@@ -519,7 +519,7 @@ pub(crate) fn setup_composefs_bls_boot(
519519
520520 cmdline_options. extend ( & root_setup. kargs ) ;
521521
522- let composefs_cmdline = if state. composefs_options . insecure {
522+ let composefs_cmdline = if state. composefs_options . allow_missing_verity {
523523 format ! ( "{COMPOSEFS_CMDLINE}=?{id_hex}" )
524524 } else {
525525 format ! ( "{COMPOSEFS_CMDLINE}={id_hex}" )
@@ -558,7 +558,7 @@ pub(crate) fn setup_composefs_bls_boot(
558558 } ;
559559
560560 // Copy all cmdline args, replacing only `composefs=`
561- let param = if booted_cfs. cmdline . insecure {
561+ let param = if booted_cfs. cmdline . allow_missing_fsverity {
562562 format ! ( "{COMPOSEFS_CMDLINE}=?{id_hex}" )
563563 } else {
564564 format ! ( "{COMPOSEFS_CMDLINE}={id_hex}" )
@@ -809,7 +809,7 @@ fn write_pe_to_esp(
809809 file_path : & Utf8Path ,
810810 pe_type : PEType ,
811811 uki_id : & Sha512HashValue ,
812- is_insecure_from_opts : bool ,
812+ missing_fsverity_allowed : bool ,
813813 mounted_efi : impl AsRef < Path > ,
814814 bootloader : & Bootloader ,
815815) -> Result < Option < UKIInfo > > {
@@ -822,17 +822,19 @@ fn write_pe_to_esp(
822822 if matches ! ( pe_type, PEType :: Uki ) {
823823 let cmdline = uki:: get_cmdline ( & efi_bin) . context ( "Getting UKI cmdline" ) ?;
824824
825- let ( composefs_cmdline, insecure ) =
825+ let ( composefs_cmdline, missing_verity_allowed_cmdline ) =
826826 get_cmdline_composefs :: < Sha512HashValue > ( cmdline) . context ( "Parsing composefs=" ) ?;
827827
828828 // If the UKI cmdline does not match what the user has passed as cmdline option
829829 // NOTE: This will only be checked for new installs and now upgrades/switches
830- match is_insecure_from_opts {
831- true if !insecure => {
832- tracing:: warn!( "--insecure passed as option but UKI cmdline does not support it" ) ;
830+ match missing_fsverity_allowed {
831+ true if !missing_verity_allowed_cmdline => {
832+ tracing:: warn!(
833+ "--allow-missing-fsverity passed as option but UKI cmdline does not support it"
834+ ) ;
833835 }
834836
835- false if insecure => {
837+ false if missing_verity_allowed_cmdline => {
836838 tracing:: warn!( "UKI cmdline has composefs set as insecure" ) ;
837839 }
838840
@@ -1077,7 +1079,8 @@ pub(crate) fn setup_composefs_uki_boot(
10771079 id : & Sha512HashValue ,
10781080 entries : Vec < ComposefsBootEntry < Sha512HashValue > > ,
10791081) -> Result < String > {
1080- let ( root_path, esp_device, bootloader, is_insecure_from_opts, uki_addons) = match setup_type {
1082+ let ( root_path, esp_device, bootloader, missing_fsverity_allowed, uki_addons) = match setup_type
1083+ {
10811084 BootSetupType :: Setup ( ( root_setup, state, postfetch, ..) ) => {
10821085 state. require_no_kargs_for_uki ( ) ?;
10831086
@@ -1087,7 +1090,7 @@ pub(crate) fn setup_composefs_uki_boot(
10871090 root_setup. physical_root_path . clone ( ) ,
10881091 esp_part. node . clone ( ) ,
10891092 postfetch. detected_bootloader . clone ( ) ,
1090- state. composefs_options . insecure ,
1093+ state. composefs_options . allow_missing_verity ,
10911094 state. composefs_options . uki_addon . as_ref ( ) ,
10921095 )
10931096 }
@@ -1101,7 +1104,7 @@ pub(crate) fn setup_composefs_uki_boot(
11011104 sysroot,
11021105 get_esp_partition ( & sysroot_parent) ?. 0 ,
11031106 bootloader,
1104- booted_cfs. cmdline . insecure ,
1107+ booted_cfs. cmdline . allow_missing_fsverity ,
11051108 None ,
11061109 )
11071110 }
@@ -1152,7 +1155,7 @@ pub(crate) fn setup_composefs_uki_boot(
11521155 utf8_file_path,
11531156 entry. pe_type ,
11541157 & id,
1155- is_insecure_from_opts ,
1158+ missing_fsverity_allowed ,
11561159 esp_mount. dir . path ( ) ,
11571160 & bootloader,
11581161 ) ?;
@@ -1231,10 +1234,10 @@ pub(crate) async fn setup_composefs_boot(
12311234 root_setup : & RootSetup ,
12321235 state : & State ,
12331236 image_id : & str ,
1234- insecure : bool ,
1237+ allow_missing_fsverity : bool ,
12351238) -> Result < ( ) > {
12361239 let mut repo = open_composefs_repo ( & root_setup. physical_root ) ?;
1237- repo. set_insecure ( insecure ) ;
1240+ repo. set_insecure ( allow_missing_fsverity ) ;
12381241
12391242 let mut fs = create_composefs_filesystem ( & repo, image_id, None ) ?;
12401243 let entries = fs. transform_for_boot ( & repo) ?;
@@ -1306,7 +1309,7 @@ pub(crate) async fn setup_composefs_boot(
13061309 & state. source . imageref . name ,
13071310 ) )
13081311 . await ?,
1309- insecure ,
1312+ allow_missing_fsverity ,
13101313 )
13111314 . await ?;
13121315
0 commit comments