Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

docs: move x86 documentation into Documentation/arch/

Move the x86 documentation under Documentation/arch/ as a way of cleaning
up the top-level directory and making the structure of our docs more
closely match the structure of the source directories it describes.

All in-kernel references to the old paths have been updated.

Acked-by: Dave Hansen <dave.hansen@linux.intel.com>
Cc: linux-arch@vger.kernel.org
Cc: x86@kernel.org
Cc: Borislav Petkov <bp@alien8.de>
Cc: Thomas Gleixner <tglx@linutronix.de>
Link: https://lore.kernel.org/lkml/20230315211523.108836-1-corbet@lwn.net/
Signed-off-by: Jonathan Corbet <corbet@lwn.net>

+54 -54
+1 -1
Documentation/admin-guide/hw-vuln/mds.rst
··· 58 58 Hyper-Thread attacks are possible. 59 59 60 60 Deeper technical information is available in the MDS specific x86 61 - architecture section: :ref:`Documentation/x86/mds.rst <mds>`. 61 + architecture section: :ref:`Documentation/arch/x86/mds.rst <mds>`. 62 62 63 63 64 64 Attack scenarios
+1 -1
Documentation/admin-guide/hw-vuln/tsx_async_abort.rst
··· 63 63 which in turn potentially leaks data stored in the buffers. 64 64 65 65 More detailed technical information is available in the TAA specific x86 66 - architecture section: :ref:`Documentation/x86/tsx_async_abort.rst <tsx_async_abort>`. 66 + architecture section: :ref:`Documentation/arch/x86/tsx_async_abort.rst <tsx_async_abort>`. 67 67 68 68 69 69 Attack scenarios
+3 -3
Documentation/admin-guide/kernel-parameters.rst
··· 177 177 X86-32 X86-32, aka i386 architecture is enabled. 178 178 X86-64 X86-64 architecture is enabled. 179 179 More X86-64 boot options can be found in 180 - Documentation/x86/x86_64/boot-options.rst. 180 + Documentation/arch/x86/x86_64/boot-options.rst. 181 181 X86 Either 32-bit or 64-bit x86 (same as X86-32+X86-64) 182 182 X86_UV SGI UV support is enabled. 183 183 XEN Xen support is enabled ··· 192 192 Parameters denoted with BOOT are actually interpreted by the boot 193 193 loader, and have no meaning to the kernel directly. 194 194 Do not modify the syntax of boot loader parameters without extreme 195 - need or coordination with <Documentation/x86/boot.rst>. 195 + need or coordination with <Documentation/arch/x86/boot.rst>. 196 196 197 197 There are also arch-specific kernel-parameters not documented here. 198 - See for example <Documentation/x86/x86_64/boot-options.rst>. 198 + See for example <Documentation/arch/x86/x86_64/boot-options.rst>. 199 199 200 200 Note that ALL kernel parameters listed below are CASE SENSITIVE, and that 201 201 a trailing = on the name of any parameter states that that parameter will
+4 -4
Documentation/admin-guide/kernel-parameters.txt
··· 2973 2973 2974 2974 mce [X86-32] Machine Check Exception 2975 2975 2976 - mce=option [X86-64] See Documentation/x86/x86_64/boot-options.rst 2976 + mce=option [X86-64] See Documentation/arch/x86/x86_64/boot-options.rst 2977 2977 2978 2978 md= [HW] RAID subsystems devices and level 2979 2979 See Documentation/admin-guide/md.rst. ··· 4410 4410 and performance comparison. 4411 4411 4412 4412 pirq= [SMP,APIC] Manual mp-table setup 4413 - See Documentation/x86/i386/IO-APIC.rst. 4413 + See Documentation/arch/x86/i386/IO-APIC.rst. 4414 4414 4415 4415 plip= [PPT,NET] Parallel port network link 4416 4416 Format: { parport<nr> | timid | 0 } ··· 5588 5588 5589 5589 serialnumber [BUGS=X86-32] 5590 5590 5591 - sev=option[,option...] [X86-64] See Documentation/x86/x86_64/boot-options.rst 5591 + sev=option[,option...] [X86-64] See Documentation/arch/x86/x86_64/boot-options.rst 5592 5592 5593 5593 shapers= [NET] 5594 5594 Maximal number of shapers. ··· 6767 6767 Can be used multiple times for multiple devices. 6768 6768 6769 6769 vga= [BOOT,X86-32] Select a particular video mode 6770 - See Documentation/x86/boot.rst and 6770 + See Documentation/arch/x86/boot.rst and 6771 6771 Documentation/admin-guide/svga.rst. 6772 6772 Use vga=ask for menu. 6773 6773 This is actually a boot loader parameter; the value is
+1 -1
Documentation/admin-guide/ras.rst
··· 199 199 mode). 200 200 201 201 .. [#f3] For more details about the Machine Check Architecture (MCA), 202 - please read Documentation/x86/x86_64/machinecheck.rst at the Kernel tree. 202 + please read Documentation/arch/x86/x86_64/machinecheck.rst at the Kernel tree. 203 203 204 204 EDAC - Error Detection And Correction 205 205 *************************************
+2 -2
Documentation/admin-guide/sysctl/kernel.rst
··· 95 95 the value 340 = 0x154. 96 96 97 97 See the ``type_of_loader`` and ``ext_loader_type`` fields in 98 - Documentation/x86/boot.rst for additional information. 98 + Documentation/arch/x86/boot.rst for additional information. 99 99 100 100 101 101 bootloader_version (x86 only) ··· 105 105 file will contain the value 564 = 0x234. 106 106 107 107 See the ``type_of_loader`` and ``ext_loader_ver`` fields in 108 - Documentation/x86/boot.rst for additional information. 108 + Documentation/arch/x86/boot.rst for additional information. 109 109 110 110 111 111 bpf_stats_enabled
+1 -1
Documentation/arch/index.rst
··· 24 24 ../s390/index 25 25 ../sh/index 26 26 ../sparc/index 27 - ../x86/index 27 + x86/index 28 28 ../xtensa/index
+1 -1
Documentation/core-api/asm-annotations.rst
··· 44 44 run to check and fix the object if needed. Currently, ``objtool`` can report 45 45 missing frame pointer setup/destruction in functions. It can also 46 46 automatically generate annotations for the ORC unwinder 47 - (Documentation/x86/orc-unwinder.rst) 47 + (Documentation/arch/x86/orc-unwinder.rst) 48 48 for most code. Both of these are especially important to support reliable 49 49 stack traces which are in turn necessary for kernel live patching 50 50 (Documentation/livepatch/livepatch.rst).
+1 -1
Documentation/driver-api/device-io.rst
··· 410 410 411 411 ioremap_uc() behaves like ioremap() except that on the x86 architecture without 412 412 'PAT' mode, it marks memory as uncached even when the MTRR has designated 413 - it as cacheable, see Documentation/x86/pat.rst. 413 + it as cacheable, see Documentation/arch/x86/pat.rst. 414 414 415 415 Portable drivers should avoid the use of ioremap_uc(). 416 416
+1 -1
Documentation/virt/kvm/api.rst
··· 7456 7456 by running an enclave in a VM, KVM prevents access to privileged attributes by 7457 7457 default. 7458 7458 7459 - See Documentation/x86/sgx.rst for more details. 7459 + See Documentation/arch/x86/sgx.rst for more details. 7460 7460 7461 7461 7.26 KVM_CAP_PPC_RPT_INVALIDATE 7462 7462 -------------------------------
Documentation/x86/amd-memory-encryption.rst Documentation/arch/x86/amd-memory-encryption.rst
Documentation/x86/amd_hsmp.rst Documentation/arch/x86/amd_hsmp.rst
+2 -2
Documentation/x86/boot.rst Documentation/arch/x86/boot.rst
