From: Alexandra Hajkova Date: Fri, 17 Jan 2020 11:59:11 +0000 (-0500) Subject: arm64: hook up finit_module and bpf syscalls X-Git-Tag: VALGRIND_3_16_0~130 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=7d4071fe8530fa1c217bb775b0e19fd97d871502;p=thirdparty%2Fvalgrind.git arm64: hook up finit_module and bpf syscalls This fixes "WARNING: unhandled arm64-linux syscall" in delete_module01 and bpf_prog01 tests in the LTP test suite. --- diff --git a/coregrind/m_syswrap/syswrap-arm64-linux.c b/coregrind/m_syswrap/syswrap-arm64-linux.c index 91329b6827..017d3a7790 100644 --- a/coregrind/m_syswrap/syswrap-arm64-linux.c +++ b/coregrind/m_syswrap/syswrap-arm64-linux.c @@ -805,14 +805,14 @@ static SyscallTableEntry syscall_main_table[] = { LINXY(__NR_process_vm_readv, sys_process_vm_readv), // 270 LINX_(__NR_process_vm_writev, sys_process_vm_writev), // 271 LINX_(__NR_kcmp, sys_kcmp), // 272 - // (__NR_finit_module, sys_ni_syscall), // 273 + LINX_(__NR_finit_module, sys_finit_module), // 273 // (__NR_sched_setattr, sys_ni_syscall), // 274 // (__NR_sched_getattr, sys_ni_syscall), // 275 LINX_(__NR_renameat2, sys_renameat2), // 276 // (__NR_seccomp, sys_ni_syscall), // 277 LINXY(__NR_getrandom, sys_getrandom), // 278 LINXY(__NR_memfd_create, sys_memfd_create), // 279 - // (__NR_bpf, sys_ni_syscall) // 280 + LINXY(__NR_bpf, sys_bpf), // 280 // (__NR_execveat, sys_ni_syscall), // 281 // (__NR_userfaultfd, sys_ni_syscall), // 282 LINX_(__NR_membarrier, sys_membarrier), // 283