On 03/06/2018 07:55 PM, Teng Qin wrote:
> These patches add support that allows bpf programs attached to perf events to
> read the address values recorded with the perf events. These values are
> requested by specifying sample_type with PERF_SAMPLE_ADDR when calling
> perf_event_open().
> The main motivation for these changes is to support building memory or lock
> access profiling and tracing tools. For example on Intel CPUs, the recorded
> address values for supported memory or lock access perf events would be
> the access or lock target addresses from PEBS buffer. Such information would
> be very valuable for building tools that help understand memory access or
> lock acquire pattern.

Series applied to bpf-next, thanks Teng!

Reply via email to