On 03/06/2018 07:55 PM, Teng Qin wrote: > These patches add support that allows bpf programs attached to perf events to > read the address values recorded with the perf events. These values are > requested by specifying sample_type with PERF_SAMPLE_ADDR when calling > perf_event_open(). > > The main motivation for these changes is to support building memory or lock > access profiling and tracing tools. For example on Intel CPUs, the recorded > address values for supported memory or lock access perf events would be > the access or lock target addresses from PEBS buffer. Such information would > be very valuable for building tools that help understand memory access or > lock acquire pattern.
Series applied to bpf-next, thanks Teng!