Blame view
net/sysctl_net.c
3.04 KB
1da177e4c
|
1 2 3 4 5 6 |
/* -*- linux-c -*- * sysctl_net.c: sysctl interface to net subsystem. * * Begun April 1, 1996, Mike Shaver. * Added /proc/sys/net directories for each protocol family. [MS] * |
1da177e4c
|
7 8 9 10 11 12 |
* Revision 1.2 1996/05/08 20:24:40 shaver * Added bits for NET_BRIDGE and the NET_IPV4_ARP stuff and * NET_IPV4_IP_FORWARD. * * */ |
1da177e4c
|
13 |
#include <linux/mm.h> |
bc3b2d7fb
|
14 |
#include <linux/export.h> |
1da177e4c
|
15 |
#include <linux/sysctl.h> |
95bdfccb2
|
16 |
#include <linux/nsproxy.h> |
1da177e4c
|
17 |
|
496a22b08
|
18 |
#include <net/sock.h> |
1da177e4c
|
19 |
#ifdef CONFIG_INET |
20380731b
|
20 |
#include <net/ip.h> |
1da177e4c
|
21 |
#endif |
1da177e4c
|
22 |
#ifdef CONFIG_NET |
20380731b
|
23 |
#include <linux/if_ether.h> |
1da177e4c
|
24 25 26 |
#endif #ifdef CONFIG_TR |
20380731b
|
27 |
#include <linux/if_tr.h> |
1da177e4c
|
28 |
#endif |
734550921
|
29 |
static struct ctl_table_set * |
95bdfccb2
|
30 31 |
net_ctl_header_lookup(struct ctl_table_root *root, struct nsproxy *namespaces) { |
734550921
|
32 33 34 35 36 37 |
return &namespaces->net_ns->sysctls; } static int is_seen(struct ctl_table_set *set) { return ¤t->nsproxy->net_ns->sysctls == set; |
95bdfccb2
|
38 |
} |
4ecb90090
|
39 40 41 42 43 44 45 46 47 48 49 50 |
/* Return standard mode bits for table entry. */ static int net_ctl_permissions(struct ctl_table_root *root, struct nsproxy *nsproxy, struct ctl_table *table) { /* Allow network administrator to have same access as root. */ if (capable(CAP_NET_ADMIN)) { int mode = (table->mode >> 6) & 7; return (mode << 6) | (mode << 3) | mode; } return table->mode; } |
95bdfccb2
|
51 52 |
static struct ctl_table_root net_sysctl_root = { .lookup = net_ctl_header_lookup, |
4ecb90090
|
53 |
.permissions = net_ctl_permissions, |
95bdfccb2
|
54 |
}; |
d62c612ef
|
55 56 57 |
static int net_ctl_ro_header_perms(struct ctl_table_root *root, struct nsproxy *namespaces, struct ctl_table *table) { |
81a1d3c31
|
58 |
if (net_eq(namespaces->net_ns, &init_net)) |
d62c612ef
|
59 60 61 62 63 64 |
return table->mode; else return table->mode & ~0222; } static struct ctl_table_root net_sysctl_ro_root = { |
d62c612ef
|
65 66 |
.permissions = net_ctl_ro_header_perms, }; |
2c8c1e729
|
67 |
static int __net_init sysctl_net_init(struct net *net) |
95bdfccb2
|
68 |
{ |
eeb61f719
|
69 70 71 |
setup_sysctl_set(&net->sysctls, &net_sysctl_ro_root.default_set, is_seen); |
95bdfccb2
|
72 73 |
return 0; } |
2c8c1e729
|
74 |
static void __net_exit sysctl_net_exit(struct net *net) |
95bdfccb2
|
75 |
{ |
734550921
|
76 |
WARN_ON(!list_empty(&net->sysctls.list)); |
95bdfccb2
|
77 78 79 80 81 82 83 84 85 86 87 88 89 90 |
} static struct pernet_operations sysctl_pernet_ops = { .init = sysctl_net_init, .exit = sysctl_net_exit, }; static __init int sysctl_init(void) { int ret; ret = register_pernet_subsys(&sysctl_pernet_ops); if (ret) goto out; register_sysctl_root(&net_sysctl_root); |
734550921
|
91 |
setup_sysctl_set(&net_sysctl_ro_root.default_set, NULL, NULL); |
d62c612ef
|
92 |
register_sysctl_root(&net_sysctl_ro_root); |
95bdfccb2
|
93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 |
out: return ret; } subsys_initcall(sysctl_init); struct ctl_table_header *register_net_sysctl_table(struct net *net, const struct ctl_path *path, struct ctl_table *table) { struct nsproxy namespaces; namespaces = *current->nsproxy; namespaces.net_ns = net; return __register_sysctl_paths(&net_sysctl_root, &namespaces, path, table); } EXPORT_SYMBOL_GPL(register_net_sysctl_table); |
d62c612ef
|
108 109 110 111 112 113 114 |
struct ctl_table_header *register_net_sysctl_rotable(const struct ctl_path *path, struct ctl_table *table) { return __register_sysctl_paths(&net_sysctl_ro_root, &init_nsproxy, path, table); } EXPORT_SYMBOL_GPL(register_net_sysctl_rotable); |
95bdfccb2
|
115 116 |
void unregister_net_sysctl_table(struct ctl_table_header *header) { |
ab59859de
|
117 |
unregister_sysctl_table(header); |
95bdfccb2
|
118 119 |
} EXPORT_SYMBOL_GPL(unregister_net_sysctl_table); |