In order to eliminate the duplicate code for registering the sysctl interface during the initialization of each feature, add the register_sysctl_init() interface Signed-off-by: Xiaoming Ni <nixiaoming@xxxxxxxxxx> --- include/linux/sysctl.h | 2 ++ kernel/hung_task_sysctl.c | 15 +-------------- kernel/sysctl.c | 19 +++++++++++++++++++ kernel/watchdog.c | 18 +----------------- 4 files changed, 23 insertions(+), 31 deletions(-) diff --git a/include/linux/sysctl.h b/include/linux/sysctl.h index 6d741d6..3cdbe89 100644 --- a/include/linux/sysctl.h +++ b/include/linux/sysctl.h @@ -207,6 +207,8 @@ struct ctl_table_header *register_sysctl_paths(const struct ctl_path *path, void unregister_sysctl_table(struct ctl_table_header * table); extern int sysctl_init(void); +extern void register_sysctl_init(const char *path, struct ctl_table *table, + const char *table_name); extern struct ctl_table sysctl_mount_point[]; diff --git a/kernel/hung_task_sysctl.c b/kernel/hung_task_sysctl.c index 62a51f5..14d2ed6 100644 --- a/kernel/hung_task_sysctl.c +++ b/kernel/hung_task_sysctl.c @@ -59,21 +59,8 @@ {} }; -/* - * The hung task sysctl has a default value. - * Even if register_sysctl() fails, it does not affect the main function of - * the hung task. At the same time, during the system initialization phase, - * malloc small memory will almost never fail. - * So the return value is ignored here - */ void __init hung_task_sysctl_init(void) { - struct ctl_table_header *srt = register_sysctl("kernel", hung_task_sysctls); - - if (unlikely(!srt)) { - pr_err("%s fail\n", __func__); - return; - } - kmemleak_not_leak(srt); + register_sysctl_init("kernel", hung_task_sysctls, "hung_task_sysctls"); } diff --git a/kernel/sysctl.c b/kernel/sysctl.c index e394990..0a09742 100644 --- a/kernel/sysctl.c +++ b/kernel/sysctl.c @@ -1823,6 +1823,25 @@ int __init sysctl_init(void) return 0; } +/* + * The sysctl interface is used to modify the interface value, + * but the feature interface has default values. Even if register_sysctl fails, + * the feature body function can also run. At the same time, malloc small + * fragment of memory during the system initialization phase, almost does + * not fail. Therefore, the function return is designed as void + */ +void __init register_sysctl_init(const char *path, struct ctl_table *table, + const char *table_name) +{ + struct ctl_table_header *hdr = register_sysctl(path, table); + + if (unlikely(!hdr)) { + pr_err("failed when register_sysctl %s to %s\n", table_name, path); + return; + } + kmemleak_not_leak(hdr); +} + #endif /* CONFIG_SYSCTL */ /* diff --git a/kernel/watchdog.c b/kernel/watchdog.c index 05e1d58..c1bebb1 100644 --- a/kernel/watchdog.c +++ b/kernel/watchdog.c @@ -23,9 +23,6 @@ #include <linux/sched/debug.h> #include <linux/sched/isolation.h> #include <linux/stop_machine.h> -#ifdef CONFIG_SYSCTL -#include <linux/kmemleak.h> -#endif #include <asm/irq_regs.h> #include <linux/kvm_para.h> @@ -853,22 +850,9 @@ int proc_watchdog_cpumask(struct ctl_table *table, int write, {} }; -/* - * The watchdog sysctl has a default value. - * Even if register_sysctl() fails, it does not affect the main function of - * the watchdog. At the same time, during the system initialization phase, - * malloc small memory will almost never fail. - * So the return value is ignored here - */ static void __init watchdog_sysctl_init(void) { - struct ctl_table_header *p = register_sysctl("kernel", watchdog_sysctls); - - if (unlikely(!p)) { - pr_err("%s fail\n", __func__); - return; - } - kmemleak_not_leak(p); + register_sysctl_init("kernel", watchdog_sysctls, "watchdog_sysctls"); } #else #define watchdog_sysctl_init() do { } while (0) -- 1.8.5.6