2 QEMU block driver reference manual
5 @c man begin DESCRIPTION
7 @node disk_images_formats
8 @subsection Disk image file formats
10 QEMU supports many image file formats that can be used with VMs as well as with
11 any of the tools (like @code{qemu-img}). This includes the preferred formats
12 raw and qcow2 as well as formats that are supported for compatibility with
13 older QEMU versions or other hypervisors.
15 Depending on the image format, different options can be passed to
16 @code{qemu-img create} and @code{qemu-img convert} using the @code{-o} option.
17 This section describes each format and the options that are supported for it.
22 Raw disk image format. This format has the advantage of
23 being simple and easily exportable to all other emulators. If your
24 file system supports @emph{holes} (for example in ext2 or ext3 on
25 Linux or NTFS on Windows), then only the written sectors will reserve
26 space. Use @code{qemu-img info} to know the real size used by the
27 image or @code{ls -ls} on Unix/Linux.
32 Preallocation mode (allowed values: @code{off}, @code{falloc}, @code{full}).
33 @code{falloc} mode preallocates space for image by calling posix_fallocate().
34 @code{full} mode preallocates space for image by writing zeros to underlying
39 QEMU image format, the most versatile format. Use it to have smaller
40 images (useful if your filesystem does not supports holes, for example
41 on Windows), zlib based compression and support of multiple VM
47 Determines the qcow2 version to use. @code{compat=0.10} uses the
48 traditional image format that can be read by any QEMU since 0.10.
49 @code{compat=1.1} enables image format extensions that only QEMU 1.1 and
50 newer understand (this is the default). Amongst others, this includes
51 zero clusters, which allow efficient copy-on-read for sparse images.
54 File name of a base image (see @option{create} subcommand)
56 Image format of the base image
58 This option is deprecated and equivalent to @code{encrypt.format=aes}
62 If this is set to @code{luks}, it requests that the qcow2 payload (not
63 qcow2 header) be encrypted using the LUKS format. The passphrase to
64 use to unlock the LUKS key slot is given by the @code{encrypt.key-secret}
65 parameter. LUKS encryption parameters can be tuned with the other
66 @code{encrypt.*} parameters.
68 If this is set to @code{aes}, the image is encrypted with 128-bit AES-CBC.
69 The encryption key is given by the @code{encrypt.key-secret} parameter.
70 This encryption format is considered to be flawed by modern cryptography
71 standards, suffering from a number of design problems:
74 @item The AES-CBC cipher is used with predictable initialization vectors based
75 on the sector number. This makes it vulnerable to chosen plaintext attacks
76 which can reveal the existence of encrypted data.
77 @item The user passphrase is directly used as the encryption key. A poorly
78 chosen or short passphrase will compromise the security of the encryption.
79 @item In the event of the passphrase being compromised there is no way to
80 change the passphrase to protect data in any qcow images. The files must
81 be cloned, using a different encryption passphrase in the new file. The
82 original file must then be securely erased using a program like shred,
83 though even this is ineffective with many modern storage technologies.
86 The use of this is no longer supported in system emulators. Support only
87 remains in the command line utilities, for the purposes of data liberation
88 and interoperability with old versions of QEMU. The @code{luks} format
89 should be used instead.
91 @item encrypt.key-secret
93 Provides the ID of a @code{secret} object that contains the passphrase
94 (@code{encrypt.format=luks}) or encryption key (@code{encrypt.format=aes}).
96 @item encrypt.cipher-alg
98 Name of the cipher algorithm and key length. Currently defaults
99 to @code{aes-256}. Only used when @code{encrypt.format=luks}.
101 @item encrypt.cipher-mode
103 Name of the encryption mode to use. Currently defaults to @code{xts}.
104 Only used when @code{encrypt.format=luks}.
106 @item encrypt.ivgen-alg
108 Name of the initialization vector generator algorithm. Currently defaults
109 to @code{plain64}. Only used when @code{encrypt.format=luks}.
111 @item encrypt.ivgen-hash-alg
113 Name of the hash algorithm to use with the initialization vector generator
114 (if required). Defaults to @code{sha256}. Only used when @code{encrypt.format=luks}.
116 @item encrypt.hash-alg
118 Name of the hash algorithm to use for PBKDF algorithm
119 Defaults to @code{sha256}. Only used when @code{encrypt.format=luks}.
121 @item encrypt.iter-time
123 Amount of time, in milliseconds, to use for PBKDF algorithm per key slot.
124 Defaults to @code{2000}. Only used when @code{encrypt.format=luks}.
127 Changes the qcow2 cluster size (must be between 512 and 2M). Smaller cluster
128 sizes can improve the image file size whereas larger cluster sizes generally
129 provide better performance.
132 Preallocation mode (allowed values: @code{off}, @code{metadata}, @code{falloc},
133 @code{full}). An image with preallocated metadata is initially larger but can
134 improve performance when the image needs to grow. @code{falloc} and @code{full}
135 preallocations are like the same options of @code{raw} format, but sets up
139 If this option is set to @code{on}, reference count updates are postponed with
140 the goal of avoiding metadata I/O and improving performance. This is
141 particularly interesting with @option{cache=writethrough} which doesn't batch
142 metadata updates. The tradeoff is that after a host crash, the reference count
143 tables must be rebuilt, i.e. on the next open an (automatic) @code{qemu-img
144 check -r all} is required, which may take some time.
146 This option can only be enabled if @code{compat=1.1} is specified.
149 If this option is set to @code{on}, it will turn off COW of the file. It's only
150 valid on btrfs, no effect on other file systems.
152 Btrfs has low performance when hosting a VM image file, even more when the guest
153 on the VM also using btrfs as file system. Turning off COW is a way to mitigate
154 this bad performance. Generally there are two ways to turn off COW on btrfs:
155 a) Disable it by mounting with nodatacow, then all newly created files will be
156 NOCOW. b) For an empty file, add the NOCOW file attribute. That's what this option
159 Note: this option is only valid to new or empty files. If there is an existing
160 file which is COW and has data blocks already, it couldn't be changed to NOCOW
161 by setting @code{nocow=on}. One can issue @code{lsattr filename} to check if
162 the NOCOW flag is set or not (Capital 'C' is NOCOW flag).
167 Old QEMU image format with support for backing files and compact image files
168 (when your filesystem or transport medium does not support holes).
170 When converting QED images to qcow2, you might want to consider using the
171 @code{lazy_refcounts=on} option to get a more QED-like behaviour.
176 File name of a base image (see @option{create} subcommand).
178 Image file format of backing file (optional). Useful if the format cannot be
179 autodetected because it has no header, like some vhd/vpc files.
181 Changes the cluster size (must be power-of-2 between 4K and 64K). Smaller
182 cluster sizes can improve the image file size whereas larger cluster sizes
183 generally provide better performance.
185 Changes the number of clusters per L1/L2 table (must be power-of-2 between 1
186 and 16). There is normally no need to change this value but this option can be
187 used for performance benchmarking.
191 Old QEMU image format with support for backing files, compact image files,
192 encryption and compression.
197 File name of a base image (see @option{create} subcommand)
199 This option is deprecated and equivalent to @code{encrypt.format=aes}
202 If this is set to @code{aes}, the image is encrypted with 128-bit AES-CBC.
203 The encryption key is given by the @code{encrypt.key-secret} parameter.
204 This encryption format is considered to be flawed by modern cryptography
205 standards, suffering from a number of design problems enumerated previously
206 against the @code{qcow2} image format.
208 The use of this is no longer supported in system emulators. Support only
209 remains in the command line utilities, for the purposes of data liberation
210 and interoperability with old versions of QEMU.
212 Users requiring native encryption should use the @code{qcow2} format
213 instead with @code{encrypt.format=luks}.
215 @item encrypt.key-secret
217 Provides the ID of a @code{secret} object that contains the encryption
218 key (@code{encrypt.format=aes}).
224 LUKS v1 encryption format, compatible with Linux dm-crypt/cryptsetup
231 Provides the ID of a @code{secret} object that contains the passphrase.
235 Name of the cipher algorithm and key length. Currently defaults
240 Name of the encryption mode to use. Currently defaults to @code{xts}.
244 Name of the initialization vector generator algorithm. Currently defaults
249 Name of the hash algorithm to use with the initialization vector generator
250 (if required). Defaults to @code{sha256}.
254 Name of the hash algorithm to use for PBKDF algorithm
255 Defaults to @code{sha256}.
259 Amount of time, in milliseconds, to use for PBKDF algorithm per key slot.
260 Defaults to @code{2000}.
265 VirtualBox 1.1 compatible image format.
269 If this option is set to @code{on}, the image is created with metadata
274 VMware 3 and 4 compatible image format.
279 File name of a base image (see @option{create} subcommand).
281 Create a VMDK version 6 image (instead of version 4)
283 Specify vmdk virtual hardware version. Compat6 flag cannot be enabled
284 if hwversion is specified.
286 Specifies which VMDK subformat to use. Valid options are
287 @code{monolithicSparse} (default),
288 @code{monolithicFlat},
289 @code{twoGbMaxExtentSparse},
290 @code{twoGbMaxExtentFlat} and
291 @code{streamOptimized}.
295 VirtualPC compatible image format (VHD).
299 Specifies which VHD subformat to use. Valid options are
300 @code{dynamic} (default) and @code{fixed}.
304 Hyper-V compatible image format (VHDX).
308 Specifies which VHDX subformat to use. Valid options are
309 @code{dynamic} (default) and @code{fixed}.
310 @item block_state_zero
311 Force use of payload blocks of type 'ZERO'. Can be set to @code{on} (default)
312 or @code{off}. When set to @code{off}, new blocks will be created as
313 @code{PAYLOAD_BLOCK_NOT_PRESENT}, which means parsers are free to return
314 arbitrary data for those blocks. Do not set to @code{off} when using
315 @code{qemu-img convert} with @code{subformat=dynamic}.
317 Block size; min 1 MB, max 256 MB. 0 means auto-calculate based on image size.
323 @subsubsection Read-only formats
324 More disk image file formats are supported in a read-only mode.
327 Bochs images of @code{growing} type.
329 Linux Compressed Loop image, useful only to reuse directly compressed
330 CD-ROM images present for example in the Knoppix CD-ROMs.
334 Parallels disk image format.
339 @subsection Using host drives
341 In addition to disk image files, QEMU can directly access host
342 devices. We describe here the usage for QEMU version >= 0.8.3.
346 On Linux, you can directly use the host device filename instead of a
347 disk image filename provided you have enough privileges to access
348 it. For example, use @file{/dev/cdrom} to access to the CDROM.
352 You can specify a CDROM device even if no CDROM is loaded. QEMU has
353 specific code to detect CDROM insertion or removal. CDROM ejection by
354 the guest OS is supported. Currently only data CDs are supported.
356 You can specify a floppy device even if no floppy is loaded. Floppy
357 removal is currently not detected accurately (if you change floppy
358 without doing floppy access while the floppy is not loaded, the guest
359 OS will think that the same floppy is loaded).
360 Use of the host's floppy device is deprecated, and support for it will
361 be removed in a future release.
363 Hard disks can be used. Normally you must specify the whole disk
364 (@file{/dev/hdb} instead of @file{/dev/hdb1}) so that the guest OS can
365 see it as a partitioned disk. WARNING: unless you know what you do, it
366 is better to only make READ-ONLY accesses to the hard disk otherwise
367 you may corrupt your host data (use the @option{-snapshot} command
368 line option or modify the device permissions accordingly).
371 @subsubsection Windows
375 The preferred syntax is the drive letter (e.g. @file{d:}). The
376 alternate syntax @file{\\.\d:} is supported. @file{/dev/cdrom} is
377 supported as an alias to the first CDROM drive.
