diff options
| author | Song Liu <[email protected]> | 2020-02-14 15:41:46 -0800 |
|---|---|---|
| committer | Daniel Borkmann <[email protected]> | 2020-02-18 16:08:27 +0100 |
| commit | b80b033bedae68dae8fc703ab8a69811ce678f2e (patch) | |
| tree | 58d2c30ae0127f991c0e2caf06edb38b38c97dc7 /tools/perf/scripts/python | |
| parent | b182a66792feb706c62e50c31db8546ca4ff168e (diff) | |
bpf: Allow bpf_perf_event_read_value in all BPF programs
bpf_perf_event_read_value() is NMI safe. Enable it for all BPF programs.
This can be used in fentry/fexit to profile BPF program and individual
kernel function with hardware counters.
Signed-off-by: Song Liu <[email protected]>
Signed-off-by: Daniel Borkmann <[email protected]>
Link: https://lore.kernel.org/bpf/[email protected]
Diffstat (limited to 'tools/perf/scripts/python')
0 files changed, 0 insertions, 0 deletions