libbpf/libbpf.changes

530 lines
25 KiB
Plaintext

-------------------------------------------------------------------
Wed Oct 30 15:59:44 UTC 2024 - Fredrik Lönnegren <fredrik.lonnegren@suse.com>
- update to 1.5.0:
* libbpf can now open (but not load!) BPF objects of non-native endianness,
enabling cross-architecture support for BPF skeleton generation and BPF
object introspection
* BPF skeleton will now auto-attach SEC(".struct_ops") maps as part of
<skeleton>__attach() call
* BPF kprobe session programs support (SEC("kprobe.session"))
* allow specifying kernel module name for fentry/fexit BPF programs
(SEC(fentry/module:function)
* libbpf recognizes LIBBPF_LOG_LEVEL environment variable, which can be used
to set default log verboseness
* BPF ringbuf APIs that limit maximum number of consumed records at a time
(ring_buffer__consume_n(), ring__consume_n())
* distilled BTF support (btf__distill_base(), btf__relocate())
* BPF link-based attachment of BPF_PROG_TYPE_SOCKMAP programs
(bpf_program__attach_sockmap())
* bpf_object__token_fd() API to fetch BPF token FD of a BPF object, if any
* fixes for fetching syscall arguments on arm64, s390x, risc-v architectures
* better GCC-BPF source code compatibility
* __bpf_fastcall support for a few BPF helpers
* __uptr annotation definition added to bpf/bpf_helpers.h API header
* fixes and improvements around handling missing and nulled out struct_ops
programs
* fixed mmap()-ing logic for global data, fixing interop between generic
bpf_object__open() APIs and BPF subskeletons
* BPF skeleton backwards compatibility handling fixes
* handle LTO-produced *.llvm.<hash> symbols better
* feature detection fixes in the presence of BPF token inside user namespace
* older kernels have broken PID filtering logic for multi-uprobes, libbpf now
detects this and avoids the use of multi-uprobes for USDTs
* fix accidental drop of FD_CLOEXEC flag during BPF map reuse
* few BTF dumper formatting fixes
* a few more small fixes all around.
-------------------------------------------------------------------
Wed Oct 30 15:29:42 UTC 2024 - Fredrik Lönnegren <fredrik.lonnegren@suse.com>
- update to 1.4.7:
* fix interop issues between generic bpf_object__open() APIs and BPF
subskeleton w.r.t. global data handling
* speed up BTF sanity checks by skipping already validated base BTF
* fix legacy treatment of non-SEC()-annotated subprogram as entry BPF program
in some cases
-------------------------------------------------------------------
Wed Sep 4 08:44:47 UTC 2024 - Fredrik Lönnegren <fredrik.lonnegren@suse.com>
- update to 1.4.6:
* BPF skeleton forward compatibility fix (f6f2402);
* BTF endianness inheritance bug fix (fe28fae).
-------------------------------------------------------------------
Thu Jul 18 15:56:27 UTC 2024 - Dirk Müller <dmueller@suse.com>
- update to 1.4.5:
* Another small bug fix release backporting https://github.com/
libbpf/libbpf/commit/d9f9fd5b22223ae69c62e083da6093d95a0db799
which works around kernel-side bug with USDT PID filtering on
kernels that support multi-uprobe (but have broken PID
filtering).
-------------------------------------------------------------------
Tue Jun 4 06:10:48 UTC 2024 - Shung-Hsi Yu <shung-hsi.yu@suse.com>
- update to 1.4.3:
* Fix libbpf unintentionally dropping FD_CLOEXEC flag when (internally)
duping FDs
-------------------------------------------------------------------
Sat May 11 07:03:51 UTC 2024 - Fredrik Lönnegren <fredrik.lonnegren@suse.com>
- update to 1.4.2:
* Another struct_ops-focused bug fix release. It addresses a few more corner
cases when dealing with SEC("struct_ops") programs.
* It also improves error messaging around common use case of declaring
struct_ops BPF program and not referencing it from SEC(".struct_ops")
variable (backed by struct_ops BPF map).
* This release should improve overall experience of using BPF struct_ops
functionality.
-------------------------------------------------------------------
Thu May 2 08:19:03 UTC 2024 - Fredrik Lönnegren <fredrik.lonnegren@suse.com>
- update to 1.4.1:
* Bug fix release fixing logic around determining whether to autoload
SEC("struct_ops") programs in cases when old kernel doesn't support some
optional callbacks and user reset them to NULL from BPF skeleton.
-------------------------------------------------------------------
Wed Apr 3 10:50:11 UTC 2024 - Shung-Hsi Yu <shung-hsi.yu@suse.com>
- update to 1.4.0:
* support for BPF token throughout low-level and high-level APIs
(see also LIBBPF_BPF_TOKEN_PATH envvar)
* struct_ops functionality around handling multi-kernel
compatibility using BPF CO-RE principles and approaches
* BPF arena map support
* support __arena tagged global variables, which are automatically
put into BPF arena map
* BPF cookie support for raw tracepoint BPF programs in attach APIs
loaded or created, respectively
* add SEC("sk_skb/verdict") support
* support global subprog argument tagging for for kprobe/uprobe,
and perf_event BPF program with newly added __arg_ctx,
__arg_nonnull, __arg_nullable, __arg_trusted, and __arg_arena
annotations
* add bpf_core_cast() macro, improving ergonomics of
bpf_rdonly_cast() BPF helper
* __long() macro added for specifying 64-bit values when declaring
BTF-defined maps
* better GCC-BPF support in BPF CO-RE macros in bpf_core_read.h header
* show specific error messages when attempting to
use struct bpf_program/bpf_map instances there were not loaded or
created
* fix inner map's max_entries setting logic
* btf_ext__raw_data() and btf__new_split() APIs are added back
* ignore DWARF sections in BPF linker sanity checks, improving
handling of some corner cases
* fix potential NULL dereference when handling corrupted ELF files.
-------------------------------------------------------------------
Sat Nov 25 09:45:41 UTC 2023 - Dirk Müller <dmueller@suse.com>
- update to 1.3.0:
* support for `netfilter` programs is added
`SEC("netfilter")` is now available
* API function `bpf_program__attach_netfilter()` is now
available
* support for `tcx` BPF programs is added:
* the following new SEC definitions are now available:
SEC("tc/egress"), SEC("tc/ingress"), SEC("tcx/egress"),
SEC("tcx/ingress")
* the following SEC definitions are now considered legacy:
SEC("tc"), SEC("action"), SEC("classifier")
* functions `bpf_prog_attach_opts()` and
`bpf_prog_query_opts()` are extended to work with `tcx`
programs, plus two new API functions are added:
* the following new SEC definitions are now available:
SEC("uprobe.multi"), SEC("uprobe.multi.s"),
SEC("uretprobe.multi"), SEC("uretprobe.multi.s")
* support for section `SEC("usdt.s")` is added for sleepable
`usdt` programs;
* support for Unix domain socket cgroup BPF programs is added
the following new SEC definitions are now available:
SEC("cgroup/connect_unix"),SEC("cgroup/sendmsg_unix"),
SEC("cgroup/recvmsg_unix"), SEC("cgroup/getpeername_unix"),
SEC("cgroup/getsockname_unix")
* new `LIBBPF_OPTS_RESET()` utility macro;
* new `bpf_object__unpin()` function to complement existing
`bpf_object__pin()`;
* new API functions for work with ring buffers
* uprobe SEC matcher extended to allow golang symbols;
* uprobe support for symbols versioning;
* `bpf_map__set_value_size()` can now be used to resize memory
mapped region for memory mapped maps;
* `struct bpf_xdp_query_opts` extended with `xdp_zc_max_segs`
output field;
* basic BTF sanity check pass added to reject bogus BTF.
