6 echo -ne "\033[0G\033[0K"
12 echo ${module} >> /etc/modules/extra_load
15 modules_scan extra_load
20 [ -d "/etc/modules/${1}" ] || touch /etc/modules/${1}
22 [ -f "/etc/modules/${1}" ] && MODS=`cat /etc/modules/${1}`
25 MLOAD=`echo ${MLIST} | sed -e "s/.*${x}.*/${x}/"`
26 if [ "${MLOAD}" = "${x}" ] # Only module to no-load
28 echo -e "${BOLD} ::${NORMAL} Skipping ${x}..."
29 elif [ "${MLOAD}" = "${MLIST}" ] # == No change == No specified no-load
31 [ -n "${DEBUG}" ] && echo -ne "${BOLD} ::${NORMAL} Checking for ${x}..."
32 # find -name does not work since the return status is always zero
33 if find /lib/modules/${KV} | grep /"${x}${KSUFF}" >/dev/null 2>&1
35 echo -ne "${BOLD} ::${NORMAL} Scanning for ${x}..."
41 echo -e "${BOLD} ::${NORMAL} Skipping ${x}..."
48 echo $1 | tr 'a-z' 'A-Z'
53 # $1 = mount dir name / media name
54 # $2 = recognition file
55 # $3 = variable to have the device path
56 # $4 = actual mount dir path (full path)
57 # args remaining are possible devices
59 local media=$1 recon=$2 vrbl=$3 mntdir=$4
62 good_msg "Looking for the ${media}" ${CRYPT_SILENT}
66 [ ! -d "${mntdir}" ] && mkdir -p ${mntdir} 2>/dev/null >/dev/null
67 if [ -n "${ISOBOOT}" ]
69 mntcddir="${mntdir%${media}}iso"
70 if [ ! -f ${mntcddir} ]
80 # Check for a block device to mount
86 # If disk and it has at least one partition, skip.
87 # We use /sys/block/${bsn}/${bsn}[0-9]* to make sure that we
88 # don't skip device mapper devices. Even the craziest scenario
89 # deserves a fair chance.
91 for part in `ls /sys/block/${bsn}/${bsn}*[0-9]* 2>/dev/null`
100 good_msg "Attempting to mount media: ${x}" ${CRYPT_SILENT}
102 mount -r -t ${CDROOT_TYPE} ${x} ${mntcddir} >/dev/null 2>&1
105 if [ -n "${ISOBOOT}" ]; then
106 if [ -f ${mntcddir}/${ISOBOOT} ]; then
107 mount -o loop ${mntcddir}/${ISOBOOT} ${mntdir}
108 if [ "$?" = "0" ]; then
109 good_msg "iso mounted on ${mntdir}"
114 # Check for the media
115 if [ -f "${mntdir}/${recon}" ]
117 #set REAL_ROOT, CRYPT_ROOT_KEYDEV or whatever ${vrbl} is
118 eval ${vrbl}'='"${x}"
119 good_msg "Media found on ${x}" ${CRYPT_SILENT}
129 eval local result='$'${vrbl}
131 [ -n "${result}" ] || bad_msg "Media not found" ${CRYPT_SILENT}
135 # Locate the cdrom device with our media on it.
137 local DEVICES="/dev/cdroms/* /dev/ide/cd/* /dev/sr*"
138 # USB Keychain/Storage
139 DEVICES="$DEVICES /dev/sd*"
141 DEVICES="$DEVICES /dev/hd*"
143 DEVICES="$DEVICES /dev/vd*"
144 # USB using the USB Block Driver
145 DEVICES="$DEVICES /dev/ubd* /dev/ubd/*"
147 DEVICES="$DEVICES /dev/iseries/vcd*"
148 # builtin mmc/sd card reader devices
149 DEVICES="$DEVICES /dev/mmcblk* /dev/mmcblk*/*"
150 # fallback scanning, this might scan something twice, but it's better than
152 [ -e /proc/partitions ] && DEVICES="${DEVICES} $(awk '/([0-9]+[[:space:]]+)/{print "/dev/" $4}' /proc/partitions)"
157 local DEVICES=`devicelist`
158 # The device was specified on the command line, so there's no need to scan
159 # a bunch of extra devices
160 [ -n "${CDROOT_DEV}" ] && DEVICES="${CDROOT_DEV}"
162 findmediamount "cdrom" "${SUBDIR}/livecd" "REAL_ROOT" "${CDROOT_PATH}" ${DEVICES}
167 local KEYDEVS=`devicelist`
168 eval local keyloc='"${CRYPT_'${1}'_KEY}"'
170 findmediamount "key" "${keyloc}" "CRYPT_${1}_KEYDEV" "/mnt/key" ${KEYDEVS}
173 cache_cd_contents() {
174 # Check loop file exists and cache to ramdisk if DO_cache is enabled
175 if [ "${LOOPTYPE}" != "noloop" ] && [ "${LOOPTYPE}" != "sgimips" ]
180 # TODO: Check the size of the image versus the size of our tmpfs
181 # along with the amount of available RAM and increase tmpfs size
182 # if necessary. (Not having awk sucks...)
184 # for i in $(cat /proc/meminfo | grep -e ^MemFree -e ^Cached | \
185 # cut -d: -f2 | cut -dk -f1 | sed -e "s/^\s*//") ; do
186 # z=$(($z + $i)) ; done
188 good_msg "Copying loop file for caching..."
189 # Verify that the needed directory exists
190 mkdir -p "$(dirname ${NEW_ROOT}/mnt/${LOOP})"
191 cp -a ${CDROOT_PATH}/${LOOP} ${NEW_ROOT}/mnt/${LOOP}
194 warn_msg "Failed to cache the loop file! Lack of RAM?"
195 rm -rf ${NEW_ROOT}/mnt/${LOOP} 2>/dev/null
196 rm -rf ${NEW_ROOT}/mnt/livecd.* 2>/dev/null
197 rm -rf ${NEW_ROOT}/mnt/image.* 2>/dev/null
198 rm -rf ${NEW_ROOT}/mnt/zisofs 2>/dev/null
205 mount -t sysfs sysfs /sys -o noexec,nosuid,nodev >/dev/null 2>&1
207 [ ${ret} -eq 0 ] || bad_msg "Failed to mount /sys!"
211 if [ "${IP}" != '' ] || busybox udhcpc -n -T 15 -q
213 [ -e /rootpath ] && NFSROOT=`cat /rootpath`
215 if [ "${NFSROOT}" = '' ]
218 OPTIONS=`busybox dmesg | grep rootserver | sed -e "s/,/ /g"`
219 for OPTION in $OPTIONS
221 if [ `echo $OPTION | sed -e "s/=/ /g" | cut -d " " -f 1` = 'rootserver' ]
223 NFSIP=`echo $OPTION | sed -e "s/=/ /g" | cut -d " " -f 2`
228 OPTIONS=`busybox dmesg | grep rootpath | sed -e "s/,/ /g"`
229 for OPTION in $OPTIONS
231 if [ `echo $OPTION | sed -e "s/=/ /g" | cut -d " " -f 1` = 'rootpath' ]
233 NFSPATH=`echo $OPTION | sed -e "s/=/ /g" | cut -d " " -f 2`
238 if [ "${NFSIP}" != '' ] && [ "$NFSPATH" != '' ]
240 NFSROOT="${NFSIP}:${NFSPATH}"
242 bad_msg "The DHCP Server did not send a valid root-path."
243 bad_msg "Please check your DHCP setup, or provide a nfsroot=<...> parameter."
247 if [ "${NFSROOT}" != '' ]
249 NFSOPTIONS=${NFSROOT#*,}
250 NFSROOT=${NFSROOT%%,*}
251 if [ "${NFSOPTIONS}" = "${NFSROOT}" ]
253 NFSOPTIONS=$DEFAULT_NFSOPTIONS
255 NFSOPTIONS="${DEFAULT_NFSOPTIONS},${NFSOPTIONS}"
258 if [ "${CDROOT}" != '0' ]
260 good_msg "Attempting to mount NFS CD image on ${NFSROOT} with options ${NFSOPTIONS}"
261 mount -t nfs -o ${NFSOPTIONS} ${NFSROOT} ${CDROOT_PATH}
266 bad_msg "NFS Mounting failed. Is the path corrent ?"
269 good_msg "Attempting to mount NFS root on ${NFSROOT} with options ${NFSOPTIONS}"
270 mount -t nfs -o ${NFSOPTIONS} ${NFSROOT} ${NEW_ROOT}
275 bad_msg "NFS Mounting failed. Is the path correct ?"
277 # FIXME: Need to start portmap and the other rpc daemons in
278 # order to remount rw.
286 if [ "${LOOP}" = '' -o ! -e "${CDROOT_PATH}/${LOOP}" ]
289 bad_msg "Invalid loop location: ${LOOP}"
290 bad_msg 'Please export LOOP with a valid location, or reboot and pass a proper loop=...'
291 bad_msg 'kernel command line!'
302 # Use devtmpfs if enabled in kernel,
303 # else tmpfs. Always run mdev just in case
305 if grep -qs devtmpfs /proc/filesystems ; then
309 # Options copied from /etc/init.d/udev-mount, should probably be kept in sync
310 if grep -qs '^devtmpfs' /proc/mounts; then
311 mount -t $devfs -o "exec,nosuid,mode=0755,size=10M" udev /dev \
312 || bad_msg "Failed to mount /dev as ${devfs}"
315 # http://git.busybox.net/busybox/plain/docs/mdev.txt
316 if grep -qs '^devpts' /proc/mounts; then
317 mkdir -m 0755 /dev/pts
318 mount -t devpts -o gid=5,mode=0620 devpts /dev/pts || bad_msg "Failed to mount /dev/pts"
324 # If last command failed send error message and fall back to a shell
325 if [ "$retcode" != '0' ]
328 error_string="${error_string:-run command}"
329 bad_msg 'Failed to $1; failing back to the shell...'
