2005-04-17 02:20:36 +04:00
/* -*- linux-c -*-
* sysctl_net . c : sysctl interface to net subsystem .
*
* Begun April 1 , 1996 , Mike Shaver .
* Added / proc / sys / net directories for each protocol family . [ MS ]
*
* Revision 1.2 1996 / 05 / 08 20 : 24 : 40 shaver
* Added bits for NET_BRIDGE and the NET_IPV4_ARP stuff and
* NET_IPV4_IP_FORWARD .
*
*
*/
# include <linux/mm.h>
# include <linux/sysctl.h>
2007-11-30 15:55:42 +03:00
# include <linux/nsproxy.h>
2005-04-17 02:20:36 +04:00
2005-10-04 01:16:34 +04:00
# include <net/sock.h>
2005-04-17 02:20:36 +04:00
# ifdef CONFIG_INET
2005-08-16 09:18:02 +04:00
# include <net/ip.h>
2005-04-17 02:20:36 +04:00
# endif
# ifdef CONFIG_NET
2005-08-16 09:18:02 +04:00
# include <linux/if_ether.h>
2005-04-17 02:20:36 +04:00
# endif
# ifdef CONFIG_TR
2005-08-16 09:18:02 +04:00
# include <linux/if_tr.h>
2005-04-17 02:20:36 +04:00
# endif
2008-07-15 05:22:20 +04:00
static struct ctl_table_set *
2007-11-30 15:55:42 +03:00
net_ctl_header_lookup ( struct ctl_table_root * root , struct nsproxy * namespaces )
{
2008-07-15 05:22:20 +04:00
return & namespaces - > net_ns - > sysctls ;
}
static int is_seen ( struct ctl_table_set * set )
{
return & current - > nsproxy - > net_ns - > sysctls = = set ;
2007-11-30 15:55:42 +03:00
}
2008-07-25 12:48:32 +04:00
/* Return standard mode bits for table entry. */
static int net_ctl_permissions ( struct ctl_table_root * root ,
struct nsproxy * nsproxy ,
struct ctl_table * table )
{
/* Allow network administrator to have same access as root. */
if ( capable ( CAP_NET_ADMIN ) ) {
int mode = ( table - > mode > > 6 ) & 7 ;
return ( mode < < 6 ) | ( mode < < 3 ) | mode ;
}
return table - > mode ;
}
2007-11-30 15:55:42 +03:00
static struct ctl_table_root net_sysctl_root = {
. lookup = net_ctl_header_lookup ,
2008-07-25 12:48:32 +04:00
. permissions = net_ctl_permissions ,
2007-11-30 15:55:42 +03:00
} ;
2008-05-20 00:45:33 +04:00
static int net_ctl_ro_header_perms ( struct ctl_table_root * root ,
struct nsproxy * namespaces , struct ctl_table * table )
{
if ( namespaces - > net_ns = = & init_net )
return table - > mode ;
else
return table - > mode & ~ 0222 ;
}
static struct ctl_table_root net_sysctl_ro_root = {
. permissions = net_ctl_ro_header_perms ,
} ;
2007-11-30 15:55:42 +03:00
static int sysctl_net_init ( struct net * net )
{
2008-07-27 11:59:33 +04:00
setup_sysctl_set ( & net - > sysctls ,
& net_sysctl_ro_root . default_set ,
is_seen ) ;
2007-11-30 15:55:42 +03:00
return 0 ;
}
static void sysctl_net_exit ( struct net * net )
{
2008-07-15 05:22:20 +04:00
WARN_ON ( ! list_empty ( & net - > sysctls . list ) ) ;
2007-11-30 15:55:42 +03:00
return ;
}
static struct pernet_operations sysctl_pernet_ops = {
. init = sysctl_net_init ,
. exit = sysctl_net_exit ,
} ;
static __init int sysctl_init ( void )
{
int ret ;
ret = register_pernet_subsys ( & sysctl_pernet_ops ) ;
if ( ret )
goto out ;
register_sysctl_root ( & net_sysctl_root ) ;
2008-07-15 05:22:20 +04:00
setup_sysctl_set ( & net_sysctl_ro_root . default_set , NULL , NULL ) ;
2008-05-20 00:45:33 +04:00
register_sysctl_root ( & net_sysctl_ro_root ) ;
2007-11-30 15:55:42 +03:00
out :
return ret ;
}
subsys_initcall ( sysctl_init ) ;
struct ctl_table_header * register_net_sysctl_table ( struct net * net ,
const struct ctl_path * path , struct ctl_table * table )
{
struct nsproxy namespaces ;
namespaces = * current - > nsproxy ;
namespaces . net_ns = net ;
return __register_sysctl_paths ( & net_sysctl_root ,
& namespaces , path , table ) ;
}
EXPORT_SYMBOL_GPL ( register_net_sysctl_table ) ;
2008-05-20 00:45:33 +04:00
struct ctl_table_header * register_net_sysctl_rotable ( const
struct ctl_path * path , struct ctl_table * table )
{
return __register_sysctl_paths ( & net_sysctl_ro_root ,
& init_nsproxy , path , table ) ;
}
EXPORT_SYMBOL_GPL ( register_net_sysctl_rotable ) ;
2007-11-30 15:55:42 +03:00
void unregister_net_sysctl_table ( struct ctl_table_header * header )
{
2008-05-01 13:47:38 +04:00
unregister_sysctl_table ( header ) ;
2007-11-30 15:55:42 +03:00
}
EXPORT_SYMBOL_GPL ( unregister_net_sysctl_table ) ;