/* vi: set sw=4 ts=4: */ /* * Sysctl 1.01 - A utility to read and manipulate the sysctl parameters * * Copyright 1999 George Staikos * * Licensed under GPLv2 or later, see file LICENSE in this source tree. * * Changelog: * v1.01 - added -p to preload values from a file * v1.01.1 - busybox applet aware by */ //config:config BB_SYSCTL //config: bool "sysctl (6.9 kb)" //config: default y //config: help //config: Configure kernel parameters at runtime. //applet:IF_BB_SYSCTL(APPLET(sysctl, BB_DIR_SBIN, BB_SUID_DROP)) //kbuild:lib-$(CONFIG_BB_SYSCTL) += sysctl.o //usage:#define sysctl_trivial_usage //usage: "-p [-enq] [FILE...] / [-enqaw] [KEY[=VALUE]]..." //usage:#define sysctl_full_usage "\n\n" //usage: "Show/set kernel parameters\n" //usage: "\n -p Set values from FILEs (default /etc/sysctl.conf)" //usage: "\n -e Don't warn about unknown keys" //usage: "\n -n Don't show key names" //usage: "\n -q Quiet" //usage: "\n -a Show all values" /* Same as -a, no need to show it */ /* //usage: "\n -A Show all values in table form" */ //usage: "\n -w Set values" //usage: //usage:#define sysctl_example_usage //usage: "sysctl [-n] [-e] variable...\n" //usage: "sysctl [-n] [-e] [-q] -w variable=value...\n" //usage: "sysctl [-n] [-e] -a\n" //usage: "sysctl [-n] [-e] [-q] -p file (default /etc/sysctl.conf)\n" //usage: "sysctl [-n] [-e] -A\n" #include "libbb.h" enum { FLAG_SHOW_KEYS = 1 << 0, FLAG_SHOW_KEY_ERRORS = 1 << 1, FLAG_TABLE_FORMAT = 1 << 2, /* not implemented */ FLAG_SHOW_ALL = 1 << 3, FLAG_PRELOAD_FILE = 1 << 4, /* NB: procps 3.2.8 does not require -w for KEY=VAL to work, it only rejects non-KEY=VAL form */ FLAG_WRITE = 1 << 5, FLAG_QUIET = 1 << 6, }; #define OPTION_STR "neAapwq" static void sysctl_dots_to_slashes(char *name) { char *cptr, *last_good, *end; /* Convert minimum number of '.' to '/' so that * we end up with existing file's name. * * Example from bug 3894: * net.ipv4.conf.eth0.100.mc_forwarding -> * net/ipv4/conf/eth0.100/mc_forwarding * NB: net/ipv4/conf/eth0/mc_forwarding *also exists*, * therefore we must start from the end, and if * we replaced even one . -> /, start over again, * but never replace dots before the position * where last replacement occurred. * * Another bug we later had is that * net.ipv4.conf.eth0.100 * (without .mc_forwarding) was mishandled. * * To set up testing: modprobe 8021q; vconfig add eth0 100 */ end = name + strlen(name); last_good = name - 1; *end = '.'; /* trick the loop into trying full name too */ again: cptr = end; while (cptr > last_good) { if (*cptr == '.') { *cptr = '\0'; //bb_error_msg("trying:'%s'", name); if (access(name, F_OK) == 0) { *cptr = '/'; //bb_error_msg("replaced:'%s'", name); last_good = cptr; goto again; } *cptr = '.'; } cptr--; } *end = '\0'; } static int sysctl_act_on_setting(char *setting) { int fd, retval = EXIT_SUCCESS; char *cptr, *outname; char *value = value; /* for compiler */ bool writing = (option_mask32 & FLAG_WRITE); outname = xstrdup(setting); cptr = outname; while (*cptr) { if (*cptr == '/') *cptr = '.'; cptr++; } cptr = strchr(setting, '='); if (cptr) writing = 1; if (writing) { if (cptr == NULL) { bb_error_msg("error: '%s' must be of the form name=value", outname); retval = EXIT_FAILURE; goto end; } value = cptr + 1; /* point to the value in name=value */ if (setting == cptr || !*value) { bb_error_msg("error: malformed setting '%s'", outname); retval = EXIT_FAILURE; goto end; } *cptr = '\0'; outname[cptr - setting] = '\0'; /* procps 3.2.7 actually uses these flags */ fd = open(setting, O_WRONLY|O_CREAT|O_TRUNC, 0666); } else { fd = open(setting, O_RDONLY); } if (fd < 0) { switch (errno) { case EACCES: /* Happens for write-only settings, e.g. net.ipv6.route.flush */ goto end; case ENOENT: if (option_mask32 & FLAG_SHOW_KEY_ERRORS) bb_error_msg("error: '%s' is an unknown key", outname); break; default: bb_perror_msg("error %sing key '%s'", writing ? "sett" : "read", outname); break; } retval = EXIT_FAILURE; goto end; } if (writing) { //TODO: procps 3.2.7 writes "value\n", note trailing "\n" xwrite_str(fd, value); close(fd); if (!