* fix for btf_dump__dump_type_data() when type contains
bitfields;
* fix for correct work of offsetof() and container_of() macro
with CO-RE;
* no longer attempt to load modules BTF when resolving CO-RE
relocations if CAP_SYS_ADMIN are absent;
* regex based function search for "kprobe.multi/" programs no
longer attempts to trace functions that cannot be traced;
* bpf_program__set_type() no longer resets sec_def if it is set
to a custom fallback SEC handler;
* fix for memory leak possible after
bpf_program__set_attach_target() call;
-------------------------------------------------------------------
Fri Jul 14 05:04:50 UTC 2023 - Shung-Hsi Yu <shung-hsi.yu@suse.com>
- update to v1.2.2:
* fix a regression in perf tool caused by libbpf resetting its custom
catch-all SEC() handler on explicit bpf_program__set_type() call
* fix possible double-free in USDT-related libbpf code, which happens when
libbpf runs out of space in __bpf_usdt_specs map due to having too many
unique USDT specs
-------------------------------------------------------------------
Tue May 2 08:03:30 UTC 2023 - Dirk Müller <dmueller@suse.com>
- update to 1.2.0:
* completely overhauled "Libbpf overview" landing documentation
page;
* support for BPF link-based `struct_ops` programs:
* `SEC(".struct_ops.link")` annotations;
* `bpf_map__attach_struct_ops()` attach API;
* `bpf_link__update_map()` link update API;
* support sleepable `SEC("struct_ops.s")` programs
* improved thread-safety of libbpf print callbacks and
`libbpf_set_print()`
* improve handling and reporting of missing BPF kfuncs
* `bpf_{btf,link,map,prog}_get_info_by_fd()` APIs
* `bpf_xdp_query_opts()` supports fetching XDP/XSK supported
features;
* `perf_buffer__new()` allows customizing notification/sampling
period now;
* BPF verifier logging improvements:
* pass-through BPF verifier log level and flags to kernel as
is
* support `log_true_size` for getting required log buffer size
to fit BPF verifier log completely;
* allow precise control over kprobe/uprobe attach mode: legacy,
perf-based, link-based.
* fix legacy kprobe events names sanitization;
* fix clobbering errno in some cases;
* fix BPF map's `BPF_F_MMAPABLE` flag sanitization;
* fix BPF-side USDT support code on s390x architecture;
* fix `BPF_PROBE_READ{_STR}_INTO()` on s390x architecture;
* fix kernel version setting for Debian kernels;
* fix netlink protocol handling in some cases;
* improve robustness of attaching to legacy kprobes and
uprobes;
* fix double-free during static linking empty ELF sections;
* a bunch of other small fixes here and there.
-------------------------------------------------------------------
Thu Jan 5 07:02:19 UTC 2023 - Shung-Hsi Yu <shung-hsi.yu@suse.com>
- Remove requirement of linux-glibc-devel >= 5.16 for devel package
-------------------------------------------------------------------
Thu Dec 22 07:08:39 UTC 2022 - Dirk Müller <dmueller@suse.com>
- update to v1.1.0:
User space-side features and APIs:
* user-space ring buffer (BPF_MAP_TYPE_USER_RINGBUF) support;
* new documentation page listing all recognized SEC() definitions;
* BTF dedup improvements:
* unambiguous fwd declaration resolution for structs and unions;
* better handling of some corner cases with identical structs and arrays;
* mixed enum and enum64 forward declaration resolution logic;
* bpf_{link,btf,pro,mapg}_get_fd_by_id_opts() and bpf_get_fd_by_id_opts()
APIs;
* libbpf supports loading raw BTF for BPF CO-RE from known search paths;
* support for new cgroup local storage (BPF_MAP_TYPE_CGRP_STORAGE);
* libbpf will only add BPF_F_MMAPABLE flag for data maps with global
(i.e., non-static) vars;
* latest Linux UAPI headers with lots of changes synced into
include/uapi/linux.
BPF-side features and APIs;
* BPF_PROG2() macro added that supports struct-by-value arguments;
* new BPF helpers:
* bpf_user_ringbuf_drain();
* cgrp_storage_get() and cgrp_storage_delete().
Bug fixes
* better handling of padding corner cases;
* btf__align_of() determines packed structs better now;
* improved handling of enums of non-standard sizes;
* USDT spec parsing improvements;
* overflow handling fixes for ringbufs;
* Makefile fixes to support cross-compilation for 32-bit targets;
* fix crash if SEC("freplace") programs don't have attach_prog_fd set;
* better handling of file existence checks when running as non-root with
enhanced capabilities;
* a bunch of small fixes:
* ELF handling improvements;
* fix memory leak in USDT argument parsing logic;
* fix NULL dereferences in few corner cases;
* improved netlink attribute iteration handling.
- drop libbpf-Use-elf_getshdrnum-instead-of-e_shnum.patch,
libbpf-Fix-use-after-free-in-btf_dump_name_dups.patch,
libbpf-Fix-memory-leak-in-parse_usdt_arg.patch
libbpf-Fix-null-pointer-dereference-in-find_prog_by_.patch (upstream)
-------------------------------------------------------------------
Tue Nov 8 06:03:55 UTC 2022 - Shung-Hsi Yu <shung-hsi.yu@suse.com>
- Fix out-of-bound heap write (boo#1194248 boo#1194249 CVE-2021-45940 CVE-2021-45941)
+ libbpf-Use-elf_getshdrnum-instead-of-e_shnum.patch
- Fix use-after-free in btf_dump_name_dups (boo#1204391 CVE-2022-3534)
+ libbpf-Fix-use-after-free-in-btf_dump_name_dups.patch
- Fix memory leak in parse_usdt_arg() (boo#1204393 CVE-2022-3533)
+ libbpf-Fix-memory-leak-in-parse_usdt_arg.patch
- Fix null pointer dereference in find_prog_by_sec_insn() (boo#1204502 CVE-2022-3606)
+ libbpf-Fix-null-pointer-dereference-in-find_prog_by_.patch
-------------------------------------------------------------------
Tue Oct 4 17:22:08 UTC 2022 - Dirk Müller <dmueller@suse.com>
- update to 1.0.1:
* fix inadvertently changed struct bpf_object_open_opts memory layout;
* fix btf.h header relying on struct enum64 type defined in kernel UAPI headers;
* fix NULL pointer exception in API btf_dump__dump_type_data;
* remove struct btf_map_def accidentally left in bpf_helpers.h header.
* All deprecated APIs and features removed!
* support for syscall-specific kprobe/kretprobe
(SEC("ksyscall/<syscall_name>") and SEC("kretsyscall/<syscall_name>"));
* support for sleepable uprobe BPF programs (SEC("uprobe.s"));
* support for per-cgroup LSM BPF programs (SEC("lsm_cgroup"));
* support for new BPF CO-RE relocation TYPE_MATCHES;
* bpf_prog_load() and bpf_map_create() are now smarter about handling program
and map name on old kernels (it will be ignored if kernel doesn't support
names);
* BTF_KIND_ENUM64 support;
* increase tracing attachment (kprobe/uprobe/tracepoint) robustness by using
tracefs or debugfs, whichever is mounted;
* new APIs for converting BPF enums to their string representation:
* libbpf_bpf_prog_type_str();
* libbpf_bpf_map_type_str();
* libbpf_bpf_link_type_str();
* libbpf_bpf_attach_type_str();
* bpf_program__set_autoattach() and bpf_program__autoattach() to allow opting
out from auto-attaching of BPF program by BPF skeleton;
* perf_buffer__buffer() API to give access to underlying per-CPU buffer for BPF ringbuf;
* bpf_obj_get_opts() API for more flexible fetching of BPF kernel objects' information.
- see https://github.com/libbpf/libbpf/releases/tag/v1.0.0 for detailed changelog
-------------------------------------------------------------------
Wed Aug 3 13:55:13 UTC 2022 - Callum Farmer <gmbr3@opensuse.org>
- Update to release 0.8.1:
* make shared xsk creation network namespace aware
-------------------------------------------------------------------
Thu May 19 03:00:36 UTC 2022 - Shung-Hsi Yu <shung-hsi.yu@suse.com>
- Update to release 0.8.0
* New features and APIs:
- support auto-resolution of binaries and shared libraries from PATH, if necessary;
- support attaching by function names (only by IP was supported before);
- support attaching to USDTs (SEC("usdt/...") and
bpf_program__attach_usdt()) with initially supported architectures:
x86-64 (amd64); x86 (i386); s390x; ARM64 (aarch64); RISC V (riscv);
- improved BPF verifier log reporting for CO-RE relocation failures (no
more obscure "invalid func unknown#195896080" errors);
- auto-adjust BPF ringbuf size according to host kernel's page size requirements;
- high-level BPF map APIs: bpf_map__lookup_elem(), bpf_map__update_elem(),
etc that validate key/value buffer sizes;
- bpf_link_create() can create all bpf_link-based (including raw_tp,
fentry/fexit, etc), falling back to bpf_raw_tracepoint_open() on old
kernels transparently;
- support opting out from auto-loading BPF programs declaratively with
SEC("?...");
- support opting out from auto-creation of declarative BPF maps with
bpf_map__set_autocreate();
- support multi-kprobes (SEC("kprobe.multi/...") and
bpf_program__attach_kprobe_multi_opts());
- support target-less SEC() programs (e.g., SEC("kprobe"), SEC("tp"), etc);
- support BPF sub-skeletons for "incomplete" BPF object files (requires
matching bpftool to generate .subskel.h);
- BPF cookie support for fentry/fexit/fmod_ret BPF programs
(bpf_program__attach_trace_opts());
- support for custom SEC() handlers (libbpf_register_prog_handler()).
* BPF-side API
- BPF-side USDT APIs. See new usdt.bpf.h header:
* BPF_USDT() program wrapper macro; bpf_usdt_arg(), bpf_usdt_arg_cnt(),
* bpf_usdt_cookie() helpers;
- new bpf_core_field_offset() CO-RE helper and support
bpf_core_field_size(type, field) forms;
- barrier() and barrier_var() macros for improving BPF code generation;
- __kptr and __kptr_ref tags added;
- ARC architecture support in bpf_tracing.h header;
- new BPF helpers:
* bpf_skb_set_tstamp();
* bpf_ima_file_hash();
* bpf_kptr_xchg();
* bpf_map_lookup_percpu_elem().
* Bug fixes
- netlink bug fixes;
- libbpf.pc fixes to support patch releases properly;
- BPF_MAP_TYPE_PERF_EVENT_ARRAY map auto-pinning fix;
- minor CO-RE fixes and improvements for some corner cases;
- various other small fixes and improvements.
-------------------------------------------------------------------
Thu Mar 10 18:28:17 UTC 2022 - Jeff Mahoney <jeffm@suse.com>
- Enable building and packaging of static library.
Explicitly enable fat LTO objects.
-------------------------------------------------------------------
Mon Mar 7 11:52:14 UTC 2022 - Jan Engelhardt <jengelh@inai.de>
- Python is not used during build; remove it and help break
a cycle.
-------------------------------------------------------------------
Fri Mar 4 10:18:54 UTC 2022 - Jan Engelhardt <jengelh@inai.de>
- Update to release 0.7.0
* legacy BPF map definitions (using struct bpf_map_def) are
deprecated when LIBBPF_STRICT_MAP_DEFINITIONS is passed to
libbpf_set_strict_mode(). Please use BTF-defined map
definitions.
* ability to control and capture BPF verifier log output on
per-object and per-program level
* CO-RE support and other improvements for "light skeleton"
* improved compilation when system BTF UAPI headers are outdated
-------------------------------------------------------------------
Sat Dec 11 10:37:27 UTC 2021 - Jan Engelhardt <jengelh@inai.de>
- Update to release 0.6.1
* Introduce legacy kprobe events support
* Add legacy uprobe attaching support
* Support uniform BTF-defined key/value specification across
all BPF maps
* Support kernel module function calls
* Support detecting and attaching of writable tracepoint
program
* Add bloom filter map implementation
* Add typeless and weak ksym support to gen_loader
* Add RISC-V (RV64) support to bpf_tracing.h
* Deprecate AF_XDP support
* Support BTF_KIND_TYPE_TAG
-------------------------------------------------------------------
Mon Sep 27 11:02:49 UTC 2021 - Shung-Hsi Yu <shung-hsi.yu@suse.com>
- Update to 0.5.0:
+ New features and user-space APIs:
- libbpf_set_strict_mode() allowing to opt-in into backwards incompatible libbpf-1.0 changes. See "Libbpf: the road to 1.0" and "Libbpf 1.0 migration guide" for more details.
- streamlined error reporting for low-level APIs, high-level error-returning APIs, and pointer-returning APIs (as a libbpf-1.0 opt-in);
- "Light" BPF skeleton support;
- BPF_PROG_TYPE_SYSCALL support;
- BPF perf link support for kprobe, uprobe, tracepoint, and perf_event BPF programs;
- BPF cookie support for kprobe, uprobe, tracepoint, and perf_event BPF programs through bpf_program__attach_[ku]probe_opts() APIs;
- allow to specify ref_ctr_off for USDT semaphores through bpf_program__attach_uprobe_opts() API;
- btf_custom_path support in bpf_object_open_opts, allowing to specify custom BTF for CO-RE relocations;
- sk_reuseport/migrate program type support;
- btf_dump__dump_type_data() API, allowing to dump binary data according to BTF type description;
- btf__load_into_kernel() and btf__load_from_kernel_by_id(), and split BTF variants of them;
- btf__load_vmlinux_btf() and btf__load_module_btf() APIs;
- bpf_map__initial_value() API to get initial value of mmap-ed BPF maps;
- bpf_map_lookup_and_delete_elem_flags() API.
