OLD | NEW |
1 #!/bin/bash | 1 #!/bin/bash |
2 # | 2 # |
3 # Copyright (c) 2010 The Chromium OS Authors. All rights reserved. | 3 # Copyright (c) 2010 The Chromium OS Authors. All rights reserved. |
4 # Use of this source code is governed by a BSD-style license that can be | 4 # Use of this source code is governed by a BSD-style license that can be |
5 # found in the LICENSE file. | 5 # found in the LICENSE file. |
6 # | 6 # |
7 # Script which ensures that a given image has an up-to-date | 7 # Script which ensures that a given image has an up-to-date |
8 # kernel partition, rootfs integrity hashes, and legacy bootloader configs. | 8 # kernel partition, rootfs integrity hashes, and legacy bootloader configs. |
9 | 9 |
10 # Load common constants. This should be the first executable line. | 10 # Load common constants. This should be the first executable line. |
(...skipping 62 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
73 "Default all bootloaders to use kernel-based root fs integrity checking." | 73 "Default all bootloaders to use kernel-based root fs integrity checking." |
74 DEFINE_integer verity_error_behavior 2 \ | 74 DEFINE_integer verity_error_behavior 2 \ |
75 "Kernel verified boot error behavior (0: I/O errors, 1: reboot, 2: nothing)" | 75 "Kernel verified boot error behavior (0: I/O errors, 1: reboot, 2: nothing)" |
76 DEFINE_integer verity_depth 1 \ | 76 DEFINE_integer verity_depth 1 \ |
77 "Kernel verified boot hash tree depth" | 77 "Kernel verified boot hash tree depth" |
78 DEFINE_integer verity_max_ios 1024 \ | 78 DEFINE_integer verity_max_ios 1024 \ |
79 "Number of outstanding I/O operations dm-verity caps at." | 79 "Number of outstanding I/O operations dm-verity caps at." |
80 DEFINE_string verity_algorithm "sha1" \ | 80 DEFINE_string verity_algorithm "sha1" \ |
81 "Cryptographic hash algorithm used for kernel vboot." | 81 "Cryptographic hash algorithm used for kernel vboot." |
82 | 82 |
| 83 DEFINE_string arm_extra_bootargs "" \ |
| 84 "Additional command line options to pass to the ARM kernel." |
| 85 |
83 DEFINE_string keys_dir "/usr/share/vboot/devkeys" \ | 86 DEFINE_string keys_dir "/usr/share/vboot/devkeys" \ |
84 "Directory containing the signing keys." | 87 "Directory containing the signing keys." |
85 | 88 |
86 DEFINE_string rootfs_mountpoint "/tmp/rootfs" \ | 89 DEFINE_string rootfs_mountpoint "/tmp/rootfs" \ |
87 "Path where the rootfs can be safely mounted" | 90 "Path where the rootfs can be safely mounted" |
88 DEFINE_string statefulfs_mountpoint "/tmp/statefulfs" \ | 91 DEFINE_string statefulfs_mountpoint "/tmp/statefulfs" \ |
89 "Path where the statefulfs can be safely mounted" | 92 "Path where the statefulfs can be safely mounted" |
90 DEFINE_string espfs_mountpoint "/tmp/espfs" \ | 93 DEFINE_string espfs_mountpoint "/tmp/espfs" \ |
91 "Path where the espfs can be safely mounted" | 94 "Path where the espfs can be safely mounted" |
92 | 95 |
(...skipping 151 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
244 mkdir -p ${FLAGS_statefulfs_mountpoint} | 247 mkdir -p ${FLAGS_statefulfs_mountpoint} |
245 mkdir -p ${FLAGS_espfs_mountpoint} | 248 mkdir -p ${FLAGS_espfs_mountpoint} |
246 | 249 |
247 make_image_bootable ${IMAGE} | 250 make_image_bootable ${IMAGE} |
248 | 251 |
249 if [ ${FLAGS_cleanup_dirs} -eq ${FLAGS_TRUE} ]; then | 252 if [ ${FLAGS_cleanup_dirs} -eq ${FLAGS_TRUE} ]; then |
250 rmdir ${FLAGS_rootfs_mountpoint} | 253 rmdir ${FLAGS_rootfs_mountpoint} |
251 rmdir ${FLAGS_statefulfs_mountpoint} | 254 rmdir ${FLAGS_statefulfs_mountpoint} |
252 rmdir ${FLAGS_espfs_mountpoint} | 255 rmdir ${FLAGS_espfs_mountpoint} |
253 fi | 256 fi |
OLD | NEW |