From: Julien Grall <julien.grall@arm.com>
To: xen-devel@lists.xenproject.org
Cc: jgross@suse.com, Stefano Stabellini <sstabellini@kernel.org>,
Wei Liu <wl@xen.org>,
Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
George Dunlap <George.Dunlap@eu.citrix.com>,
Andrew Cooper <andrew.cooper3@citrix.com>,
Ian Jackson <ian.jackson@eu.citrix.com>, Tim Deegan <tim@xen.org>,
Julien Grall <julien.grall@arm.com>,
Jan Beulich <jbeulich@suse.com>,
Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [Xen-devel] [PATCH for-4.13 v2 2/2] docs: Replace all instance of ARM by Arm
Date: Tue, 24 Sep 2019 15:35:15 +0100 [thread overview]
Message-ID: <20190924143515.8810-3-julien.grall@arm.com> (raw)
In-Reply-To: <20190924143515.8810-1-julien.grall@arm.com>
The documentation is using a mix of ARM (old) and Arm (new). To stay
consistent, use only the new name.
Signed-off-by: Julien Grall <julien.grall@arm.com>
---
Cc: jgross@suse.com
Changes in v2:
- Patch added
---
SUPPORT.md | 50 +++++++++++++++---------------
docs/INDEX | 6 ++--
docs/features/livepatch.pandoc | 2 +-
docs/features/sched_rtds.pandoc | 2 +-
docs/hypervisor-guide/code-coverage.rst | 2 +-
docs/man/xl.cfg.5.pod.in | 8 ++---
docs/misc/arm/booting.txt | 10 +++---
docs/misc/arm/device-tree/guest.txt | 4 +--
docs/misc/arm/early-printk.txt | 2 +-
docs/misc/arm/silicon-errata.txt | 26 ++++++++--------
docs/misc/console.txt | 2 +-
docs/misc/efi.pandoc | 2 +-
docs/misc/livepatch.pandoc | 8 ++---
docs/misc/xen-command-line.pandoc | 22 ++++++-------
docs/process/xen-release-management.pandoc | 2 +-
docs/specs/libxc-migration-stream.pandoc | 6 ++--
docs/specs/libxl-migration-stream.pandoc | 2 +-
17 files changed, 78 insertions(+), 78 deletions(-)
diff --git a/SUPPORT.md b/SUPPORT.md
index 375473a456..cf759319cc 100644
--- a/SUPPORT.md
+++ b/SUPPORT.md
@@ -31,11 +31,11 @@ supported in this document.
Status: Supported
-### ARM v7 + Virtualization Extensions
+### Arm v7 + Virtualization Extensions
Status: Supported
-### ARM v8
+### Arm v8
Status: Supported
@@ -52,7 +52,7 @@ supported in this document.
### Host ACPI (via Domain 0)
Status, x86 PV: Supported
- Status, ARM: Experimental
+ Status, Arm: Experimental
### x86/Intel Platform QoS Technologies
@@ -62,10 +62,10 @@ supported in this document.
Status, AMD IOMMU: Supported
Status, Intel VT-d: Supported
- Status, ARM SMMUv1: Supported
- Status, ARM SMMUv2: Supported
+ Status, Arm SMMUv1: Supported
+ Status, Arm SMMUv2: Supported
-### ARM/GICv3 ITS
+### Arm/GICv3 ITS
Extension to the GICv3 interrupt controller to support MSI.
@@ -102,9 +102,9 @@ Dom0 support requires an IOMMU (Intel VT-d / AMD IOMMU).
Status, domU: Supported
Status, dom0: Experimental
-### ARM
+### Arm
-ARM only has one guest type at the moment
+Arm only has one guest type at the moment
Status: Supported
@@ -119,8 +119,8 @@ ARM only has one guest type at the moment
Format which the toolstack accepts for direct-boot kernels
Supported, x86: bzImage, ELF
- Supported, ARM32: zImage
- Supported, ARM64: Image
+ Supported, Arm32: zImage
+ Supported, Arm64: Image
### Dom0 init support for xl
@@ -158,10 +158,10 @@ Output of information in machine-parseable JSON format
Status, NS16550: Supported
Status, EHCI: Supported
- Status, Cadence UART (ARM): Supported
- Status, PL011 UART (ARM): Supported
- Status, Exynos 4210 UART (ARM): Supported
- Status, OMAP UART (ARM): Supported
+ Status, Cadence UART (Arm): Supported
+ Status, PL011 UART (Arm): Supported
+ Status, Exynos 4210 UART (Arm): Supported
+ Status, OMAP UART (Arm): Supported
Status, SCI(F) UART: Supported
### Hypervisor 'debug keys'
@@ -242,7 +242,7 @@ Alternative p2m (altp2m) allows external monitoring of guest memory
by maintaining multiple physical to machine (p2m) memory mappings.
Status, x86 HVM: Tech Preview
- Status, ARM: Tech Preview
+ Status, Arm: Tech Preview
## Resource Management
@@ -305,15 +305,15 @@ Enables NUMA aware scheduling in Xen
NB that this refers to the ability of guests
to have higher-level page table entries point directly to memory,
improving TLB performance.
-On ARM, and on x86 in HAP mode,
+On Arm, and on x86 in HAP mode,
the guest has whatever support is enabled by the hardware.
This feature is independent
-of the ARM "page granularity" feature (see below).
+of the Arm "page granularity" feature (see below).
Status, x86 HVM/PVH, HAP: Supported
Status, x86 HVM/PVH, Shadow, 2MiB: Supported
- Status, ARM: Supported
+ Status, Arm: Supported
On x86 in shadow mode, only 2MiB (L2) superpages are available;
furthermore, they do not have the performance characteristics
@@ -545,9 +545,9 @@ be issued an XSA, since that does weaken security.
### Live Patching
Status, x86: Supported
- Status, ARM: Experimental
+ Status, Arm: Experimental
-Compile time disabled for ARM by default.
+Compile time disabled for Arm by default.
### Virtual Machine Introspection
@@ -639,24 +639,24 @@ to be used in addition to QEMU.
Status: Experimental
-### ARM/Non-PCI device passthrough
+### Arm/Non-PCI device passthrough
Status: Supported, not security supported
Note that this still requires an IOMMU
that covers the DMA of the device to be passed through.
-### ARM: 16K and 64K page granularity in guests
+### Arm: 16K and 64K page granularity in guests
Status: Supported, with caveats
No support for QEMU backends in a 16K or 64K domain.
-### ARM: Guest Device Tree support
+### Arm: Guest Device Tree support
Status: Supported
-### ARM: Guest ACPI support
+### Arm: Guest ACPI support
Status: Supported
@@ -762,7 +762,7 @@ including security support status, functional completeness, etc.
Refer to the detailed definitions below.
If support differs based on implementation
-(for instance, x86 / ARM, Linux / QEMU / FreeBSD),
+(for instance, x86 / Arm, Linux / QEMU / FreeBSD),
one line for each set of implementations will be listed.
## Definition of Status labels
diff --git a/docs/INDEX b/docs/INDEX
index e673edd75c..8cd7c7cf65 100644
--- a/docs/INDEX
+++ b/docs/INDEX
@@ -1,5 +1,5 @@
hypercall Hypercall Interfaces
-hypercall/arm/index ARM
+hypercall/arm/index Arm
hypercall/x86_32/index x86_32
hypercall/x86_64/index x86_64
@@ -20,8 +20,8 @@ misc/vtd VT-d HOWTO
misc/xen-error-handling Xen Error Handling
misc/xenpaging Xen Paging
misc/xsm-flask XSM/FLASK Configuration
-misc/arm/booting How to boot Xen on ARM
-misc/arm/early-printk Enabling early printk on ARM
+misc/arm/booting How to boot Xen on Arm
+misc/arm/early-printk Enabling early printk on Arm
misc/arm/passthrough Passthrough a device described in the Device Tree to a guest
misc/arm/device-tree/booting Device tree bindings to boot Xen
misc/arm/device-tree/passthrough Device tree binding to passthrough a device
diff --git a/docs/features/livepatch.pandoc b/docs/features/livepatch.pandoc
index 17f1cd0d05..8974b9d894 100644
--- a/docs/features/livepatch.pandoc
+++ b/docs/features/livepatch.pandoc
@@ -12,7 +12,7 @@
Status: **Tech Preview/Experimental**
- Architecture: ARM
+ Architecture: Arm
Component: Hypervisor, toolstack
---------------- ----------------------------------------------------
diff --git a/docs/features/sched_rtds.pandoc b/docs/features/sched_rtds.pandoc
index 4ccf704b53..2a50cd1b4d 100644
--- a/docs/features/sched_rtds.pandoc
+++ b/docs/features/sched_rtds.pandoc
@@ -101,7 +101,7 @@ at a macroscopic level), the following should be done:
# Known issues
-* OSSTest reports occasional failures on ARM.
+* OSSTest reports occasional failures on Arm.
# References
diff --git a/docs/hypervisor-guide/code-coverage.rst b/docs/hypervisor-guide/code-coverage.rst
index 6c7552d691..1c70570037 100644
--- a/docs/hypervisor-guide/code-coverage.rst
+++ b/docs/hypervisor-guide/code-coverage.rst
@@ -8,7 +8,7 @@ so some extra steps are required to collect and process the data.
.. warning::
- ARM doesn't currently boot when the final binary exceeds 2MB in size,
+ Arm doesn't currently boot when the final binary exceeds 2MB in size,
and the coverage build tends to exceed this limit.
diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in
index e71b3b411d..dbb12e1558 100644
--- a/docs/man/xl.cfg.5.pod.in
+++ b/docs/man/xl.cfg.5.pod.in
@@ -1259,7 +1259,7 @@ Guests use hypervisor resources for each event channel they use.
The default of 1023 should be sufficient for typical guests. The
maximum value depends on what the guest supports. Guests supporting the
FIFO-based event channel ABI support up to 131,071 event channels.
-Other guests are limited to 4095 (64-bit x86 and ARM) or 1023 (32-bit
+Other guests are limited to 4095 (64-bit x86 and Arm) or 1023 (32-bit
x86).
=item B<vdispl=[ "VDISPL_SPEC_STRING", "VDISPL_SPEC_STRING", ...]>
@@ -1791,7 +1791,7 @@ the virtual firmware to the guest Operating System. ACPI is required
by most modern guest Operating Systems. This option is enabled by
default and usually you should omit it. However, it may be necessary to
disable ACPI for compatibility with some guest Operating Systems.
-This option is true for x86 while it's false for ARM by default.
+This option is true for x86 while it's false for Arm by default.
=item B<acpi_s3=BOOLEAN>
@@ -2707,7 +2707,7 @@ See B<qemu(1)> for more information.
=head2 Architecture Specific options
-=head3 ARM
+=head3 Arm
=over 4
@@ -2745,7 +2745,7 @@ VM config file:
vuart = "sbsa_uart"
-Currently, only the "sbsa_uart" model is supported for ARM.
+Currently, only the "sbsa_uart" model is supported for Arm.
=back
diff --git a/docs/misc/arm/booting.txt b/docs/misc/arm/booting.txt
index d3f6ce4755..69250c1f8d 100644
--- a/docs/misc/arm/booting.txt
+++ b/docs/misc/arm/booting.txt
@@ -1,13 +1,13 @@
Booting Xen
===========
-Xen follows the zImage protocol defined for 32-bit ARM Linux[1] and the
-Image protocol defined for ARM64 Linux[2].
+Xen follows the zImage protocol defined for 32-bit Arm Linux[1] and the
+Image protocol defined for Arm64 Linux[2].
In both cases the recommendation to boot in HYP/EL2 mode is a strict
requirement for Xen.
-The exceptions to this on 32-bit ARM are as follows:
+The exceptions to this on 32-bit Arm are as follows:
Xen does not require the machine type to be passed in r1. This
register is ignored (so may be invalid or the actual machine type).
@@ -21,7 +21,7 @@ The exceptions to this on 32-bit ARM are as follows:
zImage protocol should still be used and not the stricter "raw
(non-zImage)" protocol described in arm/Booting.
