Home
last modified time | relevance | path

Searched full:access (Results 1 – 25 of 51) sorted by relevance

123

/kvm-unit-tests/lib/ppc64/asm/
H A Dpgtable-hwdef.h43 #define _PAGE_WRITE 0x00002 /* write access allowed */
44 #define _PAGE_READ 0x00004 /* read access allowed */
45 #define _PAGE_PRIVILEGED 0x00008 /* kernel access only */
46 #define _PAGE_SAO 0x00010 /* Strong access order */
/kvm-unit-tests/x86/
H A DREADME25 access: lots of page table related access (pte/pde) (read/write)
33 sieve: heavy memory access with no paging and with paging static and
H A Daccess_test.c4 #include "access.h"
H A Daccess.c6 #include "access.h"
34 * Page table access check tests. Each number/bit represent an individual
875 "unexpected access"); in ac_test_do_access()
984 * If the write-fault access is from supervisor and CR0.WP is not set on the
985 * vcpu, kvm will fix it by adjusting pte access - it sets the W bit on pte
986 * and clears U bit. This is the chance that kvm can change pte access from
989 * Unfortunately, the pte access is the access of 'direct' shadow page table,
990 * means direct sp.role.access = pte_access, then we will create a writable
1100 * the access test and toggle EFER.NX to coerce KVM into rebuilding in do_cr0_wp_access()
1181 printf("%s: read access at1 fail\n", __FUNCTION__); in check_effective_sp_permissions()
[all …]
H A Dlam.c90 report(!fault, "Expected access to untagged address for %s to succeed", in test_ptr()
95 report(fault != lam_active, "Expected access to tagged address for %s %s LAM to %s", in test_ptr()
106 report(fault, "Expected access to non-LAM-canonical address for %s to #GP", in test_ptr()
H A DMakefile.common114 $(TEST_DIR)/access_test.$(bin): $(TEST_DIR)/access.o
116 $(TEST_DIR)/vmx.$(bin): $(TEST_DIR)/access.o
H A Dtaskswitch2.c68 if (*error_code == 0x2) /* write access, not present */ in do_pf_tss()
189 printf("Access unmapped page\n"); in test_kernel_mode_int()
/kvm-unit-tests/s390x/
H A Dskey.c163 enum access { enum
174 static void check_key_prot_exc(enum access access, enum protection prot) in check_key_prot_exc() argument
189 /* no access code in case of key protection */ in check_key_prot_exc()
199 report_pass("valid access code"); in check_key_prot_exc()
203 report((access & access_code) && (prot & access_code), in check_key_prot_exc()
204 "valid access code"); in check_key_prot_exc()
213 report_fail("valid access code"); in check_key_prot_exc()
230 * with access key 1.
333 * with access key 1.
442 * with access key 1.
[all …]
H A Dmvpg.c81 * Check that the Operand Access Identification matches with the values of
88 * Operand Access Identification.
226 report(check_oai(), "operand access ident"); in test_mmu_prot()
236 report(check_oai(), "operand access ident"); in test_mmu_prot()
H A Ddiag258.c170 * If diag258 would not be applying prefixing on access to in test_refbk_prefixing()
171 * refbk_in_reverse_prefix correctly, it would access absolute address in test_refbk_prefixing()
H A Dmacros.S51 * access all fprs to save them.
/kvm-unit-tests/lib/arm/asm/
H A Dsysreg.h29 #define CR_HA (1 << 17) /* Hardware management of Access Flag */
33 #define CR_U (1 << 22) /* Unaligned access operation */
38 #define CR_AFE (1 << 29) /* Access flag enable */
H A Darch_gicv3.h53 * We may access GICR_TYPER and GITS_TYPER by reading both the TYPER
/kvm-unit-tests/lib/s390x/
H A Dfault.c25 if (teid.sop_teid_predictable) {/* implies access list or DAT */ in print_decode_pgm_prot()
65 printf("Access Register\n"); in print_decode_teid()
H A Dmalloc_io.c10 * Using this interface provide host access to the allocated pages in
/kvm-unit-tests/arm/
H A Dunittests.cfg69 [pmu-mem-access]
73 extra_params = -append 'pmu-mem-access'
75 [pmu-mem-access-reliability]
79 extra_params = -append 'pmu-mem-access-reliability'
H A DMakefile.arm15 CFLAGS += -mno-unaligned-access
H A Dmte.c51 * to access a tagged address, the compiler will reasonably assume
52 * that the access succeeded, and the next instruction may do
55 * But a test might want the tagged access to fail on purpose, and if
H A Dpmu.c577 /* We may measure more than 20 mem access depending on the core */ in test_mem_access()
759 * This test checks that a mem access loop featuring COUNT accesses
761 * records the min/max access count to see how much the counting
1063 /* init before event access, this test only cares about cycle count */ in check_cycles_increase()
1118 /* init before event access, this test only cares about cycle count */ in check_cpi()
1262 } else if (strcmp(argv[1], "pmu-mem-access-reliability") == 0) { in main()
1265 } else if (strcmp(argv[1], "pmu-mem-access") == 0) { in main()
/kvm-unit-tests/lib/
H A Dpci.h4 * API for scanning a PCI bus for a given device, as well to access
49 * @bar_num in all BAR access functions below is the index of the 32-bit
/kvm-unit-tests/ci/
H A Dcirrus-ci-fedora.yml23 access
/kvm-unit-tests/lib/s390x/asm/
H A Dfacility.h64 if (test_facility(131)) /* side-effect-access facility */ in get_supp_on_prot_facility()
/kvm-unit-tests/
H A Derrata.txt5 9e3f7a296940 : 4.9 : arm64: KVM: pmu: Fix AArch32 cycle counter access
/kvm-unit-tests/powerpc/
H A Dsprs.c113 uint16_t access; member
356 return !!(sprs[spr].access & SPR_HV_READ); in spr_read_perms()
358 return !!(sprs[spr].access & SPR_OS_READ); in spr_read_perms()
364 return !!(sprs[spr].access & SPR_HV_WRITE); in spr_write_perms()
366 return !!(sprs[spr].access & SPR_OS_WRITE); in spr_write_perms()
H A Dinterrupts.c82 /* KVM does not MCE on access outside partition scope */ in test_mce()
83 report_kfail(host_is_kvm, got_interrupt, "MCE on access to invalid real address"); in test_mce()
93 /* KVM does not MCE on access outside partition scope */ in test_mce()

123