+ BPF-side APIs and features:
- support for weak typed __ksym externs;
- BPF timer helpers: bpf_timer_init(), bpf_timer_set_callback(), bpf_timer_start(), bpf_timer_cancel();
- bpf_get_attach_cookie() helper to get BPF cookie from BPF program side;
- bpf_get_func_ip() helper;
- bpf_sys_bpf() helper;
- bpf_task_pt_regs() helper;
- bpf_btf_find_by_name_kind() helper;
- usability improvements for bpf_tracing.h when target architecture is missing.
+ Bug fixes and compatibility improvements:
- improve BPF support detection on old Red Hat kernels with backported BPF patches;
- improvements for LTO builds with GCC 10+;
- pass NLM_F_EXCL when creating TC qdisc;
- better support of BPF map reuse on old kernels;
- fix the bug resulting in sometimes closing FD 0, which wasn't created and owned by libbpf itself.
- Remove patches merged upstream
+ libdir.patch
+ libbpf-Fix-build-with-latest-gcc-binutils-with-LTO.patch
-------------------------------------------------------------------
Fri Aug 27 06:20:53 UTC 2021 - Michal Suchanek <msuchanek@suse.com>
- Fix LTO build (bsc#1188749).
+ libbpf-Fix-build-with-latest-gcc-binutils-with-LTO.patch
-------------------------------------------------------------------
Fri Aug 20 08:47:47 UTC 2021 - Michal Suchanek <msuchanek@suse.com>
- Depend on new enough Linux headers.
-------------------------------------------------------------------
Mon Aug 2 11:00:28 UTC 2021 - Callum Farmer <gmbr3@opensuse.org>
- Create libbpf0-32bit needed by libdwarves1-32bit
-------------------------------------------------------------------
Sat Jul 17 15:38:52 UTC 2021 - Michal Suchanek <msuchanek@suse.com>
- libbpf is now a separate project, stop building from the kernel
(bsc#1188419 jsc#SLE-17288 jsc#SLE-18805).
- Fix LIBSUBDIR
+ libdir.patch
-------------------------------------------------------------------
Mon Jun 8 23:52:39 UTC 2020 - Michał Rostecki <mrostecki@suse.com>
- Add python3 as a build dependency.
-------------------------------------------------------------------
Sun Feb 2 19:50:55 UTC 2020 - Michał Rostecki <mrostecki@opensuse.org>
- Build libbpf from kernel sources, not from github sources, for
consistency with bpftool package.
-------------------------------------------------------------------
Tue Jan 7 14:36:44 UTC 2020 - Tomáš Chvátal <tchvatal@suse.com>
- Reflect SUSE CFLAGS
- Do not bother with obscpio if we are fetching direct releases
- Remove patch 0001-makefile-Fix-install-target.patch seems
to build/install without it just fine
- Update to 0.0.6:
+ New features
- new extensible bpf_object__open_{file,mem} APIs and
DECLARE_LIBBPF_OPTS() macro to go with them
- bpf_helpers.h, bpf_endian.h, and bpf_tracing.h are now
distributed with libbpf
- BPF CO-RE: added field size, field existence, and bitfield
relocation support
- BPF CO-RE: BPF_CORE_READ(), bpf_core_field_exists(),
bpf_core_field_size() and other BPF CO-RE related helpers
available through bpf_core_read.h header
- bpf_object__open() API now auto-detects program type from
its section name
- BPF_PROG_TRACING programs support (incuding BTF-typed raw
tracepoints, fentry/fexit programs)
- mmap() support for BPF global variables
- declarative map pinning support added
- probe_read_{user,kernel}[_str]() BPF helpers added
- bpf_get_link_xdp_info() function to get more XDP information
added
- a bunch of other AF_XDP changes
+ Usability improvements
- no need for int version SEC('version') = 1; anymore
- raw_tp/tp and uprobe/uretprobe section prefixes added
- new bpf_program__get_{type,expected_attach_type} getters
- preserve error code on program load failure
+ Fixes
- btf_dump padding handling
- bpf_object__name() returning name, not path
- ELF section handling off-by-one bug fix
- mem leak/double free fix in BPF program relocation code
-------------------------------------------------------------------
Tue Oct 1 09:15:18 UTC 2019 - Michał Rostecki <mrostecki@opensuse.org>
- Initial release