Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(303)

Side by Side Diff: build_kernel_image.sh

Issue 6597001: Modify x86 kernel command line to enable nmi watchog. (Closed) Base URL: ssh://git@gitrw.chromium.org:9222/crosutils.git@master
Patch Set: Created 9 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « no previous file | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 #!/bin/bash 1 #!/bin/bash
2 2
3 # Copyright (c) 2010 The Chromium OS Authors. All rights reserved. 3 # Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
4 # Use of this source code is governed by a BSD-style license that can be 4 # Use of this source code is governed by a BSD-style license that can be
5 # found in the LICENSE file. 5 # found in the LICENSE file.
6 6
7 # Helper script that generates the signed kernel image 7 # Helper script that generates the signed kernel image
8 8
9 # --- BEGIN COMMON.SH BOILERPLATE --- 9 # --- BEGIN COMMON.SH BOILERPLATE ---
10 # Load common CrOS utilities. Inside the chroot this file is installed in 10 # Load common CrOS utilities. Inside the chroot this file is installed in
(...skipping 114 matching lines...) Expand 10 before | Expand all | Expand 10 after
125 125
126 # Only let dm-verity block if rootfs verification is configured. 126 # Only let dm-verity block if rootfs verification is configured.
127 dev_wait=0 127 dev_wait=0
128 if [[ ${FLAGS_root} = "/dev/dm-0" ]]; then 128 if [[ ${FLAGS_root} = "/dev/dm-0" ]]; then
129 dev_wait=1 129 dev_wait=1
130 fi 130 fi
131 131
132 cat <<EOF > "${FLAGS_working_dir}/boot.config" 132 cat <<EOF > "${FLAGS_working_dir}/boot.config"
133 root=${FLAGS_root} 133 root=${FLAGS_root}
134 quiet 134 quiet
135 loglevel=1 135 loglevel=7
Mandeep Singh Baines 2011/02/25 18:37:47 Nit. This looks like leftover.
vb 2011/02/26 00:02:11 Done.
136 rootwait 136 rootwait
137 ro 137 ro
138 dm_verity.error_behavior=${FLAGS_verity_error_behavior} 138 dm_verity.error_behavior=${FLAGS_verity_error_behavior}
139 dm_verity.max_bios=${FLAGS_verity_max_ios} 139 dm_verity.max_bios=${FLAGS_verity_max_ios}
140 dm_verity.dev_wait=${dev_wait} 140 dm_verity.dev_wait=${dev_wait}
141 ${verity_args} 141 ${verity_args}
142 ${FLAGS_boot_args} 142 ${FLAGS_boot_args}
143 EOF 143 EOF
144 144
145 WORK="${WORK} ${FLAGS_working_dir}/boot.config" 145 WORK="${WORK} ${FLAGS_working_dir}/boot.config"
(...skipping 14 matching lines...) Expand all
160 init=/sbin/init 160 init=/sbin/init
161 add_efi_memmap 161 add_efi_memmap
162 boot=local 162 boot=local
163 noresume 163 noresume
164 noswap 164 noswap
165 i915.modeset=1 165 i915.modeset=1
166 cros_secure 166 cros_secure
167 kern_guid=%U 167 kern_guid=%U
168 tpm_tis.force=1 168 tpm_tis.force=1
169 tpm_tis.interrupts=0 169 tpm_tis.interrupts=0
170 nmi_watchdog=1
Mandeep Singh Baines 2011/02/25 18:37:47 We tried this and had issues. This should really b
vb 2011/02/26 00:02:11 Done.
170 EOF 171 EOF
171 WORK="${WORK} ${FLAGS_working_dir}/config.txt" 172 WORK="${WORK} ${FLAGS_working_dir}/config.txt"
172 173
173 # We sign the image with the recovery_key, because this is what goes onto the 174 # We sign the image with the recovery_key, because this is what goes onto the
174 # USB key. We can only boot from the USB drive in recovery mode. 175 # USB key. We can only boot from the USB drive in recovery mode.
175 # For dev install shim, we need to use the installer keyblock instead of 176 # For dev install shim, we need to use the installer keyblock instead of
176 # the recovery keyblock because of the difference in flags. 177 # the recovery keyblock because of the difference in flags.
177 if [ ${FLAGS_use_dev_keys} -eq ${FLAGS_TRUE} ]; then 178 if [ ${FLAGS_use_dev_keys} -eq ${FLAGS_TRUE} ]; then
178 USB_KEYBLOCK=installer_kernel.keyblock 179 USB_KEYBLOCK=installer_kernel.keyblock
179 info "DEBUG: use dev install signing key" 180 info "DEBUG: use dev install signing key"
(...skipping 92 matching lines...) Expand 10 before | Expand all | Expand 10 after
272 info "Cleaning up temporary files: ${WORK}" 273 info "Cleaning up temporary files: ${WORK}"
273 rm ${WORK} 274 rm ${WORK}
274 rmdir ${FLAGS_working_dir} 275 rmdir ${FLAGS_working_dir}
275 fi 276 fi
276 277
277 info "Kernel partition image emitted: ${FLAGS_to}" 278 info "Kernel partition image emitted: ${FLAGS_to}"
278 279
279 if [[ -f ${FLAGS_rootfs_hash} ]]; then 280 if [[ -f ${FLAGS_rootfs_hash} ]]; then
280 info "Root filesystem hash emitted: ${FLAGS_rootfs_hash}" 281 info "Root filesystem hash emitted: ${FLAGS_rootfs_hash}"
281 fi 282 fi
OLDNEW
« no previous file with comments | « no previous file | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698