Project

General

Profile

Download (15.3 KB) Statistics
| Branch: | Tag: | Revision:
1
#!/bin/sh
2

    
3
# /etc/rc.firmware
4
# originally part of m0n0wall (http://neon1.net/m0n0wall)
5
# Copyright (C) 2005-2009 Scott Ullrich <sullrich@pfsense.org>.
6
# Copyright (C) 2003 Manuel Kasper <mk@neon1.net>.
7
# All rights reserved.
8

    
9
# mount /cf
10
/etc/rc.conf_mount_rw
11

    
12
# Reset file(s)
13
echo "" >/conf/upgrade_log.txt
14
echo "" >/conf/firmware_update_misc_log.txt
15
echo "" >/conf/fdisk_upgrade_log.txt
16

    
17
exec 3>&2 2>>/conf/firmware_update_misc_log.txt
18

    
19
export ACTION=$1
20
export IMG=$2
21
if [ $# -eq 3 ]; then
22
	export CUSTOMIMG=$3
23
fi
24

    
25
if [ $ACTION != "upgrade" ]; then
26
	/sbin/umount -f /ftmp > /dev/null 2>&1
27
fi
28

    
29
file_notice() {
30
	/usr/local/bin/php -q -d auto_prepend_file=config.inc <<ENDOFF
31
	<?php
32
		require_once("globals.inc");		
33
		require_once("functions.inc");
34
		file_notice("$1", "$2", "$1", "");
35
	?>
36
ENDOFF
37
}
38

    
39
output_env_to_log() {
40
	date >> /conf/upgrade_log.txt
41
	echo "" >> /conf/upgrade_log.txt
42
	
43
	ls -lah /dev/ >> /conf/upgrade_log.txt
44
	echo "" >> /conf/upgrade_log.txt
45

    
46
	ls -lah $IMG >> /conf/upgrade_log.txt
47
	echo "" >> /conf/upgrade_log.txt
48

    
49
	md5 $IMG >> /conf/upgrade_log.txt
50
	echo "" >> /conf/upgrade_log.txt
51

    
52
	mount >> /conf/upgrade_log.txt
53
	echo "" >> /conf/upgrade_log.txt
54

    
55
	top >> /conf/upgrade_log.txt
56
	echo "" >> /conf/upgrade_log.txt
57
}
58

    
59
backup_chflags() {
60
	TOPROCESS="bin lib libexec sbin usr"
61
	for files in $TOPROCESS; do
62
		/usr/sbin/mtree -Pcp /${files} | bzip2 -9 > /tmp/chflags.dist.${files}.bz2 2>> /conf/upgrade_log.txt 
63
	done
64
}
65

    
66
restore_chflags() {
67
	TOPROCESS="bin lib libexec sbin usr"
68
	for files in $TOPROCESS; do
69
		cd / && /usr/bin/bzcat /tmp/chflags.dist.${files}.bz2 | /usr/sbin/mtree -PU -p /${files} >> /conf/upgrade_log.txt 2>&1
70
	done
71
}
72

    
73
remove_chflags() {
74
	TOPROCESS="bin lib libexec sbin usr"
75
	for files in $TOPROCESS; do
76
		/bin/chflags -R noschg /${files}
77
		/bin/chmod -R u+rw /${files}
78
	done
79
}
80

    
81
binary_update() {
82
	TGZ=$1
83
	ERR_F="/tmp/bdiff.log"
84
	rm ${ERR_F} 2>/dev/null
85
	/bin/mkdir /tmp/patched /tmp/patches 2>>${ERR_F}
86
	backup_chflags
87
	remove_chflags
88
	cd /tmp/patches
89
	for i in `/usr/bin/tar tvzf $TGZ | egrep -v "(^d|_md5)" | nawk '{print $9;}'`;
90
	 do
91
	   FILE=`basename ${i}`
92
	   echo "Working on ${i}"
93
	   # Untar patch file and md5 files
94
	   /usr/bin/tar xzf ${TGZ} ${i} ${i}.old_file_md5 ${i}.new_patch_md5 ${i}.new_file_md5 2>>${ERR_F}
95

    
96
	   # Apply patch - oldfile newfile patchfile
97
	   /usr/local/bin/bspatch /${i} /tmp/patched/${FILE} /tmp/patches/${i} 2>>${ERR_F}
98

    
99
	   OLD_FILE_MD5=`cat /tmp/patches/${i}.old_file_md5 2>/dev/null`
100
	   NEW_PATCH_MD5=`cat /tmp/patches/${i}.new_patch_md5 2>/dev/null`
101
	   NEW_FILE_MD5=`cat /tmp/patches/${i}.new_file_md5 2>/dev/null`
102
	   PATCHED_MD5=`/sbin/md5 -q /tmp/patched/${FILE} 2>/dev/null`
103

    
104
	   if [ "$PATCHED_MD5" = "$NEW_PATCH_MD5" ]; then
105
		/usr/bin/install -S  /tmp/patched/${FILE} /${i}
106
	   else
107
		#echo "${i} file does not match intended final md5."
108
		echo "${i} file does not match intended final md5." >> ${ERR_F}
109
	   fi
110

    
111
	   /bin/rm /tmp/patched/${FILE} >> ${ERR_F}
112
	   /bin/rm /tmp/patches/${i} >> ${ERR_F}
113
	   /bin/rm /tmp/patches/${i}.* >> ${ERR_F}
114
	done
115
	/bin/rm -rf /tmp/patched /tmp/patches >> ${ERR_F}
116
	restore_chflags
117
}
118

    
119
case $ACTION in
120
enable)
121
	touch /conf/upgrade_log.txt
122
	echo "" >> /conf/upgrade_log.txt
123
	echo "Enable" >> /conf/upgrade_log.txt
124
	echo "" >> /conf/upgrade_log.txt		
125
	/etc/rc.conf_mount_ro
126
	;;
127
auto)
128
	touch /var/run/firmwarelock.dirty
129
	backup_chflags
130
	remove_chflags
131
	/etc/rc.firmware_auto
132
	restore_chflags
133
	/etc/rc.conf_mount_ro
134
	;;
135
pfSenseNanoBSDupgrade)
136

    
137
	# Sanity check - bail early if there's no firmware file!
138
	if [ ! -r $IMG ]; then
139
		echo "2nd parameter has not been passed or file does not exist. Exiting." >> /conf/upgrade_log.txt 2>&1
140
		/etc/rc.conf_mount_ro
141
		exit 1
142
	fi
143

    
144
	# Prevent full upgrade file from being used to upgrade
145
	if [ `echo $IMG | grep "full"` ]; then
146
		echo "You cannot use a full file for upgrade.  Please use a file labeled nanobsd upgrade."
147
		file_notice "NanoBSDUpgradeFailure" "You have attemped to use a full NanoBSD installation file as an upgrade.  Please use a NanoBSD file labeled 'upgrade' instead."
148
		rm -f $IMG
149
		/etc/rc.conf_mount_ro		
150
		exit 1
151
	fi
152

    
153
	touch /var/run/firmwarelock.dirty
154

    
155
	echo "NanoBSD Firmware upgrade in progress..."  >> /conf/upgrade_log.txt 2>&1
156
	echo "NanoBSD Firmware upgrade in progress..." | wall
157

    
158
	# backup config
159
	/bin/mkdir -p /tmp/configbak
160
	cp -Rp /conf/* /tmp/configbak 2>/dev/null
161

    
162
	# Remove logs from backup dir to avoid clobbering upon restore.
163
	rm /tmp/configbak/*_log.txt 2>/dev/null
164

    
165
	echo "" >> /conf/upgrade_log.txt
166

    
167
	echo "Installing ${IMG}." >> /conf/upgrade_log.txt 2>&1
168
	echo "Installing ${IMG}." | wall
169

    
170
	# resolve glabel label that we booted from
171
	BOOT_DEVICE=`/sbin/mount | /usr/bin/grep pfsense | /usr/bin/cut -d'/' -f4 | /usr/bin/cut -d' ' -f1`
172
	# resolve glabel to the real boot dev entry
173
	REAL_BOOT_DEVICE=`/sbin/glabel list | /usr/bin/grep -B2 ufs/${BOOT_DEVICE} | /usr/bin/head -n 1 | /usr/bin/cut -f3 -d' '`
174
	# grab the boot device, example ad1, ad0
175
	BOOT_DRIVE=`/sbin/glabel list | /usr/bin/grep -B2 ufs/pfsense | /usr/bin/head -n 1 | /usr/bin/cut -f3 -d' ' | /usr/bin/cut -d's' -f1`
176
	# test the slice.  if we are on slice 1 we need to flash 2 and vica versa
177
	if [ `echo $REAL_BOOT_DEVICE | /usr/bin/grep "s1"` ]; then 
178
		SLICE="2"
179
		OLDSLICE="1"
180
		TOFLASH="${BOOT_DRIVE}s${SLICE}"
181
		COMPLETE_PATH="${BOOT_DRIVE}s${SLICE}a"
182
		GLABEL_SLICE="pfsense1"
183
		UFS_ID="1"
184
		OLD_UFS_ID="0"
185
	else
186
		SLICE="1"
187
		OLDSLICE="2"		
188
		TOFLASH="${BOOT_DRIVE}s${SLICE}"
189
		COMPLETE_PATH="${BOOT_DRIVE}s${SLICE}a"
190
		GLABEL_SLICE="pfsense0"
191
		UFS_ID="0"
192
		OLD_UFS_ID="1"
193
	fi
194

    
195
	# Output specifc information that this script is using
196
	echo "SLICE         ${SLICE}" >> /conf/upgrade_log.txt
197
	echo "OLDSLICE      ${OLDSLICE}" >> /conf/upgrade_log.txt
198
	echo "TOFLASH       ${TOFLASH}" >> /conf/upgrade_log.txt
199
	echo "COMPLETE_PATH ${COMPLETE_PATH}" >> /conf/upgrade_log.txt
200
	echo "GLABEL_SLICE  ${GLABEL_SLICE}" >> /conf/upgrade_log.txt
201

    
202
	# First ensure the new file can fit inside the 
203
	# slice that we are going to be operating on.
204
	NEW_IMG_SIZE=`echo $((\`gzip -l ${IMG} | grep -v compressed | awk '{ print $2}'\` / 1024 / 1024))`
205
	SIZE=`/sbin/fdisk ${COMPLETE_PATH} | /usr/bin/grep Meg | /usr/bin/awk '{ print $5 }' | /usr/bin/cut -d"(" -f2`
206
	SIZE=`expr $SIZE + 1`
207
	if [ "$SIZE" -lt "$NEW_IMG_SIZE" ]; then
208
		file_notice "UpgradeFailure" "Upgrade failed due to the upgrade image being larger than the partition that is configured on disk.  Halting. Size on disk: $SIZE < Size of new image: $NEW_IMG_SIZE"
209
		echo "Upgrade failed.  Please check the system log file for more information" | wall
210
		rm -f $IMG
211
		rm -f /var/run/firmwarelock.dirty
212
		rm -f /var/run/firmware.lock
213
		rm -f ${IMG}
214
		/etc/rc.conf_mount_ro		
215
		exit 1
216
	fi
217

    
218
	# Output environment information to log file
219
	output_env_to_log
220
	
221
	# Grab a before upgrade look at fdisk
222
	echo "" >> /conf/fdisk_upgrade_log.txt
223
	echo "Before upgrade fdisk/bsdlabel" >> /conf/fdisk_upgrade_log.txt
224
	fdisk $BOOT_DRIVE >> /conf/fdisk_upgrade_log.txt
225
	bsdlabel -A ${BOOT_DRIVE}s1 >> /conf/fdisk_upgrade_log.txt
226
	bsdlabel -A ${BOOT_DRIVE}s2 >> /conf/fdisk_upgrade_log.txt
227
	bsdlabel -A ${BOOT_DRIVE}s3 >> /conf/fdisk_upgrade_log.txt
228
	echo "---------------------------------------------------------------" >> /conf/fdisk_upgrade_log.txt
229
	echo "" >> /conf/fdisk_upgrade_log.txt
230
	
231
	# Log that we are really doing a NanoBSD upgrade
232
	echo "" >> /conf/upgrade_log.txt
233
	echo "NanoBSD upgrade starting" >> /conf/upgrade_log.txt
234
	echo "" >> /conf/upgrade_log.txt
235

    
236
	# Remove TOFLASH and get ready for new flash image
237
	echo "" >> /conf/upgrade_log.txt
238
	echo "dd if=/dev/zero of=/dev/${TOFLASH} bs=1m count=1" >> /conf/upgrade_log.txt	
239
	dd if=/dev/zero of=/dev/${TOFLASH} bs=1m count=1 >> /conf/upgrade_log.txt 2>&1
240

