aboutsummaryrefslogtreecommitdiff
path: root/infra/libkookie/nixpkgs/nixos/modules/virtualisation/qemu-vm.nix
diff options
context:
space:
mode:
authorMx Kookie <kookie@spacekookie.de>2020-10-31 19:35:09 +0100
committerMx Kookie <kookie@spacekookie.de>2020-10-31 19:35:09 +0100
commitc4625b175f8200f643fd6e11010932ea44c78433 (patch)
treebce3f89888c8ac3991fa5569a878a9eab6801ccc /infra/libkookie/nixpkgs/nixos/modules/virtualisation/qemu-vm.nix
parent49f735974dd103039ddc4cb576bb76555164a9e7 (diff)
parentd661aa56a8843e991261510c1bb28fdc2f6975ae (diff)
Add 'infra/libkookie/' from commit 'd661aa56a8843e991261510c1bb28fdc2f6975ae'
git-subtree-dir: infra/libkookie git-subtree-mainline: 49f735974dd103039ddc4cb576bb76555164a9e7 git-subtree-split: d661aa56a8843e991261510c1bb28fdc2f6975ae
Diffstat (limited to 'infra/libkookie/nixpkgs/nixos/modules/virtualisation/qemu-vm.nix')
-rw-r--r--infra/libkookie/nixpkgs/nixos/modules/virtualisation/qemu-vm.nix751
1 files changed, 751 insertions, 0 deletions
diff --git a/infra/libkookie/nixpkgs/nixos/modules/virtualisation/qemu-vm.nix b/infra/libkookie/nixpkgs/nixos/modules/virtualisation/qemu-vm.nix
new file mode 100644
index 000000000000..42e43f5ee023
--- /dev/null
+++ b/infra/libkookie/nixpkgs/nixos/modules/virtualisation/qemu-vm.nix
@@ -0,0 +1,751 @@
+# This module creates a virtual machine from the NixOS configuration.
+# Building the `config.system.build.vm' attribute gives you a command
+# that starts a KVM/QEMU VM running the NixOS configuration defined in
+# `config'. The Nix store is shared read-only with the host, which
+# makes (re)building VMs very efficient. However, it also means you
+# can't reconfigure the guest inside the guest - you need to rebuild
+# the VM in the host. On the other hand, the root filesystem is a
+# read/writable disk image persistent across VM reboots.
+
+{ config, lib, pkgs, ... }:
+
+with lib;
+with import ../../lib/qemu-flags.nix { inherit pkgs; };
+
+let
+
+ qemu = config.system.build.qemu or pkgs.qemu_test;
+
+ cfg = config.virtualisation;
+
+ consoles = lib.concatMapStringsSep " " (c: "console=${c}") cfg.qemu.consoles;
+
+ driveOpts = { ... }: {
+
+ options = {
+
+ file = mkOption {
+ type = types.str;
+ description = "The file image used for this drive.";
+ };
+
+ driveExtraOpts = mkOption {
+ type = types.attrsOf types.str;
+ default = {};
+ description = "Extra options passed to drive flag.";
+ };
+
+ deviceExtraOpts = mkOption {
+ type = types.attrsOf types.str;
+ default = {};
+ description = "Extra options passed to device flag.";
+ };
+
+ name = mkOption {
+ type = types.nullOr types.str;
+ default = null;
+ description =
+ "A name for the drive. Must be unique in the drives list. Not passed to qemu.";
+ };
+
+ };
+
+ };
+
+ driveCmdline = idx: { file, driveExtraOpts, deviceExtraOpts, ... }:
+ let
+ drvId = "drive${toString idx}";
+ mkKeyValue = generators.mkKeyValueDefault {} "=";
+ mkOpts = opts: concatStringsSep "," (mapAttrsToList mkKeyValue opts);
+ driveOpts = mkOpts (driveExtraOpts // {
+ index = idx;
+ id = drvId;
+ "if" = "none";
+ inherit file;
+ });
+ deviceOpts = mkOpts (deviceExtraOpts // {
+ drive = drvId;
+ });
+ device =
+ if cfg.qemu.diskInterface == "scsi" then
+ "-device lsi53c895a -device scsi-hd,${deviceOpts}"
+ else
+ "-device virtio-blk-pci,${deviceOpts}";
+ in
+ "-drive ${driveOpts} ${device}";
+
+ drivesCmdLine = drives: concatStringsSep " " (imap1 driveCmdline drives);
+
+
+ # Creates a device name from a 1-based a numerical index, e.g.
+ # * `driveDeviceName 1` -> `/dev/vda`
+ # * `driveDeviceName 2` -> `/dev/vdb`
+ driveDeviceName = idx:
+ let letter = elemAt lowerChars (idx - 1);
+ in if cfg.qemu.diskInterface == "scsi" then
+ "/dev/sd${letter}"
+ else
+ "/dev/vd${letter}";
+
+ lookupDriveDeviceName = driveName: driveList:
+ (findSingle (drive: drive.name == driveName)
+ (throw "Drive ${driveName} not found")
+ (throw "Multiple drives named ${driveName}") driveList).device;
+
+ addDeviceNames =
+ imap1 (idx: drive: drive // { device = driveDeviceName idx; });
+
+ efiPrefix =
+ if (pkgs.stdenv.isi686 || pkgs.stdenv.isx86_64) then "${pkgs.OVMF.fd}/FV/OVMF"
+ else if pkgs.stdenv.isAarch64 then "${pkgs.OVMF.fd}/FV/AAVMF"
+ else throw "No EFI firmware available for platform";
+ efiFirmware = "${efiPrefix}_CODE.fd";
+ efiVarsDefault = "${efiPrefix}_VARS.fd";
+
+ # Shell script to start the VM.
+ startVM =
+ ''
+ #! ${pkgs.runtimeShell}
+
+ NIX_DISK_IMAGE=$(readlink -f ''${NIX_DISK_IMAGE:-${config.virtualisation.diskImage}})
+
+ if ! test -e "$NIX_DISK_IMAGE"; then
+ ${qemu}/bin/qemu-img create -f qcow2 "$NIX_DISK_IMAGE" \
+ ${toString config.virtualisation.diskSize}M || exit 1
+ fi
+
+ # Create a directory for storing temporary data of the running VM.
+ if [ -z "$TMPDIR" -o -z "$USE_TMPDIR" ]; then
+ TMPDIR=$(mktemp -d nix-vm.XXXXXXXXXX --tmpdir)
+ fi
+
+ # Create a directory for exchanging data with the VM.
+ mkdir -p $TMPDIR/xchg
+
+ ${if cfg.useBootLoader then ''
+ # Create a writable copy/snapshot of the boot disk.
+ # A writable boot disk can be booted from automatically.
+ ${qemu}/bin/qemu-img create -f qcow2 -b ${bootDisk}/disk.img $TMPDIR/disk.img || exit 1
+
+ NIX_EFI_VARS=$(readlink -f ''${NIX_EFI_VARS:-${cfg.efiVars}})
+
+ ${if cfg.useEFIBoot then ''
+ # VM needs writable EFI vars
+ if ! test -e "$NIX_EFI_VARS"; then
+ cp ${bootDisk}/efi-vars.fd "$NIX_EFI_VARS" || exit 1
+ chmod 0644 "$NIX_EFI_VARS" || exit 1
+ fi
+ '' else ''
+ ''}
+ '' else ''
+ ''}
+
+ cd $TMPDIR
+ idx=0
+ ${flip concatMapStrings cfg.emptyDiskImages (size: ''
+ if ! test -e "empty$idx.qcow2"; then
+ ${qemu}/bin/qemu-img create -f qcow2 "empty$idx.qcow2" "${toString size}M"
+ fi
+ idx=$((idx + 1))
+ '')}
+
+ # Start QEMU.
+ exec ${qemuBinary qemu} \
+ -name ${config.system.name} \
+ -m ${toString config.virtualisation.memorySize} \
+ -smp ${toString config.virtualisation.cores} \
+ -device virtio-rng-pci \
+ ${concatStringsSep " " config.virtualisation.qemu.networkingOptions} \
+ -virtfs local,path=/nix/store,security_model=none,mount_tag=store \
+ -virtfs local,path=$TMPDIR/xchg,security_model=none,mount_tag=xchg \
+ -virtfs local,path=''${SHARED_DIR:-$TMPDIR/xchg},security_model=none,mount_tag=shared \
+ ${drivesCmdLine config.virtualisation.qemu.drives} \
+ ${toString config.virtualisation.qemu.options} \
+ $QEMU_OPTS \
+ "$@"
+ '';
+
+
+ regInfo = pkgs.closureInfo { rootPaths = config.virtualisation.pathsInNixDB; };
+
+
+ # Generate a hard disk image containing a /boot partition and GRUB
+ # in the MBR. Used when the `useBootLoader' option is set.
+ # Uses `runInLinuxVM` to create the image in a throwaway VM.
+ # See note [Disk layout with `useBootLoader`].
+ # FIXME: use nixos/lib/make-disk-image.nix.
+ bootDisk =
+ pkgs.vmTools.runInLinuxVM (
+ pkgs.runCommand "nixos-boot-disk"
+ { preVM =
+ ''
+ mkdir $out
+ diskImage=$out/disk.img
+ ${qemu}/bin/qemu-img create -f qcow2 $diskImage "60M"
+ ${if cfg.useEFIBoot then ''
+ efiVars=$out/efi-vars.fd
+ cp ${efiVarsDefault} $efiVars
+ chmod 0644 $efiVars
+ '' else ''
+ ''}
+ '';
+ buildInputs = [ pkgs.utillinux ];
+ QEMU_OPTS = "-nographic -serial stdio -monitor none"
+ + lib.optionalString cfg.useEFIBoot (
+ " -drive if=pflash,format=raw,unit=0,readonly=on,file=${efiFirmware}"
+ + " -drive if=pflash,format=raw,unit=1,file=$efiVars");
+ }
+ ''
+ # Create a /boot EFI partition with 60M and arbitrary but fixed GUIDs for reproducibility
+ ${pkgs.gptfdisk}/bin/sgdisk \
+ --set-alignment=1 --new=1:34:2047 --change-name=1:BIOSBootPartition --typecode=1:ef02 \
+ --set-alignment=512 --largest-new=2 --change-name=2:EFISystem --typecode=2:ef00 \
+ --attributes=1:set:1 \
+ --attributes=2:set:2 \
+ --disk-guid=97FD5997-D90B-4AA3-8D16-C1723AEA73C1 \
+ --partition-guid=1:1C06F03B-704E-4657-B9CD-681A087A2FDC \
+ --partition-guid=2:970C694F-AFD0-4B99-B750-CDB7A329AB6F \
+ --hybrid 2 \
+ --recompute-chs /dev/vda
+
+ ${optionalString (config.boot.loader.grub.device != "/dev/vda")
+ # In this throwaway VM, we only have the /dev/vda disk, but the
+ # actual VM described by `config` (used by `switch-to-configuration`
+ # below) may set `boot.loader.grub.device` to a different device
+ # that's nonexistent in the throwaway VM.
+ # Create a symlink for that device, so that the `grub-install`
+ # by `switch-to-configuration` will hit /dev/vda anyway.
+ ''
+ ln -s /dev/vda ${config.boot.loader.grub.device}
+ ''
+ }
+
+ ${pkgs.dosfstools}/bin/mkfs.fat -F16 /dev/vda2
+ export MTOOLS_SKIP_CHECK=1
+ ${pkgs.mtools}/bin/mlabel -i /dev/vda2 ::boot
+
+ # Mount /boot; load necessary modules first.
+ ${pkgs.kmod}/bin/insmod ${pkgs.linux}/lib/modules/*/kernel/fs/nls/nls_cp437.ko.xz || true
+ ${pkgs.kmod}/bin/insmod ${pkgs.linux}/lib/modules/*/kernel/fs/nls/nls_iso8859-1.ko.xz || true
+ ${pkgs.kmod}/bin/insmod ${pkgs.linux}/lib/modules/*/kernel/fs/fat/fat.ko.xz || true
+ ${pkgs.kmod}/bin/insmod ${pkgs.linux}/lib/modules/*/kernel/fs/fat/vfat.ko.xz || true
+ ${pkgs.kmod}/bin/insmod ${pkgs.linux}/lib/modules/*/kernel/fs/efivarfs/efivarfs.ko.xz || true
+ mkdir /boot
+ mount /dev/vda2 /boot
+
+ ${optionalString config.boot.loader.efi.canTouchEfiVariables ''
+ mount -t efivarfs efivarfs /sys/firmware/efi/efivars
+ ''}
+
+ # This is needed for GRUB 0.97, which doesn't know about virtio devices.
+ mkdir /boot/grub
+ echo '(hd0) /dev/vda' > /boot/grub/device.map
+
+ # This is needed for systemd-boot to find ESP, and udev is not available here to create this
+ mkdir -p /dev/block
+ ln -s /dev/vda2 /dev/block/254:2
+
+ # Set up system profile (normally done by nixos-rebuild / nix-env --set)
+ mkdir -p /nix/var/nix/profiles
+ ln -s ${config.system.build.toplevel} /nix/var/nix/profiles/system-1-link
+ ln -s /nix/var/nix/profiles/system-1-link /nix/var/nix/profiles/system
+
+ # Install bootloader
+ touch /etc/NIXOS
+ export NIXOS_INSTALL_BOOTLOADER=1
+ ${config.system.build.toplevel}/bin/switch-to-configuration boot
+
+ umount /boot
+ '' # */
+ );
+
+in
+
+{
+ imports = [
+ ../profiles/qemu-guest.nix
+ ];
+
+ options = {
+
+ virtualisation.memorySize =
+ mkOption {
+ default = 384;
+ description =
+ ''
+ Memory size (M) of virtual machine.
+ '';
+ };
+
+ virtualisation.diskSize =
+ mkOption {
+ default = 512;
+ description =
+ ''
+ Disk size (M) of virtual machine.
+ '';
+ };
+
+ virtualisation.diskImage =
+ mkOption {
+ default = "./${config.system.name}.qcow2";
+ description =
+ ''
+ Path to the disk image containing the root filesystem.
+ The image will be created on startup if it does not
+ exist.
+ '';
+ };
+
+ virtualisation.bootDevice =
+ mkOption {
+ type = types.str;
+ example = "/dev/vda";
+ description =
+ ''
+ The disk to be used for the root filesystem.
+ '';
+ };
+
+ virtualisation.emptyDiskImages =
+ mkOption {
+ default = [];
+ type = types.listOf types.int;
+ description =
+ ''
+ Additional disk images to provide to the VM. The value is
+ a list of size in megabytes of each disk. These disks are
+ writeable by the VM.
+ '';
+ };
+
+ virtualisation.graphics =
+ mkOption {
+ default = true;
+ description =
+ ''
+ Whether to run QEMU with a graphics window, or in nographic mode.
+ Serial console will be enabled on both settings, but this will
+ change the preferred console.
+ '';
+ };
+
+ virtualisation.cores =
+ mkOption {
+ default = 1;
+ type = types.int;
+ description =
+ ''
+ Specify the number of cores the guest is permitted to use.
+ The number can be higher than the available cores on the
+ host system.
+ '';
+ };
+
+ virtualisation.pathsInNixDB =
+ mkOption {
+ default = [];
+ description =
+ ''
+ The list of paths whose closure is registered in the Nix
+ database in the VM. All other paths in the host Nix store
+ appear in the guest Nix store as well, but are considered
+ garbage (because they are not registered in the Nix
+ database in the guest).
+ '';
+ };
+
+ virtualisation.vlans =
+ mkOption {
+ default = [ 1 ];
+ example = [ 1 2 ];
+ description =
+ ''
+ Virtual networks to which the VM is connected. Each
+ number <replaceable>N</replaceable> in this list causes
+ the VM to have a virtual Ethernet interface attached to a
+ separate virtual network on which it will be assigned IP
+ address
+ <literal>192.168.<replaceable>N</replaceable>.<replaceable>M</replaceable></literal>,
+ where <replaceable>M</replaceable> is the index of this VM
+ in the list of VMs.
+ '';
+ };
+
+ virtualisation.writableStore =
+ mkOption {
+ default = true; # FIXME
+ description =
+ ''
+ If enabled, the Nix store in the VM is made writable by
+ layering an overlay filesystem on top of the host's Nix
+ store.
+ '';
+ };
+
+ virtualisation.writableStoreUseTmpfs =
+ mkOption {
+ default = true;
+ description =
+ ''
+ Use a tmpfs for the writable store instead of writing to the VM's
+ own filesystem.
+ '';
+ };
+
+ networking.primaryIPAddress =
+ mkOption {
+ default = "";
+ internal = true;
+ description = "Primary IP address used in /etc/hosts.";
+ };
+
+ virtualisation.qemu = {
+ options =
+ mkOption {
+ type = types.listOf types.unspecified;
+ default = [];
+ example = [ "-vga std" ];
+ description = "Options passed to QEMU.";
+ };
+
+ consoles = mkOption {
+ type = types.listOf types.str;
+ default = let
+ consoles = [ "${qemuSerialDevice},115200n8" "tty0" ];
+ in if cfg.graphics then consoles else reverseList consoles;
+ example = [ "console=tty1" ];
+ description = ''
+ The output console devices to pass to the kernel command line via the
+ <literal>console</literal> parameter, the primary console is the last
+ item of this list.
