On Tue, 15 Oct 2024 18:55:11 +0000 Martin Kelly
<[email protected]> wrote:
> Source: linux-signed-amd64
> X-Debbugs-Cc: [email protected]
> Version: 6.11.2+1
> Severity: important
> Tags: upstream
> 
> Some BPF fentry hooks in the 6.11.2-cloud-amd64 kernel successfully
> load
> but then are ignored when they should fire. This can be seen with the
> following bpftrace command:
> 
> bpftrace -e 'kfunc:acct_process { printf("acct_process called\n"); }'
> 

This was root-caused to be the same issue as the one addressed in this
(unmerged) patch series:
https://lore.kernel.org/lkml/[email protected]/

Essentially this has to do with ftrace and weak functions.

Reply via email to