]> git.proxmox.com Git - mirror_qemu.git/blame - qemu-doc.texi
docs: create interop/ subdirectory
[mirror_qemu.git] / qemu-doc.texi
CommitLineData
386405f7 1\input texinfo @c -*- texinfo -*-
debc7065
FB
2@c %**start of header
3@setfilename qemu-doc.info
e080e785
SW
4
5@documentlanguage en
6@documentencoding UTF-8
7
8f40c388 8@settitle QEMU Emulator User Documentation
debc7065
FB
9@exampleindent 0
10@paragraphindent 0
11@c %**end of header
386405f7 12
a1a32b05
SW
13@ifinfo
14@direntry
15* QEMU: (qemu-doc). The QEMU Emulator User Documentation.
16@end direntry
17@end ifinfo
18
0806e3f6 19@iftex
386405f7
FB
20@titlepage
21@sp 7
8f40c388 22@center @titlefont{QEMU Emulator}
debc7065
FB
23@sp 1
24@center @titlefont{User Documentation}
386405f7
FB
25@sp 3
26@end titlepage
0806e3f6 27@end iftex
386405f7 28
debc7065
FB
29@ifnottex
30@node Top
31@top
32
33@menu
34* Introduction::
debc7065
FB
35* QEMU PC System emulator::
36* QEMU System emulator for non PC targets::
3f2ce724 37* QEMU Guest Agent::
83195237 38* QEMU User space emulator::
78e87797 39* Implementation notes::
7544a042 40* License::
debc7065
FB
41* Index::
42@end menu
43@end ifnottex
44
45@contents
46
47@node Introduction
386405f7
FB
48@chapter Introduction
49
debc7065
FB
50@menu
51* intro_features:: Features
52@end menu
53
54@node intro_features
322d0c66 55@section Features
386405f7 56
1f673135
FB
57QEMU is a FAST! processor emulator using dynamic translation to
58achieve good emulation speed.
1eb20527 59
1f3e7e41 60@cindex operating modes
1eb20527 61QEMU has two operating modes:
0806e3f6 62
d7e5edca 63@itemize
7544a042 64@cindex system emulation
1f3e7e41 65@item Full system emulation. In this mode, QEMU emulates a full system (for
3f9f3aa1
FB
66example a PC), including one or several processors and various
67peripherals. It can be used to launch different Operating Systems
68without rebooting the PC or to debug system code.
1eb20527 69
7544a042 70@cindex user mode emulation
1f3e7e41 71@item User mode emulation. In this mode, QEMU can launch
83195237 72processes compiled for one CPU on another CPU. It can be used to
1f673135
FB
73launch the Wine Windows API emulator (@url{http://www.winehq.org}) or
74to ease cross-compilation and cross-debugging.
1eb20527
FB
75
76@end itemize
77
1f3e7e41
PB
78QEMU has the following features:
79
80@itemize
81@item QEMU can run without a host kernel driver and yet gives acceptable
82performance. It uses dynamic translation to native code for reasonable speed,
83with support for self-modifying code and precise exceptions.
84
85@item It is portable to several operating systems (GNU/Linux, *BSD, Mac OS X,
86Windows) and architectures.
87
88@item It performs accurate software emulation of the FPU.
89@end itemize
322d0c66 90
1f3e7e41 91QEMU user mode emulation has the following features:
52c00a5f 92@itemize
1f3e7e41
PB
93@item Generic Linux system call converter, including most ioctls.
94
95@item clone() emulation using native CPU clone() to use Linux scheduler for threads.
96
97@item Accurate signal handling by remapping host signals to target signals.
98@end itemize
99
100QEMU full system emulation has the following features:
101@itemize
102@item
103QEMU uses a full software MMU for maximum portability.
104
105@item
106QEMU can optionally use an in-kernel accelerator, like kvm. The accelerators
107execute most of the guest code natively, while
108continuing to emulate the rest of the machine.
109
110@item
111Various hardware devices can be emulated and in some cases, host
112devices (e.g. serial and parallel ports, USB, drives) can be used
113transparently by the guest Operating System. Host device passthrough
114can be used for talking to external physical peripherals (e.g. a
115webcam, modem or tape drive).
116
117@item
118Symmetric multiprocessing (SMP) support. Currently, an in-kernel
119accelerator is required to use more than one host CPU for emulation.
120
52c00a5f 121@end itemize
386405f7 122
0806e3f6 123
debc7065 124@node QEMU PC System emulator
3f9f3aa1 125@chapter QEMU PC System emulator
7544a042 126@cindex system emulation (PC)
1eb20527 127
debc7065
FB
128@menu
129* pcsys_introduction:: Introduction
130* pcsys_quickstart:: Quick Start
131* sec_invocation:: Invocation
a40db1b3
PM
132* pcsys_keys:: Keys in the graphical frontends
133* mux_keys:: Keys in the character backend multiplexer
debc7065
FB
134* pcsys_monitor:: QEMU Monitor
135* disk_images:: Disk Images
136* pcsys_network:: Network emulation
576fd0a1 137* pcsys_other_devs:: Other Devices
debc7065
FB
138* direct_linux_boot:: Direct Linux Boot
139* pcsys_usb:: USB emulation
f858dcae 140* vnc_security:: VNC security
debc7065
FB
141* gdb_usage:: GDB usage
142* pcsys_os_specific:: Target OS specific information
143@end menu
144
145@node pcsys_introduction
0806e3f6
FB
146@section Introduction
147
148@c man begin DESCRIPTION
149
3f9f3aa1
FB
150The QEMU PC System emulator simulates the
151following peripherals:
0806e3f6
FB
152
153@itemize @minus
5fafdf24 154@item
15a34c63 155i440FX host PCI bridge and PIIX3 PCI to ISA bridge
0806e3f6 156@item
15a34c63
FB
157Cirrus CLGD 5446 PCI VGA card or dummy VGA card with Bochs VESA
158extensions (hardware level, including all non standard modes).
0806e3f6
FB
159@item
160PS/2 mouse and keyboard
5fafdf24 161@item
15a34c63 1622 PCI IDE interfaces with hard disk and CD-ROM support
1f673135
FB
163@item
164Floppy disk
5fafdf24 165@item
3a2eeac0 166PCI and ISA network adapters
0806e3f6 167@item
05d5818c
FB
168Serial ports
169@item
23076bb3
CM
170IPMI BMC, either and internal or external one
171@item
c0fe3827
FB
172Creative SoundBlaster 16 sound card
173@item
174ENSONIQ AudioPCI ES1370 sound card
175@item
e5c9a13e
AZ
176Intel 82801AA AC97 Audio compatible sound card
177@item
7d72e762
GH
178Intel HD Audio Controller and HDA codec
179@item
2d983446 180Adlib (OPL2) - Yamaha YM3812 compatible chip
b389dbfb 181@item
26463dbc
AZ
182Gravis Ultrasound GF1 sound card
183@item
cc53d26d 184CS4231A compatible sound card
185@item
a92ff8c1 186PCI UHCI, OHCI, EHCI or XHCI USB controller and a virtual USB-1.1 hub.
0806e3f6
FB
187@end itemize
188
3f9f3aa1
FB
189SMP is supported with up to 255 CPUs.
190
a8ad4159 191QEMU uses the PC BIOS from the Seabios project and the Plex86/Bochs LGPL
15a34c63
FB
192VGA BIOS.
193
c0fe3827
FB
194QEMU uses YM3812 emulation by Tatsuyuki Satoh.
195
2d983446 196QEMU uses GUS emulation (GUSEMU32 @url{http://www.deinmeister.de/gusemu/})
26463dbc 197by Tibor "TS" Schütz.
423d65f4 198
1a1a0e20 199Note that, by default, GUS shares IRQ(7) with parallel ports and so
b65ee4fa 200QEMU must be told to not have parallel ports to have working GUS.
720036a5 201
202@example
3804da9d 203qemu-system-i386 dos.img -soundhw gus -parallel none
720036a5 204@end example
205
206Alternatively:
207@example
3804da9d 208qemu-system-i386 dos.img -device gus,irq=5
720036a5 209@end example
210
211Or some other unclaimed IRQ.
212
cc53d26d 213CS4231A is the chip used in Windows Sound System and GUSMAX products
214
0806e3f6
FB
215@c man end
216
debc7065 217@node pcsys_quickstart
1eb20527 218@section Quick Start
7544a042 219@cindex quick start
1eb20527 220
285dc330 221Download and uncompress the linux image (@file{linux.img}) and type:
0806e3f6
FB
222
223@example
3804da9d 224qemu-system-i386 linux.img
0806e3f6
FB
225@end example
226
227Linux should boot and give you a prompt.
228
6cc721cf 229@node sec_invocation
ec410fc9
FB
230@section Invocation
231
232@example
0806e3f6 233@c man begin SYNOPSIS
8485140f 234@command{qemu-system-i386} [@var{options}] [@var{disk_image}]
0806e3f6 235@c man end
ec410fc9
FB
236@end example
237
0806e3f6 238@c man begin OPTIONS
d2c639d6
BS
239@var{disk_image} is a raw hard disk image for IDE hard disk 0. Some
240targets do not need a disk image.
ec410fc9 241
5824d651 242@include qemu-options.texi
ec410fc9 243
3e11db9a
FB
244@c man end
245
debc7065 246@node pcsys_keys
a40db1b3 247@section Keys in the graphical frontends
3e11db9a
FB
248
249@c man begin OPTIONS
250
de1db2a1
BH
251During the graphical emulation, you can use special key combinations to change
252modes. The default key mappings are shown below, but if you use @code{-alt-grab}
253then the modifier is Ctrl-Alt-Shift (instead of Ctrl-Alt) and if you use
254@code{-ctrl-grab} then the modifier is the right Ctrl key (instead of Ctrl-Alt):
255
a1b74fe8 256@table @key
f9859310 257@item Ctrl-Alt-f
7544a042 258@kindex Ctrl-Alt-f
a1b74fe8 259Toggle full screen
a0a821a4 260
d6a65ba3
JK
261@item Ctrl-Alt-+
262@kindex Ctrl-Alt-+
263Enlarge the screen
264
265@item Ctrl-Alt--
266@kindex Ctrl-Alt--
267Shrink the screen
268
c4a735f9 269@item Ctrl-Alt-u
7544a042 270@kindex Ctrl-Alt-u
c4a735f9 271Restore the screen's un-scaled dimensions
272
f9859310 273@item Ctrl-Alt-n
7544a042 274@kindex Ctrl-Alt-n
a0a821a4
FB
275Switch to virtual console 'n'. Standard console mappings are:
276@table @emph
277@item 1
278Target system display
279@item 2
280Monitor
281@item 3
282Serial port
a1b74fe8
FB
283@end table
284
f9859310 285@item Ctrl-Alt
7544a042 286@kindex Ctrl-Alt
a0a821a4
FB
287Toggle mouse and keyboard grab.
288@end table
289
7544a042
SW
290@kindex Ctrl-Up
291@kindex Ctrl-Down
292@kindex Ctrl-PageUp
293@kindex Ctrl-PageDown
3e11db9a
FB
294In the virtual consoles, you can use @key{Ctrl-Up}, @key{Ctrl-Down},
295@key{Ctrl-PageUp} and @key{Ctrl-PageDown} to move in the back log.
296
a40db1b3
PM
297@c man end
298
299@node mux_keys
300@section Keys in the character backend multiplexer
301
302@c man begin OPTIONS
303
304During emulation, if you are using a character backend multiplexer
305(which is the default if you are using @option{-nographic}) then
306several commands are available via an escape sequence. These
307key sequences all start with an escape character, which is @key{Ctrl-a}
308by default, but can be changed with @option{-echr}. The list below assumes
309you're using the default.
ec410fc9
FB
310
311@table @key
a1b74fe8 312@item Ctrl-a h
7544a042 313@kindex Ctrl-a h
ec410fc9 314Print this help
3b46e624 315@item Ctrl-a x
7544a042 316@kindex Ctrl-a x
366dfc52 317Exit emulator
3b46e624 318@item Ctrl-a s
7544a042 319@kindex Ctrl-a s
1f47a922 320Save disk data back to file (if -snapshot)
20d8a3ed 321@item Ctrl-a t
7544a042 322@kindex Ctrl-a t
d2c639d6 323Toggle console timestamps
a1b74fe8 324@item Ctrl-a b
7544a042 325@kindex Ctrl-a b
1f673135 326Send break (magic sysrq in Linux)
a1b74fe8 327@item Ctrl-a c
7544a042 328@kindex Ctrl-a c
a40db1b3
PM
329Rotate between the frontends connected to the multiplexer (usually
330this switches between the monitor and the console)
a1b74fe8 331@item Ctrl-a Ctrl-a
a40db1b3
PM
332@kindex Ctrl-a Ctrl-a
333Send the escape character to the frontend
ec410fc9 334@end table
0806e3f6
FB
335@c man end
336
337@ignore
338
1f673135
FB
339@c man begin SEEALSO
340The HTML documentation of QEMU for more precise information and Linux
341user mode emulator invocation.
342@c man end
343
344@c man begin AUTHOR
345Fabrice Bellard
346@c man end
347
348@end ignore
349
debc7065 350@node pcsys_monitor
1f673135 351@section QEMU Monitor
7544a042 352@cindex QEMU monitor
1f673135
FB
353
354The QEMU monitor is used to give complex commands to the QEMU
355emulator. You can use it to:
356
357@itemize @minus
358
359@item
e598752a 360Remove or insert removable media images
89dfe898 361(such as CD-ROM or floppies).
1f673135 362
5fafdf24 363@item
1f673135
FB
364Freeze/unfreeze the Virtual Machine (VM) and save or restore its state
365from a disk file.
366
367@item Inspect the VM state without an external debugger.
368
369@end itemize
370
371@subsection Commands
372
373The following commands are available:
374
2313086a 375@include qemu-monitor.texi
0806e3f6 376
2cd8af2d
PB
377@include qemu-monitor-info.texi
378
1f673135
FB
379@subsection Integer expressions
380
381The monitor understands integers expressions for every integer
382argument. You can use register names to get the value of specifics
383CPU registers by prefixing them with @emph{$}.
ec410fc9 384
1f47a922
FB
385@node disk_images
386@section Disk Images
387
acd935ef
FB
388Since version 0.6.1, QEMU supports many disk image formats, including
389growable disk images (their size increase as non empty sectors are
13a2e80f
FB
390written), compressed and encrypted disk images. Version 0.8.3 added
391the new qcow2 disk image format which is essential to support VM
392snapshots.
1f47a922 393
debc7065
FB
394@menu
395* disk_images_quickstart:: Quick start for disk image creation
396* disk_images_snapshot_mode:: Snapshot mode
13a2e80f 397* vm_snapshots:: VM snapshots
debc7065 398* qemu_img_invocation:: qemu-img Invocation
975b092b 399* qemu_nbd_invocation:: qemu-nbd Invocation
d3067b02 400* disk_images_formats:: Disk image file formats
19cb3738 401* host_drives:: Using host drives
debc7065 402* disk_images_fat_images:: Virtual FAT disk images
75818250 403* disk_images_nbd:: NBD access
42af9c30 404* disk_images_sheepdog:: Sheepdog disk images
00984e39 405* disk_images_iscsi:: iSCSI LUNs
8809e289 406* disk_images_gluster:: GlusterFS disk images
0a12ec87 407* disk_images_ssh:: Secure Shell (ssh) disk images
debc7065
FB
408@end menu
409
410@node disk_images_quickstart
acd935ef
FB
411@subsection Quick start for disk image creation
412
413You can create a disk image with the command:
1f47a922 414@example
acd935ef 415qemu-img create myimage.img mysize
1f47a922 416@end example
acd935ef
FB
417where @var{myimage.img} is the disk image filename and @var{mysize} is its
418size in kilobytes. You can add an @code{M} suffix to give the size in
419megabytes and a @code{G} suffix for gigabytes.
420
debc7065 421See @ref{qemu_img_invocation} for more information.
1f47a922 422
debc7065 423@node disk_images_snapshot_mode
1f47a922
FB
424@subsection Snapshot mode
425
426If you use the option @option{-snapshot}, all disk images are
427considered as read only. When sectors in written, they are written in
428a temporary file created in @file{/tmp}. You can however force the
acd935ef
FB
429write back to the raw disk images by using the @code{commit} monitor
430command (or @key{C-a s} in the serial console).
1f47a922 431
13a2e80f
FB
432@node vm_snapshots
433@subsection VM snapshots
434
435VM snapshots are snapshots of the complete virtual machine including
436CPU state, RAM, device state and the content of all the writable
437disks. In order to use VM snapshots, you must have at least one non
438removable and writable block device using the @code{qcow2} disk image
439format. Normally this device is the first virtual hard drive.
440
441Use the monitor command @code{savevm} to create a new VM snapshot or
442replace an existing one. A human readable name can be assigned to each
19d36792 443snapshot in addition to its numerical ID.
13a2e80f
FB
444
445Use @code{loadvm} to restore a VM snapshot and @code{delvm} to remove
446a VM snapshot. @code{info snapshots} lists the available snapshots
447with their associated information:
448
449@example
450(qemu) info snapshots
451Snapshot devices: hda
452Snapshot list (from hda):
453ID TAG VM SIZE DATE VM CLOCK
4541 start 41M 2006-08-06 12:38:02 00:00:14.954
4552 40M 2006-08-06 12:43:29 00:00:18.633
4563 msys 40M 2006-08-06 12:44:04 00:00:23.514
457@end example
458
459A VM snapshot is made of a VM state info (its size is shown in
460@code{info snapshots}) and a snapshot of every writable disk image.
461The VM state info is stored in the first @code{qcow2} non removable
462and writable block device. The disk image snapshots are stored in
463every disk image. The size of a snapshot in a disk image is difficult
464to evaluate and is not shown by @code{info snapshots} because the
465associated disk sectors are shared among all the snapshots to save
19d36792
FB
466disk space (otherwise each snapshot would need a full copy of all the
467disk images).
13a2e80f
FB
468
469When using the (unrelated) @code{-snapshot} option
470(@ref{disk_images_snapshot_mode}), you can always make VM snapshots,
471but they are deleted as soon as you exit QEMU.
472
473VM snapshots currently have the following known limitations:
474@itemize
5fafdf24 475@item
13a2e80f
FB
476They cannot cope with removable devices if they are removed or
477inserted after a snapshot is done.
5fafdf24 478@item
13a2e80f
FB
479A few device drivers still have incomplete snapshot support so their
480state is not saved or restored properly (in particular USB).
481@end itemize
482
acd935ef
FB
483@node qemu_img_invocation
484@subsection @code{qemu-img} Invocation
1f47a922 485
acd935ef 486@include qemu-img.texi
05efe46e 487
975b092b
TS
488@node qemu_nbd_invocation
489@subsection @code{qemu-nbd} Invocation
490
491@include qemu-nbd.texi
492
d3067b02
KW
493@node disk_images_formats
494@subsection Disk image file formats
495
496QEMU supports many image file formats that can be used with VMs as well as with
497any of the tools (like @code{qemu-img}). This includes the preferred formats
498raw and qcow2 as well as formats that are supported for compatibility with
499older QEMU versions or other hypervisors.
500
501Depending on the image format, different options can be passed to
502@code{qemu-img create} and @code{qemu-img convert} using the @code{-o} option.
503This section describes each format and the options that are supported for it.
504
505@table @option
506@item raw
507
508Raw disk image format. This format has the advantage of
509being simple and easily exportable to all other emulators. If your
510file system supports @emph{holes} (for example in ext2 or ext3 on
511Linux or NTFS on Windows), then only the written sectors will reserve
512space. Use @code{qemu-img info} to know the real size used by the
513image or @code{ls -ls} on Unix/Linux.
514
06247428
HT
515Supported options:
516@table @code
517@item preallocation
518Preallocation mode (allowed values: @code{off}, @code{falloc}, @code{full}).
519@code{falloc} mode preallocates space for image by calling posix_fallocate().
520@code{full} mode preallocates space for image by writing zeros to underlying
521storage.
522@end table
523
d3067b02
KW
524@item qcow2
525QEMU image format, the most versatile format. Use it to have smaller
526images (useful if your filesystem does not supports holes, for example
a1f688f4
MA
527on Windows), zlib based compression and support of multiple VM
528snapshots.
d3067b02
KW
529
530Supported options:
531@table @code
532@item compat
7fa9e1f9
SH
533Determines the qcow2 version to use. @code{compat=0.10} uses the
534traditional image format that can be read by any QEMU since 0.10.
d3067b02 535@code{compat=1.1} enables image format extensions that only QEMU 1.1 and
7fa9e1f9
SH
536newer understand (this is the default). Amongst others, this includes
537zero clusters, which allow efficient copy-on-read for sparse images.
d3067b02
KW
538
539@item backing_file
540File name of a base image (see @option{create} subcommand)
541@item backing_fmt
542Image format of the base image
543@item encryption
136cd19d 544If this option is set to @code{on}, the image is encrypted with 128-bit AES-CBC.
d3067b02 545
136cd19d
DB
546The use of encryption in qcow and qcow2 images is considered to be flawed by
547modern cryptography standards, suffering from a number of design problems:
548
549@itemize @minus
550@item The AES-CBC cipher is used with predictable initialization vectors based
551on the sector number. This makes it vulnerable to chosen plaintext attacks
552which can reveal the existence of encrypted data.
553@item The user passphrase is directly used as the encryption key. A poorly
554chosen or short passphrase will compromise the security of the encryption.
555@item In the event of the passphrase being compromised there is no way to
556change the passphrase to protect data in any qcow images. The files must
557be cloned, using a different encryption passphrase in the new file. The
558original file must then be securely erased using a program like shred,
559though even this is ineffective with many modern storage technologies.
560@end itemize
561
a1f688f4
MA
562Use of qcow / qcow2 encryption with QEMU is deprecated, and support for
563it will go away in a future release. Users are recommended to use an
564alternative encryption technology such as the Linux dm-crypt / LUKS
565system.
d3067b02
KW
566
567@item cluster_size
568Changes the qcow2 cluster size (must be between 512 and 2M). Smaller cluster
569sizes can improve the image file size whereas larger cluster sizes generally
570provide better performance.
571
572@item preallocation
0e4271b7
HT
573Preallocation mode (allowed values: @code{off}, @code{metadata}, @code{falloc},
574@code{full}). An image with preallocated metadata is initially larger but can
575improve performance when the image needs to grow. @code{falloc} and @code{full}
576preallocations are like the same options of @code{raw} format, but sets up
577metadata also.
d3067b02
KW
578
579@item lazy_refcounts
580If this option is set to @code{on}, reference count updates are postponed with
581the goal of avoiding metadata I/O and improving performance. This is
582particularly interesting with @option{cache=writethrough} which doesn't batch
583metadata updates. The tradeoff is that after a host crash, the reference count
584tables must be rebuilt, i.e. on the next open an (automatic) @code{qemu-img
585check -r all} is required, which may take some time.
586
587This option can only be enabled if @code{compat=1.1} is specified.
588
4ab15590 589@item nocow
bc3a7f90 590If this option is set to @code{on}, it will turn off COW of the file. It's only
4ab15590
CL
591valid on btrfs, no effect on other file systems.
592
593Btrfs has low performance when hosting a VM image file, even more when the guest
594on the VM also using btrfs as file system. Turning off COW is a way to mitigate
595this bad performance. Generally there are two ways to turn off COW on btrfs:
596a) Disable it by mounting with nodatacow, then all newly created files will be
597NOCOW. b) For an empty file, add the NOCOW file attribute. That's what this option
598does.
599
600Note: this option is only valid to new or empty files. If there is an existing
601file which is COW and has data blocks already, it couldn't be changed to NOCOW
602by setting @code{nocow=on}. One can issue @code{lsattr filename} to check if
bc3a7f90 603the NOCOW flag is set or not (Capital 'C' is NOCOW flag).
4ab15590 604
d3067b02
KW
605@end table
606
607@item qed
608Old QEMU image format with support for backing files and compact image files
609(when your filesystem or transport medium does not support holes).
610
611When converting QED images to qcow2, you might want to consider using the
612@code{lazy_refcounts=on} option to get a more QED-like behaviour.
613
614Supported options:
615@table @code
616@item backing_file
617File name of a base image (see @option{create} subcommand).
618@item backing_fmt
619Image file format of backing file (optional). Useful if the format cannot be
620autodetected because it has no header, like some vhd/vpc files.
621@item cluster_size
622Changes the cluster size (must be power-of-2 between 4K and 64K). Smaller
623cluster sizes can improve the image file size whereas larger cluster sizes
624generally provide better performance.
625@item table_size
626Changes the number of clusters per L1/L2 table (must be power-of-2 between 1
627and 16). There is normally no need to change this value but this option can be
628used for performance benchmarking.
629@end table
630
631@item qcow
632Old QEMU image format with support for backing files, compact image files,
633encryption and compression.
634
635Supported options:
636@table @code
637@item backing_file
638File name of a base image (see @option{create} subcommand)
639@item encryption
640If this option is set to @code{on}, the image is encrypted.
641@end table
642
d3067b02
KW
643@item vdi
644VirtualBox 1.1 compatible image format.
645Supported options:
646@table @code
647@item static
648If this option is set to @code{on}, the image is created with metadata
649preallocation.
650@end table
651
652@item vmdk
653VMware 3 and 4 compatible image format.
654
655Supported options:
656@table @code
657@item backing_file
658File name of a base image (see @option{create} subcommand).
659@item compat6
660Create a VMDK version 6 image (instead of version 4)
f249924e
JK
661@item hwversion
662Specify vmdk virtual hardware version. Compat6 flag cannot be enabled
663if hwversion is specified.
d3067b02
KW
664@item subformat
665Specifies which VMDK subformat to use. Valid options are
666@code{monolithicSparse} (default),
667@code{monolithicFlat},
668@code{twoGbMaxExtentSparse},
669@code{twoGbMaxExtentFlat} and
670@code{streamOptimized}.
671@end table
672
673@item vpc
674VirtualPC compatible image format (VHD).
675Supported options:
676@table @code
677@item subformat
678Specifies which VHD subformat to use. Valid options are
679@code{dynamic} (default) and @code{fixed}.
680@end table
8282db1b
JC
681
682@item VHDX
683Hyper-V compatible image format (VHDX).
684Supported options:
685@table @code
686@item subformat
687Specifies which VHDX subformat to use. Valid options are
688@code{dynamic} (default) and @code{fixed}.
689@item block_state_zero
30af51ce
JC
690Force use of payload blocks of type 'ZERO'. Can be set to @code{on} (default)
691or @code{off}. When set to @code{off}, new blocks will be created as
692@code{PAYLOAD_BLOCK_NOT_PRESENT}, which means parsers are free to return
693arbitrary data for those blocks. Do not set to @code{off} when using
694@code{qemu-img convert} with @code{subformat=dynamic}.
8282db1b
JC
695@item block_size
696Block size; min 1 MB, max 256 MB. 0 means auto-calculate based on image size.
697@item log_size
698Log size; min 1 MB.
699@end table
d3067b02
KW
700@end table
701
702@subsubsection Read-only formats
703More disk image file formats are supported in a read-only mode.
704@table @option
705@item bochs
706Bochs images of @code{growing} type.
707@item cloop
708Linux Compressed Loop image, useful only to reuse directly compressed
709CD-ROM images present for example in the Knoppix CD-ROMs.
710@item dmg
711Apple disk image.
712@item parallels
713Parallels disk image format.
714@end table
715
716
19cb3738
FB
717@node host_drives
718@subsection Using host drives
719
720In addition to disk image files, QEMU can directly access host
721devices. We describe here the usage for QEMU version >= 0.8.3.
722
723@subsubsection Linux
724
725On Linux, you can directly use the host device filename instead of a
4be456f1 726disk image filename provided you have enough privileges to access
92a539d2 727it. For example, use @file{/dev/cdrom} to access to the CDROM.
19cb3738 728
f542086d 729@table @code
19cb3738
FB
730@item CD
731You can specify a CDROM device even if no CDROM is loaded. QEMU has
732specific code to detect CDROM insertion or removal. CDROM ejection by
733the guest OS is supported. Currently only data CDs are supported.
734@item Floppy
735You can specify a floppy device even if no floppy is loaded. Floppy
736removal is currently not detected accurately (if you change floppy
737without doing floppy access while the floppy is not loaded, the guest
738OS will think that the same floppy is loaded).
92a539d2
MA
739Use of the host's floppy device is deprecated, and support for it will
740be removed in a future release.
19cb3738
FB
741@item Hard disks
742Hard disks can be used. Normally you must specify the whole disk
743(@file{/dev/hdb} instead of @file{/dev/hdb1}) so that the guest OS can
744see it as a partitioned disk. WARNING: unless you know what you do, it
745is better to only make READ-ONLY accesses to the hard disk otherwise
746you may corrupt your host data (use the @option{-snapshot} command
747line option or modify the device permissions accordingly).
748@end table
749
750@subsubsection Windows
751
01781963
FB
752@table @code
753@item CD
4be456f1 754The preferred syntax is the drive letter (e.g. @file{d:}). The
01781963
FB
755alternate syntax @file{\\.\d:} is supported. @file{/dev/cdrom} is
756supported as an alias to the first CDROM drive.
19cb3738 757
e598752a 758Currently there is no specific code to handle removable media, so it
19cb3738
FB
759is better to use the @code{change} or @code{eject} monitor commands to
760change or eject media.
01781963 761@item Hard disks
89dfe898 762Hard disks can be used with the syntax: @file{\\.\PhysicalDrive@var{N}}
01781963
FB
763where @var{N} is the drive number (0 is the first hard disk).
764
765WARNING: unless you know what you do, it is better to only make
766READ-ONLY accesses to the hard disk otherwise you may corrupt your
767host data (use the @option{-snapshot} command line so that the
768modifications are written in a temporary file).
769@end table
770
19cb3738
FB
771
772@subsubsection Mac OS X
773
5fafdf24 774@file{/dev/cdrom} is an alias to the first CDROM.
19cb3738 775
e598752a 776Currently there is no specific code to handle removable media, so it
19cb3738
FB
777is better to use the @code{change} or @code{eject} monitor commands to
778change or eject media.
779
debc7065 780@node disk_images_fat_images
2c6cadd4
FB
781@subsection Virtual FAT disk images
782
783QEMU can automatically create a virtual FAT disk image from a
784directory tree. In order to use it, just type:
785
5fafdf24 786@example
3804da9d 787qemu-system-i386 linux.img -hdb fat:/my_directory
2c6cadd4
FB
788@end example
789
790Then you access access to all the files in the @file{/my_directory}
791directory without having to copy them in a disk image or to export
792them via SAMBA or NFS. The default access is @emph{read-only}.
793
794Floppies can be emulated with the @code{:floppy:} option:
795
5fafdf24 796@example
3804da9d 797qemu-system-i386 linux.img -fda fat:floppy:/my_directory
2c6cadd4
FB
798@end example
799
800A read/write support is available for testing (beta stage) with the
801@code{:rw:} option:
802
5fafdf24 803@example
3804da9d 804qemu-system-i386 linux.img -fda fat:floppy:rw:/my_directory
2c6cadd4
FB
805@end example
806
807What you should @emph{never} do:
808@itemize
809@item use non-ASCII filenames ;
810@item use "-snapshot" together with ":rw:" ;
85b2c688
FB
811@item expect it to work when loadvm'ing ;
812@item write to the FAT directory on the host system while accessing it with the guest system.
2c6cadd4
FB
813@end itemize
814
75818250
TS
815@node disk_images_nbd
816@subsection NBD access
817
818QEMU can access directly to block device exported using the Network Block Device
819protocol.
820
821@example
1d7d2a9d 822qemu-system-i386 linux.img -hdb nbd://my_nbd_server.mydomain.org:1024/
75818250
TS
823@end example
824
825If the NBD server is located on the same host, you can use an unix socket instead
826of an inet socket:
827
828@example
1d7d2a9d 829qemu-system-i386 linux.img -hdb nbd+unix://?socket=/tmp/my_socket
75818250
TS
830@end example
831
832In this case, the block device must be exported using qemu-nbd:
833
834@example
835qemu-nbd --socket=/tmp/my_socket my_disk.qcow2
836@end example
837
9d85d557 838The use of qemu-nbd allows sharing of a disk between several guests:
75818250
TS
839@example
840qemu-nbd --socket=/tmp/my_socket --share=2 my_disk.qcow2
841@end example
842
1d7d2a9d 843@noindent
75818250
TS
844and then you can use it with two guests:
845@example
1d7d2a9d
PB
846qemu-system-i386 linux1.img -hdb nbd+unix://?socket=/tmp/my_socket
847qemu-system-i386 linux2.img -hdb nbd+unix://?socket=/tmp/my_socket
75818250
TS
848@end example
849
1d7d2a9d
PB
850If the nbd-server uses named exports (supported since NBD 2.9.18, or with QEMU's
851own embedded NBD server), you must specify an export name in the URI:
1d45f8b5 852@example
1d7d2a9d
PB
853qemu-system-i386 -cdrom nbd://localhost/debian-500-ppc-netinst
854qemu-system-i386 -cdrom nbd://localhost/openSUSE-11.1-ppc-netinst
855@end example
856
857The URI syntax for NBD is supported since QEMU 1.3. An alternative syntax is
858also available. Here are some example of the older syntax:
859@example
860qemu-system-i386 linux.img -hdb nbd:my_nbd_server.mydomain.org:1024
861qemu-system-i386 linux2.img -hdb nbd:unix:/tmp/my_socket
862qemu-system-i386 -cdrom nbd:localhost:10809:exportname=debian-500-ppc-netinst
1d45f8b5
LV
863@end example
864
42af9c30
MK
865@node disk_images_sheepdog
866@subsection Sheepdog disk images
867
868Sheepdog is a distributed storage system for QEMU. It provides highly
869available block level storage volumes that can be attached to
870QEMU-based virtual machines.
871
872You can create a Sheepdog disk image with the command:
873@example
5d6768e3 874qemu-img create sheepdog:///@var{image} @var{size}
42af9c30
MK
875@end example
876where @var{image} is the Sheepdog image name and @var{size} is its
877size.
878
879To import the existing @var{filename} to Sheepdog, you can use a
880convert command.
881@example
5d6768e3 882qemu-img convert @var{filename} sheepdog:///@var{image}
42af9c30
MK
883@end example
884
885You can boot from the Sheepdog disk image with the command:
886@example
5d6768e3 887qemu-system-i386 sheepdog:///@var{image}
42af9c30
MK
888@end example
889
890You can also create a snapshot of the Sheepdog image like qcow2.
891@example
5d6768e3 892qemu-img snapshot -c @var{tag} sheepdog:///@var{image}
42af9c30
MK
893@end example
894where @var{tag} is a tag name of the newly created snapshot.
895
896To boot from the Sheepdog snapshot, specify the tag name of the
897snapshot.
898@example
5d6768e3 899qemu-system-i386 sheepdog:///@var{image}#@var{tag}
42af9c30
MK
900@end example
901
902You can create a cloned image from the existing snapshot.
903@example
5d6768e3 904qemu-img create -b sheepdog:///@var{base}#@var{tag} sheepdog:///@var{image}
42af9c30
MK
905@end example
906where @var{base} is a image name of the source snapshot and @var{tag}
907is its tag name.
908
1b8bbb46
MK
909You can use an unix socket instead of an inet socket:
910
911@example
912qemu-system-i386 sheepdog+unix:///@var{image}?socket=@var{path}
913@end example
914
42af9c30
MK
915If the Sheepdog daemon doesn't run on the local host, you need to
916specify one of the Sheepdog servers to connect to.
917@example
5d6768e3
MK
918qemu-img create sheepdog://@var{hostname}:@var{port}/@var{image} @var{size}
919qemu-system-i386 sheepdog://@var{hostname}:@var{port}/@var{image}
42af9c30
MK
920@end example
921
00984e39
RS
922@node disk_images_iscsi
923@subsection iSCSI LUNs
924
925iSCSI is a popular protocol used to access SCSI devices across a computer
926network.
927
928There are two different ways iSCSI devices can be used by QEMU.
929
930The first method is to mount the iSCSI LUN on the host, and make it appear as
931any other ordinary SCSI device on the host and then to access this device as a
932/dev/sd device from QEMU. How to do this differs between host OSes.
933
934The second method involves using the iSCSI initiator that is built into
935QEMU. This provides a mechanism that works the same way regardless of which
936host OS you are running QEMU on. This section will describe this second method
937of using iSCSI together with QEMU.
938
939In QEMU, iSCSI devices are described using special iSCSI URLs
940
941@example
942URL syntax:
943iscsi://[<username>[%<password>]@@]<host>[:<port>]/<target-iqn-name>/<lun>
944@end example
945
946Username and password are optional and only used if your target is set up
947using CHAP authentication for access control.
948Alternatively the username and password can also be set via environment
949variables to have these not show up in the process list
950
951@example
952export LIBISCSI_CHAP_USERNAME=<username>
953export LIBISCSI_CHAP_PASSWORD=<password>
954iscsi://<host>/<target-iqn-name>/<lun>
955@end example
956
f9dadc98
RS
957Various session related parameters can be set via special options, either
958in a configuration file provided via '-readconfig' or directly on the
959command line.
960
31459f46
RS
961If the initiator-name is not specified qemu will use a default name
962of 'iqn.2008-11.org.linux-kvm[:<name>'] where <name> is the name of the
963virtual machine.
964
965
f9dadc98
RS
966@example
967Setting a specific initiator name to use when logging in to the target
968-iscsi initiator-name=iqn.qemu.test:my-initiator
969@end example
970
971@example
972Controlling which type of header digest to negotiate with the target
973-iscsi header-digest=CRC32C|CRC32C-NONE|NONE-CRC32C|NONE
974@end example
975
976These can also be set via a configuration file
977@example
978[iscsi]
979 user = "CHAP username"
980 password = "CHAP password"
981 initiator-name = "iqn.qemu.test:my-initiator"
982 # header digest is one of CRC32C|CRC32C-NONE|NONE-CRC32C|NONE
983 header-digest = "CRC32C"
984@end example
985
986
987Setting the target name allows different options for different targets
988@example
989[iscsi "iqn.target.name"]
990 user = "CHAP username"
991 password = "CHAP password"
992 initiator-name = "iqn.qemu.test:my-initiator"
993 # header digest is one of CRC32C|CRC32C-NONE|NONE-CRC32C|NONE
994 header-digest = "CRC32C"
995@end example
996
997
998Howto use a configuration file to set iSCSI configuration options:
999@example
1000cat >iscsi.conf <<EOF
1001[iscsi]
1002 user = "me"
1003 password = "my password"
1004 initiator-name = "iqn.qemu.test:my-initiator"
1005 header-digest = "CRC32C"
1006EOF
1007
1008qemu-system-i386 -drive file=iscsi://127.0.0.1/iqn.qemu.test/1 \
1009 -readconfig iscsi.conf
1010@end example
1011
1012
00984e39
RS
1013Howto set up a simple iSCSI target on loopback and accessing it via QEMU:
1014@example
1015This example shows how to set up an iSCSI target with one CDROM and one DISK
1016using the Linux STGT software target. This target is available on Red Hat based
1017systems as the package 'scsi-target-utils'.
1018
1019tgtd --iscsi portal=127.0.0.1:3260
1020tgtadm --lld iscsi --op new --mode target --tid 1 -T iqn.qemu.test
1021tgtadm --lld iscsi --mode logicalunit --op new --tid 1 --lun 1 \
1022 -b /IMAGES/disk.img --device-type=disk
1023tgtadm --lld iscsi --mode logicalunit --op new --tid 1 --lun 2 \
1024 -b /IMAGES/cd.iso --device-type=cd
1025tgtadm --lld iscsi --op bind --mode target --tid 1 -I ALL
1026
f9dadc98
RS
1027qemu-system-i386 -iscsi initiator-name=iqn.qemu.test:my-initiator \
1028 -boot d -drive file=iscsi://127.0.0.1/iqn.qemu.test/1 \
00984e39
RS
1029 -cdrom iscsi://127.0.0.1/iqn.qemu.test/2
1030@end example
1031
8809e289
BR
1032@node disk_images_gluster
1033@subsection GlusterFS disk images
00984e39 1034
736a83fa 1035GlusterFS is a user space distributed file system.
8809e289
BR
1036
1037You can boot from the GlusterFS disk image with the command:
1038@example
76b5550f
PKK
1039URI:
1040qemu-system-x86_64 -drive file=gluster[+@var{type}]://[@var{host}[:@var{port}]]/@var{volume}/@var{path}
1041 [?socket=...][,file.debug=9][,file.logfile=...]
1042
1043JSON:
1044qemu-system-x86_64 'json:@{"driver":"qcow2",
1045 "file":@{"driver":"gluster",
1046 "volume":"testvol","path":"a.img","debug":9,"logfile":"...",
1047 "server":[@{"type":"tcp","host":"...","port":"..."@},
1048 @{"type":"unix","socket":"..."@}]@}@}'
8809e289
BR
1049@end example
1050
1051@var{gluster} is the protocol.
1052
76b5550f 1053@var{type} specifies the transport type used to connect to gluster
8809e289 1054management daemon (glusterd). Valid transport types are
76b5550f
PKK
1055tcp and unix. In the URI form, if a transport type isn't specified,
1056then tcp type is assumed.
8809e289 1057
76b5550f
PKK
1058@var{host} specifies the server where the volume file specification for
1059the given volume resides. This can be either a hostname or an ipv4 address.
1060If transport type is unix, then @var{host} field should not be specified.
8809e289
BR
1061Instead @var{socket} field needs to be populated with the path to unix domain
1062socket.
1063
1064@var{port} is the port number on which glusterd is listening. This is optional
76b5550f
PKK
1065and if not specified, it defaults to port 24007. If the transport type is unix,
1066then @var{port} should not be specified.
1067
1068@var{volume} is the name of the gluster volume which contains the disk image.
1069
1070@var{path} is the path to the actual disk image that resides on gluster volume.
1071
1072@var{debug} is the logging level of the gluster protocol driver. Debug levels
1073are 0-9, with 9 being the most verbose, and 0 representing no debugging output.
1074The default level is 4. The current logging levels defined in the gluster source
1075are 0 - None, 1 - Emergency, 2 - Alert, 3 - Critical, 4 - Error, 5 - Warning,
10766 - Notice, 7 - Info, 8 - Debug, 9 - Trace
1077
1078@var{logfile} is a commandline option to mention log file path which helps in
1079logging to the specified file and also help in persisting the gfapi logs. The
1080default is stderr.
1081
8809e289 1082
8809e289 1083
8809e289
BR
1084
1085You can create a GlusterFS disk image with the command:
1086@example
76b5550f 1087qemu-img create gluster://@var{host}/@var{volume}/@var{path} @var{size}
8809e289
BR
1088@end example
1089
1090Examples
1091@example
1092qemu-system-x86_64 -drive file=gluster://1.2.3.4/testvol/a.img
1093qemu-system-x86_64 -drive file=gluster+tcp://1.2.3.4/testvol/a.img
1094qemu-system-x86_64 -drive file=gluster+tcp://1.2.3.4:24007/testvol/dir/a.img
1095qemu-system-x86_64 -drive file=gluster+tcp://[1:2:3:4:5:6:7:8]/testvol/dir/a.img
1096qemu-system-x86_64 -drive file=gluster+tcp://[1:2:3:4:5:6:7:8]:24007/testvol/dir/a.img
1097qemu-system-x86_64 -drive file=gluster+tcp://server.domain.com:24007/testvol/dir/a.img
1098qemu-system-x86_64 -drive file=gluster+unix:///testvol/dir/a.img?socket=/tmp/glusterd.socket
1099qemu-system-x86_64 -drive file=gluster+rdma://1.2.3.4:24007/testvol/a.img
76b5550f
PKK
1100qemu-system-x86_64 -drive file=gluster://1.2.3.4/testvol/a.img,file.debug=9,file.logfile=/var/log/qemu-gluster.log
1101qemu-system-x86_64 'json:@{"driver":"qcow2",
1102 "file":@{"driver":"gluster",
1103 "volume":"testvol","path":"a.img",
1104 "debug":9,"logfile":"/var/log/qemu-gluster.log",
1105 "server":[@{"type":"tcp","host":"1.2.3.4","port":24007@},
1106 @{"type":"unix","socket":"/var/run/glusterd.socket"@}]@}@}'
1107qemu-system-x86_64 -drive driver=qcow2,file.driver=gluster,file.volume=testvol,file.path=/path/a.img,
1108 file.debug=9,file.logfile=/var/log/qemu-gluster.log,
1109 file.server.0.type=tcp,file.server.0.host=1.2.3.4,file.server.0.port=24007,
1110 file.server.1.type=unix,file.server.1.socket=/var/run/glusterd.socket
8809e289 1111@end example
00984e39 1112
0a12ec87
RJ
1113@node disk_images_ssh
1114@subsection Secure Shell (ssh) disk images
1115
1116You can access disk images located on a remote ssh server
1117by using the ssh protocol:
1118
1119@example
1120qemu-system-x86_64 -drive file=ssh://[@var{user}@@]@var{server}[:@var{port}]/@var{path}[?host_key_check=@var{host_key_check}]
1121@end example
1122
1123Alternative syntax using properties:
1124
1125@example
1126qemu-system-x86_64 -drive file.driver=ssh[,file.user=@var{user}],file.host=@var{server}[,file.port=@var{port}],file.path=@var{path}[,file.host_key_check=@var{host_key_check}]
1127@end example
1128
1129@var{ssh} is the protocol.
1130
1131@var{user} is the remote user. If not specified, then the local
1132username is tried.
1133
1134@var{server} specifies the remote ssh server. Any ssh server can be
1135used, but it must implement the sftp-server protocol. Most Unix/Linux
1136systems should work without requiring any extra configuration.
1137
1138@var{port} is the port number on which sshd is listening. By default
1139the standard ssh port (22) is used.
1140
1141@var{path} is the path to the disk image.
1142
1143The optional @var{host_key_check} parameter controls how the remote
1144host's key is checked. The default is @code{yes} which means to use
1145the local @file{.ssh/known_hosts} file. Setting this to @code{no}
1146turns off known-hosts checking. Or you can check that the host key
1147matches a specific fingerprint:
1148@code{host_key_check=md5:78:45:8e:14:57:4f:d5:45:83:0a:0e:f3:49:82:c9:c8}
1149(@code{sha1:} can also be used as a prefix, but note that OpenSSH
1150tools only use MD5 to print fingerprints).
1151
1152Currently authentication must be done using ssh-agent. Other
1153authentication methods may be supported in future.
1154
9a2d462e
RJ
1155Note: Many ssh servers do not support an @code{fsync}-style operation.
1156The ssh driver cannot guarantee that disk flush requests are
1157obeyed, and this causes a risk of disk corruption if the remote
1158server or network goes down during writes. The driver will
1159print a warning when @code{fsync} is not supported:
1160
1161warning: ssh server @code{ssh.example.com:22} does not support fsync
1162
1163With sufficiently new versions of libssh2 and OpenSSH, @code{fsync} is
1164supported.
0a12ec87 1165
debc7065 1166@node pcsys_network
9d4fb82e
FB
1167@section Network emulation
1168
4be456f1 1169QEMU can simulate several network cards (PCI or ISA cards on the PC
41d03949
FB
1170target) and can connect them to an arbitrary number of Virtual Local
1171Area Networks (VLANs). Host TAP devices can be connected to any QEMU
1172VLAN. VLAN can be connected between separate instances of QEMU to
4be456f1 1173simulate large networks. For simpler usage, a non privileged user mode
41d03949
FB
1174network stack can replace the TAP device to have a basic network
1175connection.
1176
1177@subsection VLANs
9d4fb82e 1178
41d03949
FB
1179QEMU simulates several VLANs. A VLAN can be symbolised as a virtual
1180connection between several network devices. These devices can be for
1181example QEMU virtual Ethernet cards or virtual Host ethernet devices
1182(TAP devices).
9d4fb82e 1183
41d03949
FB
1184@subsection Using TAP network interfaces
1185
1186This is the standard way to connect QEMU to a real network. QEMU adds
1187a virtual network device on your host (called @code{tapN}), and you
1188can then configure it as if it was a real ethernet card.
9d4fb82e 1189
8f40c388
FB
1190@subsubsection Linux host
1191
9d4fb82e
FB
1192As an example, you can download the @file{linux-test-xxx.tar.gz}
1193archive and copy the script @file{qemu-ifup} in @file{/etc} and
1194configure properly @code{sudo} so that the command @code{ifconfig}
1195contained in @file{qemu-ifup} can be executed as root. You must verify
41d03949 1196that your host kernel supports the TAP network interfaces: the
9d4fb82e
FB
1197device @file{/dev/net/tun} must be present.
1198
ee0f4751
FB
1199See @ref{sec_invocation} to have examples of command lines using the
1200TAP network interfaces.
9d4fb82e 1201
8f40c388
FB
1202@subsubsection Windows host
1203
1204There is a virtual ethernet driver for Windows 2000/XP systems, called
1205TAP-Win32. But it is not included in standard QEMU for Windows,
1206so you will need to get it separately. It is part of OpenVPN package,
1207so download OpenVPN from : @url{http://openvpn.net/}.
1208
9d4fb82e
FB
1209@subsection Using the user mode network stack
1210
41d03949
FB
1211By using the option @option{-net user} (default configuration if no
1212@option{-net} option is specified), QEMU uses a completely user mode
4be456f1 1213network stack (you don't need root privilege to use the virtual
41d03949 1214network). The virtual network configuration is the following:
9d4fb82e
FB
1215
1216@example
1217
41d03949
FB
1218 QEMU VLAN <------> Firewall/DHCP server <-----> Internet
1219 | (10.0.2.2)
9d4fb82e 1220 |
2518bd0d 1221 ----> DNS server (10.0.2.3)
3b46e624 1222 |
2518bd0d 1223 ----> SMB server (10.0.2.4)
9d4fb82e
FB
1224@end example
1225
1226The QEMU VM behaves as if it was behind a firewall which blocks all
1227incoming connections. You can use a DHCP client to automatically
41d03949
FB
1228configure the network in the QEMU VM. The DHCP server assign addresses
1229to the hosts starting from 10.0.2.15.
9d4fb82e
FB
1230
1231In order to check that the user mode network is working, you can ping
1232the address 10.0.2.2 and verify that you got an address in the range
123310.0.2.x from the QEMU virtual DHCP server.
1234
37cbfcce
GH
1235Note that ICMP traffic in general does not work with user mode networking.
1236@code{ping}, aka. ICMP echo, to the local router (10.0.2.2) shall work,
1237however. If you're using QEMU on Linux >= 3.0, it can use unprivileged ICMP
1238ping sockets to allow @code{ping} to the Internet. The host admin has to set
1239the ping_group_range in order to grant access to those sockets. To allow ping
1240for GID 100 (usually users group):
1241
1242@example
1243echo 100 100 > /proc/sys/net/ipv4/ping_group_range
1244@end example
b415a407 1245
9bf05444
FB
1246When using the built-in TFTP server, the router is also the TFTP
1247server.
1248
c8c6afa8
TH
1249When using the @option{'-netdev user,hostfwd=...'} option, TCP or UDP
1250connections can be redirected from the host to the guest. It allows for
1251example to redirect X11, telnet or SSH connections.
443f1376 1252
41d03949
FB
1253@subsection Connecting VLANs between QEMU instances
1254
1255Using the @option{-net socket} option, it is possible to make VLANs
1256that span several QEMU instances. See @ref{sec_invocation} to have a
1257basic example.
1258
576fd0a1 1259@node pcsys_other_devs
6cbf4c8c
CM
1260@section Other Devices
1261
1262@subsection Inter-VM Shared Memory device
1263
5400c02b
MA
1264On Linux hosts, a shared memory device is available. The basic syntax
1265is:
6cbf4c8c
CM
1266
1267@example
5400c02b
MA
1268qemu-system-x86_64 -device ivshmem-plain,memdev=@var{hostmem}
1269@end example
1270
1271where @var{hostmem} names a host memory backend. For a POSIX shared
1272memory backend, use something like
1273
1274@example
1275-object memory-backend-file,size=1M,share,mem-path=/dev/shm/ivshmem,id=@var{hostmem}
6cbf4c8c
CM
1276@end example
1277
1278If desired, interrupts can be sent between guest VMs accessing the same shared
1279memory region. Interrupt support requires using a shared memory server and
1280using a chardev socket to connect to it. The code for the shared memory server
1281is qemu.git/contrib/ivshmem-server. An example syntax when using the shared
1282memory server is:
1283
1284@example
a75eb03b 1285# First start the ivshmem server once and for all
50d34c4e 1286ivshmem-server -p @var{pidfile} -S @var{path} -m @var{shm-name} -l @var{shm-size} -n @var{vectors}
a75eb03b
DM
1287
1288# Then start your qemu instances with matching arguments
5400c02b 1289qemu-system-x86_64 -device ivshmem-doorbell,vectors=@var{vectors},chardev=@var{id}
50d34c4e 1290 -chardev socket,path=@var{path},id=@var{id}
6cbf4c8c
CM
1291@end example
1292
1293When using the server, the guest will be assigned a VM ID (>=0) that allows guests
1294using the same server to communicate via interrupts. Guests can read their
1309cf44 1295VM ID from a device register (see ivshmem-spec.txt).
6cbf4c8c 1296
62a830b6
MA
1297@subsubsection Migration with ivshmem
1298
5400c02b
MA
1299With device property @option{master=on}, the guest will copy the shared
1300memory on migration to the destination host. With @option{master=off},
1301the guest will not be able to migrate with the device attached. In the
1302latter case, the device should be detached and then reattached after
1303migration using the PCI hotplug support.
6cbf4c8c 1304
62a830b6
MA
1305At most one of the devices sharing the same memory can be master. The
1306master must complete migration before you plug back the other devices.
1307
7d4f4bda
MAL
1308@subsubsection ivshmem and hugepages
1309
1310Instead of specifying the <shm size> using POSIX shm, you may specify
1311a memory backend that has hugepage support:
1312
1313@example
5400c02b
MA
1314qemu-system-x86_64 -object memory-backend-file,size=1G,mem-path=/dev/hugepages/my-shmem-file,share,id=mb1
1315 -device ivshmem-plain,memdev=mb1
7d4f4bda
MAL
1316@end example
1317
1318ivshmem-server also supports hugepages mount points with the
1319@option{-m} memory path argument.
1320
9d4fb82e
FB
1321@node direct_linux_boot
1322@section Direct Linux Boot
1f673135
FB
1323
1324This section explains how to launch a Linux kernel inside QEMU without
1325having to make a full bootable image. It is very useful for fast Linux
ee0f4751 1326kernel testing.
1f673135 1327
ee0f4751 1328The syntax is:
1f673135 1329@example
3804da9d 1330qemu-system-i386 -kernel arch/i386/boot/bzImage -hda root-2.4.20.img -append "root=/dev/hda"
1f673135
FB
1331@end example
1332
ee0f4751
FB
1333Use @option{-kernel} to provide the Linux kernel image and
1334@option{-append} to give the kernel command line arguments. The
1335@option{-initrd} option can be used to provide an INITRD image.
1f673135 1336
ee0f4751
FB
1337When using the direct Linux boot, a disk image for the first hard disk
1338@file{hda} is required because its boot sector is used to launch the
1339Linux kernel.
1f673135 1340
ee0f4751
FB
1341If you do not need graphical output, you can disable it and redirect
1342the virtual serial port and the QEMU monitor to the console with the
1343@option{-nographic} option. The typical command line is:
1f673135 1344@example
3804da9d
SW
1345qemu-system-i386 -kernel arch/i386/boot/bzImage -hda root-2.4.20.img \
1346 -append "root=/dev/hda console=ttyS0" -nographic
1f673135
FB
1347@end example
1348
ee0f4751
FB
1349Use @key{Ctrl-a c} to switch between the serial console and the
1350monitor (@pxref{pcsys_keys}).
1f673135 1351
debc7065 1352@node pcsys_usb
b389dbfb
FB
1353@section USB emulation
1354
a92ff8c1
TH
1355QEMU can emulate a PCI UHCI, OHCI, EHCI or XHCI USB controller. You can
1356plug virtual USB devices or real host USB devices (only works with certain
1357host operating systems). QEMU will automatically create and connect virtual
1358USB hubs as necessary to connect multiple USB devices.
b389dbfb 1359
0aff66b5
PB
1360@menu
1361* usb_devices::
1362* host_usb_devices::
1363@end menu
1364@node usb_devices
1365@subsection Connecting USB devices
b389dbfb 1366
a92ff8c1
TH
1367USB devices can be connected with the @option{-device usb-...} command line
1368option or the @code{device_add} monitor command. Available devices are:
b389dbfb 1369
db380c06 1370@table @code
a92ff8c1 1371@item usb-mouse
0aff66b5 1372Virtual Mouse. This will override the PS/2 mouse emulation when activated.
a92ff8c1 1373@item usb-tablet
c6d46c20 1374Pointer device that uses absolute coordinates (like a touchscreen).
b65ee4fa 1375This means QEMU is able to report the mouse position without having
0aff66b5 1376to grab the mouse. Also overrides the PS/2 mouse emulation when activated.
a92ff8c1
TH
1377@item usb-storage,drive=@var{drive_id}
1378Mass storage device backed by @var{drive_id} (@pxref{disk_images})
1379@item usb-uas
1380USB attached SCSI device, see
1381@url{http://git.qemu.org/?p=qemu.git;a=blob_plain;f=docs/usb-storage.txt,usb-storage.txt}
1382for details
1383@item usb-bot
1384Bulk-only transport storage device, see
1385@url{http://git.qemu.org/?p=qemu.git;a=blob_plain;f=docs/usb-storage.txt,usb-storage.txt}
1386for details here, too
1387@item usb-mtp,x-root=@var{dir}
1388Media transfer protocol device, using @var{dir} as root of the file tree
1389that is presented to the guest.
1390@item usb-host,hostbus=@var{bus},hostaddr=@var{addr}
1391Pass through the host device identified by @var{bus} and @var{addr}
1392@item usb-host,vendorid=@var{vendor},productid=@var{product}
1393Pass through the host device identified by @var{vendor} and @var{product} ID
1394@item usb-wacom-tablet
f6d2a316
AZ
1395Virtual Wacom PenPartner tablet. This device is similar to the @code{tablet}
1396above but it can be used with the tslib library because in addition to touch
1397coordinates it reports touch pressure.
a92ff8c1 1398@item usb-kbd
47b2d338 1399Standard USB keyboard. Will override the PS/2 keyboard (if present).
a92ff8c1 1400@item usb-serial,chardev=@var{id}
db380c06 1401Serial converter. This emulates an FTDI FT232BM chip connected to host character
a92ff8c1
TH
1402device @var{id}.
1403@item usb-braille,chardev=@var{id}
2e4d9fb1 1404Braille device. This will use BrlAPI to display the braille output on a real
a92ff8c1
TH
1405or fake device referenced by @var{id}.
1406@item usb-net[,netdev=@var{id}]
1407Network adapter that supports CDC ethernet and RNDIS protocols. @var{id}
1408specifies a netdev defined with @code{-netdev @dots{},id=@var{id}}.
9ad97e65 1409For instance, user-mode networking can be used with
6c9f886c 1410@example
a92ff8c1 1411qemu-system-i386 [...] -netdev user,id=net0 -device usb-net,netdev=net0
6c9f886c 1412@end example
a92ff8c1
TH
1413@item usb-ccid
1414Smartcard reader device
1415@item usb-audio
1416USB audio device
1417@item usb-bt-dongle
1418Bluetooth dongle for the transport layer of HCI. It is connected to HCI
1419scatternet 0 by default (corresponds to @code{-bt hci,vlan=0}).
1420Note that the syntax for the @code{-device usb-bt-dongle} option is not as
1421useful yet as it was with the legacy @code{-usbdevice} option. So to
1422configure an USB bluetooth device, you might need to use
1423"@code{-usbdevice bt}[:@var{hci-type}]" instead. This configures a
1424bluetooth dongle whose type is specified in the same format as with
2d564691
AZ
1425the @option{-bt hci} option, @pxref{bt-hcis,,allowed HCI types}. If
1426no type is given, the HCI logic corresponds to @code{-bt hci,vlan=0}.
1427This USB device implements the USB Transport Layer of HCI. Example
1428usage:
1429@example
8485140f 1430@command{qemu-system-i386} [...@var{OPTIONS}...] @option{-usbdevice} bt:hci,vlan=3 @option{-bt} device:keyboard,vlan=3
2d564691 1431@end example
0aff66b5 1432@end table
b389dbfb 1433
0aff66b5 1434@node host_usb_devices
b389dbfb
FB
1435@subsection Using host USB devices on a Linux host
1436
1437WARNING: this is an experimental feature. QEMU will slow down when
1438using it. USB devices requiring real time streaming (i.e. USB Video
1439Cameras) are not supported yet.
1440
1441@enumerate
5fafdf24 1442@item If you use an early Linux 2.4 kernel, verify that no Linux driver
b389dbfb
FB
1443is actually using the USB device. A simple way to do that is simply to
1444disable the corresponding kernel module by renaming it from @file{mydriver.o}
1445to @file{mydriver.o.disabled}.
1446
1447@item Verify that @file{/proc/bus/usb} is working (most Linux distributions should enable it by default). You should see something like that:
1448@example
1449ls /proc/bus/usb
1450001 devices drivers
1451@end example
1452
1453@item Since only root can access to the USB devices directly, you can either launch QEMU as root or change the permissions of the USB devices you want to use. For testing, the following suffices:
1454@example
1455chown -R myuid /proc/bus/usb
1456@end example
1457
1458@item Launch QEMU and do in the monitor:
5fafdf24 1459@example
b389dbfb
FB
1460info usbhost
1461 Device 1.2, speed 480 Mb/s
1462 Class 00: USB device 1234:5678, USB DISK
1463@end example
1464You should see the list of the devices you can use (Never try to use
1465hubs, it won't work).
1466
1467@item Add the device in QEMU by using:
5fafdf24 1468@example
a92ff8c1 1469device_add usb-host,vendorid=0x1234,productid=0x5678
b389dbfb
FB
1470@end example
1471
a92ff8c1
TH
1472Normally the guest OS should report that a new USB device is plugged.
1473You can use the option @option{-device usb-host,...} to do the same.
b389dbfb
FB
1474
1475@item Now you can try to use the host USB device in QEMU.
1476
1477@end enumerate
1478
1479When relaunching QEMU, you may have to unplug and plug again the USB
1480device to make it work again (this is a bug).
1481
f858dcae
TS
1482@node vnc_security
1483@section VNC security
1484
1485The VNC server capability provides access to the graphical console
1486of the guest VM across the network. This has a number of security
1487considerations depending on the deployment scenarios.
1488
1489@menu
1490* vnc_sec_none::
1491* vnc_sec_password::
1492* vnc_sec_certificate::
1493* vnc_sec_certificate_verify::
1494* vnc_sec_certificate_pw::
2f9606b3
AL
1495* vnc_sec_sasl::
1496* vnc_sec_certificate_sasl::
f858dcae 1497* vnc_generate_cert::
2f9606b3 1498* vnc_setup_sasl::
f858dcae
TS
1499@end menu
1500@node vnc_sec_none
1501@subsection Without passwords
1502
1503The simplest VNC server setup does not include any form of authentication.
1504For this setup it is recommended to restrict it to listen on a UNIX domain
1505socket only. For example
1506
1507@example
3804da9d 1508qemu-system-i386 [...OPTIONS...] -vnc unix:/home/joebloggs/.qemu-myvm-vnc
f858dcae
TS
1509@end example
1510
1511This ensures that only users on local box with read/write access to that
1512path can access the VNC server. To securely access the VNC server from a
1513remote machine, a combination of netcat+ssh can be used to provide a secure
1514tunnel.
1515
1516@node vnc_sec_password
1517@subsection With passwords
1518
1519The VNC protocol has limited support for password based authentication. Since
1520the protocol limits passwords to 8 characters it should not be considered
1521to provide high security. The password can be fairly easily brute-forced by
1522a client making repeat connections. For this reason, a VNC server using password
1523authentication should be restricted to only listen on the loopback interface
0f66998f
PM
1524or UNIX domain sockets. Password authentication is not supported when operating
1525in FIPS 140-2 compliance mode as it requires the use of the DES cipher. Password
1526authentication is requested with the @code{password} option, and then once QEMU
1527is running the password is set with the monitor. Until the monitor is used to
1528set the password all clients will be rejected.
f858dcae
TS
1529
1530@example
3804da9d 1531qemu-system-i386 [...OPTIONS...] -vnc :1,password -monitor stdio
f858dcae
TS
1532(qemu) change vnc password
1533Password: ********
1534(qemu)
1535@end example
1536
1537@node vnc_sec_certificate
1538@subsection With x509 certificates
1539
1540The QEMU VNC server also implements the VeNCrypt extension allowing use of
1541TLS for encryption of the session, and x509 certificates for authentication.
1542The use of x509 certificates is strongly recommended, because TLS on its
1543own is susceptible to man-in-the-middle attacks. Basic x509 certificate
1544support provides a secure session, but no authentication. This allows any
1545client to connect, and provides an encrypted session.
1546
1547@example
3804da9d 1548qemu-system-i386 [...OPTIONS...] -vnc :1,tls,x509=/etc/pki/qemu -monitor stdio
f858dcae
TS
1549@end example
1550
1551In the above example @code{/etc/pki/qemu} should contain at least three files,
1552@code{ca-cert.pem}, @code{server-cert.pem} and @code{server-key.pem}. Unprivileged
1553users will want to use a private directory, for example @code{$HOME/.pki/qemu}.
1554NB the @code{server-key.pem} file should be protected with file mode 0600 to
1555only be readable by the user owning it.
1556
1557@node vnc_sec_certificate_verify
1558@subsection With x509 certificates and client verification
1559
1560Certificates can also provide a means to authenticate the client connecting.
1561The server will request that the client provide a certificate, which it will
1562then validate against the CA certificate. This is a good choice if deploying
1563in an environment with a private internal certificate authority.
1564
1565@example
3804da9d 1566qemu-system-i386 [...OPTIONS...] -vnc :1,tls,x509verify=/etc/pki/qemu -monitor stdio
f858dcae
TS
1567@end example
1568
1569
1570@node vnc_sec_certificate_pw
1571@subsection With x509 certificates, client verification and passwords
1572
1573Finally, the previous method can be combined with VNC password authentication
1574to provide two layers of authentication for clients.
1575
1576@example
3804da9d 1577qemu-system-i386 [...OPTIONS...] -vnc :1,password,tls,x509verify=/etc/pki/qemu -monitor stdio
f858dcae
TS
1578(qemu) change vnc password
1579Password: ********
1580(qemu)
1581@end example
1582
2f9606b3
AL
1583
1584@node vnc_sec_sasl
1585@subsection With SASL authentication
1586
1587The SASL authentication method is a VNC extension, that provides an
1588easily extendable, pluggable authentication method. This allows for
1589integration with a wide range of authentication mechanisms, such as
1590PAM, GSSAPI/Kerberos, LDAP, SQL databases, one-time keys and more.
1591The strength of the authentication depends on the exact mechanism
1592configured. If the chosen mechanism also provides a SSF layer, then
1593it will encrypt the datastream as well.
1594
1595Refer to the later docs on how to choose the exact SASL mechanism
1596used for authentication, but assuming use of one supporting SSF,
1597then QEMU can be launched with:
1598
1599@example
3804da9d 1600qemu-system-i386 [...OPTIONS...] -vnc :1,sasl -monitor stdio
2f9606b3
AL
1601@end example
1602
1603@node vnc_sec_certificate_sasl
1604@subsection With x509 certificates and SASL authentication
1605
1606If the desired SASL authentication mechanism does not supported
1607SSF layers, then it is strongly advised to run it in combination
1608with TLS and x509 certificates. This provides securely encrypted
1609data stream, avoiding risk of compromising of the security
1610credentials. This can be enabled, by combining the 'sasl' option
1611with the aforementioned TLS + x509 options:
1612
1613@example
3804da9d 1614qemu-system-i386 [...OPTIONS...] -vnc :1,tls,x509,sasl -monitor stdio
2f9606b3
AL
1615@end example
1616
1617
f858dcae
TS
1618@node vnc_generate_cert
1619@subsection Generating certificates for VNC
1620
1621The GNU TLS packages provides a command called @code{certtool} which can
1622be used to generate certificates and keys in PEM format. At a minimum it
40c5c6cd 1623is necessary to setup a certificate authority, and issue certificates to
f858dcae
TS
1624each server. If using certificates for authentication, then each client
1625will also need to be issued a certificate. The recommendation is for the
1626server to keep its certificates in either @code{/etc/pki/qemu} or for
1627unprivileged users in @code{$HOME/.pki/qemu}.
1628
1629@menu
1630* vnc_generate_ca::
1631* vnc_generate_server::
1632* vnc_generate_client::
1633@end menu
1634@node vnc_generate_ca
1635@subsubsection Setup the Certificate Authority
1636
1637This step only needs to be performed once per organization / organizational
1638unit. First the CA needs a private key. This key must be kept VERY secret
1639and secure. If this key is compromised the entire trust chain of the certificates
1640issued with it is lost.
1641
1642@example
1643# certtool --generate-privkey > ca-key.pem
1644@end example
1645
1646A CA needs to have a public certificate. For simplicity it can be a self-signed
1647certificate, or one issue by a commercial certificate issuing authority. To
1648generate a self-signed certificate requires one core piece of information, the
1649name of the organization.
1650
1651@example
1652# cat > ca.info <<EOF
1653cn = Name of your organization
1654ca
1655cert_signing_key
1656EOF
1657# certtool --generate-self-signed \
1658 --load-privkey ca-key.pem
1659 --template ca.info \
1660 --outfile ca-cert.pem
1661@end example
1662
1663The @code{ca-cert.pem} file should be copied to all servers and clients wishing to utilize
1664TLS support in the VNC server. The @code{ca-key.pem} must not be disclosed/copied at all.
1665
1666@node vnc_generate_server
1667@subsubsection Issuing server certificates
1668
1669Each server (or host) needs to be issued with a key and certificate. When connecting
1670the certificate is sent to the client which validates it against the CA certificate.
1671The core piece of information for a server certificate is the hostname. This should
1672be the fully qualified hostname that the client will connect with, since the client
1673will typically also verify the hostname in the certificate. On the host holding the
1674secure CA private key:
1675
1676@example
1677# cat > server.info <<EOF
1678organization = Name of your organization
1679cn = server.foo.example.com
1680tls_www_server
1681encryption_key
1682signing_key
1683EOF
1684# certtool --generate-privkey > server-key.pem
1685# certtool --generate-certificate \
1686 --load-ca-certificate ca-cert.pem \
1687 --load-ca-privkey ca-key.pem \
63c693f8 1688 --load-privkey server-key.pem \
f858dcae
TS
1689 --template server.info \
1690 --outfile server-cert.pem
1691@end example
1692
1693The @code{server-key.pem} and @code{server-cert.pem} files should now be securely copied
1694to the server for which they were generated. The @code{server-key.pem} is security
1695sensitive and should be kept protected with file mode 0600 to prevent disclosure.
1696
1697@node vnc_generate_client
1698@subsubsection Issuing client certificates
1699
1700If the QEMU VNC server is to use the @code{x509verify} option to validate client
1701certificates as its authentication mechanism, each client also needs to be issued
1702a certificate. The client certificate contains enough metadata to uniquely identify
1703the client, typically organization, state, city, building, etc. On the host holding
1704the secure CA private key:
1705
1706@example
1707# cat > client.info <<EOF
1708country = GB
1709state = London
1710locality = London
63c693f8 1711organization = Name of your organization
f858dcae
TS
1712cn = client.foo.example.com
1713tls_www_client
1714encryption_key
1715signing_key
1716EOF
1717# certtool --generate-privkey > client-key.pem
1718# certtool --generate-certificate \
1719 --load-ca-certificate ca-cert.pem \
1720 --load-ca-privkey ca-key.pem \
1721 --load-privkey client-key.pem \
1722 --template client.info \
1723 --outfile client-cert.pem
1724@end example
1725
1726The @code{client-key.pem} and @code{client-cert.pem} files should now be securely
1727copied to the client for which they were generated.
1728
2f9606b3
AL
1729
1730@node vnc_setup_sasl
1731
1732@subsection Configuring SASL mechanisms
1733
1734The following documentation assumes use of the Cyrus SASL implementation on a
1735Linux host, but the principals should apply to any other SASL impl. When SASL
1736is enabled, the mechanism configuration will be loaded from system default
1737SASL service config /etc/sasl2/qemu.conf. If running QEMU as an
1738unprivileged user, an environment variable SASL_CONF_PATH can be used
1739to make it search alternate locations for the service config.
1740
c6a9a9f5
DB
1741If the TLS option is enabled for VNC, then it will provide session encryption,
1742otherwise the SASL mechanism will have to provide encryption. In the latter
1743case the list of possible plugins that can be used is drastically reduced. In
1744fact only the GSSAPI SASL mechanism provides an acceptable level of security
1745by modern standards. Previous versions of QEMU referred to the DIGEST-MD5
1746mechanism, however, it has multiple serious flaws described in detail in
1747RFC 6331 and thus should never be used any more. The SCRAM-SHA-1 mechanism
1748provides a simple username/password auth facility similar to DIGEST-MD5, but
1749does not support session encryption, so can only be used in combination with
1750TLS.
1751
1752When not using TLS the recommended configuration is
2f9606b3
AL
1753
1754@example
c6a9a9f5
DB
1755mech_list: gssapi
1756keytab: /etc/qemu/krb5.tab
2f9606b3
AL
1757@end example
1758
c6a9a9f5
DB
1759This says to use the 'GSSAPI' mechanism with the Kerberos v5 protocol, with
1760the server principal stored in /etc/qemu/krb5.tab. For this to work the
1761administrator of your KDC must generate a Kerberos principal for the server,
1762with a name of 'qemu/somehost.example.com@@EXAMPLE.COM' replacing
1763'somehost.example.com' with the fully qualified host name of the machine
1764running QEMU, and 'EXAMPLE.COM' with the Kerberos Realm.
2f9606b3 1765
c6a9a9f5
DB
1766When using TLS, if username+password authentication is desired, then a
1767reasonable configuration is
2f9606b3
AL
1768
1769@example
c6a9a9f5
DB
1770mech_list: scram-sha-1
1771sasldb_path: /etc/qemu/passwd.db
2f9606b3
AL
1772@end example
1773
c6a9a9f5
DB
1774The saslpasswd2 program can be used to populate the passwd.db file with
1775accounts.
2f9606b3 1776
c6a9a9f5
DB
1777Other SASL configurations will be left as an exercise for the reader. Note that
1778all mechanisms except GSSAPI, should be combined with use of TLS to ensure a
1779secure data channel.
2f9606b3 1780
0806e3f6 1781@node gdb_usage
da415d54
FB
1782@section GDB usage
1783
1784QEMU has a primitive support to work with gdb, so that you can do
0806e3f6 1785'Ctrl-C' while the virtual machine is running and inspect its state.
da415d54 1786
b65ee4fa 1787In order to use gdb, launch QEMU with the '-s' option. It will wait for a
da415d54
FB
1788gdb connection:
1789@example
3804da9d
SW
1790qemu-system-i386 -s -kernel arch/i386/boot/bzImage -hda root-2.4.20.img \
1791 -append "root=/dev/hda"
da415d54
FB
1792Connected to host network interface: tun0
1793Waiting gdb connection on port 1234
1794@end example
1795
1796Then launch gdb on the 'vmlinux' executable:
1797@example
1798> gdb vmlinux
1799@end example
1800
1801In gdb, connect to QEMU:
1802@example
6c9bf893 1803(gdb) target remote localhost:1234
da415d54
FB
1804@end example
1805
1806Then you can use gdb normally. For example, type 'c' to launch the kernel:
1807@example
1808(gdb) c
1809@end example
1810
0806e3f6
FB
1811Here are some useful tips in order to use gdb on system code:
1812
1813@enumerate
1814@item
1815Use @code{info reg} to display all the CPU registers.
1816@item
1817Use @code{x/10i $eip} to display the code at the PC position.
1818@item
1819Use @code{set architecture i8086} to dump 16 bit code. Then use
294e8637 1820@code{x/10i $cs*16+$eip} to dump the code at the PC position.
0806e3f6
FB
1821@end enumerate
1822
60897d36
EI
1823Advanced debugging options:
1824
b6af0975 1825The default single stepping behavior is step with the IRQs and timer service routines off. It is set this way because when gdb executes a single step it expects to advance beyond the current instruction. With the IRQs and timer service routines on, a single step might jump into the one of the interrupt or exception vectors instead of executing the current instruction. This means you may hit the same breakpoint a number of times before executing the instruction gdb wants to have executed. Because there are rare circumstances where you want to single step into an interrupt vector the behavior can be controlled from GDB. There are three commands you can query and set the single step behavior:
94d45e44 1826@table @code
60897d36
EI
1827@item maintenance packet qqemu.sstepbits
1828
1829This will display the MASK bits used to control the single stepping IE:
1830@example
1831(gdb) maintenance packet qqemu.sstepbits
1832sending: "qqemu.sstepbits"
1833received: "ENABLE=1,NOIRQ=2,NOTIMER=4"
1834@end example
1835@item maintenance packet qqemu.sstep
1836
1837This will display the current value of the mask used when single stepping IE:
1838@example
1839(gdb) maintenance packet qqemu.sstep
1840sending: "qqemu.sstep"
1841received: "0x7"
1842@end example
1843@item maintenance packet Qqemu.sstep=HEX_VALUE
1844
1845This will change the single step mask, so if wanted to enable IRQs on the single step, but not timers, you would use:
1846@example
1847(gdb) maintenance packet Qqemu.sstep=0x5
1848sending: "qemu.sstep=0x5"
1849received: "OK"
1850@end example
94d45e44 1851@end table
60897d36 1852
debc7065 1853@node pcsys_os_specific
1a084f3d
FB
1854@section Target OS specific information
1855
1856@subsection Linux
1857
15a34c63
FB
1858To have access to SVGA graphic modes under X11, use the @code{vesa} or
1859the @code{cirrus} X11 driver. For optimal performances, use 16 bit
1860color depth in the guest and the host OS.
1a084f3d 1861
e3371e62
FB
1862When using a 2.6 guest Linux kernel, you should add the option
1863@code{clock=pit} on the kernel command line because the 2.6 Linux
1864kernels make very strict real time clock checks by default that QEMU
1865cannot simulate exactly.
1866
7c3fc84d
FB
1867When using a 2.6 guest Linux kernel, verify that the 4G/4G patch is
1868not activated because QEMU is slower with this patch. The QEMU
1869Accelerator Module is also much slower in this case. Earlier Fedora
4be456f1 1870Core 3 Linux kernel (< 2.6.9-1.724_FC3) were known to incorporate this
7c3fc84d
FB
1871patch by default. Newer kernels don't have it.
1872
1a084f3d
FB
1873@subsection Windows
1874
1875If you have a slow host, using Windows 95 is better as it gives the
1876best speed. Windows 2000 is also a good choice.
1877
e3371e62
FB
1878@subsubsection SVGA graphic modes support
1879
1880QEMU emulates a Cirrus Logic GD5446 Video
15a34c63
FB
1881card. All Windows versions starting from Windows 95 should recognize
1882and use this graphic card. For optimal performances, use 16 bit color
1883depth in the guest and the host OS.
1a084f3d 1884
3cb0853a
FB
1885If you are using Windows XP as guest OS and if you want to use high
1886resolution modes which the Cirrus Logic BIOS does not support (i.e. >=
18871280x1024x16), then you should use the VESA VBE virtual graphic card
1888(option @option{-std-vga}).
1889
e3371e62
FB
1890@subsubsection CPU usage reduction
1891
1892Windows 9x does not correctly use the CPU HLT
15a34c63
FB
1893instruction. The result is that it takes host CPU cycles even when
1894idle. You can install the utility from
3ba34a70
TH
1895@url{http://web.archive.org/web/20060212132151/http://www.user.cityline.ru/~maxamn/amnhltm.zip}
1896to solve this problem. Note that no such tool is needed for NT, 2000 or XP.
1a084f3d 1897
9d0a8e6f 1898@subsubsection Windows 2000 disk full problem
e3371e62 1899
9d0a8e6f
FB
1900Windows 2000 has a bug which gives a disk full problem during its
1901installation. When installing it, use the @option{-win2k-hack} QEMU
1902option to enable a specific workaround. After Windows 2000 is
1903installed, you no longer need this option (this option slows down the
1904IDE transfers).
e3371e62 1905
6cc721cf
FB
1906@subsubsection Windows 2000 shutdown
1907
1908Windows 2000 cannot automatically shutdown in QEMU although Windows 98
1909can. It comes from the fact that Windows 2000 does not automatically
1910use the APM driver provided by the BIOS.
1911
1912In order to correct that, do the following (thanks to Struan
1913Bartlett): go to the Control Panel => Add/Remove Hardware & Next =>
1914Add/Troubleshoot a device => Add a new device & Next => No, select the
1915hardware from a list & Next => NT Apm/Legacy Support & Next => Next
1916(again) a few times. Now the driver is installed and Windows 2000 now
5fafdf24 1917correctly instructs QEMU to shutdown at the appropriate moment.
6cc721cf
FB
1918
1919@subsubsection Share a directory between Unix and Windows
1920
c8c6afa8
TH
1921See @ref{sec_invocation} about the help of the option
1922@option{'-netdev user,smb=...'}.
6cc721cf 1923
2192c332 1924@subsubsection Windows XP security problem
e3371e62
FB
1925
1926Some releases of Windows XP install correctly but give a security
1927error when booting:
1928@example
1929A problem is preventing Windows from accurately checking the
1930license for this computer. Error code: 0x800703e6.
1931@end example
e3371e62 1932
2192c332
FB
1933The workaround is to install a service pack for XP after a boot in safe
1934mode. Then reboot, and the problem should go away. Since there is no
1935network while in safe mode, its recommended to download the full
1936installation of SP1 or SP2 and transfer that via an ISO or using the
1937vvfat block device ("-hdb fat:directory_which_holds_the_SP").
e3371e62 1938
a0a821a4
FB
1939@subsection MS-DOS and FreeDOS
1940
1941@subsubsection CPU usage reduction
1942
1943DOS does not correctly use the CPU HLT instruction. The result is that
3ba34a70
TH
1944it takes host CPU cycles even when idle. You can install the utility from
1945@url{http://web.archive.org/web/20051222085335/http://www.vmware.com/software/dosidle210.zip}
1946to solve this problem.
a0a821a4 1947
debc7065 1948@node QEMU System emulator for non PC targets
3f9f3aa1
FB
1949@chapter QEMU System emulator for non PC targets
1950
1951QEMU is a generic emulator and it emulates many non PC
1952machines. Most of the options are similar to the PC emulator. The
4be456f1 1953differences are mentioned in the following sections.
3f9f3aa1 1954
debc7065 1955@menu
7544a042 1956* PowerPC System emulator::
24d4de45
TS
1957* Sparc32 System emulator::
1958* Sparc64 System emulator::
1959* MIPS System emulator::
1960* ARM System emulator::
1961* ColdFire System emulator::
7544a042
SW
1962* Cris System emulator::
1963* Microblaze System emulator::
1964* SH4 System emulator::
3aeaea65 1965* Xtensa System emulator::
debc7065
FB
1966@end menu
1967
7544a042
SW
1968@node PowerPC System emulator
1969@section PowerPC System emulator
1970@cindex system emulation (PowerPC)
1a084f3d 1971
15a34c63
FB
1972Use the executable @file{qemu-system-ppc} to simulate a complete PREP
1973or PowerMac PowerPC system.
1a084f3d 1974
b671f9ed 1975QEMU emulates the following PowerMac peripherals:
1a084f3d 1976
15a34c63 1977@itemize @minus
5fafdf24 1978@item
006f3a48 1979UniNorth or Grackle PCI Bridge
15a34c63
FB
1980@item
1981PCI VGA compatible card with VESA Bochs Extensions
5fafdf24 1982@item
15a34c63 19832 PMAC IDE interfaces with hard disk and CD-ROM support
5fafdf24 1984@item
15a34c63
FB
1985NE2000 PCI adapters
1986@item
1987Non Volatile RAM
1988@item
1989VIA-CUDA with ADB keyboard and mouse.
1a084f3d
FB
1990@end itemize
1991
b671f9ed 1992QEMU emulates the following PREP peripherals:
52c00a5f
FB
1993
1994@itemize @minus
5fafdf24 1995@item
15a34c63
FB
1996PCI Bridge
1997@item
1998PCI VGA compatible card with VESA Bochs Extensions
5fafdf24 1999@item
52c00a5f
FB
20002 IDE interfaces with hard disk and CD-ROM support
2001@item
2002Floppy disk
5fafdf24 2003@item
15a34c63 2004NE2000 network adapters
52c00a5f
FB
2005@item
2006Serial port
2007@item
2008PREP Non Volatile RAM
15a34c63
FB
2009@item
2010PC compatible keyboard and mouse.
52c00a5f
FB
2011@end itemize
2012
15a34c63 2013QEMU uses the Open Hack'Ware Open Firmware Compatible BIOS available at
3f9f3aa1 2014@url{http://perso.magic.fr/l_indien/OpenHackWare/index.htm}.
52c00a5f 2015
992e5acd 2016Since version 0.9.1, QEMU uses OpenBIOS @url{http://www.openbios.org/}
006f3a48
BS
2017for the g3beige and mac99 PowerMac machines. OpenBIOS is a free (GPL
2018v2) portable firmware implementation. The goal is to implement a 100%
2019IEEE 1275-1994 (referred to as Open Firmware) compliant firmware.
992e5acd 2020
15a34c63
FB
2021@c man begin OPTIONS
2022
2023The following options are specific to the PowerPC emulation:
2024
2025@table @option
2026
4e257e5e 2027@item -g @var{W}x@var{H}[x@var{DEPTH}]
15a34c63 2028
340fb41b 2029Set the initial VGA graphic mode. The default is 800x600x32.
15a34c63 2030
4e257e5e 2031@item -prom-env @var{string}
95efd11c
BS
2032
2033Set OpenBIOS variables in NVRAM, for example:
2034
2035@example
2036qemu-system-ppc -prom-env 'auto-boot?=false' \
2037 -prom-env 'boot-device=hd:2,\yaboot' \
2038 -prom-env 'boot-args=conf=hd:2,\yaboot.conf'
2039@end example
2040
2041These variables are not used by Open Hack'Ware.
2042
15a34c63
FB
2043@end table
2044
5fafdf24 2045@c man end
15a34c63
FB
2046
2047
52c00a5f 2048More information is available at
3f9f3aa1 2049@url{http://perso.magic.fr/l_indien/qemu-ppc/}.
52c00a5f 2050
24d4de45
TS
2051@node Sparc32 System emulator
2052@section Sparc32 System emulator
7544a042 2053@cindex system emulation (Sparc32)
e80cfcfc 2054
34a3d239
BS
2055Use the executable @file{qemu-system-sparc} to simulate the following
2056Sun4m architecture machines:
2057@itemize @minus
2058@item
2059SPARCstation 4
2060@item
2061SPARCstation 5
2062@item
2063SPARCstation 10
2064@item
2065SPARCstation 20
2066@item
2067SPARCserver 600MP
2068@item
2069SPARCstation LX
2070@item
2071SPARCstation Voyager
2072@item
2073SPARCclassic
2074@item
2075SPARCbook
2076@end itemize
2077
2078The emulation is somewhat complete. SMP up to 16 CPUs is supported,
2079but Linux limits the number of usable CPUs to 4.
e80cfcfc 2080
6a4e1771 2081QEMU emulates the following sun4m peripherals:
e80cfcfc
FB
2082
2083@itemize @minus
3475187d 2084@item
6a4e1771 2085IOMMU
e80cfcfc 2086@item
33632788 2087TCX or cgthree Frame buffer
5fafdf24 2088@item
e80cfcfc
FB
2089Lance (Am7990) Ethernet
2090@item
34a3d239 2091Non Volatile RAM M48T02/M48T08
e80cfcfc 2092@item
3475187d
FB
2093Slave I/O: timers, interrupt controllers, Zilog serial ports, keyboard
2094and power/reset logic
2095@item
2096ESP SCSI controller with hard disk and CD-ROM support
2097@item
6a3b9cc9 2098Floppy drive (not on SS-600MP)
a2502b58
BS
2099@item
2100CS4231 sound device (only on SS-5, not working yet)
e80cfcfc
FB
2101@end itemize
2102
6a3b9cc9
BS
2103The number of peripherals is fixed in the architecture. Maximum
2104memory size depends on the machine type, for SS-5 it is 256MB and for
7d85892b 2105others 2047MB.
3475187d 2106
30a604f3 2107Since version 0.8.2, QEMU uses OpenBIOS
0986ac3b
FB
2108@url{http://www.openbios.org/}. OpenBIOS is a free (GPL v2) portable
2109firmware implementation. The goal is to implement a 100% IEEE
21101275-1994 (referred to as Open Firmware) compliant firmware.
3475187d
FB
2111
2112A sample Linux 2.6 series kernel and ram disk image are available on
34a3d239 2113the QEMU web site. There are still issues with NetBSD and OpenBSD, but
9bb9f217 2114most kernel versions work. Please note that currently older Solaris kernels
34a3d239
BS
2115don't work probably due to interface issues between OpenBIOS and
2116Solaris.
3475187d
FB
2117
2118@c man begin OPTIONS
2119
a2502b58 2120The following options are specific to the Sparc32 emulation:
3475187d
FB
2121
2122@table @option
2123
4e257e5e 2124@item -g @var{W}x@var{H}x[x@var{DEPTH}]
3475187d 2125
33632788
MCA
2126Set the initial graphics mode. For TCX, the default is 1024x768x8 with the
2127option of 1024x768x24. For cgthree, the default is 1024x768x8 with the option
2128of 1152x900x8 for people who wish to use OBP.
3475187d 2129
4e257e5e 2130@item -prom-env @var{string}
66508601
BS
2131
2132Set OpenBIOS variables in NVRAM, for example:
2133
2134@example
2135qemu-system-sparc -prom-env 'auto-boot?=false' \
2136 -prom-env 'boot-device=sd(0,2,0):d' -prom-env 'boot-args=linux single'
2137@end example
2138
6a4e1771 2139@item -M [SS-4|SS-5|SS-10|SS-20|SS-600MP|LX|Voyager|SPARCClassic] [|SPARCbook]
a2502b58
BS
2140
2141Set the emulated machine type. Default is SS-5.
2142
3475187d
FB
2143@end table
2144
5fafdf24 2145@c man end
3475187d 2146
24d4de45
TS
2147@node Sparc64 System emulator
2148@section Sparc64 System emulator
7544a042 2149@cindex system emulation (Sparc64)
e80cfcfc 2150
34a3d239
BS
2151Use the executable @file{qemu-system-sparc64} to simulate a Sun4u
2152(UltraSPARC PC-like machine), Sun4v (T1 PC-like machine), or generic
9bb9f217
MCA
2153Niagara (T1) machine. The Sun4u emulator is mostly complete, being
2154able to run Linux, NetBSD and OpenBSD in headless (-nographic) mode. The
a2664ca0
AT
2155Sun4v emulator is still a work in progress.
2156
2157The Niagara T1 emulator makes use of firmware and OS binaries supplied in the S10image/ directory
2158of the OpenSPARC T1 project @url{http://download.oracle.com/technetwork/systems/opensparc/OpenSPARCT1_Arch.1.5.tar.bz2}
2159and is able to boot the disk.s10hw2 Solaris image.
2160@example
2161qemu-system-sparc64 -M niagara -L /path-to/S10image/ \
2162 -nographic -m 256 \
2163 -drive if=pflash,readonly=on,file=/S10image/disk.s10hw2
2164@end example
2165
b756921a 2166
c7ba218d 2167QEMU emulates the following peripherals:
83469015
FB
2168
2169@itemize @minus
2170@item
5fafdf24 2171UltraSparc IIi APB PCI Bridge
83469015
FB
2172@item
2173PCI VGA compatible card with VESA Bochs Extensions
2174@item
34a3d239
BS
2175PS/2 mouse and keyboard
2176@item
83469015
FB
2177Non Volatile RAM M48T59
2178@item
2179PC-compatible serial ports
c7ba218d
BS
2180@item
21812 PCI IDE interfaces with hard disk and CD-ROM support
34a3d239
BS
2182@item
2183Floppy disk
83469015
FB
2184@end itemize
2185
c7ba218d
BS
2186@c man begin OPTIONS
2187
2188The following options are specific to the Sparc64 emulation:
2189
2190@table @option
2191
4e257e5e 2192@item -prom-env @var{string}
34a3d239
BS
2193
2194Set OpenBIOS variables in NVRAM, for example:
2195
2196@example
2197qemu-system-sparc64 -prom-env 'auto-boot?=false'
2198@end example
2199
a2664ca0 2200@item -M [sun4u|sun4v|niagara]
c7ba218d
BS
2201
2202Set the emulated machine type. The default is sun4u.
2203
2204@end table
2205
2206@c man end
2207
24d4de45
TS
2208@node MIPS System emulator
2209@section MIPS System emulator
7544a042 2210@cindex system emulation (MIPS)
9d0a8e6f 2211
d9aedc32
TS
2212Four executables cover simulation of 32 and 64-bit MIPS systems in
2213both endian options, @file{qemu-system-mips}, @file{qemu-system-mipsel}
2214@file{qemu-system-mips64} and @file{qemu-system-mips64el}.
88cb0a02 2215Five different machine types are emulated:
24d4de45
TS
2216
2217@itemize @minus
2218@item
2219A generic ISA PC-like machine "mips"
2220@item
2221The MIPS Malta prototype board "malta"
2222@item
d9aedc32 2223An ACER Pica "pica61". This machine needs the 64-bit emulator.
6bf5b4e8 2224@item
f0fc6f8f 2225MIPS emulator pseudo board "mipssim"
88cb0a02
AJ
2226@item
2227A MIPS Magnum R4000 machine "magnum". This machine needs the 64-bit emulator.
24d4de45
TS
2228@end itemize
2229
2230The generic emulation is supported by Debian 'Etch' and is able to
2231install Debian into a virtual disk image. The following devices are
2232emulated:
3f9f3aa1
FB
2233
2234@itemize @minus
5fafdf24 2235@item
6bf5b4e8 2236A range of MIPS CPUs, default is the 24Kf
3f9f3aa1
FB
2237@item
2238PC style serial port
2239@item
24d4de45
TS
2240PC style IDE disk
2241@item
3f9f3aa1
FB
2242NE2000 network card
2243@end itemize
2244
24d4de45
TS
2245The Malta emulation supports the following devices:
2246
2247@itemize @minus
2248@item
0b64d008 2249Core board with MIPS 24Kf CPU and Galileo system controller
24d4de45
TS
2250@item
2251PIIX4 PCI/USB/SMbus controller
2252@item
2253The Multi-I/O chip's serial device
2254@item
3a2eeac0 2255PCI network cards (PCnet32 and others)
24d4de45
TS
2256@item
2257Malta FPGA serial device
2258@item
1f605a76 2259Cirrus (default) or any other PCI VGA graphics card
24d4de45
TS
2260@end itemize
2261
2262The ACER Pica emulation supports:
2263
2264@itemize @minus
2265@item
2266MIPS R4000 CPU
2267@item
2268PC-style IRQ and DMA controllers
2269@item
2270PC Keyboard
2271@item
2272IDE controller
2273@end itemize
3f9f3aa1 2274
b5e4946f 2275The mipssim pseudo board emulation provides an environment similar
f0fc6f8f
TS
2276to what the proprietary MIPS emulator uses for running Linux.
2277It supports:
6bf5b4e8
TS
2278
2279@itemize @minus
2280@item
2281A range of MIPS CPUs, default is the 24Kf
2282@item
2283PC style serial port
2284@item
2285MIPSnet network emulation
2286@end itemize
2287
88cb0a02
AJ
2288The MIPS Magnum R4000 emulation supports:
2289
2290@itemize @minus
2291@item
2292MIPS R4000 CPU
2293@item
2294PC-style IRQ controller
2295@item
2296PC Keyboard
2297@item
2298SCSI controller
2299@item
2300G364 framebuffer
2301@end itemize
2302
2303
24d4de45
TS
2304@node ARM System emulator
2305@section ARM System emulator
7544a042 2306@cindex system emulation (ARM)
3f9f3aa1
FB
2307
2308Use the executable @file{qemu-system-arm} to simulate a ARM
2309machine. The ARM Integrator/CP board is emulated with the following
2310devices:
2311
2312@itemize @minus
2313@item
9ee6e8bb 2314ARM926E, ARM1026E, ARM946E, ARM1136 or Cortex-A8 CPU
3f9f3aa1
FB
2315@item
2316Two PL011 UARTs
5fafdf24 2317@item
3f9f3aa1 2318SMC 91c111 Ethernet adapter
00a9bf19
PB
2319@item
2320PL110 LCD controller
2321@item
2322PL050 KMI with PS/2 keyboard and mouse.
a1bb27b1
PB
2323@item
2324PL181 MultiMedia Card Interface with SD card.
00a9bf19
PB
2325@end itemize
2326
2327The ARM Versatile baseboard is emulated with the following devices:
2328
2329@itemize @minus
2330@item
9ee6e8bb 2331ARM926E, ARM1136 or Cortex-A8 CPU
00a9bf19
PB
2332@item
2333PL190 Vectored Interrupt Controller
2334@item
2335Four PL011 UARTs
5fafdf24 2336@item
00a9bf19
PB
2337SMC 91c111 Ethernet adapter
2338@item
2339PL110 LCD controller
2340@item
2341PL050 KMI with PS/2 keyboard and mouse.
2342@item
2343PCI host bridge. Note the emulated PCI bridge only provides access to
2344PCI memory space. It does not provide access to PCI IO space.
4be456f1
TS
2345This means some devices (eg. ne2k_pci NIC) are not usable, and others
2346(eg. rtl8139 NIC) are only usable when the guest drivers use the memory
00a9bf19 2347mapped control registers.
e6de1bad
PB
2348@item
2349PCI OHCI USB controller.
2350@item
2351LSI53C895A PCI SCSI Host Bus Adapter with hard disk and CD-ROM devices.
a1bb27b1
PB
2352@item
2353PL181 MultiMedia Card Interface with SD card.
3f9f3aa1
FB
2354@end itemize
2355
21a88941
PB
2356Several variants of the ARM RealView baseboard are emulated,
2357including the EB, PB-A8 and PBX-A9. Due to interactions with the
2358bootloader, only certain Linux kernel configurations work out
2359of the box on these boards.
2360
2361Kernels for the PB-A8 board should have CONFIG_REALVIEW_HIGH_PHYS_OFFSET
2362enabled in the kernel, and expect 512M RAM. Kernels for The PBX-A9 board
2363should have CONFIG_SPARSEMEM enabled, CONFIG_REALVIEW_HIGH_PHYS_OFFSET
2364disabled and expect 1024M RAM.
2365
40c5c6cd 2366The following devices are emulated:
d7739d75
PB
2367
2368@itemize @minus
2369@item
f7c70325 2370ARM926E, ARM1136, ARM11MPCore, Cortex-A8 or Cortex-A9 MPCore CPU
d7739d75
PB
2371@item
2372ARM AMBA Generic/Distributed Interrupt Controller
2373@item
2374Four PL011 UARTs
5fafdf24 2375@item
0ef849d7 2376SMC 91c111 or SMSC LAN9118 Ethernet adapter
d7739d75
PB
2377@item
2378PL110 LCD controller
2379@item
2380PL050 KMI with PS/2 keyboard and mouse
2381@item
2382PCI host bridge
2383@item
2384PCI OHCI USB controller
2385@item
2386LSI53C895A PCI SCSI Host Bus Adapter with hard disk and CD-ROM devices
a1bb27b1
PB
2387@item
2388PL181 MultiMedia Card Interface with SD card.
d7739d75
PB
2389@end itemize
2390
b00052e4
AZ
2391The XScale-based clamshell PDA models ("Spitz", "Akita", "Borzoi"
2392and "Terrier") emulation includes the following peripherals:
2393
2394@itemize @minus
2395@item
2396Intel PXA270 System-on-chip (ARM V5TE core)
2397@item
2398NAND Flash memory
2399@item
2400IBM/Hitachi DSCM microdrive in a PXA PCMCIA slot - not in "Akita"
2401@item
2402On-chip OHCI USB controller
2403@item
2404On-chip LCD controller
2405@item
2406On-chip Real Time Clock
2407@item
2408TI ADS7846 touchscreen controller on SSP bus
2409@item
2410Maxim MAX1111 analog-digital converter on I@math{^2}C bus
2411@item
2412GPIO-connected keyboard controller and LEDs
2413@item
549444e1 2414Secure Digital card connected to PXA MMC/SD host
b00052e4
AZ
2415@item
2416Three on-chip UARTs
2417@item
2418WM8750 audio CODEC on I@math{^2}C and I@math{^2}S busses
2419@end itemize
2420
02645926
AZ
2421The Palm Tungsten|E PDA (codename "Cheetah") emulation includes the
2422following elements:
2423
2424@itemize @minus
2425@item
2426Texas Instruments OMAP310 System-on-chip (ARM 925T core)
2427@item
2428ROM and RAM memories (ROM firmware image can be loaded with -option-rom)
2429@item
2430On-chip LCD controller
2431@item
2432On-chip Real Time Clock
2433@item
2434TI TSC2102i touchscreen controller / analog-digital converter / Audio
2435CODEC, connected through MicroWire and I@math{^2}S busses
2436@item
2437GPIO-connected matrix keypad
2438@item
2439Secure Digital card connected to OMAP MMC/SD host
2440@item
2441Three on-chip UARTs
2442@end itemize
2443
c30bb264
AZ
2444Nokia N800 and N810 internet tablets (known also as RX-34 and RX-44 / 48)
2445emulation supports the following elements:
2446
2447@itemize @minus
2448@item
2449Texas Instruments OMAP2420 System-on-chip (ARM 1136 core)
2450@item
2451RAM and non-volatile OneNAND Flash memories
2452@item
2453Display connected to EPSON remote framebuffer chip and OMAP on-chip
2454display controller and a LS041y3 MIPI DBI-C controller
2455@item
2456TI TSC2301 (in N800) and TI TSC2005 (in N810) touchscreen controllers
2457driven through SPI bus
2458@item
2459National Semiconductor LM8323-controlled qwerty keyboard driven
2460through I@math{^2}C bus
2461@item
2462Secure Digital card connected to OMAP MMC/SD host
2463@item
2464Three OMAP on-chip UARTs and on-chip STI debugging console
2465@item
40c5c6cd 2466A Bluetooth(R) transceiver and HCI connected to an UART
2d564691 2467@item
c30bb264
AZ
2468Mentor Graphics "Inventra" dual-role USB controller embedded in a TI
2469TUSB6010 chip - only USB host mode is supported
2470@item
2471TI TMP105 temperature sensor driven through I@math{^2}C bus
2472@item
2473TI TWL92230C power management companion with an RTC on I@math{^2}C bus
2474@item
2475Nokia RETU and TAHVO multi-purpose chips with an RTC, connected
2476through CBUS
2477@end itemize
2478
9ee6e8bb
PB
2479The Luminary Micro Stellaris LM3S811EVB emulation includes the following
2480devices:
2481
2482@itemize @minus
2483@item
2484Cortex-M3 CPU core.
2485@item
248664k Flash and 8k SRAM.
2487@item
2488Timers, UARTs, ADC and I@math{^2}C interface.
2489@item
2490OSRAM Pictiva 96x16 OLED with SSD0303 controller on I@math{^2}C bus.
2491@end itemize
2492
2493The Luminary Micro Stellaris LM3S6965EVB emulation includes the following
2494devices:
2495
2496@itemize @minus
2497@item
2498Cortex-M3 CPU core.
2499@item
2500256k Flash and 64k SRAM.
2501@item
2502Timers, UARTs, ADC, I@math{^2}C and SSI interfaces.
2503@item
2504OSRAM Pictiva 128x64 OLED with SSD0323 controller connected via SSI.
2505@end itemize
2506
57cd6e97
AZ
2507The Freecom MusicPal internet radio emulation includes the following
2508elements:
2509
2510@itemize @minus
2511@item
2512Marvell MV88W8618 ARM core.
2513@item
251432 MB RAM, 256 KB SRAM, 8 MB flash.
2515@item
2516Up to 2 16550 UARTs
2517@item
2518MV88W8xx8 Ethernet controller
2519@item
2520MV88W8618 audio controller, WM8750 CODEC and mixer
2521@item
e080e785 2522128×64 display with brightness control
57cd6e97
AZ
2523@item
25242 buttons, 2 navigation wheels with button function
2525@end itemize
2526
997641a8 2527The Siemens SX1 models v1 and v2 (default) basic emulation.
40c5c6cd 2528The emulation includes the following elements:
997641a8
AZ
2529
2530@itemize @minus
2531@item
2532Texas Instruments OMAP310 System-on-chip (ARM 925T core)
2533@item
2534ROM and RAM memories (ROM firmware image can be loaded with -pflash)
2535V1
25361 Flash of 16MB and 1 Flash of 8MB
2537V2
25381 Flash of 32MB
2539@item
2540On-chip LCD controller
2541@item
2542On-chip Real Time Clock
2543@item
2544Secure Digital card connected to OMAP MMC/SD host
2545@item
2546Three on-chip UARTs
2547@end itemize
2548
3f9f3aa1
FB
2549A Linux 2.6 test image is available on the QEMU web site. More
2550information is available in the QEMU mailing-list archive.
9d0a8e6f 2551
d2c639d6
BS
2552@c man begin OPTIONS
2553
2554The following options are specific to the ARM emulation:
2555
2556@table @option
2557
2558@item -semihosting
2559Enable semihosting syscall emulation.
2560
2561On ARM this implements the "Angel" interface.
2562
2563Note that this allows guest direct access to the host filesystem,
2564so should only be used with trusted guest OS.
2565
2566@end table
2567
24d4de45
TS
2568@node ColdFire System emulator
2569@section ColdFire System emulator
7544a042
SW
2570@cindex system emulation (ColdFire)
2571@cindex system emulation (M68K)
209a4e69
PB
2572
2573Use the executable @file{qemu-system-m68k} to simulate a ColdFire machine.
2574The emulator is able to boot a uClinux kernel.
707e011b
PB
2575
2576The M5208EVB emulation includes the following devices:
2577
2578@itemize @minus
5fafdf24 2579@item
707e011b
PB
2580MCF5208 ColdFire V2 Microprocessor (ISA A+ with EMAC).
2581@item
2582Three Two on-chip UARTs.
2583@item
2584Fast Ethernet Controller (FEC)
2585@end itemize
2586
2587The AN5206 emulation includes the following devices:
209a4e69
PB
2588
2589@itemize @minus
5fafdf24 2590@item
209a4e69
PB
2591MCF5206 ColdFire V2 Microprocessor.
2592@item
2593Two on-chip UARTs.
2594@end itemize
2595
d2c639d6
BS
2596@c man begin OPTIONS
2597
7544a042 2598The following options are specific to the ColdFire emulation:
d2c639d6
BS
2599
2600@table @option
2601
2602@item -semihosting
2603Enable semihosting syscall emulation.
2604
2605On M68K this implements the "ColdFire GDB" interface used by libgloss.
2606
2607Note that this allows guest direct access to the host filesystem,
2608so should only be used with trusted guest OS.
2609
2610@end table
2611
7544a042
SW
2612@node Cris System emulator
2613@section Cris System emulator
2614@cindex system emulation (Cris)
2615
2616TODO
2617
2618@node Microblaze System emulator
2619@section Microblaze System emulator
2620@cindex system emulation (Microblaze)
2621
2622TODO
2623
2624@node SH4 System emulator
2625@section SH4 System emulator
2626@cindex system emulation (SH4)
2627
2628TODO
2629
3aeaea65
MF
2630@node Xtensa System emulator
2631@section Xtensa System emulator
2632@cindex system emulation (Xtensa)
2633
2634Two executables cover simulation of both Xtensa endian options,
2635@file{qemu-system-xtensa} and @file{qemu-system-xtensaeb}.
2636Two different machine types are emulated:
2637
2638@itemize @minus
2639@item
2640Xtensa emulator pseudo board "sim"
2641@item
2642Avnet LX60/LX110/LX200 board
2643@end itemize
2644
b5e4946f 2645The sim pseudo board emulation provides an environment similar
3aeaea65
MF
2646to one provided by the proprietary Tensilica ISS.
