sysctl: Make the directories have nlink == 1
[linux-2.6-block.git] / net / sysctl_net.c
CommitLineData
1da177e4
LT
1/* -*- linux-c -*-
2 * sysctl_net.c: sysctl interface to net subsystem.
3 *
4 * Begun April 1, 1996, Mike Shaver.
5 * Added /proc/sys/net directories for each protocol family. [MS]
6 *
1da177e4
LT
7 * Revision 1.2 1996/05/08 20:24:40 shaver
8 * Added bits for NET_BRIDGE and the NET_IPV4_ARP stuff and
9 * NET_IPV4_IP_FORWARD.
10 *
11 *
12 */
13
1da177e4 14#include <linux/mm.h>
bc3b2d7f 15#include <linux/export.h>
1da177e4 16#include <linux/sysctl.h>
95bdfccb 17#include <linux/nsproxy.h>
1da177e4 18
496a22b0
RK
19#include <net/sock.h>
20
1da177e4 21#ifdef CONFIG_INET
20380731 22#include <net/ip.h>
1da177e4
LT
23#endif
24
1da177e4 25#ifdef CONFIG_NET
20380731 26#include <linux/if_ether.h>
1da177e4
LT
27#endif
28
29#ifdef CONFIG_TR
20380731 30#include <linux/if_tr.h>
1da177e4
LT
31#endif
32
73455092 33static struct ctl_table_set *
95bdfccb
EB
34net_ctl_header_lookup(struct ctl_table_root *root, struct nsproxy *namespaces)
35{
73455092
AV
36 return &namespaces->net_ns->sysctls;
37}
38
39static int is_seen(struct ctl_table_set *set)
40{
41 return &current->nsproxy->net_ns->sysctls == set;
95bdfccb
EB
42}
43
4ecb9009
SH
44/* Return standard mode bits for table entry. */
45static int net_ctl_permissions(struct ctl_table_root *root,
46 struct nsproxy *nsproxy,
47 struct ctl_table *table)
48{
49 /* Allow network administrator to have same access as root. */
50 if (capable(CAP_NET_ADMIN)) {
51 int mode = (table->mode >> 6) & 7;
52 return (mode << 6) | (mode << 3) | mode;
53 }
54 return table->mode;
55}
56
95bdfccb
EB
57static struct ctl_table_root net_sysctl_root = {
58 .lookup = net_ctl_header_lookup,
4ecb9009 59 .permissions = net_ctl_permissions,
95bdfccb
EB
60};
61
d62c612e
PE
62static int net_ctl_ro_header_perms(struct ctl_table_root *root,
63 struct nsproxy *namespaces, struct ctl_table *table)
64{
81a1d3c3 65 if (net_eq(namespaces->net_ns, &init_net))
d62c612e
PE
66 return table->mode;
67 else
68 return table->mode & ~0222;
69}
70
71static struct ctl_table_root net_sysctl_ro_root = {
d62c612e
PE
72 .permissions = net_ctl_ro_header_perms,
73};
74
2c8c1e72 75static int __net_init sysctl_net_init(struct net *net)
95bdfccb 76{
eeb61f71
AV
77 setup_sysctl_set(&net->sysctls,
78 &net_sysctl_ro_root.default_set,
79 is_seen);
95bdfccb
EB
80 return 0;
81}
82
2c8c1e72 83static void __net_exit sysctl_net_exit(struct net *net)
95bdfccb 84{
73455092 85 WARN_ON(!list_empty(&net->sysctls.list));
95bdfccb
EB
86}
87
88static struct pernet_operations sysctl_pernet_ops = {
89 .init = sysctl_net_init,
90 .exit = sysctl_net_exit,
91};
92
de4e83bd 93static __init int net_sysctl_init(void)
95bdfccb
EB
94{
95 int ret;
96 ret = register_pernet_subsys(&sysctl_pernet_ops);
97 if (ret)
98 goto out;
99 register_sysctl_root(&net_sysctl_root);
73455092 100 setup_sysctl_set(&net_sysctl_ro_root.default_set, NULL, NULL);
d62c612e 101 register_sysctl_root(&net_sysctl_ro_root);
95bdfccb
EB
102out:
103 return ret;
104}
de4e83bd 105subsys_initcall(net_sysctl_init);
95bdfccb
EB
106
107struct ctl_table_header *register_net_sysctl_table(struct net *net,
108 const struct ctl_path *path, struct ctl_table *table)
109{
110 struct nsproxy namespaces;
111 namespaces = *current->nsproxy;
112 namespaces.net_ns = net;
113 return __register_sysctl_paths(&net_sysctl_root,
114 &namespaces, path, table);
115}
116EXPORT_SYMBOL_GPL(register_net_sysctl_table);
117
d62c612e
PE
118struct ctl_table_header *register_net_sysctl_rotable(const
119 struct ctl_path *path, struct ctl_table *table)
120{
121 return __register_sysctl_paths(&net_sysctl_ro_root,
122 &init_nsproxy, path, table);
123}
124EXPORT_SYMBOL_GPL(register_net_sysctl_rotable);
125
95bdfccb
EB
126void unregister_net_sysctl_table(struct ctl_table_header *header)
127{
ab59859d 128 unregister_sysctl_table(header);
95bdfccb
EB
129}
130EXPORT_SYMBOL_GPL(unregister_net_sysctl_table);