2 #************************************************************************************
3 # Copyright (c) 2020, longpanda <admin@ventoy.net>
5 # This program is free software; you can redistribute it and/or
6 # modify it under the terms of the GNU General Public License as
7 # published by the Free Software Foundation; either version 3 of the
8 # License, or (at your option) any later version.
10 # This program is distributed in the hope that it will be useful, but
11 # WITHOUT ANY WARRANTY; without even the implied warranty of
12 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 # General Public License for more details.
15 # You should have received a copy of the GNU General Public License
16 # along with this program; if not, see <http://www.gnu.org/licenses/>.
18 #************************************************************************************
21 ####################################################################
23 # Step 1 : extract real initramfs to / #
25 ####################################################################
27 rm -rf /init /linuxrc /dev/ /root
29 vtSbinFileNum=$(ls -1 /sbin | wc -l)
30 if [ $vtSbinFileNum -eq 1 ]; then
31 echo "remove whole sbin directory" >> $VTLOG
34 echo "remove only sbin/init file" >> $VTLOG
39 ventoy_is_initrd_ramdisk() {
40 #As I known, PCLinuxOS/smgl use ramdisk
41 if echo $vtkerver | grep -i -q 'PCLinuxOS'; then
43 elif echo $vtkerver | grep -i -q 'SMGL-'; then
50 ventoy_mount_squashfs() {
52 mount -t devtmpfs devtmpfs /dev
53 dd if=$1 of=/dev/ram0 status=none
54 umount /dev && rm -rf /dev
57 # param: file skip magic tmp
58 ventoy_unpack_initramfs() {
59 vtfile=$1; vtskip=$2; vtmagic=$3; vttmp=$4
60 echo "=====ventoy_unpack_initramfs: #$*#" >> $VTLOG
63 #if [ "${vtmagic:0:4}" = '5678' ]; then
64 # echo -en '\x1F\x8B' | dd status=none of=$vtfile bs=1 count=2 conv=notrunc
68 if [ "${vtmagic:0:4}" = '6873' ]; then
69 ventoy_mount_squashfs $vtfile
73 for vtx in '1F8B zcat' '1F9E zcat' '425A bzcat' '5D00 lzcat' 'FD37 xzcat' '894C lzopcat' '0221 lz4cat' '28B5 zstdcat' '3037 cat' '4C5A lunzip -c'; do
74 if [ "${vtx:0:4}" = "${vtmagic:0:4}" ]; then
75 echo "vtx=$vtx" >> $VTLOG
76 if [ $vtskip -eq 0 ]; then
77 if [ "${vtx:5}" = "xzcat" ]; then
78 rm -f $VTOY_PATH/xzlog
79 ${vtx:5} $vtfile 2> $VTOY_PATH/xzlog | (cpio -idmu 2>>$VTLOG; cat > $vttmp)
80 if grep -q 'corrupted data' $VTOY_PATH/xzlog; then
81 echo 'xzcat failed, now try xzcat_musl ...' >> $VTLOG
82 xzcat_musl $vtfile | (cpio -idmu 2>>$VTLOG; cat > $vttmp)
85 ${vtx:5} $vtfile | (cpio -idmu 2>>$VTLOG; cat > $vttmp)
88 dd if=$vtfile skip=$vtskip iflag=skip_bytes status=none | ${vtx:5} | (cpio -idmu 2>>$VTLOG; cat > $vttmp)
95 # param: file magic tmp
96 ventoy_unpack_initrd() {
97 vtfile=$1; vtmagic=$2; vttmp=$3
98 echo "=====ventoy_unpack_initrd: #$*#" >> $VTLOG
100 for vtx in '1F8B zcat' '1F9E zcat' '425A bzcat' '5D00 lzcat' 'FD37 xzcat' '894C lzopcat' '0221 lz4cat' '28B5 zstdcat' '3037 cat'; do
101 if [ "${vtx:0:4}" = "${vtmagic:0:4}" ]; then
102 echo "vtx=$vtx" >> $VTLOG
103 ${vtx:5} $vtfile > $vttmp
110 # This export is for busybox cpio command
111 export EXTRACT_UNSAFE_SYMLINKS=1
113 for vtfile in $(ls /initrd*); do
114 #decompress first initrd
115 vtmagic=$(hexdump -n 2 -e '2/1 "%02X"' $vtfile)
117 if ventoy_is_initrd_ramdisk; then
118 ventoy_unpack_initrd $vtfile $vtmagic ${vtfile}_tmp
119 mv ${vtfile}_tmp $vtfile
122 ventoy_unpack_initramfs $vtfile 0 $vtmagic ${vtfile}_tmp
125 #only for cpio,cpio,...,initrd sequence, initrd,cpio or initrd,initrd sequence is not supported
126 while [ -e ${vtfile}_tmp ] && [ $(stat -c '%s' ${vtfile}_tmp) -gt 512 ]; do
127 mv ${vtfile}_tmp $vtfile
128 vtdump=$(hexdump -n 512 -e '512/1 "%02X"' $vtfile)
129 vtmagic=$(echo $vtdump | sed 's/^\(00\)*//')
130 let vtoffset="(${#vtdump}-${#vtmagic})/2"
132 if [ -z "$vtmagic" ]; then
133 echo "terminate with all zero data file" >> $VTLOG
137 ventoy_unpack_initramfs $vtfile $vtoffset ${vtmagic:0:4} ${vtfile}_tmp
140 rm -f $vtfile ${vtfile}_tmp
144 #break here for debug
145 if [ "$VTOY_BREAK_LEVEL" = "02" ] || [ "$VTOY_BREAK_LEVEL" = "12" ]; then
147 echo -e "\n\n\033[32m ################################################# \033[0m"
148 echo -e "\033[32m ################ VENTOY DEBUG ################### \033[0m"
149 echo -e "\033[32m ################################################# \033[0m \n"
150 if [ "$VTOY_BREAK_LEVEL" = "12" ]; then
153 exec $BUSYBOX_PATH/sh
157 ####################################################################
159 # Step 3 : Extract injection archive #
161 ####################################################################
162 ventoy_unpack_injection() {
163 vtmagic=$(hexdump -n 2 -e '2/1 "%02X"' $VTOY_PATH/ventoy_injection)
164 echo "ventoy_unpack_injection vtmagic=$vtmagic ..."
166 if [ "1F8B" = "$vtmagic" ] || [ "1F9E" = "$vtmagic" ]; then
167 echo "tar.gz tar -xzvf"
168 tar -xzvf $VTOY_PATH/ventoy_injection -C /
169 elif [ "425A" = "$vtmagic" ]; then
170 echo "tar.bz2 tar -xjvf"
171 tar -xjvf $VTOY_PATH/ventoy_injection -C /
172 elif [ "FD37" = "$vtmagic" ]; then
173 echo "tar.xz tar -xJvf"
174 tar -xJvf $VTOY_PATH/ventoy_injection -C /
175 elif [ "5D00" = "$vtmagic" ]; then
176 echo "tar.lzma tar -xavf"
177 tar -xavf $VTOY_PATH/ventoy_injection -C /
180 unzip -o $VTOY_PATH/ventoy_injection -d /
184 if [ -e $VTOY_PATH/ventoy_injection ]; then
185 echo "### decompress injection ... ###" >>$VTLOG
186 ventoy_unpack_injection > $VTOY_PATH/injection.log 2>&1
190 ####################################################################
192 # Step 4 : Hand over to ventoy_chain.sh #
194 ####################################################################
195 echo "Now hand over to ventoy.sh" >>$VTLOG
196 . $VTOY_PATH/tool/vtoytool_install.sh
198 export PATH=$VTOY_ORG_PATH
199 exec $BUSYBOX_PATH/sh $VTOY_PATH/ventoy_chain.sh