-There are no exception on 64-bit ARM.
+There are no exception on 64-bit Arm.
Firmware/bootloader requirements
@@ -31,7 +31,7 @@ Xen relies on some settings the firmware has to configure in EL3 before starting
* Xen must be entered in NS EL2 mode
-* The bit SCR_EL3.HCE (resp. SCR.HCE for 32-bit ARM) must be set to 1.
+* The bit SCR_EL3.HCE (resp. SCR.HCE for 32-bit Arm) must be set to 1.
[1] linux/Documentation/arm/Booting
diff --git a/docs/misc/arm/device-tree/guest.txt b/docs/misc/arm/device-tree/guest.txt
index 418f1e9f4e..5a76ba81e1 100644
--- a/docs/misc/arm/device-tree/guest.txt
+++ b/docs/misc/arm/device-tree/guest.txt
@@ -1,6 +1,6 @@
* Xen hypervisor device tree bindings
-Xen ARM virtual platforms shall have a top-level "hypervisor" node with
+Xen Arm virtual platforms shall have a top-level "hypervisor" node with
the following properties:
- compatible:
@@ -17,7 +17,7 @@ the following properties:
A GIC node is also required.
This property is unnecessary when booting Dom0 using ACPI.
-To support UEFI on Xen ARM virtual platforms, Xen populates the FDT "uefi" node
+To support UEFI on Xen Arm virtual platforms, Xen populates the FDT "uefi" node
under /hypervisor with following parameters:
________________________________________________________________________________
diff --git a/docs/misc/arm/early-printk.txt b/docs/misc/arm/early-printk.txt
index 89e081e51e..b53adeae49 100644
--- a/docs/misc/arm/early-printk.txt
+++ b/docs/misc/arm/early-printk.txt
@@ -41,7 +41,7 @@ the name of the machine:
- brcm: printk with 8250 on Broadcom 7445D0 boards with A15 processors.
- dra7: printk with 8250 on DRA7 platform
- exynos5250: printk with the second UART
- - fastmodel: printk on ARM Fastmodel software emulators
+ - fastmodel: printk on Arm Fastmodel software emulators
- hikey960: printk with pl011 with Hikey 960
- juno: printk with pl011 on Juno platform
- lager: printk with SCIF0 on Renesas Lager board (R-Car H2 processor)
diff --git a/docs/misc/arm/silicon-errata.txt b/docs/misc/arm/silicon-errata.txt
index 11e5a9dcec..4bb1a03b1e 100644
--- a/docs/misc/arm/silicon-errata.txt
+++ b/docs/misc/arm/silicon-errata.txt
@@ -3,7 +3,7 @@
It is an unfortunate fact of life that hardware is often produced with
so-called "errata", which can cause it to deviate from the architecture
-under specific circumstances. For hardware produced by ARM, these
+under specific circumstances. For hardware produced by Arm, these
errata are broadly classified into the following categories:
Category A: A critical error without a viable workaround.
@@ -29,7 +29,7 @@ For software workarounds that may adversely impact systems unaffected by
the erratum in question, a Kconfig entry is added under "ARM errata
workarounds via the alternatives framework". These are enabled by default
and patched in at runtime when an affected CPU is detected. Note that
-runtime patching is only supported on ARM64. For less-intrusive workarounds,
+runtime patching is only supported on Arm64. For less-intrusive workarounds,
a Kconfig option is not available and the code is structured (preferably
with a comment) in such a way that the erratum will not be hit.
@@ -41,14 +41,14 @@ stable hypervisors.
| Implementor | Component | Erratum ID | Kconfig |
+----------------+-----------------+-----------------+-------------------------+
-| ARM | Cortex-A15 | #766422 | N/A |
-| ARM | Cortex-A53 | #827319 | ARM64_ERRATUM_827319 |
-| ARM | Cortex-A53 | #824069 | ARM64_ERRATUM_824069 |
-| ARM | Cortex-A53 | #819472 | ARM64_ERRATUM_819472 |
-| ARM | Cortex-A57 | #852523 | N/A |
-| ARM | Cortex-A57 | #832075 | ARM64_ERRATUM_832075 |
-| ARM | Cortex-A57 | #834220 | ARM64_ERRATUM_834220 |
-| ARM | Cortex-A57 | #1319537 | N/A |
-| ARM | Cortex-A72 | #1319367 | N/A |
-| ARM | Cortex-A76 | #1165522 | N/A |
-| ARM | MMU-500 | #842869 | N/A |
+| Arm | Cortex-A15 | #766422 | N/A |
+| Arm | Cortex-A53 | #827319 | ARM64_ERRATUM_827319 |
+| Arm | Cortex-A53 | #824069 | ARM64_ERRATUM_824069 |
+| Arm | Cortex-A53 | #819472 | ARM64_ERRATUM_819472 |
+| Arm | Cortex-A57 | #852523 | N/A |
+| Arm | Cortex-A57 | #832075 | ARM64_ERRATUM_832075 |
+| Arm | Cortex-A57 | #834220 | ARM64_ERRATUM_834220 |
+| Arm | Cortex-A57 | #1319537 | N/A |
+| Arm | Cortex-A72 | #1319367 | N/A |
+| Arm | Cortex-A76 | #1165522 | N/A |
+| Arm | MMU-500 | #842869 | N/A |
diff --git a/docs/misc/console.txt b/docs/misc/console.txt
index 4e180f88ba..adbefd3955 100644
--- a/docs/misc/console.txt
+++ b/docs/misc/console.txt
@@ -23,7 +23,7 @@ The virtual UART console path in xenstore is defined as:
/local/domain/$DOMID/vuart/0
-The vuart console provides access to a virtual SBSA UART on ARM systems.
+The vuart console provides access to a virtual SBSA UART on Arm systems.
To enable vuart the following line has to be added to the guest configuration
file:
diff --git a/docs/misc/efi.pandoc b/docs/misc/efi.pandoc
index 23c1a2732d..968f4980bd 100644
--- a/docs/misc/efi.pandoc
+++ b/docs/misc/efi.pandoc
@@ -103,7 +103,7 @@ Specifies a CPU microcode blob to load. (x86 only)
Specifies a device tree file to load. The platform firmware may provide a
DTB in an EFI configuration table, so this field is optional in that
case. A dtb specified in the configuration file will override a device tree
-provided in the EFI configuration table. (ARM only)
+provided in the EFI configuration table. (Arm only)
###`chain=<filename>`
diff --git a/docs/misc/livepatch.pandoc b/docs/misc/livepatch.pandoc
index 6d9f72f49b..073541213b 100644
--- a/docs/misc/livepatch.pandoc
+++ b/docs/misc/livepatch.pandoc
@@ -313,7 +313,7 @@ The size of the structure is 64 bytes on 64-bit hypervisors. It will be
the new function (which will replace the one at `old_addr`) in bytes.
* If the value of `new_addr` is zero then `new_size` determines how many
instruction bytes to NOP (up to opaque size modulo smallest platform
- instruction - 1 byte x86 and 4 bytes on ARM).
+ instruction - 1 byte x86 and 4 bytes on Arm).
* `version` is to be one.
* `opaque` **MUST** be zero.
@@ -1091,7 +1091,7 @@ that in the hypervisor is advised.
The tool for generating payloads currently does perform a compile-time
check to ensure that the function to be replaced is large enough.
-#### Trampoline, ARM
+#### Trampoline, Arm
The unconditional branch instruction (for the encoding see the
DDI 0406C.c and DDI 0487A.j Architecture Reference Manual's).
@@ -1099,8 +1099,8 @@ with proper offset is used for an unconditional branch to the new code.
This means that that `old_size` **MUST** be at least four bytes if patching
in trampoline.
-The instruction offset is limited on ARM32 to +/- 32MB to displacement
-and on ARM64 to +/- 128MB displacement.
+The instruction offset is limited on Arm32 to +/- 32MB to displacement
+and on Arm64 to +/- 128MB displacement.
The new code is placed in the 8M - 10M virtual address space while the
Xen code is in 2M - 4M. That gives us enough space.
diff --git a/docs/misc/xen-command-line.pandoc b/docs/misc/xen-command-line.pandoc
index 832797e2e2..55dfb7420d 100644
--- a/docs/misc/xen-command-line.pandoc
+++ b/docs/misc/xen-command-line.pandoc
@@ -710,7 +710,7 @@ Controls for the dom0 IOMMU setup.
available by fully disabling all IOMMUs.
This option is hardwired to false for x86 PVH dom0's (where a non-identity
- transform is required for dom0 to function), and is ignored for ARM.
+ transform is required for dom0 to function), and is ignored for Arm.
* The `strict` boolean is applicable to x86 PV dom0's only and defaults to
false. It controls whether dom0 can have IOMMU mappings for all domain
@@ -718,7 +718,7 @@ Controls for the dom0 IOMMU setup.
This option is hardwired to true for x86 PVH dom0's (as RAM belonging to
other domains in the system don't live in a compatible address space), and
- is ignored for ARM.
+ is ignored for Arm.
* The `map-inclusive` boolean is applicable to x86 PV dom0's, and sets up
identity IOMMU mappings for all non-RAM regions below 4GB except for
@@ -784,7 +784,7 @@ For example, with `dom0_max_vcpus=4-8`:
> 8 | 8
> 10 | 8
-### dom0_mem (ARM)
+### dom0_mem (Arm)
> `= <size>`
Set the amount of memory for the initial domain (dom0). It must be
@@ -849,7 +849,7 @@ affinities to prefer but be not limited to the specified node(s).
Pin dom0 vcpus to their respective pcpus
-### dtuart (ARM)
+### dtuart (Arm)
> `= path [:options]`
> Default: `""`
@@ -1017,7 +1017,7 @@ version are 1 and 2.
use of grant table v2 without transitive grants is an ABI breakage from the
guests point of view.
-The usage of gnttab v2 is not security supported on ARM platforms.
+The usage of gnttab v2 is not security supported on Arm platforms.
### gnttab_max_frames
> `= <integer>`
@@ -1225,7 +1225,7 @@ boolean (e.g. `iommu=no`) can override this and leave the IOMMUs disabled.
hardware, and this option is ignored. It is enabled by default on Intel
systems.
- This option is ignored on ARM, and the pagetables are always shared.
+ This option is ignored on Arm, and the pagetables are always shared.
* The `intremap` boolean controls the Interrupt Remapping sub-feature, and
is active by default on compatible hardware. On x86 systems, the first
@@ -1390,7 +1390,7 @@ based interrupts. Any higher IRQs will be available for use via PCI MSI.
### max_lpi_bits (arm)
> `= <integer>`
-Specifies the number of ARM GICv3 LPI interrupts to allocate on the host,
+Specifies the number of Arm GICv3 LPI interrupts to allocate on the host,
presented as the number of bits needed to encode it. This must be at least
14 and not exceed 32, and each LPI requires one byte (configuration) and
one pending bit to be allocated.
@@ -1417,7 +1417,7 @@ limit is ignored by Xen.
> `= [<domU>][,[<ctldom>][,[<hwdom>][,<ptdom>]]]`
> x86 default: `9,18,12,12`
-> ARM default: `9,18,10,10`
+> Arm default: `9,18,10,10`
Change the maximum order permitted for allocation (or allocation-like)
requests issued by the various kinds of domains (in this order:
@@ -1804,7 +1804,7 @@ accidentally leaking secrets by releasing pages without proper sanitization.
Set the serial transmit buffer size.
-### serrors (ARM)
+### serrors (Arm)
> `= diverse | forward | panic`
> Default: `diverse`
@@ -2184,8 +2184,8 @@ production systems (see http://xenbits.xen.org/xsa/advisory-163.html)!
