[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] Re: pci-passthrough: suspected kmemleaks



On Tue, Sep 14, 2010 at 05:17:32PM +0200, Sander Eikelenboom wrote:
> Hi Konrad,
> 
> I encountered these suspected kmemleaks after starting a VM with pci device 
> passed through, of which some seem potential related to pciback.

Ok, most of them seem to come from

arch_init_chip_data

And they look to be un-used, hmm - let me put it on my todo list and see
what is happening. Thanks
>   hex dump (first 32 bytes):
>     00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
>     00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
>   backtrace:
>     [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
>     [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
>     [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
>     [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
>     [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
>     [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
>     [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185
>     [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98
>     [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3
>     [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f
>     [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212
>     [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d
>     [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40
>     [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70
>     [<ffffffff81243e54>] pci_enable_device+0xe/0x10
>     [<ffffffff812401f3>] pci_enable_bridges+0x2a/0x4e

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.