USPLASH=y option in /usr/share/initramfs-tools/conf-hooks.d/cryptsetup is ignored

Bug #433773 reported by Richard Hansen
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
initramfs-tools (Ubuntu)
Fix Released
Undecided
Unassigned

Bug Description

Binary package hint: initramfs-tools

initramfs-tools version 0.92bubuntu46 (Karmic)

The cryptsetup password prompt is always text based even though USPLASH=y has been added to /usr/share/initramfs-tools/conf-hooks.d/cryptsetup (in cryptsetup version 2:1.0.6+20090405.svn49-1ubuntu2). The USPLASH=y line causes update-initramfs to copy the appropriate usplash scripts to the initramfs image, but when it is time to run these scripts at boot time, the scripts are not executed. This is because ${USPLASH} is not set at boot time, and thus call_scripts() in scripts/functions skips the usplash scripts.

One way to fix this would be to copy /usr/share/initramfs-tools/conf-hooks.d/* to the initramfs image, then source these files from the initramfs init script before calling run_scripts. An alternate solution is to modify call_scripts() and remove the check to see if the optional script is enabled.

A workaround is to add USPLASH=y to /etc/initramfs-tools/initramfs.conf. This file is copied to the initramfs image and sourced at boot time, so call_scripts() won't skip over the usplash scripts.

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package initramfs-tools - 0.92bubuntu48

---------------
initramfs-tools (0.92bubuntu48) karmic; urgency=low

   * Don't do OPTION=VAR checking at runtime, only do it when assembling the
     initramfs; this spares us having to add extra config files to the
     initramfs to enable functionality that's already been selected.
     LP: #433773.

 -- Steve Langasek <email address hidden> Tue, 22 Sep 2009 00:17:13 -0700

Changed in initramfs-tools (Ubuntu):
status: New → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.