From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: by sourceware.org (Postfix, from userid 2155) id 70759386F006; Thu, 18 Feb 2021 08:39:55 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 70759386F006 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="utf-8" From: Corinna Vinschen To: cygwin-cvs@sourceware.org Subject: [newlib-cygwin] cpuinfo: add AVX features; move SME, SEV/_ES features X-Act-Checkin: newlib-cygwin X-Git-Author: Brian Inglis X-Git-Refname: refs/heads/master X-Git-Oldrev: a8d99824bad67ebb855f53b32091d9cd253ebfc7 X-Git-Newrev: 038d4a78f9ac662430b10c01919fd3d8542b106f Message-Id: <20210218083955.70759386F006@sourceware.org> Date: Thu, 18 Feb 2021 08:39:55 +0000 (GMT) X-BeenThere: cygwin-cvs@cygwin.com X-Mailman-Version: 2.1.29 Precedence: list List-Id: Cygwin core component git logs List-Unsubscribe: , List-Archive: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 18 Feb 2021 08:39:55 -0000 https://sourceware.org/git/gitweb.cgi?p=newlib-cygwin.git;h=038d4a78f9ac662430b10c01919fd3d8542b106f commit 038d4a78f9ac662430b10c01919fd3d8542b106f Author: Brian Inglis Date: Wed Feb 17 09:28:36 2021 -0700 cpuinfo: add AVX features; move SME, SEV/_ES features Linux 5.11 💕 Valentine's Day Edition 💕 added features and changes: add Intel 0x00000007 EDX:23 avx512_fp16 and 0x00000007:1 EAX:4 avx_vnni; group scattered AMD 0x8000001f EAX Secure Mem/Encrypted Virt features at end: 0 sme, 1 sev, 3 sev_es (more to come not yet displayed) Diff: --- winsup/cygwin/fhandler_proc.cc | 44 ++++++++++++++++++++++-------------------- 1 file changed, 23 insertions(+), 21 deletions(-) diff --git a/winsup/cygwin/fhandler_proc.cc b/winsup/cygwin/fhandler_proc.cc index d4c8613eb..501c157da 100644 --- a/winsup/cygwin/fhandler_proc.cc +++ b/winsup/cygwin/fhandler_proc.cc @@ -1330,13 +1330,6 @@ format_proc_cpuinfo (void *, char *&destbuf) ftcprint (features1, 7, "hw_pstate"); /* hw P state */ ftcprint (features1, 11, "proc_feedback"); /* proc feedback interf */ } - /* cpuid 0x8000001f eax */ - if (maxe >= 0x8000001f) - { - cpuid (&features1, &unused, &unused, &unused, 0x8000001f); - - ftcprint (features1, 0, "sme"); /* secure memory encryption */ - } /* ftcprint (features1, 11, "pti");*//* Page Table Isolation reqd with Meltdown */ @@ -1370,14 +1363,6 @@ format_proc_cpuinfo (void *, char *&destbuf) /* from above */ ftcprint (features1, 6, "mba"); /* memory bandwidth alloc */ } - /* cpuid 0x8000001f eax */ - if (maxe >= 0x8000001f) - { - cpuid (&features2, &unused, &unused, &unused, 0x8000001f); - - ftcprint (features2, 1, "sev"); /* secure encrypted virt */ - /*ftcprint (features2, 3, "sev_es"); - print below */ - } /* cpuid 0x80000008 ebx */ if (maxe >= 0x80000008) { @@ -1401,12 +1386,6 @@ format_proc_cpuinfo (void *, char *&destbuf) /* ftcprint (features1, 26, "ssb_no"); *//* ssb fixed in hardware */ } - /* cpuid 0x8000001f eax - set above */ - if (maxe >= 0x8000001f) - { - ftcprint (features2, 3, "sev_es"); /* AMD SEV encrypted state */ - } - /* cpuid 0x00000007 ebx */ if (maxf >= 0x00000007) { @@ -1478,6 +1457,7 @@ format_proc_cpuinfo (void *, char *&destbuf) { cpuid (&features1, &unused, &unused, &unused, 0x00000007, 1); + ftcprint (features1, 4, "avx_vnni"); /* vex enc NN vec */ ftcprint (features1, 5, "avx512_bf16"); /* vec bfloat16 short */ } @@ -1539,6 +1519,7 @@ format_proc_cpuinfo (void *, char *&destbuf) ftcprint (features1, 13, "avic"); /* virt int control */ ftcprint (features1, 15, "v_vmsave_vmload"); /* virt vmsave vmload */ ftcprint (features1, 16, "vgif"); /* virt glb int flag */ +/* ftcprint (features1, 28, "svme_addr_chk"); *//* secure vmexit addr check */ } /* Intel cpuid 0x00000007 ecx */ @@ -1592,10 +1573,31 @@ format_proc_cpuinfo (void *, char *&destbuf) ftcprint (features1, 16, "tsxldtrk"); /* TSX Susp Ld Addr Track */ ftcprint (features1, 18, "pconfig"); /* platform config */ ftcprint (features1, 19, "arch_lbr"); /* last branch records */ + ftcprint (features1, 23, "avx512_fp16"); /* avx512 fp16 */ ftcprint (features1, 28, "flush_l1d"); /* flush l1d cache */ ftcprint (features1, 29, "arch_capabilities"); /* arch cap MSR */ } + /* cpuid x8000001f eax */ + if (is_amd && maxe >= 0x8000001f) + { + cpuid (&features2, &unused, &unused, &unused, 0x8000001f); + + ftcprint (features2, 0, "sme"); /* secure memory encryption */ + ftcprint (features2, 1, "sev"); /* AMD secure encrypted virt */ +/* ftcprint (features2, 2, "vm_page_flush");*/ /* VM page flush MSR */ + ftcprint (features2, 3, "sev_es"); /* AMD SEV encrypted state */ +/* ftcprint (features2, 4, "sev_snp");*//* AMD SEV secure nested paging */ +/* ftcprint (features2, 5, "vmpl"); *//* VM permission levels support */ +/* ftcprint (features2, 10, "sme_coherent"); *//* SME h/w cache coherent */ +/* ftcprint (features2, 11, "sev_64b");*//* SEV 64 bit host guest only */ +/* ftcprint (features2, 12, "sev_rest_inj"); *//* SEV restricted injection */ +/* ftcprint (features2, 13, "sev_alt_inj"); *//* SEV alternate injection */ +/* ftcprint (features2, 14, "sev_es_dbg_swap");*//* SEV-ES debug state swap */ +/* ftcprint (features2, 15, "no_host_ibs"); *//* host IBS unsupported */ +/* ftcprint (features2, 16, "vte"); *//* virtual transparent encryption */ + } + print ("\n"); bufptr += __small_sprintf (bufptr, "bogomips\t: %d.00\n",