WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] pci-passthrough: suspected kmemleaks

To: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>
Subject: [Xen-devel] pci-passthrough: suspected kmemleaks
From: Sander Eikelenboom <linux@xxxxxxxxxxxxxx>
Date: Tue, 14 Sep 2010 17:17:32 +0200
Cc:
Delivery-date: Tue, 14 Sep 2010 08:18:29 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Organization: Eikelenboom IT services
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Hi Konrad,

I encountered these suspected kmemleaks after starting a VM with pci device 
passed through, of which some seem potential related to pciback.

--
Sander

unreferenced object 0xffff88002ff077e0 (size 72):
  comm "swapper", pid 1, jiffies 4294667523
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 0e 01 01 00 00 00 00 00  ................
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff81119500>] kmem_cache_alloc+0x136/0x185
    [<ffffffff81285377>] acpi_ut_allocate_object_desc_dbg+0x4c/0x88
    [<ffffffff812853d5>] acpi_ut_create_internal_object_dbg+0x22/0x88
    [<ffffffff81273dbf>] acpi_ex_read_data_from_field+0xf2/0x157
    [<ffffffff81278ce3>] acpi_ex_resolve_node_to_value+0x18f/0x220
    [<ffffffff8127481b>] acpi_ex_resolve_to_value+0x205/0x216
    [<ffffffff8126ecb0>] acpi_ds_evaluate_name_path+0x7a/0xff
    [<ffffffff8126d8ab>] acpi_ds_exec_end_op+0x94/0x3d9
    [<ffffffff8127f78b>] acpi_ps_parse_loop+0x80a/0x98b
    [<ffffffff8127e835>] acpi_ps_parse_aml+0x9a/0x2d9
    [<ffffffff8127ffd2>] acpi_ps_execute_method+0x1dd/0x2ab
    [<ffffffff8127b79a>] acpi_ns_evaluate+0xee/0x1b6
    [<ffffffff8127b964>] acpi_ns_exec_module_code_list+0x102/0x17e
    [<ffffffff812840c4>] acpi_initialize_objects+0x1f/0x59
    [<ffffffff819d1d5b>] acpi_init+0x102/0x2cc
unreferenced object 0xffff88002f0b71e0 (size 32):
  comm "swapper", pid 1, jiffies 4294668424
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185
    [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98
    [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3
    [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f
    [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212
    [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d
    [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40
    [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70
    [<ffffffff81243e54>] pci_enable_device+0xe/0x10
    [<ffffffff812401f3>] pci_enable_bridges+0x2a/0x4e
unreferenced object 0xffff88002f0b7200 (size 32):
  comm "swapper", pid 1, jiffies 4294668426
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185
    [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98
    [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3
    [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f
    [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212
    [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d
    [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40
    [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70
    [<ffffffff81243e54>] pci_enable_device+0xe/0x10
    [<ffffffff812401f3>] pci_enable_bridges+0x2a/0x4e
unreferenced object 0xffff88002c0b5ea0 (size 32):
  comm "swapper", pid 1, jiffies 4294669364
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185
    [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98
    [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3
    [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f
    [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212
    [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d
    [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40
    [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70
    [<ffffffff81243e54>] pci_enable_device+0xe/0x10
    [<ffffffff81243ed0>] pcim_enable_device+0x7a/0x9a
