From 3379e15a69d60a64a64c623a826e9b4e13de90aa Mon Sep 17 00:00:00 2001 From: jbtrystram Date: Thu, 27 Jun 2024 10:45:49 +0200 Subject: [PATCH] overlay/15fcos: upgrade bootloader for Secure Boot-enabled systems The 6.9 kernel won't boot on systems installed prior to F39, as the shim is too old. Add a systemd unit that updates the bootloader on those machines. Manually handle systems with mirrored ESPs. See also: https://github.com/coreos/fedora-coreos-tracker/issues/1752 Fixes: https://github.com/fedora-silverblue/issue-tracker/issues/543 Co-authored-by: Jonathan Lebon --- .../lib/systemd/system-preset/45-fcos.preset | 3 +++ ...coreos-bootupctl-update-secureboot.service | 19 +++++++++++++ .../usr/libexec/coreos-update-bootloader | 27 +++++++++++++++++++ 3 files changed, 49 insertions(+) create mode 100644 overlay.d/15fcos/usr/lib/systemd/system/coreos-bootupctl-update-secureboot.service create mode 100755 overlay.d/15fcos/usr/libexec/coreos-update-bootloader diff --git a/overlay.d/15fcos/usr/lib/systemd/system-preset/45-fcos.preset b/overlay.d/15fcos/usr/lib/systemd/system-preset/45-fcos.preset index eb19f43eb..97a80fa22 100644 --- a/overlay.d/15fcos/usr/lib/systemd/system-preset/45-fcos.preset +++ b/overlay.d/15fcos/usr/lib/systemd/system-preset/45-fcos.preset @@ -9,3 +9,6 @@ enable coreos-check-wireless-firmwares.service # Strip extraneous field in aleph files to avoid bootupctl failing # https://github.com/coreos/fedora-coreos-tracker/issues/1724 enable coreos-fix-aleph-file.service +# Upgrade bootloader on Secure Boot-enabled nodes to avoid +# https://github.com/coreos/fedora-coreos-tracker/issues/1752 +enable coreos-bootupctl-update-secureboot.service diff --git a/overlay.d/15fcos/usr/lib/systemd/system/coreos-bootupctl-update-secureboot.service b/overlay.d/15fcos/usr/lib/systemd/system/coreos-bootupctl-update-secureboot.service new file mode 100644 index 000000000..9d444e401 --- /dev/null +++ b/overlay.d/15fcos/usr/lib/systemd/system/coreos-bootupctl-update-secureboot.service @@ -0,0 +1,19 @@ +# Remove after the next barrier release + +[Unit] +Description=Update Bootloader for Secure Boot-enabled Systems +Documentation=https://github.com/coreos/fedora-coreos-tracker/issues/1752 +ConditionSecurity=uefi-secureboot + +# make sure to run after the aleph file is fixed +# see https://github.com/coreos/fedora-coreos-tracker/issues/1724 +After=coreos-fix-aleph-file.service +Requires=coreos-fix-aleph-file.service + +[Service] +Type=oneshot +ExecStart=/usr/libexec/coreos-update-bootloader +RemainAfterExit=yes + +[Install] +WantedBy=multi-user.target diff --git a/overlay.d/15fcos/usr/libexec/coreos-update-bootloader b/overlay.d/15fcos/usr/libexec/coreos-update-bootloader new file mode 100755 index 000000000..1c7d65da5 --- /dev/null +++ b/overlay.d/15fcos/usr/libexec/coreos-update-bootloader @@ -0,0 +1,27 @@ +#!/bin/bash +set -euo pipefail + +# This script update the bootloader using bootupd +# and also detect RAID-1 setups as those requires +# extra steps + +if [ -e /dev/disk/by-label/EFI-SYSTEM ]; then + echo "Found ESP; calling 'bootupctl update'" + bootupctl update + exit +fi + +# handle RAID case manually since bootupd doesn't support it +# https://github.com/coreos/bootupd/issues/132 +i=1 +while true; do + if [ ! -e /dev/disk/by-label/esp-$i ]; then + break + fi + echo "Found ESP (replica $i); updating" + mount /dev/disk/by-label/esp-$i /boot/efi + cp -rp /usr/lib/bootupd/updates/EFI /boot/efi + umount /boot/efi + i=$((i+1)) +done +sync