我试图调试内核模块。我怀疑有一些内存泄漏。要检查它我准备了内核和模块启用内存泄漏调试。我得到了一些警告:
[11839.429168] slab error in verify_redzone_free(): cache `size-64': memory outside object was overwritten
[11839.438659] [] (unwind_backtrace+0x0/0x164) from [] (kfree+0x278/0x4d8)
[11839.447357] [] (kfree+0x278/0x4d8) from [] (some_function+0x18/0x1c [my_module])
[11839.457214] [] (some_function+0x18/0x1c [my_module]) from [] (some_function+0x174/0x718 [my_module])
[11839.470184] [] (some_function+0x174/0x718 [my_module]) from [] (some_function+0x12c/0x16c [my_module])
[11839.483917] [] (some_function+0x12c/0x16c [my_module]) from [] (some_function+0x8/0x10 [my_module])
[11839.496368] [] (some_function+0x8/0x10 [my_module]) from [] (some_function+0x358/0x6d4 [my_module])
[11839.507476] [] (some_function+0x358/0x6d4 [my_module]) from [] (worker_thread+0x1e8/0x284)
[11839.517211] [] (worker_thread+0x1e8/0x284) from [] (kthread+0x78/0x80)
[11839.525543] [] (kthread+0x78/0x80) from [] (kernel_thread_exit+0x0/0x8)
翻译地址指向内核没有问题:
$ addr2line -f -e vmlinux.kmeml c0116ca0
verify_redzone_free
/[...]/kernel/mm/slab.c:2922
但我不能这样做,如果地址是从my_module:
$ addr2line -f -e vmlinux.kmeml bf0a56b8
??
??:0
我也在尝试与模块文件:
$ addr2line -f -e my_module.ko bf0a56b8
??
??:0
如何将此地址转换为文件和行号?