Message ID | 20230301212308.1839139-1-deso@posteo.net (mailing list archive) |
---|---|
Headers | show |
Series | Make uprobe attachment APK aware | expand |
Hello: This series was applied to bpf/bpf-next.git (master) by Andrii Nakryiko <andrii@kernel.org>: On Wed, 1 Mar 2023 21:23:05 +0000 you wrote: > On Android, APKs (android packages; zip packages with somewhat > prescriptive contents) are first class citizens in the system: the > shared objects contained in them don't exist in unpacked form on the > file system. Rather, they are mmaped directly from within the archive > and the archive is also what the kernel is aware of. > > For users that complicates the process of attaching a uprobe to a > function contained in a shared object in one such APK: they'd have to > find the byte offset of said function from the beginning of the archive. > That is cumbersome to do manually and can be fragile, because various > changes could invalidate said offset. > > [...] Here is the summary with links: - [bpf-next,v4,1/3] libbpf: Implement basic zip archive parsing support https://git.kernel.org/bpf/bpf-next/c/1eebcb60633f - [bpf-next,v4,2/3] libbpf: Introduce elf_find_func_offset_from_file() function https://git.kernel.org/bpf/bpf-next/c/434fdcead735 - [bpf-next,v4,3/3] libbpf: Add support for attaching uprobes to shared objects in APKs https://git.kernel.org/bpf/bpf-next/c/c44fd8450763 You are awesome, thank you!