https://bugs.kde.org/show_bug.cgi?id=426148
Mark Wielaard <m...@klomp.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Ever confirmed|0 |1 Assignee|jsew...@acm.org |m...@klomp.org Status|REPORTED |CONFIRMED --- Comment #3 from Mark Wielaard <m...@klomp.org> --- Created attachment 142314 --> https://bugs.kde.org/attachment.cgi?id=142314&action=edit Implement BPF_MAP_LOOKUP_AND_DELETE_ELEM and BPF_MAP_FREEZE Implements BPF_MAP_LOOKUP_AND_DELETE_ELEM (command 20) and BPF_MAP_FREEZE (command 21) and produces a WARNING instead of a fatal error for unrecognized BPF commands. This does not fully solve the issue with opensnoop, that will still report WARNINGS, but will no longer crash under valgrind: ==3618029== Command: ./opensnoop ==3618029== --3618029-- WARNING: unhandled eBPF command 35 --3618029-- WARNING: unhandled eBPF command 35 --3618029-- WARNING: unhandled eBPF command 35 --3618029-- WARNING: unhandled eBPF command 35 --3618029-- WARNING: unhandled eBPF command 35 --3618029-- WARNING: unhandled eBPF command 35 --3618029-- WARNING: unhandled eBPF command 35 --3618029-- WARNING: unhandled eBPF command 35 --3618029-- WARNING: unhandled eBPF command 35 --3618029-- WARNING: unhandled eBPF command 35 --3618029-- WARNING: unhandled eBPF command 28 PID COMM FD ERR PATH -- You are receiving this mail because: You are watching all bug changes.