x86: Hide the int3_emulate_call/jmp functions from UML
authorSteven Rostedt (VMware) <rostedt@goodmis.org>
Sat, 11 May 2019 12:32:40 +0000 (08:32 -0400)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Fri, 31 May 2019 13:47:10 +0000 (06:47 -0700)
commitf77efdaa77b777e9b983696fa5a4a29a2768d6dd
tree3deaddc55e114b1109c17c37271f878bb33bcb4a
parent44a05cd896d97a3cd4f0c2ddb29a221ab2fdf43d
x86: Hide the int3_emulate_call/jmp functions from UML

commit 693713cbdb3a4bda5a8a678c31f06560bbb14657 upstream.

User Mode Linux does not have access to the ip or sp fields of the pt_regs,
and accessing them causes UML to fail to build. Hide the int3_emulate_jmp()
and int3_emulate_call() instructions from UML, as it doesn't need them
anyway.

Reported-by: kbuild test robot <lkp@intel.com>
Signed-off-by: Steven Rostedt (VMware) <rostedt@goodmis.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
arch/x86/include/asm/text-patching.h