Received: by 2002:ab2:60d1:0:b0:1f7:5705:b850 with SMTP id i17csp349737lqm; Wed, 1 May 2024 02:30:23 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCWnnRV5rIl9jecAYRzlgG/pEnRiYf978PkowlASQ7/BkFySB2rBAqU/JKkYpPMflzM8tl2x0VfS9ml5MTuxw/bFxOLW4DUEMelqKHcTCg== X-Google-Smtp-Source: AGHT+IEjKnAFUM73W5NJwIwn7o++yTiuxOM15jxhHu7HbJFsmUJXFxi9yqutQDzZoi4fa0xGpjT5 X-Received: by 2002:a17:902:ec85:b0:1ea:b125:befa with SMTP id x5-20020a170902ec8500b001eab125befamr2073674plg.55.1714555823638; Wed, 01 May 2024 02:30:23 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1714555823; cv=pass; d=google.com; s=arc-20160816; b=ULj9xemjGMn1rgVDEN3NYD3AeLToTX24+xXw5VKrrr6ZbrJdIBcv862nRfSgk3OByu hiaY9Wi9n+2qmJ75vBcchDr7GFH/QCDWq77Qx4zRbSf1QgCmj0jjoHq5eOFk8PtKcEEr 2d6tf/t2lYZItsIcjuqYO6t9gqE9CWOV0JG+TxgZ7D7/jOqh/Xv3G8TovVagEjHzNBhp VynQlG8cOZumgQDUpnpRLTzp3W1gGZxxtkiNJwvI5zWsTGGtHQH+KxGoqZoX5SymlAoE 5Scxfz0XF6rCL7VlH2W997pUNArOjOz733Hm7SDQVwCdCqjp5u5QXw4Yf9MwXrcXH/1D /xGA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=reply-to:cc:to:content-transfer-encoding:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:message-id:date :subject:from:dkim-signature; bh=rmxStFvCqlbYA5nTosV8gPw9lRsbVj14kj26y700w7E=; fh=5g1ykxCv7ojYBYHK3aM7cpTkEd6dkeVMOJWUsjMgiIo=; b=DWDZmwNiYOej05zUqLY3sGzGcvJb00Jhxe14rfKmDZxQ3uozSNCN1i7Ru5uvTkGY0N HcwsEBwSBID8DEXkYwhC8ZGoxQEF/a0OPSRudH5ddC/uTh00A50cjjo6VF7PL07RSNe0 9EeepHMc+/gwn+zoaecZAXJL5CLB/MGkhiQH5pgUc1OeP4MbexuBCWcBRsIeJI2Rqidw ry8A917/7jCpjlXqoipNxBjtu6fuf6Hcop8gD3jXJEDn66BmEM4AdLvJ/91DIaBVXh/P eZ6ZVSYsKDMgdJCzrfPctBkeVs67rLk6MwqRY3/M70bl57V3ox5vupuuS1zc9RXpjvdc sX8g==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ehO7+oA8; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-nfs+bounces-3109-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-nfs+bounces-3109-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [2604:1380:40f1:3f00::1]) by mx.google.com with ESMTPS id e14-20020a170903240e00b001e797d47ee3si21757076plo.76.2024.05.01.02.30.23 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 01 May 2024 02:30:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs+bounces-3109-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) client-ip=2604:1380:40f1:3f00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ehO7+oA8; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-nfs+bounces-3109-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-nfs+bounces-3109-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 2DAEBB21578 for ; Wed, 1 May 2024 09:30:21 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 96A6F524C4; Wed, 1 May 2024 09:30:09 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="ehO7+oA8" X-Original-To: linux-nfs@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 267D9502AC; Wed, 1 May 2024 09:30:08 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714555809; cv=none; b=pigoKpnH5BWB/MdrLdVazV1SAsJ7Sab42FedulYN0zxdBJ8O5GlgKsYB6nePXG7sVBHmj9hXSMzFbzz0M2hoYt5KxKC5czTX0kZ5f9OiTHRrZAHZXrMYFUnjr3zBgtWHy/Q0wX5wEzvOnodqEa2bIA2WJ1aKE4LKUHCFWER7StA= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714555809; c=relaxed/simple; bh=U+fp0NCvRQA/VQfDZyEv4EVJJSOhTrhYe3rvwmsw39I=; h=From:Subject:Date:Message-Id:MIME-Version:Content-Type:To:Cc; b=GiJBd5BzU0f7aBSb3kgradM43wbIqGqWMqRn0xUIjWMYFMs/+pAxXwxl7qlDqQjCLFLL7+LSF9sX0LU5D5GA/UGOyStomHKPqOuvxj3fxiCX8/u3nlw56tkubmulHk1Te//W1+LDrK56P2DwHW33Asu2qSXSb6gBk3DMdbQGEyA= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=ehO7+oA8; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPS id 93733C4AF14; Wed, 1 May 2024 09:30:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1714555808; bh=U+fp0NCvRQA/VQfDZyEv4EVJJSOhTrhYe3rvwmsw39I=; h=From:Subject:Date:To:Cc:Reply-To:From; b=ehO7+oA8MnpQv3d2J4ICWhiZ9CCsFF7SSQbMX02LcF80fsd77pg0ap1TF81Ov0Iwe uYTVfC8p3+LmxMdWOlRQrtyyoeDYoRnhFZm5kxLnkS5oqt9zqaYzN4/pAV+lMUjlnr 7yLDX4ubxJnPFEJcWVaQqDu6q61WuM+pdyivcXAbchDmPLxAWrdoB9gqfBFiAidUTP 5Qxl5fa3IAintKxe/MiL0IjxNCNJM7HIKErRu7q/6WaUsJmvLrSz/pn1mrh/QOfw7M bNhowCOIOmiH9D+OhWkrJjzPWXJks4iC33QMzibU+z7Gd3zvM5/04c+gEN65bedXWs C+cWGVfQ6ysYA== Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7A31BC4345F; Wed, 1 May 2024 09:30:08 +0000 (UTC) From: Joel Granados via B4 Relay Subject: [PATCH net-next v6 0/8] sysctl: Remove sentinel elements from networking Date: Wed, 01 May 2024 11:29:24 +0200 Message-Id: <20240501-jag-sysctl_remset_net-v6-0-370b702b6b4a@samsung.com> Precedence: bulk X-Mailing-List: linux-nfs@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-B4-Tracking: v=1; b=H4sIAHULMmYC/3XO3WqEMBAF4FdZct0UZ/Kj2au+RylLNKObUrWYV HZZfPdOpVCLeDmcmW/OQySaIiVxPj3ERHNMcRx4sE8n0Vz90JGMgWeBBepCAch338l0T03+uEz UJ8qXgbIMHHrwTgVbC779nKiNt9V9FT8LA92yeOPkGlMep/v6cIY1/7X1gT2DLKT3aGutA7rgX pLv09fQPTdjv5ozbhysjhxkx2DjWh8cl233jvpzNOCRo9gBgKoMoBoE2Dt646A5cjQ7jipsXWX Ksgx7x2wde+QYdkjVgK3lWt7+d5Zl+QZSV2YR5gEAAA== To: "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Alexander Aring , Stefan Schmidt , Miquel Raynal , David Ahern , Steffen Klassert , Herbert Xu , Matthieu Baerts , Mat Martineau , Geliang Tang , Ralf Baechle , Remi Denis-Courmont , Allison Henderson , David Howells , Marc Dionne , Marcelo Ricardo Leitner , Xin Long , Wenjia Zhang , Jan Karcher , "D. Wythe" , Tony Lu , Wen Gu , Trond Myklebust , Anna Schumaker , Chuck Lever , Jeff Layton , Neil Brown , Olga Kornievskaia , Dai Ngo , Tom Talpey , Jon Maloy , Ying Xue , Martin Schiller , Pablo Neira Ayuso , Jozsef Kadlecsik , Florian Westphal , Roopa Prabhu , Nikolay Aleksandrov , Simon Horman , Julian Anastasov , Joerg Reuter , Luis Chamberlain , Kees Cook Cc: netdev@vger.kernel.org, linux-kernel@vger.kernel.org, dccp@vger.kernel.org, linux-wpan@vger.kernel.org, mptcp@lists.linux.dev, linux-hams@vger.kernel.org, linux-rdma@vger.kernel.org, rds-devel@oss.oracle.com, linux-afs@lists.infradead.org, linux-sctp@vger.kernel.org, linux-s390@vger.kernel.org, linux-nfs@vger.kernel.org, tipc-discussion@lists.sourceforge.net, linux-x25@vger.kernel.org, netfilter-devel@vger.kernel.org, coreteam@netfilter.org, bridge@lists.linux.dev, lvs-devel@vger.kernel.org, Joel Granados X-Mailer: b4 0.13-dev-2d940 X-Developer-Signature: v=1; a=openpgp-sha256; l=16255; i=j.granados@samsung.com; h=from:subject:message-id; bh=Ex95kiaNjDMI8AmLp4Ar2dajO1Rh4yJWTrLmopWKeYk=; b=owJ4nAHtARL+kA0DAAoBupfNUreWQU8ByyZiAGYyC5rzgGzYYniA6SrIUBpx2xHAvTry3olsf Wfn7GEbR7HWxYkBswQAAQoAHRYhBK5HCVcl5jElzssnkLqXzVK3lkFPBQJmMguaAAoJELqXzVK3 lkFPsWAMAI9T5jTMI27oz0wvNz1D23W9kQXS2RO6sp3hRRdvDHA4rIQ9AgBHF8ScWGI9tGGPBot D2Y7/mqU1fNhFu2nxlxiDC0KNKDduXrGakmNfdXdCJ7/4mNl07LYOdWl/XSSOp0AJT99mcVbwpb 4P1F9Ot3d81A6NuOijNGkSj0zYNeDQPquGfvZ0Y146myxafru5VE5ygye1d3g3LWdSNEYgGkTZ3 xCM05PUlaMLXVKcS01m6FP1RfXD4ycJWPFYhNFa/Mp3qs8JHYkFLoNCtYmfhNcM3CDXqnz1SVoi M+IcqGgbVZrNT+DK69xcb/sDmq+4EWwg5UhH0SNzIXENlfyIZnyJ7bcKnwH/kU09gRuWXib9+I2 pvuCPWu9/PHQkiWog8nofDO6I83YQK1ZOTLC3MufkKz53nHtIl9UJF5F2EOakhPImsYmDy1FZ43 +b4C6kndWlvvqQZ+pZO+zRr5vUWeGfNUx4wZ3WQmGXuyBJZbUOrJvZ9kV6A5Itjhn1QstdFvmF5 7M= X-Developer-Key: i=j.granados@samsung.com; a=openpgp; fpr=F1F8E46D30F0F6C4A45FF4465895FAAC338C6E77 X-Endpoint-Received: by B4 Relay for j.granados@samsung.com/default with auth_id=70 X-Original-From: Joel Granados Reply-To: j.granados@samsung.com From: Joel Granados What? These commits remove the sentinel element (last empty element) from the sysctl arrays of all the files under the "net/" directory that register a sysctl array. The merging of the preparation patches [4] to mainline allows us to just remove sentinel elements without changing behavior. This is safe because the sysctl registration code (register_sysctl() and friends) use the array size in addition to checking for a sentinel [1]. Why? By removing the sysctl sentinel elements we avoid kernel bloat as ctl_table arrays get moved out of kernel/sysctl.c into their own respective subsystems. This move was started long ago to avoid merge conflicts; the sentinel removal bit came after Mathew Wilcox suggested it to avoid bloating the kernel by one element as arrays moved out. This patchset will reduce the overall build time size of the kernel and run time memory bloat by about ~64 bytes per declared ctl_table array (more info here [5]). When are we done? There are 4 patchest (25 commits [2]) that are still outstanding to completely remove the sentinels: files under "net/" (this patchset), files under "kernel/" dir, misc dirs (files under mm/ security/ and others) and the final set that removes the unneeded check for ->procname == NULL. Testing: * Ran sysctl selftests (./tools/testing/selftests/sysctl/sysctl.sh) * Ran this through 0-day with no errors or warnings Savings in vmlinux: A total of 64 bytes per sentinel is saved after removal; I measured in x86_64 to give an idea of the aggregated savings. The actual savings will depend on individual kernel configuration. * bloat-o-meter - The "yesall" config saves 3976 bytes (bloat-o-meter output [6]) - A reduced config [3] saves 1263 bytes (bloat-o-meter output [7]) Savings in allocated memory: None in this set but will occur when the superfluous allocations are removed from proc_sysctl.c. I include it here for context. The estimated savings during boot for config [3] are 6272 bytes. See [8] for how to measure it. Comments/feedback greatly appreciated Changes in v6: - Rebased onto net-next/main. - Besides re-running my cocci scripts, I ran a new find script [9]. Found 0 hits in net/ - Moved "i" variable declaraction out of for() in sysctl_core_net_init - Removed forgotten sentinel in mpls_table - Removed CONFIG_AX25_DAMA_SLAVE guard from net/ax25/ax25_ds_timer.c. It is not needed because that file is compiled only when CONFIG_AX25_DAMA_SLAVE is set. - When traversing smc_table, stop on ARRAY_SIZE instead of ARRAY_SIZE-1. - Link to v5: https://lore.kernel.org/r/20240426-jag-sysctl_remset_net-v5-0-e3b12f6111a6@samsung.com Changes in v5: - Added net files with additional variable to my test .config so the typo can be caught next time. - Fixed typo tabel_size -> table_size - Link to v4: https://lore.kernel.org/r/20240425-jag-sysctl_remset_net-v4-0-9e82f985777d@samsung.com Changes in v4: - Keep reverse xmas tree order when introducing new variables - Use a table_size variable to keep the value of ARRAY_SIZE - Separated the original "networking: Remove the now superfluous sentinel elements from ctl_table arra" into smaller commits to ease review - Merged x.25 and ax.25 commits together. - Removed any SOB from the commits that were changed - Link to v3: https://lore.kernel.org/r/20240412-jag-sysctl_remset_net-v3-0-11187d13c211@samsung.com Changes in v3: - Reworkded ax.25 - Added a BUILD_BUG_ON for the ax.25 commit - Added a CONFIG_AX25_DAMA_SLAVE guard where needed - Link to v2: https://lore.kernel.org/r/20240328-jag-sysctl_remset_net-v2-0-52c9fad9a1af@samsung.com Changes in v2: - Rebased to v6.9-rc1 - Removed unneeded comment from sysctl_net_ax25.c - Link to v1: https://lore.kernel.org/r/20240314-jag-sysctl_remset_net-v1-0-aa26b44d29d9@samsung.com Best Joel [1] https://lore.kernel.org/all/20230809105006.1198165-1-j.granados@samsung.com/ [2] https://git.kernel.org/pub/scm/linux/kernel/git/joel.granados/linux.git/tag/?h=sysctl_remove_empty_elem_v5 [3] https://gist.github.com/Joelgranados/feaca7af5537156ca9b73aeaec093171 [4] https://lore.kernel.org/all/ZO5Yx5JFogGi%2FcBo@bombadil.infradead.org/ [5] Links Related to the ctl_table sentinel removal: * Good summaries from Luis: https://lore.kernel.org/all/ZO5Yx5JFogGi%2FcBo@bombadil.infradead.org/ https://lore.kernel.org/all/ZMFizKFkVxUFtSqa@bombadil.infradead.org/ * Patches adjusting sysctl register calls: https://lore.kernel.org/all/20230302204612.782387-1-mcgrof@kernel.org/ https://lore.kernel.org/all/20230302202826.776286-1-mcgrof@kernel.org/ * Discussions about expectations and approach https://lore.kernel.org/all/20230321130908.6972-1-frank.li@vivo.com https://lore.kernel.org/all/20220220060626.15885-1-tangmeng@uniontech.com [6] add/remove: 0/1 grow/shrink: 2/67 up/down: 76/-4052 (-3976) Function old new delta llc_sysctl_init 306 377 +71 nf_log_net_init 866 871 +5 sysctl_core_net_init 375 366 -9 lowpan_frags_init_net 618 598 -20 ip_vs_control_net_init_sysctl 2446 2422 -24 sysctl_route_net_init 521 493 -28 __addrconf_sysctl_register 678 650 -28 xfrm_sysctl_init 405 374 -31 mpls_net_init 367 334 -33 sctp_sysctl_net_register 386 346 -40 __ip_vs_lblcr_init 546 501 -45 __ip_vs_lblc_init 546 501 -45 neigh_sysctl_register 1011 958 -53 mpls_dev_sysctl_register 475 419 -56 ipv6_route_sysctl_init 450 394 -56 xs_tunables_table 448 384 -64 xr_tunables_table 448 384 -64 xfrm_table 320 256 -64 xfrm6_policy_table 128 64 -64 xfrm4_policy_table 128 64 -64 x25_table 448 384 -64 vs_vars 1984 1920 -64 unix_table 128 64 -64 tipc_table 448 384 -64 svcrdma_parm_table 832 768 -64 smc_table 512 448 -64 sctp_table 256 192 -64 sctp_net_table 2304 2240 -64 rxrpc_sysctl_table 704 640 -64 rose_table 704 640 -64 rds_tcp_sysctl_table 192 128 -64 rds_sysctl_rds_table 384 320 -64 rds_ib_sysctl_table 384 320 -64 phonet_table 128 64 -64 nr_table 832 768 -64 nf_log_sysctl_table 768 704 -64 nf_log_sysctl_ftable 128 64 -64 nf_ct_sysctl_table 3200 3136 -64 nf_ct_netfilter_table 128 64 -64 nf_ct_frag6_sysctl_table 256 192 -64 netns_core_table 320 256 -64 net_core_table 2176 2112 -64 neigh_sysctl_template 1416 1352 -64 mptcp_sysctl_table 576 512 -64 mpls_dev_table 128 64 -64 lowpan_frags_ns_ctl_table 256 192 -64 lowpan_frags_ctl_table 128 64 -64 llc_station_table 64 - -64 llc2_timeout_table 320 256 -64 ipv6_table_template 1344 1280 -64 ipv6_route_table_template 768 704 -64 ipv6_rotable 320 256 -64 ipv6_icmp_table_template 448 384 -64 ipv4_table 1024 960 -64 ipv4_route_table 832 768 -64 ipv4_route_netns_table 320 256 -64 ipv4_net_table 7552 7488 -64 ip6_frags_ns_ctl_table 256 192 -64 ip6_frags_ctl_table 128 64 -64 ip4_frags_ns_ctl_table 320 256 -64 ip4_frags_ctl_table 128 64 -64 devinet_sysctl 2184 2120 -64 debug_table 384 320 -64 dccp_default_table 576 512 -64 ctl_forward_entry 128 64 -64 brnf_table 448 384 -64 ax25_param_table 960 896 -64 atalk_table 320 256 -64 addrconf_sysctl 3904 3840 -64 vs_vars_table 256 128 -128 Total: Before=440631035, After=440627059, chg -0.00% [7] add/remove: 0/0 grow/shrink: 1/22 up/down: 8/-1263 (-1255) Function old new delta sysctl_route_net_init 189 197 +8 __addrconf_sysctl_register 306 294 -12 ipv6_route_sysctl_init 201 185 -16 neigh_sysctl_register 385 366 -19 unix_table 128 64 -64 netns_core_table 256 192 -64 net_core_table 1664 1600 -64 neigh_sysctl_template 1416 1352 -64 ipv6_table_template 1344 1280 -64 ipv6_route_table_template 768 704 -64 ipv6_rotable 192 128 -64 ipv6_icmp_table_template 448 384 -64 ipv4_table 768 704 -64 ipv4_route_table 832 768 -64 ipv4_route_netns_table 320 256 -64 ipv4_net_table 7040 6976 -64 ip6_frags_ns_ctl_table 256 192 -64 ip6_frags_ctl_table 128 64 -64 ip4_frags_ns_ctl_table 320 256 -64 ip4_frags_ctl_table 128 64 -64 devinet_sysctl 2184 2120 -64 ctl_forward_entry 128 64 -64 addrconf_sysctl 3392 3328 -64 Total: Before=8523801, After=8522546, chg -0.01% [8] To measure the in memory savings apply this on top of this patchset. " diff --git i/fs/proc/proc_sysctl.c w/fs/proc/proc_sysctl.c index 37cde0efee57..896c498600e8 100644 --- i/fs/proc/proc_sysctl.c +++ w/fs/proc/proc_sysctl.c @@ -966,6 +966,7 @@ static struct ctl_dir *new_dir(struct ctl_table_set *set, table[0].procname = new_name; table[0].mode = S_IFDIR|S_IRUGO|S_IXUGO; init_header(&new->header, set->dir.header.root, set, node, table, 1); + printk("%ld sysctl saved mem kzalloc\n", sizeof(struct ctl_table)); return new; } @@ -1189,6 +1190,7 @@ static struct ctl_table_header *new_links(struct ctl_dir *dir, s> link_name += len; link++; } + printk("%ld sysctl saved mem kzalloc\n", sizeof(struct ctl_table)); init_header(links, dir->header.root, dir->header.set, node, link_table, head->ctl_table_size); links->nreg = nr_entries; " and then run the following bash script in the kernel: ``` accum=0 for n in $(dmesg | grep kzalloc | awk '{print $3}') ; do accum=$(calc "$accum + $n") done echo $accum ``` [9] ``` #!/usr/bin/gawk -f BEGINFILE { RS="," has_struct = 0 } /(static )?(const )?struct ctl_table/ { has_struct = 1 } has_struct && /^(\n)?[\t ]*{(\n)*[\t ]*}/ { print "Filename : " FILENAME ", Record Number : " FNR } ``` Signed-off-by: Joel Granados -- --- --- Joel Granados (8): net: Remove the now superfluous sentinel elements from ctl_table array net: ipv{6,4}: Remove the now superfluous sentinel elements from ctl_table array net: rds: Remove the now superfluous sentinel elements from ctl_table array net: sunrpc: Remove the now superfluous sentinel elements from ctl_table array net: Remove ctl_table sentinel elements from several networking subsystems netfilter: Remove the now superfluous sentinel elements from ctl_table array appletalk: Remove the now superfluous sentinel elements from ctl_table array ax.25: x.25: Remove the now superfluous sentinel elements from ctl_table array include/net/ax25.h | 2 ++ net/appletalk/sysctl_net_atalk.c | 1 - net/ax25/ax25_dev.c | 3 +++ net/ax25/ax25_ds_timer.c | 1 + net/ax25/sysctl_net_ax25.c | 3 +-- net/bridge/br_netfilter_hooks.c | 1 - net/core/neighbour.c | 5 +---- net/core/sysctl_net_core.c | 13 ++++++------- net/dccp/sysctl.c | 2 -- net/ieee802154/6lowpan/reassembly.c | 6 +----- net/ipv4/devinet.c | 5 ++--- net/ipv4/ip_fragment.c | 2 -- net/ipv4/route.c | 8 ++------ net/ipv4/sysctl_net_ipv4.c | 7 +++---- net/ipv4/xfrm4_policy.c | 1 - net/ipv6/addrconf.c | 8 +++----- net/ipv6/icmp.c | 1 - net/ipv6/netfilter/nf_conntrack_reasm.c | 1 - net/ipv6/reassembly.c | 2 -- net/ipv6/route.c | 5 ----- net/ipv6/sysctl_net_ipv6.c | 8 +++----- net/ipv6/xfrm6_policy.c | 1 - net/llc/sysctl_net_llc.c | 8 ++------ net/mpls/af_mpls.c | 13 ++++++------- net/mptcp/ctrl.c | 1 - net/netfilter/ipvs/ip_vs_ctl.c | 5 +---- net/netfilter/ipvs/ip_vs_lblc.c | 5 +---- net/netfilter/ipvs/ip_vs_lblcr.c | 5 +---- net/netfilter/nf_conntrack_standalone.c | 6 +----- net/netfilter/nf_log.c | 3 +-- net/netrom/sysctl_net_netrom.c | 1 - net/phonet/sysctl.c | 1 - net/rds/ib_sysctl.c | 1 - net/rds/sysctl.c | 1 - net/rds/tcp.c | 1 - net/rose/sysctl_net_rose.c | 1 - net/rxrpc/sysctl.c | 1 - net/sctp/sysctl.c | 10 +++------- net/smc/smc_sysctl.c | 6 +++--- net/sunrpc/sysctl.c | 1 - net/sunrpc/xprtrdma/svc_rdma.c | 1 - net/sunrpc/xprtrdma/transport.c | 1 - net/sunrpc/xprtsock.c | 1 - net/tipc/sysctl.c | 1 - net/unix/sysctl_net_unix.c | 1 - net/x25/sysctl_net_x25.c | 1 - net/xfrm/xfrm_sysctl.c | 5 +---- 47 files changed, 48 insertions(+), 119 deletions(-) --- base-commit: c2e6a872bde9912f1a7579639c5ca3adf1003916 change-id: 20240311-jag-sysctl_remset_net-d403a1a93d6b Best regards, -- Joel Granados