diff options
author | Song Liu <songliubraving@fb.com> | 2020-07-24 13:05:02 -0700 |
---|---|---|
committer | Alexei Starovoitov <ast@kernel.org> | 2020-07-25 20:16:36 -0700 |
commit | 2b9b305fcdda1810bdffeb599361174eb2cd0b7c (patch) | |
tree | 6ac97431bb7987d56ee380f5dc0fb7eb52fb5587 /security | |
parent | dfcdf0e9ad2e006196986f363c99b2097aec5ef0 (diff) | |
download | linux-stable-2b9b305fcdda1810bdffeb599361174eb2cd0b7c.tar.gz linux-stable-2b9b305fcdda1810bdffeb599361174eb2cd0b7c.tar.bz2 linux-stable-2b9b305fcdda1810bdffeb599361174eb2cd0b7c.zip |
bpf: Fix build on architectures with special bpf_user_pt_regs_t
Architectures like s390, powerpc, arm64, riscv have speical definition of
bpf_user_pt_regs_t. So we need to cast the pointer before passing it to
bpf_get_stack(). This is similar to bpf_get_stack_tp().
Fixes: 03d42fd2d83f ("bpf: Separate bpf_get_[stack|stackid] for perf events BPF")
Reported-by: kernel test robot <lkp@intel.com>
Signed-off-by: Song Liu <songliubraving@fb.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Link: https://lore.kernel.org/bpf/20200724200503.3629591-1-songliubraving@fb.com
Diffstat (limited to 'security')
0 files changed, 0 insertions, 0 deletions