2 * Copyright (C) 2004-2006 Kay Sievers <kay.sievers@vrfy.org>
4 * This program is free software; you can redistribute it and/or modify it
5 * under the terms of the GNU General Public License as published by the
6 * Free Software Foundation version 2 of the License.
8 * This program is distributed in the hope that it will be useful, but
9 * WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
11 * General Public License for more details.
13 * You should have received a copy of the GNU General Public License along
14 * with this program; if not, write to the Free Software Foundation, Inc.,
15 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
29 #include <sys/socket.h>
31 #include <sys/select.h>
32 #include <linux/types.h>
33 #include <linux/netlink.h>
37 static int uevent_netlink_sock = -1;
38 static int udev_monitor_sock = -1;
39 static volatile int udev_exit;
41 static int init_udev_monitor_socket(void)
43 struct sockaddr_un saddr;
47 memset(&saddr, 0x00, sizeof(saddr));
48 saddr.sun_family = AF_LOCAL;
49 /* use abstract namespace for socket path */
50 strcpy(&saddr.sun_path[1], "/org/kernel/udev/monitor");
51 addrlen = offsetof(struct sockaddr_un, sun_path) + 1 + strlen(&saddr.sun_path[1]);
53 udev_monitor_sock = socket(AF_LOCAL, SOCK_DGRAM, 0);
54 if (udev_monitor_sock == -1) {
55 fprintf(stderr, "error getting socket: %s\n", strerror(errno));
59 /* the bind takes care of ensuring only one copy running */
60 retval = bind(udev_monitor_sock, (struct sockaddr *) &saddr, addrlen);
62 fprintf(stderr, "bind failed: %s\n", strerror(errno));
63 close(udev_monitor_sock);
64 udev_monitor_sock = -1;
71 static int init_uevent_netlink_sock(void)
73 struct sockaddr_nl snl;
76 memset(&snl, 0x00, sizeof(struct sockaddr_nl));
77 snl.nl_family = AF_NETLINK;
78 snl.nl_pid = getpid();
81 uevent_netlink_sock = socket(PF_NETLINK, SOCK_DGRAM, NETLINK_KOBJECT_UEVENT);
82 if (uevent_netlink_sock == -1) {
83 fprintf(stderr, "error getting socket: %s\n", strerror(errno));
87 retval = bind(uevent_netlink_sock, (struct sockaddr *) &snl,
88 sizeof(struct sockaddr_nl));
90 fprintf(stderr, "bind failed: %s\n", strerror(errno));
91 close(uevent_netlink_sock);
92 uevent_netlink_sock = -1;
99 static void asmlinkage sig_handler(int signum)
101 if (signum == SIGINT || signum == SIGTERM)
105 static const char *search_key(const char *searchkey, const char *buf, size_t buflen)
108 size_t searchkeylen = strlen(searchkey);
110 while (bufpos < buflen) {
115 keylen = strlen(key);
118 if ((strncmp(searchkey, key, searchkeylen) == 0) && key[searchkeylen] == '=')
119 return &key[searchkeylen + 1];
120 bufpos += keylen + 1;
125 int udevadm_monitor(struct udev *udev, int argc, char *argv[])
127 struct sigaction act;
130 int print_kernel = 0;
135 static const struct option options[] = {
136 { "environment", 0, NULL, 'e' },
137 { "kernel", 0, NULL, 'k' },
138 { "udev", 0, NULL, 'u' },
139 { "help", 0, NULL, 'h' },
144 option = getopt_long(argc, argv, "ekuh", options, NULL);
159 printf("Usage: udevadm monitor [--environment] [--kernel] [--udev] [--help]\n"
160 " --env print the whole event environment\n"
161 " --kernel print kernel uevents\n"
162 " --udev print udev events\n"
163 " --help print this help text\n\n");
169 if (!print_kernel && !print_udev) {
174 if (getuid() != 0 && print_kernel) {
175 fprintf(stderr, "root privileges needed to subscribe to kernel events\n");
179 /* set signal handlers */
180 memset(&act, 0x00, sizeof(struct sigaction));
181 act.sa_handler = (void (*)(int)) sig_handler;
182 sigemptyset(&act.sa_mask);
183 act.sa_flags = SA_RESTART;
184 sigaction(SIGINT, &act, NULL);
185 sigaction(SIGTERM, &act, NULL);
187 printf("monitor will print the received events for:\n");
189 retval = init_udev_monitor_socket();
192 printf("UDEV the event which udev sends out after rule processing\n");
195 retval = init_uevent_netlink_sock();
198 printf("UEVENT the kernel uevent\n");
203 char buf[UEVENT_BUFFER_SIZE*2];
211 const char *source = NULL;
212 const char *devpath, *action, *subsys;
216 if (uevent_netlink_sock >= 0)
217 FD_SET(uevent_netlink_sock, &readfds);
218 if (udev_monitor_sock >= 0)
219 FD_SET(udev_monitor_sock, &readfds);
221 fdcount = select(UDEV_MAX(uevent_netlink_sock, udev_monitor_sock)+1, &readfds, NULL, NULL, NULL);
224 fprintf(stderr, "error receiving uevent message: %s\n", strerror(errno));
228 if (gettimeofday(&tv, &tz) == 0) {
229 snprintf(timestr, sizeof(timestr), "%llu.%06u",
230 (unsigned long long) tv.tv_sec, (unsigned int) tv.tv_usec);
234 if ((uevent_netlink_sock >= 0) && FD_ISSET(uevent_netlink_sock, &readfds)) {
235 buflen = recv(uevent_netlink_sock, &buf, sizeof(buf), 0);
237 fprintf(stderr, "error receiving uevent message: %s\n", strerror(errno));
243 if ((udev_monitor_sock >= 0) && FD_ISSET(udev_monitor_sock, &readfds)) {
244 buflen = recv(udev_monitor_sock, &buf, sizeof(buf), 0);
246 fprintf(stderr, "error receiving udev message: %s\n", strerror(errno));
255 keys = strlen(buf) + 1; /* start of payload */
256 devpath = search_key("DEVPATH", &buf[keys], buflen);
257 action = search_key("ACTION", &buf[keys], buflen);
258 subsys = search_key("SUBSYSTEM", &buf[keys], buflen);
259 printf("%s[%s] %-8s %s (%s)\n", source, timestr, action, devpath, subsys);
261 /* print environment */
264 while (bufpos < buflen) {
269 keylen = strlen(key);
273 bufpos += keylen + 1;
280 if (uevent_netlink_sock >= 0)
281 close(uevent_netlink_sock);
282 if (udev_monitor_sock >= 0)
283 close(udev_monitor_sock);