Interpreting call trace

Sowmya Sridharan sowmya.sridharan at tcs.com
Thu Apr 7 05:34:39 EDT 2011


> Did that. Is there any way to show disassembled
> output interleaved with source code?
> 
> 
objdump is the tool you should be looking for.
If you have the tool, then take an "objdump" of your entire 
vmlinux(uncompressed version). Options -d, and -S will intermix source 
with disassembly.
With the output, you can analyze the call trace with the functions' base 
addresses and offsets.

Thanks,
Sowmya
=====-----=====-----=====
Notice: The information contained in this e-mail
message and/or attachments to it may contain 
confidential or privileged information. If you are 
not the intended recipient, any dissemination, use, 
review, distribution, printing or copying of the 
information contained in this e-mail message 
and/or attachments to it are strictly prohibited. If 
you have received this communication in error, 
please notify us by reply e-mail or telephone and 
immediately and permanently delete the message 
and any attachments. Thank you


-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.kernelnewbies.org/pipermail/kernelnewbies/attachments/20110407/985d1f64/attachment.html 


More information about the Kernelnewbies mailing list