From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.9 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI, SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id D6434C606BD for ; Mon, 8 Jul 2019 16:32:27 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id A98F521537 for ; Mon, 8 Jul 2019 16:32:27 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=kinvolk.io header.i=@kinvolk.io header.b="Dfct8cMt" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391508AbfGHQc0 (ORCPT ); Mon, 8 Jul 2019 12:32:26 -0400 Received: from mail-wm1-f66.google.com ([209.85.128.66]:51941 "EHLO mail-wm1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389407AbfGHQb5 (ORCPT ); Mon, 8 Jul 2019 12:31:57 -0400 Received: by mail-wm1-f66.google.com with SMTP id 207so162700wma.1 for ; Mon, 08 Jul 2019 09:31:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kinvolk.io; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=85UmCqjB/2q4FemAi0uqOHeKcTywLVBMQcPg1IVAqAM=; b=Dfct8cMtJ3z8OuDpeDpsjRAF6WXSTiaH+K294/muggipqhmBYGNxaI8Of4vzfovnWd araJpc0PBcJ2t3N22S6Ai2IPrId9rxQmWqKV1zBEiXjqowqjmg/g1mcNqux1teEWW98B jNJCpOG+OC0EloVzoloxZiHXdRx1tzoJis7HQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=85UmCqjB/2q4FemAi0uqOHeKcTywLVBMQcPg1IVAqAM=; b=Bf4XPA5gXqbjcn9QDm/jSv4DyYxZkRt7XPJbD7wX5GjQzmhB8L+LH/E9pTz3SL7VYm g2x7ntPUyTMvuLRs+k5NFLie3EcKb4SH+kBBW15cV2NJUhNEwV1g6Z6qzkfku8BGomFL rITPmCaefM7na0b/mLpRjssQdw/QEFmN4j9P29G2J03nwYLdzY4yHHkfJ1j5HzWTPWN3 ZbJVCLllNIMRoZUYdK3yVYGTcMBO7Sk0L0JNSmqD2fOezNGhabTlGWjpbtXguY9TCpCf MH/xYmocQt3XDBI8OLg8odLBbHG8z/19EJvV1uapJHy2aWgeNl081LSzuNmntZ5XS0A8 pdqQ== X-Gm-Message-State: APjAAAVYfzf6ehf0B8VBuCkFspLQGpmlWKZYEKAQKXv2y6mTpzw82mVQ 0DQt4Rm6AFCZFLtKY9Ou1Eqmrsm+z6AbJQ== X-Google-Smtp-Source: APXvYqyj4c3lEISNKOfADRNSxJClIv1MsBpCK5ZQjZI88b+WTlVEnLoE4ff4qUL/ArYdaGtzNigjjg== X-Received: by 2002:a1c:305:: with SMTP id 5mr18180038wmd.101.1562603516202; Mon, 08 Jul 2019 09:31:56 -0700 (PDT) Received: from localhost.localdomain (ip5f5aedbe.dynamic.kabel-deutschland.de. [95.90.237.190]) by smtp.gmail.com with ESMTPSA id e6sm18255086wrw.23.2019.07.08.09.31.55 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Mon, 08 Jul 2019 09:31:55 -0700 (PDT) From: Krzesimir Nowak To: linux-kernel@vger.kernel.org Cc: Alban Crequy , =?UTF-8?q?Iago=20L=C3=B3pez=20Galeiras?= , Alexei Starovoitov , Daniel Borkmann , Martin KaFai Lau , Song Liu , Yonghong Song , "David S. Miller" , Jakub Kicinski , Jesper Dangaard Brouer , John Fastabend , Stanislav Fomichev , netdev@vger.kernel.org, bpf@vger.kernel.org, xdp-newbies@vger.kernel.org, Krzesimir Nowak Subject: [bpf-next v3 08/12] tools headers: Sync struct bpf_perf_event_data Date: Mon, 8 Jul 2019 18:31:17 +0200 Message-Id: <20190708163121.18477-9-krzesimir@kinvolk.io> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190708163121.18477-1-krzesimir@kinvolk.io> References: <20190708163121.18477-1-krzesimir@kinvolk.io> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org struct bpf_perf_event_data in kernel headers has the addr field, which is missing in the tools version of the struct. This will be important for the bpf prog test run implementation for perf events as it will expect data to be an instance of struct bpf_perf_event_data, so the size of the data needs to match sizeof(bpf_perf_event_data). Signed-off-by: Krzesimir Nowak --- tools/include/uapi/linux/bpf_perf_event.h | 1 + 1 file changed, 1 insertion(+) diff --git a/tools/include/uapi/linux/bpf_perf_event.h b/tools/include/uapi/linux/bpf_perf_event.h index 8f95303f9d80..eb1b9d21250c 100644 --- a/tools/include/uapi/linux/bpf_perf_event.h +++ b/tools/include/uapi/linux/bpf_perf_event.h @@ -13,6 +13,7 @@ struct bpf_perf_event_data { bpf_user_pt_regs_t regs; __u64 sample_period; + __u64 addr; }; #endif /* _UAPI__LINUX_BPF_PERF_EVENT_H__ */ -- 2.20.1