[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [help] Xen 4.14.5 on Devuan 4.0 Chimaera, regression from Xen 4.0.1


  • To: tachyon_gun@xxxxxx, xen-devel@xxxxxxxxxxxxxxxxxxxx
  • From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • Date: Thu, 9 Mar 2023 20:37:46 +0000
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=X762uWGr8AqErXsFhTRawFm+W4LsH4MPhr5iRM2QoSM=; b=dBZBBlF0WQ5Js+VLqz3R97sou3DzS6PSknSdykX1QfI3GHOfyZZs/GFiAMwe1UBSk1ffIlwLR6xLGH5x+u8zenwDOEnjhGwWWjq58/JVqYPVcs8hWHpxyuMYGjd1NSsmJhW5pavWpCxuDG/O2OB77rNK4G1IwASGwatZjgasub9EPA5VwAT1PNz7/E3FeUpyn6Ef6NlvSsSNVeJnnZKdbhwY2xDcnAENydNRqgjYnJxGzAC9dNr0xgj7NEcB/8KOFZS6eEO4XVJ1JV+1O1tNtJwtgzANqXN6k2N0+EMeA+h3PsiRP2pMBRR56scbyUl5f4Rnzwr+Do5KepXg2d1h/Q==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AhGBKCXTugaef2ONr59Z/PYV4rG0AJ7Nvjr9ovEyJLcGElqYeya1qM8dG71CUSV/xSRZHhqbi8bD4JHnzBDw4sfsWoKRmzncmQF6ZFJsWK07a/bwKLhnGsDmHcnBG9LLW6pbUkKZIAelBkwarNAvtrKZxDssiBeoUOJ1RIWjm0JMwtyto2SO1dPvVdEb2Ba1eahXOFIGRz+Xx/SZuZMzYOnO0ut6paqeNcqFs6spMqgwdFWxc+Y6dt2WmNtpz1/tP8XVaePnTQX9gpPyUOpOuGw21hyNwRuRH242XcEc5D+z50m1u7qSN4nbdXqjNJ9xZg9r0FZGTKissA3VgF7bGg==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com;
  • Cc: Jan Beulich <jbeulich@xxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Delivery-date: Thu, 09 Mar 2023 20:38:15 +0000
  • Ironport-data: A9a23:4YE6HK9kbKRM10Lh2aSIDrUDq3+TJUtcMsCJ2f8bNWPcYEJGY0x3m GYeWWmBa/aMYWbzfNEia4S39kMCucfVytQwSVA++Xs8E34SpcT7XtnIdU2Y0wF+jCHgZBk+s 5hBMImowOQcFCK0SsKFa+C5xZVE/fjUAOG6UKicYXoZqTZMEE8JkQhkl/MynrlmiN24BxLlk d7pqojUNUTNNwRcawr40Ire7kI/1BjOkGlA5AdmPqga5AS2e0Q9V/rzG4ngdxMUfaEMdgKKb 76r5K20+Grf4yAsBruN+losWhRXKlJ6FVHmZkt+A8BOsDAbzsAB+v9T2M4nQVVWk120c+VZk 72hg3ASpTABZcUgkMxFO/VR/roX0aduoNcrKlDn2SCfItGvn9IBDJyCAWlvVbD09NqbDklky NUcGBEcUiupgv+dkI6bdNFKv/gaeZyD0IM34hmMzBn/JNN/G9XmfP+P4tVVmjAtmspJAPDSI dIDbiZiZwjBZBsJPUoLDJU5n6GjgXyXnz9w8QrJ4/ZopTaNilAouFTuGIO9ltiibMNZhEuH4 EnB+Hz0GEoyP92D0zuVtHmrg4cjmAuqCdxKTuDjp5aGhnWdzF08OkU3XGeWmsurhA2GBuJ6K 3Abr39GQa8asRbDosPGdwGxq36VuRgrVMdWO/I34keBx8L88wufQ2QJUDNFQNgnr9MtAywn0 EeTmNHkDiApt6eaIVqf/LqJqTK5OQAOMHQPIyQDSGM4D8LLpYgyilfKUYxlGavs1NntQ2msm naNsTQ0gKgVgYgTzaKn8FvbgjWq4J/UUgoy4QaRVWWghu9kWLOYi0WTwQCzxZ59wEyxFzFtY FBsdxCi0d0z
  • Ironport-hdrordr: A9a23:wmrrYq6l4zs0yX8DfwPXwOfXdLJyesId70hD6qkRc20sTiX8ra qTdZsgpHrJYVoqKRMdcLO7WJVoI0mskqKdiLN5VdzCYODIghrKEGgI1/qF/9SPIVyGygef78 tdmmpFZeHYPBxVi8D15QX9KdomzdWdtIi1mOa29QYIceinUc5dBs5CZDqmLg==
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 09/03/2023 7:34 pm, tachyon_gun@xxxxxx wrote:
> Subject:
> [help] Xen 4.14.5 on Devuan 4.0 Chimaera
> From:
> tachyon_gun@xxxxxx
> Date:
> 09/03/2023, 7:34 pm
> 
> To:
> xen-devel@xxxxxxxxxxxxxxxxxxxx
> 
> 
> Hello.
> 
> Following the advice of Andrew Cooper (thanks for helping out) over on
> OFTC.net in #xen, I'll post this here.
> If this is the wrong place, please move it to the right section of your
> mailing lists.
>  
> I got some problems running Xen 4.14.5 on Devuan 4.0.
>  
> The AMD-Vi and I/O virtualisation are not being enabled when booting up
> the host system with Xen.
>  
> Hardware used:
> Mainboard: Gigabyte GA-890FXA-UD5, BIOS version F6 (2010.11.24, the
> latest version)
> CPU: AMD Phenom II X4 910e
> Memory: 16GB
> Storage: 2TB Crucial MX500
>  
> A short snippet of what I see when invoking "xl dmesg":
>  
> (XEN) No southbridge IO-APIC found in IVRS table
> (XEN) AMD-Vi: Error initialization
> (XEN) I/O virtualisation disabled 
>  
> What I would like to see (taken from Xen 4.0.1 running on Debian
> Squeeze, in use since 2011):
>  
> (XEN) IOAPIC[0]: apic_id 8, version 33, address 0xfec00000, GSI 0-23
> (XEN) Enabling APIC mode:  Flat.  Using 1 I/O APICs
> (XEN) Using scheduler: SMP Credit Scheduler (credit)
> (XEN) Detected 2611.936 MHz processor.
> (XEN) Initing memory sharing.
> (XEN) HVM: ASIDs enabled.
> (XEN) HVM: SVM enabled
> (XEN) HVM: Hardware Assisted Paging detected.
> (XEN) AMD-Vi: IOMMU 0 Enabled.
> (XEN) I/O virtualisation enabled
>  
> My question would be if this is "normal" behaviour due to older hardware
> being used with newer versions of Xen (compared to the old 4.0.1) or if
> this is a bug.
> If the latter, has this been addressed already in newer version (4.14+)?
>  
> I'll attach some log files (hypervisor.log, dom0.log, xl_info.log,
> lspci_vvv.log, acpi.dmp, ivrs.dat, ivrs.dsl).
>  
> Thank you for your time.

Let me braindump the investigation so far before I forget it.

Xen requires that there is an IVRS special-device record describing an
IO-APIC 00:14.0.  This check failing is the source of the "No
southbridge" message, and the cause of the IOMMU(s) being turned off.

The MADT and IVRS tables agree that there is one IO-APIC in the system,
but that's the northbridge IO-APIC, not the southbridge.

The block diagram for the southbridge does have a PIC/IO-APIC as part of
the PCI bridge, so honestly I was expecting the MADT to describe 2
IO-APICs.  But OTOH, I could see this legitimately not existing in
configurations where the PCI bridge isn't in use.

`xl dmesg` does have a few unknown irqs, so there might be something
down in the southbridge really generating interrupts.  Or there might be
a IRQ misconfiguration elsewhere, and this is just a red herring.

However, a consequence of the northbridge and southbridge being separate
chips means that all southbridge IO is fully encapsulated by the IOMMU
in the northbridge.

So irrespective of whether there is ah IO-APIC operating properly in the
southbridge, and whether or not it's properly described, I think Xen's
insistence that there must be an IVRS special-device entry for it is bogus.


Furthermore, Xen's decisions are monumentally stupid.  It takes a
specifically safe (IOMMU-wise) system, and because it can't figure out a
partial aspect of interrupt handling the southbridge, decided that the
system can't be safe (a false conclusion) and turns the IOMMU off fully
to compensate, which makes the system concretely less safe.

~Andrew



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.