Hi, Quick question: are there some suggested methods for obtaining a call graph for a warning that a smatch pattern reports when I run it for the whole kernel? I can see that there are a couple of existing patterns (check_capable, check_locking) that use sql methods for saving the caller_info, but I don't fully understand how it works, maybe there is some description somewhere on this that I missed? Best Regards, Elena.