commit | b80b033bedae68dae8fc703ab8a69811ce678f2e | [log] [tgz] |
---|---|---|
author | Song Liu <songliubraving@fb.com> | Fri Feb 14 15:41:46 2020 -0800 |
committer | Daniel Borkmann <daniel@iogearbox.net> | Tue Feb 18 16:08:27 2020 +0100 |
tree | 58d2c30ae0127f991c0e2caf06edb38b38c97dc7 | |
parent | b182a66792feb706c62e50c31db8546ca4ff168e [diff] |
bpf: Allow bpf_perf_event_read_value in all BPF programs bpf_perf_event_read_value() is NMI safe. Enable it for all BPF programs. This can be used in fentry/fexit to profile BPF program and individual kernel function with hardware counters. Signed-off-by: Song Liu <songliubraving@fb.com> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net> Link: https://lore.kernel.org/bpf/20200214234146.2910011-1-songliubraving@fb.com