2002-02-02 04:17:29 +05:30
|
|
|
/*
|
|
|
|
* Sysctl 1.01 - A utility to read and manipulate the sysctl parameters
|
|
|
|
*
|
|
|
|
* "Copyright 1999 George Staikos
|
2012-03-02 17:59:36 +05:30
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU General Public License
|
|
|
|
* as published by the Free Software Foundation; either version 2
|
|
|
|
* of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
2002-02-02 04:17:29 +05:30
|
|
|
*
|
|
|
|
* Changelog:
|
|
|
|
* v1.01:
|
|
|
|
* - added -p <preload> to preload values from a file
|
2012-01-25 13:48:38 +05:30
|
|
|
* Horms:
|
2004-07-15 10:14:42 +05:30
|
|
|
* - added -q to be quiet when modifying values
|
2002-12-15 06:00:17 +05:30
|
|
|
*
|
|
|
|
* Changes by Albert Cahalan, 2002.
|
2002-02-02 04:17:29 +05:30
|
|
|
*/
|
|
|
|
|
2011-06-05 23:16:49 +05:30
|
|
|
#include <dirent.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <getopt.h>
|
2012-05-03 10:54:20 +05:30
|
|
|
#include <glob.h>
|
2011-06-05 23:16:49 +05:30
|
|
|
#include <libgen.h>
|
2011-10-07 12:40:49 +05:30
|
|
|
#include <limits.h>
|
2011-10-07 12:40:50 +05:30
|
|
|
#include <regex.h>
|
2012-05-03 10:32:52 +05:30
|
|
|
#include <stdbool.h>
|
2002-02-02 04:17:29 +05:30
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
2011-06-05 23:16:49 +05:30
|
|
|
#include <string.h>
|
2002-02-02 04:17:29 +05:30
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/types.h>
|
2011-06-05 23:16:49 +05:30
|
|
|
#include <unistd.h>
|
2011-10-09 06:27:45 +05:30
|
|
|
|
|
|
|
#include "c.h"
|
2012-03-23 18:02:24 +05:30
|
|
|
#include "fileutils.h"
|
2011-10-09 06:27:45 +05:30
|
|
|
#include "nls.h"
|
2011-10-10 00:59:26 +05:30
|
|
|
#include "xalloc.h"
|
2002-11-27 13:51:30 +05:30
|
|
|
#include "proc/procps.h"
|
2002-12-12 04:25:42 +05:30
|
|
|
#include "proc/version.h"
|
2002-02-02 04:17:29 +05:30
|
|
|
|
2018-03-12 07:36:08 +05:30
|
|
|
extern FILE *fprocopen(const char *, const char *);
|
|
|
|
|
2002-02-02 04:17:29 +05:30
|
|
|
/*
|
|
|
|
* Globals...
|
|
|
|
*/
|
2002-10-10 03:02:33 +05:30
|
|
|
static const char PROC_PATH[] = "/proc/sys/";
|
|
|
|
static const char DEFAULT_PRELOAD[] = "/etc/sysctl.conf";
|
2012-02-14 01:51:43 +05:30
|
|
|
static const char *DEPRECATED[] = {
|
|
|
|
"base_reachable_time",
|
|
|
|
"retrans_time",
|
|
|
|
""
|
|
|
|
};
|
|
|
|
static bool IgnoreDeprecated;
|
2004-07-15 20:52:23 +05:30
|
|
|
static bool NameOnly;
|
2002-02-02 04:17:29 +05:30
|
|
|
static bool PrintName;
|
|
|
|
static bool PrintNewline;
|
2002-12-12 04:25:42 +05:30
|
|
|
static bool IgnoreError;
|
2004-07-15 10:14:42 +05:30
|
|
|
static bool Quiet;
|
2011-10-07 12:40:50 +05:30
|
|
|
static char *pattern;
|
2002-02-02 04:17:29 +05:30
|
|
|
|
2018-01-18 16:08:02 +05:30
|
|
|
#define LINELEN 4096
|
|
|
|
static char *iobuf;
|
|
|
|
static size_t iolen = LINELEN;
|
|
|
|
|
2012-01-25 13:48:38 +05:30
|
|
|
/* Function prototypes. */
|
2012-11-02 23:20:55 +05:30
|
|
|
static int pattern_match(const char *string, const char *pat);
|
2012-01-25 13:48:38 +05:30
|
|
|
static int DisplayAll(const char *restrict const path);
|
2002-02-02 04:17:29 +05:30
|
|
|
|
2012-01-25 13:48:38 +05:30
|
|
|
static void slashdot(char *restrict p, char old, char new)
|
|
|
|
{
|
|
|
|
int warned = 1;
|
|
|
|
p = strpbrk(p, "/.");
|
|
|
|
if (!p)
|
|
|
|
/* nothing -- can't be, but oh well */
|
|
|
|
return;
|
|
|
|
if (*p == new)
|
|
|
|
/* already in desired format */
|
|
|
|
return;
|
|
|
|
while (p) {
|
|
|
|
char c = *p;
|
|
|
|
if ((*(p + 1) == '/' || *(p + 1) == '.') && warned) {
|
|
|
|
xwarnx(_("separators should not be repeated: %s"), p);
|
|
|
|
warned = 0;
|
|
|
|
}
|
|
|
|
if (c == old)
|
|
|
|
*p = new;
|
|
|
|
if (c == new)
|
|
|
|
*p = old;
|
|
|
|
p = strpbrk(p + 1, "/.");
|
|
|
|
}
|
2002-10-09 11:53:58 +05:30
|
|
|
}
|
2002-02-02 04:17:29 +05:30
|
|
|
|
|
|
|
/*
|
2012-01-25 13:48:38 +05:30
|
|
|
* Display the usage format
|
2002-02-02 04:17:29 +05:30
|
|
|
*/
|
