Home
last modified time | relevance | path

Searched full:user (Results 1 – 25 of 37) sorted by relevance

12

/kvm-unit-tests/x86/
H A Dvmware_backdoors.c111 RDPMC_TEST("HOST_TSC user", VMWARE_BACKDOOR_PMC_HOST_TSC,
113 RDPMC_TEST("REAL_TIME user", VMWARE_BACKDOOR_PMC_REAL_TIME,
115 RDPMC_TEST("APPARENT_TIME user", VMWARE_BACKDOOR_PMC_APPARENT_TIME,
117 RDPMC_TEST("RANDOM PMC user", 0xfff, USER_MODE, FAULT),
119 PORT_TEST("CMD_GETVERSION user", VMWARE_BACKDOOR_PORT, VMWARE_MAGIC,
123 PORT_TEST("CMD_ILLEGAL user", VMWARE_BACKDOOR_PORT, VMWARE_MAGIC,
125 PORT_TEST("RANDOM port user", RANDOM_IO_PORT, VMWARE_MAGIC, 0xfff,
132 * from User Mode
163 /* Disable Permission to run rdpmc from user mode */ in check_vmware_backdoors()
H A Dsmap.c75 "write from user page with SMAP=0, AC=0, WP=0, PTE.U=1 && PTE.W=0"); in check_smap_nowp()
83 "read from user page with SMAP=1, AC=0, WP=0, PTE.U=1 && PTE.W=0"); in check_smap_nowp()
113 // Present the same 8MB as user pages in the 8MB-16MB range in main()
138 report(pf_count == 0, "read from user page with AC=1"); in main()
144 "read from user page with AC=0"); in main()
151 "write to user page with AC=1"); in main()
157 "read from user page with AC=0"); in main()
174 "write to user stack with AC=1"); in main()
186 "write to user stack with AC=0"); in main()
194 report(pf_count == 0, "executing on user page with AC=0"); in main()
H A Dpku.c129 "write to user page when pkru is wd and wp == 0"); in main()
136 "write to user page when pkru is wd and wp == 1"); in main()
141 report(pf_count == 1 && save == 26, "read from user page when pkru is ad"); in main()
H A Dpks.c132 "write to user page when pkrs is wd and wp == 0"); in main()
139 "write to user page when pkrs is wd and wp == 1"); in main()
144 report(pf_count == 0, "read from user page when pkrs is ad"); in main()
H A Daccess.c129 [AC_PTE_USER_BIT] = "pte.user",
137 [AC_PDE_USER_BIT] = "pde.user",
149 [AC_ACCESS_USER_BIT] = "user",
358 * USER when CR4.SMEP=1. in __ac_test_init()
419 * we can't switch to user mode. in ac_test_legal()
471 bool writable, bool user, in ac_test_permissions() argument
477 if (F(AC_ACCESS_USER) && !user) in ac_test_permissions()
486 if (F(AC_ACCESS_FETCH) && user && F(AC_CPU_CR4_SMEP)) in ac_test_permissions()
489 if (user && !F(AC_ACCESS_FETCH) && F(AC_PKU_PKEY) && F(AC_CPU_CR4_PKE)) { in ac_test_permissions()
511 bool user, writable, executable; in ac_emulate_access() local
[all …]
H A Dlam.c58 * Bit 63 determines if the address should be treated as a user address in get_lam_mask()
234 * identical mapping, the linear address will be considered as user mode in test_lam_user()
H A Dcet.c114 printf("Unit test for CET user mode...\n"); in main()
H A Dsvm.c311 /* NPT accesses are treated as "user" accesses. */ in setup_npt()
H A Dmsr.c325 * If the user provided an MSR+value, test exactly that and skip all in main()
/kvm-unit-tests/lib/powerpc/
H A Dio.c45 bool user = in_usermode(); in puts() local
47 if (user) in puts()
53 if (user) in puts()
H A Drtas.c141 assert_msg(!in_usermode(), "May not make RTAS call from user mode\n"); in rtas_call()
H A Dprocessor.c192 assert_msg(!(mfmsr() & MSR_PR), "enter_usermode called from user mode"); in enter_usermode()
/kvm-unit-tests/scripts/
H A Dcheck-patch.py26 # base for the user's branch. We thus need to figure out a common
27 # ancestor between the user's branch and current git master.
/kvm-unit-tests/lib/x86/
H A Dusermode.c61 /* IRET into user mode */ in run_in_user()
80 /* Call user mode function */ in run_in_user()
H A Dusermode.h19 * Run function in user mode
H A Ddesc.c28 {0xffff, 0, 0, .type_limit_flags = 0xcffb}, /* 32-bit code segment (user) */
29 {0xffff, 0, 0, .type_limit_flags = 0xcff3}, /* 32-bit data segment (user) */
42 {0xffff, 0, 0, .type_limit_flags = 0xcffb}, /* 0x38 32-bit code segment (user) */
43 {0xffff, 0, 0, .type_limit_flags = 0xcff3}, /* 0x40 32/64-bit data segment (user) */
44 {0xffff, 0, 0, .type_limit_flags = 0xaffb}, /* 0x48 64-bit code segment (user) */
/kvm-unit-tests/
H A D.gitlab-ci.yml50 selftest-vectors-user
65 selftest-vectors-user
79 selftest-vectors-user
110 selftest-vectors-user
125 selftest-vectors-user
138 selftest-setup selftest-vectors-kernel selftest-vectors-user selftest-smp
H A DREADME158 when the user does not provide an environ, then an environ generated
H A DREADME.md158 when the user does not provide an environ, then an environ generated
/kvm-unit-tests/arm/
H A Dunittests.cfg27 # Test vector setup and exception handling (user mode).
28 [selftest-vectors-user]
30 extra_params = -append 'vectors-user'
H A Dselftest.c83 * assume that that memory region could have been larger, if the user in check_pabt_init()
442 } else if (strcmp(argv[1], "vectors-user") == 0) { in main()
/kvm-unit-tests/riscv/
H A Drun12 # Allow user overrides of some config.mak variables
/kvm-unit-tests/lib/linux/
H A Dpsci.h5 * by: ARM kernel, ARM64 kernel, KVM ARM/ARM64 and user space.
/kvm-unit-tests/lib/arm64/asm/
H A Dpgtable-hwdef.h110 #define PTE_UXN (_AT(pteval_t, 1) << 54) /* User XN */
/kvm-unit-tests/s390x/
H A Dpv-attest.c96 report(cc == 1 && uvcb.header.rc == 0x102, "invalid user data size"); in test_attest_v1()

12