. /etc/functions.sh failsafe_ip() { ifconfig $ifname 192.168.1.1 netmask 255.255.255.0 broadcast 192.168.1.255 up } failsafe() { lock /tmp/.failsafe failsafe_ip echo "0 1 2 3 4 5u*" > /proc/switch/eth0/vlan/0/ports set_state failsafe [ -x "/usr/sbin/nvram" ] && { [ "$(nvram get boot_wait)" != "on" ] && { nvram set boot_wait=on nvram commit } } netmsg 192.168.1.255 "Entering Failsafe!" telnetd -l /bin/login <> /dev/null 2>&1 ash --login } mount none /proc -t proc insmod diag set_state preinit trap 'FAILSAFE=true' USR1 echo '/sbin/hotplug.failsafe' > /proc/sys/kernel/hotplug ifname=eth0 # hardware specific overrides case "$(cat /proc/diag/model)" in "Linksys WAP54G V1") ifname=eth1;; "ASUS WL-HDD") ifname=eth1;; "ASUS WL-300g") ifname=eth1;; "ASUS (unknown, BCM4702)") ifname=eth1;; esac failsafe_ip insmod switch-core insmod switch-robo || insmod switch-adm || rmmod switch-core [ -d /proc/switch/eth0 ] && { echo 1 > /proc/switch/eth0/reset # this would be easier if we blasted the message across all ports # but we don't want packets leaking across interfaces for port in $(seq 0 4); do { echo "$port 5u*" > /proc/switch/eth0/vlan/0/ports netmsg 192.168.1.255 "Press reset now, to enter Failsafe!" }; done } || netmsg 192.168.1.255 "Press reset now, to enter Failsafe!" ifconfig $ifname 0.0.0.0 down sleep 2