2011-06-05 23:16:49 +05:30
|
|
|
static void __attribute__ ((__noreturn__))
|
|
|
|
Usage(FILE * out)
|
|
|
|
{
|
2012-01-25 13:48:38 +05:30
|
|
|
fputs(USAGE_HEADER, out);
|
|
|
|
fprintf(out,
|
|
|
|
_(" %s [options] [variable[=value] ...]\n"),
|
|
|
|
program_invocation_short_name);
|
|
|
|
fputs(USAGE_OPTIONS, out);
|
2013-10-11 04:37:10 +05:30
|
|
|
fputs(_(" -a, --all display all variables\n"), out);
|
|
|
|
fputs(_(" -A alias of -a\n"), out);
|
|
|
|
fputs(_(" -X alias of -a\n"), out);
|
|
|
|
fputs(_(" --deprecated include deprecated parameters to listing\n"), out);
|
|
|
|
fputs(_(" -b, --binary print value without new line\n"), out);
|
|
|
|
fputs(_(" -e, --ignore ignore unknown variables errors\n"), out);
|
|
|
|
fputs(_(" -N, --names print variable names without values\n"), out);
|
2018-03-03 12:59:19 +05:30
|
|
|
fputs(_(" -n, --values print only values of the given variable(s)\n"), out);
|
2013-10-11 04:37:10 +05:30
|
|
|
fputs(_(" -p, --load[=<file>] read values from file\n"), out);
|
|
|
|
fputs(_(" -f alias of -p\n"), out);
|
|
|
|
fputs(_(" --system read values from all system directories\n"), out);
|
|
|
|
fputs(_(" -r, --pattern <expression>\n"
|
|
|
|
" select setting that match expression\n"), out);
|
|
|
|
fputs(_(" -q, --quiet do not echo variable set\n"), out);
|
|
|
|
fputs(_(" -w, --write enable writing a value to variable\n"), out);
|
|
|
|
fputs(_(" -o does nothing\n"), out);
|
|
|
|
fputs(_(" -x does nothing\n"), out);
|
|
|
|
fputs(_(" -d alias of -h\n"), out);
|
2012-01-25 13:48:38 +05:30
|
|
|
fputs(USAGE_SEPARATOR, out);
|
|
|
|
fputs(USAGE_HELP, out);
|
|
|
|
fputs(USAGE_VERSION, out);
|
|
|
|
fprintf(out, USAGE_MAN_TAIL("sysctl(8)"));
|
|
|
|
|
|
|
|
exit(out == stderr ? EXIT_FAILURE : EXIT_SUCCESS);
|
2002-12-12 04:25:42 +05:30
|
|
|
}
|
2002-02-02 04:17:29 +05:30
|
|
|
|
|
|
|
/*
|
2012-01-25 13:48:38 +05:30
|
|
|
* Strip the leading and trailing spaces from a string
|
2002-02-02 04:17:29 +05:30
|
|
|
*/
|
2012-01-25 13:48:38 +05:30
|
|
|
static char *StripLeadingAndTrailingSpaces(char *oneline)
|
|
|
|
{
|
|
|
|
char *t;
|
2002-02-02 04:17:29 +05:30
|
|
|
|
2012-01-25 13:48:38 +05:30
|
|
|
if (!oneline || !*oneline)
|
|
|
|
return oneline;
|
2002-02-02 04:17:29 +05:30
|
|
|
|
2012-01-25 13:48:38 +05:30
|
|
|
t = oneline;
|
|
|
|
t += strlen(oneline) - 1;
|
2002-02-02 04:17:29 +05:30
|
|
|
|
2012-01-25 13:48:38 +05:30
|
|
|
while ((*t == ' ' || *t == '\t' || *t == '\n' || *t == '\r') && t != oneline)
|
|
|
|
*t-- = 0;
|
2002-02-02 04:17:29 +05:30
|
|
|
|
2012-01-25 13:48:38 +05:30
|
|
|
t = oneline;
|
2002-02-02 04:17:29 +05:30
|
|
|
|
2012-01-25 13:48:38 +05:30
|
|
|
while ((*t == ' ' || *t == '\t') && *t != 0)
|
|
|
|
t++;
|
2002-02-02 04:17:29 +05:30
|
|
|
|
2012-01-25 13:48:38 +05:30
|
|
|
return t;
|
2002-12-12 04:25:42 +05:30
|
|
|
}
|
2002-02-02 04:17:29 +05:30
|
|
|
|
|
|
|
/*
|
2012-01-25 13:48:38 +05:30
|
|
|
* Read a sysctl setting
|
2002-02-02 04:17:29 +05:30
|
|
|
*/
|
2012-01-25 13:48:38 +05:30
|
|
|
static int ReadSetting(const char *restrict const name)
|
|
|
|
{
|
|
|
|
int rc = 0;
|
|
|
|
char *restrict tmpname;
|
|
|
|
char *restrict outname;
|
2018-01-18 16:08:02 +05:30
|
|
|
ssize_t rlen;
|
2012-01-25 13:48:38 +05:30
|
|
|
FILE *restrict fp;
|
|
|
|
struct stat ts;
|
|
|
|
|
|
|
|
if (!name || !*name) {
|
|
|
|
xwarnx(_("\"%s\" is an unknown key"), name);
|
|
|
|
return -1;
|
|
|
|
}
|
2002-02-02 04:17:29 +05:30
|
|
|
|
2012-01-25 13:48:38 +05:30
|
|
|
/* used to display the output */
|
|
|
|
outname = xstrdup(name);
|
|
|
|
/* change / to . */
|
|
|
|
slashdot(outname, '/', '.');
|
|
|
|
|
|
|
|
/* used to open the file */
|
|
|
|
tmpname = xmalloc(strlen(name) + strlen(PROC_PATH) + 2);
|
|
|
|
strcpy(tmpname, PROC_PATH);
|
|
|
|
strcat(tmpname, name);
|
|
|
|
/* change . to / */
|
|
|
|
slashdot(tmpname + strlen(PROC_PATH), '.', '/');
|
|
|
|
|
|
|
|
/* used to display the output */
|
|
|
|
outname = xstrdup(name);
|
