Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v0.19.0
->v0.23.1
9aa4983
->7625b7f
v4.13.0
->v4.13.1
v0.5.5
->v0.5.6
v1.0.1
->v1.0.2
v0.16.0
->v0.18.0
v1.1.2
->v1.3.0
v1.2.0
->v1.7.1
v0.6.0
->v0.8.0
v2.0.4
->v2.0.7
v3.12.1
->v3.12.2
v5.9.0+incompatible
->v5.9.11+incompatible
v1.8.0
->v1.9.0
v2.7.0
->v2.8.0
v0.5.1
->v0.6.0
v0.21.0
->v0.21.1
v0.23.0
->v0.23.1
v0.22.0
->v0.25.0
v0.6.8
->v0.6.9
v0.6.0
->v0.7.0
a4b03ec
->c008609
v2.26.1
->v2.26.3
v1.17.11
->v1.18.0
v2.2.9
->v2.2.10
v0.3.0
->v0.4.0
v0.7.7
->v0.9.0
v7.0.88
->v7.0.91
v1.8.2-community.0.20250331143604-8496cf5818d4
->v1.9.0-crc1
f37122a
->526b43e
v0.59.1-netobserv
->v0.62.0
v2.22.2
->v2.23.4
v1.36.2
->v1.37.0
8a7efbf
->7152b1b
57a2590
->39e94d8
v4.1.21
->v4.1.22
v0.2.2
->v0.2.3
v0.79.2
->v0.82.0
v1.21.0
->v1.22.0
v0.6.1
->v0.6.2
v0.62.0
->v0.63.0
v0.15.1
->v0.16.1
v1.8.2-0.20201028100903-3245b3267b24
->v1.99.0
v0.3.1-0.20231027162144-83e5e0097c91
->v0.5.10
v1.8.1
->v1.9.1
v2.27.2
->v2.27.6
v0.12.0
->v0.14.0
5f08fbb
->686a1a2
1.23.4
->1.24.2
v0.53.0
->v0.60.0
v1.34.0
->v1.35.0
v1.32.0
->v1.35.0
v1.29.0
->v1.35.0
v1.34.0
->v1.35.0
v1.33.0
->v1.35.0
v1.34.0
->v1.35.0
v1.34.0
->v1.35.0
v1.34.0
->v1.35.0
v1.32.0
->v1.35.0
v1.34.0
->v1.35.0
v1.5.0
->v1.6.0
v1.9.0
->v1.11.0
v0.36.0
->v0.37.0
054e65f
->7e4ce0a
v0.37.0
->v0.39.0
v0.26.0
->v0.29.0
v0.12.0
->v0.13.0
v0.31.0
->v0.32.0
v0.30.0
->v0.31.0
v0.23.0
->v0.24.0
v0.7.0
->v0.11.0
v0.31.0
->v0.32.0
v2.4.0
->v2.5.0
e9438ea
->10db94c
e9438ea
->10db94c
v1.70.0
->v1.72.0
v1.36.5
->v1.36.6
v0.32.3
->v0.33.0
v0.32.3
->v0.33.0
v0.32.3
->v0.33.0
v0.32.3
->v0.33.0
v0.32.3
->v0.33.0
v0.32.3
->v0.33.0
v0.32.3
->v0.33.0
32ad38e
->c8a335a
24370be
->0f33e8f
v1.2.0
->v1.3.0
v0.31.0
->v0.32.0
v0.20.3
->v0.20.4
v4.5.0
->v4.7.0
Release Notes
google/cel-spec (cel.dev/expr)
v0.23.1
Compare Source
What's Changed
Full Changelog: google/cel-spec@v0.23.0...v0.23.1
v0.23.0
Compare Source
What's Changed
New Contributors
Full Changelog: google/cel-spec@v0.22.1...v0.23.0
v0.22.1
Compare Source
What's Changed
Full Changelog: google/cel-spec@v0.22.0...v0.22.1
v0.22.0
Compare Source
What's Changed
New Contributors
Full Changelog: google/cel-spec@v0.21.2...v0.22.0
v0.21.2
Compare Source
What's Changed
Full Changelog: google/cel-spec@v0.21.1...v0.21.2
v0.21.1
Compare Source
What's Changed
Full Changelog: google/cel-spec@v0.21.0...v0.21.1
v0.21.0
Compare Source
What's Changed
Full Changelog: google/cel-spec@v0.20.0...v0.21.0
v0.20.0
What's Changed
Full Changelog: google/cel-spec@v0.19.2...v0.20.0
v0.19.2
Compare Source
What's Changed
Full Changelog: google/cel-spec@v0.19.1...v0.19.2
v0.19.1
Compare Source
What's Changed
Full Changelog: google/cel-spec@v0.19.0...v0.19.1
antlr4-go/antlr (github.com/antlr4-go/antlr/v4)
v4.13.1
: Release 4.13.1Compare Source
The 4.13.1 release has:
using mutexes, when the user knows they will not use it with multiple
go routines. (Note, somewhat experimental)
Note that I did not remove the sort.Slices calls. They will not be experimental for long
and are implemented efficently. Please make a fork if you must use it without this
dependency. Maybe review whether you need to do so for the sake of one call.
bpfman/bpfman-operator (github.com/bpfman/bpfman-operator)
v0.5.6
Compare Source
The v0.5.6 release is a patch release. The primary reason for the release is to move the version of sigstore-rs because of a breaking change which caused all previous bpfman versions to no longer be able to verify images. The CSI driver container used by bpfman-operator was also updated to support multiple architectures.
What's Changed
Full Changelog: bpfman/bpfman-operator@v0.5.5...v0.5.6
New Contributors
cenkalti/hub (github.com/cenkalti/hub)
v1.0.2
Compare Source
cilium/ebpf (github.com/cilium/ebpf)
v0.18.0
Compare Source
Initial Windows Support
This release adds support for eBPF on Windows through the eBPF for Windows runtime. Users must run a recent build of the
main
branch of eBPF for Windows, version 0.20.0 is not supported.See the documentation and how to contribute to the Windows port.
Supported:
Not supported:
The Windows port is still very new and won't be as performant or stable as the Linux part of the code base. There is also no guarantee of stability at the moment.
Build System Improvements
-verbose
flag to bpf2go and gentypes toolsV=
environment variableDocumentation
Bugfixes
Breaking Changes
ebpf:
SanitizeName
function. Map and program names are now automatically sanitized.What's Changed
binary.Read
withbinary.Decode
insysenc.Unmarshal
by @kolesnikovae in https://github.com/cilium/ebpf/pull/1713New Contributors
Full Changelog: cilium/ebpf@v0.17.3...v0.18.0
v0.17.3
Compare Source
Fixes for a data race in
btf.Spec.Copy
(thanks @paulcacheux) and a buffer overflow when running 32-bit user space on a 64-bit kernel (thanks @kolyshkin).What's Changed
unix.Auxv
by @tklauser in https://github.com/cilium/ebpf/pull/1665parseLineInfoRecords
by @paulcacheux in https://github.com/cilium/ebpf/pull/1657(*mutableTypes).copy
by @paulcacheux in https://github.com/cilium/ebpf/pull/1673Full Changelog: cilium/ebpf@v0.17.2...v0.17.3
v0.17.2
Compare Source
Another minor release to ship some bug fixes, notably for attaching bpf programs to symbols in kernel modules, and for reusing data sections across multiple Collections.
All users are encouraged to upgrade!
Features
Bug Fixes
Other Changes
flattenInstructions
by @paulcacheux in https://github.com/cilium/ebpf/pull/1647Thanks to all who contributed and reported issues!
Full Changelog: cilium/ebpf@v0.17.1...v0.17.2
v0.17.1
: Hotfix: don't retry endlessly on verifier errors on kernels <6.4Compare Source
During the prior removal of
ProgramOptions.LogSize
in v0.16, the tests weren't updated to exercise the retry logic. With the last-minute addition ofProgramOptions.LogSizeStart
, a bug was introduced that would cause program loads to retry indefinitely without ever growing the buffer in case of a verifier error on kernels before 6.4. This is now fixed, and the tests were updated to exercise the retry logic.v0.17.0
: Global Variables, Decl Tags, and packagepin
Compare Source
Note: the hotfix release 0.17.1 is out. Users are highly encouraged to upgrade.
As we close the door on the year 2024, we're also wrapping up the ebpf-go v0.17 development cycle. This release represents a large body of work and is our largest feature release since BTF.
Users are, as always, highly encouraged to upgrade, and we're looking forward to hearing your feedback on the new Global Variables API. We've been putting this interface trough its paces internally, along with a few eager community members, and we're ready to let the wider community make use of it.
This release also marks the end of our Go 1.21 support; Go 1.22 is required going forward.
Breaking Changes
Before we get to the fun stuff, we need to call out a few breaking changes:
Global variables with a
static
qualifier can no longer be rewritten usingCollectionSpec.RewriteConstants()
! See the section on global variables under major features below.program: remove LogSize and VerifierError.Truncated by @lmb in https://github.com/cilium/ebpf/pull/1526
prog: add ProgramOptions.LogSizeStart to obtain full log after verifier bug by @ti-mo in https://github.com/cilium/ebpf/pull/1630
The
ProgramOptions.LogSize
field was deprecated and a no-op since 0.16 and has now been removed completely. In its place, a new field was added to obtain full verifier logs when the verifier hits an internal bug. TheProgramOptions.LogSizeStart
field controls the starting size of the log buffer. Use this if you have a good understanding of the log size you're expecting, or if you're trying to pull out the full log when the verifier hits an internal bug. The error string now also contains some hints about what happened and how to handle this situation.map: remove MapSpec.Freeze field by @ti-mo in https://github.com/cilium/ebpf/pull/1558
elf_reader: don't use BPF_F_RDONLY_PROG flag to trigger map freezing by @ti-mo in https://github.com/cilium/ebpf/pull/1568
The Freeze field was ambiguous from the start, and has been a source of subtle bugs over the years. Automatic map freezing is now done based solely on map name (.(ro)data prefix). If you were manually setting this flag, consider using a conventional map name instead.
info: expose ksym info and func info by ProgramInfo by @Asphaltt in https://github.com/cilium/ebpf/pull/1576
info: expose more prog jited info by @Asphaltt in https://github.com/cilium/ebpf/pull/1598
Some ext_info types in package btf were redefined to enable pulling raw func and line infos out of
Program.Info()
. These were all types without methods and all unexported fields, but calling them out regardless in case someone's doingunintendedadvanced things with BTF.kallsyms: change Modules caching strategy, cache address lookups by @ti-mo in https://github.com/cilium/ebpf/pull/1590
Users attaching bpf programs to kernel symbols should see a marked decrease in allocations made in the library during program creation in the general case. Only used entries are now cached, making kallsyms lookups on subsequent program loads free. In the pathological case (new kernel symbols on every load), scanning is repeated, resulting in more CPU time being used instead of holding on to all kallsyms symbols indefinitely.
ProgramSpec.KernelModule()
was unexported until further notice.Also, bpf2go users should now be able to generate Go bindings as unprivileged users once again. Oops!
Major Features
Easy global variables: introducing
ebpf.VariableSpec
andebpf.Variable
This has been a frequent ask in the community for years, so we finally bit the bullet and committed to an API to interact with global bpf variables through
CollectionSpec.Variables
andCollectionSpec.Variables
. We've published a small guide over on ebpf-go.dev/concepts/global-variables that details how to use them, so we're not going to reiterate here.See the documentation on the use of the
static
qualifier! These are no longer considered global variables, and can't be modified at runtime.bpf2go now also generates objects to be used with
CollectionSpec.Assign
and.LoadAndAssign()
, and also emits Go type declarations for C types used as bpf C variables. Our test coverage was somewhat lacking for the latter, please drop something on the issue tracker if you're noticing surprising bpf2go output.Note that it's currently not possible to manually create a
VariableSpec
and wire it up to aCollectionSpec
, so if you were previously relying on e.g. manually assembling aCollectionSpec
and usingRewriteConstants()
in tests, this will no longer work. This may land as the API crystallizes and we settle on a good mechanism to enable this. Please reach out on the Cilium Slack if you'd like to see this happen.Tags!
As you'll notice, the
btf.Struct
,btf.Union
,btf.Member
,btf.Typedef
,btf.Func
andbtf.Var
have gained a new field:Tags
! Set one or more tags on these objects from bpf C using__attribute__((btf_decl_tag("mytag")))
andyou'll find
Tags
being populated in Go.There's also the
btf.Func.ParamTags
field that holds tags declared on individual function parameters. These are part of theFunc
since they appear only in the function prototype, not in the parameter type itself, since those can appear in many different types. (it does get confusing!)Also, an honorable mention to
btf.TypeTag
, which has now been exported. This allows tagging pointers with an arbitrary string value and is mainly used by the Linux verifier to tag kernel pointers, see the__kptr
and__kptr_ref
macros in Linux'bpf_helpers.h
.Pins!
We've added a new root-level package
pin
, which currently features theLoad()
andWalkDir()
functions. Since allLoadPinned*
functions in the library now check for the underlying object's type, we've repurposed the machinery to allow loading an opaque pin and returning a Go object of the right type.WalkDir
does what it says on the tin, it walks bpffs directories and invokes a callback that received the loaded object. Super convenient!Minor Features
We've also added a handful of minor features during this release:
bpf_prog_info
fields inProgramInfo
by @tyrone-wu in https://github.com/cilium/ebpf/pull/1512Other Changes
Last but not least, there's bugfixes, CI changes and some internal refactoring that happened to eventually make ebpf-go work with ebpf-for-windows. See individual PRs for more context. Stay tuned!
objNameAllowsDot
, return *btf.Var fromVariable{Spec}.Type()
by @ti-mo in https://github.com/cilium/ebpf/pull/1612Configuration
📅 Schedule: Branch creation - "after 5am on sunday" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
To execute skipped test pipelines write comment
/ok-to-test
.This PR has been generated by MintMaker (powered by Renovate Bot).