From 220a956c7d6afc8d643dcbcfe41abce7bb57228e Mon Sep 17 00:00:00 2001 From: SolidHal Date: Mon, 2 Mar 2020 20:16:22 -0600 Subject: [PATCH] fix whitespace and make dmesg "disable" level consistent --- resources/BuildResources/initramfs-init | 2 +- scripts/InstallScripts/InstallPrawnOS.sh | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/resources/BuildResources/initramfs-init b/resources/BuildResources/initramfs-init index 3a1c09c..284beb9 100644 --- a/resources/BuildResources/initramfs-init +++ b/resources/BuildResources/initramfs-init @@ -76,7 +76,7 @@ fi if [ -n "$(blkid ${ROOT_DEV}2 | grep crypto_LUKS)" ] then #decrypt and mount the root filesystem, disable kernel log messages to avoid clashing with the prompt - dmesg -n 4 + dmesg -n 2 echo "Opening encrypted root partition, this will take 30s..." cryptsetup --tries 5 luksOpen ${ROOT_DEV}2 luksroot || rescue_shell dmesg -n 7 diff --git a/scripts/InstallScripts/InstallPrawnOS.sh b/scripts/InstallScripts/InstallPrawnOS.sh index a931578..84db0ac 100755 --- a/scripts/InstallScripts/InstallPrawnOS.sh +++ b/scripts/InstallScripts/InstallPrawnOS.sh @@ -123,12 +123,12 @@ install() { # Since iteration count is based on cpu power, and the rk3288 isn't as fast as a usual # desktop cpu, manually supply -i 15000 for security at the cost of a slightly slower unlock dmesg -n 2 - echo "Enter the password you would like to use to unlock the encrypted root partition at boot" + echo "Enter the password you would like to use to unlock the encrypted root partition at boot" cryptsetup -q -y -s 512 luksFormat -i 15000 $ROOT_PARTITION || exit 1 echo "Now unlock the newly created encrypted root partition so we can mount it and install the filesystem" cryptsetup luksOpen $ROOT_PARTITION luksroot || exit 1 dmesg -n 7 - ROOT_PARTITION=/dev/mapper/luksroot + ROOT_PARTITION=/dev/mapper/luksroot break ;; No,*|*,No )