Skip to main content

The KVM Hypervisor

Introduction

This guide explains how to use the KVM hypervisor through its API directly without using any third party library or software such as libvirt, qemu etc.

A brief explanation of how the KVM system exposes itself is presented below. KVM hypervisor provides 4 types of ioctl or input/output controls. They are a logical hierarchy of what you would expect a hypervisor system to do. First you have system calls, which you can use to create a virtual machine. Once created you will receive a path or file descriptor to that VM which can be used to issue Virtual Machine Calls. After the VM is created, you will similarly receive a file descriptor. You can use this file descriptor as an address to issue both Virtual CPU calls and device calls.

System Calls

These query and set global attributes which affect the whole kvm subsystem. In addition a system ioctl is used to create virtual machines.

Virtual Machine Calls

These query and set attributes that affect an entire virtual machine, for example memory layout. In addition a VM ioctl is used to create virtual cpus (vcpus) and devices.

Virtual CPU Calls

These query and set attributes that control the operation of a single virtual cpu.

Device Calls

These query and set attributes that control the operation of a single device.

 

Comments

Popular posts from this blog

Good Game: Dice City

Another GTA Clone Back in early 2004, when the internet was new and download speeds were hitting 30 KB/s there was the thriving of world of flash games and a little programming language some of you might have known as ActionScript. Among the many games was a title called Ray part 2.  I was pretty young at the time and I had a computer with very weak specs, a Celeron processor. I could not play many of the AAA games. I would download their demos and wait at least a day for the download to finish, make sure the computer was switched on, sometimes the downloaded file would be corrupt so had to restart until download managers came around and saved me quite a few times. Ray part 2 for me was no different than actually playing GTA vice city but I could at least play it. The good thing about it were the different choices available in the game. Along the years, I would check from time to time if Ray Part 3 was released and eventually I found out that the original author had abandoned the game.

Top Android Encryption Apps

After I released my own android encryption app called Dexacrypt , I wanted to see what else was available on the market. Although, I thought my idea was unique there are already a large number of encryption apps on the market. Let's review some of them and rank them.  In this post, we will only look at message encryption apps and not advanced apps such as Surespot or SSE that provide file encryption or messaging. Meet the Contenders: Encrypt Messages And Text This app was last updated in November 2021 and has more than a 100,000 installs. Many reviews praise its simple UI and small size, however one user has specified that the latest version no longer works on Android 12. Secret Message - Encrypt/Decrypt Messages This app has a slightly larger size of 12 MB but only has 5000+ installs. The top review says and I quote, I am sorry but this is not as easy or self explanatory as it should be. You need to grab someone and hand them a phone and watch their expression. Ouch! maybe h

Murder Island

Murder Island - Old School Adventure Game One of my projects that was collecting dust, but now finally playable and available on the app store. Murder Island takes you on a humorous non-linear journey set in an Island resort. The resort is built in a western style town. In this game, you play as Detective Sherkey Romes who is commonly mistaken for world famous Dr. Datsun, his supervisor. Talk to different characters on the island and uncover clues about who could be the murderer. Run errands for locals to win their trust and solve the case. Use your inventory to combine items and exchange them for other items. GLHF!