Linux kernel “的含义;(OF)";或;(属于"x2B)";linux内核中的崩溃报告

Linux kernel “的含义;(OF)";或;(属于"x2B)";linux内核中的崩溃报告,linux-kernel,kernel-module,Linux Kernel,Kernel Module,我试图了解这些符号的含义,即在Linux内核跟踪中随模块名一起指定的“(of)”或“(of)+”。有人能帮助我理解这一点吗?因为我在网上找不到任何关于这一点的信息 这是我找到的线索 general protection fault: 0000 [#1] Modules linked in: cxgb4(OF+) toecore(OF) ip6table_filter ip6_tables ebtable_nat ebtables nf_conntrack_ipv4 nf_defrag_ipv4

我试图了解这些符号的含义,即在Linux内核跟踪中随模块名一起指定的“(of)”或“(of)+”。有人能帮助我理解这一点吗?因为我在网上找不到任何关于这一点的信息

这是我找到的线索

general protection fault: 0000 [#1]
Modules linked in: cxgb4(OF+) toecore(OF) ip6table_filter ip6_tables
ebtable_nat ebtables nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack
.....
....
CPU: 5 PID: 15240 Comm: modprobe Tainted: GF          O 3.11.10 #1
Hardware name: Supermicro X9DRD-iF/LF/X9DRD-iF, BIOS 3.0b 12/05/2013
task: ffff88046c1660c0 ti: ffff88045f4da000 task.ti: ffff88045f4da000
RIP: 0010:[<ffffffff812674aa>]  [<ffffffff812674aa>]
kobject_uevent_env+0x5a/0x5e0
...
一般保护故障:0000[#1]
链接到的模块:cxgb4(OF+)toecore(OF)ip6表格过滤器ip6表格
ebtable_nat ebtables nf_conntrack_ipv4 nf_碎片整理_ipv4 xt_状态nf_conntrack
.....
....
CPU:5 PID:15240通信:modprobe污染:GF O 3.11.10#1
硬件名称:Supermicro X9DRD iF/LF/X9DRD iF,BIOS 3.0b 12/05/2013
任务:ffff88046c1660c0 ti:ffff88045f4da000任务。ti:ffff88045f4da000
RIP:0010:[]
kobject_uevent_env+0x5a/0x5e0
...
非常感谢

'P' - Proprietary module has been loaded.
'F' - Module has been forcibly loaded.
'S' - SMP with CPUs not designed for SMP.
'R' - User forced a module unload.
'M' - System experienced a machine check exception.
'B' - System has hit bad_page.
'U' - Userspace-defined naughtiness.
'D' - Kernel has oopsed before
'A' - ACPI table overridden.
'W' - Taint on warning.
'C' - modules from drivers/staging are loaded.
'I' - Working around severe firmware bug.
'O' - Out-of-tree module has been loaded.

'+' -  Module is being loaded, probably running module_init
'-' -  Module is being unloaded (state is set only after module_exit returns)
来源:




来源:





Nice ans,你也可以发布一个参考链接吗?@brokenfoot我从内核源代码获得了它。很好,你也可以发布一个参考链接吗?@brokenfoot我从内核源代码中获得了它。