Bug#1085178: linux-signed-amd64: Some BPF fentry hooks silently fail
- To: Martin Kelly <martin.kelly@crowdstrike.com>, 1085178@bugs.debian.org
- Subject: Bug#1085178: linux-signed-amd64: Some BPF fentry hooks silently fail
- From: Salvatore Bonaccorso <carnil@debian.org>
- Date: Fri, 21 Feb 2025 21:03:50 +0100
- Message-id: <[🔎] Z7jcJmIm8S4QTPlr@eldamar.lan>
- Reply-to: Salvatore Bonaccorso <carnil@debian.org>, 1085178@bugs.debian.org
- In-reply-to: <f6208162be11c2c44f6097fa3043b0d757a0d19b.camel@crowdstrike.com>
- References: <697b28af8475160ca68382f78c744aee01c633a0.camel@crowdstrike.com> <697b28af8475160ca68382f78c744aee01c633a0.camel@crowdstrike.com> <f6208162be11c2c44f6097fa3043b0d757a0d19b.camel@crowdstrike.com> <697b28af8475160ca68382f78c744aee01c633a0.camel@crowdstrike.com>
Control: found -1 6.12.15-1
On Fri, Dec 06, 2024 at 11:10:33PM +0000, Martin Kelly wrote:
> On Tue, 15 Oct 2024 18:55:11 +0000 Martin Kelly
> <martin.kelly@crowdstrike.com> wrote:
> > Source: linux-signed-amd64
> > X-Debbugs-Cc: martin.kelly@crowdstrike.com
> > Version: 6.11.2+1
> > Severity: important
> > Tags: upstream
> >
> > Some BPF fentry hooks in the 6.11.2-cloud-amd64 kernel successfully
> > load
> > but then are ignored when they should fire. This can be seen with the
> > following bpftrace command:
> >
> > bpftrace -e 'kfunc:acct_process { printf("acct_process called\n"); }'
> >
>
> This was root-caused to be the same issue as the one addressed in this
> (unmerged) patch series:
> https://lore.kernel.org/lkml/20240723063258.2240610-1-zhengyejian@huaweicloud.com/
>
> Essentially this has to do with ftrace and weak functions.
As I understand this is still an issue in 6.12.15-1.
Regards,
Salvatore
Reply to: