Commit 49ffcf8f authored by Eric W. Biederman's avatar Eric W. Biederman Committed by Linus Torvalds

sysctl: update sysctl_check_table

Well it turns out after I dug into the problems a little more I was returning
a few false positives so this patch updates my logic to remove them.

- Don't complain about 0 ctl_names in sysctl_check_binary_path
  It is valid for someone to remove the sysctl binary interface
  and still keep the same sysctl proc interface.

- Count ctl_names and procnames as matching if they both don't
  exist.

- Only warn about missing min&max when the generic functions care.
Signed-off-by: default avatarEric W. Biederman <ebiederm@xmission.com>
Cc: Alexey Dobriyan <adobriyan@sw.ru>
Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>
Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
parent fc6cd25b
...@@ -565,6 +565,7 @@ static struct trans_ctl_table trans_net_ipv6_table[] = { ...@@ -565,6 +565,7 @@ static struct trans_ctl_table trans_net_ipv6_table[] = {
{ NET_IPV6_IP6FRAG_TIME, "ip6frag_time" }, { NET_IPV6_IP6FRAG_TIME, "ip6frag_time" },
{ NET_IPV6_IP6FRAG_SECRET_INTERVAL, "ip6frag_secret_interval" }, { NET_IPV6_IP6FRAG_SECRET_INTERVAL, "ip6frag_secret_interval" },
{ NET_IPV6_MLD_MAX_MSF, "mld_max_msf" }, { NET_IPV6_MLD_MAX_MSF, "mld_max_msf" },
{ 2088 /* IPQ_QMAX */, "ip6_queue_maxlen" },
{} {}
}; };
...@@ -723,6 +724,7 @@ static struct trans_ctl_table trans_net_table[] = { ...@@ -723,6 +724,7 @@ static struct trans_ctl_table trans_net_table[] = {
{ NET_LLC, "llc", trans_net_llc_table }, { NET_LLC, "llc", trans_net_llc_table },
{ NET_NETFILTER, "netfilter", trans_net_netfilter_table }, { NET_NETFILTER, "netfilter", trans_net_netfilter_table },
{ NET_DCCP, "dccp", trans_net_dccp_table }, { NET_DCCP, "dccp", trans_net_dccp_table },
{ 2089, "nf_conntrack_max" },
{} {}
}; };
...@@ -1421,12 +1423,14 @@ static int sysctl_check_dir(struct ctl_table *table) ...@@ -1421,12 +1423,14 @@ static int sysctl_check_dir(struct ctl_table *table)
ref = sysctl_check_lookup(table); ref = sysctl_check_lookup(table);
if (ref) { if (ref) {
int match = 0; int match = 0;
if (table->procname && ref->procname && if ((!table->procname && !ref->procname) ||
(strcmp(table->procname, ref->procname) == 0)) (table->procname && ref->procname &&
(strcmp(table->procname, ref->procname) == 0)))
match++; match++;
if (table->ctl_name && ref->ctl_name && if ((!table->ctl_name && !ref->ctl_name) ||
(table->ctl_name == ref->ctl_name)) (table->ctl_name && ref->ctl_name &&
(table->ctl_name == ref->ctl_name)))
match++; match++;
if (match != 2) { if (match != 2) {
...@@ -1463,8 +1467,8 @@ static void sysctl_check_bin_path(struct ctl_table *table, const char **fail) ...@@ -1463,8 +1467,8 @@ static void sysctl_check_bin_path(struct ctl_table *table, const char **fail)
(strcmp(table->procname, ref->procname) != 0))) (strcmp(table->procname, ref->procname) != 0)))
set_fail(fail, table, "procname does not match binary path procname"); set_fail(fail, table, "procname does not match binary path procname");
if (ref->ctl_name && if (ref->ctl_name && table->ctl_name &&
(!table->ctl_name || table->ctl_name != ref->ctl_name)) (table->ctl_name != ref->ctl_name))
set_fail(fail, table, "ctl_name does not match binary path ctl_name"); set_fail(fail, table, "ctl_name does not match binary path ctl_name");
} }
} }
...@@ -1500,7 +1504,7 @@ int sysctl_check_table(struct ctl_table *table) ...@@ -1500,7 +1504,7 @@ int sysctl_check_table(struct ctl_table *table)
if (table->extra2) if (table->extra2)
set_fail(&fail, table, "Directory with extra2"); set_fail(&fail, table, "Directory with extra2");
if (sysctl_check_dir(table)) if (sysctl_check_dir(table))
set_fail(&fail, table, "Inconsistent directory"); set_fail(&fail, table, "Inconsistent directory names");
} else { } else {
if ((table->strategy == sysctl_data) || if ((table->strategy == sysctl_data) ||
(table->strategy == sysctl_string) || (table->strategy == sysctl_string) ||
...@@ -1521,23 +1525,27 @@ int sysctl_check_table(struct ctl_table *table) ...@@ -1521,23 +1525,27 @@ int sysctl_check_table(struct ctl_table *table)
if (!table->maxlen) if (!table->maxlen)
set_fail(&fail, table, "No maxlen"); set_fail(&fail, table, "No maxlen");
} }
if ((table->strategy == sysctl_intvec) || if ((table->proc_handler == proc_doulongvec_minmax) ||
(table->proc_handler == proc_dointvec_minmax) ||
(table->proc_handler == proc_doulongvec_minmax) ||
(table->proc_handler == proc_doulongvec_ms_jiffies_minmax)) { (table->proc_handler == proc_doulongvec_ms_jiffies_minmax)) {
if (!table->extra1) if (table->maxlen > sizeof (unsigned long)) {
set_fail(&fail, table, "No min"); if (!table->extra1)
if (!table->extra2) set_fail(&fail, table, "No min");
set_fail(&fail, table, "No max"); if (!table->extra2)
set_fail(&fail, table, "No max");
}
} }
#ifdef CONFIG_SYSCTL_SYSCALL
if (table->ctl_name && !table->strategy) if (table->ctl_name && !table->strategy)
set_fail(&fail, table, "Missing strategy"); set_fail(&fail, table, "Missing strategy");
#endif
#if 0 #if 0
if (!table->ctl_name && table->strategy) if (!table->ctl_name && table->strategy)
set_fail(&fail, table, "Strategy without ctl_name"); set_fail(&fail, table, "Strategy without ctl_name");
#endif #endif
#ifdef CONFIG_PROC_FS
if (table->procname && !table->proc_handler) if (table->procname && !table->proc_handler)
set_fail(&fail, table, "No proc_handler"); set_fail(&fail, table, "No proc_handler");
#endif
#if 0 #if 0
if (!table->procname && table->proc_handler) if (!table->procname && table->proc_handler)
set_fail(&fail, table, "proc_handler without procname"); set_fail(&fail, table, "proc_handler without procname");
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment