Interpreting call trace

Manish Katiyar mkatiyar at gmail.com
Thu Apr 7 13:04:41 EDT 2011


On Thu, Apr 7, 2011 at 1:26 AM, Daniel Baluta <daniel.baluta at gmail.com> wrote:
>> For better understanding you can do
>>> gdb vmlinux
>> and then run
>> gdb> disassemble _read_unlock_bh
>>
>> Then look at offset 0x10.
>
> Did that. Is there any way to show disassembled
> output interleaved with source code?
>

Have a look at http://kerneltrap.org/mailarchive/linux-kernel-newbies/2009/9/2/6373273/thread


>
> thank you all for your answers.
>
> Daniel.
>
> _______________________________________________
> Kernelnewbies mailing list
> Kernelnewbies at kernelnewbies.org
> http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies
>



-- 
Thanks -
Manish



More information about the Kernelnewbies mailing list