patches and low-level development discussion
 help / color / mirror / code / Atom feed
From: Demi Marie Obenour <demiobenour@gmail.com>
To: Spectrum OS Development <devel@spectrum-os.org>
Cc: Demi Marie Obenour <demiobenour@gmail.com>, Alyssa Ross <hi@alyssa.is>
Subject: [PATCH 2/3] tools: Add adapter tool for services using sd_notify
Date: Sat, 13 Sep 2025 23:16:53 -0400	[thread overview]
Message-ID: <20250913-udev-v1-2-eade4ab8f2b4@gmail.com> (raw)
In-Reply-To: <20250913-udev-v1-0-eade4ab8f2b4@gmail.com>

This adapts programs using sd_notify for use with s6 readiness
notification.

Signed-off-by: Demi Marie Obenour <demiobenour@gmail.com>
---
The amount of code in sd-notify-adapter is significantly less than that
of s6-supervise itself.  Furthermore, it duplicates a lot of the
functionality in that tool.  Therefore, I think that s6-supervise is
actually the correct place for this.  In particular, this allows
reliable reloading of services: send a SIGHUP and wait for RELOADING=1
and then READY=1.
---
 tools/default.nix                           |   1 +
 tools/meson.build                           |   1 +
 tools/sd-notify-adapter/meson.build         |   4 +
 tools/sd-notify-adapter/sd-notify-adapter.c | 490 ++++++++++++++++++++++++++++
 4 files changed, 496 insertions(+)

diff --git a/tools/default.nix b/tools/default.nix
index 95d76a12c5d2cdc0f47134f36dc8ac326bd8aff1..88556e6fbae6584d03e67da5b74fbac306acb16e 100644
--- a/tools/default.nix
+++ b/tools/default.nix
@@ -70,6 +70,7 @@ stdenv.mkDerivation (finalAttrs: {
       ./lsvm
       ./start-vmm
       ./subprojects
+      ./sd-notify-adapter
     ]));
   };
   sourceRoot = "source/tools";
diff --git a/tools/meson.build b/tools/meson.build
index 9cebd03e323531fca7600cacf120161a98de16c5..91cb54e4e7472f8fc225bc75b82442d5600a3a9c 100644
--- a/tools/meson.build
+++ b/tools/meson.build
@@ -21,6 +21,7 @@ if get_option('host')
 
   subdir('lsvm')
   subdir('start-vmm')
+  subdir('sd-notify-adapter')
 endif
 
 if get_option('guest')
diff --git a/tools/sd-notify-adapter/meson.build b/tools/sd-notify-adapter/meson.build
new file mode 100644
index 0000000000000000000000000000000000000000..6032a3a7704d49cae0655b43d0189444d3b15e4d
--- /dev/null
+++ b/tools/sd-notify-adapter/meson.build
@@ -0,0 +1,4 @@
+# SPDX-License-Identifier: ISC
+# SPDX-FileCopyrightText: 2025 Demi Marie Obenour <demiobenour@gmail.com>
+
+executable('sd-notify-adapter', 'sd-notify-adapter.c', install: true)
diff --git a/tools/sd-notify-adapter/sd-notify-adapter.c b/tools/sd-notify-adapter/sd-notify-adapter.c
new file mode 100644
index 0000000000000000000000000000000000000000..d5356e2957bad8a15a5dd45e32db6bbac915c2c6
--- /dev/null
+++ b/tools/sd-notify-adapter/sd-notify-adapter.c
@@ -0,0 +1,490 @@
+// SPDX-License-Identifier: ISC
+// SPDX-FileCopyrightText: 2025 Demi Marie Obenour <demiobenour@gmail.com>
+// check_posix and check_posix_bool are based on code with following license:
+//
+// Copyright  2014 Daniel Micay
+//
+// Permission is hereby granted, free of charge, to any person obtaining a
+// copy of this software and associated documentation files (the
+// "Software"), to deal in the Software without restriction, including
+// without limitation the rights to use, copy, modify, merge, publish,
+// distribute, sublicense, and/or sell copies of the Software, and to
+// permit persons to whom the Software is furnished to do so, subject to
+// the following conditions:
+//
+// The above copyright notice and this permission notice shall be included
+// in all copies or substantial portions of the Software.