unreferenced object 0xffff88002c0b5ba0 (size 32):
  comm "swapper", pid 1, jiffies 4294669478
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185
    [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98
    [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3
    [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f
    [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212
    [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d
    [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40
    [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70
    [<ffffffff81243efe>] pci_enable_device_mem+0xe/0x10
    [<ffffffff815c5b0c>] e1000_probe+0x39/0xbcd
unreferenced object 0xffff88002c0b5d40 (size 32):
  comm "swapper", pid 1, jiffies 4294669478
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1
    [<ffffffff81299b3c>] xen_create_msi_irq+0xba/0x19d
    [<ffffffff8103be17>] xen_setup_msi_irqs+0x39/0x87
    [<ffffffff8149c7b6>] xen_pci_setup_msi_irqs+0x34/0x1be
    [<ffffffff81058114>] arch_setup_msi_irqs+0x38/0x138
    [<ffffffff8124d053>] pci_enable_msi_block+0x26c/0x306
    [<ffffffff8137af57>] e1000e_set_interrupt_capability+0xd2/0x114
    [<ffffffff815c5e04>] e1000_probe+0x331/0xbcd
    [<ffffffff8124505b>] local_pci_probe+0x12/0x16
    [<ffffffff812452d9>] pci_device_probe+0x5c/0x86
unreferenced object 0xffff88002c0b5e80 (size 32):
  comm "swapper", pid 1, jiffies 4294669592
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185
    [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98
    [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3
    [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f
    [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212
    [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d
    [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40
    [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70
    [<ffffffff81243e54>] pci_enable_device+0xe/0x10
    [<ffffffff815d3e61>] i801_probe+0x98/0x2b4
unreferenced object 0xffff88002ff01c40 (size 32):
  comm "xenstored", pid 5411, jiffies 4295057498
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1
    [<ffffffff81299765>] bind_evtchn_to_irq+0x34/0xb8
    [<ffffffff81299a49>] bind_evtchn_to_irqhandler+0x22/0x5b
    [<ffffffff8129f11c>] evtchn_bind_to_user+0x4c/0x57
    [<ffffffff8129f235>] evtchn_ioctl+0x10e/0x2ed
    [<ffffffff8112cbb8>] vfs_ioctl+0x2a/0x78
    [<ffffffff8112d12b>] do_vfs_ioctl+0x4aa/0x4e7
    [<ffffffff8112d1bd>] sys_ioctl+0x55/0x77
    [<ffffffff8103dd42>] system_call_fastpath+0x16/0x1b
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88002f0bb498 (size 8):
  comm "xenbus", pid 34, jiffies 4295058172
  hex dump (first 8 bytes):
    77 00 0b 2f 00 88 ff ff                          w../....
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff8129ba45>] xenbus_thread+0xcc/0x281
    [<ffffffff81093376>] kthread+0x7d/0x85
    [<ffffffff8103eeaa>] child_rip+0xa/0x20
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88002b9a5a08 (size 8):
  comm "xenbus", pid 34, jiffies 4295058332
  hex dump (first 8 bytes):
    77 00 9a 2b 00 88 ff ff                          w..+....
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff8129ba45>] xenbus_thread+0xcc/0x281
    [<ffffffff81093376>] kthread+0x7d/0x85
    [<ffffffff8103eeaa>] child_rip+0xa/0x20
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88002ff06258 (size 8):
  comm "xenbus", pid 34, jiffies 4295059316
  hex dump (first 8 bytes):
    77 00 f0 2f 00 88 ff ff                          w../....
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff8129ba45>] xenbus_thread+0xcc/0x281
    [<ffffffff81093376>] kthread+0x7d/0x85
    [<ffffffff8103eeaa>] child_rip+0xa/0x20
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88002f0b7060 (size 32):
