/qemu/docs/ |
H A D | pcie_sriov.txt | 6 SR/IOV (Single Root I/O Virtualization) is an optional extended capability 24 capability. All VFs have the same BARs and BAR sizes. 34 you would need to add a PCI Express capability in the normal PCI 35 capability list. You might also want to add an ARI (Alternative 36 Routing-ID Interpretation) capability to indicate that your device 54 /* Add and initialize the SR/IOV capability */ 72 except for the SR/IOV capability. Then you need to set up the VF BARs as
|
H A D | pcie_pci_bridge.txt | 35 Red Hat vendor-specific PCI capability, added to the root port 40 uint8_t id; Standard PCI capability header field 41 uint8_t next; Standard PCI capability header field 42 uint8_t len; Standard PCI vendor-specific capability header field 44 uint8_t type; Red Hat vendor-specific capability type 62 At the moment this capability is used only in QEMU generic PCIe root port 87 - Root ports: 1 QEMU generic root port with the capability mentioned above, 88 2 QEMU generic root ports without this capability;
|
H A D | COLO-FT.txt | 213 {"execute": "migrate-set-capabilities", "arguments": {"capabilities": [ {"capability": "x-colo", "s… 229 {"execute": "migrate-set-capabilities", "arguments": {"capabilities": [ {"capability": "x-colo", "s… 299 {"execute": "migrate-set-capabilities", "arguments":{ "capabilities": [ {"capability": "x-colo", "s… 328 {"execute": "migrate-set-capabilities", "arguments":{ "capabilities": [ {"capability": "x-colo", "s…
|
H A D | rdma.txt | 300 * Flags (bitwise OR of each capability), 320 Currently there is only one capability in Version #1: dynamic page registration 323 sets a flag, but the destination does not support this capability, it 325 that as not being an available capability and will thus disable that 326 capability on the primary-VM side.
|
/qemu/backends/tpm/ |
H A D | tpm_util.c | 229 uint32_t capability; in tpm_util_get_buffer_size() member 238 .capability = cpu_to_be32(TPM_CAP_PROPERTY), in tpm_util_get_buffer_size() 273 uint32_t capability; in tpm_util_get_buffer_size() member 282 .capability = cpu_to_be32(TPM2_CAP_TPM_PROPERTIES), in tpm_util_get_buffer_size() 289 uint32_t capability; in tpm_util_get_buffer_size() member
|
/qemu/hw/timer/ |
H A D | hpet.c | 82 uint64_t capability; /* capabilities */ member 279 s->capability &= ~HPET_ID_NUM_TIM_MASK; in hpet_post_load() 280 s->capability |= (s->num_timers - 1) << HPET_ID_NUM_TIM_SHIFT; in hpet_post_load() 281 hpet_cfg.hpet[s->hpet_id].event_timer_block_id = (uint32_t)s->capability; in hpet_post_load() 470 return s->capability >> shift; in hpet_ram_read() 668 hpet_cfg.hpet[s->hpet_id].event_timer_block_id = (uint32_t)s->capability; in hpet_reset() 740 s->capability = 0x8086a001ULL; in hpet_realize() 741 s->capability |= (s->num_timers - 1) << HPET_ID_NUM_TIM_SHIFT; in hpet_realize() 742 s->capability |= ((uint64_t)(HPET_CLK_PERIOD * FS_PER_NS) << 32); in hpet_realize()
|
/qemu/include/sysemu/ |
H A D | kvm.h | 442 #define kvm_vm_enable_cap(s, capability, cap_flags, ...) \ argument 445 .cap = capability, \ 454 #define kvm_vcpu_enable_cap(cpu, capability, cap_flags, ...) \ argument 457 .cap = capability, \
|
/qemu/docs/specs/ |
H A D | ppc-spapr-xive.rst | 57 kernel, KVM will advertise the XIVE capability to QEMU or not. 60 depend on the XIVE KVM capability of the host. On older kernels 66 hypervisor will not advertise the KVM capability and QEMU will use the 128 IRQ_XIVE capability must be present for KVM`` 133 IRQ_XIVE capability must be present for KVM``
|
H A D | ivshmem-spec.rst | 41 - If you additionally need the capability for peers to interrupt each 84 MSI-X capability: INTx is asserted when the bit-wise AND of Status and 85 Mask is non-zero and the device has no MSI-X capability. Interrupt 118 If the peer is a revision 0 device without MSI-X capability, its
|
/qemu/tests/qtest/ |
H A D | tpm-tis-util.c | 50 uint32_t capability; in tpm_tis_test_check_localities() local 59 capability = readl(TIS_REG(locty, TPM_TIS_REG_INTF_CAPABILITY)); in tpm_tis_test_check_localities() 60 g_assert_cmpint(capability, ==, TPM_TIS_CAPABILITIES_SUPPORTED2_0); in tpm_tis_test_check_localities()
|
H A D | migration-helpers.h | 40 void migrate_set_capability(QTestState *who, const char *capability,
|
H A D | tpm-tis-i2c-test.c | 164 uint32_t capability, i2c_cap; in tpm_tis_i2c_test_check_localities() local 173 capability = tpm_tis_i2c_readl(locty, TPM_I2C_REG_INTF_CAPABILITY); in tpm_tis_i2c_test_check_localities() 180 g_assert_cmpint(capability, ==, i2c_cap); in tpm_tis_i2c_test_check_localities()
|
H A D | migration-helpers.c | 238 void migrate_set_capability(QTestState *who, const char *capability, in migrate_set_capability() argument 246 capability, value); in migrate_set_capability()
|
/qemu/include/qemu/ |
H A D | clang-tsa.h | 41 #define TSA_CAPABILITY(x) TSA(capability(x))
|
/qemu/docs/devel/migration/ |
H A D | vfio.rst | 20 enabling "switchover-ack" migration capability. 23 before stopping the source VM. Enabling this migration capability will 68 "switchover-ack" migration capability when this capability is enabled. 105 Discovering device capability, starting and stopping dirty tracking, and
|
H A D | CPR.rst | 49 ``x-ignore-shared`` capability be set. This combination allows memory 55 * Set the ``x-ignore-shared`` capability if desired. 65 * Set the ``x-ignore-shared`` capability if desired.
|
/qemu/hw/s390x/ |
H A D | trace-events | 19 s390_pci_clp_cap(const char *id, uint32_t cap) "PCI: %s: missing expected CLP capability %u" 20 …ap_size(const char *id, uint32_t size, uint32_t cap) "PCI: %s: bad size (%u) for CLP capability %u"
|
/qemu/qapi/ |
H A D | error.json | 23 # required KVM capability is missing
|
H A D | dump.json | 196 # @query-dump-guest-memory-capability: 211 { 'command': 'query-dump-guest-memory-capability',
|
H A D | misc-target.json | 178 # The struct describes capability for a Secure Encrypted 299 # The struct describes capability for a specific GIC (Generic 325 # objects that describe its capability bits.
|
H A D | migration.json | 156 # this state unless colo capability is enabled for migration. 234 # capability is enabled. (Since 3.0) 466 # are present. 'return-path' capability must be enabled to use 500 # Migration capability information 502 # @capability: capability enum 504 # @state: capability state bool 509 'data': { 'capability': 'MigrationCapability', 'state': 'bool' } } 516 # @capabilities: json array of capability modifications to make 832 # only has effect if the @mapped-ram capability is enabled. 1007 # only has effect if the @mapped-ram capability is enabled. [all …]
|
/qemu/linux-headers/linux/ |
H A D | vduse.h | 250 __u64 capability; member
|
/qemu/migration/ |
H A D | savevm.c | 241 static bool should_validate_capability(int capability) in should_validate_capability() argument 243 assert(capability >= 0 && capability < MIGRATION_CAPABILITY__MAX); in should_validate_capability() 245 switch (capability) { in should_validate_capability() 322 MigrationCapability capability = state->capabilities[i]; in configuration_validate_capabilities() local 323 set_bit(capability, source_caps_bm); in configuration_validate_capabilities() 386 MigrationCapability *capability = pv; in get_capability() local 396 *capability = i; in get_capability() 407 MigrationCapability *capability = pv; in put_capability() local 408 const char *capability_str = MigrationCapability_str(*capability); in put_capability()
|
/qemu/docs/system/ |
H A D | guest-loader.rst | 18 multi-boot capability. A typical example would look like:
|
/qemu/hw/sensor/ |
H A D | adm1266.c | 85 pmdev->capability = ADM1266_CAPABILITY_NO_PEC; in adm1266_exit_reset()
|