/kvm-unit-tests/x86/ |
H A D | vmware_backdoors.c | 111 RDPMC_TEST("HOST_TSC user", VMWARE_BACKDOOR_PMC_HOST_TSC, 113 RDPMC_TEST("REAL_TIME user", VMWARE_BACKDOOR_PMC_REAL_TIME, 115 RDPMC_TEST("APPARENT_TIME user", VMWARE_BACKDOOR_PMC_APPARENT_TIME, 117 RDPMC_TEST("RANDOM PMC user", 0xfff, USER_MODE, FAULT), 119 PORT_TEST("CMD_GETVERSION user", VMWARE_BACKDOOR_PORT, VMWARE_MAGIC, 123 PORT_TEST("CMD_ILLEGAL user", VMWARE_BACKDOOR_PORT, VMWARE_MAGIC, 125 PORT_TEST("RANDOM port user", RANDOM_IO_PORT, VMWARE_MAGIC, 0xfff, 132 * from User Mode 163 /* Disable Permission to run rdpmc from user mode */ in check_vmware_backdoors()
|
H A D | smap.c | 75 "write from user page with SMAP=0, AC=0, WP=0, PTE.U=1 && PTE.W=0"); in check_smap_nowp() 83 "read from user page with SMAP=1, AC=0, WP=0, PTE.U=1 && PTE.W=0"); in check_smap_nowp() 113 // Present the same 8MB as user pages in the 8MB-16MB range in main() 138 report(pf_count == 0, "read from user page with AC=1"); in main() 144 "read from user page with AC=0"); in main() 151 "write to user page with AC=1"); in main() 157 "read from user page with AC=0"); in main() 174 "write to user stack with AC=1"); in main() 186 "write to user stack with AC=0"); in main() 194 report(pf_count == 0, "executing on user page with AC=0"); in main()
|
H A D | pku.c | 129 "write to user page when pkru is wd and wp == 0"); in main() 136 "write to user page when pkru is wd and wp == 1"); in main() 141 report(pf_count == 1 && save == 26, "read from user page when pkru is ad"); in main()
|
H A D | pks.c | 132 "write to user page when pkrs is wd and wp == 0"); in main() 139 "write to user page when pkrs is wd and wp == 1"); in main() 144 report(pf_count == 0, "read from user page when pkrs is ad"); in main()
|
H A D | access.c | 129 [AC_PTE_USER_BIT] = "pte.user", 137 [AC_PDE_USER_BIT] = "pde.user", 149 [AC_ACCESS_USER_BIT] = "user", 358 * USER when CR4.SMEP=1. in __ac_test_init() 419 * we can't switch to user mode. in ac_test_legal() 471 bool writable, bool user, in ac_test_permissions() argument 477 if (F(AC_ACCESS_USER) && !user) in ac_test_permissions() 486 if (F(AC_ACCESS_FETCH) && user && F(AC_CPU_CR4_SMEP)) in ac_test_permissions() 489 if (user && !F(AC_ACCESS_FETCH) && F(AC_PKU_PKEY) && F(AC_CPU_CR4_PKE)) { in ac_test_permissions() 511 bool user, writable, executable; in ac_emulate_access() local [all …]
|
H A D | lam.c | 58 * Bit 63 determines if the address should be treated as a user address in get_lam_mask() 234 * identical mapping, the linear address will be considered as user mode in test_lam_user()
|
H A D | cet.c | 114 printf("Unit test for CET user mode...\n"); in main()
|
H A D | svm.c | 311 /* NPT accesses are treated as "user" accesses. */ in setup_npt()
|
H A D | msr.c | 325 * If the user provided an MSR+value, test exactly that and skip all in main()
|
/kvm-unit-tests/lib/powerpc/ |
H A D | io.c | 45 bool user = in_usermode(); in puts() local 47 if (user) in puts() 53 if (user) in puts()
|
H A D | rtas.c | 141 assert_msg(!in_usermode(), "May not make RTAS call from user mode\n"); in rtas_call()
|
H A D | processor.c | 192 assert_msg(!(mfmsr() & MSR_PR), "enter_usermode called from user mode"); in enter_usermode()
|
/kvm-unit-tests/scripts/ |
H A D | check-patch.py | 26 # base for the user's branch. We thus need to figure out a common 27 # ancestor between the user's branch and current git master.
|
/kvm-unit-tests/lib/x86/ |
H A D | usermode.c | 61 /* IRET into user mode */ in run_in_user() 80 /* Call user mode function */ in run_in_user()
|
H A D | usermode.h | 19 * Run function in user mode
|
H A D | desc.c | 28 {0xffff, 0, 0, .type_limit_flags = 0xcffb}, /* 32-bit code segment (user) */ 29 {0xffff, 0, 0, .type_limit_flags = 0xcff3}, /* 32-bit data segment (user) */ 42 {0xffff, 0, 0, .type_limit_flags = 0xcffb}, /* 0x38 32-bit code segment (user) */ 43 {0xffff, 0, 0, .type_limit_flags = 0xcff3}, /* 0x40 32/64-bit data segment (user) */ 44 {0xffff, 0, 0, .type_limit_flags = 0xaffb}, /* 0x48 64-bit code segment (user) */
|
/kvm-unit-tests/ |
H A D | .gitlab-ci.yml | 50 selftest-vectors-user 65 selftest-vectors-user 79 selftest-vectors-user 110 selftest-vectors-user 125 selftest-vectors-user 138 selftest-setup selftest-vectors-kernel selftest-vectors-user selftest-smp
|
H A D | README | 158 when the user does not provide an environ, then an environ generated
|
H A D | README.md | 158 when the user does not provide an environ, then an environ generated
|
/kvm-unit-tests/arm/ |
H A D | unittests.cfg | 27 # Test vector setup and exception handling (user mode). 28 [selftest-vectors-user] 30 extra_params = -append 'vectors-user'
|
H A D | selftest.c | 83 * assume that that memory region could have been larger, if the user in check_pabt_init() 442 } else if (strcmp(argv[1], "vectors-user") == 0) { in main()
|
/kvm-unit-tests/riscv/ |
H A D | run | 12 # Allow user overrides of some config.mak variables
|
/kvm-unit-tests/lib/linux/ |
H A D | psci.h | 5 * by: ARM kernel, ARM64 kernel, KVM ARM/ARM64 and user space.
|
/kvm-unit-tests/lib/arm64/asm/ |
H A D | pgtable-hwdef.h | 110 #define PTE_UXN (_AT(pteval_t, 1) << 54) /* User XN */
|
/kvm-unit-tests/s390x/ |
H A D | pv-attest.c | 96 report(cc == 1 && uvcb.header.rc == 0x102, "invalid user data size"); in test_attest_v1()
|