+
+ By default it enables both serial console and
+ <literal>tty0</literal>. The preferred console (last one) is based on
+ the value of <option>virtualisation.graphics</option>.
+ '';
+ };
+
+ networkingOptions =
+ mkOption {
+ default = [
+ "-net nic,netdev=user.0,model=virtio"
+ "-netdev user,id=user.0\${QEMU_NET_OPTS:+,$QEMU_NET_OPTS}"
+ ];
+ type = types.listOf types.str;
+ description = ''
+ Networking-related command-line options that should be passed to qemu.
+ The default is to use userspace networking (slirp).
+
+ If you override this option, be advised to keep
+ ''${QEMU_NET_OPTS:+,$QEMU_NET_OPTS} (as seen in the default)
+ to keep the default runtime behaviour.
+ '';
+ };
+
+ drives =
+ mkOption {
+ type = types.listOf (types.submodule driveOpts);
+ description = "Drives passed to qemu.";
+ apply = addDeviceNames;
+ };
+
+ diskInterface =
+ mkOption {
+ default = "virtio";
+ example = "scsi";
+ type = types.enum [ "virtio" "scsi" "ide" ];
+ description = "The interface used for the virtual hard disks.";
+ };
+
+ guestAgent.enable =
+ mkOption {
+ default = true;
+ type = types.bool;
+ description = ''
+ Enable the Qemu guest agent.
+ '';
+ };
+ };
+
+ virtualisation.useBootLoader =
+ mkOption {
+ default = false;
+ description =
+ ''
+ If enabled, the virtual machine will be booted using the
+ regular boot loader (i.e., GRUB 1 or 2). This allows
+ testing of the boot loader. If
+ disabled (the default), the VM directly boots the NixOS
+ kernel and initial ramdisk, bypassing the boot loader
+ altogether.
+ '';
+ };
+
+ virtualisation.useEFIBoot =
+ mkOption {
+ default = false;
+ description =
+ ''
+ If enabled, the virtual machine will provide a EFI boot
+ manager.
+ useEFIBoot is ignored if useBootLoader == false.
+ '';
+ };
+
+ virtualisation.efiVars =
+ mkOption {
+ default = "./${config.system.name}-efi-vars.fd";
+ description =
+ ''
+ Path to nvram image containing UEFI variables. The will be created
+ on startup if it does not exist.
+ '';
+ };
+
+ virtualisation.bios =
+ mkOption {
+ default = null;
+ type = types.nullOr types.package;
+ description =
+ ''
+ An alternate BIOS (such as <package>qboot</package>) with which to start the VM.
+ Should contain a file named <literal>bios.bin</literal>.
+ If <literal>null</literal>, QEMU's builtin SeaBIOS will be used.
+ '';
+ };
+
+ };
+
+ config = {
+
+ # Note [Disk layout with `useBootLoader`]
+ #
+ # If `useBootLoader = true`, we configure 2 drives:
+ # `/dev/?da` for the root disk, and `/dev/?db` for the boot disk
+ # which has the `/boot` partition and the boot loader.
+ # Concretely:
+ #
+ # * The second drive's image `disk.img` is created in `bootDisk = ...`
+ # using a throwaway VM. Note that there the disk is always `/dev/vda`,
+ # even though in the final VM it will be at `/dev/*b`.
+ # * The disks are attached in `virtualisation.qemu.drives`.
+ # Their order makes them appear as devices `a`, `b`, etc.
+ # * `fileSystems."/boot"` is adjusted to be on device `b`.
+
+ # If `useBootLoader`, GRUB goes to the second disk, see
+ # note [Disk layout with `useBootLoader`].
+ boot.loader.grub.device = mkVMOverride (
+ if cfg.useBootLoader
+ then driveDeviceName 2 # second disk
+ else cfg.bootDevice
+ );
+
+ boot.initrd.extraUtilsCommands =
+ ''
+ # We need mke2fs in the initrd.
+ copy_bin_and_libs ${pkgs.e2fsprogs}/bin/mke2fs
+ '';
+
+ boot.initrd.postDeviceCommands =
+ ''
+ # If the disk image appears to be empty, run mke2fs to
+ # initialise.
+ FSTYPE=$(blkid -o value -s TYPE ${cfg.bootDevice} || true)
+ if test -z "$FSTYPE"; then
+ mke2fs -t ext4 ${cfg.bootDevice}
+ fi
+ '';
+
+ boot.initrd.postMountCommands =
+ ''
+ # Mark this as a NixOS machine.
+ mkdir -p $targetRoot/etc
+ echo -n > $targetRoot/etc/NIXOS
+
+ # Fix the permissions on /tmp.
+ chmod 1777 $targetRoot/tmp
+
+ mkdir -p $targetRoot/boot
+
+ ${optionalString cfg.writableStore ''
+ echo "mounting overlay filesystem on /nix/store..."
+ mkdir -p 0755 $targetRoot/nix/.rw-store/store $targetRoot/nix/.rw-store/work $targetRoot/nix/store
+ mount -t overlay overlay $targetRoot/nix/store \
+ -o lowerdir=$targetRoot/nix/.ro-store,upperdir=$targetRoot/nix/.rw-store/store,workdir=$targetRoot/nix/.rw-store/work || fail
+ ''}
+ '';
+
+ # After booting, register the closure of the paths in
+ # `virtualisation.pathsInNixDB' in the Nix database in the VM. This
+ # allows Nix operations to work in the VM. The path to the
+ # registration file is passed through the kernel command line to
+ # allow `system.build.toplevel' to be included. (If we had a direct
+ # reference to ${regInfo} here, then we would get a cyclic
+ # dependency.)
+ boot.postBootCommands =
+ ''
+ if [[ "$(cat /proc/cmdline)" =~ regInfo=([^ ]*) ]]; then
+ ${config.nix.package.out}/bin/nix-store --load-db < ''${BASH_REMATCH[1]}
+ fi
+ '';
+
+ boot.initrd.availableKernelModules =
+ optional cfg.writableStore "overlay"
+ ++ optional (cfg.qemu.diskInterface == "scsi") "sym53c8xx";
+
+ virtualisation.bootDevice = mkDefault (driveDeviceName 1);
+
+ virtualisation.pathsInNixDB = [ config.system.build.toplevel ];
+
+ # FIXME: Consolidate this one day.
+ virtualisation.qemu.options = mkMerge [
+ (mkIf (pkgs.stdenv.isi686 || pkgs.stdenv.isx86_64) [
+ "-usb" "-device usb-tablet,bus=usb-bus.0"
+ ])
+ (mkIf (pkgs.stdenv.isAarch32 || pkgs.stdenv.isAarch64) [
+ "-device virtio-gpu-pci" "-device usb-ehci,id=usb0" "-device usb-kbd" "-device usb-tablet"
+ ])
+ (mkIf (!cfg.useBootLoader) [
+ "-kernel ${config.system.build.toplevel}/kernel"
+ "-initrd ${config.system.build.toplevel}/initrd"
+ ''-append "$(cat ${config.system.build.toplevel}/kernel-params) init=${config.system.build.toplevel}/init regInfo=${regInfo}/registration ${consoles} $QEMU_KERNEL_PARAMS"''
+ ])
+ (mkIf cfg.useEFIBoot [
+ "-drive if=pflash,format=raw,unit=0,readonly,file=${efiFirmware}"
+ "-drive if=pflash,format=raw,unit=1,file=$NIX_EFI_VARS"
+ ])
+ (mkIf (cfg.bios != null) [
+ "-bios ${cfg.bios}/bios.bin"
+ ])
+ (mkIf (!cfg.graphics) [
+ "-nographic"
+ ])
+ ];
+
+ virtualisation.qemu.drives = mkMerge [
+ [{
+ name = "root";
+ file = "$NIX_DISK_IMAGE";
+ driveExtraOpts.cache = "writeback";
+ driveExtraOpts.werror = "report";
+ }]
+ (mkIf cfg.useBootLoader [
+ # The order of this list determines the device names, see
+ # note [Disk layout with `useBootLoader`].
+ {
+ name = "boot";
+ file = "$TMPDIR/disk.img";
+ driveExtraOpts.media = "disk";
+ deviceExtraOpts.bootindex = "1";
+ }
+ ])
+ (imap0 (idx: _: {
+ file = "$(pwd)/empty${toString idx}.qcow2";
+ driveExtraOpts.werror = "report";
+ }) cfg.emptyDiskImages)
+ ];
+
+ # Mount the host filesystem via 9P, and bind-mount the Nix store
+ # of the host into our own filesystem. We use mkVMOverride to
+ # allow this module to be applied to "normal" NixOS system
+ # configuration, where the regular value for the `fileSystems'
+ # attribute should be disregarded for the purpose of building a VM
+ # test image (since those filesystems don't exist in the VM).
+ fileSystems = mkVMOverride (
+ { "/".device = cfg.bootDevice;
+ ${if cfg.writableStore then "/nix/.ro-store" else "/nix/store"} =
+ { device = "store";
+ fsType = "9p";
+ options = [ "trans=virtio" "version=9p2000.L" "cache=loose" ];
+ neededForBoot = true;
+ };
+ "/tmp" = mkIf config.boot.tmpOnTmpfs
+ { device = "tmpfs";
+ fsType = "tmpfs";
+ neededForBoot = true;
+ # Sync with systemd's tmp.mount;
+ options = [ "mode=1777" "strictatime" "nosuid" "nodev" ];
+ };
+ "/tmp/xchg" =
+ { device = "xchg";
+ fsType = "9p";
+ options = [ "trans=virtio" "version=9p2000.L" ];
+ neededForBoot = true;
+ };
+ "/tmp/shared" =
+ { device = "shared";
+ fsType = "9p";
+ options = [ "trans=virtio" "version=9p2000.L" ];
+ neededForBoot = true;
+ };
+ } // optionalAttrs (cfg.writableStore && cfg.writableStoreUseTmpfs)
+ { "/nix/.rw-store" =
+ { fsType = "tmpfs";
+ options = [ "mode=0755" ];
+ neededForBoot = true;
+ };
+ } // optionalAttrs cfg.useBootLoader
+ { "/boot" =
+ # see note [Disk layout with `useBootLoader`]
+ { device = "${lookupDriveDeviceName "boot" cfg.qemu.drives}2"; # 2 for e.g. `vdb2`, as created in `bootDisk`
+ fsType = "vfat";
+ noCheck = true; # fsck fails on a r/o filesystem
+ };
+ });
+
+ swapDevices = mkVMOverride [ ];
+ boot.initrd.luks.devices = mkVMOverride {};
+
+ # Don't run ntpd in the guest. It should get the correct time from KVM.
+ services.timesyncd.enable = false;
+
+ services.qemuGuest.enable = cfg.qemu.guestAgent.enable;
+
+ system.build.vm = pkgs.runCommand "nixos-vm" { preferLocalBuild = true; }
+ ''
+ mkdir -p $out/bin
+ ln -s ${config.system.build.toplevel} $out/system
+ ln -s ${pkgs.writeScript "run-nixos-vm" startVM} $out/bin/run-${config.system.name}-vm
+ '';
+
+ # When building a regular system configuration, override whatever
+ # video driver the host uses.
+ services.xserver.videoDrivers = mkVMOverride [ "modesetting" ];
+ services.xserver.defaultDepth = mkVMOverride 0;
+ services.xserver.resolutions = mkVMOverride [ { x = 1024; y = 768; } ];
+ services.xserver.monitorSection =
+ ''
+ # Set a higher refresh rate so that resolutions > 800x600 work.
+ HorizSync 30-140
+ VertRefresh 50-160
+ '';
+
+ # Wireless won't work in the VM.
+ networking.wireless.enable = mkVMOverride false;
+ services.connman.enable = mkVMOverride false;
+
+ # Speed up booting by not waiting for ARP.
+ networking.dhcpcd.extraConfig = "noarp";
+
+ networking.usePredictableInterfaceNames = false;
+
+ system.requiredKernelConfig = with config.lib.kernelConfig;
+ [ (isEnabled "VIRTIO_BLK")
+ (isEnabled "VIRTIO_PCI")
+ (isEnabled "VIRTIO_NET")
+ (isEnabled "EXT4_FS")
+ (isYes "BLK_DEV")
+ (isYes "PCI")
+ (isYes "EXPERIMENTAL")
+ (isYes "NETDEVICES")
+ (isYes "NET_CORE")
+ (isYes "INET")
+ (isYes "NETWORK_FILESYSTEMS")
+ ] ++ optional (!cfg.graphics) [
+ (isYes "SERIAL_8250_CONSOLE")
+ (isYes "SERIAL_8250")
+ ];
+
+ };
+}