Home
last modified time | relevance | path

Searched full:device (Results 1 – 25 of 2081) sorted by relevance

12345678910>>...84

/qemu/docs/
H A Dqdev-device-use.txt1 = How to convert to -device & friends =
5 In qdev, each device has a parent bus. Some devices provide one or
6 more buses for children. You can specify a device's parent bus with
7 -device parameter bus.
9 A device typically has a device address on its parent bus. For buses
23 Example: device i440FX-pcihost is on the root bus, and provides a PCI
24 bus named pci.0. To put a FOO device into its slot 4, use -device
30 A QEMU block device (drive) has a host and a guest part.
32 In the general case, the guest device is connected to a controller
33 device. For instance, the IDE controller provides two IDE buses, each
[all …]
/qemu/qapi/
H A Dqdev.json8 # = Device infrastructure (qdev)
14 # @device-list-properties:
16 # List properties associated with a device.
18 # @typename: the type name of a device
29 { 'command': 'device-list-properties',
36 # Add a device.
38 # @driver: the name of the new device's driver
40 # @bus: the device's parent bus (device tree path)
42 # @id: the device's ID, must be unique
46 # @json-cli: If present, the "-device" command line option supports
[all …]
H A Dvfio.json12 # An enumeration of the VFIO device migration states.
14 # @stop: The device is stopped.
16 # @running: The device is running.
18 # @stop-copy: The device is stopped and its internal state is
21 # @resuming: The device is stopped and its internal state is available
24 # @running-p2p: The device is running in the P2P quiescent state.
26 # @pre-copy: The device is running, tracking its internal state and
29 # @pre-copy-p2p: The device is running in the P2P quiescent state,
42 # This event is emitted when a VFIO device migration state is changed.
44 # @device-id: The device's id, if it has one.
[all …]
H A Dblock.json102 # @device: Block device name
104 # @id: The name or QOM path of the guest device (since: 2.8)
111 # @deprecated: Member @device is deprecated. Use @id instead.
114 # - If @device is not a valid block device, DeviceNotFound
116 # .. note:: Ejecting a device with no media results in success.
126 'data': { '*device': { 'type': 'str', 'features': [ 'deprecated' ] },
133 # Opens a block device's tray. If there is a block driver state tree
135 # it will remain associated to the block device, so closing the tray
145 # - if the BlockBackend denoted by @device does not have a guest
146 # device attached to it
[all …]
H A Dvirtio.json43 # "path": "/machine/peripheral-anon/device[4]/virtio-backend"
51 # "path": "/machine/peripheral-anon/device[2]/virtio-backend"
55 # "path": "/machine/peripheral-anon/device[1]/virtio-backend"
59 # "path": "/machine/peripheral-anon/device[0]/virtio-backend"
71 # Information about a vhost device. This information will only be
72 # displayed if the vhost device is active.
117 # Full status of the virtio device with most VirtIODevice members.
118 # Also includes the full status of the corresponding vhost device if
119 # the vhost device is active.
123 # @device-id: VirtIODevice ID
[all …]
/qemu/tests/qemu-iotests/
H A D186.out6 Testing: -device floppy
9 /machine/peripheral-anon/device[1]: [not inserted]
10 Attached to: /machine/peripheral-anon/device[N]
11 Removable device: not locked, tray closed
14 Testing: -device floppy,id=qdev_id
19 Removable device: not locked, tray closed
22 Testing: -device ide-cd
25 /machine/peripheral-anon/device[1]: [not inserted]
26 Attached to: /machine/peripheral-anon/device[N]
27 Removable device: not locked, tray closed
[all …]
H A D172.out64 Attached to: /machine/unattached/device[N]
65 Removable device: not locked, tray closed
69 Attached to: /machine/unattached/device[N]
70 Removable device: not locked, tray closed
114 Attached to: /machine/unattached/device[N]
115 Removable device: not locked, tray closed
119 Attached to: /machine/unattached/device[N]
120 Removable device: not locked, tray closed
123 Attached to: /machine/unattached/device[N]
124 Removable device: not locked, tray closed
[all …]
H A D172100 # '-device floppy', even to a different slot, the default drive is disabled.
