public inbox for glibc-bugs@sourceware.org help / color / mirror / Atom feed
From: "sam at gentoo dot org" <sourceware-bugzilla@sourceware.org> To: glibc-bugs@sourceware.org Subject: [Bug libc/31877] New: elf/tst-shstk-legacy-1g test failure on znver4 Date: Mon, 10 Jun 2024 19:42:33 +0000 [thread overview] Message-ID: <bug-31877-131@http.sourceware.org/bugzilla/> (raw) https://sourceware.org/bugzilla/show_bug.cgi?id=31877 Bug ID: 31877 Summary: elf/tst-shstk-legacy-1g test failure on znver4 Product: glibc Version: unspecified Status: NEW Severity: normal Priority: P2 Component: libc Assignee: unassigned at sourceware dot org Reporter: sam at gentoo dot org CC: drepper.fsp at gmail dot com, hjl.tools at gmail dot com Target Milestone: --- I can reproduce this but it was also reported downstream in Gentoo at https://bugs.gentoo.org/927973. ``` # cat elf/tst-shstk-legacy-1g.test-result FAIL: elf/tst-shstk-legacy-1g original exit status 1 ``` ``` # cat elf/tst-shstk-legacy-1g.out # blank ``` ``` # lscpu Architecture: x86_64 CPU op-mode(s): 32-bit, 64-bit Address sizes: 48 bits physical, 48 bits virtual Byte Order: Little Endian CPU(s): 16 On-line CPU(s) list: 0-15 Vendor ID: AuthenticAMD BIOS Vendor ID: Advanced Micro Devices, Inc. Model name: AMD Ryzen 9 PRO 7940HS w/ Radeon 780M Graphics BIOS Model name: AMD Ryzen 9 PRO 7940HS w/ Radeon 780M Graphics None CPU @ 4.0GHz BIOS CPU family: 107 CPU family: 25 Model: 116 Thread(s) per core: 2 Core(s) per socket: 8 Socket(s): 1 Stepping: 1 Frequency boost: enabled CPU(s) scaling MHz: 34% CPU max MHz: 5263.0000 CPU min MHz: 400.0000 BogoMIPS: 7985.11 Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext fxsr_opt pdpe1gb rdtscp lm constant_tsc r ep_good amd_lbr_v2 nopl xtopology nonstop_tsc cpuid extd_apicid aperfmperf rapl pni pclmulqdq monitor ssse3 fma cx16 sse4_1 sse4_2 x2apic movbe popcnt aes xsave avx f16c rdrand lahf_lm cmp_legacy svm extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch osvw ibs skinit wdt tce topoext perfctr_core perfctr_nb bpext per fctr_llc mwaitx cpb cat_l3 cdp_l3 hw_pstate ssbd mba perfmon_v2 ibrs ibpb stibp ibrs_enhanced vmmcall fsgsbase bmi1 avx2 smep bmi2 erms invpcid cqm rdt_a avx512 f avx512dq rdseed adx smap avx512ifma clflushopt clwb avx512cd sha_ni avx512bw avx512vl xsaveopt xsavec xgetbv1 xsaves cqm_llc cqm_occup_llc cqm_mbm_total cqm_m bm_local user_shstk avx512_bf16 clzero irperf xsaveerptr rdpru wbnoinvd cppc arat npt lbrv svm_lock nrip_save tsc_scale vmcb_clean flushbyasid decodeassists pau sefilter pfthreshold v_vmsave_vmload vgif x2avic v_spec_ctrl vnmi avx512vbmi umip pku ospke avx512_vbmi2 gfni vaes vpclmulqdq avx512_vnni avx512_bitalg avx512_v popcntdq rdpid overflow_recov succor smca flush_l1d amd_lbr_pmc_freeze Virtualization features: Virtualization: AMD-V Caches (sum of all): L1d: 256 KiB (8 instances) L1i: 256 KiB (8 instances) L2: 8 MiB (8 instances) L3: 16 MiB (1 instance) NUMA: NUMA node(s): 1 NUMA node0 CPU(s): 0-15 Vulnerabilities: Gather data sampling: Not affected Itlb multihit: Not affected L1tf: Not affected Mds: Not affected Meltdown: Not affected Mmio stale data: Not affected Reg file data sampling: Not affected Retbleed: Not affected Spec rstack overflow: Vulnerable: Safe RET, no microcode Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization Spectre v2: Mitigation; Enhanced / Automatic IBRS; IBPB conditional; STIBP always-on; RSB filling; PBRSB-eIBRS Not affected; BHI Not affected Srbds: Not affected Tsx async abort: Not affected ``` dmesg has these for the other tests as expected: ``` [ 4023.300729] ld-linux-x86-64[3977174] control protection ip:7feae26b8833 sp:7ffed9928168 ssp:7feae23fffd0 error:1(near ret) in tst-shstk-legacy-1b[7feae26b8000+2000] [ 4023.301270] tst-shstk-legac[3977179] control protection ip:7f3bcaea7443 sp:7ffd5a033148 ssp:7f3bcadfffd8 error:1(near ret) in tst-shstk-legacy-1b-static[7f3bcaea6000+9e000] [ 4023.304565] ld-linux-x86-64[3977194] control protection ip:7f821de9182b sp:7ffca75f7768 ssp:7f821dbfffe8 error:1(near ret) in tst-shstk-legacy-1e[7f821de91000+2000] [ 4023.304937] tst-shstk-legac[3977199] control protection ip:7fa4fb2e143b sp:7ffc7c405928 ssp:7fa4fb1ffff0 error:1(near ret) in tst-shstk-legacy-1e-static[7fa4fb2e0000+9e000] ``` -- You are receiving this mail because: You are on the CC list for the bug.
next reply other threads:[~2024-06-10 19:42 UTC|newest] Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top 2024-06-10 19:42 sam at gentoo dot org [this message] 2024-06-10 19:44 ` [Bug libc/31877] " sam at gentoo dot org 2024-06-10 20:49 ` hjl.tools at gmail dot com 2024-06-10 20:51 ` sam at gentoo dot org 2024-06-10 21:13 ` hjl.tools at gmail dot com 2024-06-18 13:12 ` simon.chopin at canonical dot com
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=bug-31877-131@http.sourceware.org/bugzilla/ \ --to=sourceware-bugzilla@sourceware.org \ --cc=glibc-bugs@sourceware.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).