Hello Proxmox Users,
The Issue:
Proxmox (pve-qemu) currently only enables x86, x86_64 and ARM64 architectures when Qemu supports many more.
History:
I've seen old posts about using ARM and MIPs with Proxmox without much done to really address these missing features other than adding ARM to pve-qemu build script as a --target-list configure flag.
Posts on the topic of non-x86 Proxmox (2016-2017):
- https://forum.proxmox.com/threads/emulating-non-x86-machine-types.35801/
- https://pve.proxmox.com/pipermail/pve-user/2016-October/167497.html
- https://www.nicksherlock.com/2017/08/emulating-mips-guests-in-proxmox/
The Question:
If Qemu supports all of these architectures, why not enable them all?
The Solution:
To make development and testing a easier for these features, I created a build of pve-qemu from (git://git.proxmox.com/git/pve-qemu) with all CPUs supported by Qemu enabled.
The build comes with pve-qemu in both development and release DEB packages.
The modified build is called pve-qemu-unlocked as all CPU architectures are enabled that Qemu really supports and not just x86 based ones.
To test on Proxmox do the following:
wget https://github.com/lillypad/pve-qem...1.1-3_amd64/pve-qemu-kvm_4.1.1-3_amd64.tar.gz
tar -xzvf pve-qemu-kvm_4.1.1-3_amd64.tar.gz
cd pve-qemu-kvm_4.1.1-3_amd64/
sudo dpkg -i pve-qemu-kvm_4.1.1-3_amd64.deb
Source Code and Builds:
- https://github.com/lillypad/pve-qemu-unlocked
If you wish to build from source, simply run make and Docker will do everything else for you.
Future Goals:
- Make new architectures easy to test and implement for developers with pre-compiled pve-qemu binaries
- Modify UI to enable features needed for all Qemu supported architectures
- Implement CI for regular build snapshots
Support:
If you decide to test this and encounter any issues, please let me know the errors you have so I can incorporate fixes to this modified build.
Why?: I do malware analysis / reverse engineering and couldn't bare waiting for these features implemented on a decent virtualization server. Malware like Mirai needs to be analyzed at and this would make my life a little easier.
The Issue:
Proxmox (pve-qemu) currently only enables x86, x86_64 and ARM64 architectures when Qemu supports many more.
History:
I've seen old posts about using ARM and MIPs with Proxmox without much done to really address these missing features other than adding ARM to pve-qemu build script as a --target-list configure flag.
Posts on the topic of non-x86 Proxmox (2016-2017):
- https://forum.proxmox.com/threads/emulating-non-x86-machine-types.35801/
- https://pve.proxmox.com/pipermail/pve-user/2016-October/167497.html
- https://www.nicksherlock.com/2017/08/emulating-mips-guests-in-proxmox/
The Question:
If Qemu supports all of these architectures, why not enable them all?
The Solution:
To make development and testing a easier for these features, I created a build of pve-qemu from (git://git.proxmox.com/git/pve-qemu) with all CPUs supported by Qemu enabled.
The build comes with pve-qemu in both development and release DEB packages.
The modified build is called pve-qemu-unlocked as all CPU architectures are enabled that Qemu really supports and not just x86 based ones.
To test on Proxmox do the following:
wget https://github.com/lillypad/pve-qem...1.1-3_amd64/pve-qemu-kvm_4.1.1-3_amd64.tar.gz
tar -xzvf pve-qemu-kvm_4.1.1-3_amd64.tar.gz
cd pve-qemu-kvm_4.1.1-3_amd64/
sudo dpkg -i pve-qemu-kvm_4.1.1-3_amd64.deb
Source Code and Builds:
- https://github.com/lillypad/pve-qemu-unlocked
If you wish to build from source, simply run make and Docker will do everything else for you.
Future Goals:
- Make new architectures easy to test and implement for developers with pre-compiled pve-qemu binaries
- Modify UI to enable features needed for all Qemu supported architectures
- Implement CI for regular build snapshots
Support:
If you decide to test this and encounter any issues, please let me know the errors you have so I can incorporate fixes to this modified build.
Why?: I do malware analysis / reverse engineering and couldn't bare waiting for these features implemented on a decent virtualization server. Malware like Mirai needs to be analyzed at and this would make my life a little easier.