Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp417196pxp; Fri, 11 Mar 2022 06:54:02 -0800 (PST) X-Google-Smtp-Source: ABdhPJwjNDbi3WDpgl47eAWghH5SXt42xlgyFlm09KRUenaiDJPms98IvjJ1UQiFjLWwrFeDdOVq X-Received: by 2002:a17:906:6a11:b0:6d7:76cc:12f6 with SMTP id qw17-20020a1709066a1100b006d776cc12f6mr8934332ejc.456.1647010441739; Fri, 11 Mar 2022 06:54:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1647010441; cv=none; d=google.com; s=arc-20160816; b=qN2xbaRqN93/sNzt0bYl5Uw/Uw/GbIiTKzJHEaBkf+x5KBZuBGHSpxkQSe/2V8pZET pvlTrex6Gm544BMw3gxKEeKyU+swyGxGdpbgBAd1DI2PngY61rZJ4+VIRO5ogcgdDvNL e75h3QhSKERg9DwRWbZ41hzP8RLQcB6CpYzj5PyJ+U/axN45zmr49ktVkCXz1K3aI1sB Rxlb6VnkasXNaX79Y75owsbfM7fxCke6+n37DXTKE8dTUeyXK0iOmywRAM1KL4zBaDoW S93xJMAoYkVyoYZSeWBfQm7iZNhB/y9+g5ZYnHFQzKIR3dbAO5kOOZ8k5zRhPHvVIPE4 KRdA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=5jYhLy2ptg67j7gosQDMGJHvlLaTaY6CmmJDT+qiajc=; b=dI+0uOrRoxLOWhghIAdSU+yfKwjZ2R+xWs3DjEwLC/rXfU3OIJAa/WnTq490WCEXum ntjJgJ9TmLHTh77NpnFhgsBTULv8BhpawJUGa89fV4UIHNcoGrGAx3TxHk9E26PjhVL0 s4rY1iE0AjbW+9VcGWtcxYRDDtKFLeO+8w19Rqwp9ZCJI+aO4ezwGBu5ggAW9hU2b70j sXJF8Qflfg3OLqnE1cUHYVfwDKWXyK0LIKAl59yCk0WuKu5XD1O42eqM7EzPFTWFuURa 0VZOzyywt5Nx17dwCGp8LSTfK1e1WSCx0bkdcare7rzIvJWf9HvFaz4P7LxJQDn0zjXP idaQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="L/2wjF/B"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id s17-20020aa7c551000000b00416a88695desi3685211edr.546.2022.03.11.06.53.17; Fri, 11 Mar 2022 06:54:01 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="L/2wjF/B"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244635AbiCKA7l (ORCPT + 99 others); Thu, 10 Mar 2022 19:59:41 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35132 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242170AbiCKA7j (ORCPT ); Thu, 10 Mar 2022 19:59:39 -0500 Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D8E0AE98CB for ; Thu, 10 Mar 2022 16:58:36 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1646960316; x=1678496316; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=9siIY6FLOfYc5ocEKvjG/SmhAvdKrtM6lD3UINVbS4o=; b=L/2wjF/BVcJhdc1j76K2+HYNgL3x0S4U5JOh5AxeICY6V1ZUWjuOjfe/ zwOSQlAp3me7JX6GLepFJxE6xuQtppIWoj1XQwaL7fEJW5RTOt/IsDgKg 1Ig1v13RU7ZrSeEXCMCvdwnvFRUgWpnaBSzVWLqrmVrnFrGzfHIyvbzqT iNeJVkgQ/s5ebbKU6zdlPqXCZQnE9pHBHnefRW/I5zC2je8M0xBKQ944k gwQjxoshtUHFYJD0VZSVywV7YuYfyMRuirKZY5zavE5PmiBVSPEeXi8oO wPn3EMWK9XNnd6577IoipEjjqVXwXbNQ69PlEG6JPSKfI40uPkX3rN0rI w==; X-IronPort-AV: E=McAfee;i="6200,9189,10282"; a="255405805" X-IronPort-AV: E=Sophos;i="5.90,172,1643702400"; d="scan'208";a="255405805" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Mar 2022 16:57:46 -0800 X-IronPort-AV: E=Sophos;i="5.90,172,1643702400"; d="scan'208";a="554989174" Received: from gdavids1-mobl.amr.corp.intel.com (HELO localhost) ([10.212.65.108]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Mar 2022 16:57:46 -0800 From: ira.weiny@intel.com To: Dave Hansen , "Aneesh Kumar K.V" Cc: Ira Weiny , "Edgecombe, Rick P" , linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org Subject: [PATCH 2/5] x86/pkeys: Remove __arch_set_user_pkey_access() declaration Date: Thu, 10 Mar 2022 16:57:39 -0800 Message-Id: <20220311005742.1060992-3-ira.weiny@intel.com> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220311005742.1060992-1-ira.weiny@intel.com> References: <20220311005742.1060992-1-ira.weiny@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.9 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ira Weiny In the x86 code __arch_set_user_pkey_access() is not used and is not defined. Remove the dead declaration. To: Dave Hansen Signed-off-by: Ira Weiny --- Changes from V1: Make this part of a series of pkey clean ups --- arch/x86/include/asm/pkeys.h | 6 ------ 1 file changed, 6 deletions(-) diff --git a/arch/x86/include/asm/pkeys.h b/arch/x86/include/asm/pkeys.h index 9c530530b9a7..2e6c04d8a45b 100644 --- a/arch/x86/include/asm/pkeys.h +++ b/arch/x86/include/asm/pkeys.h @@ -41,9 +41,6 @@ static inline int arch_override_mprotect_pkey(struct vm_area_struct *vma, return __arch_override_mprotect_pkey(vma, prot, pkey); } -extern int __arch_set_user_pkey_access(struct task_struct *tsk, int pkey, - unsigned long init_val); - #define ARCH_VM_PKEY_FLAGS (VM_PKEY_BIT0 | VM_PKEY_BIT1 | VM_PKEY_BIT2 | VM_PKEY_BIT3) #define mm_pkey_allocation_map(mm) (mm->context.pkey_allocation_map) @@ -118,9 +115,6 @@ int mm_pkey_free(struct mm_struct *mm, int pkey) return 0; } -extern int __arch_set_user_pkey_access(struct task_struct *tsk, int pkey, - unsigned long init_val); - static inline int vma_pkey(struct vm_area_struct *vma) { unsigned long vma_pkey_mask = VM_PKEY_BIT0 | VM_PKEY_BIT1 | -- 2.35.1