+//
+// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
+// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
+// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
+// IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
+// CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
+// TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
+// SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
+
+#define _GNU_SOURCE 1
+#include <assert.h>
+#include <errno.h>
+#include <limits.h>
+#include <signal.h>
+#include <stdarg.h>
+#include <stddef.h>
+#include <stdint.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+
+#include <getopt.h>
+#include <fcntl.h>
+#include <sys/syscall.h>
+#include <sys/socket.h>
+#include <sys/stat.h>
+#include <sys/un.h>
+#include <sys/wait.h>
+#include <unistd.h>
+#include <sysexits.h>
+#include <err.h>
+#include <poll.h>
+
+/* TODO: does this need to have credit given to Daniel Micay? */
+__attribute__((format(printf, 2, 3)))
+intmax_t check_posix(intmax_t arg, const char *fmt, ...) {
+	if (arg >= 0)
+		return arg;
+	assert(arg == -1);
+	va_list a;
+	va_start(a, fmt);
+	verr(EX_OSERR, fmt, a);
+	__builtin_unreachable();
+}
+
+#define check_posix(arg, message, ...) \
+	((__typeof__(arg))check_posix(arg, message, ## __VA_ARGS__))
+
+/* And same here */
+__attribute__((format(printf, 2, 3)))
+void check_posix_bool(intmax_t arg, const char *fmt, ...) {
+	if (arg != -1) {
+		assert(arg == 0);
+		return;
+	}
+	va_list a;
+	va_start(a, fmt);
+	verr(EX_OSERR, fmt, a);
+	va_end(a); /* not reached */
+}
+
+/* And same here */
+void check_posix_bool_no_atexit(intmax_t arg, const char *msg) {
+	if (arg != -1) {
+		assert(arg == 0);
+		return;
+	}
+	perror(msg);
+	_exit(EX_OSERR);
+}
+
+static volatile siginfo_t sig_info;
+static pid_t child_pid;
+
+/* Interrupts a call to ppoll(), which is AS-safe */
+static void handler(int signum, siginfo_t *info, void *data)
+{
+	(void)data;
+	switch (signum) {
+	case SIGCHLD:
+		switch (info->si_code) {
+		case CLD_EXITED:
+		case CLD_KILLED:
+		case CLD_DUMPED:
+			if (info->si_pid == child_pid)
+				sig_info = *info;
+			break;
+		}
+		break;
+	case SIGTERM:
+	case SIGINT:
+	case SIGWINCH:
+	case SIGHUP:
+	case SIGUSR1:
+	case SIGUSR2:
+	case SIGQUIT:
+		kill(child_pid, signum);
+		break;
+	default:
+		abort();
+	}
+}
+
+/* too_low is 1 below the lower bound; this prevents the final negation
+ * from overflowing if too_low and the result are INT_MIN */
+static int parse_int(const char *arg, int too_low) {
+	char *end = (char *)arg;
+	if (*arg == '0') {
+		if (arg[1] == '\0' && too_low < 0)
+			return 0;
+		return INT_MIN;
+	}
+	int negative = *arg == '-';
+	if (negative) {
+		arg++;
+	}
+	if (*arg < '1' || *arg > '9') {
+		return INT_MIN;
+	}
+	errno = 0;
+	long v = strtol(arg, &end, 10);
+	if (v <= too_low || v > INT_MAX || errno || *end != '\0') {
+		return INT_MIN;
+	}
+	return negative ? -(int)v : (int)v;
+}
+
+const struct option longopts[] = {
+	{ "oom-score-adj", required_argument, NULL, 'o' },
+	{ "help", no_argument, NULL, 'h' },
+	{ NULL, 0, NULL, 0 },
+};
+
+static _Noreturn void usage(int arg) {
+	errx(arg, "Usage: notification-fd [[-o|--oom-score-adj] adjustment] -- notify-socket program argv0 args...\n");
+}
+
+#if O_RDONLY != 0 || O_WRONLY != 1 || O_RDWR != 2
+# error unsupported O_* constants
+#endif
+
+static void check_fd_usable(int fd, bool writable) {
+	int raw_flags = fcntl(fd, F_GETFL);
+	if (raw_flags == -1) {
+		err(errno == EBADF ? EX_USAGE : EX_OSERR, "fcntl(%d, F_GETFD)", fd);
+	}
+	int flags = raw_flags & 3;
+	if (flags != O_RDWR && flags != (writable ? O_WRONLY : O_RDONLY)) {
+		errx(EX_USAGE, "File descriptor %d is not %s (flags 0x%x)", fd, writable ? "writable" : "readable", raw_flags);
+	}
+}
+
+static void check_pipe(int fd) {
+	struct stat buf;
+	check_posix_bool(fstat(fd, &buf), "fstat");
+	if (!S_ISFIFO(buf.st_mode)) {
+		errx(EX_USAGE, "notification fd %d is not a pipe", fd);
+	}
+	if (buf.st_mode & 066) {
+		errx(EX_USAGE, "notification fd %d is accessible by group or other", fd);
+	}
+}
+
+static pid_t process_cmsg(struct msghdr *const msg) {
+	pid_t sender_pid = -1;
+	for (struct cmsghdr *cmsg = CMSG_FIRSTHDR(msg); cmsg; cmsg = CMSG_NXTHDR(msg, cmsg)) {
+		size_t data_len = cmsg->cmsg_len - sizeof(struct cmsghdr);
+		if (cmsg->cmsg_level != SOL_SOCKET) {
+		       continue;
+		}
+		if (cmsg->cmsg_type == SCM_RIGHTS) {
+			int received_fd;
+			for (size_t i = 0; data_len - i >= sizeof(received_fd); i += sizeof(received_fd)) {
+				memcpy(&received_fd, CMSG_DATA(cmsg) + i, sizeof(received_fd));
+				(void)close(received_fd);
+			}
+		}
+		if (cmsg->cmsg_type == SCM_CREDENTIALS) {
+			struct ucred creds;
+			assert(data_len >= sizeof(creds));
+			memcpy(&creds, CMSG_DATA(cmsg), sizeof(creds));
+			sender_pid = creds.pid;
+		}
+	}
+	return sender_pid;
+}
+static pid_t own_pid;
+
+void kill_process_group(void) {
+	if (own_pid != -1)
+		kill(0, SIGKILL);
+}
+
+int main(int argc, char **argv) {
+	own_pid = getpid();
+	int oom_score_adj = INT_MIN;
+	if (argc < 1) {
+		errx(EX_USAGE, "argv[0] is NULL");
+	}
+	if (own_pid < 2) {
+		errx(EX_USAGE, "cannot run as PID 1");
+	}
+	for (int i = 0; i < 3; ++i) {
+		check_fd_usable(i, i != 0);
+	}
+
+	for (;;) {
+		int longindex = -1;
+		const char *lastopt = argv[optind];
+		int res = getopt_long(argc, argv, "+o:h", longopts, &longindex);
+		if (res == -1) {
+			if (argc - optind < 4) {
+				usage(EX_USAGE);
+			}
+			if (strcmp(lastopt, "--") != 0) {
+				errx(EX_USAGE, "no -- before non-option arguments");
+			}
+			break;
+		}
+		if (res == '?') {
+			usage(EX_USAGE);
+		}
+		/* getopt_long accepts abbreviated options. Disable this misfeature. */
+		if (lastopt[0] == '-' && lastopt[1] == '-') {
+			const char *optname = lastopt + 2;