··· 1344 1344 In addition to read/modify/write the setup header of the struct 1345 1345 boot_params as that of 16-bit boot protocol, the boot loader should 1346 1346 also fill the additional fields of the struct boot_params as 1347 - described in chapter Documentation/x86/zero-page.rst. 1347 + described in chapter Documentation/arch/x86/zero-page.rst. 1348 1348 1349 1349 After setting up the struct boot_params, the boot loader can load the 1350 1350 32/64-bit kernel in the same way as that of 16-bit boot protocol. ··· 1380 1380 In addition to read/modify/write the setup header of the struct 1381 1381 boot_params as that of 16-bit boot protocol, the boot loader should 1382 1382 also fill the additional fields of the struct boot_params as described 1383 - in chapter Documentation/x86/zero-page.rst. 1383 + in chapter Documentation/arch/x86/zero-page.rst. 1384 1384 1385 1385 After setting up the struct boot_params, the boot loader can load 1386 1386 64-bit kernel in the same way as that of 16-bit boot protocol, but
+1 -1
Documentation/x86/booting-dt.rst Documentation/arch/x86/booting-dt.rst
··· 7 7 the decompressor (the real mode entry point goes to the same 32bit 8 8 entry point once it switched into protected mode). That entry point 9 9 supports one calling convention which is documented in 10 - Documentation/x86/boot.rst 10 + Documentation/arch/x86/boot.rst 11 11 The physical pointer to the device-tree block is passed via setup_data 12 12 which requires at least boot protocol 2.09. 13 13 The type filed is defined as
Documentation/x86/buslock.rst Documentation/arch/x86/buslock.rst
Documentation/x86/cpuinfo.rst Documentation/arch/x86/cpuinfo.rst
Documentation/x86/earlyprintk.rst Documentation/arch/x86/earlyprintk.rst
Documentation/x86/elf_auxvec.rst Documentation/arch/x86/elf_auxvec.rst
Documentation/x86/entry_64.rst Documentation/arch/x86/entry_64.rst
Documentation/x86/exception-tables.rst Documentation/arch/x86/exception-tables.rst
Documentation/x86/features.rst Documentation/arch/x86/features.rst
Documentation/x86/i386/IO-APIC.rst Documentation/arch/x86/i386/IO-APIC.rst
Documentation/x86/i386/index.rst Documentation/arch/x86/i386/index.rst
Documentation/x86/ifs.rst Documentation/arch/x86/ifs.rst
Documentation/x86/index.rst Documentation/arch/x86/index.rst
Documentation/x86/intel-hfi.rst Documentation/arch/x86/intel-hfi.rst
Documentation/x86/intel_txt.rst Documentation/arch/x86/intel_txt.rst
Documentation/x86/iommu.rst Documentation/arch/x86/iommu.rst
Documentation/x86/kernel-stacks.rst Documentation/arch/x86/kernel-stacks.rst
Documentation/x86/mds.rst Documentation/arch/x86/mds.rst
Documentation/x86/microcode.rst Documentation/arch/x86/microcode.rst
+1 -1
Documentation/x86/mtrr.rst Documentation/arch/x86/mtrr.rst
··· 28 28 firmware code though and the OS does not make any specific MTRR mapping 29 29 requests mtrr_type_lookup() should always return MTRR_TYPE_INVALID. 30 30 31 - For details refer to Documentation/x86/pat.rst. 31 + For details refer to Documentation/arch/x86/pat.rst. 32 32 33 33 .. tip:: 34 34 On Intel P6 family processors (Pentium Pro, Pentium II and later)
Documentation/x86/orc-unwinder.rst Documentation/arch/x86/orc-unwinder.rst
Documentation/x86/pat.rst Documentation/arch/x86/pat.rst
Documentation/x86/pti.rst Documentation/arch/x86/pti.rst
Documentation/x86/resctrl.rst Documentation/arch/x86/resctrl.rst
Documentation/x86/sgx.rst Documentation/arch/x86/sgx.rst
Documentation/x86/sva.rst Documentation/arch/x86/sva.rst
Documentation/x86/tdx.rst Documentation/arch/x86/tdx.rst
Documentation/x86/tlb.rst Documentation/arch/x86/tlb.rst
Documentation/x86/topology.rst Documentation/arch/x86/topology.rst
Documentation/x86/tsx_async_abort.rst Documentation/arch/x86/tsx_async_abort.rst
Documentation/x86/usb-legacy-support.rst Documentation/arch/x86/usb-legacy-support.rst
+1 -1
Documentation/x86/x86_64/5level-paging.rst Documentation/arch/x86/x86_64/5level-paging.rst
··· 20 20 QEMU 2.9 and later support 5-level paging. 21 21 22 22 Virtual memory layout for 5-level paging is described in 23 - Documentation/x86/x86_64/mm.rst 23 + Documentation/arch/x86/x86_64/mm.rst 24 24 25 25 26 26 Enabling 5-level paging
+2 -2
Documentation/x86/x86_64/boot-options.rst Documentation/arch/x86/x86_64/boot-options.rst
··· 9 9 10 10 Machine check 11 11 ============= 12 - Please see Documentation/x86/x86_64/machinecheck.rst for sysfs runtime tunables. 12 + Please see Documentation/arch/x86/x86_64/machinecheck.rst for sysfs runtime tunables. 13 13 14 14 mce=off 15 15 Disable machine check ··· 82 82 Don't use the local APIC (alias for i386 compatibility) 83 83 84 84 pirq=... 85 - See Documentation/x86/i386/IO-APIC.rst 85 + See Documentation/arch/x86/i386/IO-APIC.rst 86 86 87 87 noapictimer 88 88 Don't set up the APIC timer
Documentation/x86/x86_64/cpu-hotplug-spec.rst Documentation/arch/x86/x86_64/cpu-hotplug-spec.rst
+1 -1
Documentation/x86/x86_64/fake-numa-for-cpusets.rst Documentation/arch/x86/x86_64/fake-numa-for-cpusets.rst
··· 18 18 Documentation/admin-guide/cgroup-v1/cpusets.rst. 19 19 There are a number of different configurations you can use for your needs. For 20 20 more information on the numa=fake command line option and its various ways of 21 - configuring fake nodes, see Documentation/x86/x86_64/boot-options.rst. 21 + configuring fake nodes, see Documentation/arch/x86/x86_64/boot-options.rst. 22 22 23 23 For the purposes of this introduction, we'll assume a very primitive NUMA 24 24 emulation setup of "numa=fake=4*512,". This will split our system memory into
Documentation/x86/x86_64/fsgs.rst Documentation/arch/x86/x86_64/fsgs.rst
Documentation/x86/x86_64/index.rst Documentation/arch/x86/x86_64/index.rst
Documentation/x86/x86_64/machinecheck.rst Documentation/arch/x86/x86_64/machinecheck.rst
Documentation/x86/x86_64/mm.rst Documentation/arch/x86/x86_64/mm.rst
Documentation/x86/x86_64/uefi.rst Documentation/arch/x86/x86_64/uefi.rst
Documentation/x86/xstate.rst Documentation/arch/x86/xstate.rst
Documentation/x86/zero-page.rst Documentation/arch/x86/zero-page.rst
+6 -6
MAINTAINERS
··· 1071 1071 R: Carlos Bilbao <carlos.bilbao@amd.com> 1072 1072 L: platform-driver-x86@vger.kernel.org 1073 1073 S: Maintained 1074 - F: Documentation/x86/amd_hsmp.rst 1074 + F: Documentation/arch/x86/amd_hsmp.rst 1075 1075 F: arch/x86/include/asm/amd_hsmp.h 1076 1076 F: arch/x86/include/uapi/asm/amd_hsmp.h 1077 1077 F: drivers/platform/x86/amd/hsmp.c ··· 10643 10643 S: Supported 10644 10644 W: http://tboot.sourceforge.net 10645 10645 T: hg http://tboot.hg.sourceforge.net:8000/hgroot/tboot/tboot 10646 - F: Documentation/x86/intel_txt.rst 10646 + F: Documentation/arch/x86/intel_txt.rst 10647 10647 F: arch/x86/kernel/tboot.c 10648 10648 F: include/linux/tboot.h 10649 10649 ··· 10654 10654 S: Supported 10655 10655 Q: https://patchwork.kernel.org/project/intel-sgx/list/ 10656 10656 T: git git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git x86/sgx 10657 - F: Documentation/x86/sgx.rst 10657 + F: Documentation/arch/x86/sgx.rst 10658 10658 F: arch/x86/entry/vdso/vsgx.S 10659 10659 F: arch/x86/include/asm/sgx.h 10660 10660 F: arch/x86/include/uapi/asm/sgx.h ··· 17630 17630 M: Reinette Chatre <reinette.chatre@intel.com> 17631 17631 L: linux-kernel@vger.kernel.org 17632 17632 S: Supported 17633 - F: Documentation/x86/resctrl* 17633 + F: Documentation/arch/x86/resctrl* 17634 17634 F: arch/x86/include/asm/resctrl.h 17635 17635 F: arch/x86/kernel/cpu/resctrl/ 17636 17636 F: tools/testing/selftests/resctrl/ ··· 22660 22660 S: Maintained 22661 22661 T: git git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git x86/core 22662 22662 F: Documentation/devicetree/bindings/x86/ 22663 - F: Documentation/x86/ 22663 + F: Documentation/arch/x86/ 22664 22664 F: arch/x86/ 22665 22665 22666 22666 X86 ENTRY CODE ··· 22676 22676 L: linux-edac@vger.kernel.org 22677 22677 S: Maintained 22678 22678 F: Documentation/ABI/testing/sysfs-mce 22679 - F: Documentation/x86/x86_64/machinecheck.rst 22679 + F: Documentation/arch/x86/x86_64/machinecheck.rst 22680 22680 F: arch/x86/kernel/cpu/mce/* 22681 22681 22682 22682 X86 MICROCODE UPDATE SUPPORT
+1 -1
arch/arm/Kconfig
··· 986 986 uniprocessor machines. On a uniprocessor machine, the kernel 987 987 will run faster if you say N here. 988 988 989 - See also <file:Documentation/x86/i386/IO-APIC.rst>, 989 + See also <file:Documentation/arch/x86/i386/IO-APIC.rst>, 990 990 <file:Documentation/admin-guide/lockup-watchdogs.rst> and the SMP-HOWTO available at 991 991 <http://tldp.org/HOWTO/SMP-HOWTO.html>. 992 992
+5 -5
arch/x86/Kconfig
··· 434 434 Y to "Enhanced Real Time Clock Support", below. The "Advanced Power 435 435 Management" code will be disabled if you say Y here. 436 436 437 - See also <file:Documentation/x86/i386/IO-APIC.rst>, 437 + See also <file:Documentation/arch/x86/i386/IO-APIC.rst>, 438 438 <file:Documentation/admin-guide/lockup-watchdogs.rst> and the SMP-HOWTO available at 439 439 <http://www.tldp.org/docs.html#howto>. 440 440 ··· 1324 1324 the Linux kernel. 1325 1325 1326 1326 The preferred method to load microcode from a detached initrd is described 1327 - in Documentation/x86/microcode.rst. For that you need to enable 1327 + in Documentation/arch/x86/microcode.rst. For that you need to enable 1328 1328 CONFIG_BLK_DEV_INITRD in order for the loader to be able to scan the 1329 1329 initrd for microcode blobs. 1330 1330 ··· 1510 1510 A kernel with the option enabled can be booted on machines that 1511 1511 support 4- or 5-level paging. 1512 1512 1513 - See Documentation/x86/x86_64/5level-paging.rst for more 1513 + See Documentation/arch/x86/x86_64/5level-paging.rst for more 1514 1514 information. 1515 1515 1516 1516 Say N if unsure. ··· 1774 1774 You can safely say Y even if your machine doesn't have MTRRs, you'll 1775 1775 just add about 9 KB to your kernel. 1776 1776 1777 - See <file:Documentation/x86/mtrr.rst> for more information. 1777 + See <file:Documentation/arch/x86/mtrr.rst> for more information. 1778 1778 1779 1779 config MTRR_SANITIZER 1780 1780 def_bool y ··· 2551 2551 ensuring that the majority of kernel addresses are not mapped 2552 2552 into userspace. 2553 2553 2554 - See Documentation/x86/pti.rst for more details. 2554 + See Documentation/arch/x86/pti.rst for more details. 2555 2555 2556 2556 config RETPOLINE 2557 2557 bool "Avoid speculative indirect branches in kernel"
+1 -1
arch/x86/Kconfig.debug
··· 97 97 code. When you use it make sure you have a big enough 98 98 IOMMU/AGP aperture. Most of the options enabled by this can 99 99 be set more finegrained using the iommu= command line 100 - options. See Documentation/x86/x86_64/boot-options.rst for more 100 + options. See Documentation/arch/x86/x86_64/boot-options.rst for more 101 101 details. 102 102 103 103 config IOMMU_LEAK
+1 -1
arch/x86/boot/header.S
··· 321 321 322 322 type_of_loader: .byte 0 # 0 means ancient bootloader, newer 323 323 # bootloaders know to change this. 324 - # See Documentation/x86/boot.rst for 324 + # See Documentation/arch/x86/boot.rst for 325 325 # assigned ids 326 326 327 327 # flags, unused bits must be zero (RFU) bit within loadflags
+1 -1
arch/x86/entry/entry_64.S
··· 8 8 * 9 9 * entry.S contains the system-call and fault low-level handling routines. 10 10 * 11 - * Some of this is documented in Documentation/x86/entry_64.rst 11 + * Some of this is documented in Documentation/arch/x86/entry_64.rst 12 12 * 13 13 * A note on terminology: 14 14 * - iret frame: Architecture defined interrupt frame from SS to RIP
+1 -1
arch/x86/include/asm/bootparam_utils.h
··· 38 38 * IMPORTANT NOTE TO BOOTLOADER AUTHORS: do not simply clear 39 39 * this field. The purpose of this field is to guarantee 40 40 * compliance with the x86 boot spec located in 41 - * Documentation/x86/boot.rst . That spec says that the 41 + * Documentation/arch/x86/boot.rst . That spec says that the 42 42 * *whole* structure should be cleared, after which only the 43 43 * portion defined by struct setup_header (boot_params->hdr) 44 44 * should be copied in.
+1 -1
arch/x86/include/asm/page_64_types.h
··· 49 49 50 50 #define __START_KERNEL_map _AC(0xffffffff80000000, UL) 51 51 52 - /* See Documentation/x86/x86_64/mm.rst for a description of the memory map. */ 52 + /* See Documentation/arch/x86/x86_64/mm.rst for a description of the memory map. */ 53 53 54 54 #define __PHYSICAL_MASK_SHIFT 52 55 55
+1 -1
arch/x86/include/asm/pgtable_64_types.h
··· 104 104 #define PGDIR_MASK (~(PGDIR_SIZE - 1)) 105 105 106 106 /* 107 - * See Documentation/x86/x86_64/mm.rst for a description of the memory map. 107 + * See Documentation/arch/x86/x86_64/mm.rst for a description of the memory map. 108 108 * 109 109 * Be very careful vs. KASLR when changing anything here. The KASLR address 110 110 * range must not overlap with anything except the KASAN shadow area, which
+1 -1
arch/x86/kernel/cpu/microcode/amd.c
··· 61 61 62 62 /* 63 63 * Microcode patch container file is prepended to the initrd in cpio 64 - * format. See Documentation/x86/microcode.rst 64 + * format. See Documentation/arch/x86/microcode.rst 65 65 */ 66 66 static const char 67 67 ucode_path[] __maybe_unused = "kernel/x86/microcode/AuthenticAMD.bin";
+1 -1
arch/x86/kernel/cpu/resctrl/monitor.c
··· 76 76 #define CF(cf) ((unsigned long)(1048576 * (cf) + 0.5)) 77 77 78 78 /* 79 - * The correction factor table is documented in Documentation/x86/resctrl.rst. 79 + * The correction factor table is documented in Documentation/arch/x86/resctrl.rst. 80 80 * If rmid > rmid threshold, MBM total and local values should be multiplied 81 81 * by the correction factor. 82 82 *
+1 -1
arch/x86/kernel/cpu/sgx/sgx.h
··· 15 15 16 16 #define EREMOVE_ERROR_MESSAGE \ 17 17 "EREMOVE returned %d (0x%x) and an EPC page was leaked. SGX may become unusable. " \ 18 - "Refer to Documentation/x86/sgx.rst for more information." 18 + "Refer to Documentation/arch/x86/sgx.rst for more information." 19 19 20 20 #define SGX_MAX_EPC_SECTIONS 8 21 21 #define SGX_EEXTEND_BLOCK_SIZE 256
+1 -1
arch/x86/kernel/kexec-bzimage64.c
··· 476 476 efi_map_offset = params_cmdline_sz; 477 477 efi_setup_data_offset = efi_map_offset + ALIGN(efi_map_sz, 16); 478 478 479 - /* Copy setup header onto bootparams. Documentation/x86/boot.rst */ 479 + /* Copy setup header onto bootparams. Documentation/arch/x86/boot.rst */ 480 480 setup_header_size = 0x0202 + kernel[0x0201] - setup_hdr_offset; 481 481 482 482 /* Is there a limit on setup header size? */
+1 -1
arch/x86/kernel/pci-dma.c
··· 124 124 } 125 125 126 126 /* 127 - * See <Documentation/x86/x86_64/boot-options.rst> for the iommu kernel 127 + * See <Documentation/arch/x86/x86_64/boot-options.rst> for the iommu kernel 128 128 * parameter documentation. 129 129 */ 130 130 static __init int iommu_setup(char *p)
+1 -1
arch/x86/mm/pat/set_memory.c
··· 234 234 * take full advantage of the the limited (s32) immediate addressing range (2G) 235 235 * of x86_64. 236 236 * 237 - * See Documentation/x86/x86_64/mm.rst for more detail. 237 + * See Documentation/arch/x86/x86_64/mm.rst for more detail. 238 238 */ 239 239 240 240 static inline unsigned long highmap_start_pfn(void)
+1 -1
arch/x86/mm/tlb.c
··· 925 925 } 926 926 927 927 /* 928 - * See Documentation/x86/tlb.rst for details. We choose 33 928 + * See Documentation/arch/x86/tlb.rst for details. We choose 33 929 929 * because it is large enough to cover the vast majority (at 930 930 * least 95%) of allocations, and is small enough that we are 931 931 * confident it will not cause too much overhead. Each single
+1 -1
arch/x86/platform/pvh/enlighten.c
··· 86 86 } 87 87 88 88 /* 89 - * See Documentation/x86/boot.rst. 89 + * See Documentation/arch/x86/boot.rst. 90 90 * 91 91 * Version 2.12 supports Xen entry point but we will use default x86/PC 92 92 * environment (i.e. hardware_subarch 0).
+1 -1
drivers/vhost/vhost.c
··· 1831 1831 1832 1832 /* TODO: This is really inefficient. We need something like get_user() 1833 1833 * (instruction directly accesses the data, with an exception table entry 1834 - * returning -EFAULT). See Documentation/x86/exception-tables.rst. 1834 + * returning -EFAULT). See Documentation/arch/x86/exception-tables.rst. 1835 1835 */ 1836 1836 static int set_bit_to_user(int nr, void __user *addr) 1837 1837 {
+1 -1
security/Kconfig
··· 110 110 See <https://www.intel.com/technology/security/> for more information 111 111 about Intel(R) TXT. 112 112 See <http://tboot.sourceforge.net> for more information about tboot. 113 - See Documentation/x86/intel_txt.rst for a description of how to enable 113 + See Documentation/arch/x86/intel_txt.rst for a description of how to enable 114 114 Intel TXT support in a kernel boot. 115 115 116 116 If you are unsure as to whether this is required, answer N.
+1 -1
tools/include/linux/err.h
··· 20 20 * Userspace note: 21 21 * The same principle works for userspace, because 'error' pointers 22 22 * fall down to the unused hole far from user space, as described 23 - * in Documentation/x86/x86_64/mm.rst for x86_64 arch: 23 + * in Documentation/arch/x86/x86_64/mm.rst for x86_64 arch: 24 24 * 25 25 * 0000000000000000 - 00007fffffffffff (=47 bits) user space, different per mm hole caused by [48:63] sign extension 26 26 * ffffffffffe00000 - ffffffffffffffff (=2 MB) unused hole
+1 -1
tools/objtool/Documentation/objtool.txt
··· 181 181 band. So it doesn't affect runtime performance and it can be 182 182 reliable even when interrupts or exceptions are involved. 183 183 184 - For more details, see Documentation/x86/orc-unwinder.rst. 184 + For more details, see Documentation/arch/x86/orc-unwinder.rst. 185 185 186 186 c) Higher live patching compatibility rate 187 187