diff options
author | Peter Zijlstra <peterz@infradead.org> | 2020-09-02 15:25:50 +0200 |
---|---|---|
committer | Thomas Gleixner <tglx@linutronix.de> | 2020-09-04 15:09:29 +0200 |
commit | 662a0221893a3d58aa72719671844264306f6e4b (patch) | |
tree | 8e261b7b2011e4e669c066528dc8aba50a715960 /arch/x86/kernel | |
parent | 2356bb4b8221d7dc8c7beb810418122ed90254c9 (diff) |
x86/entry: Fix AC assertion
The WARN added in commit 3c73b81a9164 ("x86/entry, selftests: Further
improve user entry sanity checks") unconditionally triggers on a IVB
machine because it does not support SMAP.
For !SMAP hardware the CLAC/STAC instructions are patched out and thus if
userspace sets AC, it is still have set after entry.
Fixes: 3c73b81a9164 ("x86/entry, selftests: Further improve user entry sanity checks")
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Tested-by: Daniel Thompson <daniel.thompson@linaro.org>
Acked-by: Andy Lutomirski <luto@kernel.org>
Cc: stable@vger.kernel.org
Link: https://lore.kernel.org/r/20200902133200.666781610@infradead.org
Diffstat (limited to 'arch/x86/kernel')
0 files changed, 0 insertions, 0 deletions