linux内核里面频繁分配和释放空间造成的系统奔溃
各位大侠们:你们好:
我最近在在tcp.c(net\ipv4)文件的int tcp_sendmsg(struct kiocb *iocb, struct sock *sk, struct msghdr *msg,size_t size)函数中加了一段代码(红色部分),奔溃信息在最后!我分析了一下是不是我在linux内核里面频繁分配和释放空间造成的系统奔溃!
忘高手织一条生路!!谢谢啦!!
int tcp_sendmsg(struct kiocb *iocb, struct sock *sk, struct msghdr *msg,
		size_t size)
{
	struct iovec *iov;
	struct tcp_sock *tp = tcp_sk(sk);
	struct sk_buff *skb;
	int iovlen, flags;
	int mss_now, size_goal;
	int sg, err, copied;
	long timeo;
	/*2012 8 23 mouchange*/
	char *mouiov;
	char *duiov;
	int duiov_len;
	struct crypto_comp *tfm;
	int mouflag=0;
	int ret;
	struct iovec *mdiov;	
	lock_sock(sk);
	flags = msg->msg_flags;
	timeo = sock_sndtimeo(sk, flags & MSG_DONTWAIT);
	/* Wait for a connection to finish. */
	if ((1 << sk->sk_state) & ~(TCPF_ESTABLISHED | TCPF_CLOSE_WAIT))
		if ((err = sk_stream_wait_connect(sk, &timeo)) != 0)
			goto out_err;
	/* This should be in poll */
	clear_bit(SOCK_ASYNC_NOSPACE, &sk->sk_socket->flags);
	mss_now = tcp_send_mss(sk, &size_goal, flags);
	/* Ok commence sending. */
	iovlen = msg->msg_iovlen;
	iov = msg->msg_iov;
	copied = 0;
	err = -EPIPE;
	if (sk->sk_err || (sk->sk_shutdown & SEND_SHUTDOWN))
		goto out_err;
	sg = sk->sk_route_caps & NETIF_F_SG;
	/*2012 8 23 mouchange*/
	if(iov->iov_len>2000)
	{
	mdiov=iov;	
    	if((mouiov=kmalloc(iov->iov_len, GFP_KERNEL)))
		printk(KERN_INFO " tcp_sendmsg 2012 8 23 mouiov=kmalloc is Success\n");
	else
        printk(KERN_INFO " tcp_sendmsg 2012 8 23 mouiov=kmalloc is unSuccess\n");
	printk(KERN_INFO " tcp_sendmsg 2012 8 23 mouiov=kmalloc is %d\n",ksize(mouiov));
	if((duiov=kmalloc(iov->iov_len, GFP_KERNEL)))
		printk(KERN_INFO " tcp_sendmsg 2012 8 23 duiov=kmalloc is Success\n");
	else
        printk(KERN_INFO " tcp_sendmsg 2012 8 23 duiov=kmalloc is unSuccess\n");
	printk(KERN_INFO " tcp_sendmsg 2012 8 23 duiov=kmalloc is %d\n",ksize(duiov));
	if(copy_from_user(mouiov,iov->iov_base,iov->iov_len))
		printk(KERN_INFO " tcp_sendmsg 2012 8 23 copy_from_user is UnSuccess\n");
	else
        printk(KERN_INFO " tcp_sendmsg 2012 8 23 copy_from_user is Success\n");
	tfm = crypto_alloc_comp("deflate",0,0);
	if(IS_ERR(tfm)) {
		printk("<1>failed to load transform for deflate !\n");
		release_sock(sk);
		return 0;
	}
	ret = crypto_comp_compress(tfm,mouiov,iov->iov_len,duiov,&duiov_len);
	if(ret) {
		printk("<1>failed to compress !\n");
		release_sock(sk);
		//return copied;
		return 0;
     	}
	printk(KERN_INFO " tcp_sendmsg iov->iov_len %d unSuccess\n",iov->iov_len);
	printk(KERN_INFO " tcp_sendmsg duiov_len %d unSuccess\n",duiov_len);
	iov->iov_base=duiov;
	iov->iov_len=duiov_len;
	crypto_free_comp(tfm);
	kfree(mouiov);
	mouflag=1;
	}[color=#FF0000][/color][color=#FF0000][/color]	
	while (--iovlen >= 0) {
		size_t seglen = iov->iov_len;
		unsigned char __user *from = iov->iov_base;
奔溃信息:
Aug 30 20:02:00 ubuntu kernel: [  266.030039] lftp: page allocation failure: order:4, mode:0x40d0
Aug 30 20:02:00 ubuntu kernel: [  266.030046] Pid: 1416, comm: lftp Not tainted 3.1.4 #15
Aug 30 20:02:00 ubuntu kernel: [  266.030050] Call Trace:
Aug 30 20:02:00 ubuntu kernel: [  266.030063]  [<c01e0857>] warn_alloc_failed+0x97/0xf0
Aug 30 20:02:00 ubuntu kernel: [  266.030070]  [<c01e17fc>]