Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp312745ybi; Wed, 29 May 2019 22:03:34 -0700 (PDT) X-Google-Smtp-Source: APXvYqxFpkndUbIclr8RZRnAsuUwHNDCIi+j65/MY+hjbsRJXX40B4X5DA4dBmkuLmjO3uL1MvlE X-Received: by 2002:a17:902:e104:: with SMTP id cc4mr2020367plb.254.1559192614281; Wed, 29 May 2019 22:03:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559192614; cv=none; d=google.com; s=arc-20160816; b=Yj6yx4LPg9I5q4SBzo5R+By7IcRNJD6WnJRw+BjDY8PffeILM2xGVyB4KHrNKaOdmq 0+DUlcYMAYUUaU0YQ2jOPi/RaHIuOq69/mYjbpEHNWjb4MSrKtRFlh3mvc3d4ftp0fp8 9Zo2abOwH8FfxU+0Wi8+Cm6KiWJx0Hh2iXmQKUWP9j1MPGNqW+/Aq7ezjRimwk4+WNkF 2mSnctkXsBIow7xdaPiDri9b6IQM3KemxyUiI80Y+xyMJyOVU3JxVvjf7YnJo/oN/MXK smmRIjbCaJRLC3dxfhH2gMF7NdSDkUnUZZXktoWJfrxzFvpf719HmLIcvwU73mK2D1Zr Wg4w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=fJaKlWlIWDSLPPFmVNUa87pv6cv4gKuvvJONyiDlXaQ=; b=M35pPmScH+/pynlQydV/oXBH/g/2JuX/b878KnEwWIR7eiQfZqYa8abaprU+LXkP23 degTEmqGsG8id72Q3KnAE0xliiVgxG3j7BBKEdsSnMBxRvTmUdpAOjtW7IcBTPWMEuEp kTpLeFyMFcbEWVUQoiwBkOE306a+pzNeW6HKzheq7Y0xnqntEOEbIlLQCG3hpzSiqZZ9 bjnTkFseSRIjnYmc5hh+hqMnyzxVp88Bx/Bn1zwo/mA/2YkZDD83nPlc8Q22jJqKkw24 pWC1JZvtDiPWeeLnF+pkOiFwb5J7RK6OtnVErJlFBADfVvtqaZHKUYgE1zuqP5WgvJIf vo/g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=UZMFazma; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i38si2200357plb.132.2019.05.29.22.03.17; Wed, 29 May 2019 22:03:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=UZMFazma; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727535AbfE3DJY (ORCPT + 99 others); Wed, 29 May 2019 23:09:24 -0400 Received: from mail.kernel.org ([198.145.29.99]:43928 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726744AbfE3DJY (ORCPT ); Wed, 29 May 2019 23:09:24 -0400 Received: from localhost (ip67-88-213-2.z213-88-67.customer.algx.net [67.88.213.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 993E92446F; Thu, 30 May 2019 03:09:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1559185763; bh=oi8lKQ5r/i49dFb9dykc0Y0t9E2sFOuG489GbRWGmc4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=UZMFazma9DQpnDn6lFP7JdtW0MvVJaJxL0/tBBtlNMe71OTHTe9ZVsAxykfHj5s1B MLWlR5ISZc7Ixm/nAJu9EVnsY8gH3pGb0QYUIvrTsPhU/0+ZXQSGxlQ5YndiH2wBjB uuTrKb3E2OI9NaPPzkGiSwqMk2ZO1rbkUttoeL7Y= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, kbuild test robot , "Steven Rostedt (VMware)" Subject: [PATCH 5.1 001/405] x86: Hide the int3_emulate_call/jmp functions from UML Date: Wed, 29 May 2019 19:59:59 -0700 Message-Id: <20190530030540.383776666@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190530030540.291644921@linuxfoundation.org> References: <20190530030540.291644921@linuxfoundation.org> User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Steven Rostedt (VMware) commit 693713cbdb3a4bda5a8a678c31f06560bbb14657 upstream. User Mode Linux does not have access to the ip or sp fields of the pt_regs, and accessing them causes UML to fail to build. Hide the int3_emulate_jmp() and int3_emulate_call() instructions from UML, as it doesn't need them anyway. Reported-by: kbuild test robot Signed-off-by: Steven Rostedt (VMware) Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm/text-patching.h | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) --- a/arch/x86/include/asm/text-patching.h +++ b/arch/x86/include/asm/text-patching.h @@ -39,6 +39,7 @@ extern int poke_int3_handler(struct pt_r extern void *text_poke_bp(void *addr, const void *opcode, size_t len, void *handler); extern int after_bootmem; +#ifndef CONFIG_UML_X86 static inline void int3_emulate_jmp(struct pt_regs *regs, unsigned long ip) { regs->ip = ip; @@ -65,6 +66,7 @@ static inline void int3_emulate_call(str int3_emulate_push(regs, regs->ip - INT3_INSN_SIZE + CALL_INSN_SIZE); int3_emulate_jmp(regs, func); } -#endif +#endif /* CONFIG_X86_64 */ +#endif /* !CONFIG_UML_X86 */ #endif /* _ASM_X86_TEXT_PATCHING_H */