On 8/5/15 3:04 AM, Peter Zijlstra wrote:
>+   __perf_event_read(event);
>+   return perf_event_count(event);
>+}
Also, you probably want a WARN_ON(in_nmi()) there, this function is
_NOT_  NMI safe.

we check that very early on:
unsigned int trace_call_bpf(struct bpf_prog *prog, void *ctx)
{
        unsigned int ret;

        if (in_nmi()) /* not supported yet */
                return 1;
...

--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to