Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758092AbcJQPiG (ORCPT ); Mon, 17 Oct 2016 11:38:06 -0400 Received: from mout.kundenserver.de ([212.227.126.135]:59933 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754595AbcJQPhy (ORCPT ); Mon, 17 Oct 2016 11:37:54 -0400 From: Arnd Bergmann To: Dave Hansen Cc: linux-kernel@vger.kernel.org, dave.hansen@linux.intel.com, tglx@linutronix.de, x86@kernel.org, linux-arch@vger.kernel.org, mgorman@techsingularity.net, linux-api@vger.kernel.org, linux-mm@kvack.org, luto@kernel.org, akpm@linux-foundation.org, torvalds@linux-foundation.org Subject: Re: [PATCH] generic syscalls: kill cruft from removed pkey syscalls Date: Mon, 17 Oct 2016 17:37:29 +0200 Message-ID: <5993847.hpzj164ak1@wuerfel> User-Agent: KMail/5.1.3 (Linux/4.4.0-34-generic; KDE/5.18.0; x86_64; ; ) In-Reply-To: <20161017151814.1CE8B6C3@viggo.jf.intel.com> References: <20161017151814.1CE8B6C3@viggo.jf.intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" X-Provags-ID: V03:K0:iM1xmmll4M0pGjkTzqQs+MVSJJMbL2zCHZPKA2ayPGJxGyFnRAj fLZRkBezGT8VHTtlEv1TThr5SWL8s/lPayA5ed5wI6zv1fv1qpKgku3660auzeunhIa83KN VHAzo/4CoSKUiy8lh74+0K7z/9s+n9CFwOPnWV/v7zzKeg8r1ZstXEilhY2wKQ1ZAaWEwe9 ywakPFVdLikhAzKbVvn0A== X-UI-Out-Filterresults: notjunk:1;V01:K0:UcEni/HgG4c=:QYHjPHF4vBsqClABGAmgkB z2/hZbIJwG1sssyYfQ+lcEd9BlAW6nbJCRcm+TsvbbtNwImx+aUAQfWYq4niDOoiTrnoVzPqM ksFEDHkN5dVXjSVbBgkAed6I5Kq5TiN8y0cYJLQRXPpy86qvNRB+6fGmNt446U/j89LUg4ysc 1U0KdFONDZ7BgyX7go/4YWUP6FUvSsj+Q1dc5mrZLuD5g/7fwQvduK9Apf7qjoQqSBNDGS8bU 7MPchrYudP3+G2lBKP3m2T2WWLnKQLvNlll3ajKIAQe5yJ/3aFw0hUzqAroP1UYliOF0HDrpP sz6ANNdkfhnQh2t58pS21NiKAFsbNQtTqD+xkfYE9KDKpvjRap7BmdrgwT2owyLvhx/o3vSRC /CSVv7LZtKWlSKTzf/xCC9vmy+y92KMrKXKNDfMPRTl9nKOloEv5SNps66z8J+4wIFsu/iDwW 4ysQcAGze3tBBEiKX+ddIr674cmvtKzyXbq1yEYfDeWhNIPckacEtJVE7aT++SNqmqEXhpRo0 Uq6HwwSo6pPphQYLf695GCPPxxDhifZzY/WSf3iuFUBNqDaFc0HKtOHq9z652ZNJ+gD+dokH+ LwkjQNyYoWbCLSfHp15acXEBpGmLCbJmtoOKTOxT4TRjoC9uglvL/nS7wbw484uAuiBiMv8I6 DyXosNG8q2t5e0KzzBLK3fJ1E8xbcZc7kqh1JGHm8dK83vPqAEU0df7Ot6jEv3tHScpU9XXg3 iIdmVi/wySg2TG/m Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 986 Lines: 25 On Monday, October 17, 2016 8:18:15 AM CEST Dave Hansen wrote: > > pkey_set() and pkey_get() were syscalls present in older versions > of the protection keys patches. They were fully excised from the > x86 code, but some cruft was left in the generic syscall code. The > C++ comments were intended to help to make it more glaring to me to > fix them before actually submitting them. That technique worked, > but later than I would have liked. > > I test-compiled this for arm64. > > Signed-off-by: Dave Hansen > Cc: Thomas Gleixner > Cc: x86@kernel.org > Cc: Arnd Bergmann > Cc: linux-arch@vger.kernel.org > Cc: mgorman@techsingularity.net > Cc: linux-api@vger.kernel.org > Cc: linux-mm@kvack.org > Cc: luto@kernel.org > Cc: akpm@linux-foundation.org > Cc: torvalds@linux-foundation.org > Fixes: a60f7b69d92c0 ("generic syscalls: Wire up memory protection keys syscalls") Acked-by: Arnd Bergmann