aboutsummaryrefslogtreecommitdiffstats
path: root/main/mkinitfs
diff options
context:
space:
mode:
authorNatanael Copa <ncopa@alpinelinux.org>2015-12-18 10:58:54 +0000
committerNatanael Copa <ncopa@alpinelinux.org>2015-12-18 11:03:22 +0000
commit44e371dc3f6dd83467da99f9d4f7667902fbdc12 (patch)
treebc6ad7ea8b1349b6cf969c21d601886b5a619b55 /main/mkinitfs
parent25e6d1f3898106f37842eee53cb58d05ffbeaaee (diff)
downloadaports-44e371dc3f6dd83467da99f9d4f7667902fbdc12.tar.bz2
aports-44e371dc3f6dd83467da99f9d4f7667902fbdc12.tar.xz
main/mkinitfs: upgrade to 3.0.0
Diffstat (limited to 'main/mkinitfs')
-rw-r--r--main/mkinitfs/APKBUILD12
-rw-r--r--main/mkinitfs/git.patch1969
2 files changed, 4 insertions, 1977 deletions
diff --git a/main/mkinitfs/APKBUILD b/main/mkinitfs/APKBUILD
index c24380f29f..229e3b0556 100644
--- a/main/mkinitfs/APKBUILD
+++ b/main/mkinitfs/APKBUILD
@@ -1,6 +1,6 @@
# Maintainer: Natanael Copa <ncopa@alpinelinux.org>
pkgname=mkinitfs
-pkgver=2.8.0_git20151216
+pkgver=3.0.0
_ver=${pkgver%_git*}
pkgrel=0
pkgdesc="Tool to generate initramfs images for Alpine"
@@ -10,7 +10,6 @@ depends="acct busybox apk-tools>=2.0 lddtree>=1.25"
install="$pkgname.pre-upgrade $pkgname.post-install $pkgname.post-upgrade"
triggers="$pkgname.trigger=/usr/share/kernel/*"
source="http://dev.alpinelinux.org/archive/$pkgname/$pkgname-$_ver.tar.xz
- git.patch
"
arch="all"
license="GPL2"
@@ -36,9 +35,6 @@ package() {
cd "$_builddir"
make install DESTDIR="$pkgdir" || return 1
}
-md5sums="1a321336d97b22257349ddd36884ec34 mkinitfs-2.8.0.tar.xz
-56f7bf0af2d4262d60a91d335bb44073 git.patch"
-sha256sums="5ffe4c5ec9e0ff4581e5b24301fd30d0964120d6b30ee78ea79f31ff48eeab73 mkinitfs-2.8.0.tar.xz
-057a4c8be2867db925ac4aa5af18b9a7457d5f2d44f0fdb058270c3ad908d690 git.patch"
-sha512sums="c103003f95c7d7d94daa41d0a81b210a0208c93d77203978554fb127a21e2f143b56990865fc53e2c5c732ef663603b297da63d31f915b1e3a3e0f3818aa8f2e mkinitfs-2.8.0.tar.xz
-6680ccff560306e6708c94f822d7415616ce920807ab33a26228ab73ed0cbf27c44adf58fe90f590ecab86a72d1f37f2375059bff5775e760bb2a68aa1634111 git.patch"
+md5sums="a6ffc5292902994f28dee3700cc9cebb mkinitfs-3.0.0.tar.xz"
+sha256sums="45c0bb5972906f5b95e0bb66e45972d0752b1097c83ad31136913a09adbc796f mkinitfs-3.0.0.tar.xz"
+sha512sums="a70cfb5e21b26dc15332f92c5633429144ca70053ee095eb3b0fa18900fc73200cf1f42ccd6232dede96f4b2939504f7887b0ac915871200043ed4b62c534624 mkinitfs-3.0.0.tar.xz"
diff --git a/main/mkinitfs/git.patch b/main/mkinitfs/git.patch
deleted file mode 100644
index ef27ea474d..0000000000
--- a/main/mkinitfs/git.patch
+++ /dev/null
@@ -1,1969 +0,0 @@
-diff --git a/Makefile b/Makefile
-index aaa553e..5ce1962 100644
---- a/Makefile
-+++ b/Makefile
-@@ -5,7 +5,7 @@ sysconfdir ?= /etc/mkinitfs
- datarootdir ?= /usr/share
- datadir ?= $(datarootdir)/mkinitfs
-
--SBIN_FILES := mkinitfs bootchartd
-+SBIN_FILES := mkinitfs bootchartd nlplug-findfs
- SHARE_FILES := initramfs-init fstab passwd group
- CONF_FILES := mkinitfs.conf \
- features.d/ata.modules \
-@@ -25,13 +25,13 @@ CONF_FILES := mkinitfs.conf \
- features.d/gfs2.modules \
- features.d/jfs.modules \
- features.d/keymap.files \
-- features.d/kms.files \
- features.d/kms.modules \
- features.d/lvm.files \
- features.d/lvm.modules \
- features.d/network.files \
- features.d/network.modules \
- features.d/ocfs2.modules \
-+ features.d/raid.files\
- features.d/raid.modules \
- features.d/reiserfs.modules \
- features.d/scsi.modules \
-@@ -41,7 +41,7 @@ CONF_FILES := mkinitfs.conf \
- features.d/virtio.modules \
- features.d/xfs.modules
-
--SCRIPTS := $(SBIN_FILES) initramfs-init
-+SCRIPTS := mkinitfs bootchartd initramfs-init
- IN_FILES := $(addsuffix .in,$(SCRIPTS))
-
- GIT_REV := $(shell test -d .git && git describe || echo exported)
-@@ -62,7 +62,8 @@ SED_REPLACE := -e 's:@VERSION@:$(FULL_VERSION):g' \
- -e 's:@datadir@:$(datadir):g'
-
-
--all: $(SCRIPTS)
-+
-+all: $(SBIN_FILES) $(SCRIPTS)
-
- clean:
- rm -f $(SCRIPTS)
-@@ -71,6 +72,26 @@ help:
- @echo mkinitfs $(VERSION)
- @echo "usage: make install [DESTDIR=]"
-
-+CFLAGS ?= -Wall -Werror -g
-+CFLAGS += -D_GNU_SOURCE -DDEBUG
-+
-+PKGCONF ?= pkg-config
-+BLKID_CFLAGS := $(shell $(PKGCONF) --cflags blkid)
-+BLKID_LIBS := $(shell $(PKGCONF) --libs blkid)
-+LIBKMOD_CFLAGS := $(shell $(PKGCONF) --cflags libkmod)
-+LIBKMOD_LIBS := $(shell $(PKGCONF) --libs libkmod)
-+CRYPTSETUP_CFLAGS := $(shell $(PKGCONF) --cflags libcryptsetup)
-+CRYPTSETUP_LIBS := $(shell $(PKGCONF) --libs libcryptsetup)
-+
-+CFLAGS += $(BLKID_CFLAGS) $(LIBKMOD_CFLAGS) $(CRYPTSETUP_CFLAGS)
-+LIBS = $(BLKID_LIBS) $(LIBKMOD_LIBS) $(CRYPTSETUP_LIBS)
-+
-+%.o: %.c
-+ $(CC) $(CFLAGS) -o $@ -c $<
-+
-+nlplug-findfs: nlplug-findfs.o
-+ $(CC) $(LDFLAGS) -o $@ $^ $(LIBS)
-+
- .SUFFIXES: .in
- .in:
- ${SED} ${SED_REPLACE} ${SED_EXTRA} $< > $@
-diff --git a/arg.h b/arg.h
-new file mode 100644
-index 0000000..92a313f
---- /dev/null
-+++ b/arg.h
-@@ -0,0 +1,39 @@
-+/*
-+ * Copy me if you can.
-+ * by 20h
-+ */
-+
-+#ifndef __ARG_H__
-+#define __ARG_H__
-+
-+#define USED(x) ((void)(x))
-+
-+#define ARGBEGIN for (argv++, argc--;\
-+ argv[0] && argv[0][1]\
-+ && argv[0][0] == '-';\
-+ argc--, argv++) {\
-+ char _argc;\
-+ char **_argv;\
-+ if (argv[0][1] == '-' && argv[0][2] == '\0') {\
-+ argv++;\
-+ argc--;\
-+ break;\
-+ }\
-+ for (argv[0]++, _argv = argv; argv[0][0];\
-+ argv[0]++) {\
-+ if (_argv != argv)\
-+ break;\
-+ _argc = argv[0][0];\
-+ switch (_argc)
-+
-+#define ARGEND }\
-+ USED(_argc);\
-+ }\
-+ USED(argv);\
-+ USED(argc);
-+
-+#define EARGF(x) ((argv[1] == NULL)? ((x), abort(), (char *)0) :\
-+ (argc--, argv++, argv[0]))
-+
-+#endif
-+
-diff --git a/bootchartd.in b/bootchartd.in
-index c4daa35..55a0883 100755
---- a/bootchartd.in
-+++ b/bootchartd.in
-@@ -46,7 +46,7 @@ do_logging()
- # Enable process accounting if configured
- if [ "$PROCESS_ACCOUNTING" = "yes" ]; then
- [ -e kernel_pacct ] || : > kernel_pacct
-- accton kernel_pacct
-+ accton kernel_pacct > /dev/null
- fi
-
- # open file descriptors
-@@ -98,7 +98,7 @@ do_logging()
- i=$(($i + 1))
- done
-
-- [ -e kernel_pacct ] && accton
-+ [ -e kernel_pacct ] && accton off > /dev/null
- }
-
- # Stop the boot logger. The lock file is removed to force the loggers in
-@@ -151,19 +151,18 @@ finalize()
-
- # Package log files
- tar -zcf "$BOOTLOG_DEST" header $pacct *.log
-- rm "$LOGDIR"/*
-- rmdir "$LOGDIR"
-+ rm -rf "$LOGDIR"
- }
-
- case "$1" in
- start-initfs)
- NEWROOT="$2"
-+ mkdir -p "$LOGDIR"
- (
- cleanup=true
- trap "not_stop_logging=false" USR1
- trap "cleanup=false; not_stop_logging=false" USR2
-
-- mkdir "$LOGDIR"
- cd "$LOGDIR"
- do_logging
- if $cleanup; then
-@@ -171,18 +170,16 @@ start-initfs)
- finalize
- fi
- ) &
-- echo $! > $LOGDIR/bootchart.pid
-+ echo $! > "$LOGDIR"/bootchart.pid
- ;;
- stop-initfs)
- NEWROOT="$2"
--
-- cd "$LOGDIR"
-- mkdir "$NEWROOT$LOGDIR"
-- cp /sbin/bootchartd $NEWROOT/sbin
-- PID=`cat bootchart.pid`
-+ [ -x "$NEWROOT"/sbin/bootchartd ] || cp -a /sbin/bootchartd "$NEWROOT"/sbin
-+ rm -rf "$NEWROOT/$LOGDIR"
-+ PID=$(cat "$LOGDIR"/bootchart.pid)
- kill -USR2 $PID
- wait $PID
-- mv * "$NEWROOT$LOGDIR"
-+ mv "$LOGDIR" "$NEWROOT"
- ;;
- start-rootfs)
- (
-diff --git a/features.d/base.files b/features.d/base.files
-index 7dd36e5..23718cb 100644
---- a/features.d/base.files
-+++ b/features.d/base.files
-@@ -4,3 +4,4 @@
- /sbin/apk
- /etc/modprobe.d/*.conf
- /etc/mdev.conf
-+/sbin/nlplug-findfs
-diff --git a/features.d/bootchart.files b/features.d/bootchart.files
-index 8adf4df..6f28294 100644
---- a/features.d/bootchart.files
-+++ b/features.d/bootchart.files
-@@ -1,3 +1,4 @@
-+/sbin/bootchartd
- /usr/bin/ac
- /usr/bin/last
- /usr/bin/lastcomm
-@@ -5,4 +6,3 @@
- /usr/sbin/dump-acct
- /usr/sbin/accton
- /usr/sbin/sa
--
-diff --git a/features.d/btrfs.modules b/features.d/btrfs.modules
-index b5a271f..a114111 100644
---- a/features.d/btrfs.modules
-+++ b/features.d/btrfs.modules
-@@ -1,2 +1,5 @@
- kernel/crypto/crc32c*
-+kernel/arch/*/crypto/crc32*
-+kernel/arch/*/crypto/crc32*
-+kernel/crypto/crc32*
- kernel/fs/btrfs
-diff --git a/features.d/cryptsetup.modules b/features.d/cryptsetup.modules
-index 9b63cd3..1469be7 100644
---- a/features.d/cryptsetup.modules
-+++ b/features.d/cryptsetup.modules
-@@ -1,2 +1,3 @@
- kernel/crypto/*
-+kernel/arch/*/crypto/*
- kernel/drivers/md/dm-crypt.ko
-diff --git a/features.d/kms.files b/features.d/kms.files
-deleted file mode 100644
-index 9d198b2..0000000
---- a/features.d/kms.files
-+++ /dev/null
-@@ -1 +0,0 @@
--lib/firmware/radeon/*.bin
-diff --git a/features.d/lvm.modules b/features.d/lvm.modules
-index 92f0721..3af8ef9 100644
---- a/features.d/lvm.modules
-+++ b/features.d/lvm.modules
-@@ -1 +1,2 @@
- kernel/drivers/md/dm-mod.ko
-+kernel/drivers/md/dm-snapshot.ko
-diff --git a/features.d/raid.files b/features.d/raid.files
-new file mode 100644
-index 0000000..c393dc4
---- /dev/null
-+++ b/features.d/raid.files
-@@ -0,0 +1,2 @@
-+/etc/mdadm.conf
-+/sbin/mdadm
-diff --git a/features.d/virtio.modules b/features.d/virtio.modules
-index fa74c10..b0e6c22 100644
---- a/features.d/virtio.modules
-+++ b/features.d/virtio.modules
-@@ -1,2 +1,3 @@
- kernel/drivers/block/virtio*
- kernel/drivers/virtio
-+kernel/drivers/net/virtio_net*
-diff --git a/features.d/xfs.modules b/features.d/xfs.modules
-index f577bf3..2b7fd53 100644
---- a/features.d/xfs.modules
-+++ b/features.d/xfs.modules
-@@ -1 +1,4 @@
-+kernel/arch/*/crypto/crc32*
-+kernel/arch/*/crypto/crc32*
-+kernel/crypto/crc32*
- kernel/fs/xfs
-diff --git a/initramfs-init.in b/initramfs-init.in
-index 934fe92..cdf50b9 100755
---- a/initramfs-init.in
-+++ b/initramfs-init.in
-@@ -7,7 +7,7 @@ sysroot=/sysroot
- splashfile=/.splash.ctrl
-
- /bin/busybox mkdir -p /usr/bin /usr/sbin /proc /sys /dev $sysroot \
-- /media/cdrom /media/usb /tmp
-+ /media/cdrom /media/usb /tmp /run
- /bin/busybox --install -s
-
- # basic environment
-@@ -42,30 +42,6 @@ eend() {
- fi
- }
-
--scan_drivers() {
-- if [ "$KOPT_autodetect" != no ] ; then
-- find /sys -name modalias | xargs sort -u | xargs modprobe -a 2> /dev/null
-- fi
--}
--
--find_ovl() {
-- local mnt="$1"
--
-- if [ -n "$APKOVL" ]; then
-- [ -f "$mnt/$APKOVL" ] && echo "$mnt/$APKOVL"
-- return
-- fi
--
-- # look for apkovl's on mounted media
-- set -- "$mnt"/*.apkovl.tar.gz*
--
-- if [ $# -gt 1 ] ; then
-- echo "ERROR: More than one apkovl file was found on $(basename $mnt). None will be read." >&2
-- return 1
-- fi
-- echo "$1"
--}
--
- retry_mount() {
- # usb might need some time to settle so we retry a few times
- for i in $(seq 0 9); do
-@@ -87,7 +63,6 @@ unpack_apkovl() {
- fi
-
- # we need openssl. let apk handle deps
-- find_boot_repositories > /tmp/repositories
- apk add --quiet --initdb --repositories-file /tmp/repositories openssl\
- || return 1
-
-@@ -110,92 +85,35 @@ unpack_apkovl() {
- # find mount dir for given device in an fstab
- # returns global MNTOPTS
- find_mnt() {
-- local search_dev="$1" fstab="$2"
-- MNTOPTS=
-- [ -r "$fstab" ] || return 1
-- local dev mnt fs chk
-+ local search_dev="$1"
-+ local fstab="$2"
- case "$search_dev" in
-- UUID=*|LABEL=*|/dev/*);;
-- *) search_dev=/dev/$search_dev;;
-+ UUID*|LABEL*) search_dev=$(findfs "$search_dev");;
- esac
-- local search_real_dev=$(resolve_dev $search_dev)
-+ MNTOPTS=
-+ [ -r "$fstab" ] || return 1
-+ local search_maj_min=$(stat -L -c '%t,%T' $search_dev)
- while read dev mnt fs MNTOPTS chk; do
-- local real_dev=$(resolve_dev $dev)
-- local i j
-- for i in "$search_dev" "$search_real_dev"; do
-- [ -z "$i" ] && continue
-- for j in "$dev" "$real_dev"; do
-- [ -z "$j" ] && continue
-- if [ "$i" = "$j" ]; then
-- echo "$mnt"
-- return
-- fi
-- done
-- done
-+ case "$dev" in
-+ UUID*|LABEL*) dev=$(findfs "$dev");;
-+ esac
-+ if [ -b "$dev" ]; then
-+ local maj_min=$(stat -L -c '%t,%T' $dev)
-+ if [ "$maj_min" = "$search_maj_min" ]; then
-+ echo "$mnt"
-+ return
-+ fi
-+ fi
- done < $fstab
- MNTOPTS=
- }
-
--# Wait for usb to settle
--wait_usb() {
-- if [ -n "$USB_DONE" ] || ! dmesg | grep '^usb-storage: waiting' >/dev/null; then
-- return 0
-- fi
-- ebegin "Waiting for USB device to settle"
-- while ! dmesg | grep 'usb-storage: device scan complete' >/dev/null; do
-- sleep 1
-- done
-- USB_DONE=yes
-- eend 0
--}
--
- # add a boot service to $sysroot
- rc_add() {
- mkdir -p $sysroot/etc/runlevels/$2
- ln -sf /etc/init.d/$1 $sysroot/etc/runlevels/$2/$1
- }
-
--find_ovl_blkdev() {
-- local fsmoddir=/lib/modules/$(uname -r)/kernel/fs
-- blkid | while read line; do
-- mod=
-- UUID=
-- TYPE=
-- dev=${line%%: *}
-- eval ${line#$dev:}
-- for i in $fsmoddir/$TYPE.ko $fsmoddir/*/$TYPE.ko; do
-- [ -f $fsmoddir/*/$TYPE.ko ] && mod=$i && break
-- done
-- [ -n "$mod" ] || continue
-- mnt=/media/${UUID:-${dev##*/}}
-- mkdir -p "$mnt"
-- mount -o ro -t "$TYPE" "$dev" "$mnt" 2>/dev/null || continue
-- ovl=$(find_ovl "$mnt")
-- if [ -f "$ovl" ]; then
-- echo "$ovl"
-- break
-- fi
-- umount "$mnt"
-- done
--}
--
--# we have issues with some slow usb 1 hosts so we add 1 second delay
--# with possibility to increase delay at boot prompt with usbdelay=<sec>
--find_ovl_delayed_usb() {
-- local n i
-- # look for apkovl
-- for n in $(seq 0 ${KOPT_usbdelay:-1}); do
-- # wait for usb to settle if needed
-- wait_usb
-- ovl=$(find_ovl_blkdev)
-- if [ -f "$ovl" ]; then
-- ovl_unmount="${ovl%/*}"
-- return
-- fi
-- sleep 1
-- done
--}
--
- setup_inittab_console(){
- while [ $# -gt 0 ]; do
- local tty=${1%,*}
-@@ -225,44 +143,6 @@ setup_inittab_console(){
- done
- }
-
--start_raid() {
-- local n= i=
-- case "$KOPT_root" in
-- /dev/md*) n=${KOPT_root#/dev/md} ;;
-- esac
-- case "$KOPT_autoraid" in
-- [0-9]*) n="$n $(echo $KOPT_autoraid | tr ',' ' ')" ;;
-- esac
-- # if kernel can autostart the raid he will
-- for i in $n; do
-- mknod /dev/md$i b 9 $i
-- raidautorun /dev/md$i
-- done
-- # kernel cannot autostart newer versions of mdadm metadata
-- # so we also check if mdadm binary is there
-- if [ -x /sbin/mdadm ]; then
-- mdadm --assemble --scan
-- fi
--}
--
--# start cryptsetup if exists
--start_cryptsetup() {
-- [ -x /sbin/cryptsetup ] || return
-- modprobe dm-crypt
-- if [ -n "$KOPT_cryptroot" ]; then
-- modprobe dm-crypt
-- cryptsetup luksOpen $(resolve_dev "$KOPT_cryptroot") "$KOPT_cryptdm"
-- fi
--}
--
--# start lvm if exists
--start_lvm() {
-- [ -x /sbin/lvm ] || return
-- modprobe dm-mod
-- lvm vgscan --mknodes --ignorelockingfailure >/dev/null 2>&1
-- lvm vgchange --ignorelockingfailure -a y >/dev/null 2>&1
--}
--
- # determine the default interface to use if ip=dhcp is set
- # uses the first "eth" interface.
