Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

Documentation: move Documentation/virtual to Documentation/virt

Renaming docs seems to be en vogue at the moment, so fix on of the
grossly misnamed directories. We usually never use "virtual" as
a shortcut for virtualization in the kernel, but always virt,
as seen in the virt/ top-level directory. Fix up the documentation
to match that.

Fixes: ed16648eb5b8 ("Move kvm, uml, and lguest subdirectories under a common "virtual" directory, I.E:")
Signed-off-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>

authored by

Christoph Hellwig and committed by
Paolo Bonzini
2f5947df c6bf2ae9

+19 -19
+1 -1
Documentation/admin-guide/kernel-parameters.txt
··· 2532 2532 mem_encrypt=on: Activate SME 2533 2533 mem_encrypt=off: Do not activate SME 2534 2534 2535 - Refer to Documentation/virtual/kvm/amd-memory-encryption.rst 2535 + Refer to Documentation/virt/kvm/amd-memory-encryption.rst 2536 2536 for details on when memory encryption can be activated. 2537 2537 2538 2538 mem_sleep_default= [SUSPEND] Default system suspend mode:
Documentation/virtual/index.rst Documentation/virt/index.rst
Documentation/virtual/kvm/amd-memory-encryption.rst Documentation/virt/kvm/amd-memory-encryption.rst
+1 -1
Documentation/virtual/kvm/api.txt Documentation/virt/kvm/api.txt
··· 3781 3781 3782 3782 Currently, this ioctl is used for issuing Secure Encrypted Virtualization 3783 3783 (SEV) commands on AMD Processors. The SEV commands are defined in 3784 - Documentation/virtual/kvm/amd-memory-encryption.rst. 3784 + Documentation/virt/kvm/amd-memory-encryption.rst. 3785 3785 3786 3786 4.111 KVM_MEMORY_ENCRYPT_REG_REGION 3787 3787
Documentation/virtual/kvm/arm/hyp-abi.txt Documentation/virt/kvm/arm/hyp-abi.txt
Documentation/virtual/kvm/arm/psci.txt Documentation/virt/kvm/arm/psci.txt
Documentation/virtual/kvm/cpuid.rst Documentation/virt/kvm/cpuid.rst
Documentation/virtual/kvm/devices/README Documentation/virt/kvm/devices/README
Documentation/virtual/kvm/devices/arm-vgic-its.txt Documentation/virt/kvm/devices/arm-vgic-its.txt
Documentation/virtual/kvm/devices/arm-vgic-v3.txt Documentation/virt/kvm/devices/arm-vgic-v3.txt
Documentation/virtual/kvm/devices/arm-vgic.txt Documentation/virt/kvm/devices/arm-vgic.txt
Documentation/virtual/kvm/devices/mpic.txt Documentation/virt/kvm/devices/mpic.txt
Documentation/virtual/kvm/devices/s390_flic.txt Documentation/virt/kvm/devices/s390_flic.txt
Documentation/virtual/kvm/devices/vcpu.txt Documentation/virt/kvm/devices/vcpu.txt
Documentation/virtual/kvm/devices/vfio.txt Documentation/virt/kvm/devices/vfio.txt
Documentation/virtual/kvm/devices/vm.txt Documentation/virt/kvm/devices/vm.txt
Documentation/virtual/kvm/devices/xics.txt Documentation/virt/kvm/devices/xics.txt
Documentation/virtual/kvm/devices/xive.txt Documentation/virt/kvm/devices/xive.txt
Documentation/virtual/kvm/halt-polling.txt Documentation/virt/kvm/halt-polling.txt
+2 -2
Documentation/virtual/kvm/hypercalls.txt Documentation/virt/kvm/hypercalls.txt
··· 18 18 number in R1. 19 19 20 20 For further information on the S390 diagnose call as supported by KVM, 21 - refer to Documentation/virtual/kvm/s390-diag.txt. 21 + refer to Documentation/virt/kvm/s390-diag.txt. 22 22 23 23 PowerPC: 24 24 It uses R3-R10 and hypercall number in R11. R4-R11 are used as output registers. ··· 26 26 27 27 KVM hypercalls uses 4 byte opcode, that are patched with 'hypercall-instructions' 28 28 property inside the device tree's /hypervisor node. 29 - For more information refer to Documentation/virtual/kvm/ppc-pv.txt 29 + For more information refer to Documentation/virt/kvm/ppc-pv.txt 30 30 31 31 MIPS: 32 32 KVM hypercalls use the HYPCALL instruction with code 0 and the hypercall
Documentation/virtual/kvm/index.rst Documentation/virt/kvm/index.rst
Documentation/virtual/kvm/locking.txt Documentation/virt/kvm/locking.txt
+1 -1
Documentation/virtual/kvm/mmu.txt Documentation/virt/kvm/mmu.txt
··· 298 298 vcpu->arch.mmio_gfn, and call the emulator 299 299 - If both P bit and R/W bit of error code are set, this could possibly 300 300 be handled as a "fast page fault" (fixed without taking the MMU lock). See 301 - the description in Documentation/virtual/kvm/locking.txt. 301 + the description in Documentation/virt/kvm/locking.txt. 302 302 - if needed, walk the guest page tables to determine the guest translation 303 303 (gva->gpa or ngpa->gpa) 304 304 - if permissions are insufficient, reflect the fault back to the guest
Documentation/virtual/kvm/msr.txt Documentation/virt/kvm/msr.txt
Documentation/virtual/kvm/nested-vmx.txt Documentation/virt/kvm/nested-vmx.txt
Documentation/virtual/kvm/ppc-pv.txt Documentation/virt/kvm/ppc-pv.txt
+1 -1
Documentation/virtual/kvm/review-checklist.txt Documentation/virt/kvm/review-checklist.txt
··· 7 7 2. Patches should be against kvm.git master branch. 8 8 9 9 3. If the patch introduces or modifies a new userspace API: 10 - - the API must be documented in Documentation/virtual/kvm/api.txt 10 + - the API must be documented in Documentation/virt/kvm/api.txt 11 11 - the API must be discoverable using KVM_CHECK_EXTENSION 12 12 13 13 4. New state must include support for save/restore.
Documentation/virtual/kvm/s390-diag.txt Documentation/virt/kvm/s390-diag.txt
Documentation/virtual/kvm/timekeeping.txt Documentation/virt/kvm/timekeeping.txt
Documentation/virtual/kvm/vcpu-requests.rst Documentation/virt/kvm/vcpu-requests.rst
Documentation/virtual/paravirt_ops.rst Documentation/virt/paravirt_ops.rst
Documentation/virtual/uml/UserModeLinux-HOWTO.txt Documentation/virt/uml/UserModeLinux-HOWTO.txt
+3 -3
MAINTAINERS
··· 8727 8727 W: http://www.linux-kvm.org 8728 8728 T: git git://git.kernel.org/pub/scm/virt/kvm/kvm.git 8729 8729 S: Supported 8730 - F: Documentation/virtual/kvm/ 8730 + F: Documentation/virt/kvm/ 8731 8731 F: include/trace/events/kvm.h 8732 8732 F: include/uapi/asm-generic/kvm* 8733 8733 F: include/uapi/linux/kvm* ··· 12054 12054 M: Alok Kataria <akataria@vmware.com> 12055 12055 L: virtualization@lists.linux-foundation.org 12056 12056 S: Supported 12057 - F: Documentation/virtual/paravirt_ops.txt 12057 + F: Documentation/virt/paravirt_ops.txt 12058 12058 F: arch/*/kernel/paravirt* 12059 12059 F: arch/*/include/asm/paravirt*.h 12060 12060 F: include/linux/hypervisor.h ··· 16745 16745 Q: https://patchwork.ozlabs.org/project/linux-um/list/ 16746 16746 T: git git://git.kernel.org/pub/scm/linux/kernel/git/rw/uml.git 16747 16747 S: Maintained 16748 - F: Documentation/virtual/uml/ 16748 + F: Documentation/virt/uml/ 16749 16749 F: arch/um/ 16750 16750 F: arch/x86/um/ 16751 16751 F: fs/hostfs/
+1 -1
arch/powerpc/include/uapi/asm/kvm_para.h
··· 31 31 * Struct fields are always 32 or 64 bit aligned, depending on them being 32 32 32 * or 64 bit wide respectively. 33 33 * 34 - * See Documentation/virtual/kvm/ppc-pv.txt 34 + * See Documentation/virt/kvm/ppc-pv.txt 35 35 */ 36 36 struct kvm_vcpu_arch_shared { 37 37 __u64 scratch1;
+1 -1
arch/x86/kvm/mmu.c
··· 3466 3466 /* 3467 3467 * Currently, fast page fault only works for direct mapping 3468 3468 * since the gfn is not stable for indirect shadow page. See 3469 - * Documentation/virtual/kvm/locking.txt to get more detail. 3469 + * Documentation/virt/kvm/locking.txt to get more detail. 3470 3470 */ 3471 3471 fault_handled = fast_pf_fix_direct_spte(vcpu, sp, 3472 3472 iterator.sptep, spte,
+2 -2
include/uapi/linux/kvm.h
··· 116 116 * ACPI gsi notion of irq. 117 117 * For IA-64 (APIC model) IOAPIC0: irq 0-23; IOAPIC1: irq 24-47.. 118 118 * For X86 (standard AT mode) PIC0/1: irq 0-15. IOAPIC0: 0-23.. 119 - * For ARM: See Documentation/virtual/kvm/api.txt 119 + * For ARM: See Documentation/virt/kvm/api.txt 120 120 */ 121 121 union { 122 122 __u32 irq; ··· 1086 1086 * 1087 1087 * KVM_IRQFD_FLAG_RESAMPLE indicates resamplefd is valid and specifies 1088 1088 * the irqfd to operate in resampling mode for level triggered interrupt 1089 - * emulation. See Documentation/virtual/kvm/api.txt. 1089 + * emulation. See Documentation/virt/kvm/api.txt. 1090 1090 */ 1091 1091 #define KVM_IRQFD_FLAG_RESAMPLE (1 << 1) 1092 1092
+2 -2
tools/include/uapi/linux/kvm.h
··· 116 116 * ACPI gsi notion of irq. 117 117 * For IA-64 (APIC model) IOAPIC0: irq 0-23; IOAPIC1: irq 24-47.. 118 118 * For X86 (standard AT mode) PIC0/1: irq 0-15. IOAPIC0: 0-23.. 119 - * For ARM: See Documentation/virtual/kvm/api.txt 119 + * For ARM: See Documentation/virt/kvm/api.txt 120 120 */ 121 121 union { 122 122 __u32 irq; ··· 1085 1085 * 1086 1086 * KVM_IRQFD_FLAG_RESAMPLE indicates resamplefd is valid and specifies 1087 1087 * the irqfd to operate in resampling mode for level triggered interrupt 1088 - * emulation. See Documentation/virtual/kvm/api.txt. 1088 + * emulation. See Documentation/virt/kvm/api.txt. 1089 1089 */ 1090 1090 #define KVM_IRQFD_FLAG_RESAMPLE (1 << 1) 1091 1091
+1 -1
virt/kvm/arm/arm.c
··· 727 727 * Ensure we set mode to IN_GUEST_MODE after we disable 728 728 * interrupts and before the final VCPU requests check. 729 729 * See the comment in kvm_vcpu_exiting_guest_mode() and 730 - * Documentation/virtual/kvm/vcpu-requests.rst 730 + * Documentation/virt/kvm/vcpu-requests.rst 731 731 */ 732 732 smp_store_mb(vcpu->mode, IN_GUEST_MODE); 733 733
+1 -1
virt/kvm/arm/vgic/vgic-mmio-v3.c
··· 250 250 * pending state of interrupt is latched in pending_latch variable. 251 251 * Userspace will save and restore pending state and line_level 252 252 * separately. 253 - * Refer to Documentation/virtual/kvm/devices/arm-vgic-v3.txt 253 + * Refer to Documentation/virt/kvm/devices/arm-vgic-v3.txt 254 254 * for handling of ISPENDR and ICPENDR. 255 255 */ 256 256 for (i = 0; i < len * 8; i++) {
+2 -2
virt/kvm/arm/vgic/vgic.h
··· 42 42 VGIC_AFFINITY_LEVEL(val, 3)) 43 43 44 44 /* 45 - * As per Documentation/virtual/kvm/devices/arm-vgic-v3.txt, 45 + * As per Documentation/virt/kvm/devices/arm-vgic-v3.txt, 46 46 * below macros are defined for CPUREG encoding. 47 47 */ 48 48 #define KVM_REG_ARM_VGIC_SYSREG_OP0_MASK 0x000000000000c000 ··· 63 63 KVM_REG_ARM_VGIC_SYSREG_OP2_MASK) 64 64 65 65 /* 66 - * As per Documentation/virtual/kvm/devices/arm-vgic-its.txt, 66 + * As per Documentation/virt/kvm/devices/arm-vgic-its.txt, 67 67 * below macros are defined for ITS table entry encoding. 68 68 */ 69 69 #define KVM_ITS_CTE_VALID_SHIFT 63