/qemu/docs/system/arm/ |
H A D | virt.rst | 46 - running guests using the KVM accelerator on aarch64 hardware 88 For example, MTE support must be enabled with ``-machine virt,mte=on``, 108 Set ``on``/``off`` to enable/disable emulating a guest CPU which implements the 112 Set ``on``/``off`` to enable/disable emulating a guest CPU which implements the 116 Set ``on``/``off`` to enable/disable emulating a guest CPU which implements the 120 Set ``on``/``off`` to enable/disable placing devices and RAM in physical 121 address space above 32 bits. The default is ``on`` for machine types 125 boot a 32-bit kernel which does not have ``CONFIG_LPAE`` enabled on 131 Set ``on``/``off`` to enable/disable the compact layout for high memory regions. 132 The default is ``on`` for machine types later than ``virt-7.2``. [all …]
|
/qemu/docs/devel/migration/ |
H A D | postcopy.rst | 8 (or take too long to converge) its plus side is that there is an upper bound on 22 To enable postcopy, issue this command on the monitor (both source and 25 ``migrate_set_capability postcopy-ram on`` 34 time later on. Issuing it after the end of a migration is harmless. 39 separately for each vCPU. These values are calculated on destination 41 command on destination monitor: 43 ``migrate_set_capability postcopy-blocktime on`` 76 Entered on receipt of the first 'discard' command; prior to 80 have discards on them to be broken. 88 on processing the blob. With this thread able to process page [all …]
|
/qemu/include/hw/xtensa/ |
H A D | xtensa-isa.h | 101 * The encoding and decoding functions operate on instruction buffers, 102 * not on the raw bytes of the instructions. The same instruction 204 * XTENSA_UNDEFINED on error. The "from_chars" function first reads the 244 * XTENSA_UNDEFINED on error. 256 * stages before stage 0. Returns XTENSA_UNDEFINED on error. 282 /* Get the name of a format. Returns null on error. */ 305 * All the other fields are set to zero. Returns non-zero on error. 314 * XTENSA_UNDEFINED on error. 322 * on error. 330 * Returns XTENSA_UNDEFINED on error. [all …]
|
/qemu/tests/qemu-iotests/ |
H A D | 153.out | 2 == readonly=off,force-share=on should be rejected == 3 QEMU_PROG: -drive if=none,file=null-co://,readonly=off,force-share=on: force-share=on can only be u… 17 == Launching another QEMU, opts: 'read-only=on' == 18 QEMU_PROG: -drive file=TEST_DIR/t.qcow2,if=none,read-only=on: Failed to get shared "write" lock 21 == Launching another QEMU, opts: 'read-only=on,force-share=on' == 104 qemu-io: can't open device TEST_DIR/t.qcow2: force-share=on can only be used with read-only images 109 qemu-io: can't open device TEST_DIR/t.qcow2: force-share=on can only be used with read-only images 147 qemu-img: Could not open 'TEST_DIR/t.qcow2': force-share=on can only be used with read-only images 158 == Launching QEMU, opts: 'read-only=on' == 164 == Launching another QEMU, opts: 'read-only=on' == [all …]
|
H A D | 159.out | 5 No errors were found on the image. 10 No errors were found on the image. 17 No errors were found on the image. 22 No errors were found on the image. 29 No errors were found on the image. 34 No errors were found on the image. 41 No errors were found on the image. 46 No errors were found on the image. 53 No errors were found on the image. 58 No errors were found on the image. [all …]
|
H A D | 284.out | 9 No errors were found on the image. 16 No errors were found on the image. 23 No errors were found on the image. 28 No errors were found on the image. 35 No errors were found on the image. 42 No errors were found on the image. 47 No errors were found on the image. 54 No errors were found on the image. 61 No errors were found on the image.
|
/qemu/include/semihosting/ |
H A D | uaccess.h | 25 * Returns: 0 on success, -1 on error. 36 * Returns: 0 on success, -1 on error. 47 * Returns: 0 on success, -1 on error. 58 * Returns: 0 on success, -1 on error. 65 * Returns: 0 on success, -1 on error. 74 * Returns: 0 on success, -1 on error. 83 * Returns: 0 on success, -1 on error.
|
/qemu/docs/ |
H A D | nvdimm.txt | 18 -machine pc,nvdimm=on 20 -object memory-backend-file,id=mem1,share=on,mem-path=$PATH,size=$NVDIMM_SIZE,readonly=off 34 - "object memory-backend-file,id=mem1,share=on,mem-path=$PATH, 36 $NVDIMM_SIZE on a file $PATH. All accesses to the virtual NVDIMM device go 39 "share=on/off" controls the visibility of guest writes. If 40 "share=on", then guest writes will be applied to the backend 42 "share=on", then above writes will be visible to it as well. If 46 "readonly=on/off" controls whether the file $PATH is opened read-only or 56 bit is present. Set unarmed to on when the memdev has readonly=on. 78 2. QEMU v2.6.0 only puts a basic alignment requirement on the "size" [all …]
|
/qemu/hw/vfio/ |
H A D | Kconfig | 3 depends on LINUX 10 depends on LINUX && PCI 16 depends on LINUX && S390_CCW_VIRTIO 22 depends on LINUX && PLATFORM_BUS 27 depends on VFIO_PLATFORM 32 depends on VFIO_PLATFORM 38 depends on LINUX && S390_CCW_VIRTIO 43 depends on VFIO_PCI
|
/qemu/docs/devel/ |
H A D | kconfig.rst | 36 This domain-specific language is based on the Kconfig language that 81 **dependencies**: ``depends on <expr>`` 89 While ``depends on`` can force a symbol to false, reverse dependencies can 100 contradictions between ``depends on`` and ``select`` statements and prevent 107 ``select`` or ``depends on`` directives do not force the value to true 163 depends on PCI 170 Devices *depend on* the bus that they lie on, for example a PCI 171 device would specify ``depends on PCI``. An MMIO device will likely 172 have no ``depends on`` directive. Devices also *select* the buses 175 only if they have at least one ``depends on``; the default could be [all …]
|
H A D | ebpf_rss.rst | 12 - eBPF RSS (can function with also with vhost=on) 18 of rx virtqueue based on lookup table built according to calculated symmetric hash 34 eBPF RSS turned on by different combinations of vhost-net, vitrio-net and tap configurations: 38 tap,vhost=off & virtio-net-pci,rss=on,hash=off 42 tap,vhost=on & virtio-net-pci,rss=on,hash=off 46 tap,vhost=off & virtio-net-pci,rss=on,hash=on 50 tap,vhost=on & virtio-net-pci,rss=on,hash=on 70 Overall eBPF RSS works on kernels 5.8+. 87 - redirect - "boolean" value, should the hash be calculated, on false - ``default_queue`` would be… 96 … 3 maps and loads eBPF program from the rss.bpf.skeleton.h. Returns 'true' on success. After that,…
|
/qemu/include/qapi/ |
H A D | visitor.h | 40 * details on what it supports. Also, see visitor-impl.h for the 52 * call on all visits). Then, regardless of success or failure, the 99 * visit_type_FOO() returns true on success, false on error. 108 * struct. It also returns true on success, false on error. 227 * visit_is_input() for cleaning up on failure. 266 * visit_type_FOO() or visit_start_ITEM() has been performed on the 285 * On failure, set *@obj to NULL and store an error through @errp. 288 * Return true on success, false on failure. 305 * On failure, store an error through @errp. Can happen only when @v 308 * Return true on success, false on failure. [all …]
|
/qemu/include/qemu/ |
H A D | hbitmap.h | 55 * bits will be represented by a single bit. Each operation on a 85 * @hb: HBitmap to operate on. 93 * @hb: HBitmap to operate on. 101 * @hb: HBitmap to operate on. 109 * @hb: HBitmap to operate on. 119 * @hb: HBitmap to operate on. 134 * @hb: HBitmap to operate on. 142 * @hb: HBitmap to operate on. 164 * @hb: HBitmap to operate on. 176 * @hb: HBitmap to operate on. [all …]
|
/qemu/include/migration/ |
H A D | blocker.h | 28 * @returns - 0 on success, -EBUSY/-EACCES on failure, with errp set. 31 * On success, the caller must not free @reasonp, except by 44 * @returns - 0 on success, -EBUSY on failure, with errp set. 51 * On success, the caller must not free @reasonp, except by 72 * @returns - 0 on success, -EBUSY/-EACCES on failure, with errp set. 75 * On success, the caller must not free @reasonp, except by 90 * @returns - 0 on success, -EBUSY/-EACCES on failure, with errp set. 93 * On success, the caller must not free *@reasonp before the blocker is removed.
|
/qemu/docs/system/ |
H A D | vm-templating.rst | 6 For now, the focus is on VM memory aspects, and not about how to save and 17 VMs. The Copy-On-Write mechanism in the operating systems makes sure that 39 Supply VM RAM via memory-backend-file, with ``share=on`` (modifications go 49 -object memory-backend-file,id=pc.ram,mem-path=template,size=2g,share=on,... \\ 58 In order to have a new VM be based on a template VM, we have to 59 configure VM RAM to be based on a template VM RAM file; however, the VM 63 stay private), ``readonly=on`` (open the file readonly) and ``rom=off`` 67 In the following command-line example, a 2GB VM is created based on the 73 -object memory-backend-file,id=pc.ram,mem-path=template,size=2g,readonly=on,rom=off,... \\ 80 template VM or when starting new VMs based on a template VM. [all …]
|
/qemu/include/crypto/ |
H A D | hash.h | 90 * Returns: 0 on success, -1 on error 122 * Returns: 0 on success, -1 on error 146 * Returns: 0 on success, -1 on error 164 * Returns: 0 on success, -1 on error 180 * Returns: 0 on success, -1 on error 200 * Returns: 0 on success, -1 on error 218 * Returns: 0 on success, -1 on error 245 * Returns: 0 on success, -1 on error 260 * Returns: New hash object with the given algorithm, or NULL on error. 289 * Returns: 0 on success, -1 on error [all …]
|
/qemu/hw/hyperv/ |
H A D | Kconfig | 3 depends on KVM 8 depends on HYPERV 13 depends on HYPERV 18 depends on VMBUS 26 depends on VMBUS 27 depends on HV_BALLOON_POSSIBLE 28 depends on HV_BALLOON_SUPPORTED
|
/qemu/hw/ipmi/ |
H A D | Kconfig | 7 depends on IPMI 12 depends on IPMI 16 depends on ISA_BUS 21 depends on ISA_BUS 26 depends on PCI 31 depends on PCI 36 depends on I2C
|
/qemu/tests/unit/ |
H A D | test-seccomp.c | 100 test_seccomp_killed("on,spawn=deny", doit_sys_fork); in test_seccomp_sys_fork_on_nospawn() 105 test_seccomp_passed("on", doit_sys_fork); in test_seccomp_sys_fork_on() 128 test_seccomp_killed("on,spawn=deny", doit_fork); in test_seccomp_fork_on_nospawn() 133 test_seccomp_passed("on", doit_fork); in test_seccomp_fork_on() 161 test_seccomp_passed("on", doit_thread); in test_seccomp_thread_on() 166 test_seccomp_passed("on,spawn=deny", doit_thread); in test_seccomp_thread_on_nospawn() 182 test_seccomp_errno("on,resourcecontrol=deny", EPERM, doit_sched); in test_seccomp_sched_on_nores() 187 test_seccomp_passed("on", doit_sched); in test_seccomp_sched_on() 232 g_test_add_func("/seccomp/sys-fork/on", in main() 234 g_test_add_func("/seccomp/sys-fork/on-nospawn", in main() [all …]
|
/qemu/contrib/ivshmem-client/ |
H A D | ivshmem-client.h | 14 * on the host to ask QEMU to send an interrupt to an ivshmem PCI device in a 18 * A standalone ivshmem client based on this file is provided for debug/test 94 * Returns: 0 on success, or a negative value on error 109 * Returns: 0 on success, or a negative value on error 148 * Returns: 0 on success, or a negative value on error 159 * Returns: 0 on success, or a negative value on error 170 * Returns: 0 on success, or a negative value on error (at least one 181 * Returns: 0 on success, or a negative value on error (at least one 201 * Dump information of this ivshmem client on stdout 204 * of its peers and their vectors on stdout.
|
/qemu/hw/riscv/ |
H A D | Kconfig | 15 depends on RISCV64 31 depends on RISCV32 || RISCV64 39 depends on RISCV32 47 depends on RISCV32 || RISCV64 75 depends on RISCV64 84 depends on RISCV32 || RISCV64 96 depends on RISCV32 || RISCV64 116 depends on RISCV32 || RISCV64
|
/qemu/hw/pci-bridge/ |
H A D | Kconfig | 4 depends on PCI 9 depends on PCI_EXPRESS && MSI_NONBROKEN 14 depends on PCIE_PORT 23 depends on PCI_EXPRESS && MSI_NONBROKEN 28 depends on PCI_EXPRESS && MSI_NONBROKEN 33 depends on PCI_EXPRESS 44 depends on PCI_EXPRESS && MSI_NONBROKEN && PXB
|
/qemu/docs/system/s390x/ |
H A D | cpu-topology.rst | 3 CPU topology on s390x 6 Since QEMU 8.2, CPU topology on s390x provides up to 3 levels of 20 This documentation provides general information on S390 CPU topology, 22 For information on how to modify the S390 CPU topology and how to 41 ``ctop`` to ``on`` as in: 45 -cpu gen16b,ctop=on 53 The CPU topology can be specified on the QEMU command line 77 based on the core-id starting with core-0 at position 0 of socket-0, 79 of book-0 and so on up to the last socket of the last book of the last 98 adding the CPUs to the topology based on the core-id. [all …]
|
/qemu/include/hw/nvram/ |
H A D | eeprom_at24c.h | 13 * Create and realize an AT24C EEPROM device on the heap. 14 * @bus: I2C bus to put it on 15 * @address: I2C address of the EEPROM slave when put on a bus 18 * Create the device state structure, initialize it, put it on the specified 25 * Create and realize an AT24C EEPROM device on the heap with initial data. 26 * @bus: I2C bus to put it on 27 * @address: I2C address of the EEPROM slave when put on a bus 32 * Create the device state structure, initialize it, put it on the specified
|
/qemu/include/hw/hyperv/ |
H A D | vmbus.h | 59 * Calculate the number of channels based on the device properties. Called 66 * Return 0 on success, -errno on failure. 111 * Notify (on guest's behalf) the host side of the channel that there's data in 120 * Return 0 on success, negative errno on failure. 129 * Return total number of bytes placed in the send ringbuffer on success, 130 * negative errno on failure. 131 * The ringbuffer indices are updated on success, and the guest is signaled if 141 * Return 0 on success, negative errno on failure. 157 * VMBusChanReq at the beginning, followed by the message payload, or NULL on 176 * preceding recv_peek/recv_pop calls on success, negative errno on failure. [all …]
|