Skip to content

Commit 57f33f1

Browse files
mmhalsean-jc
authored andcommitted
KVM: Correct kvm_vcpu_event(s) typo in KVM API documentation
Set KVM_GET_VCPU_EVENTS and KVM_SET_VCPU_EVENTS parameter type to `struct kvm_vcpu_events`. Events, plural. Opportunistically fix few other typos. Signed-off-by: Michal Luczaj <[email protected]> Link: https://lore.kernel.org/r/[email protected] Signed-off-by: Sean Christopherson <[email protected]>
1 parent 5804c19 commit 57f33f1

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

Documentation/virt/kvm/api.rst

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -540,7 +540,7 @@ ioctl is useful if the in-kernel PIC is not used.
540540
PPC:
541541
^^^^
542542

543-
Queues an external interrupt to be injected. This ioctl is overleaded
543+
Queues an external interrupt to be injected. This ioctl is overloaded
544544
with 3 different irq values:
545545

546546
a) KVM_INTERRUPT_SET
@@ -965,7 +965,7 @@ be set in the flags field of this ioctl:
965965
The KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL flag requests KVM to generate
966966
the contents of the hypercall page automatically; hypercalls will be
967967
intercepted and passed to userspace through KVM_EXIT_XEN. In this
968-
ase, all of the blob size and address fields must be zero.
968+
case, all of the blob size and address fields must be zero.
969969

970970
The KVM_XEN_HVM_CONFIG_EVTCHN_SEND flag indicates to KVM that userspace
971971
will always use the KVM_XEN_HVM_EVTCHN_SEND ioctl to deliver event
@@ -1070,7 +1070,7 @@ Other flags returned by ``KVM_GET_CLOCK`` are accepted but ignored.
10701070
:Extended by: KVM_CAP_INTR_SHADOW
10711071
:Architectures: x86, arm64
10721072
:Type: vcpu ioctl
1073-
:Parameters: struct kvm_vcpu_event (out)
1073+
:Parameters: struct kvm_vcpu_events (out)
10741074
:Returns: 0 on success, -1 on error
10751075

10761076
X86:
@@ -1193,7 +1193,7 @@ directly to the virtual CPU).
11931193
:Extended by: KVM_CAP_INTR_SHADOW
11941194
:Architectures: x86, arm64
11951195
:Type: vcpu ioctl
1196-
:Parameters: struct kvm_vcpu_event (in)
1196+
:Parameters: struct kvm_vcpu_events (in)
11971197
:Returns: 0 on success, -1 on error
11981198

11991199
X86:
@@ -3063,7 +3063,7 @@ as follow::
30633063
};
30643064

30653065
An entry with a "page_shift" of 0 is unused. Because the array is
3066-
organized in increasing order, a lookup can stop when encoutering
3066+
organized in increasing order, a lookup can stop when encountering
30673067
such an entry.
30683068

30693069
The "slb_enc" field provides the encoding to use in the SLB for the
@@ -3455,7 +3455,7 @@ Possible features:
34553455
- KVM_RUN and KVM_GET_REG_LIST are not available;
34563456

34573457
- KVM_GET_ONE_REG and KVM_SET_ONE_REG cannot be used to access
3458-
the scalable archietctural SVE registers
3458+
the scalable architectural SVE registers
34593459
KVM_REG_ARM64_SVE_ZREG(), KVM_REG_ARM64_SVE_PREG() or
34603460
KVM_REG_ARM64_SVE_FFR;
34613461

@@ -4401,7 +4401,7 @@ This will have undefined effects on the guest if it has not already
44014401
placed itself in a quiescent state where no vcpu will make MMU enabled
44024402
memory accesses.
44034403

4404-
On succsful completion, the pending HPT will become the guest's active
4404+
On successful completion, the pending HPT will become the guest's active
44054405
HPT and the previous HPT will be discarded.
44064406

44074407
On failure, the guest will still be operating on its previous HPT.
@@ -5016,7 +5016,7 @@ before the vcpu is fully usable.
50165016

50175017
Between KVM_ARM_VCPU_INIT and KVM_ARM_VCPU_FINALIZE, the feature may be
50185018
configured by use of ioctls such as KVM_SET_ONE_REG. The exact configuration
5019-
that should be performaned and how to do it are feature-dependent.
5019+
that should be performed and how to do it are feature-dependent.
50205020

50215021
Other calls that depend on a particular feature being finalized, such as
50225022
KVM_RUN, KVM_GET_REG_LIST, KVM_GET_ONE_REG and KVM_SET_ONE_REG, will fail with
@@ -5475,7 +5475,7 @@ KVM_XEN_ATTR_TYPE_EVTCHN
54755475
from the guest. A given sending port number may be directed back to
54765476
a specified vCPU (by APIC ID) / port / priority on the guest, or to
54775477
trigger events on an eventfd. The vCPU and priority can be changed
5478-
by setting KVM_XEN_EVTCHN_UPDATE in a subsequent call, but but other
5478+
by setting KVM_XEN_EVTCHN_UPDATE in a subsequent call, but other
54795479
fields cannot change for a given sending port. A port mapping is
54805480
removed by using KVM_XEN_EVTCHN_DEASSIGN in the flags field. Passing
54815481
KVM_XEN_EVTCHN_RESET in the flags field removes all interception of

0 commit comments

Comments
 (0)