about summary refs log tree commit diff
path: root/core-services
Commit message (Collapse)AuthorAgeFilesLines
* core-services/99-cleanup.sh: also create lastlogLeah Neukirchen2023-06-161-0/+3
|
* core-services/01-static-devnodes: simplify parsingclassabbyamp2023-04-131-1/+1
| | | | fixes #82
* Activate mdadm arrays on bootAntonio Gurgel2022-03-271-0/+5
|
* Print message when seeding RNGJason A. Donenfeld2022-03-261-0/+1
|
* core-services/00-pseudofs: mount /sys/firmware/efi/efivars when appropriateLeah Neukirchen2022-03-251-0/+4
|
* Use seedrng for seeding the random number generatorJason A. Donenfeld2022-03-251-2/+1
| | | | | | | | | | | | The RNG can't actually be seeded from a shell script, due to the reliance on ioctls. For this reason, the seedrng project provides a basic script meant to be copy and pasted into projects like void-runit and tweaked as needed: <https://git.zx2c4.com/seedrng/about/>. This commit imports it into void-runit and wires up the init scripts to call it. This also is a significant improvement over the current init script, which fails to remove seed files that have already been used, or to ratchet them forward.
* Support pure v2 cgroup mounts 20210314ap4y2021-03-131-4/+30
| | | | | | | | | | | | | Some of the tooling that rely on cgroups (notably podman, runc and crun) enable cgroup2 mode only if /sys/fs/cgroup has a v2 magic number. This commit introduces configuration option that controls the way cgroup is mounted, 3 modes are supported: - hybrid: current mode with v1 and v2 mounted - unified: v2 only mode - legacy: v1 only mode This is modeled after OpenRC: https://github.com/OpenRC/openrc/blob/72df51e17ba0e1a0f94451b4bbfb338288c4625c/init.d/cgroups.in#L121-L129
* core-services/03-filesystems.sh: respect auto_activation_volume_listAndrew Benson2021-02-121-2/+2
| | | | Closes #64.
* core-services/03-filesystems.sh: load keys as necessary when mountingAndrew J. Hesford2021-01-031-1/+1
|
* core-services/03-filesystems.sh: initialize ZFS even with no cachefileAndrew J. Hesford2020-07-171-3/+8
|
* core-services/00-pseudofs.sh: mount cgroup v2 unified file systemAndrew J. Hesford2020-07-121-0/+4
|
* Merge pull request #30 from CameronNemo/urandomJuan RP2019-12-281-1/+0
|\ | | | | fix(urandom): avoid uninitialized read during boot
| * fix(urandom): avoid uninitialized read during bootCameron Nemo2019-10-031-1/+0
| | | | | | | | | | | | | | | | | | Regenerating the stored seed was an attempt to prevent hard shutdowns from leading to seed reuse. Unfortunately, this practice depletes any entropy that was added by the seed. Furthermore on newer kernels which do not credit entropy added from userspace, the operation is often an uninitialized read of urandom.
* | fix(sysctl): behave more like sysctl --systemCameron Nemo2019-10-031-5/+9
|/ | | | | | | | | Loading of sysctl.d directories should follow the same ordering and overriding rules as xbps, modules-load, and most importantly, `sysctl --system`. This change ensures proper ordering of files loaded by building the selected files then operating on them, and it allows for masking system level configuration from /etc and even /run.
* core-services/05-misc.sh: create utmp earlyLeah Neukirchen2019-09-062-1/+1
|
* core-services/05-misc.sh: log boot in wtmpLeah Neukirchen2019-09-061-0/+2
|
* urandom: don't seed/store in containersCameron Nemo2019-03-161-3/+5
|
* Merge pull request #64 from dne/patch-1Enno Boland2018-06-131-1/+1
|\ | | | | core-services/01-static-devnodes.sh: Honour modprobe blacklists
| * core-services/01-static-devnodes.sh: Honour modprobe blacklistsDaniel Néri2017-02-121-1/+1
| |
* | core-services/00-pseudofs.sh: Add securityfs mountpoint - Needed for LSM supportOlivier Mauras2017-03-211-0/+1
|/
* Do not try to load modules if kernel doesn't support modules.Jan Tatje2016-09-021-0/+2
|
* 00-pseudofs.sh: create /run/lock and /run/log 20160826Duncaen2016-08-251-1/+1
|
* Fix mounting devtmpfs. (#54)Jan Tatje2016-08-221-1/+1
| | | mount was missing the path argument, this breaks booting with custom kernel and initramfs.
* fix the broken font setting (#47) 20160525chinarulezzz2016-05-251-0/+0
|
* Import and mount ZFS at boot time (#46)Dominik Honnef2016-05-251-0/+16
|
* core-services: load kmods before mounting filesystems (close #39). 20160419Juan RP2016-04-191-0/+0
|
* Don't output newline to /proc file when setting hostname.Christopher Brannon2015-11-111-1/+1
| | | | | | This breaks in certain combinations of echo command and standard library, notably musl and bash builtin echo, or coreutils echo + musl.
* core-services/sysctl: drop sysctl(8) --system requirement. 20150905Juan RP2015-09-051-17/+11
| | | | | Use sysctl -p everywhere: works with procps-ng and busybox (and probably others as well).
* core-services: sysctl --system fallback for busyboxEivind Uggedal2015-08-271-2/+18
|
* Added core-services/98-sbin-merge scriptlet to create usr/sbin symlink. 20150603Juan RP2015-06-031-0/+11
| | | | | | This checks if /usr/sbin is a real directory and then moves it to /usr/sbin.old if there are only symlinks, and then the /usr/sbin -> /usr/bin symlink is created.
* Update paths for the usr/sbin -> usr/bin move.Juan RP2015-06-023-6/+6
|
* Find out size of the saved random-seed via /proc/sys/kernel/random/poolsize. 20150511.1Juan RP2015-05-111-1/+1
| | | | | This is what the random(4) manual page recommends, and hopefully should improve entropy reading from /dev/{u,}random.
* core-services: load kernel modules that aren't autoloaded by eudev3 anymore. 20150424Juan RP2015-04-241-0/+6
| | | | | We use the output of `kmod static-nodes` to get a list of modules that should be loaded for the running kernel, just like systemd does via tmpfiles.d(5).
* Remove ability to declare kernel modules in rc.confSören Tempel2015-03-261-1/+1
| | | | | The preferred way is to declare them in /etc/modules-load.d so why offer an additional way? This isn't perl.
* Add an additional variable for ttysSören Tempel2015-03-231-2/+7
|
* core-services: remove extra newline from msg{,_warn}().Juan RP2015-03-226-9/+9
|
* add a newline by default to msg and msg_warn outputSören Tempel2015-03-222-14/+14
|
* Merge pull request #25 from nmeum/crypttabJuan RP2015-03-221-7/+1
|\ | | | | Remove fallback /etc/crypttab parsing code
| * Remove fallback /etc/crypttab parsing codeSören Tempel2015-03-211-7/+1
| | | | | | | | | | If /etc/runit/crypt.awk doesn't exist then somebody obviously fucked up his runit-void installation because that file is installed by default.
* | warn if hostname wasn't setSören Tempel2015-03-211-4/+4
| |
* | Use read to retrieve the hostnameSören Tempel2015-03-101-1/+1
|/
* Fix typo and remove redundant msg from 03-filesystems.sh.Juan RP2015-01-161-2/+1
|
* add fallback path if crypttab parser not foundpulux2015-01-061-1/+8
|
* add function to parse more crypttab filds and optionsMarkus.Berger2015-01-051-3/+1
|
* core-services/02-console-setup.sh: setup HARDWARECLOCK if set.Juan RP2014-12-311-0/+6
| | | | This was lost somehow after adding "core-services".
* core-services/99-cleanup.sh: no need to set a shebang.Juan RP2014-10-101-1/+1
|
* core-services: run console-setup before filesystems, for LUKS setups.Juan RP2014-10-091-0/+0
| | | | | ... otherwise the keymap is not properly setup when entering LUKS passwords. Reported by freds0n.
* core-services/00-pseudofs.sh: fix /proc mount due to a typo.Juan RP2014-09-281-1/+1
|
* 00-pseudofs.sh: restore cgroup mounting in a busybox-compatible wayChristian Neukirchen2014-09-231-0/+1
|
* Revert "core-services/08-sysctl.sh: make this work with busybox sysctl."Juan RP2014-09-211-6/+1
| | | | | | This reverts commit 6285339a7a40da441cef2114e4cb1197d42a925a. Make no sense to have this workaround as we need procps-ng anyway for pkill.