/* SPDX-License-Identifier: GPL-2.0-or-later */ #include #include #include "sd-device.h" #include "sd-event.h" #include "device-enumerator-private.h" #include "device-private.h" #include "device-util.h" #include "fd-util.h" #include "fileio.h" #include "parse-util.h" #include "path-util.h" #include "process-util.h" #include "set.h" #include "string-util.h" #include "strv.h" #include "udevadm.h" #include "udevadm-util.h" #include "udev-ctrl.h" #include "virt.h" static bool arg_verbose = false; static bool arg_dry_run = false; static bool arg_quiet = false; static bool arg_uuid = false; static int exec_list( sd_device_enumerator *e, sd_device_action_t action, Hashmap *settle_hashmap) { bool skip_uuid_logic = false; const char *action_str; sd_device *d; int r, ret = 0; action_str = device_action_to_string(action); FOREACH_DEVICE_AND_SUBSYSTEM(e, d) { sd_id128_t id = SD_ID128_NULL; const char *syspath; r = sd_device_get_syspath(d, &syspath); if (r < 0) { log_debug_errno(r, "Failed to get syspath of enumerated devices, ignoring: %m"); continue; } if (arg_verbose) printf("%s\n", syspath); if (arg_dry_run) continue; /* Use the UUID mode if the user explicitly asked for it, or if --settle has been specified, * so that we can recognize our own uevent. */ r = sd_device_trigger_with_uuid(d, action, (arg_uuid || settle_hashmap) && !skip_uuid_logic ? &id : NULL); if (r == -EINVAL && !arg_uuid && settle_hashmap && !skip_uuid_logic) { /* If we specified a UUID because of the settling logic, and we got EINVAL this might * be caused by an old kernel which doesn't know the UUID logic (pre-4.13). Let's try * if it works without the UUID logic then. */ r = sd_device_trigger(d, action); if (r != -EINVAL) skip_uuid_logic = true; /* dropping the uuid stuff changed the return code, * hence don't bother next time */ } if (r < 0) { /* ENOENT may be returned when a device does not have /uevent or is already * removed. Hence, this is logged at debug level and ignored. * * ENODEV may be returned by some buggy device drivers e.g. /sys/devices/vio. * See, * https://github.com/systemd/systemd/issues/13652#issuecomment-535129791 and * https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1845319. * So, this error is ignored, but logged at warning level to encourage people to * fix the driver. * * EROFS is returned when /sys is read only. In that case, all subsequent * writes will also fail, hence return immediately. * * EACCES or EPERM may be returned when this is invoked by non-priviledged user. * We do NOT return immediately, but continue operation and propagate the error. * Why? Some device can be owned by a user, e.g., network devices configured in * a network namespace. See, https://github.com/systemd/systemd/pull/18559 and * https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ebb4a4bf76f164457184a3f43ebc1552416bc823 * * All other errors are logged at error level, but let's continue the operation, * and propagate the error. */ bool ignore = IN_SET(r, -ENOENT, -ENODEV); int level = arg_quiet ? LOG_DEBUG : r == -ENOENT ? LOG_DEBUG : r == -ENODEV ? LOG_WARNING : LOG_ERR; log_device_full_errno(d, level, r, "Failed to write '%s' to '%s/uevent'%s: %m", action_str, syspath, ignore ? ", ignoring" : ""); if (r == -EROFS) return r; if (ret == 0 && !ignore) ret = r; continue; } /* If the user asked for it, write event UUID to stdout */ if (arg_uuid) printf(SD_ID128_UUID_FORMAT_STR "\n", SD_ID128_FORMAT_VAL(id)); if (settle_hashmap) { _cleanup_free_ sd_id128_t *mid = NULL; _cleanup_free_ char *sp = NULL; sp = strdup(syspath); if (!sp) return log_oom(); mid = newdup(sd_id128_t, &id, 1); if (!d) return log_oom(); r = hashmap_put(settle_hashmap, sp, mid); if (r < 0) return log_oom(); TAKE_PTR(sp); TAKE_PTR(mid); } } return ret; } static int device_monitor_handler(sd_device_monitor *m, sd_device *dev, void *userdata) { Hashmap *settle_hashmap = ASSERT_PTR(userdata); sd_id128_t *settle_id; const char *syspath; char *k; int r; assert(dev); r = sd_device_get_syspath(dev, &syspath); if (r < 0) { log_debug_errno(r, "Failed to get syspath of device event, ignoring: %m"); return 0; } settle_id = hashmap_get2(settle_hashmap, syspath, (void**) &k); if (!settle_id) { log_debug("Got uevent for unexpected device '%s', ignoring.", syspath); return 0; } if (!sd_id128_is_null(*settle_id)) { /* If this is SD_ID128_NULL then we are on pre-4.13 and have no UUID to check, hence don't */ sd_id128_t event_id; r = sd_device_get_trigger_uuid(dev, &event_id); if (r < 0) { log_debug_errno(r, "Got uevent without synthetic UUID for device '%s', ignoring: %m", syspath); return 0; } if (!sd_id128_equal(event_id, *settle_id)) { log_debug("Got uevent not matching expected UUID for device '%s', ignoring.", syspath); return 0; } } if (arg_verbose) printf("settle %s\n", syspath); if (arg_uuid) printf("settle " SD_ID128_UUID_FORMAT_STR "\n", SD_ID128_FORMAT_VAL(*settle_id)); free(hashmap_remove(settle_hashmap, syspath)); free(k); if (hashmap_isempty(settle_hashmap)) return sd_event_exit(sd_device_monitor_get_event(m), 0); return 0; } static char* keyval(const char *str, const char **key, const char **val) { char *buf, *pos; buf = strdup(str); if (!buf) return NULL; pos = strchr(buf, '='); if (pos) { pos[0] = 0; pos++; } *key = buf; *val = pos; return buf; } static int help(void) { printf("%s trigger [OPTIONS] DEVPATH\n\n" "Request events from the kernel.\n\n" " -h --help Show this help\n" " -V --version Show package version\n" " -v --verbose Print the list of devices while running\n" " -n --dry-run Do not actually trigger the events\n" " -q --quiet Suppress error logging in triggering events\n" " -t --type= Type of events to trigger\n" " devices sysfs devices (default)\n" " subsystems sysfs subsystems and drivers\n" " -c --action=ACTION|help Event action value, default is \"change\"\n" " -s --subsystem-match=SUBSYSTEM Trigger devices from a matching subsystem\n" " -S --subsystem-nomatch=SUBSYSTEM Exclude devices from a matching subsystem\n" " -a --attr-match=FILE[=VALUE] Trigger devices with a matching attribute\n" " -A --attr-nomatch=FILE[=VALUE] Exclude devices with a matching attribute\n" " -p --property-match=KEY=VALUE Trigger devices with a matching property\n" " -g --tag-match=TAG Trigger devices with a matching tag\n" " -y --sysname-match=NAME Trigger devices with this /sys path\n" " --name-match=NAME Trigger devices with this /dev name\n" " -b --parent-match=NAME Trigger devices with that parent device\n" " --initialized-match Trigger devices that are already initialized\n" " --initialized-nomatch Trigger devices that are not initialized yet\n" " -w --settle Wait for the triggered events to complete\n" " --wait-daemon[=SECONDS] Wait for udevd daemon to be initialized\n" " before triggering uevents\n" " --uuid Print synthetic uevent UUID\n" " --prioritized-subsystem=SUBSYSTEM[,SUBSYSTEM…]\n" " Trigger devices from a matching subsystem first\n", program_invocation_short_name); return 0; } int trigger_main(int argc, char *argv[], void *userdata) { enum { ARG_NAME = 0x100, ARG_PING, ARG_UUID, ARG_PRIORITIZED_SUBSYSTEM, ARG_INITIALIZED_MATCH, ARG_INITIALIZED_NOMATCH, }; static const struct option options[] = { { "verbose", no_argument, NULL, 'v' }, { "dry-run", no_argument, NULL, 'n' }, { "quiet", no_argument, NULL, 'q' }, { "type", required_argument, NULL, 't' }, { "action", required_argument, NULL, 'c' }, { "subsystem-match", required_argument, NULL, 's' }, { "subsystem-nomatch", required_argument, NULL, 'S' }, { "attr-match", required_argument, NULL, 'a' }, { "attr-nomatch", required_argument, NULL, 'A' }, { "property-match", required_argument, NULL, 'p' }, { "tag-match", required_argument, NULL, 'g' }, { "sysname-match", required_argument, NULL, 'y' }, { "name-match", required_argument, NULL, ARG_NAME }, { "parent-match", required_argument, NULL, 'b' }, { "initialized-match", no_argument, NULL, ARG_INITIALIZED_MATCH }, { "initialized-nomatch", no_argument, NULL, ARG_INITIALIZED_NOMATCH }, { "settle", no_argument, NULL, 'w' }, { "wait-daemon", optional_argument, NULL, ARG_PING }, { "version", no_argument, NULL, 'V' }, { "help", no_argument, NULL, 'h' }, { "uuid", no_argument, NULL, ARG_UUID }, { "prioritized-subsystem", required_argument, NULL, ARG_PRIORITIZED_SUBSYSTEM }, {} }; enum { TYPE_DEVICES, TYPE_SUBSYSTEMS, TYPE_ALL, } device_type = TYPE_DEVICES; sd_device_action_t action = SD_DEVICE_CHANGE; _cleanup_(sd_device_enumerator_unrefp) sd_device_enumerator *e = NULL; _cleanup_(sd_device_monitor_unrefp) sd_device_monitor *m = NULL; _cleanup_(sd_event_unrefp) sd_event *event = NULL; _cleanup_hashmap_free_ Hashmap *settle_hashmap = NULL; usec_t ping_timeout_usec = 5 * USEC_PER_SEC; bool settle = false, ping = false; int c, r; if (running_in_chroot() > 0) { log_info("Running in chroot, ignoring request."); return 0; } r = sd_device_enumerator_new(&e); if (r < 0) return r; r = sd_device_enumerator_allow_uninitialized(e); if (r < 0) return r; while ((c = getopt_long(argc, argv, "vnqt:c:s:S:a:A:p:g:y:b:wVh", options, NULL)) >= 0) { _cleanup_free_ char *buf = NULL; const char *key, *val; switch (c) { case 'v': arg_verbose = true; break; case 'n': arg_dry_run = true; break; case 'q': arg_quiet = true; break; case 't': if (streq(optarg, "devices")) device_type = TYPE_DEVICES; else if (streq(optarg, "subsystems")) device_type = TYPE_SUBSYSTEMS; else if (streq(optarg, "all")) device_type = TYPE_ALL; else return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Unknown type --type=%s", optarg); break; case 'c': r = parse_device_action(optarg, &action); if (r < 0) return log_error_errno(r, "Unknown action '%s'", optarg); if (r == 0) return 0; break; case 's': r = sd_device_enumerator_add_match_subsystem(e, optarg, true); if (r < 0) return log_error_errno(r, "Failed to add subsystem match '%s': %m", optarg); break; case 'S': r = sd_device_enumerator_add_match_subsystem(e, optarg, false); if (r < 0) return log_error_errno(r, "Failed to add negative subsystem match '%s': %m", optarg); break; case 'a': buf = keyval(optarg, &key, &val); if (!buf) return log_oom(); r = sd_device_enumerator_add_match_sysattr(e, key, val, true); if (r < 0) return log_error_errno(r, "Failed to add sysattr match '%s=%s': %m", key, val); break; case 'A': buf = keyval(optarg, &key, &val); if (!buf) return log_oom(); r = sd_device_enumerator_add_match_sysattr(e, key, val, false); if (r < 0) return log_error_errno(r, "Failed to add negative sysattr match '%s=%s': %m", key, val); break; case 'p': buf = keyval(optarg, &key, &val); if (!buf) return log_oom(); r = sd_device_enumerator_add_match_property(e, key, val); if (r < 0) return log_error_errno(r, "Failed to add property match '%s=%s': %m", key, val); break; case 'g': r = sd_device_enumerator_add_match_tag(e, optarg); if (r < 0) return log_error_errno(r, "Failed to add tag match '%s': %m", optarg); break; case 'y': r = sd_device_enumerator_add_match_sysname(e, optarg); if (r < 0) return log_error_errno(r, "Failed to add sysname match '%s': %m", optarg); break; case 'b': { _cleanup_(sd_device_unrefp) sd_device *dev = NULL; r = find_device(optarg, "/sys", &dev); if (r < 0) return log_error_errno(r, "Failed to open the device '%s': %m", optarg); r = device_enumerator_add_match_parent_incremental(e, dev); if (r < 0) return log_error_errno(r, "Failed to add parent match '%s': %m", optarg); break; } case 'w': settle = true; break; case ARG_NAME: { _cleanup_(sd_device_unrefp) sd_device *dev = NULL; r = find_device(optarg, "/dev", &dev); if (r < 0) return log_error_errno(r, "Failed to open the device '%s': %m", optarg); r = device_enumerator_add_match_parent_incremental(e, dev); if (r < 0) return log_error_errno(r, "Failed to add parent match '%s': %m", optarg); break; } case ARG_PING: ping = true; if (optarg) { r = parse_sec(optarg, &ping_timeout_usec); if (r < 0) log_error_errno(r, "Failed to parse timeout value '%s', ignoring: %m", optarg); } break; case ARG_UUID: arg_uuid = true; break; case ARG_PRIORITIZED_SUBSYSTEM: { _cleanup_strv_free_ char **subsystems = NULL; subsystems = strv_split(optarg, ","); if (!subsystems) return log_error_errno(r, "Failed to parse prioritized subsystem '%s': %m", optarg); STRV_FOREACH(p, subsystems) { r = device_enumerator_add_prioritized_subsystem(e, *p); if (r < 0) return log_error_errno(r, "Failed to add prioritized subsystem '%s': %m", *p); } break; } case ARG_INITIALIZED_MATCH: case ARG_INITIALIZED_NOMATCH: r = device_enumerator_add_match_is_initialized(e, c == ARG_INITIALIZED_MATCH ? MATCH_INITIALIZED_YES : MATCH_INITIALIZED_NO); if (r < 0) return log_error_errno(r, "Failed to set initialized filter: %m"); break; case 'V': return print_version(); case 'h': return help(); case '?': return -EINVAL; default: assert_not_reached(); } } if (ping) { _cleanup_(udev_ctrl_unrefp) UdevCtrl *uctrl = NULL; r = udev_ctrl_new(&uctrl); if (r < 0) return log_error_errno(r, "Failed to initialize udev control: %m"); r = udev_ctrl_send_ping(uctrl); if (r < 0) return log_error_errno(r, "Failed to connect to udev daemon: %m"); r = udev_ctrl_wait(uctrl, ping_timeout_usec); if (r < 0) return log_error_errno(r, "Failed to wait for daemon to reply: %m"); } for (; optind < argc; optind++) { _cleanup_(sd_device_unrefp) sd_device *dev = NULL; r = find_device(argv[optind], NULL, &dev); if (r < 0) return log_error_errno(r, "Failed to open the device '%s': %m", argv[optind]); r = device_enumerator_add_match_parent_incremental(e, dev); if (r < 0) return log_error_errno(r, "Failed to add parent match '%s': %m", argv[optind]); } if (settle) { settle_hashmap = hashmap_new(&path_hash_ops_free_free); if (!settle_hashmap) return log_oom(); r = sd_event_default(&event); if (r < 0) return log_error_errno(r, "Failed to get default event: %m"); r = sd_device_monitor_new(&m); if (r < 0) return log_error_errno(r, "Failed to create device monitor object: %m"); r = sd_device_monitor_attach_event(m, event); if (r < 0) return log_error_errno(r, "Failed to attach event to device monitor: %m"); r = sd_device_monitor_start(m, device_monitor_handler, settle_hashmap); if (r < 0) return log_error_errno(r, "Failed to start device monitor: %m"); } switch (device_type) { case TYPE_SUBSYSTEMS: r = device_enumerator_scan_subsystems(e); if (r < 0) return log_error_errno(r, "Failed to scan subsystems: %m"); break; case TYPE_DEVICES: r = device_enumerator_scan_devices(e); if (r < 0) return log_error_errno(r, "Failed to scan devices: %m"); break; case TYPE_ALL: r = device_enumerator_scan_devices_and_subsystems(e); if (r < 0) return log_error_errno(r, "Failed to scan devices and subsystems: %m"); break; default: assert_not_reached(); } r = exec_list(e, action, settle_hashmap); if (r < 0) return r; if (event && !hashmap_isempty(settle_hashmap)) { r = sd_event_loop(event); if (r < 0) return log_error_errno(r, "Event loop failed: %m"); } return 0; }