x86/uaccess, xen: Suppress SMAP warnings
authorPeter Zijlstra <peterz@infradead.org>
Wed, 6 Mar 2019 18:09:08 +0000 (19:09 +0100)
committerIngo Molnar <mingo@kernel.org>
Wed, 3 Apr 2019 07:39:46 +0000 (09:39 +0200)
commit4fc0f0e9471ec573ab2d44e7f462d996d614536e
tree3c973eefcbf1cde7b61fb5aec5d2a1c4673218bb
parentff05ab2305aaeb21a3002ae95a17e176c198b71b
x86/uaccess, xen: Suppress SMAP warnings

drivers/xen/privcmd.o: warning: objtool: privcmd_ioctl()+0x1414: call to hypercall_page() with UACCESS enabled

Some Xen hypercalls allow parameter buffers in user land, so they need
to set AC=1. Avoid the warning for those cases.

Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Reviewed-by: Juergen Gross <jgross@suse.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Josh Poimboeuf <jpoimboe@redhat.com>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: andrew.cooper3@citrix.com
Signed-off-by: Ingo Molnar <mingo@kernel.org>
arch/x86/include/asm/xen/hypercall.h