123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350 |
- /* vi: set sw=4 ts=4: */
- /*
- * Sysctl 1.01 - A utility to read and manipulate the sysctl parameters
- *
- * Copyright 1999 George Staikos
- *
- * Licensed under GPLv2 or later, see file LICENSE in this source tree.
- *
- * Changelog:
- * v1.01 - added -p <preload> to preload values from a file
- * v1.01.1 - busybox applet aware by <solar@gentoo.org>
- */
- //config:config BB_SYSCTL
- //config: bool "sysctl (7.4 kb)"
- //config: default y
- //config: help
- //config: Configure kernel parameters at runtime.
- //applet:IF_BB_SYSCTL(APPLET_NOEXEC(sysctl, sysctl, BB_DIR_SBIN, BB_SUID_DROP, sysctl))
- //kbuild:lib-$(CONFIG_BB_SYSCTL) += sysctl.o
- //usage:#define sysctl_trivial_usage
- //usage: "[-enq] { -a | -p [FILE]... | [-w] [KEY[=VALUE]]... }"
- //usage:#define sysctl_full_usage "\n\n"
- //usage: "Show/set kernel parameters\n"
- //usage: "\n -e Don't warn about unknown keys"
- //usage: "\n -n Don't show key names"
- //usage: "\n -q Quiet"
- //usage: "\n -a Show all values"
- /* Same as -a, no need to show it */
- /* //usage: "\n -A Show all values in table form" */
- //usage: "\n -p Set values from FILEs (default /etc/sysctl.conf)"
- //usage: "\n -w Set values"
- //usage:
- //usage:#define sysctl_example_usage
- //usage: "sysctl [-n] [-e] variable...\n"
- //usage: "sysctl [-n] [-e] [-q] -w variable=value...\n"
- //usage: "sysctl [-n] [-e] -a\n"
- //usage: "sysctl [-n] [-e] [-q] -p file (default /etc/sysctl.conf)\n"
- //usage: "sysctl [-n] [-e] -A\n"
- #include "libbb.h"
- enum {
- FLAG_SHOW_KEYS = 1 << 0,
- FLAG_SHOW_KEY_ERRORS = 1 << 1,
- FLAG_TABLE_FORMAT = 1 << 2, /* not implemented */
- FLAG_SHOW_ALL = 1 << 3,
- FLAG_PRELOAD_FILE = 1 << 4,
- /* NB: procps 3.2.8 does not require -w for KEY=VAL to work, it only rejects non-KEY=VAL form */
- FLAG_WRITE = 1 << 5,
- FLAG_QUIET = 1 << 6,
- };
- #define OPTION_STR "neAapwq"
- static void sysctl_dots_to_slashes(char *name)
- {
- char *cptr, *last_good, *end, *slash;
- char end_ch;
- end = strchrnul(name, '=');
- slash = strchrnul(name, '/');
- if (slash < end
- && strchrnul(name, '.') < slash
- ) {
- /* There are both dots and slashes, and 1st dot is
- * before 1st slash.
- * (IOW: not raw, unmangled a/b/c.d format)
- *
- * procps supports this syntax for names with dots:
- * net.ipv4.conf.eth0/100.mc_forwarding
- * (dots and slashes are simply swapped)
- */
- while (end != name) {
- end--;
- if (*end == '.') *end = '/';
- else if (*end == '/') *end = '.';
- }
- return;
- }
- /* else: use our old behavior: */
- /* Convert minimum number of '.' to '/' so that
- * we end up with existing file's name.
- *
- * Example from bug 3894:
- * net.ipv4.conf.eth0.100.mc_forwarding ->
- * net/ipv4/conf/eth0.100/mc_forwarding
- * NB: net/ipv4/conf/eth0/mc_forwarding *also exists*,
- * therefore we must start from the end, and if
- * we replaced even one . -> /, start over again,
- * but never replace dots before the position
- * where last replacement occurred.
- *
- * Another bug we later had is that
- * net.ipv4.conf.eth0.100
- * (without .mc_forwarding) was mishandled.
