|
|
|
|
@@ -107,20 +107,85 @@ esac
|
|
|
|
|
if [ -n "${GRUB_BTRFS_PROTECTION_AUTHORIZED_USERS}" ] ; then
|
|
|
|
|
protection_authorized_users="--users ${GRUB_BTRFS_PROTECTION_AUTHORIZED_USERS} "
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
## Probe information of Root and Boot devices
|
|
|
|
|
# Probe info "Root partition"
|
|
|
|
|
root_device=$(${grub_probe} --target=device /) # Root device
|
|
|
|
|
root_uuid=$(${grub_probe} --device ${root_device} --target="fs_uuid" 2>/dev/null) # UUID of the root device
|
|
|
|
|
root_uuid_subvolume=$(btrfs subvolume show / 2>/dev/null) || print_error "UUID of the root subvolume is not available"; # If UUID of root subvolume is not available, then exit
|
|
|
|
|
root_uuid_subvolume=$(awk -F":" 'match($1, /(^[ \t]+UUID)/) {sub(/^[ \t]+/, "", $2); print $2}' <<< "$root_uuid_subvolume") # UUID of the root subvolume '
|
|
|
|
|
# Probe info "Boot partition"
|
|
|
|
|
boot_device=$(${grub_probe} --target=device ${boot_directory}) # Boot device
|
|
|
|
|
boot_uuid=$(${grub_probe} --device ${boot_device} --target="fs_uuid" 2>/dev/null) # UUID of the boot device
|
|
|
|
|
boot_uuid_subvolume=$(btrfs subvolume show "$boot_directory" 2>/dev/null) || boot_uuid_subvolume=" UUID: $root_uuid_subvolume"; # If boot folder isn't a subvolume, then UUID=root_uuid_subvolume
|
|
|
|
|
boot_uuid_subvolume=$(awk -F":" 'match($1, /(^[ \t]+UUID)/) {sub(/^[ \t]+/, "", $2); print $2}' <<< "$boot_uuid_subvolume") # UUID of the boot subvolume '
|
|
|
|
|
boot_hs=$(${grub_probe} --device ${boot_device} --target="hints_string" 2>/dev/null) # hints string
|
|
|
|
|
boot_fs=$(${grub_probe} --device ${boot_device} --target="fs" 2>/dev/null) # Type filesystem of boot device
|
|
|
|
|
# -----------------------------------------------------------
|
|
|
|
|
|
|
|
|
|
# ---------- Root partition ----------
|
|
|
|
|
root_device="$(${grub_probe} --target=device /)" # e.g. /dev/mapper/enc
|
|
|
|
|
root_uuid="$(${grub_probe} --device "${root_device}" --target=fs_uuid 2>/dev/null)" || true
|
|
|
|
|
|
|
|
|
|
# Fallback when grub-probe fails (encrypted container, detached header…)
|
|
|
|
|
if [ -z "$root_uuid" ]; then
|
|
|
|
|
root_uuid="$(blkid -s UUID -o value "${root_device}" 2>/dev/null)"
|
|
|
|
|
fi
|
|
|
|
|
[ -z "$root_uuid" ] && print_error "Cannot determine UUID of ${root_device}"
|
|
|
|
|
|
|
|
|
|
# Root subvolume UUID
|
|
|
|
|
root_uuid_subvolume="$(btrfs subvolume show / 2>/dev/null | \
|
|
|
|
|
awk -F':' '/^\s*UUID/ {gsub(/^[ \t]+/, "", $2); print $2}')"
|
|
|
|
|
[ -z "$root_uuid_subvolume" ] && print_error "UUID of the root subvolume is not available"
|
|
|
|
|
|
|
|
|
|
# ---------- Boot partition ----------
|
|
|
|
|
boot_device="$(${grub_probe} --target=device "${boot_directory}")" # e.g. /dev/sdb1
|
|
|
|
|
boot_uuid="$(${grub_probe} --device "${boot_device}" --target=fs_uuid 2>/dev/null)" || true
|
|
|
|
|
|
|
|
|
|
# Fallback for boot UUID
|
|
|
|
|
if [ -z "$boot_uuid" ]; then
|
|
|
|
|
boot_uuid="$(blkid -s UUID -o value "${boot_device}" 2>/dev/null)"
|
|
|
|
|
fi
|
|
|
|
|
[ -z "$boot_uuid" ] && print_error "Cannot determine UUID of ${boot_device}"
|
|
|
|
|
|
|
|
|
|
# If /boot is not a Btrfs subvolume, reuse root subvol UUID
|
|
|
|
|
boot_uuid_subvolume="$(
|
|
|
|
|
btrfs subvolume show "${boot_directory}" 2>/dev/null | \
|
|
|
|
|
awk -F':' '/^\s*UUID/ {gsub(/^[ \t]+/, "", $2); print $2; exit}'
|
|
|
|
|
)"
|
|
|
|
|
[ -z "$boot_uuid_subvolume" ] && boot_uuid_subvolume="$root_uuid_subvolume"
|
|
|
|
|
|
|
|
|
|
# Extra data for GRUB commands
|
|
|
|
|
boot_hs="$(${grub_probe} --device "${boot_device}" --target=hints_string 2>/dev/null)"
|
|
|
|
|
boot_fs="$(${grub_probe} --device "${boot_device}" --target=fs 2>/dev/null)"
|
|
|
|
|
# -----------------------------------------------------------
|
|
|
|
|
|
|
|
|
|
## Enable LUKS encrypted devices support
|
|
|
|
|
case "$(echo "$GRUB_BTRFS_ENABLE_CRYPTODISK" | tr '[:upper:]' '[:lower:]')" in
|
|
|
|
|
true)
|
|
|
|
|
list_insmods=(
|
|
|
|
|
"insmod gzio"
|
|
|
|
|
"insmod part_gpt"
|
|
|
|
|
"insmod cryptodisk"
|
|
|
|
|
"insmod luks"
|
|
|
|
|
"insmod gcry_rijndael"
|
|
|
|
|
"insmod gcry_rijndael"
|
|
|
|
|
"insmod gcry_sha256"
|
|
|
|
|
"insmod ${boot_fs}"
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
# Extract the <source> field of cryptdevice=<source>:<name>[:header]
|
|
|
|
|
crypt_source="$(printf '%s %s\n' "$GRUB_CMDLINE_LINUX_DEFAULT" "$GRUB_CMDLINE_LINUX" \
|
|
|
|
|
| grep -o -P 'cryptdevice=\K[^:]+' || true)"
|
|
|
|
|
|
|
|
|
|
# Turn the source into a UUID that cryptomount -u understands
|
|
|
|
|
crypt_uuid=""
|
|
|
|
|
if [[ "$crypt_source" =~ ^UUID=.* ]]; then # already UUID=…
|
|
|
|
|
crypt_uuid="${crypt_source#UUID=}"
|
|
|
|
|
elif [[ "$crypt_source" == /dev/* ]]; then # path → resolve → blkid
|
|
|
|
|
real_dev=$(readlink -f "$crypt_source" 2>/dev/null || true)
|
|
|
|
|
[ -b "$real_dev" ] && crypt_uuid=$(blkid -s UUID -o value "$real_dev" 2>/dev/null || true)
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
# Emit the proper cryptomount command
|
|
|
|
|
if [[ "$crypt_uuid" =~ ^[0-9a-fA-F-]{36}$ ]]; then
|
|
|
|
|
list_insmods+=("cryptomount -u ${crypt_uuid}")
|
|
|
|
|
else
|
|
|
|
|
# last-resort: scan all crypto containers (works but a bit slower)
|
|
|
|
|
list_insmods+=("cryptomount -a")
|
|
|
|
|
fi
|
|
|
|
|
;;
|
|
|
|
|
*)
|
|
|
|
|
list_insmods=("insmod ${boot_fs}")
|
|
|
|
|
;;
|
|
|
|
|
esac
|
|
|
|
|
|
|
|
|
|
## Parameters passed to the kernel
|
|
|
|
|
kernel_parameters="$GRUB_CMDLINE_LINUX $GRUB_CMDLINE_LINUX_DEFAULT $GRUB_BTRFS_SNAPSHOT_KERNEL_PARAMETERS"
|
|
|
|
|
@@ -218,13 +283,22 @@ make_menu_entries()
|
|
|
|
|
if [ x\$feature_all_video_module = xy ]; then
|
|
|
|
|
insmod all_video
|
|
|
|
|
fi
|
|
|
|
|
set gfxpayload=keep
|
|
|
|
|
insmod ${boot_fs}
|
|
|
|
|
set gfxpayload=keep"
|
|
|
|
|
for j in "${insmods[@]}"; do
|
|
|
|
|
entry "\
|
|
|
|
|
${j}"
|
|
|
|
|
done
|
|
|
|
|
entry "\
|
|
|
|
|
if [ x\$feature_platform_search_hint = xy ]; then
|
|
|
|
|
search --no-floppy --fs-uuid --set=root ${boot_hs} ${boot_uuid}
|
|
|
|
|
else
|
|
|
|
|
search --no-floppy --fs-uuid --set=root ${boot_uuid}
|
|
|
|
|
fi"
|
|
|
|
|
if [ "${SUSE_BTRFS_SNAPSHOT_BOOTING:-"false"}" = "true" ]; then
|
|
|
|
|
entry "\
|
|
|
|
|
set btrfs_subvolid=5"
|
|
|
|
|
fi
|
|
|
|
|
entry "\
|
|
|
|
|
echo 'Loading Snapshot: "${snap_date_trim}" "${snap_dir_name_trim}"'
|
|
|
|
|
echo 'Loading Kernel: "${k}" ...'
|
|
|
|
|
linux \"${boot_dir_root_grub}/"${k}"\" root="${LINUX_ROOT_DEVICE}" ${kernel_parameters} ${rootflags}subvol=\""${snap_dir_name_trim}"\""
|
|
|
|
|
@@ -259,7 +333,12 @@ make_menu_entries()
|
|
|
|
|
search --no-floppy --fs-uuid --set=root ${boot_hs} ${boot_uuid}
|
|
|
|
|
else
|
|
|
|
|
search --no-floppy --fs-uuid --set=root ${boot_uuid}
|
|
|
|
|
fi"
|
|
|
|
|
if [ "${SUSE_BTRFS_SNAPSHOT_BOOTING:-"false"}" = "true" ]; then
|
|
|
|
|
entry "\
|
|
|
|
|
set btrfs_subvolid=5"
|
|
|
|
|
fi
|
|
|
|
|
entry "\
|
|
|
|
|
echo 'Loading Snapshot: "${snap_date_trim}" "${snap_dir_name_trim}"'
|
|
|
|
|
echo 'Loading Kernel: "${k}" ...'
|
|
|
|
|
linux \"${boot_dir_root_grub}/"${k}"\" root="${LINUX_ROOT_DEVICE}" ${kernel_parameters} ${rootflags}subvol=\""${snap_dir_name_trim}"\""
|
|
|
|
|
@@ -318,7 +397,7 @@ snapshot_list()
|
|
|
|
|
# Parse Snapper & timeshift & yabsnap information
|
|
|
|
|
local type_snapshot="N/A"
|
|
|
|
|
local description_snapshot="N/A"
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# path to yabsnap snapshot meta data
|
|
|
|
|
local yabsnap_info="$grub_btrfs_mount_point/${path_snapshot%"/"*}/$(echo "${snap[13]}" | awk -F'/' '{print $3 "-meta.json"}')"
|
|
|
|
|
|
|
|
|
|
@@ -455,12 +534,8 @@ detect_microcode()
|
|
|
|
|
list_ucode=()
|
|
|
|
|
# Original intel/amd microcode (auto-detect)
|
|
|
|
|
# See "https://www.gnu.org/software/grub/manual/grub/html_node/Simple-configuration.html"
|
|
|
|
|
for oiucode in "${boot_dir}"/intel-uc.img \
|
|
|
|
|
"${boot_dir}"/intel-ucode.img \
|
|
|
|
|
"${boot_dir}"/amd-uc.img \
|
|
|
|
|
"${boot_dir}"/amd-ucode.img \
|
|
|
|
|
"${boot_dir}"/early_ucode.cpio \
|
|
|
|
|
"${boot_dir}"/microcode.cpio; do
|
|
|
|
|
for oiucode in ${GRUB_EARLY_INITRD_LINUX_STOCK} ; do
|
|
|
|
|
oiucode="${boot_dir}/${oiucode}"
|
|
|
|
|
[ ! -f "${oiucode}" ] && continue;
|
|
|
|
|
list_ucode+=("$oiucode")
|
|
|
|
|
done
|
|
|
|
|
@@ -531,6 +606,7 @@ boot_bounded()
|
|
|
|
|
detect_rootflags
|
|
|
|
|
title_format
|
|
|
|
|
boot_dir_root_grub="$(make_system_path_relative_to_its_root "${boot_dir}")" # convert "boot_directory" to root of GRUB (e.g /boot become /)
|
|
|
|
|
insmods=("${list_insmods[@]##*"/"}")
|
|
|
|
|
make_menu_entries
|
|
|
|
|
# show snapshot found during run "grub-mkconfig"
|
|
|
|
|
if [ "${GRUB_BTRFS_SHOW_SNAPSHOTS_FOUND:-"true"}" = "true" ]; then
|
|
|
|
|
|