6 echo -ne "\033[0G\033[0K"
12 echo ${module} >> /etc/modules/extra_load
15 modules_scan extra_load
20 [ -d "/etc/modules/${1}" ] || touch /etc/modules/${1}
22 [ -f "/etc/modules/${1}" ] && MODS=`cat /etc/modules/${1}`
25 MLOAD=`echo ${MLIST} | sed -e "s/.*${x}.*/${x}/"`
26 if [ "${MLOAD}" = "${x}" ] # Only module to no-load
28 echo -e "${BOLD} ::${NORMAL} Skipping ${x}..."
29 elif [ "${MLOAD}" = "${MLIST}" ] # == No change == No specified no-load
31 [ -n "${DEBUG}" ] && echo -ne "${BOLD} ::${NORMAL} Checking for ${x}..."
32 # find -name does not work since the return status is always zero
33 if find /lib/modules/${KV} | grep /"${x}${KSUFF}" >/dev/null 2>&1
35 echo -ne "${BOLD} ::${NORMAL} Scanning for ${x}..."
41 echo -e "${BOLD} ::${NORMAL} Skipping ${x}..."
48 echo $1 | tr 'a-z' 'A-Z'
53 # $1 = mount dir name / media name
54 # $2 = recognition file
55 # $3 = variable to have the device path
56 # $4 = actual mount dir path (full path)
57 # args remaining are possible devices
59 local media=$1 recon=$2 vrbl=$3 mntdir=$4
62 good_msg "Looking for the ${media}" ${CRYPT_SILENT}
66 [ ! -d "${mntdir}" ] && mkdir -p ${mntdir} 2>/dev/null >/dev/null
67 if [ -n "${ISOBOOT}" ]
69 mntcddir="${mntdir%${media}}iso"
70 if [ ! -f ${mntcddir} ]
80 # Check for a block device to mount
86 # If disk and it has at least one partition, skip.
87 # We use /sys/block/${bsn}/${bsn}[0-9]* to make sure that we
88 # don't skip device mapper devices. Even the craziest scenario
89 # deserves a fair chance.
91 for part in `ls /sys/block/${bsn}/${bsn}*[0-9]* 2>/dev/null`
100 good_msg "Attempting to mount media: ${x}" ${CRYPT_SILENT}
102 mount -r -t ${CDROOT_TYPE} ${x} ${mntcddir} >/dev/null 2>&1
105 if [ -n "${ISOBOOT}" ]; then
106 if [ -f ${mntcddir}/${ISOBOOT} ]; then
107 mount -o loop ${mntcddir}/${ISOBOOT} ${mntdir}
108 if [ "$?" = "0" ]; then
109 good_msg "iso mounted on ${mntdir}"
114 # Check for the media
115 if [ -f "${mntdir}/${recon}" ]
117 #set REAL_ROOT, CRYPT_ROOT_KEYDEV or whatever ${vrbl} is
118 eval ${vrbl}'='"${x}"
119 good_msg "Media found on ${x}" ${CRYPT_SILENT}
129 eval local result='$'${vrbl}
131 [ -n "${result}" ] || bad_msg "Media not found" ${CRYPT_SILENT}
135 # Locate the cdrom device with our media on it.
137 local DEVICES="/dev/cdroms/* /dev/ide/cd/* /dev/sr*"
138 # USB Keychain/Storage
139 DEVICES="$DEVICES /dev/sd*"
141 DEVICES="$DEVICES /dev/hd*"
143 DEVICES="$DEVICES /dev/vd*"
144 # USB using the USB Block Driver
145 DEVICES="$DEVICES /dev/ubd* /dev/ubd/*"
147 DEVICES="$DEVICES /dev/iseries/vcd*"
148 # builtin mmc/sd card reader devices
149 DEVICES="$DEVICES /dev/mmcblk* /dev/mmcblk*/*"
150 # fallback scanning, this might scan something twice, but it's better than
152 [ -e /proc/partitions ] && DEVICES="${DEVICES} $(awk '/([0-9]+[[:space:]]+)/{print "/dev/" $4}' /proc/partitions)"
157 local DEVICES=`devicelist`
158 # The device was specified on the command line, so there's no need to scan
159 # a bunch of extra devices
160 [ -n "${CDROOT_DEV}" ] && DEVICES="${CDROOT_DEV}"
162 findmediamount "cdrom" "${SUBDIR}/livecd" "REAL_ROOT" "${CDROOT_PATH}" ${DEVICES}
167 local KEYDEVS=`devicelist`
168 eval local keyloc='"${CRYPT_'${1}'_KEY}"'
170 findmediamount "key" "${keyloc}" "CRYPT_${1}_KEYDEV" "/mnt/key" ${KEYDEVS}
173 cache_cd_contents() {
174 # Check loop file exists and cache to ramdisk if DO_cache is enabled
175 if [ "${LOOPTYPE}" != "noloop" ] && [ "${LOOPTYPE}" != "sgimips" ]
180 # TODO: Check the size of the image versus the size of our tmpfs
181 # along with the amount of available RAM and increase tmpfs size
182 # if necessary. (Not having awk sucks...)
184 # for i in $(cat /proc/meminfo | grep -e ^MemFree -e ^Cached | \
185 # cut -d: -f2 | cut -dk -f1 | sed -e "s/^\s*//") ; do
186 # z=$(($z + $i)) ; done
188 good_msg "Copying loop file for caching..."
189 # Verify that the needed directory exists
190 mkdir -p "$(dirname ${NEW_ROOT}/mnt/${LOOP})"
191 cp -a ${CDROOT_PATH}/${LOOP} ${NEW_ROOT}/mnt/${LOOP}
194 warn_msg "Failed to cache the loop file! Lack of RAM?"
195 rm -rf ${NEW_ROOT}/mnt/${LOOP} 2>/dev/null
196 rm -rf ${NEW_ROOT}/mnt/livecd.* 2>/dev/null
197 rm -rf ${NEW_ROOT}/mnt/image.* 2>/dev/null
198 rm -rf ${NEW_ROOT}/mnt/zisofs 2>/dev/null
205 mount -t sysfs sysfs /sys -o noexec,nosuid,nodev >/dev/null 2>&1
207 [ ${ret} -eq 0 ] || bad_msg "Failed to mount /sys!"
211 if [ "${IP}" != '' ] || busybox udhcpc -n -T 15 -q
213 [ -e /rootpath ] && NFSROOT=`cat /rootpath`
215 if [ "${NFSROOT}" = '' ]
218 OPTIONS=`busybox dmesg | grep rootserver | sed -e "s/,/ /g"`
219 for OPTION in $OPTIONS
221 if [ `echo $OPTION | sed -e "s/=/ /g" | cut -d " " -f 1` = 'rootserver' ]
223 NFSIP=`echo $OPTION | sed -e "s/=/ /g" | cut -d " " -f 2`
228 OPTIONS=`busybox dmesg | grep rootpath | sed -e "s/,/ /g"`
229 for OPTION in $OPTIONS
231 if [ `echo $OPTION | sed -e "s/=/ /g" | cut -d " " -f 1` = 'rootpath' ]
233 NFSPATH=`echo $OPTION | sed -e "s/=/ /g" | cut -d " " -f 2`
238 if [ "${NFSIP}" != '' ] && [ "$NFSPATH" != '' ]
240 NFSROOT="${NFSIP}:${NFSPATH}"
242 bad_msg "The DHCP Server did not send a valid root-path."
243 bad_msg "Please check your DHCP setup, or provide a nfsroot=<...> parameter."
247 if [ "${NFSROOT}" != '' ]
249 NFSOPTIONS=${NFSROOT#*,}
250 NFSROOT=${NFSROOT%%,*}
251 if [ "${NFSOPTIONS}" = "${NFSROOT}" ]
253 NFSOPTIONS=$DEFAULT_NFSOPTIONS
255 NFSOPTIONS="${DEFAULT_NFSOPTIONS},${NFSOPTIONS}"
258 if [ "${CDROOT}" != '0' ]
260 good_msg "Attempting to mount NFS CD image on ${NFSROOT} with options ${NFSOPTIONS}"
261 mount -t nfs -o ${NFSOPTIONS} ${NFSROOT} ${CDROOT_PATH}
266 bad_msg "NFS Mounting failed. Is the path corrent ?"
269 good_msg "Attempting to mount NFS root on ${NFSROOT} with options ${NFSOPTIONS}"
270 mount -t nfs -o ${NFSOPTIONS} ${NFSROOT} ${NEW_ROOT}
275 bad_msg "NFS Mounting failed. Is the path correct ?"
277 # FIXME: Need to start portmap and the other rpc daemons in
278 # order to remount rw.
286 if [ "${LOOP}" = '' -o ! -e "${CDROOT_PATH}/${LOOP}" ]
289 bad_msg "Invalid loop location: ${LOOP}"
290 bad_msg 'Please export LOOP with a valid location, or reboot and pass a proper loop=...'
291 bad_msg 'kernel command line!'
302 # Use devtmpfs if enabled in kernel,
303 # else tmpfs. Always run mdev just in case
305 if grep -qs devtmpfs /proc/filesystems ; then
309 # Options copied from /etc/init.d/udev-mount, should probably be kept in sync
310 mount -t $devfs -o "exec,nosuid,mode=0755,size=10M" udev /dev \
311 || bad_msg "Failed to mount /dev as ${devfs}"
313 # http://git.busybox.net/busybox/plain/docs/mdev.txt
314 mkdir -m 0755 /dev/pts
315 mount -t devpts -o gid=5,mode=0620 devpts /dev/pts || bad_msg "Failed to mount /dev/pts"
320 # If last command failed send error message and fall back to a shell
321 if [ "$retcode" != '0' ]
324 error_string="${error_string:-run command}"
325 bad_msg 'Failed to $1; failing back to the shell...'
331 # msg functions arguments
337 msg_string="${msg_string:-...}"
338 [ "$2" != 1 ] && echo -e "${GOOD}>>${NORMAL}${BOLD} ${msg_string} ${NORMAL}"
343 msg_string="${msg_string:-...}"
346 splash 'verbose' > /dev/null &
347 echo -e "${BAD}!!${NORMAL}${BOLD} ${msg_string} ${NORMAL}"
353 msg_string="${msg_string:-...}"
354 [ "$2" != 1 ] && echo -e "${WARN}**${NORMAL}${BOLD} ${msg_string} ${NORMAL}"
358 if [ "${CRYPT_SILENT}" = '1' ]
360 eval $1 >/dev/null 2>/dev/null
362 splash 'verbose' > /dev/null &
367 splash set_msg 'Disk unlocked.'
374 # $1 = variable whose value is the path (examples: "REAL_ROOT",
377 # $3 = optional explanations for failure
379 eval local oldvalue='$'${1}
381 [ \( $# != 2 \) -a \( $# != 3 \) ] && \
382 bad_msg "Bad invocation of function prompt_user, please file a bug \
383 report with this message" && exit 1
384 [ -n "${3}" ] && local explnt=" or : ${3}" || local explnt="."
386 bad_msg "Could not find the ${2} in ${oldvalue}${explnt}"
387 echo ' Please specify another value or: press Enter for the same, type "shell" for a shell, or "q" to skip...'
388 echo -n "${2}(${oldvalue}) :: "
390 case `eval echo '$'${1}` in
392 eval ${1}'='${oldvalue}
393 warn_msg "Skipping step, this will likely cause a boot failure."
397 eval ${1}'='${oldvalue}
398 echo "To leave and try again just press <Ctrl>+D"
402 eval ${1}'='${oldvalue}
408 # This function removes unset DO_slowusb if there is no usb-storage attached.
409 # If noslowusb is set, skip this function
410 [ "${DO_slowusb}" ] || return
412 # Unset DO_slowusb, so we can set it again if usb-storage has something attached
415 local usb_storage_dir="/sys/bus/usb/drivers/usb-storage"
416 if [ ! -d "${usb_storage_dir}" ]
418 # no automated slowusb required. no usb-storage devices attached.
421 for x in "${usb_storage_dir}"/*
423 [ -d "${x}" ] && [ "${x}" != "${usb_storage_dir}/module" ] \
424 && { DO_slowusb="1" ; break ; }
429 # Scan CMDLINE for any "doscsi" or "noscsi"-type arguments
437 if [ "${y}" = "do${x}" ]
439 MY_HWOPTS="${MY_HWOPTS} $x"
440 elif [ "${y}" = "no${x}" ]
442 MY_HWOPTS="`echo ${MY_HWOPTS} | sed -e \"s/${x}//g\" -`"
444 if [ "$(echo ${y} | cut -b -7)" = "keymap=" ]
446 MY_HWOPTS="${MY_HWOPTS} keymap"
451 # Shouldnt need to sort this as the following loop should figure out the
452 # duplicates and strip them out
453 #MY_HWOPTS=`echo ${MY_HWOPTS}| sort`
455 for x in ${MY_HWOPTS}
458 for y in ${TMP_HWOPTS}
460 if [ "${y}" = "${x}" ]
465 TMP_HWOPTS="${TMP_HWOPTS} ${x}"
466 eval DO_`echo ${x} | sed 's/-//'`=1
469 MY_HWOPTS=${TMP_HWOPTS}
473 # Load modules listed in MY_HWOPTS if /lib/modules exists for the running
475 if [ -d "/lib/modules/${KV}" ]
477 good_msg 'Loading modules'
478 # Load appropriate kernel modules
479 for modules in $MY_HWOPTS
481 modules_scan $modules
484 good_msg 'Skipping module load; no modules in the ramdisk!'
489 if [ "${DO_keymap}" ]
491 if [ ! -e /dev/vc/0 -a ! -e /dev/tty0 ]
494 mount -o bind ${NEW_ROOT}/dev /dev
496 [ ! -e /dev/tty0 ] && ln -s /dev/tty1 /dev/tty0
498 [ -f /lib/keymaps/keymapList ] && chooseKeymap
500 [ "${DEVBIND}" = '1' ] && umount /dev
502 if [ -e /etc/sysconfig/keyboard -a "${CDROOT}" = '1' ]
504 mkdir -p ${NEW_ROOT}/etc/sysconfig/
505 cp /etc/sysconfig/keyboard ${NEW_ROOT}/etc/sysconfig/keyboard
511 good_msg "Loading keymaps"
512 if [ -z "${keymap}" ]
514 splash 'verbose' > /dev/null &
515 cat /lib/keymaps/keymapList
516 read -t 10 -p '<< Load keymap (Enter for default): ' keymap
518 1|azerty) keymap=azerty ;;
521 4|br-a) keymap=br-a ;;
522 5|br-l) keymap=br-l ;;
525 8|croat) keymap=croat ;;
529 12|dvorak) keymap=dvorak ;;
551 34|sk-y) keymap=sk-y ;;
552 35|sk-z) keymap=sk-z ;;
553 36|slovene) keymap=slovene ;;
554 37|trf) keymap=trf ;;
555 38|trq) keymap=trq ;;
559 42|wangbe) keymap=wangbe ;;
560 43|sf|ch*) keymap=sf ;;
563 if [ -e /lib/keymaps/${keymap}.map ]
565 good_msg "Loading the ''${keymap}'' keymap"
566 loadkmap < /lib/keymaps/${keymap}.map
568 # echo ${keymap} | egrep -e "[0-9]+" >/dev/null 2>&1
571 # xkeymap=`tail -n 8 /lib/keymaps/keymapList | grep ${keymap} | sed -r "s/.*\s+${keymap}\s+([a-z-]+).*/\1/g" | egrep -v 1`
573 mkdir -p /etc/sysconfig
574 # echo "XKEYBOARD=${xkeymap}" > /etc/sysconfig/keyboard
575 echo "XKEYBOARD=${keymap}" > /etc/sysconfig/keyboard
576 splash set_msg "Set keymap to ${keymap}"
577 elif [ -z "${keymap}" ]
580 good_msg "Keeping default keymap"
581 splash set_msg "Keeping default keymap"
583 bad_msg "Sorry, but keymap ''${keymap}'' is invalid!"
590 #good_msg 'Checking if volumes need to be started...'
592 # Here, we check for /dev/device-mapper, and if it exists, we setup a
593 # a symlink, which should hopefully fix bug #142775 and bug #147015
594 if [ -e /dev/device-mapper ] && [ ! -e /dev/mapper/control ]
597 ln -sf /dev/device-mapper /dev/mapper/control
600 if [ "${USE_MDADM}" = '1' ]
602 if [ -e '/sbin/mdadm' ]
604 /sbin/mdadm --assemble --scan
606 bad_msg "mdadm not found: skipping mdadm raid assembly!"
610 if [ "${USE_DMRAID_NORMAL}" = '1' ]
612 if [ -e '/sbin/dmraid' ]
614 good_msg "Activating Device-Mapper RAID(s)"
615 if [ '${DMRAID_OPTS}' = '' ]
619 /sbin/dmraid -ay ${DMRAID_OPTS}
624 if [ "${USE_LVM_NORMAL}" = '1' ]
628 for dev in ${RAID_DEVICES}
630 setup_md_device "${dev}"
633 # This is needed for /bin/lvm to accept the following logic
634 lvm_commands="#! /bin/lvm"
636 # If there is a cahe, update it. Unbreak at least dmcrypt
637 [ -d /etc/lvm/cache ] && lvm_commands="${lvm_commands} \nvgscan"
639 # To activate volumegroups on all devices in the cache
640 lvm_commands="${lvm_commands} \nvgchange -ay --sysinit"
642 # To create symlinks so users can use real_root=/dev/vg/root
643 # This needs to run after vgchange, using vgchange --mknodes is too
645 lvm_commands="${lvm_commands} \nvgmknodes --ignorelockingfailure"
647 # And finally execute it all (/proc/... needed if lvm is compiled without readline)
648 good_msg "Scanning for and activating Volume Groups"
649 printf "%b\n" "${lvm_commands}" | /bin/lvm /proc/self/fd/0
651 bad_msg "vgscan or vgchange not found: skipping LVM volume group activation!"
655 if [ "${USE_ZFS}" = '1' ]
657 if [ -z "${ZFS_POOL}" ]
659 good_msg "Importing ZFS pools"
661 /sbin/zpool import -N -a "${ZPOOL_FORCE}"
665 good_msg "Importing ZFS pools succeeded"
667 bad_msg "Imported ZFS pools failed"
671 if [ "$(zpool list -H -o name ${ZFS_POOL} 2>&1)" = "$ZFS_POOL" ]
673 good_msg "ZFS pool ${ZFS_POOL} already imported"
675 good_msg "Importing ZFS pool ${ZFS_POOL}"
677 /sbin/zpool import -N "${ZPOOL_FORCE}" "${ZFS_POOL}"
681 good_msg "Importing ${ZFS_POOL} succeeded"
683 bad_msg "Importing ${ZFS_POOL} failed"
692 if [ ! -n "${ISCSI_NOIBFT}" ]
694 good_msg "Activating iSCSI via iBFT"
698 if [ -n "${ISCSI_INITIATORNAME}" ] && [ -n "${ISCSI_TARGET}" ] && [ -n "${ISCSI_ADDRESS}" ]
700 good_msg "Activating iSCSI via cmdline"
702 if [ "${ISCSI_TGPT}" ]
704 ADDITIONAL="${ADDITIONAL} -g ${ISCSI_TGPT}"
706 ADDITIONAL="${ADDITIONAL} -g 1"
709 if [ "${ISCSI_PORT}" ]
711 ADDITIONAL="${ADDITIONAL} -p ${ISCSI_PORT}"
714 if [ "${ISCSI_USERNAME}" ]
716 ADDITIONAL="${ADDITIONAL} -u ${ISCSI_USERNAME}"
719 if [ "${ISCSI_PASSWORD}" ]
721 ADDITIONAL="${ADDITIONAL} -w ${ISCSI_PASSWORD}"
724 if [ "${ISCSI_USERNAME_IN}" ]
726 ADDITIONAL="${ADDITIONAL} -U ${ISCSI_USERNAME_IN}"
729 if [ "${ISCSI_PASSWORD_IN}" ]
731 ADDITIONAL="${ADDITIONAL} -W ${ISCSI_PASSWORD_IN}"
734 if [ "${ISCSI_DEBUG}" ]
736 ADDITIONAL="${ADDITIONAL} -d ${ISCSI_DEBUG}"
739 iscsistart -i "${ISCSI_INITIATORNAME}" -t "${ISCSI_TARGET}" -a "${ISCSI_ADDRESS}" ${ADDITIONAL}
741 # let iscsid settle - otherwise mounting the iSCSI-disk will fail (very rarely, though)
748 # It is either the root or a swap, other devices are supported in the scripts provided with sys-fs/cryptsetup-luks
751 # please use 'tr' and this line, or remove it
752 # eval local TYPE=`uppercase $1`
763 eval local LUKS_DEVICE='"${CRYPT_'${TYPE}'}"' LUKS_NAME="$1" LUKS_KEY='"${CRYPT_'${TYPE}'_KEY}"' LUKS_KEYDEV='"${CRYPT_'${TYPE}'_KEYDEV}"' LUKS_TRIM='"${CRYPT_'${TYPE}'_TRIM}"'
764 local DEV_ERROR=0 KEY_ERROR=0 KEYDEV_ERROR=0
765 local mntkey="/mnt/key/" cryptsetup_options=''
767 [ ! -e /sbin/cryptsetup ] && bad_msg "The ramdisk does not support LUKS" && exit 1
771 # if crypt_silent=1 and some error occurs, enter shell quietly
772 if [ \( ${CRYPT_SILENT} -eq 1 \) -a \( \( \( ${DEV_ERROR} -eq 1 \) -o \( ${KEY_ERROR} -eq 1 \) \) -o \( ${KEYDEV_ERROR} -eq 1 \) \) ]
775 elif [ ${DEV_ERROR} -eq 1 ]
777 prompt_user "LUKS_DEVICE" "${LUKS_NAME}"
779 elif [ ${KEY_ERROR} -eq 1 ]
781 prompt_user "LUKS_KEY" "${LUKS_NAME} key"
783 elif [ ${KEYDEV_ERROR} -eq 1 ]
785 prompt_user "LUKS_KEYDEV" "${LUKS_NAME} key device"
788 case "${LUKS_DEVICE}" in
793 if [ "${retval}" -ne 0 ]; then
794 REAL_LUKS=`findfs "${LUKS_DEVICE}" 2>/dev/null`
798 if [ "$retval" -ne 0 ]; then
799 REAL_LUKS=`busybox findfs "${LUKS_DEVICE}" 2>/dev/null`
803 if [ "${retval}" -ne 0 ]; then
804 REAL_LUKS=`blkid -o device -l -t "${LUKS_DEVICE}"`
808 if [ "${retval}" -eq 0 ] && [ -n "${REAL_LUKS}" ]; then
809 good_msg "Detected device ${REAL_LUKS}"
810 LUKS_DEVICE="${REAL_LUKS}"
815 setup_md_device ${LUKS_DEVICE}
816 cryptsetup isLuks ${LUKS_DEVICE}
819 bad_msg "The LUKS device ${LUKS_DEVICE} does not contain a LUKS header" ${CRYPT_SILENT}
824 if [ "x${LUKS_TRIM}" = "xyes" ]
826 good_msg "Enabling TRIM support for ${LUKS_NAME}." ${CRYPT_SILENT}
827 cryptsetup_options="${cryptsetup_options} --allow-discards"
830 if [ -n "${LUKS_KEY}" ]
832 if [ ! -e "${mntkey}${LUKS_KEY}" ]
834 if [ -b "${LUKS_KEYDEV}" ]
835 then good_msg "Using key device ${LUKS_KEYDEV}." ${CRYPT_SILENT}
837 good_msg "Please insert removable device ${LUKS_KEYDEV} for ${LUKS_NAME}" ${CRYPT_SILENT}
838 # abort after 10 secs
840 while [ ${count} -gt 0 ]
844 if [ -b "${LUKS_KEYDEV}" ]
846 good_msg "Removable device ${LUKS_KEYDEV} detected." ${CRYPT_SILENT}
850 if [ ! -b "${LUKS_KEYDEV}" ]
852 eval CRYPT_${TYPE}_KEY=${LUKS_KEY}
854 eval LUKS_KEYDEV='"${CRYPT_'${TYPE}'_KEYDEV}"'
855 if [ ! -b "${LUKS_KEYDEV}" ]; then
857 bad_msg "Removable device ${LUKS_KEYDEV} not found." ${CRYPT_SILENT}
860 # continue otherwise will mount keydev which is mounted by bootstrap
864 # At this point a device was recognized, now let's see if the key is there
865 [ ! -d "$mntkey" ] && mkdir -p ${mntkey} 2>/dev/null >/dev/null
867 mount -n -o ro ${LUKS_KEYDEV} ${mntkey} >/dev/null 2>/dev/null
871 bad_msg "Mounting of device ${LUKS_KEYDEV} failed." ${CRYPT_SILENT}
874 good_msg "Removable device ${LUKS_KEYDEV} mounted." ${CRYPT_SILENT}
877 if [ ! -e "${mntkey}${LUKS_KEY}" ]; then
878 umount -n ${mntkey} 2>/dev/null >/dev/null
881 bad_msg "Key {LUKS_KEY} on device ${LUKS_KEYDEV} not found." ${CRYPT_SILENT}
886 # At this point a candidate key exists (either mounted before or not)
887 good_msg "${LUKS_KEY} on device ${LUKS_KEYDEV} found" ${CRYPT_SILENT}
888 if [ "$(echo ${LUKS_KEY} | grep -o '.gpg$')" = ".gpg" ] && [ -e /sbin/gpg ] ; then
889 [ -e /dev/tty ] && mv /dev/tty /dev/tty.org
891 cryptsetup_options="-d -"
892 gpg_cmd="/sbin/gpg --logger-file /dev/null --quiet --decrypt ${mntkey}${LUKS_KEY} |"
894 cryptsetup_options="-d ${mntkey}${LUKS_KEY}"
897 # At this point, keyfile or not, we're ready!
898 crypt_filter "${gpg_cmd}cryptsetup ${cryptsetup_options} luksOpen ${LUKS_DEVICE} ${LUKS_NAME}"
901 [ -e /dev/tty.org ] \
903 && mv /dev/tty.org /dev/tty
905 if [ ${crypt_filter_ret} -eq 0 ]
907 good_msg "LUKS device ${LUKS_DEVICE} opened" ${CRYPT_SILENT}
910 bad_msg "Failed to open LUKS device ${LUKS_DEVICE}" ${CRYPT_SILENT}
918 umount ${mntkey} 2>/dev/null >/dev/null
919 rmdir -p ${mntkey} 2>/dev/null >/dev/null
924 # if key is set but key device isn't, find it
926 [ -n "${CRYPT_ROOT_KEY}" ] && [ -z "${CRYPT_ROOT_KEYDEV}" ] \
927 && sleep 6 && bootstrapKey "ROOT"
929 if [ -n "${CRYPT_ROOT}" ]; then
931 if [ -n "${REAL_ROOT}" ]
936 REAL_ROOT="/dev/mapper/root"
940 # same for swap, but no need to sleep if root was unencrypted
941 [ -n "${CRYPT_SWAP_KEY}" ] && [ -z "${CRYPT_SWAP_KEYDEV}" ] \
942 && { [ -z "${CRYPT_ROOT}" ] && sleep 6; bootstrapKey "SWAP"; }
944 if [ -n "${CRYPT_SWAP}" ]; then
946 if [ -z "${REAL_RESUME}" ]
948 # Resume from swap as default
949 REAL_RESUME="/dev/mapper/swap"
955 # Sleep a specific number of seconds if SDELAY is set
958 good_msg "Waiting ${SDELAY} seconds..."
960 elif [ "${CDROOT}" = '1' ]
962 # many CD/DVD drives require extra sleep, especially when
963 # connected via USB. Many people reported that 1 second sleep
964 # is not enough on their notebooks, that's why sleep 3, when booting
965 # off a livecd is a better default.
968 good_msg 'Hint: Use parameter scandelay[=seconds] if you need waiting here'
973 # if QUIET is set make the kernel less chatty
974 [ -n "$QUIET" ] && echo '0' > /proc/sys/kernel/printk
978 # if QUIET is set make the kernel less chatty
979 [ -n "$QUIET" ] && echo '6' > /proc/sys/kernel/printk
984 if [ "${CDROOT}" = '1' ]
986 if [ -x /${CDROOT_PATH}/cdupdate.sh ]
988 good_msg "Running cdupdate.sh"
989 ${CDROOT_PATH}/cdupdate.sh
992 bad_msg "Executing cdupdate.sh failed!"
996 good_msg 'No cdupdate.sh script found, skipping...'
1002 # start BTRFS volume detection, if available
1003 [ -x /sbin/btrfsctl ] && /sbin/btrfsctl -a
1009 [ -z "$1" ] && device="${REAL_ROOT}" || device="$1"
1010 [ -z "${device}" ] && return # LiveCD
1012 if [ `echo ${device}|sed -e 's#\(luks:\)\?\(/dev/md\)[[:digit:]]\+#\2#'` = "/dev/md" ]
1014 good_msg 'Detected real_root as a md device. Setting up the device node...'
1015 MD_NUMBER=`echo ${device}|sed -e 's#\(luks:\)\?/dev/md\([[:digit:]]\+\)#\2#'`
1016 if [ ! -e /dev/md${MD_NUMBER} ]
1018 mknod /dev/md${MD_NUMBER} b 9 ${MD_NUMBER} >/dev/null 2>&1
1019 [ $? -ne 0 ] && bad_msg "Creation of /dev/md${MD_NUMBER} failed..."
1021 mdstart ${MDPART} /dev/md${MD_NUMBER}
1025 do_rundebugshell() {
1026 good_msg 'Type "exit" to continue with normal bootup.'
1027 [ -x /bin/sh ] && /bin/sh || /bin/ash
1033 good_msg 'Starting debug shell as requested by "debug" option.'
1039 if [ -d /proc/suspend2 -o -d /sys/power/suspend2 -o -d /sys/power/tuxonice ]; then
1047 # determine swap resume partition
1048 local device=$(ls -lL "${REAL_RESUME}" | sed 's/\ */ /g' | cut -d \ -f 5-6 | sed 's/,\ */:/')
1049 [ -f /sys/power/resume ] && echo "${device}" > /sys/power/resume
1054 if grep "splash=" /proc/cmdline > /dev/null 2>&1; then
1055 splash_theme=$(cat /proc/cmdline | sed 's/.*splash=/splash=/' | sed 's/ .*//' | sed 's/.*theme://' | sed 's/,.*//')
1058 local tuxonice_userui_program="/sys/power/tuxonice/user_interface/program"
1059 local tuxonice_do_resume="/sys/power/tuxonice/do_resume"
1060 local tuxonice_resumedev="/sys/power/tuxonice/resume"
1061 local tuxonice_replace_swsusp="/sys/power/tuxonice/replace_swsusp"
1064 # Backward compatibility
1066 if [ -e /sys/power/suspend2 ]; then
1067 tuxonice_userui_program="/sys/power/suspend2/user_interface/program"
1068 tuxonice_do_resume="/sys/power/suspend2/do_resume"
1069 tuxonice_resumedev="/sys/power/suspend2/resume"
1070 tuxonice_replace_swsusp="/sys/power/suspend2/replace_swsusp"
1071 elif [ -e /proc/suspend2 ]; then
1072 tuxonice_userui_program="/proc/suspend2/userui_program"
1073 tuxonice_do_resume="/proc/suspend2/do_resume"
1074 tuxonice_resumedev="/proc/suspend2/resume"
1075 tuxonice_replace_swsusp="/proc/suspend2/replace_swsusp"
1078 # if 'use_swsusp' is given, use swsusp instead
1079 if grep "use_swsusp" /proc/cmdline > /dev/null 2>&1; then
1080 echo 0 > ${tuxonice_replace_swsusp}
1085 modules_scan tuxonice
1087 # we both configure tuxonice and activate resuming,
1088 # however the kernel will resume only if an image is found
1090 if ! grep suspend_noui /proc/cmdline > /dev/null 2>&1; then
1091 which suspend2ui_text > /dev/null 2>&1 && which suspend2ui_text > "${tuxonice_userui_program}"
1092 which tuxoniceui_text > /dev/null 2>&1 && which tuxoniceui_text > "${tuxonice_userui_program}"
1094 if [ -n "${splash_theme}" ]; then
1095 ln -s /etc/splash/${splash_theme} /etc/splash/suspend2
1096 ln -s /etc/splash/${splash_theme} /etc/splash/tuxonice
1098 which suspend2ui_fbsplash > /dev/null 2>&1 && which suspend2ui_fbsplash > "${tuxonice_userui_program}"
1099 which tuxoniceui_fbsplash > /dev/null 2>&1 && which tuxoniceui_fbsplash > "${tuxonice_userui_program}"
1103 echo "${REAL_RESUME}" > "${tuxonice_resumedev}"
1104 echo > "${tuxonice_do_resume}"
1108 for loop in ${LOOPS}
1110 if [ -e "${CDROOT_PATH}""${loop}" ]
1118 LOOPTYPE="${LOOP##*.}"
1119 [ "${LOOPTYPE}" == "loop" ] && LOOPTYPE="normal"
1120 [ "${LOOP}" == "/zisofs" ] && LOOPTYPE="${LOOP#/}"
1121 [ -z "${LOOPTYPE}" ] && LOOPTYPE="noloop"
1125 echo $(( $(hexdump -n 4 -s $((316 + 12 * $2)) -e '"%i"' $1) * 512))
1128 setup_squashfs_aufs() {
1130 # Setup aufs directories and vars
1131 local overlay=/mnt/overlay
1132 local static=/mnt/livecd
1134 for i in "${overlay}" "${static}"; do
1135 [ ! -d "${i}" ] && mkdir -p "${i}"
1137 good_msg "Loading aufs"
1138 modprobe aufs > /dev/null 2>&1
1140 mount -t squashfs -o loop,ro "${CDROOT_PATH}/${LOOPEXT}${LOOP}" "${static}"
1141 mount -t tmpfs none "${overlay}"
1142 mount -t aufs -o br:${overlay}:${static} aufs "${NEW_ROOT}"
1144 [ ! -d "${NEW_ROOT}${overlay}" ] && mkdir -p "${NEW_ROOT}${overlay}"
1145 [ ! -d "${NEW_ROOT}${static}" ] && mkdir -p "${NEW_ROOT}${static}"
1146 echo "aufs / aufs defaults 0 0" > "${NEW_ROOT}"/etc/fstab
1147 for i in "${overlay}" "${static}"; do mount --move "${i}" "${NEW_ROOT}${i}"; done
1149 # have handy /mnt/cdrom (CDROOT_PATH) as well
1150 local new_cdroot="${NEW_ROOT}${CDROOT_PATH}"
1151 [ ! -d "${new_cdroot}" ] && mkdir -p "${new_cdroot}"
1152 mount --bind "${CDROOT_PATH}" "${new_cdroot}"
1159 if [ "${USE_UNIONFS_NORMAL}" = '1' ]
1161 # Directory used for rw changes in union mount filesystem
1166 # CHANGES=$MEMORY/unionfs_changes/default
1168 # CHANGES=$MEMORY/unionfs_changes/$UID
1171 # mkdir -p ${MEMORY}
1173 good_msg "Loading fuse module"
1174 modprobe fuse > /dev/null 2>&1
1175 # if [ -n "${UNIONFS}" ]
1177 # CHANGESDEV=${UNIONFS}
1178 # good_msg "mounting $CHANGESDEV to $MEMORY for unionfs support"
1179 # mount -t auto $CHANGESDEV $MEMORY
1180 # # mount tmpfs only in the case when changes= boot parameter was
1181 # # empty or we were not able to mount the storage device
1183 # if [ ${ret} -ne 0 ]
1185 # bad_msg "mount of $CHANGESDEV failed falling back to ramdisk based unionfs"
1186 # mount -t tmpfs tmpfs $MEMORY
1188 # if [ "${CDROOT}" -eq '1' -a ! -f ${MEMORY}/livecd.unionfs ]
1191 # bad_msg "failed to find livecd.unionfs file on $CHANGESDEV"
1192 # bad_msg "create a livecd.unionfs file on this device if you wish to use it for unionfs"
1193 # bad_msg "falling back to ramdisk based unionfs for safety"
1194 # mount -t tmpfs tmpfs $MEMORY
1197 # good_msg "Mounting ramdisk to $MEMORY for unionfs support..."
1198 # mount -t tmpfs tmpfs $MEMORY
1204 # mount -t unionfs -o dirs=$CHANGES=rw unionfs ${UNION}
1205 good_msg "Creating union mount"
1206 unionfs -o allow_other,cow,noinitgroups,suid,dev,default_permissions,use_ino ${rw_dir}=RW:${ro_dir}=RO ${UNION} 2>/dev/null
1210 bad_msg "Can't setup union mount!"
1211 USE_UNIONFS_NORMAL=0
1213 [ ! -d "${NEW_ROOT}${CDROOT_PATH}" ] && mkdir -p "${NEW_ROOT}${CDROOT_PATH}"
1214 mount --bind "${CDROOT_PATH}" "${NEW_ROOT}${CDROOT_PATH}"
1216 USE_UNIONFS_NORMAL=0
1223 /^[[:blank:]]*#/ { next }
1225 ' ${NEW_ROOT}/etc/initramfs.mounts
1230 [ -e "${NEW_ROOT}"/etc/fstab ] || return 1
1232 /^[[:blank:]]*#/ { next }
1233 $2 == fs { print $3 }
1234 ' ${NEW_ROOT}/etc/fstab
1239 [ -e "${NEW_ROOT}"/etc/fstab ] || return 1
1241 /^[[:blank:]]*#/ { next }
1242 $2 == fs { print $4 }
1243 ' ${NEW_ROOT}/etc/fstab
1248 [ -e "${NEW_ROOT}"/etc/fstab ] || return 1
1250 /^[[:blank:]]*#/ { next }
1251 $2 == fs { print $1 }
1252 ' ${NEW_ROOT}/etc/fstab
1255 # If the kernel is handed a mount option is does not recognize, it WILL fail to
1256 # mount. util-linux handles auto/noauto, but busybox passes it straight to the kernel
1257 # which then rejects the mount.
1258 # To make like a little easier, busybox mount does not care about leading,
1259 # trailing or duplicate commas.
1260 strip_mount_options()
1262 sed -r 's/(,|^)(no)?auto(,|$)/,/g'