From d2d2ba7c6602e73dc2e3dbd0aa4215e4c412a688 Mon Sep 17 00:00:00 2001 From: johannst Date: Wed, 2 Jun 2021 22:38:57 +0000 Subject: deploy: d2e2063cb2b5a82709e9c5188602a9fc0f7dadbd --- kvm_rs/all.html | 7 +++++ kvm_rs/index.html | 14 +++++++++ kvm_rs/kvm/index.html | 8 +++++ kvm_rs/kvm/sidebar-items.js | 1 + kvm_rs/kvm/struct.Kvm.html | 20 ++++++++++++ kvm_rs/kvm_sys/index.html | 7 +++++ kvm_rs/kvm_sys/sidebar-items.js | 1 + kvm_rs/kvm_sys/struct.kvm_dtable.html | 23 ++++++++++++++ kvm_rs/kvm_sys/struct.kvm_regs.html | 38 +++++++++++++++++++++++ kvm_rs/kvm_sys/struct.kvm_segment.html | 32 ++++++++++++++++++++ kvm_rs/kvm_sys/struct.kvm_sregs.html | 38 +++++++++++++++++++++++ kvm_rs/sidebar-items.js | 1 + kvm_rs/struct.PhysAddr.html | 15 +++++++++ kvm_rs/struct.UserMem.html | 29 ++++++++++++++++++ kvm_rs/vcpu/enum.KvmExit.html | 25 +++++++++++++++ kvm_rs/vcpu/index.html | 10 ++++++ kvm_rs/vcpu/sidebar-items.js | 1 + kvm_rs/vcpu/struct.Vcpu.html | 27 +++++++++++++++++ kvm_rs/vm/index.html | 8 +++++ kvm_rs/vm/sidebar-items.js | 1 + kvm_rs/vm/struct.Vm.html | 26 ++++++++++++++++ kvm_rs/x86_64/constant.CR0_AM.html | 8 +++++ kvm_rs/x86_64/constant.CR0_CD.html | 6 ++++ kvm_rs/x86_64/constant.CR0_EM.html | 8 +++++ kvm_rs/x86_64/constant.CR0_ET.html | 6 ++++ kvm_rs/x86_64/constant.CR0_MP.html | 6 ++++ kvm_rs/x86_64/constant.CR0_NE.html | 6 ++++ kvm_rs/x86_64/constant.CR0_NW.html | 6 ++++ kvm_rs/x86_64/constant.CR0_PE.html | 8 +++++ kvm_rs/x86_64/constant.CR0_PG.html | 7 +++++ kvm_rs/x86_64/constant.CR0_TS.html | 6 ++++ kvm_rs/x86_64/constant.CR0_WP.html | 7 +++++ kvm_rs/x86_64/constant.CR3_PAGE_BASE_MASK.html | 6 ++++ kvm_rs/x86_64/constant.CR3_PCD.html | 6 ++++ kvm_rs/x86_64/constant.CR3_PWT.html | 6 ++++ kvm_rs/x86_64/constant.CR4_LA57.html | 8 +++++ kvm_rs/x86_64/constant.CR4_PAE.html | 8 +++++ kvm_rs/x86_64/constant.EFER_LMA.html | 7 +++++ kvm_rs/x86_64/constant.EFER_LME.html | 7 +++++ kvm_rs/x86_64/constant.MSR_EFER.html | 8 +++++ kvm_rs/x86_64/constant.PAGE_ENTRY_PRESENT.html | 6 ++++ kvm_rs/x86_64/constant.PAGE_RENTRY_RW.html | 7 +++++ kvm_rs/x86_64/constant.RFLAGS_AC.html | 6 ++++ kvm_rs/x86_64/constant.RFLAGS_AF.html | 6 ++++ kvm_rs/x86_64/constant.RFLAGS_CF.html | 6 ++++ kvm_rs/x86_64/constant.RFLAGS_DF.html | 6 ++++ kvm_rs/x86_64/constant.RFLAGS_IF.html | 6 ++++ kvm_rs/x86_64/constant.RFLAGS_IOPL.html | 6 ++++ kvm_rs/x86_64/constant.RFLAGS_OF.html | 6 ++++ kvm_rs/x86_64/constant.RFLAGS_PF.html | 6 ++++ kvm_rs/x86_64/constant.RFLAGS_SF.html | 6 ++++ kvm_rs/x86_64/constant.RFLAGS_ZF.html | 6 ++++ kvm_rs/x86_64/constant.SEG_SELECTOR_INDEX.html | 8 +++++ kvm_rs/x86_64/constant.SEG_SELECTOR_RPL.html | 8 +++++ kvm_rs/x86_64/constant.SEG_SELECTOR_TI.html | 10 ++++++ kvm_rs/x86_64/fn.rflags_ac.html | 5 +++ kvm_rs/x86_64/fn.rflags_af.html | 5 +++ kvm_rs/x86_64/fn.rflags_cf.html | 5 +++ kvm_rs/x86_64/fn.rflags_df.html | 5 +++ kvm_rs/x86_64/fn.rflags_if.html | 5 +++ kvm_rs/x86_64/fn.rflags_iopl.html | 5 +++ kvm_rs/x86_64/fn.rflags_of.html | 5 +++ kvm_rs/x86_64/fn.rflags_pf.html | 5 +++ kvm_rs/x86_64/fn.rflags_sf.html | 5 +++ kvm_rs/x86_64/fn.rflags_zf.html | 5 +++ kvm_rs/x86_64/fn.seg_selector_index.html | 5 +++ kvm_rs/x86_64/fn.seg_selector_rpl.html | 5 +++ kvm_rs/x86_64/fn.seg_selector_ti.html | 5 +++ kvm_rs/x86_64/index.html | 42 ++++++++++++++++++++++++++ kvm_rs/x86_64/sidebar-items.js | 1 + 70 files changed, 669 insertions(+) create mode 100644 kvm_rs/all.html create mode 100644 kvm_rs/index.html create mode 100644 kvm_rs/kvm/index.html create mode 100644 kvm_rs/kvm/sidebar-items.js create mode 100644 kvm_rs/kvm/struct.Kvm.html create mode 100644 kvm_rs/kvm_sys/index.html create mode 100644 kvm_rs/kvm_sys/sidebar-items.js create mode 100644 kvm_rs/kvm_sys/struct.kvm_dtable.html create mode 100644 kvm_rs/kvm_sys/struct.kvm_regs.html create mode 100644 kvm_rs/kvm_sys/struct.kvm_segment.html create mode 100644 kvm_rs/kvm_sys/struct.kvm_sregs.html create mode 100644 kvm_rs/sidebar-items.js create mode 100644 kvm_rs/struct.PhysAddr.html create mode 100644 kvm_rs/struct.UserMem.html create mode 100644 kvm_rs/vcpu/enum.KvmExit.html create mode 100644 kvm_rs/vcpu/index.html create mode 100644 kvm_rs/vcpu/sidebar-items.js create mode 100644 kvm_rs/vcpu/struct.Vcpu.html create mode 100644 kvm_rs/vm/index.html create mode 100644 kvm_rs/vm/sidebar-items.js create mode 100644 kvm_rs/vm/struct.Vm.html create mode 100644 kvm_rs/x86_64/constant.CR0_AM.html create mode 100644 kvm_rs/x86_64/constant.CR0_CD.html create mode 100644 kvm_rs/x86_64/constant.CR0_EM.html create mode 100644 kvm_rs/x86_64/constant.CR0_ET.html create mode 100644 kvm_rs/x86_64/constant.CR0_MP.html create mode 100644 kvm_rs/x86_64/constant.CR0_NE.html create mode 100644 kvm_rs/x86_64/constant.CR0_NW.html create mode 100644 kvm_rs/x86_64/constant.CR0_PE.html create mode 100644 kvm_rs/x86_64/constant.CR0_PG.html create mode 100644 kvm_rs/x86_64/constant.CR0_TS.html create mode 100644 kvm_rs/x86_64/constant.CR0_WP.html create mode 100644 kvm_rs/x86_64/constant.CR3_PAGE_BASE_MASK.html create mode 100644 kvm_rs/x86_64/constant.CR3_PCD.html create mode 100644 kvm_rs/x86_64/constant.CR3_PWT.html create mode 100644 kvm_rs/x86_64/constant.CR4_LA57.html create mode 100644 kvm_rs/x86_64/constant.CR4_PAE.html create mode 100644 kvm_rs/x86_64/constant.EFER_LMA.html create mode 100644 kvm_rs/x86_64/constant.EFER_LME.html create mode 100644 kvm_rs/x86_64/constant.MSR_EFER.html create mode 100644 kvm_rs/x86_64/constant.PAGE_ENTRY_PRESENT.html create mode 100644 kvm_rs/x86_64/constant.PAGE_RENTRY_RW.html create mode 100644 kvm_rs/x86_64/constant.RFLAGS_AC.html create mode 100644 kvm_rs/x86_64/constant.RFLAGS_AF.html create mode 100644 kvm_rs/x86_64/constant.RFLAGS_CF.html create mode 100644 kvm_rs/x86_64/constant.RFLAGS_DF.html create mode 100644 kvm_rs/x86_64/constant.RFLAGS_IF.html create mode 100644 kvm_rs/x86_64/constant.RFLAGS_IOPL.html create mode 100644 kvm_rs/x86_64/constant.RFLAGS_OF.html create mode 100644 kvm_rs/x86_64/constant.RFLAGS_PF.html create mode 100644 kvm_rs/x86_64/constant.RFLAGS_SF.html create mode 100644 kvm_rs/x86_64/constant.RFLAGS_ZF.html create mode 100644 kvm_rs/x86_64/constant.SEG_SELECTOR_INDEX.html create mode 100644 kvm_rs/x86_64/constant.SEG_SELECTOR_RPL.html create mode 100644 kvm_rs/x86_64/constant.SEG_SELECTOR_TI.html create mode 100644 kvm_rs/x86_64/fn.rflags_ac.html create mode 100644 kvm_rs/x86_64/fn.rflags_af.html create mode 100644 kvm_rs/x86_64/fn.rflags_cf.html create mode 100644 kvm_rs/x86_64/fn.rflags_df.html create mode 100644 kvm_rs/x86_64/fn.rflags_if.html create mode 100644 kvm_rs/x86_64/fn.rflags_iopl.html create mode 100644 kvm_rs/x86_64/fn.rflags_of.html create mode 100644 kvm_rs/x86_64/fn.rflags_pf.html create mode 100644 kvm_rs/x86_64/fn.rflags_sf.html create mode 100644 kvm_rs/x86_64/fn.rflags_zf.html create mode 100644 kvm_rs/x86_64/fn.seg_selector_index.html create mode 100644 kvm_rs/x86_64/fn.seg_selector_rpl.html create mode 100644 kvm_rs/x86_64/fn.seg_selector_ti.html create mode 100644 kvm_rs/x86_64/index.html create mode 100644 kvm_rs/x86_64/sidebar-items.js (limited to 'kvm_rs') diff --git a/kvm_rs/all.html b/kvm_rs/all.html new file mode 100644 index 0000000..994beeb --- /dev/null +++ b/kvm_rs/all.html @@ -0,0 +1,7 @@ +List of all items in this crate + +

List of all items[] + +

Structs

Enums

Functions

Constants

+ \ No newline at end of file diff --git a/kvm_rs/index.html b/kvm_rs/index.html new file mode 100644 index 0000000..7917f4b --- /dev/null +++ b/kvm_rs/index.html @@ -0,0 +1,14 @@ +kvm_rs - Rust + +

Crate kvm_rs[][src]

Modules

+
kvm

KVM system ioctls.

+
kvm_sys

Definitions of the system header <linux/kvm.h>.

+
vcpu

VCPU system ioctls.

+
vm

VM system ioctls.

+
x86_64

x86_64 flags and bitfields.

+

Structs

+
PhysAddr

Strong type representing physical addresses.

+
UserMem

Wrapper to safely allocate memory for guest VMs.

+
+ \ No newline at end of file diff --git a/kvm_rs/kvm/index.html b/kvm_rs/kvm/index.html new file mode 100644 index 0000000..862e672 --- /dev/null +++ b/kvm_rs/kvm/index.html @@ -0,0 +1,8 @@ +kvm_rs::kvm - Rust + +

Module kvm_rs::kvm[][src]

KVM system ioctls.

+

Structs

+
Kvm

Wrapper for /dev/kvm ioctls.

+
+ \ No newline at end of file diff --git a/kvm_rs/kvm/sidebar-items.js b/kvm_rs/kvm/sidebar-items.js new file mode 100644 index 0000000..d00bbd2 --- /dev/null +++ b/kvm_rs/kvm/sidebar-items.js @@ -0,0 +1 @@ +initSidebarItems({"struct":[["Kvm","Wrapper for `/dev/kvm` ioctls."]]}); \ No newline at end of file diff --git a/kvm_rs/kvm/struct.Kvm.html b/kvm_rs/kvm/struct.Kvm.html new file mode 100644 index 0000000..abd62f2 --- /dev/null +++ b/kvm_rs/kvm/struct.Kvm.html @@ -0,0 +1,20 @@ +kvm_rs::kvm::Kvm - Rust + +

Struct kvm_rs::kvm::Kvm[][src]

pub struct Kvm { /* fields omitted */ }

Wrapper for /dev/kvm ioctls.

+

Representation of the file descriptor obtained by opening /dev/kvm. +This wrapper provides access to the system ioctls as described in KVM API.

+

Implementations

impl Kvm[src]

pub fn new() -> Result<Kvm>[src]

Open the /dev/kvm device.

+

pub fn create_vm(&self) -> Result<Vm>[src]

Create a new virtual machine with the KVM_CREATE_VM ioctl. +Returns a wrapper vm::Vm representing the VM.

+

Auto Trait Implementations

impl RefUnwindSafe for Kvm

impl Send for Kvm

impl Sync for Kvm

impl Unpin for Kvm

impl UnwindSafe for Kvm

Blanket Implementations

impl<T> Any for T where
    T: 'static + ?Sized
[src]

impl<T> Borrow<T> for T where
    T: ?Sized
[src]

impl<T> BorrowMut<T> for T where
    T: ?Sized
[src]

impl<T> From<T> for T[src]

impl<T, U> Into<U> for T where
    U: From<T>, 
[src]

impl<T, U> TryFrom<U> for T where
    U: Into<T>, 
[src]

type Error = Infallible

The type returned in the event of a conversion error.

+

impl<T, U> TryInto<U> for T where
    U: TryFrom<T>, 
[src]

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.

+
+ \ No newline at end of file diff --git a/kvm_rs/kvm_sys/index.html b/kvm_rs/kvm_sys/index.html new file mode 100644 index 0000000..c96bef4 --- /dev/null +++ b/kvm_rs/kvm_sys/index.html @@ -0,0 +1,7 @@ +kvm_rs::kvm_sys - Rust + +

Module kvm_rs::kvm_sys[][src]

Definitions of the system header <linux/kvm.h>.

+

Structs

+
kvm_dtable
kvm_regs
kvm_segment
kvm_sregs
+ \ No newline at end of file diff --git a/kvm_rs/kvm_sys/sidebar-items.js b/kvm_rs/kvm_sys/sidebar-items.js new file mode 100644 index 0000000..383be42 --- /dev/null +++ b/kvm_rs/kvm_sys/sidebar-items.js @@ -0,0 +1 @@ +initSidebarItems({"struct":[["kvm_dtable",""],["kvm_regs",""],["kvm_segment",""],["kvm_sregs",""]]}); \ No newline at end of file diff --git a/kvm_rs/kvm_sys/struct.kvm_dtable.html b/kvm_rs/kvm_sys/struct.kvm_dtable.html new file mode 100644 index 0000000..600741d --- /dev/null +++ b/kvm_rs/kvm_sys/struct.kvm_dtable.html @@ -0,0 +1,23 @@ +kvm_rs::kvm_sys::kvm_dtable - Rust + +

Struct kvm_rs::kvm_sys::kvm_dtable[][src]

#[repr(C)]pub struct kvm_dtable {
+    pub base: u64,
+    pub limit: u16,
+    // some fields omitted
+}

+ Fields

base: u64limit: u16

Trait Implementations

impl Debug for kvm_dtable[src]

impl Default for kvm_dtable[src]

impl Display for kvm_dtable[src]

Auto Trait Implementations

Blanket Implementations

impl<T> Any for T where
    T: 'static + ?Sized
[src]

impl<T> Borrow<T> for T where
    T: ?Sized
[src]

impl<T> BorrowMut<T> for T where
    T: ?Sized
[src]

impl<T> From<T> for T[src]

impl<T, U> Into<U> for T where
    U: From<T>, 
[src]

impl<T> ToString for T where
    T: Display + ?Sized
[src]

impl<T, U> TryFrom<U> for T where
    U: Into<T>, 
[src]

type Error = Infallible

The type returned in the event of a conversion error.

+

impl<T, U> TryInto<U> for T where
    U: TryFrom<T>, 
[src]

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.

+
+ \ No newline at end of file diff --git a/kvm_rs/kvm_sys/struct.kvm_regs.html b/kvm_rs/kvm_sys/struct.kvm_regs.html new file mode 100644 index 0000000..78e8adc --- /dev/null +++ b/kvm_rs/kvm_sys/struct.kvm_regs.html @@ -0,0 +1,38 @@ +kvm_rs::kvm_sys::kvm_regs - Rust + +

Struct kvm_rs::kvm_sys::kvm_regs[][src]

#[repr(C)]pub struct kvm_regs {
+    pub rax: u64,
+    pub rbx: u64,
+    pub rcx: u64,
+    pub rdx: u64,
+    pub rsi: u64,
+    pub rdi: u64,
+    pub rsp: u64,
+    pub rbp: u64,
+    pub r8: u64,
+    pub r9: u64,
+    pub r10: u64,
+    pub r11: u64,
+    pub r12: u64,
+    pub r13: u64,
+    pub r14: u64,
+    pub r15: u64,
+    pub rip: u64,
+    pub rflags: u64,
+}

+ Fields

rax: u64rbx: u64rcx: u64rdx: u64rsi: u64rdi: u64rsp: u64rbp: u64r8: u64r9: u64r10: u64r11: u64r12: u64r13: u64r14: u64r15: u64rip: u64rflags: u64

Trait Implementations

impl Debug for kvm_regs[src]

impl Default for kvm_regs[src]

impl Display for kvm_regs[src]

Auto Trait Implementations

Blanket Implementations

impl<T> Any for T where
    T: 'static + ?Sized
[src]

impl<T> Borrow<T> for T where
    T: ?Sized
[src]

impl<T> BorrowMut<T> for T where
    T: ?Sized
[src]

impl<T> From<T> for T[src]

impl<T, U> Into<U> for T where
    U: From<T>, 
[src]

impl<T> ToString for T where
    T: Display + ?Sized
[src]

impl<T, U> TryFrom<U> for T where
    U: Into<T>, 
[src]

type Error = Infallible

The type returned in the event of a conversion error.

+

impl<T, U> TryInto<U> for T where
    U: TryFrom<T>, 
[src]

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.

+
+ \ No newline at end of file diff --git a/kvm_rs/kvm_sys/struct.kvm_segment.html b/kvm_rs/kvm_sys/struct.kvm_segment.html new file mode 100644 index 0000000..f7eb7a0 --- /dev/null +++ b/kvm_rs/kvm_sys/struct.kvm_segment.html @@ -0,0 +1,32 @@ +kvm_rs::kvm_sys::kvm_segment - Rust + +

Struct kvm_rs::kvm_sys::kvm_segment[][src]

#[repr(C)]pub struct kvm_segment {
+    pub base: u64,
+    pub limit: u32,
+    pub selector: u16,
+    pub type_: u8,
+    pub present: u8,
+    pub dpl: u8,
+    pub db: u8,
+    pub s: u8,
+    pub l: u8,
+    pub g: u8,
+    pub avl: u8,
+    // some fields omitted
+}

+ Fields

base: u64limit: u32selector: u16type_: u8present: u8dpl: u8db: u8s: u8l: u8g: u8avl: u8

Trait Implementations

impl Debug for kvm_segment[src]

impl Default for kvm_segment[src]

impl Display for kvm_segment[src]

Auto Trait Implementations

Blanket Implementations

impl<T> Any for T where
    T: 'static + ?Sized
[src]

impl<T> Borrow<T> for T where
    T: ?Sized
[src]

impl<T> BorrowMut<T> for T where
    T: ?Sized
[src]

impl<T> From<T> for T[src]

impl<T, U> Into<U> for T where
    U: From<T>, 
[src]

impl<T> ToString for T where
    T: Display + ?Sized
[src]

impl<T, U> TryFrom<U> for T where
    U: Into<T>, 
[src]

type Error = Infallible

The type returned in the event of a conversion error.

+

impl<T, U> TryInto<U> for T where
    U: TryFrom<T>, 
[src]

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.

+
+ \ No newline at end of file diff --git a/kvm_rs/kvm_sys/struct.kvm_sregs.html b/kvm_rs/kvm_sys/struct.kvm_sregs.html new file mode 100644 index 0000000..9a45d40 --- /dev/null +++ b/kvm_rs/kvm_sys/struct.kvm_sregs.html @@ -0,0 +1,38 @@ +kvm_rs::kvm_sys::kvm_sregs - Rust + +

Struct kvm_rs::kvm_sys::kvm_sregs[][src]

#[repr(C)]pub struct kvm_sregs {
+    pub cs: kvm_segment,
+    pub ds: kvm_segment,
+    pub es: kvm_segment,
+    pub fs: kvm_segment,
+    pub gs: kvm_segment,
+    pub ss: kvm_segment,
+    pub tr: kvm_segment,
+    pub ldt: kvm_segment,
+    pub gdt: kvm_dtable,
+    pub idt: kvm_dtable,
+    pub cr0: u64,
+    pub cr2: u64,
+    pub cr3: u64,
+    pub cr4: u64,
+    pub cr8: u64,
+    pub efer: u64,
+    pub apic_base: u64,
+    pub interrupt_bitmap: [u64; 4],
+}

+ Fields

cs: kvm_segmentds: kvm_segmentes: kvm_segmentfs: kvm_segmentgs: kvm_segmentss: kvm_segmenttr: kvm_segmentldt: kvm_segmentgdt: kvm_dtableidt: kvm_dtablecr0: u64cr2: u64cr3: u64cr4: u64cr8: u64efer: u64apic_base: u64interrupt_bitmap: [u64; 4]

Trait Implementations

impl Debug for kvm_sregs[src]

impl Default for kvm_sregs[src]

impl Display for kvm_sregs[src]

Auto Trait Implementations

Blanket Implementations

impl<T> Any for T where
    T: 'static + ?Sized
[src]

impl<T> Borrow<T> for T where
    T: ?Sized
[src]

impl<T> BorrowMut<T> for T where
    T: ?Sized
[src]

impl<T> From<T> for T[src]

impl<T, U> Into<U> for T where
    U: From<T>, 
[src]

impl<T> ToString for T where
    T: Display + ?Sized
[src]

impl<T, U> TryFrom<U> for T where
    U: Into<T>, 
[src]

type Error = Infallible

The type returned in the event of a conversion error.

+

impl<T, U> TryInto<U> for T where
    U: TryFrom<T>, 
[src]

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.