    
241
	# Stream gzipped image to dd and explode image to new area
242
	echo "" >> /conf/upgrade_log.txt
243
	echo "/usr/bin/gzip -dc $IMG | /bin/dd of=/dev/${TOFLASH} obs=64k" >> /conf/upgrade_log.txt
244
	/usr/bin/gzip -dc $IMG | /bin/dd of=/dev/${TOFLASH} obs=64k >> /conf/upgrade_log.txt 2>&1
245

    
246
	# Grab a after upgrade look at fdisk
247
	echo "" >> /conf/fdisk_upgrade_log.txt
248
	echo "After upgrade fdisk/bsdlabel" >> /conf/upgrade_log.txt
249
	fdisk $BOOT_DRIVE >> /conf/fdisk_upgrade_log.txt
250
	bsdlabel -A ${BOOT_DRIVE}s1 >> /conf/fdisk_upgrade_log.txt
251
	bsdlabel -A ${BOOT_DRIVE}s2 >> /conf/fdisk_upgrade_log.txt
252
	bsdlabel -A ${BOOT_DRIVE}s3 >> /conf/fdisk_upgrade_log.txt
253
	echo "---------------------------------------------------------------" >> /conf/fdisk_upgrade_log.txt
254
	echo "" >> /conf/fdisk_upgrade_log.txt
255
	
256
	# Ensure that our new system is sound and bail if it is not and file a notice
257
	echo "" >> /conf/upgrade_log.txt
258
	echo "/sbin/fsck_ufs -y /dev/${COMPLETE_PATH}" >> /conf/upgrade_log.txt
259
	/sbin/fsck_ufs -y /dev/${COMPLETE_PATH} >> /conf/upgrade_log.txt 2>&1
260
	if [ $? != 0 ]; then
261
		file_notice "UpgradeFailure" "{\$g['product_name']} upgrade has failed.   Your system has been left in a usable state."
262
		rm -f $IMG
263
		rm -f /var/run/firmwarelock.dirty
264
		rm -f /var/run/firmware.lock
265
		/etc/rc.conf_mount_ro		
266
		exit 1
267
	fi
268

    
269
	# Enable foot shooting
270
	sysctl kern.geom.debugflags=16
271

    
272
	# Add back the corresponding glabel
273
	echo "" >> /conf/upgrade_log.txt
274
	echo "/sbin/tunefs -L ${GLABEL_SLICE} /dev/${COMPLETE_PATH}" >> /conf/upgrade_log.txt
275
	/sbin/tunefs -L ${GLABEL_SLICE} /dev/${COMPLETE_PATH} >> /conf/upgrade_log.txt 2>&1
276

    
277
	# restore config
278
	cp -Rp /tmp/configbak/* /conf 2>/dev/null
279

    
280
	# Remove upgrade file
281
	rm -f $IMG
282

    
283
	# Mount newly prepared slice
284
	mkdir /tmp/$GLABEL_SLICE
285
	mount /dev/ufs/$GLABEL_SLICE /tmp/$GLABEL_SLICE
286

    
287
	# If /tmp/$GLABEL_SLICE/tmp/post_upgrade_command exists 
288
	# after update then execute the command.
289
	if [ -f /tmp/$GLABEL_SLICE/tmp/post_upgrade_command ]; then
290
		sh /tmp/$GLABEL_SLICE/tmp/post_upgrade_command >> /conf/upgrade_log.txt 2>&1
291
	fi
292

    
293
	# Update fstab
294
	cp /etc/fstab /tmp/$GLABEL_SLICE/etc/fstab
295
	sed -i "" "s/pfsense${OLD_UFS_ID}/pfsense${UFS_ID}/g" /tmp/$GLABEL_SLICE/etc/fstab
296
	if [ $? != 0 ]; then
297
		echo "Something went wrong when trying to update the fstab entry.  Aborting upgrade."
298
		file_notice "UpgradeFailure" "Something went wrong when trying to update the fstab entry.  Aborting upgrade."
299
		rm -f $IMG
300
		rm -f /var/run/firmwarelock.dirty
301
		rm -f /var/run/firmware.lock
302
		umount /tmp/$GLABEL_SLICE
303
		/etc/rc.conf_mount_ro
304
		exit 1
305
	fi
306
	echo "" >> /conf/upgrade_log.txt
307
	cat /tmp/$GLABEL_SLICE/etc/fstab >> /conf/upgrade_log.txt
308

