/openbmc/linux/tools/testing/selftests/rcutorture/bin/ |
H A D | kvm-test-1-run.sh | 2 # SPDX-License-Identifier: GPL-2.0+ 4 # Run a kvm-based test of the specified tree on the specified configs. 10 # Usage: kvm-test-1-run.sh config resdir seconds qemu-args boot_args_in 12 # qemu-args defaults to "-enable-kvm -display none -no-reboot", along 19 # Anything you specify for either qemu-args or boot_args_in is appended to 20 # the default values. The "-smp" value is deduced from the contents of 29 T="`mktemp -d ${TMPDIR-/tmp}/kvm-test-1-run.sh.XXXXXX`" 30 trap 'rm -rf $T' 0 36 config_dir=`echo $config_template | sed -e 's,/[^/]*$,,'` 37 title=`echo $config_template | sed -e 's/^.*\///'` [all …]
|
H A D | kvm-build.sh | 2 # SPDX-License-Identifier: GPL-2.0+ 4 # Build a kvm-ready Linux kernel from the tree in the current directory. 6 # Usage: kvm-build.sh config-template resdir 12 if test -f "$TORTURE_STOPFILE" 14 echo "kvm-build.sh early exit due to run STOP request" 19 if test -z "$config_template" -o ! -f "$config_template" -o ! -r "$config_template" 21 echo "kvm-build.sh :$config_template: Not a readable file" 26 T="`mktemp -d ${TMPDIR-/tmp}/kvm-build.sh.XXXXXX`" 27 trap 'rm -rf $T' 0 38 if test $retval -gt 1 [all …]
|
H A D | kvm-test-1-run-batch.sh | 2 # SPDX-License-Identifier: GPL-2.0+ 4 # Carry out a kvm-based run for the specified batch of scenarios, which 5 # might have been built by --build-only kvm.sh run. 7 # Usage: kvm-test-1-run-batch.sh SCENARIO [ SCENARIO ... ] 10 # containing a ready-to-run qemu-cmd file. 16 T="`mktemp -d ${TMPDIR-/tmp}/kvm-test-1-run-batch.sh.XXXXXX`" 17 trap 'rm -rf $T' 0 19 echo ---- Running batch $* 24 if ! echo $i | grep -q '^[^/.a-z]\+\(\.[0-9]\+\)\?$' 29 if ! test -d "$i" [all …]
|
H A D | kvm-recheck.sh | 2 # SPDX-License-Identifier: GPL-2.0+ 4 # Given the results directories for previous KVM-based torture runs, 5 # check the build and console output for errors. Given a directory 8 # Usage: kvm-recheck.sh resdir ... 16 T=/tmp/kvm-recheck.sh.$$ 17 trap 'rm -f $T' 0 2 26 dirs=`find $rd -name Make.defconfig.out -print | sort | sed -e 's,/[^/]*$,,' | sort -u` 29 if test -n "$firsttime" 32 resdir=`echo $i | sed -e 's,/$,,' -e 's,/[^/]*$,,'` 33 head -1 $resdir/log [all …]
|
H A D | kvm-remote.sh | 2 # SPDX-License-Identifier: GPL-2.0+ 4 # Run a series of tests on remote systems under KVM. 6 # Usage: kvm-remote.sh "systems" [ <kvm.sh args> ] 7 # kvm-remote.sh "systems" /path/to/old/run [ <kvm-again.sh args> ] 16 if ! test -d tools/testing/selftests/rcutorture/bin 18 echo $scriptname must be run from top-level directory of kernel source tree. 29 if test -z "$systems" 37 # T: /tmp/kvm-remote.sh.NNNNNN where "NNNNNN" is set by mktemp 38 # resdir: /tmp/kvm-remote.sh.NNNNNN/res 39 # rundir: /tmp/kvm-remote.sh.NNNNNN/res/$ds ("-remote" suffix) [all …]
|
H A D | kvm.sh | 2 # SPDX-License-Identifier: GPL-2.0+ 4 # Run a series of tests under KVM. By default, this series is specified 5 # by the relevant CFLIST file, but can be overridden by the --configs 6 # command-line argument. 8 # Usage: kvm.sh [ options ] 17 T="`mktemp -d ${TMPDIR-/tmp}/kvm.sh.XXXXXX`" 18 trap 'rm -rf $T' 0 23 LANG=en_US.UTF-8; export LANG 55 ds=`date +%Y.%m.%d-%H.%M.%S` 56 jitter="-1" [all …]
|
/openbmc/linux/Documentation/RCU/ |
H A D | torture.rst | 1 .. SPDX-License-Identifier: GPL-2.0 19 Documentation/admin-guide/kernel-parameters.txt. 26 …rcu-torture:--- Start of test: nreaders=16 nfakewriters=4 stat_interval=30 verbose=0 test_no_idle_… 27 …rcu-torture: rtc: (null) ver: 155441 tfle: 0 rta: 155441 rtaf: 8884 rtf: 155440 rtmbe: 0… 28 rcu-torture: Reader Pipe: 727860534 34213 0 0 0 0 0 0 0 0 0 29 rcu-torture: Reader Batch: 727877838 17003 0 0 0 0 0 0 0 0 0 30 …rcu-torture: Free-Block Circulation: 155440 155440 155440 155440 155440 155440 155440 155440 1554… 31 …rcu-torture:--- End of test: SUCCESS: nreaders=16 nfakewriters=4 stat_interval=30 verbose=0 test_n… 37 be evident. ;-) 51 * "tfle": If non-zero, indicates that the "torture freelist" [all …]
|
/openbmc/qemu/docs/about/ |
H A D | build-platforms.rst | 1 .. _Supported-build-platforms: 3 Supported build platforms 7 platforms. This appendix outlines which platforms are the major build 25 support for those backports, unless the feature is auto-detectable in a 33 ---------------------------- 37 .. list-table:: 38 :header-rows: 1 40 * - CPU Architecture 41 - Accelerators 42 * - Arm [all …]
|
/openbmc/openbmc/poky/documentation/dev-manual/ |
H A D | qemu.rst | 1 .. SPDX-License-Identifier: CC-BY-SA-2.0-UK 18 built using the Yocto Project as just another task on your build system. 34 - `QEMU Website <https://wiki.qemu.org/Main_Page>`__\ *:* The official 37 - `Documentation <https://wiki.qemu.org/Manual>`__\ *:* The QEMU user 49 (SDK). See ":ref:`sdk-manual/intro:the qemu emulator`" section in the 56 - If you cloned the ``poky`` repository or you downloaded and 57 unpacked a Yocto Project release tarball, you can source the build 58 environment script (i.e. :ref:`structure-core-script`):: 61 $ source oe-init-build-env 63 - If you installed a cross-toolchain, you can run the script that [all …]
|
/openbmc/linux/arch/x86/kvm/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 3 # KVM configuration 6 source "virt/kvm/Kconfig" 21 config KVM config 22 tristate "Kernel-based Virtual Machine (KVM) support" 59 a character device node named /dev/kvm. 62 will be called kvm. 67 bool "Compile KVM with -Werror" 68 # KASAN may cause the build to fail due to larger frames 72 depends on KVM [all …]
|
H A D | xen.h | 1 // SPDX-License-Identifier: GPL-2.0 6 * KVM Xen emulation 24 int kvm_xen_hvm_set_attr(struct kvm *kvm, struct kvm_xen_hvm_attr *data); 25 int kvm_xen_hvm_get_attr(struct kvm *kvm, struct kvm_xen_hvm_attr *data); 26 int kvm_xen_hvm_evtchn_send(struct kvm *kvm, struct kvm_irq_routing_xen_evtchn *evt); 28 int kvm_xen_hvm_config(struct kvm *kvm, struct kvm_xen_hvm_config *xhc); 29 void kvm_xen_init_vm(struct kvm *kvm); 30 void kvm_xen_destroy_vm(struct kvm *kvm); 34 struct kvm *kvm); 35 int kvm_xen_setup_evtchn(struct kvm *kvm, [all …]
|
/openbmc/linux/Documentation/dev-tools/ |
H A D | gdb-kernel-debugging.rst | 6 The kernel debugger kgdb, hypervisors like QEMU or JTAG-based hardware 11 them. It focuses on QEMU/KVM virtual machines as target, but the examples can 16 ------------ 18 - gdb 7.2+ (recommended: 7.4+) with python support enabled (typically true 23 ----- 25 - Create a virtual Linux machine for QEMU/KVM (see www.linux-kvm.org and 26 www.qemu.org for more details). For cross-development, 30 - Build the kernel with CONFIG_GDB_SCRIPTS enabled, but leave 34 - Install that kernel on the guest, turn off KASLR if necessary by adding 36 Alternatively, QEMU allows to boot the kernel directly using -kernel, [all …]
|
/openbmc/linux/Documentation/process/ |
H A D | maintainer-kvm-x86.rst | 1 .. SPDX-License-Identifier: GPL-2.0 3 KVM x86 7 -------- 8 KVM strives to be a welcoming community; contributions from newcomers are 12 an honest effort to follow KVM x86's guidelines, are receptive to feedback, 17 ----- 21 ----- 22 KVM x86 is currently in a transition period from being part of the main KVM 23 tree, to being "just another KVM arch". As such, KVM x86 is split across the 24 main KVM tree, ``git.kernel.org/pub/scm/virt/kvm/kvm.git``, and a KVM x86 [all …]
|
/openbmc/qemu/docs/system/i386/ |
H A D | hyperv.rst | 1 Hyper-V Enlightenments 6 ----------- 8 In some cases when implementing a hardware interface in software is slow, KVM 11 It may, however, be hard-to-impossible to add support for these interfaces to 14 KVM on x86 implements Hyper-V Enlightenments for Windows guests. These features 15 make Windows and Hyper-V guests think they're running on top of a Hyper-V 16 compatible hypervisor and use Hyper-V specific features. 20 ----- 22 No Hyper-V enlightenments are enabled by default by either KVM or QEMU. In 25 .. parsed-literal:: [all …]
|
/openbmc/qemu/.gitlab-ci.d/ |
H A D | crossbuild-template.yml | 3 stage: build 7 - ccache 12 - source scripts/ci/gitlab-ci-section 13 - section_start setup "Pre-script setup" 14 - JOBS=$(expr $(nproc) + 1) 15 - cat /packages.txt 16 - section_end setup 18 - export CCACHE_BASEDIR="$(pwd)" 19 - export CCACHE_DIR="$CCACHE_BASEDIR/ccache" 20 - export CCACHE_MAXSIZE="500M" [all …]
|
H A D | buildtest.yml | 2 - local: '/.gitlab-ci.d/buildtest-template.yml' 4 build-system-alpine: 6 - .native_build_job_template 7 - .native_build_artifact_template 9 - job: amd64-alpine-container 12 TARGETS: avr-softmmu loongarch64-softmmu mips64-softmmu mipsel-softmmu 13 MAKE_CHECK_ARGS: check-build 14 CONFIGURE_ARGS: --enable-docs --enable-trace-backends=log,simple,syslog 16 check-system-alpine: 19 - job: build-system-alpine [all …]
|
/openbmc/qemu/target/s390x/kvm/ |
H A D | meson.build | 4 'kvm.c', 5 'stsi-topology.c' 14 # - we build on s390x 15 # - we build the system emulation for s390x (qemu-system-s390x) 16 # - KVM is enabled 17 # - the linker supports --s390-pgste 18 if host_machine.cpu_family() == 's390x' and cc.has_link_argument('-Wl,--s390-pgste') 20 if_true: declare_dependency(link_args: ['-Wl,--s390-pgste']))
|
/openbmc/linux/arch/arm64/kvm/hyp/nvhe/ |
H A D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 3 # Makefile for Kernel-based Virtual Machine module, HYP/nVHE part 6 asflags-y := -D__KVM_NVHE_HYPERVISOR__ -D__DISABLE_EXPORTS 8 # Tracepoint and MMIO logging symbols should not be visible at nVHE KVM as 9 # there is no way to execute them and any such MMIO access from nVHE KVM 11 # __DISABLE_TRACE_MMIO__ to disable MMIO tracing for nVHE KVM. 12 ccflags-y := -D__KVM_NVHE_HYPERVISOR__ -D__DISABLE_EXPORTS -D__DISABLE_TRACE_MMIO__ 13 ccflags-y += -fno-stack-protector \ 14 -DDISABLE_BRANCH_PROFILING \ 17 hostprogs := gen-hyprel [all …]
|
/openbmc/qemu/ |
H A D | .patchew.yml | 1 --- 91 {% elif test == "docker-mingw@fedora" or test == "docker-quick@centos8" or test == "asan" %} 94 This series failed the {{ test }} build test. Please find the testing commands and 104 This series failed build test on {{test}} host. Please find the details below. 115 --- 117 Please send your feedback to patchew-devel@redhat.com 126 time make docker-test-debug@fedora TARGET_LIST=x86_64-softmmu J=14 NETWORK=1 127 docker-quick@centos8: 133 time make docker-test-quick@centos8 SHOW_ENV=1 J=14 NETWORK=1 140 git rev-parse base > /dev/null || exit 0 [all …]
|
/openbmc/qemu/bsd-user/ |
H A D | meson.build | 10 'bsd-mem.c', 11 'bsd-proc.c', 23 kvm = cc.find_library('kvm', required: true) build 24 bsd_user_ss.add(elf, procstat, kvm) 26 # Pull in the OS-specific build glue, if any
|
/openbmc/linux/tools/ |
H A D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 3 # as in kernel build. 12 @echo ' acpi - ACPI tools' 13 @echo ' bpf - misc BPF tools' 14 @echo ' cgroup - cgroup tools' 15 @echo ' counter - counter tools' 16 @echo ' cpupower - a tool for all things x86 CPU power' 17 @echo ' debugging - tools for debugging' 18 @echo ' firewire - the userspace part of nosy, an IEEE-1394 traffic sniffer' 19 @echo ' firmware - Firmware tools' [all …]
|
/openbmc/linux/tools/testing/selftests/wireguard/qemu/ |
H A D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 3 # Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved. 9 BUILD_PATH ?= $(PWD)/build/$(ARCH) 13 CBUILD := $(shell gcc -dumpmachine) 14 HOST_ARCH := $(firstword $(subst -, ,$(CBUILD))) 19 MIRROR := https://download.wireguard.com/qemu-test/distfiles/ 21 KERNEL_BUILD_PATH := $(BUILD_PATH)/kernel$(if $(findstring yes,$(DEBUG_KERNEL)),-debug) 28 $(1)_NAME := $(2)-$$($(1)_VERSION) 36 mkdir -p $(DISTFILES_PATH) 37 …-x $$@.lock -c '[ -f $$@ ] && exit 0; wget -O $$@.tmp $(MIRROR)$(1) || wget -O $$@.tmp $(2)$(1) ||… [all …]
|
/openbmc/qemu/docs/devel/ |
H A D | tracing.rst | 19 $ qemu --trace "memory_region_ops_*" ... 25 ``./configure --enable-trace-backends=BACKENDS`` was not explicitly specified. 27 Multiple patterns can be specified by repeating the ``--trace`` option:: 29 $ qemu --trace "kvm_*" --trace "virtio_*" ... 32 file to avoid long command-line options:: 36 $ qemu --trace events=/tmp/events ... 41 Sub-directory setup 42 ------------------- 45 "trace-events" file. All directories which contain "trace-events" files must be 46 listed in the "trace_events_subdirs" variable in the top level meson.build [all …]
|
/openbmc/linux/arch/arm64/kvm/hyp/ |
H A D | vgic-v2-cpuif-proxy.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * Copyright (C) 2012-2015 - ARM Ltd 10 #include <linux/irqchip/arm-gic.h> 27 * __vgic_v2_perform_cpuif_access -- perform a GICV access on behalf of the 35 * -1: Illegal GICV access successfully performed 39 struct kvm *kvm = kern_hyp_va(vcpu->kvm); in __vgic_v2_perform_cpuif_access() local 40 struct vgic_dist *vgic = &kvm->arch.vgic; in __vgic_v2_perform_cpuif_access() 45 /* Build the full address */ in __vgic_v2_perform_cpuif_access() 50 if (fault_ipa < vgic->vgic_cpu_base || in __vgic_v2_perform_cpuif_access() 51 fault_ipa >= (vgic->vgic_cpu_base + KVM_VGIC_V2_CPU_SIZE)) in __vgic_v2_perform_cpuif_access() [all …]
|
/openbmc/bmcweb/ |
H A D | README.md | 9 - DBus event websocket. Allows registering on changes to specific dbus paths, 11 - OpenBMC DBus REST api. Allows direct, low interference, high fidelity access 13 - Serial: A serial websocket for interacting with the host serial console 15 - Redfish: A protocol compliant, [DBus to Redfish translator](Redfish.md). 16 - KVM: A websocket based implementation of the RFB (VNC) frame buffer protocol 17 intended to mate to webui-vue to provide a complete KVM implementation. 30 - Basic authentication per RFC7617 31 - Cookie based authentication for authenticating against webui-vue 32 - Mutual TLS authentication based on OpenSSL 33 - Session authentication through webui-vue [all …]
|