335 # msg functions arguments
341 msg_string="${msg_string:-...}"
342 [ "$2" != 1 ] && echo -e "${GOOD}>>${NORMAL}${BOLD} ${msg_string} ${NORMAL}"
347 msg_string="${msg_string:-...}"
350 splash 'verbose' > /dev/null &
351 echo -e "${BAD}!!${NORMAL}${BOLD} ${msg_string} ${NORMAL}"
357 msg_string="${msg_string:-...}"
358 [ "$2" != 1 ] && echo -e "${WARN}**${NORMAL}${BOLD} ${msg_string} ${NORMAL}"
362 if [ "${CRYPT_SILENT}" = '1' ]
364 eval $1 >/dev/null 2>/dev/null
366 splash 'verbose' > /dev/null &
371 splash set_msg 'Disk unlocked.'
378 # $1 = variable whose value is the path (examples: "REAL_ROOT",
381 # $3 = optional explanations for failure
383 eval local oldvalue='$'${1}
385 [ \( $# != 2 \) -a \( $# != 3 \) ] && \
386 bad_msg "Bad invocation of function prompt_user, please file a bug \
387 report with this message" && exit 1
388 [ -n "${3}" ] && local explnt=" or : ${3}" || local explnt="."
390 bad_msg "Could not find the ${2} in ${oldvalue}${explnt}"
391 echo ' Please specify another value or: press Enter for the same, type "shell" for a shell, or "q" to skip...'
392 echo -n "${2}(${oldvalue}) :: "
394 case `eval echo '$'${1}` in
396 eval ${1}'='${oldvalue}
397 warn_msg "Skipping step, this will likely cause a boot failure."
401 eval ${1}'='${oldvalue}
402 echo "To leave and try again just press <Ctrl>+D"
406 eval ${1}'='${oldvalue}
412 # This function removes unset DO_slowusb if there is no usb-storage attached.
413 # If noslowusb is set, skip this function
414 [ "${DO_slowusb}" ] || return
416 # Unset DO_slowusb, so we can set it again if usb-storage has something attached
419 local usb_storage_dir="/sys/bus/usb/drivers/usb-storage"
420 if [ ! -d "${usb_storage_dir}" ]
422 # no automated slowusb required. no usb-storage devices attached.
425 for x in "${usb_storage_dir}"/*
427 [ -d "${x}" ] && [ "${x}" != "${usb_storage_dir}/module" ] \
428 && { DO_slowusb="1" ; break ; }
433 # Scan CMDLINE for any "doscsi" or "noscsi"-type arguments
441 if [ "${y}" = "do${x}" ]
443 MY_HWOPTS="${MY_HWOPTS} $x"
444 elif [ "${y}" = "no${x}" ]
446 MY_HWOPTS="`echo ${MY_HWOPTS} | sed -e \"s/${x}//g\" -`"
448 if [ "$(echo ${y} | cut -b -7)" = "keymap=" ]
450 MY_HWOPTS="${MY_HWOPTS} keymap"
455 # Shouldnt need to sort this as the following loop should figure out the
456 # duplicates and strip them out
457 #MY_HWOPTS=`echo ${MY_HWOPTS}| sort`
459 for x in ${MY_HWOPTS}
462 for y in ${TMP_HWOPTS}
464 if [ "${y}" = "${x}" ]
469 TMP_HWOPTS="${TMP_HWOPTS} ${x}"
470 eval DO_`echo ${x} | sed 's/-//'`=1
473 MY_HWOPTS=${TMP_HWOPTS}
477 # Load modules listed in MY_HWOPTS if /lib/modules exists for the running
479 if [ -d "/lib/modules/${KV}" ]
481 good_msg 'Loading modules'
482 # Load appropriate kernel modules
483 for modules in $MY_HWOPTS
485 modules_scan $modules
488 good_msg 'Skipping module load; no modules in the ramdisk!'
493 if [ "${DO_keymap}" ]
495 if [ ! -e /dev/vc/0 -a ! -e /dev/tty0 ]
498 mount -o bind ${NEW_ROOT}/dev /dev
500 [ ! -e /dev/tty0 ] && ln -s /dev/tty1 /dev/tty0
502 [ -f /lib/keymaps/keymapList ] && chooseKeymap
504 [ "${DEVBIND}" = '1' ] && umount /dev
506 if [ -e /etc/sysconfig/keyboard -a "${CDROOT}" = '1' ]
508 mkdir -p ${NEW_ROOT}/etc/sysconfig/
509 cp /etc/sysconfig/keyboard ${NEW_ROOT}/etc/sysconfig/keyboard
515 good_msg "Loading keymaps"
516 if [ -z "${keymap}" ]
518 splash 'verbose' > /dev/null &
519 cat /lib/keymaps/keymapList
520 read -t 10 -p '<< Load keymap (Enter for default): ' keymap
522 1|azerty) keymap=azerty ;;
525 4|br-a) keymap=br-a ;;
526 5|br-l) keymap=br-l ;;
529 8|croat) keymap=croat ;;
533 12|dvorak) keymap=dvorak ;;
555 34|sk-y) keymap=sk-y ;;
556 35|sk-z) keymap=sk-z ;;
557 36|slovene) keymap=slovene ;;
558 37|trf) keymap=trf ;;
559 38|trq) keymap=trq ;;
563 42|wangbe) keymap=wangbe ;;
564 43|sf|ch*) keymap=sf ;;
567 if [ -e /lib/keymaps/${keymap}.map ]
569 good_msg "Loading the ''${keymap}'' keymap"
570 loadkmap < /lib/keymaps/${keymap}.map
572 # echo ${keymap} | egrep -e "[0-9]+" >/dev/null 2>&1
575 # xkeymap=`tail -n 8 /lib/keymaps/keymapList | grep ${keymap} | sed -r "s/.*\s+${keymap}\s+([a-z-]+).*/\1/g" | egrep -v 1`
577 mkdir -p /etc/sysconfig
578 # echo "XKEYBOARD=${xkeymap}" > /etc/sysconfig/keyboard
579 echo "XKEYBOARD=${keymap}" > /etc/sysconfig/keyboard
580 splash set_msg "Set keymap to ${keymap}"
581 elif [ -z "${keymap}" ]
584 good_msg "Keeping default keymap"
585 splash set_msg "Keeping default keymap"
587 bad_msg "Sorry, but keymap ''${keymap}'' is invalid!"
594 #good_msg 'Checking if volumes need to be started...'
596 # Here, we check for /dev/device-mapper, and if it exists, we setup a
597 # a symlink, which should hopefully fix bug #142775 and bug #147015
598 if [ -e /dev/device-mapper ] && [ ! -e /dev/mapper/control ]
601 ln -sf /dev/device-mapper /dev/mapper/control
604 if [ "${USE_MDADM}" = '1' ]
606 if [ -e '/sbin/mdadm' ]
608 /sbin/mdadm --assemble --scan
610 bad_msg "mdadm not found: skipping mdadm raid assembly!"
614 if [ "${USE_DMRAID_NORMAL}" = '1' ]
616 if [ -e '/sbin/dmraid' ]
618 good_msg "Activating Device-Mapper RAID(s)"
619 if [ '${DMRAID_OPTS}' = '' ]
623 /sbin/dmraid -ay ${DMRAID_OPTS}
628 if [ "${USE_LVM_NORMAL}" = '1' ]
632 for dev in ${RAID_DEVICES}
634 setup_md_device "${dev}"
637 # This is needed for /bin/lvm to accept the following logic
638 lvm_commands="#! /bin/lvm"
640 # If there is a cahe, update it. Unbreak at least dmcrypt
641 [ -d /etc/lvm/cache ] && lvm_commands="${lvm_commands} \nvgscan"
643 # To activate volumegroups on all devices in the cache
644 lvm_commands="${lvm_commands} \nvgchange -ay --sysinit"
646 # To create symlinks so users can use real_root=/dev/vg/root
647 # This needs to run after vgchange, using vgchange --mknodes is too
649 lvm_commands="${lvm_commands} \nvgmknodes --ignorelockingfailure"
651 # And finally execute it all (/proc/... needed if lvm is compiled without readline)
652 good_msg "Scanning for and activating Volume Groups"
653 printf "%b\n" "${lvm_commands}" | /bin/lvm /proc/self/fd/0
655 bad_msg "vgscan or vgchange not found: skipping LVM volume group activation!"
659 if [ "${USE_ZFS}" = '1' ]
661 if [ -z "${ZFS_POOL}" ]
663 good_msg "Importing ZFS pools"
665 /sbin/zpool import -N -a "${ZPOOL_FORCE}"
669 good_msg "Importing ZFS pools succeeded"
671 bad_msg "Imported ZFS pools failed"
675 if [ "$(zpool list -H -o name ${ZFS_POOL} 2>&1)" = "$ZFS_POOL" ]
677 good_msg "ZFS pool ${ZFS_POOL} already imported."
679 if [ -n "${CRYPT_ROOT}" -o -n "${CRYPT_SWAP}" ]
681 good_msg "LUKS detected. Reimporting ${ZFS_POOL}"
682 /sbin/zpool export -f "${ZFS_POOL}"
683 /sbin/zpool import -N "${ZPOOL_FORCE}" "${ZFS_POOL}"
686 good_msg "Importing ZFS pool ${ZFS_POOL}"
688 /sbin/zpool import -N "${ZPOOL_FORCE}" "${ZFS_POOL}"
692 good_msg "Importing ${ZFS_POOL} succeeded"
694 bad_msg "Importing ${ZFS_POOL} failed"
703 if [ ! -n "${ISCSI_NOIBFT}" ]
705 good_msg "Activating iSCSI via iBFT"
709 if [ -n "${ISCSI_INITIATORNAME}" ] && [ -n "${ISCSI_TARGET}" ] && [ -n "${ISCSI_ADDRESS}" ]
711 good_msg "Activating iSCSI via cmdline"
713 if [ "${ISCSI_TGPT}" ]
715 ADDITIONAL="${ADDITIONAL} -g ${ISCSI_TGPT}"
717 ADDITIONAL="${ADDITIONAL} -g 1"
720 if [ "${ISCSI_PORT}" ]
722 ADDITIONAL="${ADDITIONAL} -p ${ISCSI_PORT}"
725 if [ "${ISCSI_USERNAME}" ]
727 ADDITIONAL="${ADDITIONAL} -u ${ISCSI_USERNAME}"
730 if [ "${ISCSI_PASSWORD}" ]
732 ADDITIONAL="${ADDITIONAL} -w ${ISCSI_PASSWORD}"
735 if [ "${ISCSI_USERNAME_IN}" ]
737 ADDITIONAL="${ADDITIONAL} -U ${ISCSI_USERNAME_IN}"
740 if [ "${ISCSI_PASSWORD_IN}" ]
742 ADDITIONAL="${ADDITIONAL} -W ${ISCSI_PASSWORD_IN}"
745 if [ "${ISCSI_DEBUG}" ]
747 ADDITIONAL="${ADDITIONAL} -d ${ISCSI_DEBUG}"
750 iscsistart -i "${ISCSI_INITIATORNAME}" -t "${ISCSI_TARGET}" -a "${ISCSI_ADDRESS}" ${ADDITIONAL}
752 # let iscsid settle - otherwise mounting the iSCSI-disk will fail (very rarely, though)
759 # It is either the root or a swap, other devices are supported in the scripts provided with sys-fs/cryptsetup-luks
762 # please use 'tr' and this line, or remove it
763 # eval local TYPE=`uppercase $1`
774 eval local LUKS_DEVICE='"${CRYPT_'${TYPE}'}"' LUKS_NAME="$1" LUKS_KEY='"${CRYPT_'${TYPE}'_KEY}"' LUKS_KEYDEV='"${CRYPT_'${TYPE}'_KEYDEV}"' LUKS_TRIM='"${CRYPT_'${TYPE}'_TRIM}"'
775 local DEV_ERROR=0 KEY_ERROR=0 KEYDEV_ERROR=0
776 local mntkey="/mnt/key/" cryptsetup_options=''
778 [ ! -e /sbin/cryptsetup ] && bad_msg "The ramdisk does not support LUKS" && exit 1
782 # if crypt_silent=1 and some error occurs, enter shell quietly
783 if [ \( ${CRYPT_SILENT} -eq 1 \) -a \( \( \( ${DEV_ERROR} -eq 1 \) -o \( ${KEY_ERROR} -eq 1 \) \) -o \( ${KEYDEV_ERROR} -eq 1 \) \) ]
786 elif [ ${DEV_ERROR} -eq 1 ]
788 prompt_user "LUKS_DEVICE" "${LUKS_NAME}"
790 elif [ ${KEY_ERROR} -eq 1 ]
792 prompt_user "LUKS_KEY" "${LUKS_NAME} key"
794 elif [ ${KEYDEV_ERROR} -eq 1 ]
796 prompt_user "LUKS_KEYDEV" "${LUKS_NAME} key device"
799 case "${LUKS_DEVICE}" in
804 if [ "${retval}" -ne 0 ]; then
805 REAL_LUKS=`findfs "${LUKS_DEVICE}" 2>/dev/null`
809 if [ "$retval" -ne 0 ]; then
810 REAL_LUKS=`busybox findfs "${LUKS_DEVICE}" 2>/dev/null`
814 if [ "${retval}" -ne 0 ]; then
815 REAL_LUKS=`blkid -o device -l -t "${LUKS_DEVICE}"`
819 if [ "${retval}" -eq 0 ] && [ -n "${REAL_LUKS}" ]; then
820 good_msg "Detected device ${REAL_LUKS}"
821 LUKS_DEVICE="${REAL_LUKS}"
826 setup_md_device ${LUKS_DEVICE}
827 cryptsetup isLuks ${LUKS_DEVICE}
830 bad_msg "The LUKS device ${LUKS_DEVICE} does not contain a LUKS header" ${CRYPT_SILENT}
835 if [ "x${LUKS_TRIM}" = "xyes" ]
837 good_msg "Enabling TRIM support for ${LUKS_NAME}." ${CRYPT_SILENT}
838 cryptsetup_options="${cryptsetup_options} --allow-discards"
841 if [ -n "${LUKS_KEY}" ]
843 if [ ! -e "${mntkey}${LUKS_KEY}" ]
845 if [ -b "${LUKS_KEYDEV}" ]
846 then good_msg "Using key device ${LUKS_KEYDEV}." ${CRYPT_SILENT}
848 good_msg "Please insert removable device ${LUKS_KEYDEV} for ${LUKS_NAME}" ${CRYPT_SILENT}