- *
- * To set up testing: modprobe 8021q; vconfig add eth0 100
- */
- end_ch = *end;
- *end = '.'; /* trick the loop into trying full name too */
- last_good = name - 1;
- again:
- cptr = end;
- while (cptr > last_good) {
- if (*cptr == '.') {
- *cptr = '\0';
- //bb_error_msg("trying:'%s'", name);
- if (access(name, F_OK) == 0) {
- *cptr = '/';
- //bb_error_msg("replaced:'%s'", name);
- last_good = cptr;
- goto again;
- }
- *cptr = '.';
- }
- cptr--;
- }
- *end = end_ch;
- }
- static int sysctl_act_on_setting(char *setting)
- {
- int fd, retval = EXIT_SUCCESS;
- char *cptr, *outname;
- char *value = value; /* for compiler */
- bool writing = (option_mask32 & FLAG_WRITE);
- outname = xstrdup(setting);
- cptr = outname;
- while (*cptr) {
- if (*cptr == '/')
- *cptr = '.';
- else if (*cptr == '.')
- *cptr = '/';
- cptr++;
- }
- cptr = strchr(setting, '=');
- if (cptr)
- writing = 1;
- if (writing) {
- if (!cptr) {
- bb_error_msg("error: '%s' must be of the form name=value",
- outname);
- retval = EXIT_FAILURE;
- goto end;
- }
- value = cptr + 1; /* point to the value in name=value */
- if (setting == cptr /* "name" can't be empty */
- /* || !*value - WRONG: "sysctl net.ipv4.ip_local_reserved_ports=" is a valid syntax (clears the value) */
- ) {
- bb_error_msg("error: malformed setting '%s'", outname);
- retval = EXIT_FAILURE;
- goto end;
- }
- *cptr = '\0';
- outname[cptr - setting] = '\0';
- /* procps 3.2.7 actually uses these flags */
- fd = open(setting, O_WRONLY|O_CREAT|O_TRUNC, 0666);
- } else {
- fd = open(setting, O_RDONLY);
- }
- if (fd < 0) {
- switch (errno) {
- case ENOENT:
- if (option_mask32 & FLAG_SHOW_KEY_ERRORS)
- bb_error_msg("error: '%s' is an unknown key", outname);
- break;
- case EACCES:
- /* Happens for write-only settings, e.g. net.ipv6.route.flush */
- if (!writing)
- goto end;
- /* fall through */
- default:
- bb_perror_msg("error %sing key '%s'",
- writing ?
- "sett" : "read",
- outname);
- break;
- }
- retval = EXIT_FAILURE;
- goto end;
- }
- if (writing) {
- //TODO: procps 3.2.7 writes "value\n", note trailing "\n"
- xwrite_str(fd, value);
- close(fd);
- if (!(option_mask32 & FLAG_QUIET)) {
- if (option_mask32 & FLAG_SHOW_KEYS)
- printf("%s = ", outname);
- puts(value);
- }
- } else {
- char c;
- value = cptr = xmalloc_read(fd, NULL);
- close(fd);
- if (value == NULL) {
- bb_perror_msg("error reading key '%s'", outname);
- retval = EXIT_FAILURE;
- goto end;
- }
- /* dev.cdrom.info and sunrpc.transports, for example,
- * are multi-line. Try "sysctl sunrpc.transports"
- */
- while ((c = *cptr) != '\0') {
- if (option_mask32 & FLAG_SHOW_KEYS)
- printf("%s = ", outname);
- while (1) {
- fputc(c, stdout);
- cptr++;
- if (c == '\n')
- break;
- c = *cptr;
- if (c == '\0')
- break;
- }
- }
- free(value);
- }
- end:
- free(outname);
- return retval;
- }
- static int sysctl_act_recursive(const char *path)
- {
- struct stat buf;
- int retval = 0;
- if (!(option_mask32 & FLAG_WRITE)
- && !strchr(path, '=') /* do not try to resurse on "var=val" */
- && stat(path, &buf) == 0
- && S_ISDIR(buf.st_mode)
- ) {
- struct dirent *entry;
- DIR *dirp;
- dirp = opendir(path);
- if (dirp == NULL)
- return -1;
- while ((entry = readdir(dirp)) != NULL) {
- char *next = concat_subpath_file(path, entry->d_name);
- if (next == NULL)
- continue; /* d_name is "." or ".." */
- /* if path was ".", drop "./" prefix: */
- retval |= sysctl_act_recursive((next[0] == '.' && next[1] == '/') ?
