On Thu, 24 May 2018 12:26:54 +0530, Sandipan Das wrote: > This splits up the contiguous JITed dump obtained via the bpf > system call into more relatable chunks for each function in > the program. If the kernel symbols corresponding to these are > known, they are printed in the header for each JIT image dump > otherwise the masked start address is printed.
... > Signed-off-by: Sandipan Das <sandi...@linux.vnet.ibm.com> Reviewed-by: Jakub Kicinski <jakub.kicin...@netronome.com> Thank you!