diff options
author | askeshav <askeshav> | 2005-12-16 00:27:52 +0000 |
---|---|---|
committer | askeshav <askeshav> | 2005-12-16 00:27:52 +0000 |
commit | 2cb51fddbd5cfd64ecf347f81d336ee8786c7e35 (patch) | |
tree | 24636e2080c50ee2ad120531ecc02e46db95bf94 /tapsets.cxx | |
parent | 3a5c927fcdeefa3efe98bc6dd30cd624e901b06a (diff) | |
download | systemtap-steved-2cb51fddbd5cfd64ecf347f81d336ee8786c7e35.tar.gz systemtap-steved-2cb51fddbd5cfd64ecf347f81d336ee8786c7e35.tar.xz systemtap-steved-2cb51fddbd5cfd64ecf347f81d336ee8786c7e35.zip |
Anil S Keshavamurthy - Blacklist'ing notifier_call_chain() function, as this
function is on kprobes critical path, having probes on this will damage the
system.
Diffstat (limited to 'tapsets.cxx')
-rw-r--r-- | tapsets.cxx | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/tapsets.cxx b/tapsets.cxx index f8ecf1d7..fcf84820 100644 --- a/tapsets.cxx +++ b/tapsets.cxx @@ -1948,6 +1948,7 @@ dwarf_query::blacklisted_p(string const & funcname, if (filename == 0) filename = ""; // possibly 0 string filename_s = filename; // is passed as const char* if (funcname == "do_IRQ" || + funcname == "notifier_call_chain" || filename_s == "kernel/kprobes.c" || 0 == fnmatch ("arch/*/kernel/kprobes.c", filename, 0) || (has_return && (funcname == "sys_execve" || // bug #1345 |