]> git.baikalelectronics.ru Git - kernel.git/commit
arm64/syscall: Include asm/ptrace.h in syscall_wrapper header.
authorKuniyuki Iwashima <kuniyu@amazon.com>
Mon, 31 Oct 2022 21:57:28 +0000 (14:57 -0700)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 8 Dec 2022 10:22:57 +0000 (11:22 +0100)
commite8fb7b85e4e3539ffe1d23898273111052e2fa56
tree970fabb4f52b187bbf98e9478b2cdaab2d21d774
parent48b49b15038f0f422aff0883e2edc25322b10fbf
arm64/syscall: Include asm/ptrace.h in syscall_wrapper header.

[ Upstream commit 29ed33ef89c85fcde2ca640b323972e098f589c9 ]

Add the same change for ARM64 as done in the commit 33ed529a3375
("x86/syscall: Include asm/ptrace.h in syscall_wrapper header") to
make sure all syscalls see 'struct pt_regs' definition and resulted
BTF for '__arm64_sys_*(struct pt_regs *regs)' functions point to
actual struct.

Without this patch, the BPF verifier refuses to load a tracing prog
which accesses pt_regs.

  bpf(BPF_PROG_LOAD, {prog_type=0x1a, ...}, 128) = -1 EACCES

With this patch, we can see the correct error, which saves us time
in debugging the prog.

  bpf(BPF_PROG_LOAD, {prog_type=0x1a, ...}, 128) = 4
  bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name=NULL, prog_fd=4}}, 128) = -1 ENOTSUPP

Signed-off-by: Kuniyuki Iwashima <kuniyu@amazon.com>
Acked-by: Andrii Nakryiko <andrii@kernel.org>
Link: https://lore.kernel.org/r/20221031215728.50389-1-kuniyu@amazon.com
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
arch/arm64/include/asm/syscall_wrapper.h