Discussion
Hardware hotplug events on Linux, the gory details
krasikra: Excellent deep dive. The uevent/netlink path is one of those things every Linux developer should understand but few actually trace through.One thing worth adding: on embedded systems (ARM SBCs, Jetson boards), hotplug behavior can be surprisingly different from x86. Some device tree overlays don't fire proper uevents, and you end up polling sysfs as a fallback. The kernel's device model assumes a level of firmware cooperation that embedded vendors don't always provide.The kobject lifecycle diagram alone makes this worth bookmarking.
philips: Sort of relatedly: I bought an inexpensive DDR pad recently that worked on coldplug but not hotplug.It turns out the firmware on the pad isn’t quite ready to be polled for USB descriptors right when it is plugged in so you have to put in a little udev hack to suspend it then let it reconnect. At which point it comes back correctly.(The manufacturer included a little debugging flyer telling you to plug the device in slowly to work around this issue haha)For those interested: https://github.com/batocera-linux/batocera.linux/issues/1547...
WaitWaitWha: Love it.Since I am a visual learner, here is a sequence diagram that helped me follow it a bit cleaner. (yes, I used the gAI dark magic)``` sequenceDiagram participant HW as Hardware participant Kernel as Linux Kernel<br>(USB / driver core / kobject) participant NetlinkK as Netlink<br>(NETLINK_KOBJECT_UEVENT<br>group 1 = MONITOR_GROUP_KERNEL) participant Udevd as udevd<br>(systemd-udevd) participant NetlinkU as Netlink<br>(NETLINK_KOBJECT_UEVENT<br>group 2 = MONITOR_GROUP_UDEV) participant App as Userspace Application<br>(libudev or direct netlink listener) participant Sysd as systemd<br>(device units, services) participant DevFS as /dev<br>(device nodes + symlinks) HW->>Kernel: Physical insertion (USB plug-in) Kernel->>Kernel: Detect change via bus/driver<br>(e.g. xhci-hcd → usbcore) Kernel->>Kernel: Register new device in device model<br>(kobject_add / device_add) Kernel->>NetlinkK: kobject_uevent_env(ACTION=add, ...)<br>multicast to group 1<br>(raw uevent: null-terminated key=value strings) NetlinkK->>Udevd: Receive kernel uevent<br>(ACTION=add, SUBSYSTEM=..., DEVPATH=..., etc.) Note over Udevd: udevd parses uevent Udevd->>Udevd: Match & apply udev rules<br>(/lib/udev/rules.d/, /etc/udev/rules.d/) Udevd->>Udevd: Perform actions:<br>• Load firmware<br>• usb_modeswitch<br>• Set permissions<br>• Run programs/scripts Udevd->>Udevd: Create device node(s)<br>e.g. /dev/bus/usb/001/002 Udevd->>Udevd: Create symlinks<br>e.g. /dev/ttyACM0, /dev/disk/by-id/... alt Optional: triggers systemd .device unit Udevd->>Sysd: Triggers / influences device unit activation Sysd->>Sysd: May start dependent services / scopes end Udevd->>Udevd: Build enhanced udev packet:<br>• libudev header ("libudev\0", magic 0xfeedcafe, ...)<br>• MurmurHash2 subsystem/devtype<br>• 64-bit tag Bloom filter<br>• Original + added properties Udevd->>NetlinkU: Broadcast processed event<br>multicast to group 2<br>(binary format with header + properties) NetlinkU->>App: Receive udev event packet<br>(via libudev_monitor or raw netlink socket) App->>App: Parse header, validate magic/credentials<br>Extract properties App->>App: React to device<br>(open /dev/..., query sysfs, etc.) Note over DevFS: Device now usable via stable names / permissions ```
znpy: sorry for the dumb question, but what language is this? dotty? mermaid? what tool can i feed that code into ?EDIT: chatgpt correctly identified it as mermaid.live link: https://mermaid.live/edit#pako:eNqVVu1u6kYQfZWRf1SJLmAgJASri...
WaitWaitWha: apologies. Yes it is for mermaid.live
robinsonb5: I can't help feeling that the old XKCD cartoon [1] about life satisfaction being proportional to the time since last opening xorg.conf could equally apply to udev.For instance, I tinker with FPGA boards, and one board in particular presents both a JTAG and serial port over USB. Nothing unusual there, but while most such boards show up as /dev/ttyUSBn, but this one shows up as /dev/ttyACM0. I eventually figured out how to make the JTAG part accessible to the tools I was using, without having to be root, via a udev rule. The serial side was defeating me though - it turned out some kind of modem manager service was messing with the port, and needed to be disabled. OK, job done?Nope.A few days ago I updated the tools, and now access as a regular user wasn't working any more! It turns out the new version of one particular tool uses libusb, while the old version used rawhid (that last detail is no doubt why I had such trouble getting it to work in the first place) - and as such they require different entries in the udev rule. I'm getting too old for those kinds of side quest, especially now a certain search engine is much less use in solving them.(Not naming the tools because I'm not ranting against them - just venting about the frustration caused by the excessive and seemingly opaque complexity. Having got that off my chest, I'll go read the article, in the hope that the complexity becomes a little less opaque!)[1] https://xkcd.com/963/
foresto: > it turned out some kind of modem manager service was messing with the port, and needed to be disabled.Curious. What service was that?I have an on-board serial port that's only working in one direction, which is something I've never encountered before. I wonder if the service you're referring to could be causing my problem.
idle_zealot: These rules exist ostensibly for security, right? I wonder what the right model is here for interactive end-user operating systems. Just trust apps to behave and give them access to your devices? That's more-or-less what udev hacks end up amounting to in my experience... Maybe the API applications see should just ask the OS for a device that matches some description, and then the OS pops open a picker for the user, kinda like a file dialog? Selection of a device to pass to an application counts as granting permission to use it.
xobs: ModemManager. You need to set the variable ENV{ID_MM_PORT_IGNORE}=“1” I. A udev rule.Standard usb serial ports show up as ttyACM#, whereas nonstandard ports that require a driver like ftdi show up as ttyUSB#. Modems tend to be standard usb devices, so ModemManager by default scans all serial ports as if they were modems. This involves sending some AT commands to them to try and identify them.Software implementations of serial devices tend to follow the standard, so they show up as ttyACM#.
fc417fc802: Devices are typically controlled per-user. So if you want to increase isolation you need to run as a different UID. It's definitely a sub-par model IMO but it seems to work well enough.> and then the OS pops open a picker for the user, kinda like a file dialog?How would that work when I'm in a container or at a tty with nothing more than a shell?
robinsonb5: I don't have a problem with the concept of udev - I just find the details to be laden with papercuts. Needing different syntax depending on which subsystem is interacting with the device makes no sense from a user perspective.To cover all bases my udev rule seems to need to contain both SUBSYSTEM="hidraw", ATTRS{interface}=="CMSIS-DAP", MODE="0660", GROUP="plugdev" and SUBSYSTEM="usb", ATTR{idVendor}=="1d50", ATTRS{idProduct}=="602b", MODE="0660", GROUP="plugdev" I don't understand why the second rule isn't sufficient, and finding enough information online to even consider trying the first rule was extremely difficult.
hrmtst93837: I think a device picker UI is the right surface for user consent, but the hard part is turning selection into an unforgeable capability rather than a path a rogue process can guess and abuse.A practical pattern is to have a trusted agent open the device and pass a file descriptor to the sandboxed app over a Unix domain socket or D-Bus fds, and to persist grants by stable identifiers like ID_SERIAL or /dev/disk/by-id instead of ephemeral names such as /dev/sdX.That model gives you revocation and auditability, and it handles multi-interface devices better, but you still need explicit policies for exclusive access devices and a clear UX for transient versus persistent grants.From what I have seen the pragmatic path is to combine a portal implementation like xdg-desktop-portal for interactive apps with a documented policy file or daemon API for automation, accepting a little UX friction to get sane, revocable device capabilities.
blueflow: ModemManager used to open() and probe every tty device attached to the system. I had a 8-channel relay card with an arduino nano wired up with my desk to control the lights and disco ball, interfaced with a custom ascii-based serial protocol. connecting it to an ubuntu machine (where modemmanager was active in the default install) turned the 2nd or 3rd channel on.This was generally infuriating, there are many arduino forum posts about modemmanager messing up DIY setups.Upstream fix was changing modemmanager to work on a whitelist / opt-in approach instead of blacklist / out-opt. My fix was to switch to debian.
dismalpedigree: A while back I built an orchestrator application that would monitor usb events and then launch/destroy containers that have that usb device mapped to them. The orchestrator also ran in a container with no networking.Imagine my frustration when I learned that udev events don’t make it into containers unless networking is enabled.Figured out a solution eventually. Was a combination of compiling certain packages from source and some kernel flags if i remember correctly.
M95D: Shouldn't you manage permissions from groups instead of hacking udev?And why do you have modemmanager if you don't have a modem?