When hardened, the extended BPF just-in-time (JIT) compiler will randomize any kernel addresses in the BPF programs and maps, and will not expose the JIT addresses in "/proc/kallsyms".
Check
Verify RHEL 10 enables hardening for the BPF JIT compiler.
Check the status of the "net.core.bpf_jit_harden" parameter with the following command: