Message ID | 20220510205923.3206889-1-kuifeng@fb.com (mailing list archive) |
---|---|
Headers | show |
Series | Attach a cookie to a tracing program. | expand |
Hello: This series was applied to bpf/bpf-next.git (master) by Andrii Nakryiko <andrii@kernel.org>: On Tue, 10 May 2022 13:59:18 -0700 you wrote: > Allow users to attach a 64-bits cookie to a bpf_link of fentry, fexit, > or fmod_ret. > > This patchset includes several major changes. > > - Define struct bpf_tramp_links to replace bpf_tramp_prog. > struct bpf_tramp_links collects bpf_links of a trampoline > > [...] Here is the summary with links: - [bpf-next,v8,1/5] bpf, x86: Generate trampolines from bpf_tramp_links https://git.kernel.org/bpf/bpf-next/c/f7e0beaf39d3 - [bpf-next,v8,2/5] bpf, x86: Create bpf_tramp_run_ctx on the caller thread's stack https://git.kernel.org/bpf/bpf-next/c/e384c7b7b46d - [bpf-next,v8,3/5] bpf, x86: Attach a cookie to fentry/fexit/fmod_ret/lsm. https://git.kernel.org/bpf/bpf-next/c/22c1d9a17b82 - [bpf-next,v8,4/5] libbpf: Assign cookies to links in libbpf. https://git.kernel.org/bpf/bpf-next/c/3d5602b6d8b9 - [bpf-next,v8,5/5] selftest/bpf: The test cses of BPF cookie for fentry/fexit/fmod_ret/lsm. https://git.kernel.org/bpf/bpf-next/c/f3273797de13 You are awesome, thank you!