]> git.ipfire.org Git - thirdparty/kernel/stable.git/commit
x86: Hide the int3_emulate_call/jmp functions from UML
authorSteven Rostedt (VMware) <rostedt@goodmis.org>
Sat, 11 May 2019 12:32:40 +0000 (08:32 -0400)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Fri, 31 May 2019 13:44:44 +0000 (06:44 -0700)
commitc607bd396315f34af275f93ea50c9ef91bc7fc80
treea929c18fb6205c0b26c95f0cbe76f1effdeee2e5
parent3f7c1cab1a61108821cf47dda8a32ed25cc3588b
x86: Hide the int3_emulate_call/jmp functions from UML

commit 693713cbdb3a4bda5a8a678c31f06560bbb14657 upstream.

User Mode Linux does not have access to the ip or sp fields of the pt_regs,
and accessing them causes UML to fail to build. Hide the int3_emulate_jmp()
and int3_emulate_call() instructions from UML, as it doesn't need them
anyway.

Reported-by: kbuild test robot <lkp@intel.com>
Signed-off-by: Steven Rostedt (VMware) <rostedt@goodmis.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
arch/x86/include/asm/text-patching.h