Justin Schoeman <[EMAIL PROTECTED]> wrote:
>
> Will the slab debugger make it into the kernel as a standard compile
> time option? It is a _really_ usefull tool to have around.
It has a slight downside: it unconditionally changes the type of
kmem_bufctl_t to unsigned long, which wastes two or f
Thanks everybody for your help. I have at least located the site of the
leak - now I just need to find out why the destructor is not being
called ;-).
Will the slab debugger make it into the kernel as a standard compile
time option? It is a _really_ usefull tool to have around.
Thanks again,
Justin Schoeman <[EMAIL PROTECTED]> wrote:
>
> OK - I have the patch working now, but there seems to be a flaw in the
> address reporting. When I look up the reported address in
> /proc/kallsyms, then look in the objdump of the module, the reported
> adress _does_not_ point to a call.
>
> A
OK - I have the patch working now, but there seems to be a flaw in the
address reporting. When I look up the reported address in
/proc/kallsyms, then look in the objdump of the module, the reported
adress _does_not_ point to a call.
Am I missing something simple here?
Justin
Andrew Morton wrote
Andrew Morton wrote:
OGAWA Hirofumi <[EMAIL PROTECTED]> wrote:
Andrew Morton <[EMAIL PROTECTED]> writes:
> + slab_bufctl(slabp)[objnr] = (unsigned long)caller;
Umm... this patch looks strange..
slab_bufctl() returns "kmem_bufctl_t *", but kmem_bufctl_t is
"unsigned short".
Good poi
OGAWA Hirofumi <[EMAIL PROTECTED]> wrote:
>
> Andrew Morton <[EMAIL PROTECTED]> writes:
>
> > + slab_bufctl(slabp)[objnr] = (unsigned long)caller;
>
> Umm... this patch looks strange..
>
> slab_bufctl() returns "kmem_bufctl_t *", but kmem_bufctl_t is
> "unsigned short".
Good point.
Andrew Morton <[EMAIL PROTECTED]> writes:
> + slab_bufctl(slabp)[objnr] = (unsigned long)caller;
Umm... this patch looks strange..
slab_bufctl() returns "kmem_bufctl_t *", but kmem_bufctl_t is
"unsigned short".
I guess that this debug patch was broken by something else...
--
OGAWA
> I am having a problem with memory leaking on a patched kernel. In order
> to pinpoint the leak, I would like to try to trace the allocation points
> for the memory.
>
> I have found some vague references to patches that allow the user to
> dump the caller address for slab allocations, but I
Justin Schoeman <[EMAIL PROTECTED]> wrote:
>
> I am having a problem with memory leaking on a patched kernel. In order
> to pinpoint the leak, I would like to try to trace the allocation points
> for the memory.
>
> I have found some vague references to patches that allow the user to
> dum
Hi,
I am having a problem with memory leaking on a patched kernel. In order
to pinpoint the leak, I would like to try to trace the allocation points
for the memory.
I have found some vague references to patches that allow the user to
dump the caller address for slab allocations, but I cannot f
10 matches
Mail list logo