When using a serial port from an add-in PCI card, and that IRQ is (as usual) outside of the legacy range (0...15), Xen would never really enable the IRQ, as at the time setup_irq() runs the handler for the IRQ still is &no_irq_type. Consequently, once the trigger mode and polarity of the interrupt become known to Xen, it should start such IRQ(s) it uses for itself. The question is whether the same should also be done in ioapic_guest_write(): Legacy kernels don't use PHYSDEVOP_setup_gsi (and hence don't trigger the code path modified). Note however that even when a kernel is using PHYSDEVOP_setup_gsi in the way the pv-ops kernel currently does, there's still no guarantee that the call would ever be issued for IRQs Xen may be using, since this happens only when devices get enabled. For Xen's purposes, this function should be called for *all* device IRQs, regardless of whether those would actually be (attempted to be) used by the kernel, i.e. in a subsys_initcall() from drivers/acpi/pci_irq.c iterating over all PCI devices and doing mostly what acpi_pci_irq_enable() does except for calling this function in place of acpi_register_gsi(). The downside of this approach is that without extra filtering in Xen (based on a hint from Dom0), vectors will then get up even for IRQs that are unused by both hypervisor and kernel. Signed-off-by: Jan Beulich --- 2010-03-22.orig/xen/arch/x86/io_apic.c 2010-03-22 00:00:00.000000000 +0100 +++ 2010-03-22/xen/arch/x86/io_apic.c 2010-03-23 15:48:14.000000000 +0100 @@ -2113,6 +2113,7 @@ int __init io_apic_get_redir_entries (in int io_apic_set_pci_routing (int ioapic, int pin, int irq, int edge_level, int active_high_low) { + struct irq_desc *desc = irq_to_desc(irq); struct IO_APIC_route_entry entry; unsigned long flags; int vector; @@ -2166,6 +2167,11 @@ int io_apic_set_pci_routing (int ioapic, set_native_irq_info(irq, TARGET_CPUS); spin_unlock_irqrestore(&ioapic_lock, flags); + spin_lock(&desc->lock); + if (!(desc->status & (IRQ_DISABLED | IRQ_GUEST))) + desc->handler->startup(irq); + spin_unlock(&desc->lock); + return 0; }