Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp2935478pxu; Mon, 7 Dec 2020 21:58:25 -0800 (PST) X-Google-Smtp-Source: ABdhPJwY2ipvmaq9fuBprvoZrZAHOIxfxwPkjC/P4MUHYkyDBL7HSf1MSdwI9poiWd9U9gAQzgTW X-Received: by 2002:a50:f089:: with SMTP id v9mr23683902edl.353.1607407105531; Mon, 07 Dec 2020 21:58:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1607407105; cv=none; d=google.com; s=arc-20160816; b=JG0RxSU1PXTjcDVj1HvW8HdJwjVCAIg+JYttroAPCMKLzRH0+hBU25W3KmIwGQPPE8 9jB+ryf26OChZq1henVkb7cXZHnEvthHe1aENne0lMSp7BqAnFg/E7c3DUYYqZCiy682 Iw4Xw4OlzN+nyjiqOndiXyIiv/l7DHdsDbJ2ek5AfppBW6r1USE2j51hVcNOZNJKdDkU bphvgF/Gqdmeq2M/MKezrzzIDC4vcJz7c9jEOLc9jKilKxxhHtT+X8ss2ytdNMzeB+jL Cu5qsvo8nCgDuPKj4A73gwz0pTSb7i4ZccdiZ9bB7+DxGC9jmIJCbRLLhpZX2tiuXBhm /jEQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=UuwuKvzq+wdDkl2E8GU1eKqobKVKk5J5SJyMQZaG2YA=; b=eYHt0RmXt23cy//cAlLfq8hlVFK20cXxvv8Tx+UZ4pvE8xTfz2HjVf9gN2c5+idnoh TN6KC4yYyrKSyPo8xulk2KnlgXuXdivI49lizuWG1rVI3KFXHhdedP5Xy0lxT+gsZuWe CyXzapJUb7bdTIkAJXqYO6fmB28cuwhA2ZYfsomhqf/mGcu5SD6aR4Y4EufyBruYsYN1 W++rKHbZqXIAmUtAFkTIWpFYqfNhKXMesnoNspGkE1ASzkJbee1XzAWs3qn9jeopQgrp zZL7sUg5R1/Phb1Y45wf3dRvv9OmTbvuRjWYkj3UzheGGkUCXQDMJAoCiGlUn7NagM8h mJqA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bz24si8219622ejc.72.2020.12.07.21.57.32; Mon, 07 Dec 2020 21:58:25 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726190AbgLHEfw (ORCPT + 99 others); Mon, 7 Dec 2020 23:35:52 -0500 Received: from szxga07-in.huawei.com ([45.249.212.35]:9393 "EHLO szxga07-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726028AbgLHEfv (ORCPT ); Mon, 7 Dec 2020 23:35:51 -0500 Received: from DGGEMS405-HUB.china.huawei.com (unknown [172.30.72.59]) by szxga07-in.huawei.com (SkyGuard) with ESMTP id 4CqnQP2rH8z7BGD; Tue, 8 Dec 2020 12:34:37 +0800 (CST) Received: from DESKTOP-8RFUVS3.china.huawei.com (10.174.185.179) by DGGEMS405-HUB.china.huawei.com (10.3.19.205) with Microsoft SMTP Server id 14.3.487.0; Tue, 8 Dec 2020 12:34:59 +0800 From: Zenghui Yu To: , CC: , , , , Zenghui Yu Subject: [PATCH] KVM: Documentation: Update description of KVM_{GET,CLEAR}_DIRTY_LOG Date: Tue, 8 Dec 2020 12:34:39 +0800 Message-ID: <20201208043439.895-1-yuzenghui@huawei.com> X-Mailer: git-send-email 2.23.0.windows.1 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.174.185.179] X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Update various words, including the wrong parameter name and the vague description of the usage of "slot" field. Signed-off-by: Zenghui Yu --- Documentation/virt/kvm/api.rst | 16 +++++++--------- 1 file changed, 7 insertions(+), 9 deletions(-) diff --git a/Documentation/virt/kvm/api.rst b/Documentation/virt/kvm/api.rst index 70254eaa5229..0eb236737f80 100644 --- a/Documentation/virt/kvm/api.rst +++ b/Documentation/virt/kvm/api.rst @@ -360,10 +360,9 @@ since the last call to this ioctl. Bit 0 is the first page in the memory slot. Ensure the entire structure is cleared to avoid padding issues. -If KVM_CAP_MULTI_ADDRESS_SPACE is available, bits 16-31 specifies -the address space for which you want to return the dirty bitmap. -They must be less than the value that KVM_CHECK_EXTENSION returns for -the KVM_CAP_MULTI_ADDRESS_SPACE capability. +If KVM_CAP_MULTI_ADDRESS_SPACE is available, bits 16-31 of slot field specifies +the address space for which you want to return the dirty bitmap. See +KVM_SET_USER_MEMORY_REGION for details on the usage of slot field. The bits in the dirty bitmap are cleared before the ioctl returns, unless KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2 is enabled. For more information, @@ -4427,7 +4426,7 @@ to I/O ports. :Capability: KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2 :Architectures: x86, arm, arm64, mips :Type: vm ioctl -:Parameters: struct kvm_dirty_log (in) +:Parameters: struct kvm_clear_dirty_log (in) :Returns: 0 on success, -1 on error :: @@ -4454,10 +4453,9 @@ in KVM's dirty bitmap, and dirty tracking is re-enabled for that page (for example via write-protection, or by clearing the dirty bit in a page table entry). -If KVM_CAP_MULTI_ADDRESS_SPACE is available, bits 16-31 specifies -the address space for which you want to return the dirty bitmap. -They must be less than the value that KVM_CHECK_EXTENSION returns for -the KVM_CAP_MULTI_ADDRESS_SPACE capability. +If KVM_CAP_MULTI_ADDRESS_SPACE is available, bits 16-31 of slot field specifies +the address space for which you want to clear the dirty status. See +KVM_SET_USER_MEMORY_REGION for details on the usage of slot field. This ioctl is mostly useful when KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2 is enabled; for more information, see the description of the capability. -- 2.19.1