On Tue, 15 Oct 2024 18:55:11 +0000 Martin Kelly <martin.ke...@crowdstrike.com> wrote: > Source: linux-signed-amd64 > X-Debbugs-Cc: martin.ke...@crowdstrike.com > Version: 6.11.2+1 > Severity: important > Tags: upstream > > Some BPF fentry hooks in the 6.11.2-cloud-amd64 kernel successfully > load > but then are ignored when they should fire. This can be seen with the > following bpftrace command: > > bpftrace -e 'kfunc:acct_process { printf("acct_process called\n"); }' >
This was root-caused to be the same issue as the one addressed in this (unmerged) patch series: https://lore.kernel.org/lkml/20240723063258.2240610-1-zhengyej...@huaweicloud.com/ Essentially this has to do with ftrace and weak functions.