Message ID | 20220305010129.1549719-1-andrii@kernel.org (mailing list archive) |
---|---|
Headers | show |
Series | libbpf: support custom SEC() handlers | expand |
Hello: This series was applied to bpf/bpf-next.git (master) by Alexei Starovoitov <ast@kernel.org>: On Fri, 4 Mar 2022 17:01:26 -0800 you wrote: > Add ability for user applications and libraries to register custom BPF program > SEC() handlers. See patch #2 for examples where this is useful. > > Patch #1 does some preliminary refactoring to allow exponsing program > init, preload, and attach callbacks as public API. It also establishes > a protocol to allow optional auto-attach behavior. This will also help the > case of sometimes auto-attachable uprobes. > > [...] Here is the summary with links: - [v5,bpf-next,1/3] libbpf: allow BPF program auto-attach handlers to bail out https://git.kernel.org/bpf/bpf-next/c/4fa5bcfe07f7 - [v5,bpf-next,2/3] libbpf: support custom SEC() handlers https://git.kernel.org/bpf/bpf-next/c/697f104db8a6 - [v5,bpf-next,3/3] selftests/bpf: add custom SEC() handling selftest https://git.kernel.org/bpf/bpf-next/c/aa963bcb0adc You are awesome, thank you!