+static bool load_pending(struct load_url_result *result)
+{
+ return !result || result->status == LOAD_ASYNC;
+}
+
+static int check_load(struct boot_task *task, const char *name,
+ struct load_url_result *result)
+{
+ if (!result)
+ return 0;
+
+ if (result->status != LOAD_ERROR) {
+ update_status(task->status_fn, task->status_arg,
+ STATUS_ERROR,
+ _("Loaded %s from %s"), name,
+ pb_url_to_string(result->url));
+ return 0;
+ }
+
+ pb_log("Failed to load %s from %s\n", name,
+ pb_url_to_string(result->url));
+ update_status(task->status_fn, task->status_arg,
+ STATUS_ERROR,
+ _("Couldn't load %s from %s"), name,
+ pb_url_to_string(result->url));
+ return -1;
+}
+
+static void cleanup_load(struct load_url_result *result)
+{
+ if (!result)
+ return;
+ if (result->status != LOAD_OK)
+ return;
+ if (!result->cleanup_local)
+ return;
+ unlink(result->local);
+}
+
+static void cleanup_cancellations(struct boot_task *task,
+ struct load_url_result *cur_result)
+{
+ struct boot_resource *resource;
+ struct load_url_result *result;
+ bool pending = false;
+
+ list_for_each_entry(&task->resources, resource, list) {
+ result = resource->result;
+
+ /* Nothing to do if a load hasn't actually started yet */
+ if (!result)
+ continue;
+
+ /* We need to cleanup and free any completed loads */
+ if (result == cur_result || result->status == LOAD_OK
+ || result->status == LOAD_ERROR) {
+ cleanup_load(result);
+ /* ... and cancel any pending loads, which we'll free in
+ * the completion callback */
+ } else if (result->status == LOAD_ASYNC) {
+ load_url_async_cancel(result);
+ pending = true;
+
+ /* if we're waiting for a cancellation, we still need to
+ * wait for the completion before freeing the boot task */
+ } else if (result->status == LOAD_CANCELLED) {
+ pending = true;
+ }
+ }
+
+ if (!pending)
+ talloc_free(task);
+}
+
+static void boot_process(struct load_url_result *result, void *data)
+{
+ struct boot_task *task = data;
+ struct boot_resource *resource;
+ int rc = -1;
+
+ if (task->cancelled) {
+ cleanup_cancellations(task, result);
+ return;
+ }
+
+ list_for_each_entry(&task->resources, resource, list)
+ if (load_pending(resource->result))
+ return;
+
+ list_for_each_entry(&task->resources, resource, list) {
+ if (check_load(task, resource->name, resource->result))
+ goto no_load;
+ *resource->local_path = resource->result->local;
+ }
+
+ run_boot_hooks(task);
+
+ update_status(task->status_fn, task->status_arg, STATUS_INFO,
+ _("Performing kexec load"));
+
+ rc = kexec_load(task);
+ pb_log_fn("kexec_load returned %d\n", rc);
+ if (rc == KEXEC_LOAD_DECRYPTION_FALURE) {
+ update_status(task->status_fn, task->status_arg,
+ STATUS_ERROR, _("Decryption failed"));
+ }
+ else if (rc == KEXEC_LOAD_SIGNATURE_FAILURE) {
+ update_status(task->status_fn, task->status_arg,
+ STATUS_ERROR,
+ _("Signature verification failed"));
+ }
+ else if (rc == KEXEC_LOAD_SIG_SETUP_INVALID) {
+ update_status(task->status_fn, task->status_arg,
+ STATUS_ERROR,
+ _("Invalid signature configuration"));
+ }
+
+no_load:
+ list_for_each_entry(&task->resources, resource, list)
+ cleanup_load(resource->result);
+
+ if (!rc) {
+ update_status(task->status_fn, task->status_arg,
+ STATUS_INFO, _("Performing kexec reboot"));
+
+ rc = kexec_reboot(task);
+ if (rc) {
+ update_status(task->status_fn, task->status_arg,
+ STATUS_ERROR,
+ _("kexec reboot failed"));
+ }
+ } else {
+ pb_log("Failed to load all boot resources\n");
+ }
+}
+
+static int start_url_load(struct boot_task *task, struct boot_resource *res)