  comm "xenconsoled", pid 5417, jiffies 4295059743
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1
    [<ffffffff81299765>] bind_evtchn_to_irq+0x34/0xb8
    [<ffffffff81299a49>] bind_evtchn_to_irqhandler+0x22/0x5b
    [<ffffffff8129f11c>] evtchn_bind_to_user+0x4c/0x57
    [<ffffffff8129f235>] evtchn_ioctl+0x10e/0x2ed
    [<ffffffff8112cbb8>] vfs_ioctl+0x2a/0x78
    [<ffffffff8112d12b>] do_vfs_ioctl+0x4aa/0x4e7
    [<ffffffff8112d1bd>] sys_ioctl+0x55/0x77
    [<ffffffff8103dd42>] system_call_fastpath+0x16/0x1b
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88002ff01980 (size 32):
  comm "xenwatch", pid 33, jiffies 4295062339
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1
    [<ffffffff81299765>] bind_evtchn_to_irq+0x34/0xb8
    [<ffffffff812999ea>] bind_interdomain_evtchn_to_irqhandler+0x3d/0x7a
    [<ffffffff812a1945>] pciback_attach+0x1b8/0x2a6
    [<ffffffff812a2078>] pciback_frontend_changed+0x69/0x51e
    [<ffffffff8129d6b9>] xenbus_otherend_changed+0x79/0x82
    [<ffffffff8129d872>] frontend_changed+0xb/0xd
    [<ffffffff8129bd14>] xenwatch_thread+0x11a/0x14d
    [<ffffffff81093376>] kthread+0x7d/0x85
    [<ffffffff8103eeaa>] child_rip+0xa/0x20
unreferenced object 0xffff88002f0b70a0 (size 32):
  comm "xenwatch", pid 33, jiffies 4295062501
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1
    [<ffffffff81299765>] bind_evtchn_to_irq+0x34/0xb8
    [<ffffffff812999ea>] bind_interdomain_evtchn_to_irqhandler+0x3d/0x7a
    [<ffffffff812a6102>] blkif_map+0x17d/0x1bc
    [<ffffffff812a572a>] frontend_changed+0x1b7/0x244
    [<ffffffff8129d6b9>] xenbus_otherend_changed+0x79/0x82
    [<ffffffff8129d872>] frontend_changed+0xb/0xd
    [<ffffffff8129bd14>] xenwatch_thread+0x11a/0x14d
    [<ffffffff81093376>] kthread+0x7d/0x85
    [<ffffffff8103eeaa>] child_rip+0xa/0x20
unreferenced object 0xffff88002bac1de0 (size 32):
  comm "pciback_workque", pid 640, jiffies 4295062583
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1
    [<ffffffff81299b3c>] xen_create_msi_irq+0xba/0x19d
    [<ffffffff8103be17>] xen_setup_msi_irqs+0x39/0x87
    [<ffffffff8149c7b6>] xen_pci_setup_msi_irqs+0x34/0x1be
    [<ffffffff81058114>] arch_setup_msi_irqs+0x38/0x138
    [<ffffffff8124ccb3>] pci_enable_msix+0x3c2/0x3d3
    [<ffffffff812a3c29>] pciback_enable_msix+0xa6/0x106
    [<ffffffff812a159e>] pciback_do_op+0xd7/0x148
    [<ffffffff8108f723>] worker_thread+0x22c/0x332
    [<ffffffff81093376>] kthread+0x7d/0x85
unreferenced object 0xffff88002bac1940 (size 32):
  comm "pciback_workque", pid 640, jiffies 4295062583
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1
    [<ffffffff81299b3c>] xen_create_msi_irq+0xba/0x19d
    [<ffffffff8103be17>] xen_setup_msi_irqs+0x39/0x87
    [<ffffffff8149c7b6>] xen_pci_setup_msi_irqs+0x34/0x1be
    [<ffffffff81058114>] arch_setup_msi_irqs+0x38/0x138
    [<ffffffff8124ccb3>] pci_enable_msix+0x3c2/0x3d3
    [<ffffffff812a3c29>] pciback_enable_msix+0xa6/0x106
    [<ffffffff812a159e>] pciback_do_op+0xd7/0x148
    [<ffffffff8108f723>] worker_thread+0x22c/0x332
    [<ffffffff81093376>] kthread+0x7d/0x85
unreferenced object 0xffff88002f0b7900 (size 32):
  comm "xenwatch", pid 33, jiffies 4295063153
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1
    [<ffffffff81299765>] bind_evtchn_to_irq+0x34/0xb8
    [<ffffffff812999ea>] bind_interdomain_evtchn_to_irqhandler+0x3d/0x7a
    [<ffffffff812ad21d>] netif_map+0x1a3/0x303
    [<ffffffff812ac674>] frontend_changed+0x306/0x5b6
    [<ffffffff8129d6b9>] xenbus_otherend_changed+0x79/0x82
    [<ffffffff8129d872>] frontend_changed+0xb/0xd
    [<ffffffff8129bd14>] xenwatch_thread+0x11a/0x14d
    [<ffffffff81093376>] kthread+0x7d/0x85
    [<ffffffff8103eeaa>] child_rip+0xa/0x20



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

<Prev in Thread] Current Thread [Next in Thread>