379 Currently there is no specific code to handle removable media, so it
380 is better to use the @code{change} or @code{eject} monitor commands to
381 change or eject media.
383 Hard disks can be used with the syntax: @file{\\.\PhysicalDrive@var{N}}
384 where @var{N} is the drive number (0 is the first hard disk).
385 @file{/dev/hda} is supported as an alias to
386 the first hard disk drive @file{\\.\PhysicalDrive0}.
388 WARNING: unless you know what you do, it is better to only make
389 READ-ONLY accesses to the hard disk otherwise you may corrupt your
390 host data (use the @option{-snapshot} command line so that the
391 modifications are written in a temporary file).
395 @subsubsection Mac OS X
397 @file{/dev/cdrom} is an alias to the first CDROM.
399 Currently there is no specific code to handle removable media, so it
400 is better to use the @code{change} or @code{eject} monitor commands to
401 change or eject media.
403 @node disk_images_fat_images
404 @subsection Virtual FAT disk images
406 QEMU can automatically create a virtual FAT disk image from a
407 directory tree. In order to use it, just type:
410 qemu-system-i386 linux.img -hdb fat:/my_directory
413 Then you access access to all the files in the @file{/my_directory}
414 directory without having to copy them in a disk image or to export
415 them via SAMBA or NFS. The default access is @emph{read-only}.
417 Floppies can be emulated with the @code{:floppy:} option:
420 qemu-system-i386 linux.img -fda fat:floppy:/my_directory
423 A read/write support is available for testing (beta stage) with the
427 qemu-system-i386 linux.img -fda fat:floppy:rw:/my_directory
430 What you should @emph{never} do:
432 @item use non-ASCII filenames ;
433 @item use "-snapshot" together with ":rw:" ;
434 @item expect it to work when loadvm'ing ;
435 @item write to the FAT directory on the host system while accessing it with the guest system.
438 @node disk_images_nbd
439 @subsection NBD access
441 QEMU can access directly to block device exported using the Network Block Device
445 qemu-system-i386 linux.img -hdb nbd://my_nbd_server.mydomain.org:1024/
448 If the NBD server is located on the same host, you can use an unix socket instead
452 qemu-system-i386 linux.img -hdb nbd+unix://?socket=/tmp/my_socket
455 In this case, the block device must be exported using qemu-nbd:
458 qemu-nbd --socket=/tmp/my_socket my_disk.qcow2
461 The use of qemu-nbd allows sharing of a disk between several guests:
463 qemu-nbd --socket=/tmp/my_socket --share=2 my_disk.qcow2
467 and then you can use it with two guests:
469 qemu-system-i386 linux1.img -hdb nbd+unix://?socket=/tmp/my_socket
470 qemu-system-i386 linux2.img -hdb nbd+unix://?socket=/tmp/my_socket
473 If the nbd-server uses named exports (supported since NBD 2.9.18, or with QEMU's
474 own embedded NBD server), you must specify an export name in the URI:
476 qemu-system-i386 -cdrom nbd://localhost/debian-500-ppc-netinst
477 qemu-system-i386 -cdrom nbd://localhost/openSUSE-11.1-ppc-netinst
480 The URI syntax for NBD is supported since QEMU 1.3. An alternative syntax is
481 also available. Here are some example of the older syntax:
483 qemu-system-i386 linux.img -hdb nbd:my_nbd_server.mydomain.org:1024
484 qemu-system-i386 linux2.img -hdb nbd:unix:/tmp/my_socket
485 qemu-system-i386 -cdrom nbd:localhost:10809:exportname=debian-500-ppc-netinst
488 @node disk_images_sheepdog
489 @subsection Sheepdog disk images
491 Sheepdog is a distributed storage system for QEMU. It provides highly
492 available block level storage volumes that can be attached to
493 QEMU-based virtual machines.
495 You can create a Sheepdog disk image with the command:
497 qemu-img create sheepdog:///@var{image} @var{size}
499 where @var{image} is the Sheepdog image name and @var{size} is its
502 To import the existing @var{filename} to Sheepdog, you can use a
505 qemu-img convert @var{filename} sheepdog:///@var{image}
508 You can boot from the Sheepdog disk image with the command:
510 qemu-system-i386 sheepdog:///@var{image}
513 You can also create a snapshot of the Sheepdog image like qcow2.
515 qemu-img snapshot -c @var{tag} sheepdog:///@var{image}
517 where @var{tag} is a tag name of the newly created snapshot.
519 To boot from the Sheepdog snapshot, specify the tag name of the
522 qemu-system-i386 sheepdog:///@var{image}#@var{tag}
525 You can create a cloned image from the existing snapshot.
527 qemu-img create -b sheepdog:///@var{base}#@var{tag} sheepdog:///@var{image}
529 where @var{base} is a image name of the source snapshot and @var{tag}
532 You can use an unix socket instead of an inet socket:
535 qemu-system-i386 sheepdog+unix:///@var{image}?socket=@var{path}
538 If the Sheepdog daemon doesn't run on the local host, you need to
539 specify one of the Sheepdog servers to connect to.
541 qemu-img create sheepdog://@var{hostname}:@var{port}/@var{image} @var{size}
542 qemu-system-i386 sheepdog://@var{hostname}:@var{port}/@var{image}
545 @node disk_images_iscsi
546 @subsection iSCSI LUNs
548 iSCSI is a popular protocol used to access SCSI devices across a computer
551 There are two different ways iSCSI devices can be used by QEMU.
553 The first method is to mount the iSCSI LUN on the host, and make it appear as
554 any other ordinary SCSI device on the host and then to access this device as a
555 /dev/sd device from QEMU. How to do this differs between host OSes.
557 The second method involves using the iSCSI initiator that is built into
558 QEMU. This provides a mechanism that works the same way regardless of which
559 host OS you are running QEMU on. This section will describe this second method
560 of using iSCSI together with QEMU.
562 In QEMU, iSCSI devices are described using special iSCSI URLs
566 iscsi://[<username>[%<password>]@@]<host>[:<port>]/<target-iqn-name>/<lun>
569 Username and password are optional and only used if your target is set up
570 using CHAP authentication for access control.
571 Alternatively the username and password can also be set via environment
572 variables to have these not show up in the process list
575 export LIBISCSI_CHAP_USERNAME=<username>
576 export LIBISCSI_CHAP_PASSWORD=<password>
577 iscsi://<host>/<target-iqn-name>/<lun>
580 Various session related parameters can be set via special options, either
581 in a configuration file provided via '-readconfig' or directly on the
584 If the initiator-name is not specified qemu will use a default name
585 of 'iqn.2008-11.org.linux-kvm[:<uuid>'] where <uuid> is the UUID of the
586 virtual machine. If the UUID is not specified qemu will use
587 'iqn.2008-11.org.linux-kvm[:<name>'] where <name> is the name of the
591 Setting a specific initiator name to use when logging in to the target
592 -iscsi initiator-name=iqn.qemu.test:my-initiator
596 Controlling which type of header digest to negotiate with the target
597 -iscsi header-digest=CRC32C|CRC32C-NONE|NONE-CRC32C|NONE
600 These can also be set via a configuration file
603 user = "CHAP username"
604 password = "CHAP password"
605 initiator-name = "iqn.qemu.test:my-initiator"
606 # header digest is one of CRC32C|CRC32C-NONE|NONE-CRC32C|NONE
607 header-digest = "CRC32C"
611 Setting the target name allows different options for different targets
613 [iscsi "iqn.target.name"]
614 user = "CHAP username"
615 password = "CHAP password"
616 initiator-name = "iqn.qemu.test:my-initiator"
617 # header digest is one of CRC32C|CRC32C-NONE|NONE-CRC32C|NONE
618 header-digest = "CRC32C"
622 Howto use a configuration file to set iSCSI configuration options:
624 cat >iscsi.conf <<EOF
627 password = "my password"
628 initiator-name = "iqn.qemu.test:my-initiator"
629 header-digest = "CRC32C"
632 qemu-system-i386 -drive file=iscsi://127.0.0.1/iqn.qemu.test/1 \
633 -readconfig iscsi.conf
637 Howto set up a simple iSCSI target on loopback and accessing it via QEMU:
639 This example shows how to set up an iSCSI target with one CDROM and one DISK
640 using the Linux STGT software target. This target is available on Red Hat based
641 systems as the package 'scsi-target-utils'.
643 tgtd --iscsi portal=127.0.0.1:3260
644 tgtadm --lld iscsi --op new --mode target --tid 1 -T iqn.qemu.test
645 tgtadm --lld iscsi --mode logicalunit --op new --tid 1 --lun 1 \
646 -b /IMAGES/disk.img --device-type=disk
647 tgtadm --lld iscsi --mode logicalunit --op new --tid 1 --lun 2 \
648 -b /IMAGES/cd.iso --device-type=cd
649 tgtadm --lld iscsi --op bind --mode target --tid 1 -I ALL
651 qemu-system-i386 -iscsi initiator-name=iqn.qemu.test:my-initiator \
652 -boot d -drive file=iscsi://127.0.0.1/iqn.qemu.test/1 \
653 -cdrom iscsi://127.0.0.1/iqn.qemu.test/2
656 @node disk_images_gluster
657 @subsection GlusterFS disk images
659 GlusterFS is a user space distributed file system.
661 You can boot from the GlusterFS disk image with the command:
664 qemu-system-x86_64 -drive file=gluster[+@var{type}]://[@var{host}[:@var{port}]]/@var{volume}/@var{path}
665 [?socket=...][,file.debug=9][,file.logfile=...]
668 qemu-system-x86_64 'json:@{"driver":"qcow2",
669 "file":@{"driver":"gluster",
670 "volume":"testvol","path":"a.img","debug":9,"logfile":"...",
671 "server":[@{"type":"tcp","host":"...","port":"..."@},
672 @{"type":"unix","socket":"..."@}]@}@}'
675 @var{gluster} is the protocol.
677 @var{type} specifies the transport type used to connect to gluster
678 management daemon (glusterd). Valid transport types are
679 tcp and unix. In the URI form, if a transport type isn't specified,
680 then tcp type is assumed.
682 @var{host} specifies the server where the volume file specification for
683 the given volume resides. This can be either a hostname or an ipv4 address.
684 If transport type is unix, then @var{host} field should not be specified.
685 Instead @var{socket} field needs to be populated with the path to unix domain
688 @var{port} is the port number on which glusterd is listening. This is optional
689 and if not specified, it defaults to port 24007. If the transport type is unix,
690 then @var{port} should not be specified.
692 @var{volume} is the name of the gluster volume which contains the disk image.
694 @var{path} is the path to the actual disk image that resides on gluster volume.
696 @var{debug} is the logging level of the gluster protocol driver. Debug levels
697 are 0-9, with 9 being the most verbose, and 0 representing no debugging output.
698 The default level is 4. The current logging levels defined in the gluster source
699 are 0 - None, 1 - Emergency, 2 - Alert, 3 - Critical, 4 - Error, 5 - Warning,
700 6 - Notice, 7 - Info, 8 - Debug, 9 - Trace
702 @var{logfile} is a commandline option to mention log file path which helps in
703 logging to the specified file and also help in persisting the gfapi logs. The
709 You can create a GlusterFS disk image with the command:
711 qemu-img create gluster://@var{host}/@var{volume}/@var{path} @var{size}
716 qemu-system-x86_64 -drive file=gluster://1.2.3.4/testvol/a.img
717 qemu-system-x86_64 -drive file=gluster+tcp://1.2.3.4/testvol/a.img
718 qemu-system-x86_64 -drive file=gluster+tcp://1.2.3.4:24007/testvol/dir/a.img
719 qemu-system-x86_64 -drive file=gluster+tcp://[1:2:3:4:5:6:7:8]/testvol/dir/a.img
720 qemu-system-x86_64 -drive file=gluster+tcp://[1:2:3:4:5:6:7:8]:24007/testvol/dir/a.img
721 qemu-system-x86_64 -drive file=gluster+tcp://server.domain.com:24007/testvol/dir/a.img
722 qemu-system-x86_64 -drive file=gluster+unix:///testvol/dir/a.img?socket=/tmp/glusterd.socket
723 qemu-system-x86_64 -drive file=gluster+rdma://1.2.3.4:24007/testvol/a.img
724 qemu-system-x86_64 -drive file=gluster://1.2.3.4/testvol/a.img,file.debug=9,file.logfile=/var/log/qemu-gluster.log
725 qemu-system-x86_64 'json:@{"driver":"qcow2",
726 "file":@{"driver":"gluster",
727 "volume":"testvol","path":"a.img",
728 "debug":9,"logfile":"/var/log/qemu-gluster.log",
729 "server":[@{"type":"tcp","host":"1.2.3.4","port":24007@},
730 @{"type":"unix","socket":"/var/run/glusterd.socket"@}]@}@}'
731 qemu-system-x86_64 -drive driver=qcow2,file.driver=gluster,file.volume=testvol,file.path=/path/a.img,
732 file.debug=9,file.logfile=/var/log/qemu-gluster.log,
733 file.server.0.type=tcp,file.server.0.host=1.2.3.4,file.server.0.port=24007,
734 file.server.1.type=unix,file.server.1.socket=/var/run/glusterd.socket
737 @node disk_images_ssh
738 @subsection Secure Shell (ssh) disk images
740 You can access disk images located on a remote ssh server
741 by using the ssh protocol:
744 qemu-system-x86_64 -drive file=ssh://[@var{user}@@]@var{server}[:@var{port}]/@var{path}[?host_key_check=@var{host_key_check}]
747 Alternative syntax using properties:
750 qemu-system-x86_64 -drive file.driver=ssh[,file.user=@var{user}],file.host=@var{server}[,file.port=@var{port}],file.path=@var{path}[,file.host_key_check=@var{host_key_check}]
753 @var{ssh} is the protocol.
755 @var{user} is the remote user. If not specified, then the local
758 @var{server} specifies the remote ssh server. Any ssh server can be
759 used, but it must implement the sftp-server protocol. Most Unix/Linux
760 systems should work without requiring any extra configuration.
762 @var{port} is the port number on which sshd is listening. By default
763 the standard ssh port (22) is used.
765 @var{path} is the path to the disk image.
767 The optional @var{host_key_check} parameter controls how the remote
768 host's key is checked. The default is @code{yes} which means to use
769 the local @file{.ssh/known_hosts} file. Setting this to @code{no}
770 turns off known-hosts checking. Or you can check that the host key
771 matches a specific fingerprint:
772 @code{host_key_check=md5:78:45:8e:14:57:4f:d5:45:83:0a:0e:f3:49:82:c9:c8}
773 (@code{sha1:} can also be used as a prefix, but note that OpenSSH
774 tools only use MD5 to print fingerprints).
776 Currently authentication must be done using ssh-agent. Other
777 authentication methods may be supported in future.
779 Note: Many ssh servers do not support an @code{fsync}-style operation.
780 The ssh driver cannot guarantee that disk flush requests are
781 obeyed, and this causes a risk of disk corruption if the remote
782 server or network goes down during writes. The driver will
783 print a warning when @code{fsync} is not supported:
785 warning: ssh server @code{ssh.example.com:22} does not support fsync
787 With sufficiently new versions of libssh2 and OpenSSH, @code{fsync} is
794 @setfilename qemu-block-drivers
795 @settitle QEMU block drivers reference
798 The HTML documentation of QEMU for more precise information and Linux
799 user mode emulator invocation.
803 Fabrice Bellard and the QEMU Project developers