    
309
	echo "" >> /conf/upgrade_log.txt
310
	find /tmp/$GLABEL_SLICE >/conf/file_upgrade_log.txt
311
	echo "" >> /conf/upgrade_log.txt
312

    
313
	# Unmount newly prepared slice
314
	umount /tmp/$GLABEL_SLICE
315
	
316
	sync
317

    
318
	# Set active mount slice in fdisk
319
	echo "" >> /conf/upgrade_log.txt
320
	echo "gpart set -a active -i ${SLICE} ${BOOT_DRIVE}" >> /conf/upgrade_log.txt
321
	gpart set -a active -i ${SLICE} ${BOOT_DRIVE} >> /conf/upgrade_log.txt 2>&1
322

    
323
	sync
324

    
325
	# Set active boot source - NanoBSD does not do this but otherwise we
326
	# end up with the wrong partition being active.
327
	echo "" >> /conf/upgrade_log.txt
328
	echo "/usr/sbin/boot0cfg -s ${SLICE} -v /dev/${BOOT_DRIVE}" >> /conf/upgrade_log.txt
329
	/usr/sbin/boot0cfg -s ${SLICE} -v /dev/${BOOT_DRIVE} >> /conf/upgrade_log.txt 2>&1
330

    
331
	# Disable foot shooting
332
	sysctl kern.geom.debugflags=0
333

    
334
	# Grab a final look at fdisk
335
	echo "" >> /conf/fdisk_upgrade_log.txt
336
	echo "Final upgrade fdisk/bsdlabel" >> /conf/fdisk_upgrade_log.txt
337
	fdisk $BOOT_DRIVE >> /conf/fdisk_upgrade_log.txt
338
	bsdlabel -A ${BOOT_DRIVE}s1 >> /conf/fdisk_upgrade_log.txt
339
	bsdlabel -A ${BOOT_DRIVE}s2 >> /conf/fdisk_upgrade_log.txt
340
	bsdlabel -A ${BOOT_DRIVE}s3 >> /conf/fdisk_upgrade_log.txt
341
	echo "---------------------------------------------------------------" >> /conf/fdisk_upgrade_log.txt
342
	echo "" >> /conf/fdisk_upgrade_log.txt
343

    
344
	# Remove extra stuff
345
	rm -rf /etc/rc.conf
346
	rm -rf /etc/motd
347
	rm -rf /usr/savecore/*
348

    
349
	date >> /conf/upgrade_log.txt
350
	echo "" >> /conf/upgrade_log.txt
351

    
352
	# Trigger a package reinstallation on reobot
353
	touch /conf/needs_package_sync
354

    
355
	# remount /cf ro
356
	/etc/rc.conf_mount_ro
357
	/bin/sync
358

    
359
	sleep 10
360

    
361
	rm -f /var/run/firmwarelock.dirty
362
	rm -f /var/run/firmware.lock
363
	sh /etc/rc.reboot
364

    
365
	;;
366
pfSenseupgrade)
367

    
368
	# Sanity check - bail early if there's no firmware file!
369
	if [ ! -r $IMG ]; then
370
		echo "2nd parameter has not been passed or file does not exist. Exiting." >> /conf/upgrade_log.txt 2>&1
371
		/etc/rc.conf_mount_ro
372
		exit
373
	fi
374

    
375
	# wait 1 seconds before beginning
376
	sleep 1
377

    
378
	# Log that we are really doing a pfSense upgrade
379
	echo "" >> /conf/upgrade_log.txt
380
	echo "pfSenseupgrade upgrade starting" >> /conf/upgrade_log.txt
381
	echo "" >> /conf/upgrade_log.txt
382

    
383
	touch /var/run/firmwarelock.dirty
384

    
385
	touch /conf/upgrade_log.txt
386
	echo "" >> /conf/upgrade_log.txt
387

    
388
	# Output environment information to log file
389
	output_env_to_log
390

    
391
	backup_chflags
392
	remove_chflags
393

    
394
	# Do we have a pre-upgrade hook in the update file?
395
	if [ `tar tvzf $IMG | grep /tmp/pre_upgrade_command | wc -l` -gt 0 ]; then 
396
		tar xzvf $IMG -C / ./tmp/pre_upgrade_command >> /conf/upgrade_log.txt 2>&1
397
		chmod a+rx /tmp/pre_upgrade_command >> /conf/upgrade_log.txt 2>&1
398
		sh /tmp/pre_upgrade_command >> /conf/upgrade_log.txt 2>&1
399
	fi
400

