/kvm-unit-tests/x86/ |
H A D | svm.h | 378 void (*prepare)(struct svm_test *test); 379 void (*prepare_gif_clear)(struct svm_test *test); 380 void (*guest_func)(struct svm_test *test); 381 bool (*finished)(struct svm_test *test); 382 bool (*succeeded)(struct svm_test *test); 385 /* Alternative test interface. */ 425 void default_prepare(struct svm_test *test); 426 void default_prepare_gif_clear(struct svm_test *test); 427 bool default_finished(struct svm_test *test); 430 int get_test_stage(struct svm_test *test); [all …]
|
H A D | lam.c | 2 * Intel LAM unit test 100 * This test case is only triggered when LAM_U57 is active and 4-level in test_ptr() 181 /* Test for normal memory. */ in __test_lam_sup() 183 /* Test for MMIO to trigger instruction emulation. */ in __test_lam_sup() 203 * range is allocated in this test. in test_lam_sup() 213 /* Test without LAM Supervisor enabled. */ in test_lam_sup() 216 /* Test with LAM Supervisor enabled, if supported. */ in test_lam_sup() 267 /* If !has_lam, it has been tested above, no need to test again. */ in test_lam_user()
|
H A D | access_test.c | 10 printf("starting test\n\n"); in main() 19 printf("starting 5-level paging test.\n\n"); in main()
|
H A D | debug.c | 2 * Test for x86 debugging facilities 97 static void __run_single_step_db_test(db_test_fn test, db_report_fn report_fn) in __run_single_step_db_test() argument 105 start = test(); in __run_single_step_db_test() 109 * MOV DR #GPs at CPL>0, don't try to run the DR7.GD test in usermode. in __run_single_step_db_test() 112 if (test == singlestep_with_movss_blocking_and_dr7_gd in __run_single_step_db_test() 113 || test == singlestep_with_sti_hlt) in __run_single_step_db_test() 120 * Run the test in usermode. Use the expected start RIP from the first in __run_single_step_db_test() 122 * RIP out of the test, and it shouldn't change in any case. Run the in __run_single_step_db_test() 123 * test with IOPL=3 so that it can use OUT, CLI, STI, etc... in __run_single_step_db_test() 126 run_in_user((usermode_func)test, GP_VECTOR, 0, 0, 0, 0, &ign); in __run_single_step_db_test() [all …]
|
H A D | la57.c | 147 /* Write the test value*/ in test_register_write() 156 * Check that the value was really written. Don't test TR and LDTR, in test_register_write() 171 * Restore the old value directly without safety wrapper, to avoid test in test_register_write() 224 * Note that this test tests the kvm's behavior only when ept=0. in test_invpcid() 239 printf("\nRunning canonical test %s forced emulation:\n", in __test_canonical_checks() 265 * metal from within this test. E.g. checking HYPERVISOR in CPUID is in __test_canonical_checks() 305 /* Test that INVPCID type 0 #GPs correctly */ in __test_canonical_checks()
|
H A D | amd_sev.c | 2 * AMD SEV test cases 30 printf("SEV activation test is loaded.\n"); in test_sev_activation() 93 report(rtn == EXIT_SUCCESS, "SEV activation test."); in main()
|
H A D | kvmclock_test.c | 19 volatile cycle_t last; /* last cycle seen by test */ 94 printf("Test loops: %ld\n", loops); in cycle_test() 125 printf("Wallclock test, threshold %ld\n", threshold); in main() 140 printf("Monotonic cycle test:\n"); in main()
|
H A D | tsc.c | 19 report(ecx == aux, "Test RDTSCP %" PRIu64, aux); in test_rdtscp() 28 report(eax == aux, "Test rdpid %%eax %" PRId64, aux); in test_rdpid()
|
H A D | vmx_tests.c | 2 * All test cases of nested virtualization should be in this file 75 report_pass("Basic VMX test"); in basic_guest_main() 80 report_fail("Basic VMX test"); in basic_exit_handler() 90 report_pass("test vmlaunch"); in vmenter_main() 100 report((rax == 0xFFFF) && (rsp == resume_rsp), "test vmresume"); in vmenter_main() 110 report_fail("test vmresume"); in vmenter_exit_handler() 117 report_fail("test vmresume"); in vmenter_exit_handler() 453 // Test read through in cr_shadowing_main() 466 // Test write through in cr_shadowing_main() 481 // Test read shadow in cr_shadowing_main() [all …]
|
H A D | access.c | 13 /* Test code/data is at 32MiB, paging structures at 33MiB. */ 35 * test case. The main test will bump a counter by 1 to run all permutations 36 * of the below test cases (sans illegal combinations). 39 * toggled on every test, e.g. to keep entries in the TLB. 63 * special test case to DISABLE writable bit on page directory 336 * Each test needs at most pt_levels-1 structures per virtual address, in ac_test_alloc_pt() 355 * The test infrastructure, e.g. this function, must use a different in __ac_test_init() 356 * top-level SPTE than the test, otherwise modifying SPTEs can affect in __ac_test_init() 357 * normal behavior, e.g. crash the test due to marking code SPTEs in __ac_test_init() 375 * sub-test. This allows runtime PTE modification to assert that two in __ac_test_init() [all …]
|
/kvm-unit-tests/lib/ |
H A D | alloc.h | 4 * alloc supplies three ingredients to the test framework that are all 8 * friends. Using wrappers allows test code and common code to use the 14 * used almost immediately by the test framework.
