Hi,
Call Trace: [<d083af26>] svc_authorise+0x1b/0x2a [sunrpc] [<d0838270>] svc_process+0x411/0x689 [sunrpc] ...
Here, the first hex value is the offset in the procedure, and the second is the total length of the procedure. Note that the offset does not mean the line offset in the source code. Rather an offset in the (memory containing) machine language code. So you can utilize the hex value and use objdump to find the offending machine language instruction. And then reverse engineer it to find the corresponding C source line. Thanks, Rajat -- To unsubscribe from this list: send an email with "unsubscribe kernelnewbies" to ecartis@xxxxxxxxxxxx Please read the FAQ at http://kernelnewbies.org/FAQ