+
+ \ No newline at end of file diff --git a/kvm_rs/sidebar-items.js b/kvm_rs/sidebar-items.js new file mode 100644 index 0000000..b1bd5bb --- /dev/null +++ b/kvm_rs/sidebar-items.js @@ -0,0 +1 @@ +initSidebarItems({"mod":[["kvm","KVM system ioctls."],["kvm_sys","Definitions of the system header ``."],["vcpu","VCPU system ioctls."],["vm","VM system ioctls."],["x86_64","`x86_64` flags and bitfields."]],"struct":[["PhysAddr","Strong type representing physical addresses."],["UserMem","Wrapper to safely allocate memory for guest VMs."]]}); \ No newline at end of file diff --git a/kvm_rs/struct.PhysAddr.html b/kvm_rs/struct.PhysAddr.html new file mode 100644 index 0000000..5fb8083 --- /dev/null +++ b/kvm_rs/struct.PhysAddr.html @@ -0,0 +1,15 @@ +kvm_rs::PhysAddr - Rust + +

Struct kvm_rs::PhysAddr[][src]

pub struct PhysAddr(pub u64);

Strong type representing physical addresses.

+

Auto Trait Implementations

Blanket Implementations

impl<T> Any for T where
    T: 'static + ?Sized
[src]

impl<T> Borrow<T> for T where
    T: ?Sized
[src]

impl<T> BorrowMut<T> for T where
    T: ?Sized
[src]

impl<T> From<T> for T[src]

impl<T, U> Into<U> for T where
    U: From<T>, 
[src]

impl<T, U> TryFrom<U> for T where
    U: Into<T>, 
[src]

type Error = Infallible

The type returned in the event of a conversion error.

+

impl<T, U> TryInto<U> for T where
    U: TryFrom<T>, 
[src]

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.

+
+ \ No newline at end of file diff --git a/kvm_rs/struct.UserMem.html b/kvm_rs/struct.UserMem.html new file mode 100644 index 0000000..92ec687 --- /dev/null +++ b/kvm_rs/struct.UserMem.html @@ -0,0 +1,29 @@ +kvm_rs::UserMem - Rust + +

Struct kvm_rs::UserMem[][src]

pub struct UserMem { /* fields omitted */ }

Wrapper to safely allocate memory for guest VMs.

+

The underlying memory is freed automatically once the UserMem instance is dropped.

+

Memory can be mapped into a guest VM with +Vm::set_user_memory_region.

+

Implementations

impl UserMem[src]

pub fn new(len: usize) -> Result<UserMem>[src]

Allocate a zero-initialized memory region of len bytes.

+

pub fn with_init(len: usize, init_from: &[u8]) -> Result<UserMem>[src]

Allocate a zero-initialized memory region of len bytes and initialize the first bytes +with init_from.

+

Panics

+

Panics if init_from is larger than the memory size len.

+

pub fn load(&mut self, addr: PhysAddr, data: &[u8])[src]

Load the bytes stored in data into memory at physical address addr.

+

Panics

+

Panics if addr + data.len is larger than the memory size len.

+

Trait Implementations

impl AsMut<[u8]> for UserMem[src]

impl AsRef<[u8]> for UserMem[src]

impl Drop for UserMem[src]

fn drop(&mut self)[src]

Free underlying memory.

+

Auto Trait Implementations

impl RefUnwindSafe for UserMem

impl !Send for UserMem

impl !Sync for UserMem

impl Unpin for UserMem

impl UnwindSafe for UserMem

Blanket Implementations

impl<T> Any for T where
    T: 'static + ?Sized
[src]

impl<T> Borrow<T> for T where
    T: ?Sized
[src]

impl<T> BorrowMut<T> for T where
    T: ?Sized
[src]

impl<T> From<T> for T[src]

impl<T, U> Into<U> for T where
    U: From<T>, 
[src]

impl<T, U> TryFrom<U> for T where
    U: Into<T>, 
[src]

type Error = Infallible

The type returned in the event of a conversion error.

+

impl<T, U> TryInto<U> for T where
    U: TryFrom<T>, 
[src]

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.

+
+ \ No newline at end of file diff --git a/kvm_rs/vcpu/enum.KvmExit.html b/kvm_rs/vcpu/enum.KvmExit.html new file mode 100644 index 0000000..42e3c04 --- /dev/null +++ b/kvm_rs/vcpu/enum.KvmExit.html @@ -0,0 +1,25 @@ +kvm_rs::vcpu::KvmExit - Rust + +

Enum kvm_rs::vcpu::KvmExit[][src]

pub enum KvmExit<'cpu> {
+    Halt,
+    IoIn(u16&'cpu mut [u8]),
+    IoOut(u16&'cpu [u8]),
+    MmioRead(u64&'cpu mut [u8]),
+    MmioWrite(u64&'cpu [u8]),
+}

Exit reasons for the Vcpu::kvm_run function.

+

Details for the different exit reasons can be found in the kvm_run +structure description.

+

+ Variants

+
Halt
IoOut(u16&'cpu [u8])
MmioRead(u64&'cpu mut [u8])
MmioWrite(u64&'cpu [u8])

Auto Trait Implementations

impl<'cpu> RefUnwindSafe for KvmExit<'cpu>

impl<'cpu> Send for KvmExit<'cpu>

impl<'cpu> Sync for KvmExit<'cpu>

impl<'cpu> Unpin for KvmExit<'cpu>

impl<'cpu> !UnwindSafe for KvmExit<'cpu>

Blanket Implementations

impl<T> Any for T where
    T: 'static + ?Sized
[src]

impl<T> Borrow<T> for T where
    T: ?Sized
[src]

impl<T> BorrowMut<T> for T where
    T: ?Sized
[src]

impl<T> From<T> for T[src]

impl<T, U> Into<U> for T where
    U: From<T>, 
[src]

impl<T, U> TryFrom<U> for T where
    U: Into<T>, 
[src]

type Error = Infallible

The type returned in the event of a conversion error.

+

impl<T, U> TryInto<U> for T where
    U: TryFrom<T>, 
[src]

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.

+
+ \ No newline at end of file diff --git a/kvm_rs/vcpu/index.html b/kvm_rs/vcpu/index.html new file mode 100644 index 0000000..571bab9 --- /dev/null +++ b/kvm_rs/vcpu/index.html @@ -0,0 +1,10 @@ +kvm_rs::vcpu - Rust + +

Module kvm_rs::vcpu[][src]

VCPU system ioctls.

+

Structs

+
Vcpu

Wrapper for VCPU ioctls.

+

Enums

+
KvmExit

Exit reasons for the Vcpu::kvm_run function.

+
+ \ No newline at end of file diff --git a/kvm_rs/vcpu/sidebar-items.js b/kvm_rs/vcpu/sidebar-items.js new file mode 100644 index 0000000..564790f --- /dev/null +++ b/kvm_rs/vcpu/sidebar-items.js @@ -0,0 +1 @@ +initSidebarItems({"enum":[["KvmExit","Exit reasons for the [`Vcpu::kvm_run`][crate::vcpu::Vcpu::kvm_run] function."]],"struct":[["Vcpu","Wrapper for VCPU ioctls."]]}); \ No newline at end of file diff --git a/kvm_rs/vcpu/struct.Vcpu.html b/kvm_rs/vcpu/struct.Vcpu.html new file mode 100644 index 0000000..698abb1 --- /dev/null +++ b/kvm_rs/vcpu/struct.Vcpu.html @@ -0,0 +1,27 @@ +kvm_rs::vcpu::Vcpu - Rust + +

Struct kvm_rs::vcpu::Vcpu[][src]

pub struct Vcpu { /* fields omitted */ }

Wrapper for VCPU ioctls.

+

Representation of the file descriptor obtained by the KVM_CREATE_VCPU ioctl. +This wrapper provides access to the VCPU ioctls as described in KVM API.

