Searched full:l2 (Results 1 – 5 of 5) sorted by relevance
/kvm-unit-tests/lib/ |
H A D | string.c | 103 size_t l1, l2; in strstr() local 105 l2 = strlen(s2); in strstr() 106 if (!l2) in strstr() 109 while (l1 >= l2) { in strstr() 111 if (!memcmp(s1, s2, l2)) in strstr()
|
/kvm-unit-tests/x86/ |
H A D | vmx_tests.c | 2110 /* Test that #UD is properly injected in L2. */ in disable_rdtscp_main() 2150 printf("Calling exit(0) from l2...\n"); in exit_monitor_from_l2_main() 5574 * If false, accessing the APIC access address from L2 is treated as a 5599 /* Good configs, where some L2 APIC accesses are virtualized. */ in apic_reg_virt_exit_expectation() 5706 /* Good configs, where some L2 APIC accesses are virtualized. */ 5905 * L1 and L2 are in sync with each other, as expected. in apic_reg_virt_guest() 6056 /* Configs where L2 entry fails early, due to invalid controls. */ in configure_apic_reg_virt_test() 6540 * "activate secondary controls" (i.e. L2 gets access to L1's x2APIC 6563 * enable the "virtualize x2APIC mode" VM-execution control (i.e. L2 6585 * enable "APIC-register virtualization" --> L2 gets L1's x2APIC MSRs. [all …]
|
H A D | svm_tests.c | 1579 report_svm_guest(!virq_fired, test, "virtual IRQ blocked after L2 cli"); in virq_inject_test() 1583 report_svm_guest(virq_fired, test, "virtual IRQ fired after L2 sti"); in virq_inject_test() 1587 report_svm_guest(!virq_fired, test, "intercepted VINTR blocked after L2 cli"); in virq_inject_test() 1591 report_svm_guest(virq_fired, test, "intercepted VINTR fired after L2 sti"); in virq_inject_test() 2059 * after VM-exit from an L2 guest that sets CR4.OSXSAVE to a different 2813 /* If CR0.TS and CR0.EM are cleared in L2, no #NM is generated. */ 3230 report(hit_ac, "Usermode #AC handled in L2"); in svm_l2_ac_test() 3256 "Handling %s in L2's exception handler", in svm_exception_handler() 3267 "%s handled by L2", exception_mnemonic(vector)); in handle_exception_in_l2()
|
H A D | vmx.c | 12 * 2. main function for codes running in L2 guest, 13 * 3. exit_handler to handle vmexit of L2 to L1 14 * 4. syscall handler to handle L2 syscall vmexit 24 * concurrent guest test environment with same paging for L2 and 2081 /* We want xAPIC mode to test MMIO passthrough from L1 (us) to L2. */ in main()
|
/kvm-unit-tests/lib/x86/ |
H A D | processor.h | 1021 /* If CR0.TS is set in L2, #NM is generated. */
|