|
|
|
/* change / to . */
|
|
|
|
slashdot(outname, '/', '.');
|
|
|
|
|
|
|
|
if (stat(tmpname, &ts) < 0) {
|
|
|
|
if (!IgnoreError) {
|
|
|
|
xwarn(_("cannot stat %s"), tmpname);
|
|
|
|
rc = -1;
|
|
|
|
}
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if ((ts.st_mode & S_IRUSR) == 0)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
if (S_ISDIR(ts.st_mode)) {
|
|
|
|
size_t len;
|
|
|
|
len = strlen(tmpname);
|
|
|
|
tmpname[len] = '/';
|
|
|
|
tmpname[len + 1] = '\0';
|
|
|
|
rc = DisplayAll(tmpname);
|
|
|
|
goto out;
|
|
|
|
}
|
2002-02-02 04:17:29 +05:30
|
|
|
|
2012-01-25 13:48:38 +05:30
|
|
|
if (pattern && !pattern_match(outname, pattern)) {
|
2017-05-22 18:01:34 +05:30
|
|
|
rc = 0;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (NameOnly) {
|
|
|
|
fprintf(stdout, "%s\n", outname);
|
|
|
|
goto out;
|
2012-01-25 13:48:38 +05:30
|
|
|
}
|
|
|
|
|
2018-01-18 16:08:02 +05:30
|
|
|
fp = fprocopen(tmpname, "r");
|
2012-01-25 13:48:38 +05:30
|
|
|
|
|
|
|
if (!fp) {
|
|
|
|
switch (errno) {
|
|
|
|
case ENOENT:
|
|
|
|
if (!IgnoreError) {
|
|
|
|
xwarnx(_("\"%s\" is an unknown key"), outname);
|
|
|
|
rc = -1;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case EACCES:
|
|
|
|
xwarnx(_("permission denied on key '%s'"), outname);
|
|
|
|
rc = -1;
|
|
|
|
break;
|
2017-07-07 17:39:12 +05:30
|
|
|
case EIO: /* Ignore stable_secret below /proc/sys/net/ipv6/conf */
|
|
|
|
rc = -1;
|
|
|
|
break;
|
2012-01-25 13:48:38 +05:30
|
|
|
default:
|
|
|
|
xwarn(_("reading key \"%s\""), outname);
|
|
|
|
rc = -1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
errno = 0;
|
2018-01-18 16:08:02 +05:30
|
|
|
if ((rlen = getline(&iobuf, &iolen, fp)) > 0) {
|
2012-01-25 13:48:38 +05:30
|
|
|
/* this loop is required, see
|
|
|
|
* /sbin/sysctl -a | egrep -6 dev.cdrom.info
|
|
|
|
*/
|
|
|
|
do {
|
2017-05-22 18:01:34 +05:30
|
|
|
char *nlptr;
|
|
|
|
if (PrintName) {
|
|
|
|
fprintf(stdout, "%s = ", outname);
|
|
|
|
do {
|
2018-01-18 16:08:02 +05:30
|
|
|
fprintf(stdout, "%s", iobuf);
|
|
|
|
nlptr = &iobuf[strlen(iobuf) - 1];
|
2017-05-22 18:01:34 +05:30
|
|
|
/* already has the \n in it */
|
|
|
|
if (*nlptr == '\n')
|
|
|
|
break;
|
2018-01-18 16:08:02 +05:30
|
|
|
} while ((rlen = getline(&iobuf, &iolen, fp)) > 0);
|
2017-05-22 18:01:34 +05:30
|
|
|
if (*nlptr != '\n')
|
|
|
|
putchar('\n');
|
|
|
|
} else {
|
|
|
|
if (!PrintNewline) {
|
2018-01-18 16:08:02 +05:30
|
|
|
nlptr = strchr(iobuf, '\n');
|
2017-05-22 18:01:34 +05:30
|
|
|
if (nlptr)
|
|
|
|
*nlptr = '\0';
|
2012-01-25 13:48:38 +05:30
|
|
|
}
|
2018-01-18 16:08:02 +05:30
|
|
|
fprintf(stdout, "%s", iobuf);
|
2012-01-25 13:48:38 +05:30
|
|
|
}
|
2018-01-18 16:08:02 +05:30
|
|
|
} while ((rlen = getline(&iobuf, &iolen, fp)) > 0);
|
2012-01-25 13:48:38 +05:30
|
|
|
} else {
|
|
|
|
switch (errno) {
|
|
|
|
case EACCES:
|
|
|
|
xwarnx(_("permission denied on key '%s'"),
|
|
|
|
outname);
|
|
|
|
rc = -1;
|
|
|
|
break;
|
|
|
|
case EISDIR: {
|
|
|
|
size_t len;
|
|
|
|
len = strlen(tmpname);
|
|
|
|
tmpname[len] = '/';
|
|
|
|
tmpname[len + 1] = '\0';
|
|
|
|
fclose(fp);
|
|
|
|
rc = DisplayAll(tmpname);
|
|
|
|
goto out;
|
|
|
|
}
|
2017-07-07 17:39:12 +05:30
|
|
|
case EIO: /* Ignore stable_secret below /proc/sys/net/ipv6/conf */
|
|
|
|
rc = -1;
|
|
|
|
break;
|
2012-01-25 13:48:38 +05:30
|
|
|
default:
|
|
|
|
xwarnx(_("reading key \"%s\""), outname);
|
|
|
|
rc = -1;
|
|
|
|
case 0:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
fclose(fp);
|
|
|
|
}
|
|
|
|
out:
|
|
|
|
free(tmpname);
|
|
|
|
free(outname);
|
|
|
|
return rc;
|
|
|
|
}
|
2002-02-02 04:17:29 +05:30
|
|
|
|
2012-11-02 23:20:55 +05:30
|
|
|
static int is_deprecated(char *filename)
|
2012-02-14 01:51:43 +05:30
|
|
|
{
|
|
|
|
int i;
|
|
|
|
for (i = 0; strlen(DEPRECATED[i]); i++) {
|
|
|
|
if (strcmp(DEPRECATED[i], filename) == 0)
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2002-11-26 03:12:17 +05:30
|
|
|
/*
|
