Home
last modified time | relevance | path

Searched +full:kvm +full:- +full:build (Results 1 – 25 of 202) sorted by relevance

123456789

/openbmc/linux/tools/testing/selftests/rcutorture/bin/
H A Dkvm-test-1-run.sh2 # SPDX-License-Identifier: GPL-2.0+
4 # Run a kvm-based test of the specified tree on the specified configs.
10 # Usage: kvm-test-1-run.sh config resdir seconds qemu-args boot_args_in
12 # qemu-args defaults to "-enable-kvm -display none -no-reboot", along
19 # Anything you specify for either qemu-args or boot_args_in is appended to
20 # the default values. The "-smp" value is deduced from the contents of
29 T="`mktemp -d ${TMPDIR-/tmp}/kvm-test-1-run.sh.XXXXXX`"
30 trap 'rm -rf $T' 0
36 config_dir=`echo $config_template | sed -e 's,/[^/]*$,,'`
37 title=`echo $config_template | sed -e 's/^.*\///'`
[all …]
H A Dkvm-build.sh2 # SPDX-License-Identifier: GPL-2.0+
4 # Build a kvm-ready Linux kernel from the tree in the current directory.
6 # Usage: kvm-build.sh config-template resdir
12 if test -f "$TORTURE_STOPFILE"
14 echo "kvm-build.sh early exit due to run STOP request"
19 if test -z "$config_template" -o ! -f "$config_template" -o ! -r "$config_template"
21 echo "kvm-build.sh :$config_template: Not a readable file"
26 T="`mktemp -d ${TMPDIR-/tmp}/kvm-build.sh.XXXXXX`"
27 trap 'rm -rf $T' 0
38 if test $retval -gt 1
[all …]
H A Dkvm-test-1-run-batch.sh2 # SPDX-License-Identifier: GPL-2.0+
4 # Carry out a kvm-based run for the specified batch of scenarios, which
5 # might have been built by --build-only kvm.sh run.
7 # Usage: kvm-test-1-run-batch.sh SCENARIO [ SCENARIO ... ]
10 # containing a ready-to-run qemu-cmd file.
16 T="`mktemp -d ${TMPDIR-/tmp}/kvm-test-1-run-batch.sh.XXXXXX`"
17 trap 'rm -rf $T' 0
19 echo ---- Running batch $*
24 if ! echo $i | grep -q '^[^/.a-z]\+\(\.[0-9]\+\)\?$'
29 if ! test -d "$i"
[all …]
H A Dkvm-recheck.sh2 # SPDX-License-Identifier: GPL-2.0+
4 # Given the results directories for previous KVM-based torture runs,
5 # check the build and console output for errors. Given a directory
8 # Usage: kvm-recheck.sh resdir ...
16 T=/tmp/kvm-recheck.sh.$$
17 trap 'rm -f $T' 0 2
26 dirs=`find $rd -name Make.defconfig.out -print | sort | sed -e 's,/[^/]*$,,' | sort -u`
29 if test -n "$firsttime"
32 resdir=`echo $i | sed -e 's,/$,,' -e 's,/[^/]*$,,'`
33 head -1 $resdir/log
[all …]
H A Dkvm-remote.sh2 # SPDX-License-Identifier: GPL-2.0+
4 # Run a series of tests on remote systems under KVM.
6 # Usage: kvm-remote.sh "systems" [ <kvm.sh args> ]
7 # kvm-remote.sh "systems" /path/to/old/run [ <kvm-again.sh args> ]
16 if ! test -d tools/testing/selftests/rcutorture/bin
18 echo $scriptname must be run from top-level directory of kernel source tree.
29 if test -z "$systems"
37 # T: /tmp/kvm-remote.sh.NNNNNN where "NNNNNN" is set by mktemp
38 # resdir: /tmp/kvm-remote.sh.NNNNNN/res
39 # rundir: /tmp/kvm-remote.sh.NNNNNN/res/$ds ("-remote" suffix)
[all …]
H A Dkvm.sh2 # SPDX-License-Identifier: GPL-2.0+
4 # Run a series of tests under KVM. By default, this series is specified
5 # by the relevant CFLIST file, but can be overridden by the --configs
6 # command-line argument.
8 # Usage: kvm.sh [ options ]
17 T="`mktemp -d ${TMPDIR-/tmp}/kvm.sh.XXXXXX`"
18 trap 'rm -rf $T' 0
23 LANG=en_US.UTF-8; export LANG
55 ds=`date +%Y.%m.%d-%H.%M.%S`
56 jitter="-1"
[all …]
/openbmc/linux/Documentation/RCU/
H A Dtorture.rst1 .. SPDX-License-Identifier: GPL-2.0
19 Documentation/admin-guide/kernel-parameters.txt.
26 …rcu-torture:--- Start of test: nreaders=16 nfakewriters=4 stat_interval=30 verbose=0 test_no_idle_…
27 …rcu-torture: rtc: (null) ver: 155441 tfle: 0 rta: 155441 rtaf: 8884 rtf: 155440 rtmbe: 0…
28 rcu-torture: Reader Pipe: 727860534 34213 0 0 0 0 0 0 0 0 0
29 rcu-torture: Reader Batch: 727877838 17003 0 0 0 0 0 0 0 0 0
30 …rcu-torture: Free-Block Circulation: 155440 155440 155440 155440 155440 155440 155440 155440 1554…
31 …rcu-torture:--- End of test: SUCCESS: nreaders=16 nfakewriters=4 stat_interval=30 verbose=0 test_n…
37 be evident. ;-)
51 * "tfle": If non-zero, indicates that the "torture freelist"
[all …]
/openbmc/qemu/docs/about/
H A Dbuild-platforms.rst1 .. _Supported-build-platforms:
3 Supported build platforms
7 platforms. This appendix outlines which platforms are the major build
25 support for those backports, unless the feature is auto-detectable in a
33 ----------------------------
37 .. list-table::
38 :header-rows: 1
40 * - CPU Architecture
41 - Accelerators
42 * - Arm
[all …]
/openbmc/openbmc/poky/documentation/dev-manual/
H A Dqemu.rst1 .. SPDX-License-Identifier: CC-BY-SA-2.0-UK
18 built using the Yocto Project as just another task on your build system.
34 - `QEMU Website <https://wiki.qemu.org/Main_Page>`__\ *:* The official
37 - `Documentation <https://wiki.qemu.org/Manual>`__\ *:* The QEMU user
49 (SDK). See ":ref:`sdk-manual/intro:the qemu emulator`" section in the
56 - If you cloned the ``poky`` repository or you downloaded and
57 unpacked a Yocto Project release tarball, you can source the build
58 environment script (i.e. :ref:`structure-core-script`)::
61 $ source oe-init-build-env
63 - If you installed a cross-toolchain, you can run the script that
[all …]
/openbmc/linux/arch/x86/kvm/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0
3 # KVM configuration
6 source "virt/kvm/Kconfig"
21 config KVM config
22 tristate "Kernel-based Virtual Machine (KVM) support"
59 a character device node named /dev/kvm.
62 will be called kvm.
67 bool "Compile KVM with -Werror"
68 # KASAN may cause the build to fail due to larger frames
72 depends on KVM
[all …]
H A Dxen.h1 // SPDX-License-Identifier: GPL-2.0
6 * KVM Xen emulation
24 int kvm_xen_hvm_set_attr(struct kvm *kvm, struct kvm_xen_hvm_attr *data);
25 int kvm_xen_hvm_get_attr(struct kvm *kvm, struct kvm_xen_hvm_attr *data);
26 int kvm_xen_hvm_evtchn_send(struct kvm *kvm, struct kvm_irq_routing_xen_evtchn *evt);
28 int kvm_xen_hvm_config(struct kvm *kvm, struct kvm_xen_hvm_config *xhc);
29 void kvm_xen_init_vm(struct kvm *kvm);
30 void kvm_xen_destroy_vm(struct kvm *kvm);
34 struct kvm *kvm);
35 int kvm_xen_setup_evtchn(struct kvm *kvm,
[all …]
/openbmc/linux/Documentation/dev-tools/
H A Dgdb-kernel-debugging.rst6 The kernel debugger kgdb, hypervisors like QEMU or JTAG-based hardware
11 them. It focuses on QEMU/KVM virtual machines as target, but the examples can
16 ------------
18 - gdb 7.2+ (recommended: 7.4+) with python support enabled (typically true
23 -----
25 - Create a virtual Linux machine for QEMU/KVM (see www.linux-kvm.org and
26 www.qemu.org for more details). For cross-development,
30 - Build the kernel with CONFIG_GDB_SCRIPTS enabled, but leave
34 - Install that kernel on the guest, turn off KASLR if necessary by adding
36 Alternatively, QEMU allows to boot the kernel directly using -kernel,
[all …]
/openbmc/linux/Documentation/process/
H A Dmaintainer-kvm-x86.rst1 .. SPDX-License-Identifier: GPL-2.0
3 KVM x86
7 --------
8 KVM strives to be a welcoming community; contributions from newcomers are
12 an honest effort to follow KVM x86's guidelines, are receptive to feedback,
17 -----
21 -----
22 KVM x86 is currently in a transition period from being part of the main KVM
23 tree, to being "just another KVM arch". As such, KVM x86 is split across the
24 main KVM tree, ``git.kernel.org/pub/scm/virt/kvm/kvm.git``, and a KVM x86
[all …]
/openbmc/qemu/docs/system/i386/
H A Dhyperv.rst1 Hyper-V Enlightenments
6 -----------
8 In some cases when implementing a hardware interface in software is slow, KVM
11 It may, however, be hard-to-impossible to add support for these interfaces to
14 KVM on x86 implements Hyper-V Enlightenments for Windows guests. These features
15 make Windows and Hyper-V guests think they're running on top of a Hyper-V
16 compatible hypervisor and use Hyper-V specific features.
20 -----
22 No Hyper-V enlightenments are enabled by default by either KVM or QEMU. In
25 .. parsed-literal::
[all …]
/openbmc/qemu/.gitlab-ci.d/
H A Dcrossbuild-template.yml3 stage: build
7 - ccache
12 - source scripts/ci/gitlab-ci-section
13 - section_start setup "Pre-script setup"
14 - JOBS=$(expr $(nproc) + 1)
15 - cat /packages.txt
16 - section_end setup
18 - export CCACHE_BASEDIR="$(pwd)"
19 - export CCACHE_DIR="$CCACHE_BASEDIR/ccache"
20 - export CCACHE_MAXSIZE="500M"
[all …]
H A Dbuildtest.yml2 - local: '/.gitlab-ci.d/buildtest-template.yml'
4 build-system-alpine:
6 - .native_build_job_template
7 - .native_build_artifact_template
9 - job: amd64-alpine-container
12 TARGETS: avr-softmmu loongarch64-softmmu mips64-softmmu mipsel-softmmu
13 MAKE_CHECK_ARGS: check-build
14 CONFIGURE_ARGS: --enable-docs --enable-trace-backends=log,simple,syslog
16 check-system-alpine:
19 - job: build-system-alpine
[all …]
/openbmc/linux/arch/arm64/kvm/hyp/nvhe/
H A DMakefile1 # SPDX-License-Identifier: GPL-2.0
3 # Makefile for Kernel-based Virtual Machine module, HYP/nVHE part
6 asflags-y := -D__KVM_NVHE_HYPERVISOR__ -D__DISABLE_EXPORTS
8 # Tracepoint and MMIO logging symbols should not be visible at nVHE KVM as
9 # there is no way to execute them and any such MMIO access from nVHE KVM
11 # __DISABLE_TRACE_MMIO__ to disable MMIO tracing for nVHE KVM.
12 ccflags-y := -D__KVM_NVHE_HYPERVISOR__ -D__DISABLE_EXPORTS -D__DISABLE_TRACE_MMIO__
13 ccflags-y += -fno-stack-protector \
14 -DDISABLE_BRANCH_PROFILING \
17 hostprogs := gen-hyprel
[all …]
/openbmc/qemu/target/s390x/kvm/
H A Dmeson.build4 'kvm.c',
5 'stsi-topology.c'
14 # - we build on s390x
15 # - we build the system emulation for s390x (qemu-system-s390x)
16 # - KVM is enabled
17 # - the linker supports --s390-pgste
18 if host_machine.cpu_family() == 's390x' and cc.has_link_argument('-Wl,--s390-pgste')
20 if_true: declare_dependency(link_args: ['-Wl,--s390-pgste']))
/openbmc/qemu/
H A D.patchew.yml1 ---
91 {% elif test == "docker-mingw@fedora" or test == "docker-quick@centos8" or test == "asan" %}
94 This series failed the {{ test }} build test. Please find the testing commands and
104 This series failed build test on {{test}} host. Please find the details below.
115 ---
117 Please send your feedback to patchew-devel@redhat.com
126 time make docker-test-debug@fedora TARGET_LIST=x86_64-softmmu J=14 NETWORK=1
127 docker-quick@centos8:
133 time make docker-test-quick@centos8 SHOW_ENV=1 J=14 NETWORK=1
140 git rev-parse base > /dev/null || exit 0
[all …]
/openbmc/qemu/bsd-user/
H A Dmeson.build10 'bsd-mem.c',
11 'bsd-proc.c',
23 kvm = cc.find_library('kvm', required: true) build
24 bsd_user_ss.add(elf, procstat, kvm)
26 # Pull in the OS-specific build glue, if any
/openbmc/linux/tools/
H A DMakefile1 # SPDX-License-Identifier: GPL-2.0
3 # as in kernel build.
12 @echo ' acpi - ACPI tools'
13 @echo ' bpf - misc BPF tools'
14 @echo ' cgroup - cgroup tools'
15 @echo ' counter - counter tools'
16 @echo ' cpupower - a tool for all things x86 CPU power'
17 @echo ' debugging - tools for debugging'
18 @echo ' firewire - the userspace part of nosy, an IEEE-1394 traffic sniffer'
19 @echo ' firmware - Firmware tools'
[all …]
/openbmc/linux/tools/testing/selftests/wireguard/qemu/
H A DMakefile1 # SPDX-License-Identifier: GPL-2.0
3 # Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
9 BUILD_PATH ?= $(PWD)/build/$(ARCH)
13 CBUILD := $(shell gcc -dumpmachine)
14 HOST_ARCH := $(firstword $(subst -, ,$(CBUILD)))
19 MIRROR := https://download.wireguard.com/qemu-test/distfiles/
21 KERNEL_BUILD_PATH := $(BUILD_PATH)/kernel$(if $(findstring yes,$(DEBUG_KERNEL)),-debug)
28 $(1)_NAME := $(2)-$$($(1)_VERSION)
36 mkdir -p $(DISTFILES_PATH)
37-x $$@.lock -c '[ -f $$@ ] && exit 0; wget -O $$@.tmp $(MIRROR)$(1) || wget -O $$@.tmp $(2)$(1) ||…
[all …]
/openbmc/qemu/docs/devel/
H A Dtracing.rst19 $ qemu --trace "memory_region_ops_*" ...
25 ``./configure --enable-trace-backends=BACKENDS`` was not explicitly specified.
27 Multiple patterns can be specified by repeating the ``--trace`` option::
29 $ qemu --trace "kvm_*" --trace "virtio_*" ...
32 file to avoid long command-line options::
36 $ qemu --trace events=/tmp/events ...
41 Sub-directory setup
42 -------------------
45 "trace-events" file. All directories which contain "trace-events" files must be
46 listed in the "trace_events_subdirs" variable in the top level meson.build
[all …]
/openbmc/linux/arch/arm64/kvm/hyp/
H A Dvgic-v2-cpuif-proxy.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * Copyright (C) 2012-2015 - ARM Ltd
10 #include <linux/irqchip/arm-gic.h>
27 * __vgic_v2_perform_cpuif_access -- perform a GICV access on behalf of the
35 * -1: Illegal GICV access successfully performed
39 struct kvm *kvm = kern_hyp_va(vcpu->kvm); in __vgic_v2_perform_cpuif_access() local
40 struct vgic_dist *vgic = &kvm->arch.vgic; in __vgic_v2_perform_cpuif_access()
45 /* Build the full address */ in __vgic_v2_perform_cpuif_access()
50 if (fault_ipa < vgic->vgic_cpu_base || in __vgic_v2_perform_cpuif_access()
51 fault_ipa >= (vgic->vgic_cpu_base + KVM_VGIC_V2_CPU_SIZE)) in __vgic_v2_perform_cpuif_access()
[all …]
/openbmc/linux/Documentation/virt/kvm/s390/
H A Ds390-pv-boot.rst1 .. SPDX-License-Identifier: GPL-2.0
8 -------
13 Documentation/virt/kvm/s390/s390-pv.rst for details."
17 KVM to decrypt the protected virtual machine.
19 Based on this data, KVM will make the protected virtual machine known
22 hashes, to ensure integrity. Afterwards KVM can run the PVM via the
23 SIE instruction which the UV will intercept and execute on KVM's
33 -------
46 The new PV load-device-specific-parameters field specifies all data
52 * AES-XTS Tweak prefix
[all …]

123456789