/openbmc/linux/tools/testing/selftests/rcutorture/bin/ |
H A D | kvm-test-1-run.sh | 2 # SPDX-License-Identifier: GPL-2.0+ 4 # Run a kvm-based test of the specified tree on the specified configs. 10 # Usage: kvm-test-1-run.sh config resdir seconds qemu-args boot_args_in 12 # qemu-args defaults to "-enable-kvm -display none -no-reboot", along 19 # Anything you specify for either qemu-args or boot_args_in is appended to 20 # the default values. The "-smp" value is deduced from the contents of 29 T="`mktemp -d ${TMPDIR-/tmp}/kvm-test-1-run.sh.XXXXXX`" 30 trap 'rm -rf $T' 0 36 config_dir=`echo $config_template | sed -e 's,/[^/]*$,,'` 37 title=`echo $config_template | sed -e 's/^.*\///'` [all …]
|
H A D | kvm-build.sh | 2 # SPDX-License-Identifier: GPL-2.0+ 4 # Build a kvm-ready Linux kernel from the tree in the current directory. 6 # Usage: kvm-build.sh config-template resdir 12 if test -f "$TORTURE_STOPFILE" 14 echo "kvm-build.sh early exit due to run STOP request" 19 if test -z "$config_template" -o ! -f "$config_template" -o ! -r "$config_template" 21 echo "kvm-build.sh :$config_template: Not a readable file" 26 T="`mktemp -d ${TMPDIR-/tmp}/kvm-build.sh.XXXXXX`" 27 trap 'rm -rf $T' 0 38 if test $retval -gt 1 [all …]
|
H A D | kvm-test-1-run-batch.sh | 2 # SPDX-License-Identifier: GPL-2.0+ 4 # Carry out a kvm-based run for the specified batch of scenarios, which 5 # might have been built by --build-only kvm.sh run. 7 # Usage: kvm-test-1-run-batch.sh SCENARIO [ SCENARIO ... ] 10 # containing a ready-to-run qemu-cmd file. 16 T="`mktemp -d ${TMPDIR-/tmp}/kvm-test-1-run-batch.sh.XXXXXX`" 17 trap 'rm -rf $T' 0 19 echo ---- Running batch $* 24 if ! echo $i | grep -q '^[^/.a-z]\+\(\.[0-9]\+\)\?$' 29 if ! test -d "$i" [all …]
|
H A D | kvm-recheck.sh | 2 # SPDX-License-Identifier: GPL-2.0+ 4 # Given the results directories for previous KVM-based torture runs, 5 # check the build and console output for errors. Given a directory 8 # Usage: kvm-recheck.sh resdir ... 16 T=/tmp/kvm-recheck.sh.$$ 17 trap 'rm -f $T' 0 2 26 dirs=`find $rd -name Make.defconfig.out -print | sort | sed -e 's,/[^/]*$,,' | sort -u` 29 if test -n "$firsttime" 32 resdir=`echo $i | sed -e 's,/$,,' -e 's,/[^/]*$,,'` 33 head -1 $resdir/log [all …]
|
H A D | kvm-remote.sh | 2 # SPDX-License-Identifier: GPL-2.0+ 4 # Run a series of tests on remote systems under KVM. 6 # Usage: kvm-remote.sh "systems" [ <kvm.sh args> ] 7 # kvm-remote.sh "systems" /path/to/old/run [ <kvm-again.sh args> ] 16 if ! test -d tools/testing/selftests/rcutorture/bin 18 echo $scriptname must be run from top-level directory of kernel source tree. 29 if test -z "$systems" 37 # T: /tmp/kvm-remote.sh.NNNNNN where "NNNNNN" is set by mktemp 38 # resdir: /tmp/kvm-remote.sh.NNNNNN/res 39 # rundir: /tmp/kvm-remote.sh.NNNNNN/res/$ds ("-remote" suffix) [all …]
|
H A D | kvm.sh | 2 # SPDX-License-Identifier: GPL-2.0+ 4 # Run a series of tests under KVM. By default, this series is specified 5 # by the relevant CFLIST file, but can be overridden by the --configs 6 # command-line argument. 8 # Usage: kvm.sh [ options ] 17 T="`mktemp -d ${TMPDIR-/tmp}/kvm.sh.XXXXXX`" 18 trap 'rm -rf $T' 0 23 LANG=en_US.UTF-8; export LANG 55 ds=`date +%Y.%m.%d-%H.%M.%S` 56 jitter="-1" [all …]
|
/openbmc/linux/Documentation/RCU/ |
H A D | torture.rst | 1 .. SPDX-License-Identifier: GPL-2.0 19 Documentation/admin-guide/kernel-parameters.txt. 26 …rcu-torture:--- Start of test: nreaders=16 nfakewriters=4 stat_interval=30 verbose=0 test_no_idle_… 27 …rcu-torture: rtc: (null) ver: 155441 tfle: 0 rta: 155441 rtaf: 8884 rtf: 155440 rtmbe: 0… 28 rcu-torture: Reader Pipe: 727860534 34213 0 0 0 0 0 0 0 0 0 29 rcu-torture: Reader Batch: 727877838 17003 0 0 0 0 0 0 0 0 0 30 …rcu-torture: Free-Block Circulation: 155440 155440 155440 155440 155440 155440 155440 155440 1554… 31 …rcu-torture:--- End of test: SUCCESS: nreaders=16 nfakewriters=4 stat_interval=30 verbose=0 test_n… 37 be evident. ;-) 51 * "tfle": If non-zero, indicates that the "torture freelist" [all …]
|
/openbmc/qemu/docs/about/ |
H A D | build-platforms.rst | 1 .. _Supported-build-platforms: 3 Supported build platforms 7 platforms. This appendix outlines which platforms are the major build 25 support for those backports, unless the feature is auto-detectable in a 33 ---------------------------- 37 .. list-table:: 38 :header-rows: 1 40 * - CPU Architecture 41 - Accelerators 42 * - Arm [all …]
|
/openbmc/openbmc/poky/documentation/dev-manual/ |
H A D | qemu.rst | 1 .. SPDX-License-Identifier: CC-BY-SA-2.0-UK 18 built using the Yocto Project as just another task on your build system. 34 - `QEMU Website <https://wiki.qemu.org/Main_Page>`__\ *:* The official 37 - `Documentation <https://wiki.qemu.org/Manual>`__\ *:* The QEMU user 49 (SDK). See ":ref:`sdk-manual/intro:the qemu emulator`" section in the 56 - If you cloned the ``poky`` repository or you downloaded and 57 unpacked a Yocto Project release tarball, you can source the build 58 environment script (i.e. :ref:`structure-core-script`):: 61 $ source oe-init-build-env 63 - If you installed a cross-toolchain, you can run the script that [all …]
|
/openbmc/linux/arch/x86/kvm/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 3 # KVM configuration 6 source "virt/kvm/Kconfig" 21 config KVM config 22 tristate "Kernel-based Virtual Machine (KVM) support" 59 a character device node named /dev/kvm. 62 will be called kvm. 67 bool "Compile KVM with -Werror" 68 # KASAN may cause the build to fail due to larger frames 72 depends on KVM [all …]
|
H A D | xen.h | 1 // SPDX-License-Identifier: GPL-2.0 6 * KVM Xen emulation 24 int kvm_xen_hvm_set_attr(struct kvm *kvm, struct kvm_xen_hvm_attr *data); 25 int kvm_xen_hvm_get_attr(struct kvm *kvm, struct kvm_xen_hvm_attr *data); 26 int kvm_xen_hvm_evtchn_send(struct kvm *kvm, struct kvm_irq_routing_xen_evtchn *evt); 28 int kvm_xen_hvm_config(struct kvm *kvm, struct kvm_xen_hvm_config *xhc); 29 void kvm_xen_init_vm(struct kvm *kvm); 30 void kvm_xen_destroy_vm(struct kvm *kvm); 34 struct kvm *kvm); 35 int kvm_xen_setup_evtchn(struct kvm *kvm, [all …]
|
/openbmc/linux/Documentation/dev-tools/ |
H A D | gdb-kernel-debugging.rst | 6 The kernel debugger kgdb, hypervisors like QEMU or JTAG-based hardware 11 them. It focuses on QEMU/KVM virtual machines as target, but the examples can 16 ------------ 18 - gdb 7.2+ (recommended: 7.4+) with python support enabled (typically true 23 ----- 25 - Create a virtual Linux machine for QEMU/KVM (see www.linux-kvm.org and 26 www.qemu.org for more details). For cross-development, 30 - Build the kernel with CONFIG_GDB_SCRIPTS enabled, but leave 34 - Install that kernel on the guest, turn off KASLR if necessary by adding 36 Alternatively, QEMU allows to boot the kernel directly using -kernel, [all …]
|
/openbmc/linux/Documentation/process/ |
H A D | maintainer-kvm-x86.rst | 1 .. SPDX-License-Identifier: GPL-2.0 3 KVM x86 7 -------- 8 KVM strives to be a welcoming community; contributions from newcomers are 12 an honest effort to follow KVM x86's guidelines, are receptive to feedback, 17 ----- 21 ----- 22 KVM x86 is currently in a transition period from being part of the main KVM 23 tree, to being "just another KVM arch". As such, KVM x86 is split across the 24 main KVM tree, ``git.kernel.org/pub/scm/virt/kvm/kvm.git``, and a KVM x86 [all …]
|
/openbmc/qemu/docs/system/i386/ |
H A D | hyperv.rst | 1 Hyper-V Enlightenments 6 ----------- 8 In some cases when implementing a hardware interface in software is slow, KVM 11 It may, however, be hard-to-impossible to add support for these interfaces to 14 KVM on x86 implements Hyper-V Enlightenments for Windows guests. These features 15 make Windows and Hyper-V guests think they're running on top of a Hyper-V 16 compatible hypervisor and use Hyper-V specific features. 20 ----- 22 No Hyper-V enlightenments are enabled by default by either KVM or QEMU. In 25 .. parsed-literal:: [all …]
|
/openbmc/qemu/.gitlab-ci.d/ |
H A D | crossbuild-template.yml | 3 stage: build 7 - ccache 12 - source scripts/ci/gitlab-ci-section 13 - section_start setup "Pre-script setup" 14 - JOBS=$(expr $(nproc) + 1) 15 - cat /packages.txt 16 - section_end setup 18 - export CCACHE_BASEDIR="$(pwd)" 19 - export CCACHE_DIR="$CCACHE_BASEDIR/ccache" 20 - export CCACHE_MAXSIZE="500M" [all …]
|
H A D | buildtest.yml | 2 - local: '/.gitlab-ci.d/buildtest-template.yml' 4 build-system-alpine: 6 - .native_build_job_template 7 - .native_build_artifact_template 9 - job: amd64-alpine-container 12 TARGETS: avr-softmmu loongarch64-softmmu mips64-softmmu mipsel-softmmu 13 MAKE_CHECK_ARGS: check-build 14 CONFIGURE_ARGS: --enable-docs --enable-trace-backends=log,simple,syslog 16 check-system-alpine: 19 - job: build-system-alpine [all …]
|
/openbmc/linux/arch/arm64/kvm/hyp/nvhe/ |
H A D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 3 # Makefile for Kernel-based Virtual Machine module, HYP/nVHE part 6 asflags-y := -D__KVM_NVHE_HYPERVISOR__ -D__DISABLE_EXPORTS 8 # Tracepoint and MMIO logging symbols should not be visible at nVHE KVM as 9 # there is no way to execute them and any such MMIO access from nVHE KVM 11 # __DISABLE_TRACE_MMIO__ to disable MMIO tracing for nVHE KVM. 12 ccflags-y := -D__KVM_NVHE_HYPERVISOR__ -D__DISABLE_EXPORTS -D__DISABLE_TRACE_MMIO__ 13 ccflags-y += -fno-stack-protector \ 14 -DDISABLE_BRANCH_PROFILING \ 17 hostprogs := gen-hyprel [all …]
|
/openbmc/qemu/target/s390x/kvm/ |
H A D | meson.build | 4 'kvm.c', 5 'stsi-topology.c' 14 # - we build on s390x 15 # - we build the system emulation for s390x (qemu-system-s390x) 16 # - KVM is enabled 17 # - the linker supports --s390-pgste 18 if host_machine.cpu_family() == 's390x' and cc.has_link_argument('-Wl,--s390-pgste') 20 if_true: declare_dependency(link_args: ['-Wl,--s390-pgste']))
|
/openbmc/qemu/ |
H A D | .patchew.yml | 1 --- 91 {% elif test == "docker-mingw@fedora" or test == "docker-quick@centos8" or test == "asan" %} 94 This series failed the {{ test }} build test. Please find the testing commands and 104 This series failed build test on {{test}} host. Please find the details below. 115 --- 117 Please send your feedback to patchew-devel@redhat.com 126 time make docker-test-debug@fedora TARGET_LIST=x86_64-softmmu J=14 NETWORK=1 127 docker-quick@centos8: 133 time make docker-test-quick@centos8 SHOW_ENV=1 J=14 NETWORK=1 140 git rev-parse base > /dev/null || exit 0 [all …]
|
/openbmc/qemu/bsd-user/ |
H A D | meson.build | 10 'bsd-mem.c', 11 'bsd-proc.c', 23 kvm = cc.find_library('kvm', required: true) build 24 bsd_user_ss.add(elf, procstat, kvm) 26 # Pull in the OS-specific build glue, if any
|
/openbmc/linux/tools/ |
H A D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 3 # as in kernel build. 12 @echo ' acpi - ACPI tools' 13 @echo ' bpf - misc BPF tools' 14 @echo ' cgroup - cgroup tools' 15 @echo ' counter - counter tools' 16 @echo ' cpupower - a tool for all things x86 CPU power' 17 @echo ' debugging - tools for debugging' 18 @echo ' firewire - the userspace part of nosy, an IEEE-1394 traffic sniffer' 19 @echo ' firmware - Firmware tools' [all …]
|
/openbmc/linux/tools/testing/selftests/wireguard/qemu/ |
H A D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 3 # Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved. 9 BUILD_PATH ?= $(PWD)/build/$(ARCH) 13 CBUILD := $(shell gcc -dumpmachine) 14 HOST_ARCH := $(firstword $(subst -, ,$(CBUILD))) 19 MIRROR := https://download.wireguard.com/qemu-test/distfiles/ 21 KERNEL_BUILD_PATH := $(BUILD_PATH)/kernel$(if $(findstring yes,$(DEBUG_KERNEL)),-debug) 28 $(1)_NAME := $(2)-$$($(1)_VERSION) 36 mkdir -p $(DISTFILES_PATH) 37 …-x $$@.lock -c '[ -f $$@ ] && exit 0; wget -O $$@.tmp $(MIRROR)$(1) || wget -O $$@.tmp $(2)$(1) ||… [all …]
|
/openbmc/qemu/docs/devel/ |
H A D | tracing.rst | 19 $ qemu --trace "memory_region_ops_*" ... 25 ``./configure --enable-trace-backends=BACKENDS`` was not explicitly specified. 27 Multiple patterns can be specified by repeating the ``--trace`` option:: 29 $ qemu --trace "kvm_*" --trace "virtio_*" ... 32 file to avoid long command-line options:: 36 $ qemu --trace events=/tmp/events ... 41 Sub-directory setup 42 ------------------- 45 "trace-events" file. All directories which contain "trace-events" files must be 46 listed in the "trace_events_subdirs" variable in the top level meson.build [all …]
|
/openbmc/linux/arch/arm64/kvm/hyp/ |
H A D | vgic-v2-cpuif-proxy.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * Copyright (C) 2012-2015 - ARM Ltd 10 #include <linux/irqchip/arm-gic.h> 27 * __vgic_v2_perform_cpuif_access -- perform a GICV access on behalf of the 35 * -1: Illegal GICV access successfully performed 39 struct kvm *kvm = kern_hyp_va(vcpu->kvm); in __vgic_v2_perform_cpuif_access() local 40 struct vgic_dist *vgic = &kvm->arch.vgic; in __vgic_v2_perform_cpuif_access() 45 /* Build the full address */ in __vgic_v2_perform_cpuif_access() 50 if (fault_ipa < vgic->vgic_cpu_base || in __vgic_v2_perform_cpuif_access() 51 fault_ipa >= (vgic->vgic_cpu_base + KVM_VGIC_V2_CPU_SIZE)) in __vgic_v2_perform_cpuif_access() [all …]
|
/openbmc/linux/Documentation/virt/kvm/s390/ |
H A D | s390-pv-boot.rst | 1 .. SPDX-License-Identifier: GPL-2.0 8 ------- 13 Documentation/virt/kvm/s390/s390-pv.rst for details." 17 KVM to decrypt the protected virtual machine. 19 Based on this data, KVM will make the protected virtual machine known 22 hashes, to ensure integrity. Afterwards KVM can run the PVM via the 23 SIE instruction which the UV will intercept and execute on KVM's 33 ------- 46 The new PV load-device-specific-parameters field specifies all data 52 * AES-XTS Tweak prefix [all …]
|