[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <8acdd32a-1702-4434-8d79-2e73ded36d2a@gmail.com>
Date: Wed, 13 Nov 2024 13:02:43 +0530
From: Dropify <d.dropify@...il.com>
To: zhengyejian1@...wei.com
Cc: bpf@...r.kernel.org, jpoimboe@...nel.org, linux-kernel@...r.kernel.org,
linux-modules@...r.kernel.org, linux-trace-kernel@...r.kernel.org,
mark.rutland@....com, mathieu.desnoyers@...icios.com, mcgrof@...nel.org,
mhiramat@...nel.org, peterz@...radead.org, rostedt@...dmis.org
Subject: Re: [RFC PATCH] ftrace: Skip __fentry__ location of overridden weak
functions
Wondering where are we with this issue?
I am experiencing an issue where in a fentry/kfunc bpf probe attached to
a function doesn't fire. I have only experienced this behavior on Debian
kernels with `CONFIG_X86_KERNEL_IBT` enabled.
Because of weak symbols being removed from kallsyms,
kallsyms_lookup_size_offset() returns the symbol offset for the function
"acct_process()" more than the actual size. And the function body now
contains two __fentry__ locations.
Depending on where binary search lands up first, correct (acct_process +
4) or incorrect (acct_process + 260) location is returned.
Thanks,
Dropify
Powered by blists - more mailing lists