Documentation: move Documentation/virtual to Documentation/virt
authorChristoph Hellwig <hch@lst.de>
Wed, 24 Jul 2019 07:24:49 +0000 (09:24 +0200)
committerPaolo Bonzini <pbonzini@redhat.com>
Wed, 24 Jul 2019 08:52:11 +0000 (10:52 +0200)
Renaming docs seems to be en vogue at the moment, so fix on of the
grossly misnamed directories.  We usually never use "virtual" as
a shortcut for virtualization in the kernel, but always virt,
as seen in the virt/ top-level directory.  Fix up the documentation
to match that.

Fixes: ed16648eb5b8 ("Move kvm, uml, and lguest subdirectories under a common "virtual" directory, I.E:")
Signed-off-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
40 files changed:
Documentation/admin-guide/kernel-parameters.txt
Documentation/virt/index.rst [moved from Documentation/virtual/index.rst with 100% similarity]
Documentation/virt/kvm/amd-memory-encryption.rst [moved from Documentation/virtual/kvm/amd-memory-encryption.rst with 100% similarity]
Documentation/virt/kvm/api.txt [moved from Documentation/virtual/kvm/api.txt with 99% similarity]
Documentation/virt/kvm/arm/hyp-abi.txt [moved from Documentation/virtual/kvm/arm/hyp-abi.txt with 100% similarity]
Documentation/virt/kvm/arm/psci.txt [moved from Documentation/virtual/kvm/arm/psci.txt with 100% similarity]
Documentation/virt/kvm/cpuid.rst [moved from Documentation/virtual/kvm/cpuid.rst with 100% similarity]
Documentation/virt/kvm/devices/README [moved from Documentation/virtual/kvm/devices/README with 100% similarity]
Documentation/virt/kvm/devices/arm-vgic-its.txt [moved from Documentation/virtual/kvm/devices/arm-vgic-its.txt with 100% similarity]
Documentation/virt/kvm/devices/arm-vgic-v3.txt [moved from Documentation/virtual/kvm/devices/arm-vgic-v3.txt with 100% similarity]
Documentation/virt/kvm/devices/arm-vgic.txt [moved from Documentation/virtual/kvm/devices/arm-vgic.txt with 100% similarity]
Documentation/virt/kvm/devices/mpic.txt [moved from Documentation/virtual/kvm/devices/mpic.txt with 100% similarity]
Documentation/virt/kvm/devices/s390_flic.txt [moved from Documentation/virtual/kvm/devices/s390_flic.txt with 100% similarity]
Documentation/virt/kvm/devices/vcpu.txt [moved from Documentation/virtual/kvm/devices/vcpu.txt with 100% similarity]
Documentation/virt/kvm/devices/vfio.txt [moved from Documentation/virtual/kvm/devices/vfio.txt with 100% similarity]
Documentation/virt/kvm/devices/vm.txt [moved from Documentation/virtual/kvm/devices/vm.txt with 100% similarity]
Documentation/virt/kvm/devices/xics.txt [moved from Documentation/virtual/kvm/devices/xics.txt with 100% similarity]
Documentation/virt/kvm/devices/xive.txt [moved from Documentation/virtual/kvm/devices/xive.txt with 100% similarity]
Documentation/virt/kvm/halt-polling.txt [moved from Documentation/virtual/kvm/halt-polling.txt with 100% similarity]
Documentation/virt/kvm/hypercalls.txt [moved from Documentation/virtual/kvm/hypercalls.txt with 97% similarity]
Documentation/virt/kvm/index.rst [moved from Documentation/virtual/kvm/index.rst with 100% similarity]
Documentation/virt/kvm/locking.txt [moved from Documentation/virtual/kvm/locking.txt with 100% similarity]
Documentation/virt/kvm/mmu.txt [moved from Documentation/virtual/kvm/mmu.txt with 99% similarity]
Documentation/virt/kvm/msr.txt [moved from Documentation/virtual/kvm/msr.txt with 100% similarity]
Documentation/virt/kvm/nested-vmx.txt [moved from Documentation/virtual/kvm/nested-vmx.txt with 100% similarity]
Documentation/virt/kvm/ppc-pv.txt [moved from Documentation/virtual/kvm/ppc-pv.txt with 100% similarity]
Documentation/virt/kvm/review-checklist.txt [moved from Documentation/virtual/kvm/review-checklist.txt with 95% similarity]
Documentation/virt/kvm/s390-diag.txt [moved from Documentation/virtual/kvm/s390-diag.txt with 100% similarity]
Documentation/virt/kvm/timekeeping.txt [moved from Documentation/virtual/kvm/timekeeping.txt with 100% similarity]
Documentation/virt/kvm/vcpu-requests.rst [moved from Documentation/virtual/kvm/vcpu-requests.rst with 100% similarity]
Documentation/virt/paravirt_ops.rst [moved from Documentation/virtual/paravirt_ops.rst with 100% similarity]
Documentation/virt/uml/UserModeLinux-HOWTO.txt [moved from Documentation/virtual/uml/UserModeLinux-HOWTO.txt with 100% similarity]
MAINTAINERS
arch/powerpc/include/uapi/asm/kvm_para.h
arch/x86/kvm/mmu.c
include/uapi/linux/kvm.h
tools/include/uapi/linux/kvm.h
virt/kvm/arm/arm.c
virt/kvm/arm/vgic/vgic-mmio-v3.c
virt/kvm/arm/vgic/vgic.h

index 099c5a4..8a8880c 100644 (file)
                        mem_encrypt=on:         Activate SME
                        mem_encrypt=off:        Do not activate SME
 
-                       Refer to Documentation/virtual/kvm/amd-memory-encryption.rst
+                       Refer to Documentation/virt/kvm/amd-memory-encryption.rst
                        for details on when memory encryption can be activated.
 
        mem_sleep_default=      [SUSPEND] Default system suspend mode:
similarity index 99%
rename from Documentation/virtual/kvm/api.txt
rename to Documentation/virt/kvm/api.txt
index e54a3f5..2d06776 100644 (file)
@@ -3781,7 +3781,7 @@ encrypted VMs.
 
 Currently, this ioctl is used for issuing Secure Encrypted Virtualization
 (SEV) commands on AMD Processors. The SEV commands are defined in
-Documentation/virtual/kvm/amd-memory-encryption.rst.
+Documentation/virt/kvm/amd-memory-encryption.rst.
 
 4.111 KVM_MEMORY_ENCRYPT_REG_REGION
 
similarity index 97%
rename from Documentation/virtual/kvm/hypercalls.txt
rename to Documentation/virt/kvm/hypercalls.txt
index da21065..5f6d291 100644 (file)
@@ -18,7 +18,7 @@ S390:
   number in R1.
 
   For further information on the S390 diagnose call as supported by KVM,
-  refer to Documentation/virtual/kvm/s390-diag.txt.
+  refer to Documentation/virt/kvm/s390-diag.txt.
 
  PowerPC:
   It uses R3-R10 and hypercall number in R11. R4-R11 are used as output registers.
@@ -26,7 +26,7 @@ S390:
 
   KVM hypercalls uses 4 byte opcode, that are patched with 'hypercall-instructions'
   property inside the device tree's /hypervisor node.
-  For more information refer to Documentation/virtual/kvm/ppc-pv.txt
+  For more information refer to Documentation/virt/kvm/ppc-pv.txt
 
 MIPS:
   KVM hypercalls use the HYPCALL instruction with code 0 and the hypercall
similarity index 99%
rename from Documentation/virtual/kvm/mmu.txt
rename to Documentation/virt/kvm/mmu.txt
index 2efe0ef..1b9880d 100644 (file)
@@ -298,7 +298,7 @@ Handling a page fault is performed as follows:
      vcpu->arch.mmio_gfn, and call the emulator
  - If both P bit and R/W bit of error code are set, this could possibly
    be handled as a "fast page fault" (fixed without taking the MMU lock).  See
-   the description in Documentation/virtual/kvm/locking.txt.
+   the description in Documentation/virt/kvm/locking.txt.
  - if needed, walk the guest page tables to determine the guest translation
    (gva->gpa or ngpa->gpa)
    - if permissions are insufficient, reflect the fault back to the guest
similarity index 95%
rename from Documentation/virtual/kvm/review-checklist.txt
rename to Documentation/virt/kvm/review-checklist.txt
index a83b276..499af49 100644 (file)
@@ -7,7 +7,7 @@ Review checklist for kvm patches
 2.  Patches should be against kvm.git master branch.
 
 3.  If the patch introduces or modifies a new userspace API:
-    - the API must be documented in Documentation/virtual/kvm/api.txt
+    - the API must be documented in Documentation/virt/kvm/api.txt
     - the API must be discoverable using KVM_CHECK_EXTENSION
 
 4.  New state must include support for save/restore.
index debbb7b..1aec936 100644 (file)
@@ -8727,7 +8727,7 @@ L:        kvm@vger.kernel.org
 W:     http://www.linux-kvm.org
 T:     git git://git.kernel.org/pub/scm/virt/kvm/kvm.git
 S:     Supported
-F:     Documentation/virtual/kvm/
+F:     Documentation/virt/kvm/
 F:     include/trace/events/kvm.h
 F:     include/uapi/asm-generic/kvm*
 F:     include/uapi/linux/kvm*
@@ -12054,7 +12054,7 @@ M:      Juergen Gross <jgross@suse.com>
 M:     Alok Kataria <akataria@vmware.com>
 L:     virtualization@lists.linux-foundation.org
 S:     Supported
-F:     Documentation/virtual/paravirt_ops.txt
+F:     Documentation/virt/paravirt_ops.txt
 F:     arch/*/kernel/paravirt*
 F:     arch/*/include/asm/paravirt*.h
 F:     include/linux/hypervisor.h
@@ -16745,7 +16745,7 @@ W:      http://user-mode-linux.sourceforge.net
 Q:     https://patchwork.ozlabs.org/project/linux-um/list/
 T:     git git://git.kernel.org/pub/scm/linux/kernel/git/rw/uml.git
 S:     Maintained
-F:     Documentation/virtual/uml/
+F:     Documentation/virt/uml/
 F:     arch/um/
 F:     arch/x86/um/
 F:     fs/hostfs/
index 01555c6..be48c22 100644 (file)
@@ -31,7 +31,7 @@
  * Struct fields are always 32 or 64 bit aligned, depending on them being 32
  * or 64 bit wide respectively.
  *
- * See Documentation/virtual/kvm/ppc-pv.txt
+ * See Documentation/virt/kvm/ppc-pv.txt
  */
 struct kvm_vcpu_arch_shared {
        __u64 scratch1;
index 8f72526..24843cf 100644 (file)
@@ -3466,7 +3466,7 @@ static bool fast_page_fault(struct kvm_vcpu *vcpu, gva_t gva, int level,
                /*
                 * Currently, fast page fault only works for direct mapping
                 * since the gfn is not stable for indirect shadow page. See
-                * Documentation/virtual/kvm/locking.txt to get more detail.
+                * Documentation/virt/kvm/locking.txt to get more detail.
                 */
                fault_handled = fast_pf_fix_direct_spte(vcpu, sp,
                                                        iterator.sptep, spte,
index a7c1954..5e3f12d 100644 (file)
@@ -116,7 +116,7 @@ struct kvm_irq_level {
         * ACPI gsi notion of irq.
         * For IA-64 (APIC model) IOAPIC0: irq 0-23; IOAPIC1: irq 24-47..
         * For X86 (standard AT mode) PIC0/1: irq 0-15. IOAPIC0: 0-23..
-        * For ARM: See Documentation/virtual/kvm/api.txt
+        * For ARM: See Documentation/virt/kvm/api.txt
         */
        union {
                __u32 irq;
@@ -1086,7 +1086,7 @@ struct kvm_xen_hvm_config {
  *
  * KVM_IRQFD_FLAG_RESAMPLE indicates resamplefd is valid and specifies
  * the irqfd to operate in resampling mode for level triggered interrupt
- * emulation.  See Documentation/virtual/kvm/api.txt.
+ * emulation.  See Documentation/virt/kvm/api.txt.
  */
 #define KVM_IRQFD_FLAG_RESAMPLE (1 << 1)
 
