On Tue, 15 Oct 2024 18:55:11 +0000 Martin Kelly
<martin.ke...@crowdstrike.com> wrote:
> Source: linux-signed-amd64
> X-Debbugs-Cc: martin.ke...@crowdstrike.com
> Version: 6.11.2+1
> Severity: important
> Tags: upstream
> 
> Some BPF fentry hooks in the 6.11.2-cloud-amd64 kernel successfully
> load
> but then are ignored when they should fire. This can be seen with the
> following bpftrace command:
> 
> bpftrace -e 'kfunc:acct_process { printf("acct_process called\n"); }'
> 

This was root-caused to be the same issue as the one addressed in this
(unmerged) patch series:
https://lore.kernel.org/lkml/20240723063258.2240610-1-zhengyej...@huaweicloud.com/

Essentially this has to do with ftrace and weak functions.

Reply via email to