Blame view
net/sysctl_net.c
3.01 KB
1da177e4c
|
1 2 3 4 5 6 |
/* -*- linux-c -*- * sysctl_net.c: sysctl interface to net subsystem. * * Begun April 1, 1996, Mike Shaver. * Added /proc/sys/net directories for each protocol family. [MS] * |
1da177e4c
|
7 8 9 10 11 12 |
* Revision 1.2 1996/05/08 20:24:40 shaver * Added bits for NET_BRIDGE and the NET_IPV4_ARP stuff and * NET_IPV4_IP_FORWARD. * * */ |
1da177e4c
|
13 14 |
#include <linux/mm.h> #include <linux/sysctl.h> |
95bdfccb2
|
15 |
#include <linux/nsproxy.h> |
1da177e4c
|
16 |
|
496a22b08
|
17 |
#include <net/sock.h> |
1da177e4c
|
18 |
#ifdef CONFIG_INET |
20380731b
|
19 |
#include <net/ip.h> |
1da177e4c
|
20 |
#endif |
1da177e4c
|
21 |
#ifdef CONFIG_NET |
20380731b
|
22 |
#include <linux/if_ether.h> |
1da177e4c
|
23 24 25 |
#endif #ifdef CONFIG_TR |
20380731b
|
26 |
#include <linux/if_tr.h> |
1da177e4c
|
27 |
#endif |
734550921
|
28 |
static struct ctl_table_set * |
95bdfccb2
|
29 30 |
net_ctl_header_lookup(struct ctl_table_root *root, struct nsproxy *namespaces) { |
734550921
|
31 32 33 34 35 36 |
return &namespaces->net_ns->sysctls; } static int is_seen(struct ctl_table_set *set) { return ¤t->nsproxy->net_ns->sysctls == set; |
95bdfccb2
|
37 |
} |
4ecb90090
|
38 39 40 41 42 43 44 45 46 47 48 49 |
/* Return standard mode bits for table entry. */ static int net_ctl_permissions(struct ctl_table_root *root, struct nsproxy *nsproxy, struct ctl_table *table) { /* Allow network administrator to have same access as root. */ if (capable(CAP_NET_ADMIN)) { int mode = (table->mode >> 6) & 7; return (mode << 6) | (mode << 3) | mode; } return table->mode; } |
95bdfccb2
|
50 51 |
static struct ctl_table_root net_sysctl_root = { .lookup = net_ctl_header_lookup, |
4ecb90090
|
52 |
.permissions = net_ctl_permissions, |
95bdfccb2
|
53 |
}; |
d62c612ef
|
54 55 56 |
static int net_ctl_ro_header_perms(struct ctl_table_root *root, struct nsproxy *namespaces, struct ctl_table *table) { |
81a1d3c31
|
57 |
if (net_eq(namespaces->net_ns, &init_net)) |
d62c612ef
|
58 59 60 61 62 63 |
return table->mode; else return table->mode & ~0222; } static struct ctl_table_root net_sysctl_ro_root = { |
d62c612ef
|
64 65 |
.permissions = net_ctl_ro_header_perms, }; |
2c8c1e729
|
66 |
static int __net_init sysctl_net_init(struct net *net) |
95bdfccb2
|
67 |
{ |
eeb61f719
|
68 69 70 |
setup_sysctl_set(&net->sysctls, &net_sysctl_ro_root.default_set, is_seen); |
95bdfccb2
|
71 72 |
return 0; } |
2c8c1e729
|
73 |
static void __net_exit sysctl_net_exit(struct net *net) |
95bdfccb2
|
74 |
{ |
734550921
|
75 |
WARN_ON(!list_empty(&net->sysctls.list)); |
95bdfccb2
|
76 77 78 79 80 81 82 83 84 85 86 87 88 89 |
} static struct pernet_operations sysctl_pernet_ops = { .init = sysctl_net_init, .exit = sysctl_net_exit, }; static __init int sysctl_init(void) { int ret; ret = register_pernet_subsys(&sysctl_pernet_ops); if (ret) goto out; register_sysctl_root(&net_sysctl_root); |
734550921
|
90 |
setup_sysctl_set(&net_sysctl_ro_root.default_set, NULL, NULL); |
d62c612ef
|
91 |
register_sysctl_root(&net_sysctl_ro_root); |
95bdfccb2
|
92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 |
out: return ret; } subsys_initcall(sysctl_init); struct ctl_table_header *register_net_sysctl_table(struct net *net, const struct ctl_path *path, struct ctl_table *table) { struct nsproxy namespaces; namespaces = *current->nsproxy; namespaces.net_ns = net; return __register_sysctl_paths(&net_sysctl_root, &namespaces, path, table); } EXPORT_SYMBOL_GPL(register_net_sysctl_table); |
d62c612ef
|
107 108 109 110 111 112 113 |
struct ctl_table_header *register_net_sysctl_rotable(const struct ctl_path *path, struct ctl_table *table) { return __register_sysctl_paths(&net_sysctl_ro_root, &init_nsproxy, path, table); } EXPORT_SYMBOL_GPL(register_net_sysctl_rotable); |
95bdfccb2
|
114 115 |
void unregister_net_sysctl_table(struct ctl_table_header *header) { |
ab59859de
|
116 |
unregister_sysctl_table(header); |
95bdfccb2
|
117 118 |
} EXPORT_SYMBOL_GPL(unregister_net_sysctl_table); |