2647It supports:
2648
2649@itemize @minus
2650@item
2651A range of Xtensa CPUs, default is the DC232B
2652@item
2653Console and filesystem access via semihosting calls
2654@end itemize
2655
2656The Avnet LX60/LX110/LX200 emulation supports:
2657
2658@itemize @minus
2659@item
2660A range of Xtensa CPUs, default is the DC232B
2661@item
266216550 UART
2663@item
2664OpenCores 10/100 Mbps Ethernet MAC
2665@end itemize
2666
2667@c man begin OPTIONS
2668
2669The following options are specific to the Xtensa emulation:
2670
2671@table @option
2672
2673@item -semihosting
2674Enable semihosting syscall emulation.
2675
2676Xtensa semihosting provides basic file IO calls, such as open/read/write/seek/select.
2677Tensilica baremetal libc for ISS and linux platform "sim" use this interface.
2678
2679Note that this allows guest direct access to the host filesystem,
2680so should only be used with trusted guest OS.
2681
2682@end table
3f2ce724
TH
2683
2684@node QEMU Guest Agent
2685@chapter QEMU Guest Agent invocation
2686
2687@include qemu-ga.texi
2688
5fafdf24
TS
2689@node QEMU User space emulator
2690@chapter QEMU User space emulator
83195237
FB
2691
2692@menu
2693* Supported Operating Systems ::
0722cc42 2694* Features::
83195237 2695* Linux User space emulator::
84778508 2696* BSD User space emulator ::
83195237
FB
2697@end menu
2698
2699@node Supported Operating Systems
2700@section Supported Operating Systems
2701
2702The following OS are supported in user space emulation:
2703
2704@itemize @minus
2705@item
4be456f1 2706Linux (referred as qemu-linux-user)
83195237 2707@item
84778508 2708BSD (referred as qemu-bsd-user)
83195237
FB
2709@end itemize
2710
0722cc42
PB
2711@node Features
2712@section Features
2713
2714QEMU user space emulation has the following notable features:
2715
2716@table @strong
2717@item System call translation:
2718QEMU includes a generic system call translator. This means that
2719the parameters of the system calls can be converted to fix
2720endianness and 32/64-bit mismatches between hosts and targets.
2721IOCTLs can be converted too.
2722
2723@item POSIX signal handling:
2724QEMU can redirect to the running program all signals coming from
2725the host (such as @code{SIGALRM}), as well as synthesize signals from
2726virtual CPU exceptions (for example @code{SIGFPE} when the program
2727executes a division by zero).
2728
2729QEMU relies on the host kernel to emulate most signal system
2730calls, for example to emulate the signal mask. On Linux, QEMU
2731supports both normal and real-time signals.
2732
2733@item Threading:
2734On Linux, QEMU can emulate the @code{clone} syscall and create a real
2735host thread (with a separate virtual CPU) for each emulated thread.
2736Note that not all targets currently emulate atomic operations correctly.
2737x86 and ARM use a global lock in order to preserve their semantics.
2738@end table
2739
2740QEMU was conceived so that ultimately it can emulate itself. Although
2741it is not very useful, it is an important test to show the power of the
2742emulator.
2743
83195237
FB
2744@node Linux User space emulator
2745@section Linux User space emulator
386405f7 2746
debc7065
FB
2747@menu
2748* Quick Start::
2749* Wine launch::
2750* Command line options::
79737e4a 2751* Other binaries::
debc7065
FB
2752@end menu
2753
2754@node Quick Start
83195237 2755@subsection Quick Start
df0f11a0 2756
1f673135 2757In order to launch a Linux process, QEMU needs the process executable
5fafdf24 2758itself and all the target (x86) dynamic libraries used by it.
386405f7 2759
1f673135 2760@itemize
386405f7 2761
1f673135
FB
2762@item On x86, you can just try to launch any process by using the native
2763libraries:
386405f7 2764
5fafdf24 2765@example
1f673135
FB
2766qemu-i386 -L / /bin/ls
2767@end example
386405f7 2768
1f673135
FB
2769@code{-L /} tells that the x86 dynamic linker must be searched with a
2770@file{/} prefix.
386405f7 2771
b65ee4fa
SW
2772@item Since QEMU is also a linux process, you can launch QEMU with
2773QEMU (NOTE: you can only do that if you compiled QEMU from the sources):
386405f7 2774
5fafdf24 2775@example
1f673135
FB
2776qemu-i386 -L / qemu-i386 -L / /bin/ls
2777@end example
386405f7 2778
1f673135
FB
2779@item On non x86 CPUs, you need first to download at least an x86 glibc
2780(@file{qemu-runtime-i386-XXX-.tar.gz} on the QEMU web page). Ensure that
2781@code{LD_LIBRARY_PATH} is not set:
df0f11a0 2782
1f673135 2783@example
5fafdf24 2784unset LD_LIBRARY_PATH
1f673135 2785@end example
1eb87257 2786
1f673135 2787Then you can launch the precompiled @file{ls} x86 executable:
1eb87257 2788
1f673135
FB
2789@example
2790qemu-i386 tests/i386/ls
2791@end example
4c3b5a48 2792You can look at @file{scripts/qemu-binfmt-conf.sh} so that
1f673135
FB
2793QEMU is automatically launched by the Linux kernel when you try to
2794launch x86 executables. It requires the @code{binfmt_misc} module in the
2795Linux kernel.
1eb87257 2796
1f673135
FB
2797@item The x86 version of QEMU is also included. You can try weird things such as:
2798@example
debc7065
FB
2799qemu-i386 /usr/local/qemu-i386/bin/qemu-i386 \
2800 /usr/local/qemu-i386/bin/ls-i386
1f673135 2801@end example
1eb20527 2802
1f673135 2803@end itemize
1eb20527 2804
debc7065 2805@node Wine launch
83195237 2806@subsection Wine launch
1eb20527 2807
1f673135 2808@itemize
386405f7 2809
1f673135
FB
2810@item Ensure that you have a working QEMU with the x86 glibc
2811distribution (see previous section). In order to verify it, you must be
2812able to do:
386405f7 2813
1f673135
FB
2814@example
2815qemu-i386 /usr/local/qemu-i386/bin/ls-i386
2816@end example
386405f7 2817
1f673135 2818@item Download the binary x86 Wine install
5fafdf24 2819(@file{qemu-XXX-i386-wine.tar.gz} on the QEMU web page).
386405f7 2820
1f673135 2821@item Configure Wine on your account. Look at the provided script
debc7065 2822@file{/usr/local/qemu-i386/@/bin/wine-conf.sh}. Your previous
1f673135 2823@code{$@{HOME@}/.wine} directory is saved to @code{$@{HOME@}/.wine.org}.
386405f7 2824
1f673135 2825@item Then you can try the example @file{putty.exe}:
386405f7 2826
1f673135 2827@example
debc7065
FB
2828qemu-i386 /usr/local/qemu-i386/wine/bin/wine \
2829 /usr/local/qemu-i386/wine/c/Program\ Files/putty.exe
1f673135 2830@end example
386405f7 2831
1f673135 2832@end itemize
fd429f2f 2833
debc7065 2834@node Command line options
83195237 2835@subsection Command line options
1eb20527 2836
1f673135 2837@example
8485140f 2838@command{qemu-i386} [@option{-h]} [@option{-d]} [@option{-L} @var{path}] [@option{-s} @var{size}] [@option{-cpu} @var{model}] [@option{-g} @var{port}] [@option{-B} @var{offset}] [@option{-R} @var{size}] @var{program} [@var{arguments}...]
1f673135 2839@end example
1eb20527 2840
1f673135
FB
2841@table @option
2842@item -h
2843Print the help
3b46e624 2844@item -L path
1f673135
FB
2845Set the x86 elf interpreter prefix (default=/usr/local/qemu-i386)
2846@item -s size
2847Set the x86 stack size in bytes (default=524288)
34a3d239 2848@item -cpu model
c8057f95 2849Select CPU model (-cpu help for list and additional feature selection)
f66724c9
SW
2850@item -E @var{var}=@var{value}
2851Set environment @var{var} to @var{value}.
2852@item -U @var{var}
2853Remove @var{var} from the environment.
379f6698
PB
2854@item -B offset
2855Offset guest address by the specified number of bytes. This is useful when
1f5c3f8c
SW
2856the address region required by guest applications is reserved on the host.
2857This option is currently only supported on some hosts.
68a1c816
PB
2858@item -R size
2859Pre-allocate a guest virtual address space of the given size (in bytes).
0d6753e5 2860"G", "M", and "k" suffixes may be used when specifying the size.
386405f7
FB
2861@end table
2862
1f673135 2863Debug options:
386405f7 2864
1f673135 2865@table @option
989b697d
PM
2866@item -d item1,...
2867Activate logging of the specified items (use '-d help' for a list of log items)
1f673135
FB
2868@item -p pagesize
2869Act as if the host page size was 'pagesize' bytes
34a3d239
BS
2870@item -g port
2871Wait gdb connection to port
1b530a6d
AJ
2872@item -singlestep
2873Run the emulation in single step mode.
1f673135 2874@end table
386405f7 2875
b01bcae6
AZ
2876Environment variables:
2877
2878@table @env
2879@item QEMU_STRACE
2880Print system calls and arguments similar to the 'strace' program
2881(NOTE: the actual 'strace' program will not work because the user
2882space emulator hasn't implemented ptrace). At the moment this is
2883incomplete. All system calls that don't have a specific argument
2884format are printed with information for six arguments. Many
2885flag-style arguments don't have decoders and will show up as numbers.
5cfdf930 2886@end table
b01bcae6 2887
79737e4a 2888@node Other binaries
83195237 2889@subsection Other binaries
79737e4a 2890
7544a042
SW
2891@cindex user mode (Alpha)
2892@command{qemu-alpha} TODO.
2893
2894@cindex user mode (ARM)
2895@command{qemu-armeb} TODO.
2896
2897@cindex user mode (ARM)
79737e4a
PB
2898@command{qemu-arm} is also capable of running ARM "Angel" semihosted ELF
2899binaries (as implemented by the arm-elf and arm-eabi Newlib/GDB
2900configurations), and arm-uclinux bFLT format binaries.
2901
7544a042
SW
2902@cindex user mode (ColdFire)
2903@cindex user mode (M68K)
e6e5906b
PB
2904@command{qemu-m68k} is capable of running semihosted binaries using the BDM
2905(m5xxx-ram-hosted.ld) or m68k-sim (sim.ld) syscall interfaces, and
2906coldfire uClinux bFLT format binaries.
2907
79737e4a
PB
2908The binary format is detected automatically.
2909
7544a042
SW
2910@cindex user mode (Cris)
2911@command{qemu-cris} TODO.
2912
2913@cindex user mode (i386)
2914@command{qemu-i386} TODO.
2915@command{qemu-x86_64} TODO.
2916
2917@cindex user mode (Microblaze)
2918@command{qemu-microblaze} TODO.
2919
2920@cindex user mode (MIPS)
2921@command{qemu-mips} TODO.
2922@command{qemu-mipsel} TODO.
2923
e671711c
MV
2924@cindex user mode (NiosII)
2925@command{qemu-nios2} TODO.
2926
7544a042
SW
2927@cindex user mode (PowerPC)
2928@command{qemu-ppc64abi32} TODO.
2929@command{qemu-ppc64} TODO.
2930@command{qemu-ppc} TODO.
2931
2932@cindex user mode (SH4)
2933@command{qemu-sh4eb} TODO.
2934@command{qemu-sh4} TODO.
2935
2936@cindex user mode (SPARC)
34a3d239
BS
2937@command{qemu-sparc} can execute Sparc32 binaries (Sparc32 CPU, 32 bit ABI).
2938
a785e42e
BS
2939@command{qemu-sparc32plus} can execute Sparc32 and SPARC32PLUS binaries
2940(Sparc64 CPU, 32 bit ABI).
2941
2942@command{qemu-sparc64} can execute some Sparc64 (Sparc64 CPU, 64 bit ABI) and
2943SPARC32PLUS binaries (Sparc64 CPU, 32 bit ABI).
2944
84778508
BS
2945@node BSD User space emulator
2946@section BSD User space emulator
2947
2948@menu
2949* BSD Status::
2950* BSD Quick Start::
2951* BSD Command line options::
2952@end menu
2953
2954@node BSD Status
2955@subsection BSD Status
2956
2957@itemize @minus
2958@item
2959target Sparc64 on Sparc64: Some trivial programs work.
2960@end itemize
2961
2962@node BSD Quick Start
2963@subsection Quick Start
2964
2965In order to launch a BSD process, QEMU needs the process executable
2966itself and all the target dynamic libraries used by it.
2967
2968@itemize
2969
2970@item On Sparc64, you can just try to launch any process by using the native
2971libraries:
2972
2973@example
2974qemu-sparc64 /bin/ls
2975@end example
2976
2977@end itemize
2978
2979@node BSD Command line options
2980@subsection Command line options
2981
2982@example
8485140f 2983@command{qemu-sparc64} [@option{-h]} [@option{-d]} [@option{-L} @var{path}] [@option{-s} @var{size}] [@option{-bsd} @var{type}] @var{program} [@var{arguments}...]
84778508
BS
2984@end example
2985
2986@table @option
2987@item -h
2988Print the help
2989@item -L path
2990Set the library root path (default=/)
2991@item -s size
2992Set the stack size in bytes (default=524288)
f66724c9
SW
2993@item -ignore-environment
2994Start with an empty environment. Without this option,
40c5c6cd 2995the initial environment is a copy of the caller's environment.
f66724c9
SW
2996@item -E @var{var}=@var{value}
2997Set environment @var{var} to @var{value}.
2998@item -U @var{var}
2999Remove @var{var} from the environment.
84778508
BS
3000@item -bsd type
3001Set the type of the emulated BSD Operating system. Valid values are
3002FreeBSD, NetBSD and OpenBSD (default).
3003@end table
3004
3005Debug options:
3006
3007@table @option
989b697d
PM
3008@item -d item1,...
3009Activate logging of the specified items (use '-d help' for a list of log items)
84778508
BS
3010@item -p pagesize
3011Act as if the host page size was 'pagesize' bytes
1b530a6d
AJ
3012@item -singlestep
3013Run the emulation in single step mode.
84778508
BS
3014@end table
3015
47eacb4f 3016
78e87797
PB
3017@include qemu-tech.texi
3018
7544a042
SW
3019@node License
3020@appendix License
3021
3022QEMU is a trademark of Fabrice Bellard.
3023
2f8d8f01
TH
3024QEMU is released under the
3025@url{https://www.gnu.org/licenses/gpl-2.0.txt,GNU General Public License},
3026version 2. Parts of QEMU have specific licenses, see file
3027@url{http://git.qemu.org/?p=qemu.git;a=blob_plain;f=LICENSE,LICENSE}.
7544a042 3028
debc7065 3029@node Index
7544a042
SW
3030@appendix Index
3031@menu
3032* Concept Index::
3033* Function Index::
3034* Keystroke Index::
3035* Program Index::
3036* Data Type Index::
3037* Variable Index::
3038@end menu
3039
3040@node Concept Index
3041@section Concept Index
3042This is the main index. Should we combine all keywords in one index? TODO
debc7065
FB
3043@printindex cp
3044
7544a042
SW
3045@node Function Index
3046@section Function Index
3047This index could be used for command line options and monitor functions.
3048@printindex fn
3049
3050@node Keystroke Index
3051@section Keystroke Index
3052
3053This is a list of all keystrokes which have a special function
3054in system emulation.
3055
3056@printindex ky
3057
3058@node Program Index
3059@section Program Index
3060@printindex pg
3061
3062@node Data Type Index
3063@section Data Type Index
3064
3065This index could be used for qdev device names and options.
3066
3067@printindex tp
3068
3069@node Variable Index
3070@section Variable Index
3071@printindex vr
3072
debc7065 3073@bye