2012-01-25 13:48:38 +05:30
|
|
|
* Display all the sysctl settings
|
2002-11-26 03:12:17 +05:30
|
|
|
*/
|
2012-01-25 13:48:38 +05:30
|
|
|
static int DisplayAll(const char *restrict const path)
|
|
|
|
{
|
|
|
|
int rc = 0;
|
|
|
|
int rc2;
|
|
|
|
DIR *restrict dp;
|
|
|
|
struct dirent *restrict de;
|
|
|
|
struct stat ts;
|
|
|
|
|
|
|
|
dp = opendir(path);
|
|
|
|
|
|
|
|
if (!dp) {
|
|
|
|
xwarnx(_("unable to open directory \"%s\""), path);
|
|
|
|
rc = -1;
|
|
|
|
} else {
|
|
|
|
readdir(dp); /* skip . */
|
|
|
|
readdir(dp); /* skip .. */
|
|
|
|
while ((de = readdir(dp))) {
|
|
|
|
char *restrict tmpdir;
|
2012-02-14 01:51:43 +05:30
|
|
|
if (IgnoreDeprecated && is_deprecated(de->d_name))
|
|
|
|
continue;
|
2012-01-25 13:48:38 +05:30
|
|
|
tmpdir =
|
|
|
|
(char *restrict) xmalloc(strlen(path) +
|
|
|
|
strlen(de->d_name) +
|
|
|
|
2);
|
|
|
|
sprintf(tmpdir, "%s%s", path, de->d_name);
|
|
|
|
rc2 = stat(tmpdir, &ts);
|
|
|
|
if (rc2 != 0) {
|
|
|
|
xwarn(_("cannot stat %s"), tmpdir);
|
|
|
|
} else {
|
|
|
|
if (S_ISDIR(ts.st_mode)) {
|
|
|
|
strcat(tmpdir, "/");
|
|
|
|
DisplayAll(tmpdir);
|
|
|
|
} else {
|
|
|
|
rc |=
|
|
|
|
ReadSetting(tmpdir +
|
|
|
|
strlen(PROC_PATH));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
free(tmpdir);
|
|
|
|
}
|
|
|
|
closedir(dp);
|
|
|
|
}
|
|
|
|
return rc;
|
2002-11-26 04:54:40 +05:30
|
|
|
}
|
2002-02-02 04:17:29 +05:30
|
|
|
|
|
|
|
/*
|
2012-01-25 13:48:38 +05:30
|
|
|
* Write a sysctl setting
|
2002-02-02 04:17:29 +05:30
|
|
|
*/
|
2012-01-25 13:48:38 +05:30
|
|
|
static int WriteSetting(const char *setting)
|
|
|
|
{
|
|
|
|
int rc = 0;
|
|
|
|
const char *name = setting;
|
|
|
|
const char *value;
|
|
|
|
const char *equals;
|
|
|
|
char *tmpname;
|
|
|
|
char *outname;
|
2012-05-03 23:38:27 +05:30
|
|
|
char *last_dot;
|
2019-09-21 11:20:53 +05:30
|
|
|
bool ignore_failure;
|
2012-05-03 23:38:27 +05:30
|
|
|
|
2012-01-25 13:48:38 +05:30
|
|
|
FILE *fp;
|
|
|
|
struct stat ts;
|
|
|
|
|
|
|
|
if (!name)
|
|
|
|
/* probably don't want to display this err */
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
equals = strchr(setting, '=');
|
|
|
|
|
|
|
|
if (!equals) {
|
|
|
|
xwarnx(_("\"%s\" must be of the form name=value"),
|
|
|
|
setting);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* point to the value in name=value */
|
|
|
|
value = equals + 1;
|
|
|
|
|
2017-12-09 05:35:40 +05:30
|
|
|
if (!*name || name == equals) {
|
2012-01-25 13:48:38 +05:30
|
|
|
xwarnx(_("malformed setting \"%s\""), setting);
|
|
|
|
return -2;
|
|
|
|
}
|
|
|
|
|
2019-09-21 11:20:53 +05:30
|
|
|
ignore_failure = name[0] == '-';
|
|
|
|
if (ignore_failure)
|
|
|
|
name++;
|
|
|
|
|
2012-01-25 13:48:38 +05:30
|
|
|
/* used to open the file */
|
|
|
|
tmpname = xmalloc(equals - name + 1 + strlen(PROC_PATH));
|
|
|
|
strcpy(tmpname, PROC_PATH);
|
|
|
|
strncat(tmpname, name, (int) (equals - name));
|
|
|
|
tmpname[equals - name + strlen(PROC_PATH)] = 0;
|
|
|
|
/* change . to / */
|
|
|
|
slashdot(tmpname + strlen(PROC_PATH), '.', '/');
|
|
|
|
|
|
|
|
/* used to display the output */
|
|
|
|
outname = xmalloc(equals - name + 1);
|
|
|
|
strncpy(outname, name, (int) (equals - name));
|
|
|
|
outname[equals - name] = 0;
|
|
|
|
/* change / to . */
|
|
|
|
slashdot(outname, '/', '.');
|
2012-05-03 23:38:27 +05:30
|
|
|
last_dot = strrchr(outname, '.');
|
|
|
|
if (last_dot != NULL && is_deprecated(last_dot + 1)) {
|
2012-02-14 01:51:43 +05:30
|
|
|
xwarnx(_("%s is deprecated, value not set"), outname);
|
|
|
|
goto out;
|
|
|
|
}
|
2012-01-25 13:48:38 +05:30
|
|
|
|
|
|
|
if (stat(tmpname, &ts) < 0) {
|
|
|
|
if (!IgnoreError) {
|
|
|
|
xwarn(_("cannot stat %s"), tmpname);
|
|
|
|
rc = -1;
|
|
|
|
}
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((ts.st_mode & S_IWUSR) == 0) {
|
|
|
|
xwarn(_("setting key \"%s\""), outname);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (S_ISDIR(ts.st_mode)) {
|
|
|
|
