diff options
Diffstat (limited to 'net/ipv4/sysctl_net_ipv4.c')
| -rw-r--r-- | net/ipv4/sysctl_net_ipv4.c | 433 | 
1 files changed, 295 insertions, 138 deletions
diff --git a/net/ipv4/sysctl_net_ipv4.c b/net/ipv4/sysctl_net_ipv4.c index e91911d7aae..79a007c5255 100644 --- a/net/ipv4/sysctl_net_ipv4.c +++ b/net/ipv4/sysctl_net_ipv4.c @@ -13,6 +13,8 @@  #include <linux/seqlock.h>  #include <linux/init.h>  #include <linux/slab.h> +#include <linux/nsproxy.h> +#include <linux/swap.h>  #include <net/snmp.h>  #include <net/icmp.h>  #include <net/ip.h> @@ -21,29 +23,44 @@  #include <net/udp.h>  #include <net/cipso_ipv4.h>  #include <net/inet_frag.h> +#include <net/ping.h> +#include <net/tcp_memcontrol.h>  static int zero; +static int one = 1; +static int four = 4; +static int gso_max_segs = GSO_MAX_SEGS;  static int tcp_retr1_max = 255;  static int ip_local_port_range_min[] = { 1, 1 };  static int ip_local_port_range_max[] = { 65535, 65535 }; +static int tcp_adv_win_scale_min = -31; +static int tcp_adv_win_scale_max = 31; +static int ip_ttl_min = 1; +static int ip_ttl_max = 255; +static int tcp_syn_retries_min = 1; +static int tcp_syn_retries_max = MAX_TCP_SYNCNT; +static int ip_ping_group_range_min[] = { 0, 0 }; +static int ip_ping_group_range_max[] = { GID_T_MAX, GID_T_MAX };  /* Update system visible IP port range */ -static void set_local_port_range(int range[2]) +static void set_local_port_range(struct net *net, int range[2])  { -	write_seqlock(&sysctl_local_ports.lock); -	sysctl_local_ports.range[0] = range[0]; -	sysctl_local_ports.range[1] = range[1]; -	write_sequnlock(&sysctl_local_ports.lock); +	write_seqlock(&net->ipv4.ip_local_ports.lock); +	net->ipv4.ip_local_ports.range[0] = range[0]; +	net->ipv4.ip_local_ports.range[1] = range[1]; +	write_sequnlock(&net->ipv4.ip_local_ports.lock);  }  /* Validate changes from /proc interface. */ -static int ipv4_local_port_range(ctl_table *table, int write, +static int ipv4_local_port_range(struct ctl_table *table, int write,  				 void __user *buffer,  				 size_t *lenp, loff_t *ppos)  { +	struct net *net = +		container_of(table->data, struct net, ipv4.ip_local_ports.range);  	int ret;  	int range[2]; -	ctl_table tmp = { +	struct ctl_table tmp = {  		.data = &range,  		.maxlen = sizeof(range),  		.mode = table->mode, @@ -51,24 +68,88 @@ static int ipv4_local_port_range(ctl_table *table, int write,  		.extra2 = &ip_local_port_range_max,  	}; -	inet_get_local_port_range(range, range + 1); +	inet_get_local_port_range(net, &range[0], &range[1]); +  	ret = proc_dointvec_minmax(&tmp, write, buffer, lenp, ppos);  	if (write && ret == 0) {  		if (range[1] < range[0])  			ret = -EINVAL;  		else -			set_local_port_range(range); +			set_local_port_range(net, range); +	} + +	return ret; +} + + +static void inet_get_ping_group_range_table(struct ctl_table *table, kgid_t *low, kgid_t *high) +{ +	kgid_t *data = table->data; +	struct net *net = +		container_of(table->data, struct net, ipv4.ping_group_range.range); +	unsigned int seq; +	do { +		seq = read_seqbegin(&net->ipv4.ip_local_ports.lock); + +		*low = data[0]; +		*high = data[1]; +	} while (read_seqretry(&net->ipv4.ip_local_ports.lock, seq)); +} + +/* Update system visible IP port range */ +static void set_ping_group_range(struct ctl_table *table, kgid_t low, kgid_t high) +{ +	kgid_t *data = table->data; +	struct net *net = +		container_of(table->data, struct net, ipv4.ping_group_range.range); +	write_seqlock(&net->ipv4.ip_local_ports.lock); +	data[0] = low; +	data[1] = high; +	write_sequnlock(&net->ipv4.ip_local_ports.lock); +} + +/* Validate changes from /proc interface. */ +static int ipv4_ping_group_range(struct ctl_table *table, int write, +				 void __user *buffer, +				 size_t *lenp, loff_t *ppos) +{ +	struct user_namespace *user_ns = current_user_ns(); +	int ret; +	gid_t urange[2]; +	kgid_t low, high; +	struct ctl_table tmp = { +		.data = &urange, +		.maxlen = sizeof(urange), +		.mode = table->mode, +		.extra1 = &ip_ping_group_range_min, +		.extra2 = &ip_ping_group_range_max, +	}; + +	inet_get_ping_group_range_table(table, &low, &high); +	urange[0] = from_kgid_munged(user_ns, low); +	urange[1] = from_kgid_munged(user_ns, high); +	ret = proc_dointvec_minmax(&tmp, write, buffer, lenp, ppos); + +	if (write && ret == 0) { +		low = make_kgid(user_ns, urange[0]); +		high = make_kgid(user_ns, urange[1]); +		if (!gid_valid(low) || !gid_valid(high) || +		    (urange[1] < urange[0]) || gid_lt(high, low)) { +			low = make_kgid(&init_user_ns, 1); +			high = make_kgid(&init_user_ns, 0); +		} +		set_ping_group_range(table, low, high);  	}  	return ret;  } -static int proc_tcp_congestion_control(ctl_table *ctl, int write, +static int proc_tcp_congestion_control(struct ctl_table *ctl, int write,  				       void __user *buffer, size_t *lenp, loff_t *ppos)  {  	char val[TCP_CA_NAME_MAX]; -	ctl_table tbl = { +	struct ctl_table tbl = {  		.data = val,  		.maxlen = TCP_CA_NAME_MAX,  	}; @@ -82,12 +163,12 @@ static int proc_tcp_congestion_control(ctl_table *ctl, int write,  	return ret;  } -static int proc_tcp_available_congestion_control(ctl_table *ctl, +static int proc_tcp_available_congestion_control(struct ctl_table *ctl,  						 int write,  						 void __user *buffer, size_t *lenp,  						 loff_t *ppos)  { -	ctl_table tbl = { .maxlen = TCP_CA_BUF_MAX, }; +	struct ctl_table tbl = { .maxlen = TCP_CA_BUF_MAX, };  	int ret;  	tbl.data = kmalloc(tbl.maxlen, GFP_USER); @@ -99,12 +180,12 @@ static int proc_tcp_available_congestion_control(ctl_table *ctl,  	return ret;  } -static int proc_allowed_congestion_control(ctl_table *ctl, +static int proc_allowed_congestion_control(struct ctl_table *ctl,  					   int write,  					   void __user *buffer, size_t *lenp,  					   loff_t *ppos)  { -	ctl_table tbl = { .maxlen = TCP_CA_BUF_MAX }; +	struct ctl_table tbl = { .maxlen = TCP_CA_BUF_MAX };  	int ret;  	tbl.data = kmalloc(tbl.maxlen, GFP_USER); @@ -119,6 +200,53 @@ static int proc_allowed_congestion_control(ctl_table *ctl,  	return ret;  } +static int proc_tcp_fastopen_key(struct ctl_table *ctl, int write, +				 void __user *buffer, size_t *lenp, +				 loff_t *ppos) +{ +	struct ctl_table tbl = { .maxlen = (TCP_FASTOPEN_KEY_LENGTH * 2 + 10) }; +	struct tcp_fastopen_context *ctxt; +	int ret; +	u32  user_key[4]; /* 16 bytes, matching TCP_FASTOPEN_KEY_LENGTH */ + +	tbl.data = kmalloc(tbl.maxlen, GFP_KERNEL); +	if (!tbl.data) +		return -ENOMEM; + +	rcu_read_lock(); +	ctxt = rcu_dereference(tcp_fastopen_ctx); +	if (ctxt) +		memcpy(user_key, ctxt->key, TCP_FASTOPEN_KEY_LENGTH); +	else +		memset(user_key, 0, sizeof(user_key)); +	rcu_read_unlock(); + +	snprintf(tbl.data, tbl.maxlen, "%08x-%08x-%08x-%08x", +		user_key[0], user_key[1], user_key[2], user_key[3]); +	ret = proc_dostring(&tbl, write, buffer, lenp, ppos); + +	if (write && ret == 0) { +		if (sscanf(tbl.data, "%x-%x-%x-%x", user_key, user_key + 1, +			   user_key + 2, user_key + 3) != 4) { +			ret = -EINVAL; +			goto bad_key; +		} +		/* Generate a dummy secret but don't publish it. This +		 * is needed so we don't regenerate a new key on the +		 * first invocation of tcp_fastopen_cookie_gen +		 */ +		tcp_fastopen_init_key_once(false); +		tcp_fastopen_reset_cipher(user_key, TCP_FASTOPEN_KEY_LENGTH); +	} + +bad_key: +	pr_debug("proc FO key set 0x%x-%x-%x-%x <- 0x%s: %u\n", +	       user_key[0], user_key[1], user_key[2], user_key[3], +	       (char *)tbl.data, ret); +	kfree(tbl.data); +	return ret; +} +  static struct ctl_table ipv4_table[] = {  	{  		.procname	= "tcp_timestamps", @@ -153,15 +281,9 @@ static struct ctl_table ipv4_table[] = {  		.data		= &sysctl_ip_default_ttl,  		.maxlen		= sizeof(int),  		.mode		= 0644, -		.proc_handler	= ipv4_doint_and_flush, -		.extra2		= &init_net, -	}, -	{ -		.procname	= "ip_no_pmtu_disc", -		.data		= &ipv4_config.no_pmtu_disc, -		.maxlen		= sizeof(int), -		.mode		= 0644, -		.proc_handler	= proc_dointvec +		.proc_handler	= proc_dointvec_minmax, +		.extra1		= &ip_ttl_min, +		.extra2		= &ip_ttl_max,  	},  	{  		.procname	= "ip_nonlocal_bind", @@ -175,7 +297,9 @@ static struct ctl_table ipv4_table[] = {  		.data		= &sysctl_tcp_syn_retries,  		.maxlen		= sizeof(int),  		.mode		= 0644, -		.proc_handler	= proc_dointvec +		.proc_handler	= proc_dointvec_minmax, +		.extra1		= &tcp_syn_retries_min, +		.extra2		= &tcp_syn_retries_max  	},  	{  		.procname	= "tcp_synack_retries", @@ -199,6 +323,13 @@ static struct ctl_table ipv4_table[] = {  		