mirror of
https://github.com/systemd/systemd.git
synced 2024-12-25 01:34:28 +03:00
sysctl: configure kernel parameters in the order they occur in each sysctl configuration files (#4205)
Currently, systemd-sysctl command configures kernel parameters in each sysctl configuration files in random order due to characteristics of iterator of Hashmap. However, kernel parameters need to be configured in the order they occur in each sysctl configuration files. - For example, consider fs.suid_coredump and kernel.core_pattern. If fs.suid_coredump=2 is configured before kernel.core_pattern= whose default value is "core", then kernel outputs the following message: Unsafe core_pattern used with suid_dumpable=2. Pipe handler or fully qualified core dump path required. Note that the security issue mentioned in this message has already been fixed on recent kernels, so this is just a warning message on such kernels. But it's still confusing to users that this message is output on some boot and not output on another boot. - I don't know but there could be other kernel parameters that are significant in the order they are configured. - The legacy sysctl command configures kernel parameters in the order they occur in each sysctl configuration files. Although I didn't find any official specification explaining this behavior of sysctl command, I don't think there is any meaningful reason to change this behavior, in particular, to the random one. This commit does the change by simply using OrderedHashmap instead of Hashmap.
This commit is contained in:
parent
48a8d337a6
commit
886cf982d3
@ -41,12 +41,12 @@ static char **arg_prefixes = NULL;
|
||||
|
||||
static const char conf_file_dirs[] = CONF_PATHS_NULSTR("sysctl.d");
|
||||
|
||||
static int apply_all(Hashmap *sysctl_options) {
|
||||
static int apply_all(OrderedHashmap *sysctl_options) {
|
||||
char *property, *value;
|
||||
Iterator i;
|
||||
int r = 0;
|
||||
|
||||
HASHMAP_FOREACH_KEY(value, property, sysctl_options, i) {
|
||||
ORDERED_HASHMAP_FOREACH_KEY(value, property, sysctl_options, i) {
|
||||
int k;
|
||||
|
||||
k = sysctl_write(property, value);
|
||||
@ -62,7 +62,7 @@ static int apply_all(Hashmap *sysctl_options) {
|
||||
return r;
|
||||
}
|
||||
|
||||
static int parse_file(Hashmap *sysctl_options, const char *path, bool ignore_enoent) {
|
||||
static int parse_file(OrderedHashmap *sysctl_options, const char *path, bool ignore_enoent) {
|
||||
_cleanup_fclose_ FILE *f = NULL;
|
||||
int r;
|
||||
|
||||
@ -125,13 +125,13 @@ static int parse_file(Hashmap *sysctl_options, const char *path, bool ignore_eno
|
||||
}
|
||||
|
||||
found:
|
||||
existing = hashmap_get2(sysctl_options, p, &v);
|
||||
existing = ordered_hashmap_get2(sysctl_options, p, &v);
|
||||
if (existing) {
|
||||
if (streq(value, existing))
|
||||
continue;
|
||||
|
||||
log_debug("Overwriting earlier assignment of %s in file '%s'.", p, path);
|
||||
free(hashmap_remove(sysctl_options, p));
|
||||
free(ordered_hashmap_remove(sysctl_options, p));
|
||||
free(v);
|
||||
}
|
||||
|
||||
@ -145,7 +145,7 @@ found:
|
||||
return log_oom();
|
||||
}
|
||||
|
||||
k = hashmap_put(sysctl_options, property, new_value);
|
||||
k = ordered_hashmap_put(sysctl_options, property, new_value);
|
||||
if (k < 0) {
|
||||
log_error_errno(k, "Failed to add sysctl variable %s to hashmap: %m", property);
|
||||
free(property);
|
||||
@ -230,7 +230,7 @@ static int parse_argv(int argc, char *argv[]) {
|
||||
|
||||
int main(int argc, char *argv[]) {
|
||||
int r = 0, k;
|
||||
Hashmap *sysctl_options;
|
||||
OrderedHashmap *sysctl_options;
|
||||
|
||||
r = parse_argv(argc, argv);
|
||||
if (r <= 0)
|
||||
@ -242,7 +242,7 @@ int main(int argc, char *argv[]) {
|
||||
|
||||
umask(0022);
|
||||
|
||||
sysctl_options = hashmap_new(&string_hash_ops);
|
||||
sysctl_options = ordered_hashmap_new(&string_hash_ops);
|
||||
if (!sysctl_options) {
|
||||
r = log_oom();
|
||||
goto finish;
|
||||
@ -280,7 +280,7 @@ int main(int argc, char *argv[]) {
|
||||
r = k;
|
||||
|
||||
finish:
|
||||
hashmap_free_free_free(sysctl_options);
|
||||
ordered_hashmap_free_free_free(sysctl_options);
|
||||
strv_free(arg_prefixes);
|
||||
|
||||
return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;
|
||||
|
Loading…
Reference in New Issue
Block a user