Sander Eikelenboom
2010-Sep-14  13:33 UTC
[Xen-devel] pvops xen-stable-2.6.32.x, 7 kmemleaks just after boot
Hi Jeremy/Konrad,
I Don''t know if these kmemleaks are bogus, but they are reported right
after boot, no domU''s started (with memleak detector enabled).
Running:
xen-unstable 4.1                        xen_changeset: Fri Sep 10 19:06:33 2010
+0100 22132:3985fea87987
pvops xen-stable-2.6.32.x kernel        last commit
b297cdac0373625d3cd0e6f2b393570dcf2edba6
--
Sander
xentest:/sys/kernel/debug# cat kmemleak
unreferenced object 0xffff88002ff6f7e0 (size 72):
  comm "swapper", pid 1, jiffies 4294667524
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 0e 01 01 00 00 00 00 00  ................
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff81119500>] kmem_cache_alloc+0x136/0x185
    [<ffffffff81285377>] acpi_ut_allocate_object_desc_dbg+0x4c/0x88
    [<ffffffff812853d5>] acpi_ut_create_internal_object_dbg+0x22/0x88
    [<ffffffff81273dbf>] acpi_ex_read_data_from_field+0xf2/0x157
    [<ffffffff81278ce3>] acpi_ex_resolve_node_to_value+0x18f/0x220
    [<ffffffff8127481b>] acpi_ex_resolve_to_value+0x205/0x216
    [<ffffffff8126ecb0>] acpi_ds_evaluate_name_path+0x7a/0xff
    [<ffffffff8126d8ab>] acpi_ds_exec_end_op+0x94/0x3d9
    [<ffffffff8127f78b>] acpi_ps_parse_loop+0x80a/0x98b
    [<ffffffff8127e835>] acpi_ps_parse_aml+0x9a/0x2d9
    [<ffffffff8127ffd2>] acpi_ps_execute_method+0x1dd/0x2ab
    [<ffffffff8127b79a>] acpi_ns_evaluate+0xee/0x1b6
    [<ffffffff8127b964>] acpi_ns_exec_module_code_list+0x102/0x17e
    [<ffffffff812840c4>] acpi_initialize_objects+0x1f/0x59
    [<ffffffff819d1d5b>] acpi_init+0x102/0x2cc
unreferenced object 0xffff88002f040840 (size 32):
  comm "swapper", pid 1, jiffies 4294668379
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185
    [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98
    [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3
    [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f
    [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212
    [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d
    [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40
    [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70
    [<ffffffff81243e54>] pci_enable_device+0xe/0x10
    [<ffffffff812401f3>] pci_enable_bridges+0x2a/0x4e
unreferenced object 0xffff88002f040860 (size 32):
  comm "swapper", pid 1, jiffies 4294668381
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185
    [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98
    [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3
    [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f
    [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212
    [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d
    [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40
    [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70
    [<ffffffff81243e54>] pci_enable_device+0xe/0x10
    [<ffffffff812401f3>] pci_enable_bridges+0x2a/0x4e
unreferenced object 0xffff88002c226fe0 (size 32):
  comm "swapper", pid 1, jiffies 4294669476
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185
    [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98
    [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3
    [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f
    [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212
    [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d
    [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40
    [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70
    [<ffffffff81243e54>] pci_enable_device+0xe/0x10
    [<ffffffff81243ed0>] pcim_enable_device+0x7a/0x9a
unreferenced object 0xffff88002fee71c0 (size 32):
  comm "swapper", pid 1, jiffies 4294669610
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185
    [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98
    [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3
    [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f
    [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212
    [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d
    [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40
    [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70
    [<ffffffff81243efe>] pci_enable_device_mem+0xe/0x10
    [<ffffffff815c5b0c>] e1000_probe+0x39/0xbcd
unreferenced object 0xffff88002fee7100 (size 32):
  comm "swapper", pid 1, jiffies 4294669610
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1
    [<ffffffff81299b3c>] xen_create_msi_irq+0xba/0x19d
    [<ffffffff8103be17>] xen_setup_msi_irqs+0x39/0x87
    [<ffffffff8149c7b6>] xen_pci_setup_msi_irqs+0x34/0x1be
    [<ffffffff81058114>] arch_setup_msi_irqs+0x38/0x138
    [<ffffffff8124d053>] pci_enable_msi_block+0x26c/0x306
    [<ffffffff8137af57>] e1000e_set_interrupt_capability+0xd2/0x114
    [<ffffffff815c5e04>] e1000_probe+0x331/0xbcd
    [<ffffffff8124505b>] local_pci_probe+0x12/0x16
    [<ffffffff812452d9>] pci_device_probe+0x5c/0x86
unreferenced object 0xffff88002ff2da60 (size 32):
  comm "swapper", pid 1, jiffies 4294669729
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
    [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
    [<ffffffff81056dbf>] kzalloc_node+0xf/0x11
    [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
    [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
    [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
    [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185
    [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98
    [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3
    [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f
    [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212
    [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d
    [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40
    [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70
    [<ffffffff81243e54>] pci_enable_device+0xe/0x10
    [<ffffffff815d3e61>] i801_probe+0x98/0x2b4
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
Jeremy Fitzhardinge
2010-Sep-14  22:08 UTC
[Xen-devel] Re: pvops xen-stable-2.6.32.x, 7 kmemleaks just after boot
On 09/14/2010 06:33 AM, Sander Eikelenboom wrote:> Hi Jeremy/Konrad, > > I Don''t know if these kmemleaks are bogus, but they are reported right after boot, no domU''s started (with memleak detector enabled).They look fairly minor. The first is some ACPI value, which is presumably not being used in the pvops case (is this dom0 or domU?). The others are just per-interrupt data we''re not using, which probably shouldn''t be allocated in the first place. How much space is actually leaked? I''d be surprised if its more than a page or two. J> Running: > xen-unstable 4.1 xen_changeset: Fri Sep 10 19:06:33 2010 +0100 22132:3985fea87987 > pvops xen-stable-2.6.32.x kernel last commit b297cdac0373625d3cd0e6f2b393570dcf2edba6 > > -- > Sander > > > > > xentest:/sys/kernel/debug# cat kmemleak > unreferenced object 0xffff88002ff6f7e0 (size 72): > comm "swapper", pid 1, jiffies 4294667524 > hex dump (first 32 bytes): > 00 00 00 00 00 00 00 00 0e 01 01 00 00 00 00 00 ................ > 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > backtrace: > [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44 > [<ffffffff81119500>] kmem_cache_alloc+0x136/0x185 > [<ffffffff81285377>] acpi_ut_allocate_object_desc_dbg+0x4c/0x88 > [<ffffffff812853d5>] acpi_ut_create_internal_object_dbg+0x22/0x88 > [<ffffffff81273dbf>] acpi_ex_read_data_from_field+0xf2/0x157 > [<ffffffff81278ce3>] acpi_ex_resolve_node_to_value+0x18f/0x220 > [<ffffffff8127481b>] acpi_ex_resolve_to_value+0x205/0x216 > [<ffffffff8126ecb0>] acpi_ds_evaluate_name_path+0x7a/0xff > [<ffffffff8126d8ab>] acpi_ds_exec_end_op+0x94/0x3d9 > [<ffffffff8127f78b>] acpi_ps_parse_loop+0x80a/0x98b > [<ffffffff8127e835>] acpi_ps_parse_aml+0x9a/0x2d9 > [<ffffffff8127ffd2>] acpi_ps_execute_method+0x1dd/0x2ab > [<ffffffff8127b79a>] acpi_ns_evaluate+0xee/0x1b6 > [<ffffffff8127b964>] acpi_ns_exec_module_code_list+0x102/0x17e > [<ffffffff812840c4>] acpi_initialize_objects+0x1f/0x59 > [<ffffffff819d1d5b>] acpi_init+0x102/0x2cc > unreferenced object 0xffff88002f040840 (size 32): > comm "swapper", pid 1, jiffies 4294668379 > hex dump (first 32 bytes): > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > backtrace: > [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44 > [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea > [<ffffffff81056dbf>] kzalloc_node+0xf/0x11 > [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45 > [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39 > [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7 > [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185 > [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98 > [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3 > [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f > [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212 > [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d > [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40 > [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70 > [<ffffffff81243e54>] pci_enable_device+0xe/0x10 > [<ffffffff812401f3>] pci_enable_bridges+0x2a/0x4e > unreferenced object 0xffff88002f040860 (size 32): > comm "swapper", pid 1, jiffies 4294668381 > hex dump (first 32 bytes): > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > backtrace: > [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44 > [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea > [<ffffffff81056dbf>] kzalloc_node+0xf/0x11 > [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45 > [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39 > [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7 > [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185 > [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98 > [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3 > [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f > [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212 > [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d > [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40 > [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70 > [<ffffffff81243e54>] pci_enable_device+0xe/0x10 > [<ffffffff812401f3>] pci_enable_bridges+0x2a/0x4e > unreferenced object 0xffff88002c226fe0 (size 32): > comm "swapper", pid 1, jiffies 4294669476 > hex dump (first 32 bytes): > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > backtrace: > [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44 > [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea > [<ffffffff81056dbf>] kzalloc_node+0xf/0x11 > [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45 > [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39 > [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7 > [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185 > [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98 > [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3 > [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f > [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212 > [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d > [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40 > [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70 > [<ffffffff81243e54>] pci_enable_device+0xe/0x10 > [<ffffffff81243ed0>] pcim_enable_device+0x7a/0x9a > unreferenced object 0xffff88002fee71c0 (size 32): > comm "swapper", pid 1, jiffies 4294669610 > hex dump (first 32 bytes): > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > backtrace: > [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44 > [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea > [<ffffffff81056dbf>] kzalloc_node+0xf/0x11 > [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45 > [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39 > [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7 > [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185 > [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98 > [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3 > [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f > [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212 > [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d > [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40 > [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70 > [<ffffffff81243efe>] pci_enable_device_mem+0xe/0x10 > [<ffffffff815c5b0c>] e1000_probe+0x39/0xbcd > unreferenced object 0xffff88002fee7100 (size 32): > comm "swapper", pid 1, jiffies 4294669610 > hex dump (first 32 bytes): > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > backtrace: > [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44 > [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea > [<ffffffff81056dbf>] kzalloc_node+0xf/0x11 > [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45 > [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39 > [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7 > [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1 > [<ffffffff81299b3c>] xen_create_msi_irq+0xba/0x19d > [<ffffffff8103be17>] xen_setup_msi_irqs+0x39/0x87 > [<ffffffff8149c7b6>] xen_pci_setup_msi_irqs+0x34/0x1be > [<ffffffff81058114>] arch_setup_msi_irqs+0x38/0x138 > [<ffffffff8124d053>] pci_enable_msi_block+0x26c/0x306 > [<ffffffff8137af57>] e1000e_set_interrupt_capability+0xd2/0x114 > [<ffffffff815c5e04>] e1000_probe+0x331/0xbcd > [<ffffffff8124505b>] local_pci_probe+0x12/0x16 > [<ffffffff812452d9>] pci_device_probe+0x5c/0x86 > unreferenced object 0xffff88002ff2da60 (size 32): > comm "swapper", pid 1, jiffies 4294669729 > hex dump (first 32 bytes): > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > backtrace: > [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44 > [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea > [<ffffffff81056dbf>] kzalloc_node+0xf/0x11 > [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45 > [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39 > [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7 > [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185 > [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98 > [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3 > [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f > [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212 > [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d > [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40 > [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70 > [<ffffffff81243e54>] pci_enable_device+0xe/0x10 > [<ffffffff815d3e61>] i801_probe+0x98/0x2b4 >_______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel