]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/udev/udevadm-monitor.c
Merge pull request #15669 from andir/systemd-ipv6-pd-subnet-id
[thirdparty/systemd.git] / src / udev / udevadm-monitor.c
CommitLineData
e7145211 1/* SPDX-License-Identifier: GPL-2.0+ */
1bc33626 2
1bc33626 3#include <errno.h>
0d2516c3 4#include <getopt.h>
1bc33626 5
2b25284e 6#include "sd-device.h"
66a94860 7#include "sd-event.h"
2b25284e
YW
8
9#include "alloc-util.h"
a46556f7 10#include "device-monitor-private.h"
2c18a854 11#include "device-private.h"
2b25284e 12#include "device-util.h"
3ffd4af2 13#include "fd-util.h"
f97b34a6 14#include "format-util.h"
2b25284e 15#include "hashmap.h"
2b25284e 16#include "set.h"
66a94860 17#include "signal-util.h"
2b25284e 18#include "string-util.h"
3d05193e 19#include "udevadm.h"
c494b739 20#include "virt.h"
ca78ad1d 21#include "time-util.h"
1bc33626 22
2b25284e
YW
23static bool arg_show_property = false;
24static bool arg_print_kernel = false;
25static bool arg_print_udev = false;
26static Set *arg_tag_filter = NULL;
27static Hashmap *arg_subsystem_filter = NULL;
1bc33626 28
66a94860 29static int device_monitor_handler(sd_device_monitor *monitor, sd_device *device, void *userdata) {
2c18a854
YW
30 DeviceAction action = _DEVICE_ACTION_INVALID;
31 const char *devpath = NULL, *subsystem = NULL;
66a94860 32 MonitorNetlinkGroup group = PTR_TO_INT(userdata);
912541b0 33 struct timespec ts;
2b25284e 34
66a94860
YW
35 assert(device);
36 assert(IN_SET(group, MONITOR_GROUP_UDEV, MONITOR_GROUP_KERNEL));
2b25284e 37
2c18a854 38 (void) device_get_action(device, &action);
2b25284e
YW
39 (void) sd_device_get_devpath(device, &devpath);
40 (void) sd_device_get_subsystem(device, &subsystem);
912541b0 41
b3b90a25 42 assert_se(clock_gettime(CLOCK_MONOTONIC, &ts) == 0);
2b25284e 43
cc9211b0 44 printf("%-6s[%"PRI_TIME".%06"PRI_NSEC"] %-8s %s (%s)\n",
66a94860 45 group == MONITOR_GROUP_UDEV ? "UDEV" : "KERNEL",
cc9211b0 46 ts.tv_sec, (nsec_t)ts.tv_nsec/1000,
2c18a854
YW
47 strna(device_action_to_string(action)),
48 devpath, subsystem);
2b25284e
YW
49
50 if (arg_show_property) {
51 const char *key, *value;
52
53 FOREACH_DEVICE_PROPERTY(device, key, value)
54 printf("%s=%s\n", key, value);
55
912541b0
KS
56 printf("\n");
57 }
2b25284e
YW
58
59 return 0;
60}
61
66a94860 62static int setup_monitor(MonitorNetlinkGroup sender, sd_event *event, sd_device_monitor **ret) {
a46556f7 63 _cleanup_(sd_device_monitor_unrefp) sd_device_monitor *monitor = NULL;
2b25284e 64 const char *subsystem, *devtype, *tag;
2b25284e 65 Iterator i;
66a94860 66 int r;
2b25284e 67
a46556f7
YW
68 r = device_monitor_new_full(&monitor, sender, -1);
69 if (r < 0)
70 return log_error_errno(r, "Failed to create netlink socket: %m");
2b25284e 71
66a94860 72 (void) sd_device_monitor_set_receive_buffer_size(monitor, 128*1024*1024);
2b25284e 73
deb2b734 74 r = sd_device_monitor_attach_event(monitor, event);
66a94860
YW
75 if (r < 0)
76 return log_error_errno(r, "Failed to attach event: %m");
2b25284e
YW
77
78 HASHMAP_FOREACH_KEY(devtype, subsystem, arg_subsystem_filter, i) {
a46556f7 79 r = sd_device_monitor_filter_add_match_subsystem_devtype(monitor, subsystem, devtype);
2b25284e
YW
80 if (r < 0)
81 return log_error_errno(r, "Failed to apply subsystem filter '%s%s%s': %m",
82 subsystem, devtype ? "/" : "", strempty(devtype));
83 }
84
85 SET_FOREACH(tag, arg_tag_filter, i) {
a46556f7 86 r = sd_device_monitor_filter_add_match_tag(monitor, tag);
2b25284e
YW
87 if (r < 0)
88 return log_error_errno(r, "Failed to apply tag filter '%s': %m", tag);
89 }
90
deb2b734 91 r = sd_device_monitor_start(monitor, device_monitor_handler, INT_TO_PTR(sender));
2b25284e 92 if (r < 0)
66a94860 93 return log_error_errno(r, "Failed to start device monitor: %m");
2b25284e 94
deb2b734
YW
95 (void) sd_event_source_set_description(sd_device_monitor_get_event_source(monitor),
96 sender == MONITOR_GROUP_UDEV ? "device-monitor-udev" : "device-monitor-kernel");
97
2b25284e 98 *ret = TAKE_PTR(monitor);
66a94860 99 return 0;
0de33a61
KS
100}
101
2b25284e 102static int help(void) {
5639df9a 103 printf("%s monitor [OPTIONS]\n\n"
5ac0162c
LP
104 "Listen to kernel and udev events.\n\n"
105 " -h --help Show this help\n"
5639df9a 106 " -V --version Show package version\n"
5ac0162c
LP
107 " -p --property Print the event properties\n"
108 " -k --kernel Print kernel uevents\n"
109 " -u --udev Print udev events\n"
110 " -s --subsystem-match=SUBSYSTEM[/DEVTYPE] Filter events by subsystem\n"
111 " -t --tag-match=TAG Filter events by tag\n"
112 , program_invocation_short_name);
7643ac9a 113
2b25284e
YW
114 return 0;
115}
912541b0 116
2b25284e 117static int parse_argv(int argc, char *argv[]) {
912541b0 118 static const struct option options[] = {
7643ac9a
ZJS
119 { "property", no_argument, NULL, 'p' },
120 { "environment", no_argument, NULL, 'e' }, /* alias for -p */
121 { "kernel", no_argument, NULL, 'k' },
122 { "udev", no_argument, NULL, 'u' },
912541b0 123 { "subsystem-match", required_argument, NULL, 's' },
7643ac9a 124 { "tag-match", required_argument, NULL, 't' },
5639df9a 125 { "version", no_argument, NULL, 'V' },
7643ac9a 126 { "help", no_argument, NULL, 'h' },
912541b0
KS
127 {}
128 };
129
2b25284e 130 int r, c;
912541b0 131
5639df9a 132 while ((c = getopt_long(argc, argv, "pekus:t:Vh", options, NULL)) >= 0)
7643ac9a 133 switch (c) {
912541b0
KS
134 case 'p':
135 case 'e':
2b25284e 136 arg_show_property = true;
912541b0
KS
137 break;
138 case 'k':
2b25284e 139 arg_print_kernel = true;
912541b0
KS
140 break;
141 case 'u':
2b25284e 142 arg_print_udev = true;
912541b0 143 break;
2b25284e
YW
144 case 's': {
145 _cleanup_free_ char *subsystem = NULL, *devtype = NULL;
146 const char *slash;
147
148 slash = strchr(optarg, '/');
149 if (slash) {
0eba88dc 150 devtype = strdup(slash + 1);
2b25284e
YW
151 if (!devtype)
152 return -ENOMEM;
153
0eba88dc 154 subsystem = strndup(optarg, slash - optarg);
2b25284e
YW
155 } else
156 subsystem = strdup(optarg);
157
158 if (!subsystem)
159 return -ENOMEM;
160
161 r = hashmap_ensure_allocated(&arg_subsystem_filter, NULL);
162 if (r < 0)
163 return r;
164
165 r = hashmap_put(arg_subsystem_filter, subsystem, devtype);
166 if (r < 0)
167 return r;
168
169 subsystem = devtype = NULL;
912541b0 170 break;
2b25284e
YW
171 }
172 case 't': {
173 _cleanup_free_ char *tag = NULL;
174
175 r = set_ensure_allocated(&arg_tag_filter, &string_hash_ops);
176 if (r < 0)
177 return r;
178
179 tag = strdup(optarg);
180 if (!tag)
181 return -ENOMEM;
182
183 r = set_put(arg_tag_filter, tag);
184 if (r < 0)
185 return r;
186
187 tag = NULL;
188 break;
189 }
5639df9a 190 case 'V':
51b006e1 191 return print_version();
912541b0 192 case 'h':
2b25284e
YW
193 return help();
194 case '?':
195 return -EINVAL;
912541b0 196 default:
2b25284e 197 assert_not_reached("Unknown option.");
912541b0 198 }
912541b0 199
2b25284e
YW
200 if (!arg_print_kernel && !arg_print_udev) {
201 arg_print_kernel = true;
202 arg_print_udev = true;
912541b0
KS
203 }
204
2b25284e
YW
205 return 1;
206}
207
208int monitor_main(int argc, char *argv[], void *userdata) {
a46556f7 209 _cleanup_(sd_device_monitor_unrefp) sd_device_monitor *kernel_monitor = NULL, *udev_monitor = NULL;
a0570c1a 210 _cleanup_(sd_event_unrefp) sd_event *event = NULL;
2b25284e
YW
211 int r;
212
213 r = parse_argv(argc, argv);
214 if (r <= 0)
215 goto finalize;
216
c494b739
YW
217 if (running_in_chroot() > 0) {
218 log_info("Running in chroot, ignoring request.");
219 return 0;
220 }
221
8d00539d
SW
222 /* Callers are expecting to see events as they happen: Line buffering */
223 setlinebuf(stdout);
224
66a94860
YW
225 r = sd_event_default(&event);
226 if (r < 0) {
227 log_error_errno(r, "Failed to initialize event: %m");
2b25284e 228 goto finalize;
912541b0
KS
229 }
230
66a94860
YW
231 assert_se(sigprocmask_many(SIG_UNBLOCK, NULL, SIGTERM, SIGINT, -1) >= 0);
232 (void) sd_event_add_signal(event, NULL, SIGTERM, NULL, NULL);
233 (void) sd_event_add_signal(event, NULL, SIGINT, NULL, NULL);
234
912541b0 235 printf("monitor will print the received events for:\n");
2b25284e 236 if (arg_print_udev) {
66a94860
YW
237 r = setup_monitor(MONITOR_GROUP_UDEV, event, &udev_monitor);
238 if (r < 0)
2b25284e 239 goto finalize;
912541b0
KS
240
241 printf("UDEV - the event which udev sends out after rule processing\n");
242 }
243
2b25284e 244 if (arg_print_kernel) {
66a94860
YW
245 r = setup_monitor(MONITOR_GROUP_KERNEL, event, &kernel_monitor);
246 if (r < 0)
2b25284e 247 goto finalize;
912541b0
KS
248
249 printf("KERNEL - the kernel uevent\n");
250 }
251 printf("\n");
252
66a94860
YW
253 r = sd_event_loop(event);
254 if (r < 0) {
255 log_error_errno(r, "Failed to run event loop: %m");
256 goto finalize;
912541b0 257 }
44433ebd 258
2b25284e
YW
259 r = 0;
260
261finalize:
262 hashmap_free_free_free(arg_subsystem_filter);
263 set_free_free(arg_tag_filter);
264
265 return r;
1bc33626 266}