From mboxrd@z Thu Jan 1 00:00:00 1970 From: michi1@michaelblizek.twilightparadox.com (Michael Blizek) Date: Wed, 6 Apr 2011 18:47:46 +0200 Subject: Interpreting call trace In-Reply-To: References: Message-ID: <20110406164746.GA2095@michaelblizek.twilightparadox.com> To: kernelnewbies@lists.kernelnewbies.org List-Id: kernelnewbies.lists.kernelnewbies.org Hi! On 15:56 Wed 06 Apr , Daniel Baluta wrote: ... > For example having: > [ 3992.316/0] [] ? neigh_create+0x2f1/0x6b0 > [ 3992.321/0] [] ? _read_unlock_bh+0x10/0x20 > > means that _read_unlock_bh has been called & finished ? Or it has been > interrupted by > next function in trace (neigh_create). > > Any other info about interpreting call traces are welcomed. Usually this means that _read_unlock_bh has called neigh_create. However, this looks very unlikely to me. So maybe there was a buffer overflow on the stack or any other form of memory corruption. -Michi -- programing a layer 3+4 network protocol for mesh networks see http://michaelblizek.twilightparadox.com