Re: Interpreting call trace

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Apr 7, 2011 at 1:26 AM, Daniel Baluta <daniel.baluta@xxxxxxxxx> wrote:
>> For better understanding you can do
>>> gdb vmlinux
>> and then run
>> gdb> disassemble _read_unlock_bh
>>
>> Then look at offset 0x10.
>
> Did that. Is there any way to show disassembled
> output interleaved with source code?
>

Have a look at http://kerneltrap.org/mailarchive/linux-kernel-newbies/2009/9/2/6373273/thread


>
> thank you all for your answers.
>
> Daniel.
>
> _______________________________________________
> Kernelnewbies mailing list
> Kernelnewbies@xxxxxxxxxxxxxxxxx
> http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies
>



-- 
Thanks -
Manish

_______________________________________________
Kernelnewbies mailing list
Kernelnewbies@xxxxxxxxxxxxxxxxx
http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies


[Index of Archives]     [Newbies FAQ]     [Linux Kernel Mentors]     [Linux Kernel Development]     [IETF Annouce]     [Git]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux SCSI]     [Linux ACPI]
  Powered by Linux