in reply to Re: Extracting numerical information
in thread Extracting numerical information

There are a number of lines like the one I have given as an example.

66.411709: TDSCDMA:M tfw_stmr.c:697 | tfw_walltime_isr: WALL 0x0164761a, status=0x00000001

Extract: 66.411709 and 0x0164761a

66.411736: TDSCDMA:L tfw_ce_proc.c:1484 | CE: sfn 955, slot 5 has 1 CE calls scheduled.

Extract: 66.411736 and 1.

66.411737: TDSCDMA:L tfw_ce_event_queue.c:196 | CE: Enqueue pending event 113 (type 12, sfm 955, slot 5, dvga=6)

Extract: 66.411737 and 113.

66.411720: TDSCDMA:L tfw_ulc.c:370 | ULC: Processing (start:end) 0x0164766c : 0x01647683, Subframe: 0x03bb, TS: 0x5

extract: 66.411720, 0x0164766c and 0x01647683

Replies are listed 'Best First'.
Re^3: Extracting numerical information
by ww (Archbishop) on Jun 27, 2013 at 19:07 UTC
    What are your criteria?

    IOW, in the first sample, why aren't "697" and "0x00000001" just as much "numerical information" as those values you're seeking to extract?

    For future reference, I know what I mean. Why don't you?


    If you didn't program your executable by toggling in binary, it wasn't really programming!