- ip_choose_if() {
-@@ -332,10 +212,6 @@ configure_ip() {
- ip_set "$device" "$client_ip" "$netmask" "$gw_ip"
- eend $?
- fi
-- MAC_ADDRESS=$(cat /sys/class/net/$device/address)
-- MACHINE_UUID=$(cat /sys/class/dmi/id/product_uuid)
-- OVL_DEV="${OVL_DEV/{MAC\}/$MAC_ADDRESS}"
-- OVL_DEV="${OVL_DEV/{UUID\}/$MACHINE_UUID}"
- }
-
- # resolve an uuid or symlink to the real device
-@@ -346,37 +222,27 @@ resolve_dev() {
- esac
- }
-
--# relocate ALPINE_MNT according given fstab
--relocate_alpine_mnt() {
-- local fstab="$1"
-- local mnt=$(find_mnt $ALPINE_DEV $fstab)
-- if [ -n "$mnt" ] && [ "$ALPINE_MNT" != "$mnt" ]; then
-- mkdir -p "$mnt"
-- mount -o move $ALPINE_MNT $mnt
-- ALPINE_MNT=$mnt
-+# relocate mountpoint according given fstab
-+relocate_mount() {
-+ local dir="${1}"
-+ local fstab="$2"
-+ local dev=$(df -P "$dir" | tail -1 | awk '{print $1}')
-+ local mnt=$(find_mnt $dev $fstab)
-+ if [ -n "$mnt" ]; then
-+ local oldmnt=$(awk -v d=$dev '$1==d {print $2}' /proc/mounts)
-+ if [ "$oldmnt" != "$mnt" ]; then
-+ mkdir -p "$mnt"
-+ mount -o move "$oldmnt" "$mnt"
-+ fi
- fi
- }
-
--# detect filesystem type on given device/UUID
--find_fs_type() {
-- local dev=$(findfs $1)
-- local i=
-- for i in $(blkid $dev); do
-- case $i in
-- TYPE=*) eval "$i"
-- echo $TYPE
-- return
-- ;;
-- esac
-- done
--}
--
- # find the dirs under ALPINE_MNT that are boot repositories
- find_boot_repositories() {
- if [ -n "$ALPINE_REPO" ]; then
- echo "$ALPINE_REPO"
- else
-- find $ALPINE_MNT -name .boot_repository -type f -maxdepth 3 \
-+ find /media/* -name .boot_repository -type f -maxdepth 3 \
- | sed 's:/.boot_repository$::'
- fi
- }
-@@ -438,63 +304,14 @@ if [ "$KOPT_dma" = no ]; then
- modprobe libata dma=0
- fi
-
--ALPINE_DEV=${KOPT_alpine_dev%%:*}
--ALPINE_DEV_FS=${KOPT_alpine_dev##*:}
--if [ "$ALPINE_DEV_FS" = "$ALPINE_DEV" ]; then
-- unset ALPINE_DEV_FS
--fi
--
--# /dev/blah:ext3
--if [ -n "$KOPT_ovl_dev" ] ; then
-- OVL_DEV=${KOPT_ovl_dev%%:*}
-- OVL_DEV_FS=${KOPT_ovl_dev##*:}
-- if [ "$OVL_DEV_FS" = "$OVL_DEV" ]; then
-- unset OVL_DEV_FS
-- fi
--fi
--
--# http://.../blah.apkovl.tar.gz
--case "$KOPT_apkovl" in
-- http://*|https://|ftp://*)
-- OVL_DEV="$KOPT_apkovl";;
-- *:*:*) # apkovl=sda1:ext4:/subdir/host.apkovl.tar.gz
-- OVL_DEV="${KOPT_apkovl%%:*}"
-- OVL_DEV_FS="${KOPT_apkovl%:*}"
-- OVL_DEV_FS="${OVL_DEV_FS#*:}"
-- APKOVL="${KOPT_apkovl##*:}"
-- ;;
-- *:*) # apkovl=sda1:/subdir/host.apkovl.tar.gz
-- OVL_DEV=${KOPT_apkovl%%:*}
-- APKOVL=${KOPT_apkovl##*:}
-- ;;
-- *) # apkovl=subdir/host.apkovl.tar.gz
-- APKOVL="${KOPT_apkovl}"
-- ;;
--esac
--
--case "$ALPINE_DEV" in
-- UUID=*|LABEL=*) ;;
-- nfs)
-- # nfs:IP:EXPORT
-- ALPINE_DEV_FS="$ALPINE_DEV"
-- ALPINE_DEV="${KOPT_alpine_dev:4}"
-- ;;
-- *) ALPINE_DEV=/dev/$ALPINE_DEV ;;
--esac
--
- # The following values are supported:
- # alpine_repo=auto -- default, search for .boot_repository
- # alpine_repo=http://... -- network repository
- ALPINE_REPO=${KOPT_alpine_repo}
- [ "$ALPINE_REPO" = "auto" ] && ALPINE_REPO=
-
--# look for standard mountpoint locations
--ALPINE_MNT=$(find_mnt $ALPINE_DEV /etc/fstab)
--[ -z "$ALPINE_MNT" ] && [ "$ALPINE_DEV_FS" = nfs ] && ALPINE_MNT=/media/alpine
--[ -z "$ALPINE_MNT" ] && ALPINE_MNT=/media/${ALPINE_DEV##*/}
--
- # hide kernel messages
--[ "$KOPT_quiet" = yes ] && dmesg -n 1
-+#[ "$KOPT_quiet" = yes ] && dmesg -n 1
-
- # optional blacklist
- for i in ${KOPT_blacklist/,/ }; do
-@@ -502,12 +319,8 @@ for i in ${KOPT_blacklist/,/ }; do
- done
-
- # setup /dev
--ebegin "Starting mdev"
- mount -t devtmpfs -o exec,nosuid,mode=0755,size=2M devtmpfs /dev 2>/dev/null \
- || mount -t tmpfs -o exec,nosuid,mode=0755,size=2M tmpfs /dev
--echo "/sbin/mdev" > /proc/sys/kernel/hotplug
--mdev -s
--RC=$?
- [ -d /dev/pts ] || mkdir -m 755 /dev/pts
- [ -c /dev/ptmx ] || mknod -m 666 /dev/ptmx c 5 2
- # make sure /dev/null is setup correctly
-@@ -516,7 +329,6 @@ RC=$?
- mount -t devpts -o gid=5,mode=0620,noexec,nosuid devpts /dev/pts
- [ -d /dev/shm ] || mkdir /dev/shm
- mount -t tmpfs -o nodev,nosuid,noexec shm /dev/shm
--eend $RC
-
- # load available drivers to get access to modloop media
- ebegin "Loading boot drivers"
-@@ -528,34 +340,36 @@ if [ -f /etc/modules ] ; then
- modprobe -q $module $args
- done
- fi
--scan_drivers
--scan_drivers
- eend 0
-
-+if [ -n "$KOPT_cryptroot" ]; then
-+ cryptopts="-c ${KOPT_cryptroot}"
-+ if [ -n "$KOPT_cryptdm" ]; then
-+ cryptopts="$cryptopts -m ${KOPT_cryptdm}"
-+ fi
-+fi
-+
- # check if root=... was set
- if [ -n "$KOPT_root" ]; then
- if [ "$SINGLEMODE" = "yes" ]; then
- echo "Entering single mode. Type 'exit' to continue booting."
- sh
- fi
-- # let usb settle in case we boot from usb disks
-- [ -n "$KOPT_usbdelay" ] && sleep "$KOPT_usbdelay"
-- wait_usb
-- start=${KOPT_alpine_start:-raid,cryptsetup,lvm}
-- for i in ${start//,/ }; do
-- start_$i
-- done
-+
- ebegin "Mounting root"
- if [ "$KOPT_overlaytmpfs" = "yes" ]; then
-- mkdir -p /media/root-ro /media/root-rw $sysroot/media/root-ro $sysroot/media/root-rw
-- retry_mount -o ro $KOPT_root /media/root-ro 2>/dev/null
-+ mkdir -p /media/root-ro /media/root-rw $sysroot/media/root-ro \
-+ $sysroot/media/root-rw
-+ nlplug-findfs $cryptopts -p /sbin/mdev $KOPT_root \
-+ && mount -o ro $KOPT_root /media/root-ro
- mount -t tmpfs root-tmpfs /media/root-rw
- mkdir -p /media/root-rw/work /media/root-rw/root
- mount -t overlay -o lowerdir=/media/root-ro,upperdir=/media/root-rw/root,workdir=/media/root-rw/work overlayfs $sysroot
- else
-- retry_mount ${KOPT_rootfstype:+-t} ${KOPT_rootfstype} \
-+ nlplug-findfs $cryptopts -p /sbin/mdev $KOPT_root
-+ mount ${KOPT_rootfstype:+-t} ${KOPT_rootfstype} \
- -o ${KOPT_rootflags:-ro} \
-- $KOPT_root $sysroot 2>/dev/null
-+ $KOPT_root $sysroot
- fi
-
- eend $?
-@@ -571,35 +385,11 @@ if [ -n "$KOPT_root" ]; then
- exec /bin/busybox sh
- fi
-
--# we only want to wait for usb if really needed at this point
--if [ -z "${ALPINE_DEV##*usb*}" ]; then
-- wait_usb
--fi
--
--# IP. This shouldn't be needed if root= is set.
--configure_ip
--
--# incase we have alpine_dev on raid device...
--start=${KOPT_alpine_start:-raid,cryptsetup,lvm}
--for i in ${start//,/ }; do
-- start_$i
--done
--
- # locate boot media and mount it
- ebegin "Mounting boot media"
--mkdir -p $ALPINE_MNT
--
--# try detect the filesystem
--if [ -z "$ALPINE_DEV_FS" ]; then
-- ALPINE_DEV_FS=$(find_fs_type $ALPINE_DEV)
--fi
--
--if [ -n "$ALPINE_DEV_FS" ]; then
-- mount_opts="-t $ALPINE_DEV_FS"
-- [ "$ALPINE_DEV_FS" = "nfs" ] && mount_opts="$mount_opts -o nolock"
--fi
--
--retry_mount -o ro $mount_opts $ALPINE_DEV $ALPINE_MNT >/dev/null 2>&1
-+nlplug-findfs $cryptopts -p /sbin/mdev ${KOPT_debug_init:+-d} \
-+ ${KOPT_usbdelay:+-t $(( $KOPT_usbdelay * 1000 ))} \
-+ -b /tmp/repositories -a /tmp/apkovls
- eend $?
-
- # early console?
-@@ -620,27 +410,24 @@ fi
-
- mount -t tmpfs -o $rootflags tmpfs $sysroot
-
--case "$OVL_DEV" in
-+case "$KOPT_apkovl" in
- '')
-- ovl=$(find_ovl $ALPINE_MNT)
-- if ! [ -f "$ovl" ]; then
-- find_ovl_delayed_usb
-+ if [ -e /tmp/apkovls ]; then
-+ ovl=$(head -n 1 /tmp/apkovls)
- fi
- ;;
- http://*|https://*|ftp://*)
-- ovl=/tmp/boot.apkovl.tar.gz
-- wget -O "$ovl" "$OVL_DEV" || ovl=
-+ configure_ip
-+
-+ MAC_ADDRESS=$(cat /sys/class/net/$device/address)
-+ MACHINE_UUID=$(cat /sys/class/dmi/id/product_uuid)
-+ url="${KOPT_apkovl/{MAC\}/$MAC_ADDRESS}"
-+ url="${url/{UUID\}/$MACHINE_UUID}"
-+ ovl=/tmp/${url##*/}
-+ wget -O "$ovl" "$url" || ovl=
- ;;
- *)
-- mkdir -p /media/$OVL_DEV
-- unset mount_opts
-- if [ -n "$OVL_DEV_FS" ]; then
-- mount_opts="-t $OVL_DEV_FS"
-- fi
--
-- retry_mount -o ro $mount_opts /dev/$OVL_DEV /media/$OVL_DEV \
-- >/dev/null 2>&1
-- ovl=$(find_ovl /media/$OVL_DEV)
-+ ovl="$KOPT_apkovl"
- ;;
- esac
-
-@@ -660,26 +447,16 @@ if [ -f "$ovl" ]; then
- eend $? $errstr || ovlfiles=
- # hack, incase /root/.ssh was included in apkovl
- [ -d "$sysroot/root" ] && chmod 700 "$sysroot/root"
-- pkgs="$pkgs $(sed 's/\#.*//' $sysroot/etc/lbu/packages.list 2>/dev/null)"
-- pkgs="$pkgs $(cat $sysroot/var/lib/apk/world \
-- $sysroot/etc/apk/world 2>/dev/null)"
-- # clean up after upgrade
-- rm -f $sysroot/etc/lbu/packages.list \
-- $sysroot/var/lib/apk/world
--
-- # fix up inittab from pre openrc times (alpine v1.8)
-- if [ -f "$sysroot"/etc/inittab ]; then
-- sed -i -e 's|:/etc/init.d/rcS|:/sbin/rc sysinit|' \
-- -e 's|:/etc/init.d/rcL|:/sbin/rc default|' \
-- -e 's|:/etc/init.d/rcK|:/sbin/rc shutdown|' \
-- "$sysroot"/etc/inittab
-- fi
-+ pkgs="$pkgs $(cat $sysroot/etc/apk/world 2>/dev/null)"
- fi
-+
- if [ -f "$sysroot/etc/.default_boot_services" -o ! -f "$ovl" ]; then
- # add some boot services by default
- rc_add devfs sysinit
- rc_add dmesg sysinit
- rc_add mdev sysinit
-+ rc_add hwdrivers sysinit
-+ rc_add modloop sysinit
-
- rc_add hwclock boot
- rc_add modules boot
-@@ -695,17 +472,24 @@ if [ -f "$sysroot/etc/.default_boot_services" -o ! -f "$ovl" ]; then
- rm -f "$sysroot/etc/.default_boot_services"
- fi
-
--if [ "$KOPT_splash" != "no" -a -e $ALPINE_MNT/fbsplash.ppm ]; then
-+if [ "$KOPT_splash" != "no" ]; then
-+ for fbsplash in /media/*/fbsplash.ppm; do
-+ if [ -e "$fbsplash" ]; then
-+ break;
-+ fi
-+ done
-+fi
-+
-+if [ -n "$fbsplash" ] && [ -e "$fbsplash" ]; then
- local config
-- ebegin "Starting bootsplash (from $ALPINE_MNT)"
-+ ebegin "Starting bootsplash"
- mkfifo $sysroot/$splashfile
-- if [ -e $ALPINE_MNT/fbsplash.cfg ]; then
-- config=$ALPINE_MNT/fbsplash.cfg
-- else
-+ config="${fbsplash%.*}.cfg"
-+ if ! [ -e "$config" ]; then
- config=/tmp/fbsplash.cfg
- echo "IMAGE_ALIGN=CM" > $config
- fi
-- setsid fbsplash -T 16 -s $ALPINE_MNT/fbsplash.ppm -i $config -f $sysroot/$splashfile &
-+ setsid fbsplash -T 16 -s "$fbsplash" -i $config -f $sysroot/$splashfile &
- eend 0
- else
- KOPT_splash="no"
-@@ -723,13 +507,13 @@ if [ -f $sysroot/etc/fstab ]; then
- # move the ALPINE_MNT if ALPINE_DEV is specified in users fstab
- # this is so a generated /etc/apk/repositories will use correct
- # mount dir
-- relocate_alpine_mnt "$sysroot"/etc/fstab
--fi
--
--# in case we upgrade we might need those:
--rc_add hwdrivers sysinit
--rc_add modloop sysinit
-
-+ if [ -e /tmp/repositores ]; then
-+ while read dir; do
-+ relocate_mount "$dir" "$sysroot"/etc/fstab
-+ done < /tmp/repositories
-+ fi
-+fi
-
- # hack so we get openrc
- pkgs="$pkgs alpine-base"
-@@ -776,11 +560,16 @@ if [ "$KOPT_keep_apk_new" != yes ]; then
- apkflags="$apkflags --clean-protected"
- [ -n "$ovlfiles" ] && apkflags="$apkflags --overlay-from-stdin"
- fi
-+mkdir -p $sysroot/sys $sysroot/proc $sysroot/dev
-+mount -o bind /sys $sysroot/sys
-+mount -o bind /proc $sysroot/proc
-+mount -o bind /dev $sysroot/dev
- if [ -n "$ovlfiles" ]; then
- apk add --root $sysroot $repo_opt $apkflags $pkgs <$ovlfiles
- else
- apk add --root $sysroot $repo_opt $apkflags $pkgs
- fi
-+umount $sysroot/sys $sysroot/proc $sysroot/dev
- eend $?
