]> git.ipfire.org Git - thirdparty/qemu.git/blame - qemu-doc.texi
Merge remote-tracking branch 'remotes/bonzini/tags/for-upstream' into staging
[thirdparty/qemu.git] / qemu-doc.texi
CommitLineData
386405f7 1\input texinfo @c -*- texinfo -*-
debc7065
FB
2@c %**start of header
3@setfilename qemu-doc.info
44cb280d 4@include version.texi
e080e785
SW
5
6@documentlanguage en
7@documentencoding UTF-8
8
44cb280d 9@settitle QEMU version @value{VERSION} User Documentation
debc7065
FB
10@exampleindent 0
11@paragraphindent 0
12@c %**end of header
386405f7 13
664785ac
TH
14@set qemu_system qemu-system-x86_64
15@set qemu_system_x86 qemu-system-x86_64
16
a1a32b05
SW
17@ifinfo
18@direntry
19* QEMU: (qemu-doc). The QEMU Emulator User Documentation.
20@end direntry
21@end ifinfo
22
0806e3f6 23@iftex
386405f7
FB
24@titlepage
25@sp 7
44cb280d 26@center @titlefont{QEMU version @value{VERSION}}
debc7065
FB
27@sp 1
28@center @titlefont{User Documentation}
386405f7
FB
29@sp 3
30@end titlepage
0806e3f6 31@end iftex
386405f7 32
debc7065
FB
33@ifnottex
34@node Top
35@top
36
37@menu
38* Introduction::
debc7065
FB
39* QEMU PC System emulator::
40* QEMU System emulator for non PC targets::
3f2ce724 41* QEMU Guest Agent::
83195237 42* QEMU User space emulator::
483c6ad4 43* System requirements::
e8412576 44* Security::
78e87797 45* Implementation notes::
eb22aeca 46* Deprecated features::
369e8f5b 47* Recently removed features::
45b47130 48* Supported build platforms::
7544a042 49* License::
debc7065
FB
50* Index::
51@end menu
52@end ifnottex
53
54@contents
55
56@node Introduction
386405f7
FB
57@chapter Introduction
58
debc7065
FB
59@menu
60* intro_features:: Features
61@end menu
62
63@node intro_features
322d0c66 64@section Features
386405f7 65
1f673135
FB
66QEMU is a FAST! processor emulator using dynamic translation to
67achieve good emulation speed.
1eb20527 68
1f3e7e41 69@cindex operating modes
1eb20527 70QEMU has two operating modes:
0806e3f6 71
d7e5edca 72@itemize
7544a042 73@cindex system emulation
1f3e7e41 74@item Full system emulation. In this mode, QEMU emulates a full system (for
3f9f3aa1
FB
75example a PC), including one or several processors and various
76peripherals. It can be used to launch different Operating Systems
77without rebooting the PC or to debug system code.
1eb20527 78
7544a042 79@cindex user mode emulation
1f3e7e41 80@item User mode emulation. In this mode, QEMU can launch
83195237 81processes compiled for one CPU on another CPU. It can be used to
70b7fba9 82launch the Wine Windows API emulator (@url{https://www.winehq.org}) or
1f673135 83to ease cross-compilation and cross-debugging.
1eb20527
FB
84
85@end itemize
86
1f3e7e41
PB
87QEMU has the following features:
88
89@itemize
90@item QEMU can run without a host kernel driver and yet gives acceptable
91performance. It uses dynamic translation to native code for reasonable speed,
92with support for self-modifying code and precise exceptions.
93
94@item It is portable to several operating systems (GNU/Linux, *BSD, Mac OS X,
95Windows) and architectures.
96
97@item It performs accurate software emulation of the FPU.
98@end itemize
322d0c66 99
1f3e7e41 100QEMU user mode emulation has the following features:
52c00a5f 101@itemize
1f3e7e41
PB
102@item Generic Linux system call converter, including most ioctls.
103
104@item clone() emulation using native CPU clone() to use Linux scheduler for threads.
105
106@item Accurate signal handling by remapping host signals to target signals.
107@end itemize
108
109QEMU full system emulation has the following features:
110@itemize
111@item
112QEMU uses a full software MMU for maximum portability.
113
114@item
326c4c3c 115QEMU can optionally use an in-kernel accelerator, like kvm. The accelerators
1f3e7e41
PB
116execute most of the guest code natively, while
117continuing to emulate the rest of the machine.
118
119@item
120Various hardware devices can be emulated and in some cases, host
121devices (e.g. serial and parallel ports, USB, drives) can be used
122transparently by the guest Operating System. Host device passthrough
123can be used for talking to external physical peripherals (e.g. a
124webcam, modem or tape drive).
125
126@item
127Symmetric multiprocessing (SMP) support. Currently, an in-kernel
128accelerator is required to use more than one host CPU for emulation.
129
52c00a5f 130@end itemize
386405f7 131
0806e3f6 132
debc7065 133@node QEMU PC System emulator
3f9f3aa1 134@chapter QEMU PC System emulator
7544a042 135@cindex system emulation (PC)
1eb20527 136
debc7065
FB
137@menu
138* pcsys_introduction:: Introduction
139* pcsys_quickstart:: Quick Start
140* sec_invocation:: Invocation
a40db1b3
PM
141* pcsys_keys:: Keys in the graphical frontends
142* mux_keys:: Keys in the character backend multiplexer
debc7065 143* pcsys_monitor:: QEMU Monitor
2544e9e4 144* cpu_models:: CPU models
debc7065
FB
145* disk_images:: Disk Images
146* pcsys_network:: Network emulation
576fd0a1 147* pcsys_other_devs:: Other Devices
debc7065
FB
148* direct_linux_boot:: Direct Linux Boot
149* pcsys_usb:: USB emulation
f858dcae 150* vnc_security:: VNC security
5d19a6ea 151* network_tls:: TLS setup for network services
debc7065
FB
152* gdb_usage:: GDB usage
153* pcsys_os_specific:: Target OS specific information
154@end menu
155
156@node pcsys_introduction
0806e3f6
FB
157@section Introduction
158
159@c man begin DESCRIPTION
160
3f9f3aa1
FB
161The QEMU PC System emulator simulates the
162following peripherals:
0806e3f6
FB
163
164@itemize @minus
5fafdf24 165@item
15a34c63 166i440FX host PCI bridge and PIIX3 PCI to ISA bridge
0806e3f6 167@item
15a34c63
FB
168Cirrus CLGD 5446 PCI VGA card or dummy VGA card with Bochs VESA
169extensions (hardware level, including all non standard modes).
0806e3f6
FB
170@item
171PS/2 mouse and keyboard
5fafdf24 172@item
15a34c63 1732 PCI IDE interfaces with hard disk and CD-ROM support
1f673135
FB
174@item
175Floppy disk
5fafdf24 176@item
3a2eeac0 177PCI and ISA network adapters
0806e3f6 178@item
05d5818c
FB
179Serial ports
180@item
23076bb3
CM
181IPMI BMC, either and internal or external one
182@item
c0fe3827
FB
183Creative SoundBlaster 16 sound card
184@item
185ENSONIQ AudioPCI ES1370 sound card
186@item
e5c9a13e
AZ
187Intel 82801AA AC97 Audio compatible sound card
188@item
7d72e762
GH
189Intel HD Audio Controller and HDA codec
190@item
2d983446 191Adlib (OPL2) - Yamaha YM3812 compatible chip
b389dbfb 192@item
26463dbc
AZ
193Gravis Ultrasound GF1 sound card
194@item
cc53d26d 195CS4231A compatible sound card
196@item
a92ff8c1 197PCI UHCI, OHCI, EHCI or XHCI USB controller and a virtual USB-1.1 hub.
0806e3f6
FB
198@end itemize
199
3f9f3aa1
FB
200SMP is supported with up to 255 CPUs.
201
a8ad4159 202QEMU uses the PC BIOS from the Seabios project and the Plex86/Bochs LGPL
15a34c63
FB
203VGA BIOS.
204
c0fe3827
FB
205QEMU uses YM3812 emulation by Tatsuyuki Satoh.
206
2d983446 207QEMU uses GUS emulation (GUSEMU32 @url{http://www.deinmeister.de/gusemu/})
26463dbc 208by Tibor "TS" Schütz.
423d65f4 209
1a1a0e20 210Note that, by default, GUS shares IRQ(7) with parallel ports and so
b65ee4fa 211QEMU must be told to not have parallel ports to have working GUS.
720036a5 212
213@example
664785ac 214@value{qemu_system_x86} dos.img -soundhw gus -parallel none
720036a5 215@end example
216
217Alternatively:
218@example
664785ac 219@value{qemu_system_x86} dos.img -device gus,irq=5
720036a5 220@end example
221
222Or some other unclaimed IRQ.
223
cc53d26d 224CS4231A is the chip used in Windows Sound System and GUSMAX products
225
0806e3f6
FB
226@c man end
227
debc7065 228@node pcsys_quickstart
1eb20527 229@section Quick Start
7544a042 230@cindex quick start
1eb20527 231
664785ac
TH
232Download and uncompress a hard disk image with Linux installed (e.g.
233@file{linux.img}) and type:
0806e3f6
FB
234
235@example
664785ac 236@value{qemu_system} linux.img
0806e3f6
FB
237@end example
238
239Linux should boot and give you a prompt.
240
6cc721cf 241@node sec_invocation
ec410fc9
FB
242@section Invocation
243
244@example
0806e3f6 245@c man begin SYNOPSIS
664785ac 246@command{@value{qemu_system}} [@var{options}] [@var{disk_image}]
0806e3f6 247@c man end
ec410fc9
FB
248@end example
249
0806e3f6 250@c man begin OPTIONS
d2c639d6
BS
251@var{disk_image} is a raw hard disk image for IDE hard disk 0. Some
252targets do not need a disk image.
ec410fc9 253
5824d651 254@include qemu-options.texi
ec410fc9 255
3e11db9a
FB
256@c man end
257
e896d0f9
MA
258@subsection Device URL Syntax
259@c TODO merge this with section Disk Images
260
261@c man begin NOTES
262
263In addition to using normal file images for the emulated storage devices,
264QEMU can also use networked resources such as iSCSI devices. These are
265specified using a special URL syntax.
266
267@table @option
268@item iSCSI
269iSCSI support allows QEMU to access iSCSI resources directly and use as
270images for the guest storage. Both disk and cdrom images are supported.
271
272Syntax for specifying iSCSI LUNs is
273``iscsi://<target-ip>[:<port>]/<target-iqn>/<lun>''
274
275By default qemu will use the iSCSI initiator-name
276'iqn.2008-11.org.linux-kvm[:<name>]' but this can also be set from the command
277line or a configuration file.
278
279Since version Qemu 2.4 it is possible to specify a iSCSI request timeout to detect
280stalled requests and force a reestablishment of the session. The timeout
281is specified in seconds. The default is 0 which means no timeout. Libiscsi
2821.15.0 or greater is required for this feature.
283
284Example (without authentication):
285@example
664785ac 286@value{qemu_system} -iscsi initiator-name=iqn.2001-04.com.example:my-initiator \
e896d0f9
MA
287 -cdrom iscsi://192.0.2.1/iqn.2001-04.com.example/2 \
288 -drive file=iscsi://192.0.2.1/iqn.2001-04.com.example/1
289@end example
290
291Example (CHAP username/password via URL):
292@example
664785ac 293@value{qemu_system} -drive file=iscsi://user%password@@192.0.2.1/iqn.2001-04.com.example/1
e896d0f9
MA
294@end example
295
296Example (CHAP username/password via environment variables):
297@example
298LIBISCSI_CHAP_USERNAME="user" \
299LIBISCSI_CHAP_PASSWORD="password" \
664785ac 300@value{qemu_system} -drive file=iscsi://192.0.2.1/iqn.2001-04.com.example/1
e896d0f9
MA
301@end example
302
303@item NBD
304QEMU supports NBD (Network Block Devices) both using TCP protocol as well
0c61ebb0 305as Unix Domain Sockets. With TCP, the default port is 10809.
e896d0f9 306
0c61ebb0
EB
307Syntax for specifying a NBD device using TCP, in preferred URI form:
308``nbd://<server-ip>[:<port>]/[<export>]''
309
310Syntax for specifying a NBD device using Unix Domain Sockets; remember
311that '?' is a shell glob character and may need quoting:
312``nbd+unix:///[<export>]?socket=<domain-socket>''
313
314Older syntax that is also recognized:
e896d0f9
MA
315``nbd:<server-ip>:<port>[:exportname=<export>]''
316
317Syntax for specifying a NBD device using Unix Domain Sockets
318``nbd:unix:<domain-socket>[:exportname=<export>]''
319
320Example for TCP
321@example
664785ac 322@value{qemu_system} --drive file=nbd:192.0.2.1:30000
e896d0f9
MA
323@end example
324
325Example for Unix Domain Sockets
326@example
664785ac 327@value{qemu_system} --drive file=nbd:unix:/tmp/nbd-socket
e896d0f9
MA
328@end example
329
330@item SSH
331QEMU supports SSH (Secure Shell) access to remote disks.
332
333Examples:
334@example
664785ac
TH
335@value{qemu_system} -drive file=ssh://user@@host/path/to/disk.img
336@value{qemu_system} -drive file.driver=ssh,file.user=user,file.host=host,file.port=22,file.path=/path/to/disk.img
e896d0f9
MA
337@end example
338
339Currently authentication must be done using ssh-agent. Other
340authentication methods may be supported in future.
341
342@item Sheepdog
343Sheepdog is a distributed storage system for QEMU.
344QEMU supports using either local sheepdog devices or remote networked
345devices.
346
347Syntax for specifying a sheepdog device
348@example
349sheepdog[+tcp|+unix]://[host:port]/vdiname[?socket=path][#snapid|#tag]
350@end example
351
352Example
353@example
664785ac 354@value{qemu_system} --drive file=sheepdog://192.0.2.1:30000/MyVirtualMachine
e896d0f9
MA
355@end example
356
357See also @url{https://sheepdog.github.io/sheepdog/}.
358
359@item GlusterFS
360GlusterFS is a user space distributed file system.
361QEMU supports the use of GlusterFS volumes for hosting VM disk images using
362TCP, Unix Domain Sockets and RDMA transport protocols.
363
364Syntax for specifying a VM disk image on GlusterFS volume is
365@example
366
367URI:
368gluster[+type]://[host[:port]]/volume/path[?socket=...][,debug=N][,logfile=...]
369
370JSON:
371'json:@{"driver":"qcow2","file":@{"driver":"gluster","volume":"testvol","path":"a.img","debug":N,"logfile":"...",
372@ "server":[@{"type":"tcp","host":"...","port":"..."@},
373@ @{"type":"unix","socket":"..."@}]@}@}'
374@end example
375
376
377Example
378@example
379URI:
664785ac 380@value{qemu_system} --drive file=gluster://192.0.2.1/testvol/a.img,
e896d0f9
MA
381@ file.debug=9,file.logfile=/var/log/qemu-gluster.log
382
383JSON:
664785ac 384@value{qemu_system} 'json:@{"driver":"qcow2",
e896d0f9
MA
385@ "file":@{"driver":"gluster",
386@ "volume":"testvol","path":"a.img",
387@ "debug":9,"logfile":"/var/log/qemu-gluster.log",
388@ "server":[@{"type":"tcp","host":"1.2.3.4","port":24007@},
389@ @{"type":"unix","socket":"/var/run/glusterd.socket"@}]@}@}'
664785ac 390@value{qemu_system} -drive driver=qcow2,file.driver=gluster,file.volume=testvol,file.path=/path/a.img,
e896d0f9
MA
391@ file.debug=9,file.logfile=/var/log/qemu-gluster.log,
392@ file.server.0.type=tcp,file.server.0.host=1.2.3.4,file.server.0.port=24007,
393@ file.server.1.type=unix,file.server.1.socket=/var/run/glusterd.socket
394@end example
395
396See also @url{http://www.gluster.org}.
397
398@item HTTP/HTTPS/FTP/FTPS
399QEMU supports read-only access to files accessed over http(s) and ftp(s).
400
401Syntax using a single filename:
402@example
403<protocol>://[<username>[:<password>]@@]<host>/<path>
404@end example
405
406where:
407@table @option
408@item protocol
409'http', 'https', 'ftp', or 'ftps'.
410
411@item username
412Optional username for authentication to the remote server.
413
414@item password
415Optional password for authentication to the remote server.
416
417@item host
418Address of the remote server.
419
420@item path
421Path on the remote server, including any query string.
422@end table
423
424The following options are also supported:
425@table @option
426@item url
427The full URL when passing options to the driver explicitly.
428
429@item readahead
430The amount of data to read ahead with each range request to the remote server.
431This value may optionally have the suffix 'T', 'G', 'M', 'K', 'k' or 'b'. If it
432does not have a suffix, it will be assumed to be in bytes. The value must be a
433multiple of 512 bytes. It defaults to 256k.
434
435@item sslverify
436Whether to verify the remote server's certificate when connecting over SSL. It
437can have the value 'on' or 'off'. It defaults to 'on'.
438
439@item cookie
440Send this cookie (it can also be a list of cookies separated by ';') with
441each outgoing request. Only supported when using protocols such as HTTP
442which support cookies, otherwise ignored.
443
444@item timeout
445Set the timeout in seconds of the CURL connection. This timeout is the time
446that CURL waits for a response from the remote server to get the size of the
447image to be downloaded. If not set, the default timeout of 5 seconds is used.
448@end table
449
450Note that when passing options to qemu explicitly, @option{driver} is the value
451of <protocol>.
452
453Example: boot from a remote Fedora 20 live ISO image
454@example
93bbbdf6 455@value{qemu_system_x86} --drive media=cdrom,file=https://archives.fedoraproject.org/pub/archive/fedora/linux/releases/20/Live/x86_64/Fedora-Live-Desktop-x86_64-20-1.iso,readonly
e896d0f9 456
93bbbdf6 457@value{qemu_system_x86} --drive media=cdrom,file.driver=http,file.url=http://archives.fedoraproject.org/pub/fedora/linux/releases/20/Live/x86_64/Fedora-Live-Desktop-x86_64-20-1.iso,readonly
e896d0f9
MA
458@end example
459
460Example: boot from a remote Fedora 20 cloud image using a local overlay for
461writes, copy-on-read, and a readahead of 64k
462@example
93bbbdf6 463qemu-img create -f qcow2 -o backing_file='json:@{"file.driver":"http",, "file.url":"http://archives.fedoraproject.org/pub/archive/fedora/linux/releases/20/Images/x86_64/Fedora-x86_64-20-20131211.1-sda.qcow2",, "file.readahead":"64k"@}' /tmp/Fedora-x86_64-20-20131211.1-sda.qcow2
e896d0f9 464
664785ac 465@value{qemu_system_x86} -drive file=/tmp/Fedora-x86_64-20-20131211.1-sda.qcow2,copy-on-read=on
e896d0f9
MA
466@end example
467
468Example: boot from an image stored on a VMware vSphere server with a self-signed
469certificate using a local overlay for writes, a readahead of 64k and a timeout
470of 10 seconds.
471@example
472qemu-img create -f qcow2 -o backing_file='json:@{"file.driver":"https",, "file.url":"https://user:password@@vsphere.example.com/folder/test/test-flat.vmdk?dcPath=Datacenter&dsName=datastore1",, "file.sslverify":"off",, "file.readahead":"64k",, "file.timeout":10@}' /tmp/test.qcow2
473
664785ac 474@value{qemu_system_x86} -drive file=/tmp/test.qcow2
e896d0f9
MA
475@end example
476
477@end table
478
479@c man end
480
debc7065 481@node pcsys_keys
a40db1b3 482@section Keys in the graphical frontends
3e11db9a
FB
483
484@c man begin OPTIONS
485
de1db2a1
BH
486During the graphical emulation, you can use special key combinations to change
487modes. The default key mappings are shown below, but if you use @code{-alt-grab}
488then the modifier is Ctrl-Alt-Shift (instead of Ctrl-Alt) and if you use
489@code{-ctrl-grab} then the modifier is the right Ctrl key (instead of Ctrl-Alt):
490
a1b74fe8 491@table @key
f9859310 492@item Ctrl-Alt-f
7544a042 493@kindex Ctrl-Alt-f
a1b74fe8 494Toggle full screen
a0a821a4 495
d6a65ba3
JK
496@item Ctrl-Alt-+
497@kindex Ctrl-Alt-+
498Enlarge the screen
499
500@item Ctrl-Alt--
501@kindex Ctrl-Alt--
502Shrink the screen
503
c4a735f9 504@item Ctrl-Alt-u
7544a042 505@kindex Ctrl-Alt-u
c4a735f9 506Restore the screen's un-scaled dimensions
507
f9859310 508@item Ctrl-Alt-n
7544a042 509@kindex Ctrl-Alt-n
a0a821a4
FB
510Switch to virtual console 'n'. Standard console mappings are:
511@table @emph
512@item 1
513Target system display
514@item 2
515Monitor
516@item 3
517Serial port
a1b74fe8
FB
518@end table
519
f9859310 520@item Ctrl-Alt
7544a042 521@kindex Ctrl-Alt
a0a821a4
FB
522Toggle mouse and keyboard grab.
523@end table
524
7544a042
SW
525@kindex Ctrl-Up
526@kindex Ctrl-Down
527@kindex Ctrl-PageUp
528@kindex Ctrl-PageDown
3e11db9a
FB
529In the virtual consoles, you can use @key{Ctrl-Up}, @key{Ctrl-Down},
530@key{Ctrl-PageUp} and @key{Ctrl-PageDown} to move in the back log.
531
a40db1b3
PM
532@c man end
533
534@node mux_keys
535@section Keys in the character backend multiplexer
536
537@c man begin OPTIONS
538
539During emulation, if you are using a character backend multiplexer
540(which is the default if you are using @option{-nographic}) then
541several commands are available via an escape sequence. These
542key sequences all start with an escape character, which is @key{Ctrl-a}
543by default, but can be changed with @option{-echr}. The list below assumes
544you're using the default.
ec410fc9
FB
545
546@table @key
a1b74fe8 547@item Ctrl-a h
7544a042 548@kindex Ctrl-a h
ec410fc9 549Print this help
3b46e624 550@item Ctrl-a x
7544a042 551@kindex Ctrl-a x
366dfc52 552Exit emulator
3b46e624 553@item Ctrl-a s
7544a042 554@kindex Ctrl-a s
1f47a922 555Save disk data back to file (if -snapshot)
20d8a3ed 556@item Ctrl-a t
7544a042 557@kindex Ctrl-a t
d2c639d6 558Toggle console timestamps
a1b74fe8 559@item Ctrl-a b
7544a042 560@kindex Ctrl-a b
1f673135 561Send break (magic sysrq in Linux)
a1b74fe8 562@item Ctrl-a c
7544a042 563@kindex Ctrl-a c
a40db1b3
PM
564Rotate between the frontends connected to the multiplexer (usually
565this switches between the monitor and the console)
a1b74fe8 566@item Ctrl-a Ctrl-a
a40db1b3
PM
567@kindex Ctrl-a Ctrl-a
568Send the escape character to the frontend
ec410fc9 569@end table
0806e3f6
FB
570@c man end
571
572@ignore
573
1f673135
FB
574@c man begin SEEALSO
575The HTML documentation of QEMU for more precise information and Linux
576user mode emulator invocation.
577@c man end
578
579@c man begin AUTHOR
580Fabrice Bellard
581@c man end
582
583@end ignore
584
debc7065 585@node pcsys_monitor
1f673135 586@section QEMU Monitor
7544a042 587@cindex QEMU monitor
1f673135
FB
588
589The QEMU monitor is used to give complex commands to the QEMU
590emulator. You can use it to:
591
592@itemize @minus
593
594@item
e598752a 595Remove or insert removable media images
89dfe898 596(such as CD-ROM or floppies).
1f673135 597
5fafdf24 598@item
1f673135
FB
599Freeze/unfreeze the Virtual Machine (VM) and save or restore its state
600from a disk file.
601
602@item Inspect the VM state without an external debugger.
603
604@end itemize
605
606@subsection Commands
607
608The following commands are available:
609
2313086a 610@include qemu-monitor.texi
0806e3f6 611
2cd8af2d
PB
612@include qemu-monitor-info.texi
613
1f673135
FB
614@subsection Integer expressions
615
616The monitor understands integers expressions for every integer
617argument. You can use register names to get the value of specifics
618CPU registers by prefixing them with @emph{$}.
ec410fc9 619
2544e9e4
DB
620@node cpu_models
621@section CPU models
622
623@include docs/qemu-cpu-models.texi
624
1f47a922
FB
625@node disk_images
626@section Disk Images
627
ee29bdb6
PB
628QEMU supports many disk image formats, including growable disk images
629(their size increase as non empty sectors are written), compressed and
630encrypted disk images.
1f47a922 631
debc7065
FB
632@menu
633* disk_images_quickstart:: Quick start for disk image creation
634* disk_images_snapshot_mode:: Snapshot mode
13a2e80f 635* vm_snapshots:: VM snapshots
debc7065 636* qemu_img_invocation:: qemu-img Invocation
975b092b 637* qemu_nbd_invocation:: qemu-nbd Invocation
d3067b02 638* disk_images_formats:: Disk image file formats
19cb3738 639* host_drives:: Using host drives
debc7065 640* disk_images_fat_images:: Virtual FAT disk images
75818250 641* disk_images_nbd:: NBD access
42af9c30 642* disk_images_sheepdog:: Sheepdog disk images
00984e39 643* disk_images_iscsi:: iSCSI LUNs
8809e289 644* disk_images_gluster:: GlusterFS disk images
0a12ec87 645* disk_images_ssh:: Secure Shell (ssh) disk images
e86de5e4 646* disk_images_nvme:: NVMe userspace driver
b1d1cb27 647* disk_image_locking:: Disk image file locking
debc7065
FB
648@end menu
649
650@node disk_images_quickstart
acd935ef
FB
651@subsection Quick start for disk image creation
652
653You can create a disk image with the command:
1f47a922 654@example
acd935ef 655qemu-img create myimage.img mysize
1f47a922 656@end example
acd935ef
FB
657where @var{myimage.img} is the disk image filename and @var{mysize} is its
658size in kilobytes. You can add an @code{M} suffix to give the size in
659megabytes and a @code{G} suffix for gigabytes.
660
debc7065 661See @ref{qemu_img_invocation} for more information.
1f47a922 662
debc7065 663@node disk_images_snapshot_mode
1f47a922
FB
664@subsection Snapshot mode
665
666If you use the option @option{-snapshot}, all disk images are
667considered as read only. When sectors in written, they are written in
668a temporary file created in @file{/tmp}. You can however force the
acd935ef
FB
669write back to the raw disk images by using the @code{commit} monitor
670command (or @key{C-a s} in the serial console).
1f47a922 671
13a2e80f
FB
672@node vm_snapshots
673@subsection VM snapshots
674
675VM snapshots are snapshots of the complete virtual machine including
676CPU state, RAM, device state and the content of all the writable
677disks. In order to use VM snapshots, you must have at least one non
678removable and writable block device using the @code{qcow2} disk image
679format. Normally this device is the first virtual hard drive.
680
681Use the monitor command @code{savevm} to create a new VM snapshot or
682replace an existing one. A human readable name can be assigned to each
19d36792 683snapshot in addition to its numerical ID.
13a2e80f
FB
684
685Use @code{loadvm} to restore a VM snapshot and @code{delvm} to remove
686a VM snapshot. @code{info snapshots} lists the available snapshots
687with their associated information:
688
689@example
690(qemu) info snapshots
691Snapshot devices: hda
692Snapshot list (from hda):
693ID TAG VM SIZE DATE VM CLOCK
6941 start 41M 2006-08-06 12:38:02 00:00:14.954
6952 40M 2006-08-06 12:43:29 00:00:18.633
6963 msys 40M 2006-08-06 12:44:04 00:00:23.514
697@end example
698
699A VM snapshot is made of a VM state info (its size is shown in
700@code{info snapshots}) and a snapshot of every writable disk image.
701The VM state info is stored in the first @code{qcow2} non removable
702and writable block device. The disk image snapshots are stored in
703every disk image. The size of a snapshot in a disk image is difficult
704to evaluate and is not shown by @code{info snapshots} because the
705associated disk sectors are shared among all the snapshots to save
19d36792
FB
706disk space (otherwise each snapshot would need a full copy of all the
707disk images).
13a2e80f
FB
708
709When using the (unrelated) @code{-snapshot} option
710(@ref{disk_images_snapshot_mode}), you can always make VM snapshots,
711but they are deleted as soon as you exit QEMU.
712
713VM snapshots currently have the following known limitations:
714@itemize
5fafdf24 715@item
13a2e80f
FB
716They cannot cope with removable devices if they are removed or
717inserted after a snapshot is done.
5fafdf24 718@item
13a2e80f
FB
719A few device drivers still have incomplete snapshot support so their
720state is not saved or restored properly (in particular USB).
721@end itemize
722
acd935ef
FB
723@node qemu_img_invocation
724@subsection @code{qemu-img} Invocation
1f47a922 725
acd935ef 726@include qemu-img.texi
05efe46e 727
975b092b
TS
728@node qemu_nbd_invocation
729@subsection @code{qemu-nbd} Invocation
730
731@include qemu-nbd.texi
732
78aa8aa0 733@include docs/qemu-block-drivers.texi
0a12ec87 734
debc7065 735@node pcsys_network
9d4fb82e
FB
736@section Network emulation
737
0e0266c2
TH
738QEMU can simulate several network cards (e.g. PCI or ISA cards on the PC
739target) and can connect them to a network backend on the host or an emulated
740hub. The various host network backends can either be used to connect the NIC of
741the guest to a real network (e.g. by using a TAP devices or the non-privileged
742user mode network stack), or to other guest instances running in another QEMU
743process (e.g. by using the socket host network backend).
9d4fb82e 744
41d03949
FB
745@subsection Using TAP network interfaces
746
747This is the standard way to connect QEMU to a real network. QEMU adds
748a virtual network device on your host (called @code{tapN}), and you
749can then configure it as if it was a real ethernet card.
9d4fb82e 750
8f40c388
FB
751@subsubsection Linux host
752
9d4fb82e
FB
753As an example, you can download the @file{linux-test-xxx.tar.gz}
754archive and copy the script @file{qemu-ifup} in @file{/etc} and
755configure properly @code{sudo} so that the command @code{ifconfig}
756contained in @file{qemu-ifup} can be executed as root. You must verify
41d03949 757that your host kernel supports the TAP network interfaces: the
9d4fb82e
FB
758device @file{/dev/net/tun} must be present.
759
ee0f4751
FB
760See @ref{sec_invocation} to have examples of command lines using the
761TAP network interfaces.
9d4fb82e 762
8f40c388
FB
763@subsubsection Windows host
764
765There is a virtual ethernet driver for Windows 2000/XP systems, called
766TAP-Win32. But it is not included in standard QEMU for Windows,
767so you will need to get it separately. It is part of OpenVPN package,
70b7fba9 768so download OpenVPN from : @url{https://openvpn.net/}.
8f40c388 769
9d4fb82e
FB
770@subsection Using the user mode network stack
771
41d03949
FB
772By using the option @option{-net user} (default configuration if no
773@option{-net} option is specified), QEMU uses a completely user mode
4be456f1 774network stack (you don't need root privilege to use the virtual
41d03949 775network). The virtual network configuration is the following:
9d4fb82e
FB
776
777@example
778
0e0266c2 779 guest (10.0.2.15) <------> Firewall/DHCP server <-----> Internet
41d03949 780 | (10.0.2.2)
9d4fb82e 781 |
2518bd0d 782 ----> DNS server (10.0.2.3)
3b46e624 783 |
2518bd0d 784 ----> SMB server (10.0.2.4)
9d4fb82e
FB
785@end example
786
787The QEMU VM behaves as if it was behind a firewall which blocks all
788incoming connections. You can use a DHCP client to automatically
41d03949
FB
789configure the network in the QEMU VM. The DHCP server assign addresses
790to the hosts starting from 10.0.2.15.
9d4fb82e
FB
791
792In order to check that the user mode network is working, you can ping
793the address 10.0.2.2 and verify that you got an address in the range
79410.0.2.x from the QEMU virtual DHCP server.
795
37cbfcce
GH
796Note that ICMP traffic in general does not work with user mode networking.
797@code{ping}, aka. ICMP echo, to the local router (10.0.2.2) shall work,
798however. If you're using QEMU on Linux >= 3.0, it can use unprivileged ICMP
799ping sockets to allow @code{ping} to the Internet. The host admin has to set
800the ping_group_range in order to grant access to those sockets. To allow ping
801for GID 100 (usually users group):
802
803@example
804echo 100 100 > /proc/sys/net/ipv4/ping_group_range
805@end example
b415a407 806
9bf05444
FB
807When using the built-in TFTP server, the router is also the TFTP
808server.
809
c8c6afa8
TH
810When using the @option{'-netdev user,hostfwd=...'} option, TCP or UDP
811connections can be redirected from the host to the guest. It allows for
812example to redirect X11, telnet or SSH connections.
443f1376 813
0e0266c2
TH
814@subsection Hubs
815
816QEMU can simulate several hubs. A hub can be thought of as a virtual connection
817between several network devices. These devices can be for example QEMU virtual
818ethernet cards or virtual Host ethernet devices (TAP devices). You can connect
819guest NICs or host network backends to such a hub using the @option{-netdev
820hubport} or @option{-nic hubport} options. The legacy @option{-net} option
821also connects the given device to the emulated hub with ID 0 (i.e. the default
822hub) unless you specify a netdev with @option{-net nic,netdev=xxx} here.
41d03949 823
0e0266c2 824@subsection Connecting emulated networks between QEMU instances
41d03949 825
0e0266c2
TH
826Using the @option{-netdev socket} (or @option{-nic socket} or
827@option{-net socket}) option, it is possible to create emulated
828networks that span several QEMU instances.
829See the description of the @option{-netdev socket} option in the
830@ref{sec_invocation,,Invocation chapter} to have a basic example.
41d03949 831
576fd0a1 832@node pcsys_other_devs
6cbf4c8c
CM
833@section Other Devices
834
835@subsection Inter-VM Shared Memory device
836
5400c02b
MA
837On Linux hosts, a shared memory device is available. The basic syntax
838is:
6cbf4c8c
CM
839
840@example
664785ac 841@value{qemu_system_x86} -device ivshmem-plain,memdev=@var{hostmem}
5400c02b
MA
842@end example
843
844where @var{hostmem} names a host memory backend. For a POSIX shared
845memory backend, use something like
846
847@example
848-object memory-backend-file,size=1M,share,mem-path=/dev/shm/ivshmem,id=@var{hostmem}
6cbf4c8c
CM
849@end example
850
851If desired, interrupts can be sent between guest VMs accessing the same shared
852memory region. Interrupt support requires using a shared memory server and
853using a chardev socket to connect to it. The code for the shared memory server
854is qemu.git/contrib/ivshmem-server. An example syntax when using the shared
855memory server is:
856
857@example
a75eb03b 858# First start the ivshmem server once and for all
50d34c4e 859ivshmem-server -p @var{pidfile} -S @var{path} -m @var{shm-name} -l @var{shm-size} -n @var{vectors}
a75eb03b
DM
860
861# Then start your qemu instances with matching arguments
664785ac 862@value{qemu_system_x86} -device ivshmem-doorbell,vectors=@var{vectors},chardev=@var{id}
50d34c4e 863 -chardev socket,path=@var{path},id=@var{id}
6cbf4c8c
CM
864@end example
865
866When using the server, the guest will be assigned a VM ID (>=0) that allows guests
867using the same server to communicate via interrupts. Guests can read their
1309cf44 868VM ID from a device register (see ivshmem-spec.txt).
6cbf4c8c 869
62a830b6
MA
870@subsubsection Migration with ivshmem
871
5400c02b
MA
872With device property @option{master=on}, the guest will copy the shared
873memory on migration to the destination host. With @option{master=off},
874the guest will not be able to migrate with the device attached. In the
875latter case, the device should be detached and then reattached after
876migration using the PCI hotplug support.
6cbf4c8c 877
62a830b6
MA
878At most one of the devices sharing the same memory can be master. The
879master must complete migration before you plug back the other devices.
880
7d4f4bda
MAL
881@subsubsection ivshmem and hugepages
882
883Instead of specifying the <shm size> using POSIX shm, you may specify
884a memory backend that has hugepage support:
885
886@example
664785ac 887@value{qemu_system_x86} -object memory-backend-file,size=1G,mem-path=/dev/hugepages/my-shmem-file,share,id=mb1
5400c02b 888 -device ivshmem-plain,memdev=mb1
7d4f4bda
MAL
889@end example
890
891ivshmem-server also supports hugepages mount points with the
892@option{-m} memory path argument.
893
9d4fb82e
FB
894@node direct_linux_boot
895@section Direct Linux Boot
1f673135
FB
896
897This section explains how to launch a Linux kernel inside QEMU without
898having to make a full bootable image. It is very useful for fast Linux
ee0f4751 899kernel testing.
1f673135 900
ee0f4751 901The syntax is:
1f673135 902@example
664785ac 903@value{qemu_system} -kernel bzImage -hda rootdisk.img -append "root=/dev/hda"
1f673135
FB
904@end example
905
ee0f4751
FB
906Use @option{-kernel} to provide the Linux kernel image and
907@option{-append} to give the kernel command line arguments. The
908@option{-initrd} option can be used to provide an INITRD image.
1f673135 909
ee0f4751
FB
910If you do not need graphical output, you can disable it and redirect
911the virtual serial port and the QEMU monitor to the console with the
912@option{-nographic} option. The typical command line is:
1f673135 913@example
664785ac 914@value{qemu_system} -kernel bzImage -hda rootdisk.img \
3804da9d 915 -append "root=/dev/hda console=ttyS0" -nographic
1f673135
FB
916@end example
917
ee0f4751
FB
918Use @key{Ctrl-a c} to switch between the serial console and the
919monitor (@pxref{pcsys_keys}).
1f673135 920
debc7065 921@node pcsys_usb
b389dbfb
FB
922@section USB emulation
923
a92ff8c1
TH
924QEMU can emulate a PCI UHCI, OHCI, EHCI or XHCI USB controller. You can
925plug virtual USB devices or real host USB devices (only works with certain
926host operating systems). QEMU will automatically create and connect virtual
927USB hubs as necessary to connect multiple USB devices.
b389dbfb 928
0aff66b5
PB
929@menu
930* usb_devices::
931* host_usb_devices::
932@end menu
933@node usb_devices
934@subsection Connecting USB devices
b389dbfb 935
a92ff8c1
TH
936USB devices can be connected with the @option{-device usb-...} command line
937option or the @code{device_add} monitor command. Available devices are:
b389dbfb 938
db380c06 939@table @code
a92ff8c1 940@item usb-mouse
0aff66b5 941Virtual Mouse. This will override the PS/2 mouse emulation when activated.
a92ff8c1 942@item usb-tablet
c6d46c20 943Pointer device that uses absolute coordinates (like a touchscreen).
b65ee4fa 944This means QEMU is able to report the mouse position without having
0aff66b5 945to grab the mouse. Also overrides the PS/2 mouse emulation when activated.
a92ff8c1
TH
946@item usb-storage,drive=@var{drive_id}
947Mass storage device backed by @var{drive_id} (@pxref{disk_images})
948@item usb-uas
949USB attached SCSI device, see
70b7fba9 950@url{https://git.qemu.org/?p=qemu.git;a=blob_plain;f=docs/usb-storage.txt,usb-storage.txt}
a92ff8c1
TH
951for details
952@item usb-bot
953Bulk-only transport storage device, see
70b7fba9 954@url{https://git.qemu.org/?p=qemu.git;a=blob_plain;f=docs/usb-storage.txt,usb-storage.txt}
a92ff8c1 955for details here, too
1ee53067 956@item usb-mtp,rootdir=@var{dir}
a92ff8c1
TH
957Media transfer protocol device, using @var{dir} as root of the file tree
958that is presented to the guest.
959@item usb-host,hostbus=@var{bus},hostaddr=@var{addr}
960Pass through the host device identified by @var{bus} and @var{addr}
961@item usb-host,vendorid=@var{vendor},productid=@var{product}
962Pass through the host device identified by @var{vendor} and @var{product} ID
963@item usb-wacom-tablet
f6d2a316
AZ
964Virtual Wacom PenPartner tablet. This device is similar to the @code{tablet}
965above but it can be used with the tslib library because in addition to touch
966coordinates it reports touch pressure.
a92ff8c1 967@item usb-kbd
47b2d338 968Standard USB keyboard. Will override the PS/2 keyboard (if present).
a92ff8c1 969@item usb-serial,chardev=@var{id}
db380c06 970Serial converter. This emulates an FTDI FT232BM chip connected to host character
a92ff8c1
TH
971device @var{id}.
972@item usb-braille,chardev=@var{id}
2e4d9fb1 973Braille device. This will use BrlAPI to display the braille output on a real
a92ff8c1
TH
974or fake device referenced by @var{id}.
975@item usb-net[,netdev=@var{id}]
976Network adapter that supports CDC ethernet and RNDIS protocols. @var{id}
977specifies a netdev defined with @code{-netdev @dots{},id=@var{id}}.
9ad97e65 978For instance, user-mode networking can be used with
6c9f886c 979@example
664785ac 980@value{qemu_system} [...] -netdev user,id=net0 -device usb-net,netdev=net0
6c9f886c 981@end example
a92ff8c1
TH
982@item usb-ccid
983Smartcard reader device
984@item usb-audio
985USB audio device
986@item usb-bt-dongle
987Bluetooth dongle for the transport layer of HCI. It is connected to HCI
988scatternet 0 by default (corresponds to @code{-bt hci,vlan=0}).
989Note that the syntax for the @code{-device usb-bt-dongle} option is not as
990useful yet as it was with the legacy @code{-usbdevice} option. So to
991configure an USB bluetooth device, you might need to use
992"@code{-usbdevice bt}[:@var{hci-type}]" instead. This configures a
993bluetooth dongle whose type is specified in the same format as with
2d564691
AZ
994the @option{-bt hci} option, @pxref{bt-hcis,,allowed HCI types}. If
995no type is given, the HCI logic corresponds to @code{-bt hci,vlan=0}.
996This USB device implements the USB Transport Layer of HCI. Example
997usage:
998@example
664785ac 999@command{@value{qemu_system}} [...@var{OPTIONS}...] @option{-usbdevice} bt:hci,vlan=3 @option{-bt} device:keyboard,vlan=3
2d564691 1000@end example
0aff66b5 1001@end table
b389dbfb 1002
0aff66b5 1003@node host_usb_devices
b389dbfb
FB
1004@subsection Using host USB devices on a Linux host
1005
1006WARNING: this is an experimental feature. QEMU will slow down when
1007using it. USB devices requiring real time streaming (i.e. USB Video
1008Cameras) are not supported yet.
1009
1010@enumerate
5fafdf24 1011@item If you use an early Linux 2.4 kernel, verify that no Linux driver
b389dbfb
FB
1012is actually using the USB device. A simple way to do that is simply to
1013disable the corresponding kernel module by renaming it from @file{mydriver.o}
1014to @file{mydriver.o.disabled}.
1015
1016@item Verify that @file{/proc/bus/usb} is working (most Linux distributions should enable it by default). You should see something like that:
1017@example
1018ls /proc/bus/usb
1019001 devices drivers
1020@end example
1021
1022@item Since only root can access to the USB devices directly, you can either launch QEMU as root or change the permissions of the USB devices you want to use. For testing, the following suffices:
1023@example
1024chown -R myuid /proc/bus/usb
1025@end example
1026
1027@item Launch QEMU and do in the monitor:
5fafdf24 1028@example
b389dbfb
FB
1029info usbhost
1030 Device 1.2, speed 480 Mb/s
1031 Class 00: USB device 1234:5678, USB DISK
1032@end example
1033You should see the list of the devices you can use (Never try to use
1034hubs, it won't work).
1035
1036@item Add the device in QEMU by using:
5fafdf24 1037@example
a92ff8c1 1038device_add usb-host,vendorid=0x1234,productid=0x5678
b389dbfb
FB
1039@end example
1040
a92ff8c1
TH
1041Normally the guest OS should report that a new USB device is plugged.
1042You can use the option @option{-device usb-host,...} to do the same.
b389dbfb
FB
1043
1044@item Now you can try to use the host USB device in QEMU.
1045
1046@end enumerate
1047
1048When relaunching QEMU, you may have to unplug and plug again the USB
1049device to make it work again (this is a bug).
1050
f858dcae
TS
1051@node vnc_security
1052@section VNC security
1053
1054The VNC server capability provides access to the graphical console
1055of the guest VM across the network. This has a number of security
1056considerations depending on the deployment scenarios.
1057
1058@menu
1059* vnc_sec_none::
1060* vnc_sec_password::
1061* vnc_sec_certificate::
1062* vnc_sec_certificate_verify::
1063* vnc_sec_certificate_pw::
2f9606b3
AL
1064* vnc_sec_sasl::
1065* vnc_sec_certificate_sasl::
2f9606b3 1066* vnc_setup_sasl::
f858dcae
TS
1067@end menu
1068@node vnc_sec_none
1069@subsection Without passwords
1070
1071The simplest VNC server setup does not include any form of authentication.
1072For this setup it is recommended to restrict it to listen on a UNIX domain
1073socket only. For example
1074
1075@example
664785ac 1076@value{qemu_system} [...OPTIONS...] -vnc unix:/home/joebloggs/.qemu-myvm-vnc
f858dcae
TS
1077@end example
1078
1079This ensures that only users on local box with read/write access to that
1080path can access the VNC server. To securely access the VNC server from a
1081remote machine, a combination of netcat+ssh can be used to provide a secure
1082tunnel.
1083
1084@node vnc_sec_password
1085@subsection With passwords
1086
1087The VNC protocol has limited support for password based authentication. Since
1088the protocol limits passwords to 8 characters it should not be considered
1089to provide high security. The password can be fairly easily brute-forced by
1090a client making repeat connections. For this reason, a VNC server using password
1091authentication should be restricted to only listen on the loopback interface
0f66998f
PM
1092or UNIX domain sockets. Password authentication is not supported when operating
1093in FIPS 140-2 compliance mode as it requires the use of the DES cipher. Password
1094authentication is requested with the @code{password} option, and then once QEMU
1095is running the password is set with the monitor. Until the monitor is used to
1096set the password all clients will be rejected.
f858dcae
TS
1097
1098@example
664785ac 1099@value{qemu_system} [...OPTIONS...] -vnc :1,password -monitor stdio
f858dcae
TS
1100(qemu) change vnc password
1101Password: ********
1102(qemu)
1103@end example
1104
1105@node vnc_sec_certificate
1106@subsection With x509 certificates
1107
1108The QEMU VNC server also implements the VeNCrypt extension allowing use of
1109TLS for encryption of the session, and x509 certificates for authentication.
1110The use of x509 certificates is strongly recommended, because TLS on its
1111own is susceptible to man-in-the-middle attacks. Basic x509 certificate
1112support provides a secure session, but no authentication. This allows any
1113client to connect, and provides an encrypted session.
1114
1115@example
664785ac 1116@value{qemu_system} [...OPTIONS...] \
756b9da7
DB
1117 -object tls-creds-x509,id=tls0,dir=/etc/pki/qemu,endpoint=server,verify-peer=no \
1118 -vnc :1,tls-creds=tls0 -monitor stdio
f858dcae
TS
1119@end example
1120
1121In the above example @code{/etc/pki/qemu} should contain at least three files,
1122@code{ca-cert.pem}, @code{server-cert.pem} and @code{server-key.pem}. Unprivileged
1123users will want to use a private directory, for example @code{$HOME/.pki/qemu}.
1124NB the @code{server-key.pem} file should be protected with file mode 0600 to
1125only be readable by the user owning it.
1126
1127@node vnc_sec_certificate_verify
1128@subsection With x509 certificates and client verification
1129
1130Certificates can also provide a means to authenticate the client connecting.
1131The server will request that the client provide a certificate, which it will
1132then validate against the CA certificate. This is a good choice if deploying
756b9da7
DB
1133in an environment with a private internal certificate authority. It uses the
1134same syntax as previously, but with @code{verify-peer} set to @code{yes}
1135instead.
f858dcae
TS
1136
1137@example
664785ac 1138@value{qemu_system} [...OPTIONS...] \
756b9da7
DB
1139 -object tls-creds-x509,id=tls0,dir=/etc/pki/qemu,endpoint=server,verify-peer=yes \
1140 -vnc :1,tls-creds=tls0 -monitor stdio
f858dcae
TS
1141@end example
1142
1143
1144@node vnc_sec_certificate_pw
1145@subsection With x509 certificates, client verification and passwords
1146
1147Finally, the previous method can be combined with VNC password authentication
1148to provide two layers of authentication for clients.
1149
1150@example
664785ac 1151@value{qemu_system} [...OPTIONS...] \
756b9da7
DB
1152 -object tls-creds-x509,id=tls0,dir=/etc/pki/qemu,endpoint=server,verify-peer=yes \
1153 -vnc :1,tls-creds=tls0,password -monitor stdio
f858dcae
TS
1154(qemu) change vnc password
1155Password: ********
1156(qemu)
1157@end example
1158
2f9606b3
AL
1159
1160@node vnc_sec_sasl
1161@subsection With SASL authentication
1162
1163The SASL authentication method is a VNC extension, that provides an
1164easily extendable, pluggable authentication method. This allows for
1165integration with a wide range of authentication mechanisms, such as
1166PAM, GSSAPI/Kerberos, LDAP, SQL databases, one-time keys and more.
1167The strength of the authentication depends on the exact mechanism
1168configured. If the chosen mechanism also provides a SSF layer, then
1169it will encrypt the datastream as well.
1170
1171Refer to the later docs on how to choose the exact SASL mechanism
1172used for authentication, but assuming use of one supporting SSF,
1173then QEMU can be launched with:
1174
1175@example
664785ac 1176@value{qemu_system} [...OPTIONS...] -vnc :1,sasl -monitor stdio
2f9606b3
AL
1177@end example
1178
1179@node vnc_sec_certificate_sasl
1180@subsection With x509 certificates and SASL authentication
1181
1182If the desired SASL authentication mechanism does not supported
1183SSF layers, then it is strongly advised to run it in combination
1184with TLS and x509 certificates. This provides securely encrypted
1185data stream, avoiding risk of compromising of the security
1186credentials. This can be enabled, by combining the 'sasl' option
1187with the aforementioned TLS + x509 options:
1188
1189@example
664785ac 1190@value{qemu_system} [...OPTIONS...] \
756b9da7
DB
1191 -object tls-creds-x509,id=tls0,dir=/etc/pki/qemu,endpoint=server,verify-peer=yes \
1192 -vnc :1,tls-creds=tls0,sasl -monitor stdio
2f9606b3
AL
1193@end example
1194
5d19a6ea
DB
1195@node vnc_setup_sasl
1196
1197@subsection Configuring SASL mechanisms
1198
1199The following documentation assumes use of the Cyrus SASL implementation on a
1200Linux host, but the principles should apply to any other SASL implementation
1201or host. When SASL is enabled, the mechanism configuration will be loaded from
1202system default SASL service config /etc/sasl2/qemu.conf. If running QEMU as an
1203unprivileged user, an environment variable SASL_CONF_PATH can be used to make
1204it search alternate locations for the service config file.
1205
1206If the TLS option is enabled for VNC, then it will provide session encryption,
1207otherwise the SASL mechanism will have to provide encryption. In the latter
1208case the list of possible plugins that can be used is drastically reduced. In
1209fact only the GSSAPI SASL mechanism provides an acceptable level of security
1210by modern standards. Previous versions of QEMU referred to the DIGEST-MD5
1211mechanism, however, it has multiple serious flaws described in detail in
1212RFC 6331 and thus should never be used any more. The SCRAM-SHA-1 mechanism
1213provides a simple username/password auth facility similar to DIGEST-MD5, but
1214does not support session encryption, so can only be used in combination with
1215TLS.
2f9606b3 1216
5d19a6ea 1217When not using TLS the recommended configuration is
f858dcae 1218
5d19a6ea
DB
1219@example
1220mech_list: gssapi
1221keytab: /etc/qemu/krb5.tab
1222@end example
1223
1224This says to use the 'GSSAPI' mechanism with the Kerberos v5 protocol, with
1225the server principal stored in /etc/qemu/krb5.tab. For this to work the
1226administrator of your KDC must generate a Kerberos principal for the server,
1227with a name of 'qemu/somehost.example.com@@EXAMPLE.COM' replacing
1228'somehost.example.com' with the fully qualified host name of the machine
1229running QEMU, and 'EXAMPLE.COM' with the Kerberos Realm.
1230
1231When using TLS, if username+password authentication is desired, then a
1232reasonable configuration is
1233
1234@example
1235mech_list: scram-sha-1
1236sasldb_path: /etc/qemu/passwd.db
1237@end example
1238
1239The @code{saslpasswd2} program can be used to populate the @code{passwd.db}
1240file with accounts.
1241
1242Other SASL configurations will be left as an exercise for the reader. Note that
1243all mechanisms, except GSSAPI, should be combined with use of TLS to ensure a
1244secure data channel.
1245
1246
1247@node network_tls
1248@section TLS setup for network services
1249
1250Almost all network services in QEMU have the ability to use TLS for
1251session data encryption, along with x509 certificates for simple
1252client authentication. What follows is a description of how to
1253generate certificates suitable for usage with QEMU, and applies to
1254the VNC server, character devices with the TCP backend, NBD server
1255and client, and migration server and client.
1256
1257At a high level, QEMU requires certificates and private keys to be
1258provided in PEM format. Aside from the core fields, the certificates
1259should include various extension data sets, including v3 basic
1260constraints data, key purpose, key usage and subject alt name.
1261
1262The GnuTLS package includes a command called @code{certtool} which can
1263be used to easily generate certificates and keys in the required format
1264with expected data present. Alternatively a certificate management
1265service may be used.
1266
1267At a minimum it is necessary to setup a certificate authority, and
1268issue certificates to each server. If using x509 certificates for
1269authentication, then each client will also need to be issued a
1270certificate.
1271
1272Assuming that the QEMU network services will only ever be exposed to
1273clients on a private intranet, there is no need to use a commercial
1274certificate authority to create certificates. A self-signed CA is
1275sufficient, and in fact likely to be more secure since it removes
1276the ability of malicious 3rd parties to trick the CA into mis-issuing
1277certs for impersonating your services. The only likely exception
1278where a commercial CA might be desirable is if enabling the VNC
1279websockets server and exposing it directly to remote browser clients.
1280In such a case it might be useful to use a commercial CA to avoid
1281needing to install custom CA certs in the web browsers.
1282
1283The recommendation is for the server to keep its certificates in either
1284@code{/etc/pki/qemu} or for unprivileged users in @code{$HOME/.pki/qemu}.
f858dcae
TS
1285
1286@menu
5d19a6ea
DB
1287* tls_generate_ca::
1288* tls_generate_server::
1289* tls_generate_client::
1290* tls_creds_setup::
e1a6dc91 1291* tls_psk::
f858dcae 1292@end menu
5d19a6ea
DB
1293@node tls_generate_ca
1294@subsection Setup the Certificate Authority
f858dcae
TS
1295
1296This step only needs to be performed once per organization / organizational
1297unit. First the CA needs a private key. This key must be kept VERY secret
1298and secure. If this key is compromised the entire trust chain of the certificates
1299issued with it is lost.
1300
1301@example
1302# certtool --generate-privkey > ca-key.pem
1303@end example
1304
5d19a6ea
DB
1305To generate a self-signed certificate requires one core piece of information,
1306the name of the organization. A template file @code{ca.info} should be
1307populated with the desired data to avoid having to deal with interactive
1308prompts from certtool:
f858dcae
TS
1309@example
1310# cat > ca.info <<EOF
1311cn = Name of your organization
1312ca
1313cert_signing_key
1314EOF
1315# certtool --generate-self-signed \
1316 --load-privkey ca-key.pem
1317 --template ca.info \
1318 --outfile ca-cert.pem
1319@end example
1320
5d19a6ea
DB
1321The @code{ca} keyword in the template sets the v3 basic constraints extension
1322to indicate this certificate is for a CA, while @code{cert_signing_key} sets
1323the key usage extension to indicate this will be used for signing other keys.
1324The generated @code{ca-cert.pem} file should be copied to all servers and
1325clients wishing to utilize TLS support in the VNC server. The @code{ca-key.pem}
1326must not be disclosed/copied anywhere except the host responsible for issuing
1327certificates.
f858dcae 1328
5d19a6ea
DB
1329@node tls_generate_server
1330@subsection Issuing server certificates
f858dcae
TS
1331
1332Each server (or host) needs to be issued with a key and certificate. When connecting
1333the certificate is sent to the client which validates it against the CA certificate.
5d19a6ea
DB
1334The core pieces of information for a server certificate are the hostnames and/or IP
1335addresses that will be used by clients when connecting. The hostname / IP address
1336that the client specifies when connecting will be validated against the hostname(s)
1337and IP address(es) recorded in the server certificate, and if no match is found
1338the client will close the connection.
1339
1340Thus it is recommended that the server certificate include both the fully qualified
1341and unqualified hostnames. If the server will have permanently assigned IP address(es),
1342and clients are likely to use them when connecting, they may also be included in the
1343certificate. Both IPv4 and IPv6 addresses are supported. Historically certificates
1344only included 1 hostname in the @code{CN} field, however, usage of this field for
1345validation is now deprecated. Instead modern TLS clients will validate against the
1346Subject Alt Name extension data, which allows for multiple entries. In the future
1347usage of the @code{CN} field may be discontinued entirely, so providing SAN
1348extension data is strongly recommended.
1349
1350On the host holding the CA, create template files containing the information
1351for each server, and use it to issue server certificates.
f858dcae
TS
1352
1353@example
5d19a6ea 1354# cat > server-hostNNN.info <<EOF
f858dcae 1355organization = Name of your organization
5d19a6ea
DB
1356cn = hostNNN.foo.example.com
1357dns_name = hostNNN
1358dns_name = hostNNN.foo.example.com
1359ip_address = 10.0.1.87
1360ip_address = 192.8.0.92
1361ip_address = 2620:0:cafe::87
1362ip_address = 2001:24::92
f858dcae
TS
1363tls_www_server
1364encryption_key
1365signing_key
1366EOF
5d19a6ea 1367# certtool --generate-privkey > server-hostNNN-key.pem
f858dcae
TS
1368# certtool --generate-certificate \
1369 --load-ca-certificate ca-cert.pem \
1370 --load-ca-privkey ca-key.pem \
5d19a6ea
DB
1371 --load-privkey server-hostNNN-key.pem \
1372 --template server-hostNNN.info \
1373 --outfile server-hostNNN-cert.pem
f858dcae
TS
1374@end example
1375
5d19a6ea
DB
1376The @code{dns_name} and @code{ip_address} fields in the template are setting
1377the subject alt name extension data. The @code{tls_www_server} keyword is the
1378key purpose extension to indicate this certificate is intended for usage in
1379a web server. Although QEMU network services are not in fact HTTP servers
1380(except for VNC websockets), setting this key purpose is still recommended.
1381The @code{encryption_key} and @code{signing_key} keyword is the key usage
1382extension to indicate this certificate is intended for usage in the data
1383session.
1384
1385The @code{server-hostNNN-key.pem} and @code{server-hostNNN-cert.pem} files
1386should now be securely copied to the server for which they were generated,
1387and renamed to @code{server-key.pem} and @code{server-cert.pem} when added
1388to the @code{/etc/pki/qemu} directory on the target host. The @code{server-key.pem}
1389file is security sensitive and should be kept protected with file mode 0600
1390to prevent disclosure.
1391
1392@node tls_generate_client
1393@subsection Issuing client certificates
f858dcae 1394
5d19a6ea
DB
1395The QEMU x509 TLS credential setup defaults to enabling client verification
1396using certificates, providing a simple authentication mechanism. If this
1397default is used, each client also needs to be issued a certificate. The client
1398certificate contains enough metadata to uniquely identify the client with the
1399scope of the certificate authority. The client certificate would typically
1400include fields for organization, state, city, building, etc.
1401
1402Once again on the host holding the CA, create template files containing the
1403information for each client, and use it to issue client certificates.
f858dcae 1404
f858dcae
TS
1405
1406@example
5d19a6ea 1407# cat > client-hostNNN.info <<EOF
f858dcae
TS
1408country = GB
1409state = London
5d19a6ea 1410locality = City Of London
63c693f8 1411organization = Name of your organization
5d19a6ea 1412cn = hostNNN.foo.example.com
f858dcae
TS
1413tls_www_client
1414encryption_key
1415signing_key
1416EOF
5d19a6ea 1417# certtool --generate-privkey > client-hostNNN-key.pem
f858dcae
TS
1418# certtool --generate-certificate \
1419 --load-ca-certificate ca-cert.pem \
1420 --load-ca-privkey ca-key.pem \
5d19a6ea
DB
1421 --load-privkey client-hostNNN-key.pem \
1422 --template client-hostNNN.info \
1423 --outfile client-hostNNN-cert.pem
f858dcae
TS
1424@end example
1425
5d19a6ea
DB
1426The subject alt name extension data is not required for clients, so the
1427the @code{dns_name} and @code{ip_address} fields are not included.
1428The @code{tls_www_client} keyword is the key purpose extension to indicate
1429this certificate is intended for usage in a web client. Although QEMU
1430network clients are not in fact HTTP clients, setting this key purpose is
1431still recommended. The @code{encryption_key} and @code{signing_key} keyword
1432is the key usage extension to indicate this certificate is intended for
1433usage in the data session.
1434
1435The @code{client-hostNNN-key.pem} and @code{client-hostNNN-cert.pem} files
1436should now be securely copied to the client for which they were generated,
1437and renamed to @code{client-key.pem} and @code{client-cert.pem} when added
1438to the @code{/etc/pki/qemu} directory on the target host. The @code{client-key.pem}
1439file is security sensitive and should be kept protected with file mode 0600
1440to prevent disclosure.
1441
1442If a single host is going to be using TLS in both a client and server
1443role, it is possible to create a single certificate to cover both roles.
1444This would be quite common for the migration and NBD services, where a
1445QEMU process will be started by accepting a TLS protected incoming migration,
1446and later itself be migrated out to another host. To generate a single
1447certificate, simply include the template data from both the client and server
1448instructions in one.
2f9606b3 1449
5d19a6ea
DB
1450@example
1451# cat > both-hostNNN.info <<EOF
1452country = GB
1453state = London
1454locality = City Of London
1455organization = Name of your organization
1456cn = hostNNN.foo.example.com
1457dns_name = hostNNN
1458dns_name = hostNNN.foo.example.com
1459ip_address = 10.0.1.87
1460ip_address = 192.8.0.92
1461ip_address = 2620:0:cafe::87
1462ip_address = 2001:24::92
1463tls_www_server
1464tls_www_client
1465encryption_key
1466signing_key
1467EOF
1468# certtool --generate-privkey > both-hostNNN-key.pem
1469# certtool --generate-certificate \
1470 --load-ca-certificate ca-cert.pem \
1471 --load-ca-privkey ca-key.pem \
1472 --load-privkey both-hostNNN-key.pem \
1473 --template both-hostNNN.info \
1474 --outfile both-hostNNN-cert.pem
1475@end example
c6a9a9f5 1476
5d19a6ea
DB
1477When copying the PEM files to the target host, save them twice,
1478once as @code{server-cert.pem} and @code{server-key.pem}, and
1479again as @code{client-cert.pem} and @code{client-key.pem}.
1480
1481@node tls_creds_setup
1482@subsection TLS x509 credential configuration
1483
1484QEMU has a standard mechanism for loading x509 credentials that will be
1485used for network services and clients. It requires specifying the
1486@code{tls-creds-x509} class name to the @code{--object} command line
1487argument for the system emulators. Each set of credentials loaded should
1488be given a unique string identifier via the @code{id} parameter. A single
1489set of TLS credentials can be used for multiple network backends, so VNC,
1490migration, NBD, character devices can all share the same credentials. Note,
1491however, that credentials for use in a client endpoint must be loaded
1492separately from those used in a server endpoint.
1493
1494When specifying the object, the @code{dir} parameters specifies which
1495directory contains the credential files. This directory is expected to
1496contain files with the names mentioned previously, @code{ca-cert.pem},
1497@code{server-key.pem}, @code{server-cert.pem}, @code{client-key.pem}
1498and @code{client-cert.pem} as appropriate. It is also possible to
1499include a set of pre-generated Diffie-Hellman (DH) parameters in a file
1500@code{dh-params.pem}, which can be created using the
1501@code{certtool --generate-dh-params} command. If omitted, QEMU will
1502dynamically generate DH parameters when loading the credentials.
1503
1504The @code{endpoint} parameter indicates whether the credentials will
1505be used for a network client or server, and determines which PEM
1506files are loaded.
1507
1508The @code{verify} parameter determines whether x509 certificate
1509validation should be performed. This defaults to enabled, meaning
1510clients will always validate the server hostname against the
1511certificate subject alt name fields and/or CN field. It also
1512means that servers will request that clients provide a certificate
1513and validate them. Verification should never be turned off for
1514client endpoints, however, it may be turned off for server endpoints
1515if an alternative mechanism is used to authenticate clients. For
1516example, the VNC server can use SASL to authenticate clients
1517instead.
1518
1519To load server credentials with client certificate validation
1520enabled
2f9606b3
AL
1521
1522@example
664785ac 1523@value{qemu_system} -object tls-creds-x509,id=tls0,dir=/etc/pki/qemu,endpoint=server
2f9606b3
AL
1524@end example
1525
5d19a6ea 1526while to load client credentials use
2f9606b3
AL
1527
1528@example
664785ac 1529@value{qemu_system} -object tls-creds-x509,id=tls0,dir=/etc/pki/qemu,endpoint=client
2f9606b3
AL
1530@end example
1531
5d19a6ea
DB
1532Network services which support TLS will all have a @code{tls-creds}
1533parameter which expects the ID of the TLS credentials object. For
1534example with VNC:
2f9606b3 1535
5d19a6ea 1536@example
664785ac 1537@value{qemu_system} -vnc 0.0.0.0:0,tls-creds=tls0
5d19a6ea 1538@end example
2f9606b3 1539
e1a6dc91
RJ
1540@node tls_psk
1541@subsection TLS Pre-Shared Keys (PSK)
1542
1543Instead of using certificates, you may also use TLS Pre-Shared Keys
1544(TLS-PSK). This can be simpler to set up than certificates but is
1545less scalable.
1546
1547Use the GnuTLS @code{psktool} program to generate a @code{keys.psk}
1548file containing one or more usernames and random keys:
1549
1550@example
1551mkdir -m 0700 /tmp/keys
1552psktool -u rich -p /tmp/keys/keys.psk
1553@end example
1554
1555TLS-enabled servers such as qemu-nbd can use this directory like so:
1556
1557@example
1558qemu-nbd \
1559 -t -x / \
1560 --object tls-creds-psk,id=tls0,endpoint=server,dir=/tmp/keys \
1561 --tls-creds tls0 \
1562 image.qcow2
1563@end example
1564
1565When connecting from a qemu-based client you must specify the
1566directory containing @code{keys.psk} and an optional @var{username}
1567(defaults to ``qemu''):
1568
1569@example
1570qemu-img info \
1571 --object tls-creds-psk,id=tls0,dir=/tmp/keys,username=rich,endpoint=client \
1572 --image-opts \
1573 file.driver=nbd,file.host=localhost,file.port=10809,file.tls-creds=tls0,file.export=/
1574@end example
1575
0806e3f6 1576@node gdb_usage
da415d54
FB
1577@section GDB usage
1578
1579QEMU has a primitive support to work with gdb, so that you can do
0806e3f6 1580'Ctrl-C' while the virtual machine is running and inspect its state.
da415d54 1581
b65ee4fa 1582In order to use gdb, launch QEMU with the '-s' option. It will wait for a
da415d54
FB
1583gdb connection:
1584@example
664785ac 1585@value{qemu_system} -s -kernel bzImage -hda rootdisk.img -append "root=/dev/hda"
da415d54
FB
1586Connected to host network interface: tun0
1587Waiting gdb connection on port 1234
1588@end example
1589
1590Then launch gdb on the 'vmlinux' executable:
1591@example
1592> gdb vmlinux
1593@end example
1594
1595In gdb, connect to QEMU:
1596@example
6c9bf893 1597(gdb) target remote localhost:1234
da415d54
FB
1598@end example
1599
1600Then you can use gdb normally. For example, type 'c' to launch the kernel:
1601@example
1602(gdb) c
1603@end example
1604
0806e3f6
FB
1605Here are some useful tips in order to use gdb on system code:
1606
1607@enumerate
1608@item
1609Use @code{info reg} to display all the CPU registers.
1610@item
1611Use @code{x/10i $eip} to display the code at the PC position.
1612@item
1613Use @code{set architecture i8086} to dump 16 bit code. Then use
294e8637 1614@code{x/10i $cs*16+$eip} to dump the code at the PC position.
0806e3f6
FB
1615@end enumerate
1616
60897d36
EI
1617Advanced debugging options:
1618
b6af0975 1619The default single stepping behavior is step with the IRQs and timer service routines off. It is set this way because when gdb executes a single step it expects to advance beyond the current instruction. With the IRQs and timer service routines on, a single step might jump into the one of the interrupt or exception vectors instead of executing the current instruction. This means you may hit the same breakpoint a number of times before executing the instruction gdb wants to have executed. Because there are rare circumstances where you want to single step into an interrupt vector the behavior can be controlled from GDB. There are three commands you can query and set the single step behavior:
94d45e44 1620@table @code
60897d36
EI
1621@item maintenance packet qqemu.sstepbits
1622
1623This will display the MASK bits used to control the single stepping IE:
1624@example
1625(gdb) maintenance packet qqemu.sstepbits
1626sending: "qqemu.sstepbits"
1627received: "ENABLE=1,NOIRQ=2,NOTIMER=4"
1628@end example
1629@item maintenance packet qqemu.sstep
1630
1631This will display the current value of the mask used when single stepping IE:
1632@example
1633(gdb) maintenance packet qqemu.sstep
1634sending: "qqemu.sstep"
1635received: "0x7"
1636@end example
1637@item maintenance packet Qqemu.sstep=HEX_VALUE
1638
1639This will change the single step mask, so if wanted to enable IRQs on the single step, but not timers, you would use:
1640@example
1641(gdb) maintenance packet Qqemu.sstep=0x5
1642sending: "qemu.sstep=0x5"
1643received: "OK"
1644@end example
94d45e44 1645@end table
60897d36 1646
debc7065 1647@node pcsys_os_specific
1a084f3d
FB
1648@section Target OS specific information
1649
1650@subsection Linux
1651
15a34c63
FB
1652To have access to SVGA graphic modes under X11, use the @code{vesa} or
1653the @code{cirrus} X11 driver. For optimal performances, use 16 bit
1654color depth in the guest and the host OS.
1a084f3d 1655
e3371e62
FB
1656When using a 2.6 guest Linux kernel, you should add the option
1657@code{clock=pit} on the kernel command line because the 2.6 Linux
1658kernels make very strict real time clock checks by default that QEMU
1659cannot simulate exactly.
1660
7c3fc84d
FB
1661When using a 2.6 guest Linux kernel, verify that the 4G/4G patch is
1662not activated because QEMU is slower with this patch. The QEMU
1663Accelerator Module is also much slower in this case. Earlier Fedora
4be456f1 1664Core 3 Linux kernel (< 2.6.9-1.724_FC3) were known to incorporate this
7c3fc84d
FB
1665patch by default. Newer kernels don't have it.
1666
1a084f3d
FB
1667@subsection Windows
1668
1669If you have a slow host, using Windows 95 is better as it gives the
1670best speed. Windows 2000 is also a good choice.
1671
e3371e62
FB
1672@subsubsection SVGA graphic modes support
1673
1674QEMU emulates a Cirrus Logic GD5446 Video
15a34c63
FB
1675card. All Windows versions starting from Windows 95 should recognize
1676and use this graphic card. For optimal performances, use 16 bit color
1677depth in the guest and the host OS.
1a084f3d 1678
3cb0853a
FB
1679If you are using Windows XP as guest OS and if you want to use high
1680resolution modes which the Cirrus Logic BIOS does not support (i.e. >=
16811280x1024x16), then you should use the VESA VBE virtual graphic card
1682(option @option{-std-vga}).
1683
e3371e62
FB
1684@subsubsection CPU usage reduction
1685
1686Windows 9x does not correctly use the CPU HLT
15a34c63
FB
1687instruction. The result is that it takes host CPU cycles even when
1688idle. You can install the utility from
70b7fba9 1689@url{https://web.archive.org/web/20060212132151/http://www.user.cityline.ru/~maxamn/amnhltm.zip}
3ba34a70 1690to solve this problem. Note that no such tool is needed for NT, 2000 or XP.
1a084f3d 1691
9d0a8e6f 1692@subsubsection Windows 2000 disk full problem
e3371e62 1693
9d0a8e6f
FB
1694Windows 2000 has a bug which gives a disk full problem during its
1695installation. When installing it, use the @option{-win2k-hack} QEMU
1696option to enable a specific workaround. After Windows 2000 is
1697installed, you no longer need this option (this option slows down the
1698IDE transfers).
e3371e62 1699
6cc721cf
FB
1700@subsubsection Windows 2000 shutdown
1701
1702Windows 2000 cannot automatically shutdown in QEMU although Windows 98
1703can. It comes from the fact that Windows 2000 does not automatically
1704use the APM driver provided by the BIOS.
1705
1706In order to correct that, do the following (thanks to Struan
1707Bartlett): go to the Control Panel => Add/Remove Hardware & Next =>
1708Add/Troubleshoot a device => Add a new device & Next => No, select the
1709hardware from a list & Next => NT Apm/Legacy Support & Next => Next
1710(again) a few times. Now the driver is installed and Windows 2000 now
5fafdf24 1711correctly instructs QEMU to shutdown at the appropriate moment.
6cc721cf
FB
1712
1713@subsubsection Share a directory between Unix and Windows
1714
c8c6afa8
TH
1715See @ref{sec_invocation} about the help of the option
1716@option{'-netdev user,smb=...'}.
6cc721cf 1717
2192c332 1718@subsubsection Windows XP security problem
e3371e62
FB
1719
1720Some releases of Windows XP install correctly but give a security
1721error when booting:
1722@example
1723A problem is preventing Windows from accurately checking the
1724license for this computer. Error code: 0x800703e6.
1725@end example
e3371e62 1726
2192c332
FB
1727The workaround is to install a service pack for XP after a boot in safe
1728mode. Then reboot, and the problem should go away. Since there is no
1729network while in safe mode, its recommended to download the full
1730installation of SP1 or SP2 and transfer that via an ISO or using the
1731vvfat block device ("-hdb fat:directory_which_holds_the_SP").
e3371e62 1732
a0a821a4
FB
1733@subsection MS-DOS and FreeDOS
1734
1735@subsubsection CPU usage reduction
1736
1737DOS does not correctly use the CPU HLT instruction. The result is that
3ba34a70 1738it takes host CPU cycles even when idle. You can install the utility from
70b7fba9 1739@url{https://web.archive.org/web/20051222085335/http://www.vmware.com/software/dosidle210.zip}
3ba34a70 1740to solve this problem.
a0a821a4 1741
debc7065 1742@node QEMU System emulator for non PC targets
3f9f3aa1
FB
1743@chapter QEMU System emulator for non PC targets
1744
1745QEMU is a generic emulator and it emulates many non PC
1746machines. Most of the options are similar to the PC emulator. The
4be456f1 1747differences are mentioned in the following sections.
3f9f3aa1 1748
debc7065 1749@menu
7544a042 1750* PowerPC System emulator::
24d4de45
TS
1751* Sparc32 System emulator::
1752* Sparc64 System emulator::
1753* MIPS System emulator::
1754* ARM System emulator::
1755* ColdFire System emulator::
7544a042
SW
1756* Cris System emulator::
1757* Microblaze System emulator::
1758* SH4 System emulator::
3aeaea65 1759* Xtensa System emulator::
debc7065
FB
1760@end menu
1761
7544a042
SW
1762@node PowerPC System emulator
1763@section PowerPC System emulator
1764@cindex system emulation (PowerPC)
1a084f3d 1765
15a34c63
FB
1766Use the executable @file{qemu-system-ppc} to simulate a complete PREP
1767or PowerMac PowerPC system.
1a084f3d 1768
b671f9ed 1769QEMU emulates the following PowerMac peripherals:
1a084f3d 1770
15a34c63 1771@itemize @minus
5fafdf24 1772@item
006f3a48 1773UniNorth or Grackle PCI Bridge
15a34c63
FB
1774@item
1775PCI VGA compatible card with VESA Bochs Extensions
5fafdf24 1776@item
15a34c63 17772 PMAC IDE interfaces with hard disk and CD-ROM support
5fafdf24 1778@item
15a34c63
FB
1779NE2000 PCI adapters
1780@item
1781Non Volatile RAM
1782@item
1783VIA-CUDA with ADB keyboard and mouse.
1a084f3d
FB
1784@end itemize
1785
b671f9ed 1786QEMU emulates the following PREP peripherals:
52c00a5f
FB
1787
1788@itemize @minus
5fafdf24 1789@item
15a34c63
FB
1790PCI Bridge
1791@item
1792PCI VGA compatible card with VESA Bochs Extensions
5fafdf24 1793@item
52c00a5f
FB
17942 IDE interfaces with hard disk and CD-ROM support
1795@item
1796Floppy disk
5fafdf24 1797@item
15a34c63 1798NE2000 network adapters
52c00a5f
FB
1799@item
1800Serial port
1801@item
1802PREP Non Volatile RAM
15a34c63
FB
1803@item
1804PC compatible keyboard and mouse.
52c00a5f
FB
1805@end itemize
1806
15a34c63 1807QEMU uses the Open Hack'Ware Open Firmware Compatible BIOS available at
3f9f3aa1 1808@url{http://perso.magic.fr/l_indien/OpenHackWare/index.htm}.
52c00a5f 1809
70b7fba9 1810Since version 0.9.1, QEMU uses OpenBIOS @url{https://www.openbios.org/}
006f3a48
BS
1811for the g3beige and mac99 PowerMac machines. OpenBIOS is a free (GPL
1812v2) portable firmware implementation. The goal is to implement a 100%
1813IEEE 1275-1994 (referred to as Open Firmware) compliant firmware.
992e5acd 1814
15a34c63
FB
1815@c man begin OPTIONS
1816
1817The following options are specific to the PowerPC emulation:
1818
1819@table @option
1820
4e257e5e 1821@item -g @var{W}x@var{H}[x@var{DEPTH}]
15a34c63 1822
340fb41b 1823Set the initial VGA graphic mode. The default is 800x600x32.
15a34c63 1824
4e257e5e 1825@item -prom-env @var{string}
95efd11c
BS
1826
1827Set OpenBIOS variables in NVRAM, for example:
1828
1829@example
1830qemu-system-ppc -prom-env 'auto-boot?=false' \
1831 -prom-env 'boot-device=hd:2,\yaboot' \
1832 -prom-env 'boot-args=conf=hd:2,\yaboot.conf'
1833@end example
1834
1835These variables are not used by Open Hack'Ware.
1836
15a34c63
FB
1837@end table
1838
5fafdf24 1839@c man end
15a34c63
FB
1840
1841
52c00a5f 1842More information is available at
3f9f3aa1 1843@url{http://perso.magic.fr/l_indien/qemu-ppc/}.
52c00a5f 1844
24d4de45
TS
1845@node Sparc32 System emulator
1846@section Sparc32 System emulator
7544a042 1847@cindex system emulation (Sparc32)
e80cfcfc 1848
34a3d239
BS
1849Use the executable @file{qemu-system-sparc} to simulate the following
1850Sun4m architecture machines:
1851@itemize @minus
1852@item
1853SPARCstation 4
1854@item
1855SPARCstation 5
1856@item
1857SPARCstation 10
1858@item
1859SPARCstation 20
1860@item
1861SPARCserver 600MP
1862@item
1863SPARCstation LX
1864@item
1865SPARCstation Voyager
1866@item
1867SPARCclassic
1868@item
1869SPARCbook
1870@end itemize
1871
1872The emulation is somewhat complete. SMP up to 16 CPUs is supported,
1873but Linux limits the number of usable CPUs to 4.
e80cfcfc 1874
6a4e1771 1875QEMU emulates the following sun4m peripherals:
e80cfcfc
FB
1876
1877@itemize @minus
3475187d 1878@item
6a4e1771 1879IOMMU
e80cfcfc 1880@item
33632788 1881TCX or cgthree Frame buffer
5fafdf24 1882@item
e80cfcfc
FB
1883Lance (Am7990) Ethernet
1884@item
34a3d239 1885Non Volatile RAM M48T02/M48T08
e80cfcfc 1886@item
3475187d
FB
1887Slave I/O: timers, interrupt controllers, Zilog serial ports, keyboard
1888and power/reset logic
1889@item
1890ESP SCSI controller with hard disk and CD-ROM support
1891@item
6a3b9cc9 1892Floppy drive (not on SS-600MP)
a2502b58
BS
1893@item
1894CS4231 sound device (only on SS-5, not working yet)
e80cfcfc
FB
1895@end itemize
1896
6a3b9cc9
BS
1897The number of peripherals is fixed in the architecture. Maximum
1898memory size depends on the machine type, for SS-5 it is 256MB and for
7d85892b 1899others 2047MB.
3475187d 1900
30a604f3 1901Since version 0.8.2, QEMU uses OpenBIOS
70b7fba9 1902@url{https://www.openbios.org/}. OpenBIOS is a free (GPL v2) portable
0986ac3b
FB
1903firmware implementation. The goal is to implement a 100% IEEE
19041275-1994 (referred to as Open Firmware) compliant firmware.
3475187d
FB
1905
1906A sample Linux 2.6 series kernel and ram disk image are available on
34a3d239 1907the QEMU web site. There are still issues with NetBSD and OpenBSD, but
9bb9f217 1908most kernel versions work. Please note that currently older Solaris kernels
34a3d239
BS
1909don't work probably due to interface issues between OpenBIOS and
1910Solaris.
3475187d
FB
1911
1912@c man begin OPTIONS
1913
a2502b58 1914The following options are specific to the Sparc32 emulation:
3475187d
FB
1915
1916@table @option
1917
4e257e5e 1918@item -g @var{W}x@var{H}x[x@var{DEPTH}]
3475187d 1919
33632788
MCA
1920Set the initial graphics mode. For TCX, the default is 1024x768x8 with the
1921option of 1024x768x24. For cgthree, the default is 1024x768x8 with the option
1922of 1152x900x8 for people who wish to use OBP.
3475187d 1923
4e257e5e 1924@item -prom-env @var{string}
66508601
BS
1925
1926Set OpenBIOS variables in NVRAM, for example:
1927
1928@example
1929qemu-system-sparc -prom-env 'auto-boot?=false' \
1930 -prom-env 'boot-device=sd(0,2,0):d' -prom-env 'boot-args=linux single'
1931@end example
1932
6a4e1771 1933@item -M [SS-4|SS-5|SS-10|SS-20|SS-600MP|LX|Voyager|SPARCClassic] [|SPARCbook]
a2502b58
BS
1934
1935Set the emulated machine type. Default is SS-5.
1936
3475187d
FB
1937@end table
1938
5fafdf24 1939@c man end
3475187d 1940
24d4de45
TS
1941@node Sparc64 System emulator
1942@section Sparc64 System emulator
7544a042 1943@cindex system emulation (Sparc64)
e80cfcfc 1944
34a3d239
BS
1945Use the executable @file{qemu-system-sparc64} to simulate a Sun4u
1946(UltraSPARC PC-like machine), Sun4v (T1 PC-like machine), or generic
9bb9f217
MCA
1947Niagara (T1) machine. The Sun4u emulator is mostly complete, being
1948able to run Linux, NetBSD and OpenBSD in headless (-nographic) mode. The
a2664ca0
AT
1949Sun4v emulator is still a work in progress.
1950
1951The Niagara T1 emulator makes use of firmware and OS binaries supplied in the S10image/ directory
1952of the OpenSPARC T1 project @url{http://download.oracle.com/technetwork/systems/opensparc/OpenSPARCT1_Arch.1.5.tar.bz2}
1953and is able to boot the disk.s10hw2 Solaris image.
1954@example
1955qemu-system-sparc64 -M niagara -L /path-to/S10image/ \
1956 -nographic -m 256 \
1957 -drive if=pflash,readonly=on,file=/S10image/disk.s10hw2
1958@end example
1959
b756921a 1960
c7ba218d 1961QEMU emulates the following peripherals:
83469015
FB
1962
1963@itemize @minus
1964@item
5fafdf24 1965UltraSparc IIi APB PCI Bridge
83469015
FB
1966@item
1967PCI VGA compatible card with VESA Bochs Extensions
1968@item
34a3d239
BS
1969PS/2 mouse and keyboard
1970@item
83469015
FB
1971Non Volatile RAM M48T59
1972@item
1973PC-compatible serial ports
c7ba218d
BS
1974@item
19752 PCI IDE interfaces with hard disk and CD-ROM support
34a3d239
BS
1976@item
1977Floppy disk
83469015
FB
1978@end itemize
1979
c7ba218d
BS
1980@c man begin OPTIONS
1981
1982The following options are specific to the Sparc64 emulation:
1983
1984@table @option
1985
4e257e5e 1986@item -prom-env @var{string}
34a3d239
BS
1987
1988Set OpenBIOS variables in NVRAM, for example:
1989
1990@example
1991qemu-system-sparc64 -prom-env 'auto-boot?=false'
1992@end example
1993
a2664ca0 1994@item -M [sun4u|sun4v|niagara]
c7ba218d
BS
1995
1996Set the emulated machine type. The default is sun4u.
1997
1998@end table
1999
2000@c man end
2001
24d4de45
TS
2002@node MIPS System emulator
2003@section MIPS System emulator
7544a042 2004@cindex system emulation (MIPS)
9d0a8e6f 2005
f7d257cb
SM
2006@menu
2007* nanoMIPS System emulator ::
2008@end menu
2009
d9aedc32
TS
2010Four executables cover simulation of 32 and 64-bit MIPS systems in
2011both endian options, @file{qemu-system-mips}, @file{qemu-system-mipsel}
2012@file{qemu-system-mips64} and @file{qemu-system-mips64el}.
88cb0a02 2013Five different machine types are emulated:
24d4de45
TS
2014
2015@itemize @minus
2016@item
2017A generic ISA PC-like machine "mips"
2018@item
2019The MIPS Malta prototype board "malta"
2020@item
d9aedc32 2021An ACER Pica "pica61". This machine needs the 64-bit emulator.
6bf5b4e8 2022@item
f0fc6f8f 2023MIPS emulator pseudo board "mipssim"
88cb0a02
AJ
2024@item
2025A MIPS Magnum R4000 machine "magnum". This machine needs the 64-bit emulator.
24d4de45
TS
2026@end itemize
2027
2028The generic emulation is supported by Debian 'Etch' and is able to
2029install Debian into a virtual disk image. The following devices are
2030emulated:
3f9f3aa1
FB
2031
2032@itemize @minus
5fafdf24 2033@item
6bf5b4e8 2034A range of MIPS CPUs, default is the 24Kf
3f9f3aa1
FB
2035@item
2036PC style serial port
2037@item
24d4de45
TS
2038PC style IDE disk
2039@item
3f9f3aa1
FB
2040NE2000 network card
2041@end itemize
2042
24d4de45
TS
2043The Malta emulation supports the following devices:
2044
2045@itemize @minus
2046@item
0b64d008 2047Core board with MIPS 24Kf CPU and Galileo system controller
24d4de45
TS
2048@item
2049PIIX4 PCI/USB/SMbus controller
2050@item
2051The Multi-I/O chip's serial device
2052@item
3a2eeac0 2053PCI network cards (PCnet32 and others)
24d4de45
TS
2054@item
2055Malta FPGA serial device
2056@item
1f605a76 2057Cirrus (default) or any other PCI VGA graphics card
24d4de45
TS
2058@end itemize
2059
ba182a18
AM
2060The Boston board emulation supports the following devices:
2061
2062@itemize @minus
2063@item
2064Xilinx FPGA, which includes a PCIe root port and an UART
2065@item
2066Intel EG20T PCH connects the I/O peripherals, but only the SATA bus is emulated
2067@end itemize
2068
24d4de45
TS
2069The ACER Pica emulation supports:
2070
2071@itemize @minus
2072@item
2073MIPS R4000 CPU
2074@item
2075PC-style IRQ and DMA controllers
2076@item
2077PC Keyboard
2078@item
2079IDE controller
2080@end itemize
3f9f3aa1 2081
88cb0a02
AJ
2082The MIPS Magnum R4000 emulation supports:
2083
2084@itemize @minus
2085@item
2086MIPS R4000 CPU
2087@item
2088PC-style IRQ controller
2089@item
2090PC Keyboard
2091@item
2092SCSI controller
2093@item
2094G364 framebuffer
2095@end itemize
2096
3a1b94d9
AM
2097The Fulong 2E emulation supports:
2098
2099@itemize @minus
2100@item
2101Loongson 2E CPU
2102@item
2103Bonito64 system controller as North Bridge
2104@item
2105VT82C686 chipset as South Bridge
2106@item
2107RTL8139D as a network card chipset
2108@end itemize
2109
53d21e7b
AM
2110The mipssim pseudo board emulation provides an environment similar
2111to what the proprietary MIPS emulator uses for running Linux.
2112It supports:
2113
2114@itemize @minus
2115@item
2116A range of MIPS CPUs, default is the 24Kf
2117@item
2118PC style serial port
2119@item
2120MIPSnet network emulation
2121@end itemize
2122
f7d257cb
SM
2123@node nanoMIPS System emulator
2124@subsection nanoMIPS System emulator
2125@cindex system emulation (nanoMIPS)
2126
2127Executable @file{qemu-system-mipsel} also covers simulation of
212832-bit nanoMIPS system in little endian mode:
2129
2130@itemize @minus
2131@item
2132nanoMIPS I7200 CPU
2133@end itemize
2134
2135Example of @file{qemu-system-mipsel} usage for nanoMIPS is shown below:
2136
2137Download @code{<disk_image_file>} from @url{https://mipsdistros.mips.com/LinuxDistro/nanomips/buildroot/index.html}.
2138
2139Download @code{<kernel_image_file>} from @url{https://mipsdistros.mips.com/LinuxDistro/nanomips/kernels/v4.15.18-432-gb2eb9a8b07a1-20180627102142/index.html}.
2140
2141Start system emulation of Malta board with nanoMIPS I7200 CPU:
2142@example
2143qemu-system-mipsel -cpu I7200 -kernel @code{<kernel_image_file>} \
2144 -M malta -serial stdio -m @code{<memory_size>} -hda @code{<disk_image_file>} \
2145 -append "mem=256m@@0x0 rw console=ttyS0 vga=cirrus vesa=0x111 root=/dev/sda"
2146@end example
2147
88cb0a02 2148
24d4de45
TS
2149@node ARM System emulator
2150@section ARM System emulator
7544a042 2151@cindex system emulation (ARM)
3f9f3aa1
FB
2152
2153Use the executable @file{qemu-system-arm} to simulate a ARM
2154machine. The ARM Integrator/CP board is emulated with the following
2155devices:
2156
2157@itemize @minus
2158@item
9ee6e8bb 2159ARM926E, ARM1026E, ARM946E, ARM1136 or Cortex-A8 CPU
3f9f3aa1
FB
2160@item
2161Two PL011 UARTs
5fafdf24 2162@item
3f9f3aa1 2163SMC 91c111 Ethernet adapter
00a9bf19
PB
2164@item
2165PL110 LCD controller
2166@item
2167PL050 KMI with PS/2 keyboard and mouse.
a1bb27b1
PB
2168@item
2169PL181 MultiMedia Card Interface with SD card.
00a9bf19
PB
2170@end itemize
2171
2172The ARM Versatile baseboard is emulated with the following devices:
2173
2174@itemize @minus
2175@item
9ee6e8bb 2176ARM926E, ARM1136 or Cortex-A8 CPU
00a9bf19
PB
2177@item
2178PL190 Vectored Interrupt Controller
2179@item
2180Four PL011 UARTs
5fafdf24 2181@item
00a9bf19
PB
2182SMC 91c111 Ethernet adapter
2183@item
2184PL110 LCD controller
2185@item
2186PL050 KMI with PS/2 keyboard and mouse.
2187@item
2188PCI host bridge. Note the emulated PCI bridge only provides access to
2189PCI memory space. It does not provide access to PCI IO space.
4be456f1
TS
2190This means some devices (eg. ne2k_pci NIC) are not usable, and others
2191(eg. rtl8139 NIC) are only usable when the guest drivers use the memory
00a9bf19 2192mapped control registers.
e6de1bad
PB
2193@item
2194PCI OHCI USB controller.
2195@item
2196LSI53C895A PCI SCSI Host Bus Adapter with hard disk and CD-ROM devices.
a1bb27b1
PB
2197@item
2198PL181 MultiMedia Card Interface with SD card.
3f9f3aa1
FB
2199@end itemize
2200
21a88941
PB
2201Several variants of the ARM RealView baseboard are emulated,
2202including the EB, PB-A8 and PBX-A9. Due to interactions with the
2203bootloader, only certain Linux kernel configurations work out
2204of the box on these boards.
2205
2206Kernels for the PB-A8 board should have CONFIG_REALVIEW_HIGH_PHYS_OFFSET
2207enabled in the kernel, and expect 512M RAM. Kernels for The PBX-A9 board
2208should have CONFIG_SPARSEMEM enabled, CONFIG_REALVIEW_HIGH_PHYS_OFFSET
2209disabled and expect 1024M RAM.
2210
40c5c6cd 2211The following devices are emulated:
d7739d75
PB
2212
2213@itemize @minus
2214@item
f7c70325 2215ARM926E, ARM1136, ARM11MPCore, Cortex-A8 or Cortex-A9 MPCore CPU
d7739d75
PB
2216@item
2217ARM AMBA Generic/Distributed Interrupt Controller
2218@item
2219Four PL011 UARTs
5fafdf24 2220@item
0ef849d7 2221SMC 91c111 or SMSC LAN9118 Ethernet adapter
d7739d75
PB
2222@item
2223PL110 LCD controller
2224@item
2225PL050 KMI with PS/2 keyboard and mouse
2226@item
2227PCI host bridge
2228@item
2229PCI OHCI USB controller
2230@item
2231LSI53C895A PCI SCSI Host Bus Adapter with hard disk and CD-ROM devices
a1bb27b1
PB
2232@item
2233PL181 MultiMedia Card Interface with SD card.
d7739d75
PB
2234@end itemize
2235
b00052e4
AZ
2236The XScale-based clamshell PDA models ("Spitz", "Akita", "Borzoi"
2237and "Terrier") emulation includes the following peripherals:
2238
2239@itemize @minus
2240@item
2241Intel PXA270 System-on-chip (ARM V5TE core)
2242@item
2243NAND Flash memory
2244@item
2245IBM/Hitachi DSCM microdrive in a PXA PCMCIA slot - not in "Akita"
2246@item
2247On-chip OHCI USB controller
2248@item
2249On-chip LCD controller
2250@item
2251On-chip Real Time Clock
2252@item
2253TI ADS7846 touchscreen controller on SSP bus
2254@item
2255Maxim MAX1111 analog-digital converter on I@math{^2}C bus
2256@item
2257GPIO-connected keyboard controller and LEDs
2258@item
549444e1 2259Secure Digital card connected to PXA MMC/SD host
b00052e4
AZ
2260@item
2261Three on-chip UARTs
2262@item
2263WM8750 audio CODEC on I@math{^2}C and I@math{^2}S busses
2264@end itemize
2265
02645926
AZ
2266The Palm Tungsten|E PDA (codename "Cheetah") emulation includes the
2267following elements:
2268
2269@itemize @minus
2270@item
2271Texas Instruments OMAP310 System-on-chip (ARM 925T core)
2272@item
2273ROM and RAM memories (ROM firmware image can be loaded with -option-rom)
2274@item
2275On-chip LCD controller
2276@item
2277On-chip Real Time Clock
2278@item
2279TI TSC2102i touchscreen controller / analog-digital converter / Audio
2280CODEC, connected through MicroWire and I@math{^2}S busses
2281@item
2282GPIO-connected matrix keypad
2283@item
2284Secure Digital card connected to OMAP MMC/SD host
2285@item
2286Three on-chip UARTs
2287@end itemize
2288
c30bb264
AZ
2289Nokia N800 and N810 internet tablets (known also as RX-34 and RX-44 / 48)
2290emulation supports the following elements:
2291
2292@itemize @minus
2293@item
2294Texas Instruments OMAP2420 System-on-chip (ARM 1136 core)
2295@item
2296RAM and non-volatile OneNAND Flash memories
2297@item
2298Display connected to EPSON remote framebuffer chip and OMAP on-chip
2299display controller and a LS041y3 MIPI DBI-C controller
2300@item
2301TI TSC2301 (in N800) and TI TSC2005 (in N810) touchscreen controllers
2302driven through SPI bus
2303@item
2304National Semiconductor LM8323-controlled qwerty keyboard driven
2305through I@math{^2}C bus
2306@item
2307Secure Digital card connected to OMAP MMC/SD host
2308@item
2309Three OMAP on-chip UARTs and on-chip STI debugging console
2310@item
40c5c6cd 2311A Bluetooth(R) transceiver and HCI connected to an UART
2d564691 2312@item
c30bb264
AZ
2313Mentor Graphics "Inventra" dual-role USB controller embedded in a TI
2314TUSB6010 chip - only USB host mode is supported
2315@item
2316TI TMP105 temperature sensor driven through I@math{^2}C bus
2317@item
2318TI TWL92230C power management companion with an RTC on I@math{^2}C bus
2319@item
2320Nokia RETU and TAHVO multi-purpose chips with an RTC, connected
2321through CBUS
2322@end itemize
2323
9ee6e8bb
PB
2324The Luminary Micro Stellaris LM3S811EVB emulation includes the following
2325devices:
2326
2327@itemize @minus
2328@item
2329Cortex-M3 CPU core.
2330@item
233164k Flash and 8k SRAM.
2332@item
2333Timers, UARTs, ADC and I@math{^2}C interface.
2334@item
2335OSRAM Pictiva 96x16 OLED with SSD0303 controller on I@math{^2}C bus.
2336@end itemize
2337
2338The Luminary Micro Stellaris LM3S6965EVB emulation includes the following
2339devices:
2340
2341@itemize @minus
2342@item
2343Cortex-M3 CPU core.
2344@item
2345256k Flash and 64k SRAM.
2346@item
2347Timers, UARTs, ADC, I@math{^2}C and SSI interfaces.
2348@item
2349OSRAM Pictiva 128x64 OLED with SSD0323 controller connected via SSI.
2350@end itemize
2351
57cd6e97
AZ
2352The Freecom MusicPal internet radio emulation includes the following
2353elements:
2354
2355@itemize @minus
2356@item
2357Marvell MV88W8618 ARM core.
2358@item
235932 MB RAM, 256 KB SRAM, 8 MB flash.
2360@item
2361Up to 2 16550 UARTs
2362@item
2363MV88W8xx8 Ethernet controller
2364@item
2365MV88W8618 audio controller, WM8750 CODEC and mixer
2366@item
e080e785 2367128×64 display with brightness control
57cd6e97
AZ
2368@item
23692 buttons, 2 navigation wheels with button function
2370@end itemize
2371
997641a8 2372The Siemens SX1 models v1 and v2 (default) basic emulation.
40c5c6cd 2373The emulation includes the following elements:
997641a8
AZ
2374
2375@itemize @minus
2376@item
2377Texas Instruments OMAP310 System-on-chip (ARM 925T core)
2378@item
2379ROM and RAM memories (ROM firmware image can be loaded with -pflash)
2380V1
23811 Flash of 16MB and 1 Flash of 8MB
2382V2
23831 Flash of 32MB
2384@item
2385On-chip LCD controller
2386@item
2387On-chip Real Time Clock
2388@item
2389Secure Digital card connected to OMAP MMC/SD host
2390@item
2391Three on-chip UARTs
2392@end itemize
2393
3f9f3aa1
FB
2394A Linux 2.6 test image is available on the QEMU web site. More
2395information is available in the QEMU mailing-list archive.
9d0a8e6f 2396
d2c639d6
BS
2397@c man begin OPTIONS
2398
2399The following options are specific to the ARM emulation:
2400
2401@table @option
2402
2403@item -semihosting
2404Enable semihosting syscall emulation.
2405
2406On ARM this implements the "Angel" interface.
2407
2408Note that this allows guest direct access to the host filesystem,
2409so should only be used with trusted guest OS.
2410
2411@end table
2412
abc67eb6
TH
2413@c man end
2414
24d4de45
TS
2415@node ColdFire System emulator
2416@section ColdFire System emulator
7544a042
SW
2417@cindex system emulation (ColdFire)
2418@cindex system emulation (M68K)
209a4e69
PB
2419
2420Use the executable @file{qemu-system-m68k} to simulate a ColdFire machine.
2421The emulator is able to boot a uClinux kernel.
707e011b
PB
2422
2423The M5208EVB emulation includes the following devices:
2424
2425@itemize @minus
5fafdf24 2426@item
707e011b
PB
2427MCF5208 ColdFire V2 Microprocessor (ISA A+ with EMAC).
2428@item
2429Three Two on-chip UARTs.
2430@item
2431Fast Ethernet Controller (FEC)
2432@end itemize
2433
2434The AN5206 emulation includes the following devices:
209a4e69
PB
2435
2436@itemize @minus
5fafdf24 2437@item
209a4e69
PB
2438MCF5206 ColdFire V2 Microprocessor.
2439@item
2440Two on-chip UARTs.
2441@end itemize
2442
d2c639d6
BS
2443@c man begin OPTIONS
2444
7544a042 2445The following options are specific to the ColdFire emulation:
d2c639d6
BS
2446
2447@table @option
2448
2449@item -semihosting
2450Enable semihosting syscall emulation.
2451
2452On M68K this implements the "ColdFire GDB" interface used by libgloss.
2453
2454Note that this allows guest direct access to the host filesystem,
2455so should only be used with trusted guest OS.
2456
2457@end table
2458
abc67eb6
TH
2459@c man end
2460
7544a042
SW
2461@node Cris System emulator
2462@section Cris System emulator
2463@cindex system emulation (Cris)
2464
2465TODO
2466
2467@node Microblaze System emulator
2468@section Microblaze System emulator
2469@cindex system emulation (Microblaze)
2470
2471TODO
2472
2473@node SH4 System emulator
2474@section SH4 System emulator
2475@cindex system emulation (SH4)
2476
2477TODO
2478
3aeaea65
MF
2479@node Xtensa System emulator
2480@section Xtensa System emulator
2481@cindex system emulation (Xtensa)
2482
2483Two executables cover simulation of both Xtensa endian options,
2484@file{qemu-system-xtensa} and @file{qemu-system-xtensaeb}.
2485Two different machine types are emulated:
2486
2487@itemize @minus
2488@item
2489Xtensa emulator pseudo board "sim"
2490@item
2491Avnet LX60/LX110/LX200 board
2492@end itemize
2493
b5e4946f 2494The sim pseudo board emulation provides an environment similar
3aeaea65
MF
2495to one provided by the proprietary Tensilica ISS.
2496It supports:
2497
2498@itemize @minus
2499@item
2500A range of Xtensa CPUs, default is the DC232B
2501@item
2502Console and filesystem access via semihosting calls
2503@end itemize
2504
2505The Avnet LX60/LX110/LX200 emulation supports:
2506
2507@itemize @minus
2508@item
2509A range of Xtensa CPUs, default is the DC232B
2510@item
251116550 UART
2512@item
2513OpenCores 10/100 Mbps Ethernet MAC
2514@end itemize
2515
2516@c man begin OPTIONS
2517
2518The following options are specific to the Xtensa emulation:
2519
2520@table @option
2521
2522@item -semihosting
2523Enable semihosting syscall emulation.
2524
2525Xtensa semihosting provides basic file IO calls, such as open/read/write/seek/select.
2526Tensilica baremetal libc for ISS and linux platform "sim" use this interface.
2527
2528Note that this allows guest direct access to the host filesystem,
2529so should only be used with trusted guest OS.
2530
2531@end table
3f2ce724 2532
abc67eb6
TH
2533@c man end
2534
5fafdf24
TS
2535@node QEMU User space emulator
2536@chapter QEMU User space emulator
83195237
FB
2537
2538@menu
2539* Supported Operating Systems ::
0722cc42 2540* Features::
83195237 2541* Linux User space emulator::
84778508 2542* BSD User space emulator ::
83195237
FB
2543@end menu
2544
2545@node Supported Operating Systems
2546@section Supported Operating Systems
2547
2548The following OS are supported in user space emulation:
2549
2550@itemize @minus
2551@item
4be456f1 2552Linux (referred as qemu-linux-user)
83195237 2553@item
84778508 2554BSD (referred as qemu-bsd-user)
83195237
FB
2555@end itemize
2556
0722cc42
PB
2557@node Features
2558@section Features
2559
2560QEMU user space emulation has the following notable features:
2561
2562@table @strong
2563@item System call translation:
2564QEMU includes a generic system call translator. This means that
2565the parameters of the system calls can be converted to fix
2566endianness and 32/64-bit mismatches between hosts and targets.
2567IOCTLs can be converted too.
2568
2569@item POSIX signal handling:
2570QEMU can redirect to the running program all signals coming from
2571the host (such as @code{SIGALRM}), as well as synthesize signals from
2572virtual CPU exceptions (for example @code{SIGFPE} when the program
2573executes a division by zero).
2574
2575QEMU relies on the host kernel to emulate most signal system
2576calls, for example to emulate the signal mask. On Linux, QEMU
2577supports both normal and real-time signals.
2578
2579@item Threading:
2580On Linux, QEMU can emulate the @code{clone} syscall and create a real
2581host thread (with a separate virtual CPU) for each emulated thread.
2582Note that not all targets currently emulate atomic operations correctly.
2583x86 and ARM use a global lock in order to preserve their semantics.
2584@end table
2585
2586QEMU was conceived so that ultimately it can emulate itself. Although
2587it is not very useful, it is an important test to show the power of the
2588emulator.
2589
83195237
FB
2590@node Linux User space emulator
2591@section Linux User space emulator
386405f7 2592
debc7065
FB
2593@menu
2594* Quick Start::
2595* Wine launch::
2596* Command line options::
79737e4a 2597* Other binaries::
debc7065
FB
2598@end menu
2599
2600@node Quick Start
83195237 2601@subsection Quick Start
df0f11a0 2602
1f673135 2603In order to launch a Linux process, QEMU needs the process executable
5fafdf24 2604itself and all the target (x86) dynamic libraries used by it.
386405f7 2605
1f673135 2606@itemize
386405f7 2607
1f673135
FB
2608@item On x86, you can just try to launch any process by using the native
2609libraries:
386405f7 2610
5fafdf24 2611@example
1f673135
FB
2612qemu-i386 -L / /bin/ls
2613@end example
386405f7 2614
1f673135
FB
2615@code{-L /} tells that the x86 dynamic linker must be searched with a
2616@file{/} prefix.
386405f7 2617
b65ee4fa
SW
2618@item Since QEMU is also a linux process, you can launch QEMU with
2619QEMU (NOTE: you can only do that if you compiled QEMU from the sources):
386405f7 2620
5fafdf24 2621@example
1f673135
FB
2622qemu-i386 -L / qemu-i386 -L / /bin/ls
2623@end example
386405f7 2624
1f673135
FB
2625@item On non x86 CPUs, you need first to download at least an x86 glibc
2626(@file{qemu-runtime-i386-XXX-.tar.gz} on the QEMU web page). Ensure that
2627@code{LD_LIBRARY_PATH} is not set:
df0f11a0 2628
1f673135 2629@example
5fafdf24 2630unset LD_LIBRARY_PATH
1f673135 2631@end example
1eb87257 2632
1f673135 2633Then you can launch the precompiled @file{ls} x86 executable:
1eb87257 2634
1f673135
FB
2635@example
2636qemu-i386 tests/i386/ls
2637@end example
4c3b5a48 2638You can look at @file{scripts/qemu-binfmt-conf.sh} so that
1f673135
FB
2639QEMU is automatically launched by the Linux kernel when you try to
2640launch x86 executables. It requires the @code{binfmt_misc} module in the
2641Linux kernel.
1eb87257 2642
1f673135
FB
2643@item The x86 version of QEMU is also included. You can try weird things such as:
2644@example
debc7065
FB
2645qemu-i386 /usr/local/qemu-i386/bin/qemu-i386 \
2646 /usr/local/qemu-i386/bin/ls-i386
1f673135 2647@end example
1eb20527 2648
1f673135 2649@end itemize
1eb20527 2650
debc7065 2651@node Wine launch
83195237 2652@subsection Wine launch
1eb20527 2653
1f673135 2654@itemize
386405f7 2655
1f673135
FB
2656@item Ensure that you have a working QEMU with the x86 glibc
2657distribution (see previous section). In order to verify it, you must be
2658able to do:
386405f7 2659
1f673135
FB
2660@example
2661qemu-i386 /usr/local/qemu-i386/bin/ls-i386
2662@end example
386405f7 2663
1f673135 2664@item Download the binary x86 Wine install
5fafdf24 2665(@file{qemu-XXX-i386-wine.tar.gz} on the QEMU web page).
386405f7 2666
1f673135 2667@item Configure Wine on your account. Look at the provided script
debc7065 2668@file{/usr/local/qemu-i386/@/bin/wine-conf.sh}. Your previous
1f673135 2669@code{$@{HOME@}/.wine} directory is saved to @code{$@{HOME@}/.wine.org}.
386405f7 2670
1f673135 2671@item Then you can try the example @file{putty.exe}:
386405f7 2672
1f673135 2673@example
debc7065
FB
2674qemu-i386 /usr/local/qemu-i386/wine/bin/wine \
2675 /usr/local/qemu-i386/wine/c/Program\ Files/putty.exe
1f673135 2676@end example
386405f7 2677
1f673135 2678@end itemize
fd429f2f 2679
debc7065 2680@node Command line options
83195237 2681@subsection Command line options
1eb20527 2682
1f673135 2683@example
8485140f 2684@command{qemu-i386} [@option{-h]} [@option{-d]} [@option{-L} @var{path}] [@option{-s} @var{size}] [@option{-cpu} @var{model}] [@option{-g} @var{port}] [@option{-B} @var{offset}] [@option{-R} @var{size}] @var{program} [@var{arguments}...]
1f673135 2685@end example
1eb20527 2686
1f673135
FB
2687@table @option
2688@item -h
2689Print the help
3b46e624 2690@item -L path
1f673135
FB
2691Set the x86 elf interpreter prefix (default=/usr/local/qemu-i386)
2692@item -s size
2693Set the x86 stack size in bytes (default=524288)
34a3d239 2694@item -cpu model
c8057f95 2695Select CPU model (-cpu help for list and additional feature selection)
f66724c9
SW
2696@item -E @var{var}=@var{value}
2697Set environment @var{var} to @var{value}.
2698@item -U @var{var}
2699Remove @var{var} from the environment.
379f6698
PB
2700@item -B offset
2701Offset guest address by the specified number of bytes. This is useful when
1f5c3f8c
SW
2702the address region required by guest applications is reserved on the host.
2703This option is currently only supported on some hosts.
68a1c816
PB
2704@item -R size
2705Pre-allocate a guest virtual address space of the given size (in bytes).
0d6753e5 2706"G", "M", and "k" suffixes may be used when specifying the size.
386405f7
FB
2707@end table
2708
1f673135 2709Debug options:
386405f7 2710
1f673135 2711@table @option
989b697d
PM
2712@item -d item1,...
2713Activate logging of the specified items (use '-d help' for a list of log items)
1f673135
FB
2714@item -p pagesize
2715Act as if the host page size was 'pagesize' bytes
34a3d239
BS
2716@item -g port
2717Wait gdb connection to port
1b530a6d
AJ
2718@item -singlestep
2719Run the emulation in single step mode.
1f673135 2720@end table
386405f7 2721
b01bcae6
AZ
2722Environment variables:
2723
2724@table @env
2725@item QEMU_STRACE
2726Print system calls and arguments similar to the 'strace' program
2727(NOTE: the actual 'strace' program will not work because the user
2728space emulator hasn't implemented ptrace). At the moment this is
2729incomplete. All system calls that don't have a specific argument
2730format are printed with information for six arguments. Many
2731flag-style arguments don't have decoders and will show up as numbers.
5cfdf930 2732@end table
b01bcae6 2733
79737e4a 2734@node Other binaries
83195237 2735@subsection Other binaries
79737e4a 2736
7544a042
SW
2737@cindex user mode (Alpha)
2738@command{qemu-alpha} TODO.
2739
2740@cindex user mode (ARM)
2741@command{qemu-armeb} TODO.
2742
2743@cindex user mode (ARM)
79737e4a
PB
2744@command{qemu-arm} is also capable of running ARM "Angel" semihosted ELF
2745binaries (as implemented by the arm-elf and arm-eabi Newlib/GDB
2746configurations), and arm-uclinux bFLT format binaries.
2747
7544a042
SW
2748@cindex user mode (ColdFire)
2749@cindex user mode (M68K)
e6e5906b
PB
2750@command{qemu-m68k} is capable of running semihosted binaries using the BDM
2751(m5xxx-ram-hosted.ld) or m68k-sim (sim.ld) syscall interfaces, and
2752coldfire uClinux bFLT format binaries.
2753
79737e4a
PB
2754The binary format is detected automatically.
2755
7544a042
SW
2756@cindex user mode (Cris)
2757@command{qemu-cris} TODO.
2758
2759@cindex user mode (i386)
2760@command{qemu-i386} TODO.
2761@command{qemu-x86_64} TODO.
2762
2763@cindex user mode (Microblaze)
2764@command{qemu-microblaze} TODO.
2765
2766@cindex user mode (MIPS)
8639c5c9
AM
2767@command{qemu-mips} executes 32-bit big endian MIPS binaries (MIPS O32 ABI).
2768
2769@command{qemu-mipsel} executes 32-bit little endian MIPS binaries (MIPS O32 ABI).
2770
2771@command{qemu-mips64} executes 64-bit big endian MIPS binaries (MIPS N64 ABI).
2772
2773@command{qemu-mips64el} executes 64-bit little endian MIPS binaries (MIPS N64 ABI).
2774
2775@command{qemu-mipsn32} executes 32-bit big endian MIPS binaries (MIPS N32 ABI).
2776
2777@command{qemu-mipsn32el} executes 32-bit little endian MIPS binaries (MIPS N32 ABI).
7544a042 2778
e671711c
MV
2779@cindex user mode (NiosII)
2780@command{qemu-nios2} TODO.
2781
7544a042
SW
2782@cindex user mode (PowerPC)
2783@command{qemu-ppc64abi32} TODO.
2784@command{qemu-ppc64} TODO.
2785@command{qemu-ppc} TODO.
2786
2787@cindex user mode (SH4)
2788@command{qemu-sh4eb} TODO.
2789@command{qemu-sh4} TODO.
2790
2791@cindex user mode (SPARC)
34a3d239
BS
2792@command{qemu-sparc} can execute Sparc32 binaries (Sparc32 CPU, 32 bit ABI).
2793
a785e42e
BS
2794@command{qemu-sparc32plus} can execute Sparc32 and SPARC32PLUS binaries
2795(Sparc64 CPU, 32 bit ABI).
2796
2797@command{qemu-sparc64} can execute some Sparc64 (Sparc64 CPU, 64 bit ABI) and
2798SPARC32PLUS binaries (Sparc64 CPU, 32 bit ABI).
2799
84778508
BS
2800@node BSD User space emulator
2801@section BSD User space emulator
2802
2803@menu
2804* BSD Status::
2805* BSD Quick Start::
2806* BSD Command line options::
2807@end menu
2808
2809@node BSD Status
2810@subsection BSD Status
2811
2812@itemize @minus
2813@item
2814target Sparc64 on Sparc64: Some trivial programs work.
2815@end itemize
2816
2817@node BSD Quick Start
2818@subsection Quick Start
2819
2820In order to launch a BSD process, QEMU needs the process executable
2821itself and all the target dynamic libraries used by it.
2822
2823@itemize
2824
2825@item On Sparc64, you can just try to launch any process by using the native
2826libraries:
2827
2828@example
2829qemu-sparc64 /bin/ls
2830@end example
2831
2832@end itemize
2833
2834@node BSD Command line options
2835@subsection Command line options
2836
2837@example
8485140f 2838@command{qemu-sparc64} [@option{-h]} [@option{-d]} [@option{-L} @var{path}] [@option{-s} @var{size}] [@option{-bsd} @var{type}] @var{program} [@var{arguments}...]
84778508
BS
2839@end example
2840
2841@table @option
2842@item -h
2843Print the help
2844@item -L path
2845Set the library root path (default=/)
2846@item -s size
2847Set the stack size in bytes (default=524288)
f66724c9
SW
2848@item -ignore-environment
2849Start with an empty environment. Without this option,
40c5c6cd 2850the initial environment is a copy of the caller's environment.
f66724c9
SW
2851@item -E @var{var}=@var{value}
2852Set environment @var{var} to @var{value}.
2853@item -U @var{var}
2854Remove @var{var} from the environment.
84778508
BS
2855@item -bsd type
2856Set the type of the emulated BSD Operating system. Valid values are
2857FreeBSD, NetBSD and OpenBSD (default).
2858@end table
2859
2860Debug options:
2861
2862@table @option
989b697d
PM
2863@item -d item1,...
2864Activate logging of the specified items (use '-d help' for a list of log items)
84778508
BS
2865@item -p pagesize
2866Act as if the host page size was 'pagesize' bytes
1b530a6d
AJ
2867@item -singlestep
2868Run the emulation in single step mode.
84778508
BS
2869@end table
2870
483c6ad4
BP
2871@node System requirements
2872@chapter System requirements
2873
2874@section KVM kernel module
2875
2876On x86_64 hosts, the default set of CPU features enabled by the KVM accelerator
2877require the host to be running Linux v4.5 or newer.
2878
2879The OpteronG[345] CPU models require KVM support for RDTSCP, which was
2880added with Linux 4.5 which is supported by the major distros. And even
2881if RHEL7 has kernel 3.10, KVM there has the required functionality there
2882to make it close to a 4.5 or newer kernel.
47eacb4f 2883
e8412576
SH
2884@include docs/security.texi
2885
78e87797
PB
2886@include qemu-tech.texi
2887
44c67847 2888@include qemu-deprecated.texi
efe2add7 2889
45b47130
DB
2890@node Supported build platforms
2891@appendix Supported build platforms
2892
2893QEMU aims to support building and executing on multiple host OS platforms.
2894This appendix outlines which platforms are the major build targets. These
2895platforms are used as the basis for deciding upon the minimum required
2896versions of 3rd party software QEMU depends on. The supported platforms
2897are the targets for automated testing performed by the project when patches
2898are submitted for review, and tested before and after merge.
2899
2900If a platform is not listed here, it does not imply that QEMU won't work.
2901If an unlisted platform has comparable software versions to a listed platform,
2902there is every expectation that it will work. Bug reports are welcome for
2903problems encountered on unlisted platforms unless they are clearly older
2904vintage than what is described here.
2905
2906Note that when considering software versions shipped in distros as support
2907targets, QEMU considers only the version number, and assumes the features in
2908that distro match the upstream release with the same version. In other words,
2909if a distro backports extra features to the software in their distro, QEMU
2910upstream code will not add explicit support for those backports, unless the
2911feature is auto-detectable in a manner that works for the upstream releases
2912too.
2913
2914The Repology site @url{https://repology.org} is a useful resource to identify
2915currently shipped versions of software in various operating systems, though
2916it does not cover all distros listed below.
2917
2918@section Linux OS
2919
2920For distributions with frequent, short-lifetime releases, the project will
2921aim to support all versions that are not end of life by their respective
2922vendors. For the purposes of identifying supported software versions, the
2923project will look at Fedora, Ubuntu, and openSUSE distros. Other short-
2924lifetime distros will be assumed to ship similar software versions.
2925
2926For distributions with long-lifetime releases, the project will aim to support
2927the most recent major version at all times. Support for the previous major
2928version will be dropped 2 years after the new major version is released. For
2929the purposes of identifying supported software versions, the project will look
2930at RHEL, Debian, Ubuntu LTS, and SLES distros. Other long-lifetime distros will
2931be assumed to ship similar software versions.
2932
2933@section Windows
2934
2935The project supports building with current versions of the MinGW toolchain,
2936hosted on Linux.
2937
2938@section macOS
2939
2940The project supports building with the two most recent versions of macOS, with
2941the current homebrew package set available.
2942
2943@section FreeBSD
2944
2945The project aims to support the all the versions which are not end of life.
2946
2947@section NetBSD
2948
2949The project aims to support the most recent major version at all times. Support
2950for the previous major version will be dropped 2 years after the new major
2951version is released.
2952
2953@section OpenBSD
2954
2955The project aims to support the all the versions which are not end of life.
2956
7544a042
SW
2957@node License
2958@appendix License
2959
2960QEMU is a trademark of Fabrice Bellard.
2961
2f8d8f01
TH
2962QEMU is released under the
2963@url{https://www.gnu.org/licenses/gpl-2.0.txt,GNU General Public License},
2964version 2. Parts of QEMU have specific licenses, see file
70b7fba9 2965@url{https://git.qemu.org/?p=qemu.git;a=blob_plain;f=LICENSE,LICENSE}.
7544a042 2966
debc7065 2967@node Index
7544a042
SW
2968@appendix Index
2969@menu
2970* Concept Index::
2971* Function Index::
2972* Keystroke Index::
2973* Program Index::
2974* Data Type Index::
2975* Variable Index::
2976@end menu
2977
2978@node Concept Index
2979@section Concept Index
2980This is the main index. Should we combine all keywords in one index? TODO
debc7065
FB
2981@printindex cp
2982
7544a042
SW
2983@node Function Index
2984@section Function Index
2985This index could be used for command line options and monitor functions.
2986@printindex fn
2987
2988@node Keystroke Index
2989@section Keystroke Index
2990
2991This is a list of all keystrokes which have a special function
2992in system emulation.
2993
2994@printindex ky
2995
2996@node Program Index
2997@section Program Index
2998@printindex pg
2999
3000@node Data Type Index
3001@section Data Type Index
3002
3003This index could be used for qdev device names and options.
3004
3005@printindex tp
3006
3007@node Variable Index
3008@section Variable Index
3009@printindex vr
3010
debc7065 3011@bye