From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by sourceware.org (Postfix) with ESMTPS id 1AD9C3858296 for ; Tue, 21 Feb 2023 15:11:28 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 1AD9C3858296 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=redhat.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=redhat.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1676992287; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=11H24ltaLNM/7SASfY0g4aV0FTUX+24DRdUFFHZHp7k=; b=hl9seS8XnVttgi3EAVpCg1BhDfDIv97CTbo6ae7AB9UcVtaEq1S601xhlYqNwW6TtNItnd WGam2X8kXf8W2noPJPBXSg+906FTeWzMHH7/pngf6TxJpqQiCOhLGZucVuYvMEx9tz1A7d IRHicAuMzt9dvZ63TBBcVlHM9oS/tSE= Received: from mail-io1-f71.google.com (mail-io1-f71.google.com [209.85.166.71]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_128_GCM_SHA256) id us-mta-15-zefBF_aBMXK_-HRq3SryoA-1; Tue, 21 Feb 2023 10:11:23 -0500 X-MC-Unique: zefBF_aBMXK_-HRq3SryoA-1 Received: by mail-io1-f71.google.com with SMTP id i3-20020a0566022c8300b0073a6a9f8f45so2632535iow.11 for ; Tue, 21 Feb 2023 07:11:20 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:in-reply-to:organization:from:references :cc:to:content-language:subject:user-agent:mime-version:date :message-id:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=11H24ltaLNM/7SASfY0g4aV0FTUX+24DRdUFFHZHp7k=; b=WTWJ4OY+r0rWUUec/VzHYRC8txsgw76SAOAMigs6NRh/gBzxiav4MwHerF/5sX+Li5 CokOrpwDTLqvu2vALBW5xQWnYEK0NRVr37mCTVvoo0/SDy15GgPHGpm0QtAQL7Biwd5V A/1TCF+aqYnWqVU9OmIh3TzeA/PO5Xu74d2zGN21sKewsiJ/Z+cVB2E0/8iVp+tO4O/U OPFX6cagPSQLhFb6Oc65Q5Xqa3j4m0b/ZTCMEsx0QbYK2S7prjWDzJT++aok6JHh9HLi gro02X+/IlY/dvTNqgeUIB6Y5G+FGMTA8DsPw74gIm4M2kFvApbfQ5mk7KgSGkKZwljh IpQg== X-Gm-Message-State: AO0yUKX4Fm/6wcG1Q3rlVkrPWyOyaO+6ZvvftyJAiL5XSHS6LmV4eAml 7ETIPJgSI26EFjyvjfDV5HcpxVnHnQHHNXOYOmNvQ3ApanaifzYXrH3TuiPuks4YEu1bVjaVMkR /P1cldvjKhQ64mHm5pxlZF6XZDw== X-Received: by 2002:a5d:9301:0:b0:72a:efc0:3cf1 with SMTP id l1-20020a5d9301000000b0072aefc03cf1mr9812697ion.21.1676992279090; Tue, 21 Feb 2023 07:11:19 -0800 (PST) X-Google-Smtp-Source: AK7set8GYHZbyAo/TO0UzqKSRMDVBrju0lZry12n1QUfDGYRQTjFzmLNZDB+2J1+uYt9mraSUPuEaQ== X-Received: by 2002:a5d:9301:0:b0:72a:efc0:3cf1 with SMTP id l1-20020a5d9301000000b0072aefc03cf1mr9812678ion.21.1676992278646; Tue, 21 Feb 2023 07:11:18 -0800 (PST) Received: from [192.168.0.241] ([198.48.244.52]) by smtp.gmail.com with ESMTPSA id a5-20020a5d9585000000b007046e9e138esm474385ioo.22.2023.02.21.07.11.17 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 21 Feb 2023 07:11:17 -0800 (PST) Message-ID: Date: Tue, 21 Feb 2023 10:11:16 -0500 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.6.0 Subject: Re: [PATCH v2] x86-64: Add glibc.cpu.prefer_map_32bit_exec [BZ #28656] To: "H.J. Lu" , libc-alpha@sourceware.org Cc: Florian Weimer References: <20230210222142.17943-1-hjl.tools@gmail.com> From: Carlos O'Donell Organization: Red Hat In-Reply-To: <20230210222142.17943-1-hjl.tools@gmail.com> X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Language: en-US Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-12.9 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,GIT_PATCH_0,KAM_SHORT,NICE_REPLY_A,RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE,TXREP autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org List-Id: On 2/10/23 17:21, H.J. Lu wrote: > Crossing 2GB boundaries with indirect calls and jumps can use more > branch prediction resources on Intel Golden Cove CPU (see the > "Misprediction for Branches >2GB" section in Intel 64 and IA-32 > Architectures Optimization Reference Manual.) There is visible > performance improvement on workloads with many PLT calls when executable > and shared libraries are mmapped below 2GB. Add the Prefer_MAP_32BIT_EXEC > bit so that mmap will try to map executable or denywrite pages in shared > libraries with MAP_32BIT first. The environment variable LD_PREFER_MAP_32BIT_EXEC is alraedy documented in the Linux Man Pages project. Looking forward to a v3. Florian is correct in that the kernel should be ultimately responsible for this change, but given that we have precedent for this in glibc, and it helps improve the situation, then I think we should commit this as a way in which customers can improve their deployments on affected hardware. There is a backport hazard here, in that the addition of a tunable into a released version of glibc changes the size of the tunable table. I would like to avoid backporting tunables unless and until we solve the backport hazard in some way. The hazard is that during an in-place upgrade this may cause processes crashes. See: https://sourceware.org/bugzilla/show_bug.cgi?id=30027 https://gitlab.com/redhat/centos-stream/rpms/glibc/-/commit/3ccfcc3019f231f8081daf62bfabfe277b4b591a > NB: Prefer_MAP_32BIT_EXEC reduces bits available for address space > layout randomization (ASLR), which is always disabled for SUID programs > and can only be enabled by the tunable, glibc.cpu.prefer_map_32bit_exec, > or the environment variable, LD_PREFER_MAP_32BIT_EXEC. This works only > between shared libraries or between shared libraries and executables with > addresses below 2GB. PIEs are usually mapped above 4GB by the kernel. > --- > manual/tunables.texi | 33 ++++++++++---- > sysdeps/unix/sysv/linux/x86_64/64/Makefile | 25 +++++++++++ > .../sysv/linux/x86_64/64/dl-tunables.list | 29 +++++++++++++ > .../unix/sysv/linux/x86_64/64/mmap_internal.h | 43 +++++++++++++++++++ > .../sysv/linux/x86_64/64/tst-map-32bit-1a.c | 34 +++++++++++++++ > .../sysv/linux/x86_64/64/tst-map-32bit-1b.c | 1 + > .../sysv/linux/x86_64/64/tst-map-32bit-mod.c | 33 ++++++++++++++ > sysdeps/x86/cpu-features.c | 15 +++++++ > ...cpu-features-preferred_feature_index_1.def | 1 + > 9 files changed, 205 insertions(+), 9 deletions(-) > create mode 100644 sysdeps/unix/sysv/linux/x86_64/64/dl-tunables.list > create mode 100644 sysdeps/unix/sysv/linux/x86_64/64/mmap_internal.h > create mode 100644 sysdeps/unix/sysv/linux/x86_64/64/tst-map-32bit-1a.c > create mode 100644 sysdeps/unix/sysv/linux/x86_64/64/tst-map-32bit-1b.c > create mode 100644 sysdeps/unix/sysv/linux/x86_64/64/tst-map-32bit-mod.c > > diff --git a/manual/tunables.texi b/manual/tunables.texi > index c2630b83ab..f63eb2f8a2 100644 > --- a/manual/tunables.texi > +++ b/manual/tunables.texi > @@ -35,27 +35,32 @@ tunables with minimum and maximum values: > @example > $ /lib64/ld-linux-x86-64.so.2 --list-tunables > glibc.rtld.nns: 0x4 (min: 0x1, max: 0x10) > -glibc.elision.skip_lock_after_retries: 3 (min: -2147483648, max: 2147483647) > +glibc.elision.skip_lock_after_retries: 3 (min: 0, max: 2147483647) OK. > glibc.malloc.trim_threshold: 0x0 (min: 0x0, max: 0xffffffffffffffff) > glibc.malloc.perturb: 0 (min: 0, max: 255) > glibc.cpu.x86_shared_cache_size: 0x100000 (min: 0x0, max: 0xffffffffffffffff) > +glibc.pthread.rseq: 1 (min: 0, max: 1) > +glibc.cpu.prefer_map_32bit_exec: 0 (min: 0, max: 1) OK. > glibc.mem.tagging: 0 (min: 0, max: 255) > -glibc.elision.tries: 3 (min: -2147483648, max: 2147483647) > +glibc.elision.tries: 3 (min: 0, max: 2147483647) OK. > glibc.elision.enable: 0 (min: 0, max: 1) > -glibc.cpu.x86_rep_movsb_threshold: 0x1000 (min: 0x100, max: 0xffffffffffffffff) > +glibc.malloc.hugetlb: 0x0 (min: 0x0, max: 0xffffffffffffffff) OK., > +glibc.cpu.x86_rep_movsb_threshold: 0x2000 (min: 0x100, max: 0xffffffffffffffff) > glibc.malloc.mxfast: 0x0 (min: 0x0, max: 0xffffffffffffffff) > -glibc.elision.skip_lock_busy: 3 (min: -2147483648, max: 2147483647) > -glibc.malloc.top_pad: 0x0 (min: 0x0, max: 0xffffffffffffffff) > +glibc.rtld.dynamic_sort: 2 (min: 1, max: 2) > +glibc.elision.skip_lock_busy: 3 (min: 0, max: 2147483647) > +glibc.malloc.top_pad: 0x20000 (min: 0x0, max: 0xffffffffffffffff) OK. > glibc.cpu.x86_rep_stosb_threshold: 0x800 (min: 0x1, max: 0xffffffffffffffff) > -glibc.cpu.x86_non_temporal_threshold: 0xc0000 (min: 0x4040, max: 0x0fffffffffffffff) > +glibc.cpu.x86_non_temporal_threshold: 0xc0000 (min: 0x4040, max: 0xfffffffffffffff) OK. > glibc.cpu.x86_shstk: > +glibc.pthread.stack_cache_size: 0x2800000 (min: 0x0, max: 0xffffffffffffffff) OK. > glibc.cpu.hwcap_mask: 0x6 (min: 0x0, max: 0xffffffffffffffff) > -glibc.malloc.mmap_max: 0 (min: -2147483648, max: 2147483647) > -glibc.elision.skip_trylock_internal_abort: 3 (min: -2147483648, max: 2147483647) > +glibc.malloc.mmap_max: 0 (min: 0, max: 2147483647) > +glibc.elision.skip_trylock_internal_abort: 3 (min: 0, max: 2147483647) OK. > glibc.malloc.tcache_unsorted_limit: 0x0 (min: 0x0, max: 0xffffffffffffffff) > glibc.cpu.x86_ibt: > glibc.cpu.hwcaps: > -glibc.elision.skip_lock_internal_abort: 3 (min: -2147483648, max: 2147483647) > +glibc.elision.skip_lock_internal_abort: 3 (min: 0, max: 2147483647) OK. > glibc.malloc.arena_max: 0x0 (min: 0x1, max: 0xffffffffffffffff) > glibc.malloc.mmap_threshold: 0x0 (min: 0x0, max: 0xffffffffffffffff) > glibc.cpu.x86_data_cache_size: 0x8000 (min: 0x0, max: 0xffffffffffffffff) > @@ -580,6 +585,16 @@ instead. > This tunable is specific to i386 and x86-64. > @end deftp > > +@deftp Tunable glibc.cpu.prefer_map_32bit_exec > +When this tunable is set to \code{1}, shared libraries of non-setuid > +programs will be mmapped below 2GB with MAP_32BIT. Avoid using colloquial phrases like "mmapped" which require syscall knowledge: s/mmapped/loaded/g > + > +Note that the @env{LD_PREFER_MAP_32BIT_EXEC} environment is an alias of > +this tunable. OK. > + > +This tunable is specific to 64-bit x86-64. OK. > +@end deftp > + > @node Memory Related Tunables > @section Memory Related Tunables > @cindex memory related tunables > diff --git a/sysdeps/unix/sysv/linux/x86_64/64/Makefile b/sysdeps/unix/sysv/linux/x86_64/64/Makefile > index a7b6dc5a53..8ff4f27786 100644 > --- a/sysdeps/unix/sysv/linux/x86_64/64/Makefile > +++ b/sysdeps/unix/sysv/linux/x86_64/64/Makefile > @@ -1,2 +1,27 @@ > # The default ABI is 64. > default-abi := 64 > + > +ifeq ($(subdir),elf) > +ifneq ($(have-tunables),no) > + > +tests-map-32bit = \ > + tst-map-32bit-1a \ > + tst-map-32bit-1b \ > +# tests-map-32bit > +tst-map-32bit-1a-no-pie = yes > +tst-map-32bit-1b-no-pie = yes > +tests += $(tests-map-32bit) > + > +modules-map-32bit = \ > + tst-map-32bit-mod \ > +# modules-map-32bit > +modules-names += $(modules-map-32bit) > + > +$(objpfx)tst-map-32bit-mod.so: $(libsupport) > +tst-map-32bit-1a-ENV = LD_PREFER_MAP_32BIT_EXEC=1 > +$(objpfx)tst-map-32bit-1a: $(objpfx)tst-map-32bit-mod.so > +tst-map-32bit-1b-ENV = GLIBC_TUNABLES=glibc.cpu.prefer_map_32bit_exec=1 > +$(objpfx)tst-map-32bit-1b: $(objpfx)tst-map-32bit-mod.so > + > +endif > +endif OK. > diff --git a/sysdeps/unix/sysv/linux/x86_64/64/dl-tunables.list b/sysdeps/unix/sysv/linux/x86_64/64/dl-tunables.list > new file mode 100644 > index 0000000000..0aab52e662 > --- /dev/null > +++ b/sysdeps/unix/sysv/linux/x86_64/64/dl-tunables.list > @@ -0,0 +1,29 @@ > +# x86-64 specific tunables. > +# Copyright (C) 2023 Free Software Foundation, Inc. > +# This file is part of the GNU C Library. > + > +# The GNU C Library is free software; you can redistribute it and/or > +# modify it under the terms of the GNU Lesser General Public > +# License as published by the Free Software Foundation; either > +# version 2.1 of the License, or (at your option) any later version. > + > +# The GNU C Library is distributed in the hope that it will be useful, > +# but WITHOUT ANY WARRANTY; without even the implied warranty of > +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU > +# Lesser General Public License for more details. > + > +# You should have received a copy of the GNU Lesser General Public > +# License along with the GNU C Library; if not, see > +# . > + > +glibc { > + cpu { > + prefer_map_32bit_exec { > + type: INT_32 > + minval: 0 > + maxval: 1 > + env_alias: LD_PREFER_MAP_32BIT_EXEC > + security_level: SXID_IGNORE OK. Value propagates from parent to all children but ignored for setuid. - Makes sense because you want it to apply to everything. > + } > + } > +} OK. > diff --git a/sysdeps/unix/sysv/linux/x86_64/64/mmap_internal.h b/sysdeps/unix/sysv/linux/x86_64/64/mmap_internal.h > new file mode 100644 > index 0000000000..33dec3f805 > --- /dev/null > +++ b/sysdeps/unix/sysv/linux/x86_64/64/mmap_internal.h > @@ -0,0 +1,43 @@ > +/* Linux mmap system call. x86-64 version. > + Copyright (C) 2015-2023 Free Software Foundation, Inc. > + > + This file is part of the GNU C Library. > + > + The GNU C Library is free software; you can redistribute it and/or > + modify it under the terms of the GNU Lesser General Public License as > + published by the Free Software Foundation; either version 2.1 of the > + License, or (at your option) any later version. > + > + The GNU C Library is distributed in the hope that it will be useful, > + but WITHOUT ANY WARRANTY; without even the implied warranty of > + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU > + Lesser General Public License for more details. > + > + You should have received a copy of the GNU Lesser General Public > + License along with the GNU C Library; if not, see > + . */ > + > +#ifndef MMAP_X86_64_INTERNAL_H > +#define MMAP_X86_64_INTERNAL_H > + > +#include > + > +/* If the Prefer_MAP_32BIT_EXEC bit is set, try to map executable or > + denywrite pages with MAP_32BIT first. */ > +#define MMAP_PREPARE(addr, len, prot, flags, fd, offset) \ > + if ((addr) == NULL \ > + && (((prot) & PROT_EXEC) != 0 \ > + || ((flags) & MAP_DENYWRITE) != 0) \ > + && HAS_ARCH_FEATURE (Prefer_MAP_32BIT_EXEC)) \ > + { \ > + void *ret = (void*) INLINE_SYSCALL_CALL (mmap, (addr), (len), \ > + (prot), \ > + (flags) | MAP_32BIT, \ > + (fd), (offset)); \ > + if (ret != MAP_FAILED) \ > + return ret; \ > + } > + > +#include_next > + > +#endif OK. > diff --git a/sysdeps/unix/sysv/linux/x86_64/64/tst-map-32bit-1a.c b/sysdeps/unix/sysv/linux/x86_64/64/tst-map-32bit-1a.c > new file mode 100644 > index 0000000000..abc396589e > --- /dev/null > +++ b/sysdeps/unix/sysv/linux/x86_64/64/tst-map-32bit-1a.c > @@ -0,0 +1,34 @@ > +/* Check that LD_PREFER_MAP_32BIT_EXEC works in PDE and shared library. s/PDE/PIE/g ? > + Copyright (C) 2023 Free Software Foundation, Inc. > + This file is part of the GNU C Library. > + > + The GNU C Library is free software; you can redistribute it and/or > + modify it under the terms of the GNU Lesser General Public > + License as published by the Free Software Foundation; either > + version 2.1 of the License, or (at your option) any later version. > + > + The GNU C Library is distributed in the hope that it will be useful, > + but WITHOUT ANY WARRANTY; without even the implied warranty of > + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU > + Lesser General Public License for more details. > + > + You should have received a copy of the GNU Lesser General Public > + License along with the GNU C Library; if not, see > + . */ > + > +#include > +#include > +#include > + > +extern void dso_check_map_32bit (void); > + > +static int > +do_test (void) > +{ > + printf ("do_test: %p\n", do_test); > + TEST_VERIFY ((uintptr_t) do_test < 0xffffffffUL); > + dso_check_map_32bit (); > + return 0; > +} > + > +#include > diff --git a/sysdeps/unix/sysv/linux/x86_64/64/tst-map-32bit-1b.c b/sysdeps/unix/sysv/linux/x86_64/64/tst-map-32bit-1b.c > new file mode 100644 > index 0000000000..34ab01c773 > --- /dev/null > +++ b/sysdeps/unix/sysv/linux/x86_64/64/tst-map-32bit-1b.c > @@ -0,0 +1 @@ > +#include "tst-map-32bit-1a.c" > diff --git a/sysdeps/unix/sysv/linux/x86_64/64/tst-map-32bit-mod.c b/sysdeps/unix/sysv/linux/x86_64/64/tst-map-32bit-mod.c > new file mode 100644 > index 0000000000..78d4b6133c > --- /dev/null > +++ b/sysdeps/unix/sysv/linux/x86_64/64/tst-map-32bit-mod.c > @@ -0,0 +1,33 @@ > +/* Check that LD_PREFER_MAP_32BIT_EXEC works in shared library. OK. > + Copyright (C) 2023 Free Software Foundation, Inc. > + This file is part of the GNU C Library. > + > + The GNU C Library is free software; you can redistribute it and/or > + modify it under the terms of the GNU Lesser General Public > + License as published by the Free Software Foundation; either > + version 2.1 of the License, or (at your option) any later version. > + > + The GNU C Library is distributed in the hope that it will be useful, > + but WITHOUT ANY WARRANTY; without even the implied warranty of > + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU > + Lesser General Public License for more details. > + > + You should have received a copy of the GNU Lesser General Public > + License along with the GNU C Library; if not, see > + . */ > + > +#include > +#include > +#include > + > +static void > +dso_do_test (void) > +{ > +} > + > +void > +dso_check_map_32bit (void) > +{ > + printf ("dso_do_test: %p\n", dso_do_test); > + TEST_VERIFY ((uintptr_t) dso_do_test < 0xffffffffUL); > +} > diff --git a/sysdeps/x86/cpu-features.c b/sysdeps/x86/cpu-features.c > index a2197ed211..822688e21f 100644 > --- a/sysdeps/x86/cpu-features.c > +++ b/sysdeps/x86/cpu-features.c > @@ -27,6 +27,16 @@ > extern void TUNABLE_CALLBACK (set_hwcaps) (tunable_val_t *) > attribute_hidden; > > +# ifdef __LP64__ > +static void > +TUNABLE_CALLBACK (set_prefer_map_32bit_exec) (tunable_val_t *valp) > +{ > + if (valp->numval) > + GLRO(dl_x86_cpu_features).preferred[index_arch_Prefer_MAP_32BIT_EXEC] > + |= bit_arch_Prefer_MAP_32BIT_EXEC; OK. Set to non-zero value. > +} > +# endif > + > # if CET_ENABLED > extern void TUNABLE_CALLBACK (set_x86_ibt) (tunable_val_t *) > attribute_hidden; > @@ -705,6 +715,11 @@ no_cpuid: > #if HAVE_TUNABLES > TUNABLE_GET (hwcaps, tunable_val_t *, TUNABLE_CALLBACK (set_hwcaps)); > > +# ifdef __LP64__ > + TUNABLE_GET (prefer_map_32bit_exec, tunable_val_t *, > + TUNABLE_CALLBACK (set_prefer_map_32bit_exec)); > +# endif OK. > + > bool disable_xsave_features = false; > > if (!CPU_FEATURE_USABLE_P (cpu_features, OSXSAVE)) > diff --git a/sysdeps/x86/include/cpu-features-preferred_feature_index_1.def b/sysdeps/x86/include/cpu-features-preferred_feature_index_1.def > index e45f9cb159..d20c5b3196 100644 > --- a/sysdeps/x86/include/cpu-features-preferred_feature_index_1.def > +++ b/sysdeps/x86/include/cpu-features-preferred_feature_index_1.def > @@ -26,6 +26,7 @@ BIT (I586) > BIT (I686) > BIT (Slow_SSE4_2) > BIT (AVX_Fast_Unaligned_Load) > +BIT (Prefer_MAP_32BIT_EXEC) OK. > BIT (Prefer_No_VZEROUPPER) > BIT (Prefer_ERMS) > BIT (Prefer_No_AVX512) -- Cheers, Carlos.