2 * Copyright (C) 2004-2010 Kay Sievers <kay@vrfy.org>
4 * This program is free software: you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation, either version 2 of the License, or
7 * (at your option) any later version.
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
14 * You should have received a copy of the GNU General Public License
15 * along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include <sys/epoll.h>
29 #include "format-util.h"
30 #include "udev-util.h"
33 static bool udev_exit
;
35 static void sig_handler(int signum
) {
36 if (IN_SET(signum
, SIGINT
, SIGTERM
))
40 static void print_device(struct udev_device
*device
, const char *source
, int prop
) {
43 assert_se(clock_gettime(CLOCK_MONOTONIC
, &ts
) == 0);
44 printf("%-6s[%"PRI_TIME
".%06"PRI_NSEC
"] %-8s %s (%s)\n",
46 ts
.tv_sec
, (nsec_t
)ts
.tv_nsec
/1000,
47 udev_device_get_action(device
),
48 udev_device_get_devpath(device
),
49 udev_device_get_subsystem(device
));
51 struct udev_list_entry
*list_entry
;
53 udev_list_entry_foreach(list_entry
, udev_device_get_properties_list_entry(device
))
55 udev_list_entry_get_name(list_entry
),
56 udev_list_entry_get_value(list_entry
));
61 static void help(void) {
62 printf("%s monitor [--property] [--kernel] [--udev] [--help]\n\n"
63 "Listen to kernel and udev events.\n\n"
64 " -h --help Show this help\n"
65 " --version Show package version\n"
66 " -p --property Print the event properties\n"
67 " -k --kernel Print kernel uevents\n"
68 " -u --udev Print udev events\n"
69 " -s --subsystem-match=SUBSYSTEM[/DEVTYPE] Filter events by subsystem\n"
70 " -t --tag-match=TAG Filter events by tag\n"
71 , program_invocation_short_name
);
74 static int adm_monitor(struct udev
*udev
, int argc
, char *argv
[]) {
75 struct sigaction act
= {};
78 bool print_kernel
= false;
79 bool print_udev
= false;
80 _cleanup_udev_list_cleanup_
struct udev_list subsystem_match_list
;
81 _cleanup_udev_list_cleanup_
struct udev_list tag_match_list
;
82 _cleanup_udev_monitor_unref_
struct udev_monitor
*udev_monitor
= NULL
;
83 _cleanup_udev_monitor_unref_
struct udev_monitor
*kernel_monitor
= NULL
;
84 _cleanup_close_
int fd_ep
= -1;
85 int fd_kernel
= -1, fd_udev
= -1;
86 struct epoll_event ep_kernel
, ep_udev
;
89 static const struct option options
[] = {
90 { "property", no_argument
, NULL
, 'p' },
91 { "environment", no_argument
, NULL
, 'e' }, /* alias for -p */
92 { "kernel", no_argument
, NULL
, 'k' },
93 { "udev", no_argument
, NULL
, 'u' },
94 { "subsystem-match", required_argument
, NULL
, 's' },
95 { "tag-match", required_argument
, NULL
, 't' },
96 { "help", no_argument
, NULL
, 'h' },
100 udev_list_init(udev
, &subsystem_match_list
, true);
101 udev_list_init(udev
, &tag_match_list
, true);
103 while ((c
= getopt_long(argc
, argv
, "pekus:t:h", options
, NULL
)) >= 0)
117 char subsys
[UTIL_NAME_SIZE
];
120 strscpy(subsys
, sizeof(subsys
), optarg
);
121 devtype
= strchr(subsys
, '/');
122 if (devtype
!= NULL
) {
126 udev_list_entry_add(&subsystem_match_list
, subsys
, devtype
);
130 udev_list_entry_add(&tag_match_list
, optarg
, NULL
);
139 if (!print_kernel
&& !print_udev
) {
144 /* set signal handlers */
145 act
.sa_handler
= sig_handler
;
146 act
.sa_flags
= SA_RESTART
;
147 sigaction(SIGINT
, &act
, NULL
);
148 sigaction(SIGTERM
, &act
, NULL
);
150 sigaddset(&mask
, SIGINT
);
151 sigaddset(&mask
, SIGTERM
);
152 sigprocmask(SIG_UNBLOCK
, &mask
, NULL
);
154 /* Callers are expecting to see events as they happen: Line buffering */
