Interpreting call trace
nilesh
nilesh.tayade at netscout.com
Thu Apr 7 05:16:29 EDT 2011
Hi Daniel,
On Thu, 2011-04-07 at 11:26 +0300, Daniel Baluta wrote:
> > For better understanding you can do
> >> gdb vmlinux
> > and then run
> > gdb> disassemble _read_unlock_bh
> >
> > Then look at offset 0x10.
>
> Did that. Is there any way to show disassembled
> output interleaved with source code?
>
May be you can try taking the 'objdump' of vmlinux (FYI, it will be
quite big in size). Otherwise try taking objdump of specific binary
only.
#objdump -r -D -l -S <binary>
>
> thank you all for your answers.
>
> Daniel.
--
Thanks,
Nilesh
More information about the Kernelnewbies
mailing list