x86: Hide the int3_emulate_call/jmp functions from UML
authorSteven Rostedt (VMware) <rostedt@goodmis.org>
Sat, 11 May 2019 12:32:40 +0000 (08:32 -0400)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Fri, 31 May 2019 13:46:00 +0000 (06:46 -0700)
commit1d84eb87efceb7bfbe52d7f3539af6c2e9c86870
treeceb08dbe1176a57ff50cff470b440c375823cc9c
parent8b2fc005825583918be22b7bea6c155061e2f18d
x86: Hide the int3_emulate_call/jmp functions from UML

commit 693713cbdb3a4bda5a8a678c31f06560bbb14657 upstream.

User Mode Linux does not have access to the ip or sp fields of the pt_regs,
and accessing them causes UML to fail to build. Hide the int3_emulate_jmp()
and int3_emulate_call() instructions from UML, as it doesn't need them
anyway.

Reported-by: kbuild test robot <lkp@intel.com>
Signed-off-by: Steven Rostedt (VMware) <rostedt@goodmis.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
arch/x86/include/asm/text-patching.h