xref: /aosp_15_r20/external/cronet/base/cpu_unittest.cc (revision 6777b5387eb2ff775bb5750e3f5d96f37fb7352b)
1*6777b538SAndroid Build Coastguard Worker // Copyright 2012 The Chromium Authors
2*6777b538SAndroid Build Coastguard Worker // Use of this source code is governed by a BSD-style license that can be
3*6777b538SAndroid Build Coastguard Worker // found in the LICENSE file.
4*6777b538SAndroid Build Coastguard Worker 
5*6777b538SAndroid Build Coastguard Worker #include "base/cpu.h"
6*6777b538SAndroid Build Coastguard Worker 
7*6777b538SAndroid Build Coastguard Worker #include "base/containers/contains.h"
8*6777b538SAndroid Build Coastguard Worker #include "base/logging.h"
9*6777b538SAndroid Build Coastguard Worker #include "base/memory/protected_memory_buildflags.h"
10*6777b538SAndroid Build Coastguard Worker #include "base/strings/string_util.h"
11*6777b538SAndroid Build Coastguard Worker #include "base/test/gtest_util.h"
12*6777b538SAndroid Build Coastguard Worker #include "build/build_config.h"
13*6777b538SAndroid Build Coastguard Worker #include "testing/gtest/include/gtest/gtest.h"
14*6777b538SAndroid Build Coastguard Worker 
15*6777b538SAndroid Build Coastguard Worker // Tests whether we can run extended instructions represented by the CPU
16*6777b538SAndroid Build Coastguard Worker // information. This test actually executes some extended instructions (such as
17*6777b538SAndroid Build Coastguard Worker // MMX, SSE, etc.) supported by the CPU and sees we can run them without
18*6777b538SAndroid Build Coastguard Worker // "undefined instruction" exceptions. That is, this test succeeds when this
19*6777b538SAndroid Build Coastguard Worker // test finishes without a crash.
TEST(CPU,RunExtendedInstructions)20*6777b538SAndroid Build Coastguard Worker TEST(CPU, RunExtendedInstructions) {
21*6777b538SAndroid Build Coastguard Worker   // Retrieve the CPU information.
22*6777b538SAndroid Build Coastguard Worker   base::CPU cpu;
23*6777b538SAndroid Build Coastguard Worker #if defined(ARCH_CPU_X86_FAMILY)
24*6777b538SAndroid Build Coastguard Worker 
25*6777b538SAndroid Build Coastguard Worker   ASSERT_TRUE(cpu.has_mmx());
26*6777b538SAndroid Build Coastguard Worker   ASSERT_TRUE(cpu.has_sse());
27*6777b538SAndroid Build Coastguard Worker   ASSERT_TRUE(cpu.has_sse2());
28*6777b538SAndroid Build Coastguard Worker   ASSERT_TRUE(cpu.has_sse3());
29*6777b538SAndroid Build Coastguard Worker 
30*6777b538SAndroid Build Coastguard Worker // GCC and clang instruction test.
31*6777b538SAndroid Build Coastguard Worker #if defined(COMPILER_GCC)
32*6777b538SAndroid Build Coastguard Worker   // Execute an MMX instruction.
33*6777b538SAndroid Build Coastguard Worker   __asm__ __volatile__("emms\n" : : : "mm0");
34*6777b538SAndroid Build Coastguard Worker 
35*6777b538SAndroid Build Coastguard Worker   // Execute an SSE instruction.
36*6777b538SAndroid Build Coastguard Worker   __asm__ __volatile__("xorps %%xmm0, %%xmm0\n" : : : "xmm0");
37*6777b538SAndroid Build Coastguard Worker 
38*6777b538SAndroid Build Coastguard Worker   // Execute an SSE 2 instruction.
39*6777b538SAndroid Build Coastguard Worker   __asm__ __volatile__("psrldq $0, %%xmm0\n" : : : "xmm0");
40*6777b538SAndroid Build Coastguard Worker 
41*6777b538SAndroid Build Coastguard Worker   // Execute an SSE 3 instruction.
42*6777b538SAndroid Build Coastguard Worker   __asm__ __volatile__("addsubpd %%xmm0, %%xmm0\n" : : : "xmm0");
43*6777b538SAndroid Build Coastguard Worker 
44*6777b538SAndroid Build Coastguard Worker   if (cpu.has_ssse3()) {
45*6777b538SAndroid Build Coastguard Worker     // Execute a Supplimental SSE 3 instruction.
46*6777b538SAndroid Build Coastguard Worker     __asm__ __volatile__("psignb %%xmm0, %%xmm0\n" : : : "xmm0");
47*6777b538SAndroid Build Coastguard Worker   }
48*6777b538SAndroid Build Coastguard Worker 
49*6777b538SAndroid Build Coastguard Worker   if (cpu.has_sse41()) {
50*6777b538SAndroid Build Coastguard Worker     // Execute an SSE 4.1 instruction.
51*6777b538SAndroid Build Coastguard Worker     __asm__ __volatile__("pmuldq %%xmm0, %%xmm0\n" : : : "xmm0");
52*6777b538SAndroid Build Coastguard Worker   }
53*6777b538SAndroid Build Coastguard Worker 
54*6777b538SAndroid Build Coastguard Worker   if (cpu.has_sse42()) {
55*6777b538SAndroid Build Coastguard Worker     // Execute an SSE 4.2 instruction.
56*6777b538SAndroid Build Coastguard Worker     __asm__ __volatile__("crc32 %%eax, %%eax\n" : : : "eax");
57*6777b538SAndroid Build Coastguard Worker   }
58*6777b538SAndroid Build Coastguard Worker 
59*6777b538SAndroid Build Coastguard Worker   if (cpu.has_popcnt()) {
60*6777b538SAndroid Build Coastguard Worker     // Execute a POPCNT instruction.
61*6777b538SAndroid Build Coastguard Worker     __asm__ __volatile__("popcnt %%eax, %%eax\n" : : : "eax");
62*6777b538SAndroid Build Coastguard Worker   }
63*6777b538SAndroid Build Coastguard Worker 
64*6777b538SAndroid Build Coastguard Worker   if (cpu.has_avx()) {
65*6777b538SAndroid Build Coastguard Worker     // Execute an AVX instruction.
66*6777b538SAndroid Build Coastguard Worker     __asm__ __volatile__("vzeroupper\n" : : : "xmm0");
67*6777b538SAndroid Build Coastguard Worker   }
68*6777b538SAndroid Build Coastguard Worker 
69*6777b538SAndroid Build Coastguard Worker   if (cpu.has_fma3()) {
70*6777b538SAndroid Build Coastguard Worker     // Execute a FMA3 instruction.
71*6777b538SAndroid Build Coastguard Worker     __asm__ __volatile__("vfmadd132ps %%xmm0, %%xmm0, %%xmm0\n" : : : "xmm0");
72*6777b538SAndroid Build Coastguard Worker   }
73*6777b538SAndroid Build Coastguard Worker 
74*6777b538SAndroid Build Coastguard Worker   if (cpu.has_avx2()) {
75*6777b538SAndroid Build Coastguard Worker     // Execute an AVX 2 instruction.
76*6777b538SAndroid Build Coastguard Worker     __asm__ __volatile__("vpunpcklbw %%ymm0, %%ymm0, %%ymm0\n" : : : "xmm0");
77*6777b538SAndroid Build Coastguard Worker   }
78*6777b538SAndroid Build Coastguard Worker 
79*6777b538SAndroid Build Coastguard Worker   if (cpu.has_pku()) {
80*6777b538SAndroid Build Coastguard Worker     // rdpkru
81*6777b538SAndroid Build Coastguard Worker     uint32_t pkru;
82*6777b538SAndroid Build Coastguard Worker     __asm__ __volatile__(".byte 0x0f,0x01,0xee\n"
83*6777b538SAndroid Build Coastguard Worker                          : "=a"(pkru)
84*6777b538SAndroid Build Coastguard Worker                          : "c"(0), "d"(0));
85*6777b538SAndroid Build Coastguard Worker   }
86*6777b538SAndroid Build Coastguard Worker // Visual C 32 bit and ClangCL 32/64 bit test.
