/kvm-unit-tests/lib/ppc64/asm/ |
H A D | pgtable-hwdef.h | 43 #define _PAGE_WRITE 0x00002 /* write access allowed */ 44 #define _PAGE_READ 0x00004 /* read access allowed */ 45 #define _PAGE_PRIVILEGED 0x00008 /* kernel access only */ 46 #define _PAGE_SAO 0x00010 /* Strong access order */
|
/kvm-unit-tests/x86/ |
H A D | README | 25 access: lots of page table related access (pte/pde) (read/write) 33 sieve: heavy memory access with no paging and with paging static and
|
H A D | access_test.c | 4 #include "access.h"
|
H A D | access.c | 6 #include "access.h" 34 * Page table access check tests. Each number/bit represent an individual 875 "unexpected access"); in ac_test_do_access() 984 * If the write-fault access is from supervisor and CR0.WP is not set on the 985 * vcpu, kvm will fix it by adjusting pte access - it sets the W bit on pte 986 * and clears U bit. This is the chance that kvm can change pte access from 989 * Unfortunately, the pte access is the access of 'direct' shadow page table, 990 * means direct sp.role.access = pte_access, then we will create a writable 1100 * the access test and toggle EFER.NX to coerce KVM into rebuilding in do_cr0_wp_access() 1181 printf("%s: read access at1 fail\n", __FUNCTION__); in check_effective_sp_permissions() [all …]
|
H A D | lam.c | 90 report(!fault, "Expected access to untagged address for %s to succeed", in test_ptr() 95 report(fault != lam_active, "Expected access to tagged address for %s %s LAM to %s", in test_ptr() 106 report(fault, "Expected access to non-LAM-canonical address for %s to #GP", in test_ptr()
|
H A D | Makefile.common | 114 $(TEST_DIR)/access_test.$(bin): $(TEST_DIR)/access.o 116 $(TEST_DIR)/vmx.$(bin): $(TEST_DIR)/access.o
|
H A D | taskswitch2.c | 68 if (*error_code == 0x2) /* write access, not present */ in do_pf_tss() 189 printf("Access unmapped page\n"); in test_kernel_mode_int()
|
/kvm-unit-tests/s390x/ |
H A D | skey.c | 163 enum access { enum 174 static void check_key_prot_exc(enum access access, enum protection prot) in check_key_prot_exc() argument 189 /* no access code in case of key protection */ in check_key_prot_exc() 199 report_pass("valid access code"); in check_key_prot_exc() 203 report((access & access_code) && (prot & access_code), in check_key_prot_exc() 204 "valid access code"); in check_key_prot_exc() 213 report_fail("valid access code"); in check_key_prot_exc() 230 * with access key 1. 333 * with access key 1. 442 * with access key 1. [all …]
|
H A D | mvpg.c | 81 * Check that the Operand Access Identification matches with the values of 88 * Operand Access Identification. 226 report(check_oai(), "operand access ident"); in test_mmu_prot() 236 report(check_oai(), "operand access ident"); in test_mmu_prot()
|
H A D | diag258.c | 170 * If diag258 would not be applying prefixing on access to in test_refbk_prefixing() 171 * refbk_in_reverse_prefix correctly, it would access absolute address in test_refbk_prefixing()
|
H A D | macros.S | 51 * access all fprs to save them.
|
/kvm-unit-tests/lib/arm/asm/ |
H A D | sysreg.h | 29 #define CR_HA (1 << 17) /* Hardware management of Access Flag */ 33 #define CR_U (1 << 22) /* Unaligned access operation */ 38 #define CR_AFE (1 << 29) /* Access flag enable */
|
H A D | arch_gicv3.h | 53 * We may access GICR_TYPER and GITS_TYPER by reading both the TYPER
|
/kvm-unit-tests/lib/s390x/ |
H A D | fault.c | 25 if (teid.sop_teid_predictable) {/* implies access list or DAT */ in print_decode_pgm_prot() 65 printf("Access Register\n"); in print_decode_teid()
|
H A D | malloc_io.c | 10 * Using this interface provide host access to the allocated pages in
|
/kvm-unit-tests/arm/ |
H A D | unittests.cfg | 69 [pmu-mem-access] 73 extra_params = -append 'pmu-mem-access' 75 [pmu-mem-access-reliability] 79 extra_params = -append 'pmu-mem-access-reliability'
|
H A D | Makefile.arm | 15 CFLAGS += -mno-unaligned-access
|
H A D | mte.c | 51 * to access a tagged address, the compiler will reasonably assume 52 * that the access succeeded, and the next instruction may do 55 * But a test might want the tagged access to fail on purpose, and if
|
H A D | pmu.c | 577 /* We may measure more than 20 mem access depending on the core */ in test_mem_access() 759 * This test checks that a mem access loop featuring COUNT accesses 761 * records the min/max access count to see how much the counting 1063 /* init before event access, this test only cares about cycle count */ in check_cycles_increase() 1118 /* init before event access, this test only cares about cycle count */ in check_cpi() 1262 } else if (strcmp(argv[1], "pmu-mem-access-reliability") == 0) { in main() 1265 } else if (strcmp(argv[1], "pmu-mem-access") == 0) { in main()
|
/kvm-unit-tests/lib/ |
H A D | pci.h | 4 * API for scanning a PCI bus for a given device, as well to access 49 * @bar_num in all BAR access functions below is the index of the 32-bit
|
/kvm-unit-tests/ci/ |
H A D | cirrus-ci-fedora.yml | 23 access
|
/kvm-unit-tests/lib/s390x/asm/ |
H A D | facility.h | 64 if (test_facility(131)) /* side-effect-access facility */ in get_supp_on_prot_facility()
|
/kvm-unit-tests/ |
H A D | errata.txt | 5 9e3f7a296940 : 4.9 : arm64: KVM: pmu: Fix AArch32 cycle counter access
|
/kvm-unit-tests/powerpc/ |
H A D | sprs.c | 113 uint16_t access; member 356 return !!(sprs[spr].access & SPR_HV_READ); in spr_read_perms() 358 return !!(sprs[spr].access & SPR_OS_READ); in spr_read_perms() 364 return !!(sprs[spr].access & SPR_HV_WRITE); in spr_write_perms() 366 return !!(sprs[spr].access & SPR_OS_WRITE); in spr_write_perms()
|
H A D | interrupts.c | 82 /* KVM does not MCE on access outside partition scope */ in test_mce() 83 report_kfail(host_is_kvm, got_interrupt, "MCE on access to invalid real address"); in test_mce() 93 /* KVM does not MCE on access outside partition scope */ in test_mce()
|