From mboxrd@z Thu Jan 1 00:00:00 1970 From: Pekka Enberg Subject: Re: [PATCH 1/2] KVM: Document KVM_SET_USER_MEMORY_REGION Date: Thu, 25 Mar 2010 12:34:46 +0200 Message-ID: <4BAB3C46.9040106@cs.helsinki.fi> References: <1269513099-21060-1-git-send-email-avi@redhat.com> <1269513099-21060-2-git-send-email-avi@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: kvm@vger.kernel.org, Marcelo Tosatti To: Avi Kivity Return-path: Received: from courier.cs.helsinki.fi ([128.214.9.1]:57274 "EHLO mail.cs.helsinki.fi" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753999Ab0CYKex (ORCPT ); Thu, 25 Mar 2010 06:34:53 -0400 In-Reply-To: <1269513099-21060-2-git-send-email-avi@redhat.com> Sender: kvm-owner@vger.kernel.org List-ID: Avi Kivity kirjoitti: > Signed-off-by: Avi Kivity Acked-by: Pekka Enberg > --- > Documentation/kvm/api.txt | 43 +++++++++++++++++++++++++++++++++++++++++++ > 1 files changed, 43 insertions(+), 0 deletions(-) > > diff --git a/Documentation/kvm/api.txt b/Documentation/kvm/api.txt > index d170cb4..22af28a 100644 > --- a/Documentation/kvm/api.txt > +++ b/Documentation/kvm/api.txt > @@ -749,6 +749,49 @@ Writes debug registers into the vcpu. > See KVM_GET_DEBUGREGS for the data structure. The flags field is unused > yet and must be cleared on entry. > > +4.34 KVM_SET_USER_MEMORY_REGION > + > +Capability: KVM_CAP_USER_MEM > +Architectures: all > +Type: vm ioctl > +Parameters: struct kvm_userspace_memory_region (in) > +Returns: 0 on success, -1 on error > + > +struct kvm_userspace_memory_region { > + __u32 slot; > + __u32 flags; > + __u64 guest_phys_addr; > + __u64 memory_size; /* bytes */ > + __u64 userspace_addr; /* start of the userspace allocated memory */ > +}; > + > +/* for kvm_memory_region::flags */ > +#define KVM_MEM_LOG_DIRTY_PAGES 1UL > + > +This ioctl allows the user to create or modify a guest physical memory > +slot. When changing an existing slot, it may be moved in the guest > +physical memory space, or its flags may be modified. It may not be > +resized. Slots may not overlap in guest physical address space. > + > +Memory for the region is taken starting at the address denoted by the > +field userspace_addr, which must point at user addressable memory for > +the entire memory slot size. Any object may back this memory, including > +anonymous memory, ordinary files, and hugetlbfs. > + > +It is recommended that the lower 21 bits of guest_phys_addr and userspace_addr > +be identical. This allows large pages in the guest to be backed by large > +pages in the host. > + > +The flags field supports just one flag, KVM_MEM_LOG_DIRTY_PAGES, which > +instructs kvm to keep track of writes to memory within the slot. See > +the KVM_GET_DIRTY_LOG ioctl. > + > +When the KVM_CAP_SYNC_MMU capability, changes in the backing of the memory > +region are automatically reflected into the guest. For example, an mmap() > +that affects the region will be made visible immediately. Another example > +is madvise(MADV_DROP). > + > +It is recommended to use this API instead of the KVM_SET_MEMORY_REGION ioctl. > > 5. The kvm_run structure >