From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-pl1-x62a.google.com (mail-pl1-x62a.google.com [IPv6:2607:f8b0:4864:20::62a]) by sourceware.org (Postfix) with ESMTPS id 845FF3857816 for ; Tue, 1 Feb 2022 08:04:39 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org 845FF3857816 Received: by mail-pl1-x62a.google.com with SMTP id h14so14760852plf.1 for ; Tue, 01 Feb 2022 00:04:39 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=tb/3EbYGQcP3b/Lp9OSyGVgRfNwHmJP2HYWguoBZ0hk=; b=UjsiiSxfSgrNZv619JBsIvO27633uv9wh6g/1kPManj/SAIwNcBV7/dAjLzqBJ2Jny FybkSc4Xdo68id9/SA1FVokNjbUMiRRed+yoNtQ39xbgiJau8JzZIWz5yMHBRLLyJ8+d +gRGIxFcKGTUkIZZKRjesYm/MLkLzd4rtrOKXHfHD5xupVLWdscKF7S+VqP0lihtW7Z7 tmukN10vqNoZqUhLfwmvfszqogJdx/RKrNbuqdPAGxhwLBHLC3GLkQABFsqSCtphRkLH 24xyGh03Zmy3gDbG3LwGuvyVGG/t4S/Oadhe2C3Xck8J0GqbzZixbiwPwfYVm0yHGkiC gGqA== X-Gm-Message-State: AOAM532/Xwusy4js7Put6pZlmtT6J2fuDsnro0JaMysZST1b5KJCuCZu 1Yy1EF+6UhXqN8d+DLCUSBebLP+41YfikfYT4p28hWmqQmw= X-Google-Smtp-Source: ABdhPJz9CFEWUZ57B5tVVRYdsOwFCvMIwSChzP5mWlToGaLY+ChzQdKtKHljsGHRIqv8dgQr3c94ZcDZdBrVjbbyuJM= X-Received: by 2002:a17:902:ec81:: with SMTP id x1mr23927999plg.109.1643702678621; Tue, 01 Feb 2022 00:04:38 -0800 (PST) MIME-Version: 1.0 References: <4463051.R56niFO833@pinacolada> <45419734.fMDQidcC6G@pinacolada> In-Reply-To: <45419734.fMDQidcC6G@pinacolada> From: Noah Goldstein Date: Tue, 1 Feb 2022 02:04:27 -0600 Message-ID: Subject: Re: [2.33] FAIL: string/tst-memset-rtm To: "Andreas K. Huettel" Cc: "H.J. Lu" , libc-alpha , toolchain@gentoo.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-3.8 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, FREEMAIL_FROM, RCVD_IN_DNSWL_NONE, SPF_HELO_NONE, SPF_PASS, TXREP, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.4 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on server2.sourceware.org X-BeenThere: libc-alpha@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Libc-alpha mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 01 Feb 2022 08:04:41 -0000 On Tue, Feb 1, 2022 at 1:30 AM Andreas K. Huettel via Libc-alpha wrote: > > > > FAIL: string/tst-memset-rtm > > > > > > tst-memset-rtm.out says > > > error: ../sysdeps/x86/tst-string-rtm.h:63: TSX abort rate: 100.00% (3= 000 out of 3000) > > > error: 1 test failures > > > > > > Something to worry about? > > > > > > Linux pinacolada 5.15.16-gentoo #1 SMP PREEMPT Tue Jan 25 23:46:25 CE= T 2022 x86_64 Intel(R) Core(TM) i7-6700 CPU @ 3.40GHz GenuineIntel GNU/Linu= x > > > gcc (Gentoo 11.2.0 p1) 11.2.0 > > > GNU ld (Gentoo 2.37_p1 p0) 2.37 > > > > What processor are you using? Please show your /proc/cpuinfo > > > > huettel@pinacolada ~/Gentoo/gentoo/sys-libs/glibc $ cat /proc/cpuinfo > processor : 0 > vendor_id : GenuineIntel > cpu family : 6 > model : 94 > model name : Intel(R) Core(TM) i7-6700 CPU @ 3.40GHz > stepping : 3 > microcode : 0x33 > cpu MHz : 3400.000 > cache size : 8192 KB > physical id : 0 > siblings : 8 > core id : 0 > cpu cores : 4 > apicid : 0 > initial apicid : 0 > fpu : yes > fpu_exception : yes > cpuid level : 22 > wp : yes > flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mc= a cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx= pdpe1gb rdtscp lm constant_tsc art arch_perfmon pebs bts rep_good nopl xto= pology nonstop_tsc cpuid aperfmperf pni pclmulqdq dtes64 monitor ds_cpl vmx= smx est tm2 ssse3 sdbg fma cx16 xtpr pdcm pcid sse4_1 sse4_2 x2apic movbe = popcnt aes xsave avx f16c rdrand lahf_lm abm 3dnowprefetch cpuid_fault epb = invpcid_single pti tpr_shadow vnmi flexpriority ept vpid ept_ad fsgsbase ts= c_adjust bmi1 hle avx2 smep bmi2 erms invpcid rtm mpx rdseed adx smap clflu= shopt intel_pt xsaveopt xsavec xgetbv1 xsaves dtherm ida arat pln pts hwp h= wp_notify hwp_act_window hwp_epp > vmx flags : vnmi preemption_timer invvpid ept_x_only ept_ad ept_1gb= flexpriority tsc_offset vtpr mtf vapic ept vpid unrestricted_guest ple sha= dow_vmcs pml > bugs : cpu_meltdown spectre_v1 spectre_v2 spec_store_bypass l1= tf mds swapgs taa itlb_multihit srbds > bogomips : 6799.81 > clflush size : 64 > cache_alignment : 64 > address sizes : 39 bits physical, 48 bits virtual > power management: > > (...) > > huettel@pinacolada ~/Gentoo/gentoo/sys-libs/glibc $ LANG=3DC lscpu > Architecture: x86_64 > CPU op-mode(s): 32-bit, 64-bit > Address sizes: 39 bits physical, 48 bits virtual > Byte Order: Little Endian > CPU(s): 8 > On-line CPU(s) list: 0-7 > Vendor ID: GenuineIntel > Model name: Intel(R) Core(TM) i7-6700 CPU @ 3.40GHz > CPU family: 6 > Model: 94 > Thread(s) per core: 2 > Core(s) per socket: 4 > Socket(s): 1 > Stepping: 3 > CPU max MHz: 4000.0000 > CPU min MHz: 800.0000 > BogoMIPS: 6799.81 > Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr= pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe sys= call nx pdpe1gb rdtscp lm con > stant_tsc art arch_perfmon pebs bts rep_good nop= l xtopology nonstop_tsc cpuid aperfmperf pni pclmulqdq dtes64 monitor ds_cp= l vmx smx est tm2 ssse3 sdbg > fma cx16 xtpr pdcm pcid sse4_1 sse4_2 x2apic mov= be popcnt aes xsave avx f16c rdrand lahf_lm abm 3dnowprefetch cpuid_fault e= pb invpcid_single pti tpr_sha > dow vnmi flexpriority ept vpid ept_ad fsgsbase t= sc_adjust bmi1 hle avx2 smep bmi2 erms invpcid rtm mpx rdseed adx smap clfl= ushopt intel_pt xsaveopt xsav > ec xgetbv1 xsaves dtherm ida arat pln pts hwp hw= p_notify hwp_act_window hwp_epp > Virtualization features: > Virtualization: VT-x > Caches (sum of all): > L1d: 128 KiB (4 instances) > L1i: 128 KiB (4 instances) > L2: 1 MiB (4 instances) > L3: 8 MiB (1 instance) > NUMA: > NUMA node(s): 1 > NUMA node0 CPU(s): 0-7 > Vulnerabilities: > Itlb multihit: KVM: Mitigation: VMX disabled > L1tf: Mitigation; PTE Inversion; VMX conditional cache= flushes, SMT vulnerable > Mds: Vulnerable: Clear CPU buffers attempted, no micr= ocode; SMT vulnerable > Meltdown: Mitigation; PTI > Spec store bypass: Vulnerable > Spectre v1: Mitigation; usercopy/swapgs barriers and __user = pointer sanitization > Spectre v2: Mitigation; Full generic retpoline, STIBP disabl= ed, RSB filling > Srbds: Vulnerable: No microcode > Tsx async abort: Vulnerable: Clear CPU buffers attempted, no micr= ocode; SMT vulnerable > > > > > -- > Andreas K. H=C3=BCttel > dilfridge@gentoo.org > Gentoo Linux developer > (council, toolchain, base-system, perl, libreoffice) > > If its not a bug with CPU id https://sourceware.org/git/?p=3Dglibc.git;a=3Dblob;f=3Dsysdeps/x86_64/multi= arch/memset-vec-unaligned-erms.S;h=3D584747f1a1664005419671ed0e7caf390b77d9= 2c;hb=3Drefs/heads/release/2.33/master#l215 Looks suspect. `VZEROUPPER_SHORT_RETURN` is defined as just `vzeroupper; ret` and it doesn't appear the avx2 memset defined `VZEROUPPER_SHORT_RETURN` https://sourceware.org/git/?p=3Dglibc.git;a=3Dblob;f=3Dsysdeps/x86_64/multi= arch/memset-avx2-unaligned-erms-rtm.S;h=3D8ac3e479bba488becd0becb63011496fe= f9eff13;hb=3Drefs/heads/release/2.33/master https://sourceware.org/git/?p=3Dglibc.git;a=3Dblob;f=3Dsysdeps/x86_64/multi= arch/memset-avx2-unaligned-erms.S;h=3Dae0860f36a47d5941456e5138b11544ad9540= dbf;hb=3Drefs/heads/release/2.33/master