Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp4219019ybl; Tue, 20 Aug 2019 08:38:51 -0700 (PDT) X-Google-Smtp-Source: APXvYqxCvvLntRxf0ojwpgTt/D4BVb1SVSq0tbZeGP0OIe5Ds19qXoJEFD+wrMEE9CFEEV/U2cJM X-Received: by 2002:a17:902:b202:: with SMTP id t2mr29486703plr.303.1566315531913; Tue, 20 Aug 2019 08:38:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566315531; cv=none; d=google.com; s=arc-20160816; b=EL9d/aBof07ysLdQEOHFd2SwIY4ex+neFhSl5MeQEABxlCb3LAqg54OzfyPgcmu3rA keO2tzhdPNf0AKo11am/nBmKmAPwsRuo4QU1YkbgsYCA4QEluBXsDdsUk0AEbCNewdQs Him+zOryd0QJrt4e0wE5plLK2YNqCnASHSr+QBsLwCxI9CfPYsPe5NqEBbRfwnTn0pQe d1bihth+aur3Z0GzpbmjL7BPyRJ/X7pMNZCzyy8jsrQj492sZ3XsqZNzwXna2B3d3QR/ RxYgchwWqIusG/netCBQC+EocRmQ7sf00sOPGTCz7PEUxEnpvO8DDLWe3R5k/FGgdROa KCbQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:to:from :dkim-signature; bh=VMBAs+uLqXnI9IwrpGIH72gdXUySmwFWOLfMIvLIRqw=; b=wjjJX9A9zQO2Ab6+0ykafkBeJxin7ecPlVdhgZ25ZHGr/vAoukGLkv7eNSQ7MbWAqG mCE1ZXatCg9ZdiBfM5HGrpDoplAx9jm00iaIQ87ylg9rX5AhWVNEJRom9Y99EVVf5S40 GZe6MrSgykf7Armb65ie8C9g9Lw5Qic5rLywiEnR9201HcA8rqG639uJQ86ECMmmQvRK ClUdvt/BORQh/8W4PTr7RYFUWKzItq3CbyANm/n0kbr0P9GTeLeYz17YlB750c54GQod nJgR8swVtbbHXhRvu4vsEXzjD9fMRUD3qSqLRTpfHx4SL2Ahwh5/WjR/2qUn1pwtUTwQ 9h1g== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=Q3aduewA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a9si13223402pfn.104.2019.08.20.08.38.36; Tue, 20 Aug 2019 08:38:51 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=Q3aduewA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730440AbfHTPga (ORCPT + 99 others); Tue, 20 Aug 2019 11:36:30 -0400 Received: from mail-wm1-f68.google.com ([209.85.128.68]:54941 "EHLO mail-wm1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726550AbfHTPg3 (ORCPT ); Tue, 20 Aug 2019 11:36:29 -0400 Received: by mail-wm1-f68.google.com with SMTP id p74so3014713wme.4; Tue, 20 Aug 2019 08:36:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:from:to:subject:date:message-id; bh=VMBAs+uLqXnI9IwrpGIH72gdXUySmwFWOLfMIvLIRqw=; b=Q3aduewAEjklJX9l3q7fNNeDNihlNGNa03YzufK5MLFbraHno5JHCLedoFBxcN7J4/ wSb0yv7swMC4A/vgYZAWYg5Pnw/fEnpeCP/+/WD1VEyEdXh1+Clr4b9b/UhCFn4TT5ZA R0IzU1r6sFN8XS7Eh/OO1tb3V/+0atKTIROGIaGm4fgsK2QmVAt6CIIUD+ldWcqLNHrn 1wew4naeyVY3ccq83vMBganN2mfBr35YkMJ7RxoIlqwi/YrNB8VNvpeNGqfn9A6AV4li QSAi+uo+6qc9rHQ4AQOVLT20v6lwviblYJvxzlqdkWcww2IY/HAjy3ofxccwdUPQePKx DY+w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:from:to:subject:date:message-id; bh=VMBAs+uLqXnI9IwrpGIH72gdXUySmwFWOLfMIvLIRqw=; b=Rz9VBrU6vQ1FyfkMoi8IsbPY5r6YhgmZLNN5GebHr0TQT1TrCOHwJ40hapLyFfGqU4 DoJnjEKhWE9fQjVMcI3BYKNXaZezitiVuT1V7MO9wiZE2rclzeXaIGZP+n4OIxLnP7rl R4iUmwXEEe5Kh6sBPRqfxNNbbrg5CO/LnBjI8h3QfsKtoBQSPan3DCVjqWuXqENE7KUs