|
H A D | migrate.c | 23 * migration stress testing without polluting logs. Test cases should 48 * When the test has been started in migration mode, but the test case is
|
/kvm-unit-tests/lib/x86/ |
H A D | fault_test.c | 48 void test_run(struct fault_test *test) in test_run() argument 50 bool passed = fault_test(&(test->arg)); in test_run() 52 report(passed, "%s", test->name); in test_run()
|
H A D | amd_sev.c | 29 /* Test if we can query SEV features */ in amd_sev_enabled() 35 /* Test if SEV is supported */ in amd_sev_enabled() 41 /* Test if SEV is enabled */ in amd_sev_enabled() 82 /* Test if SEV-ES is enabled */ in amd_sev_es_enabled()
|
/kvm-unit-tests/s390x/ |
H A D | sie-dat.c | 32 /* guest will tell us the guest physical address of the test buffer */ in test_sie_dat() 38 report_info("test buffer gpa=0x%lx hva=%p", test_page_gpa, test_page_hva); in test_sie_dat() 40 /* guest will now write to the test buffer and we verify the contents */ in test_sie_dat() 53 report(contents_match, "test buffer contents match"); in test_sie_dat()
|
H A D | intercept.c | 24 /* Test the STORE PREFIX instruction */ 52 /* Test the SET PREFIX instruction */ 92 * Cannot test inaccessibility of the second page the same way. in test_spx() 106 /* Test the STORE CPU ADDRESS instruction */ 129 /* Test the STORE CPU ID instruction */ 154 /* Test the TEST BLOCK instruction */
|
H A D | panic-loop-pgm.c | 3 * Program interrupt loop test 21 report_skip("QEMU-KVM-only test"); in main()
|
H A D | stsi.c | 96 const char vm_name_ext[] = "kvm-unit-test"; in test_3_2_2() 103 report_skip("Running under lpar, no level 3 to test."); in test_3_2_2() 123 "VM name == kvm-unit-test"); in test_3_2_2() 130 "ext VM name == kvm-unit-test"); in test_3_2_2()
|
H A D | panic-loop-extint.c | 3 * External interrupt loop test 37 report_skip("QEMU-KVM-only test"); in main()
|
/kvm-unit-tests/ |
H A D | run_tests.sh | 26 -t, --tap13 Output test results in TAP format 48 # Shellcheck likes to test commands directly rather than with $? but sometimes they 49 # are too long to put in the same test. 152 # wait for any background test to finish 197 test "$tap_output" == "yes" && exec > /dev/null
|
/kvm-unit-tests/x86/efi/ |
H A D | run | 46 # Run test case with 256MiB QEMU memory. QEMU default memory size is 128MiB. 48 # memory region is ~42MiB. Although this is sufficient for many test cases to 49 # run in UEFI, some test cases, e.g. `x86/pmu.c`, require more free memory. A
|
/kvm-unit-tests/scripts/s390x/ |
H A D | func.bash | 21 # run the normal test case 24 # run PV test case
|
/kvm-unit-tests/powerpc/ |
H A D | tm.c | 72 * Test H_CEDE call while transactional memory transaction is suspended 78 * If the test passes then your kernel probably has the necessary patch. 79 * If the test fails then the H_CEDE call was unsuccessful and the 81 * If the test hits the vulnerability then it will never complete or report and
|
H A D | spapr_hcall.c | 2 * Test sPAPR hypervisor calls (aka. h-calls) 20 * Test the H_SET_SPRG0 h-call by setting some values and checking whether 50 * Test the H_PAGE_INIT h-call by using it to clear and to copy a page, and 101 * Test H_RANDOM by calling it a couple of times to check whether all bit
|
/kvm-unit-tests/riscv/ |
H A D | sbi.c | 45 puts("Test SBI\n"); in help() 280 const char *mask_test_str = mask_timer_irq ? " for mask irq test" : ""; in timer_check_set_timer() 339 report_skip("timer irq enable bit is not writable, skipping mask irq test"); in check_time() 349 report_skip("timer is not pending, skipping timer cleared while masked test"); in check_time() 511 /* Test no targets */ in check_ipi() 627 /* This test function is only being run on RV64 to verify that upper bits of suspend_type are ignor… 635 /* This test function is only being run on RV64 to verify that upper bits of suspend_type are ignor… 796 report_fail("failed to start test on cpu%d (hartid = %lx) (error=%ld)", cpu, hartid, ret.error); in check_hsm() 824 report_info("satp is not zero for test on cpu%d (hartid = %lx)", cpu, hartid); in check_hsm() 826 report_info("sstatus.SIE is not zero for test on cpu%d (hartid = %lx)", cpu, hartid); in check_hsm() [all …]
|