Interpreting call trace
Sowmya Sridharan
sowmya.sridharan at tcs.com
Thu Apr 7 05:34:39 EDT 2011
> Did that. Is there any way to show disassembled
> output interleaved with source code?
>
>
objdump is the tool you should be looking for.
If you have the tool, then take an "objdump" of your entire
vmlinux(uncompressed version). Options -d, and -S will intermix source
with disassembly.
With the output, you can analyze the call trace with the functions' base
addresses and offsets.
Thanks,
Sowmya
=====-----=====-----=====
Notice: The information contained in this e-mail
message and/or attachments to it may contain
confidential or privileged information. If you are
not the intended recipient, any dissemination, use,
review, distribution, printing or copying of the
information contained in this e-mail message
and/or attachments to it are strictly prohibited. If
you have received this communication in error,
please notify us by reply e-mail or telephone and
immediately and permanently delete the message
and any attachments. Thank you
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.kernelnewbies.org/pipermail/kernelnewbies/attachments/20110407/985d1f64/attachment.html
More information about the Kernelnewbies
mailing list