mirror of
https://chromium.googlesource.com/crosvm/crosvm
synced 2024-12-26 13:10:56 +00:00
add usage information to README
TEST=None BUG=None Change-Id: Iab070c5788e19e63140643115af6e48421989f9b Reviewed-on: https://chromium-review.googlesource.com/683798 Commit-Ready: Zach Reizner <zachr@chromium.org> Tested-by: Zach Reizner <zachr@chromium.org> Reviewed-by: Jason Clinton <jclinton@chromium.org> Reviewed-by: Stephen Barber <smbarber@chromium.org>
This commit is contained in:
parent
5e4ab46105
commit
26e1aef84f
1 changed files with 168 additions and 14 deletions
182
README.md
182
README.md
|
@ -1,4 +1,4 @@
|
|||
# Chrome OS KVM
|
||||
# crosvm - The Chrome OS Virtual Machine Monitor
|
||||
|
||||
This component, known as crosvm, runs untrusted operating systems along with
|
||||
virtualized devices. No actual hardware is emulated. This only runs VMs
|
||||
|
@ -7,18 +7,172 @@ safety within the programming language and a sandbox around the virtual
|
|||
devices to protect the kernel from attack in case of an exploit in the
|
||||
devices.
|
||||
|
||||
## Overview
|
||||
|
||||
The crosvm source code is organized into crates, each with their own
|
||||
unit tests. These crates are:
|
||||
|
||||
* `kernel_loader` Loads elf64 kernel files to a slice of memory.
|
||||
* `kvm_sys` low-level (mostly) auto-generated structures and constants for using KVM
|
||||
* `kvm` unsafe, low-level wrapper code for using kvm_sys
|
||||
* `crosvm` the top-level binary front-end for using crosvm
|
||||
* `x86_64` Support code specific to 64 bit intel machines.
|
||||
|
||||
## Usage
|
||||
|
||||
Currently there is no front-end, so the best you can do is run `cargo test` in
|
||||
each crate.
|
||||
To see the usage information for your version of crosvm, run `crosvm` or `crosvm
|
||||
run --help`.
|
||||
|
||||
### Boot a Kernel
|
||||
|
||||
To run a very basic VM with just a kernel and default devices:
|
||||
|
||||
```bash
|
||||
$ crosvm run "${KERNEL_PATH}"
|
||||
```
|
||||
|
||||
The uncompressed kernel image, also known as vmlinux, can be found in your kernel
|
||||
build directory in the case of x86 at `arch/x86/boot/compressed/vmlinux`.
|
||||
|
||||
### Rootfs
|
||||
|
||||
In most cases, you will want to give the VM a virtual block device to use as a
|
||||
root file system:
|
||||
|
||||
```bash
|
||||
$ crosvm run -r "${ROOT_IMAGE}" "${KERNEL_PATH}"
|
||||
```
|
||||
|
||||
The root image must be a path to a disk image formatted in a way that the kernel
|
||||
can read. Typically this is a squashfs image made with `mksquashfs` or an ext4
|
||||
image made with `mkfs.ext4`. By using the `-r` argument, the kernel is
|
||||
automatically told to use that image as the root, and therefore can only be
|
||||
given once. More disks can be given with `-d` or `--rwdisk` if a writable disk
|
||||
is desired.
|
||||
|
||||
To run crosvm with a writable rootfs:
|
||||
|
||||
>**WARNING:** Writable disks are at risk of corruption by a malicious or
|
||||
malfunctioning guest OS.
|
||||
```bash
|
||||
crosvm run --rwdisk "${ROOT_IMAGE}" -p "root=/dev/vda" vmlinux
|
||||
```
|
||||
>**NOTE:** If more disks arguments are added prior to the desired rootfs image,
|
||||
the `root=/dev/vda` must be adjusted to the appropriate letter.
|
||||
|
||||
### Control Socket
|
||||
|
||||
If the control socket was enabled with `-s`, the main process can be controlled
|
||||
while crosvm is running. To tell crosvm to stop and exit, for example:
|
||||
|
||||
>**NOTE:** If the socket path given is for a directory, a socket name underneath
|
||||
that path will be generated based on crosvm's PID.
|
||||
```bash
|
||||
$ crosvm run -s /var/run/crosvm.sock ${USUAL_CROSVM_ARGS}
|
||||
<in another shell>
|
||||
$ crosvm stop /var/run/crosvm.sock
|
||||
```
|
||||
>**WARNING:** The guest OS will not be notified or gracefully shutdown.
|
||||
|
||||
This will cause the original crosvm process to exit in an orderly fashion,
|
||||
allowing it to clean up any OS resources that might have stuck around if crosvm
|
||||
were terminated early.
|
||||
|
||||
### Multiprocess Mode
|
||||
|
||||
To run crosvm in multiprocess mode, use the `-u` flag. Each device that supports
|
||||
running inside of a sandbox will run in a jailed child process of crosvm. The
|
||||
appropriate minijail seccomp policy files for the running architecture must be
|
||||
in the current working directory.
|
||||
|
||||
### Virtio Wayland
|
||||
|
||||
Virtio Wayland support requires special support on the part of the guest and as
|
||||
such is unlikely to work out of the box unless you are using a Chrome OS kernel
|
||||
along with a `termina` rootfs.
|
||||
|
||||
To use it, ensure that the `XDG_RUNTIME_DIR` enviroment variable is set and that
|
||||
the path `$XDG_RUNTIME_DIR/wayland-0` points to the socket of the Wayland
|
||||
compositor you would like the guest to use.
