aboutsummaryrefslogtreecommitdiff
path: root/tools/perf/python
diff options
context:
space:
mode:
authorNamhyung Kim2012-11-10 02:27:15 +0900
committerArnaldo Carvalho de Melo2012-11-09 16:23:21 -0300
commit32ae1efd9d40645601cd4e09fa83a2711dd1ad6d (patch)
treebfe73fa1fb41d7d72ce593829cf36d88518de5e5 /tools/perf/python
parent2ba34aaa6db8b61cf1fa14132f885ba6bc7c9ae0 (diff)
perf annotate: Don't try to follow jump target on PLT symbols
The perf annotate browser on TUI can identify a jump target for a selected instruction. It assumes that the jump target is within the function but it's not the case of PLT symbols which have offset out of the function as a target. Since it caused a segmentation fault, do not try to follow jump target on the PLT symbols. Signed-off-by: Namhyung Kim <namhyung@kernel.org> Cc: Andi Kleen <ak@linux.intel.com> Cc: David Ahern <dsahern@gmail.com> Cc: Ingo Molnar <mingo@kernel.org> Cc: Jiri Olsa <jolsa@redhat.com> Cc: Peter Zijlstra <peterz@infradead.org> Cc: Stephane Eranian <eranian@google.com> Link: http://lkml.kernel.org/r/1352482044-3443-5-git-send-email-namhyung@kernel.org Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Diffstat (limited to 'tools/perf/python')
0 files changed, 0 insertions, 0 deletions