(option_mask32 & FLAG_QUIET)) { if (option_mask32 & FLAG_SHOW_KEYS) printf("%s = ", outname); puts(value); } } else { char c; value = cptr = xmalloc_read(fd, NULL); close(fd); if (value == NULL) { bb_perror_msg("error reading key '%s'", outname); goto end; } /* dev.cdrom.info and sunrpc.transports, for example, * are multi-line. Try "sysctl sunrpc.transports" */ while ((c = *cptr) != '\0') { if (option_mask32 & FLAG_SHOW_KEYS) printf("%s = ", outname); while (1) { fputc(c, stdout); cptr++; if (c == '\n') break; c = *cptr; if (c == '\0') break; } } free(value); } end: free(outname); return retval; } static int sysctl_act_recursive(const char *path) { DIR *dirp; struct stat buf; struct dirent *entry; char *next; int retval = 0; stat(path, &buf); if (S_ISDIR(buf.st_mode) && !(option_mask32 & FLAG_WRITE)) { dirp = opendir(path); if (dirp == NULL) return -1; while ((entry = readdir(dirp)) != NULL) { next = concat_subpath_file(path, entry->d_name); if (next == NULL) continue; /* d_name is "." or ".." */ /* if path was ".", drop "./" prefix: */ retval |= sysctl_act_recursive((next[0] == '.' && next[1] == '/') ? next + 2 : next); free(next); } closedir(dirp); } else { char *name = xstrdup(path); retval |= sysctl_act_on_setting(name); free(name); } return retval; } /* Set sysctl's from a conf file. Format example: * # Controls IP packet forwarding * net.ipv4.ip_forward = 0 */ static int sysctl_handle_preload_file(const char *filename) { char *token[2]; parser_t *parser; int parse_flags; parser = config_open(filename); /* Must do it _after_ config_open(): */ xchdir("/proc/sys"); parse_flags = 0; parse_flags &= ~PARSE_COLLAPSE; // NO (var==val is not var=val) - treat consecutive delimiters as one parse_flags &= ~PARSE_TRIM; // NO - trim leading and trailing delimiters parse_flags |= PARSE_GREEDY; // YES - last token takes entire remainder of the line parse_flags &= ~PARSE_MIN_DIE; // NO - die if < min tokens found parse_flags &= ~PARSE_EOL_COMMENTS; // NO (only first char) - comments are recognized even if not first char parse_flags |= PARSE_ALT_COMMENTS;// YES - two comment chars: ';' and '#' /* #comment is also comment, not strictly 1st char only */ parse_flags |= PARSE_WS_COMMENTS; // YES - comments are recognized even if there is whitespace before while (config_read(parser, token, 2, 2, ";#=", parse_flags)) { char *tp; trim(token[1]); tp = trim(token[0]); sysctl_dots_to_slashes(token[0]); /* ^^^converted in-place. tp still points to NUL */ /* now, add "=TOKEN1" */ *tp++ = '='; overlapping_strcpy(tp, token[1]); sysctl_act_on_setting(token[0]); } if (ENABLE_FEATURE_CLEAN_UP) config_close(parser); return 0; } int sysctl_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE; int sysctl_main(int argc UNUSED_PARAM, char **argv) { int retval; int opt; opt = getopt32(argv, "+" OPTION_STR); /* '+' - stop on first non-option */ argv += optind; opt ^= (FLAG_SHOW_KEYS | FLAG_SHOW_KEY_ERRORS); option_mask32 = opt; if (opt & FLAG_PRELOAD_FILE) { int cur_dir_fd; option_mask32 |= FLAG_WRITE; if (!*argv) *--argv = (char*)"/etc/sysctl.conf"; cur_dir_fd = xopen(".", O_RDONLY | O_DIRECTORY); do { /* xchdir("/proc/sys") is inside */ sysctl_handle_preload_file(*argv); xfchdir(cur_dir_fd); /* files can be relative, must restore cwd */ } while (*++argv); return 0; /* procps-ng 3.3.10 does not flag parse errors */ } xchdir("/proc/sys"); if (opt & (FLAG_TABLE_FORMAT | FLAG_SHOW_ALL)) { return sysctl_act_recursive("."); } retval = 0; while (*argv) { sysctl_dots_to_slashes(*argv); retval |= sysctl_act_recursive(*argv); argv++; } return retval; }