Interpreting call trace
Manish Katiyar
mkatiyar at gmail.com
Thu Apr 7 13:04:41 EDT 2011
On Thu, Apr 7, 2011 at 1:26 AM, Daniel Baluta <daniel.baluta at gmail.com> wrote:
>> For better understanding you can do
>>> gdb vmlinux
>> and then run
>> gdb> disassemble _read_unlock_bh
>>
>> Then look at offset 0x10.
>
> Did that. Is there any way to show disassembled
> output interleaved with source code?
>
Have a look at http://kerneltrap.org/mailarchive/linux-kernel-newbies/2009/9/2/6373273/thread
>
> thank you all for your answers.
>
> Daniel.
>
> _______________________________________________
> Kernelnewbies mailing list
> Kernelnewbies at kernelnewbies.org
> http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies
>
--
Thanks -
Manish
More information about the Kernelnewbies
mailing list