Searched full:syscall (Results 1 – 14 of 14) sorted by relevance
18 asm volatile("pushf; syscall; syscall_target: popf" : "=c"(tmp) : : "r11"); in test_syscall_lazy_load()25 * test handling of TF in syscall/sysret: #DB is raised if TF26 * is 1 at the *end* of syscall/sysret.28 * This uses 32-bit syscall/sysret because KVM emulates it on Intel processors.29 * However, the same bug happens with 64-bit syscall/sysret if two vCPUs30 * "race" to force the emulation of syscall/sysret.55 " syscall\n" /* singlestep trap taken after syscall */56 " syscall\n" /* jumps back to test_syscall_tf's body */75 * syscall to syscall32_target -> TF cleared and no singlestep in test_syscall_tf()78 * syscall to syscall32_target in test_syscall_tf()[all …]
33 tests += $(TEST_DIR)/syscall.$(exe)
238 [syscall]239 file = syscall.flat
279 /* SYSCALL target MSRs */ in __test_canonical_checks()
14 * 4. syscall handler to handle L2 syscall vmexit
42 /* a0 value before the syscall */
28 syscall
50 syscall
8 #define MSR_STAR 0xc0000081 /* legacy mode SYSCALL target */9 #define MSR_LSTAR 0xc0000082 /* long mode SYSCALL target */10 #define MSR_CSTAR 0xc0000083 /* compat mode SYSCALL target */11 #define MSR_SYSCALL_MASK 0xc0000084 /* EFLAGS mask for syscall */18 #define _EFER_SCE 0 /* SYSCALL/SYSRET */
23 * Selectors 0x08-0x10 and 0x3b-0x4b are set up for use with the SYSCALL
1 /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
326 syscall397 syscall444 syscall
367 report_prefix_push("syscall"); in test_sc()
4906 # ENOSYS means "bad syscall nr" and nothing else. This will have a small4911 "ENOSYS means 'invalid syscall nr' and nothing else\n" . $herecurr);