![]() You can have a look at the next thread for explanations and clues and there are links you can follow Īlso download the latest virtio-drivers you need from here: … -downloads Qemu-system-x86_64 -boot order=d,menu=on,reboot-timeout=5000 -m size=4096,slots=0,maxmem=4294967296 -k en-us -name Win10_21H2_English_圆4.iso,process=Win10_21H2_English_圆4.iso_0 -device virtio-scsi-pci,id=scsi0 -device virtio-vga-gl -display sdl,gl=on -audiodev pa,id=snd0 -device ich9-intel-hda -device hda-output,audiodev=snd0 -device virtio-net-pci,romfile=,netdev=net0 -netdev user,id=net0,hostfwd=tcp::60037-:22 -machine type=q35,accel=kvm,usb=on,pcspk-audiodev=snd0 -global ICH9-LPC.disable_s3=1 -enable-kvm -device scsi-cd,bus=scsi0.0,drive=cdrom0 -drive id=cdrom0,if=none,format=raw,media=cdrom,read-only=on,file=Win10_21H2_English_圆4.iso -cpu host,hv-relaxed,hv-vapic,hv-spinlocks=0x1fff,hv-time -device qemu-xhci -device usb-tablet -drive file=virtio-win-0.1.217.iso,media=cdrom -hdd win10 -serial stdio -no-reboot If I am wrong, what (least) other parameters should I include? Or what else might cause this behavior? My understanding is that the simple boot configuration in the preceding paragraph should suffice to boot Windows 10. The ArchLinux ISO boots flawlessly in QEMU, irrespective of whether KVM is enabled. If I add `-enable-kvm` to the QEMU parameters, the boot process hangs indefinitely at the Windows logo.įor comparison, I have observed the exact same behavior (hanging/failing depending on whether KVM is enabled) with a Windows 7 ISO. Starting as simple as possible, running only `qemu-system-x86_64 -cdrom win10.iso -boot order=d -drive file=win.raw,format=raw -m 4G`, appears to boot the system until this blue screen hits. This leaves me with the following problems: I now seek to boot the official Windows 10 ISO and install the operating system inside a QEMU VM. ![]() I have installed the qemu-desktop package, and created a raw disk image via `qemu-img create -f raw win.raw 40G`. Up-to-date generic Arch install with default kernel ($ uname -a Linux hp 5.18.7-arch1-1 #1 SMP PREEMPT_DYNAMIC Sat, 20:22:01 +0000 x86_64 GNU/Linux) Vulnerability Tsx async abort: Not affected Vulnerability Spectre v2: Mitigation Enhanced IBRS, IBPB conditional, RSB filling Vulnerability Spectre v1: Mitigation usercopy/swapgs barriers and _user pointer sanitization Vulnerability Spec store bypass: Mitigation Speculative Store Bypass disabled via prctl Vulnerability Mmio stale data: Not affected Vulnerability Itlb multihit: Not affected Model name: 11th Gen Intel(R) Core(TM) i5-1135G7 2.40GHzįlags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx pdpe1gb rdtscp lm constant_tsc art arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc cpuid aperfmperf tsc_known_freq pni pclmulqdq dtes64 monitor ds_cpl vmx est tm2 ssse3 sdbg fma cx16 xtpr pdcm pcid sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand lahf_lm abm 3dnowprefetch cpuid_fault epb cat_l2 invpcid_single cdp_l2 ssbd ibrs ibpb stibp ibrs_enhanced tpr_shadow vnmi flexpriority ept vpid ept_ad fsgsbase tsc_adjust bmi1 avx2 smep bmi2 erms invpcid rdt_a avx512f avx512dq rdseed adx smap avx512ifma clflushopt clwb intel_pt avx512cd sha_ni avx512bw avx512vl xsaveopt xsavec xgetbv1 xsaves split_lock_detect dtherm ida arat pln pts hwp hwp_notify hwp_act_window hwp_epp hwp_pkg_req avx512vbmi umip pku ospke avx512_vbmi2 gfni vaes vpclmulqdq avx512_vnni avx512_bitalg avx512_vpopcntdq rdpid movdiri movdir64b fsrm avx512_vp2intersect md_clear ibt flush_l1d arch_capabilities Address sizes: 39 bits physical, 48 bits virtual
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |