2 #************************************************************************************
3 # Copyright (c) 2020, longpanda <admin@ventoy.net>
5 # This program is free software; you can redistribute it and/or
6 # modify it under the terms of the GNU General Public License as
7 # published by the Free Software Foundation; either version 3 of the
8 # License, or (at your option) any later version.
10 # This program is distributed in the hope that it will be useful, but
11 # WITHOUT ANY WARRANTY; without even the implied warranty of
12 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 # General Public License for more details.
15 # You should have received a copy of the GNU General Public License
16 # along with this program; if not, see <http://www.gnu.org/licenses/>.
18 #************************************************************************************
21 ####################################################################
23 # Step 1 : extract real initramfs to / #
25 ####################################################################
27 rm -rf /init /linuxrc /dev/ /root
29 vtSbinFileNum=$(ls -1 /sbin | wc -l)
30 if [ $vtSbinFileNum -eq 1 ]; then
31 echo "remove whole sbin directory" >> $VTLOG
34 echo "remove only sbin/init file" >> $VTLOG
39 ventoy_is_initrd_ramdisk() {
40 #As I known, PCLinuxOS/smgl use ramdisk
41 if echo $vtkerver | grep -i -q 'PCLinuxOS'; then
43 elif echo $vtkerver | grep -i -q 'SMGL-'; then
50 ventoy_mount_squashfs() {
52 mount -t devtmpfs devtmpfs /dev
53 dd if=$1 of=/dev/ram0 status=none
54 umount /dev && rm -rf /dev
57 # param: file skip magic tmp
58 ventoy_unpack_initramfs() {
59 vtfile=$1; vtskip=$2; vtmagic=$3; vttmp=$4
60 echo "=====ventoy_unpack_initramfs: #$*#" >> $VTLOG
63 #if [ "${vtmagic:0:4}" = '5678' ]; then
64 # echo -en '\x1F\x8B' | dd status=none of=$vtfile bs=1 count=2 conv=notrunc
68 if [ "${vtmagic:0:4}" = '6873' ]; then
69 ventoy_mount_squashfs $vtfile
73 for vtx in '1F8B zcat' '1F9E zcat' '425A bzcat' '5D00 lzcat' 'FD37 xzcat' '894C lzopcat' '0221 lz4cat' '28B5 zstdcat' '3037 cat' '4C5A lunzip -c'; do
74 if [ "${vtx:0:4}" = "${vtmagic:0:4}" ]; then
75 echo "vtx=$vtx" >> $VTLOG
76 if [ $vtskip -eq 0 ]; then
77 if [ "${vtx:5}" = "xzcat" ]; then
78 rm -f $VTOY_PATH/xzlog
79 ${vtx:5} $vtfile 2> $VTOY_PATH/xzlog | (cpio -idmu 2>>$VTLOG; cat > $vttmp)
81 if grep -q 'corrupted data' $VTOY_PATH/xzlog; then
82 echo 'xzcat failed, now try xzminidec...' >> $VTLOG
83 cat $vtfile | xzminidec | (cpio -idmu 2>>$VTLOG; cat > $vttmp)
87 ${vtx:5} $vtfile | (cpio -idmu 2>>$VTLOG; cat > $vttmp)
90 dd if=$vtfile skip=$vtskip iflag=skip_bytes status=none | ${vtx:5} | (cpio -idmu 2>>$VTLOG; cat > $vttmp)
97 # param: file magic tmp
98 ventoy_unpack_initrd() {
99 vtfile=$1; vtmagic=$2; vttmp=$3
100 echo "=====ventoy_unpack_initrd: #$*#" >> $VTLOG
102 for vtx in '1F8B zcat' '1F9E zcat' '425A bzcat' '5D00 lzcat' 'FD37 xzcat' '894C lzopcat' '0221 lz4cat' '28B5 zstdcat' '3037 cat'; do
103 if [ "${vtx:0:4}" = "${vtmagic:0:4}" ]; then
104 echo "vtx=$vtx" >> $VTLOG
105 ${vtx:5} $vtfile > $vttmp
112 # This export is for busybox cpio command
113 export EXTRACT_UNSAFE_SYMLINKS=1
115 for vtfile in $(ls /initrd*); do
116 #decompress first initrd
117 vtmagic=$(hexdump -n 2 -e '2/1 "%02X"' $vtfile)
119 if ventoy_is_initrd_ramdisk; then
120 ventoy_unpack_initrd $vtfile $vtmagic ${vtfile}_tmp
121 mv ${vtfile}_tmp $vtfile
124 ventoy_unpack_initramfs $vtfile 0 $vtmagic ${vtfile}_tmp
127 #only for cpio,cpio,...,initrd sequence, initrd,cpio or initrd,initrd sequence is not supported
128 while [ -e ${vtfile}_tmp ] && [ $(stat -c '%s' ${vtfile}_tmp) -gt 512 ]; do
129 mv ${vtfile}_tmp $vtfile
130 vtdump=$(hexdump -n 512 -e '512/1 "%02X"' $vtfile)
131 vtmagic=$(echo $vtdump | sed 's/^\(00\)*//')
132 let vtoffset="(${#vtdump}-${#vtmagic})/2"
134 if [ -z "$vtmagic" ]; then
135 echo "terminate with all zero data file" >> $VTLOG
139 ventoy_unpack_initramfs $vtfile $vtoffset ${vtmagic:0:4} ${vtfile}_tmp
142 rm -f $vtfile ${vtfile}_tmp
146 #break here for debug
147 if [ "$VTOY_BREAK_LEVEL" = "02" ] || [ "$VTOY_BREAK_LEVEL" = "12" ]; then
149 echo -e "\n\n\033[32m ################################################# \033[0m"
150 echo -e "\033[32m ################ VENTOY DEBUG ################### \033[0m"
151 echo -e "\033[32m ################################################# \033[0m \n"
152 if [ "$VTOY_BREAK_LEVEL" = "12" ]; then
155 exec $BUSYBOX_PATH/sh
159 ####################################################################
161 # Step 3 : Extract injection archive #
163 ####################################################################
164 ventoy_unpack_injection() {
165 vtmagic=$(hexdump -n 2 -e '2/1 "%02X"' $VTOY_PATH/ventoy_injection)
166 echo "ventoy_unpack_injection vtmagic=$vtmagic ..."
168 if [ "1F8B" = "$vtmagic" ] || [ "1F9E" = "$vtmagic" ]; then
169 echo "tar.gz tar -xzvf"
170 tar -xzvf $VTOY_PATH/ventoy_injection -C /
171 elif [ "425A" = "$vtmagic" ]; then
172 echo "tar.bz2 tar -xjvf"
173 tar -xjvf $VTOY_PATH/ventoy_injection -C /
174 elif [ "FD37" = "$vtmagic" ]; then
175 echo "tar.xz tar -xJvf"
176 tar -xJvf $VTOY_PATH/ventoy_injection -C /
177 elif [ "5D00" = "$vtmagic" ]; then
178 echo "tar.lzma tar -xavf"
179 tar -xavf $VTOY_PATH/ventoy_injection -C /
182 unzip -o $VTOY_PATH/ventoy_injection -d /
186 if [ -e $VTOY_PATH/ventoy_injection ]; then
187 echo "### decompress injection ... ###" >>$VTLOG
188 ventoy_unpack_injection > $VTOY_PATH/injection.log 2>&1
192 ####################################################################
194 # Step 4 : Hand over to ventoy_chain.sh #
196 ####################################################################
197 echo "Now hand over to ventoy.sh" >>$VTLOG
198 . $VTOY_PATH/tool/vtoytool_install.sh
200 export PATH=$VTOY_ORG_PATH
201 exec $BUSYBOX_PATH/sh $VTOY_PATH/ventoy_chain.sh