On 2015/7/17 10:31, He Kuang wrote:
On 2015/7/14 21:35, Steven Rostedt wrote:
On Mon, 13 Jul 2015 20:10:29 -0700
Alexei Starovoitov wrote:
On 7/13/15 6:59 PM, He Kuang wrote:
This version we output bpf trace events in a hex array, the results
for three u64 integers in previous sample
On Fri, 17 Jul 2015 10:31:15 +0800
He Kuang wrote:
> Awaiting your reply ;-)
There's still a few more patches I have to look at first. Hopefully
I'll get to these tomorrow.
-- Steve
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to
On 2015/7/14 21:35, Steven Rostedt wrote:
On Mon, 13 Jul 2015 20:10:29 -0700
Alexei Starovoitov wrote:
On 7/13/15 6:59 PM, He Kuang wrote:
This version we output bpf trace events in a hex array, the results
for three u64 integers in previous sample changed to this:
dd 1042 [000]
On 2015/7/14 21:35, Steven Rostedt wrote:
On Mon, 13 Jul 2015 20:10:29 -0700
Alexei Starovoitov a...@plumgrid.com wrote:
On 7/13/15 6:59 PM, He Kuang wrote:
This version we output bpf trace events in a hex array, the results
for three u64 integers in previous sample changed to this:
dd
On 2015/7/17 10:31, He Kuang wrote:
On 2015/7/14 21:35, Steven Rostedt wrote:
On Mon, 13 Jul 2015 20:10:29 -0700
Alexei Starovoitov a...@plumgrid.com wrote:
On 7/13/15 6:59 PM, He Kuang wrote:
This version we output bpf trace events in a hex array, the results
for three u64 integers in
On Fri, 17 Jul 2015 10:31:15 +0800
He Kuang heku...@huawei.com wrote:
Awaiting your reply ;-)
There's still a few more patches I have to look at first. Hopefully
I'll get to these tomorrow.
-- Steve
--
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a
On Mon, 13 Jul 2015 20:10:29 -0700
Alexei Starovoitov wrote:
> On 7/13/15 6:59 PM, He Kuang wrote:
> > This version we output bpf trace events in a hex array, the results
> > for three u64 integers in previous sample changed to this:
> >
> >dd 1042 [000] 1296.122951: bpf:bpf_output_data: 7a
On Mon, 13 Jul 2015 20:10:29 -0700
Alexei Starovoitov a...@plumgrid.com wrote:
On 7/13/15 6:59 PM, He Kuang wrote:
This version we output bpf trace events in a hex array, the results
for three u64 integers in previous sample changed to this:
dd 1042 [000] 1296.122951:
On 7/13/15 6:59 PM, He Kuang wrote:
This version we output bpf trace events in a hex array, the results
for three u64 integers in previous sample changed to this:
dd 1042 [000] 1296.122951: bpf:bpf_output_data: 7a ca aa c6 2d 01 00
00 95 87 ec ca 2d 01 00 00 1b bd 41 04 00 00 00 00
typo
Hi,
Previous patch v4 url:
http://thread.gmane.org/gmane.linux.kernel/1993353
This version we output bpf trace events in a hex array, the results
for three u64 integers in previous sample changed to this:
dd 1042 [000] 1296.122951: bpf:bpf_output_data: 7a ca aa c6 2d 01 00
00 95 87 ec ca 2d
On 7/13/15 6:59 PM, He Kuang wrote:
This version we output bpf trace events in a hex array, the results
for three u64 integers in previous sample changed to this:
dd 1042 [000] 1296.122951: bpf:bpf_output_data: 7a ca aa c6 2d 01 00
00 95 87 ec ca 2d 01 00 00 1b bd 41 04 00 00 00 00
typo
Hi,
Previous patch v4 url:
http://thread.gmane.org/gmane.linux.kernel/1993353
This version we output bpf trace events in a hex array, the results
for three u64 integers in previous sample changed to this:
dd 1042 [000] 1296.122951: bpf:bpf_output_data: 7a ca aa c6 2d 01 00
00 95 87 ec ca 2d
12 matches
Mail list logo