On Wed, 18 Apr 2018, Steven Rostedt wrote:
> On Wed, 18 Apr 2018 20:17:29 +0200
> Dominik Brodowski wrote:
>
> > Acked-by: Dominik Brodowski
>
> Thanks!
>
> Ingo, Thomas, Peter,
>
> I can take this in my tree, as I have a couple of
On Wed, 18 Apr 2018, Steven Rostedt wrote:
> On Wed, 18 Apr 2018 20:17:29 +0200
> Dominik Brodowski wrote:
>
> > Acked-by: Dominik Brodowski
>
> Thanks!
>
> Ingo, Thomas, Peter,
>
> I can take this in my tree, as I have a couple of patches that need to
> go mainline as well.
>
> OK with you
On Wed, 18 Apr 2018 20:17:29 +0200
Dominik Brodowski wrote:
> Acked-by: Dominik Brodowski
Thanks!
Ingo, Thomas, Peter,
I can take this in my tree, as I have a couple of patches that need to
go mainline as well.
OK with you if I do?
--
On Wed, 18 Apr 2018 20:17:29 +0200
Dominik Brodowski wrote:
> Acked-by: Dominik Brodowski
Thanks!
Ingo, Thomas, Peter,
I can take this in my tree, as I have a couple of patches that need to
go mainline as well.
OK with you if I do?
-- Steve
On Wed, Apr 18, 2018 at 11:45:09AM -0400, Steven Rostedt wrote:
> From: "Steven Rostedt (VMware)"
>
> Arnaldo noticed that the latest kernel is missing the syscall event system
> directory in x86. I bisected it down to d5a00528b58c ("syscalls/core,
> syscalls/x86: Rename
On Wed, Apr 18, 2018 at 11:45:09AM -0400, Steven Rostedt wrote:
> From: "Steven Rostedt (VMware)"
>
> Arnaldo noticed that the latest kernel is missing the syscall event system
> directory in x86. I bisected it down to d5a00528b58c ("syscalls/core,
> syscalls/x86: Rename struct pt_regs-based
From: "Steven Rostedt (VMware)"
Arnaldo noticed that the latest kernel is missing the syscall event system
directory in x86. I bisected it down to d5a00528b58c ("syscalls/core,
syscalls/x86: Rename struct pt_regs-based sys_*() to __x64_sys_*()").
The system call trace
From: "Steven Rostedt (VMware)"
Arnaldo noticed that the latest kernel is missing the syscall event system
directory in x86. I bisected it down to d5a00528b58c ("syscalls/core,
syscalls/x86: Rename struct pt_regs-based sys_*() to __x64_sys_*()").
The system call trace events are special, as
8 matches
Mail list logo