    
401
	echo "Firmware upgrade in progress..."  >> /conf/upgrade_log.txt 2>&1
402
	echo "Firmware upgrade in progress..."  | wall
403

    
404
	# backup config
405
	/bin/mkdir -p /tmp/configbak
406
	cp -Rp /conf/* /tmp/configbak 2>/dev/null
407

    
408
	# Remove logs from backup dir to avoid clobbering upon restore.
409
	rm /tmp/configbak/*_log.txt 2>/dev/null
410

    
411
	# tar explode image onto hd
412
	echo "Installing $IMG." >> /conf/upgrade_log.txt 2>&1
413
	cd / && /usr/bin/tar xzUPf $IMG >> /conf/upgrade_log.txt 2>&1
414
	/usr/bin/find / -name CVS -exec rm -fr {} \;
415
	echo "Image installed $IMG." >> /conf/upgrade_log.txt 2>&1
416

    
417
    # process custom image if its passed
418
    if [ $# -eq 3 ]; then
419
	    if [ -f $CUSTOMIMG ]; then
420
	        echo "Custom image $CUSTOMIMG found." >> /conf/upgrade_log.txt 2>&1
421
	        echo "Custom image ($CUSTOMIMG) found." >> /conf/upgrade_log.txt 2>&1
422
	        PWD_DIR=`pwd`
423
	        cd / && /usr/bin/tar xzPUf $CUSTOMIMG >> /conf/upgrade_log.txt 2>&1
424
	        cd $PWD_DIR
425
	        echo "Custom image $CUSTOMIMG installed." >> /conf/upgrade_log.txt 2>&1
426
	    fi
427
    fi
428

    
429
	# restore config
430
	cp -Rp /tmp/configbak/* /conf 2>/dev/null
431

    
432
	# restore /etc symlinks
433
	rm /etc/hosts
434
	ln -s /var/etc/hosts /etc/hosts
435

    
436
	restore_chflags
437

    
438
	# Remove upgrade file
439
	rm -f $IMG
440

    
441
	if [ -e /etc/init_bootloader.sh ]; then
442
		sh /etc/init_bootloader.sh >> /conf/upgrade_log.txt 2>&1
443
	fi
444

    
445
	# If /tmp/post_upgrade_command exists after update
446
	# then execute the command.
447
	if [ -f /tmp/post_upgrade_command ]; then
448
		sh /tmp/post_upgrade_command >> /conf/upgrade_log.txt 2>&1
449
	fi
450

    
451
	# remove unused files
452
	rm -rf /etc/rc.conf
453
	rm -rf /etc/motd
454
	rm -rf /usr/savecore/*
455

    
456
	date >> /conf/upgrade_log.txt
457
	echo "" >> /conf/upgrade_log.txt
458

    
459
	# remount /cf ro
460
	/etc/rc.conf_mount_ro
461

    
462
	# release the firmware lock
463
	rm -f /var/run/firmwarelock.dirty
464
	rm -f /var/run/firmware.lock
465
	/bin/sync
466

    
467
	# Sleep and allow disks to catch up
468
	sleep 10
469

    
470
	# If the archive has unpacked a file called
471
	# /tmp/no_upgrade_reboot_required then do
472
	# not reboot after upgrade.
473
	if [ -f /tmp/no_upgrade_reboot_required ]; then
474
		rm /tmp/no_upgrade_reboot_required
475
	else
476
		rm -f /var/run/config.lock
477
		sh /etc/rc.reboot
478
	fi
479

    
480
	;;
481
delta_update)
482
	touch /var/run/firmwarelock.dirty
483
	backup_chflags
484
	remove_chflags
485
	binary_update $IMG
486
	restore_chflags
487
	rm -rf /etc/rc.conf
488
	rm -rf /etc/motd
489
	find / -name CVS -type d -exec rm {} \;
490
	rm -rf /usr/savecore/*
491
	/etc/rc.conf_mount_ro
492
	/sbin/umount -f /cf 2>/dev/null
493
	/sbin/mount -r /cf 2>/dev/null
494
	/sbin/umount -f / 2>/dev/null
495
	/sbin/mount -r / 2>/dev/null
496
	if [ -e /etc/init_bootloader.sh ]; then
497
		sh /etc/init_bootloader.sh
498
	fi
499

    
500
	;;
501
esac
502

    
(47-47/93)