[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] pci-passthrough: suspected kmemleaks



Hi Konrad,

I encountered these suspected kmemleaks after starting a VM with pci device 
passed through, of which some seem potential related to pciback.

--
Sander

unreferenced object 0xffff88002ff077e0 (size 72):
  comm "swapper", pid 1, jiffies 4294667523
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 0e 01 01 00 00 00 00 00  ................
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff81119500>] kmem_cache_alloc+0x136/0x185
    [<ffffffff81285377>] acpi_ut_allocate_object_desc_dbg+0x4c/0x88
    [<ffffffff812853d5>] acpi_ut_create_internal_object_dbg+0x22/0x88
    [<ffffffff81273dbf>] acpi_ex_read_data_from_field+0xf2/0x157
    [<ffffffff81278ce3>] acpi_ex_resolve_node_to_value+0x18f/0x220
    [<ffffffff8127481b>] acpi_ex_resolve_to_value+0x205/0x216
    [<ffffffff8126ecb0>] acpi_ds_evaluate_name_path+0x7a/0xff
    [<ffffffff8126d8ab>] acpi_ds_exec_end_op+0x94/0x3d9
    [<ffffffff8127f78b>] acpi_ps_parse_loop+0x80a/0x98b
    [<ffffffff8127e835>] acpi_ps_parse_aml+0x9a/0x2d9
    [<ffffffff8127ffd2>] acpi_ps_execute_method+0x1dd/0x2ab
    [<ffffffff8127b79a>] acpi_ns_evaluate+0xee/0x1b6
    [<ffffffff8127b964>] acpi_ns_exec_module_code_list+0x102/0x17e
    [<ffffffff812840c4>] acpi_initialize_objects+0x1f/0x59
    [<ffffffff819d1d5b>] acpi_init+0x102/0x2cc
unreferenced object 0xffff88002f0b71e0 (size 32):
  comm "swapper", pid 1, jiffies 4294668424
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185
    [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98
    [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3
    [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f
    [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212
    [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d
    [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40
    [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70
    [<ffffffff81243e54>] pci_enable_device+0xe/0x10
    [<ffffffff812401f3>] pci_enable_bridges+0x2a/0x4e
unreferenced object 0xffff88002f0b7200 (size 32):
  comm "swapper", pid 1, jiffies 4294668426
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185
    [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98
    [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3
    [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f
    [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212
    [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d
    [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40
    [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70
    [<ffffffff81243e54>] pci_enable_device+0xe/0x10
    [<ffffffff812401f3>] pci_enable_bridges+0x2a/0x4e
unreferenced object 0xffff88002c0b5ea0 (size 32):
  comm "swapper", pid 1, jiffies 4294669364
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185
    [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98
    [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3
    [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f
    [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212
    [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d
    [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40
    [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70
    [<ffffffff81243e54>] pci_enable_device+0xe/0x10
    [<ffffffff81243ed0>] pcim_enable_device+0x7a/0x9a
unreferenced object 0xffff88002c0b5ba0 (size 32):
  comm "swapper", pid 1, jiffies 4294669478
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185
    [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98
    [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3
    [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f
    [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212
    [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d
    [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40
    [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70
    [<ffffffff81243efe>] pci_enable_device_mem+0xe/0x10
    [<ffffffff815c5b0c>] e1000_probe+0x39/0xbcd
unreferenced object 0xffff88002c0b5d40 (size 32):
  comm "swapper", pid 1, jiffies 4294669478
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1
    [<ffffffff81299b3c>] xen_create_msi_irq+0xba/0x19d
    [<ffffffff8103be17>] xen_setup_msi_irqs+0x39/0x87
    [<ffffffff8149c7b6>] xen_pci_setup_msi_irqs+0x34/0x1be
    [<ffffffff81058114>] arch_setup_msi_irqs+0x38/0x138
    [<ffffffff8124d053>] pci_enable_msi_block+0x26c/0x306
    [<ffffffff8137af57>] e1000e_set_interrupt_capability+0xd2/0x114
    [<ffffffff815c5e04>] e1000_probe+0x331/0xbcd
    [<ffffffff8124505b>] local_pci_probe+0x12/0x16
    [<ffffffff812452d9>] pci_device_probe+0x5c/0x86
unreferenced object 0xffff88002c0b5e80 (size 32):
  comm "swapper", pid 1, jiffies 4294669592
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185
    [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98
    [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3
    [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f
    [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212
    [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d
    [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40
    [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70
    [<ffffffff81243e54>] pci_enable_device+0xe/0x10
    [<ffffffff815d3e61>] i801_probe+0x98/0x2b4
unreferenced object 0xffff88002ff01c40 (size 32):
  comm "xenstored", pid 5411, jiffies 4295057498
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1
    [<ffffffff81299765>] bind_evtchn_to_irq+0x34/0xb8
    [<ffffffff81299a49>] bind_evtchn_to_irqhandler+0x22/0x5b
    [<ffffffff8129f11c>] evtchn_bind_to_user+0x4c/0x57
    [<ffffffff8129f235>] evtchn_ioctl+0x10e/0x2ed
    [<ffffffff8112cbb8>] vfs_ioctl+0x2a/0x78
    [<ffffffff8112d12b>] do_vfs_ioctl+0x4aa/0x4e7
    [<ffffffff8112d1bd>] sys_ioctl+0x55/0x77
    [<ffffffff8103dd42>] system_call_fastpath+0x16/0x1b
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88002f0bb498 (size 8):
  comm "xenbus", pid 34, jiffies 4295058172
  hex dump (first 8 bytes):
    77 00 0b 2f 00 88 ff ff                          w../....
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff8129ba45>] xenbus_thread+0xcc/0x281
    [<ffffffff81093376>] kthread+0x7d/0x85
    [<ffffffff8103eeaa>] child_rip+0xa/0x20
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88002b9a5a08 (size 8):
  comm "xenbus", pid 34, jiffies 4295058332
  hex dump (first 8 bytes):
    77 00 9a 2b 00 88 ff ff                          w..+....
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff8129ba45>] xenbus_thread+0xcc/0x281
    [<ffffffff81093376>] kthread+0x7d/0x85
    [<ffffffff8103eeaa>] child_rip+0xa/0x20
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88002ff06258 (size 8):
  comm "xenbus", pid 34, jiffies 4295059316
  hex dump (first 8 bytes):
    77 00 f0 2f 00 88 ff ff                          w../....
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff8129ba45>] xenbus_thread+0xcc/0x281
    [<ffffffff81093376>] kthread+0x7d/0x85
    [<ffffffff8103eeaa>] child_rip+0xa/0x20
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88002f0b7060 (size 32):
  comm "xenconsoled", pid 5417, jiffies 4295059743
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1
