/qemu/tests/qemu-iotests/ |
H A D | 172 | 128 echo === Using -drive if=none and -device === 133 -device floppy,drive=none0 -device floppy,drive=none1,unit=1 144 echo === Mixing -fdX and -device === 159 echo === Mixing -drive and -device === 170 echo === Mixing -global and -device === 185 check_floppy_qtree -drive if=none -device floppy,drive=none0 -device floppy -device floppy,drive=no… 186 check_floppy_qtree -drive if=none -global floppy.drive=none0 -device floppy -device floppy 191 check_floppy_qtree -device floppy,drive=floppy0 202 -device floppy,drive=none1 208 check_floppy_qtree -device floppy [all …]
|
H A D | 172.out | 535 === Mixing -fdX and -device === 776 === Mixing -drive and -device === 898 === Mixing -global and -device === 945 Testing: -drive if=none -device floppy,drive=none0 -device floppy -device floppy,drive=none0 946 QEMU_PROG: -device floppy,drive=none0: Drive 'none0' is already in use by another device 948 Testing: -drive if=none -global floppy.drive=none0 -device floppy -device floppy 957 Testing: -device floppy,drive=floppy0 969 Testing: -device floppy 995 Testing: -device floppy,drive-type=120 1021 Testing: -device floppy,drive-type=144 [all …]
|
H A D | 186.out | 6 Testing: -device floppy 9 /machine/peripheral-anon/device[1]: [not inserted] 11 Removable device: not locked, tray closed 14 Testing: -device floppy,id=qdev_id 19 Removable device: not locked, tray closed 22 Testing: -device ide-cd 27 Removable device: not locked, tray closed 30 Testing: -device ide-cd,id=qdev_id 38 Testing: -device scsi-cd 46 Testing: -device scsi-cd,id=qdev_id [all …]
|
H A D | 083.out | 4 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo 8 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo 12 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo 16 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo 20 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo 24 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo 28 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo 32 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo 89 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/ 93 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/ [all …]
|
H A D | 030 | 59 self.vm.cmd('block-stream', device='drive0') 95 self.vm.cmd('block-stream', device='drive0') 108 self.vm.cmd('block-job-resume', device='drive0') 290 self.vm.cmd('block-stream', device='node4', 390 self.vm.cmd('block-commit', device='drive0', 412 self.vm.cmd('block-commit', device='drive0', 417 self.vm.cmd('block-stream', device='node4', 610 self.vm.cmd('block-stream', device='drive0') 667 self.vm.cmd('block-stream', device='drive0') 887 self.vm.cmd('block-stream', device='drive0') [all …]
|
H A D | 141.out | 10 {"execute": "block-job-cancel", "arguments": {"device": "job0"}} 23 {"error": {"class": "GenericError", "desc": "Node 'drv0' is busy: block device is in use by block j… 24 {"execute": "block-job-cancel", "arguments": {"device": "job0"}} 33 {"execute": "block-commit", "arguments": {"device": "drv0", "job-id": "job0"}} 37 {"error": {"class": "GenericError", "desc": "Node 'drv0' is busy: block device is in use by block j… 38 {"execute": "block-job-cancel", "arguments": {"device": "job0"}} 50 {"error": {"class": "GenericError", "desc": "Node 'drv0' is busy: block device is in use by block j… 51 {"execute": "block-job-cancel", "arguments": {"device": "job0"}} 60 {"execute": "block-stream", "arguments": {"device": "drv0", "job-id": "job0", "speed": 1}} 63 {"error": {"class": "GenericError", "desc": "Node 'drv0' is busy: block device is in use by block j… [all …]
|
H A D | 026.out | 31 write failed: No space left on device 36 write failed: No space left on device 43 write failed: No space left on device 50 write failed: No space left on device 89 write failed: No space left on device 90 read failed: No space left on device 97 write failed: No space left on device 98 read failed: No space left on device 105 write failed: No space left on device 106 read failed: No space left on device [all …]
|
H A D | 260.out | 7 {"execute": "blockdev-snapshot-sync", "arguments": {"device": "drive0", "format": "qcow2", "snapsho… 10 {"execute": "block-commit", "arguments": {"device": "drive0", "top": "TEST_DIR/PID-top"}} 12 {"data": {"device": "drive0", "len": 65536, "offset": 65536, "speed": 0, "type": "commit"}, "event"… 13 {"execute": "block-job-complete", "arguments": {"device": "drive0"}} 24 {"execute": "blockdev-snapshot-sync", "arguments": {"device": "drive0", "format": "qcow2", "snapsho… 27 {"execute": "block-commit", "arguments": {"device": "drive0", "top": "TEST_DIR/PID-top"}} 29 {"data": {"device": "drive0", "len": 65536, "offset": 65536, "speed": 0, "type": "commit"}, "event"… 30 {"execute": "block-job-complete", "arguments": {"device": "drive0"}} 41 {"execute": "blockdev-snapshot-sync", "arguments": {"device": "drive0", "format": "qcow2", "snapsho… 45 {"execute": "block-commit", "arguments": {"device": "drive0", "top": "TEST_DIR/PID-top"}} [all …]
|
H A D | 026.out.nocache | 31 write failed: No space left on device 36 write failed: No space left on device 43 write failed: No space left on device 50 write failed: No space left on device 89 write failed: No space left on device 90 read failed: No space left on device 97 write failed: No space left on device 98 read failed: No space left on device 105 write failed: No space left on device 106 read failed: No space left on device [all …]
|
H A D | 092.out | 5 qemu-io: can't open device TEST_DIR/t.qcow: Cluster size must be between 512 and 64k 6 qemu-io: can't open device TEST_DIR/t.qcow: Cluster size must be between 512 and 64k 7 qemu-io: can't open device TEST_DIR/t.qcow: Cluster size must be between 512 and 64k 8 qemu-io: can't open device TEST_DIR/t.qcow: Cluster size must be between 512 and 64k 12 qemu-io: can't open device TEST_DIR/t.qcow: L2 table size must be between 512 and 64k 13 qemu-io: can't open device TEST_DIR/t.qcow: L2 table size must be between 512 and 64k 14 qemu-io: can't open device TEST_DIR/t.qcow: L2 table size must be between 512 and 64k 19 qemu-io: can't open device TEST_DIR/t.qcow: Image too large 20 qemu-io: can't open device TEST_DIR/t.qcow: Image too large 24 qemu-io: can't open device TEST_DIR/t.qcow: Backing file name too long [all …]
|
/qemu/docs/specs/ |
H A D | pci-ids.rst | 19 network device (legacy) 21 block device (legacy) 23 balloon device (legacy) 25 console device (legacy) 31 9p filesystem device (legacy) 33 vsock device (bug compatibility) 90 PCIe NVMe device (``-device nvme``) 92 PCI PVPanic device (``-device pvpanic-pci``) 94 PCI ACPI ERST device (``-device acpi-erst``) 96 PCI UFS device (``-device ufs``) [all …]
|
H A D | acpi_mem_hotplug.rst | 14 Lo part of memory device phys address 16 Hi part of memory device phys address 18 Lo part of memory device size in bytes 20 Hi part of memory device size in bytes 22 Memory device proximity domain 24 Memory device status fields 32 no device check event to OSPM was issued. 48 Memory device slot selector, selects active memory device. 58 Memory device control fields 70 selected memory device [all …]
|
/qemu/docs/ |
H A D | qdev-device-use.txt | 1 = How to convert to -device & friends = 7 -device parameter bus. 9 A device typically has a device address on its parent bus. For buses 24 bus named pci.0. To put a FOO device into its slot 4, use -device 46 -drive, and guest device(s) with -device. 157 -chardev, and the guest device with -device. 250 The new way is -device: 283 The new way is -device. The mapping from -vga argument to -device 294 the PCI device address. 317 -device. [all …]
|
/qemu/qapi/ |
H A D | qdev.json | 14 # @device-list-properties: 18 # @typename: the type name of a device 36 # Add a device. 40 # @bus: the device's parent bus (device tree path) 63 # is the device's name 88 # Remove a device from a guest 90 # @id: the device's ID or QOM path 127 # @device: the device's ID if it has one 129 # @path: the device's QOM path 149 # @device: the device's ID if it has one [all …]
|
H A D | pci.json | 15 # A PCI device memory region 28 # Information about a PCI device I/O region. 54 # the bus the device resides on. 80 # Information about a PCI Bridge device 98 # @class: the class code of the device 110 # @device: the PCI device id 127 # Information about a PCI device 129 # @bus: the bus number of the device 135 # @class_info: the class of the device 137 # @id: the PCI device id [all …]
|
/qemu/block/monitor/ |
H A D | block-hmp-cmds.c | 205 if (!strcmp(device, "all")) { in hmp_commit() 266 .device = (char *)device, in hmp_drive_backup() 426 .device = info->value->device, in hmp_nbd_server_start() 453 .device = (char *) device, in hmp_nbd_server_add() 499 qmp_block_stream(device, device, base, NULL, NULL, false, false, NULL, in hmp_block_stream() 525 if (blk_by_name(device)) { in hmp_block_set_io_throttle() 526 throttle.device = device; in hmp_block_set_io_throttle() 528 throttle.id = device; in hmp_block_set_io_throttle() 618 if (info && *info->device) { in print_block_info() 742 if (device && strcmp(device, info->value->device)) { in hmp_info_block() [all …]
|
/qemu/docs/system/ |
H A D | virtio-net-failover.rst | 9 virtio-net device. Before migration the vfio device is unplugged and data flows 10 through the virtio-net device, on the target side another vfio-pci device is 15 networking device is called the primary device and the virtio-net device is the 16 standby device. 23 devices are allowed as primary device. The user needs to ensure that primary 30 networking device by falling back to a virtio-net device for the duration of 35 system the primary device will be automatically plugged back and the 36 net_failover module registers it again as the primary device. 43 -device virtio-net-pci,netdev=hostnet1,id=net1,mac=52:54:00:6f:55:cc, \ 59 couldn't find the primary device. [all …]
|
/qemu/docs/system/s390x/ |
H A D | css.rst | 10 in the form ``<cssid>.<ssid>.<device number>``. 22 device type. 24 The device number can range from ``0-0xffff``. 28 set if no more device numbers are free. 40 -device virtio-net-ccw 49 * a virtio-rng device in subchannel set ``0``:: 51 -device virtio-rng-ccw,devno=fe.0.0042 59 * a virtio-gpu device in subchannel set ``2``:: 61 -device virtio-gpu-ccw,devno=fe.2.1111 71 -device virtio-mouse-ccw,devno=2.0.2222 [all …]
|
/qemu/docs/system/devices/ |
H A D | usb.rst | 21 qemu -device qemu-xhci 68 device to the EHCI adapter. 176 host character device id. 179 Braille device. This emulates a Baum Braille device USB port. id has to 182 device with 204 Smartcard reader device 207 USB audio device 258 #. ``device-add usb-bot,id=foo`` 304 5. Add the device in QEMU by using: 329 Specifies the device address the device got assigned by the guest os [all …]
|
H A D | usb-u2f.rst | 8 The second factor is provided by a device implementing the U2F 9 protocol. In case of a USB U2F security key, it is a USB HID device 12 QEMU supports both pass-through of a host U2F key device to a VM, 18 The ``u2f-passthru`` device allows you to connect a real hardware 25 simple host device assignment pass-through. 31 |qemu_system| -usb -device u2f-passthru,hidraw=/dev/hidraw0 33 If you don't specify the device, the ``u2f-passthru`` device will 38 |qemu_system| -usb -device u2f-passthru 49 To work, an emulated U2F device must have four elements: 71 |qemu_system| -usb -device u2f-emulated [all …]
|
H A D | vhost-user.rst | 10 vhost-user device 36 - See https://github.com/rust-vmm/vhost-device 42 - See https://github.com/rust-vmm/vhost-device 51 - See https://github.com/rust-vmm/vhost-device 53 - Audio device 60 - See https://github.com/rust-vmm/vhost-device 65 vhost-user-device argument 68 The vhost-user-device is a generic development device intended for 78 vhost-user-device without first patching out:: 83 in ``vhost-user-device.c`` and ``vhost-user-device-pci.c`` file and [all …]
|
/qemu/docs/devel/migration/ |
H A D | virtio.rst | 2 Virtio device migration 20 - virtio device (net, blk, ...), for the different device types and their 39 device class 42 - save proxy device 44 device fields 45 - save common device 56 - device endianness, 79 - load proxy device 81 device fields 82 - load common device [all …]
|
H A D | vfio.rst | 2 VFIO device migration 5 Migration of virtual machine involves saving the state for each device that 29 the device, but the device can respond to incoming ones. Additionally, all 31 the device enters this state. 55 device. 59 save for the VFIO device. 62 active only when the VFIO device is in pre-copy states. 152 the VFIO device state, respectively. 169 Data of VFIO device for pre-copy phase is copied 176 Then the VFIO device is put in _STOP_COPY state [all …]
|
/qemu/block/ |
H A D | qapi-sysemu.c | 80 const char *device = qdev_id ?: blk_name; in do_open_tray() local 120 void qmp_blockdev_open_tray(const char *device, in qmp_blockdev_open_tray() argument 139 void qmp_blockdev_close_tray(const char *device, in qmp_blockdev_close_tray() argument 146 blk = qmp_get_blk(device, id, errp); in qmp_blockdev_close_tray() 181 blk = qmp_get_blk(device, id, errp); in blockdev_remove_medium() 282 blk = qmp_get_blk(device, id, errp); in blockdev_insert_medium() 324 blk = qmp_get_blk(device, id, errp); in qmp_blockdev_change_medium() 371 rc = do_open_tray(device, id, force, &err); in qmp_blockdev_change_medium() 379 blockdev_remove_medium(device, id, &err); in qmp_blockdev_change_medium() 391 qmp_blockdev_close_tray(device, id, errp); in qmp_blockdev_change_medium() [all …]
|
/qemu/docs/devel/ |
H A D | vfio-iommufd.rst | 10 the new iommufd interface is device-centric, relying on device fd and iommufd. 46 Kernel | device fd | 49 | ATTACH_IOAS) | | device fd 57 | iommfd core | | device | | vfio iommu | 70 - vfio legacy BE: device fd is retrieved from group fd ioctl 82 Step 1: configure the host device 93 Any QEMU device (e.g. VFIO device) wishing to use ``/dev/iommu`` must 96 device for example: 101 -device vfio-pci,host=0000:02:00.0,iommufd=iommufd0 110 -device vfio-pci,iommufd=iommufd0,fd=23 [all …]
|