blob: 87574983c8a49ceaa4429a97dd0a78e50eb1898c [file]
/* This testcase is part of GDB, the GNU debugger.
Copyright 2023 Free Software Foundation, Inc.
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>. */
/* Architecture tests for intel i386 platform. */
#include <stdlib.h>
char global_buf0[] = {0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f,
0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f};
char global_buf1[] = {0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 0};
char *dyn_buf0;
char *dyn_buf1;
int
vmov_test ()
{
char buf0[] = {0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f,
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f};
char buf1[] = {0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 0};
/*start vmov_test. */
/* Operations on registers. */
asm volatile ("mov $0, %rcx");
asm volatile ("mov $0xbeef, %rax");
asm volatile ("vmovd %rax, %xmm0");
asm volatile ("vmovd %xmm0, %rcx");
asm volatile ("vmovq %xmm0, %xmm15");
asm volatile ("vmovq %0, %%xmm15": : "m" (buf1));
/* Operations based on local buffers. */
asm volatile ("vmovd %0, %%xmm0": : "m"(buf0));
asm volatile ("vmovd %%xmm0, %0": "=m"(buf1));
asm volatile ("vmovq %0, %%xmm0": : "m"(buf0));
asm volatile ("vmovq %%xmm0, %0": "=m"(buf1));
/* Operations based on global buffers. */
asm volatile ("vmovd %0, %%xmm0": : "m"(global_buf0));
asm volatile ("vmovd %%xmm0, %0": "=m"(global_buf1));
asm volatile ("vmovq %0, %%xmm0": : "m"(global_buf0));
asm volatile ("vmovq %%xmm0, %0": "=m"(global_buf1));
/* Operations based on dynamic buffers. */
asm volatile ("vmovd %0, %%xmm0": : "m"(*dyn_buf0));
asm volatile ("vmovd %%xmm0, %0": "=m"(*dyn_buf1));
asm volatile ("vmovq %0, %%xmm0": : "m"(*dyn_buf0));
asm volatile ("vmovq %%xmm0, %0": "=m"(*dyn_buf1));
/* Reset all relevant buffers. */
asm volatile ("vmovq %%xmm15, %0": "=m" (buf1));
asm volatile ("vmovq %%xmm15, %0": "=m" (global_buf1));
asm volatile ("vmovq %%xmm15, %0": "=m" (*dyn_buf1));
/* Quick test for a different xmm register. */
asm volatile ("vmovd %0, %%xmm15": "=m" (buf0));
asm volatile ("vmovd %0, %%xmm15": "=m" (buf1));
asm volatile ("vmovq %0, %%xmm15": "=m" (buf0));
asm volatile ("vmovq %0, %%xmm15": "=m" (buf1));
/* Test vmovdq style instructions. */
/* For local and dynamic buffers, we can't guarantee they will be aligned.
However, the aligned and unaligned versions seem to be encoded the same,
so testing one is enough to validate both. */
/* Operations based on local buffers. */
asm volatile ("vmovdqu %0, %%ymm0": : "m"(buf0));
asm volatile ("vmovdqu %%ymm0, %0": "=m"(buf1));
/* Operations based on global buffers. */
/* Global buffers seem to always be aligned, lets sanity check vmovdqa. */
asm volatile ("vmovdqa %0, %%ymm15": : "m"(global_buf0));
asm volatile ("vmovdqa %%ymm15, %0": "=m"(global_buf1));
asm volatile ("vmovdqu %0, %%ymm0": : "m"(global_buf0));
asm volatile ("vmovdqu %%ymm0, %0": "=m"(global_buf1));
/* Operations based on dynamic buffers. */
/* The dynamic buffers are not aligned, so we skip vmovdqa. */
asm volatile ("vmovdqu %0, %%ymm0": : "m"(*dyn_buf0));
asm volatile ("vmovdqu %%ymm0, %0": "=m"(*dyn_buf1));
/* Operations between 2 registers. */
asm volatile ("vmovdqu %ymm15, %ymm0");
asm volatile ("vmovdqu %ymm2, %ymm15");
asm volatile ("vmovdqa %ymm15, %ymm0");
/* We have a return statement to deal with
epilogue in different compilers. */
return 0; /* end vmov_test */
}
/* Test if we can properly record (and undo) vpunpck style instructions.
Most tests will use xmm0 and xmm1 as sources. The registers xmm15 and xmm2
are used as destination to ensure we're reading the VEX.R bit correctly. */
int
vpunpck_test ()
{
/* Using GDB, load these values onto registers, for ease of testing.
ymm0.v2_int128 = {0x1f1e1d1c1b1a19181716151413121110, 0x2f2e2d2c2b2a29282726252423222120}
ymm1.v2_int128 = {0x4f4e4d4c4b4a49484746454443424140, 0x3f3e3d3c3b3a39383736353433323130}
ymm15.v2_int128 = {0xdead, 0xbeef}
so that's easy to confirm that the unpacking went as expected. */
/* start vpunpck_test. */
/* First try all low bit unpack instructions with xmm registers. */
/* 17 27 16 26 15 25 14 24 ...*/
asm volatile ("vpunpcklbw %xmm0, %xmm1, %xmm15");
/* 17 16 27 26 15 14 25 24 ...*/
asm volatile ("vpunpcklwd %0, %%xmm1, %%xmm15"
: : "m" (global_buf0));
/* 17 16 15 14 27 26 25 24 ...*/
asm volatile ("vpunpckldq %0, %%xmm1, %%xmm2"
: : "m" (global_buf0));
/* 17 16 15 14 13 12 11 10 ...*/
asm volatile ("vpunpcklqdq %xmm0, %xmm1, %xmm2");
/* Then try all high bit unpack instructions with xmm registers. */
/* 17 27 16 26 15 25 14 24 ...*/
asm volatile ("vpunpckhbw %xmm0, %xmm1, %xmm15");
/* 17 16 27 26 15 14 25 24 ...*/
asm volatile ("vpunpckhwd %0, %%xmm1, %%xmm15"
: : "m" (global_buf0));
/* 17 16 15 14 27 26 25 24 ...*/
asm volatile ("vpunpckhdq %0, %%xmm1, %%xmm2"
: : "m" (global_buf0));
/* 17 16 15 14 13 12 11 10 ...*/
asm volatile ("vpunpckhqdq %xmm0, %xmm1, %xmm2");
/* Lastly, lets test a few unpack instructions with ymm registers. */
/* 17 27 16 26 15 25 14 24 ...*/
asm volatile ("vpunpcklbw %ymm0, %ymm1, %ymm15");
/* 17 16 27 26 15 14 25 24 ...*/
asm volatile ("vpunpcklwd %ymm0, %ymm1, %ymm15");
/* 17 16 15 14 27 26 25 24 ...*/
asm volatile ("vpunpckhdq %ymm0, %ymm1, %ymm15");
/* 17 16 15 14 13 12 11 10 ...*/
asm volatile ("vpunpckhqdq %ymm0, %ymm1, %ymm15");
/* We have a return statement to deal with
epilogue in different compilers. */
return 0; /* end vpunpck_test */
}
/* Test if we can record vpbroadcast instructions. */
int
vpbroadcast_test ()
{
/* Using GDB, load this value onto the register, for ease of testing.
xmm0.uint128 = 0x0
xmm1.uint128 = 0x1f1e1d1c1b1a19181716151413121110
xmm15.uint128 = 0x0
this way it's easy to confirm we're undoing things correctly. */
/* start vpbroadcast_test. */
asm volatile ("vpbroadcastb %xmm1, %xmm0");
asm volatile ("vpbroadcastb %xmm1, %xmm15");
asm volatile ("vpbroadcastw %xmm1, %ymm0");
asm volatile ("vpbroadcastw %xmm1, %ymm15");
asm volatile ("vpbroadcastd %xmm1, %xmm0");
asm volatile ("vpbroadcastd %xmm1, %xmm15");
asm volatile ("vpbroadcastq %xmm1, %ymm0");
asm volatile ("vpbroadcastq %xmm1, %ymm15");
/* We have a return statement to deal with
epilogue in different compilers. */
return 0; /* end vpbroadcast_test */
}
int
main ()
{
dyn_buf0 = (char *) malloc(sizeof(char) * 32);
dyn_buf1 = (char *) malloc(sizeof(char) * 32);
for (int i =0; i < 32; i++)
{
dyn_buf0[i] = 0x20 + (i % 16);
dyn_buf1[i] = 0;
}
/* Zero relevant xmm registers, se we know what to look for. */
asm volatile ("vmovq %0, %%xmm0": : "m" (global_buf1));
asm volatile ("vmovq %0, %%xmm1": : "m" (global_buf1));
asm volatile ("vmovq %0, %%xmm2": : "m" (global_buf1));
asm volatile ("vmovq %0, %%xmm15": : "m" (global_buf1));
vmov_test ();
vpunpck_test ();
vpbroadcast_test ();
return 0; /* end of main */
}