87*6777b538SAndroid Build Coastguard Worker #elif defined(COMPILER_MSVC) && (defined(ARCH_CPU_32_BITS) || \
88*6777b538SAndroid Build Coastguard Worker       (defined(ARCH_CPU_64_BITS) && defined(__clang__)))
89*6777b538SAndroid Build Coastguard Worker 
90*6777b538SAndroid Build Coastguard Worker   // Execute an MMX instruction.
91*6777b538SAndroid Build Coastguard Worker   __asm emms;
92*6777b538SAndroid Build Coastguard Worker 
93*6777b538SAndroid Build Coastguard Worker   // Execute an SSE instruction.
94*6777b538SAndroid Build Coastguard Worker   __asm xorps xmm0, xmm0;
95*6777b538SAndroid Build Coastguard Worker 
96*6777b538SAndroid Build Coastguard Worker   // Execute an SSE 2 instruction.
97*6777b538SAndroid Build Coastguard Worker   __asm psrldq xmm0, 0;
98*6777b538SAndroid Build Coastguard Worker 
99*6777b538SAndroid Build Coastguard Worker   // Execute an SSE 3 instruction.
100*6777b538SAndroid Build Coastguard Worker   __asm addsubpd xmm0, xmm0;
101*6777b538SAndroid Build Coastguard Worker 
102*6777b538SAndroid Build Coastguard Worker   if (cpu.has_ssse3()) {
103*6777b538SAndroid Build Coastguard Worker     // Execute a Supplimental SSE 3 instruction.
104*6777b538SAndroid Build Coastguard Worker     __asm psignb xmm0, xmm0;
105*6777b538SAndroid Build Coastguard Worker   }
106*6777b538SAndroid Build Coastguard Worker 
107*6777b538SAndroid Build Coastguard Worker   if (cpu.has_sse41()) {
108*6777b538SAndroid Build Coastguard Worker     // Execute an SSE 4.1 instruction.
109*6777b538SAndroid Build Coastguard Worker     __asm pmuldq xmm0, xmm0;
110*6777b538SAndroid Build Coastguard Worker   }
111*6777b538SAndroid Build Coastguard Worker 
112*6777b538SAndroid Build Coastguard Worker   if (cpu.has_sse42()) {
113*6777b538SAndroid Build Coastguard Worker     // Execute an SSE 4.2 instruction.
114*6777b538SAndroid Build Coastguard Worker     __asm crc32 eax, eax;
115*6777b538SAndroid Build Coastguard Worker   }
116*6777b538SAndroid Build Coastguard Worker 
117*6777b538SAndroid Build Coastguard Worker   if (cpu.has_popcnt()) {
118*6777b538SAndroid Build Coastguard Worker     // Execute a POPCNT instruction.
119*6777b538SAndroid Build Coastguard Worker     __asm popcnt eax, eax;
120*6777b538SAndroid Build Coastguard Worker   }
121*6777b538SAndroid Build Coastguard Worker 
122*6777b538SAndroid Build Coastguard Worker   if (cpu.has_avx()) {
123*6777b538SAndroid Build Coastguard Worker     // Execute an AVX instruction.
124*6777b538SAndroid Build Coastguard Worker     __asm vzeroupper;
125*6777b538SAndroid Build Coastguard Worker   }
126*6777b538SAndroid Build Coastguard Worker 
127*6777b538SAndroid Build Coastguard Worker   if (cpu.has_fma3()) {
128*6777b538SAndroid Build Coastguard Worker     // Execute an AVX instruction.
