123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285 |
- /* vi: set sw=4 ts=4: */
- /*
- * Sysctl 1.01 - A utility to read and manipulate the sysctl parameters
- *
- * Copyright 1999 George Staikos
- *
- * Licensed under GPLv2 or later, see file LICENSE in this source tree.
- *
- * Changelog:
- * v1.01 - added -p <preload> to preload values from a file
- * v1.01.1 - busybox applet aware by <solar@gentoo.org>
- */
- //usage:#define sysctl_trivial_usage
- //usage: "[OPTIONS] [KEY[=VALUE]]..."
- //usage:#define sysctl_full_usage "\n\n"
- //usage: "Show/set kernel parameters\n"
- //usage: "\n -e Don't warn about unknown keys"
- //usage: "\n -n Don't show key names"
- //usage: "\n -a Show all values"
- /* Same as -a, no need to show it */
- /* //usage: "\n -A Show all values in table form" */
- //usage: "\n -w Set values"
- //usage: "\n -p FILE Set values from FILE (default /etc/sysctl.conf)"
- //usage: "\n -q Set values silently"
- //usage:
- //usage:#define sysctl_example_usage
- //usage: "sysctl [-n] [-e] variable...\n"
- //usage: "sysctl [-n] [-e] [-q] -w variable=value...\n"
- //usage: "sysctl [-n] [-e] -a\n"
- //usage: "sysctl [-n] [-e] [-q] -p file (default /etc/sysctl.conf)\n"
- //usage: "sysctl [-n] [-e] -A\n"
- #include "libbb.h"
- enum {
- FLAG_SHOW_KEYS = 1 << 0,
- FLAG_SHOW_KEY_ERRORS = 1 << 1,
- FLAG_TABLE_FORMAT = 1 << 2, /* not implemented */
- FLAG_SHOW_ALL = 1 << 3,
- FLAG_PRELOAD_FILE = 1 << 4,
- /* TODO: procps 3.2.8 seems to not require -w for KEY=VAL to work: */
- FLAG_WRITE = 1 << 5,
- FLAG_QUIET = 1 << 6,
- };
- #define OPTION_STR "neAapwq"
- static void sysctl_dots_to_slashes(char *name)
- {
- char *cptr, *last_good, *end;
- /* Convert minimum number of '.' to '/' so that
- * we end up with existing file's name.
- *
- * Example from bug 3894:
- * net.ipv4.conf.eth0.100.mc_forwarding ->
- * net/ipv4/conf/eth0.100/mc_forwarding
- * NB: net/ipv4/conf/eth0/mc_forwarding *also exists*,
- * therefore we must start from the end, and if
- * we replaced even one . -> /, start over again,
- * but never replace dots before the position
- * where last replacement occurred.
- *
- * Another bug we later had is that
- * net.ipv4.conf.eth0.100
- * (without .mc_forwarding) was mishandled.
- *
- * To set up testing: modprobe 8021q; vconfig add eth0 100
- */
- end = name + strlen(name);
- last_good = name - 1;
- *end = '.'; /* trick the loop into trying full name too */
- again:
- cptr = end;
- while (cptr > last_good) {
- if (*cptr == '.') {
- *cptr = '\0';
- //bb_error_msg("trying:'%s'", name);
- if (access(name, F_OK) == 0) {
- *cptr = '/';
- //bb_error_msg("replaced:'%s'", name);
- last_good = cptr;
- goto again;
- }
- *cptr = '.';
- }
- cptr--;
- }
- *end = '\0';
- }
- static int sysctl_act_on_setting(char *setting)
- {
- int fd, retval = EXIT_SUCCESS;
- char *cptr, *outname;
- char *value = value; /* for compiler */
- outname = xstrdup(setting);
- cptr = outname;
- while (*cptr) {
- if (*cptr == '/')
- *cptr = '.';
- cptr++;
- }
- if (option_mask32 & FLAG_WRITE) {
- cptr = strchr(setting, '=');
- if (cptr == NULL) {
- bb_error_msg("error: '%s' must be of the form name=value",
- outname);
- retval = EXIT_FAILURE;
- goto end;
- }
- value = cptr + 1; /* point to the value in name=value */
- if (setting == cptr || !*value) {
- bb_error_msg("error: malformed setting '%s'", outname);
- retval = EXIT_FAILURE;
- goto end;
- }
- *cptr = '\0';
- outname[cptr - setting] = '\0';
- /* procps 3.2.7 actually uses these flags */
- fd = open(setting, O_WRONLY|O_CREAT|O_TRUNC, 0666);
- } else {
- fd = open(setting, O_RDONLY);
- }
- if (fd < 0) {
- switch (errno) {
- case EACCES:
- /* Happens for write-only settings, e.g. net.ipv6.route.flush */
- goto end;
- case ENOENT:
- if (option_mask32 & FLAG_SHOW_KEY_ERRORS)
- bb_error_msg("error: '%s' is an unknown key", outname);
- break;
- default:
- bb_perror_msg("error %sing key '%s'",
- option_mask32 & FLAG_WRITE ?
