Received: by 2002:a05:7412:b995:b0:f9:9502:5bb8 with SMTP id it21csp7762675rdb; Thu, 4 Jan 2024 07:03:44 -0800 (PST) X-Google-Smtp-Source: AGHT+IG5HCTwozIwGfCS3vLCyEWj0fl+ttajbTOlxI8q9psuj60DP7b4HtWsPYHeL2/Tz/KhnFEV X-Received: by 2002:a05:6102:c14:b0:467:ac4f:19fe with SMTP id x20-20020a0561020c1400b00467ac4f19femr285272vss.1.1704380624215; Thu, 04 Jan 2024 07:03:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1704380624; cv=none; d=google.com; s=arc-20160816; b=qwvs/7Wkgqk5Xohq2VpLLXHGHnrXQTW0lGr8hbqLwYb5KslrCChQbNQDbxcwHDBCJ5 azVkSLZy7L3bNDVO9RtO3dTITjIbYqwyEUizDiBskH2m6RmHAo0nGUEFX7Mhfjc4xz6Z ZrtYGKoMKrfA20ZSbSxHmpVh8fu8FPWvSY9gW5hkS7V0EshaEQbh82x2yJKG7l44+ij4 JGZccZ/NldQqx/sYMv/rusui+QelEvchggCmJj8ReNXN3sz1F01xiiuBMVnD8tD/U7jj AzVSRNF8ZKqnXaq+AQA1VW6hBYTFqQP6GLnoBd22VLnDHJLbw4odiBhcr7lSayg6khxh 1R+w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=reply-to:cc:to:in-reply-to:references:message-id :content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:subject:date:from:dkim-signature; bh=6QL7eYqrKIN/uVEvxl919JwJSfhW+JUrdrADH/lfG2w=; fh=AuaFKPUwFYzSLqc7bUwLZldSXfNG4AOo7Dj5zlnvlas=; b=Z9wHpmdqF4p27ehxc7DWzOZgnqDcRJgYAho0TrSKQ/yJpO89MsPeh9gEQfJMfsP38U 8VCjjWgSg+3lk8ce+A4AtWq3q1CNweyowqp6KJ7vMNRY4wO/mA9ogQP7hF7gaPa9X/R8 gpi9t5lbXtgwhhkXAbq73B1IxG3qNVf2faXc5kUiYs4Gn+CoP8rxdLtCCF5I2G6aBp6G 4YvuXw56x6tympWTLk4c5OXDrbBtk+3Qf6IrYqBbfR2ysoXrITHx8R3bGEHlzirw5jAo K87Z/hBLeVY/9KO4tGcoWGcSQ1urNrGlA8RPlMjeaGRbazVkx3uy3CFg+EVELqqr/j8I LU4A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=RU9Eafr0; spf=pass (google.com: domain of linux-kernel+bounces-16820-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-16820-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id g12-20020a67cf8c000000b00466feccad72si2391607vsm.1.2024.01.04.07.03.44 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 04 Jan 2024 07:03:44 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-16820-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=RU9Eafr0; spf=pass (google.com: domain of linux-kernel+bounces-16820-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-16820-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id DD3941C22082 for ; Thu, 4 Jan 2024 15:03:43 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id A522924B27; Thu, 4 Jan 2024 15:02:46 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="RU9Eafr0" X-Original-To: linux-kernel@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C0983224CC; Thu, 4 Jan 2024 15:02:45 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPS id 35337C4339A; Thu, 4 Jan 2024 15:02:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1704380565; bh=XVTVEnd60wx8H+Ad0dNvb1xxvZOqQb2Tr7BI7+t30u4=; h=From:Date:Subject:References:In-Reply-To:To:Cc:Reply-To:From; b=RU9Eafr0Kqo4RKrCww3sae4Td1aTahO5kudHxXLg5AVhmZn2r4qaq8jW0K8XWl0XX dqeFgpX/DwSDD1xamPf/GrArJHyQ2savtiVC3HjTjkmBfjhzif8KyW1NSInQADlHe+ bQDH2XJYX7vEt78RkYxNdVfWl+6ht9Ko7s7i7XUPJFhI0yae9IMOEWAauTuKqiP23Q AB73Gh/umvc/wzPDs1PV9KGubwiTOWaIXokrtellmLi9/VdgKA7TxX57QqczXIciEU 7rP3cjnxXh71mDJs4/IJlnBUGiSwnNmApjMcfBMtSPBARywctC6qpSBmkiT0Wz79us p7A2amKaP6gTg== Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 15455C47079; Thu, 4 Jan 2024 15:02:45 +0000 (UTC) From: Joel Granados via B4 Relay Date: Thu, 04 Jan 2024 16:02:22 +0100 Subject: [PATCH v2 01/10] kernel misc: Remove the now superfluous sentinel elements from ctl_table array Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Message-Id: <20240104-jag-sysctl_remove_empty_elem_kernel-v2-1-836cc04e00ec@samsung.com> References: <20240104-jag-sysctl_remove_empty_elem_kernel-v2-0-836cc04e00ec@samsung.com> In-Reply-To: <20240104-jag-sysctl_remove_empty_elem_kernel-v2-0-836cc04e00ec@samsung.com> To: Luis Chamberlain , willy@infradead.org, josh@joshtriplett.org, Kees Cook , Eric Biederman , Iurii Zaikin , Steven Rostedt , Masami Hiramatsu , Mark Rutland , Thomas Gleixner , John Stultz , Stephen Boyd , Andy Lutomirski , Will Drewry , Ingo Molnar , Peter Zijlstra , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Ben Segall , Mel Gorman , Daniel Bristot de Oliveira , Valentin Schneider , Petr Mladek , John Ogness , Sergey Senozhatsky , "Naveen N. Rao" , Anil S Keshavamurthy , "David S. Miller" , Balbir Singh , Alexei Starovoitov , Daniel Borkmann , John Fastabend , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa Cc: linux-kernel@vger.kernel.org, kexec@lists.infradead.org, linux-fsdevel@vger.kernel.org, linux-trace-kernel@vger.kernel.org, bpf@vger.kernel.org, Joel Granados X-Mailer: b4 0.13-dev-86aa5 X-Developer-Signature: v=1; a=openpgp-sha256; l=6860; i=j.granados@samsung.com; h=from:subject:message-id; bh=9y/8jqGpr0uVWev1c4hW4nQ9TJl7X4avnCKgEoLCTzQ=; b=owEB7QES/pANAwAKAbqXzVK3lkFPAcsmYgBllsiPRM7mB48cdaH4nQnPyF9iy9pYW9CxOJKm3 kDa/TOC0gaJAbMEAAEKAB0WIQSuRwlXJeYxJc7LJ5C6l81St5ZBTwUCZZbIjwAKCRC6l81St5ZB TzPoC/9VT5bMn3OhVKB8HDRtqdmyLuiComykbikhloBWiRHKUY9vDUs0WKa9tF2gmiuc30kq3th d6ZBi1vEpe2thmpoImmvAY6jT127nZoZprHHeo8eF9UNmw5WtvR8qd4UOl+dC92cYYhoZSUlnHW yYIefLBb+XCU9J3nmMGJ/NGJcHbCVrfghgZrQ6j3B0V/5IHw87pWFti8UHg2c/SHWPvO4O+hIef 7OzrR7QZ/qrBfw54tHZ2Zr0K9KE92MmYJxsy0RQ/IjcDz/gky8Uv8bzokamzoEC85rm/cNiIMLm 5VJvXhFRir30/jXn7FAX7IP9L4m3JMYXvVCUAKOhjLnVnFeadVl/mGMzl/iSCJWCSFN2y6Oy1qN TccAkTlbsyTxB1eHhAaKvg9P6T0yxkubpGcITfDt5f9rjzqLP+Q1epc3J1w+kaunhXkB0C1muYC sTpNeugjzzp9UwY7j4zqdVSRz9bZ3YAnY/LKvlIDhaZxNhBS9W54rOKNmV/Amio0DJeKg= X-Developer-Key: i=j.granados@samsung.com; a=openpgp; fpr=F1F8E46D30F0F6C4A45FF4465895FAAC338C6E77 X-Endpoint-Received: by B4 Relay for j.granados@samsung.com/default with auth_id=70 X-Original-From: Joel Granados Reply-To: From: Joel Granados This commit comes at the tail end of a greater effort to remove the empty elements at the end of the ctl_table arrays (sentinels) which will reduce the overall build time size of the kernel and run time memory bloat by ~64 bytes per sentinel (further information Link : https://lore.kernel.org/all/ZO5Yx5JFogGi%2FcBo@bombadil.infradead.org/) Remove the sentinel from ctl_table arrays. Reduce by one the values used to compare the size of the adjusted arrays. Signed-off-by: Joel Granados --- kernel/acct.c | 1 - kernel/exit.c | 1 - kernel/hung_task.c | 1 - kernel/kexec_core.c | 1 - kernel/latencytop.c | 1 - kernel/panic.c | 1 - kernel/pid_namespace.c | 1 - kernel/pid_sysctl.h | 1 - kernel/reboot.c | 1 - kernel/signal.c | 1 - kernel/stackleak.c | 1 - kernel/sysctl.c | 2 -- kernel/ucount.c | 3 +-- kernel/utsname_sysctl.c | 1 - kernel/watchdog.c | 2 -- 15 files changed, 1 insertion(+), 18 deletions(-) diff --git a/kernel/acct.c b/kernel/acct.c index 986c8214dabf..179848ad33e9 100644 --- a/kernel/acct.c +++ b/kernel/acct.c @@ -84,7 +84,6 @@ static struct ctl_table kern_acct_table[] = { .mode = 0644, .proc_handler = proc_dointvec, }, - { } }; static __init int kernel_acct_sysctls_init(void) diff --git a/kernel/exit.c b/kernel/exit.c index aedc0832c9f4..6a6ea468a0c6 100644 --- a/kernel/exit.c +++ b/kernel/exit.c @@ -92,7 +92,6 @@ static struct ctl_table kern_exit_table[] = { .mode = 0644, .proc_handler = proc_douintvec, }, - { } }; static __init int kernel_exit_sysctls_init(void) diff --git a/kernel/hung_task.c b/kernel/hung_task.c index 9a24574988d2..a81cb511d954 100644 --- a/kernel/hung_task.c +++ b/kernel/hung_task.c @@ -313,7 +313,6 @@ static struct ctl_table hung_task_sysctls[] = { .proc_handler = proc_dointvec_minmax, .extra1 = SYSCTL_NEG_ONE, }, - {} }; static void __init hung_task_sysctl_init(void) diff --git a/kernel/kexec_core.c b/kernel/kexec_core.c index be5642a4ec49..b862285b97dc 100644 --- a/kernel/kexec_core.c +++ b/kernel/kexec_core.c @@ -988,7 +988,6 @@ static struct ctl_table kexec_core_sysctls[] = { .mode = 0644, .proc_handler = kexec_limit_handler, }, - { } }; static int __init kexec_core_sysctl_init(void) diff --git a/kernel/latencytop.c b/kernel/latencytop.c index 781249098cb6..84c53285f499 100644 --- a/kernel/latencytop.c +++ b/kernel/latencytop.c @@ -85,7 +85,6 @@ static struct ctl_table latencytop_sysctl[] = { .mode = 0644, .proc_handler = sysctl_latencytop, }, - {} }; #endif diff --git a/kernel/panic.c b/kernel/panic.c index 2807639aab51..01a82cdfd81a 100644 --- a/kernel/panic.c +++ b/kernel/panic.c @@ -99,7 +99,6 @@ static struct ctl_table kern_panic_table[] = { .mode = 0644, .proc_handler = proc_douintvec, }, - { } }; static __init int kernel_panic_sysctls_init(void) diff --git a/kernel/pid_namespace.c b/kernel/pid_namespace.c index 3028b2218aa4..ca4fbba09d38 100644 --- a/kernel/pid_namespace.c +++ b/kernel/pid_namespace.c @@ -306,7 +306,6 @@ static struct ctl_table pid_ns_ctl_table[] = { .extra1 = SYSCTL_ZERO, .extra2 = &pid_max, }, - { } }; #endif /* CONFIG_CHECKPOINT_RESTORE */ diff --git a/kernel/pid_sysctl.h b/kernel/pid_sysctl.h index 2ee41a3a1dfd..fe9fb991dc42 100644 --- a/kernel/pid_sysctl.h +++ b/kernel/pid_sysctl.h @@ -41,7 +41,6 @@ static struct ctl_table pid_ns_ctl_table_vm[] = { .extra1 = SYSCTL_ZERO, .extra2 = SYSCTL_TWO, }, - { } }; static inline void register_pid_ns_sysctl_table_vm(void) { diff --git a/kernel/reboot.c b/kernel/reboot.c index 395a0ea3c7a8..1c3b2dfc42a9 100644 --- a/kernel/reboot.c +++ b/kernel/reboot.c @@ -1276,7 +1276,6 @@ static struct ctl_table kern_reboot_table[] = { .mode = 0644, .proc_handler = proc_dointvec, }, - { } }; static void __init kernel_reboot_sysctls_init(void) diff --git a/kernel/signal.c b/kernel/signal.c index 47a7602dfe8d..737b0e630ed7 100644 --- a/kernel/signal.c +++ b/kernel/signal.c @@ -4812,7 +4812,6 @@ static struct ctl_table signal_debug_table[] = { .proc_handler = proc_dointvec }, #endif - { } }; static int __init init_signal_sysctls(void) diff --git a/kernel/stackleak.c b/kernel/stackleak.c index 34c9d81eea94..d099f3affcf1 100644 --- a/kernel/stackleak.c +++ b/kernel/stackleak.c @@ -54,7 +54,6 @@ static struct ctl_table stackleak_sysctls[] = { .extra1 = SYSCTL_ZERO, .extra2 = SYSCTL_ONE, }, - {} }; static int __init stackleak_sysctls_init(void) diff --git a/kernel/sysctl.c b/kernel/sysctl.c index 157f7ce2942d..ad61cf11922c 100644 --- a/kernel/sysctl.c +++ b/kernel/sysctl.c @@ -2034,7 +2034,6 @@ static struct ctl_table kern_table[] = { .extra2 = SYSCTL_INT_MAX, }, #endif - { } }; static struct ctl_table vm_table[] = { @@ -2240,7 +2239,6 @@ static struct ctl_table vm_table[] = { .extra2 = (void *)&mmap_rnd_compat_bits_max, }, #endif - { } }; int __init sysctl_init_bases(void) diff --git a/kernel/ucount.c b/kernel/ucount.c index 4aa6166cb856..e196da0204dc 100644 --- a/kernel/ucount.c +++ b/kernel/ucount.c @@ -87,7 +87,6 @@ static struct ctl_table user_table[] = { UCOUNT_ENTRY("max_fanotify_groups"), UCOUNT_ENTRY("max_fanotify_marks"), #endif - { } }; #endif /* CONFIG_SYSCTL */ @@ -96,7 +95,7 @@ bool setup_userns_sysctls(struct user_namespace *ns) #ifdef CONFIG_SYSCTL struct ctl_table *tbl; - BUILD_BUG_ON(ARRAY_SIZE(user_table) != UCOUNT_COUNTS + 1); + BUILD_BUG_ON(ARRAY_SIZE(user_table) != UCOUNT_COUNTS); setup_sysctl_set(&ns->set, &set_root, set_is_seen); tbl = kmemdup(user_table, sizeof(user_table), GFP_KERNEL); if (tbl) { diff --git a/kernel/utsname_sysctl.c b/kernel/utsname_sysctl.c index 019e3a1566cf..76a772072557 100644 --- a/kernel/utsname_sysctl.c +++ b/kernel/utsname_sysctl.c @@ -120,7 +120,6 @@ static struct ctl_table uts_kern_table[] = { .proc_handler = proc_do_uts_string, .poll = &domainname_poll, }, - {} }; #ifdef CONFIG_PROC_SYSCTL diff --git a/kernel/watchdog.c b/kernel/watchdog.c index 5cd6d4e26915..0f546d17c544 100644 --- a/kernel/watchdog.c +++ b/kernel/watchdog.c @@ -924,7 +924,6 @@ static struct ctl_table watchdog_sysctls[] = { }, #endif /* CONFIG_SMP */ #endif - {} }; static struct ctl_table watchdog_hardlockup_sysctl[] = { @@ -937,7 +936,6 @@ static struct ctl_table watchdog_hardlockup_sysctl[] = { .extra1 = SYSCTL_ZERO, .extra2 = SYSCTL_ONE, }, - {} }; static void __init watchdog_sysctl_init(void) -- 2.30.2