Interpreting call trace

Daniel Baluta daniel.baluta at gmail.com
Thu Apr 7 04:26:24 EDT 2011


> For better understanding you can do
>> gdb vmlinux
> and then run
> gdb> disassemble _read_unlock_bh
>
> Then look at offset 0x10.

Did that. Is there any way to show disassembled
output interleaved with source code?


thank you all for your answers.

Daniel.



More information about the Kernelnewbies mailing list