+

Implementations

impl Vcpu[src]

pub fn get_regs(&self) -> Result<kvm_regs>[src]

Get the general purpose registers with the KVM_GET_REGS ioctl in form of +kvm_regs.

+

pub fn set_regs(&self, regs: kvm_regs) -> Result<()>[src]

Set the general purpose registers with the KVM_SET_REGS ioctl in form of +kvm_regs.

+

pub fn get_sregs(&self) -> Result<kvm_sregs>[src]

Get the special registers with the KVM_GET_SREGS ioctl in form of +kvm_sregs.

+

pub fn set_sregs(&self, sregs: kvm_sregs) -> Result<()>[src]

Set the special registers with the KVM_SET_SREGS ioctl in form of +kvm_sregs.

+

pub fn run(&mut self) -> Result<KvmExit<'_>>[src]

Run the guest VCPU with the KVM_RUN ioctl until it exits with one of the exit +reasons described in KvmExit.

+

Auto Trait Implementations

impl RefUnwindSafe for Vcpu

impl !Send for Vcpu

impl !Sync for Vcpu

impl Unpin for Vcpu

impl UnwindSafe for Vcpu

Blanket Implementations

impl<T> Any for T where
    T: 'static + ?Sized
[src]

impl<T> Borrow<T> for T where
    T: ?Sized
[src]

impl<T> BorrowMut<T> for T where
    T: ?Sized
[src]

impl<T> From<T> for T[src]

impl<T, U> Into<U> for T where
    U: From<T>, 
[src]

impl<T, U> TryFrom<U> for T where
    U: Into<T>, 
[src]

type Error = Infallible

The type returned in the event of a conversion error.

+

impl<T, U> TryInto<U> for T where
    U: TryFrom<T>, 
[src]

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.

+
+ \ No newline at end of file diff --git a/kvm_rs/vm/index.html b/kvm_rs/vm/index.html new file mode 100644 index 0000000..bb81e37 --- /dev/null +++ b/kvm_rs/vm/index.html @@ -0,0 +1,8 @@ +kvm_rs::vm - Rust + +

Module kvm_rs::vm[][src]

VM system ioctls.

+

Structs

+
Vm

Wrapper for VM ioctls.

+
+ \ No newline at end of file diff --git a/kvm_rs/vm/sidebar-items.js b/kvm_rs/vm/sidebar-items.js new file mode 100644 index 0000000..158eaf3 --- /dev/null +++ b/kvm_rs/vm/sidebar-items.js @@ -0,0 +1 @@ +initSidebarItems({"struct":[["Vm","Wrapper for VM ioctls."]]}); \ No newline at end of file diff --git a/kvm_rs/vm/struct.Vm.html b/kvm_rs/vm/struct.Vm.html new file mode 100644 index 0000000..6c165a6 --- /dev/null +++ b/kvm_rs/vm/struct.Vm.html @@ -0,0 +1,26 @@ +kvm_rs::vm::Vm - Rust + +

Struct kvm_rs::vm::Vm[][src]

pub struct Vm { /* fields omitted */ }

Wrapper for VM ioctls.

+

Representation of the file descriptor obtained by the KVM_CREATE_VM ioctl. +This wrapper provides access to the VM ioctls as described in KVM API.

+

Implementations

impl Vm[src]

pub unsafe fn set_user_memory_region(
    &self,
    phys_addr: PhysAddr,
    mem: &UserMem
) -> Result<()>
[src]

Map memory from userspace into the VM as guest physical memory starting at address +phys_addr. +The underlying operation is the [KVM_SET_USER_MEMORY_REGION][kmv-set-user-memory-region] +ioctl.

+

Safety

+

The mem: &UserMem argument passed to this function must at least live as long the Vcpu +instance.

+

pub fn create_vpcu(&self, id: u64) -> Result<Vcpu>[src]

Create a new virtual cpu with the KVM_CREATE_VCPU ioctl. +Returns a wrapper vcpu::Vcpu representing the VCPU.

+

Auto Trait Implementations

impl RefUnwindSafe for Vm

impl Send for Vm

impl Sync for Vm

impl Unpin for Vm

impl UnwindSafe for Vm

Blanket Implementations

impl<T> Any for T where
    T: 'static + ?Sized
[src]

impl<T> Borrow<T> for T where
    T: ?Sized
[src]

impl<T> BorrowMut<T> for T where
    T: ?Sized
[src]

impl<T> From<T> for T[src]

impl<T, U> Into<U> for T where
    U: From<T>, 
[src]

impl<T, U> TryFrom<U> for T where
    U: Into<T>, 
[src]

type Error = Infallible

The type returned in the event of a conversion error.

+

impl<T, U> TryInto<U> for T where
    U: TryFrom<T>, 
[src]

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR0_AM.html b/kvm_rs/x86_64/constant.CR0_AM.html new file mode 100644 index 0000000..7880ede --- /dev/null +++ b/kvm_rs/x86_64/constant.CR0_AM.html @@ -0,0 +1,8 @@ +kvm_rs::x86_64::CR0_AM - Rust + +

Constant kvm_rs::x86_64::CR0_AM[][src]

pub const CR0_AM: u64 = 1 << 18; // 0x0_000_000_000_040_000u64

Alignment Mask.

+

Enables alignment check for CPL=3, check is only done if the AC +bit of the rflags register ist set.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR0_CD.html b/kvm_rs/x86_64/constant.CR0_CD.html new file mode 100644 index 0000000..7d6d08f --- /dev/null +++ b/kvm_rs/x86_64/constant.CR0_CD.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::CR0_CD - Rust + +

Constant kvm_rs::x86_64::CR0_CD[][src]

pub const CR0_CD: u64 = 1 << 30; // 0x0_000_000_040_000_000u64

Cachine disable.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR0_EM.html b/kvm_rs/x86_64/constant.CR0_EM.html new file mode 100644 index 0000000..1e6cf28 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR0_EM.html @@ -0,0 +1,8 @@ +kvm_rs::x86_64::CR0_EM - Rust + +

Constant kvm_rs::x86_64::CR0_EM[][src]

pub const CR0_EM: u64 = 1 << 2; // 0x0_000_000_000_000_004u64

Emulation.

+

When set indicates the process does not have a FPU. FPU instructions will generate an exception +that software can emulate the instruction.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR0_ET.html b/kvm_rs/x86_64/constant.CR0_ET.html new file mode 100644 index 0000000..20d6386 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR0_ET.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::CR0_ET - Rust + +

Constant kvm_rs::x86_64::CR0_ET[][src]

pub const CR0_ET: u64 = 1 << 4; // 0x0_000_000_000_000_010u64

Extension Type.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR0_MP.html b/kvm_rs/x86_64/constant.CR0_MP.html new file mode 100644 index 0000000..2fcffd3 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR0_MP.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::CR0_MP - Rust + +

Constant kvm_rs::x86_64::CR0_MP[][src]

pub const CR0_MP: u64 = 1 << 1; // 0x0_000_000_000_000_002u64

Monitor Coprocessor.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR0_NE.html b/kvm_rs/x86_64/constant.CR0_NE.html new file mode 100644 index 0000000..55c2409 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR0_NE.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::CR0_NE - Rust + +

Constant kvm_rs::x86_64::CR0_NE[][src]

pub const CR0_NE: u64 = 1 << 5; // 0x0_000_000_000_000_020u64

Numeric Error.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR0_NW.html b/kvm_rs/x86_64/constant.CR0_NW.html new file mode 100644 index 0000000..b561962 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR0_NW.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::CR0_NW - Rust + +

Constant kvm_rs::x86_64::CR0_NW[][src]

pub const CR0_NW: u64 = 1 << 29; // 0x0_000_000_020_000_000u64

Not Write-Torugh.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR0_PE.html b/kvm_rs/x86_64/constant.CR0_PE.html new file mode 100644 index 0000000..ccb1921 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR0_PE.html @@ -0,0 +1,8 @@ +kvm_rs::x86_64::CR0_PE - Rust + +

Constant kvm_rs::x86_64::CR0_PE[][src]

pub const CR0_PE: u64 = 1 << 0; // 0x0_000_000_000_000_001u64

Protection Enable.

+

Enables protected mode when set and real-address mode when cleared. This enables +segment-level protection not paging.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR0_PG.html b/kvm_rs/x86_64/constant.CR0_PG.html new file mode 100644 index 0000000..763f7e0 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR0_PG.html @@ -0,0 +1,7 @@ +kvm_rs::x86_64::CR0_PG - Rust + +

Constant kvm_rs::x86_64::CR0_PG[][src]

pub const CR0_PG: u64 = 1 << 31; // 0x0_000_000_080_000_000u64

Paging.

+

Enables paging when set, requires CR0_PE to be set as well.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR0_TS.html b/kvm_rs/x86_64/constant.CR0_TS.html new file mode 100644 index 0000000..6bb6377 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR0_TS.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::CR0_TS - Rust + +

Constant kvm_rs::x86_64::CR0_TS[][src]

pub const CR0_TS: u64 = 1 << 3; // 0x0_000_000_000_000_008u64

Task Switched.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR0_WP.html b/kvm_rs/x86_64/constant.CR0_WP.html new file mode 100644 index 0000000..8628545 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR0_WP.html @@ -0,0 +1,7 @@ +kvm_rs::x86_64::CR0_WP - Rust + +

Constant kvm_rs::x86_64::CR0_WP[][src]

pub const CR0_WP: u64 = 1 << 16; // 0x0_000_000_000_010_000u64

Write Protect.

+

When set supervisor-level procedures can’t write to read-only pages.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR3_PAGE_BASE_MASK.html b/kvm_rs/x86_64/constant.CR3_PAGE_BASE_MASK.html new file mode 100644 index 0000000..986f1ed --- /dev/null +++ b/kvm_rs/x86_64/constant.CR3_PAGE_BASE_MASK.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::CR3_PAGE_BASE_MASK - Rust + +

Constant kvm_rs::x86_64::CR3_PAGE_BASE_MASK[][src]

pub const CR3_PAGE_BASE_MASK: u64 = 0xffff_ffff_ffff_0000;

Mask for physical base address of paging structure.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR3_PCD.html b/kvm_rs/x86_64/constant.CR3_PCD.html new file mode 100644 index 0000000..cf704b0 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR3_PCD.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::CR3_PCD - Rust + +

Constant kvm_rs::x86_64::CR3_PCD[][src]

pub const CR3_PCD: u64 = 1 << 4; // 0x0_000_000_000_000_010u64

Page-level Cache Disable.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR3_PWT.html b/kvm_rs/x86_64/constant.CR3_PWT.html new file mode 100644 index 0000000..d20bd52 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR3_PWT.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::CR3_PWT - Rust + +

Constant kvm_rs::x86_64::CR3_PWT[][src]

pub const CR3_PWT: u64 = 1 << 3; // 0x0_000_000_000_000_008u64

Page-level Write-Through.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR4_LA57.html b/kvm_rs/x86_64/constant.CR4_LA57.html new file mode 100644 index 0000000..d66d363 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR4_LA57.html @@ -0,0 +1,8 @@ +kvm_rs::x86_64::CR4_LA57 - Rust + +

Constant kvm_rs::x86_64::CR4_LA57[][src]

pub const CR4_LA57: u64 = 1 << 5; // 0x0_000_000_000_000_020u64

57-bit Linear Addresses.

+

When set in long mode enables 5-level paging to translate 57-bit linear addresses. When +cleared use 4-level paging to translate 48-bit linear addresses.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR4_PAE.html b/kvm_rs/x86_64/constant.CR4_PAE.html new file mode 100644 index 0000000..efd56b4 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR4_PAE.html @@ -0,0 +1,8 @@ +kvm_rs::x86_64::CR4_PAE - Rust + +

Constant kvm_rs::x86_64::CR4_PAE[][src]

pub const CR4_PAE: u64 = 1 << 5; // 0x0_000_000_000_000_020u64

Physical Address Extenstion.

+

When set enables paging to produce physicall addresses with more than 32 bits. Required before +entering long mode.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.EFER_LMA.html b/kvm_rs/x86_64/constant.EFER_LMA.html new file mode 100644 index 0000000..e16f93b --- /dev/null +++ b/kvm_rs/x86_64/constant.EFER_LMA.html @@ -0,0 +1,7 @@ +kvm_rs::x86_64::EFER_LMA - Rust + +

Constant kvm_rs::x86_64::EFER_LMA[][src]

pub const EFER_LMA: u64 = 1 << 10; // 0x0_000_000_000_000_400u64

Long Mode Active (readonly).

+

When set indicates long mode is active.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.EFER_LME.html b/kvm_rs/x86_64/constant.EFER_LME.html new file mode 100644 index 0000000..ec81586 --- /dev/null +++ b/kvm_rs/x86_64/constant.EFER_LME.html @@ -0,0 +1,7 @@ +kvm_rs::x86_64::EFER_LME - Rust + +

Constant kvm_rs::x86_64::EFER_LME[][src]

pub const EFER_LME: u64 = 1 << 8; // 0x0_000_000_000_000_100u64

Long Mode Enable.

+

When set enables long mode operations.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.MSR_EFER.html b/kvm_rs/x86_64/constant.MSR_EFER.html new file mode 100644 index 0000000..91f1128 --- /dev/null +++ b/kvm_rs/x86_64/constant.MSR_EFER.html @@ -0,0 +1,8 @@ +kvm_rs::x86_64::MSR_EFER - Rust + +

Constant kvm_rs::x86_64::MSR_EFER[][src]

pub const MSR_EFER: u64 = 0xc000_0080;

Extended Feature Enable Register MSR number.

+

MSR number used with the rdmsr and wrmsr instructions to read/write the +EFER model specific register.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.PAGE_ENTRY_PRESENT.html b/kvm_rs/x86_64/constant.PAGE_ENTRY_PRESENT.html new file mode 100644 index 0000000..6802305 --- /dev/null +++ b/kvm_rs/x86_64/constant.PAGE_ENTRY_PRESENT.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::PAGE_ENTRY_PRESENT - Rust + +

Constant kvm_rs::x86_64::PAGE_ENTRY_PRESENT[][src]

pub const PAGE_ENTRY_PRESENT: u64 = 1 << 0; // 0x0_000_000_000_000_001u64

Page entry present.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.PAGE_RENTRY_RW.html b/kvm_rs/x86_64/constant.PAGE_RENTRY_RW.html new file mode 100644 index 0000000..5719909 --- /dev/null +++ b/kvm_rs/x86_64/constant.PAGE_RENTRY_RW.html @@ -0,0 +1,7 @@ +kvm_rs::x86_64::PAGE_RENTRY_RW - Rust + +

Constant kvm_rs::x86_64::PAGE_RENTRY_RW[][src]

pub const PAGE_RENTRY_RW: u64 = 1 << 1; // 0x0_000_000_000_000_002u64

Page region read/write.

+

If set, region reference by paging entry is writeable.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.RFLAGS_AC.html b/kvm_rs/x86_64/constant.RFLAGS_AC.html new file mode 100644 index 0000000..94d81cc --- /dev/null +++ b/kvm_rs/x86_64/constant.RFLAGS_AC.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::RFLAGS_AC - Rust + +

Constant kvm_rs::x86_64::RFLAGS_AC[][src]

pub const RFLAGS_AC: u64 = 1 << 18; // 0x0_000_000_000_040_000u64

Alignment check.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.RFLAGS_AF.html b/kvm_rs/x86_64/constant.RFLAGS_AF.html new file mode 100644 index 0000000..50f8b7f --- /dev/null +++ b/kvm_rs/x86_64/constant.RFLAGS_AF.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::RFLAGS_AF - Rust + +

Constant kvm_rs::x86_64::RFLAGS_AF[][src]

pub const RFLAGS_AF: u64 = 1 << 4; // 0x0_000_000_000_000_010u64

Adjust flag.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.RFLAGS_CF.html b/kvm_rs/x86_64/constant.RFLAGS_CF.html new file mode 100644 index 0000000..cdb9287 --- /dev/null +++ b/kvm_rs/x86_64/constant.RFLAGS_CF.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::RFLAGS_CF - Rust + +

Constant kvm_rs::x86_64::RFLAGS_CF[][src]

pub const RFLAGS_CF: u64 = 1 << 0; // 0x0_000_000_000_000_001u64

Carry flag.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.RFLAGS_DF.html b/kvm_rs/x86_64/constant.RFLAGS_DF.html new file mode 100644 index 0000000..59bbb8d --- /dev/null +++ b/kvm_rs/x86_64/constant.RFLAGS_DF.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::RFLAGS_DF - Rust + +

Constant kvm_rs::x86_64::RFLAGS_DF[][src]

pub const RFLAGS_DF: u64 = 1 << 10; // 0x0_000_000_000_000_400u64

Direction flag.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.RFLAGS_IF.html b/kvm_rs/x86_64/constant.RFLAGS_IF.html new file mode 100644 index 0000000..a11e820 --- /dev/null +++ b/kvm_rs/x86_64/constant.RFLAGS_IF.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::RFLAGS_IF - Rust + +

Constant kvm_rs::x86_64::RFLAGS_IF[][src]

pub const RFLAGS_IF: u64 = 1 << 9; // 0x0_000_000_000_000_200u64

Sign flag.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.RFLAGS_IOPL.html b/kvm_rs/x86_64/constant.RFLAGS_IOPL.html new file mode 100644 index 0000000..7fafaaa --- /dev/null +++ b/kvm_rs/x86_64/constant.RFLAGS_IOPL.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::RFLAGS_IOPL - Rust + +

Constant kvm_rs::x86_64::RFLAGS_IOPL[][src]

pub const RFLAGS_IOPL: u64 = 0b11 << 12; // 0x0_000_000_000_003_000u64

I/O privilege level.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.RFLAGS_OF.html b/kvm_rs/x86_64/constant.RFLAGS_OF.html new file mode 100644 index 0000000..d74a58a --- /dev/null +++ b/kvm_rs/x86_64/constant.RFLAGS_OF.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::RFLAGS_OF - Rust + +

Constant kvm_rs::x86_64::RFLAGS_OF[][src]

pub const RFLAGS_OF: u64 = 1 << 11; // 0x0_000_000_000_000_800u64

Overflow flag.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.RFLAGS_PF.html b/kvm_rs/x86_64/constant.RFLAGS_PF.html new file mode 100644 index 0000000..1922cf5 --- /dev/null +++ b/kvm_rs/x86_64/constant.RFLAGS_PF.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::RFLAGS_PF - Rust + +

Constant kvm_rs::x86_64::RFLAGS_PF[][src]

pub const RFLAGS_PF: u64 = 1 << 2; // 0x0_000_000_000_000_004u64

Parity flag.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.RFLAGS_SF.html b/kvm_rs/x86_64/constant.RFLAGS_SF.html new file mode 100644 index 0000000..2e303ac --- /dev/null +++ b/kvm_rs/x86_64/constant.RFLAGS_SF.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::RFLAGS_SF - Rust + +

Constant kvm_rs::x86_64::RFLAGS_SF[][src]

pub const RFLAGS_SF: u64 = 1 << 7; // 0x0_000_000_000_000_080u64

Sign flag.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.RFLAGS_ZF.html b/kvm_rs/x86_64/constant.RFLAGS_ZF.html new file mode 100644 index 0000000..3d3ab64 --- /dev/null +++ b/kvm_rs/x86_64/constant.RFLAGS_ZF.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::RFLAGS_ZF - Rust + +

Constant kvm_rs::x86_64::RFLAGS_ZF[][src]

pub const RFLAGS_ZF: u64 = 1 << 6; // 0x0_000_000_000_000_040u64

Zero flag.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.SEG_SELECTOR_INDEX.html b/kvm_rs/x86_64/constant.SEG_SELECTOR_INDEX.html new file mode 100644 index 0000000..281e6bb --- /dev/null +++ b/kvm_rs/x86_64/constant.SEG_SELECTOR_INDEX.html @@ -0,0 +1,8 @@ +kvm_rs::x86_64::SEG_SELECTOR_INDEX - Rust + +

Constant kvm_rs::x86_64::SEG_SELECTOR_INDEX[][src]

pub const SEG_SELECTOR_INDEX: u16 = 0x1fff << 3; // 0xf_ff8u16

Table index.

+

Index into the GDT or LDT table to select the segment descriptor. GDT.base + 8 * index +gives the address of the segment descriptor (times 8 because every segment descriptor is 8 byte).

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.SEG_SELECTOR_RPL.html b/kvm_rs/x86_64/constant.SEG_SELECTOR_RPL.html new file mode 100644 index 0000000..b451997 --- /dev/null +++ b/kvm_rs/x86_64/constant.SEG_SELECTOR_RPL.html @@ -0,0 +1,8 @@ +kvm_rs::x86_64::SEG_SELECTOR_RPL - Rust + +

Constant kvm_rs::x86_64::SEG_SELECTOR_RPL[][src]

pub const SEG_SELECTOR_RPL: u16 = 0b11 << 0; // 0x0_003u16

Requested privilege level.

+

Privilege level of the segment selector, where 0 is the most privileged mode and 3 the +least.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.SEG_SELECTOR_TI.html b/kvm_rs/x86_64/constant.SEG_SELECTOR_TI.html new file mode 100644 index 0000000..2f3f0d9 --- /dev/null +++ b/kvm_rs/x86_64/constant.SEG_SELECTOR_TI.html @@ -0,0 +1,10 @@ +kvm_rs::x86_64::SEG_SELECTOR_TI - Rust + +

Constant kvm_rs::x86_64::SEG_SELECTOR_TI[][src]

pub const SEG_SELECTOR_TI: u16 = 1 << 2; // 0x0_004u16

Table indicator.

+ + + +
TITable
0GDT
1LDT
+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.rflags_ac.html b/kvm_rs/x86_64/fn.rflags_ac.html new file mode 100644 index 0000000..06e8c1d --- /dev/null +++ b/kvm_rs/x86_64/fn.rflags_ac.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::rflags_ac - Rust + +

Function kvm_rs::x86_64::rflags_ac[][src]

pub const fn rflags_ac(r: u64) -> u64
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.rflags_af.html b/kvm_rs/x86_64/fn.rflags_af.html new file mode 100644 index 0000000..9112902 --- /dev/null +++ b/kvm_rs/x86_64/fn.rflags_af.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::rflags_af - Rust + +

Function kvm_rs::x86_64::rflags_af[][src]

pub const fn rflags_af(r: u64) -> u64
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.rflags_cf.html b/kvm_rs/x86_64/fn.rflags_cf.html new file mode 100644 index 0000000..cdd63d8 --- /dev/null +++ b/kvm_rs/x86_64/fn.rflags_cf.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::rflags_cf - Rust + +

Function kvm_rs::x86_64::rflags_cf[][src]

pub const fn rflags_cf(r: u64) -> u64
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.rflags_df.html b/kvm_rs/x86_64/fn.rflags_df.html new file mode 100644 index 0000000..6b3567f --- /dev/null +++ b/kvm_rs/x86_64/fn.rflags_df.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::rflags_df - Rust + +

Function kvm_rs::x86_64::rflags_df[][src]

pub const fn rflags_df(r: u64) -> u64
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.rflags_if.html b/kvm_rs/x86_64/fn.rflags_if.html new file mode 100644 index 0000000..4600467 --- /dev/null +++ b/kvm_rs/x86_64/fn.rflags_if.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::rflags_if - Rust + +

