Interpreting call trace

Kaustubh Ashtekar ksashtekar at
Wed Apr 6 23:10:19 EDT 2011

Hi Daniel,

On Wed, Apr 6, 2011 at 6:26 PM, Daniel Baluta <daniel.baluta at> wrote:
> Hello,
> I have the following stack trace:


> How could one interpret this?
> For example having:
> [ 3992.316/0]  [<ffffffff81297751>] ? neigh_create+0x2f1/0x6b0
> [ 3992.321/0]  [<ffffffff81374f00>] ? _read_unlock_bh+0x10/0x20
> means that _read_unlock_bh has been called & finished ? Or it has been
> interrupted by
> next function in trace (neigh_create).

This means that  _read_unlock_bh called neigh_create. The instruction
at (_read_unlock_bh+0x10) will be executed next when the CPU returns
from the function

For better understanding you can do
> gdb vmlinux
and then run
gdb> disassemble _read_unlock_bh

Then look at offset 0x10.


More information about the Kernelnewbies mailing list