-
- # unmount ovl mount if needed
-@@ -788,9 +577,11 @@ if [ -n "$ovl_unmount" ]; then
- umount $ovl_unmount 2>/dev/null
- fi
-
--# remount ALPINE_MNT according default fstab from package
--if [ -z "$has_fstab" ] && [ -f "$sysroot"/etc/fstab ]; then
-- relocate_alpine_mnt "$sysroot"/etc/fstab
-+# remount according default fstab from package
-+if [ -z "$has_fstab" ] && [ -f "$sysroot"/etc/fstab ] && [ -f /tmp/repositories ]; then
-+ while read dir; do
-+ relocate_mount "$dir" "$sysroot"/etc/fstab
-+ done < /tmp/repositories
- fi
-
- # generate repositories if none exists. this needs to be done after relocation
-@@ -810,10 +601,10 @@ fi
- setup_inittab_console $CONSOLE
-
- # copy alpine release info
--if ! [ -f "$sysroot"/etc/alpine-release ] && [ -f $ALPINE_MNT/.alpine-release ]; then
-- cp $ALPINE_MNT/.alpine-release $sysroot/
-- ln -sf /.alpine-release $sysroot/etc/alpine-release
--fi
-+#if ! [ -f "$sysroot"/etc/alpine-release ] && [ -f $ALPINE_MNT/.alpine-release ]; then
-+# cp $ALPINE_MNT/.alpine-release $sysroot/
-+# ln -sf /.alpine-release $sysroot/etc/alpine-release
-+#fi
-
- ! [ -f "$sysroot"/etc/resolv.conf ] && [ -f /etc/resolv.conf ] && \
- cp /etc/resolv.conf "$sysroot"/etc
-diff --git a/mkinitfs.conf b/mkinitfs.conf
-index 35cc96a..67a5444 100644
---- a/mkinitfs.conf
-+++ b/mkinitfs.conf
-@@ -1,2 +1,2 @@
- # run mkinitfs -L for a list of available features
--features="ata base bootchart cdrom cramfs ext2 ext3 ext4 floppy keymap kms raid scsi usb virtio"
-+features="ata base cdrom ext2 ext3 ext4 keymap kms mmc raid scsi usb virtio"
-diff --git a/mkinitfs.in b/mkinitfs.in
-index 04dc99c..c5f6434 100755
---- a/mkinitfs.in
-+++ b/mkinitfs.in
-@@ -36,7 +36,7 @@ feature_files() {
-
- initfs_base() {
- local i= dirs= glob= file=
-- for i in dev proc sys sbin bin .modloop lib/modules media/cdrom \
-+ for i in dev proc sys sbin bin run .modloop lib/modules media/cdrom \
- etc/apk media/floppy media/usb newroot; do
- dirs="$dirs $tmpdir/$i"
- done
-@@ -115,10 +115,24 @@ initfs_kmods() {
- for file in $(find_kmods); do
- echo "${file#/}"
- done | sort -u | cpio -pdm "$tmpdir" || return 1
-+ for file in modules.order modules.builtin; do
-+ if [ -f "$kerneldir"/$file ]; then
-+ cp "$kerneldir"/$file "$tmpdir"/lib/modules/$kernel/
-+ fi
-+ done
- depmod $kernel -b "$tmpdir"
- cd "$oldpwd"
- }
-
-+initfs_firmware() {
-+ rm -rf "$tmpdir"/lib/firmware
-+ mkdir -p "$tmpdir"/lib/firmware
-+ find "$tmpdir"/lib/modules -type f -name "*.ko" | xargs modinfo -F firmware | sort -u | while read FW; do
-+ [ -e "${basedir}/lib/firmware/${FW}" ] && install -pD "${basedir}/lib/firmware/${FW}" "$tmpdir"/lib/firmware/$FW
-+ done
-+ return 0
-+}
-+
- initfs_apk_keys() {
- mkdir -p "$tmpdir"/etc/apk/keys
- cp "${basedir}etc/apk/keys/"* "$tmpdir"/etc/apk/keys/
-@@ -179,7 +193,7 @@ done
- shift $(( $OPTIND - 1 ))
-
- . $(readlink -f "$config")
--features_dir=${features_dir:-"$sysconfdir/features.d"}
-+features_dir=${features_dir:-"${basedir%/:-}/${sysconfdir#/}/features.d"}
- [ -n "$myfeatures" ] && features="$myfeatures"
-
- if [ -n "$list_features" ]; then
-@@ -232,6 +246,7 @@ fi
-
- initfs_base \
- && initfs_kmods \
-+ && initfs_firmware \
- && initfs_apk_keys \
- && initfs_cpio
- rc=$?
-diff --git a/nlplug-findfs.c b/nlplug-findfs.c
-new file mode 100644
-index 0000000..7d1511e
---- /dev/null
-+++ b/nlplug-findfs.c
-@@ -0,0 +1,1021 @@
-+
-+/*
-+ * Copy me if you can.
-+ * by 20h
-+ *
-+ * Copyright (c) 2015 Natanael Copa <ncopa@alpinelinux.org>
-+ */
-+
-+#ifndef _GNU_SOURCE
-+#define _GNU_SOURCE
-+#endif
-+
-+#include <dirent.h>
-+#include <err.h>
-+#include <errno.h>
-+#include <glob.h>
-+#include <limits.h>
-+#include <poll.h>
-+#include <pthread.h>
-+#include <stdio.h>
-+#include <stdlib.h>
-+#include <string.h>
-+#include <termios.h>
-+#include <unistd.h>
-+
-+#include <sys/eventfd.h>
-+#include <sys/signalfd.h>
-+#include <sys/mount.h>
-+#include <sys/socket.h>
-+#include <sys/stat.h>
-+#include <sys/types.h>
-+#include <sys/uio.h>
-+#include <sys/wait.h>
-+
-+#include <linux/netlink.h>
-+
-+#include <libkmod.h>
-+#include <blkid.h>
-+#include <libcryptsetup.h>
-+
-+#include "arg.h"
-+
-+#define DEFAULT_EVENT_TIMEOUT 250
-+/* usb mass storage needs 1 sec to settle */
-+#define USB_STORAGE_TIMEOUT 1000
-+
-+#define FOUND_DEVICE 0x1
-+#define FOUND_BOOTREPO 0x2
-+#define FOUND_APKOVL 0x4
-+
-+#define TRIGGER_THREAD 0x1
-+#define CRYPTSETUP_THREAD 0x2
-+
-+#define LVM_PATH "/sbin/lvm"
-+#define MDADM_PATH "/sbin/mdadm"
-+
-+static int dodebug;
-+static char *default_envp[2];
-+char *argv0;
-+static int use_mdadm, use_lvm;
-+
-+#if defined(DEBUG)
-+#include <stdarg.h>
-+static void dbg(const char *fmt, ...)
-+{
-+ va_list fmtargs;
-+ if (!dodebug)
-+ return;
-+
-+ fprintf(stderr, "%s: ", argv0);
-+ va_start(fmtargs, fmt);
-+ vfprintf(stderr, fmt, fmtargs);
-+ va_end(fmtargs);
-+ fprintf(stderr, "\n");
-+}
-+#else
-+#define dbg(...)
-+#endif
-+
-+#define envcmp(env, key) (strncmp(env, key "=", strlen(key "=")) == 0)
-+
-+
-+static char **clone_array(char *const *const a)
-+{
-+ size_t i, s;
-+ char **c, *p;
-+
-+ if (!a) return 0;
-+
-+ s = sizeof(char*);
-+ for (i = 0; a[i]; i++)
-+ s += sizeof(char*) + strlen(a[i]) + 1;
-+ c = malloc(s);
-+ p = (char*)(c + i + 1);
-+ for (i = 0; a[i]; i++) {
-+ c[i] = p;
-+ p += sprintf(p, "%s", a[i]) + 1;
-+ }
-+ c[i] = 0;
-+ return c;
-+}
-+
-+struct spawn_task {
-+ struct spawn_task *next;
-+ char **argv, **envp;
-+};
-+struct spawn_manager {
-+ int num_running;
-+ int max_running;
-+ struct spawn_task *first, *last;
-+};
-+
-+static struct spawn_manager spawnmgr;
-+
-+static void spawn_execute(struct spawn_manager *mgr, char **argv, char **envp)
-+{
-+ pid_t pid;
-+
-+ dbg("[%d/%d] running %s", mgr->num_running+1, mgr->max_running, argv[0]);
-+ if (!(pid = fork())) {
-+ if (execve(argv[0], argv, envp ? envp : default_envp) < 0)
-+ err(1, argv[0]);
-+ exit(0);
-+ }
-+ if (pid < 0)
-+ err(1,"fork");
-+
-+ mgr->num_running++;
-+}
-+
-+static void spawn_queue(struct spawn_manager *mgr, char **argv, char **envp)
-+{
-+ struct spawn_task *task;
-+
-+ task = malloc(sizeof *task);
-+ if (!task) return;
-+ *task = (struct spawn_task) {
-+ .next = NULL,
-+ .argv = clone_array(argv),
-+ .envp = clone_array(envp),
-+ };
-+ if (mgr->last) {
-+ mgr->last->next = task;
-+ mgr->last = task;
-+ } else {
-+ mgr->first = mgr->last = task;
-+ }
-+}
-+
-+static void spawn_command(struct spawn_manager *mgr, char **argv, char **envp)
-+{
-+ if (!mgr->max_running)
-+ mgr->max_running = sysconf(_SC_NPROCESSORS_ONLN);
-+ if (mgr->num_running < mgr->max_running)
-+ spawn_execute(mgr, argv, envp);
-+ else
-+ spawn_queue(mgr, argv, envp);
-+}
-+
-+static void spawn_reap(struct spawn_manager *mgr, pid_t pid)
-+{
-+ mgr->num_running--;
-+ if (mgr->first && mgr->num_running < mgr->max_running) {
-+ struct spawn_task *task = mgr->first;
-+ if (task->next)
-+ mgr->first = task->next;
-+ else
-+ mgr->first = mgr->last = NULL;
-+ spawn_execute(mgr, task->argv, task->envp);
-+ free(task->argv);
-+ free(task->envp);
-+ free(task);
-+ }
-+}
-+
-+static int spawn_active(struct spawn_manager *mgr)
-+{
-+ return mgr->num_running || mgr->first;
-+}
-+
-+struct uevent {
-+ char *buf;
-+ size_t bufsize;
-+ char *message;
-+ char *subsystem;
-+ char *action;
-+ char *modalias;
-+ char *devname;
-+ char *major;
-+ char *minor;
-+ char devnode[256];
-+ char *envp[64];
-+};
-+
-+struct ueventconf {
-+ char **program_argv;
-+ char *search_device;
-+ char *crypt_device;
-+ char *crypt_name;
-+ char crypt_devnode[256];
-+ char *subsystem_filter;
-+ int modalias_count;
-+ int fork_count;
-+ char *bootrepos;
-+ char *apkovls;
-+ int timeout;
-+ int efd;
-+ unsigned running_threads;
-+ pthread_t cryptsetup_tid;
-+ pthread_mutex_t cryptsetup_mutex;
-+};
-+
-+
-+static void sighandler(int sig)
-+{
-+ switch (sig) {
-+ case SIGHUP:
-+ case SIGINT:
-+ case SIGQUIT:
-+ case SIGABRT:
-+ case SIGTERM:
-+ exit(0);
-+ default:
-+ break;
-+ }
-+}
-+
-+static void initsignals(void)
-+{
-+ signal(SIGHUP, sighandler);
-+ signal(SIGINT, sighandler);
-+ signal(SIGQUIT, sighandler);
-+ signal(SIGABRT, sighandler);
-+ signal(SIGTERM, sighandler);
-+ signal(SIGCHLD, sighandler);
-+ signal(SIGPIPE, SIG_IGN);
-+}
-+
-+static int init_netlink_socket(void)
-+{
-+ struct sockaddr_nl nls;
-+ int fd, slen;
-+
-+ memset(&nls, 0, sizeof(nls));
-+ nls.nl_family = AF_NETLINK;
-+ nls.nl_pid = getpid();
-+ nls.nl_groups = -1;
-+
-+ fd = socket(PF_NETLINK, SOCK_DGRAM | SOCK_NONBLOCK | SOCK_CLOEXEC,
-+ NETLINK_KOBJECT_UEVENT);
-+ if (fd < 0)
-+ err(1, "socket");
-+
-+ /* kernel will not create events bigger than 16kb, but we need
-+ buffer up all events during coldplug */
-+ slen = 512*1024;
-+ if (setsockopt(fd, SOL_SOCKET, SO_RCVBUFFORCE, &slen,
-+ sizeof(slen)) < 0) {
-+ err(1, "setsockopt");
-+ }
-+ slen = 1;
-+ if (setsockopt(fd, SOL_SOCKET, SO_PASSCRED, &slen,
-+ sizeof(slen)) < 0) {
-+ err(1, "setsockopt");
-+ }
-+
-+ if (bind(fd, (void *)&nls, sizeof(nls)))
-+ err(1, "bind");
-+
-+ return fd;
-+}
-+
-+static int load_kmod(const char *modalias, char *driver, size_t len)
-+{
-+ static struct kmod_ctx *ctx = NULL;
-+ struct kmod_list *list = NULL;
-+ struct kmod_list *node;
-+ int r, count=0;
-+
-+ if (ctx == NULL) {
-+ dbg("initializing kmod");
-+ ctx = kmod_new(NULL, NULL);
-+ if (ctx == NULL)
-+ return -1;
-+ kmod_set_log_fn(ctx, NULL, NULL);
-+ r = kmod_load_resources(ctx);
-+ }
-+
-+ r = kmod_module_new_from_lookup(ctx, modalias, &list);
-+ if (r < 0) {
-+ dbg("alias '%s' lookup failure", modalias);
-+ return r;
-+ }
-+
-+ kmod_list_foreach(node, list) {
-+ struct kmod_module *mod = kmod_module_get_module(node);
-+ const char *fmt;
-+ r = kmod_module_probe_insert_module(mod,
-+ KMOD_PROBE_APPLY_BLACKLIST,
-+ NULL, NULL, NULL, NULL);
-+ if (r == 0) {
-+ fmt = "module '%s' inserted";
-+ count++;
-+ } else if (r == KMOD_PROBE_APPLY_BLACKLIST) {
-+ fmt = "module '%s' is blacklisted";
-+ } else {
-+ fmt = "module '%s' failed";
-+ }
-+ dbg(fmt, kmod_module_get_name(mod));
-+ if (driver)
-+ strncpy(driver, kmod_module_get_name(mod), len);
-+ kmod_module_unref(mod);
-+ }
-+ kmod_module_unref_list(list);
-+ return count;
-+}
-+
-+static void start_mdadm(char *devnode)
-+{
-+ char *mdadm_argv[] = {
-+ MDADM_PATH,
-+ "--incremental",
-+ "--quiet",
-+ devnode,
-+ NULL
-+ };
-+ if (use_mdadm)
-+ spawn_command(&spawnmgr, mdadm_argv, 0);
-+}
-+
-+static void start_lvm2(char *devnode)
-+{
-+ char *lvm2_argv[] = {
-+ LVM_PATH, "vgchange",
-+ "--activate" , "ay", "--noudevsync", "--sysinit", "-q", "-q",
-+ NULL
-+ };
-+ if (use_lvm)
-+ spawn_command(&spawnmgr, lvm2_argv, 0);
-+}
-+
-+
-+static int read_pass(char *pass, size_t pass_size)
-+{
-+ struct termios old_flags, new_flags;
-+ int r;
-+
-+ tcgetattr(STDIN_FILENO, &old_flags);
-+ new_flags = old_flags;
-+ new_flags.c_lflag &= ~ECHO;
-+ new_flags.c_lflag |= ECHONL;
-+
-+ r = tcsetattr(STDIN_FILENO, TCSANOW, &new_flags);
-+ if (r < 0) {
-+ warn("tcsetattr");
-+ return r;
-+ }
-+
-+ if (fgets(pass, pass_size, stdin) == NULL) {
-+ warn("fgets");
-+ return -1;
-+ }
-+ pass[strlen(pass) - 1] = '\0';
-+
-+ if (tcsetattr(STDIN_FILENO, TCSANOW, &old_flags) < 0) {
-+ warn("tcsetattr");
-+ return r;
-+ }
-+
-+ return 0;
-+}
-+
-+static void *cryptsetup_thread(void *data)
-+{
-+ struct ueventconf *c = (struct ueventconf *)data;
-+ uint64_t ok = CRYPTSETUP_THREAD;
-+ struct crypt_device *cd;
-+ int r, passwd_tries = 5;
-+
-+ r = crypt_init(&cd, c->crypt_devnode);
-+ if (r < 0) {
-+ warnx("crypt_init(%s)", c->crypt_devnode);
-+ goto notify_out;
-+ }
-+
-+ r = crypt_load(cd , CRYPT_LUKS1, NULL);
-+ if (r < 0) {
-+ warnx("crypt_load(%s)", c->crypt_devnode);
-+ goto free_out;
-+ }
-+
-+ while (passwd_tries > 0) {
-+ char pass[1024];
-+
-+ printf("Enter passphrase for %s: ", c->crypt_devnode);
-+ fflush(stdout);
-+
-+ if (read_pass(pass, sizeof(pass)) < 0)
-+ goto free_out;
-+ passwd_tries--;
-+
-+ pthread_mutex_lock(&c->cryptsetup_mutex);
-+ r = crypt_activate_by_passphrase(cd, c->crypt_name,
-+ CRYPT_ANY_SLOT,
-+ pass, strlen(pass), 0);
-+ pthread_mutex_unlock(&c->cryptsetup_mutex);
-+
-+ if (r == 0)
-+ break;
-+ printf("No key available with this passphrase.\n");
-+ }
-+
-+free_out:
-+ crypt_free(cd);
-+notify_out:
-+ write(c->efd, &ok, sizeof(ok));
-+ return NULL;
-+}
-+
-+static void start_cryptsetup(struct ueventconf *conf)
-+{
-+ dbg("starting cryptsetup %s -> %s", conf->crypt_devnode, conf->crypt_name);
-+ load_kmod("dm-crypt", NULL, 0);
-+ pthread_create(&conf->cryptsetup_tid, NULL, cryptsetup_thread, conf);
-+ conf->running_threads |= CRYPTSETUP_THREAD;
-+}
-+
-+static int is_mounted(const char *devnode) {
-+ char line[PATH_MAX];
-+ FILE *f = fopen("/proc/mounts", "r");
-+ int r = 0;
-+ if (f == NULL)
-+ return 0;
-+ while (fgets(line, sizeof(line), f) != NULL) {
-+ strtok(line, " ");
-+ if (strcmp(devnode, line) == 0) {
-+ r = 1;
-+ break;
-+ }
-+ }
-+ fclose(f);
-+ return r;
-+}
-+
-+struct recurse_opts {
-+ const char *searchname;
-+ void (*callback)(const char *, const void *);
-+ void *userdata;
-+};
-+
-+/* pathbuf needs hold PATH_MAX chars */
-+static void recurse_dir(char *pathbuf, struct recurse_opts *opts)
-+{
-+ DIR *d = opendir(pathbuf);
-+ struct dirent *entry;
-+
-+ if (d == NULL)
-+ return;
-+
-+ while ((entry = readdir(d)) != NULL) {
-+ size_t pathlen = strlen(pathbuf);
-+ size_t namelen = strlen(entry->d_name);
-+ int is_dir;
-+
-+ /* d_type is not supported by all filesystems so we need
-+ lstat */
-+ if (pathlen + 2 + namelen > PATH_MAX) {
-+ dbg("path length overflow");
-+ continue;
-+ }
-+
-+ pathbuf[pathlen] = '/';
-+ strcpy(&pathbuf[pathlen+1], entry->d_name);
-+
-+ if (entry->d_type == DT_UNKNOWN) {
-+ /* some filesystems like iso9660 does not support
-+ the d_type so we use lstat */
-+ struct stat st;
-+ if (lstat(pathbuf, &st) < 0) {
-+ dbg("%s: %s", pathbuf, strerror(errno));
-+ goto next;
-+ }
-+ is_dir = S_ISDIR(st.st_mode);
-+ } else
-+ is_dir = entry->d_type & DT_DIR;
-+
-+ if (is_dir) {
-+ if (entry->d_name[0] == '.')