|
||||
|
||||
## Defaults
|
||||
|
||||
The following are crosvm's default arguments and how to override them.
|
||||
|
||||
* 256MB of memory (set with `-m`)
|
||||
* 1 virtual CPU (set with `-c`)
|
||||
* no block devices (set with `-r`, `-d`, or `--rwdisk`)
|
||||
* no network (set with `--host_ip`, `--netmask`, and `--mac`)
|
||||
* virtio wayland support if `XDG_RUNTIME_DIR` enviroment variable is set (disable with `--no-wl`)
|
||||
* only the kernel arguments necessary to run with the supported devices (add more with `-p`)
|
||||
* run in single process mode (run in multiprocess mode with `-u`)
|
||||
* no control socket (set with `-s`)
|
||||
|
||||
## System Requirements
|
||||
|
||||
A Linux kernel with KVM support (check for `/dev/kvm`) is required to run
|
||||
crosvm. In order to run certain devices, there are additional system
|
||||
requirements:
|
||||
|
||||
* `virtio-wayland` - The `memfd_create` syscall, introduced in Linux 3.17, and a Wayland compositor.
|
||||
* `vsock` - Host Linux kernel with vhost-vsock support, introduced in Linux 4.8.
|
||||
* `multiprocess` - Host Linux kernel with seccomp-bpf and Linux namespaceing support.
|
||||
* `virtio-net` - Host Linux kernel with TUN/TAP support (check for `/dev/net/tun`) and running with `CAP_NET_ADMIN` privileges.
|
||||
|
||||
## Emulated Devices
|
||||
|
||||
| Device | Description |
|
||||
|------------------|------------------------------------------------------------------------------------|
|
||||
| `CMOS/RTC` | Used to get the current calendar time. |
|
||||
| `i8042` | Used by the guest kernel to exit crosvm. |
|
||||
| `serial` | x86 I/O port driven serial devices that print to stdout and take input from stdin. |
|
||||
| `virtio-block` | Basic read/write block device. |
|
||||
| `virtio-net` | Device to interface the host and guest networks. |
|
||||
| `virtio-rng` | Entropy source used to seed guest OS's entropy pool. |
|
||||
| `virtio-vsock` | Enabled VSOCKs for the guests. |
|
||||
| `virtio-wayland` | Allowed guest to use host Wayland socket. |
|
||||
|
||||
## Contributing
|
||||
|
||||
### Code Health
|
||||
|
||||
#### `build_test`
|
||||
|
||||
There are no automated tests run before code is committed to crosvm. In order to
|
||||
maintain sanity, please execute `build_test` before submitting code for review.
|
||||
All tests should be passing or ignored and there should be no compiler warnings
|
||||
or errors. All supported architectures are built, but only tests for x86_64 are
|
||||
run. In order to build everything without failures, sysroots must be supplied
|
||||
for each architecture. See `build_test -h` for more information.
|
||||
|
||||
#### `rustfmt`
|
||||
|
||||
New code should be run with `rustfmt`, but not all currently checked in code has
|
||||
already been autoformatted. If running `rustfmt` causes a lot of churn for a
|
||||
file, do not check in lines unrelated to your change.
|
||||
|
||||
#### Dependencies
|
||||
|
||||
With a few exceptions, external dependencies inside of the `Cargo.toml` files
|
||||
are not allowed. The reason being that community made crates tend to explode the
|
||||
binary size by including dozens of transitive dependencies. All these
|
||||
dependencies also must be reviewed to ensure their suitability to the crosvm
|
||||
project. Currently allowed crates are:
|
||||
|
||||
* `byteorder` - A very small library used for endian swaps.
|
||||
* `gcc` - Build time dependency needed to build C source code used in crosvm.
|
||||
* `libc` - Required to use the standard library, this crate is a simple wrapper around `libc`'s symbols.
|
||||
|
||||
### Code Overview
|
||||
|
||||
The crosvm source code is written in Rust and C. To build, crosvm requires rustc
|
||||
v1.20 or later.
|
||||
|
||||
Source code is organized into crates, each with their own unit tests. These
|
||||
crates are:
|
||||
|
||||
* `crosvm` - The top-level binary front-end for using crosvm, along with all devices.
|
||||
* `io_jail` - Creates jailed process using `libminijail`.
|
||||
* `kernel_loader` - Loads elf64 kernel files to a slice of memory.
|
||||
* `kvm_sys` - Low-level (mostly) auto-generated structures and constants for using KVM.
|
||||
* `kvm` - Unsafe, low-level wrapper code for using `kvm_sys`.
|
||||
* `net_sys` - Low-level (mostly) auto-generated structures and constants for creating TUN/TAP devices.
|
||||
* `net_util` - Wrapper for creating TUN/TAP devices.
|
||||
* `sys_util` - Mostly safe wrappers for small system facilities such as `eventfd` or `syslog`.
|
||||
* `syscall_defines` - Lists of syscall numbers in each architecture used to make syscalls not supported in `libc`.
|
||||
* `vhost` - Wrappers for creating vhost based devices.
|
||||
* `virtio_sys` - Low-level (mostly) auto-generated structures and constants for interfacing with kernel vhost support.
|
||||
* `x86_64` - Support code specific to 64 bit intel machines.
|
||||
|
||||
The `seccomp` folder contains minijail seccomp policy files for each sandboxed
|
||||
device. Because some syscalls vary by architecturs, the seccomp policies are
|
||||
split by architecture.
|
||||
|
|
Loading…
Reference in a new issue