/kvm-unit-tests/lib/libfdt/ |
H A D | libfdt_internal.h | 91 * This does essentially no checks. Only the latest device-tree 117 * Note: Only checks that relate exclusively to the device tree itself 136 * This disables checks for device-tree version and removes all code 170 * drops certain checks that should never be needed unless libfdt has an
|
H A D | fdt.c | 14 * Minimal sanity check for a read-only tree. fdt_ro_probe_() checks
|
/kvm-unit-tests/lib/powerpc/asm/ |
H A D | hcall.h | 39 * hcall_have_broken_sc1 checks if we're on a host with a broken sc1.
|
/kvm-unit-tests/x86/ |
H A D | la57.c | 256 * SYSENTER ESP/EIP MSRs have canonical checks only on Intel, because in __test_canonical_checks() 259 * KVM emulation however ignores canonical checks for these MSRs, even in __test_canonical_checks() 263 * Thus, the checks only work when run on bare metal, without forced in __test_canonical_checks()
|
H A D | msr.c | 132 * canonical checks on both Intel and AMD. in test_msr() 198 * enforce checks on bits 63:36 for 32-bit hosts. The behavior in test_mce_msrs()
|
H A D | vmx_tests.c | 1043 * the various EPTP consistency checks, but doesn't ensure backing for HPA '0'. 3356 * consistency checks and generates a VM-Exit, then the test is doomed in test_vmx_vmlaunch_must_fail() 3365 * at least as far as the guest-state checks. Returns false if the 3533 * 1-setting of that control), no checks are performed on the 3557 * is clear, there are no checks on the secondary controls. in test_secondary_processor_based_ctls() 3743 * address must satisfy the following checks: 3766 * APIC-access address must satisfy the following checks: 4510 * This test covers the following two VM entry checks: 4608 * This test verifies the following two vmentry checks: 4705 * control field must satisfy the following checks: [all …]
|
H A D | svm_tests.c | 510 /* Do sanity checks */ in mode_switch_finished() 2385 * Note: Unallocated MSRPM addresses conforming to consistency checks, generate 2878 * it does a branch, and then disables the LBR and then checks. in svm_lbrv_test_guest1() 2899 * enables it, does a branch, disables it and then checks. in svm_lbrv_test_guest2()
|
H A D | vmx.c | 1099 /* 26.2 CHECKS ON VMX CONTROLS AND HOST-STATE AREA */ in init_vmcs_ctrl() 1115 /* 26.2 CHECKS ON VMX CONTROLS AND HOST-STATE AREA */ in init_vmcs_host()
|
H A D | pmu.c | 226 * Skip the precise checks on AMD, as AMD CPUs count VMRUN as a branch in adjust_events_range()
|
H A D | access.c | 433 * pde.bit13 checks handling of reserved bits in largepage PDEs. It is in ac_test_legal()
|
/kvm-unit-tests/scripts/ |
H A D | check-patch.py | 47 print("\nNo commits since %s, skipping checks\n" % ancestor)
|
H A D | checkpatch.pl | 400 # skip TAB size 1 to avoid additional checks on $tabsize - 1 3653 # This only checks context lines in the patch 4305 # Checks which may be anchored in the context. 4583 # Checks which are anchored on the added line. 7225 # checks for new __setup's 7766 (($check)? "$cnt_chk checks, " : "") .
|
/kvm-unit-tests/arm/ |
H A D | fpu.c | 323 * CPU0 corrupts/overwrites the data and finally CPU1 checks 352 * CPU1 corrupts/overwrites the data and finally CPU0 checks if 380 * Checks if during context switch, FPU/SIMD registers 390 * Checks if during context switch, SVE registers
|
H A D | pmu.c | 759 * This test checks that a mem access loop featuring COUNT accesses 1024 * overflow_at_64bits case just checks that chained counters are in test_overflow_interrupt() 1111 * nonzero CPI parameter, it also strictly checks that every measurement matches
|
/kvm-unit-tests/s390x/ |
H A D | spec_ex-sie.c | 6 * Checks that specification exception interceptions occur as expected when
|
H A D | Makefile | 90 CFLAGS += -fno-delete-null-pointer-checks 199 # Newer version of the genprotimg command checks if the given image/kernel is a
|
H A D | intercept.c | 85 /* TODO: Remove host_is_tcg() checks once CIs are using QEMU >= 7.1 */ in test_spx()
|
H A D | edat.c | 183 * The testcase checks if the memory at virtual 0 has the same in test_edat1()
|
H A D | uv-host.c | 49 * Checks if a memory area is protected as secure memory. 405 /* This function purely checks for error rcs */ in cgc_check_data()
|
H A D | topology.c | 405 * calls specific checks on the information buffer.
|
/kvm-unit-tests/lib/s390x/ |
H A D | smp.c | 173 * and the restart in the test that checks if the cpu is in smp_cpu_restart_nolock()
|
/kvm-unit-tests/lib/powerpc/ |
H A D | setup.c | 103 bool cpu_has_power_mce; /* POWER CPU machine checks */
|
/kvm-unit-tests/riscv/ |
H A D | sbi.c | 819 … report_info("hsm timer fired before cpu%d (hartid = %lx) is done with start checks", cpu, hartid); in check_hsm() 976 report_info("hsm timer fired before hart %ld is done with non-retentive resume checks", hartid); in check_hsm() 1111 …sm timer fired before cpu%d (hartid = %lx) is done with non-retentive resume checks", cpu, hartid); in check_hsm()
|
/kvm-unit-tests/lib/s390x/asm/ |
H A D | cpacf.h | 256 * and checks if @func is available
|
/kvm-unit-tests/lib/ |
H A D | alloc_page.c | 476 /* other basic sanity checks */ in _page_alloc_init_area()
|