Home
last modified time | relevance | path

Searched full:l2 (Results 1 – 5 of 5) sorted by relevance

/kvm-unit-tests/lib/
H A Dstring.c103 size_t l1, l2; in strstr() local
105 l2 = strlen(s2); in strstr()
106 if (!l2) in strstr()
109 while (l1 >= l2) { in strstr()
111 if (!memcmp(s1, s2, l2)) in strstr()
/kvm-unit-tests/x86/
H A Dvmx_tests.c2110 /* Test that #UD is properly injected in L2. */ in disable_rdtscp_main()
2150 printf("Calling exit(0) from l2...\n"); in exit_monitor_from_l2_main()
5574 * If false, accessing the APIC access address from L2 is treated as a
5599 /* Good configs, where some L2 APIC accesses are virtualized. */ in apic_reg_virt_exit_expectation()
5706 /* Good configs, where some L2 APIC accesses are virtualized. */
5905 * L1 and L2 are in sync with each other, as expected. in apic_reg_virt_guest()
6056 /* Configs where L2 entry fails early, due to invalid controls. */ in configure_apic_reg_virt_test()
6540 * "activate secondary controls" (i.e. L2 gets access to L1's x2APIC
6563 * enable the "virtualize x2APIC mode" VM-execution control (i.e. L2
6585 * enable "APIC-register virtualization" --> L2 gets L1's x2APIC MSRs.
[all …]
H A Dsvm_tests.c1579 report_svm_guest(!virq_fired, test, "virtual IRQ blocked after L2 cli"); in virq_inject_test()
1583 report_svm_guest(virq_fired, test, "virtual IRQ fired after L2 sti"); in virq_inject_test()
1587 report_svm_guest(!virq_fired, test, "intercepted VINTR blocked after L2 cli"); in virq_inject_test()
1591 report_svm_guest(virq_fired, test, "intercepted VINTR fired after L2 sti"); in virq_inject_test()
2059 * after VM-exit from an L2 guest that sets CR4.OSXSAVE to a different
2813 /* If CR0.TS and CR0.EM are cleared in L2, no #NM is generated. */
3230 report(hit_ac, "Usermode #AC handled in L2"); in svm_l2_ac_test()
3256 "Handling %s in L2's exception handler", in svm_exception_handler()
3267 "%s handled by L2", exception_mnemonic(vector)); in handle_exception_in_l2()
H A Dvmx.c12 * 2. main function for codes running in L2 guest,
13 * 3. exit_handler to handle vmexit of L2 to L1
14 * 4. syscall handler to handle L2 syscall vmexit
24 * concurrent guest test environment with same paging for L2 and
2081 /* We want xAPIC mode to test MMIO passthrough from L1 (us) to L2. */ in main()
/kvm-unit-tests/lib/x86/
H A Dprocessor.h1021 /* If CR0.TS is set in L2, #NM is generated. */