xwarn(_("setting key \"%s\""), outname);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2018-01-18 16:08:02 +05:30
|
|
|
fp = fprocopen(tmpname, "w");
|
2017-07-07 17:39:11 +05:30
|
|
|
|
2012-01-25 13:48:38 +05:30
|
|
|
if (!fp) {
|
|
|
|
switch (errno) {
|
|
|
|
case ENOENT:
|
|
|
|
if (!IgnoreError) {
|
2019-09-21 11:20:53 +05:30
|
|
|
xwarnx(_("\"%s\" is an unknown key%s"), outname, (ignore_failure?_(", ignoring"):""));
|
|
|
|
if (!ignore_failure)
|
|
|
|
rc = -1;
|
2012-01-25 13:48:38 +05:30
|
|
|
}
|
|
|
|
break;
|
2019-09-21 11:20:53 +05:30
|
|
|
case EPERM:
|
|
|
|
case EROFS:
|
2012-01-25 13:48:38 +05:30
|
|
|
case EACCES:
|
2019-09-21 11:20:53 +05:30
|
|
|
xwarnx(_("permission denied on key \"%s\"%s"), outname, (ignore_failure?_(", ignoring"):""));
|
2012-01-25 13:48:38 +05:30
|
|
|
break;
|
|
|
|
default:
|
2019-09-21 11:20:53 +05:30
|
|
|
xwarn(_("setting key \"%s\"%s"), outname, (ignore_failure?_(", ignoring"):""));
|
2012-01-25 13:48:38 +05:30
|
|
|
break;
|
|
|
|
}
|
2019-09-21 11:20:53 +05:30
|
|
|
if (!ignore_failure && errno != ENOENT)
|
|
|
|
rc = -1;
|
2012-01-25 13:48:38 +05:30
|
|
|
} else {
|
|
|
|
rc = fprintf(fp, "%s\n", value);
|
2012-03-23 20:23:01 +05:30
|
|
|
if (0 < rc)
|
|
|
|
rc = 0;
|
|
|
|
if (close_stream(fp) != 0)
|
2012-01-25 13:48:38 +05:30
|
|
|
xwarn(_("setting key \"%s\""), outname);
|
2018-05-29 16:59:03 +05:30
|
|
|
else if (rc == 0 && !Quiet) {
|
2012-01-25 13:48:38 +05:30
|
|
|
if (NameOnly) {
|
|
|
|
fprintf(stdout, "%s\n", outname);
|
|
|
|
} else {
|
|
|
|
if (PrintName) {
|
|
|
|
fprintf(stdout, "%s = %s\n",
|
|
|
|
outname, value);
|
|
|
|
} else {
|
|
|
|
if (PrintNewline)
|
|
|
|
fprintf(stdout, "%s\n", value);
|
|
|
|
else
|
|
|
|
fprintf(stdout, "%s", value);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
out:
|
|
|
|
free(tmpname);
|
|
|
|
free(outname);
|
|
|
|
return rc;
|
2002-12-12 04:25:42 +05:30
|
|
|
}
|
2002-02-02 04:17:29 +05:30
|
|
|
|
2012-11-02 23:20:55 +05:30
|
|
|
static int pattern_match(const char *string, const char *pat)
|
2011-10-07 12:40:50 +05:30
|
|
|
{
|
|
|
|
int status;
|
|
|
|
regex_t re;
|
|
|
|
|
2012-11-02 23:20:55 +05:30
|
|
|
if (regcomp(&re, pat, REG_EXTENDED | REG_NOSUB) != 0)
|
2012-01-25 13:48:38 +05:30
|
|
|
return (0);
|
2011-10-07 12:40:50 +05:30
|
|
|
status = regexec(&re, string, (size_t) 0, NULL, 0);
|
|
|
|
regfree(&re);
|
2012-01-25 13:48:38 +05:30
|
|
|
if (status != 0)
|
|
|
|
return (0);
|
2011-10-07 12:40:50 +05:30
|
|
|
return (1);
|
|
|
|
}
|
2002-02-02 04:17:29 +05:30
|
|
|
|
|
|
|
/*
|
2012-01-25 13:48:38 +05:30
|
|
|
* Preload the sysctl's from the conf file. We parse the file and then
|
|
|
|
* reform it (strip out whitespace).
|
2002-02-02 04:17:29 +05:30
|
|
|
*/
|
2012-01-25 13:48:38 +05:30
|
|
|
static int Preload(const char *restrict const filename)
|
|
|
|
{
|
|
|
|
FILE *fp;
|
|
|
|
char *t;
|
|
|
|
int n = 0;
|
|
|
|
int rc = 0;
|
2018-01-18 15:36:55 +05:30
|
|
|
ssize_t rlen;
|
2012-01-25 13:48:38 +05:30
|
|
|
char *name, *value;
|
2012-05-03 10:54:20 +05:30
|
|
|
glob_t globbuf;
|
|
|
|
int globerr;
|
2014-08-28 19:18:29 +05:30
|
|
|
int globflg;
|
2012-05-03 10:54:20 +05:30
|
|
|
int j;
|
|
|
|
|
2014-08-28 19:18:29 +05:30
|
|
|
globflg = GLOB_NOCHECK;
|
|
|
|
#ifdef GLOB_BRACE
|
|
|
|
globflg |= GLOB_BRACE;
|
|
|
|
#endif
|
2013-10-01 11:04:36 +05:30
|
|
|
#ifdef GLOB_TILDE
|
2014-08-28 19:18:29 +05:30
|
|
|
globflg |= GLOB_TILDE;
|
2013-10-01 11:04:36 +05:30
|
|
|
#else
|
|
|
|
if (filename[0] == '~')
|
|
|
|
xwarnx(_("GLOB_TILDE is not supported on your platform, "
|
|
|
|
"the tilde in \"%s\" won't be expanded."), filename);
|
|
|
|
#endif
|
2014-08-28 19:18:29 +05:30
|
|
|
globerr = glob(filename, globflg, NULL, &globbuf);
|
2013-10-01 11:04:36 +05:30
|
|
|
|
2012-05-03 10:54:20 +05:30
|
|
|
if (globerr != 0 && globerr != GLOB_NOMATCH)
|
|
|
|
xerr(EXIT_FAILURE, _("glob failed"));
|
|
|
|
|
|
|
|
for (j = 0; j < globbuf.gl_pathc; j++) {
|
|
|
|
