x86/syscalls: Stop filling syscall arrays with *_sys_ni_syscall
authorMasahiro Yamada <masahiroy@kernel.org>
Mon, 17 May 2021 07:38:11 +0000 (16:38 +0900)
committerThomas Gleixner <tglx@linutronix.de>
Thu, 20 May 2021 13:03:59 +0000 (15:03 +0200)
commit44fe4895f47cbe9f4692e1d3cdc2ef8352f4d88e
tree5b70fc99145f4d243730428dcaf587109c9e8b7a
parent6218d0f6b8dece1f2e82f0a47a0e6b8ecb631ef6
x86/syscalls: Stop filling syscall arrays with *_sys_ni_syscall

This is a follow-up cleanup after switching to the generic syscalltbl.sh.

The old x86 specific script skipped non-existing syscalls. So, the
generated syscalls_64.h, for example, had a big hole in the syscall numbers
335-423 range. That is why there exists [0 ... __NR_*_syscall_max] =
&__*_sys_ni_cyscall.

The new script, scripts/syscalltbl.sh automatically fills holes
with __SYSCALL(<nr>, sys_ni_syscall), hence such ugly code can
go away. The designated initializers, '[nr] =' are also unneeded.

Also, there is no need to give __NR_*_syscall_max+1 because the array
size is implied by the number of syscalls in the generated headers.
Hence, there is no need to include <asm/unistd.h>, either.

Signed-off-by: Masahiro Yamada <masahiroy@kernel.org>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Link: https://lore.kernel.org/r/20210517073815.97426-4-masahiroy@kernel.org
arch/x86/entry/syscall_32.c
arch/x86/entry/syscall_64.c
arch/x86/entry/syscall_x32.c
arch/x86/um/sys_call_table_32.c
arch/x86/um/sys_call_table_64.c