"/pup_new/mnt/unrootfs/init"
Was there other differences too?
That code block you were referring to should be read with the last line to receive enlightenment:gyro wrote:Patriot,
I was just reviewing my code changes to the init script in initrd.gz, and I noticed something odd with your code: ........
Code: Select all
# Patriot: init from tmpfs
mkdir -p /pup_new/mnt/unrootfs
mount -t tmpfs tmpfs /pup_new/mnt/unrootfs -o size=4m
cp /bin/busybox /pup_new/mnt/unrootfs/init
if [ "$(readlink /pup_new/sbin/init)" != "/mnt/unrootfs/init" ]; then
ln -sf /mnt/unrootfs/init /pup_new/sbin/init
fi
sync
exec switch_root /pup_new /sbin/init
Thanks for the explanation.Patriot wrote:That code block you were referring to should be read with the last line to receive enlightenment:
Code: Select all
# Find and detach loop devices
for onelodev in $(losetup|tr -d " ")
Code: Select all
# Find and detach loop devices
current_loops=$(expr $(ls -1 /dev/loop* | wc -l) - 1)
for n in $(seq 0 $current_loops); do
losetup -d /dev/loop${n} 2>/dev/null
done
Code: Select all
# Find and detach loop devices
for onelodev in $(grep "^/dev/loop" /proc/mounts | tr -s " " ":")
do
losetup -d ${onelodev%%:*} 2>/dev/null
sync
done
My guess is, yes. I would defer to Patriot on this, but I don't think having an encrypted pupsave should make any difference. Just change the scripts as outlined by Patriot.AlexS wrote:i've tried to follow this thread, but i have one question: can these fixes be applied to a ext2 encrypted pupsave? If not how could one implement that? I need encrypted pupsaves for real world usage.