129*6777b538SAndroid Build Coastguard Worker     __asm vfmadd132ps xmm0, xmm0, xmm0;
130*6777b538SAndroid Build Coastguard Worker   }
131*6777b538SAndroid Build Coastguard Worker 
132*6777b538SAndroid Build Coastguard Worker   if (cpu.has_avx2()) {
133*6777b538SAndroid Build Coastguard Worker     // Execute an AVX 2 instruction.
134*6777b538SAndroid Build Coastguard Worker     __asm vpunpcklbw ymm0, ymm0, ymm0
135*6777b538SAndroid Build Coastguard Worker   }
136*6777b538SAndroid Build Coastguard Worker #endif  // defined(COMPILER_GCC)
137*6777b538SAndroid Build Coastguard Worker #endif  // defined(ARCH_CPU_X86_FAMILY)
138*6777b538SAndroid Build Coastguard Worker 
139*6777b538SAndroid Build Coastguard Worker #if defined(ARCH_CPU_ARM64)
140*6777b538SAndroid Build Coastguard Worker   // Check that the CPU is correctly reporting support for the Armv8.5-A memory
141*6777b538SAndroid Build Coastguard Worker   // tagging extension. The new MTE instructions aren't encoded in NOP space
142*6777b538SAndroid Build Coastguard Worker   // like BTI/Pointer Authentication and will crash older cores with a SIGILL if
143*6777b538SAndroid Build Coastguard Worker   // used incorrectly. This test demonstrates how it should be done and that
144*6777b538SAndroid Build Coastguard Worker   // this approach works.
145*6777b538SAndroid Build Coastguard Worker   if (cpu.has_mte()) {
146*6777b538SAndroid Build Coastguard Worker #if !defined(__ARM_FEATURE_MEMORY_TAGGING)
147*6777b538SAndroid Build Coastguard Worker     // In this section, we're running on an MTE-compatible core, but we're
148*6777b538SAndroid Build Coastguard Worker     // building this file without MTE support. Fail this test to indicate that
149*6777b538SAndroid Build Coastguard Worker     // there's a problem with the base/ build configuration.
150*6777b538SAndroid Build Coastguard Worker     GTEST_FAIL()
151*6777b538SAndroid Build Coastguard Worker         << "MTE support detected (but base/ built without MTE support)";
152*6777b538SAndroid Build Coastguard Worker #else
153*6777b538SAndroid Build Coastguard Worker     char ptr[32];
154*6777b538SAndroid Build Coastguard Worker     uint64_t val;
155*6777b538SAndroid Build Coastguard Worker     // Execute a trivial MTE instruction. Normally, MTE should be used via the
156*6777b538SAndroid Build Coastguard Worker     // intrinsics documented at
157*6777b538SAndroid Build Coastguard Worker     // https://developer.arm.com/documentation/101028/0012/10--Memory-tagging-intrinsics,
158*6777b538SAndroid Build Coastguard Worker     // this test uses the irg (Insert Random Tag) instruction directly to make
159*6777b538SAndroid Build Coastguard Worker     // sure that it's not optimized out by the compiler.