-+ goto next;
-+ } else if (opts->searchname
-+ && strcmp(entry->d_name, opts->searchname) != 0) {
-+ goto next;
-+ }
-+
-+ if (is_dir)
-+ recurse_dir(pathbuf, opts);
-+ else
-+ opts->callback(pathbuf, opts->userdata);
-+next:
-+ pathbuf[pathlen] = '\0';
-+ }
-+ closedir(d);
-+}
-+
-+struct bootrepos {
-+ char *outfile;
-+ int count;
-+};
-+
-+static void bootrepo_cb(const char *path, const void *data)
-+{
-+ struct bootrepos *repos = (struct bootrepos *)data;
-+ int fd = open(repos->outfile, O_WRONLY | O_CREAT | O_APPEND);
-+ if (fd == -1)
-+ err(1, "%s", repos->outfile);
-+
-+ write(fd, path, strlen(path) - strlen("/.boot_repository"));
-+ write(fd, "\n", 1);
-+ close(fd);
-+ dbg("added boot repository %s to %s\n", path, repos->outfile);
-+ repos->count++;
-+}
-+
-+static int find_apkovl(const char *dir, const char *outfile)
-+{
-+ char pattern[PATH_MAX];
-+ glob_t gl;
-+ int r, fd;
-+
-+ if (outfile == NULL)
-+ return 0;
-+
-+ snprintf(pattern, sizeof(pattern), "%s/*.apkovl.tar.gz*", dir);
-+
-+ r = glob(pattern, 0, NULL, &gl);
-+ if (r != 0)
-+ return 0;
-+
-+ fd = open(outfile, O_WRONLY | O_CREAT | O_APPEND);
-+ if (fd == -1)
-+ err(1, "%s", outfile);
-+
-+ for (r = 0; r < gl.gl_pathc; r++) {
-+ dbg("Found apkovl: %s", gl.gl_pathv[r]);
-+ write(fd, gl.gl_pathv[r], strlen(gl.gl_pathv[r]));
-+ write(fd, "\n", 1);
-+ }
-+ close(fd);
-+ globfree(&gl);
-+ return FOUND_APKOVL;
-+}
-+
-+static int find_bootrepos(const char *devnode, const char *type,
-+ char *bootrepos, const char *apkovls)
-+{
-+ char mountdir[PATH_MAX] = "";
-+ char *devname;
-+ int r, rc = 0;
-+ struct bootrepos repos = {
-+ .outfile = bootrepos,
-+ .count = 0,
-+ };
-+ struct recurse_opts opts = {
-+ .searchname = ".boot_repository",
-+ .callback = bootrepo_cb,
-+ .userdata = &repos,
-+ };
-+
-+
-+ /* skip already mounted devices */
-+ if (is_mounted(devnode)) {
-+ dbg("%s is mounted (%s). skipping", devnode, type);
-+ return 0;
-+ }
-+ devname = strrchr(devnode, '/');
-+
-+ if (devname)
-+ snprintf(mountdir, sizeof(mountdir), "/media%s", devname);
-+
-+ dbg("mounting %s on %s. (%s)", devnode, mountdir, type);
-+ mkdir(mountdir, 0755);
-+
-+ r = mount(devnode, mountdir, type, MS_RDONLY, NULL);
-+ if (r < 0) {
-+ dbg("Failed to mount %s on %s: %s",
-+ devnode, mountdir, strerror(errno));
-+ return 0;
-+ }
-+
-+ recurse_dir(mountdir, &opts);
-+ if (repos.count > 0)
-+ rc |= FOUND_BOOTREPO;
-+
-+ if (find_apkovl(mountdir, apkovls))
-+ rc |= FOUND_APKOVL;
-+
-+ if (rc == 0)
-+ umount(mountdir);
-+
-+ return rc;
-+}
-+
-+static int is_same_device(const struct uevent *ev, const char *nodepath)
-+{
-+ struct stat st;
-+ unsigned int maj, min;
-+ if (stat(nodepath, &st) < 0)
-+ return 0;
-+
-+ if (ev->major == NULL || ev->minor == NULL)
-+ return 0;
-+
-+ maj = atoi(ev->major);
-+ min = atoi(ev->minor);
-+ return S_ISBLK(st.st_mode) && makedev(maj, min) == st.st_rdev;
-+}
-+
-+
-+static int searchdev(struct uevent *ev, const char *searchdev, char *bootrepos,
-+ const char *apkovls)
-+{
-+ static blkid_cache cache = NULL;
-+ char *type = NULL, *label = NULL, *uuid = NULL;
-+ int rc = 0;
-+
-+ if (searchdev == NULL && bootrepos == NULL && apkovls == NULL)
-+ return 0;
-+
-+ if (searchdev && (strcmp(ev->devname, searchdev) == 0
-+ || strcmp(ev->devnode, searchdev) == 0
-+ || is_same_device(ev, searchdev))) {
-+ return FOUND_DEVICE;
-+ }
-+
-+ if (cache == NULL)
-+ blkid_get_cache(&cache, NULL);
-+
-+ type = blkid_get_tag_value(cache, "TYPE", ev->devnode);
-+
-+ if (searchdev != NULL) {
-+ if (strncmp("LABEL=", searchdev, 6) == 0) {
-+ label = blkid_get_tag_value(cache, "LABEL", ev->devnode);
-+ if (label && strcmp(label, searchdev+6) == 0)
-+ rc = FOUND_DEVICE;
-+ } else if (strncmp("UUID=", searchdev, 5) == 0) {
-+ uuid = blkid_get_tag_value(cache, "UUID", ev->devnode);
-+ if (uuid && strcmp(uuid, searchdev+5) == 0)
-+ rc = FOUND_DEVICE;
-+ }
-+ }
-+
-+ if (type || label || uuid) {
-+ dbg("%s:\n"
-+ "\ttype='%s'\n"
-+ "\tlabel='%s'\n"
-+ "\tuuid='%s'\n", ev->devnode,
-+ type ? type : NULL,
-+ label ? label : NULL,
-+ uuid ? uuid : NULL);
-+ }
-+
-+ if (!rc && type) {
-+ if (strcmp("linux_raid_member", type) == 0) {
-+ start_mdadm(ev->devnode);
-+ } else if (strcmp("LVM2_member", type) == 0) {
-+ start_lvm2(ev->devnode);
-+ } else if (bootrepos) {
-+ rc = find_bootrepos(ev->devnode, type, bootrepos, apkovls);
-+ }
-+ }
-+
-+ if (type)
-+ free(type);
-+ if (label)
-+ free(label);
-+ if (uuid)
-+ free(uuid);
-+
-+ return rc;
-+}
-+
-+static int dispatch_uevent(struct uevent *ev, struct ueventconf *conf)
-+{
-+ static int timeout_increment = USB_STORAGE_TIMEOUT;
-+
-+ if (conf->subsystem_filter && ev->subsystem
-+ && strcmp(ev->subsystem, conf->subsystem_filter) != 0) {
-+ dbg("subsystem '%s' filtered out (by '%s').",
-+ ev->subsystem, conf->subsystem_filter);
-+ return 0;
-+ }
-+
-+ if (ev->action == NULL)
-+ return 0;
-+
-+ if (ev->modalias != NULL && strcmp(ev->action, "add") == 0) {
-+ char buf[128];
-+ memset(buf, 0, sizeof(buf));
-+ load_kmod(ev->modalias, buf, sizeof(buf)-1);
-+ conf->modalias_count++;
-+
-+ /* increase timeout so usb drives gets time to settle */
-+ if (strcmp(buf, "usb_storage") == 0) {
-+ conf->timeout += timeout_increment;
-+ timeout_increment = 0;
-+ }
-+
-+ } else if (ev->devname != NULL) {
-+ if (conf->program_argv[0] != NULL) {
-+ spawn_command(&spawnmgr, conf->program_argv, ev->envp);
-+ conf->fork_count++;
-+ }
-+
-+ if (ev->subsystem && strcmp(ev->subsystem, "block") == 0
-+ && strcmp(ev->action, "add") == 0) {
-+ int rc;
-+
-+ snprintf(ev->devnode, sizeof(ev->devnode), "/dev/%s",
-+ ev->devname);
-+ pthread_mutex_lock(&conf->cryptsetup_mutex);
-+ rc = searchdev(ev, conf->search_device,
-+ conf->bootrepos, conf->apkovls);
-+ pthread_mutex_unlock(&conf->cryptsetup_mutex);
-+ if (rc)
-+ return rc;
-+
-+ if (searchdev(ev, conf->crypt_device, NULL, NULL)) {
-+ strncpy(conf->crypt_devnode,
-+ conf->crypt_device[0] == '/' ? conf->crypt_device : ev->devnode,
-+ sizeof(conf->crypt_devnode));
-+ start_cryptsetup(conf);
-+ }
-+ }
-+ }
-+ return 0;
-+}
-+
-+static int process_uevent(char *buf, const size_t len, struct ueventconf *conf)
-+{
-+ struct uevent ev;
-+
-+ int i, nenvp, slen = 0;
-+ char *key, *value;
-+
-+ memset(&ev, 0, sizeof(ev));
-+ ev.buf = buf;
-+ ev.bufsize = len;
-+
-+ nenvp = sizeof(default_envp) / sizeof(default_envp[0]) - 1;
-+ memcpy(&ev.envp, default_envp, nenvp * sizeof(default_envp[0]));