fp = (globbuf.gl_pathv[j][0] == '-' && !globbuf.gl_pathv[j][1])
|
|
|
|
? stdin : fopen(globbuf.gl_pathv[j], "r");
|
|
|
|
if (!fp) {
|
|
|
|
xwarn(_("cannot open \"%s\""), globbuf.gl_pathv[j]);
|
2018-01-18 15:36:55 +05:30
|
|
|
rc = -1;
|
|
|
|
goto out;
|
2012-05-03 10:54:20 +05:30
|
|
|
}
|
2012-01-25 13:48:38 +05:30
|
|
|
|
2018-01-18 16:08:02 +05:30
|
|
|
while ((rlen = getline(&iobuf, &iolen, fp)) > 0) {
|
2018-01-18 15:36:55 +05:30
|
|
|
size_t offset;
|
|
|
|
|
2012-05-03 10:54:20 +05:30
|
|
|
n++;
|
2012-01-25 13:48:38 +05:30
|
|
|
|
2018-01-18 15:36:55 +05:30
|
|
|
if (rlen < 2)
|
|
|
|
continue;
|
|
|
|
|
2018-01-18 16:08:02 +05:30
|
|
|
t = StripLeadingAndTrailingSpaces(iobuf);
|
2012-05-03 10:54:20 +05:30
|
|
|
if (strlen(t) < 2)
|
|
|
|
continue;
|
2012-01-25 13:48:38 +05:30
|
|
|
|
2012-05-03 10:54:20 +05:30
|
|
|
if (*t == '#' || *t == ';')
|
|
|
|
continue;
|
2012-01-25 13:48:38 +05:30
|
|
|
|
2012-05-03 10:54:20 +05:30
|
|
|
name = strtok(t, "=");
|
|
|
|
if (!name || !*name) {
|
|
|
|
xwarnx(_("%s(%d): invalid syntax, continuing..."),
|
|
|
|
globbuf.gl_pathv[j], n);
|
|
|
|
continue;
|
|
|
|
}
|
2012-01-25 13:48:38 +05:30
|
|
|
|
2012-05-03 10:54:20 +05:30
|
|
|
StripLeadingAndTrailingSpaces(name);
|
2012-01-25 13:48:38 +05:30
|
|
|
|
2012-05-03 10:54:20 +05:30
|
|
|
if (pattern && !pattern_match(name, pattern))
|
|
|
|
continue;
|
2012-01-25 13:48:38 +05:30
|
|
|
|
2018-01-18 15:36:55 +05:30
|
|
|
offset = strlen(name);
|
2018-01-18 16:08:02 +05:30
|
|
|
memmove(&iobuf[0], name, offset);
|
|
|
|
iobuf[offset++] = '=';
|
2018-01-18 15:36:55 +05:30
|
|
|
|
2012-05-03 10:54:20 +05:30
|
|
|
value = strtok(NULL, "\n\r");
|
|
|
|
if (!value || !*value) {
|
|
|
|
xwarnx(_("%s(%d): invalid syntax, continuing..."),
|
|
|
|
globbuf.gl_pathv[j], n);
|
|
|
|
continue;
|
|
|
|
}
|
2012-01-25 13:48:38 +05:30
|
|
|
|
2012-05-03 10:54:20 +05:30
|
|
|
while ((*value == ' ' || *value == '\t') && *value != 0)
|
|
|
|
value++;
|
2012-01-25 13:48:38 +05:30
|
|
|
|
2012-05-03 10:54:20 +05:30
|
|
|
/* should NameOnly affect this? */
|
2018-01-18 16:08:02 +05:30
|
|
|
memmove(&iobuf[offset], value, strlen(value));
|
2018-01-18 15:36:55 +05:30
|
|
|
offset += strlen(value);
|
2018-01-18 16:08:02 +05:30
|
|
|
iobuf[offset] = '\0';
|
2018-01-18 15:36:55 +05:30
|
|
|
|
2018-01-18 16:08:02 +05:30
|
|
|
rc |= WriteSetting(iobuf);
|
2012-01-25 13:48:38 +05:30
|
|
|
}
|
|
|
|
|
2012-05-03 10:54:20 +05:30
|
|
|
fclose(fp);
|
2012-01-25 13:48:38 +05:30
|
|
|
}
|
2018-01-18 15:36:55 +05:30
|
|
|
out:
|
2012-01-25 13:48:38 +05:30
|
|
|
return rc;
|
2002-12-12 04:25:42 +05:30
|
|
|
}
|
2002-02-02 04:17:29 +05:30
|
|
|
|
2011-10-07 12:40:49 +05:30
|
|
|
struct pair {
|
2012-01-25 13:48:38 +05:30
|
|
|
char *name;
|
|
|
|
char *value;
|
2011-10-07 12:40:49 +05:30
|
|
|
};
|
|
|
|
|
2012-01-25 13:48:38 +05:30
|
|
|
static int sortpairs(const void *A, const void *B)
|
2011-10-07 12:40:49 +05:30
|
|
|
{
|
2012-01-25 13:48:38 +05:30
|
|
|
const struct pair *a = *(struct pair * const *) A;
|
|
|
|
const struct pair *b = *(struct pair * const *) B;
|
|
|
|
return strcmp(a->name, b->name);
|
2011-10-07 12:40:49 +05:30
|
|
|
}
|
|
|
|
|
2012-01-25 13:48:38 +05:30
|
|
|
static int PreloadSystem(void)
|
|
|
|
{
|
|
|
|
unsigned di, i;
|
|
|
|
const char *dirs[] = {
|
|
|
|
"/run/sysctl.d",
|
|
|
|
"/etc/sysctl.d",
|
|
|
|
"/usr/local/lib/sysctl.d",
|
|
|
|
"/usr/lib/sysctl.d",
|
|
|
|
"/lib/sysctl.d",
|
|
|
|
};
|
|
|
|
struct pair **cfgs = NULL;
|
|
|
|
unsigned ncfgs = 0;
|
2013-09-20 18:04:32 +05:30
|
|
|
int rc = 0;
|
|
|
|
struct stat ts;
|
2012-01-25 13:48:38 +05:30
|
|
|
enum { nprealloc = 16 };
|
|
|
|
|
|
|
|
for (di = 0; di < sizeof(dirs) / sizeof(dirs[0]); ++di) {
|
|
|
|
struct dirent *de;
|
|
|
|
DIR *dp = opendir(dirs[di]);
|
|
|
|
if (!dp)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
while ((de = readdir(dp))) {
|
|
|
|
if (!strcmp(de->d_name, ".")
|
|
|
|
|| !strcmp(de->d_name, ".."))