- "sett" : "read",
- outname);
- break;
- }
- retval = EXIT_FAILURE;
- goto end;
- }
- if (option_mask32 & FLAG_WRITE) {
- //TODO: procps 3.2.7 writes "value\n", note trailing "\n"
- xwrite_str(fd, value);
- close(fd);
- if (!(option_mask32 & FLAG_QUIET)) {
- if (option_mask32 & FLAG_SHOW_KEYS)
- printf("%s = ", outname);
- puts(value);
- }
- } else {
- char c;
- value = cptr = xmalloc_read(fd, NULL);
- close(fd);
- if (value == NULL) {
- bb_perror_msg("error reading key '%s'", outname);
- goto end;
- }
- /* dev.cdrom.info and sunrpc.transports, for example,
- * are multi-line. Try "sysctl sunrpc.transports"
- */
- while ((c = *cptr) != '\0') {
- if (option_mask32 & FLAG_SHOW_KEYS)
- printf("%s = ", outname);
- while (1) {
- fputc(c, stdout);
- cptr++;
- if (c == '\n')
- break;
- c = *cptr;
- if (c == '\0')
- break;
- }
- }
- free(value);
- }
- end:
- free(outname);
- return retval;
- }
- static int sysctl_act_recursive(const char *path)
- {
- DIR *dirp;
- struct stat buf;
- struct dirent *entry;
- char *next;
- int retval = 0;
- stat(path, &buf);
- if (S_ISDIR(buf.st_mode) && !(option_mask32 & FLAG_WRITE)) {
- dirp = opendir(path);
- if (dirp == NULL)
- return -1;
- while ((entry = readdir(dirp)) != NULL) {
- next = concat_subpath_file(path, entry->d_name);
- if (next == NULL)
- continue; /* d_name is "." or ".." */
- /* if path was ".", drop "./" prefix: */
- retval |= sysctl_act_recursive((next[0] == '.' && next[1] == '/') ?
- next + 2 : next);
- free(next);
- }
- closedir(dirp);
- } else {
- char *name = xstrdup(path);
- retval |= sysctl_act_on_setting(name);
- free(name);
- }
- return retval;
- }
- /* Set sysctl's from a conf file. Format example:
- * # Controls IP packet forwarding
- * net.ipv4.ip_forward = 0
- */
- static int sysctl_handle_preload_file(const char *filename)
- {
- char *token[2];
- parser_t *parser;
- parser = config_open(filename);
- /* Must do it _after_ config_open(): */
- xchdir("/proc/sys");
- /* xchroot("/proc/sys") - if you are paranoid */
- //TODO: ';' is comment char too
- //TODO: comment may be only at line start. "var=1 #abc" - "1 #abc" is the value
- // (but _whitespace_ from ends should be trimmed first (and we do it right))
- //TODO: "var==1" is mishandled (must use "=1" as a value, but uses "1")
- // can it be fixed by removing PARSE_COLLAPSE bit?
- while (config_read(parser, token, 2, 2, "# \t=", PARSE_NORMAL)) {
- char *tp;
- sysctl_dots_to_slashes(token[0]);
- tp = xasprintf("%s=%s", token[0], token[1]);
- sysctl_act_recursive(tp);
- free(tp);
- }
- if (ENABLE_FEATURE_CLEAN_UP)
- config_close(parser);
- return 0;
- }
- int sysctl_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
- int sysctl_main(int argc UNUSED_PARAM, char **argv)
- {
- int retval;
- int opt;
- opt = getopt32(argv, "+" OPTION_STR); /* '+' - stop on first non-option */
- argv += optind;
- opt ^= (FLAG_SHOW_KEYS | FLAG_SHOW_KEY_ERRORS);
- option_mask32 = opt;
- if (opt & FLAG_PRELOAD_FILE) {
- option_mask32 |= FLAG_WRITE;
- /* xchdir("/proc/sys") is inside */
- return sysctl_handle_preload_file(*argv ? *argv : "/etc/sysctl.conf");
- }
- xchdir("/proc/sys");
- /* xchroot("/proc/sys") - if you are paranoid */
- if (opt & (FLAG_TABLE_FORMAT | FLAG_SHOW_ALL)) {
- return sysctl_act_recursive(".");
- }
- retval = 0;
- while (*argv) {
- sysctl_dots_to_slashes(*argv);
- retval |= sysctl_act_recursive(*argv);
- argv++;
- }
- return retval;
- }
|