diff options
Diffstat (limited to 'tools/testing/selftests/kvm/x86_64/xcr0_cpuid_test.c')
| -rw-r--r-- | tools/testing/selftests/kvm/x86_64/xcr0_cpuid_test.c | 132 |
1 files changed, 0 insertions, 132 deletions
diff --git a/tools/testing/selftests/kvm/x86_64/xcr0_cpuid_test.c b/tools/testing/selftests/kvm/x86_64/xcr0_cpuid_test.c deleted file mode 100644 index 905bd5ae4431..000000000000 --- a/tools/testing/selftests/kvm/x86_64/xcr0_cpuid_test.c +++ /dev/null @@ -1,132 +0,0 @@ -// SPDX-License-Identifier: GPL-2.0 -/* - * XCR0 cpuid test - * - * Copyright (C) 2022, Google LLC. - */ - -#include <fcntl.h> -#include <stdio.h> -#include <stdlib.h> -#include <string.h> -#include <sys/ioctl.h> - -#include "test_util.h" - -#include "kvm_util.h" -#include "processor.h" - -/* - * Assert that architectural dependency rules are satisfied, e.g. that AVX is - * supported if and only if SSE is supported. - */ -#define ASSERT_XFEATURE_DEPENDENCIES(supported_xcr0, xfeatures, dependencies) \ -do { \ - uint64_t __supported = (supported_xcr0) & ((xfeatures) | (dependencies)); \ - \ - GUEST_ASSERT_3((__supported & (xfeatures)) != (xfeatures) || \ - __supported == ((xfeatures) | (dependencies)), \ - __supported, (xfeatures), (dependencies)); \ -} while (0) - -/* - * Assert that KVM reports a sane, usable as-is XCR0. Architecturally, a CPU - * isn't strictly required to _support_ all XFeatures related to a feature, but - * at the same time XSETBV will #GP if bundled XFeatures aren't enabled and - * disabled coherently. E.g. a CPU can technically enumerate supported for - * XTILE_CFG but not XTILE_DATA, but attempting to enable XTILE_CFG without - * XTILE_DATA will #GP. - */ -#define ASSERT_ALL_OR_NONE_XFEATURE(supported_xcr0, xfeatures) \ -do { \ - uint64_t __supported = (supported_xcr0) & (xfeatures); \ - \ - GUEST_ASSERT_2(!__supported || __supported == (xfeatures), \ - __supported, (xfeatures)); \ -} while (0) - -static void guest_code(void) -{ - uint64_t xcr0_reset; - uint64_t supported_xcr0; - int i, vector; - - set_cr4(get_cr4() | X86_CR4_OSXSAVE); - - xcr0_reset = xgetbv(0); - supported_xcr0 = this_cpu_supported_xcr0(); - - GUEST_ASSERT(xcr0_reset == XFEATURE_MASK_FP); - - /* Check AVX */ - ASSERT_XFEATURE_DEPENDENCIES(supported_xcr0, - XFEATURE_MASK_YMM, - XFEATURE_MASK_SSE); - - /* Check MPX */ - ASSERT_ALL_OR_NONE_XFEATURE(supported_xcr0, - XFEATURE_MASK_BNDREGS | XFEATURE_MASK_BNDCSR); - - /* Check AVX-512 */ - ASSERT_XFEATURE_DEPENDENCIES(supported_xcr0, - XFEATURE_MASK_AVX512, - XFEATURE_MASK_SSE | XFEATURE_MASK_YMM); - ASSERT_ALL_OR_NONE_XFEATURE(supported_xcr0, - XFEATURE_MASK_AVX512); - - /* Check AMX */ - ASSERT_ALL_OR_NONE_XFEATURE(supported_xcr0, - XFEATURE_MASK_XTILE); - - vector = xsetbv_safe(0, supported_xcr0); - GUEST_ASSERT_2(!vector, supported_xcr0, vector); - - for (i = 0; i < 64; i++) { - if (supported_xcr0 & BIT_ULL(i)) - continue; - - vector = xsetbv_safe(0, supported_xcr0 | BIT_ULL(i)); - GUEST_ASSERT_3(vector == GP_VECTOR, supported_xcr0, vector, BIT_ULL(i)); - } - - GUEST_DONE(); -} - -int main(int argc, char *argv[]) -{ - struct kvm_vcpu *vcpu; - struct kvm_run *run; - struct kvm_vm *vm; - struct ucall uc; - - TEST_REQUIRE(kvm_cpu_has(X86_FEATURE_XSAVE)); - - vm = vm_create_with_one_vcpu(&vcpu, guest_code); - run = vcpu->run; - - vm_init_descriptor_tables(vm); - vcpu_init_descriptor_tables(vcpu); - - while (1) { - vcpu_run(vcpu); - - TEST_ASSERT(run->exit_reason == KVM_EXIT_IO, - "Unexpected exit reason: %u (%s),\n", - run->exit_reason, - exit_reason_str(run->exit_reason)); - - switch (get_ucall(vcpu, &uc)) { - case UCALL_ABORT: - REPORT_GUEST_ASSERT_3(uc, "0x%lx 0x%lx 0x%lx"); - break; - case UCALL_DONE: - goto done; - default: - TEST_FAIL("Unknown ucall %lu", uc.cmd); - } - } - -done: - kvm_vm_free(vm); - return 0; -} |
