summaryrefslogtreecommitdiff
path: root/mm/mprotect.c
diff options
context:
space:
mode:
authorMasahiro Yamada <masahiroy@kernel.org>2021-05-17 10:38:11 +0300
committerThomas Gleixner <tglx@linutronix.de>2021-05-20 16:03:59 +0300
commit44fe4895f47cbe9f4692e1d3cdc2ef8352f4d88e (patch)
tree5b70fc99145f4d243730428dcaf587109c9e8b7a /mm/mprotect.c
parent6218d0f6b8dece1f2e82f0a47a0e6b8ecb631ef6 (diff)
downloadlinux-44fe4895f47cbe9f4692e1d3cdc2ef8352f4d88e.tar.xz
x86/syscalls: Stop filling syscall arrays with *_sys_ni_syscall
This is a follow-up cleanup after switching to the generic syscalltbl.sh. The old x86 specific script skipped non-existing syscalls. So, the generated syscalls_64.h, for example, had a big hole in the syscall numbers 335-423 range. That is why there exists [0 ... __NR_*_syscall_max] = &__*_sys_ni_cyscall. The new script, scripts/syscalltbl.sh automatically fills holes with __SYSCALL(<nr>, sys_ni_syscall), hence such ugly code can go away. The designated initializers, '[nr] =' are also unneeded. Also, there is no need to give __NR_*_syscall_max+1 because the array size is implied by the number of syscalls in the generated headers. Hence, there is no need to include <asm/unistd.h>, either. Signed-off-by: Masahiro Yamada <masahiroy@kernel.org> Signed-off-by: Thomas Gleixner <tglx@linutronix.de> Link: https://lore.kernel.org/r/20210517073815.97426-4-masahiroy@kernel.org
Diffstat (limited to 'mm/mprotect.c')
0 files changed, 0 insertions, 0 deletions