From: Alexandru Elisei <alexandru.elisei@arm.com>
To: Andre Przywara <andre.przywara@arm.com>
Cc: Dongli Si <sidongli1997@gmail.com>,
Will Deacon <will.deacon@arm.com>,
kvm@vger.kernel.org
Subject: Re: [PATCH kvmtool] x86: Fixed Unable to execute init process since glibc version 2.33
Date: Fri, 11 Mar 2022 13:43:50 +0000 [thread overview]
Message-ID: <YitSFge8LuFqweU5@monolith.localdoman> (raw)
In-Reply-To: <20220311121042.010bbb30@donnerap.cambridge.arm.com>
Hi,
On Fri, Mar 11, 2022 at 12:10:42PM +0000, Andre Przywara wrote:
> On Tue, 8 Mar 2022 17:31:25 +0000
> Andre Przywara <andre.przywara@arm.com> wrote:
>
> Hi,
>
> I did some digging on this issue, see below:
>
> > On Sat, 26 Feb 2022 14:00:48 +0800
> > Dongli Si <sidongli1997@gmail.com> wrote:
> >
> > Hi,
> >
> > > From: Dongli Si <sidongli1997@gmail.com>
> > >
> > > glibc detected invalid CPU Vendor name will cause an error:
> > >
> > > [ 0.450127] Run /sbin/init as init process
> > > /lib64/libc.so.6: CPU ISA level is lower than required
> > > [ 0.451931] Kernel panic - not syncing: Attempted to kill init!
> > > exitcode=0x00007f00 [ 0.452117] CPU: 0 PID: 1 Comm: init Not
> > > tainted 5.17.0-rc1 #72
> > >
> > > Signed-off-by: Dongli Si <sidongli1997@gmail.com>
> > > ---
> > > x86/cpuid.c | 14 +++++++++-----
> > > 1 file changed, 9 insertions(+), 5 deletions(-)
> > >
> > > diff --git a/x86/cpuid.c b/x86/cpuid.c
> > > index c3b67d9..d58a027 100644
> > > --- a/x86/cpuid.c
> > > +++ b/x86/cpuid.c
> > > @@ -2,6 +2,7 @@
> > >
> > > #include "kvm/kvm.h"
> > > #include "kvm/util.h"
> > > +#include "kvm/cpufeature.h"
> > >
> > > #include <sys/ioctl.h>
> > > #include <stdlib.h>
> > > @@ -10,7 +11,7 @@
> > >
> > > static void filter_cpuid(struct kvm_cpuid2 *kvm_cpuid)
> > > {
> > > - unsigned int signature[3];
> > > + struct cpuid_regs regs;
> > > unsigned int i;
> > >
> > > /*
> > > @@ -22,10 +23,13 @@ static void filter_cpuid(struct kvm_cpuid2
> > > *kvm_cpuid) switch (entry->function) {
> > > case 0:
> > > /* Vendor name */
> > > - memcpy(signature, "LKVMLKVMLKVM", 12);
> > > - entry->ebx = signature[0];
> > > - entry->ecx = signature[1];
> > > - entry->edx = signature[2];
> > > + regs = (struct cpuid_regs) {
> > > + .eax = 0x00,
> > > + };
> > > + host_cpuid(®s);
> > > + entry->ebx = regs.ebx;
> > > + entry->ecx = regs.ecx;
> > > + entry->edx = regs.edx;
> >
> > But that's redundant, isn't it? We already get the host vendor ID in the
> > three registers in entry, and the current code is just there to overwrite
> > this. So just removing the whole "case 0:" part should do the trick.
> >
> > Also please be aware that there was a reason for this fixup, as explained
> > in commit bc0b99a2a740 ("kvm tools: Filter out CPU vendor string").
> >
> So I had a closer look, this is some background:
>
> 1) x86 is in the process of stepping up the minimum requirements for the
> ISA level, so older x86-64 CPUs might not be supported anymore by some
> distros. As a part of this, glibc allows to set a minimum required CPU,
> and has a runtime check to verify compatibility:
> https://sourceware.org/git/?p=glibc.git;a=blob;f=sysdeps/x86/cpu-features.c;h=514226b37889;hb=HEAD#l398
> This routine first checks the vendor string, and only does very basic
> capability checks if an unknown vendor (not AMD/Centaur/Intel) is detected.
> The AMD manual (APM Vol. 3, 24594 Rev 3.3), CPUID instruction, states:
> ===============
> For AMD processors, the string is AuthenticAMD. This string informs
> software that it should follow the AMD CPUID definition for subsequent
> CPUID function calls. If the function returns another vendor’s string,
> software must use that vendor’s CPUID definition when interpreting
> the results of subsequent CPUID function calls.
> ===============
>
> So kvmtool using "LKVMLKVMLKVM" as the vendor string will probably end up
> as detecting only the minimum CPU ISA level, which means glibc's built to
> a higher standard will fail, as reported.
> On top of that glibc problem the kernel also does various CPU checks, and
> will deny features if an unknown vendor is detected. There are already
> warnings in the kernel boot log today because of this.
>
> 2) The above mentioned kvmtool commit bc0b99a2a740 switched away from
> keeping the host's vendor ID, because certain errata workarounds triggered
> when the guest saw the host CPU vendor/family/model/stepping values. This
> led to random MSR accesses, which KVM could not deal well with at the
> time. KVM has improved since, and has code to deal with #GP injections due
> to not-emulated MSR accesses. The particular first issue mentioned in the
> above commit for instance is addressed by Linux commit d47cc0db8fd6:
> https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d47cc0db8fd6
>
> In general I remember that using random vendor strings was dismissed as a
> good idea years ago, and other VMMs and hypervisors tend to inject either
> the host's vendor string or at least a well-known value. So any Linux
> guest issues due to certain vendor strings would apply to other VMMs or
> HVs as well, and are probably fixed already.
>
>
> So the problem with glibc is out there, and is there to stay. The
> algorithm of checking for the vendor string first is correct by the books,
> although arguably technically not strictly needed. But we cannot fix this,
> so have to deal with it.
>
> > Alex, did you boot this on an AMD box, to spot if this is still an issue?
>
> I gave it a try on an old AMD box similar to the one in mentioned in the
> commit message, and it worked fine with the native vendor string.
>
> So I would suggest to just revert kvmtool commit bc0b99a2a740. I will send
> a patch to that effect, unless someone objects now.
Thank you for the detailed explanation!
I too think that reverting the commit that added the custom vendor string
is the best way to fix the glibc errors in a guest.
Thanks,
Alex
prev parent reply other threads:[~2022-03-11 13:43 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-02-26 6:00 [PATCH kvmtool] x86: Fixed Unable to execute init process since glibc version 2.33 Dongli Si
2022-03-07 10:43 ` Alexandru Elisei
2022-03-08 12:12 ` Alexandru Elisei
2022-03-08 17:31 ` Andre Przywara
2022-03-10 12:17 ` Alexandru Elisei
2022-03-11 12:10 ` Andre Przywara
2022-03-11 13:43 ` Alexandru Elisei [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=YitSFge8LuFqweU5@monolith.localdoman \
--to=alexandru.elisei@arm.com \
--cc=andre.przywara@arm.com \
--cc=kvm@vger.kernel.org \
--cc=sidongli1997@gmail.com \
--cc=will.deacon@arm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox