The Chromebooks with Intel processors are fast. I've replaced my Macbook Air with a Chromebook, and run the standard ChromeOS software on VT01, and virtual machines on VT02. I have booted both Windows and different versions of Linux and the 9front version of Plan 9.
I currently use a custom build of Qemu. It's a bit hard to get Qemu built in the ChromeOS build system at present, so I've got a directory containing Qemu, its libraries and BIOS files, and scripts to chroot to that directory and run Qemu. Access to devices, where needed, is provided via bind-mounts. The setup sounds a bit kludgy but works well for me; nevertheless, we welcome improvements. What we'd most prefer is to get this patch series into chromeos, so we have qemu as part of a "real" build.
FWIW, this particular instance of qemu was built on arch Linux, lost, sadly, when my Air was stolen.
The firmware on ChromeOS devices will clear the VMX bits during boot. This means that support is disabled, but it is not locked such that runtime cannot change things. This keeps things secure during initial boot, but doesn't lock out people from enabling things themselves in the kernel. Otherwise, they'd have to resort to modifying the firmware and that's always a tricky proposition (make a mistake and you have a brick).
When the ChromeOS kernel boots up, it will look for the
Current ChromeOS systems all ship with KVM disabled. That means you need to currently build a custom kernel yourself in order to get KVM support.
Be aware that on earlier ChromeOS devices, the firmware contained bugs such that they locked VMX support during power on. It's known to affect:
For devices marked with a *, you might be able to restore support by hacking the firmware. Please see the respective device pages for more details.
To start, you're going to need an image that has the KVM modules. You should update your sources, then build an image with (at minimum) the USE=kvm option, viz:
Googlers: I have USB sticks that you can use for this install. Come see me if you want one. Sorry, can't hand these out yet :-(
Install this image in your favorite manner, either via update engine or usb stick. Boot the stick as usual.
The magic kernel command line option is
Log in as root.
This will almost certainly get an error. There are a few more steps to make sure virtual machines can be used.
Edit this config and add the line
to the command line. Then
Then comes the interesting part. On the laptops, you have to hard-disconnect the battery. On samsung, you do this by putting a paperclip into the hole on the underside of the trackpad.
Once that's done, you're going to need to pull down two files:
https://docs.google.com/open?id=0By47TDljmWaSWEttVGNBbVUwMEU, which is the qemu and other bits.
cd to /usr/local; mkdir kvm; cd there and untar this file into it. This creates a directory called qroot.
Next, you need a virtual machine image; I've set an example up at https://docs.google.com/open?id=0By47TDljmWaSX2N6VlpkS21Pd3c. Uncompress this in /usr/local/kvm (NOT the qroot directory; the one above it).
Now cd /usr/local/kvm/qroot, and
and it might just work. Please let firstname.lastname@example.org know about bugs.
If you are trying to run ChromiumOS on your own hardware (i.e. not a Chromebook/Chromebox), you should make sure your system is properly configured first.
Make sure your CPU has support for the Intel VMX extensions. Simply look at /proc/cpuinfo to see if it has the vmx flag:
If you don't, then sorry, but your CPU doesn't support VMX extensions.
Most BIOSs today have an option to enable/disable VMX support at boot, and then lock any further modifications. They often times default to disabling the VMX extensions.
You can check at runtime by using the
You only care about the lower 3 bits. An explanation of the first few bits:
Thus, if the last digit in the output is "1" (or much less unlikely, "8"), your BIOS has disabled VMX support and locked further modification. You will need to reboot into your BIOS, find the option, and enable it. Look for the word "virtualization".
The latest versions of QEMU/KVM include a tool called