Control: found -1 6.12.15-1 On Fri, Dec 06, 2024 at 11:10:33PM +0000, Martin Kelly wrote: > On Tue, 15 Oct 2024 18:55:11 +0000 Martin Kelly > <martin.ke...@crowdstrike.com> wrote: > > Source: linux-signed-amd64 > > X-Debbugs-Cc: martin.ke...@crowdstrike.com > > Version: 6.11.2+1 > > Severity: important > > Tags: upstream > > > > Some BPF fentry hooks in the 6.11.2-cloud-amd64 kernel successfully > > load > > but then are ignored when they should fire. This can be seen with the > > following bpftrace command: > > > > bpftrace -e 'kfunc:acct_process { printf("acct_process called\n"); }' > > > > This was root-caused to be the same issue as the one addressed in this > (unmerged) patch series: > https://lore.kernel.org/lkml/20240723063258.2240610-1-zhengyej...@huaweicloud.com/ > > Essentially this has to do with ftrace and weak functions.
As I understand this is still an issue in 6.12.15-1. Regards, Salvatore