160*6777b538SAndroid Build Coastguard Worker     __asm__ __volatile__("irg %0, %1" : "=r"(val) : "r"(ptr));
161*6777b538SAndroid Build Coastguard Worker #endif  // __ARM_FEATURE_MEMORY_TAGGING
162*6777b538SAndroid Build Coastguard Worker   }
163*6777b538SAndroid Build Coastguard Worker #endif  // ARCH_CPU_ARM64
164*6777b538SAndroid Build Coastguard Worker }
165*6777b538SAndroid Build Coastguard Worker 
166*6777b538SAndroid Build Coastguard Worker // For https://crbug.com/249713
TEST(CPU,BrandAndVendorContainsNoNUL)167*6777b538SAndroid Build Coastguard Worker TEST(CPU, BrandAndVendorContainsNoNUL) {
168*6777b538SAndroid Build Coastguard Worker   base::CPU cpu;
169*6777b538SAndroid Build Coastguard Worker   EXPECT_FALSE(base::Contains(cpu.cpu_brand(), '\0'));
170*6777b538SAndroid Build Coastguard Worker   EXPECT_FALSE(base::Contains(cpu.vendor_name(), '\0'));
171*6777b538SAndroid Build Coastguard Worker }
172*6777b538SAndroid Build Coastguard Worker 
173*6777b538SAndroid Build Coastguard Worker #if defined(ARCH_CPU_X86_FAMILY)
174*6777b538SAndroid Build Coastguard Worker // Tests that we compute the correct CPU family and model based on the vendor
175*6777b538SAndroid Build Coastguard Worker // and CPUID signature.
TEST(CPU,X86FamilyAndModel)176*6777b538SAndroid Build Coastguard Worker TEST(CPU, X86FamilyAndModel) {
177*6777b538SAndroid Build Coastguard Worker   base::internal::X86ModelInfo info;
178*6777b538SAndroid Build Coastguard Worker 
179*6777b538SAndroid Build Coastguard Worker   // Check with an Intel Skylake signature.
180*6777b538SAndroid Build Coastguard Worker   info = base::internal::ComputeX86FamilyAndModel("GenuineIntel", 0x000406e3);
181*6777b538SAndroid Build Coastguard Worker   EXPECT_EQ(info.family, 6);
182*6777b538SAndroid Build Coastguard Worker   EXPECT_EQ(info.model, 78);
183*6777b538SAndroid Build Coastguard Worker   EXPECT_EQ(info.ext_family, 0);
184*6777b538SAndroid Build Coastguard Worker   EXPECT_EQ(info.ext_model, 4);
185*6777b538SAndroid Build Coastguard Worker 
186*6777b538SAndroid Build Coastguard Worker   // Check with an Intel Airmont signature.
187*6777b538SAndroid Build Coastguard Worker   info = base::internal::ComputeX86FamilyAndModel("GenuineIntel", 0x000406c2);
188*6777b538SAndroid Build Coastguard Worker   EXPECT_EQ(info.family, 6);
189*6777b538SAndroid Build Coastguard Worker   EXPECT_EQ(info.model, 76);
190*6777b538SAndroid Build Coastguard Worker   EXPECT_EQ(info.ext_family, 0);
191*6777b538SAndroid Build Coastguard Worker   EXPECT_EQ(info.ext_model, 4);
192*6777b538SAndroid Build Coastguard Worker 
193*6777b538SAndroid Build Coastguard Worker   // Check with an Intel Prescott signature.
194*6777b538SAndroid Build Coastguard Worker   info = base::internal::ComputeX86FamilyAndModel("GenuineIntel", 0x00000f31);
195*6777b538SAndroid Build Coastguard Worker   EXPECT_EQ(info.family, 15);
196*6777b538SAndroid Build Coastguard Worker   EXPECT_EQ(info.model, 3);
197*6777b538SAndroid Build Coastguard Worker   EXPECT_EQ(info.ext_family, 0);
198*6777b538SAndroid Build Coastguard Worker   EXPECT_EQ(info.ext_model, 0);
199*6777b538SAndroid Build Coastguard Worker 
200*6777b538SAndroid Build Coastguard Worker   // Check with an AMD Excavator signature.
201*6777b538SAndroid Build Coastguard Worker   info = base::internal::ComputeX86FamilyAndModel("AuthenticAMD", 0x00670f00);
202*6777b538SAndroid Build Coastguard Worker   EXPECT_EQ(info.family, 21);
203*6777b538SAndroid Build Coastguard Worker   EXPECT_EQ(info.model, 112);
204*6777b538SAndroid Build Coastguard Worker   EXPECT_EQ(info.ext_family, 6);
205*6777b538SAndroid Build Coastguard Worker   EXPECT_EQ(info.ext_model, 7);
206*6777b538SAndroid Build Coastguard Worker }
207*6777b538SAndroid Build Coastguard Worker #endif  // defined(ARCH_CPU_X86_FAMILY)
208*6777b538SAndroid Build Coastguard Worker 
209*6777b538SAndroid Build Coastguard Worker #if defined(ARCH_CPU_ARM_FAMILY) && \
210*6777b538SAndroid Build Coastguard Worker     (BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_CHROMEOS))
TEST(CPU,ARMImplementerAndPartNumber)211*6777b538SAndroid Build Coastguard Worker TEST(CPU, ARMImplementerAndPartNumber) {
212*6777b538SAndroid Build Coastguard Worker   base::CPU cpu;
213*6777b538SAndroid Build Coastguard Worker 
214*6777b538SAndroid Build Coastguard Worker   const std::string& cpu_brand = cpu.cpu_brand();
215*6777b538SAndroid Build Coastguard Worker 
216*6777b538SAndroid Build Coastguard Worker   // Some devices, including on the CQ, do not report a cpu_brand
217*6777b538SAndroid Build Coastguard Worker   // https://crbug.com/1166533 and https://crbug.com/1167123.
218*6777b538SAndroid Build Coastguard Worker   EXPECT_EQ(cpu_brand, base::TrimWhitespaceASCII(cpu_brand, base::TRIM_ALL));
219*6777b538SAndroid Build Coastguard Worker   EXPECT_GT(cpu.implementer(), 0u);
220*6777b538SAndroid Build Coastguard Worker   EXPECT_GT(cpu.part_number(), 0u);
221*6777b538SAndroid Build Coastguard Worker }
222*6777b538SAndroid Build Coastguard Worker #endif  // defined(ARCH_CPU_ARM_FAMILY) && (BUILDFLAG(IS_LINUX) ||
223*6777b538SAndroid Build Coastguard Worker         // BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_CHROMEOS))
224*6777b538SAndroid Build Coastguard Worker 
225*6777b538SAndroid Build Coastguard Worker #if BUILDFLAG(PROTECTED_MEMORY_ENABLED)
TEST(CPUDeathTest,VerifyModifyingCPUInstanceNoAllocationCrashes)226*6777b538SAndroid Build Coastguard Worker TEST(CPUDeathTest, VerifyModifyingCPUInstanceNoAllocationCrashes) {
227*6777b538SAndroid Build Coastguard Worker   const base::CPU& cpu = base::CPU::GetInstanceNoAllocation();
228*6777b538SAndroid Build Coastguard Worker   uint8_t* const bytes =
229*6777b538SAndroid Build Coastguard Worker       const_cast<uint8_t*>(reinterpret_cast<const uint8_t*>(&cpu));
230*6777b538SAndroid Build Coastguard Worker 
231*6777b538SAndroid Build Coastguard Worker   // We try and flip a couple of bits and expect the test to die immediately.
232*6777b538SAndroid Build Coastguard Worker   // Checks are limited to every 15th byte, otherwise the tests run into
233*6777b538SAndroid Build Coastguard Worker   // time-outs.
234*6777b538SAndroid Build Coastguard Worker   for (size_t byte_index = 0; byte_index < sizeof(cpu); byte_index += 15) {
235*6777b538SAndroid Build Coastguard Worker     const size_t local_bit_index = byte_index % 8;
236*6777b538SAndroid Build Coastguard Worker     EXPECT_CHECK_DEATH_WITH(bytes[byte_index] ^= (0x01 << local_bit_index), "");
237*6777b538SAndroid Build Coastguard Worker   }
238*6777b538SAndroid Build Coastguard Worker }
239*6777b538SAndroid Build Coastguard Worker #endif
240