KfHxcRqvNc6pkX6L5e8WZSgCycQVKwmQk72JIG1xN8dmhEWTuS9+U57V5zdx0vUgMCgL BpnY1a3TFSO13Cx6nDb9f1jdy0qtXwKlgpLdQFHdIafUgTqAGfpa5eSsMw2T6K/gz1Z1 6mow== X-Gm-Message-State: APjAAAX0/SQo8zRWDnBjZay6VYbVSOupDc/TPyOPFmxq/Hhhd75AVoJp 9h5CBxdjpsKjgEao94Wi8EH31bgi9zg= X-Received: by 2002:a7b:ce0b:: with SMTP id m11mr630379wmc.151.1566315386768; Tue, 20 Aug 2019 08:36:26 -0700 (PDT) Received: from 640k.localdomain.com ([93.56.166.5]) by smtp.gmail.com with ESMTPSA id v124sm587415wmf.23.2019.08.20.08.36.25 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 20 Aug 2019 08:36:26 -0700 (PDT) From: Paolo Bonzini To: linux-kernel@vger.kernel.org, kvm@vger.kernel.org Subject: [PATCH] selftests: kvm: fix state save/load on processors without XSAVE Date: Tue, 20 Aug 2019 17:36:24 +0200 Message-Id: <1566315384-34848-1-git-send-email-pbonzini@redhat.com> X-Mailer: git-send-email 1.8.3.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org state_test and smm_test are failing on older processors that do not have xcr0. This is because on those processor KVM does provide support for KVM_GET/SET_XSAVE (to avoid having to rely on the older KVM_GET/SET_FPU) but not for KVM_GET/SET_XCRS. Signed-off-by: Paolo Bonzini --- tools/testing/selftests/kvm/lib/x86_64/processor.c | 16 ++++++++++------ 1 file changed, 10 insertions(+), 6 deletions(-) diff --git a/tools/testing/selftests/kvm/lib/x86_64/processor.c b/tools/testing/selftests/kvm/lib/x86_64/processor.c index 6cb34a0fa200..0a5e487dbc50 100644 --- a/tools/testing/selftests/kvm/lib/x86_64/processor.c +++ b/tools/testing/selftests/kvm/lib/x86_64/processor.c @@ -1060,9 +1060,11 @@ struct kvm_x86_state *vcpu_save_state(struct kvm_vm *vm, uint32_t vcpuid) TEST_ASSERT(r == 0, "Unexpected result from KVM_GET_XSAVE, r: %i", r); - r = ioctl(vcpu->fd, KVM_GET_XCRS, &state->xcrs); - TEST_ASSERT(r == 0, "Unexpected result from KVM_GET_XCRS, r: %i", - r); + if (kvm_check_cap(KVM_CAP_XCRS)) { + r = ioctl(vcpu->fd, KVM_GET_XCRS, &state->xcrs); + TEST_ASSERT(r == 0, "Unexpected result from KVM_GET_XCRS, r: %i", + r); + } r = ioctl(vcpu->fd, KVM_GET_SREGS, &state->sregs); TEST_ASSERT(r == 0, "Unexpected result from KVM_GET_SREGS, r: %i", @@ -1103,9 +1105,11 @@ void vcpu_load_state(struct kvm_vm *vm, uint32_t vcpuid, struct kvm_x86_state *s TEST_ASSERT(r == 0, "Unexpected result from KVM_SET_XSAVE, r: %i", r); - r = ioctl(vcpu->fd, KVM_SET_XCRS, &state->xcrs); - TEST_ASSERT(r == 0, "Unexpected result from KVM_SET_XCRS, r: %i", - r); + if (kvm_check_cap(KVM_CAP_XCRS)) { + r = ioctl(vcpu->fd, KVM_SET_XCRS, &state->xcrs); + TEST_ASSERT(r == 0, "Unexpected result from KVM_SET_XCRS, r: %i", + r); + } r = ioctl(vcpu->fd, KVM_SET_SREGS, &state->sregs); TEST_ASSERT(r == 0, "Unexpected result from KVM_SET_SREGS, r: %i", -- 1.8.3.1