The patch titled
     sysctl: allow embedded targets to disable sysctl_check.c
has been added to the -mm tree.  Its filename is
     sysctl-allow-embedded-targets-to-disable-sysctl_checkc.patch

Before you just go and hit "reply", please:
   a) Consider who else should be cc'ed
   b) Prefer to cc a suitable mailing list as well
   c) Ideally: find the original patch on the mailing list and do a
      reply-to-all to that, adding suitable additional cc's

*** Remember to use Documentation/SubmitChecklist when testing your code ***

See http://www.zip.com.au/~akpm/linux/patches/stuff/added-to-mm.txt to find
out what to do about this

The current -mm tree may be found at http://userweb.kernel.org/~akpm/mmotm/

------------------------------------------------------
Subject: sysctl: allow embedded targets to disable sysctl_check.c
From: Holger Schurig <[EMAIL PROTECTED]>

Disable sysctl_check.c for embedded targets. This saves about about 11 kB
in .text and another 11 kB in .data on a PXA255 embedded platform.

Signed-off-by: Holger Schurig <[EMAIL PROTECTED]>
Cc: "Eric W. Biederman" <[EMAIL PROTECTED]>
Signed-off-by: Andrew Morton <[EMAIL PROTECTED]>
---

 init/Kconfig    |   11 +++++++++++
 kernel/Makefile |    2 +-
 kernel/sysctl.c |   10 ++++++++--
 3 files changed, 20 insertions(+), 3 deletions(-)

diff -puN init/Kconfig~sysctl-allow-embedded-targets-to-disable-sysctl_checkc 
init/Kconfig
--- a/init/Kconfig~sysctl-allow-embedded-targets-to-disable-sysctl_checkc
+++ a/init/Kconfig
@@ -511,6 +511,17 @@ config SYSCTL_SYSCALL
 
          If unsure say Y here.
 
+config SYSCTL_SYSCALL_CHECK
+       bool "Sysctl checks" if EMBEDDED
+       depends on SYSCTL_SYSCALL
+       default y
+       ---help---
+         sys_sysctl uses binary paths that have been found challenging
+         to properly maintain and use. This enables checks that help
+         you to keep things correct.
+
+         If unsure say Y here.
+
 config KALLSYMS
         bool "Load all symbols for debugging/ksymoops" if EMBEDDED
         default y
diff -puN 
kernel/Makefile~sysctl-allow-embedded-targets-to-disable-sysctl_checkc 
kernel/Makefile
--- a/kernel/Makefile~sysctl-allow-embedded-targets-to-disable-sysctl_checkc
+++ a/kernel/Makefile
@@ -11,7 +11,7 @@ obj-y     = sched.o fork.o exec_domain.o
            hrtimer.o rwsem.o nsproxy.o srcu.o \
            notifier.o ksysfs.o pm_qos_params.o
 
-obj-$(CONFIG_SYSCTL) += sysctl_check.o
+obj-$(CONFIG_SYSCTL_SYSCALL_CHECK) += sysctl_check.o
 obj-$(CONFIG_STACKTRACE) += stacktrace.o
 obj-y += time/
 obj-$(CONFIG_DEBUG_MUTEXES) += mutex-debug.o
diff -puN 
kernel/sysctl.c~sysctl-allow-embedded-targets-to-disable-sysctl_checkc 
kernel/sysctl.c
--- a/kernel/sysctl.c~sysctl-allow-embedded-targets-to-disable-sysctl_checkc
+++ a/kernel/sysctl.c
@@ -1612,9 +1612,13 @@ static void sysctl_set_parent(struct ctl
 
 static __init int sysctl_init(void)
 {
-       int err;
        sysctl_set_parent(NULL, root_table);
-       err = sysctl_check_table(current->nsproxy, root_table);
+#ifdef CONFIG_SYSCTL_SYSCALL_CHECK
+       {
+               int err;
+               err = sysctl_check_table(current->nsproxy, root_table);
+       }
+#endif
        return 0;
 }
 
@@ -1741,10 +1745,12 @@ struct ctl_table_header *__register_sysc
        header->unregistering = NULL;
        header->root = root;
        sysctl_set_parent(NULL, header->ctl_table);
+#ifdef CONFIG_SYSCTL_SYSCALL_CHECK
        if (sysctl_check_table(namespaces, header->ctl_table)) {
                kfree(header);
                return NULL;
        }
+#endif
        spin_lock(&sysctl_lock);
        header_list = lookup_header_list(root, namespaces);
        list_add_tail(&header->ctl_entry, header_list);
_

Patches currently in -mm which might be from [EMAIL PROTECTED] are

origin.patch
sysctl-allow-embedded-targets-to-disable-sysctl_checkc.patch

-
To unsubscribe from this list: send the line "unsubscribe mm-commits" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to