From: Vitaly Kuznetsov <vkuznets@redhat.com>
To: Sean Christopherson <seanjc@google.com>,
Sean Christopherson <seanjc@google.com>,
Paolo Bonzini <pbonzini@redhat.com>
Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org
Subject: Re: [PATCH 02/11] KVM: selftests: Precisely mask off dynamic fields in CPUID test
Date: Fri, 04 Oct 2024 11:02:29 +0200 [thread overview]
Message-ID: <87setci6l6.fsf@redhat.com> (raw)
In-Reply-To: <20241003234337.273364-3-seanjc@google.com>
Sean Christopherson <seanjc@google.com> writes:
> When comparing vCPU CPUID entries against KVM's supported CPUID, mask off
> only the dynamic fields/bits instead of skipping the entire entry.
> Precisely masking bits isn't meaningfully more difficult than skipping
> entire entries, and will be necessary to maintain test coverage when a
> future commit enables OSXSAVE by default, i.e. makes one bit in all of
> CPUID.0x1 dynamic.
>
> Signed-off-by: Sean Christopherson <seanjc@google.com>
> ---
> .../testing/selftests/kvm/x86_64/cpuid_test.c | 61 +++++++++++--------
> 1 file changed, 36 insertions(+), 25 deletions(-)
>
> diff --git a/tools/testing/selftests/kvm/x86_64/cpuid_test.c b/tools/testing/selftests/kvm/x86_64/cpuid_test.c
> index fec03b11b059..f7fdcef5fa59 100644
> --- a/tools/testing/selftests/kvm/x86_64/cpuid_test.c
> +++ b/tools/testing/selftests/kvm/x86_64/cpuid_test.c
> @@ -12,17 +12,16 @@
> #include "kvm_util.h"
> #include "processor.h"
>
> -/* CPUIDs known to differ */
> -struct {
> - u32 function;
> - u32 index;
> -} mangled_cpuids[] = {
> - /*
> - * These entries depend on the vCPU's XCR0 register and IA32_XSS MSR,
> - * which are not controlled for by this test.
> - */
> - {.function = 0xd, .index = 0},
> - {.function = 0xd, .index = 1},
> +struct cpuid_mask {
> + union {
> + struct {
> + u32 eax;
> + u32 ebx;
> + u32 ecx;
> + u32 edx;
> + };
> + u32 regs[4];
> + };
> };
>
> static void test_guest_cpuids(struct kvm_cpuid2 *guest_cpuid)
> @@ -56,17 +55,23 @@ static void guest_main(struct kvm_cpuid2 *guest_cpuid)
> GUEST_DONE();
> }
>
> -static bool is_cpuid_mangled(const struct kvm_cpuid_entry2 *entrie)
> +static struct cpuid_mask get_const_cpuid_mask(const struct kvm_cpuid_entry2 *entry)
> {
> - int i;
> + struct cpuid_mask mask;
>
> - for (i = 0; i < ARRAY_SIZE(mangled_cpuids); i++) {
> - if (mangled_cpuids[i].function == entrie->function &&
> - mangled_cpuids[i].index == entrie->index)
> - return true;
> + memset(&mask, 0xff, sizeof(mask));
> +
> + switch (entry->function) {
> + case 0xd:
> + /*
> + * CPUID.0xD.{0,1}.EBX enumerate XSAVE size based on the current
> + * XCR0 and IA32_XSS MSR values.
> + */
> + if (entry->index < 2)
> + mask.ebx = 0;
> + break;
> }
> -
> - return false;
> + return mask;
> }
>
> static void compare_cpuids(const struct kvm_cpuid2 *cpuid1,
> @@ -79,6 +84,8 @@ static void compare_cpuids(const struct kvm_cpuid2 *cpuid1,
> "CPUID nent mismatch: %d vs. %d", cpuid1->nent, cpuid2->nent);
>
> for (i = 0; i < cpuid1->nent; i++) {
> + struct cpuid_mask mask;
> +
> e1 = &cpuid1->entries[i];
> e2 = &cpuid2->entries[i];
>
> @@ -88,15 +95,19 @@ static void compare_cpuids(const struct kvm_cpuid2 *cpuid1,
> i, e1->function, e1->index, e1->flags,
> e2->function, e2->index, e2->flags);
>
> - if (is_cpuid_mangled(e1))
> - continue;
> + /* Mask off dynamic bits, e.g. OSXSAVE, when comparing entries. */
> + mask = get_const_cpuid_mask(e1);
>
> - TEST_ASSERT(e1->eax == e2->eax && e1->ebx == e2->ebx &&
> - e1->ecx == e2->ecx && e1->edx == e2->edx,
> + TEST_ASSERT((e1->eax & mask.eax) == (e2->eax & mask.eax) &&
> + (e1->ebx & mask.ebx) == (e2->ebx & mask.ebx) &&
> + (e1->ecx & mask.ecx) == (e2->ecx & mask.ecx) &&
> + (e1->edx & mask.edx) == (e2->edx & mask.edx),
> "CPUID 0x%x.%x differ: 0x%x:0x%x:0x%x:0x%x vs 0x%x:0x%x:0x%x:0x%x",
> e1->function, e1->index,
> - e1->eax, e1->ebx, e1->ecx, e1->edx,
> - e2->eax, e2->ebx, e2->ecx, e2->edx);
> + e1->eax & mask.eax, e1->ebx & mask.ebx,
> + e1->ecx & mask.ecx, e1->edx & mask.edx,
> + e2->eax & mask.eax, e2->ebx & mask.ebx,
> + e2->ecx & mask.ecx, e2->edx & mask.edx);
> }
> }
Reviewed-by: Vitaly Kuznetsov <vkuznets@redhat.com>
--
Vitaly
next prev parent reply other threads:[~2024-10-04 9:02 UTC|newest]
Thread overview: 26+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-10-03 23:43 [PATCH 00/11] KVM: selftests: AVX support + fixes Sean Christopherson
2024-10-03 23:43 ` [PATCH 01/11] KVM: selftests: Fix out-of-bounds reads in CPUID test's array lookups Sean Christopherson
2024-10-04 8:22 ` Vitaly Kuznetsov
2024-10-03 23:43 ` [PATCH 02/11] KVM: selftests: Precisely mask off dynamic fields in CPUID test Sean Christopherson
2024-10-04 9:02 ` Vitaly Kuznetsov [this message]
2024-10-03 23:43 ` [PATCH 03/11] KVM: selftests: Mask off OSPKE and OSXSAVE when comparing CPUID entries Sean Christopherson
2024-10-04 9:02 ` Vitaly Kuznetsov
2024-10-03 23:43 ` [PATCH 04/11] KVM: selftests: Rework OSXSAVE CR4=>CPUID test to play nice with AVX insns Sean Christopherson
2024-10-04 9:02 ` Vitaly Kuznetsov
2024-10-03 23:43 ` [PATCH 05/11] KVM: selftests: Configure XCR0 to max supported value by default Sean Christopherson
2024-10-04 9:01 ` Vitaly Kuznetsov
2024-10-04 13:35 ` Sean Christopherson
2024-10-03 23:43 ` [PATCH 06/11] KVM: selftests: Verify XCR0 can be "downgraded" and "upgraded" Sean Christopherson
2024-10-04 9:04 ` Vitaly Kuznetsov
2024-10-03 23:43 ` [PATCH 07/11] KVM: selftests: Drop manual CR4.OSXSAVE enabling from CR4/CPUID sync test Sean Christopherson
2024-10-04 9:05 ` Vitaly Kuznetsov
2024-10-03 23:43 ` [PATCH 08/11] KVM: selftests: Drop manual XCR0 configuration from AMX test Sean Christopherson
2024-10-04 9:09 ` Vitaly Kuznetsov
2024-10-03 23:43 ` [PATCH 09/11] KVM: selftests: Drop manual XCR0 configuration from state test Sean Christopherson
2024-10-04 9:10 ` Vitaly Kuznetsov
2024-10-03 23:43 ` [PATCH 10/11] KVM: selftests: Drop manual XCR0 configuration from SEV smoke test Sean Christopherson
2024-10-03 23:43 ` [PATCH 11/11] KVM: selftests: Ensure KVM supports AVX for SEV-ES VMSA FPU test Sean Christopherson
2024-10-04 9:14 ` Vitaly Kuznetsov
2024-10-20 11:28 ` [PATCH 00/11] KVM: selftests: AVX support + fixes Paolo Bonzini
2024-10-31 19:51 ` Sean Christopherson
2024-11-01 19:31 ` Sean Christopherson
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=87setci6l6.fsf@redhat.com \
--to=vkuznets@redhat.com \
--cc=kvm@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=pbonzini@redhat.com \
--cc=seanjc@google.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).