diff options
54 files changed, 1131 insertions, 657 deletions
@@ -45,6 +45,9 @@ install: install -m755 -d $(ROOT)/etc/rc.d $(ROOT)/etc/sysconfig install -m755 rc.d/rc rc.d/rc.local rc.d/rc.sysinit $(ROOT)/etc/rc.d/ cp -af rc.d/init.d $(ROOT)/etc/rc.d/ + cp -af rc.d/rcS.d $(ROOT)/etc/rc.d/ + mkdir -p $(ROOT)/lib/systemd/system + cp -af systemd/rcS*.service $(ROOT)/lib/systemd/system install -m644 sysconfig/debug sysconfig/init sysconfig/netconsole sysconfig/readonly-root $(ROOT)/etc/sysconfig/ cp -af sysconfig/network-scripts $(ROOT)/etc/sysconfig/ cp -af ppp NetworkManager init $(ROOT)/etc @@ -170,4 +173,4 @@ archive: clean syntax-check tag changelog @sha1sum initscripts-$(VERSION).tar.bz2 > initscripts-$(VERSION).sha1sum @scp initscripts-$(VERSION).tar.bz2 initscripts-$(VERSION).sha1sum fedorahosted.org:initscripts 2>/dev/null|| scp initscripts-$(VERSION).tar.bz2 initscripts-$(VERSION).sha1sum fedorahosted.org:/srv/web/releases/i/n/initscripts @echo "Everything done, files uploaded to Fedorahosted.org" -
\ No newline at end of file + diff --git a/initscripts.spec b/initscripts.spec index 55ac44d3..b54107ee 100644 --- a/initscripts.spec +++ b/initscripts.spec @@ -39,7 +39,9 @@ Requires: SysVinit >= 2.85-38 Requires: /sbin/ip, /sbin/arping, net-tools, /bin/find Requires: /etc/system-release Requires: /sbin/runuser -Requires: udev >= 125-1 +Requires: udev >= 160-8 +Requires: systemd-units +Conflicts: systemd < 4-4 Requires: cpio Conflicts: mkinitrd < 4.0, kernel < 2.6.18, mdadm < 3.1.2-9 Conflicts: ypbind < 1.6-12, psacct < 6.3.2-12, kbd < 1.06-19, lokkit < 0.50-14 @@ -133,6 +135,21 @@ if [ $1 -eq 1 ]; then fi %endif +%posttrans +%if %{_with_systemd} +for i in \ + rcS-autoswap.service rcS-cleanup.service rcS-configure.service \ + rcS-dmesg.service rcS-dmraid.service rcS-initcrypto1.service \ + rcS-initcrypto2.service rcS-initcrypto3.service rcS-kernelparam.service \ + rcS-loaddmmod.service rcS-loadmodules.service rcS-lvm.service \ + rcS-mdraid.service rcS-mountall.service rcS-multipath.service \ + rcS-quota.service rcS-random.service rcS-selinuxrelabel.service \ + rcS-sysinitend.service rcS-waitscan.service ;do + /bin/systemctl enable $i ; +done +: +%endif + %preun if [ $1 = 0 ]; then /sbin/chkconfig --del netfs @@ -254,6 +271,8 @@ rm -rf $RPM_BUILD_ROOT /lib/udev/console_check /sbin/service /sbin/ppp-watch +/etc/rc.d/rcS.d/* +/lib/systemd/system/rcS*.service %{_mandir}/man*/* %dir %attr(775,root,root) /var/run/netreport %dir /etc/ppp diff --git a/rc.d/rc.sysinit b/rc.d/rc.sysinit index ff003e92..777dae31 100755 --- a/rc.d/rc.sysinit +++ b/rc.d/rc.sysinit @@ -2,659 +2,6 @@ # # /etc/rc.d/rc.sysinit - run once at boot time # -# Taken in part from Miquel van Smoorenburg's bcheckrc. -# - -HOSTNAME=$(/bin/hostname) - -set -m - -if [ -f /etc/sysconfig/network ]; then - . /etc/sysconfig/network -fi -if [ -z "$HOSTNAME" -o "$HOSTNAME" = "(none)" ]; then - HOSTNAME=localhost -fi - -if [ ! -e /proc/mounts ]; then - mount -n -t proc /proc /proc - mount -n -t sysfs /sys /sys >/dev/null 2>&1 -fi -if [ ! -d /proc/bus/usb ]; then - modprobe usbcore >/dev/null 2>&1 && mount -n -t usbfs /proc/bus/usb /proc/bus/usb -else - mount -n -t usbfs /proc/bus/usb /proc/bus/usb -fi - -. /etc/init.d/functions - -PLYMOUTH= -[ -x /usr/bin/plymouth ] && PLYMOUTH=yes - -# Check SELinux status -SELINUX_STATE= -if [ -e "/selinux/enforce" ] && [ "$(cat /proc/self/attr/current)" != "kernel" ]; then - if [ -r "/selinux/enforce" ] ; then - SELINUX_STATE=$(cat "/selinux/enforce") - else - # assume enforcing if you can't read it - SELINUX_STATE=1 - fi -fi - -if [ -n "$SELINUX_STATE" ] && [ -x /sbin/restorecon ] && __fgrep " /dev " /proc/mounts >/dev/null 2>&1 ; then - /sbin/restorecon -R /dev 2>/dev/null -fi - -disable_selinux() { - echo $"*** Warning -- SELinux is active" - echo $"*** Disabling security enforcement for system recovery." - echo $"*** Run 'setenforce 1' to reenable." - echo "0" > "/selinux/enforce" -} - -relabel_selinux() { - # if /sbin/init is not labeled correctly this process is running in the - # wrong context, so a reboot will be required after relabel - AUTORELABEL= - . /etc/selinux/config - echo "0" > /selinux/enforce - [ -n "$PLYMOUTH" ] && plymouth --hide-splash - - if [ "$AUTORELABEL" = "0" ]; then - echo - echo $"*** Warning -- SELinux ${SELINUXTYPE} policy relabel is required. " - echo $"*** /etc/selinux/config indicates you want to manually fix labeling" - echo $"*** problems. Dropping you to a shell; the system will reboot" - echo $"*** when you leave the shell." - sulogin - - else - echo - echo $"*** Warning -- SELinux ${SELINUXTYPE} policy relabel is required." - echo $"*** Relabeling could take a very long time, depending on file" - echo $"*** system size and speed of hard drives." - - /sbin/fixfiles -F restore > /dev/null 2>&1 - fi - rm -f /.autorelabel - echo $"Unmounting file systems" - umount -a - mount -n -o remount,ro / - echo $"Automatic reboot in progress." - reboot -f -} - -# Print a text banner. -echo -en $"\t\tWelcome to " -read -r system_release < /etc/system-release -if [[ "$system_release" == *"Red Hat"* ]]; then - [ "$BOOTUP" = "color" ] && echo -en "\\033[0;31m" - echo -en "Red Hat" - [ "$BOOTUP" = "color" ] && echo -en "\\033[0;39m" - PRODUCT=$(sed "s/Red Hat \(.*\) release.*/\1/" /etc/system-release) - echo " $PRODUCT" -elif [[ "$system_release" == *Fedora* ]]; then - [ "$BOOTUP" = "color" ] && echo -en "\\033[0;34m" - echo -en "Fedora" - [ "$BOOTUP" = "color" ] && echo -en "\\033[0;39m" - PRODUCT=$(sed "s/Fedora \(.*\) \?release.*/\1/" /etc/system-release) - echo " $PRODUCT" -else - PRODUCT=$(sed "s/ release.*//g" /etc/system-release) - echo "$PRODUCT" -fi - -# Only read this once. -cmdline=$(cat /proc/cmdline) - -# Initialize hardware -if [ -f /proc/sys/kernel/modprobe ]; then - if ! strstr "$cmdline" nomodules && [ -f /proc/modules ] ; then - sysctl -w kernel.modprobe="/sbin/modprobe" >/dev/null 2>&1 - else - # We used to set this to NULL, but that causes 'failed to exec' messages" - sysctl -w kernel.modprobe="/bin/true" >/dev/null 2>&1 - fi -fi - -touch /dev/.in_sysinit >/dev/null 2>&1 - -# Set default affinity -if [ -x /bin/taskset ]; then - if strstr "$cmdline" default_affinity= ; then - for arg in $cmdline ; do - if [ "${arg##default_affinity=}" != "${arg}" ]; then - /bin/taskset -p ${arg##default_affinity=} 1 - fi - done - fi -fi - -nashpid=$(pidof nash 2>/dev/null) -[ -n "$nashpid" ] && kill $nashpid >/dev/null 2>&1 -unset nashpid -/sbin/start_udev - -# Load other user-defined modules -for file in /etc/sysconfig/modules/*.modules ; do - [ -x $file ] && $file +for i in /etc/rc.d/rcS.d/*.sh; do + . $i done - -# Load modules (for backward compatibility with VARs) -if [ -f /etc/rc.modules ]; then - /etc/rc.modules -fi - -mount -n /dev/pts >/dev/null 2>&1 -[ -n "$SELINUX_STATE" ] && restorecon /dev/pts >/dev/null 2>&1 - -# Configure kernel parameters -update_boot_stage RCkernelparam -sysctl -e -p /etc/sysctl.conf >/dev/null 2>&1 - -# Set the hostname. -update_boot_stage RChostname -action $"Setting hostname ${HOSTNAME}: " hostname ${HOSTNAME} - -# Sync waiting for storage. -{ rmmod scsi_wait_scan ; modprobe scsi_wait_scan ; rmmod scsi_wait_scan ; } >/dev/null 2>&1 - -# Device mapper & related initialization -if ! __fgrep "device-mapper" /proc/devices >/dev/null 2>&1 ; then - modprobe dm-mod >/dev/null 2>&1 -fi - -if [ -f /etc/crypttab ]; then - init_crypto 0 -fi - -if ! strstr "$cmdline" nompath && [ -f /etc/multipath.conf ] && \ - [ -x /sbin/multipath ]; then - modprobe dm-multipath > /dev/null 2>&1 - /sbin/multipath -v 0 - if [ -x /sbin/kpartx ]; then - /sbin/dmsetup ls --target multipath --exec "/sbin/kpartx -a -p p" >/dev/null - fi -fi - -if ! strstr "$cmdline" nodmraid && [ -x /sbin/dmraid ]; then - modprobe dm-mirror >/dev/null 2>&1 - dmraidsets=$(LC_ALL=C /sbin/dmraid -s -c -i) - if [ "$?" = "0" ]; then - for dmname in $dmraidsets; do - if [[ "$dmname" == isw_* ]] && \ - ! strstr "$cmdline" noiswmd; then - continue - fi - /sbin/dmraid -ay -i --rm_partitions -p "$dmname" >/dev/null 2>&1 - /sbin/kpartx -a -p p "/dev/mapper/$dmname" - done - fi -fi - -# Start any MD RAID arrays that haven't been started yet -[ -r /proc/mdstat -a -r /dev/md/md-device-map ] && /sbin/mdadm -IRs - -if [ -x /sbin/lvm ]; then - action $"Setting up Logical Volume Management:" /sbin/lvm vgchange -a y --sysinit -fi - -if [ -f /etc/crypttab ]; then - init_crypto 0 -fi - -if [ -f /fastboot ] || strstr "$cmdline" fastboot ; then - fastboot=yes -fi - -if [ -f /fsckoptions ]; then - fsckoptions=$(cat /fsckoptions) -fi - -if [ -f /forcefsck ] || strstr "$cmdline" forcefsck ; then - fsckoptions="-f $fsckoptions" -elif [ -f /.autofsck ]; then - [ -f /etc/sysconfig/autofsck ] && . /etc/sysconfig/autofsck - if [ "$AUTOFSCK_DEF_CHECK" = "yes" ]; then - AUTOFSCK_OPT="$AUTOFSCK_OPT -f" - fi - if [ -n "$AUTOFSCK_SINGLEUSER" ]; then - [ -n "$PLYMOUTH" ] && plymouth --hide-splash - echo - echo $"*** Warning -- the system did not shut down cleanly. " - echo $"*** Dropping you to a shell; the system will continue" - echo $"*** when you leave the shell." - [ -n "$SELINUX_STATE" ] && echo "0" > /selinux/enforce - sulogin - [ -n "$SELINUX_STATE" ] && echo "1" > /selinux/enforce - [ -n "$PLYMOUTH" ] && plymouth --show-splash - fi - fsckoptions="$AUTOFSCK_OPT $fsckoptions" -fi - -if [ "$BOOTUP" = "color" ]; then - fsckoptions="-C $fsckoptions" -else - fsckoptions="-V $fsckoptions" -fi - -READONLY= -if [ -f /etc/sysconfig/readonly-root ]; then - . /etc/sysconfig/readonly-root -fi -if strstr "$cmdline" readonlyroot ; then - READONLY=yes - [ -z "$RW_MOUNT" ] && RW_MOUNT=/var/lib/stateless/writable - [ -z "$STATE_MOUNT" ] && STATE_MOUNT=/var/lib/stateless/state -fi -if strstr "$cmdline" noreadonlyroot ; then - READONLY=no -fi - -if [ "$READONLY" = "yes" -o "$TEMPORARY_STATE" = "yes" ]; then - - mount_empty() { - if [ -e "$1" ]; then - echo "$1" | cpio -p -vd "$RW_MOUNT" &>/dev/null - mount -n --bind "$RW_MOUNT$1" "$1" - fi - } - - mount_dirs() { - if [ -e "$1" ]; then - mkdir -p "$RW_MOUNT$1" - find "$1" -type d -print0 | cpio -p -0vd "$RW_MOUNT" &>/dev/null - mount -n --bind "$RW_MOUNT$1" "$1" - fi - } - - mount_files() { - if [ -e "$1" ]; then - cp -a --parents "$1" "$RW_MOUNT" - mount -n --bind "$RW_MOUNT$1" "$1" - fi - } - - # Common mount options for scratch space regardless of - # type of backing store - mountopts= - - # Scan partitions for local scratch storage - rw_mount_dev=$(blkid -t LABEL="$RW_LABEL" -l -o device) - - # First try to mount scratch storage from /etc/fstab, then any - # partition with the proper label. If either succeeds, be sure - # to wipe the scratch storage clean. If both fail, then mount - # scratch storage via tmpfs. - if mount $mountopts "$RW_MOUNT" > /dev/null 2>&1 ; then - rm -rf "$RW_MOUNT" > /dev/null 2>&1 - elif [ x$rw_mount_dev != x ] && mount $rw_mount_dev $mountopts "$RW_MOUNT" > /dev/null 2>&1; then - rm -rf "$RW_MOUNT" > /dev/null 2>&1 - else - mount -n -t tmpfs $RW_OPTIONS $mountopts none "$RW_MOUNT" - fi - - for file in /etc/rwtab /etc/rwtab.d/* /dev/.initramfs/rwtab ; do - is_ignored_file "$file" && continue - [ -f $file ] && cat $file | while read type path ; do - case "$type" in - empty) - mount_empty $path - ;; - files) - mount_files $path - ;; - dirs) - mount_dirs $path - ;; - *) - ;; - esac - [ -n "$SELINUX_STATE" ] && [ -e "$path" ] && restorecon -R "$path" - done - done - - # Use any state passed by initramfs - [ -d /dev/.initramfs/state ] && cp -a /dev/.initramfs/state/* $RW_MOUNT - - # In theory there should be no more than one network interface active - # this early in the boot process -- the one we're booting from. - # Use the network address to set the hostname of the client. This - # must be done even if we have local storage. - ipaddr= - if [ "$HOSTNAME" = "localhost" -o "$HOSTNAME" = "localhost.localdomain" ]; then - ipaddr=$(ip addr show to 0.0.0.0/0 scope global | awk '/[[:space:]]inet / { print gensub("/.*","","g",$2) }') - for ip in $ipaddr ; do - HOSTNAME= - eval $(ipcalc -h $ipaddr 2>/dev/null) - [ -n "$HOSTNAME" ] && { hostname ${HOSTNAME} ; break; } - done - fi - - # Clients with read-only root filesystems may be provided with a - # place where they can place minimal amounts of persistent - # state. SSH keys or puppet certificates for example. - # - # Ideally we'll use puppet to manage the state directory and to - # create the bind mounts. However, until that's all ready this - # is sufficient to build a working system. - - # First try to mount persistent data from /etc/fstab, then any - # partition with the proper label, then fallback to NFS - state_mount_dev=$(blkid -t LABEL="$STATE_LABEL" -l -o device) - if mount $mountopts $STATE_OPTIONS "$STATE_MOUNT" > /dev/null 2>&1 ; then - /bin/true - elif [ x$state_mount_dev != x ] && mount $state_mount_dev $mountopts "$STATE_MOUNT" > /dev/null 2>&1; then - /bin/true - elif [ ! -z "$CLIENTSTATE" ]; then - # No local storage was found. Make a final attempt to find - # state on an NFS server. - - mount -t nfs $CLIENTSTATE/$HOSTNAME $STATE_MOUNT -o rw,nolock - fi - - if [ -w "$STATE_MOUNT" ]; then - - mount_state() { - if [ -e "$1" ]; then - [ ! -e "$STATE_MOUNT$1" ] && cp -a --parents "$1" "$STATE_MOUNT" - mount -n --bind "$STATE_MOUNT$1" "$1" - fi - } - - for file in /etc/statetab /etc/statetab.d/* ; do - is_ignored_file "$file" && continue - [ ! -f "$file" ] && continue - - if [ -f "$STATE_MOUNT/$file" ] ; then - mount -n --bind "$STATE_MOUNT/$file" "$file" - fi - - for path in $(grep -v "^#" "$file" 2>/dev/null); do - mount_state "$path" - [ -n "$SELINUX_STATE" ] && [ -e "$path" ] && restorecon -R "$path" - done - done - - if [ -f "$STATE_MOUNT/files" ] ; then - for path in $(grep -v "^#" "$STATE_MOUNT/files" 2>/dev/null); do - mount_state "$path" - [ -n "$SELINUX_STATE" ] && [ -e "$path" ] && restorecon -R "$path" - done - fi - fi -fi - -if [[ " $fsckoptions" != *" -y"* ]]; then - fsckoptions="-a $fsckoptions" -fi - -_RUN_QUOTACHECK=0 -if strstr "$cmdline" forcequotacheck || [ -f /forcequotacheck ] ; then - _RUN_QUOTACHECK=1 -fi -if [ -z "$fastboot" -a "$READONLY" != "yes" ]; then - - STRING=$"Checking filesystems" - echo $STRING - fsck -T -t noopts=_netdev -A $fsckoptions - rc=$? - - if [ "$rc" -eq "0" ]; then - success "$STRING" - echo - elif [ "$rc" -eq "1" ]; then - passed "$STRING" - echo - elif [ "$rc" -eq "2" -o "$rc" -eq "3" ]; then - echo $"Unmounting file systems" - umount -a - mount -n -o remount,ro / - echo $"Automatic reboot in progress." - reboot -f - fi - - # A return of 4 or higher means there were serious problems. - if [ $rc -gt 1 ]; then - [ -n "$PLYMOUTH" ] && plymouth --hide-splash - - failure "$STRING" - echo - echo - echo $"*** An error occurred during the file system check." - echo $"*** Dropping you to a shell; the system will reboot" - echo $"*** when you leave the shell." - - str=$"(Repair filesystem)" - PS1="$str \# # "; export PS1 - [ "$SELINUX_STATE" = "1" ] && disable_selinux - sulogin - - echo $"Unmounting file systems" - umount -a - mount -n -o remount,ro / - echo $"Automatic reboot in progress." - reboot -f - elif [ "$rc" -eq "1" ]; then - _RUN_QUOTACHECK=1 - fi -fi - -remount_needed() { - local state oldifs - [ "$READONLY" = "yes" ] && return 1 - state=$(LC_ALL=C awk '/ \/ / && ($3 !~ /rootfs/) { print $4 }' /proc/mounts) - oldifs=$IFS - IFS="," - for opt in $state ; do - if [ "$opt" = "rw" ]; then - IFS=$oldifs - return 1 - fi - done - IFS=$oldifs - return 0 -} - -# Remount the root filesystem read-write. -update_boot_stage RCmountfs -if remount_needed ; then - action $"Remounting root filesystem in read-write mode: " mount -n -o remount,rw / -fi - -# Clean up SELinux labels -if [ -n "$SELINUX_STATE" ]; then - restorecon /etc/mtab /etc/ld.so.cache /etc/blkid/blkid.tab /etc/resolv.conf >/dev/null 2>&1 -fi - -# If relabeling, relabel mount points. -if [ -n "$SELINUX_STATE" -a "$READONLY" != "yes" ]; then - if strstr "$cmdline" autorelabel || [ -f /.autorelabel ] ; then - restorecon $(awk '!/^#/ && $4 !~ /noauto/ && $2 ~ /^\// { print $2 }' /etc/fstab) >/dev/null 2>&1 - fi -fi - -if [ "$READONLY" != "yes" ] ; then - # Clear mtab - (> /etc/mtab) &> /dev/null - - # Remove stale backups - rm -f /etc/mtab~ /etc/mtab~~ - - # Enter mounted filesystems into /etc/mtab - mount -f / - mount -f /proc >/dev/null 2>&1 - mount -f /sys >/dev/null 2>&1 - mount -f /dev/pts >/dev/null 2>&1 - mount -f /dev/shm >/dev/null 2>&1 - mount -f /proc/bus/usb >/dev/null 2>&1 -fi - -# Mount all other filesystems (except for NFS and /proc, which is already -# mounted). Contrary to standard usage, -# filesystems are NOT unmounted in single user mode. -if [ "$READONLY" != "yes" ] ; then - action $"Mounting local filesystems: " mount -a -t nonfs,nfs4,smbfs,ncpfs,cifs,gfs,gfs2 -O no_netdev -else - action $"Mounting local filesystems: " mount -a -n -t nonfs,nfs4,smbfs,ncpfs,cifs,gfs,gfs2 -O no_netdev -fi - -# Update quotas if necessary -if [ X"$_RUN_QUOTACHECK" = X1 ] && [ -x /sbin/quotacheck ]; then - action $"Checking local filesystem quotas: " /sbin/quotacheck -anug -fi - -if [ -x /sbin/quotaon ]; then - action $"Enabling local filesystem quotas: " /sbin/quotaon -aug -fi - -# Check to see if a full relabel is needed -if [ -n "$SELINUX_STATE" -a "$READONLY" != "yes" ]; then - if strstr "$cmdline" autorelabel || [ -f /.autorelabel ] ; then - relabel_selinux - fi -else - if [ "$READONLY" != "yes" ] && [ -d /etc/selinux ]; then - [ -f /.autorelabel ] || touch /.autorelabel - fi -fi - -# Initialize pseudo-random number generator -if [ -f "/var/lib/random-seed" ]; then - cat /var/lib/random-seed > /dev/urandom -else - [ "$READONLY" != "yes" ] && touch /var/lib/random-seed -fi -if [ "$READONLY" != "yes" ]; then - chmod 600 /var/lib/random-seed - dd if=/dev/urandom of=/var/lib/random-seed count=1 bs=512 2>/dev/null -fi - -if [ -f /etc/crypttab ]; then - init_crypto 1 -fi - -# Configure machine if necessary. -if [ -f /.unconfigured ]; then - if [ -x /usr/bin/rhgb-client ] && /usr/bin/rhgb-client --ping ; then - /usr/bin/rhgb-client --quit - fi - - if [ -x /usr/bin/system-config-keyboard ]; then - /usr/bin/system-config-keyboard - fi - if [ -x /usr/bin/passwd ]; then - /usr/bin/passwd root - fi - if [ -x /usr/sbin/system-config-network-tui ]; then - /usr/sbin/system-config-network-tui - fi - if [ -x /usr/sbin/timeconfig ]; then - /usr/sbin/timeconfig - fi - if [ -x /usr/sbin/authconfig-tui ]; then - /usr/sbin/authconfig-tui --nostart - fi - if [ -x /usr/sbin/ntsysv ]; then - /usr/sbin/ntsysv --level 35 - fi - - # Reread in network configuration data. - if [ -f /etc/sysconfig/network ]; then - . /etc/sysconfig/network - - # Reset the hostname. - action $"Resetting hostname ${HOSTNAME}: " hostname ${HOSTNAME} - fi - - rm -f /.unconfigured -fi - -# Clean out /. -rm -f /fastboot /fsckoptions /forcefsck /.autofsck /forcequotacheck /halt \ - /poweroff /.suspended &> /dev/null - -# Do we need (w|u)tmpx files? We don't set them up, but the sysadmin might... -_NEED_XFILES= -[ -f /var/run/utmpx ] || [ -f /var/log/wtmpx ] && _NEED_XFILES=1 - -# Clean up /var. -rm -rf /var/lock/cvs/* /var/run/screen/* -find /var/lock /var/run ! -type d -exec rm -f {} \; -rm -f /var/lib/rpm/__db* &> /dev/null -rm -f /var/gdm/.gdmfifo &> /dev/null - -# Clean up utmp/wtmp -> /var/run/utmp -touch /var/log/wtmp /var/log/btmp -chgrp utmp /var/run/utmp /var/log/wtmp /var/log/btmp -chmod 0664 /var/run/utmp /var/log/wtmp -chmod 0600 /var/log/btmp -if [ -n "$_NEED_XFILES" ]; then - > /var/run/utmpx - touch /var/log/wtmpx - chgrp utmp /var/run/utmpx /var/log/wtmpx - chmod 0664 /var/run/utmpx /var/log/wtmpx -fi -[ -n "$SELINUX_STATE" ] && restorecon /var/run/utmp* /var/log/wtmp* >/dev/null 2>&1 - -# Clean up various /tmp bits -[ -n "$SELINUX_STATE" ] && restorecon /tmp -rm -f /tmp/.X*-lock /tmp/.lock.* /tmp/.gdm_socket /tmp/.s.PGSQL.* -rm -rf /tmp/.X*-unix /tmp/.ICE-unix /tmp/.font-unix /tmp/hsperfdata_* \ - /tmp/kde-* /tmp/ksocket-* /tmp/mc-* /tmp/mcop-* /tmp/orbit-* \ - /tmp/scrollkeeper-* /tmp/ssh-* \ - /dev/.in_sysinit - -# Make ICE directory -mkdir -m 1777 -p /tmp/.ICE-unix >/dev/null 2>&1 -chown root:root /tmp/.ICE-unix -[ -n "$SELINUX_STATE" ] && restorecon /tmp/.ICE-unix >/dev/null 2>&1 - -# Start up swapping. -update_boot_stage RCswap -action $"Enabling /etc/fstab swaps: " swapon -a -e -if [ "$AUTOSWAP" = "yes" ]; then - curswap=$(awk '/^\/dev/ { print $1 }' /proc/swaps | while read x; do get_numeric_dev dec $x ; echo -n " "; done) - swappartitions=$(blkid -t TYPE=swap -o device) - if [ x"$swappartitions" != x ]; then - for partition in $swappartitions ; do - [ ! -e $partition ] && continue - majmin=$(get_numeric_dev dec $partition) - echo $curswap | grep -qw "$majmin" || action $"Enabling local swap partitions: " swapon $partition - done - fi -fi - -# Set up binfmt_misc -/bin/mount -t binfmt_misc none /proc/sys/fs/binfmt_misc > /dev/null 2>&1 - -# Boot time profiles. Yes, this should be somewhere else. -if [ -x /usr/sbin/system-config-network-cmd ]; then - if strstr "$cmdline" netprofile= ; then - for arg in $cmdline ; do - if [ "${arg##netprofile=}" != "${arg}" ]; then - /usr/sbin/system-config-network-cmd --profile ${arg##netprofile=} - fi - done - fi -fi - -# Now that we have all of our basic modules loaded and the kernel going, -# let's dump the syslog ring somewhere so we can find it later -[ -f /var/log/dmesg ] && mv -f /var/log/dmesg /var/log/dmesg.old -dmesg -s 131072 > /var/log/dmesg - -# create the crash indicator flag to warn on crashes, offer fsck with timeout -touch /.autofsck &> /dev/null - -if strstr "$cmdline" confirm ; then - touch /var/run/confirm -fi - -# Let rhgb know that we're leaving rc.sysinit -if [ -x /usr/bin/rhgb-client ] && /usr/bin/rhgb-client --ping ; then - /usr/bin/rhgb-client --sysinit -fi - diff --git a/rc.d/rcS.d/010-hostname.sh b/rc.d/rcS.d/010-hostname.sh new file mode 100755 index 00000000..713a3a37 --- /dev/null +++ b/rc.d/rcS.d/010-hostname.sh @@ -0,0 +1,11 @@ +#!/bin/sh +HOSTNAME=$(/bin/hostname) + +if [ -f /etc/sysconfig/network ]; then + . /etc/sysconfig/network +fi +if [ -z "$HOSTNAME" -o "$HOSTNAME" = "(none)" ]; then + HOSTNAME=localhost +fi +hostname ${HOSTNAME} +: diff --git a/rc.d/rcS.d/020-mountbasic.sh b/rc.d/rcS.d/020-mountbasic.sh new file mode 100755 index 00000000..9448be61 --- /dev/null +++ b/rc.d/rcS.d/020-mountbasic.sh @@ -0,0 +1,11 @@ +#!/bin/sh +if [ ! -e /proc/mounts ]; then + mount -n -t proc /proc /proc + mount -n -t sysfs /sys /sys >/dev/null 2>&1 +fi +if [ ! -d /proc/bus/usb ]; then + modprobe usbcore >/dev/null 2>&1 && mount -n -t usbfs /proc/bus/usb /proc/bus/usb +else + mount -n -t usbfs /proc/bus/usb /proc/bus/usb +fi +: diff --git a/rc.d/rcS.d/030-welcome.sh b/rc.d/rcS.d/030-welcome.sh new file mode 100755 index 00000000..e7d8248c --- /dev/null +++ b/rc.d/rcS.d/030-welcome.sh @@ -0,0 +1,28 @@ +#!/bin/sh +[[ $(type -t strstr) = "function" ]] || . /etc/init.d/functions +[[ $cmdline ]] || cmdline=$(cat /proc/cmdline) + +# Print a text banner. +echo -en $"\t\tWelcome to " +read -r system_release < /etc/system-release +if [[ "$system_release" == *"Red Hat"* ]]; then + [ "$BOOTUP" = "color" ] && echo -en "\\033[0;31m" + echo -en "Red Hat" + [ "$BOOTUP" = "color" ] && echo -en "\\033[0;39m" + PRODUCT=$(sed "s/Red Hat \(.*\) release.*/\1/" /etc/system-release) + echo " $PRODUCT" +elif [[ "$system_release" == *Fedora* ]]; then + [ "$BOOTUP" = "color" ] && echo -en "\\033[0;34m" + echo -en "Fedora" + [ "$BOOTUP" = "color" ] && echo -en "\\033[0;39m" + PRODUCT=$(sed "s/Fedora \(.*\) \?release.*/\1/" /etc/system-release) + echo " $PRODUCT" +else + PRODUCT=$(sed "s/ release.*//g" /etc/system-release) + echo "$PRODUCT" +fi +if [ "$PROMPT" != "no" ]; then + echo -en $"\t\tPress 'I' to enter interactive startup." + echo +fi +: diff --git a/rc.d/rcS.d/040-setmodprobe.sh b/rc.d/rcS.d/040-setmodprobe.sh new file mode 100755 index 00000000..66003357 --- /dev/null +++ b/rc.d/rcS.d/040-setmodprobe.sh @@ -0,0 +1,14 @@ +#!/bin/sh +[[ $(type -t strstr) = "function" ]] || . /etc/init.d/functions +[[ $cmdline ]] || cmdline=$(cat /proc/cmdline) + +# Initialize hardware +if [ -f /proc/sys/kernel/modprobe ]; then + if ! strstr "$cmdline" nomodules && [ -f /proc/modules ] ; then + sysctl -w kernel.modprobe="/sbin/modprobe" >/dev/null 2>&1 + else + # We used to set this to NULL, but that causes 'failed to exec' messages" + sysctl -w kernel.modprobe="/bin/true" >/dev/null 2>&1 + fi +fi +: diff --git a/rc.d/rcS.d/060-taskaffinity.sh b/rc.d/rcS.d/060-taskaffinity.sh new file mode 100755 index 00000000..c8045d40 --- /dev/null +++ b/rc.d/rcS.d/060-taskaffinity.sh @@ -0,0 +1,15 @@ +#!/bin/sh +[[ $(type -t strstr) = "function" ]] || . /etc/init.d/functions +[[ $cmdline ]] || cmdline=$(cat /proc/cmdline) + +# Set default affinity +if [ -x /bin/taskset ]; then + if strstr "$cmdline" default_affinity= ; then + for arg in $cmdline ; do + if [ "${arg##default_affinity=}" != "${arg}" ]; then + /bin/taskset -p ${arg##default_affinity=} 1 + fi + done + fi +fi +: diff --git a/rc.d/rcS.d/070-startudev.sh b/rc.d/rcS.d/070-startudev.sh new file mode 100755 index 00000000..04874038 --- /dev/null +++ b/rc.d/rcS.d/070-startudev.sh @@ -0,0 +1,3 @@ +#!/bin/sh +/sbin/start_udev +: diff --git a/rc.d/rcS.d/080-devpts.sh b/rc.d/rcS.d/080-devpts.sh new file mode 100755 index 00000000..d2fa937a --- /dev/null +++ b/rc.d/rcS.d/080-devpts.sh @@ -0,0 +1,15 @@ +#!/bin/sh +# Check SELinux status +SELINUX_STATE= +if [ -e "/selinux/enforce" ] && [ "$(cat /proc/self/attr/current)" != "kernel" ]; then + if [ -r "/selinux/enforce" ] ; then + SELINUX_STATE=$(cat "/selinux/enforce") + else + # assume enforcing if you can't read it + SELINUX_STATE=1 + fi +fi + +mount -n /dev/pts >/dev/null 2>&1 +[ -n "$SELINUX_STATE" ] && restorecon /dev/pts >/dev/null 2>&1 +: diff --git a/rc.d/rcS.d/090-loadmodules.sh b/rc.d/rcS.d/090-loadmodules.sh new file mode 100755 index 00000000..4ad4bbad --- /dev/null +++ b/rc.d/rcS.d/090-loadmodules.sh @@ -0,0 +1,12 @@ +#!/bin/sh + +# Load other user-defined modules +for file in /etc/sysconfig/modules/*.modules ; do + [ -x $file ] && $file +done + +# Load modules (for backward compatibility with VARs) +if [ -f /etc/rc.modules ]; then + /etc/rc.modules +fi +: diff --git a/rc.d/rcS.d/100-kernelparam.sh b/rc.d/rcS.d/100-kernelparam.sh new file mode 100755 index 00000000..36728c95 --- /dev/null +++ b/rc.d/rcS.d/100-kernelparam.sh @@ -0,0 +1,7 @@ +#!/bin/sh +[[ $(type -t strstr) = "function" ]] || . /etc/init.d/functions + +# Configure kernel parameters +update_boot_stage RCkernelparam +sysctl -e -p /etc/sysctl.conf >/dev/null 2>&1 +: diff --git a/rc.d/rcS.d/110-waitscan.sh b/rc.d/rcS.d/110-waitscan.sh new file mode 100755 index 00000000..db083320 --- /dev/null +++ b/rc.d/rcS.d/110-waitscan.sh @@ -0,0 +1,4 @@ +#!/bin/sh +# Sync waiting for storage. +{ rmmod scsi_wait_scan ; modprobe scsi_wait_scan ; rmmod scsi_wait_scan ; } >/dev/null 2>&1 +: diff --git a/rc.d/rcS.d/120-loaddmmod.sh b/rc.d/rcS.d/120-loaddmmod.sh new file mode 100755 index 00000000..4696af97 --- /dev/null +++ b/rc.d/rcS.d/120-loaddmmod.sh @@ -0,0 +1,8 @@ +#!/bin/sh +[[ $(type -t strstr) = "function" ]] || . /etc/init.d/functions + +# Device mapper & related initialization +if ! __fgrep "device-mapper" /proc/devices >/dev/null 2>&1 ; then + modprobe dm-mod >/dev/null 2>&1 +fi +: diff --git a/rc.d/rcS.d/130-initcrypto1.sh b/rc.d/rcS.d/130-initcrypto1.sh new file mode 100755 index 00000000..dd1ba876 --- /dev/null +++ b/rc.d/rcS.d/130-initcrypto1.sh @@ -0,0 +1,7 @@ +#!/bin/sh +[[ $(type -t strstr) = "function" ]] || . /etc/init.d/functions + +if [ -f /etc/crypttab ]; then + init_crypto 0 +fi +: diff --git a/rc.d/rcS.d/140-multipath.sh b/rc.d/rcS.d/140-multipath.sh new file mode 100755 index 00000000..83fc0d8f --- /dev/null +++ b/rc.d/rcS.d/140-multipath.sh @@ -0,0 +1,13 @@ +#!/bin/sh +[[ $(type -t strstr) = "function" ]] || . /etc/init.d/functions +[[ $cmdline ]] || cmdline=$(cat /proc/cmdline) + +if ! strstr "$cmdline" nompath && [ -f /etc/multipath.conf ] && \ + [ -x /sbin/multipath ]; then + modprobe dm-multipath > /dev/null 2>&1 + /sbin/multipath -v 0 + if [ -x /sbin/kpartx ]; then + /sbin/dmsetup ls --target multipath --exec "/sbin/kpartx -a -p p" >/dev/null + fi +fi +: diff --git a/rc.d/rcS.d/150-dmraid.sh b/rc.d/rcS.d/150-dmraid.sh new file mode 100755 index 00000000..f983e4e9 --- /dev/null +++ b/rc.d/rcS.d/150-dmraid.sh @@ -0,0 +1,19 @@ +#!/bin/sh +[[ $(type -t strstr) = "function" ]] || . /etc/init.d/functions +[[ $cmdline ]] || cmdline=$(cat /proc/cmdline) + +if ! strstr "$cmdline" nodmraid && [ -x /sbin/dmraid ]; then + modprobe dm-mirror >/dev/null 2>&1 + dmraidsets=$(LC_ALL=C /sbin/dmraid -s -c -i) + if [ "$?" = "0" ]; then + for dmname in $dmraidsets; do + if [[ "$dmname" == isw_* ]] && \ + ! strstr "$cmdline" noiswmd; then + continue + fi + /sbin/dmraid -ay -i --rm_partitions -p "$dmname" >/dev/null 2>&1 + /sbin/kpartx -a -p p "/dev/mapper/$dmname" + done + fi +fi +: diff --git a/rc.d/rcS.d/160-mdraid.sh b/rc.d/rcS.d/160-mdraid.sh new file mode 100755 index 00000000..1a0b065e --- /dev/null +++ b/rc.d/rcS.d/160-mdraid.sh @@ -0,0 +1,4 @@ +#!/bin/sh +# Start any MD RAID arrays that haven't been started yet +[ -r /proc/mdstat -a -r /dev/md/md-device-map ] && /sbin/mdadm -IRs +: diff --git a/rc.d/rcS.d/170-lvm.sh b/rc.d/rcS.d/170-lvm.sh new file mode 100755 index 00000000..da4bd84d --- /dev/null +++ b/rc.d/rcS.d/170-lvm.sh @@ -0,0 +1,7 @@ +#!/bin/sh +[[ $(type -t strstr) = "function" ]] || . /etc/init.d/functions +[[ $cmdline ]] || cmdline=$(cat /proc/cmdline) +if [ -x /sbin/lvm ]; then + action $"Setting up Logical Volume Management:" /sbin/lvm vgchange -a y --sysinit +fi +: diff --git a/rc.d/rcS.d/180-initcrypto2.sh b/rc.d/rcS.d/180-initcrypto2.sh new file mode 100755 index 00000000..dd1ba876 --- /dev/null +++ b/rc.d/rcS.d/180-initcrypto2.sh @@ -0,0 +1,7 @@ +#!/bin/sh +[[ $(type -t strstr) = "function" ]] || . /etc/init.d/functions + +if [ -f /etc/crypttab ]; then + init_crypto 0 +fi +: diff --git a/rc.d/rcS.d/190-mountall.sh b/rc.d/rcS.d/190-mountall.sh new file mode 100755 index 00000000..ff8c6953 --- /dev/null +++ b/rc.d/rcS.d/190-mountall.sh @@ -0,0 +1,315 @@ +#!/bin/sh +[[ $(type -t strstr) = "function" ]] || . /etc/init.d/functions +[[ $cmdline ]] || cmdline=$(cat /proc/cmdline) + +# Check SELinux status +SELINUX_STATE= +if [ -e "/selinux/enforce" ] && [ "$(cat /proc/self/attr/current)" != "kernel" ]; then + if [ -r "/selinux/enforce" ] ; then + SELINUX_STATE=$(cat "/selinux/enforce") + else + # assume enforcing if you can't read it + SELINUX_STATE=1 + fi +fi + +disable_selinux() { + echo $"*** Warning -- SELinux is active" + echo $"*** Disabling security enforcement for system recovery." + echo $"*** Run 'setenforce 1' to reenable." + echo "0" > "/selinux/enforce" +} + +if [ -f /fsckoptions ]; then + fsckoptions=$(cat /fsckoptions) +fi + +if [ -f /forcefsck ] || strstr "$cmdline" forcefsck ; then + fsckoptions="-f $fsckoptions" +elif [ -f /.autofsck ]; then + [ -f /etc/sysconfig/autofsck ] && . /etc/sysconfig/autofsck + if [ "$AUTOFSCK_DEF_CHECK" = "yes" ]; then + AUTOFSCK_OPT="$AUTOFSCK_OPT -f" + fi + if [ -n "$AUTOFSCK_SINGLEUSER" ]; then + [ type -p plymouth &>/dev/null ] && plymouth --hide-splash + echo + echo $"*** Warning -- the system did not shut down cleanly. " + echo $"*** Dropping you to a shell; the system will continue" + echo $"*** when you leave the shell." + [ -n "$SELINUX_STATE" ] && echo "0" > /selinux/enforce + sulogin + [ -n "$SELINUX_STATE" ] && echo "1" > /selinux/enforce + [ type -p plymouth &>/dev/null ] && plymouth --show-splash + fi + fsckoptions="$AUTOFSCK_OPT $fsckoptions" +fi + +if [ "$BOOTUP" = "color" ]; then + fsckoptions="-C $fsckoptions" +else + fsckoptions="-V $fsckoptions" +fi + +READONLY=no +if [ -f /etc/sysconfig/readonly-root ]; then + . /etc/sysconfig/readonly-root +fi +if strstr "$cmdline" readonlyroot ; then + READONLY=yes + [ -z "$RW_MOUNT" ] && RW_MOUNT=/var/lib/stateless/writable + [ -z "$STATE_MOUNT" ] && STATE_MOUNT=/var/lib/stateless/state +fi +if strstr "$cmdline" noreadonlyroot ; then + READONLY=no +fi + +if [ "$READONLY" = "yes" -o "$TEMPORARY_STATE" = "yes" ]; then + + mount_empty() { + if [ -e "$1" ]; then + echo "$1" | cpio -p -vd "$RW_MOUNT" &>/dev/null + mount -n --bind "$RW_MOUNT$1" "$1" + fi + } + + mount_dirs() { + if [ -e "$1" ]; then + mkdir -p "$RW_MOUNT$1" + find "$1" -type d -print0 | cpio -p -0vd "$RW_MOUNT" &>/dev/null + mount -n --bind "$RW_MOUNT$1" "$1" + fi + } + + mount_files() { + if [ -e "$1" ]; then + cp -a --parents "$1" "$RW_MOUNT" + mount -n --bind "$RW_MOUNT$1" "$1" + fi + } + + # Common mount options for scratch space regardless of + # type of backing store + mountopts= + + # Scan partitions for local scratch storage + rw_mount_dev=$(blkid -t LABEL="$RW_LABEL" -l -o device) + + # First try to mount scratch storage from /etc/fstab, then any + # partition with the proper label. If either succeeds, be sure + # to wipe the scratch storage clean. If both fail, then mount + # scratch storage via tmpfs. + if mount $mountopts "$RW_MOUNT" > /dev/null 2>&1 ; then + rm -rf "$RW_MOUNT" > /dev/null 2>&1 + elif [ x$rw_mount_dev != x ] && mount $rw_mount_dev $mountopts "$RW_MOUNT" > /dev/null 2>&1; then + rm -rf "$RW_MOUNT" > /dev/null 2>&1 + else + mount -n -t tmpfs $RW_OPTIONS $mountopts none "$RW_MOUNT" + fi + + for file in /etc/rwtab /etc/rwtab.d/* /dev/.initramfs/rwtab ; do + is_ignored_file "$file" && continue + [ -f $file ] && cat $file | while read type path ; do + case "$type" in + empty) + mount_empty $path + ;; + files) + mount_files $path + ;; + dirs) + mount_dirs $path + ;; + *) + ;; + esac + [ -n "$SELINUX_STATE" ] && [ -e "$path" ] && restorecon -R "$path" + done + done + + # Use any state passed by initramfs + [ -d /dev/.initramfs/state ] && cp -a /dev/.initramfs/state/* $RW_MOUNT + + # In theory there should be no more than one network interface active + # this early in the boot process -- the one we're booting from. + # Use the network address to set the hostname of the client. This + # must be done even if we have local storage. + ipaddr= + if [ "$HOSTNAME" = "localhost" -o "$HOSTNAME" = "localhost.localdomain" ]; then + ipaddr=$(ip addr show to 0.0.0.0/0 scope global | awk '/[[:space:]]inet / { print gensub("/.*","","g",$2) }') + for ip in $ipaddr ; do + HOSTNAME= + eval $(ipcalc -h $ipaddr 2>/dev/null) + [ -n "$HOSTNAME" ] && { hostname ${HOSTNAME} ; break; } + done + fi + + # Clients with read-only root filesystems may be provided with a + # place where they can place minimal amounts of persistent + # state. SSH keys or puppet certificates for example. + # + # Ideally we'll use puppet to manage the state directory and to + # create the bind mounts. However, until that's all ready this + # is sufficient to build a working system. + + # First try to mount persistent data from /etc/fstab, then any + # partition with the proper label, then fallback to NFS + state_mount_dev=$(blkid -t LABEL="$STATE_LABEL" -l -o device) + if mount $mountopts $STATE_OPTIONS "$STATE_MOUNT" > /dev/null 2>&1 ; then + /bin/true + elif [ x$state_mount_dev != x ] && mount $state_mount_dev $mountopts "$STATE_MOUNT" > /dev/null 2>&1; then + /bin/true + elif [ ! -z "$CLIENTSTATE" ]; then + # No local storage was found. Make a final attempt to find + # state on an NFS server. + + mount -t nfs $CLIENTSTATE/$HOSTNAME $STATE_MOUNT -o rw,nolock + fi + + if [ -w "$STATE_MOUNT" ]; then + + mount_state() { + if [ -e "$1" ]; then + [ ! -e "$STATE_MOUNT$1" ] && cp -a --parents "$1" "$STATE_MOUNT" + mount -n --bind "$STATE_MOUNT$1" "$1" + fi + } + + for file in /etc/statetab /etc/statetab.d/* ; do + is_ignored_file "$file" && continue + [ ! -f "$file" ] && continue + + if [ -f "$STATE_MOUNT/$file" ] ; then + mount -n --bind "$STATE_MOUNT/$file" "$file" + fi + + for path in $(grep -v "^#" "$file" 2>/dev/null); do + mount_state "$path" + [ -n "$SELINUX_STATE" ] && [ -e "$path" ] && restorecon -R "$path" + done + done + + if [ -f "$STATE_MOUNT/files" ] ; then + for path in $(grep -v "^#" "$STATE_MOUNT/files" 2>/dev/null); do + mount_state "$path" + [ -n "$SELINUX_STATE" ] && [ -e "$path" ] && restorecon -R "$path" + done + fi + fi +fi + +if [[ " $fsckoptions" != *" -y"* ]]; then + fsckoptions="-a $fsckoptions" +fi + +if [ -f /fastboot ] || strstr "$cmdline" fastboot ; then + fastboot=yes +fi +if [ -z "$fastboot" -a "$READONLY" != "yes" ]; then + + STRING=$"Checking filesystems" + echo $STRING + fsck -T -t noopts=_netdev -A $fsckoptions + rc=$? + + if [ "$rc" -eq "0" ]; then + success "$STRING" + echo + elif [ "$rc" -eq "1" ]; then + passed "$STRING" + echo + elif [ "$rc" -eq "2" -o "$rc" -eq "3" ]; then + echo $"Unmounting file systems" + umount -a + mount -n -o remount,ro / + echo $"Automatic reboot in progress." + reboot -f + fi + + # A return of 4 or higher means there were serious problems. + if [ $rc -gt 1 ]; then + [ type -p plymouth &>/dev/null ] && plymouth --hide-splash + + failure "$STRING" + echo + echo + echo $"*** An error occurred during the file system check." + echo $"*** Dropping you to a shell; the system will reboot" + echo $"*** when you leave the shell." + + str=$"(Repair filesystem)" + PS1="$str \# # "; export PS1 + [ "$SELINUX_STATE" = "1" ] && disable_selinux + sulogin + + echo $"Unmounting file systems" + umount -a + mount -n -o remount,ro / + echo $"Automatic reboot in progress." + reboot -f + elif [ "$rc" -eq "1" ]; then + _RUN_QUOTACHECK=1 + fi +fi + +remount_needed() { + local state oldifs + [ "$READONLY" = "yes" ] && return 1 + state=$(LC_ALL=C awk '/ \/ / && ($3 !~ /rootfs/) { print $4 }' /proc/mounts) + oldifs=$IFS + IFS="," + for opt in $state ; do + if [ "$opt" = "rw" ]; then + IFS=$oldifs + return 1 + fi + done + IFS=$oldifs + return 0 +} + +# Remount the root filesystem read-write. +update_boot_stage RCmountfs +if remount_needed ; then + action $"Remounting root filesystem in read-write mode: " mount -n -o remount,rw / +fi + +# Clean up SELinux labels +if [ -n "$SELINUX_STATE" ]; then + restorecon /etc/mtab /etc/ld.so.cache /etc/blkid/blkid.tab /etc/resolv.conf >/dev/null 2>&1 +fi + +# If relabeling, relabel mount points. +if [ -n "$SELINUX_STATE" -a "$READONLY" != "yes" ]; then + if strstr "$cmdline" autorelabel || [ -f /.autorelabel ] ; then + restorecon $(awk '!/^#/ && $4 !~ /noauto/ && $2 ~ /^\// { print $2 }' /etc/fstab) >/dev/null 2>&1 + fi +fi + +if [ "$READONLY" != "yes" ] ; then + # Clear mtab + (> /etc/mtab) &> /dev/null + + # Remove stale backups + rm -f /etc/mtab~ /etc/mtab~~ + + # Enter mounted filesystems into /etc/mtab + mount -f / + mount -f /proc >/dev/null 2>&1 + mount -f /sys >/dev/null 2>&1 + mount -f /dev/pts >/dev/null 2>&1 + mount -f /dev/shm >/dev/null 2>&1 + mount -f /proc/bus/usb >/dev/null 2>&1 +fi + +# Mount all other filesystems (except for NFS and /proc, which is already +# mounted). Contrary to standard usage, +# filesystems are NOT unmounted in single user mode. +if [ "$READONLY" != "yes" ] ; then + action $"Mounting local filesystems: " mount -a -t nonfs,nfs4,smbfs,ncpfs,cifs,gfs,gfs2 -O no_netdev +else + action $"Mounting local filesystems: " mount -a -n -t nonfs,nfs4,smbfs,ncpfs,cifs,gfs,gfs2 -O no_netdev +fi + +[[ $_RUN_QUOTACHECK = 1 ]] && touch /forcequotacheck +: diff --git a/rc.d/rcS.d/200-quota.sh b/rc.d/rcS.d/200-quota.sh new file mode 100755 index 00000000..bc7ee758 --- /dev/null +++ b/rc.d/rcS.d/200-quota.sh @@ -0,0 +1,12 @@ +#!/bin/sh +[[ $(type -t strstr) = "function" ]] || . /etc/init.d/functions +[[ $cmdline ]] || cmdline=$(cat /proc/cmdline) + +if [ -x /sbin/quotacheck ] && { strstr "$cmdline" forcequotacheck || [ -f /forcequotacheck ]; } ; then + action $"Checking local filesystem quotas: " /sbin/quotacheck -anug +fi + +if [ -x /sbin/quotaon ]; then + action $"Enabling local filesystem quotas: " /sbin/quotaon -aug +fi +: diff --git a/rc.d/rcS.d/210-selinuxrelabel.sh b/rc.d/rcS.d/210-selinuxrelabel.sh new file mode 100755 index 00000000..9ce86d9a --- /dev/null +++ b/rc.d/rcS.d/210-selinuxrelabel.sh @@ -0,0 +1,74 @@ +#!/bin/sh +[[ $(type -t strstr) = "function" ]] || . /etc/init.d/functions +[[ $cmdline ]] || cmdline=$(cat /proc/cmdline) + +READONLY=no +if [ -f /etc/sysconfig/readonly-root ]; then + . /etc/sysconfig/readonly-root +fi +if strstr "$cmdline" readonlyroot ; then + READONLY=yes + [ -z "$RW_MOUNT" ] && RW_MOUNT=/var/lib/stateless/writable + [ -z "$STATE_MOUNT" ] && STATE_MOUNT=/var/lib/stateless/state +fi +if strstr "$cmdline" noreadonlyroot ; then + READONLY=no +fi + +# Check SELinux status +SELINUX_STATE= +if [ -e "/selinux/enforce" ] && [ "$(cat /proc/self/attr/current)" != "kernel" ]; then + if [ -r "/selinux/enforce" ] ; then + SELINUX_STATE=$(cat "/selinux/enforce") + else + # assume enforcing if you can't read it + SELINUX_STATE=1 + fi +fi + +[[ $(type -t strstr) = "function" ]] || . /etc/init.d/functions +[[ $cmdline ]] || cmdline=$(cat /proc/cmdline) + +relabel_selinux() { + # if /sbin/init is not labeled correctly this process is running in the + # wrong context, so a reboot will be required after relabel + AUTORELABEL= + . /etc/selinux/config + echo "0" > /selinux/enforce + [ type -p plymouth &>/dev/null ] && plymouth --hide-splash + + if [ "$AUTORELABEL" = "0" ]; then + echo + echo $"*** Warning -- SELinux ${SELINUXTYPE} policy relabel is required. " + echo $"*** /etc/selinux/config indicates you want to manually fix labeling" + echo $"*** problems. Dropping you to a shell; the system will reboot" + echo $"*** when you leave the shell." + sulogin + + else + echo + echo $"*** Warning -- SELinux ${SELINUXTYPE} policy relabel is required." + echo $"*** Relabeling could take a very long time, depending on file" + echo $"*** system size and speed of hard drives." + + /sbin/fixfiles -F restore > /dev/null 2>&1 + fi + rm -f /.autorelabel + echo $"Unmounting file systems" + umount -a + mount -n -o remount,ro / + echo $"Automatic reboot in progress." + reboot -f +} + +# Check to see if a full relabel is needed +if [ -n "$SELINUX_STATE" -a "$READONLY" != "yes" ]; then + if strstr "$cmdline" autorelabel || [ -f /.autorelabel ] ; then + relabel_selinux + fi +else + if [ "$READONLY" != "yes" ] && [ -d /etc/selinux ]; then + [ -f /.autorelabel ] || touch /.autorelabel + fi +fi +: diff --git a/rc.d/rcS.d/220-random.sh b/rc.d/rcS.d/220-random.sh new file mode 100755 index 00000000..fa1102ad --- /dev/null +++ b/rc.d/rcS.d/220-random.sh @@ -0,0 +1,28 @@ +#!/bin/sh +[[ $(type -t strstr) = "function" ]] || . /etc/init.d/functions +[[ $cmdline ]] || cmdline=$(cat /proc/cmdline) + +READONLY=no +if [ -f /etc/sysconfig/readonly-root ]; then + . /etc/sysconfig/readonly-root +fi +if strstr "$cmdline" readonlyroot ; then + READONLY=yes + [ -z "$RW_MOUNT" ] && RW_MOUNT=/var/lib/stateless/writable + [ -z "$STATE_MOUNT" ] && STATE_MOUNT=/var/lib/stateless/state +fi +if strstr "$cmdline" noreadonlyroot ; then + READONLY=no +fi + +# Initialize pseudo-random number generator +if [ -f "/var/lib/random-seed" ]; then + cat /var/lib/random-seed > /dev/urandom +else + [ "$READONLY" != "yes" ] && touch /var/lib/random-seed +fi +if [ "$READONLY" != "yes" ]; then + chmod 600 /var/lib/random-seed + dd if=/dev/urandom of=/var/lib/random-seed count=1 bs=512 2>/dev/null +fi +: diff --git a/rc.d/rcS.d/230-initcrypto3.sh b/rc.d/rcS.d/230-initcrypto3.sh new file mode 100755 index 00000000..d7e7b757 --- /dev/null +++ b/rc.d/rcS.d/230-initcrypto3.sh @@ -0,0 +1,7 @@ +#!/bin/sh +[[ $(type -t strstr) = "function" ]] || . /etc/init.d/functions + +if [ -f /etc/crypttab ]; then + init_crypto 1 +fi +: diff --git a/rc.d/rcS.d/240-configure.sh b/rc.d/rcS.d/240-configure.sh new file mode 100755 index 00000000..7cf87796 --- /dev/null +++ b/rc.d/rcS.d/240-configure.sh @@ -0,0 +1,39 @@ +#!/bin/sh +[[ $(type -t strstr) = "function" ]] || . /etc/init.d/functions + +# Configure machine if necessary. +if [ -f /.unconfigured ]; then + if [ -x /usr/bin/rhgb-client ] && /usr/bin/rhgb-client --ping ; then + /usr/bin/rhgb-client --quit + fi + + if [ -x /usr/bin/system-config-keyboard ]; then + /usr/bin/system-config-keyboard + fi + if [ -x /usr/bin/passwd ]; then + /usr/bin/passwd root + fi + if [ -x /usr/sbin/system-config-network-tui ]; then + /usr/sbin/system-config-network-tui + fi + if [ -x /usr/sbin/timeconfig ]; then + /usr/sbin/timeconfig + fi + if [ -x /usr/sbin/authconfig-tui ]; then + /usr/sbin/authconfig-tui --nostart + fi + if [ -x /usr/sbin/ntsysv ]; then + /usr/sbin/ntsysv --level 35 + fi + + # Reread in network configuration data. + if [ -f /etc/sysconfig/network ]; then + . /etc/sysconfig/network + + # Reset the hostname. + action $"Resetting hostname ${HOSTNAME}: " hostname ${HOSTNAME} + fi + + rm -f /.unconfigured +fi +: diff --git a/rc.d/rcS.d/250-cleanup.sh b/rc.d/rcS.d/250-cleanup.sh new file mode 100755 index 00000000..0b4de0fb --- /dev/null +++ b/rc.d/rcS.d/250-cleanup.sh @@ -0,0 +1,57 @@ +#!/bin/sh +[[ $(type -t strstr) = "function" ]] || . /etc/init.d/functions +[[ $cmdline ]] || cmdline=$(cat /proc/cmdline) + +# Check SELinux status +SELINUX_STATE= +if [ -e "/selinux/enforce" ] && [ "$(cat /proc/self/attr/current)" != "kernel" ]; then + if [ -r "/selinux/enforce" ] ; then + SELINUX_STATE=$(cat "/selinux/enforce") + else + # assume enforcing if you can't read it + SELINUX_STATE=1 + fi +fi + +# Clean out /. +rm -f /fastboot /fsckoptions /forcefsck /.autofsck /forcequotacheck /halt \ + /poweroff /.suspended &> /dev/null + +# Do we need (w|u)tmpx files? We don't set them up, but the sysadmin might... +_NEED_XFILES= +[ -f /var/run/utmpx ] || [ -f /var/log/wtmpx ] && _NEED_XFILES=1 + +# Clean up /var. +rm -rf /var/lock/cvs/* /var/run/screen/* +find /var/lock /var/run ! -type d -exec rm -f {} \; +rm -f /var/lib/rpm/__db* &> /dev/null +rm -f /var/gdm/.gdmfifo &> /dev/null + + +# Clean up utmp/wtmp +> /var/run/utmp +touch /var/log/wtmp /var/log/btmp +chgrp utmp /var/run/utmp /var/log/wtmp /var/log/btmp +chmod 0664 /var/run/utmp /var/log/wtmp +chmod 0600 /var/log/btmp +if [ -n "$_NEED_XFILES" ]; then + > /var/run/utmpx + touch /var/log/wtmpx + chgrp utmp /var/run/utmpx /var/log/wtmpx + chmod 0664 /var/run/utmpx /var/log/wtmpx +fi +[ -n "$SELINUX_STATE" ] && restorecon /var/run/utmp* /var/log/wtmp* >/dev/null 2>&1 + +# Clean up various /tmp bits +[ -n "$SELINUX_STATE" ] && restorecon /tmp +rm -f /tmp/.X*-lock /tmp/.lock.* /tmp/.gdm_socket /tmp/.s.PGSQL.* +rm -rf /tmp/.X*-unix /tmp/.ICE-unix /tmp/.font-unix /tmp/hsperfdata_* \ + /tmp/kde-* /tmp/ksocket-* /tmp/mc-* /tmp/mcop-* /tmp/orbit-* \ + /tmp/scrollkeeper-* /tmp/ssh-* \ + /dev/.in_sysinit + +# Make ICE directory +mkdir -m 1777 -p /tmp/.ICE-unix >/dev/null 2>&1 +chown root:root /tmp/.ICE-unix +[ -n "$SELINUX_STATE" ] && restorecon /tmp/.ICE-unix >/dev/null 2>&1 +: diff --git a/rc.d/rcS.d/260-swap.sh b/rc.d/rcS.d/260-swap.sh new file mode 100755 index 00000000..51a55f39 --- /dev/null +++ b/rc.d/rcS.d/260-swap.sh @@ -0,0 +1,8 @@ +#!/bin/sh +[[ $(type -t strstr) = "function" ]] || . /etc/init.d/functions + +# Start up swapping. +update_boot_stage RCswap +action $"Enabling /etc/fstab swaps: " swapon -a -e + +: diff --git a/rc.d/rcS.d/270-autoswap.sh b/rc.d/rcS.d/270-autoswap.sh new file mode 100755 index 00000000..e7ce922e --- /dev/null +++ b/rc.d/rcS.d/270-autoswap.sh @@ -0,0 +1,16 @@ +#!/bin/sh +[[ $(type -t strstr) = "function" ]] || . /etc/init.d/functions + +# Start up swapping. +if [ "$AUTOSWAP" = "yes" ]; then + curswap=$(awk '/^\/dev/ { print $1 }' /proc/swaps | while read x; do get_numeric_dev dec $x ; echo -n " "; done) + swappartitions=$(blkid -t TYPE=swap -o device) + if [ x"$swappartitions" != x ]; then + for partition in $swappartitions ; do + [ ! -e $partition ] && continue + majmin=$(get_numeric_dev dec $partition) + echo $curswap | grep -qw "$majmin" || action $"Enabling local swap partitions: " swapon $partition + done + fi +fi +: diff --git a/rc.d/rcS.d/300-binfmtmisc.sh b/rc.d/rcS.d/300-binfmtmisc.sh new file mode 100755 index 00000000..b27148af --- /dev/null +++ b/rc.d/rcS.d/300-binfmtmisc.sh @@ -0,0 +1,4 @@ +#!/bin/sh +# Set up binfmt_misc +/bin/mount -t binfmt_misc none /proc/sys/fs/binfmt_misc > /dev/null 2>&1 +: diff --git a/rc.d/rcS.d/310-autofsck.sh b/rc.d/rcS.d/310-autofsck.sh new file mode 100755 index 00000000..ebf8717a --- /dev/null +++ b/rc.d/rcS.d/310-autofsck.sh @@ -0,0 +1,4 @@ +#!/bin/sh +# create the crash indicator flag to warn on crashes, offer fsck with timeout +touch /.autofsck &> /dev/null +: diff --git a/rc.d/rcS.d/320-getkey.sh b/rc.d/rcS.d/320-getkey.sh new file mode 100755 index 00000000..f70cb5c0 --- /dev/null +++ b/rc.d/rcS.d/320-getkey.sh @@ -0,0 +1,8 @@ +#!/bin/sh +[[ $(type -t strstr) = "function" ]] || . /etc/init.d/functions +[[ $cmdline ]] || cmdline=$(cat /proc/cmdline) + +if strstr "$cmdline" confirm ; then + touch /var/run/confirm +fi +: diff --git a/rc.d/rcS.d/330-dmesg.sh b/rc.d/rcS.d/330-dmesg.sh new file mode 100755 index 00000000..42fb0efe --- /dev/null +++ b/rc.d/rcS.d/330-dmesg.sh @@ -0,0 +1,6 @@ +#!/bin/sh +# Now that we have all of our basic modules loaded and the kernel going, +# let's dump the syslog ring somewhere so we can find it later +[ -f /var/log/dmesg ] && mv -f /var/log/dmesg /var/log/dmesg.old +dmesg -s 131072 > /var/log/dmesg +: diff --git a/rc.d/rcS.d/990-sysinitend.sh b/rc.d/rcS.d/990-sysinitend.sh new file mode 100755 index 00000000..f79d0995 --- /dev/null +++ b/rc.d/rcS.d/990-sysinitend.sh @@ -0,0 +1,6 @@ +#!/bin/sh +# Let rhgb know that we're leaving rc.sysinit +if [ -x /usr/bin/rhgb-client ] && /usr/bin/rhgb-client --ping ; then + /usr/bin/rhgb-client --sysinit +fi +: diff --git a/systemd/rcS-autoswap.service b/systemd/rcS-autoswap.service new file mode 100644 index 00000000..00d3b47b --- /dev/null +++ b/systemd/rcS-autoswap.service @@ -0,0 +1,16 @@ +[Unit] +Description=System Initialization +DefaultDependencies=no +Conflicts=shutdown.target +Before=shutdown.target emergency.service emergency.target +After=rcS-initcrypto3.service +Conflicts=sysinit.service + +[Service] +ExecStart=/etc/rc.d/rcS.d/270-autoswap.sh +Type=oneshot +TimeoutSec=0 +RemainAfterExit=yes + +[Install] +WantedBy=sysinit.target diff --git a/systemd/rcS-cleanup.service b/systemd/rcS-cleanup.service new file mode 100644 index 00000000..929a1085 --- /dev/null +++ b/systemd/rcS-cleanup.service @@ -0,0 +1,16 @@ +[Unit] +Description=System Initialization +DefaultDependencies=no +Conflicts=shutdown.target +Before=shutdown.target emergency.service emergency.target +After=rcS-mountall.service +Conflicts=sysinit.service + +[Service] +ExecStart=/etc/rc.d/rcS.d/250-cleanup.sh +Type=oneshot +TimeoutSec=0 +RemainAfterExit=yes + +[Install] +WantedBy=sysinit.target diff --git a/systemd/rcS-configure.service b/systemd/rcS-configure.service new file mode 100644 index 00000000..8cdc4a9c --- /dev/null +++ b/systemd/rcS-configure.service @@ -0,0 +1,17 @@ +[Unit] +Description=System Initialization +DefaultDependencies=no +Conflicts=shutdown.target +Before=shutdown.target emergency.service emergency.target +After=rcS-mountall.service +Conflicts=sysinit.service + +[Service] +ExecStart=/etc/rc.d/rcS.d/240-configure.sh +Type=oneshot +TimeoutSec=0 +StandardInput=tty +RemainAfterExit=yes + +[Install] +WantedBy=sysinit.target diff --git a/systemd/rcS-dmesg.service b/systemd/rcS-dmesg.service new file mode 100644 index 00000000..00d30a15 --- /dev/null +++ b/systemd/rcS-dmesg.service @@ -0,0 +1,16 @@ +[Unit] +Description=System Initialization +DefaultDependencies=no +Conflicts=shutdown.target +Before=shutdown.target emergency.service emergency.target +After=rcS-mountall.service +Conflicts=sysinit.service + +[Service] +ExecStart=/etc/rc.d/rcS.d/330-dmesg.sh +Type=oneshot +TimeoutSec=0 +RemainAfterExit=yes + +[Install] +WantedBy=sysinit.target diff --git a/systemd/rcS-dmraid.service b/systemd/rcS-dmraid.service new file mode 100644 index 00000000..f5e0bf57 --- /dev/null +++ b/systemd/rcS-dmraid.service @@ -0,0 +1,17 @@ +[Unit] +Description=System Initialization +DefaultDependencies=no +Conflicts=shutdown.target +Before=shutdown.target emergency.service emergency.target +After=rcS-multipath.service +Before=rcS-initcrypto2.service +Conflicts=sysinit.service + +[Service] +ExecStart=/etc/rc.d/rcS.d/150-dmraid.sh +Type=oneshot +TimeoutSec=0 +RemainAfterExit=yes + +[Install] +WantedBy=sysinit.target diff --git a/systemd/rcS-initcrypto1.service b/systemd/rcS-initcrypto1.service new file mode 100644 index 00000000..0082f1c5 --- /dev/null +++ b/systemd/rcS-initcrypto1.service @@ -0,0 +1,19 @@ +[Unit] +Description=System Initialization +DefaultDependencies=no +Conflicts=shutdown.target +Before=shutdown.target emergency.service emergency.target +Before=rcS-initcrypto2.service +After=rcS-waitscan.service +After=udev-settle.service +Conflicts=sysinit.service + +[Service] +ExecStart=/etc/rc.d/rcS.d/130-initcrypto1.sh +Type=oneshot +TimeoutSec=0 +StandardInput=tty +RemainAfterExit=yes + +[Install] +WantedBy=sysinit.target diff --git a/systemd/rcS-initcrypto2.service b/systemd/rcS-initcrypto2.service new file mode 100644 index 00000000..60b7e7f1 --- /dev/null +++ b/systemd/rcS-initcrypto2.service @@ -0,0 +1,18 @@ +[Unit] +Description=System Initialization +DefaultDependencies=no +Conflicts=shutdown.target +Before=shutdown.target emergency.service emergency.target +Before=rcS-mountall.service +After=rcS-initcrypto1.service +Conflicts=sysinit.service + +[Service] +ExecStart=/etc/rc.d/rcS.d/180-initcrypto2.sh +Type=oneshot +TimeoutSec=0 +StandardInput=tty +RemainAfterExit=yes + +[Install] +WantedBy=sysinit.target diff --git a/systemd/rcS-initcrypto3.service b/systemd/rcS-initcrypto3.service new file mode 100644 index 00000000..e6d8e964 --- /dev/null +++ b/systemd/rcS-initcrypto3.service @@ -0,0 +1,17 @@ +[Unit] +Description=System Initialization +DefaultDependencies=no +Conflicts=shutdown.target +Before=shutdown.target emergency.service emergency.target +After=rcS-random.service +Conflicts=sysinit.service + +[Service] +ExecStart=/etc/rc.d/rcS.d/230-initcrypto3.sh +Type=oneshot +TimeoutSec=0 +StandardInput=tty +RemainAfterExit=yes + +[Install] +WantedBy=sysinit.target diff --git a/systemd/rcS-kernelparam.service b/systemd/rcS-kernelparam.service new file mode 100644 index 00000000..564b6f68 --- /dev/null +++ b/systemd/rcS-kernelparam.service @@ -0,0 +1,16 @@ +[Unit] +Description=System Initialization +DefaultDependencies=no +Conflicts=shutdown.target +Before=shutdown.target emergency.service emergency.target +Before=udev-settle.service +Conflicts=sysinit.service + +[Service] +ExecStart=/etc/rc.d/rcS.d/100-kernelparam.sh +Type=oneshot +TimeoutSec=0 +RemainAfterExit=yes + +[Install] +WantedBy=sysinit.target diff --git a/systemd/rcS-loaddmmod.service b/systemd/rcS-loaddmmod.service new file mode 100644 index 00000000..35b88fb5 --- /dev/null +++ b/systemd/rcS-loaddmmod.service @@ -0,0 +1,16 @@ +[Unit] +Description=System Initialization +DefaultDependencies=no +Conflicts=shutdown.target +Before=shutdown.target emergency.service emergency.target +Before=rcS-dmraid.service +Conflicts=sysinit.service + +[Service] +ExecStart=/etc/rc.d/rcS.d/120-loaddmmod.sh +Type=oneshot +TimeoutSec=0 +RemainAfterExit=yes + +[Install] +WantedBy=sysinit.target
\ No newline at end of file diff --git a/systemd/rcS-loadmodules.service b/systemd/rcS-loadmodules.service new file mode 100644 index 00000000..4eb21518 --- /dev/null +++ b/systemd/rcS-loadmodules.service @@ -0,0 +1,15 @@ +[Unit] +Description=System Initialization +DefaultDependencies=no +Conflicts=shutdown.target +Before=shutdown.target emergency.service emergency.target +Conflicts=sysinit.service + +[Service] +ExecStart=/etc/rc.d/rcS.d/090-loadmodules.sh +Type=oneshot +TimeoutSec=0 +RemainAfterExit=yes + +[Install] +WantedBy=sysinit.target diff --git a/systemd/rcS-lvm.service b/systemd/rcS-lvm.service new file mode 100644 index 00000000..8e153b20 --- /dev/null +++ b/systemd/rcS-lvm.service @@ -0,0 +1,18 @@ +[Unit] +Description=System Initialization +DefaultDependencies=no +Conflicts=shutdown.target +Before=shutdown.target emergency.service emergency.target +After=rcS-mdraid.service +Before=rcS-initcrypto2.service +Conflicts=sysinit.service + +[Service] +ExecStart=/etc/rc.d/rcS.d/170-lvm.sh +Type=oneshot +TimeoutSec=0 +StandardInput=tty +RemainAfterExit=yes + +[Install] +WantedBy=sysinit.target diff --git a/systemd/rcS-mdraid.service b/systemd/rcS-mdraid.service new file mode 100644 index 00000000..f63c8fbf --- /dev/null +++ b/systemd/rcS-mdraid.service @@ -0,0 +1,18 @@ +[Unit] +Description=System Initialization +DefaultDependencies=no +Conflicts=shutdown.target +Before=shutdown.target emergency.service emergency.target +After=rcS-dmraid.service +Before=rcS-initcrypto2.service +Conflicts=sysinit.service + +[Service] +ExecStart=/etc/rc.d/rcS.d/160-mdraid.sh +Type=oneshot +TimeoutSec=0 +StandardInput=tty +RemainAfterExit=yes + +[Install] +WantedBy=sysinit.target diff --git a/systemd/rcS-mountall.service b/systemd/rcS-mountall.service new file mode 100644 index 00000000..684f1d3b --- /dev/null +++ b/systemd/rcS-mountall.service @@ -0,0 +1,17 @@ +[Unit] +Description=System Initialization +DefaultDependencies=no +Conflicts=shutdown.target +Before=shutdown.target emergency.service emergency.target +After=udev-settle.service +Conflicts=sysinit.service + +[Service] +ExecStart=/etc/rc.d/rcS.d/190-mountall.sh +Type=oneshot +TimeoutSec=0 +StandardInput=tty +RemainAfterExit=yes + +[Install] +WantedBy=sysinit.target diff --git a/systemd/rcS-multipath.service b/systemd/rcS-multipath.service new file mode 100644 index 00000000..b9754f40 --- /dev/null +++ b/systemd/rcS-multipath.service @@ -0,0 +1,17 @@ +[Unit] +Description=System Initialization +DefaultDependencies=no +Conflicts=shutdown.target +Before=shutdown.target emergency.service emergency.target +After=rcS-initcrypto1.service +Before=rcS-initcrypto2.service +Conflicts=sysinit.service + +[Service] +ExecStart=/etc/rc.d/rcS.d/140-multipath.sh +Type=oneshot +TimeoutSec=0 +RemainAfterExit=yes + +[Install] +WantedBy=sysinit.target diff --git a/systemd/rcS-quota.service b/systemd/rcS-quota.service new file mode 100644 index 00000000..ac1794ee --- /dev/null +++ b/systemd/rcS-quota.service @@ -0,0 +1,16 @@ +[Unit] +Description=System Initialization +DefaultDependencies=no +Conflicts=shutdown.target +Before=shutdown.target emergency.service emergency.target +After=rcS-mountall.service +Conflicts=sysinit.service + +[Service] +ExecStart=/etc/rc.d/rcS.d/200-quota.sh +Type=oneshot +TimeoutSec=0 +RemainAfterExit=yes + +[Install] +WantedBy=sysinit.target diff --git a/systemd/rcS-random.service b/systemd/rcS-random.service new file mode 100644 index 00000000..cbb678bb --- /dev/null +++ b/systemd/rcS-random.service @@ -0,0 +1,16 @@ +[Unit] +Description=System Initialization +DefaultDependencies=no +Conflicts=shutdown.target +Before=shutdown.target emergency.service emergency.target +After=rcS-mountall.service +Conflicts=sysinit.service + +[Service] +ExecStart=/etc/rc.d/rcS.d/220-random.sh +Type=oneshot +TimeoutSec=0 +RemainAfterExit=yes + +[Install] +WantedBy=sysinit.target diff --git a/systemd/rcS-selinuxrelabel.service b/systemd/rcS-selinuxrelabel.service new file mode 100644 index 00000000..de02ed1e --- /dev/null +++ b/systemd/rcS-selinuxrelabel.service @@ -0,0 +1,17 @@ +[Unit] +Description=System Initialization +DefaultDependencies=no +Conflicts=shutdown.target +Before=shutdown.target emergency.service emergency.target +After=rcS-mountall.service +Conflicts=sysinit.service + +[Service] +ExecStart=/etc/rc.d/rcS.d/210-selinuxrelabel.sh +Type=oneshot +TimeoutSec=0 +StandardInput=tty +RemainAfterExit=yes + +[Install] +WantedBy=sysinit.target diff --git a/systemd/rcS-sysinitend.service b/systemd/rcS-sysinitend.service new file mode 100644 index 00000000..f563dab4 --- /dev/null +++ b/systemd/rcS-sysinitend.service @@ -0,0 +1,17 @@ +[Unit] +Description=System Initialization End +DefaultDependencies=no +Conflicts=shutdown.target +Before=shutdown.target emergency.service emergency.target +Before=sysinit.target +After=rcS-dmesg.service +Conflicts=sysinit.service + +[Service] +ExecStart=/etc/rc.d/rcS.d/990-sysinitend.sh +Type=oneshot +TimeoutSec=0 +RemainAfterExit=yes + +[Install] +WantedBy=sysinit.target diff --git a/systemd/rcS-waitscan.service b/systemd/rcS-waitscan.service new file mode 100644 index 00000000..0b597d82 --- /dev/null +++ b/systemd/rcS-waitscan.service @@ -0,0 +1,17 @@ +[Unit] +Description=System Initialization +DefaultDependencies=no +Conflicts=shutdown.target +Before=shutdown.target emergency.service emergency.target +After=rcS-loadmodules.service +Before=udev-settle.service +Conflicts=sysinit.service + +[Service] +ExecStart=/etc/rc.d/rcS.d/110-waitscan.sh +Type=oneshot +TimeoutSec=0 +RemainAfterExit=yes + +[Install] +WantedBy=sysinit.target |