014-07-17 00:27:33 +00:00
|
|
|
echo "Waiting for /dev/xvda* devices..."
|
|
|
|
while ! [ -e /dev/xvda ]; do sleep 0.1; done
|
|
|
|
|
2017-10-17 20:45:07 +00:00
|
|
|
# prefer partition if exists
|
2017-01-23 22:52:15 +00:00
|
|
|
if [ -b /dev/xvda1 ]; then
|
2017-10-17 20:45:07 +00:00
|
|
|
if [ -d /dev/disk/by-partlabel ]; then
|
|
|
|
ROOT_DEV=$(basename $(readlink "/dev/disk/by-partlabel/Root\\x20filesystem"))
|
|
|
|
else
|
|
|
|
ROOT_DEV=$(grep -l "PARTNAME=Root filesystem" /sys/block/xvda/xvda*/uevent |\
|
|
|
|
grep -o "xvda[0-9]")
|
|
|
|
fi
|
|
|
|
if [ -z "$ROOT_DEV" ]; then
|
|
|
|
# fallback to third partition
|
|
|
|
ROOT_DEV=xvda3
|
|
|
|
fi
|
2017-01-23 22:52:15 +00:00
|
|
|
else
|
|
|
|
ROOT_DEV=xvda
|
|
|
|
fi
|
|
|
|
|
2015-11-25 02:38:51 +00:00
|
|
|
SWAP_SIZE=$(( 1024 * 1024 * 2 )) # sectors, 1GB
|
|
|
|
|
2017-01-23 22:52:15 +00:00
|
|
|
if [ `cat /sys/class/block/$ROOT_DEV/ro` = 1 ] ; then
|
2015-10-15 00:36:23 +00:00
|
|
|
echo "Qubes: Doing COW setup for AppVM..."
|
2014-07-17 00:27:33 +00:00
|
|
|
|
2015-10-15 00:36:23 +00:00
|
|
|
while ! [ -e /dev/xvdc ]; do sleep 0.1; done
|
2017-01-23 22:52:15 +00:00
|
|
|
VOLATILE_SIZE=$(cat /sys/class/block/xvdc/size) # sectors
|
|
|
|
ROOT_SIZE=$(cat /sys/class/block/$ROOT_DEV/size) # sectors
|
2015-11-25 02:38:51 +00:00
|
|
|
if [ $VOLATILE_SIZE -lt $SWAP_SIZE ]; then
|
|
|
|
die "volatile.img smaller than 1GB, cannot continue"
|
2015-10-15 00:38:04 +00:00
|
|
|
fi
|
2018-02-21 18:52:56 +00:00
|
|
|
/sbin/sfdisk -q --unit S /dev/xvdc >/dev/null <<EOF
|
2019-09-24 20:40:10 +00:00
|
|
|
xvdc1: type=82,start=2048,size=$SWAP_SIZE
|
|
|
|
xvdc2: type=83
|
2015-10-15 00:38:04 +00:00
|
|
|
EOF
|
|
|
|
if [ $? -ne 0 ]; then
|
|
|
|
echo "Qubes: failed to setup partitions on volatile device"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
while ! [ -e /dev/xvdc1 ]; do sleep 0.1; done
|
2018-02-21 18:52:56 +00:00
|
|
|
/sbin/mkswap /dev/xvdc1
|
2015-10-15 00:36:23 +00:00
|
|
|
while ! [ -e /dev/xvdc2 ]; do sleep 0.1; done
|
2014-07-17 00:27:33 +00:00
|
|
|
|
2017-01-23 22:52:15 +00:00
|
|
|
echo "0 `cat /sys/class/block/$ROOT_DEV/size` snapshot /dev/$ROOT_DEV /dev/xvdc2 N 16" | \
|
2018-02-21 18:52:56 +00:00
|
|
|
/sbin/dmsetup create dmroot || { echo "Qubes: FATAL: cannot create dmroot!"; exit 1; }
|
|
|
|
/sbin/dmsetup mknodes dmroot
|
2015-10-15 00:36:23 +00:00
|
|
|
echo Qubes: done.
|
2014-07-17 00:27:33 +00:00
|
|
|
else
|
2015-10-15 00:36:23 +00:00
|
|
|
echo "Qubes: Doing R/W setup for TemplateVM..."
|
2015-11-25 02:41:04 +00:00
|
|
|
while ! [ -e /dev/xvdc ]; do sleep 0.1; done
|
2018-02-21 18:52:56 +00:00
|
|
|
/sbin/sfdisk -q --unit S /dev/xvdc >/dev/null <<EOF
|
2019-09-24 20:40:10 +00:00
|
|
|
xvdc1: type=82,start=2048,size=$SWAP_SIZE
|
|
|
|
xvdc3: type=83
|
2015-11-25 02:41:04 +00:00
|
|
|
EOF
|
|
|
|
if [ $? -ne 0 ]; then
|
|
|
|
die "Qubes: failed to setup partitions on volatile device"
|
|
|
|
fi
|
|
|
|
while ! [ -e /dev/xvdc1 ]; do sleep 0.1; done
|
2018-02-21 18:52:56 +00:00
|
|
|
/sbin/mkswap /dev/xvdc1
|
2017-06-12 11:02:31 +00:00
|
|
|
ln -s ../$ROOT_DEV /dev/mapper/dmroot
|
2015-10-15 00:36:23 +00:00
|
|
|
echo Qubes: done.
|
2014-07-17 00:27:33 +00:00
|
|
|
fi
|
2015-03-21 03:14:01 +00:00
|
|
|
|
2018-02-21 18:52:56 +00:00
|
|
|
/sbin/modprobe ext4
|
2015-03-22 02:25:01 +00:00
|
|
|
|
2015-03-21 03:14:01 +00:00
|
|
|
mkdir -p /sysroot
|
2019-06-09 20:10:06 +00:00
|
|
|
mount /dev/mapper/dmroot /sysroot -o rw
|
2015-03-22 02:25:01 +00:00
|
|
|
NEWROOT=/sysroot
|
2015-03-21 03:14:01 +00:00
|
|
|
|
2015-11-08 02:46:25 +00:00
|
|
|
kver="`uname -r`"
|
|
|
|
if ! [ -d "$NEWROOT/lib/modules/$kver/kernel" ]; then
|
2015-03-21 03:14:01 +00:00
|
|
|
echo "Waiting for /dev/xvdd device..."
|
|
|
|
while ! [ -e /dev/xvdd ]; do sleep 0.1; done
|
|
|
|
|
2015-11-08 02:46:25 +00:00
|
|
|
mkdir -p /tmp/modules
|
|
|
|
mount -n -t ext3 /dev/xvdd /tmp/modules
|
2019-06-05 23:28:15 +00:00
|
|
|
if /sbin/modprobe overlay; then
|
|
|
|
# if overlayfs is supported, use that to provide fully writable /lib/modules
|
|
|
|
if ! [ -d "$NEWROOT/lib/.modules_work" ]; then
|
|
|
|
mkdir -p "$NEWROOT/lib/.modules_work"
|
|
|
|
fi
|
|
|
|
mount -t overlay none $NEWROOT/lib/modules -o lowerdir=/tmp/modules,upperdir=$NEWROOT/lib/modules,workdir=$NEWROOT/lib/.modules_work
|
|
|
|
else
|
|
|
|
# otherwise mount only `uname -r` subdirectory, to leave the rest of
|
|
|
|
# /lib/modules writable
|
|
|
|
if ! [ -d "$NEWROOT/lib/modules/$kver" ]; then
|
|
|
|
mkdir -p "$NEWROOT/lib/modules/$kver"
|
|
|
|
fi
|
|
|
|
mount --bind "/tmp/modules/$kver" "$NEWROOT/lib/modules/$kver"
|
2015-11-08 02:46:25 +00:00
|
|
|
fi
|
|
|
|
umount /tmp/modules
|
|
|
|
rmdir /tmp/modules
|
2015-03-21 03:14:01 +00:00
|
|
|
fi
|
|
|
|
|
|
|
|
umount /dev /sys /proc
|
2019-06-09 20:10:06 +00:00
|
|
|
mount "$NEWROOT" -o remount,ro
|
2015-03-21 03:14:01 +00:00
|
|
|
|
2018-02-21 18:52:56 +00:00
|
|
|
exec /sbin/switch_root $NEWROOT /sbin/init
|