1. 26 11月, 2014 2 次提交
  2. 14 10月, 2014 13 次提交
  3. 09 10月, 2014 1 次提交
  4. 07 10月, 2014 1 次提交
  5. 03 10月, 2014 1 次提交
    • K
      aarch64: filter $x from kallsyms · 6c34f1f5
      Kyle McMartin 提交于
      Similar to ARM, AArch64 is generating $x and $d syms... which isn't
      terribly helpful when looking at %pF output and the like. Filter those
      out in kallsyms, modpost and when looking at module symbols.
      
      Seems simplest since none of these check EM_ARM anyway, to just add it
      to the strchr used, rather than trying to make things overly
      complicated.
      
      initcall_debug improves:
      dmesg_before.txt: initcall $x+0x0/0x154 [sg] returned 0 after 26331 usecs
      dmesg_after.txt: initcall init_sg+0x0/0x154 [sg] returned 0 after 15461 usecs
      Signed-off-by: NKyle McMartin <kyle@redhat.com>
      Acked-by: NRusty Russell <rusty@rustcorp.com.au>
      Signed-off-by: NCatalin Marinas <catalin.marinas@arm.com>
      6c34f1f5
  6. 02 10月, 2014 2 次提交
  7. 26 9月, 2014 1 次提交
  8. 25 9月, 2014 1 次提交
  9. 23 9月, 2014 1 次提交
  10. 12 9月, 2014 1 次提交
  11. 11 9月, 2014 1 次提交
  12. 01 9月, 2014 1 次提交
  13. 30 8月, 2014 1 次提交
  14. 28 8月, 2014 1 次提交
  15. 27 8月, 2014 6 次提交
  16. 26 8月, 2014 1 次提交
  17. 24 8月, 2014 1 次提交
  18. 22 8月, 2014 2 次提交
  19. 20 8月, 2014 1 次提交
  20. 19 8月, 2014 1 次提交