    [<ffffffff81299765>] bind_evtchn_to_irq+0x34/0xb8
    [<ffffffff81299a49>] bind_evtchn_to_irqhandler+0x22/0x5b
    [<ffffffff8129f11c>] evtchn_bind_to_user+0x4c/0x57
    [<ffffffff8129f235>] evtchn_ioctl+0x10e/0x2ed
    [<ffffffff8112cbb8>] vfs_ioctl+0x2a/0x78
    [<ffffffff8112d12b>] do_vfs_ioctl+0x4aa/0x4e7
    [<ffffffff8112d1bd>] sys_ioctl+0x55/0x77
    [<ffffffff8103dd42>] system_call_fastpath+0x16/0x1b
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88002ff01980 (size 32):
  comm "xenwatch", pid 33, jiffies 4295062339
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1
    [<ffffffff81299765>] bind_evtchn_to_irq+0x34/0xb8
    [<ffffffff812999ea>] bind_interdomain_evtchn_to_irqhandler+0x3d/0x7a
    [<ffffffff812a1945>] pciback_attach+0x1b8/0x2a6
    [<ffffffff812a2078>] pciback_frontend_changed+0x69/0x51e
    [<ffffffff8129d6b9>] xenbus_otherend_changed+0x79/0x82
    [<ffffffff8129d872>] frontend_changed+0xb/0xd
    [<ffffffff8129bd14>] xenwatch_thread+0x11a/0x14d
    [<ffffffff81093376>] kthread+0x7d/0x85
    [<ffffffff8103eeaa>] child_rip+0xa/0x20
unreferenced object 0xffff88002f0b70a0 (size 32):
  comm "xenwatch", pid 33, jiffies 4295062501
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1
    [<ffffffff81299765>] bind_evtchn_to_irq+0x34/0xb8
    [<ffffffff812999ea>] bind_interdomain_evtchn_to_irqhandler+0x3d/0x7a
    [<ffffffff812a6102>] blkif_map+0x17d/0x1bc
    [<ffffffff812a572a>] frontend_changed+0x1b7/0x244
    [<ffffffff8129d6b9>] xenbus_otherend_changed+0x79/0x82
    [<ffffffff8129d872>] frontend_changed+0xb/0xd
    [<ffffffff8129bd14>] xenwatch_thread+0x11a/0x14d
    [<ffffffff81093376>] kthread+0x7d/0x85
    [<ffffffff8103eeaa>] child_rip+0xa/0x20
unreferenced object 0xffff88002bac1de0 (size 32):
  comm "pciback_workque", pid 640, jiffies 4295062583
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1
    [<ffffffff81299b3c>] xen_create_msi_irq+0xba/0x19d
    [<ffffffff8103be17>] xen_setup_msi_irqs+0x39/0x87
    [<ffffffff8149c7b6>] xen_pci_setup_msi_irqs+0x34/0x1be
    [<ffffffff81058114>] arch_setup_msi_irqs+0x38/0x138
    [<ffffffff8124ccb3>] pci_enable_msix+0x3c2/0x3d3
    [<ffffffff812a3c29>] pciback_enable_msix+0xa6/0x106
    [<ffffffff812a159e>] pciback_do_op+0xd7/0x148
    [<ffffffff8108f723>] worker_thread+0x22c/0x332
    [<ffffffff81093376>] kthread+0x7d/0x85
unreferenced object 0xffff88002bac1940 (size 32):
  comm "pciback_workque", pid 640, jiffies 4295062583
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1
    [<ffffffff81299b3c>] xen_create_msi_irq+0xba/0x19d
    [<ffffffff8103be17>] xen_setup_msi_irqs+0x39/0x87
    [<ffffffff8149c7b6>] xen_pci_setup_msi_irqs+0x34/0x1be
    [<ffffffff81058114>] arch_setup_msi_irqs+0x38/0x138
    [<ffffffff8124ccb3>] pci_enable_msix+0x3c2/0x3d3
    [<ffffffff812a3c29>] pciback_enable_msix+0xa6/0x106
    [<ffffffff812a159e>] pciback_do_op+0xd7/0x148
    [<ffffffff8108f723>] worker_thread+0x22c/0x332
    [<ffffffff81093376>] kthread+0x7d/0x85
unreferenced object 0xffff88002f0b7900 (size 32):
  comm "xenwatch", pid 33, jiffies 4295063153
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1
    [<ffffffff81299765>] bind_evtchn_to_irq+0x34/0xb8
    [<ffffffff812999ea>] bind_interdomain_evtchn_to_irqhandler+0x3d/0x7a
    [<ffffffff812ad21d>] netif_map+0x1a3/0x303
    [<ffffffff812ac674>] frontend_changed+0x306/0x5b6
    [<ffffffff8129d6b9>] xenbus_otherend_changed+0x79/0x82
    [<ffffffff8129d872>] frontend_changed+0xb/0xd
    [<ffffffff8129bd14>] xenwatch_thread+0x11a/0x14d
    [<ffffffff81093376>] kthread+0x7d/0x85
    [<ffffffff8103eeaa>] child_rip+0xa/0x20



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.