Function kvm_rs::x86_64::rflags_if[][src]

pub const fn rflags_if(r: u64) -> u64
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.rflags_iopl.html b/kvm_rs/x86_64/fn.rflags_iopl.html new file mode 100644 index 0000000..5ba8e0d --- /dev/null +++ b/kvm_rs/x86_64/fn.rflags_iopl.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::rflags_iopl - Rust + +

Function kvm_rs::x86_64::rflags_iopl[][src]

pub const fn rflags_iopl(r: u64) -> u64
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.rflags_of.html b/kvm_rs/x86_64/fn.rflags_of.html new file mode 100644 index 0000000..27be426 --- /dev/null +++ b/kvm_rs/x86_64/fn.rflags_of.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::rflags_of - Rust + +

Function kvm_rs::x86_64::rflags_of[][src]

pub const fn rflags_of(r: u64) -> u64
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.rflags_pf.html b/kvm_rs/x86_64/fn.rflags_pf.html new file mode 100644 index 0000000..c131a01 --- /dev/null +++ b/kvm_rs/x86_64/fn.rflags_pf.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::rflags_pf - Rust + +

Function kvm_rs::x86_64::rflags_pf[][src]

pub const fn rflags_pf(r: u64) -> u64
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.rflags_sf.html b/kvm_rs/x86_64/fn.rflags_sf.html new file mode 100644 index 0000000..1c1f0b0 --- /dev/null +++ b/kvm_rs/x86_64/fn.rflags_sf.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::rflags_sf - Rust + +

Function kvm_rs::x86_64::rflags_sf[][src]

pub const fn rflags_sf(r: u64) -> u64
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.rflags_zf.html b/kvm_rs/x86_64/fn.rflags_zf.html new file mode 100644 index 0000000..f1771d8 --- /dev/null +++ b/kvm_rs/x86_64/fn.rflags_zf.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::rflags_zf - Rust + +

Function kvm_rs::x86_64::rflags_zf[][src]

pub const fn rflags_zf(r: u64) -> u64
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.seg_selector_index.html b/kvm_rs/x86_64/fn.seg_selector_index.html new file mode 100644 index 0000000..8c79a6b --- /dev/null +++ b/kvm_rs/x86_64/fn.seg_selector_index.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::seg_selector_index - Rust + +

Function kvm_rs::x86_64::seg_selector_index[][src]

pub const fn seg_selector_index(s: u16) -> u16
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.seg_selector_rpl.html b/kvm_rs/x86_64/fn.seg_selector_rpl.html new file mode 100644 index 0000000..71e41fe --- /dev/null +++ b/kvm_rs/x86_64/fn.seg_selector_rpl.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::seg_selector_rpl - Rust + +

Function kvm_rs::x86_64::seg_selector_rpl[][src]

pub const fn seg_selector_rpl(s: u16) -> u16
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.seg_selector_ti.html b/kvm_rs/x86_64/fn.seg_selector_ti.html new file mode 100644 index 0000000..edf949b --- /dev/null +++ b/kvm_rs/x86_64/fn.seg_selector_ti.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::seg_selector_ti - Rust + +

Function kvm_rs::x86_64::seg_selector_ti[][src]

pub const fn seg_selector_ti(s: u16) -> u16
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/index.html b/kvm_rs/x86_64/index.html new file mode 100644 index 0000000..6303749 --- /dev/null +++ b/kvm_rs/x86_64/index.html @@ -0,0 +1,42 @@ +kvm_rs::x86_64 - Rust + +

Module kvm_rs::x86_64[][src]

x86_64 flags and bitfields.

+

Constants

+
CR0_AM

Alignment Mask.

+
CR0_CD

Cachine disable.

+
CR0_EM

Emulation.

+
CR0_ET

Extension Type.

+
CR0_MP

Monitor Coprocessor.

+
CR0_NE

Numeric Error.

+
CR0_NW

Not Write-Torugh.

+
CR0_PE

Protection Enable.

+
CR0_PG

Paging.

+
CR0_TS

Task Switched.

+
CR0_WP

Write Protect.

+
CR3_PAGE_BASE_MASK

Mask for physical base address of paging structure.

+
CR3_PCD

Page-level Cache Disable.

+
CR3_PWT

Page-level Write-Through.

+
CR4_LA57

57-bit Linear Addresses.

+
CR4_PAE

Physical Address Extenstion.

+
EFER_LMA

Long Mode Active (readonly).

+
EFER_LME

Long Mode Enable.

+
MSR_EFER

Extended Feature Enable Register MSR number.

+
PAGE_ENTRY_PRESENT

Page entry present.

+
PAGE_RENTRY_RW

Page region read/write.

+
RFLAGS_AC

Alignment check.

+
RFLAGS_AF

Adjust flag.

+
RFLAGS_CF

Carry flag.

+
RFLAGS_DF

Direction flag.

+
RFLAGS_IF

Sign flag.

+
RFLAGS_IOPL

I/O privilege level.

+
RFLAGS_OF

Overflow flag.

+
RFLAGS_PF

Parity flag.

+
RFLAGS_SF

Sign flag.

+
RFLAGS_ZF

Zero flag.

+
SEG_SELECTOR_INDEX

Table index.

+
SEG_SELECTOR_RPL

Requested privilege level.

+
SEG_SELECTOR_TI

Table indicator.

+

Functions

+
rflags_ac
rflags_af
rflags_cf
rflags_df
rflags_if
rflags_iopl
rflags_of
rflags_pf
rflags_sf
rflags_zf
seg_selector_index
seg_selector_rpl
seg_selector_ti
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/sidebar-items.js b/kvm_rs/x86_64/sidebar-items.js new file mode 100644 index 0000000..e82f7b3 --- /dev/null +++ b/kvm_rs/x86_64/sidebar-items.js @@ -0,0 +1 @@ +initSidebarItems({"constant":[["CR0_AM","Alignment Mask."],["CR0_CD","Cachine disable."],["CR0_EM","Emulation."],["CR0_ET","Extension Type."],["CR0_MP","Monitor Coprocessor."],["CR0_NE","Numeric Error."],["CR0_NW","Not Write-Torugh."],["CR0_PE","Protection Enable."],["CR0_PG","Paging."],["CR0_TS","Task Switched."],["CR0_WP","Write Protect."],["CR3_PAGE_BASE_MASK","Mask for physical base address of paging structure."],["CR3_PCD","Page-level Cache Disable."],["CR3_PWT","Page-level Write-Through."],["CR4_LA57","57-bit Linear Addresses."],["CR4_PAE","Physical Address Extenstion."],["EFER_LMA","Long Mode Active (readonly)."],["EFER_LME","Long Mode Enable."],["MSR_EFER","Extended Feature Enable Register MSR number."],["PAGE_ENTRY_PRESENT","Page entry present."],["PAGE_RENTRY_RW","Page region read/write."],["RFLAGS_AC","Alignment check."],["RFLAGS_AF","Adjust flag."],["RFLAGS_CF","Carry flag."],["RFLAGS_DF","Direction flag."],["RFLAGS_IF","Sign flag."],["RFLAGS_IOPL","I/O privilege level."],["RFLAGS_OF","Overflow flag."],["RFLAGS_PF","Parity flag."],["RFLAGS_SF","Sign flag."],["RFLAGS_ZF","Zero flag."],["SEG_SELECTOR_INDEX","Table index."],["SEG_SELECTOR_RPL","Requested privilege level."],["SEG_SELECTOR_TI","Table indicator."]],"fn":[["rflags_ac",""],["rflags_af",""],["rflags_cf",""],["rflags_df",""],["rflags_if",""],["rflags_iopl",""],["rflags_of",""],["rflags_pf",""],["rflags_sf",""],["rflags_zf",""],["seg_selector_index",""],["seg_selector_rpl",""],["seg_selector_ti",""]]}); \ No newline at end of file -- cgit v1.2.3