Provided by: guestfs-tools_1.50.1-4ubuntu1_amd64
NAME
virt-drivers - Detect bootloader, kernel and drivers inside guest
SYNOPSIS
virt-drivers [--options] -d domname virt-drivers [--options] -a disk.img
DESCRIPTION
This tool can detect the bootloader, kernel and drivers inside some guests from only the disk image. It can detect, for example, whether a disk image needs BIOS or UEFI to boot, and whether it supports virtio or requires slower emulated devices. Notes Normally you should distribute hypervisor metadata (eg. libvirt XML or OVF) alongside disk images to tell the hypervisor how to boot them. This tool is used when this metadata has not been provided. Work with the supplier of the disk image to get them to provide proper metadata.
XML FORMAT
The output is an XML document. At the top level it lists the operating systems found (the same as virt-inspector(1)): <operatingsystems> <operatingsystem> <root>/dev/sda2</root> <name>linux</name> <arch>x86_64</arch> <distro>fedora</distro> ... </operatingsystem> <operatingsystem> <root>/dev/sdb1</root> ... </operatingsystem> </operatingsystems> <firmware> The <firmware> element lists the firmware which is required to boot the guest. For UEFI it will additionally show the EFI system partition ("ESP"). Guests may support multiple boot firmwares. For example this guest is detected as using UEFI boot, and the UEFI ESP is the first partition of the first disk: <operatingsystems> <firmware type='uefi'>/dev/sda1</firmware> <operatingsystem> ... <bootloader> and <kernel> The <bootloader> element shows the bootloader found in the Linux guest. If known, this may contain information about what Linux kernels are provided. For example: <operatingsystems> <firmware type='bios'/> <operatingsystem> <root>/dev/sda2</root> <name>linux</name> ... <bootloader type='grub2' config='/boot/grub2/grub.cfg'> <kernel> <name>kernel</name> <version>6.1.0-0.rc6.46.fc38.x86_64</version> <vmlinuz>/boot/vmlinuz-6.1.0-0.rc6.46.fc38.x86_64</vmlinuz> <modules> ... </modules> <supports_virtio_blk/> <supports_virtio_net/> ... </kernel> </bootloader> Many more fields are usually available for Linux guests, including a complete list of kernel modules and information about support for virtio. For a complete example see: https://github.com/rwmjones/guestfs-tools/tree/master/drivers <drivers> The <drivers> element lists information about drivers found in Windows guests: <operatingsystems> <firmware type='bios'/> <operatingsystem> <root>/dev/sda2</root> <name>windows</name> ... <drivers> <driver> <name>scsidev</name> <pci vendor='1077' device='1216' subsystem='8471101E'/> <pci vendor='1077' device='1216' subsystem='8493101E'/> </driver> ... </drivers> The driver name (eg. "scsidev") corresponds to the Windows driver .INF file (eg. scsidev.inf). The list of PCI, USB etc devices are the matching devices which would cause this driver to load at boot.
OPTIONS
--help Display help. -a file --add file Add file which should be a disk image from a virtual machine. The format of the disk image is auto-detected. To override this and force a particular format use the --format option. -a URI --add URI Add a remote disk. The URI format is compatible with guestfish. See "ADDING REMOTE STORAGE" in guestfish(1). --blocksize 512 --blocksize 4096 This parameter sets the sector size of the disk image added with -a option and is ignored for libvirt guest added with -d option. See also "guestfs_add_drive_opts" in guestfs(3). --colors --colours Use ANSI colour sequences to colourize messages. This is the default when the output is a tty. If the output of the program is redirected to a file, ANSI colour sequences are disabled unless you use this option. -c URI --connect URI If using libvirt, connect to the given URI. If omitted, then we connect to the default libvirt hypervisor. If you specify guest block devices directly (-a), then libvirt is not used at all. -d guest --domain guest Add all the disks from the named libvirt guest. Domain UUIDs can be used instead of names. --echo-keys When prompting for keys and passphrases, virt-get-kernel normally turns echoing off so you cannot see what you are typing. If you are not worried about Tempest attacks and there is no one else in the room you can specify this flag to see what you are typing. --format raw|qcow2|.. --format auto The default for the -a option is to auto-detect the format of the disk image. Using this forces the disk format for the -a option on the command line. If you have untrusted raw-format guest disk images, you should use this option to specify the disk format. This avoids a possible security problem with malicious guests (CVE-2010-3851). --key SELECTOR Specify a key for LUKS, to automatically open a LUKS device when using the inspection. "ID" can be either the libguestfs device name, or the UUID of the LUKS device. --key "ID":key:KEY_STRING Use the specified "KEY_STRING" as passphrase. --key "ID":file:FILENAME Read the passphrase from FILENAME. --key "ID":clevis Attempt passphrase-less unlocking for "ID" with Clevis, over the network. Please refer to "ENCRYPTED DISKS" in guestfs(3) for more information on network-bound disk encryption (NBDE). Note that if any such option is present on the command line, QEMU user networking will be automatically enabled for the libguestfs appliance. --keys-from-stdin Read key or passphrase parameters from stdin. The default is to try to read passphrases from the user by opening /dev/tty. If there are multiple encrypted devices then you may need to supply multiple keys on stdin, one per line. -q --quiet Don’t print ordinary progress messages. -v --verbose Enable verbose messages for debugging. -V --version Display version number and exit. --wrap Wrap error, warning, and informative messages. This is the default when the output is a tty. If the output of the program is redirected to a file, wrapping is disabled unless you use this option. -x Enable tracing of libguestfs API calls.
ENVIRONMENT VARIABLES
For other environment variables which affect all libguestfs programs, see "ENVIRONMENT VARIABLES" in guestfs(3).
EXIT STATUS
This program returns 0 if successful, or non-zero if there was an error.
SEE ALSO
guestfs(3), guestfish(1), guestmount(1), virt-get-kernel(1), virt-inspector(1), virt-v2v(1), http://libguestfs.org/.
AUTHOR
Richard W.M. Jones http://people.redhat.com/~rjones/
COPYRIGHT
Copyright (C) 2009-2023 Red Hat Inc.
LICENSE
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
BUGS
To get a list of bugs against libguestfs, use this link: https://bugzilla.redhat.com/buglist.cgi?component=libguestfs&product=Virtualization+Tools To report a new bug against libguestfs, use this link: https://bugzilla.redhat.com/enter_bug.cgi?component=libguestfs&product=Virtualization+Tools When reporting a bug, please supply: • The version of libguestfs. • Where you got libguestfs (eg. which Linux distro, compiled from source, etc) • Describe the bug accurately and give a way to reproduce it. • Run libguestfs-test-tool(1) and paste the complete, unedited output into the bug report.