Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp1915136ybb; Sat, 21 Mar 2020 08:31:36 -0700 (PDT) X-Google-Smtp-Source: ADFU+vvv/1zZCn/y6D85QTcYPKTOnF7LHHlVDrubMNEO65kye7D8XwlgOyLUvpcvZPdchp/pnoEF X-Received: by 2002:a05:6808:a08:: with SMTP id n8mr11041797oij.91.1584804696060; Sat, 21 Mar 2020 08:31:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1584804696; cv=none; d=google.com; s=arc-20160816; b=f+VoXk+lhrbQs78gT1LYqRPMoodFWG5HzTlOU1+EKtdrQ8YerZQVELUlyoHO/L9dbO sZ5p9De7vbeBfoe9gb7ldsKGGyJTeaV80EftoVTaop6hFUQLo5wgbNtEFFToC9LZh7Me 40lwuttWk/kR8vTN49r+wU5lRC/L6WE4oAPffWV46HqB3U1dlSQGWHSoAWDQRhXXfh9O rf4alkZPkmCSPiM/v+W2elGzZnk8yUQExlTHtCrFAQvxBrylMyWbSkULonoS4OLjsJgC kwuQIQZyDCDjbfdbXAUEClXiDOuZxkS5wmXnBt4z+m0YG+/LMBpNp/uiN0Wa9p5hs/us 306w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :robot-unsubscribe:robot-id:message-id:mime-version:references :in-reply-to:cc:subject:to:reply-to:from:date; bh=Yk7HrV8js8A2Q0SnAzCOD7Ba+3b9HQIPS5pLyzSPV/Y=; b=WsBhKRkHkfESIw9kTrIn6TGOZqw8kTfKitpojl9uHiE+bGPsX51kVW2sE/f5amVdqR 0jpeyEK5jB7CsOnGXkzJWLOrE1P6dlJtLdLhu/iK+pmBK81ODHhcHhy21+RNlk+xKjtT f9TsxWaKmg5xJ9Dca+r6Bi1FanT8G7zSP+ngyelTcQXRi74CD2XPxTLvazy8NyIzsOMm 4ZmyJ/QH88VI9hqjGBNKhNAOOl2qw3iEp0ZuefwMcwxPCGrkZ+MhNDx3zcnFD9oE4fR7 Szg9HQ+21UfhVe/rY6dUodGHDMq+9q7P9kh5hXndZoBfyrgWiPK9/JyCjn0C4xQFtWTw P8dQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w203si4940529oig.54.2020.03.21.08.31.24; Sat, 21 Mar 2020 08:31:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727840AbgCUPav (ORCPT + 99 others); Sat, 21 Mar 2020 11:30:51 -0400 Received: from Galois.linutronix.de ([193.142.43.55]:38938 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727692AbgCUPao (ORCPT ); Sat, 21 Mar 2020 11:30:44 -0400 Received: from [5.158.153.53] (helo=tip-bot2.lab.linutronix.de) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1jFg5B-00050N-94; Sat, 21 Mar 2020 16:30:41 +0100 Received: from [127.0.1.1] (localhost [IPv6:::1]) by tip-bot2.lab.linutronix.de (Postfix) with ESMTP id C68ED1C22E7; Sat, 21 Mar 2020 16:30:35 +0100 (CET) Date: Sat, 21 Mar 2020 15:30:35 -0000 From: "tip-bot2 for Brian Gerst" Reply-to: linux-kernel@vger.kernel.org To: linux-tip-commits@vger.kernel.org Subject: [tip: x86/entry] x86/entry/64: Remove ptregs qualifier from syscall table Cc: Brian Gerst , Thomas Gleixner , Dominik Brodowski , x86 , LKML In-Reply-To: <20200313195144.164260-10-brgerst@gmail.com> References: <20200313195144.164260-10-brgerst@gmail.com> MIME-Version: 1.0 Message-ID: <158480463547.28353.6779026446666587633.tip-bot2@tip-bot2> X-Mailer: tip-git-log-daemon Robot-ID: Robot-Unsubscribe: Contact to get blacklisted from these emails Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The following commit has been merged into the x86/entry branch of tip: Commit-ID: d3b1b776eefcc1695d15730f37cdaab201fd8707 Gitweb: https://git.kernel.org/tip/d3b1b776eefcc1695d15730f37cdaab201fd8707 Author: Brian Gerst AuthorDate: Fri, 13 Mar 2020 15:51:35 -04:00 Committer: Thomas Gleixner CommitterDate: Sat, 21 Mar 2020 16:03:21 +01:00 x86/entry/64: Remove ptregs qualifier from syscall table Now that the fast syscall path is removed, the ptregs qualifier is unused. Signed-off-by: Brian Gerst Signed-off-by: Thomas Gleixner Reviewed-by: Dominik Brodowski Link: https://lkml.kernel.org/r/20200313195144.164260-10-brgerst@gmail.com --- arch/x86/entry/syscalls/syscall_64.tbl | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/arch/x86/entry/syscalls/syscall_64.tbl b/arch/x86/entry/syscalls/syscall_64.tbl index 0b5a25b..e8fb722 100644 --- a/arch/x86/entry/syscalls/syscall_64.tbl +++ b/arch/x86/entry/syscalls/syscall_64.tbl @@ -23,7 +23,7 @@ 12 common brk __x64_sys_brk 13 64 rt_sigaction __x64_sys_rt_sigaction 14 common rt_sigprocmask __x64_sys_rt_sigprocmask -15 64 rt_sigreturn __x64_sys_rt_sigreturn/ptregs +15 64 rt_sigreturn __x64_sys_rt_sigreturn 16 64 ioctl __x64_sys_ioctl 17 common pread64 __x64_sys_pread64 18 common pwrite64 __x64_sys_pwrite64 @@ -64,10 +64,10 @@ 53 common socketpair __x64_sys_socketpair 54 64 setsockopt __x64_sys_setsockopt 55 64 getsockopt __x64_sys_getsockopt -56 common clone __x64_sys_clone/ptregs -57 common fork __x64_sys_fork/ptregs -58 common vfork __x64_sys_vfork/ptregs -59 64 execve __x64_sys_execve/ptregs +56 common clone __x64_sys_clone +57 common fork __x64_sys_fork +58 common vfork __x64_sys_vfork +59 64 execve __x64_sys_execve 60 common exit __x64_sys_exit 61 common wait4 __x64_sys_wait4 62 common kill __x64_sys_kill @@ -180,7 +180,7 @@ 169 common reboot __x64_sys_reboot 170 common sethostname __x64_sys_sethostname 171 common setdomainname __x64_sys_setdomainname -172 common iopl __x64_sys_iopl/ptregs +172 common iopl __x64_sys_iopl 173 common ioperm __x64_sys_ioperm 174 64 create_module 175 common init_module __x64_sys_init_module @@ -330,7 +330,7 @@ 319 common memfd_create __x64_sys_memfd_create 320 common kexec_file_load __x64_sys_kexec_file_load 321 common bpf __x64_sys_bpf -322 64 execveat __x64_sys_execveat/ptregs +322 64 execveat __x64_sys_execveat 323 common userfaultfd __x64_sys_userfaultfd 324 common membarrier __x64_sys_membarrier 325 common mlock2 __x64_sys_mlock2 @@ -356,7 +356,7 @@ 432 common fsmount __x64_sys_fsmount 433 common fspick __x64_sys_fspick 434 common pidfd_open __x64_sys_pidfd_open -435 common clone3 __x64_sys_clone3/ptregs +435 common clone3 __x64_sys_clone3 437 common openat2 __x64_sys_openat2 438 common pidfd_getfd __x64_sys_pidfd_getfd @@ -374,7 +374,7 @@ 517 x32 recvfrom __x32_compat_sys_recvfrom 518 x32 sendmsg __x32_compat_sys_sendmsg 519 x32 recvmsg __x32_compat_sys_recvmsg -520 x32 execve __x32_compat_sys_execve/ptregs +520 x32 execve __x32_compat_sys_execve 521 x32 ptrace __x32_compat_sys_ptrace 522 x32 rt_sigpending __x32_compat_sys_rt_sigpending 523 x32 rt_sigtimedwait __x32_compat_sys_rt_sigtimedwait_time64 @@ -399,6 +399,6 @@ 542 x32 getsockopt __x32_compat_sys_getsockopt 543 x32 io_setup __x32_compat_sys_io_setup 544 x32 io_submit __x32_compat_sys_io_submit -545 x32 execveat __x32_compat_sys_execveat/ptregs +545 x32 execveat __x32_compat_sys_execveat 546 x32 preadv2 __x32_compat_sys_preadv64v2 547 x32 pwritev2 __x32_compat_sys_pwritev64v2