Hi Konrad,
I encountered these suspected kmemleaks after starting a VM with pci device
passed through, of which some seem potential related to pciback.
--
Sander
unreferenced object 0xffff88002ff077e0 (size 72):
comm "swapper", pid 1, jiffies 4294667523
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 0e 01 01 00 00 00 00 00 ................
01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
[<ffffffff81119500>] kmem_cache_alloc+0x136/0x185
[<ffffffff81285377>] acpi_ut_allocate_object_desc_dbg+0x4c/0x88
[<ffffffff812853d5>] acpi_ut_create_internal_object_dbg+0x22/0x88
[<ffffffff81273dbf>] acpi_ex_read_data_from_field+0xf2/0x157
[<ffffffff81278ce3>] acpi_ex_resolve_node_to_value+0x18f/0x220
[<ffffffff8127481b>] acpi_ex_resolve_to_value+0x205/0x216
[<ffffffff8126ecb0>] acpi_ds_evaluate_name_path+0x7a/0xff
[<ffffffff8126d8ab>] acpi_ds_exec_end_op+0x94/0x3d9
[<ffffffff8127f78b>] acpi_ps_parse_loop+0x80a/0x98b
[<ffffffff8127e835>] acpi_ps_parse_aml+0x9a/0x2d9
[<ffffffff8127ffd2>] acpi_ps_execute_method+0x1dd/0x2ab
[<ffffffff8127b79a>] acpi_ns_evaluate+0xee/0x1b6
[<ffffffff8127b964>] acpi_ns_exec_module_code_list+0x102/0x17e
[<ffffffff812840c4>] acpi_initialize_objects+0x1f/0x59
[<ffffffff819d1d5b>] acpi_init+0x102/0x2cc
unreferenced object 0xffff88002f0b71e0 (size 32):
comm "swapper", pid 1, jiffies 4294668424
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
[<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
[<ffffffff81056dbf>] kzalloc_node+0xf/0x11
[<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
[<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
[<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
[<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185
[<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98
[<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3
[<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f
[<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212
[<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d
[<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40
[<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70
[<ffffffff81243e54>] pci_enable_device+0xe/0x10
[<ffffffff812401f3>] pci_enable_bridges+0x2a/0x4e
unreferenced object 0xffff88002f0b7200 (size 32):
comm "swapper", pid 1, jiffies 4294668426
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
[<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
[<ffffffff81056dbf>] kzalloc_node+0xf/0x11
[<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
[<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
[<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
[<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185
[<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98
[<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3
[<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f
[<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212
[<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d
[<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40
[<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70
[<ffffffff81243e54>] pci_enable_device+0xe/0x10
[<ffffffff812401f3>] pci_enable_bridges+0x2a/0x4e
unreferenced object 0xffff88002c0b5ea0 (size 32):
comm "swapper", pid 1, jiffies 4294669364
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
[<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
[<ffffffff81056dbf>] kzalloc_node+0xf/0x11
[<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
[<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
[<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
[<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185
[<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98
[<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3
[<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f
[<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212
[<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d
[<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40
[<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70
[<ffffffff81243e54>] pci_enable_device+0xe/0x10
[<ffffffff81243ed0>] pcim_enable_device+0x7a/0x9a
unreferenced object 0xffff88002c0b5ba0 (size 32):
comm "swapper", pid 1, jiffies 4294669478
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
[<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
[<ffffffff81056dbf>] kzalloc_node+0xf/0x11
[<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
[<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
[<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
[<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185
[<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98
[<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3
[<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f
[<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212
[<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d
[<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40
[<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70
[<ffffffff81243efe>] pci_enable_device_mem+0xe/0x10
[<ffffffff815c5b0c>] e1000_probe+0x39/0xbcd
unreferenced object 0xffff88002c0b5d40 (size 32):
comm "swapper", pid 1, jiffies 4294669478
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
[<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
[<ffffffff81056dbf>] kzalloc_node+0xf/0x11
[<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
[<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
[<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
[<ffffffff812995cd>] find_unbound_irq+0x68/0xa1
[<ffffffff81299b3c>] xen_create_msi_irq+0xba/0x19d
[<ffffffff8103be17>] xen_setup_msi_irqs+0x39/0x87
[<ffffffff8149c7b6>] xen_pci_setup_msi_irqs+0x34/0x1be
[<ffffffff81058114>] arch_setup_msi_irqs+0x38/0x138
[<ffffffff8124d053>] pci_enable_msi_block+0x26c/0x306
[<ffffffff8137af57>] e1000e_set_interrupt_capability+0xd2/0x114
[<ffffffff815c5e04>] e1000_probe+0x331/0xbcd
[<ffffffff8124505b>] local_pci_probe+0x12/0x16
[<ffffffff812452d9>] pci_device_probe+0x5c/0x86
unreferenced object 0xffff88002c0b5e80 (size 32):
comm "swapper", pid 1, jiffies 4294669592
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
[<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
[<ffffffff81056dbf>] kzalloc_node+0xf/0x11
[<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
[<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
[<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
[<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185
[<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98
[<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3
[<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f
[<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212
[<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d
[<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40
[<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70
[<ffffffff81243e54>] pci_enable_device+0xe/0x10
[<ffffffff815d3e61>] i801_probe+0x98/0x2b4
unreferenced object 0xffff88002ff01c40 (size 32):
comm "xenstored", pid 5411, jiffies 4295057498
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
[<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
[<ffffffff81056dbf>] kzalloc_node+0xf/0x11
[<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
[<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
[<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
[<ffffffff812995cd>] find_unbound_irq+0x68/0xa1
[<ffffffff81299765>] bind_evtchn_to_irq+0x34/0xb8
[<ffffffff81299a49>] bind_evtchn_to_irqhandler+0x22/0x5b
[<ffffffff8129f11c>] evtchn_bind_to_user+0x4c/0x57
[<ffffffff8129f235>] evtchn_ioctl+0x10e/0x2ed
[<ffffffff8112cbb8>] vfs_ioctl+0x2a/0x78
[<ffffffff8112d12b>] do_vfs_ioctl+0x4aa/0x4e7
[<ffffffff8112d1bd>] sys_ioctl+0x55/0x77
[<ffffffff8103dd42>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88002f0bb498 (size 8):
comm "xenbus", pid 34, jiffies 4295058172
hex dump (first 8 bytes):
77 00 0b 2f 00 88 ff ff w../....
backtrace:
[<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
[<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
[<ffffffff8129ba45>] xenbus_thread+0xcc/0x281
[<ffffffff81093376>] kthread+0x7d/0x85
[<ffffffff8103eeaa>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88002b9a5a08 (size 8):
comm "xenbus", pid 34, jiffies 4295058332
hex dump (first 8 bytes):
77 00 9a 2b 00 88 ff ff w..+....
backtrace:
[<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
[<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
[<ffffffff8129ba45>] xenbus_thread+0xcc/0x281
[<ffffffff81093376>] kthread+0x7d/0x85
[<ffffffff8103eeaa>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88002ff06258 (size 8):
comm "xenbus", pid 34, jiffies 4295059316
hex dump (first 8 bytes):
77 00 f0 2f 00 88 ff ff w../....
backtrace:
[<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
[<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
[<ffffffff8129ba45>] xenbus_thread+0xcc/0x281
[<ffffffff81093376>] kthread+0x7d/0x85
[<ffffffff8103eeaa>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88002f0b7060 (size 32):
comm "xenconsoled", pid 5417, jiffies 4295059743
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
[<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
[<ffffffff81056dbf>] kzalloc_node+0xf/0x11
[<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
[<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
[<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
[<ffffffff812995cd>] find_unbound_irq+0x68/0xa1
[<ffffffff81299765>] bind_evtchn_to_irq+0x34/0xb8
[<ffffffff81299a49>] bind_evtchn_to_irqhandler+0x22/0x5b
[<ffffffff8129f11c>] evtchn_bind_to_user+0x4c/0x57
[<ffffffff8129f235>] evtchn_ioctl+0x10e/0x2ed
[<ffffffff8112cbb8>] vfs_ioctl+0x2a/0x78
[<ffffffff8112d12b>] do_vfs_ioctl+0x4aa/0x4e7
[<ffffffff8112d1bd>] sys_ioctl+0x55/0x77
[<ffffffff8103dd42>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88002ff01980 (size 32):
comm "xenwatch", pid 33, jiffies 4295062339
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
[<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
[<ffffffff81056dbf>] kzalloc_node+0xf/0x11
[<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
[<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
[<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
[<ffffffff812995cd>] find_unbound_irq+0x68/0xa1
[<ffffffff81299765>] bind_evtchn_to_irq+0x34/0xb8
[<ffffffff812999ea>] bind_interdomain_evtchn_to_irqhandler+0x3d/0x7a
[<ffffffff812a1945>] pciback_attach+0x1b8/0x2a6
[<ffffffff812a2078>] pciback_frontend_changed+0x69/0x51e
[<ffffffff8129d6b9>] xenbus_otherend_changed+0x79/0x82
[<ffffffff8129d872>] frontend_changed+0xb/0xd
[<ffffffff8129bd14>] xenwatch_thread+0x11a/0x14d
[<ffffffff81093376>] kthread+0x7d/0x85
[<ffffffff8103eeaa>] child_rip+0xa/0x20
unreferenced object 0xffff88002f0b70a0 (size 32):
comm "xenwatch", pid 33, jiffies 4295062501
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
[<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
[<ffffffff81056dbf>] kzalloc_node+0xf/0x11
[<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
[<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
[<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
[<ffffffff812995cd>] find_unbound_irq+0x68/0xa1
[<ffffffff81299765>] bind_evtchn_to_irq+0x34/0xb8
[<ffffffff812999ea>] bind_interdomain_evtchn_to_irqhandler+0x3d/0x7a
[<ffffffff812a6102>] blkif_map+0x17d/0x1bc
[<ffffffff812a572a>] frontend_changed+0x1b7/0x244
[<ffffffff8129d6b9>] xenbus_otherend_changed+0x79/0x82
[<ffffffff8129d872>] frontend_changed+0xb/0xd
[<ffffffff8129bd14>] xenwatch_thread+0x11a/0x14d
[<ffffffff81093376>] kthread+0x7d/0x85
[<ffffffff8103eeaa>] child_rip+0xa/0x20
unreferenced object 0xffff88002bac1de0 (size 32):
comm "pciback_workque", pid 640, jiffies 4295062583
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
[<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
[<ffffffff81056dbf>] kzalloc_node+0xf/0x11
[<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
[<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
[<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
[<ffffffff812995cd>] find_unbound_irq+0x68/0xa1
[<ffffffff81299b3c>] xen_create_msi_irq+0xba/0x19d
[<ffffffff8103be17>] xen_setup_msi_irqs+0x39/0x87
[<ffffffff8149c7b6>] xen_pci_setup_msi_irqs+0x34/0x1be
[<ffffffff81058114>] arch_setup_msi_irqs+0x38/0x138
[<ffffffff8124ccb3>] pci_enable_msix+0x3c2/0x3d3
[<ffffffff812a3c29>] pciback_enable_msix+0xa6/0x106
[<ffffffff812a159e>] pciback_do_op+0xd7/0x148
[<ffffffff8108f723>] worker_thread+0x22c/0x332
[<ffffffff81093376>] kthread+0x7d/0x85
unreferenced object 0xffff88002bac1940 (size 32):
comm "pciback_workque", pid 640, jiffies 4295062583
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
[<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
[<ffffffff81056dbf>] kzalloc_node+0xf/0x11
[<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
[<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
[<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
[<ffffffff812995cd>] find_unbound_irq+0x68/0xa1
[<ffffffff81299b3c>] xen_create_msi_irq+0xba/0x19d
[<ffffffff8103be17>] xen_setup_msi_irqs+0x39/0x87
[<ffffffff8149c7b6>] xen_pci_setup_msi_irqs+0x34/0x1be
[<ffffffff81058114>] arch_setup_msi_irqs+0x38/0x138
[<ffffffff8124ccb3>] pci_enable_msix+0x3c2/0x3d3
[<ffffffff812a3c29>] pciback_enable_msix+0xa6/0x106
[<ffffffff812a159e>] pciback_do_op+0xd7/0x148
[<ffffffff8108f723>] worker_thread+0x22c/0x332
[<ffffffff81093376>] kthread+0x7d/0x85
unreferenced object 0xffff88002f0b7900 (size 32):
comm "xenwatch", pid 33, jiffies 4295063153
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff815bd155>] kmemleak_alloc+0x21/0x44
[<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea
[<ffffffff81056dbf>] kzalloc_node+0xf/0x11
[<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45
[<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39
[<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7
[<ffffffff812995cd>] find_unbound_irq+0x68/0xa1
[<ffffffff81299765>] bind_evtchn_to_irq+0x34/0xb8
[<ffffffff812999ea>] bind_interdomain_evtchn_to_irqhandler+0x3d/0x7a
[<ffffffff812ad21d>] netif_map+0x1a3/0x303
[<ffffffff812ac674>] frontend_changed+0x306/0x5b6
[<ffffffff8129d6b9>] xenbus_otherend_changed+0x79/0x82
[<ffffffff8129d872>] frontend_changed+0xb/0xd
[<ffffffff8129bd14>] xenwatch_thread+0x11a/0x14d
[<ffffffff81093376>] kthread+0x7d/0x85
[<ffffffff8103eeaa>] child_rip+0xa/0x20
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|