849 # abort after 10 secs
851 while [ ${count} -gt 0 ]
855 if [ -b "${LUKS_KEYDEV}" ]
857 good_msg "Removable device ${LUKS_KEYDEV} detected." ${CRYPT_SILENT}
861 if [ ! -b "${LUKS_KEYDEV}" ]
863 eval CRYPT_${TYPE}_KEY=${LUKS_KEY}
865 eval LUKS_KEYDEV='"${CRYPT_'${TYPE}'_KEYDEV}"'
866 if [ ! -b "${LUKS_KEYDEV}" ]; then
868 bad_msg "Removable device ${LUKS_KEYDEV} not found." ${CRYPT_SILENT}
871 # continue otherwise will mount keydev which is mounted by bootstrap
875 # At this point a device was recognized, now let's see if the key is there
876 [ ! -d "$mntkey" ] && mkdir -p ${mntkey} 2>/dev/null >/dev/null
878 mount -n -o ro ${LUKS_KEYDEV} ${mntkey} >/dev/null 2>/dev/null
882 bad_msg "Mounting of device ${LUKS_KEYDEV} failed." ${CRYPT_SILENT}
885 good_msg "Removable device ${LUKS_KEYDEV} mounted." ${CRYPT_SILENT}
888 if [ ! -e "${mntkey}${LUKS_KEY}" ]; then
889 umount -n ${mntkey} 2>/dev/null >/dev/null
892 bad_msg "Key {LUKS_KEY} on device ${LUKS_KEYDEV} not found." ${CRYPT_SILENT}
897 # At this point a candidate key exists (either mounted before or not)
898 good_msg "${LUKS_KEY} on device ${LUKS_KEYDEV} found" ${CRYPT_SILENT}
899 if [ "$(echo ${LUKS_KEY} | grep -o '.gpg$')" = ".gpg" ] && [ -e /sbin/gpg ] ; then
900 [ -e /dev/tty ] && mv /dev/tty /dev/tty.org
902 cryptsetup_options="-d -"
903 gpg_cmd="/sbin/gpg --logger-file /dev/null --quiet --decrypt ${mntkey}${LUKS_KEY} |"
905 cryptsetup_options="-d ${mntkey}${LUKS_KEY}"
908 # At this point, keyfile or not, we're ready!
909 crypt_filter "${gpg_cmd}cryptsetup ${cryptsetup_options} luksOpen ${LUKS_DEVICE} ${LUKS_NAME}"
912 [ -e /dev/tty.org ] \
914 && mv /dev/tty.org /dev/tty
916 if [ ${crypt_filter_ret} -eq 0 ]
918 good_msg "LUKS device ${LUKS_DEVICE} opened" ${CRYPT_SILENT}
921 bad_msg "Failed to open LUKS device ${LUKS_DEVICE}" ${CRYPT_SILENT}
929 umount ${mntkey} 2>/dev/null >/dev/null
930 rmdir -p ${mntkey} 2>/dev/null >/dev/null
935 # if key is set but key device isn't, find it
937 [ -n "${CRYPT_ROOT_KEY}" ] && [ -z "${CRYPT_ROOT_KEYDEV}" ] \
938 && sleep 6 && bootstrapKey "ROOT"
940 if [ -n "${CRYPT_ROOT}" ]; then
942 if [ -n "${REAL_ROOT}" ]
947 REAL_ROOT="/dev/mapper/root"
951 # same for swap, but no need to sleep if root was unencrypted
952 [ -n "${CRYPT_SWAP_KEY}" ] && [ -z "${CRYPT_SWAP_KEYDEV}" ] \
953 && { [ -z "${CRYPT_ROOT}" ] && sleep 6; bootstrapKey "SWAP"; }
955 if [ -n "${CRYPT_SWAP}" ]; then
957 if [ -z "${REAL_RESUME}" ]
959 # Resume from swap as default
960 REAL_RESUME="/dev/mapper/swap"
966 # Sleep a specific number of seconds if SDELAY is set
969 good_msg "Waiting ${SDELAY} seconds..."
971 elif [ "${CDROOT}" = '1' ]
973 # many CD/DVD drives require extra sleep, especially when
974 # connected via USB. Many people reported that 1 second sleep
975 # is not enough on their notebooks, that's why sleep 3, when booting
976 # off a livecd is a better default.
979 good_msg 'Hint: Use parameter scandelay[=seconds] if you need waiting here'
984 # if QUIET is set make the kernel less chatty
985 [ -n "$QUIET" ] && echo '0' > /proc/sys/kernel/printk
989 # if QUIET is set make the kernel less chatty
990 [ -n "$QUIET" ] && echo '6' > /proc/sys/kernel/printk
995 if [ "${CDROOT}" = '1' ]
997 if [ -x /${CDROOT_PATH}/cdupdate.sh ]
999 good_msg "Running cdupdate.sh"
1000 ${CDROOT_PATH}/cdupdate.sh
1003 bad_msg "Executing cdupdate.sh failed!"
1007 good_msg 'No cdupdate.sh script found, skipping...'
1013 # start BTRFS volume detection, if available
1014 [ -x /sbin/btrfsctl ] && /sbin/btrfsctl -a
1020 [ -z "$1" ] && device="${REAL_ROOT}" || device="$1"
1021 [ -z "${device}" ] && return # LiveCD
1023 if [ `echo ${device}|sed -e 's#\(luks:\)\?\(/dev/md\)[[:digit:]]\+#\2#'` = "/dev/md" ]
1025 good_msg 'Detected real_root as a md device. Setting up the device node...'
1026 MD_NUMBER=`echo ${device}|sed -e 's#\(luks:\)\?/dev/md\([[:digit:]]\+\)#\2#'`
1027 if [ ! -e /dev/md${MD_NUMBER} ]
1029 mknod /dev/md${MD_NUMBER} b 9 ${MD_NUMBER} >/dev/null 2>&1
1030 [ $? -ne 0 ] && bad_msg "Creation of /dev/md${MD_NUMBER} failed..."
1032 mdstart ${MDPART} /dev/md${MD_NUMBER}
1036 do_rundebugshell() {
1037 good_msg 'Type "exit" to continue with normal bootup.'
1038 [ -x /bin/sh ] && /bin/sh || /bin/ash
1044 good_msg 'Starting debug shell as requested by "debug" option.'
1050 if [ -d /proc/suspend2 -o -d /sys/power/suspend2 -o -d /sys/power/tuxonice ]; then
1058 # determine swap resume partition
1059 local device=$(ls -lL "${REAL_RESUME}" | sed 's/\ */ /g' | cut -d \ -f 5-6 | sed 's/,\ */:/')
1060 [ -f /sys/power/resume ] && echo "${device}" > /sys/power/resume
1065 if grep "splash=" /proc/cmdline > /dev/null 2>&1; then
1066 splash_theme=$(cat /proc/cmdline | sed 's/.*splash=/splash=/' | sed 's/ .*//' | sed 's/.*theme://' | sed 's/,.*//')
1069 local tuxonice_userui_program="/sys/power/tuxonice/user_interface/program"
1070 local tuxonice_do_resume="/sys/power/tuxonice/do_resume"
1071 local tuxonice_resumedev="/sys/power/tuxonice/resume"
1072 local tuxonice_replace_swsusp="/sys/power/tuxonice/replace_swsusp"
1075 # Backward compatibility
1077 if [ -e /sys/power/suspend2 ]; then
1078 tuxonice_userui_program="/sys/power/suspend2/user_interface/program"
1079 tuxonice_do_resume="/sys/power/suspend2/do_resume"
1080 tuxonice_resumedev="/sys/power/suspend2/resume"
1081 tuxonice_replace_swsusp="/sys/power/suspend2/replace_swsusp"
1082 elif [ -e /proc/suspend2 ]; then
1083 tuxonice_userui_program="/proc/suspend2/userui_program"
1084 tuxonice_do_resume="/proc/suspend2/do_resume"
1085 tuxonice_resumedev="/proc/suspend2/resume"
1086 tuxonice_replace_swsusp="/proc/suspend2/replace_swsusp"
1089 # if 'use_swsusp' is given, use swsusp instead
1090 if grep "use_swsusp" /proc/cmdline > /dev/null 2>&1; then
1091 echo 0 > ${tuxonice_replace_swsusp}
1096 modules_scan tuxonice
1098 # we both configure tuxonice and activate resuming,
1099 # however the kernel will resume only if an image is found
1101 if ! grep suspend_noui /proc/cmdline > /dev/null 2>&1; then
1102 which suspend2ui_text > /dev/null 2>&1 && which suspend2ui_text > "${tuxonice_userui_program}"
1103 which tuxoniceui_text > /dev/null 2>&1 && which tuxoniceui_text > "${tuxonice_userui_program}"
1105 if [ -n "${splash_theme}" ]; then
1106 ln -s /etc/splash/${splash_theme} /etc/splash/suspend2
1107 ln -s /etc/splash/${splash_theme} /etc/splash/tuxonice
1109 which suspend2ui_fbsplash > /dev/null 2>&1 && which suspend2ui_fbsplash > "${tuxonice_userui_program}"
1110 which tuxoniceui_fbsplash > /dev/null 2>&1 && which tuxoniceui_fbsplash > "${tuxonice_userui_program}"
1114 echo "${REAL_RESUME}" > "${tuxonice_resumedev}"
1115 echo > "${tuxonice_do_resume}"
1119 for loop in ${LOOPS}
1121 if [ -e "${CDROOT_PATH}""${loop}" ]
1129 LOOPTYPE="${LOOP##*.}"
1130 [ "${LOOPTYPE}" == "loop" ] && LOOPTYPE="normal"
1131 [ "${LOOP}" == "/zisofs" ] && LOOPTYPE="${LOOP#/}"
1132 [ -z "${LOOPTYPE}" ] && LOOPTYPE="noloop"
1136 echo $(( $(hexdump -n 4 -s $((316 + 12 * $2)) -e '"%i"' $1) * 512))
1139 setup_squashfs_aufs() {
1141 # Setup aufs directories and vars
1142 local overlay=/mnt/overlay
1143 local static=/mnt/livecd
1145 for i in "${overlay}" "${static}"; do
1146 [ ! -d "${i}" ] && mkdir -p "${i}"
1148 good_msg "Loading aufs"
1149 modprobe aufs > /dev/null 2>&1
1151 mount -t squashfs -o loop,ro "${CDROOT_PATH}/${LOOPEXT}${LOOP}" "${static}"
1152 mount -t tmpfs none "${overlay}"
1153 mount -t aufs -o br:${overlay}:${static} aufs "${NEW_ROOT}"
1155 [ ! -d "${NEW_ROOT}${overlay}" ] && mkdir -p "${NEW_ROOT}${overlay}"
1156 [ ! -d "${NEW_ROOT}${static}" ] && mkdir -p "${NEW_ROOT}${static}"
1157 echo "aufs / aufs defaults 0 0" > "${NEW_ROOT}"/etc/fstab
1158 for i in "${overlay}" "${static}"; do mount --move "${i}" "${NEW_ROOT}${i}"; done
1160 # have handy /mnt/cdrom (CDROOT_PATH) as well
1161 local new_cdroot="${NEW_ROOT}${CDROOT_PATH}"
1162 [ ! -d "${new_cdroot}" ] && mkdir -p "${new_cdroot}"
1163 mount --bind "${CDROOT_PATH}" "${new_cdroot}"
1170 if [ "${USE_UNIONFS_NORMAL}" = '1' ]
1172 # Directory used for rw changes in union mount filesystem
1177 # CHANGES=$MEMORY/unionfs_changes/default
1179 # CHANGES=$MEMORY/unionfs_changes/$UID
1182 # mkdir -p ${MEMORY}
1184 good_msg "Loading fuse module"
1185 modprobe fuse > /dev/null 2>&1
1186 # if [ -n "${UNIONFS}" ]
1188 # CHANGESDEV=${UNIONFS}
1189 # good_msg "mounting $CHANGESDEV to $MEMORY for unionfs support"
1190 # mount -t auto $CHANGESDEV $MEMORY
1191 # # mount tmpfs only in the case when changes= boot parameter was
1192 # # empty or we were not able to mount the storage device
1194 # if [ ${ret} -ne 0 ]
1196 # bad_msg "mount of $CHANGESDEV failed falling back to ramdisk based unionfs"
1197 # mount -t tmpfs tmpfs $MEMORY
1199 # if [ "${CDROOT}" -eq '1' -a ! -f ${MEMORY}/livecd.unionfs ]
1202 # bad_msg "failed to find livecd.unionfs file on $CHANGESDEV"
1203 # bad_msg "create a livecd.unionfs file on this device if you wish to use it for unionfs"
1204 # bad_msg "falling back to ramdisk based unionfs for safety"
1205 # mount -t tmpfs tmpfs $MEMORY
1208 # good_msg "Mounting ramdisk to $MEMORY for unionfs support..."
1209 # mount -t tmpfs tmpfs $MEMORY
1215 # mount -t unionfs -o dirs=$CHANGES=rw unionfs ${UNION}
1216 good_msg "Creating union mount"
1217 unionfs -o allow_other,cow,noinitgroups,suid,dev,default_permissions,use_ino ${rw_dir}=RW:${ro_dir}=RO ${UNION} 2>/dev/null
1221 bad_msg "Can't setup union mount!"
1222 USE_UNIONFS_NORMAL=0
1224 [ ! -d "${NEW_ROOT}${CDROOT_PATH}" ] && mkdir -p "${NEW_ROOT}${CDROOT_PATH}"
1225 mount --bind "${CDROOT_PATH}" "${NEW_ROOT}${CDROOT_PATH}"
1227 USE_UNIONFS_NORMAL=0
1234 /^[[:blank:]]*#/ { next }
1236 ' ${NEW_ROOT}/etc/initramfs.mounts
1241 [ -e "${NEW_ROOT}"/etc/fstab ] || return 1
1243 /^[[:blank:]]*#/ { next }
1244 $2 == fs { print $3 }
1245 ' ${NEW_ROOT}/etc/fstab
1250 [ -e "${NEW_ROOT}"/etc/fstab ] || return 1
1252 /^[[:blank:]]*#/ { next }
1253 $2 == fs { print $4 }
1254 ' ${NEW_ROOT}/etc/fstab
1259 [ -e "${NEW_ROOT}"/etc/fstab ] || return 1
1261 /^[[:blank:]]*#/ { next }
1262 $2 == fs { print $1 }
1263 ' ${NEW_ROOT}/etc/fstab
1266 # If the kernel is handed a mount option is does not recognize, it WILL fail to
1267 # mount. util-linux handles auto/noauto, but busybox passes it straight to the kernel
1268 # which then rejects the mount.
1269 # To make like a little easier, busybox mount does not care about leading,
1270 # trailing or duplicate commas.
1271 strip_mount_options()
1273 sed -r 's/(,|^)(no)?auto(,|$)/,/g'