lost sysctl fix
[linux-2.6-block.git] / net / sysctl_net.c
CommitLineData
1da177e4
LT
1/* -*- linux-c -*-
2 * sysctl_net.c: sysctl interface to net subsystem.
3 *
4 * Begun April 1, 1996, Mike Shaver.
5 * Added /proc/sys/net directories for each protocol family. [MS]
6 *
1da177e4
LT
7 * Revision 1.2 1996/05/08 20:24:40 shaver
8 * Added bits for NET_BRIDGE and the NET_IPV4_ARP stuff and
9 * NET_IPV4_IP_FORWARD.
10 *
11 *
12 */
13
1da177e4
LT
14#include <linux/mm.h>
15#include <linux/sysctl.h>
95bdfccb 16#include <linux/nsproxy.h>
1da177e4 17
496a22b0
RK
18#include <net/sock.h>
19
1da177e4 20#ifdef CONFIG_INET
20380731 21#include <net/ip.h>
1da177e4
LT
22#endif
23
1da177e4 24#ifdef CONFIG_NET
20380731 25#include <linux/if_ether.h>
1da177e4
LT
26#endif
27
28#ifdef CONFIG_TR
20380731 29#include <linux/if_tr.h>
1da177e4
LT
30#endif
31
73455092 32static struct ctl_table_set *
95bdfccb
EB
33net_ctl_header_lookup(struct ctl_table_root *root, struct nsproxy *namespaces)
34{
73455092
AV
35 return &namespaces->net_ns->sysctls;
36}
37
38static int is_seen(struct ctl_table_set *set)
39{
40 return &current->nsproxy->net_ns->sysctls == set;
95bdfccb
EB
41}
42
4ecb9009
SH
43/* Return standard mode bits for table entry. */
44static int net_ctl_permissions(struct ctl_table_root *root,
45 struct nsproxy *nsproxy,
46 struct ctl_table *table)
47{
48 /* Allow network administrator to have same access as root. */
49 if (capable(CAP_NET_ADMIN)) {
50 int mode = (table->mode >> 6) & 7;
51 return (mode << 6) | (mode << 3) | mode;
52 }
53 return table->mode;
54}
55
95bdfccb
EB
56static struct ctl_table_root net_sysctl_root = {
57 .lookup = net_ctl_header_lookup,
4ecb9009 58 .permissions = net_ctl_permissions,
95bdfccb
EB
59};
60
d62c612e
PE
61static int net_ctl_ro_header_perms(struct ctl_table_root *root,
62 struct nsproxy *namespaces, struct ctl_table *table)
63{
64 if (namespaces->net_ns == &init_net)
65 return table->mode;
66 else
67 return table->mode & ~0222;
68}
69
70static struct ctl_table_root net_sysctl_ro_root = {
d62c612e
PE
71 .permissions = net_ctl_ro_header_perms,
72};
73
95bdfccb
EB
74static int sysctl_net_init(struct net *net)
75{
73455092 76 setup_sysctl_set(&net->sysctls, NULL, is_seen);
95bdfccb
EB
77 return 0;
78}
79
80static void sysctl_net_exit(struct net *net)
81{
73455092 82 WARN_ON(!list_empty(&net->sysctls.list));
95bdfccb
EB
83 return;
84}
85
86static struct pernet_operations sysctl_pernet_ops = {
87 .init = sysctl_net_init,
88 .exit = sysctl_net_exit,
89};
90
91static __init int sysctl_init(void)
92{
93 int ret;
94 ret = register_pernet_subsys(&sysctl_pernet_ops);
95 if (ret)
96 goto out;
97 register_sysctl_root(&net_sysctl_root);
73455092 98 setup_sysctl_set(&net_sysctl_ro_root.default_set, NULL, NULL);
d62c612e 99 register_sysctl_root(&net_sysctl_ro_root);
95bdfccb
EB
100out:
101 return ret;
102}
103subsys_initcall(sysctl_init);
104
105struct ctl_table_header *register_net_sysctl_table(struct net *net,
106 const struct ctl_path *path, struct ctl_table *table)
107{
108 struct nsproxy namespaces;
109 namespaces = *current->nsproxy;
110 namespaces.net_ns = net;
111 return __register_sysctl_paths(&net_sysctl_root,
112 &namespaces, path, table);
113}
114EXPORT_SYMBOL_GPL(register_net_sysctl_table);
115
d62c612e
PE
116struct ctl_table_header *register_net_sysctl_rotable(const
117 struct ctl_path *path, struct ctl_table *table)
118{
119 return __register_sysctl_paths(&net_sysctl_ro_root,
120 &init_nsproxy, path, table);
121}
122EXPORT_SYMBOL_GPL(register_net_sysctl_rotable);
123
95bdfccb
EB
124void unregister_net_sysctl_table(struct ctl_table_header *header)
125{
ab59859d 126 unregister_sysctl_table(header);
95bdfccb
EB
127}
128EXPORT_SYMBOL_GPL(unregister_net_sysctl_table);