diff options
author | Tiezhu Yang <[email protected]> | 2023-02-25 15:52:57 +0800 |
---|---|---|
committer | Huacai Chen <[email protected]> | 2023-02-25 22:12:17 +0800 |
commit | fcf77d016216ae75a19078e1079c2511a6319a49 (patch) | |
tree | 23eedd8b706bcec957e3b86f20412aa3b101ca30 /tools/perf/util/scripting-engines/trace-event-python.c | |
parent | 09e679c28a4def4ea8d4f618503c1d55c355ae5c (diff) |
LoongArch: Mark some assembler symbols as non-kprobe-able
Some assembler symbols are not kprobe safe, such as handle_syscall (used
as syscall exception handler), *memset*/*memcpy*/*memmove* (may cause
recursive exceptions), they can not be instrumented, just blacklist them
for kprobing.
Here is a related problem and discussion:
Link: https://lore.kernel.org/lkml/[email protected]/
Tested-by: Jeff Xie <[email protected]>
Signed-off-by: Tiezhu Yang <[email protected]>
Signed-off-by: Huacai Chen <[email protected]>
Diffstat (limited to 'tools/perf/util/scripting-engines/trace-event-python.c')
0 files changed, 0 insertions, 0 deletions