Home
last modified time | relevance | path

Searched +full:kvm +full:- +full:build (Results 1 – 25 of 202) sorted by relevance

123456789

/openbmc/linux/tools/testing/selftests/rcutorture/bin/
H A Dkvm-test-1-run.sh2 # SPDX-License-Identifier: GPL-2.0+
4 # Run a kvm-based test of the specified tree on the specified configs.
10 # Usage: kvm-test-1-run.sh config resdir seconds qemu-args boot_args_in
12 # qemu-args defaults to "-enable-kvm -display none -no-reboot", along
19 # Anything you specify for either qemu-args or boot_args_in is appended to
20 # the default values. The "-smp" value is deduced from the contents of
29 T="`mktemp -d ${TMPDIR-/tmp}/kvm-test-1-run.sh.XXXXXX`"
30 trap 'rm -rf $T' 0
36 config_dir=`echo $config_template | sed -e 's,/[^/]*$,,'`
37 title=`echo $config_template | sed -e 's/^.*\///'`
[all …]
H A Dkvm-build.sh2 # SPDX-License-Identifier: GPL-2.0+
4 # Build a kvm-ready Linux kernel from the tree in the current directory.
6 # Usage: kvm-build.sh config-template resdir
12 if test -f "$TORTURE_STOPFILE"
14 echo "kvm-build.sh early exit due to run STOP request"
19 if test -z "$config_template" -o ! -f "$config_template" -o ! -r "$config_template"
21 echo "kvm-build.sh :$config_template: Not a readable file"
26 T="`mktemp -d ${TMPDIR-/tmp}/kvm-build.sh.XXXXXX`"
27 trap 'rm -rf $T' 0
38 if test $retval -gt 1
[all …]
H A Dkvm-test-1-run-batch.sh2 # SPDX-License-Identifier: GPL-2.0+
4 # Carry out a kvm-based run for the specified batch of scenarios, which
5 # might have been built by --build-only kvm.sh run.
7 # Usage: kvm-test-1-run-batch.sh SCENARIO [ SCENARIO ... ]
10 # containing a ready-to-run qemu-cmd file.
16 T="`mktemp -d ${TMPDIR-/tmp}/kvm-test-1-run-batch.sh.XXXXXX`"
17 trap 'rm -rf $T' 0
19 echo ---- Running batch $*
24 if ! echo $i | grep -q '^[^/.a-z]\+\(\.[0-9]\+\)\?$'
29 if ! test -d "$i"
[all …]
H A Dkvm-recheck.sh2 # SPDX-License-Identifier: GPL-2.0+
4 # Given the results directories for previous KVM-based torture runs,
5 # check the build and console output for errors. Given a directory
8 # Usage: kvm-recheck.sh resdir ...
16 T=/tmp/kvm-recheck.sh.$$
17 trap 'rm -f $T' 0 2
26 dirs=`find $rd -name Make.defconfig.out -print | sort | sed -e 's,/[^/]*$,,' | sort -u`
29 if test -n "$firsttime"
32 resdir=`echo $i | sed -e 's,/$,,' -e 's,/[^/]*$,,'`
33 head -1 $resdir/log
[all …]
H A Dkvm-remote.sh2 # SPDX-License-Identifier: GPL-2.0+
4 # Run a series of tests on remote systems under KVM.
6 # Usage: kvm-remote.sh "systems" [ <kvm.sh args> ]
7 # kvm-remote.sh "systems" /path/to/old/run [ <kvm-again.sh args> ]
16 if ! test -d tools/testing/selftests/rcutorture/bin
18 echo $scriptname must be run from top-level directory of kernel source tree.
29 if test -z "$systems"
37 # T: /tmp/kvm-remote.sh.NNNNNN where "NNNNNN" is set by mktemp
38 # resdir: /tmp/kvm-remote.sh.NNNNNN/res
39 # rundir: /tmp/kvm-remote.sh.NNNNNN/res/$ds ("-remote" suffix)
[all …]
H A Dkvm.sh2 # SPDX-License-Identifier: GPL-2.0+
4 # Run a series of tests under KVM. By default, this series is specified
5 # by the relevant CFLIST file, but can be overridden by the --configs
6 # command-line argument.
8 # Usage: kvm.sh [ options ]
17 T="`mktemp -d ${TMPDIR-/tmp}/kvm.sh.XXXXXX`"
18 trap 'rm -rf $T' 0
23 LANG=en_US.UTF-8; export LANG
55 ds=`date +%Y.%m.%d-%H.%M.%S`
56 jitter="-1"
[all …]
/openbmc/linux/Documentation/RCU/
H A Dtorture.rst1 .. SPDX-License-Identifier: GPL-2.0
19 Documentation/admin-guide/kernel-parameters.txt.
26 …rcu-torture:--- Start of test: nreaders=16 nfakewriters=4 stat_interval=30 verbose=0 test_no_idle_…
27 …rcu-torture: rtc: (null) ver: 155441 tfle: 0 rta: 155441 rtaf: 8884 rtf: 155440 rtmbe: 0…
28 rcu-torture: Reader Pipe: 727860534 34213 0 0 0 0 0 0 0 0 0
29 rcu-torture: Reader Batch: 727877838 17003 0 0 0 0 0 0 0 0 0
30 …rcu-torture: Free-Block Circulation: 155440 155440 155440 155440 155440 155440 155440 155440 1554…
31 …rcu-torture:--- End of test: SUCCESS: nreaders=16 nfakewriters=4 stat_interval=30 verbose=0 test_n…
37 be evident. ;-)
51 * "tfle": If non-zero, indicates that the "torture freelist"
[all …]
/openbmc/qemu/docs/about/
H A Dbuild-platforms.rst1 .. _Supported-build-platforms:
3 Supported build platforms
7 platforms. This appendix outlines which platforms are the major build
25 support for those backports, unless the feature is auto-detectable in a
33 ----------------------------
37 .. list-table::
38 :header-rows: 1
40 * - CPU Architecture
41 - Accelerators
42 * - Arm
[all …]
/openbmc/openbmc/poky/documentation/dev-manual/
H A Dqemu.rst1 .. SPDX-License-Identifier: CC-BY-SA-2.0-UK
18 built using the Yocto Project as just another task on your build system.
34 - `QEMU Website <https://wiki.qemu.org/Main_Page>`__\ *:* The official
37 - `Documentation <https://wiki.qemu.org/Manual>`__\ *:* The QEMU user
49 (SDK). See ":ref:`sdk-manual/intro:the qemu emulator`" section in the
56 - If you cloned the ``poky`` repository or you downloaded and
57 unpacked a Yocto Project release tarball, you can source the build
58 environment script (i.e. :ref:`structure-core-script`)::
61 $ source oe-init-build-env
63 - If you installed a cross-toolchain, you can run the script that
[all …]
/openbmc/linux/arch/x86/kvm/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0
3 # KVM configuration
6 source "virt/kvm/Kconfig"
21 config KVM config
22 tristate "Kernel-based Virtual Machine (KVM) support"
59 a character device node named /dev/kvm.
62 will be called kvm.
67 bool "Compile KVM with -Werror"
68 # KASAN may cause the build to fail due to larger frames
72 depends on KVM
[all …]
H A Dxen.h1 // SPDX-License-Identifier: GPL-2.0
6 * KVM Xen emulation
24 int kvm_xen_hvm_set_attr(struct kvm *kvm, struct kvm_xen_hvm_attr *data);
25 int kvm_xen_hvm_get_attr(struct kvm *kvm, struct kvm_xen_hvm_attr *data);
26 int kvm_xen_hvm_evtchn_send(struct kvm *kvm, struct kvm_irq_routing_xen_evtchn *evt);
28 int kvm_xen_hvm_config(struct kvm *kvm, struct kvm_xen_hvm_config *xhc);
29 void kvm_xen_init_vm(struct kvm *kvm);
30 void kvm_xen_destroy_vm(struct kvm *kvm);
34 struct kvm *kvm);
35 int kvm_xen_setup_evtchn(struct kvm *kvm,
[all …]
/openbmc/linux/Documentation/dev-tools/
H A Dgdb-kernel-debugging.rst6 The kernel debugger kgdb, hypervisors like QEMU or JTAG-based hardware
11 them. It focuses on QEMU/KVM virtual machines as target, but the examples can
16 ------------
18 - gdb 7.2+ (recommended: 7.4+) with python support enabled (typically true
23 -----
25 - Create a virtual Linux machine for QEMU/KVM (see www.linux-kvm.org and
26 www.qemu.org for more details). For cross-development,
30 - Build the kernel with CONFIG_GDB_SCRIPTS enabled, but leave
34 - Install that kernel on the guest, turn off KASLR if necessary by adding
36 Alternatively, QEMU allows to boot the kernel directly using -kernel,
[all …]
/openbmc/linux/Documentation/process/
H A Dmaintainer-kvm-x86.rst1 .. SPDX-License-Identifier: GPL-2.0
3 KVM x86
7 --------
8 KVM strives to be a welcoming community; contributions from newcomers are
12 an honest effort to follow KVM x86's guidelines, are receptive to feedback,
17 -----
21 -----
22 KVM x86 is currently in a transition period from being part of the main KVM
23 tree, to being "just another KVM arch". As such, KVM x86 is split across the
24 main KVM tree, ``git.kernel.org/pub/scm/virt/kvm/kvm.git``, and a KVM x86
[all …]
/openbmc/qemu/docs/system/i386/
H A Dhyperv.rst1 Hyper-V Enlightenments
6 -----------
8 In some cases when implementing a hardware interface in software is slow, KVM
11 It may, however, be hard-to-impossible to add support for these interfaces to
14 KVM on x86 implements Hyper-V Enlightenments for Windows guests. These features
15 make Windows and Hyper-V guests think they're running on top of a Hyper-V
16 compatible hypervisor and use Hyper-V specific features.
20 -----
22 No Hyper-V enlightenments are enabled by default by either KVM or QEMU. In
25 .. parsed-literal::
[all …]
/openbmc/qemu/.gitlab-ci.d/
H A Dcrossbuild-template.yml3 stage: build
7 - ccache
12 - source scripts/ci/gitlab-ci-section
13 - section_start setup "Pre-script setup"
14 - JOBS=$(expr $(nproc) + 1)
15 - cat /packages.txt
16 - section_end setup
18 - export CCACHE_BASEDIR="$(pwd)"
19 - export CCACHE_DIR="$CCACHE_BASEDIR/ccache"
20 - export CCACHE_MAXSIZE="500M"
[all …]
H A Dbuildtest.yml2 - local: '/.gitlab-ci.d/buildtest-template.yml'
4 build-system-alpine:
6 - .native_build_job_template
7 - .native_build_artifact_template
9 - job: amd64-alpine-container
12 TARGETS: avr-softmmu loongarch64-softmmu mips64-softmmu mipsel-softmmu
13 MAKE_CHECK_ARGS: check-build
14 CONFIGURE_ARGS: --enable-docs --enable-trace-backends=log,simple,syslog
16 check-system-alpine:
19 - job: build-system-alpine
[all …]
/openbmc/qemu/target/s390x/kvm/
H A Dmeson.build4 'kvm.c',
5 'stsi-topology.c'
14 # - we build on s390x
15 # - we build the system emulation for s390x (qemu-system-s390x)
16 # - KVM is enabled
17 # - the linker supports --s390-pgste
18 if host_machine.cpu_family() == 's390x' and cc.has_link_argument('-Wl,--s390-pgste')
20 if_true: declare_dependency(link_args: ['-Wl,--s390-pgste']))
/openbmc/linux/arch/arm64/kvm/hyp/nvhe/
H A DMakefile1 # SPDX-License-Identifier: GPL-2.0
3 # Makefile for Kernel-based Virtual Machine module, HYP/nVHE part
6 asflags-y := -D__KVM_NVHE_HYPERVISOR__ -D__DISABLE_EXPORTS
8 # Tracepoint and MMIO logging symbols should not be visible at nVHE KVM as
9 # there is no way to execute them and any such MMIO access from nVHE KVM
11 # __DISABLE_TRACE_MMIO__ to disable MMIO tracing for nVHE KVM.
12 ccflags-y := -D__KVM_NVHE_HYPERVISOR__ -D__DISABLE_EXPORTS -D__DISABLE_TRACE_MMIO__
13 ccflags-y += -fno-stack-protector \
14 -DDISABLE_BRANCH_PROFILING \
17 hostprogs := gen-hyprel
[all …]
/openbmc/qemu/
H A D.patchew.yml1 ---
91 {% elif test == "docker-mingw@fedora" or test == "docker-quick@centos8" or test == "asan" %}
94 This series failed the {{ test }} build test. Please find the testing commands and
104 This series failed build test on {{test}} host. Please find the details below.
115 ---
117 Please send your feedback to patchew-devel@redhat.com
126 time make docker-test-debug@fedora TARGET_LIST=x86_64-softmmu J=14 NETWORK=1
127 docker-quick@centos8:
133 time make docker-test-quick@centos8 SHOW_ENV=1 J=14 NETWORK=1
140 git rev-parse base > /dev/null || exit 0
[all …]
/openbmc/qemu/bsd-user/
H A Dmeson.build10 'bsd-mem.c',
11 'bsd-proc.c',
23 kvm = cc.find_library('kvm', required: true) build
24 bsd_user_ss.add(elf, procstat, kvm)
26 # Pull in the OS-specific build glue, if any
/openbmc/linux/tools/
H A DMakefile1 # SPDX-License-Identifier: GPL-2.0
3 # as in kernel build.
12 @echo ' acpi - ACPI tools'
13 @echo ' bpf - misc BPF tools'
14 @echo ' cgroup - cgroup tools'
15 @echo ' counter - counter tools'
16 @echo ' cpupower - a tool for all things x86 CPU power'
17 @echo ' debugging - tools for debugging'
18 @echo ' firewire - the userspace part of nosy, an IEEE-1394 traffic sniffer'
19 @echo ' firmware - Firmware tools'
[all …]
/openbmc/linux/tools/testing/selftests/wireguard/qemu/
H A DMakefile1 # SPDX-License-Identifier: GPL-2.0
3 # Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
9 BUILD_PATH ?= $(PWD)/build/$(ARCH)
13 CBUILD := $(shell gcc -dumpmachine)
14 HOST_ARCH := $(firstword $(subst -, ,$(CBUILD)))
19 MIRROR := https://download.wireguard.com/qemu-test/distfiles/
21 KERNEL_BUILD_PATH := $(BUILD_PATH)/kernel$(if $(findstring yes,$(DEBUG_KERNEL)),-debug)
28 $(1)_NAME := $(2)-$$($(1)_VERSION)
36 mkdir -p $(DISTFILES_PATH)
37-x $$@.lock -c '[ -f $$@ ] && exit 0; wget -O $$@.tmp $(MIRROR)$(1) || wget -O $$@.tmp $(2)$(1) ||…
[all …]
/openbmc/qemu/docs/devel/
H A Dtracing.rst19 $ qemu --trace "memory_region_ops_*" ...
25 ``./configure --enable-trace-backends=BACKENDS`` was not explicitly specified.
27 Multiple patterns can be specified by repeating the ``--trace`` option::
29 $ qemu --trace "kvm_*" --trace "virtio_*" ...
32 file to avoid long command-line options::
36 $ qemu --trace events=/tmp/events ...
41 Sub-directory setup
42 -------------------
45 "trace-events" file. All directories which contain "trace-events" files must be
46 listed in the "trace_events_subdirs" variable in the top level meson.build
[all …]
/openbmc/linux/arch/arm64/kvm/hyp/
H A Dvgic-v2-cpuif-proxy.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * Copyright (C) 2012-2015 - ARM Ltd
10 #include <linux/irqchip/arm-gic.h>
27 * __vgic_v2_perform_cpuif_access -- perform a GICV access on behalf of the
35 * -1: Illegal GICV access successfully performed
39 struct kvm *kvm = kern_hyp_va(vcpu->kvm); in __vgic_v2_perform_cpuif_access() local
40 struct vgic_dist *vgic = &kvm->arch.vgic; in __vgic_v2_perform_cpuif_access()
45 /* Build the full address */ in __vgic_v2_perform_cpuif_access()
50 if (fault_ipa < vgic->vgic_cpu_base || in __vgic_v2_perform_cpuif_access()
51 fault_ipa >= (vgic->vgic_cpu_base + KVM_VGIC_V2_CPU_SIZE)) in __vgic_v2_perform_cpuif_access()
[all …]
/openbmc/bmcweb/
H A DREADME.md9 - DBus event websocket. Allows registering on changes to specific dbus paths,
11 - OpenBMC DBus REST api. Allows direct, low interference, high fidelity access
13 - Serial: A serial websocket for interacting with the host serial console
15 - Redfish: A protocol compliant, [DBus to Redfish translator](Redfish.md).
16 - KVM: A websocket based implementation of the RFB (VNC) frame buffer protocol
17 intended to mate to webui-vue to provide a complete KVM implementation.
30 - Basic authentication per RFC7617
31 - Cookie based authentication for authenticating against webui-vue
32 - Mutual TLS authentication based on OpenSSL
33 - Session authentication through webui-vue
[all …]

123456789