Interpreting call trace
Michael Blizek
michi1 at michaelblizek.twilightparadox.com
Wed Apr 6 12:47:46 EDT 2011
Hi!
On 15:56 Wed 06 Apr , Daniel Baluta wrote:
...
> For example having:
> [ 3992.316/0] [<ffffffff81297751>] ? neigh_create+0x2f1/0x6b0
> [ 3992.321/0] [<ffffffff81374f00>] ? _read_unlock_bh+0x10/0x20
>
> means that _read_unlock_bh has been called & finished ? Or it has been
> interrupted by
> next function in trace (neigh_create).
>
> Any other info about interpreting call traces are welcomed.
Usually this means that _read_unlock_bh has called neigh_create. However, this
looks very unlikely to me. So maybe there was a buffer overflow on the stack
or any other form of memory corruption.
-Michi
--
programing a layer 3+4 network protocol for mesh networks
see http://michaelblizek.twilightparadox.com
More information about the Kernelnewbies
mailing list