It is important to know Udevil does not play nicely with encrypted filesystems. If an encrypted filesystem is being used consider looking for an alternate auto-mount utility, such as sys-fs/udiskie.
Kernel eventpolling may need to be enabled for device media to be properly detected by the kernel:
General setup ---> [*] Configure standard kernel features (expert users) ---> [*] Enable eventpoll support
After enabling eventpolling confirm operation by running:
If either command returns 0 or -1 then there will be issues detecting device media. Create a small script in /etc/local.d that will force event polling for each device:
#!/bin/bash source /etc/profile echo 2000 > /sys/module/block/parameters/events_dfl_poll_msecs echo 2000 > /sys/block/sr0/events_poll_msecs
Be sure to make the script executable:
chmod +x /etc/local.d/eventpolling.start
emerge --ask sys-apps/udevil
Udevil's operation can be configured using the global configuration file:
According to official documentation it is possible to configure auto-mount permissions on an individual basis by creating an /etc/udevil/ configuration file in this following format:
USERNAME is replaced by the user's user name.
A configuration file called devmon is also installed in the /etc.
Udevil can be configured to operate as a daemon by calling the devmon command. It is possible to run this command in the background by calling it as a job using the ampersand (
&). Users can add the following line to their ~/.bashrc file which will start devmon as a daemon each time the system boots:
devmon 2>&1 > /dev/null &
To start devmon as a systemd service:
systemctl start devmon@<user>
udevil mount <device>
udevil unmount <device>
To avoid a permission denied error while trying to invoke udevil, ensure the user belongs to the setuid executable's group, which is most likely
- https://igurublog.wordpress.com/downloads/script-devmon/ - A page describing devmon, an auto-mounting daemon that is now distributed with Udevil. This link may be helpful for reference purposes.