From: Petr Vorel <pvorel@suse.cz>
To: Martin Doucha <mdoucha@suse.cz>
Cc: Nicolai Stange <nstange@suse.de>, ltp@lists.linux.it
Subject: Re: [LTP] [PATCH v2 2/7] Add test for CVE 2021-3656
Date: Fri, 26 May 2023 16:07:59 +0200 [thread overview]
Message-ID: <20230526140759.GA805411@pevik> (raw)
In-Reply-To: <20230526133435.7369-3-mdoucha@suse.cz>
Hi Martin,
...
> --- /dev/null
> +++ b/testcases/kernel/kvm/kvm_svm02.c
...
> +/* Load FS, GS, TR and LDTR state from vmsave_buf */
> +static int guest_vmload(void)
> +{
> + asm (
> + "vmload\n"
Unfortunately, it fails on Debian oldstable [1].
kvm_svm02.c:37:3: error: too few operands for instruction
"vmload\n"
^
<inline asm>:1:2: note: instantiated into assembly here
vmload
^
kvm_svm02.c:48:3: error: too few operands for instruction
"vmsave\n"
^
<inline asm>:1:2: note: instantiated into assembly here
vmsave
^
2 errors generated.
make[3]: *** [/__w/ltp/ltp/testcases/kernel/kvm/Makefile:63: kvm_svm02-payload.o] Error 1
I wonder if there is an easy fix or reasonable simple way how to detect
unsupported toolchain.
Kind regards,
Petr
[1] https://github.com/pevik/ltp/actions/runs/5091551272/jobs/9151721119
--
Mailing list info: https://lists.linux.it/listinfo/ltp
next prev parent reply other threads:[~2023-05-26 14:08 UTC|newest]
Thread overview: 17+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-05-26 13:34 [LTP] [PATCH v2 0/7] Two AMD SVM vulnerability tests Martin Doucha
2023-05-26 13:34 ` [LTP] [PATCH v2 1/7] KVM: Add VMSAVE/VMLOAD intercept constants Martin Doucha
2023-05-26 13:34 ` [LTP] [PATCH v2 2/7] Add test for CVE 2021-3656 Martin Doucha
2023-05-26 14:07 ` Petr Vorel [this message]
2023-05-26 14:10 ` Petr Vorel
2023-05-26 14:14 ` Petr Vorel
2023-05-26 14:27 ` Petr Vorel
2023-05-26 13:34 ` [LTP] [PATCH v2 3/7] lib: Add safe functions for pthread_kill() and mutexes Martin Doucha
2023-05-26 13:34 ` [LTP] [PATCH v2 4/7] KVM: Add async communication helper functions Martin Doucha
2023-05-29 5:51 ` Petr Vorel
2023-05-29 8:20 ` Martin Doucha
2023-05-29 8:27 ` Petr Vorel
2023-05-26 13:34 ` [LTP] [PATCH v2 5/7] KVM: Allow expected KVM_RUN errors in tst_kvm_run_instance() Martin Doucha
2023-05-26 13:34 ` [LTP] [PATCH v2 6/7] KVM: Add STGI/CLGI intercept constants Martin Doucha
2023-05-29 5:24 ` Petr Vorel
2023-05-26 13:34 ` [LTP] [PATCH v2 7/7] Add KVM test for CPU lockup through malicous SVM guest Martin Doucha
2023-05-29 10:02 ` [LTP] [PATCH v2 0/7] Two AMD SVM vulnerability tests Cyril Hrubis
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20230526140759.GA805411@pevik \
--to=pvorel@suse.cz \
--cc=ltp@lists.linux.it \
--cc=mdoucha@suse.cz \
--cc=nstange@suse.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox