#!/bin/bash # Copyright (c) 2011 The Chromium OS Authors. All rights reserved. # Use of this source code is governed by a BSD-style license that can be # found in the LICENSE file. # Helper script to generate GRUB bootloader configuration files for # x86 platforms. SCRIPT_ROOT=$(readlink -f $(dirname "$0")/..) . "${SCRIPT_ROOT}/common.sh" || exit 1 # We're invoked only by build_image, which runs in the chroot assert_inside_chroot # Flags. DEFINE_string arch "x86" \ "The boot architecture: arm or x86. (Default: x86)" DEFINE_string to "/tmp/boot" \ "Path to populate with bootloader templates (Default: /tmp/boot)" DEFINE_string usb_disk /dev/sdb3 \ "Path syslinux should use to do a usb boot. Default: /dev/sdb3" DEFINE_string boot_args "" \ "Additional boot arguments to pass to the commandline (Default: '')" DEFINE_boolean enable_rootfs_verification ${FLAGS_FALSE} \ "Controls if verity is used for root filesystem checking (Default: false)" DEFINE_integer verity_error_behavior 2 \ "Verified boot error behavior [0: I/O errors, 1: reboot, 2: nothing] \ (Default: 2)" DEFINE_integer verity_max_ios 1024 \ "Optional number of outstanding I/O operations. (Default: 1024)" # Parse flags FLAGS "$@" || exit 1 eval set -- "${FLAGS_ARGV}" switch_to_strict_mode # Only let dm-verity block if rootfs verification is configured. dev_wait=0 if [[ ${FLAGS_enable_rootfs_verification} -eq ${FLAGS_TRUE} ]]; then dev_wait=1 fi # Common kernel command-line args common_args="quiet console=tty2 init=/sbin/init boot=local rootwait ro noresume" common_args="${common_args} noswap loglevel=1 ${FLAGS_boot_args}" # Common verified boot command-line args verity_common="dm_verity.error_behavior=${FLAGS_verity_error_behavior}" verity_common="${verity_common} dm_verity.max_bios=${FLAGS_verity_max_ios}" # Ensure that dm-verity waits for its device. # TODO(wad) should add a timeout that display a useful message verity_common="${verity_common} dm_verity.dev_wait=${dev_wait}" # Populate the x86 rootfs to support legacy and EFI bios config templates. # The templates are used by the installer to populate partition 12 with # the correct bootloader configuration. if [[ "${FLAGS_arch}" = "x86" || "${FLAGS_arch}" = "amd64" ]]; then # TODO: For some reason the /dev/disk/by-uuid is not being generated by udev # in the initramfs. When we figure that out, switch to root=UUID=${UUID}. sudo mkdir -p ${FLAGS_to} # /boot/syslinux must be installed in partition 12 as /syslinux/. SYSLINUX_DIR="${FLAGS_to}/syslinux" sudo mkdir -p "${SYSLINUX_DIR}" cat </dev/null PROMPT 0 TIMEOUT 0 # the actual target include /syslinux/default.cfg # chromeos-usb.A include /syslinux/usb.A.cfg # chromeos-hd.A / chromeos-vhd.A include /syslinux/root.A.cfg # chromeos-hd.B / chromeos-vhd.B include /syslinux/root.B.cfg EOF info "Emitted ${SYSLINUX_DIR}/syslinux.cfg" if [[ ${FLAGS_enable_rootfs_verification} -eq ${FLAGS_TRUE} ]]; then # To change the active target, only this file needs to change. cat </dev/null DEFAULT chromeos-vusb.A EOF else # To change the active target, only this file needs to change. cat </dev/null DEFAULT chromeos-usb.A EOF fi info "Emitted ${SYSLINUX_DIR}/default.cfg" cat </dev/null label chromeos-usb.A