Manpages

NAME

virt-drivers - Detect bootloader, kernel and drivers inside guest

SYNOPSIS

virt-drivers [--options] -d domname
virt-drivers [--options] -a disk.img

DESCRIPTION

This tool can detect the bootloader, kernel and drivers inside some guests from only the disk image. It can detect, for example, whether a disk image needs BIOS or UEFI to boot, and whether it supports virtio or requires slower emulated devices.

Notes
Normally you should distribute hypervisor metadata (eg. libvirt XML or OVF) alongside disk images to tell the hypervisor how to boot them. This tool is used when this metadata has not been provided. Work with the supplier of the disk image to get them to provide proper metadata.

XML FORMAT

The output is an XML document. At the top level it lists the operating systems found (the same as virt-inspector(1)):

<operatingsystems>
<operatingsystem>
<root>/dev/sda2</root>
<name>linux</name>
<arch>x86_64</arch>
<distro>fedora</distro>
...
</operatingsystem>
<operatingsystem>
<root>/dev/sdb1</root>
...
</operatingsystem>
</operatingsystems>

<firmware>
The <firmware> element lists the firmware which is required to boot the guest. For UEFI it will additionally show the EFI system partition ("ESP"). Guests may support multiple boot firmwares. For example this guest is detected as using UEFI boot, and the UEFI ESP is the first partition of the first disk:

<operatingsystems>
<firmware type='uefi'>/dev/sda1</firmware>
<operatingsystem>
...

<bootloader> and <kernel>
The <bootloader> element shows the bootloader found in the Linux guest. If known, this may contain information about what Linux kernels are provided. For example:

<operatingsystems>
<firmware type='bios'/>
<operatingsystem>
<root>/dev/sda2</root>
<name>linux</name>
...
<bootloader type='grub2' config='/boot/grub2/grub.cfg'>
<kernel>
<name>kernel</name>
<version>6.1.0-0.rc6.46.fc38.x86_64</version>
<vmlinuz>/boot/vmlinuz-6.1.0-0.rc6.46.fc38.x86_64</vmlinuz>
<modules>
...
</modules>
<supports_virtio_blk/>
<supports_virtio_net/>
...
</kernel>
</bootloader>

Many more fields are usually available for Linux guests, including a complete list of kernel modules and information about support for virtio. For a complete example see: https://github.com/rwmjones/guestfs-tools/tree/master/drivers

<drivers>
The <drivers> element lists information about drivers found in Windows guests:

<operatingsystems>
<firmware type='bios'/>
<operatingsystem>
<root>/dev/sda2</root>
<name>windows</name>
...
<drivers>
<driver>
<name>scsidev</name>
<pci vendor='1077' device='1216' subsystem='8471101E'/>
<pci vendor='1077' device='1216' subsystem='8493101E'/>
</driver>
...
</drivers>

The driver name (eg. "scsidev") corresponds to the Windows driver .INF file (eg. scsidev.inf). The list of PCI, USB etc devices are the matching devices which would cause this driver to load at boot.

OPTIONS

--help

Display help.

-a file
--add
file

Add file which should be a disk image from a virtual machine.

The format of the disk image is auto-detected. To override this and force a particular format use the --format option.

-a URI
--add
URI

Add a remote disk. The URI format is compatible with guestfish. See "ADDING REMOTE STORAGE" in guestfish(1).

--blocksize 512
--blocksize 4096

This parameter sets the sector size of the disk image added with -a option and is ignored for libvirt guest added with -d option. See also "guestfs_add_drive_opts" in guestfs(3).

--colors
--colours

Use ANSI colour sequences to colourize messages. This is the default when the output is a tty. If the output of the program is redirected to a file, ANSI colour sequences are disabled unless you use this option.

-c URI
--connect
URI

If using libvirt, connect to the given URI. If omitted, then we connect to the default libvirt hypervisor.

If you specify guest block devices directly (-a), then libvirt is not used at all.

-d guest
--domain
guest

Add all the disks from the named libvirt guest. Domain UUIDs can be used instead of names.

--echo-keys

When prompting for keys and passphrases, virt-get-kernel normally turns echoing off so you cannot see what you are typing. If you are not worried about Tempest attacks and there is no one else in the room you can specify this flag to see what you are typing.

--format raw|qcow2|..
--format
auto

The default for the -a option is to auto-detect the format of the disk image. Using this forces the disk format for the -a option on the command line.

If you have untrusted raw-format guest disk images, you should use this option to specify the disk format. This avoids a possible security problem with malicious guests (CVE-2010-3851).

--key SELECTOR

Specify a key for LUKS, to automatically open a LUKS device when using the inspection.
--key
NAME:key:KEY_STRING
--key
UUID:key:KEY_STRING
--key all:key:
KEY_STRING

"NAME" is the libguestfs device name (eg. "/dev/sda1"). "UUID" is the device UUID. "all" means try the key against any encrypted device.

Use the specified "KEY_STRING" as passphrase.

--key NAME:file:FILENAME
--key
UUID:file:FILENAME
--key all:file:
FILENAME

Read the passphrase from FILENAME.

--key NAME:clevis
--key
UUID:clevis
--key all:clevis

Attempt passphrase-less unlocking for the device with Clevis, over the network. Please refer to "ENCRYPTED DISKS" in guestfs(3) for more information on network-bound disk encryption (NBDE).

Note that if any such option is present on the command line, QEMU user networking will be automatically enabled for the libguestfs appliance.

--keys-from-stdin

Read key or passphrase parameters from stdin. The default is to try to read passphrases from the user by opening /dev/tty.

If there are multiple encrypted devices then you may need to supply multiple keys on stdin, one per line.

-q

--quiet

Don’t print ordinary progress messages.

-v

--verbose

Enable verbose messages for debugging.

-V

--version

Display version number and exit.

--wrap

Wrap error, warning, and informative messages. This is the default when the output is a tty. If the output of the program is redirected to a file, wrapping is disabled unless you use this option.

-x

Enable tracing of libguestfs API calls.

ENVIRONMENT VARIABLES

For other environment variables which affect all libguestfs programs, see "ENVIRONMENT VARIABLES" in guestfs(3).

EXIT STATUS

This program returns 0 if successful, or non-zero if there was an error.

SEE ALSO

guestfs(3), guestfish(1), guestmount(1), virt-get-kernel(1), virt-inspector(1), virt-v2v(1), http://libguestfs.org/.

AUTHOR

Richard W.M. Jones http://people.redhat.com/~rjones/

COPYRIGHT

Copyright (C) 2009-2023 Red Hat Inc.

LICENSE

This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.

BUGS

To get a list of bugs against libguestfs, use this link: https://bugzilla.redhat.com/buglist.cgi?component=libguestfs&product=Virtualization+Tools

To report a new bug against libguestfs, use this link: https://bugzilla.redhat.com/enter_bug.cgi?component=libguestfs&product=Virtualization+Tools

When reporting a bug, please supply:

The version of libguestfs.

Where you got libguestfs (eg. which Linux distro, compiled from source, etc)

Describe the bug accurately and give a way to reproduce it.

Run libguestfs-test-tool(1) and paste the complete, unedited output into the bug report.