.proc_handler	= proc_dointvec  	},  	{ +		.procname	= "ip_early_demux", +		.data		= &sysctl_ip_early_demux, +		.maxlen		= sizeof(int), +		.mode		= 0644, +		.proc_handler	= proc_dointvec +	}, +	{  		.procname	= "ip_dynaddr",  		.data		= &sysctl_ip_dynaddr,  		.maxlen		= sizeof(int), @@ -258,6 +389,19 @@ static struct ctl_table ipv4_table[] = {  	},  #endif  	{ +		.procname	= "tcp_fastopen", +		.data		= &sysctl_tcp_fastopen, +		.maxlen		= sizeof(int), +		.mode		= 0644, +		.proc_handler	= proc_dointvec, +	}, +	{ +		.procname	= "tcp_fastopen_key", +		.mode		= 0600, +		.maxlen		= ((TCP_FASTOPEN_KEY_LENGTH * 2) + 10), +		.proc_handler	= proc_tcp_fastopen_key, +	}, +	{  		.procname	= "tcp_tw_recycle",  		.data		= &tcp_death_row.sysctl_tw_recycle,  		.maxlen		= sizeof(int), @@ -293,29 +437,12 @@ static struct ctl_table ipv4_table[] = {  		.proc_handler	= proc_dointvec  	},  	{ -		.procname	= "ip_local_port_range", -		.data		= &sysctl_local_ports.range, -		.maxlen		= sizeof(sysctl_local_ports.range), -		.mode		= 0644, -		.proc_handler	= ipv4_local_port_range, -	}, -	{ -		.procname	= "ip_local_reserved_ports", -		.data		= NULL, /* initialized in sysctl_ipv4_init */ -		.maxlen		= 65536, -		.mode		= 0644, -		.proc_handler	= proc_do_large_bitmap, -	}, -#ifdef CONFIG_IP_MULTICAST -	{  		.procname	= "igmp_max_memberships",  		.data		= &sysctl_igmp_max_memberships,  		.maxlen		= sizeof(int),  		.mode		= 0644,  		.proc_handler	= proc_dointvec  	}, - -#endif  	{  		.procname	= "igmp_max_msf",  		.data		= &sysctl_igmp_max_msf, @@ -345,20 +472,6 @@ static struct ctl_table ipv4_table[] = {  		.proc_handler	= proc_dointvec_jiffies,  	},  	{ -		.procname	= "inet_peer_gc_mintime", -		.data		= &inet_peer_gc_mintime, -		.maxlen		= sizeof(int), -		.mode		= 0644, -		.proc_handler	= proc_dointvec_jiffies, -	}, -	{ -		.procname	= "inet_peer_gc_maxtime", -		.data		= &inet_peer_gc_maxtime, -		.maxlen		= sizeof(int), -		.mode		= 0644, -		.proc_handler	= proc_dointvec_jiffies, -	}, -	{  		.procname	= "tcp_orphan_retries",  		.data		= &sysctl_tcp_orphan_retries,  		.maxlen		= sizeof(int), @@ -380,13 +493,6 @@ static struct ctl_table ipv4_table[] = {  		.proc_handler	= proc_dointvec  	},  	{ -		.procname	= "tcp_ecn", -		.data		= &sysctl_tcp_ecn, -		.maxlen		= sizeof(int), -		.mode		= 0644, -		.proc_handler	= proc_dointvec -	}, -	{  		.procname	= "tcp_dsack",  		.data		= &sysctl_tcp_dsack,  		.maxlen		= sizeof(int), @@ -395,24 +501,33 @@ static struct ctl_table ipv4_table[] = {  	},  	{  		.procname	= "tcp_mem", -		.data		= &sysctl_tcp_mem,  		.maxlen		= sizeof(sysctl_tcp_mem), +		.data		= &sysctl_tcp_mem,  		.mode		= 0644, -		.proc_handler	= proc_doulongvec_minmax +		.proc_handler	= proc_doulongvec_minmax,  	},  	{  		.procname	= "tcp_wmem",  		.data		= &sysctl_tcp_wmem,  		.maxlen		= sizeof(sysctl_tcp_wmem),  		.mode		= 0644, -		.proc_handler	= proc_dointvec +		.proc_handler	= proc_dointvec_minmax, +		.extra1		= &one, +	}, +	{ +		.procname	= "tcp_notsent_lowat", +		.data		= &sysctl_tcp_notsent_lowat, +		.maxlen		= sizeof(sysctl_tcp_notsent_lowat), +		.mode		= 0644, +		.proc_handler	= proc_dointvec,  	},  	{  		.procname	= "tcp_rmem",  		.data		= &sysctl_tcp_rmem,  		.maxlen		= sizeof(sysctl_tcp_rmem),  		.mode		= 0644, -		.proc_handler	= proc_dointvec +		.proc_handler	= proc_dointvec_minmax, +		.extra1		= &one,  	},  	{  		.procname	= "tcp_app_win", @@ -426,7 +541,9 @@ static struct ctl_table ipv4_table[] = {  		.data		= &sysctl_tcp_adv_win_scale,  		.maxlen		= sizeof(int),  		.mode		= 0644, -		.proc_handler	= proc_dointvec +		.proc_handler	= proc_dointvec_minmax, +		.extra1		= &tcp_adv_win_scale_min, +		.extra2		= &tcp_adv_win_scale_max,  	},  	{  		.procname	= "tcp_tw_reuse", @@ -443,13 +560,6 @@ static struct ctl_table ipv4_table[] = {  		.proc_handler	= proc_dointvec  	},  	{ -		.procname	= "tcp_frto_response", -		.data		= &sysctl_tcp_frto_response, -		.maxlen		= sizeof(int), -		.mode		= 0644, -		.proc_handler	= proc_dointvec -	}, -	{  		.procname	= "tcp_low_latency",  		.data		= &sysctl_tcp_low_latency,  		.maxlen		= sizeof(int), @@ -484,13 +594,6 @@ static struct ctl_table ipv4_table[] = {  		.proc_handler	= proc_tcp_congestion_control,  	},  	{ -		.procname	= "tcp_abc", -		.data		= &sysctl_tcp_abc, -		.maxlen		= sizeof(int), -		.mode		= 0644, -		.proc_handler	= proc_dointvec, -	}, -	{  		.procname	= "tcp_mtu_probing",  		.data		= &sysctl_tcp_mtu_probing,  		.maxlen		= sizeof(int), @@ -511,6 +614,20 @@ static struct ctl_table ipv4_table[] = {  		.mode		= 0644,  		.proc_handler	= proc_dointvec  	}, +	{ +		.procname	= "tcp_limit_output_bytes", +		.data		= &sysctl_tcp_limit_output_bytes, +		.maxlen		= sizeof(int), +		.mode		= 0644, +		.proc_handler	= proc_dointvec +	}, +	{ +		.procname	= "tcp_challenge_ack_limit", +		.data		= &sysctl_tcp_challenge_ack_limit, +		.maxlen		= sizeof(int), +		.mode		= 0644, +		.proc_handler	= proc_dointvec +	},  #ifdef CONFIG_NET_DMA  	{  		.procname	= "tcp_dma_copybreak", @@ -570,27 +687,13 @@ static struct ctl_table ipv4_table[] = {  		.proc_handler   = proc_allowed_congestion_control,  	},  	{ -		.procname	= "tcp_max_ssthresh", -		.data		= &sysctl_tcp_max_ssthresh, -		.maxlen		= sizeof(int), -		.mode		= 0644, -		.proc_handler	= proc_dointvec, -	}, -	{ -		.procname	= "tcp_cookie_size", -		.data		= &sysctl_tcp_cookie_size, -		.maxlen		= sizeof(int), -		.mode		= 0644, -		.proc_handler	= proc_dointvec -	}, -	{  		.procname       = "tcp_thin_linear_timeouts",  		.data           = &sysctl_tcp_thin_linear_timeouts,  		.maxlen         = sizeof(int),  		.mode           = 0644,  		.proc_handler   = proc_dointvec  	}, -        { +	{  		.procname       = "tcp_thin_dupack",  		.data           = &sysctl_tcp_thin_dupack,  		.maxlen         = sizeof(int), @@ -598,6 +701,33 @@ static struct ctl_table ipv4_table[] = {  		.proc_handler   = proc_dointvec  	},  	{ +		.procname	= "tcp_early_retrans", +		.data		= &sysctl_tcp_early_retrans, +		.maxlen		= sizeof(int), +		.mode		= 0644, +		.proc_handler	= proc_dointvec_minmax, +		.extra1		= &zero, +		.extra2		= &four, +	}, +	{ +		.procname	= "tcp_min_tso_segs", +		.data		= &sysctl_tcp_min_tso_segs, +		.maxlen		= sizeof(int), +		.mode		= 0644, +		.proc_handler	= proc_dointvec_minmax, +		.extra1		= &zero, +		.extra2		= &gso_max_segs, +	}, +	{ +		.procname	= "tcp_autocorking", +		.data		= &sysctl_tcp_autocorking, +		.maxlen		= sizeof(int), +		.mode		= 0644, +		.proc_handler	= proc_dointvec_minmax, +		.extra1		= &zero, +		.extra2		= &one, +	}, +	{  		.procname	= "udp_mem",  		.data		= &sysctl_udp_mem,  		.maxlen		= sizeof(sysctl_udp_mem), @@ -610,7 +740,7 @@ static struct ctl_table ipv4_table[] = {  		.maxlen		= sizeof(sysctl_udp_rmem_min),  		.mode		= 0644,  		.proc_handler	= proc_dointvec_minmax, -		.extra1		= &zero +		.extra1		= &one  	},  	{  		.procname	= "udp_wmem_min", @@ -618,7 +748,7 @@ static struct ctl_table ipv4_table[] = {  		.maxlen		= sizeof(sysctl_udp_wmem_min),  		.mode		= 0644,  		.proc_handler	= proc_dointvec_minmax, -		.extra1		= &zero +		.extra1		= &one  	},  	{ }  }; @@ -667,57 +797,93 @@ static struct ctl_table ipv4_net_table[] = {  		.proc_handler	= proc_dointvec  	},  	{ -		.procname	= "rt_cache_rebuild_count", -		.data		= &init_net.ipv4.sysctl_rt_cache_rebuild_count, +		.procname	= "ping_group_range", +		.data		= &init_net.ipv4.ping_group_range.range, +		.maxlen		= sizeof(gid_t)*2, +		.mode		= 0644, +		.proc_handler	= ipv4_ping_group_range, +	}, +	{ +		.procname	= "tcp_ecn", +		.data		= &init_net.ipv4.sysctl_tcp_ecn, +		.maxlen		= sizeof(int), +		.mode		= 0644, +		.proc_handler	= proc_dointvec +	}, +	{ +		.procname	= "ip_local_port_range", +		.maxlen		= sizeof(init_net.ipv4.ip_local_ports.range), +		.data		= &init_net.ipv4.ip_local_ports.range, +		.mode		= 0644, +		.proc_handler	= ipv4_local_port_range, +	}, +	{ +		.procname	= "ip_local_reserved_ports", +		.data		= &init_net.ipv4.sysctl_local_reserved_ports, +		.maxlen		= 65536, +		.mode		= 0644, +		.proc_handler	= proc_do_large_bitmap, +	}, +	{ +		.procname	= "ip_no_pmtu_disc", +		.data		= &init_net.ipv4.sysctl_ip_no_pmtu_disc,  		.maxlen		= sizeof(int),  		.mode		= 0644,  		.proc_handler	= proc_dointvec  	}, +	{ +		.procname	= "ip_forward_use_pmtu", +		.data		= &init_net.ipv4.sysctl_ip_fwd_use_pmtu, +		.maxlen		= sizeof(int), +		.mode		= 0644, +		.proc_handler	= proc_dointvec, +	}, +	{ +		.procname	= "fwmark_reflect", +		.data		= &init_net.ipv4.sysctl_fwmark_reflect, +		.maxlen		= sizeof(int), +		.mode		= 0644, +		.proc_handler	= proc_dointvec, +	}, +	{ +		.procname	= "tcp_fwmark_accept", +		.data		= &init_net.ipv4.sysctl_tcp_fwmark_accept, +		.maxlen		= sizeof(int), +		.mode		= 0644, +		.proc_handler	= proc_dointvec, +	},  	{ }  }; -struct ctl_path net_ipv4_ctl_path[] = { -	{ .procname = "net", }, -	{ .procname = "ipv4", }, -	{ }, -}; -EXPORT_SYMBOL_GPL(net_ipv4_ctl_path); -  static __net_init int ipv4_sysctl_init_net(struct net *net)  {  	struct ctl_table *table;  	table = ipv4_net_table;  	if (!net_eq(net, &init_net)) { +		int i; +  		table = kmemdup(table, sizeof(ipv4_net_table), GFP_KERNEL);  		if (table == NULL)  			goto err_alloc; -		table[0].data = -			&net->ipv4.sysctl_icmp_echo_ignore_all; -		table[1].data = -			&net->ipv4.sysctl_icmp_echo_ignore_broadcasts; -		table[2].data = -			&net->ipv4.sysctl_icmp_ignore_bogus_error_responses; -		table[3].data = -			&net->ipv4.sysctl_icmp_errors_use_inbound_ifaddr; -		table[4].data = -			&net->ipv4.sysctl_icmp_ratelimit; -		table[5].data = -			&net->ipv4.sysctl_icmp_ratemask; -		table[6].data = -			&net->ipv4.sysctl_rt_cache_rebuild_count; +		/* Update the variables to point into the current struct net */ +		for (i = 0; i < ARRAY_SIZE(ipv4_net_table) - 1; i++) +			table[i].data += (void *)net - (void *)&init_net;  	} -	net->ipv4.sysctl_rt_cache_rebuild_count = 4; - -	net->ipv4.ipv4_hdr = register_net_sysctl_table(net, -			net_ipv4_ctl_path, table); +	net->ipv4.ipv4_hdr = register_net_sysctl(net, "net/ipv4", table);  	if (net->ipv4.ipv4_hdr == NULL)  		goto err_reg; +	net->ipv4.sysctl_local_reserved_ports = kzalloc(65536 / 8, GFP_KERNEL); +	if (!net->ipv4.sysctl_local_reserved_ports) +		goto err_ports; +  	return 0; +err_ports: +	unregister_net_sysctl_table(net->ipv4.ipv4_hdr);  err_reg:  	if (!net_eq(net, &init_net))  		kfree(table); @@ -729,6 +895,7 @@ static __net_exit void ipv4_sysctl_exit_net(struct net *net)  {  	struct ctl_table *table; +	kfree(net->ipv4.sysctl_local_reserved_ports);  	table = net->ipv4.ipv4_hdr->ctl_table_arg;  	unregister_net_sysctl_table(net->ipv4.ipv4_hdr);  	kfree(table); @@ -742,23 +909,13 @@ static __net_initdata struct pernet_operations ipv4_sysctl_ops = {  static __init int sysctl_ipv4_init(void)  {  	struct ctl_table_header *hdr; -	struct ctl_table *i; - -	for (i = ipv4_table; i->procname; i++) { -		if (strcmp(i->procname, "ip_local_reserved_ports") == 0) { -			i->data = sysctl_local_reserved_ports; -			break; -		} -	} -	if (!i->procname) -		return -EINVAL; -	hdr = register_sysctl_paths(net_ipv4_ctl_path, ipv4_table); +	hdr = register_net_sysctl(&init_net, "net/ipv4", ipv4_table);  	if (hdr == NULL)  		return -ENOMEM;  	if (register_pernet_subsys(&ipv4_sysctl_ops)) { -		unregister_sysctl_table(hdr); +		unregister_net_sysctl_table(hdr);  		return -ENOMEM;  	}  | 