+			assert(longindex >= 0 && longindex < (int)(sizeof(longopts)/sizeof(longopts[0])));
+			const char *expected = longopts[longindex].name;
+			if (strncmp(expected, optname, strlen(expected)) != 0) {
+				char *equal = strchr(optname, '=');
+				errx(EX_USAGE,
+				     "Option --%.*s must be written as --%s",
+				     equal ? (int)(equal - optname) : INT_MAX,
+				     optname, expected);
+			}
+		}
+		switch (res) {
+		case 'o':
+			oom_score_adj = parse_int(optarg, INT_MIN);
+			if (oom_score_adj < -1000 || oom_score_adj > 1000) {
+				errx(EX_USAGE, "Invalid OOM score adjustment %s", optarg);
+			}
+			break;
+		case 'h':
+			usage(0);
+		default:
+			assert(0); /* not reached */
+		}
+	}
+
+	union {
+		struct sockaddr_un un;
+		struct sockaddr addr;
+	} a = {};
+	int notification_fd = parse_int(argv[optind], 2);
+	const char *const socket_path = argv[optind + 1];
+	const char *const progname = argv[optind + 2];
+	char **const args_to_exec = argv + optind + 3;
+
+	if (notification_fd < 3) {
+		errx(EX_USAGE, "Invalid notification descriptor %s\n", argv[optind]);
+	}
+	check_fd_usable(notification_fd, true);
+	check_pipe(notification_fd);
+	check_posix_bool(chdir("/"), "chdir(/)");
+
+	mode_t old_mask = umask(0077);
+	size_t len = strlen(socket_path);
+	if (len >= sizeof(a.un.sun_path)) {
+		/* TODO: use stravis() */
+		errx(EX_USAGE, "Path %s is too long", socket_path);
+	}
+	if (socket_path[0] != '/') {
+		/* TODO: use stravis() */
+		errx(EX_USAGE, "Path %s is not absolute", socket_path);
+	}
+
+	if (check_posix(getpgrp(), "getpgrp()") != own_pid) {
+		check_posix_bool(setsid(), "setsid");
+	}
+
+	memcpy(a.un.sun_path, socket_path, len + 1);
+	a.un.sun_family = AF_UNIX;
+	int fd = check_posix(socket(AF_UNIX, SOCK_DGRAM | SOCK_CLOEXEC, 0), "socket");
+	{
+		int flag = 1;
+		check_posix_bool(setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &flag, (socklen_t)sizeof(flag)),
+				 "setsockopt(SO_REUSEADDR)");
+		check_posix_bool(setsockopt(fd, SOL_SOCKET, SO_PASSCRED, &flag, (socklen_t)sizeof(flag)),
+				 "setsockopt(SO_PASSCRED)");
+	}
+	for (;;) {
+		int status;
+		do {
+			status = bind(fd, &a.addr, (socklen_t)(len + 1 + offsetof(struct sockaddr_un, sun_path)));
+		} while (status == -1 && errno == EINTR);
+		if (!(status == -1 && errno == EADDRINUSE)) {
+			check_posix_bool(status, "bind(%s)", socket_path);
+			break;
+		}
+		check_posix_bool(unlink(socket_path), "unlink(%s)", socket_path);
+	}
+	umask(old_mask);
+
+	/* TODO: support commands */
+	sigset_t sigset;
+	sigemptyset(&sigset);
+	const int sigs[] = { SIGCHLD, SIGQUIT, SIGTERM, SIGINT, SIGWINCH, SIGHUP, SIGUSR1, SIGUSR2 };
+	for (size_t i = 0; i < sizeof(sigs)/sizeof(sigs[0]); ++i) {
+		check_posix_bool(sigaddset(&sigset, sigs[i]), "sigaddset(%d)", sigs[i]);
+	}
+	check_posix_bool(sigprocmask(SIG_BLOCK, &sigset, NULL), "sigprocmask");
+	struct sigaction act = { };
+	/* systemd ignores SIGPIPE, so emulate this */
+	act.sa_handler = SIG_IGN;
+	check_posix_bool(sigaction(SIGPIPE, &act, NULL), "sigaction(SIGPIPE)");
+	/* add handlers */
+	act.sa_sigaction = handler;
+	act.sa_mask = sigset; /* these are already blocked but that is harmless */
+	act.sa_flags = SA_SIGINFO;
+	for (size_t i = 0; i < sizeof(sigs)/sizeof(sigs[0]); ++i) {
+		check_posix_bool(sigaction(sigs[i], &act, NULL), "sigaction(%d)", sigs[i]);
+	}
+	static_assert(EOF == -1, "bad EOF definition");
+	check_posix_bool(fflush(NULL), "fflush");
+	if (oom_score_adj != INT_MIN) {
+		char *p;
+		int fd = check_posix(open("/proc/self/oom_score_adj",
+		                          O_WRONLY | O_CLOEXEC | O_NOCTTY | O_NOFOLLOW),
+		                     "open(\"/proc/self/oom_score_adj\")");
+		int to_write = check_posix(asprintf(&p, "%d\n", oom_score_adj), "asprintf");
+		ssize_t written = check_posix(write(fd, p, (size_t)to_write), "write(\"/proc/self/oom_score_adj\")");
+		assert(written == to_write);
+		free(p);
+	}
+	pid_t pid = fork();
+	if (pid < 0) {
+		assert(pid == -1);
+		err(EX_OSERR, "fork()");
+	}
+	child_pid = pid;
+
+	if (atexit(kill_process_group)) {
+		errx(EX_OSERR, "atexit()");
+	}
+	if (pid == 0) {
+		check_posix_bool_no_atexit(syscall(SYS_close_range, 3L, ~0UL, 0L), "close_range()");
+		check_posix_bool_no_atexit(setenv("NOTIFY_SOCKET", a.un.sun_path, 1), "setenv");
+		check_posix_bool_no_atexit(execve(progname, args_to_exec, environ), "execve");
+		abort(); /* not reached */
+	}
+	char buf[sizeof("RELOADING=1\n") - 1];
+	struct iovec v[1] = {
+		{
+			.iov_base = buf,
+			.iov_len = sizeof(buf),
+		},
+	};
+	union {
+		struct cmsghdr hdr;
+		char buf[CMSG_SPACE(sizeof(struct ucred)) + CMSG_SPACE(sizeof(int) * 253)];
+	} cmsg_buffer;
+
+	struct msghdr msg = {
+		.msg_name = NULL,
+		.msg_namelen = 0,
+		.msg_iov = v,
+		.msg_iovlen = sizeof(v)/sizeof(v[0]),
+		.msg_control = cmsg_buffer.buf,
+		.msg_controllen = sizeof(cmsg_buffer.buf),
+		.msg_flags = 0,
+	};
+	sigemptyset(&sigset);
+
+	struct pollfd p[] = {
+		{
+			.fd = fd,
+			.events = POLLIN | POLLPRI | POLLRDHUP,
+			.revents = 0,
+		},
+	};
+	bool ready = false;
+	bool reloading = false;
+
+	for (;;) {
+		/* Main event loop */
+		if (sig_info.si_pid) {
+			int status;
+			int r = waitpid(sig_info.si_pid, &status, 0);
+			if (r == -1)
+				err(EX_OSERR, "waitpid(%jd)", (intmax_t)sig_info.si_pid);
+			if (WIFSIGNALED(status)) {
+				for (;;) {
+					(void)signal(WTERMSIG(status), SIG_DFL);
+					(void)kill(getpid(), WTERMSIG(status));
+				}
+			} else if (WIFEXITED(status)) {
+				own_pid = -1;
+				return WEXITSTATUS(status);
+			} else {
+				abort(); /* cannot happen */
+			}
+		}
+		int r = ppoll(p, sizeof(p)/sizeof(p[0]), NULL, &sigset);
+		if (r < -1 || r > (int)(sizeof(p)/sizeof(p[0]))) {
+			abort();
+		}
+		if (r == -1) {
+			if (errno == ENOMEM) {
+				fprintf(stderr, "Kernel out of memory in ppoll()\n");
+				continue; /* todo: use epoll(7) instead */
+			}
+			if (errno == EINTR) {
+				fprintf(stderr, "ppoll() interrupted by signal\n");
+				continue;
+			}
+			err(EX_OSERR, "poll");
+		}
+		fprintf(stderr, "Returned from poll()\n");
+		if (p[0].revents) {
+			ssize_t data = recvmsg(fd, &msg, MSG_CMSG_CLOEXEC | MSG_DONTWAIT | MSG_TRUNC | MSG_PEEK);
+			if (data == -1) {
+				if (errno == EINTR) {
+					fprintf(stderr, "recvmsg() interrupted by signal");
+					continue; /* signal caught */
+				}
+				if (errno == EAGAIN || errno == EWOULDBLOCK) {
+					fprintf(stderr, "ppoll() spurious wakeup\n");
+					continue; /* spurious wakeup */
+				}
+			}
+			size_t size = (size_t)check_posix(data, "recvmsg");
+			pid_t sender_pid = process_cmsg(&msg);
+			if (msg.msg_flags & MSG_TRUNC) {
+				char *b = (v[0].iov_base == buf) ? malloc(size) : realloc(v[0].iov_base, size);
+				if (b != NULL) {
+					v[0].iov_base = b;
+					v[0].iov_len = size;
+				}
+			}
+			size = (size_t)check_posix(recvmsg(fd, &msg, MSG_CMSG_CLOEXEC | MSG_DONTWAIT | MSG_TRUNC), "recvmsg");
+			sender_pid = process_cmsg(&msg);
+			if (sender_pid != child_pid) {
+				fprintf(stderr, "%jd cannot notify\n", (intmax_t)sender_pid);
+				continue; /* cannot notify */
+			}
+			const char *cursor = v[0].iov_base;
+			const char *end = cursor + size;
+			for (;;) {
+				char *next = memchr(cursor, '\n', (size_t)(end - cursor));
+				size_t message_size = (size_t)((next == NULL ? end : next) - cursor);
+				if (message_size == sizeof("READY=1") - 1 && memcmp(cursor, "READY=1", sizeof("READY=1") - 1) == 0) {
+					if (!ready) {
+						if (check_posix(write(notification_fd, "Ready\n", sizeof("Ready")), "write") != sizeof("Ready")) {
+							errx(EX_OSERR, "cannot notify parent of readiness");
+						}
+					}
+					ready = true;
+					if (reloading) {
+						fprintf(stderr, "Configuration reload complete\n");
+					} else {
+						fprintf(stderr, "Program ready\n");
+					}
+					reloading = false;
+				} else if (message_size == sizeof("RELOADING=1") - 1 && memcmp(cursor, "RELOADING=1", sizeof("RELOADING=1") - 1) == 0) {
+					reloading = true;
+				}
+				if (next == NULL) {
+					break;
+				}
+				cursor = next + 1;
+			}
+		}
+	}
+}

-- 
2.51.0


  parent reply	other threads:[~2025-09-14  3:19 UTC|newest]

Thread overview: 51+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-09-14  3:16 [PATCH 0/3] Switch from mdevd to systemd-udevd in root filesystem Demi Marie Obenour
2025-09-14  3:16 ` [PATCH 1/3] host/rootfs: Add early serial output Demi Marie Obenour
2025-09-17 11:45   ` Alyssa Ross
2025-09-18  2:44     ` Demi Marie Obenour
2025-09-19 14:21   ` Alyssa Ross
2025-09-19 14:49   ` Alyssa Ross
2025-09-14  3:16 ` Demi Marie Obenour [this message]
2025-09-14  3:16 ` [PATCH 3/3] host/rootfs: switch to systemd-udevd Demi Marie Obenour
2025-09-19 14:12   ` Alyssa Ross
2025-09-19 19:32     ` Demi Marie Obenour
2025-09-21 12:18       ` Alyssa Ross
2025-09-21 17:02         ` Demi Marie Obenour
2025-09-21 16:27       ` Demi Marie Obenour
2025-09-21 16:28     ` Demi Marie Obenour
2025-09-23 18:39       ` Alyssa Ross
2025-09-23 19:18         ` Demi Marie Obenour
2025-09-24 10:32 ` [PATCH v2 0/3] Switch from mdevd to systemd-udevd in root filesystem Demi Marie Obenour
2025-09-24 10:32   ` [PATCH v2 1/3] tools: Add adapter tool for services using sd_notify Demi Marie Obenour
2025-09-25 10:29     ` Alyssa Ross
2025-09-25 16:54       ` Demi Marie Obenour
2025-09-24 10:32   ` [PATCH v2 2/3] host/rootfs: Switch to systemd-udevd Demi Marie Obenour
2025-09-25 10:53     ` Alyssa Ross
2025-09-25 17:53       ` Demi Marie Obenour
2025-09-26 14:56         ` Alyssa Ross
2025-09-28 22:51     ` [PATCH v3 0/2] Switch from mdevd to systemd-udevd in root filesystem Demi Marie Obenour
2025-09-28 22:51       ` [PATCH v3 1/2] tools: Add adapter tool for services using sd_notify Demi Marie Obenour
2025-10-01 16:06         ` Alyssa Ross
2025-09-28 22:51       ` [PATCH v3 2/2] host/rootfs: Switch to systemd-udevd Demi Marie Obenour
2025-10-01 14:24         ` Alyssa Ross
2025-10-01 14:39         ` Alyssa Ross
2025-10-01 17:40           ` Demi Marie Obenour
2025-10-02  9:53             ` Alyssa Ross
2025-10-02 10:34         ` Alyssa Ross
2025-10-02 10:36       ` [PATCH v3 0/2] Switch from mdevd to systemd-udevd in root filesystem Alyssa Ross
2025-10-03 21:42       ` [PATCH v4 " Demi Marie Obenour
2025-10-03 21:42         ` [PATCH v4 1/2] tools: Add adapter tool for services using sd_notify Demi Marie Obenour
2025-10-28 15:38           ` Alyssa Ross
2025-10-28 22:56             ` Demi Marie Obenour
2025-10-29 11:26           ` Alyssa Ross
2025-10-31  4:34             ` Demi Marie Obenour
2025-10-31  8:54               ` Alyssa Ross
2025-11-01 18:23                 ` Demi Marie Obenour
2025-10-03 21:42         ` [PATCH v4 2/2] host/rootfs: Switch to systemd-udevd Demi Marie Obenour
2025-10-28 16:02           ` Alyssa Ross
2025-10-28 22:56             ` Demi Marie Obenour
2025-10-29  9:31               ` Alyssa Ross
2025-10-29  9:55                 ` Demi Marie Obenour
2025-09-24 10:32   ` [PATCH v2 3/3] host/rootfs: Simplify s6-rc dependencies Demi Marie Obenour
2025-09-25 11:07     ` Alyssa Ross
2025-09-25 15:50       ` Demi Marie Obenour
2025-10-02 10:37         ` Alyssa Ross

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20250913-udev-v1-2-eade4ab8f2b4@gmail.com \
    --to=demiobenour@gmail.com \
    --cc=devel@spectrum-os.org \
    --cc=hi@alyssa.is \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this public inbox

	https://spectrum-os.org/git/crosvm
	https://spectrum-os.org/git/doc
	https://spectrum-os.org/git/mktuntap
	https://spectrum-os.org/git/nixpkgs
	https://spectrum-os.org/git/spectrum
	https://spectrum-os.org/git/ucspi-vsock
	https://spectrum-os.org/git/www

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).