diff options
author | Masahiro Yamada <masahiroy@kernel.org> | 2021-05-17 10:38:11 +0300 |
---|---|---|
committer | Thomas Gleixner <tglx@linutronix.de> | 2021-05-20 16:03:59 +0300 |
commit | 44fe4895f47cbe9f4692e1d3cdc2ef8352f4d88e (patch) | |
tree | 5b70fc99145f4d243730428dcaf587109c9e8b7a /mm/mprotect.c | |
parent | 6218d0f6b8dece1f2e82f0a47a0e6b8ecb631ef6 (diff) | |
download | linux-44fe4895f47cbe9f4692e1d3cdc2ef8352f4d88e.tar.xz |
x86/syscalls: Stop filling syscall arrays with *_sys_ni_syscall
This is a follow-up cleanup after switching to the generic syscalltbl.sh.
The old x86 specific script skipped non-existing syscalls. So, the
generated syscalls_64.h, for example, had a big hole in the syscall numbers
335-423 range. That is why there exists [0 ... __NR_*_syscall_max] =
&__*_sys_ni_cyscall.
The new script, scripts/syscalltbl.sh automatically fills holes
with __SYSCALL(<nr>, sys_ni_syscall), hence such ugly code can
go away. The designated initializers, '[nr] =' are also unneeded.
Also, there is no need to give __NR_*_syscall_max+1 because the array
size is implied by the number of syscalls in the generated headers.
Hence, there is no need to include <asm/unistd.h>, either.
Signed-off-by: Masahiro Yamada <masahiroy@kernel.org>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Link: https://lore.kernel.org/r/20210517073815.97426-4-masahiroy@kernel.org
Diffstat (limited to 'mm/mprotect.c')
0 files changed, 0 insertions, 0 deletions