> Default: `trap`
-WFI is the ARM instruction to "wait for interrupt". WFE is similar and
-means "wait for event". This option, which is ARM specific, changes the
+WFI is the Arm instruction to "wait for interrupt". WFE is similar and
+means "wait for event". This option, which is Arm specific, changes the
way guest WFI and WFE are implemented in Xen. By default, Xen traps both
instructions. In the case of WFI, Xen blocks the guest vcpu; in the case
of WFE, Xen yield the guest vcpu. When setting vwfi to `native`, Xen
diff --git a/docs/process/xen-release-management.pandoc b/docs/process/xen-release-management.pandoc
index d6abc90a02..96207c93f0 100644
--- a/docs/process/xen-release-management.pandoc
+++ b/docs/process/xen-release-management.pandoc
@@ -416,7 +416,7 @@ J: XEN-28
=== x86 ===
-=== ARM ===
+=== Arm ===
== Completed ==
diff --git a/docs/specs/libxc-migration-stream.pandoc b/docs/specs/libxc-migration-stream.pandoc
index 97dacb6e30..ddd7d1eb2f 100644
--- a/docs/specs/libxc-migration-stream.pandoc
+++ b/docs/specs/libxc-migration-stream.pandoc
@@ -30,7 +30,7 @@ image used in Xen 4.4 and earlier (the _legacy format_).
A new format that addresses the above is required.
-ARM does not yet have have a domain save image format specified and
+Arm does not yet have have a domain save image format specified and
the format described in this specification should be suitable.
Not Yet Included
@@ -41,7 +41,7 @@ included in a future draft.
* Page data compression.
-* ARM
+* Arm
Overview
@@ -162,7 +162,7 @@ type 0x0000: Reserved.
0x0003: x86 PVH.
- 0x0004: ARM.
+ 0x0004: Arm.
0x0005 - 0xFFFFFFFF: Reserved.
diff --git a/docs/specs/libxl-migration-stream.pandoc b/docs/specs/libxl-migration-stream.pandoc
index 3766f37f4f..d407abd817 100644
--- a/docs/specs/libxl-migration-stream.pandoc
+++ b/docs/specs/libxl-migration-stream.pandoc
@@ -43,7 +43,7 @@ Not Yet Included
The following features are not yet fully specified and will be
included in a future draft.
-* ARM
+* Arm
Overview
--
2.11.0
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
next prev parent reply other threads:[~2019-09-24 14:35 UTC|newest]
Thread overview: 17+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-09-24 14:35 [Xen-devel] [PATCH for-4.13 v2 0/2] Errata implementation and doc update Julien Grall
2019-09-24 14:35 ` [Xen-devel] [PATCH for-4.13 v2 1/2] xen/arm: Implement workaround for Cortex A-57 and Cortex A72 AT speculate Julien Grall
2019-10-02 0:56 ` Stefano Stabellini
2019-09-24 14:35 ` Julien Grall [this message]
2019-09-24 14:56 ` [Xen-devel] [PATCH for-4.13 v2 2/2] docs: Replace all instance of ARM by Arm Volodymyr Babchuk
2019-09-24 15:28 ` Julien Grall
2019-09-24 15:37 ` Volodymyr Babchuk
2019-09-24 15:38 ` Julien Grall
2019-10-02 1:05 ` Stefano Stabellini
2019-10-02 8:49 ` Julien Grall
2019-10-03 15:55 ` Volodymyr Babchuk
2019-10-03 16:02 ` Julien Grall
2019-10-15 16:42 ` Julien Grall
2019-10-15 16:47 ` Stefano Stabellini
2019-10-15 16:52 ` Julien Grall
2019-09-24 14:43 ` [Xen-devel] [PATCH for-4.13 v2 0/2] Errata implementation and doc update Jürgen Groß
2019-09-24 14:51 ` Wei Liu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20190924143515.8810-3-julien.grall@arm.com \
--to=julien.grall@arm.com \
--cc=George.Dunlap@eu.citrix.com \
--cc=Volodymyr_Babchuk@epam.com \
--cc=andrew.cooper3@citrix.com \
--cc=ian.jackson@eu.citrix.com \
--cc=jbeulich@suse.com \
--cc=jgross@suse.com \
--cc=konrad.wilk@oracle.com \
--cc=sstabellini@kernel.org \
--cc=tim@xen.org \
--cc=wl@xen.org \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.