x86: Hide the int3_emulate_call/jmp functions from UML
authorSteven Rostedt (VMware) <rostedt@goodmis.org>
Sat, 11 May 2019 12:32:40 +0000 (08:32 -0400)
committerSteven Rostedt (VMware) <rostedt@goodmis.org>
Sat, 11 May 2019 12:35:52 +0000 (08:35 -0400)
commit693713cbdb3a4bda5a8a678c31f06560bbb14657
tree1cf41a2d49136484e087ec2c2bacd17266536352
parent56e33afd7757d5da2664fb797f2544ce167176be
x86: Hide the int3_emulate_call/jmp functions from UML

User Mode Linux does not have access to the ip or sp fields of the pt_regs,
and accessing them causes UML to fail to build. Hide the int3_emulate_jmp()
and int3_emulate_call() instructions from UML, as it doesn't need them
anyway.

Reported-by: kbuild test robot <lkp@intel.com>
Signed-off-by: Steven Rostedt (VMware) <rostedt@goodmis.org>
arch/x86/include/asm/text-patching.h