/* * Copyright 2015 Denys Vlasenko * * Licensed under GPLv2, see file LICENSE in this source tree. */ //config:config UEVENT //config: bool "uevent (3.1 kb)" //config: default y //config: help //config: uevent is a netlink listener for kernel uevent notifications //config: sent via netlink. It is usually used for dynamic device creation. //applet:IF_UEVENT(APPLET(uevent, BB_DIR_SBIN, BB_SUID_DROP)) //kbuild:lib-$(CONFIG_UEVENT) += uevent.o //usage:#define uevent_trivial_usage //usage: "[PROG ARGS]" //usage:#define uevent_full_usage "\n\n" //usage: "uevent runs PROG for every netlink notification." //usage: "\n""PROG's environment contains data passed from the kernel." //usage: "\n""Typical usage (daemon for dynamic device node creation):" //usage: "\n"" # uevent mdev & mdev -s" #include "libbb.h" #include "common_bufsiz.h" #include #define env ((char **)bb_common_bufsiz1) #define INIT_G() do { setup_common_bufsiz(); } while (0) enum { MAX_ENV = COMMON_BUFSIZE / sizeof(char*) - 1, // ^^^sizeof(env[0]) instead of sizeof(char*) // makes gcc-6.3.0 emit "strict-aliasing" warning. // socket receive buffer of 2MiB proved to be too small: // http://lists.busybox.net/pipermail/busybox/2019-December/087665.html // udevd seems to use a whooping 128MiB. // The socket receive buffer size is just a resource limit. // The buffers are allocated lazily so the memory is not wasted. KERN_RCVBUF = 128 * 1024 * 1024, // Might be made smaller: the kernel v5.4 passes up to 32 environment // variables with a total of 2kb on each event. // On top of that the action string and device path are added. USER_RCVBUF = 16 * 1024, }; int uevent_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE; int uevent_main(int argc UNUSED_PARAM, char **argv) { int fd; INIT_G(); argv++; // Subscribe for UEVENT kernel messages. // Without a sufficiently big RCVBUF, a ton of simultaneous events // can trigger ENOBUFS on read, which is unrecoverable. // Reproducer: // uevent mdev & // find /sys -name uevent -exec sh -c 'echo add >"{}"' ';' reopen: fd = create_and_bind_to_netlink(NETLINK_KOBJECT_UEVENT, /*groups:*/ 1 << 0, KERN_RCVBUF); for (;;) { char *netbuf; char *s, *end; ssize_t len; int idx; // In many cases, a system sits for *days* waiting // for a new uevent notification to come in. // We use a fresh mmap so that buffer is not allocated // until kernel actually starts filling it. netbuf = xmmap_anon(USER_RCVBUF); // Here we block, possibly for a very long time len = safe_read(fd, netbuf, USER_RCVBUF - 1); if (len < 0) { if (errno == ENOBUFS) { // Ran out of socket receive buffer bb_simple_error_msg("uevent overrun"); close(fd); munmap(netbuf, USER_RCVBUF); goto reopen; } bb_simple_perror_msg_and_die("read"); } end = netbuf + len; *end = '\0'; // Each netlink message starts with "ACTION@/path" // (which we currently ignore), // followed by environment variables. if (!argv[0]) putchar('\n'); idx = 0; s = netbuf; while (s < end) { if (!argv[0]) puts(s); if (strchr(s, '=') && idx < MAX_ENV) env[idx++] = s; s += strlen(s) + 1; } env[idx] = NULL; if (argv[0]) { idx = 0; while (env[idx]) putenv(env[idx++]); spawn_and_wait(argv); idx = 0; while (env[idx]) bb_unsetenv(env[idx++]); } munmap(netbuf, USER_RCVBUF); } return 0; // not reached }