menu label chromeos-usb.A kernel vmlinuz.A append ${common_args} root=${FLAGS_usb_disk} i915.modeset=1 cros_legacy label chromeos-vusb.A menu label chromeos-vusb.A kernel vmlinuz.A append ${common_args} ${verity_common} root=/dev/dm-0 i915.modeset=1 cros_legacy dm="DMTABLEA" EOF info "Emitted ${SYSLINUX_DIR}/usb.A.cfg" # Different files are used so that the updater can only touch the file it # needs to for a given change. This will minimize any potential accidental # updates issues, hopefully. cat </dev/null label chromeos-hd.A menu label chromeos-hd.A kernel vmlinuz.A append ${common_args} root=HDROOTA i915.modeset=1 cros_legacy label chromeos-vhd.A menu label chromeos-vhd.A kernel vmlinuz.A append ${common_args} ${verity_common} root=/dev/dm-0 i915.modeset=1 cros_legacy dm="DMTABLEA" EOF info "Emitted ${SYSLINUX_DIR}/root.A.cfg" cat </dev/null label chromeos-hd.B menu label chromeos-hd.B kernel vmlinuz.B append ${common_args} root=HDROOTB i915.modeset=1 cros_legacy label chromeos-vhd.B menu label chromeos-vhd.B kernel vmlinuz.B append ${common_args} ${verity_common} root=/dev/dm-0 i915.modeset=1 cros_legacy dm="DMTABLEB" EOF info "Emitted ${SYSLINUX_DIR}/root.B.cfg" cat </dev/null Partition 12 contains the active bootloader configuration when booting from a non-Chrome OS BIOS. EFI BIOSes use /efi/* and legacy BIOSes use this syslinux configuration. EOF info "Emitted ${SYSLINUX_DIR}/README" # To cover all of our bases, now populate templated boot support for efi. sudo mkdir -p "${FLAGS_to}"/efi/boot if [[ -f /bin/grub2-mkimage ]];then # Use the newer grub2 1.99+ sudo grub2-mkimage -p /efi/boot -O x86_64-efi \ -o "${FLAGS_to}/efi/boot/bootx64.efi" \ part_gpt fat ext2 hfs hfsplus normal boot chain configfile linux else # Remove this else case after a few weeks (sometime in Dec 2011) sudo grub-mkimage -p /efi/boot -o "${FLAGS_to}/efi/boot/bootx64.efi" \ part_gpt fat ext2 normal boot sh chain configfile linux fi # Templated variables: # DMTABLEA, DMTABLEB -> '0 xxxx verity ... ' # This should be replaced during postinst when updating the ESP. cat </dev/null set default=0 set timeout=2 # NOTE: These magic grub variables are a Chrome OS hack. They are not portable. menuentry "local image A" { linux \$grubpartA/boot/vmlinuz ${common_args} i915.modeset=1 cros_efi root=/dev/\$linuxpartA } menuentry "local image B" { linux \$grubpartB/boot/vmlinuz ${common_args} i915.modeset=1 cros_efi root=/dev/\$linuxpartB } menuentry "verified image A" { linux \$grubpartA/boot/vmlinuz ${common_args} ${verity_common} i915.modeset=1 cros_efi root=/dev/dm-0 dm=\\"DMTABLEA\\" } menuentry "verified image B" { linux \$grubpartB/boot/vmlinuz ${common_args} ${verity_common} i915.modeset=1 cros_efi root=/dev/dm-0 dm=\\"DMTABLEB\\" } # FIXME: usb doesn't support verified boot for now menuentry "Alternate USB Boot" { linux (hd0,3)/boot/vmlinuz ${common_args} root=/dev/sdb3 i915.modeset=1 cros_efi } EOF if [[ ${FLAGS_enable_rootfs_verification} -eq ${FLAGS_TRUE} ]]; then sudo sed -i -e 's/^set default=.*/set default=2/' \ "${FLAGS_to}/efi/boot/grub.cfg" fi info "Emitted ${FLAGS_to}/efi/boot/grub.cfg" exit 0 fi info "The target platform does not use bootloader templates."