cb143b9793
function old new delta uevent_main 285 337 +52 Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
129 lines
3.5 KiB
C
129 lines
3.5 KiB
C
/*
|
|
* Copyright 2015 Denys Vlasenko
|
|
*
|
|
* Licensed under GPLv2, see file LICENSE in this source tree.
|
|
*/
|
|
//config:config UEVENT
|
|
//config: bool "uevent (3.1 kb)"
|
|
//config: default y
|
|
//config: help
|
|
//config: uevent is a netlink listener for kernel uevent notifications
|
|
//config: sent via netlink. It is usually used for dynamic device creation.
|
|
|
|
//applet:IF_UEVENT(APPLET(uevent, BB_DIR_SBIN, BB_SUID_DROP))
|
|
|
|
//kbuild:lib-$(CONFIG_UEVENT) += uevent.o
|
|
|
|
//usage:#define uevent_trivial_usage
|
|
//usage: "[PROG [ARGS]]"
|
|
//usage:#define uevent_full_usage "\n\n"
|
|
//usage: "uevent runs PROG for every netlink notification."
|
|
//usage: "\n""PROG's environment contains data passed from the kernel."
|
|
//usage: "\n""Typical usage (daemon for dynamic device node creation):"
|
|
//usage: "\n"" # uevent mdev & mdev -s"
|
|
|
|
#include "libbb.h"
|
|
#include "common_bufsiz.h"
|
|
#include <linux/netlink.h>
|
|
|
|
#define env ((char **)bb_common_bufsiz1)
|
|
#define INIT_G() do { setup_common_bufsiz(); } while (0)
|
|
enum {
|
|
MAX_ENV = COMMON_BUFSIZE / sizeof(char*) - 1,
|
|
// ^^^sizeof(env[0]) instead of sizeof(char*)
|
|
// makes gcc-6.3.0 emit "strict-aliasing" warning.
|
|
|
|
// socket receive buffer of 2MiB proved to be too small:
|
|
// http://lists.busybox.net/pipermail/busybox/2019-December/087665.html
|
|
// udevd seems to use a whooping 128MiB.
|
|
// The socket receive buffer size is just a resource limit.
|
|
// The buffers are allocated lazily so the memory is not wasted.
|
|
KERN_RCVBUF = 128 * 1024 * 1024,
|
|
|
|
// Might be made smaller: the kernel v5.4 passes up to 32 environment
|
|
// variables with a total of 2kb on each event.
|
|
// On top of that the action string and device path are added.
|
|
USER_RCVBUF = 16 * 1024,
|
|
};
|
|
|
|
int uevent_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
|
|
int uevent_main(int argc UNUSED_PARAM, char **argv)
|
|
{
|
|
int fd;
|
|
|
|
INIT_G();
|
|
|
|
argv++;
|
|
|
|
// Subscribe for UEVENT kernel messages.
|
|
// Without a sufficiently big RCVBUF, a ton of simultaneous events
|
|
// can trigger ENOBUFS on read, which is unrecoverable.
|
|
// Reproducer:
|
|
// uevent mdev &
|
|
// find /sys -name uevent -exec sh -c 'echo add >"{}"' ';'
|
|
reopen:
|
|
fd = create_and_bind_to_netlink(NETLINK_KOBJECT_UEVENT, /*groups:*/ 1 << 0, KERN_RCVBUF);
|
|
|
|
for (;;) {
|
|
char *netbuf;
|
|
char *s, *end;
|
|
ssize_t len;
|
|
int idx;
|
|
|
|
// In many cases, a system sits for *days* waiting
|
|
// for a new uevent notification to come in.
|
|
// We use a fresh mmap so that buffer is not allocated
|
|
// until kernel actually starts filling it.
|
|
netbuf = mmap(NULL, USER_RCVBUF,
|
|
PROT_READ | PROT_WRITE,
|
|
MAP_PRIVATE | MAP_ANON,
|
|
/* ignored: */ -1, 0);
|
|
if (netbuf == MAP_FAILED)
|
|
bb_simple_perror_msg_and_die("mmap");
|
|
|
|
// Here we block, possibly for a very long time
|
|
len = safe_read(fd, netbuf, USER_RCVBUF - 1);
|
|
if (len < 0) {
|
|
if (errno == ENOBUFS) {
|
|
// Ran out of socket receive buffer
|
|
bb_simple_error_msg("uevent overrun");
|
|
close(fd);
|
|
munmap(netbuf, USER_RCVBUF);
|
|
goto reopen;
|
|
}
|
|
bb_simple_perror_msg_and_die("read");
|
|
}
|
|
end = netbuf + len;
|
|
*end = '\0';
|
|
|
|
// Each netlink message starts with "ACTION@/path"
|
|
// (which we currently ignore),
|
|
// followed by environment variables.
|
|
if (!argv[0])
|
|
putchar('\n');
|
|
idx = 0;
|
|
s = netbuf;
|
|
while (s < end) {
|
|
if (!argv[0])
|
|
puts(s);
|
|
if (strchr(s, '=') && idx < MAX_ENV)
|
|
env[idx++] = s;
|
|
s += strlen(s) + 1;
|
|
}
|
|
env[idx] = NULL;
|
|
|
|
if (argv[0]) {
|
|
idx = 0;
|
|
while (env[idx])
|
|
putenv(env[idx++]);
|
|
spawn_and_wait(argv);
|
|
idx = 0;
|
|
while (env[idx])
|
|
bb_unsetenv(env[idx++]);
|
|
}
|
|
munmap(netbuf, USER_RCVBUF);
|
|
}
|
|
|
|
return 0; // not reached
|
|
}
|