- next + 2 : next);
- free(next);
- }
- closedir(dirp);
- } else {
- char *name = xstrdup(path);
- retval |= sysctl_act_on_setting(name);
- free(name);
- }
- return retval;
- }
- /* Set sysctl's from a conf file. Format example:
- * # Controls IP packet forwarding
- * net.ipv4.ip_forward = 0
- */
- static int sysctl_handle_preload_file(const char *filename)
- {
- char *token[2];
- parser_t *parser;
- int parse_flags;
- parser = config_open(filename);
- /* Must do it _after_ config_open(): */
- xchdir("/proc/sys");
- parse_flags = 0;
- parse_flags &= ~PARSE_COLLAPSE; // NO (var==val is not var=val) - treat consecutive delimiters as one
- parse_flags &= ~PARSE_TRIM; // NO - trim leading and trailing delimiters
- parse_flags |= PARSE_GREEDY; // YES - last token takes entire remainder of the line
- parse_flags &= ~PARSE_MIN_DIE; // NO - die if < min tokens found
- parse_flags &= ~PARSE_EOL_COMMENTS; // NO (only first char) - comments are recognized even if not first char
- parse_flags |= PARSE_ALT_COMMENTS;// YES - two comment chars: ';' and '#'
- /* <space><tab><space>#comment is also comment, not strictly 1st char only */
- parse_flags |= PARSE_WS_COMMENTS; // YES - comments are recognized even if there is whitespace before
- while (config_read(parser, token, 2, 2, ";#=", parse_flags)) {
- char *tp;
- trim(token[1]);
- tp = trim(token[0]);
- sysctl_dots_to_slashes(token[0]);
- /* ^^^converted in-place. tp still points to NUL */
- /* now, add "=TOKEN1" */
- *tp++ = '=';
- overlapping_strcpy(tp, token[1]);
- sysctl_act_on_setting(token[0]);
- }
- if (ENABLE_FEATURE_CLEAN_UP)
- config_close(parser);
- return 0;
- }
- int sysctl_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
- int sysctl_main(int argc UNUSED_PARAM, char **argv)
- {
- int retval;
- int opt;
- opt = getopt32(argv, "+" OPTION_STR); /* '+' - stop on first non-option */
- argv += optind;
- opt ^= (FLAG_SHOW_KEYS | FLAG_SHOW_KEY_ERRORS);
- option_mask32 = opt;
- if (opt & FLAG_PRELOAD_FILE) {
- int cur_dir_fd;
- option_mask32 |= FLAG_WRITE;
- if (!*argv)
- *--argv = (char*)"/etc/sysctl.conf";
- cur_dir_fd = xopen(".", O_RDONLY | O_DIRECTORY);
- do {
- /* xchdir("/proc/sys") is inside */
- sysctl_handle_preload_file(*argv);
- xfchdir(cur_dir_fd); /* files can be relative, must restore cwd */
- } while (*++argv);
- return 0; /* procps-ng 3.3.10 does not flag parse errors */
- }
- xchdir("/proc/sys");
- if (opt & (FLAG_TABLE_FORMAT | FLAG_SHOW_ALL)) {
- return sysctl_act_recursive(".");
- }
- //TODO: if(!argv[0]) bb_show_usage() ?
- retval = 0;
- while (*argv) {
- sysctl_dots_to_slashes(*argv);
- retval |= sysctl_act_recursive(*argv);
- argv++;
- }
- return retval;
- }
|