157 fd_ep
= epoll_create1(EPOLL_CLOEXEC
);
159 log_error_errno(errno
, "error creating epoll fd: %m");
163 printf("monitor will print the received events for:\n");
165 struct udev_list_entry
*entry
;
167 udev_monitor
= udev_monitor_new_from_netlink(udev
, "udev");
168 if (udev_monitor
== NULL
) {
169 fprintf(stderr
, "error: unable to create netlink socket\n");
172 udev_monitor_set_receive_buffer_size(udev_monitor
, 128*1024*1024);
173 fd_udev
= udev_monitor_get_fd(udev_monitor
);
175 udev_list_entry_foreach(entry
, udev_list_get_entry(&subsystem_match_list
)) {
176 const char *subsys
= udev_list_entry_get_name(entry
);
177 const char *devtype
= udev_list_entry_get_value(entry
);
179 if (udev_monitor_filter_add_match_subsystem_devtype(udev_monitor
, subsys
, devtype
) < 0)
180 fprintf(stderr
, "error: unable to apply subsystem filter '%s'\n", subsys
);
183 udev_list_entry_foreach(entry
, udev_list_get_entry(&tag_match_list
)) {
184 const char *tag
= udev_list_entry_get_name(entry
);
186 if (udev_monitor_filter_add_match_tag(udev_monitor
, tag
) < 0)
187 fprintf(stderr
, "error: unable to apply tag filter '%s'\n", tag
);
190 if (udev_monitor_enable_receiving(udev_monitor
) < 0) {
191 fprintf(stderr
, "error: unable to subscribe to udev events\n");
195 memzero(&ep_udev
, sizeof(struct epoll_event
));
196 ep_udev
.events
= EPOLLIN
;
197 ep_udev
.data
.fd
= fd_udev
;
198 if (epoll_ctl(fd_ep
, EPOLL_CTL_ADD
, fd_udev
, &ep_udev
) < 0) {
199 log_error_errno(errno
, "fail to add fd to epoll: %m");
203 printf("UDEV - the event which udev sends out after rule processing\n");
207 struct udev_list_entry
*entry
;
209 kernel_monitor
= udev_monitor_new_from_netlink(udev
, "kernel");
210 if (kernel_monitor
== NULL
) {
211 fprintf(stderr
, "error: unable to create netlink socket\n");
214 udev_monitor_set_receive_buffer_size(kernel_monitor
, 128*1024*1024);
215 fd_kernel
= udev_monitor_get_fd(kernel_monitor
);
217 udev_list_entry_foreach(entry
, udev_list_get_entry(&subsystem_match_list
)) {
218 const char *subsys
= udev_list_entry_get_name(entry
);
220 if (udev_monitor_filter_add_match_subsystem_devtype(kernel_monitor
, subsys
, NULL
) < 0)
221 fprintf(stderr
, "error: unable to apply subsystem filter '%s'\n", subsys
);
224 if (udev_monitor_enable_receiving(kernel_monitor
) < 0) {
225 fprintf(stderr
, "error: unable to subscribe to kernel events\n");
229 memzero(&ep_kernel
, sizeof(struct epoll_event
));
230 ep_kernel
.events
= EPOLLIN
;
231 ep_kernel
.data
.fd
= fd_kernel
;
232 if (epoll_ctl(fd_ep
, EPOLL_CTL_ADD
, fd_kernel
, &ep_kernel
) < 0) {
233 log_error_errno(errno
, "fail to add fd to epoll: %m");
237 printf("KERNEL - the kernel uevent\n");
243 struct epoll_event ev
[4];
246 fdcount
= epoll_wait(fd_ep
, ev
, ELEMENTSOF(ev
), -1);
249 fprintf(stderr
, "error receiving uevent message: %m\n");
253 for (i
= 0; i
< fdcount
; i
++) {
254 if (ev
[i
].data
.fd
== fd_kernel
&& ev
[i
].events
& EPOLLIN
) {
255 struct udev_device
*device
;
257 device
= udev_monitor_receive_device(kernel_monitor
);
260 print_device(device
, "KERNEL", prop
);
261 udev_device_unref(device
);
262 } else if (ev
[i
].data
.fd
== fd_udev
&& ev
[i
].events
& EPOLLIN
) {
263 struct udev_device
*device
;
265 device
= udev_monitor_receive_device(udev_monitor
);
268 print_device(device
, "UDEV", prop
);
269 udev_device_unref(device
);
277 const struct udevadm_cmd udevadm_monitor
= {
280 .help
= "Listen to kernel and udev events",