From patchwork Tue Nov 7 13:45:01 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Joel Granados via B4 Relay X-Patchwork-Id: 162478 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:aa0b:0:b0:403:3b70:6f57 with SMTP id k11csp243103vqo; Tue, 7 Nov 2023 05:47:06 -0800 (PST) X-Google-Smtp-Source: AGHT+IFvkKtaaCr0SvfaJu3uRNmB2ZLzPb1VtWjEVYTWJGsuIEGA9U0K3Gd9aN9+UFCH89it0/F1 X-Received: by 2002:a05:6808:4197:b0:3a7:5cc1:69b0 with SMTP id dj23-20020a056808419700b003a75cc169b0mr34906325oib.7.1699364826185; Tue, 07 Nov 2023 05:47:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1699364826; cv=none; d=google.com; s=arc-20160816; b=mF1tVEvWbgGKDCNyzkR0G3tETHAZ/xdZy4NOj/krCNp5q6R+SnceIDnCzu3yrzSPbI 9BSPT1slUuE0sFnneMXnCxs4T1MhJjz9sCYfOpktx+xLK1zRrX55iN0cIOTP71qutTgH K/4CZUDTWvSzvj6+WC1bDI6siJqxF9gO1fuyvZqJYoUnWu+24OR5kEHwIq1EInqnY3iO tAQVsiYzVdpqgxzoFnYD7E26jM4H6ln5IZklQDinLeYq96dykC1S+MZ4nUj8netiAFcB VzcvoCeZOxEoV05rE9cUh+0QxHPfWWG2fFf9Xcv7V/mE6vOym38ivjjoypcV6agn+33W 42XA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:reply-to:cc:to:in-reply-to:references:message-id :content-transfer-encoding:mime-version:subject:date:from :dkim-signature; bh=7nGbGPohByGlSK7X0xAN9EAWptFamOpUJKXpkYMursk=; fh=AuaFKPUwFYzSLqc7bUwLZldSXfNG4AOo7Dj5zlnvlas=; b=JF3boUrrmsgF6OOEkZCVyaOiD+Pk+jqnBbCEJvnMqRkfr7aemR3slxwnaeIRUfxH65 jOYJezPyaGDGMAGhGqIDagjhV94Y/7HGJCZigYx7bLhs/ZN7umdV2bzDJ+VfXC0uc0Hz 8yzLJUyl/pANt3GLbTYIws869CbtsTYVMbI+HoBcfQCeHvrHUiqHC9ADupNhSKW6sQSV eSeiwGzMFsOGP6HS4ON83bbIvWCP3HEXCRNpjOzNiZ2CMnWd03+sywQGcbq5dBlWDChz JeoPVvbzjV3BXi6HWSlCKFsan+Kl6/QgBKw9CFQjV1qoj3xReCX3lCkbD7pLT/nmTMvY f3cA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="l+Sng+/a"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from agentk.vger.email (agentk.vger.email. [2620:137:e000::3:2]) by mx.google.com with ESMTPS id bm23-20020a656e97000000b0058b8c72c5ddsi2450908pgb.607.2023.11.07.05.47.05 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 07 Nov 2023 05:47:06 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) client-ip=2620:137:e000::3:2; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="l+Sng+/a"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 9DDA580F648F; Tue, 7 Nov 2023 05:46:54 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234966AbjKGNqG (ORCPT + 32 others); Tue, 7 Nov 2023 08:46:06 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42872 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234855AbjKGNpd (ORCPT ); Tue, 7 Nov 2023 08:45:33 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C16431986 for ; Tue, 7 Nov 2023 05:45:13 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPS id 592FCC433C8; Tue, 7 Nov 2023 13:45:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1699364713; bh=rqfXn0wJQ1JNhGTxqjEEY6h7Zs0nkvvzH0tVRgYOztM=; h=From:Date:Subject:References:In-Reply-To:To:Cc:Reply-To:From; b=l+Sng+/axabqmNBtBMSVeYZTFMKrg5e+qpIyAtpm8wfvAbfIrBP7QdfaTaEAcgvBI 8PQrfa+R6aRpRgYuDF9RYFYmRvwtr9h4Xab0VW17HjuVUM5ywnrzNbkAb+HNRWNMV6 