diff options
author | Song Liu <songliubraving@fb.com> | 2020-02-14 15:41:46 -0800 |
---|---|---|
committer | Daniel Borkmann <daniel@iogearbox.net> | 2020-02-18 16:08:27 +0100 |
commit | b80b033bedae68dae8fc703ab8a69811ce678f2e (patch) | |
tree | 58d2c30ae0127f991c0e2caf06edb38b38c97dc7 /arch/arm/kernel/fiqasm.S | |
parent | b182a66792feb706c62e50c31db8546ca4ff168e (diff) |
bpf: Allow bpf_perf_event_read_value in all BPF programs
bpf_perf_event_read_value() is NMI safe. Enable it for all BPF programs.
This can be used in fentry/fexit to profile BPF program and individual
kernel function with hardware counters.
Signed-off-by: Song Liu <songliubraving@fb.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Link: https://lore.kernel.org/bpf/20200214234146.2910011-1-songliubraving@fb.com
Diffstat (limited to 'arch/arm/kernel/fiqasm.S')
0 files changed, 0 insertions, 0 deletions