index c2152f3..e7c67be 100644 (file)
@@ -116,7 +116,7 @@ struct kvm_irq_level {
         * ACPI gsi notion of irq.
         * For IA-64 (APIC model) IOAPIC0: irq 0-23; IOAPIC1: irq 24-47..
         * For X86 (standard AT mode) PIC0/1: irq 0-15. IOAPIC0: 0-23..
-        * For ARM: See Documentation/virtual/kvm/api.txt
+        * For ARM: See Documentation/virt/kvm/api.txt
         */
        union {
                __u32 irq;
@@ -1085,7 +1085,7 @@ struct kvm_xen_hvm_config {
  *
  * KVM_IRQFD_FLAG_RESAMPLE indicates resamplefd is valid and specifies
  * the irqfd to operate in resampling mode for level triggered interrupt
- * emulation.  See Documentation/virtual/kvm/api.txt.
+ * emulation.  See Documentation/virt/kvm/api.txt.
  */
 #define KVM_IRQFD_FLAG_RESAMPLE (1 << 1)
 
index f645c0f..acc4324 100644 (file)
@@ -727,7 +727,7 @@ int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *run)
                 * Ensure we set mode to IN_GUEST_MODE after we disable
                 * interrupts and before the final VCPU requests check.
                 * See the comment in kvm_vcpu_exiting_guest_mode() and
-                * Documentation/virtual/kvm/vcpu-requests.rst
+                * Documentation/virt/kvm/vcpu-requests.rst
                 */
                smp_store_mb(vcpu->mode, IN_GUEST_MODE);
 
index 936962a..c45e2d7 100644 (file)
@@ -250,7 +250,7 @@ static unsigned long vgic_v3_uaccess_read_pending(struct kvm_vcpu *vcpu,
         * pending state of interrupt is latched in pending_latch variable.
         * Userspace will save and restore pending state and line_level
         * separately.
-        * Refer to Documentation/virtual/kvm/devices/arm-vgic-v3.txt
+        * Refer to Documentation/virt/kvm/devices/arm-vgic-v3.txt
         * for handling of ISPENDR and ICPENDR.
         */
        for (i = 0; i < len * 8; i++) {
index 57205be..3b7525d 100644 (file)
@@ -42,7 +42,7 @@
                            VGIC_AFFINITY_LEVEL(val, 3))
 
 /*
- * As per Documentation/virtual/kvm/devices/arm-vgic-v3.txt,
+ * As per Documentation/virt/kvm/devices/arm-vgic-v3.txt,
  * below macros are defined for CPUREG encoding.
  */
 #define KVM_REG_ARM_VGIC_SYSREG_OP0_MASK   0x000000000000c000
@@ -63,7 +63,7 @@
                                      KVM_REG_ARM_VGIC_SYSREG_OP2_MASK)
 
 /*
- * As per Documentation/virtual/kvm/devices/arm-vgic-its.txt,
+ * As per Documentation/virt/kvm/devices/arm-vgic-its.txt,
  * below macros are defined for ITS table entry encoding.
  */
 #define KVM_ITS_CTE_VALID_SHIFT                63