Control: found -1 6.12.15-1

On Fri, Dec 06, 2024 at 11:10:33PM +0000, Martin Kelly wrote:
> On Tue, 15 Oct 2024 18:55:11 +0000 Martin Kelly
> <martin.ke...@crowdstrike.com> wrote:
> > Source: linux-signed-amd64
> > X-Debbugs-Cc: martin.ke...@crowdstrike.com
> > Version: 6.11.2+1
> > Severity: important
> > Tags: upstream
> > 
> > Some BPF fentry hooks in the 6.11.2-cloud-amd64 kernel successfully
> > load
> > but then are ignored when they should fire. This can be seen with the
> > following bpftrace command:
> > 
> > bpftrace -e 'kfunc:acct_process { printf("acct_process called\n"); }'
> > 
> 
> This was root-caused to be the same issue as the one addressed in this
> (unmerged) patch series:
> https://lore.kernel.org/lkml/20240723063258.2240610-1-zhengyej...@huaweicloud.com/
> 
> Essentially this has to do with ftrace and weak functions.

As I understand this is still an issue in 6.12.15-1.

Regards,
Salvatore

Reply via email to