Skip to content

CHECK_UNARY test fails on ppc64el with gcc 15.2.0 #1356

@drew-parsons

Description

@drew-parsons

xsimd tests (CHECK_UNARY) are now failing with release 14.2.0 on ppc64el architecture with gcc 15.2.0.
https://ci.debian.net/data/autopkgtest/unstable/ppc64el/x/xsimd/71330067/log.gz
https://ci.debian.net/data/autopkgtest/testing/ppc64el/x/xsimd/71345568/log.gz

The gcc tests were passing with 14.1.0,
https://ci.debian.net/data/autopkgtest/unstable/ppc64el/x/xsimd/70780399/log.gz
https://ci.debian.net/data/autopkgtest/testing/ppc64el/x/xsimd/71221930/log.gz

Ironically ppc64el previously failed tests with clang, Issue #999 , but that is now fixed in 14.2.0 by PR #1010 .
So 14.2.0 now passes on ppc64el with clang 21.1.8, while failing with gcc 15.2.0.

The failure message from the gcc test is

551s 1: /tmp/autopkgtest-lxc.z0hh1a_o/downtmp/build.21l/src/test/test_load_store.cpp:594:
551s 1: TEST CASE:  [load store]<xsimd::batch<short int>>
551s 1:   store
551s 1: 
551s 1: /tmp/autopkgtest-lxc.z0hh1a_o/downtmp/build.21l/src/test/test_load_store.cpp:422: ERROR: CHECK_UNARY( vectors_are_near ) is NOT correct!
551s 1:   values: CHECK_UNARY( false )
551s 1:   logged: load int16_t unaligned
551s 1:           load int16_t aligned
551s 1:           load int16_t unaligned (store_as)
551s 1:           load int16_t aligned (store_as)
551s 1:           load int16_t stream (batch::store)
551s 1:           load int16_t stream (store_as)
551s 1:           load int16_t masked none aligned store
551s 1:           load int16_t masked none unaligned store
551s 1:           load int16_t masked last half aligned
551s 1:           load int16_t masked last half unaligned
551s 1:           res:{?}
551s 1:           expected_masked:{?}
551s 1: 
551s 1: ===============================================================================
551s 1: [doctest] test cases:  367 |  366 passed | 1 failed | 0 skipped
551s 1: [doctest] assertions: 5660 | 5659 passed | 1 failed |
551s 1: [doctest] Status: FAILURE!
551s 1/1 Test #1: test_xsimd .......................***Failed    0.30 sec

The ppc64le machine particulars are

 33s Linux ci-140-7f005e25 6.12.88+deb13-powerpc64le #1 SMP Debian 6.12.88-1 (2026-05-15) ppc64le GNU/Linux
 33s Architecture:                            ppc64le
 33s Byte Order:                              Little Endian
 33s CPU(s):                                  16
 33s On-line CPU(s) list:                     0-15
 33s Model name:                              POWER10 (architected), altivec supported
 33s Model:                                   2.0 (pvr 0080 0200)
 33s Thread(s) per core:                      1
 33s Core(s) per socket:                      1
 33s Socket(s):                               16
 33s Hypervisor vendor:                       KVM
 33s Virtualization type:                     para
 33s L1d cache:                               512 KiB (16 instances)
 33s L1i cache:                               768 KiB (16 instances)
 33s NUMA node(s):                            1
 33s NUMA node0 CPU(s):                       0-15
 33s Vulnerability Gather data sampling:      Not affected
 33s Vulnerability Indirect target selection: Not affected
 33s Vulnerability Itlb multihit:             Not affected
 33s Vulnerability L1tf:                      Mitigation; RFI Flush, L1D private per thread
 33s Vulnerability Mds:                       Not affected
 33s Vulnerability Meltdown:                  Mitigation; RFI Flush, L1D private per thread
 33s Vulnerability Mmio stale data:           Not affected
 33s Vulnerability Reg file data sampling:    Not affected
 33s Vulnerability Retbleed:                  Not affected
 33s Vulnerability Spec rstack overflow:      Not affected
 33s Vulnerability Spec store bypass:         Mitigation; Kernel entry/exit barrier (eieio)
 33s Vulnerability Spectre v1:                Mitigation; __user pointer sanitization, ori31 speculation barrier enabled
 33s Vulnerability Spectre v2:                Mitigation; Software count cache flush (hardware accelerated), Software link stack flush
 33s Vulnerability Srbds:                     Not affected
 33s Vulnerability Tsa:                       Not affected
 33s Vulnerability Tsx async abort:           Not affected
 33s Vulnerability Vmscape:                   Not affected

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions