Interpreting call trace

nilesh nilesh.tayade at netscout.com
Thu Apr 7 05:16:29 EDT 2011


Hi Daniel,

On Thu, 2011-04-07 at 11:26 +0300, Daniel Baluta wrote:
> > For better understanding you can do
> >> gdb vmlinux
> > and then run
> > gdb> disassemble _read_unlock_bh
> >
> > Then look at offset 0x10.
> 
> Did that. Is there any way to show disassembled
> output interleaved with source code?
> 
May be you can try taking the 'objdump' of vmlinux (FYI, it will be
quite big in size). Otherwise try taking objdump of specific binary
only.

#objdump -r -D -l -S <binary>
> 
> thank you all for your answers.
> 
> Daniel.

-- 
Thanks,
Nilesh



More information about the Kernelnewbies mailing list