x86, smap: Do not abuse the [f][x]rstor_checking() functions for user space
authorH. Peter Anvin <hpa@zytor.com>
Tue, 25 Sep 2012 22:42:18 +0000 (15:42 -0700)
committerH. Peter Anvin <hpa@zytor.com>
Tue, 25 Sep 2012 22:42:18 +0000 (15:42 -0700)
commite139e95590dfebab81841bf7a3ac46500f51a47c
tree2094d5154d34ce212c7110ed3a30d975026e5c75
parent49b8c695e331c9685e6ffdbf34872509d77c8459
x86, smap: Do not abuse the [f][x]rstor_checking() functions for user space

With SMAP, the [f][x]rstor_checking() functions are no longer usable
for user-space pointers by applying a simple __force cast.  Instead,
create new [f][x]rstor_user() functions which do the proper SMAP
magic.

Signed-off-by: H. Peter Anvin <hpa@linux.intel.com>
Cc: Suresh Siddha <suresh.b.siddha@intel.com>
Link: http://lkml.kernel.org/r/1343171129-2747-3-git-send-email-suresh.b.siddha@intel.com
arch/x86/include/asm/fpu-internal.h
arch/x86/kernel/xsave.c