[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] Re: pci-passthrough: suspected kmemleaks
On Tue, Sep 14, 2010 at 05:17:32PM +0200, Sander Eikelenboom wrote: > Hi Konrad, > > I encountered these suspected kmemleaks after starting a VM with pci device > passed through, of which some seem potential related to pciback. Ok, most of them seem to come from arch_init_chip_data And they look to be un-used, hmm - let me put it on my todo list and see what is happening. Thanks > hex dump (first 32 bytes): > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > backtrace: > [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44 > [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea > [<ffffffff81056dbf>] kzalloc_node+0xf/0x11 > [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45 > [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39 > [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7 > [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185 > [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98 > [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3 > [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f > [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212 > [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d > [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40 > [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70 > [<ffffffff81243e54>] pci_enable_device+0xe/0x10 > [<ffffffff812401f3>] pci_enable_bridges+0x2a/0x4e _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |