search for: machine_q35

Displaying 6 results from an estimated 6 matches for "machine_q35".

2018 Jun 19
2
[PATCH] v2v: Set machine type explicitly for outputs which support it (RHBZ#1581428).
..._xml ?pool source target_buses guestcaps | Some { Uefi.flags = flags } when List.mem Uefi.UEFI_FLAG_SECURE_BOOT_REQUIRED flags -> true | _ -> false in - (* Currently these are required by secure boot, but in theory they - * might be independent properties. - *) - let machine_q35 = secure_boot_required in let smm = secure_boot_required in (* We have the machine features of the guest when it was on the @@ -140,7 +136,18 @@ let create_libvirt_xml ?pool source target_buses guestcaps (* The <os> section subelements. *) let os_section = - let machine = i...
2018 Jul 19
0
[PATCH] v2v: Model machine type explicitly.
...required = - match uefi_firmware with - | Some { Uefi.flags = flags } - when List.mem Uefi.UEFI_FLAG_SECURE_BOOT_REQUIRED flags -> true - | _ -> false in - (* Currently these are required by secure boot, but in theory they - * might be independent properties. - *) - let machine_q35 = secure_boot_required in + let machine, secure_boot_required = + match guestcaps.gcaps_machine, uefi_firmware with + | _, Some { Uefi.flags = flags } + when List.mem Uefi.UEFI_FLAG_SECURE_BOOT_REQUIRED flags -> + (* Force machine type to Q35 because PC does not support +...
2018 Jun 19
0
Re: [PATCH] v2v: Set machine type explicitly for outputs which support it (RHBZ#1581428).
...tcaps > | Some { Uefi.flags = flags } > when List.mem Uefi.UEFI_FLAG_SECURE_BOOT_REQUIRED flags -> true > | _ -> false in > - (* Currently these are required by secure boot, but in theory they > - * might be independent properties. > - *) > - let machine_q35 = secure_boot_required in > let smm = secure_boot_required in > > (* We have the machine features of the guest when it was on the > @@ -140,7 +136,18 @@ let create_libvirt_xml ?pool source target_buses guestcaps > > (* The <os> section subelements. *) > le...
2017 Mar 16
7
[PATCH 0/4] Pass CPU vendor, model and topology from source to target.
This is tangentially related to: https://bugzilla.redhat.com/show_bug.cgi?id=1372668 The problem in that bug is that we didn't pass the source CPU model (Sandybridge in that case) through to the target RHV hypervisor. So when the Windows guest booted on the target it gives an error about CPU hardware being disconnected (although it otherwise boots and works fine). This patch series
2017 Apr 27
4
[PATCH 0/4] common: Add a simple mini-library for handling qemu command and config files.
Currently we have an OCaml library for generating the qemu command line (used only by ‘virt-v2v -o qemu’). However we also generate a qemu command line in ‘lib/launch-direct.c’, and we might in future need to generate a ‘-readconfig’-compatible configuration file if we want to go beyond 10,000 drives for scalability testing. Therefore this patch series reimplements the qemu command line code as
2017 Mar 17
7
[PATCH v2 0/6] v2v: Pass CPU vendor, model and topology from source to target.
v1 -> v2: - Support for passing topology through -o glance. - Support for passing topology through -o rhv. - Use bool for acpi/apic/pae struct fields in virt-p2v. - Write the xpath expression in error messages instead of file/line. - Fix more memory leaks in virt-p2v cpuid.c. - Passes make check & check-valgrind. There may be some other minor changes. I believe that everything