128 echo === Using -drive if=none and -device ===
130 check_floppy_qtree -drive if=none,file="$TEST_IMG" -device floppy,drive=none0
131 check_floppy_qtree -drive if=none,file="$TEST_IMG" -device floppy,drive=none0,unit=1
133 -device floppy,drive=none0 -device floppy,drive=none1,unit=1
144 echo === Mixing -fdX and -device ===
147 check_floppy_qtree -fda "$TEST_IMG" -drive if=none,file="$TEST_IMG.2" -device floppy,drive=none0
148 check_floppy_qtree -fda "$TEST_IMG" -drive if=none,file="$TEST_IMG.2" -device floppy,drive=none0,un…
150 check_floppy_qtree -fdb "$TEST_IMG" -drive if=none,file="$TEST_IMG.2" -device floppy,drive=none0
151 check_floppy_qtree -fdb "$TEST_IMG" -drive if=none,file="$TEST_IMG.2" -device floppy,drive=none0,un…
[all …]
H A D026.out31 write failed: No space left on device
36 write failed: No space left on device
41 qemu-io: Failed to flush the L2 table cache: No space left on device
42 qemu-io: Failed to flush the refcount block cache: No space left on device
43 write failed: No space left on device
48 qemu-io: Failed to flush the L2 table cache: No space left on device
49 qemu-io: Failed to flush the refcount block cache: No space left on device
50 write failed: No space left on device
89 write failed: No space left on device
90 read failed: No space left on device
[all …]
H A D026.out.nocache31 write failed: No space left on device
36 write failed: No space left on device
41 qemu-io: Failed to flush the L2 table cache: No space left on device
42 qemu-io: Failed to flush the refcount block cache: No space left on device
43 write failed: No space left on device
48 qemu-io: Failed to flush the L2 table cache: No space left on device
49 qemu-io: Failed to flush the refcount block cache: No space left on device
50 write failed: No space left on device
89 write failed: No space left on device
90 read failed: No space left on device
[all …]
H A D083.out4 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo
8 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo
12 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo
16 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo
20 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo
24 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo
28 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo
32 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo
36 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo
40 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo
[all …]
/qemu/docs/specs/
H A Dpci-ids.rst5 Red Hat, Inc. donates a part of its device ID range to QEMU, to be used for
8 Contact Gerd Hoffmann <kraxel@redhat.com> to get a device ID assigned
14 The 1000 -> 10ff device ID range is used as follows for virtio-pci devices.
15 Note that this allocation is separate from the virtio device IDs, which are
19 network device (legacy)
21 block device (legacy)
23 balloon device (legacy)
25 console device (legacy)
27 SCSI host bus adapter device (legacy)
29 entropy generator device (legacy)
[all …]
H A Driscv-iommu.rst9 The emulation includes a PCI reference device (riscv-iommu-pci) and a platform
10 bus device (riscv-iommu-sys) that QEMU RISC-V boards can use. The 'virt'
13 riscv-iommu-pci reference device
16 This device implements the RISC-V IOMMU emulation as recommended by the section
17 "Integrating an IOMMU as a PCIe device" of `iommu1.0.0`_: a PCI device with base
20 As a reference device it doesn't implement anything outside of the specification,
23 To include the device in the 'virt' machine:
27 $ qemu-system-riscv64 -M virt -device riscv-iommu-pci,[optional_pci_opts] (...)
29 This will add a RISC-V IOMMU PCI device in the board following any additional
41 The current Linux kernel support will use the IOMMU device to create IOMMU groups
[all …]
/qemu/tests/qtest/fuzz/
H A Dgeneric_fuzz_configs.h2 * Generic Virtual-Device Fuzzing Target Configs
27 "-device virtio-9p,fsdev=hshare,mount_tag=hshare " in generic_fuzzer_virtio_9p_args()
36 "-device virtio-net,netdev=net0 -netdev user,id=net0",
40 .args = "-machine q35 -device virtio-blk,drive=disk0 "
45 .args = "-machine q35 -device virtio-scsi,num_queues=8 "
46 "-device scsi-hd,drive=disk0 "
51 .args = "-machine q35 -nodefaults -device virtio-gpu",
55 .args = "-machine q35 -nodefaults -device virtio-vga",
59 .args = "-machine q35 -nodefaults -device virtio-rng",
63 .args = "-machine q35 -nodefaults -device virtio-balloon",
[all …]
/qemu/docs/devel/migration/
H A Dvfio.rst2 VFIO device migration
5 Migration of virtual machine involves saving the state for each device that
14 continue whilst the VFIO device state is transferred to the destination, this
29 the device, but the device can respond to incoming ones. Additionally, all
31 the device enters this state.
39 support P2P migration. Single VFIO device migration is allowed regardless of
42 A detailed description of the UAPI for VFIO device migration can be found in
46 VFIO implements the device hooks for the iterative approach as follows:
50 * A ``load_setup`` function that sets the VFIO device on the destination in
55 device.
[all …]
/qemu/scripts/
H A Ddevice-crash-test22 Run QEMU with all combinations of -machine and -device types,
48 logger = logging.getLogger('device-crash-test')
66 # * device: regexp, full match only
80 # devices that don't work out of the box because they require extra options to "-device DEV":
81 # DEVICE | ERROR MESSAGE
82 {'device':'.*-(i386|x86_64)-cpu', 'expected':True}, # CPU socket-id is not set
83 …{'device':'icp', 'expected':True}, # icp_realize: required link 'xics' not fou…
84 …{'device':'ics', 'expected':True}, # ics_base_realize: required link 'xics' no…
85 # "-device ide-cd" does work on more recent QEMU versions, so it doesn't have expected=True
86 {'device':'ide-cd'}, # No drive specified
[all …]
/qemu/docs/system/devices/
H A Dusb.rst21 |qemu_system| -device qemu-xhci
49 You can use the standard ``-device`` switch to add a EHCI controller to
52 ``-device usb-ehci,id=ehci``. This will give you a USB 2.0 bus named
55 When adding USB devices using the ``-device`` switch you can specify the
63 -device usb-ehci,id=ehci \\
64 -device usb-tablet,bus=usb-bus.0 \\
65 -device usb-storage,bus=ehci.0,drive=usbstick
68 device to the EHCI adapter.
100 USB devices can be connected with the ``-device usb-...`` command line
108 Pointer device that uses absolute coordinates (like a touchscreen).
[all …]
H A Dusb-u2f.rst1 Universal Second Factor (U2F) USB Key Device
8 The second factor is provided by a device implementing the U2F
9 protocol. In case of a USB U2F security key, it is a USB HID device
12 QEMU supports both pass-through of a host U2F key device to a VM,
18 The ``u2f-passthru`` device allows you to connect a real hardware
25 simple host device assignment pass-through.
28 option, which takes the host path to a Linux ``/dev/hidrawN`` device:
31 |qemu_system| -usb -device u2f-passthru,hidraw=/dev/hidraw0
33 If you don't specify the device, the ``u2f-passthru`` device will
34 autoscan to take the first U2F device it finds on the host (this
[all …]
/qemu/docs/system/
H A Dvirtio-net-failover.rst9 virtio-net device. Before migration the vfio device is unplugged and data flows
10 through the virtio-net device, on the target side another vfio-pci device is
14 The two devices are called primary and standby device. The fast hardware based
15 networking device is called the primary device and the virtio-net device is the
16 standby device.
23 devices are allowed as primary device. The user needs to ensure that primary
30 networking device by falling back to a virtio-net device for the duration of
33 another host QEMU will unplug the primary device via the PCIe based hotplug
34 handler and traffic will go through the virtio-net device. On the target
35 system the primary device will be automatically plugged back and the
[all …]
H A Ddevice-emulation.rst3 Device Emulation
15 Device Front End
18 A device front end is how a device is presented to the guest. The type
19 of device presented should match the hardware that the guest operating
21 ``--device`` command line option. Running QEMU with the command line
22 options ``--device help`` will list all devices it is aware of. Using
23 the command line ``--device foo,help`` will list the additional
24 configuration options available for that device.