|
|
|
|
continue;
|
2012-05-03 10:37:58 +05:30
|
|
|
if (strlen(de->d_name) < 5
|
|
|
|
|| strcmp(de->d_name + strlen(de->d_name) - 5, ".conf"))
|
2012-01-25 13:48:38 +05:30
|
|
|
continue;
|
|
|
|
/* check if config already known */
|
|
|
|
for (i = 0; i < ncfgs; ++i) {
|
2012-02-06 01:32:34 +05:30
|
|
|
if (cfgs && !strcmp(cfgs[i]->name, de->d_name))
|
2012-01-25 13:48:38 +05:30
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (i < ncfgs)
|
|
|
|
/* already in */
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (ncfgs % nprealloc == 0)
|
2012-02-06 01:32:34 +05:30
|
|
|
cfgs =
|
|
|
|
xrealloc(cfgs,
|
|
|
|
sizeof(struct pair *) * (ncfgs +
|
|
|
|
nprealloc));
|
|
|
|
|
|
|
|
if (cfgs) {
|
|
|
|
cfgs[ncfgs] =
|
|
|
|
xmalloc(sizeof(struct pair) +
|
|
|
|
strlen(de->d_name) * 2 + 2 +
|
|
|
|
strlen(dirs[di]) + 1);
|
|
|
|
cfgs[ncfgs]->name =
|
|
|
|
(char *)cfgs[ncfgs] + sizeof(struct pair);
|
|
|
|
strcpy(cfgs[ncfgs]->name, de->d_name);
|
|
|
|
cfgs[ncfgs]->value =
|
|
|
|
(char *)cfgs[ncfgs] + sizeof(struct pair) +
|
|
|
|
strlen(cfgs[ncfgs]->name) + 1;
|
|
|
|
sprintf(cfgs[ncfgs]->value, "%s/%s", dirs[di],
|
|
|
|
de->d_name);
|
|
|
|
ncfgs++;
|
|
|
|
} else {
|
|
|
|
xerrx(EXIT_FAILURE, _("internal error"));
|
|
|
|
}
|
2012-01-25 13:48:38 +05:30
|
|
|
|
|
|
|
}
|
|
|
|
closedir(dp);
|
|
|
|
}
|
|
|
|
qsort(cfgs, ncfgs, sizeof(struct cfg *), sortpairs);
|
|
|
|
|
|
|
|
for (i = 0; i < ncfgs; ++i) {
|
|
|
|
if (!Quiet)
|
|
|
|
printf(_("* Applying %s ...\n"), cfgs[i]->value);
|
2013-09-20 18:04:32 +05:30
|
|
|
rc |= Preload(cfgs[i]->value);
|
2012-01-25 13:48:38 +05:30
|
|
|
}
|
2002-02-02 04:17:29 +05:30
|
|
|
|
2013-09-20 18:04:32 +05:30
|
|
|
|
2015-06-26 18:33:11 +05:30
|
|
|
if (stat(DEFAULT_PRELOAD, &ts) == 0 && S_ISREG(ts.st_mode)) {
|
2013-09-20 18:04:32 +05:30
|
|
|
if (!Quiet)
|
|
|
|
printf(_("* Applying %s ...\n"), DEFAULT_PRELOAD);
|
|
|
|
rc |= Preload(DEFAULT_PRELOAD);
|
|
|
|
}
|
2014-01-03 00:19:36 +05:30
|
|
|
|
|
|
|
/* cleaning */
|
|
|
|
for (i = 0; i < ncfgs; ++i) {
|
|
|
|
free(cfgs[i]);
|
|
|
|
}
|
|
|
|
if (cfgs) free(cfgs);
|
|
|
|
|
2013-09-20 18:04:32 +05:30
|
|
|
return rc;
|
2012-01-25 13:48:38 +05:30
|
|
|
}
|
2002-02-02 04:17:29 +05:30
|
|
|
|
|
|
|
/*
|
2012-01-25 13:48:38 +05:30
|
|
|
* Main...
|
2002-02-02 04:17:29 +05:30
|
|
|
*/
|
2011-06-05 23:16:49 +05:30
|
|
|
int main(int argc, char *argv[])
|
|
|
|
{
|
2012-01-25 13:48:38 +05:30
|
|
|
bool WriteMode = false;
|
|
|
|
bool DisplayAllOpt = false;
|
|
|
|
bool preloadfileOpt = false;
|
|
|
|
int ReturnCode = 0;
|
|
|
|
int c;
|
2012-05-03 10:54:20 +05:30
|
|
|
const char *preloadfile = NULL;
|
2012-01-25 13:48:38 +05:30
|
|
|
|
|
|
|
enum {
|
2012-02-14 01:51:43 +05:30
|
|
|
DEPRECATED_OPTION = CHAR_MAX + 1,
|
|
|
|
SYSTEM_OPTION
|
2012-01-25 13:48:38 +05:30
|
|
|
};
|
|
|
|
static const struct option longopts[] = {
|
|
|
|
{"all", no_argument, NULL, 'a'},
|
2012-02-14 01:51:43 +05:30
|
|
|
{"deprecated", no_argument, NULL, DEPRECATED_OPTION},
|
2012-01-25 13:48:38 +05:30
|
|
|
{"binary", no_argument, NULL, 'b'},
|
|
|
|
{"ignore", no_argument, NULL, 'e'},
|
|
|
|
{"names", no_argument, NULL, 'N'},
|
|
|
|
{"values", no_argument, NULL, 'n'},
|
|
|
|
{"load", optional_argument, NULL, 'p'},
|
|
|
|
{"quiet", no_argument, NULL, 'q'},
|
|
|
|
{"write", no_argument, NULL, 'w'},
|
|
|
|
{"system", no_argument, NULL, SYSTEM_OPTION},
|
|
|
|
{"pattern", required_argument, NULL, 'r'},
|
|
|
|
{"help", no_argument, NULL, 'h'},
|
|
|
|
{"version", no_argument, NULL, 'V'},
|
|
|
|
{NULL, 0, NULL, 0}
|
|
|
|
};
|
2011-06-05 23:16:49 +05:30
|
|
|
|
2013-02-20 23:01:48 +05:30
|
|
|
#ifdef HAVE_PROGRAM_INVOCATION_NAME
|
2012-01-03 13:18:43 +05:30
|
|
|
program_invocation_name = program_invocation_short_name;
|
2013-02-20 23:01:48 +05:30
|
|
|
#endif
|
2012-01-25 13:48:38 +05:30
|
|
|
setlocale(LC_ALL, "");
|
2012-01-03 13:18:43 +05:30
|
|
|
bindtextdomain(PACKAGE, LOCALEDIR);
|
|
|
|
textdomain(PACKAGE);
|
2012-03-23 18:02:24 +05:30
|
|
|
atexit(close_stdout);
|
2011-12-07 17:57:21 +05:30
|
|
|
|
2012-01-25 13:48:38 +05:30
|
|
|
PrintName = true;
|
|
|
|
PrintNewline = true;
|
|
|
|
IgnoreError = false;
|
|
|
|
Quiet = false;
|
2012-02-14 01:51:43 +05:30
|
|
|
IgnoreDeprecated = true;
|
2012-01-25 13:48:38 +05:30
|
|
|
|
|
|
|
if (argc < 2)
|
|
|
|
Usage(stderr);
|
|
|
|
|
|
|
|
while ((c =
|
|
|
|
getopt_long(argc, argv, "bneNwfp::qoxaAXr:Vdh", longopts,
|
2012-03-07 17:19:09 +05:30
|
|
|
NULL)) != -1) {
|
2012-01-25 13:48:38 +05:30
|
|
|
switch (c) {
|
|
|
|
case 'b':
|
|
|
|
/* This is "binary" format, which means more for BSD. */
|
|
|
|
PrintNewline = false;
|
|
|
|
/* FALL THROUGH */
|
|
|
|
case 'n':
|
|
|
|
PrintName = false;
|
|
|
|
break;
|
|
|
|
case 'e':
|
|
|
|
/*
|
|
|
|
* For FreeBSD, -e means a "%s=%s\n" format.
|
|
|
|
* ("%s: %s\n" default). We (and NetBSD) use
|
|
|
|
* "%s = %s\n" always, and -e to ignore errors.
|
|
|
|
*/
|
|
|
|
IgnoreError = true;
|
|
|
|
break;
|
|
|
|
case 'N':
|
|
|
|
NameOnly = true;
|
|
|
|
break;
|
|
|
|
case 'w':
|
|
|
|
WriteMode = true;
|
|
|
|
break;
|
|
|
|
case 'f': /* the NetBSD way */
|
|
|
|
case 'p':
|
|
|
|
preloadfileOpt = true;
|
|
|
|
if (optarg)
|
|
|
|
preloadfile = optarg;
|
|
|
|
break;
|
|
|
|
case 'q':
|
|
|
|
Quiet = true;
|
|
|
|
break;
|
|
|
|
case 'o': /* BSD: binary values too, 1st 16 bytes in hex */
|
|
|
|
case 'x': /* BSD: binary values too, whole thing in hex */
|
|
|
|
/* does nothing */ ;
|
|
|
|
break;
|
|
|
|
case 'a': /* string and integer values (for Linux, all of them) */
|
|
|
|
case 'A': /* same as -a -o */
|
|
|
|
case 'X': /* same as -a -x */
|
|
|
|
DisplayAllOpt = true;
|
|
|
|
break;
|
2012-02-14 01:51:43 +05:30
|
|
|
case DEPRECATED_OPTION:
|
|
|
|
IgnoreDeprecated = false;
|
|
|
|
break;
|
2012-01-25 13:48:38 +05:30
|
|
|
case SYSTEM_OPTION:
|
|
|
|
IgnoreError = true;
|
|
|
|
return PreloadSystem();
|
|
|
|
case 'r':
|
|
|
|
pattern = xstrdup(optarg);
|
|
|
|
break;
|
|
|
|
case 'V':
|
|
|
|
printf(PROCPS_NG_VERSION);
|
|
|
|
return EXIT_SUCCESS;
|
|
|
|
case 'd': /* BSD: print description ("vm.kvm_size: Size of KVM") */
|
|
|
|
case 'h': /* BSD: human-readable (did FreeBSD 5 make -e default?) */
|
|
|
|
case '?':
|
|
|
|
Usage(stdout);
|
|
|
|
default:
|
|
|
|
Usage(stderr);
|
|
|
|
}
|
2012-03-07 17:19:09 +05:30
|
|
|
}
|
|
|
|
|
2012-05-03 10:54:20 +05:30
|
|
|
argc -= optind;
|
|
|
|
argv += optind;
|
|
|
|
|
2018-01-18 16:08:02 +05:30
|
|
|
iobuf = xmalloc(iolen);
|
2017-07-07 17:39:11 +05:30
|
|
|
|
2012-01-25 13:48:38 +05:30
|
|
|
if (DisplayAllOpt)
|
|
|
|
return DisplayAll(PROC_PATH);
|
|
|
|
|
2012-05-03 10:54:20 +05:30
|
|
|
if (preloadfileOpt) {
|
|
|
|
int ret = EXIT_SUCCESS, i;
|
|
|
|
if (!preloadfile) {
|
|
|
|
if (!argc) {
|
2013-04-07 05:00:59 +05:30
|
|
|
ret |= Preload(DEFAULT_PRELOAD);
|
2012-05-03 10:54:20 +05:30
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/* This happens when -pfile option is
|
|
|
|
* used without space. */
|
2013-04-07 05:00:59 +05:30
|
|
|
ret |= Preload(preloadfile);
|
2012-05-03 10:54:20 +05:30
|
|
|
}
|
|
|
|
for (i = 0; i < argc; i++)
|
2013-04-07 05:00:59 +05:30
|
|
|
ret |= Preload(argv[i]);
|
2012-05-03 10:54:20 +05:30
|
|
|
return ret;
|
|
|
|
}
|
2012-01-25 13:48:38 +05:30
|
|
|
|
|
|
|
if (argc < 1)
|
|
|
|
xerrx(EXIT_FAILURE, _("no variables specified\n"
|
|
|
|
"Try `%s --help' for more information."),
|
|
|
|
program_invocation_short_name);
|
|
|
|
if (NameOnly && Quiet)
|
|
|
|
xerrx(EXIT_FAILURE, _("options -N and -q cannot coexist\n"
|
|
|
|
"Try `%s --help' for more information."),
|
|
|
|
program_invocation_short_name);
|
|
|
|
|
2012-03-07 17:19:09 +05:30
|
|
|
for ( ; *argv; argv++) {
|
2016-08-07 15:01:25 +05:30
|
|
|
if (WriteMode || strchr(*argv, '='))
|
2012-03-07 17:19:09 +05:30
|
|
|
ReturnCode += WriteSetting(*argv);
|
|
|
|
else
|
|
|
|
ReturnCode += ReadSetting(*argv);
|
|
|
|
}
|
2012-01-25 13:48:38 +05:30
|
|
|
return ReturnCode;
|
2002-12-12 04:25:42 +05:30
|
|
|
}
|