1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
|
#!/bin/sh -e
# Setup for using apt to install packages in /target.
mountpoints () {
cut -d" " -f2 /proc/mounts | sort | uniq
}
chroot_setup () {
# Bail out if directories we need are not there
if [ ! -d /target/sbin ] || [ ! -d /target/usr/sbin ] || \
[ ! -d /target/proc ]; then
return 1
fi
case $(uname -r | cut -d . -f 1,2) in
2.6)
if [ ! -d /target/sys ] ; then
return 1
fi
;;
esac
if [ -e /var/run/chroot-setup.lock ]; then
cat >&2 <<EOF
apt-install or in-target is already running, so you cannot run either of
them again until the other instance finishes. You may be able to use
'chroot /target ...' instead.
EOF
return 1
fi
touch /var/run/chroot-setup.lock
# Create a policy-rc.d to stop maintainer scripts using invoke-rc.d
# from running init scripts. In case of maintainer scripts that don't
# use invoke-rc.d, add a dummy start-stop-daemon.
cat > /target/usr/sbin/policy-rc.d <<EOF
#!/bin/sh
exit 101
EOF
chmod a+rx /target/usr/sbin/policy-rc.d
if [ -e /target/sbin/start-stop-daemon ]; then
mv /target/sbin/start-stop-daemon /target/sbin/start-stop-daemon.REAL
fi
cat > /target/sbin/start-stop-daemon <<EOF
#!/bin/sh
echo 1>&2
echo 'Warning: Fake start-stop-daemon called, doing nothing.' 1>&2
exit 0
EOF
chmod a+rx /target/sbin/start-stop-daemon
# Record the current mounts
mountpoints > /tmp/mount.pre
# Some packages (eg. the kernel-image package) require a mounted
# /proc/. Only mount it if not mounted already
if [ ! -f /target/proc/cmdline ] ; then
mount -t proc proc /target/proc
fi
# For installing >=2.6.14 kernels we also need sysfs mounted
# Only mount it if not mounted already and we're running 2.6
case $(uname -r | cut -d . -f 1,2) in
2.6)
if [ ! -d /target/sys/devices ] ; then
mount -t sysfs none /target/sys
fi
;;
esac
# Try to enable proxy when using HTTP.
# What about using ftp_proxy for FTP sources?
RET=$(debconf-get mirror/protocol || true)
if [ "$RET" = "http" ]; then
RET=$(debconf-get mirror/http/proxy || true)
if [ "$RET" ] ; then
http_proxy="$RET"
export http_proxy
fi
fi
# Pass debconf priority through.
DEBIAN_PRIORITY=$(debconf-get debconf/priority || true)
export DEBIAN_PRIORITY
LANG=$(debconf-get debian-installer/locale || true)
export LANG
export PERL_BADLANG=0
# Unset variables that would make scripts in the target think
# that debconf is already running there.
unset DEBIAN_HAS_FRONTEND
unset DEBIAN_FRONTEND
unset DEBCONF_FRONTEND
unset DEBCONF_REDIR
# Avoid debconf mailing notes.
DEBCONF_ADMIN_EMAIL=""
export DEBCONF_ADMIN_EMAIL
return 0
}
chroot_cleanup () {
rm -f /target/usr/sbin/policy-rc.d
mv /target/sbin/start-stop-daemon.REAL /target/sbin/start-stop-daemon
# Undo the mounts done by the packages during installation.
# Reverse sorting to umount the deepest mount points first.
# Items with count of 1 are new.
for dir in $( (cat /tmp/mount.pre /tmp/mount.pre; mountpoints ) | \
sort -r | uniq -c | grep "^[[:space:]]*1[[:space:]]" | \
sed "s/^[[:space:]]*[0-9][[:space:]]//"); do
if ! umount $dir ; then
logger -t $0 "warning: Unable to umount '$dir'"
fi
done
rm -f /tmp/mount.pre
rm -f /var/run/chroot-setup.lock
}
|