/qemu/hw/virtio/ |
H A D | virtio-mmio.c | 77 if (!proxy->legacy) { in virtio_mmio_soft_reset() 104 if (proxy->legacy) { in virtio_mmio_read() 118 if (proxy->legacy) { in virtio_mmio_read() 152 if (proxy->legacy) { in virtio_mmio_read() 162 if (proxy->legacy) { in virtio_mmio_read() 179 if (!proxy->legacy) { in virtio_mmio_read() 181 "%s: read from legacy register (0x%" in virtio_mmio_read() 182 HWADDR_PRIx ") in non-legacy mode\n", in virtio_mmio_read() 189 if (proxy->legacy) { in virtio_mmio_read() 191 "%s: read from non-legacy register (0x%" in virtio_mmio_read() [all …]
|
H A D | virtio-pci.c | 331 bool legacy = virtio_pci_legacy(proxy); in virtio_pci_ioeventfd_assign() local 350 if (legacy) { in virtio_pci_ioeventfd_assign() 363 if (legacy) { in virtio_pci_ioeventfd_assign() 1962 bool legacy = virtio_pci_legacy(proxy); in virtio_pci_device_plugged() local 1978 if (!legacy) { in virtio_pci_device_plugged() 1979 error_setg(errp, "Device doesn't support modern mode, and legacy" in virtio_pci_device_plugged() 1981 error_append_hint(errp, "Set disable-legacy to off\n"); in virtio_pci_device_plugged() 1994 if (legacy) { in virtio_pci_device_plugged() 1997 * To avoid migration issues, we allow legacy mode when legacy in virtio_pci_device_plugged() 2002 "compatibility legacy is allowed"); in virtio_pci_device_plugged() [all …]
|
/qemu/target/i386/ |
H A D | xsave_helper.c | 16 X86LegacyXSaveArea *legacy; in x86_cpu_xsave_all_areas() local 24 legacy = buf + e->offset; in x86_cpu_xsave_all_areas() 25 header = buf + e->offset + sizeof(*legacy); in x86_cpu_xsave_all_areas() 34 legacy->fcw = cwd; in x86_cpu_xsave_all_areas() 35 legacy->fsw = swd; in x86_cpu_xsave_all_areas() 36 legacy->ftw = twd; in x86_cpu_xsave_all_areas() 37 legacy->fpop = env->fpop; in x86_cpu_xsave_all_areas() 38 legacy->fpip = env->fpip; in x86_cpu_xsave_all_areas() 39 legacy->fpdp = env->fpdp; in x86_cpu_xsave_all_areas() 40 memcpy(&legacy->fpregs, env->fpregs, in x86_cpu_xsave_all_areas() [all …]
|
/qemu/target/i386/tcg/ |
H A D | tcg-cpu.h | 41 X86LegacyXSaveArea legacy; member 66 QEMU_BUILD_BUG_ON(offsetof(X86XSaveArea, legacy.fcw) != XSAVE_FCW_FSW_OFFSET); 67 QEMU_BUILD_BUG_ON(offsetof(X86XSaveArea, legacy.ftw) != XSAVE_FTW_FOP_OFFSET); 68 QEMU_BUILD_BUG_ON(offsetof(X86XSaveArea, legacy.fpip) != XSAVE_CWD_RIP_OFFSET); 69 QEMU_BUILD_BUG_ON(offsetof(X86XSaveArea, legacy.fpdp) != XSAVE_CWD_RDP_OFFSET); 70 QEMU_BUILD_BUG_ON(offsetof(X86XSaveArea, legacy.mxcsr) != XSAVE_MXCSR_OFFSET); 71 QEMU_BUILD_BUG_ON(offsetof(X86XSaveArea, legacy.fpregs) != XSAVE_ST_SPACE_OFFSET); 72 QEMU_BUILD_BUG_ON(offsetof(X86XSaveArea, legacy.xmm_regs) != XSAVE_XMM_SPACE_OFFSET);
|
/qemu/tests/functional/ |
H A D | test_virtio_version.py | 34 # Device IDs for legacy/transitional devices: 61 `disable-legacy`. 97 'disable-modern=off,disable-legacy=on') 102 # <prefix>,disable-modern=off,disable-legacy=on 108 'disable-modern=off,disable-legacy=off') 111 # Force legacy mode: 113 'disable-modern=on,disable-legacy=off') 126 # <prefix>,disable-modern=off,disable-legacy=off 157 'disable-modern=off,disable-legacy=on')
|
/qemu/docs/specs/ |
H A D | pci-ids.rst | 19 network device (legacy) 21 block device (legacy) 23 balloon device (legacy) 25 console device (legacy) 27 SCSI host bus adapter device (legacy) 29 entropy generator device (legacy) 31 9p filesystem device (legacy)
|
H A D | standard-vga.rst | 16 legacy-free pci variant 41 The legacy-free variant has no ROM and has ``PCI_CLASS_DISPLAY_OTHER`` 48 Doesn't apply to the legacy-free pci variant, use the MMIO bar instead.
|
H A D | acpi_cpu_hotplug.rst | 11 Legacy ACPI CPU hotplug interface registers 19 - The first DWORD in bitmap is used in write mode to switch from legacy 192 QEMU starts with legacy CPU hotplug interface enabled. Detecting and 193 switching to modern interface is based on the 2 legacy CPU hotplug features: 205 Otherwise legacy or no CPU hotplug interface available
|
H A D | vmw_pvscsi-spec.rst | 69 The interrupt modes supported are legacy, MSI and MSI-X. 70 In the case of legacy interrupts, the ``PVSCSI_REG_OFFSET_INTR_STATUS``
|
/qemu/docs/devel/ |
H A D | vfio-iommufd.rst | 9 for assigned devices. While the legacy kernel interface is group-centric, 13 to abstract the common part of VFIO legacy and iommufd container. So that the 18 specific to either legacy or iommufd. Each container has its own way to setup 38 | iommufd | | vfio legacy | 64 - vfio legacy BE: uses group fd and container fd to setup secure context 70 - vfio legacy BE: device fd is retrieved from group fd ioctl 77 * vfio legacy BE: uses container fd 85 It's exactly same as the VFIO device with legacy VFIO container. 115 is not used and the user gets the behavior based on the legacy VFIO
|
H A D | multiple-iothreads.rst | 53 The main difference between legacy code and new code that can run in an 66 * LEGACY ``qemu_aio_set_fd_handler()`` - monitor a file descriptor 67 * LEGACY ``qemu_aio_set_event_notifier()`` - monitor an event notifier 68 * LEGACY ``timer_new_ms()`` - create a timer 69 * LEGACY ``qemu_bh_new()`` - create a BH 70 * LEGACY ``qemu_bh_new_guarded()`` - create a BH with a device re-entrancy guard 71 * LEGACY ``qemu_aio_wait()`` - run an event loop iteration
|
/qemu/docs/ |
H A D | igd-assign.txt | 48 QEMU also provides a "Legacy" mode that implicitly enables full functionality 55 In "Legacy" mode, QEMU will automatically setup OpRegion, LPC bridge IDs and 59 By default, "Legacy" mode won't fail, it continues on error. User can set 60 "x-igd-legacy-mode=on" to force enabling legacy mode, this also checks if the 61 conditions above for legacy mode is met, and if any error occurs, QEMU will 62 fail immediately. Users can also set "x-igd-legacy-mode=off" to disable legacy 65 In legacy mode, as the guest VGA ranges are assigned to IGD device, all other 111 * x-igd-legacy-mode=[on|off|*auto*] 112 Enable/Disable legacy mode 122 * Adding IGD with automatically legacy mode support [all …]
|
H A D | pcie.txt | 41 not controllers. Place only legacy PCI devices on 46 Integrated Endpoints, existing hardware mostly integrates legacy PCI 54 (3) PCI Express to PCI Bridge (pcie-pci-bridge), for starting legacy PCI 135 Legacy PCI devices can be plugged into pcie.0 as Integrated Endpoints, 136 but, as mentioned in section 5, doing so means the legacy PCI 143 (each supporting also 32 slots) will support hundreds of legacy devices. 274 PCI-PCI Bridge slots can be used for legacy PCI host devices. 306 In both cases disable-legacy and disable-modern properties can be used 309 Note that setting disable-legacy=off will enable legacy mode (enabling 310 legacy behavior) for PCI Express virtio devices causing them to
|
H A D | pcie_pci_bridge.txt | 6 PCIE-to-PCI bridge is a new method for legacy PCI 12 PCIE-to-PCI bridge should now be used for any legacy PCI device usage 21 Hot-plug of legacy PCI devices into the bridge 106 3) Set 'msi' property to off - this forces the bridge to use legacy INTx,
|
H A D | qdev-device-use.txt | 162 -FOO FOO-OPTS...,LEGACY-CHARDEV 165 LEGACY-CHARDEV is the same everywhere. 182 * -usbdevice braille doesn't support LEGACY-CHARDEV syntax. It always 191 LEGACY-CHARDEV translates to -chardev HOST-OPTS... as follows: 225 * mon:LEGACY-CHARDEV is special: it multiplexes the monitor onto the 226 character device defined by LEGACY-CHARDEV. -chardev provides more 231 QEMU uses LEGACY-CHARDEV syntax not just to set up guest devices, but 234 LEGACY-CHARDEV to refer to a host part defined with -chardev.
|
/qemu/hw/s390x/ |
H A D | s390-hypercall.h | 17 #define DIAG500_VIRTIO_NOTIFY 0 /* legacy, implemented as a NOP */ 18 #define DIAG500_VIRTIO_RESET 1 /* legacy */ 19 #define DIAG500_VIRTIO_SET_STATUS 2 /* legacy */
|
/qemu/docs/system/i386/ |
H A D | microvm.rst | 71 legacy and non-legacy devices. In this example, a VM is created 73 legacy ``ISA serial`` device as console:: 86 footprint further by disabling some legacy devices. If you're using 93 This is an example of a VM with all optional legacy features
|
/qemu/hw/vfio/ |
H A D | igd.c | 38 * The code here attempts to enable what we'll call legacy mode assignment, 174 * device, which may be at VM address 00:02.0 in legacy mode or another in vfio_pci_igd_opregion_init() 534 * For backward compatibility, enable legacy mode when in vfio_pci_igd_config_quirk() 538 * - Not manually disabled by x-igd-legacy-mode=off in vfio_pci_igd_config_quirk() 546 * IGD legacy mode requires: in vfio_pci_igd_config_quirk() 555 info_report("IGD legacy mode enabled, " in vfio_pci_igd_config_quirk() 556 "use x-igd-legacy-mode=off to disable it if unwanted."); in vfio_pci_igd_config_quirk() 572 * enabled, try to enable it. Probably shouldn't be using legacy mode in vfio_pci_igd_config_quirk() 587 "or device %04x (gen %d) doesn't support legacy mode", in vfio_pci_igd_config_quirk() 662 * When legacy mode is implicity enabled, continue on error, in vfio_pci_igd_config_quirk() [all …]
|
/qemu/qapi/ |
H A D | virtio.json | 156 # @disable-legacy-check: VirtIODevice disabled_legacy_check flag 186 'disable-legacy-check': 'bool', 218 # "disable-legacy-check": false, 243 # "VIRTIO_F_VERSION_1: Device compliant for v1 spec (legacy)" 252 # "VIRTIO_F_VERSION_1: Device compliant for v1 spec (legacy)", 278 # "disabled-legacy-check": false, 305 # "VIRTIO_F_VERSION_1: Device compliant for v1 spec (legacy)" 317 # "VIRTIO_F_VERSION_1: Device compliant for v1 spec (legacy)", 351 # "VIRTIO_F_VERSION_1: Device compliant for v1 spec (legacy)", 393 # "VIRTIO_F_VERSION_1: Device compliant for v1 spec (legacy)" [all …]
|
/qemu/.gitlab-ci.d/ |
H A D | container-cross.yml | 13 amd64-debian-legacy-cross-container: 17 NAME: debian-legacy-test-cross
|
/qemu/include/hw/virtio/ |
H A D | virtio-mmio.h | 61 bool legacy; member 70 /* Fields only used for non-legacy (v2) devices */
|
H A D | virtio-pci.h | 212 * 2) generic_name has the "disable-legacy" and "disable-modern" 220 * using the disable-legacy and disable-modern properties. 221 * If disable-legacy=auto, (non-)transitional mode is selected
|
/qemu/hw/smbios/ |
H A D | smbios_legacy.c | 2 * SMBIOS legacy support 122 * function is for legacy mode and needs to keep the guest ABI, and in smbios_build_type_1_fields() 155 * build a set of legacy smbios_table entries using user provided blobs in smbios_get_table_legacy()
|
/qemu/docs/config/ |
H A D | q35-emulated.cfg | 43 # 00:1e.0 PCI bridge (legacy PCI bridge) 112 # PCI bridge (legacy PCI bridge) 116 # for legacy PCI devices. PCI Express devices should be 279 # The sound card is a legacy PCI device that is plugged
|
/qemu/include/standard-headers/linux/ |
H A D | virtio_config.h | 74 * this is for compatibility with legacy systems. 77 /* Legacy name for VIRTIO_F_ACCESS_PLATFORM (for compatibility with old userspace) */
|