On Thu, 24 May 2018 12:26:54 +0530, Sandipan Das wrote:
> This splits up the contiguous JITed dump obtained via the bpf
> system call into more relatable chunks for each function in
> the program. If the kernel symbols corresponding to these are
> known, they are printed in the header for each JIT image dump
> otherwise the masked start address is printed.

...
 
> Signed-off-by: Sandipan Das <sandi...@linux.vnet.ibm.com>

Reviewed-by: Jakub Kicinski <jakub.kicin...@netronome.com>

Thank you!

Reply via email to