-+
-+ for (i = 0; i < len; i += slen + 1) {
-+ key = buf + i;
-+ value = strchr(key, '=');
-+ slen = strlen(buf+i);
-+
-+ if (i == 0 && slen != 0) {
-+ /* first line, the message */
-+ ev.message = key;
-+ continue;
-+ }
-+
-+ if (!slen || !value)
-+ continue;
-+
-+ value++;
-+ if (envcmp(key, "MODALIAS")) {
-+ ev.modalias = value;
-+ } else if (envcmp(key, "ACTION")) {
-+ ev.action = value;
-+ } else if (envcmp(key, "SUBSYSTEM")) {
-+ ev.subsystem = value;
-+ } else if (envcmp(key, "DEVNAME")) {
-+ ev.devname = value;
-+ } else if (envcmp(key, "MAJOR")) {
-+ ev.major = value;
-+ } else if (envcmp(key, "MINOR")) {
-+ ev.minor = value;
-+ }
-+
-+ if (!envcmp(key, "PATH"))
-+ ev.envp[nenvp++]= key;
-+ }
-+ ev.envp[nenvp++] = 0;
-+
-+ return dispatch_uevent(&ev, conf);
-+}
-+
-+static void trigger_uevent_cb(const char *path, const void *data)
-+{
-+ int fd = open(path, O_WRONLY);
-+ write(fd, "add", 3);
-+ close(fd);
-+}
-+
-+static void *trigger_thread(void *data)
-+{
-+ int fd = *(int *)data;
-+ uint64_t ok = TRIGGER_THREAD;
-+ struct recurse_opts opts = {
-+ .searchname = "uevent",
-+ .callback = trigger_uevent_cb,
-+ .userdata = NULL,
-+ };
-+ char path[PATH_MAX] = "/sys/bus";
-+
-+ recurse_dir(path, &opts);
-+ strcpy(path, "/sys/devices");
-+ recurse_dir(path, &opts);
-+ write(fd, &ok, sizeof(ok));
-+ return NULL;
-+}
-+
-+static void usage(int rc)
-+{
-+ printf("coldplug system til given device is found\n"
-+ "usage: %s [options] DEVICE\n"
-+ "\n"
-+ "options:\n"
-+ " -a OUTFILE add paths to found apkovls to OUTFILE\n"
-+ " -b OUTFILE add found boot repositories to OUTFILE\n"
-+ " -c CRYPTDEVICE run cryptsetup luksOpen when CRYPTDEVICE is found\n"
-+ " -h show this help\n"
-+ " -m CRYPTNAME use CRYPTNAME name for crypto device mapping\n"
-+ " -d enable debugging ouput\n"
-+ " -f SUBSYSTEM filter subsystem\n"
-+ " -p PROGRAM use PROGRAM as handler for every event with DEVNAME\n"
-+ " -t TIMEOUT timeout after TIMEOUT milliseconds without uevents\n"
-+ "\n", argv0);
-+
-+ exit(rc);
-+}
-+
-+int main(int argc, char *argv[])
-+{
-+ struct pollfd fds[3];
-+ int numfds = 3;
-+ int r;
-+ struct ueventconf conf;
-+ int event_count = 0;
-+ size_t total_bytes = 0;
-+ int found = 0;
-+ char *program_argv[2] = {0,0};
-+ pthread_t tid;
-+ sigset_t sigchldmask;
-+
-+ for (r = 0; environ[r]; r++) {
-+ if (envcmp(environ[r], "PATH"))
-+ default_envp[0] = environ[r];
-+ }
-+
-+ memset(&conf, 0, sizeof(conf));
-+ conf.program_argv = program_argv;
-+ conf.timeout = DEFAULT_EVENT_TIMEOUT;
-+ use_lvm = access(LVM_PATH, X_OK) == 0;
-+ use_mdadm = access(MDADM_PATH, X_OK) == 0;
-+
-+ argv0 = strrchr(argv[0], '/');
-+ if (argv0++ == NULL)
-+ argv0 = argv[0];
-+
-+ ARGBEGIN {
-+ case 'a':
-+ conf.apkovls = EARGF(usage(1));;
-+ break;
-+ case 'b':
-+ conf.bootrepos = EARGF(usage(1));
-+ break;
-+ case 'c':
-+ conf.crypt_device = EARGF(usage(1));
-+ break;
-+ case 'h':
-+ usage(0);
-+ break;
-+ case 'm':
-+ conf.crypt_name = EARGF(usage(1));
-+ break;
-+ case 'd':
-+ dodebug = 1;
-+ break;
-+ case 'f':
-+ conf.subsystem_filter = EARGF(usage(1));
-+ break;
-+ case 'p':
-+ conf.program_argv[0] = EARGF(usage(1));
-+ break;
-+ case 't':
-+ conf.timeout = atoi(EARGF(usage(1)));
-+ break;
-+ default:
-+ usage(1);
-+ } ARGEND;
-+
-+ if (argc > 0)
-+ conf.search_device = argv[0];
-+
-+ r = pthread_mutex_init(&conf.cryptsetup_mutex, NULL);
-+ if (r < 0)
-+ err(1, "pthread_mutex_init");
-+
-+ initsignals();
-+ sigemptyset(&sigchldmask);
-+ sigaddset(&sigchldmask, SIGCHLD);
-+ sigprocmask(SIG_BLOCK, &sigchldmask, NULL);
-+
-+ fds[0].fd = init_netlink_socket();
-+ fds[0].events = POLLIN;
-+
-+ fds[1].fd = signalfd(-1, &sigchldmask, SFD_NONBLOCK|SFD_CLOEXEC);
-+ fds[1].events = POLLIN;
-+
-+ fds[2].fd = eventfd(0, EFD_CLOEXEC);
-+ fds[2].events = POLLIN;
-+ conf.efd = fds[2].fd;
-+ pthread_create(&tid, NULL, trigger_thread, &fds[2].fd);
-+ conf.running_threads |= TRIGGER_THREAD;
-+
-+ while (1) {
-+ r = poll(fds, numfds, (spawn_active(&spawnmgr) || conf.running_threads) ? -1 : conf.timeout);
-+ if (r == -1) {
-+ if (errno == EINTR || errno == ERESTART)
-+ continue;
-+ err(1, "poll");
-+ }
-+ if (r == 0) {
-+ dbg("exit due to timeout (%i)", conf.timeout);
-+ break;
-+ }
-+
-+ if (fds[0].revents & POLLIN) {
-+ size_t len;
-+ struct iovec iov;
-+ char cbuf[CMSG_SPACE(sizeof(struct ucred))];
-+ char buf[16384];
-+ struct cmsghdr *chdr;
-+ struct ucred *cred;
-+ struct msghdr hdr;
-+ struct sockaddr_nl cnls;
-+
-+ iov.iov_base = &buf;
-+ iov.iov_len = sizeof(buf);
-+ memset(&hdr, 0, sizeof(hdr));
-+ hdr.msg_iov = &iov;
-+ hdr.msg_iovlen = 1;
-+ hdr.msg_control = cbuf;
-+ hdr.msg_controllen = sizeof(cbuf);
-+ hdr.msg_name = &cnls;
-+ hdr.msg_namelen = sizeof(cnls);
-+
-+ len = recvmsg(fds[0].fd, &hdr, 0);
-+ if (len < 0) {
-+ if (errno == EINTR)
-+ continue;
-+ err(1, "recvmsg");
-+ }
-+ if (len < 32 || len >= sizeof(buf))
-+ continue;
-+
-+ total_bytes += len;
-+ chdr = CMSG_FIRSTHDR(&hdr);
-+ if (chdr == NULL || chdr->cmsg_type != SCM_CREDENTIALS)
-+ continue;
-+
-+ /* filter out messages that are not from root or kernel */
-+ cred = (struct ucred *)CMSG_DATA(chdr);
-+ if (cred->uid != 0 || cnls.nl_pid > 0)
-+ continue;
-+
-+ event_count++;
-+ found |= process_uevent(buf, len, &conf);
-+
-+ if ((found & FOUND_DEVICE)
-+ || ((found & FOUND_BOOTREPO) &&
-+ (found & FOUND_APKOVL))) {
-+ if (conf.timeout)
-+ dbg("FOUND! setting timeout to 0");
-+ conf.timeout = 0;
-+ }
-+ }
-+
-+ if (fds[0].revents & POLLHUP) {
-+ dbg("parent hung up\n");
-+ break;
-+ }
-+
-+ if (fds[1].revents & POLLIN) {
-+ struct signalfd_siginfo fdsi;
-+ pid_t pid;
-+ int status;
-+
-+ while (read(fds[1].fd, &fdsi, sizeof fdsi) > 0)
-+ ;
-+ while ((pid = waitpid(-1, &status, WNOHANG)) > 0)
-+ spawn_reap(&spawnmgr, pid);
-+ }
-+
-+ if (fds[2].revents & POLLIN) {
-+ uint64_t tmask = 0;
-+ if (read(fds[2].fd, &tmask, sizeof(tmask)) < 0)
-+ warn("eventfd");
-+ if (tmask & TRIGGER_THREAD) {
-+ dbg("terminating trigger thread");
-+ pthread_join(tid, NULL);
-+ }
-+ if (tmask & CRYPTSETUP_THREAD) {
-+ dbg("terminating cryptsetup thread");
-+ pthread_join(conf.cryptsetup_tid, NULL);
-+ }
-+ conf.running_threads &= ~tmask;
-+ }
-+ }
-+ close(fds[2].fd);
-+ pthread_mutex_destroy(&conf.cryptsetup_mutex);
-+
-+ dbg("modaliases: %i, forks: %i, events: %i, total bufsize: %zu",
-+ conf.modalias_count,
-+ conf.fork_count,
-+ event_count, total_bytes);
-+
-+ return found ? 0 : 1;
-+}