Interpreting call trace
nilesh.tayade at netscout.com
Thu Apr 7 05:16:29 EDT 2011
On Thu, 2011-04-07 at 11:26 +0300, Daniel Baluta wrote:
> > For better understanding you can do
> >> gdb vmlinux
> > and then run
> > gdb> disassemble _read_unlock_bh
> > Then look at offset 0x10.
> Did that. Is there any way to show disassembled
> output interleaved with source code?
May be you can try taking the 'objdump' of vmlinux (FYI, it will be
quite big in size). Otherwise try taking objdump of specific binary
#objdump -r -D -l -S <binary>
> thank you all for your answers.
More information about the Kernelnewbies