On Thu, 24 May 2018 12:26:54 +0530, Sandipan Das wrote: > This splits up the contiguous JITed dump obtained via the bpf > system call into more relatable chunks for each function in > the program. If the kernel symbols corresponding to these are > known, they are printed in the header for each JIT image dump > otherwise the masked start address is printed.
... > Signed-off-by: Sandipan Das <[email protected]> Reviewed-by: Jakub Kicinski <[email protected]> Thank you!
