Supported Hardware
Virtualization is supported on Intel devices with VMX enabled and ARMv8.0 and above devices that boot into EL2. The following hardware will have the best support due to being included in daily automated and manual testing:
- Pixelbook Go m3
- Intel NUC7 (NUC7i5DNHE)
The following hardware is also often used, but does not have the same level of automated test coverage.
- x64 QEMU/Nested VMX
Some virtualization features will work when using the Fuchsia emulator with nested VMX enabled. Notably, Vulkan acceleration using virtmagma will not be available to any guests when running in the Fuchsia emulator.
Supported Guests
While arbitrary Linux guests may run on Fuchsia, the following guest configurations are tested in CI on Fuchsia:
- Zircon Guest - A minimal fuchsia system that boots to a zircon virtcon.
- Debian Guest - A Debian bullseye guest.
- Termina Guest - A linux guest that contains additional features for Vulkan and window manager integration, based on the Termina VM from ChromeOS.
Build Fuchsia with Virtualization
For each guest operating system, there is a guest manager and a core shard that must be included in the build.
Below, PRODUCT is typically one of core
,
and BOARD is typically one of
x64
, chromebook-x64
, sherlock
.
$ fx set PRODUCT.BOARD \
# For Debian Guest
--with //src/virtualization/bundles:debian \
--args='core_realm_shards += [ "//src/virtualization/bundles:debian_core_shards" ]' \
# For Zircon Guest
--with //src/virtualization/bundles:zircon \
--args='core_realm_shards += [ "//src/virtualization/bundles:zircon_core_shards" ]' \
# For Termina Guest
--with //src/virtualization/bundles:termina \
--args='core_realm_shards += [ "//src/virtualization/bundles:termina_core_shards" ]'
Alternatively, you can enable all the guests with the following command:
$ fx set PRODUCT.BOARD \
--with //src/virtualization/bundles:all_guests \
--args='core_realm_shards += [ "//src/virtualization/bundles:all_core_shards" ]'
Launching a Guest from the CLI
You can launch a guest using the guest
CLI tool. The tool will launch the
guest and then provide access to a virtio-console over stdio:
Launch Debian Guest:
(fuchsia) $ guest launch debian
Starting Debian
$ uname -a Linux machina-guest 5.10.0-13-amd64 #1 SMP Debian 5.10.106-1 (2022-03-17) x86_64 GNU/Linux
Launch Zircon Guest
(fuchsia) $ guest launch zircon
Starting zircon
physboot: {{{reset}}}
physboot: {{{module:0:physboot:elf:9f2c4d6615bd603d}}}
physboot: {{{mmap:0x100000:0x14a100:load:0:rwx:0x0}}}
physboot: | Physical memory range | Size | Type
physboot: | [0x0000000000008000, 0x0000000000080000) | 480K | free RAM
physboot: | [0x0000000000100000, 0x00000000001cd000) | 820K | phys kernel image
physboot: | [0x00000000001cd000, 0x000000000024a000) | 500K | free RAM
physboot: | [0x000000000024a000, 0x000000000024a100) | 256B | phys kernel image
physboot: | [0x000000000024a100, 0x000000000024b000) | 3840B | free RAM
…
Launch Termina Guest
(fuchsia) $ guest launch termina
Starting Termina
…
On products with a UI Stack, the debian and zircon guests will also create a window that displays a virtual framebuffer powered by a virtio-gpu. Input from that window will also be sent to the guest as a virtual keyboard.
Running on QEMU
Running a guest on QEMU on x64 requires KVM. You may also need to enable nested KVM on your host machine. To check whether nested virtualization is enabled, run the following command:
Configure your Host
cat /sys/module/kvm_intel/parameters/nested
An output of Y
indicates nested virtualization is enabled, 0
or N
indicates not enabled.
To enable nested virtualization until the next reboot:
modprobe -r kvm_intel
modprobe kvm_intel nested=1
To make the change permanent add the following line to
/etc/modprobe.d/kvm.conf
:
options kvm_intel nested=1
Start QEMU
One you have your host machine setup, you can start the Fuchsia Emulator:
$ ffx emu start
Integration tests
Machina has a set of integration tests that launch Zircon and Debian guests to test the VMM, hypervisor, and each of the virtio devices. To run the tests, first add them to your build:
$ fx set PRODUCT.BOARD --with //src/virtualization:tests
$ fx build
Then run any of the following tests:
# Tests of the low level hypervisor syscalls:
$ fx test hypervisor_tests
# Basic tests that verify OS boot and basic functionality:
$ fx test virtualization-core-tests
# Test suites focused on specific devices:
$ fx test virtualization-block-tests
$ fx test virtualization-net-tests
$ fx test virtualization-sound-tests
$ fx test virtualization-vsock-tests
$ fx test virtualization-gpu-tests
$ fx test virtualization-input-tests