Interpreting call trace

Michael Blizek michi1 at michaelblizek.twilightparadox.com
Wed Apr 6 12:47:46 EDT 2011


Hi!

On 15:56 Wed 06 Apr     , Daniel Baluta wrote:
...
> For example having:
> [ 3992.316/0]  [<ffffffff81297751>] ? neigh_create+0x2f1/0x6b0
> [ 3992.321/0]  [<ffffffff81374f00>] ? _read_unlock_bh+0x10/0x20
> 
> means that _read_unlock_bh has been called & finished ? Or it has been
> interrupted by
> next function in trace (neigh_create).
> 
> Any other info about interpreting call traces are welcomed.

Usually this means that _read_unlock_bh has called neigh_create. However, this
looks very unlikely to me. So maybe there was a buffer overflow on the stack
or any other form of memory corruption.

	-Michi
-- 
programing a layer 3+4 network protocol for mesh networks
see http://michaelblizek.twilightparadox.com




More information about the Kernelnewbies mailing list