2 * Copyright (C) 2004-2006 Kay Sievers <kay.sievers@vrfy.org>
4 * This program is free software; you can redistribute it and/or modify it
5 * under the terms of the GNU General Public License as published by the
6 * Free Software Foundation version 2 of the License.
8 * This program is distributed in the hope that it will be useful, but
9 * WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
11 * General Public License for more details.
13 * You should have received a copy of the GNU General Public License along
14 * with this program; if not, write to the Free Software Foundation, Inc.,
15 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
29 #include <sys/socket.h>
31 #include <sys/select.h>
32 #include <linux/types.h>
33 #include <linux/netlink.h>
38 static int uevent_netlink_sock = -1;
39 static int udev_monitor_sock = -1;
40 static volatile int udev_exit;
42 static int init_udev_monitor_socket(void)
44 struct sockaddr_un saddr;
48 memset(&saddr, 0x00, sizeof(saddr));
49 saddr.sun_family = AF_LOCAL;
50 /* use abstract namespace for socket path */
51 strcpy(&saddr.sun_path[1], "/org/kernel/udev/monitor");
52 addrlen = offsetof(struct sockaddr_un, sun_path) + 1 + strlen(&saddr.sun_path[1]);
54 udev_monitor_sock = socket(AF_LOCAL, SOCK_DGRAM, 0);
55 if (udev_monitor_sock == -1) {
56 fprintf(stderr, "error getting socket: %s\n", strerror(errno));
60 /* the bind takes care of ensuring only one copy running */
61 retval = bind(udev_monitor_sock, (struct sockaddr *) &saddr, addrlen);
63 fprintf(stderr, "bind failed: %s\n", strerror(errno));
64 close(udev_monitor_sock);
65 udev_monitor_sock = -1;
72 static int init_uevent_netlink_sock(void)
74 struct sockaddr_nl snl;
77 memset(&snl, 0x00, sizeof(struct sockaddr_nl));
78 snl.nl_family = AF_NETLINK;
79 snl.nl_pid = getpid();
82 uevent_netlink_sock = socket(PF_NETLINK, SOCK_DGRAM, NETLINK_KOBJECT_UEVENT);
83 if (uevent_netlink_sock == -1) {
84 fprintf(stderr, "error getting socket: %s\n", strerror(errno));
88 retval = bind(uevent_netlink_sock, (struct sockaddr *) &snl,
89 sizeof(struct sockaddr_nl));
91 fprintf(stderr, "bind failed: %s\n", strerror(errno));
92 close(uevent_netlink_sock);
93 uevent_netlink_sock = -1;
100 static void asmlinkage sig_handler(int signum)
102 if (signum == SIGINT || signum == SIGTERM)
106 static const char *search_key(const char *searchkey, const char *buf, size_t buflen)
109 size_t searchkeylen = strlen(searchkey);
111 while (bufpos < buflen) {
116 keylen = strlen(key);
119 if ((strncmp(searchkey, key, searchkeylen) == 0) && key[searchkeylen] == '=')
120 return &key[searchkeylen + 1];
121 bufpos += keylen + 1;
126 int udevmonitor(int argc, char *argv[])
128 struct sigaction act;
136 static const struct option options[] = {
137 { "environment", 0, NULL, 'e' },
138 { "kernel", 0, NULL, 'k' },
139 { "udev", 0, NULL, 'u' },
140 { "help", 0, NULL, 'h' },
145 option = getopt_long(argc, argv, "ekuh", options, NULL);
160 printf("Usage: udevadm monitor [--environment] [--kernel] [--udev] [--help]\n"
161 " --env print the whole event environment\n"
162 " --kernel print kernel uevents\n"
163 " --udev print udev events\n"
164 " --help print this help text\n\n");
170 if (!kernel && !udev) {
175 if (getuid() != 0 && kernel) {
176 fprintf(stderr, "root privileges needed to subscribe to kernel events\n");
180 /* set signal handlers */
181 memset(&act, 0x00, sizeof(struct sigaction));
182 act.sa_handler = (void (*)(int)) sig_handler;
183 sigemptyset(&act.sa_mask);
184 act.sa_flags = SA_RESTART;
185 sigaction(SIGINT, &act, NULL);
186 sigaction(SIGTERM, &act, NULL);
188 printf("udevmonitor will print the received events for:\n");
190 retval = init_udev_monitor_socket();
193 printf("UDEV the event which udev sends out after rule processing\n");
196 retval = init_uevent_netlink_sock();
199 printf("UEVENT the kernel uevent\n");
204 char buf[UEVENT_BUFFER_SIZE*2];
212 const char *source = NULL;
213 const char *devpath, *action, *subsys;
217 if (uevent_netlink_sock >= 0)
218 FD_SET(uevent_netlink_sock, &readfds);
219 if (udev_monitor_sock >= 0)
220 FD_SET(udev_monitor_sock, &readfds);
222 fdcount = select(UDEV_MAX(uevent_netlink_sock, udev_monitor_sock)+1, &readfds, NULL, NULL, NULL);
225 fprintf(stderr, "error receiving uevent message: %s\n", strerror(errno));
229 if (gettimeofday(&tv, &tz) == 0) {
230 snprintf(timestr, sizeof(timestr), "%llu.%06u",
231 (unsigned long long) tv.tv_sec, (unsigned int) tv.tv_usec);
235 if ((uevent_netlink_sock >= 0) && FD_ISSET(uevent_netlink_sock, &readfds)) {
236 buflen = recv(uevent_netlink_sock, &buf, sizeof(buf), 0);
238 fprintf(stderr, "error receiving uevent message: %s\n", strerror(errno));
244 if ((udev_monitor_sock >= 0) && FD_ISSET(udev_monitor_sock, &readfds)) {
245 buflen = recv(udev_monitor_sock, &buf, sizeof(buf), 0);
247 fprintf(stderr, "error receiving udev message: %s\n", strerror(errno));
256 keys = strlen(buf) + 1; /* start of payload */
257 devpath = search_key("DEVPATH", &buf[keys], buflen);
258 action = search_key("ACTION", &buf[keys], buflen);
259 subsys = search_key("SUBSYSTEM", &buf[keys], buflen);
260 printf("%s[%s] %-8s %s (%s)\n", source, timestr, action, devpath, subsys);
262 /* print environment */
265 while (bufpos < buflen) {
270 keylen = strlen(key);
274 bufpos += keylen + 1;
281 if (uevent_netlink_sock >= 0)
282 close(uevent_netlink_sock);
283 if (udev_monitor_sock >= 0)
284 close(udev_monitor_sock);