This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Home Products Support Community News


[Xen-bugs] [Bug 1512] New: kernel/irq/manage.c:273 __enable_irq+0x6b/0xd

To: xen-bugs@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-bugs] [Bug 1512] New: kernel/irq/manage.c:273 __enable_irq+0x6b/0xd4() every time ENTER is hit on the PV console
From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
Date: Fri, 18 Sep 2009 06:35:37 -0700
Delivery-date: Fri, 18 Sep 2009 06:35:41 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-bugs-request@lists.xensource.com?subject=help>
List-id: Xen Bugzilla <xen-bugs.lists.xensource.com>
List-post: <mailto:xen-bugs@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=unsubscribe>
Reply-to: bugs@xxxxxxxxxxxxxxxxxx
Sender: xen-bugs-bounces@xxxxxxxxxxxxxxxxxxx

           Summary: kernel/irq/manage.c:273 __enable_irq+0x6b/0xd4() every
                    time ENTER is hit on the PV console
           Product: Xen
           Version: unstable
          Platform: Other
        OS/Version: Linux
            Status: NEW
          Severity: normal
          Priority: P5
         Component: Linux-pv_ops dom0
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: konrad.wilk@xxxxxxxxxx

I am using an Virtual Iron console daemon. It works similarly to 'xm console'
except that it can send (and receive) the output/input via UDP. 

This might the fault of the console daemon doing something unorthodox, or it
might be exactly what the kernel says.

 2726.912429] Pid: 12599, comm: console Tainted: G        W 
2.6.31-xen0-01416-ge02d501 #1
[ 2726.912605] Call Trace:
[ 2726.912651]  [<ffffffff81109ba6>] ? __enable_irq+0x6b/0xd4
[ 2726.912651]  [<ffffffff81085e12>] warn_slowpath_common+0xc9/0x10c
[ 2726.912651]  [<ffffffff81085f2d>] warn_slowpath_fmt+0x8b/0xb2
[ 2726.912651]  [<ffffffff81010b1a>] ? xen_force_evtchn_callback+0x2e/0x52
[ 2726.912651]  [<ffffffff8106d34a>] ? should_resched+0x23/0x6d
[ 2726.912651]  [<ffffffff81109ba6>] __enable_irq+0x6b/0xd4
[ 2726.912651]  [<ffffffff8176429d>] ? _spin_lock_irqsave+0x3d/0x8d
[ 2726.912651]  [<ffffffff8110a13d>] enable_irq+0x68/0xa2
[ 2726.912651]  [<ffffffff813ee56c>] evtchn_write+0x10d/0x198
[ 2726.912651]  [<ffffffff8119645d>] ? rw_verify_area+0x140/0x183
[ 2726.912651]  [<ffffffff81196d8e>] vfs_write+0x107/0x19c
[ 2726.912651]  [<ffffffff81196f68>] sys_write+0x79/0xcf
[ 2726.912651]  [<ffffffff81019302>] system_call_fastpath+0x16/0x1b
[ 2726.912651] ---[ end trace 5a5d197966b56a5c ]---
[ 2726.918403] ------------[ cut here ]------------
[ 2726.918508] WARNING: at

Configure bugmail: 
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

Xen-bugs mailing list

<Prev in Thread] Current Thread [Next in Thread>