我正在尝试调试内核模块。我怀疑有一些内存泄漏。为了检查它,我准备了内核和模块启用内存泄漏调试的构建。而我得到了一些来自警告:内核模块addr2line
[11839.429168] slab error in verify_redzone_free(): cache `size-64': memory outside object was overwritten
[11839.438659] [<c005575c>] (unwind_backtrace+0x0/0x164) from [<c0116ca0>] (kfree+0x278/0x4d8)
[11839.447357] [<c0116ca0>] (kfree+0x278/0x4d8) from [<bf083f48>] (some_function+0x18/0x1c [my_module])
[11839.457214] [<bf083f48>] (some_function+0x18/0x1c [my_module]) from [<bf08762c>] (some_function+0x174/0x718 [my_module])
[11839.470184] [<bf08762c>] (some_function+0x174/0x718 [my_module]) from [<bf0a56b8>] (some_function+0x12c/0x16c [my_module])
[11839.483917] [<bf0a56b8>] (some_function+0x12c/0x16c [my_module]) from [<bf085790>] (some_function+0x8/0x10 [my_module])
[11839.496368] [<bf085790>] (some_function+0x8/0x10 [my_module]) from [<bf07b74c>] (some_function+0x358/0x6d4 [my_module])
[11839.507476] [<bf07b74c>] (some_function+0x358/0x6d4 [my_module]) from [<c00a60f8>] (worker_thread+0x1e8/0x284)
[11839.517211] [<c00a60f8>] (worker_thread+0x1e8/0x284) from [<c00a9edc>] (kthread+0x78/0x80)
[11839.525543] [<c00a9edc>] (kthread+0x78/0x80) from [<c004f8fc>] (kernel_thread_exit+0x0/0x8)
有翻译指向内核地址没有问题:
$ addr2line -f -e vmlinux.kmeml c0116ca0
verify_redzone_free
/[...]/kernel/mm/slab.c:2922
但我不能这样做,如果地址是从my_module:
$ addr2line -f -e vmlinux.kmeml bf0a56b8
??
??:0
我也与模块文件尝试:
$ addr2line -f -e my_module.ko bf0a56b8
??
??:0
如何将这些地址转换为文件和行号?
附注。如果您正在使用x86并且您的Linux内核是2.6.31或更新的版本,您可能会发现更轻量级的KEDR系统(http://kedr.berlios.de/),可用于检查模块是否存在内存泄漏。与像Kmemleak这样的内核设施不同,KEDR不需要重建内核。它应该很容易设置和使用。 – Eugene 2011-05-27 14:01:27