jprA4r75WFPH6EJRen7UH7IPBMhxh9xoHgZhTjABSskqE94imUa5BQnCsHofmAP5G0 MldPhm4x5Lqh1lLYP83GlAOaBHg3nAyp0q6bRp9Y/nAgly35X/LbeMNV38WwjNoMh/ SspqAZ3bduZRZRiEz6Ie35kPi/jv6S0zS0xiQTU+dDLiQhaGFNZBbh9ijUuldsfM15 MbNGIdrXBoOsw== Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3D2C1C4167D; Tue, 7 Nov 2023 13:45:13 +0000 (UTC) From: Joel Granados via B4 Relay Date: Tue, 07 Nov 2023 14:45:01 +0100 Subject: [PATCH 01/10] kernel misc: Remove the now superfluous sentinel elements from ctl_table array MIME-Version: 1.0 Message-Id: <20231107-jag-sysctl_remove_empty_elem_kernel-v1-1-e4ce1388dfa0@samsung.com> References: <20231107-jag-sysctl_remove_empty_elem_kernel-v1-0-e4ce1388dfa0@samsung.com> In-Reply-To: <20231107-jag-sysctl_remove_empty_elem_kernel-v1-0-e4ce1388dfa0@samsung.com> To: Luis Chamberlain , willy@infradead.org, josh@joshtriplett.org, Kees Cook , Eric Biederman , Iurii Zaikin , Steven Rostedt , Masami Hiramatsu , Mark Rutland , Thomas Gleixner , John Stultz , Stephen Boyd , Andy Lutomirski , Will Drewry , Ingo Molnar , Peter Zijlstra , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Ben Segall , Mel Gorman , Daniel Bristot de Oliveira , Valentin Schneider , Petr Mladek , John Ogness , Sergey Senozhatsky , "Naveen N. Rao" , Anil S Keshavamurthy , "David S. Miller" , Balbir Singh , Alexei Starovoitov , Daniel Borkmann , John Fastabend , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa Cc: linux-kernel@vger.kernel.org, kexec@lists.infradead.org, linux-fsdevel@vger.kernel.org, linux-trace-kernel@vger.kernel.org, bpf@vger.kernel.org, Joel Granados X-Mailer: b4 0.13-dev-86aa5 X-Developer-Signature: v=1; a=openpgp-sha256; l=6862; i=j.granados@samsung.com; h=from:subject:message-id; bh=Vf2nfm8EIVObj93St9fzf/hBCa2RYMM8qEK/8uD5INs=; b=owEB7QES/pANAwAKAbqXzVK3lkFPAcsmYgBlSj9lNHckPwtCPajlFgcDWUDNDUAbwHFBmrxX0 nRNFS3XDpyJAbMEAAEKAB0WIQSuRwlXJeYxJc7LJ5C6l81St5ZBTwUCZUo/ZQAKCRC6l81St5ZB T1YMC/4woW0SrQv/4J7HMtbVEvvvjnhtpdDR8lmEcclHb2E63th3zuS0lf3ImuQ5V9YIyNAu6Ok BRITievAwQz5uTypXdY6QR5EK//TKhEv5X+FkL0F2i/Iz2EnWc1boKqoj+azCzURfmyVx+iwYgW utfj0hJS3RAgf9jv0vJTdIveJ62gdM1I8UnTDfIy3gLoj//GyUw3eUtVH9glB/QVPELK7ajMLZC Zgr/DOgkAXLlccpdPwwfzhVEwlBuHIZb/0mVmYSTt6D8QTFp2Mh8zNmHFQafQrZRCvbfVkyOzop uj9jy+Kw+weezMlFnS86F9kNWvuH97Lt+KEkBmj4havydzEgjgLEOvNpZkO7MAurvqaATeloEBR qIasKrQUtbC45m6UVuNvYVB03O43R9/wS6T/xkZIeUt4nJAOo8T/+IoBURAx6y3HZFdPLKmFibz xgMrhdUrS1X9CSmq1m3XLszAepwWZm17nCplDVT7lUeF4NJzhp0EiSR9gJsjHbprdm3ko= X-Developer-Key: i=j.granados@samsung.com; a=openpgp; fpr=F1F8E46D30F0F6C4A45FF4465895FAAC338C6E77 X-Endpoint-Received: by B4 Relay for j.granados@samsung.com/default with auth_id=70 X-Original-From: Joel Granados Reply-To: X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Tue, 07 Nov 2023 05:46:54 -0800 (PST) X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1781913172137874121 X-GMAIL-MSGID: 1781913172137874121 From: Joel Granados This commit comes at the tail end of a greater effort to remove the empty elements at the end of the ctl_table arrays (sentinels) which will reduce the overall build time size of the kernel and run time memory bloat by ~64 bytes per sentinel (further information Link : https://lore.kernel.org/all/ZO5Yx5JFogGi%2FcBo@bombadil.infradead.org/) Remove the sentinel from ctl_table arrays. Reduce by one the values used to compare the size of the adjusted arrays. Signed-off-by: Joel Granados --- kernel/acct.c | 1 - kernel/exit.c | 1 - kernel/hung_task.c | 1 - kernel/kexec_core.c | 1 - kernel/latencytop.c | 1 - kernel/panic.c | 1 - kernel/pid_namespace.c | 1 - kernel/pid_sysctl.h | 1 - kernel/reboot.c | 1 - kernel/signal.c | 1 - kernel/stackleak.c | 1 - kernel/sysctl.c | 2 -- kernel/ucount.c | 3 +-- kernel/utsname_sysctl.c | 1 - kernel/watchdog.c | 2 -- 15 files changed, 1 insertion(+), 18 deletions(-) diff --git a/kernel/acct.c b/kernel/acct.c index 1a9f929fe629..20d09f437262 100644 --- a/kernel/acct.c +++ b/kernel/acct.c @@ -84,7 +84,6 @@ static struct ctl_table kern_acct_table[] = { .mode = 0644, .proc_handler = proc_dointvec, }, - { } }; static __init int kernel_acct_sysctls_init(void) diff --git a/kernel/exit.c b/kernel/exit.c index edb50b4c9972..aebe885e5b2f 100644 --- a/kernel/exit.c +++ b/kernel/exit.c @@ -90,7 +90,6 @@ static struct ctl_table kern_exit_table[] = { .mode = 0644, .proc_handler = proc_douintvec, }, - { } }; static __init int kernel_exit_sysctls_init(void) diff --git a/kernel/hung_task.c b/kernel/hung_task.c index 9a24574988d2..a81cb511d954 100644 --- a/kernel/hung_task.c +++ b/kernel/hung_task.c @@ -313,7 +313,6 @@ static struct ctl_table hung_task_sysctls[] = { .proc_handler = proc_dointvec_minmax, .extra1 = SYSCTL_NEG_ONE, }, - {} }; static void __init hung_task_sysctl_init(void) diff --git a/kernel/kexec_core.c b/kernel/kexec_core.c index 9dc728982d79..d7e883864f82 100644 --- a/kernel/kexec_core.c +++ b/kernel/kexec_core.c @@ -1005,7 +1005,6 @@ static struct ctl_table kexec_core_sysctls[] = { .mode = 0644, .proc_handler = kexec_limit_handler, }, - { } }; static int __init kexec_core_sysctl_init(void) diff --git a/kernel/latencytop.c b/kernel/latencytop.c index 781249098cb6..84c53285f499 100644 --- a/kernel/latencytop.c +++ b/kernel/latencytop.c @@ -85,7 +85,6 @@ static struct ctl_table latencytop_sysctl[] = { .mode = 0644, .proc_handler = sysctl_latencytop, }, - {} }; #endif diff --git a/kernel/panic.c b/kernel/panic.c index ffa037fa777d..5ae3e6ba88c9 100644 --- a/kernel/panic.c +++ b/kernel/panic.c @@ -99,7 +99,6 @@ static struct ctl_table kern_panic_table[] = { .mode = 0644, .proc_handler = proc_douintvec, }, - { } }; static __init int kernel_panic_sysctls_init(void) diff --git a/kernel/pid_namespace.c b/kernel/pid_namespace.c index 619972c78774..3978b98f6e6b 100644 --- a/kernel/pid_namespace.c +++ b/kernel/pid_namespace.c @@ -312,7 +312,6 @@ static struct ctl_table pid_ns_ctl_table[] = { .extra1 = SYSCTL_ZERO, .extra2 = &pid_max, }, - { } }; #endif /* CONFIG_CHECKPOINT_RESTORE */ diff --git a/kernel/pid_sysctl.h b/kernel/pid_sysctl.h index 2ee41a3a1dfd..fe9fb991dc42 100644 --- a/kernel/pid_sysctl.h +++ b/kernel/pid_sysctl.h @@ -41,7 +41,6 @@ static struct ctl_table pid_ns_ctl_table_vm[] = { .extra1 = SYSCTL_ZERO, .extra2 = SYSCTL_TWO, }, - { } }; static inline void register_pid_ns_sysctl_table_vm(void) { diff --git a/kernel/reboot.c b/kernel/reboot.c index 3bba88c7ffc6..a7828365d2aa 100644 --- a/kernel/reboot.c +++ b/kernel/reboot.c @@ -1272,7 +1272,6 @@ static struct ctl_table kern_reboot_table[] = { .mode = 0644, .proc_handler = proc_dointvec, }, - { } }; static void __init kernel_reboot_sysctls_init(void) diff --git a/kernel/signal.c b/kernel/signal.c index 09019017d669..89476890e3a1 100644 --- a/kernel/signal.c +++ b/kernel/signal.c @@ -4800,7 +4800,6 @@ static struct ctl_table signal_debug_table[] = { .proc_handler = proc_dointvec }, #endif - { } }; static int __init init_signal_sysctls(void) diff --git a/kernel/stackleak.c b/kernel/stackleak.c index 34c9d81eea94..d099f3affcf1 100644 --- a/kernel/stackleak.c +++ b/kernel/stackleak.c @@ -54,7 +54,6 @@ static struct ctl_table stackleak_sysctls[] = { .extra1 = SYSCTL_ZERO, .extra2 = SYSCTL_ONE, }, - {} }; static int __init stackleak_sysctls_init(void) diff --git a/kernel/sysctl.c b/kernel/sysctl.c index 354a2d294f52..64f3613c224a 100644 --- a/kernel/sysctl.c +++ b/kernel/sysctl.c @@ -2043,7 +2043,6 @@ static struct ctl_table kern_table[] = { .extra2 = SYSCTL_INT_MAX, }, #endif - { } }; static struct ctl_table vm_table[] = { @@ -2249,7 +2248,6 @@ static struct ctl_table vm_table[] = { .extra2 = (void *)&mmap_rnd_compat_bits_max, }, #endif - { } }; int __init sysctl_init_bases(void) diff --git a/kernel/ucount.c b/kernel/ucount.c index 4aa6166cb856..e196da0204dc 100644 --- a/kernel/ucount.c +++ b/kernel/ucount.c @@ -87,7 +87,6 @@ static struct ctl_table user_table[] = { UCOUNT_ENTRY("max_fanotify_groups"), UCOUNT_ENTRY("max_fanotify_marks"), #endif - { } }; #endif /* CONFIG_SYSCTL */ @@ -96,7 +95,7 @@ bool setup_userns_sysctls(struct user_namespace *ns) #ifdef CONFIG_SYSCTL struct ctl_table *tbl; - BUILD_BUG_ON(ARRAY_SIZE(user_table) != UCOUNT_COUNTS + 1); + BUILD_BUG_ON(ARRAY_SIZE(user_table) != UCOUNT_COUNTS); setup_sysctl_set(&ns->set, &set_root, set_is_seen); tbl = kmemdup(user_table, sizeof(user_table), GFP_KERNEL); if (tbl) { diff --git a/kernel/utsname_sysctl.c b/kernel/utsname_sysctl.c index 019e3a1566cf..76a772072557 100644 --- a/kernel/utsname_sysctl.c +++ b/kernel/utsname_sysctl.c @@ -120,7 +120,6 @@ static struct ctl_table uts_kern_table[] = { .proc_handler = proc_do_uts_string, .poll = &domainname_poll, }, - {} }; #ifdef CONFIG_PROC_SYSCTL diff --git a/kernel/watchdog.c b/kernel/watchdog.c index 5cd6d4e26915..0f546d17c544 100644 --- a/kernel/watchdog.c +++ b/kernel/watchdog.c @@ -924,7 +924,6 @@ static struct ctl_table watchdog_sysctls[] = { }, #endif /* CONFIG_SMP */ #endif - {} }; static struct ctl_table watchdog_hardlockup_sysctl[] = { @@ -937,7 +936,6 @@ static struct ctl_table watchdog_hardlockup_sysctl[] = { .extra1 = SYSCTL_ZERO, .extra2 = SYSCTL_ONE, }, - {} }; static void __init watchdog_sysctl_init(void)