29 Device Buses
34 automatically created. In most cases the BUS a device is attached to
[all …]
/qemu/include/hw/
H A Dqdev-core.h14 * DOC: The QEMU Device API
17 * TYPE_DEVICE. The device API introduces the additional methods of
18 * @realize and @unrealize to represent additional stages in a device
27 * 2) device realization via the #DeviceState.realized property
30 * during device introspection already), and the latter may return error
56 * Hiding a device
59 * To hide a device, a DeviceListener function hide_device() needs to
60 * be registered. It can be used to defer adding a device and
63 * later. It must return if it wants the device to be hidden or
64 * visible. When the handler function decides the device shall be
[all …]
/qemu/tests/qtest/
H A Ddevice-plug-test.c2 * QEMU device plug/unplug handling
24 * Other devices might get removed along with the removed device. Skip in wait_device_deleted_event()
25 * these. The device of interest will be the last one. in wait_device_deleted_event()
30 if (!data || !qdict_get(data, "device")) { in wait_device_deleted_event()
34 qstr = qobject_to(QString, qdict_get(data, "device")); in wait_device_deleted_event()
47 * Request device removal. As the guest is not running, the request won't in process_device_remove()
49 * handled, removing the device. in process_device_remove()
63 g_test_skip("Device virtio-mouse-pci not available"); in test_pci_unplug_request()
71 qtest = qtest_initf("%s -device virtio-mouse-pci,id=dev0", in test_pci_unplug_request()
84 g_test_skip("Device virtio-mouse-pci not available"); in test_q35_pci_unplug_request()
[all …]
/qemu/docs/devel/
H A Dmulti-process.rst68 Another is the modular nature of QEMU device emulation code provides
69 interface points where the QEMU functions that perform device emulation
74 QEMU device emulation
77 QEMU uses an object oriented SW architecture for device emulation code.
80 code to emulate a device named "foo" is always present in QEMU, but its
81 instantiation code is only run when the device is included in the target
82 VM. (e.g., via the QEMU command line as *-device foo*)
84 The object model is hierarchical, so device emulation code names its
85 parent object (such as "pci-device" for a PCI device) and QEMU will
86 instantiate a parent object before calling the device's instantiation
[all …]
/qemu/docs/system/s390x/
H A Dcss.rst10 in the form ``<cssid>.<ssid>.<device number>``.
21 Any device may be put into any subchannel set, there is no restriction by
22 device type.
24 The device number can range from ``0-0xffff``.
26 If the ``devno`` property is not specified for a device, QEMU will choose the
27 next free device number in subchannel set 0, skipping to the next subchannel
28 set if no more device numbers are free.
30 QEMU places a device at the first free subchannel in the specified subchannel
31 set. If a device is hotunplugged and later replugged, it may appear at a
38 * a virtio-net device, cssid/ssid/devno automatically assigned::
[all …]
/qemu/block/monitor/
H A Dblock-hmp-cmds.c160 error_report("Device '%s' not found", id); in hmp_drive_del()
165 error_report("Deleting device added with blockdev-add" in hmp_drive_del()
184 * If this BlockBackend has a device attached to it, its refcount will be in hmp_drive_del()
185 * decremented when the device is removed; otherwise we have to do so here. in hmp_drive_del()
198 const char *device = qdict_get_str(qdict, "device"); in hmp_commit() local
205 if (!strcmp(device, "all")) { in hmp_commit()
210 blk = blk_by_name(device); in hmp_commit()
212 error_report("Device '%s' not found", device); in hmp_commit()
219 error_report("Device '%s' has no medium", device); in hmp_commit()
226 error_report("'commit' error for '%s': %s", device, strerror(-ret)); in hmp_commit()
[all …]

12345678910>>...84