blob: b3042663f7e7e70ceb6031248993088ffa63d98d [file] [log] [blame]
#!/bin/bash
# Copyright 2019 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
# All kernel command line changes must update the security base lines in
# the signer. It rejects any settings it does not recognize and breaks the
# build. So any modify_kernel_command_line() function change here needs to be
# reflected in ensure_secure_kernelparams.config.
# See crrev.com/i/216896 as an example.
modify_kernel_command_line() {
# Might be helpful to preserve ramoops in extreme circumstances
echo "ramoops.ecc=1" >> "$1"
# Avoid a cosmetic TPM error (Work around for b/113527055)
sed -i -e '/tpm_tis.force/d' "$1"
echo "tpm_tis.force=0" >> "$1"
# Enable S0ix logging using GSMI
echo "gsmi.s0ix_logging_enable=1" >> "$1"
# Check for S0ix failures and show warnings on failures
echo "intel_pmc_core.warn_on_s0ix_failures=1" >> "$1"
# Load GuC and HuC firmware
echo "i915.enable_guc=2" >> "$1"
# Force DRM to use PCI device ID 9a49
echo "i915.force_probe=9a49" >> "$1"
}