Re: [PATCH bpf-next v2 1/2] libbpf: do not resolve size on duplicate FUNCs

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 30/09/2024 00:32, Alexei Starovoitov wrote:
On Sun, Sep 29, 2024 at 2:31 AM Eric Long via B4 Relay
<devnull+i.hack3r.moe@xxxxxxxxxx> wrote:

Looks like a hack to me.

In the test you're using:
void *bpf_cast_to_kern_ctx(void *obj) __ksym;

but __weak is missing.
Is that the reason you're hitting this issue?


No. libbpf still returns -EINVAL (from the same path) even if the prototype is marked __weak, when the patch is not applied.

(Sorry for the off-list reply)




[Index of Archives]     [Linux Samsung SoC]     [Linux Rockchip SoC]     [Linux Actions SoC]     [Linux for Synopsys ARC Processors]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]


  Powered by Linux