@@ -519,7 +519,7 @@ pub(crate) fn setup_composefs_bls_boot(
519519
520520 cmdline_options. extend ( & root_setup. kargs ) ;
521521
522- let composefs_cmdline = if state. composefs_options . insecure {
522+ let composefs_cmdline = if state. composefs_options . allow_missing_verity {
523523 format ! ( "{COMPOSEFS_CMDLINE}=?{id_hex}" )
524524 } else {
525525 format ! ( "{COMPOSEFS_CMDLINE}={id_hex}" )
@@ -558,7 +558,7 @@ pub(crate) fn setup_composefs_bls_boot(
558558 } ;
559559
560560 // Copy all cmdline args, replacing only `composefs=`
561- let param = if booted_cfs. cmdline . insecure {
561+ let param = if booted_cfs. cmdline . allow_missing_fsverity {
562562 format ! ( "{COMPOSEFS_CMDLINE}=?{id_hex}" )
563563 } else {
564564 format ! ( "{COMPOSEFS_CMDLINE}={id_hex}" )
@@ -811,7 +811,7 @@ fn write_pe_to_esp(
811811 file_path : & Utf8Path ,
812812 pe_type : PEType ,
813813 uki_id : & Sha512HashValue ,
814- is_insecure_from_opts : bool ,
814+ missing_fsverity_allowed : bool ,
815815 mounted_efi : impl AsRef < Path > ,
816816 bootloader : & Bootloader ,
817817) -> Result < Option < UKIInfo > > {
@@ -824,17 +824,19 @@ fn write_pe_to_esp(
824824 if matches ! ( pe_type, PEType :: Uki ) {
825825 let cmdline = uki:: get_cmdline ( & efi_bin) . context ( "Getting UKI cmdline" ) ?;
826826
827- let ( composefs_cmdline, insecure ) =
827+ let ( composefs_cmdline, missing_verity_allowed_cmdline ) =
828828 get_cmdline_composefs :: < Sha512HashValue > ( cmdline) . context ( "Parsing composefs=" ) ?;
829829
830830 // If the UKI cmdline does not match what the user has passed as cmdline option
831831 // NOTE: This will only be checked for new installs and now upgrades/switches
832- match is_insecure_from_opts {
833- true if !insecure => {
834- tracing:: warn!( "--insecure passed as option but UKI cmdline does not support it" ) ;
832+ match missing_fsverity_allowed {
833+ true if !missing_verity_allowed_cmdline => {
834+ tracing:: warn!(
835+ "--allow-missing-fsverity passed as option but UKI cmdline does not support it"
836+ ) ;
835837 }
836838
837- false if insecure => {
839+ false if missing_verity_allowed_cmdline => {
838840 tracing:: warn!( "UKI cmdline has composefs set as insecure" ) ;
839841 }
840842
@@ -1080,7 +1082,8 @@ pub(crate) fn setup_composefs_uki_boot(
10801082 id : & Sha512HashValue ,
10811083 entries : Vec < ComposefsBootEntry < Sha512HashValue > > ,
10821084) -> Result < String > {
1083- let ( root_path, esp_device, bootloader, is_insecure_from_opts, uki_addons) = match setup_type {
1085+ let ( root_path, esp_device, bootloader, missing_fsverity_allowed, uki_addons) = match setup_type
1086+ {
10841087 BootSetupType :: Setup ( ( root_setup, state, postfetch, ..) ) => {
10851088 state. require_no_kargs_for_uki ( ) ?;
10861089
@@ -1090,7 +1093,7 @@ pub(crate) fn setup_composefs_uki_boot(
10901093 root_setup. physical_root_path . clone ( ) ,
10911094 esp_part. node . clone ( ) ,
10921095 postfetch. detected_bootloader . clone ( ) ,
1093- state. composefs_options . insecure ,
1096+ state. composefs_options . allow_missing_verity ,
10941097 state. composefs_options . uki_addon . as_ref ( ) ,
10951098 )
10961099 }
@@ -1104,7 +1107,7 @@ pub(crate) fn setup_composefs_uki_boot(
11041107 sysroot,
11051108 get_esp_partition ( & sysroot_parent) ?. 0 ,
11061109 bootloader,
1107- booted_cfs. cmdline . insecure ,
1110+ booted_cfs. cmdline . allow_missing_fsverity ,
11081111 None ,
11091112 )
11101113 }
@@ -1155,7 +1158,7 @@ pub(crate) fn setup_composefs_uki_boot(
11551158 utf8_file_path,
11561159 entry. pe_type ,
11571160 & id,
1158- is_insecure_from_opts ,
1161+ missing_fsverity_allowed ,
11591162 esp_mount. dir . path ( ) ,
11601163 & bootloader,
11611164 ) ?;
@@ -1236,10 +1239,10 @@ pub(crate) async fn setup_composefs_boot(
12361239 root_setup : & RootSetup ,
12371240 state : & State ,
12381241 image_id : & str ,
1239- insecure : bool ,
1242+ allow_missing_fsverity : bool ,
12401243) -> Result < ( ) > {
12411244 let mut repo = open_composefs_repo ( & root_setup. physical_root ) ?;
1242- repo. set_insecure ( insecure ) ;
1245+ repo. set_insecure ( allow_missing_fsverity ) ;
12431246
12441247 let mut fs = create_composefs_filesystem ( & repo, image_id, None ) ?;
12451248 let entries = fs. transform_for_boot ( & repo) ?;
@@ -1311,7 +1314,7 @@ pub(crate) async fn setup_composefs_boot(
13111314 & state. source . imageref . name ,
13121315 ) )
13131316 . await ?,
1314- insecure ,
1317+ allow_missing_fsverity ,
13151318 )
13161319 . await ?;
13171320
0 commit comments