aboutsummaryrefslogtreecommitdiff
path: root/tools/perf/util/scripting-engines/trace-event-python.c
diff options
context:
space:
mode:
authorTiezhu Yang <[email protected]>2023-02-25 15:52:57 +0800
committerHuacai Chen <[email protected]>2023-02-25 22:12:17 +0800
commitfcf77d016216ae75a19078e1079c2511a6319a49 (patch)
tree23eedd8b706bcec957e3b86f20412aa3b101ca30 /tools/perf/util/scripting-engines/trace-event-python.c
parent09e679c28a4def4ea8d4f618503c1d55c355ae5c (diff)
LoongArch: Mark some assembler symbols as non-kprobe-able
Some assembler symbols are not kprobe safe, such as handle_syscall (used as syscall exception handler), *memset*/*memcpy*/*memmove* (may cause recursive exceptions), they can not be instrumented, just blacklist them for kprobing. Here is a related problem and discussion: Link: https://lore.kernel.org/lkml/[email protected]/ Tested-by: Jeff Xie <[email protected]> Signed-off-by: Tiezhu Yang <[email protected]> Signed-off-by: Huacai Chen <[email protected]>
Diffstat (limited to 'tools/perf/util/scripting-engines/trace-event-python.c')
0 files changed, 0 insertions, 0 deletions