Struct kvm_ioctls::Kvm [−][src]
pub struct Kvm { /* fields omitted */ }
Expand description
Wrapper over KVM system ioctls.
Implementations
Opens /dev/kvm
and returns a Kvm
object on success.
Example
use kvm_ioctls::Kvm;
let kvm = Kvm::new().unwrap();
Opens /dev/kvm
and returns the fd number on success.
One usecase for this method is opening /dev/kvm
before exec-ing into a
process with seccomp filters enabled that blacklist the sys_open
syscall.
For this usecase open_with_cloexec
must be called with the close_on_exec
parameter set to false.
Arguments
close_on_exec
: If true opens/dev/kvm
using theO_CLOEXEC
flag.
Example
let kvm_fd = Kvm::open_with_cloexec(false).unwrap();
// The `kvm_fd` can now be passed to another process where we can use
// `from_raw_fd` for creating a `Kvm` object:
let kvm = unsafe { Kvm::from_raw_fd(kvm_fd) };
Returns the KVM API version.
See the documentation for KVM_GET_API_VERSION
.
Example
let kvm = Kvm::new().unwrap();
assert_eq!(kvm.get_api_version(), 12);
Checks if a particular Cap
is available.
Returns true if the capability is supported and false otherwise.
See the documentation for KVM_CHECK_EXTENSION
.
Arguments
c
- KVM capability to check.
Example
use kvm_ioctls::Cap;
let kvm = Kvm::new().unwrap();
// Check if `KVM_CAP_USER_MEMORY` is supported.
assert!(kvm.check_extension(Cap::UserMemory));
Returns the size of the memory mapping required to use the vcpu’s kvm_run
structure.
See the documentation for KVM_GET_VCPU_MMAP_SIZE
.
Example
let kvm = Kvm::new().unwrap();
assert!(kvm.get_vcpu_mmap_size().unwrap() > 0);
Gets the recommended number of VCPUs per VM.
See the documentation for KVM_CAP_NR_VCPUS
.
Default to 4 when KVM_CAP_NR_VCPUS
is not implemented.
Example
let kvm = Kvm::new().unwrap();
// We expect the number of vCPUs to be > 0 as per KVM API documentation.
assert!(kvm.get_nr_vcpus() > 0);
Returns the maximum allowed memory slots per VM.
KVM reports the number of available memory slots (KVM_CAP_NR_MEMSLOTS
)
using the extension interface. Both x86 and s390 implement this, ARM
and powerpc do not yet enable it.
Default to 32 when KVM_CAP_NR_MEMSLOTS
is not implemented.
Example
let kvm = Kvm::new().unwrap();
assert!(kvm.get_nr_memslots() > 0);
Gets the recommended maximum number of VCPUs per VM.
See the documentation for KVM_CAP_MAX_VCPUS
.
Returns get_nr_vcpus() when
KVM_CAP_MAX_VCPUS
is not implemented.
Example
let kvm = Kvm::new().unwrap();
assert!(kvm.get_max_vcpus() > 0);
Gets the Maximum VCPU ID per VM.
See the documentation for KVM_CAP_MAX_VCPU_ID
Returns get_max_vcpus() when
KVM_CAP_MAX_VCPU_ID
is not implemented
Example
let kvm = Kvm::new().unwrap();
assert!(kvm.get_max_vcpu_id() > 0);
X86 specific call to get the system emulated CPUID values.
See the documentation for KVM_GET_EMULATED_CPUID
.
Arguments
num_entries
- Maximum number of CPUID entries. This function can return less than this when the hardware does not support so many CPUID entries.
Returns Error errno::Error(libc::ENOMEM)
when the input num_entries
is greater than
KVM_MAX_CPUID_ENTRIES
.
Example
extern crate kvm_bindings;
use kvm_bindings::KVM_MAX_CPUID_ENTRIES;
use kvm_ioctls::Kvm;
let kvm = Kvm::new().unwrap();
let mut cpuid = kvm.get_emulated_cpuid(KVM_MAX_CPUID_ENTRIES).unwrap();
let cpuid_entries = cpuid.as_mut_slice();
assert!(cpuid_entries.len() <= KVM_MAX_CPUID_ENTRIES);
X86 specific call to get the system supported CPUID values.
See the documentation for KVM_GET_SUPPORTED_CPUID
.
Arguments
num_entries
- Maximum number of CPUID entries. This function can return less than this when the hardware does not support so many CPUID entries.
Returns Error errno::Error(libc::ENOMEM)
when the input num_entries
is greater than
KVM_MAX_CPUID_ENTRIES
.
Example
extern crate kvm_bindings;
use kvm_bindings::KVM_MAX_CPUID_ENTRIES;
use kvm_ioctls::Kvm;
let kvm = Kvm::new().unwrap();
let mut cpuid = kvm.get_supported_cpuid(KVM_MAX_CPUID_ENTRIES).unwrap();
let cpuid_entries = cpuid.as_mut_slice();
assert!(cpuid_entries.len() <= KVM_MAX_CPUID_ENTRIES);
X86 specific call to get list of supported MSRS
See the documentation for KVM_GET_MSR_INDEX_LIST
.
Example
use kvm_ioctls::Kvm;
let kvm = Kvm::new().unwrap();
let msr_index_list = kvm.get_msr_index_list().unwrap();
Creates a VM fd using the KVM fd.
See the documentation for KVM_CREATE_VM
.
A call to this function will also initialize the size of the vcpu mmap area using the
KVM_GET_VCPU_MMAP_SIZE
ioctl.
Example
let kvm = Kvm::new().unwrap();
let vm = kvm.create_vm().unwrap();
// Check that the VM mmap size is the same reported by `KVM_GET_VCPU_MMAP_SIZE`.
assert!(vm.run_size() == kvm.get_vcpu_mmap_size().unwrap());
Creates a VM fd using the KVM fd of a specific type.
See the documentation for KVM_CREATE_VM
.
A call to this function will also initialize the size of the vcpu mmap area using the
KVM_GET_VCPU_MMAP_SIZE
ioctl.
vm_type
- Platform and architecture specific platform VM type. A value of 0 is the equivalent to using the default VM type.
Example
let kvm = Kvm::new().unwrap();
let vm = kvm.create_vm_with_type(0).unwrap();
// Check that the VM mmap size is the same reported by `KVM_GET_VCPU_MMAP_SIZE`.
assert!(vm.run_size() == kvm.get_vcpu_mmap_size().unwrap());
Creates a VmFd object from a VM RawFd.
Arguments
fd
- the RawFd used for creating the VmFd object.
Safety
This function is unsafe as the primitives currently returned have the contract that they are the sole owner of the file descriptor they are wrapping. Usage of this function could accidentally allow violating this contract which can cause memory unsafety in code that relies on it being true.
The caller of this method must make sure the fd is valid and nothing else uses it.
Example
let kvm = Kvm::new().unwrap();
let vm = kvm.create_vm().unwrap();
let rawfd = unsafe { libc::dup(vm.as_raw_fd()) };
assert!(rawfd >= 0);
let vm = unsafe { kvm.create_vmfd_from_rawfd(rawfd).unwrap() };
Trait Implementations
Creates a new Kvm object assuming fd
represents an existing open file descriptor
associated with /dev/kvm
.
For usage examples check open_with_cloexec().
Arguments
fd
- File descriptor for/dev/kvm
.
Safety
This function is unsafe as the primitives currently returned have the contract that they are the sole owner of the file descriptor they are wrapping. Usage of this function could accidentally allow violating this contract which can cause memory unsafety in code that relies on it being true.
The caller of this method must make sure the fd is valid and nothing else uses it.
Example
let kvm_fd = Kvm::open_with_cloexec(true).unwrap();
// Safe because we verify that the fd is valid in `open_with_cloexec` and we own the fd.
let kvm = unsafe { Kvm::from_raw_fd(kvm_fd) };