From: Jeff Law <law@redhat.com>
To: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Cc: Jeremy Fitzhardinge <jeremy@goop.org>,
Tim.Deegan@citrix.com, weidong.han@intel.com,
haitao.shan@intel.com, stefan.bader@canonical.com,
xen-devel <xen-devel@lists.xen.org>,
Jan Beulich <JBeulich@suse.com>,
Konrad Rzeszutek Wilk <konrad@darnok.org>
Subject: Re: xsave=0 workaround needed on 3.2 kernels with Xen 4.1 or Xen-unstable.
Date: Thu, 10 May 2012 13:39:53 -0600 [thread overview]
Message-ID: <4FAC1989.4060201@redhat.com> (raw)
In-Reply-To: <20120509173836.GB9094@phenom.dumpdata.com>
On 05/09/2012 11:38 AM, Konrad Rzeszutek Wilk wrote:
>>
>> And finally one always has to keep in mind that there is this nice
>> glibc bug in that in some versions it is failing to look at CPUID.OSXSAVE
>> when trying to determine whether AVX or FMA is available.
>
> It has this:
> 146
> 147 if (__cpu_features.cpuid[COMMON_CPUID_INDEX_1].ecx& bit_AVX)
> 148 {
> 149 /* Reset the AVX bit in case OSXSAVE is disabled. */
> 150 if ((__cpu_features.cpuid[COMMON_CPUID_INDEX_1].ecx& bit_OSXSAVE) != 0
> 151&& ({ unsigned int xcrlow;
> 152 unsigned int xcrhigh;
> 153 asm ("xgetbv"
> 154 : "=a" (xcrlow), "=d" (xcrhigh) : "c" (0));
> 155 (xcrlow& 6) == 6; }))
> 156 __cpu_features.feature[index_YMM_Usable] |= bit_YMM_Usable;
> 157 }
>
>
> And when I ran a little silly C program (attached) to probe the CPUID flags, I got:
> /root/test-xsave
> SSE3 CMOV
> AVX XSAVE
> Trying XGETBV
> Illegal instruction (core dumped)
>
> Which would imply that the OSXSAVE is not set (but Fedora Core 17 64-bit PV guest
> still crashes on that machine) - which means that in multi-lib the bit_YMM_Usable
> is _not_ set. But then looking at the sources I see:
>
> # ifdef USE_AS_STRCASECMP_L
> 102 ENTRY(__strcasecmp)
> 103 .type __strcasecmp, @gnu_indirect_function
> 104 cmpl $0, __cpu_features+KIND_OFFSET(%rip)
> 105 jne 1f
> 106 call __init_cpu_features
> 107 1:
> 108 # ifdef HAVE_AVX_SUPPORT
> 109 leaq __strcasecmp_avx(%rip), %rax
> 110 testl $bit_AVX, __cpu_features+CPUID_OFFSET+index_AVX(%rip)
> 111 jnz 2f
> 112 # endif
>
> which would imply that the AVX bit is sampled here instead of the
> YMM one.
[ ... ]
I think Uli's position is that this code only uses AVX encodings, but
not the YMM registers and thus the right check is for AVX.
That doesn't make sense to me given the text under availability and
support here:
http://software.intel.com/en-us/articles/introduction-to-intel-advanced-vector-extensions/
According to my reading AVX can only be used if the hardware supports
AVX *and* the OS supports XSAVE. The only weasel language is "To use
the Intel AVX extensions reliably in most settings ..." Which Uli might
be relying upon for his position.
Ironically, the code in init-arch used to look like:
if (__cpu_features.cpuid[COMMON_CPUID_INDEX_1].ecx & bit_AVX)
{
/* Reset the AVX bit in case OSXSAVE is disabled. */
if ((__cpu_features.cpuid[COMMON_CPUID_INDEX_1].ecx &
bit_OSXSAVE) == 0
|| ({ unsigned int xcrlow;
unsigned int xcrhigh;
asm ("xgetbv"
: "=a" (xcrlow), "=d" (xcrhigh) : "c" (0));
(xcrlow & 6) != 6; }))
__cpu_features.cpuid[COMMON_CPUID_INDEX_1].ecx &= ~bit_AVX;
}
Which I think would have done the right thing. Uli changed it to the
form you quoted just 2 hours after installing the version I quoted.
If i'm going to make the claim Uli is wrong, some clarification from
Intel would be appreciated.
jeff
next prev parent reply other threads:[~2012-05-10 19:39 UTC|newest]
Thread overview: 26+ messages / expand[flat|nested] mbox.gz Atom feed top
2012-04-30 19:37 xsave=0 workaround needed on 3.2 kernels with Xen 4.1 or Xen-unstable Konrad Rzeszutek Wilk
2012-05-02 9:00 ` Jan Beulich
2012-05-02 18:42 ` AP
2012-05-03 9:15 ` Jan Beulich
2012-05-03 18:09 ` AP
2012-05-04 19:30 ` AP
2012-05-07 7:15 ` Jan Beulich
2012-05-07 16:07 ` Konrad Rzeszutek Wilk
2012-05-07 22:55 ` Jeremy Fitzhardinge
2012-05-07 23:57 ` AP
2012-05-08 0:08 ` Konrad Rzeszutek Wilk
2012-05-08 0:41 ` AP
2012-05-08 16:39 ` Konrad Rzeszutek Wilk
2012-05-08 17:02 ` Matt Wilson
2012-05-09 0:35 ` Konrad Rzeszutek Wilk
2012-05-09 13:11 ` Konrad Rzeszutek Wilk
2012-05-09 13:30 ` Ian Campbell
2012-05-09 13:34 ` Jan Beulich
2012-05-09 17:38 ` Konrad Rzeszutek Wilk
2012-05-10 19:39 ` Jeff Law [this message]
2012-05-10 20:57 ` Konrad Rzeszutek Wilk
2012-05-11 0:58 ` Konrad Rzeszutek Wilk
2012-05-11 2:27 ` Jeff Law
2012-05-11 8:23 ` Jan Beulich
2012-05-10 20:15 ` Jeff Law
2012-05-08 6:25 ` Jan Beulich
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4FAC1989.4060201@redhat.com \
--to=law@redhat.com \
--cc=JBeulich@suse.com \
--cc=Tim.Deegan@citrix.com \
--cc=haitao.shan@intel.com \
--cc=jeremy@goop.org \
--cc=konrad.wilk@oracle.com \
--cc=konrad@darnok.org \
--cc=stefan.bader@canonical.com \
--cc=weidong.han@intel.com \
--cc=xen-devel@lists.xen.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).