From: Mark Wielaard Date: Fri, 17 Oct 2025 17:26:09 +0000 (+0200) Subject: Hook up bpf syscall wrapper on x86-linux X-Git-Tag: VALGRIND_3_26_0~21 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=34806c89abbd509b0ff731dda8fa3a3e95882438;p=thirdparty%2Fvalgrind.git Hook up bpf syscall wrapper on x86-linux --- diff --git a/coregrind/m_syswrap/syswrap-x86-linux.c b/coregrind/m_syswrap/syswrap-x86-linux.c index f697a9e19..22f5a1a07 100644 --- a/coregrind/m_syswrap/syswrap-x86-linux.c +++ b/coregrind/m_syswrap/syswrap-x86-linux.c @@ -1588,7 +1588,7 @@ static SyscallTableEntry syscall_table[] = { LINXY(__NR_getrandom, sys_getrandom), // 355 LINXY(__NR_memfd_create, sys_memfd_create), // 356 -// LIN__(__NR_bpf, sys_ni_syscall), // 357 + LINXY(__NR_bpf, sys_bpf), // 357 LINX_(__NR_execveat, sys_execveat), // 358 LINXY(__NR_socket, sys_socket), // 359 LINXY(__NR_socketpair, sys_socketpair), // 360