From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933129AbcH2MTV (ORCPT ); Mon, 29 Aug 2016 08:19:21 -0400 Received: from bombadil.infradead.org ([198.137.202.9]:46046 "EHLO bombadil.infradead.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932969AbcH2MTS (ORCPT ); Mon, 29 Aug 2016 08:19:18 -0400 Date: Mon, 29 Aug 2016 14:19:08 +0200 From: Peter Zijlstra To: Alexei Starovoitov Cc: "David S . Miller" , Brendan Gregg , Daniel Borkmann , Arnaldo Carvalho de Melo , Wang Nan , netdev@vger.kernel.org, linux-kernel@vger.kernel.org, kernel-team@fb.com Subject: Re: [PATCH net-next 0/6] perf, bpf: add support for bpf in sw/hw perf_events Message-ID: <20160829121908.GO10153@twins.programming.kicks-ass.net> References: <1472265084-1767670-1-git-send-email-ast@fb.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1472265084-1767670-1-git-send-email-ast@fb.com> User-Agent: Mutt/1.5.23.1 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Aug 26, 2016 at 07:31:18PM -0700, Alexei Starovoitov wrote: > Hi Peter, Dave, > > this patch set is a follow up to the discussion: > https://lkml.org/lkml/2016/8/4/304 > It turned out to be simpler than what we discussed. > > Patches 1-3 is a bpf-side prep for the main patch 4 > that adds bpf program as an overflow_handler to sw and hw perf_events. > Peter, please review. > > Patches 5 and 6 are tests/examples from myself and Brendan. Brendan, so this works for you without extra hacks required?