tvix/boot
This directory provides tooling to boot VMs with /nix/store provided by virtiofs.
In the tests/
subdirectory, there's some integration tests.
//tvix/boot:runVM
A script spinning up a tvix-store virtiofs
daemon, then starting a cloud-
hypervisor VM.
The cloud-hypervisor VM is using a (semi-)minimal kernel image with virtiofs support, and a custom initrd (using u-root). It supports various command line options, to be able to do VM tests, act as an interactive shell or exec a binary from a closure.
It supports the following env vars:
CH_NUM_CPUS=1
controls the number of CPUs available to the VMCH_MEM_SIZE=512M
controls the memory availabe to the VMCH_CMDLINE=
controls the kernel cmdline (which can be used to control the boot)
Usage
First, ensure you have tvix-store
in $PATH
, as that's what run-tvix-vm
expects:
Assuming you ran cargo build --profile=release-with-debug
before, and are in
the tvix
directory:
export PATH=$PATH:$PWD/target/release-with-debug
Secondly, configure tvix to use the local backend:
export BLOB_SERVICE_ADDR=sled://$PWD/blobs.sled export DIRECTORY_SERVICE_ADDR=sled://$PWD/directories.sled export PATH_INFO_SERVICE_ADDR=sled://$PWD/pathinfo.sled
Potentially copy some data into tvix-store (via nar-bridge):
mg run //tvix:store -- daemon & $(mg build //tvix:nar-bridge)/bin/nar-bridge-http & rm -Rf ~/.cache/nix; nix copy --to http://localhost:9000\?compression\=none $(mg build //third_party/nixpkgs:hello) pkill nar-bridge-http; pkill tvix-store
Interactive shell
Run the VM like this:
CH_CMDLINE=tvix.shell mg run //tvix/boot:runVM --
You'll get dropped into an interactive shell, from which you can do things with the store:
______ _ ____ _ __ /_ __/ __(_) __ / _/___ (_) /_ / / | | / / / |/_/ / // __ \/ / __/ / / | |/ / /> < _/ // / / / / /_ /_/ |___/_/_/|_| /___/_/ /_/_/\__/ /# ls -la /nix/store/ dr-xr-xr-x root 0 0 Jan 1 00:00 . dr-xr-xr-x root 0 989 Jan 1 00:00 aw2fw9ag10wr9pf0qk4nk5sxi0q0bn56-glibc-2.37-8 dr-xr-xr-x root 0 3 Jan 1 00:00 jbwb8d8l28lg9z0xzl784wyb9vlbwss6-xgcc-12.3.0-libgcc dr-xr-xr-x root 0 82 Jan 1 00:00 k8ivghpggjrq1n49xp8sj116i4sh8lia-libidn2-2.3.4 dr-xr-xr-x root 0 141 Jan 1 00:00 mdi7lvrn2mx7rfzv3fdq3v5yw8swiks6-hello-2.12.1 dr-xr-xr-x root 0 5 Jan 1 00:00 s2gi8pfjszy6rq3ydx0z1vwbbskw994i-libunistring-1.1
Once you exit the shell, the VM will power off itself.
Execute a specific binary
Run the VM like this:
hello_cmd=$(mg build //third_party/nixpkgs:hello)/bin/hello CH_CMDLINE=tvix.run=$hello_cmd mg run //tvix/boot:runVM --
Observe it executing the file (and closure) from the tvix-store:
[ 0.277486] Run /init as init process ______ _ ____ _ __ /_ __/ __(_) __ / _/___ (_) /_ / / | | / / / |/_/ / // __ \/ / __/ / / | |/ / /> < _/ // / / / / /_ /_/ |___/_/_/|_| /___/_/ /_/_/\__/ Hello, world! 2023/09/24 21:10:19 Nothing left to be done, powering off. [ 0.299122] ACPI: PM: Preparing to enter system sleep state S5 [ 0.299422] reboot: Power down
Execute a NixOS system closure
It's also possible to invoke a system closure. To do this, tvix-init honors the init= cmdline option, and will switch_root to it.
CH_CMDLINE=init=/nix/store/…-nixos-system-…/init mg run //tvix/boot:runVM --
______ _ ____ _ __ /_ __/ __(_) __ / _/___ (_) /_ / / | | / / / |/_/ / // __ \/ / __/ / / | |/ / /> < _/ // / / / / /_ /_/ |___/_/_/|_| /___/_/ /_/_/\__/ 2023/09/24 21:16:43 switch_root: moving mounts 2023/09/24 21:16:43 switch_root: Skipping "/run" as the dir does not exist 2023/09/24 21:16:43 switch_root: Changing directory 2023/09/24 21:16:43 switch_root: Moving / 2023/09/24 21:16:43 switch_root: Changing root! 2023/09/24 21:16:43 switch_root: Deleting old / 2023/09/24 21:16:43 switch_root: executing init <<< NixOS Stage 2 >>> [ 0.322096] booting system configuration /nix/store/g657sdxinpqfcdv0162zmb8vv9b5c4c5-nixos-system-client-23.11.git.82102fc37da running activation script... setting up /etc... starting systemd... [ 0.980740] systemd[1]: systemd 253.6 running in system mode (+PAM +AUDIT -SELINUX +APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD +BPF_FRAMEWORK -XKBCOMMON +UTMP -SYSVINIT default-hierarchy=unified)
This effectively replaces the NixOS Stage 1 entirely.