From nobody Sat May 18 19:24:33 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of redhat.com designates 216.205.24.124 as permitted sender) client-ip=216.205.24.124; envelope-from=philmd@redhat.com; helo=us-smtp-delivery-124.mimecast.com; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of redhat.com designates 216.205.24.124 as permitted sender) smtp.mailfrom=philmd@redhat.com; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1637313434; cv=none; d=zohomail.com; s=zohoarc; b=YlY9d+ocNY+jZiU/JRYfS9tcji6lEXAMlgOoJyrGlucivZwmruWPWSNyod4AbWzbKwedUI5H+Iv53rfg5ktqlWxKvOdCVMZ+yaVegY5wcrbpNqo06uidpbKv402xDTH3Kbc7N4Hgct+OAPeWxaLWRshuxUZAxPVz+3Ekg2cTUcQ= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1637313434; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; bh=oiIAv4nG/zKFIRhPsKBsR5CbFtnXIXNxqIa5ZKHRQAU=; b=FK1x2UWfS02wR+WNzzEhPm+Rpj0GlZEbh12NO7ogfuFTpdLr0mHnLX7/LkmSPIYMJKrIo2aqBOdq+ctfcbd2FcF3FaXrb52lNEONv7iCpk6pgad2YZ0RPUeZp7oLMS7Mj88paIYd7NehLDK8sfOXmKdaGQzwPVgfli3gYzz+r4I= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of redhat.com designates 216.205.24.124 as permitted sender) smtp.mailfrom=philmd@redhat.com; dmarc=pass header.from= (p=none dis=none) Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [216.205.24.124]) by mx.zohomail.com with SMTPS id 1637313434190864.6915736626235; Fri, 19 Nov 2021 01:17:14 -0800 (PST) Received: from mail-wm1-f70.google.com (mail-wm1-f70.google.com [209.85.128.70]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-523-KkUjrmIdPKeGaxyyiONgwA-1; Fri, 19 Nov 2021 04:17:09 -0500 Received: by mail-wm1-f70.google.com with SMTP id 205-20020a1c00d6000000b003335d1384f1so5605991wma.3 for ; Fri, 19 Nov 2021 01:17:09 -0800 (PST) Return-Path: Return-Path: Received: from x1w.. (62.red-83-57-168.dynamicip.rima-tde.net. [83.57.168.62]) by smtp.gmail.com with ESMTPSA id p12sm2398203wro.33.2021.11.19.01.17.06 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 19 Nov 2021 01:17:07 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1637313433; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=oiIAv4nG/zKFIRhPsKBsR5CbFtnXIXNxqIa5ZKHRQAU=; b=PcDzxneTn3GdXlSy5JRtkAO7lSPZUGCwTXaMN/ACajadVSYexHSoTdRc6H+CsJMi5C6NEZ qjUr+auE49sljospgemzOyZSfL03T7UtzHgpXuUy+38L4Rh4TlP9SO7YH0U0mVeDgaE/bo yUxVYVkEG8dwpPgS9a3pZaKn5Q0KYfA= X-MC-Unique: KkUjrmIdPKeGaxyyiONgwA-1 X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=oiIAv4nG/zKFIRhPsKBsR5CbFtnXIXNxqIa5ZKHRQAU=; b=JrdJsFmjlN3mMFF1z33TualZ4u/fdS7KETlRf8QIpnzH2SQzxs1SoS+4QQtwKOH8BA rc6SxnVmiY/4l9Nnkf1JRotzIDHUT6jK2y4gwXGqFEKIG/vq2Kyn0pibGdj+fGG7TN61 MA0nshPSU5scTJW63OPAjw+W1eZBH2KXDzVMNR3NRx4h2+S/I0jQhZzazr2d7rJz5Dvx twt2EZbXib3Vw1KLGu5CfVZW+8PKjtWXqSb4Fzj64jcUqgTmZWsyfSgtbvwsA6XVaiB+ l/+U/PS0vMegxnmH3Zznxq+WspgFwfzNsyUjAE+52QBqao0t2eTAEVnUwL2vsqU3GwRK VlDQ== X-Gm-Message-State: AOAM531nC0p0VDG6hBv6sFs7QgObKIpvXmsOQCBKfAh6e8zEbWLh1zdd NwCqYhtMVirKOAR2cjvyVrsB9DDBsXEEbVjFaatQ/pOXTsTv8Icg9ZVDU332BBWqQHR5W3iUCtW DIjpUQ5bVELd5qQ== X-Received: by 2002:a5d:4846:: with SMTP id n6mr5279170wrs.249.1637313428286; Fri, 19 Nov 2021 01:17:08 -0800 (PST) X-Google-Smtp-Source: ABdhPJzhvvggI3Me1Ebzc0Hf4EkkNPsfM7EN2qI/s5tLwQlYFI7gprjoiohzSUTO7pIXXeuhY4d9vw== X-Received: by 2002:a5d:4846:: with SMTP id n6mr5279119wrs.249.1637313427954; Fri, 19 Nov 2021 01:17:07 -0800 (PST) From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= To: qemu-devel@nongnu.org Cc: Cleber Rosa , John Snow , Eric Blake , Markus Armbruster , Hanna Reitz , Michael Roth , qemu-block@nongnu.org, Marcelo Tosatti , Vladimir Sementsov-Ogievskiy , Eduardo Habkost , Taylor Simpson , kvm@vger.kernel.org, Paolo Bonzini , Kevin Wolf , =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= , Darren Kenny Subject: [PATCH-for-6.2? v2 1/3] docs: Spell QEMU all caps Date: Fri, 19 Nov 2021 10:16:59 +0100 Message-Id: <20211119091701.277973-2-philmd@redhat.com> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20211119091701.277973-1-philmd@redhat.com> References: <20211119091701.277973-1-philmd@redhat.com> MIME-Version: 1.0 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=philmd@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1637313436206100001 QEMU should be written all caps. Normally checkpatch.pl warns when it is not (see commit 9964d8f9422: "checkpatch: Add QEMU specific rule"). Replace Qemu -> QEMU. Reviewed-by: Darren Kenny Reviewed-by: Markus Armbruster Signed-off-by: Philippe Mathieu-Daud=C3=A9 --- docs/devel/modules.rst | 2 +- docs/devel/multi-thread-tcg.rst | 2 +- docs/devel/style.rst | 2 +- docs/devel/ui.rst | 4 ++-- docs/interop/nbd.txt | 6 +++--- docs/interop/qcow2.txt | 8 ++++---- docs/multiseat.txt | 2 +- docs/system/device-url-syntax.rst.inc | 2 +- docs/system/i386/sgx.rst | 26 +++++++++++++------------- docs/u2f.txt | 2 +- 10 files changed, 28 insertions(+), 28 deletions(-) diff --git a/docs/devel/modules.rst b/docs/devel/modules.rst index 066f347b89b..8e999c4fa48 100644 --- a/docs/devel/modules.rst +++ b/docs/devel/modules.rst @@ -1,5 +1,5 @@ =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D -Qemu modules +QEMU modules =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =20 .. kernel-doc:: include/qemu/module.h diff --git a/docs/devel/multi-thread-tcg.rst b/docs/devel/multi-thread-tcg.= rst index 5b446ee08b6..c9541a7b20a 100644 --- a/docs/devel/multi-thread-tcg.rst +++ b/docs/devel/multi-thread-tcg.rst @@ -228,7 +228,7 @@ Emulated hardware state =20 Currently thanks to KVM work any access to IO memory is automatically protected by the global iothread mutex, also known as the BQL (Big -Qemu Lock). Any IO region that doesn't use global mutex is expected to +QEMU Lock). Any IO region that doesn't use global mutex is expected to do its own locking. =20 However IO memory isn't the only way emulated hardware state can be diff --git a/docs/devel/style.rst b/docs/devel/style.rst index 260e3263fa0..e00af62e763 100644 --- a/docs/devel/style.rst +++ b/docs/devel/style.rst @@ -686,7 +686,7 @@ Rationale: hex numbers are hard to read in logs when th= ere is no 0x prefix, especially when (occasionally) the representation doesn't contain any lett= ers and especially in one line with other decimal numbers. Number groups are a= llowed to not use '0x' because for some things notations like %x.%x.%x are used n= ot -only in Qemu. Also dumping raw data bytes with '0x' is less readable. +only in QEMU. Also dumping raw data bytes with '0x' is less readable. =20 '#' printf flag --------------- diff --git a/docs/devel/ui.rst b/docs/devel/ui.rst index 06c7d622ce7..17fb667dec4 100644 --- a/docs/devel/ui.rst +++ b/docs/devel/ui.rst @@ -1,8 +1,8 @@ =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D -Qemu UI subsystem +QEMU UI subsystem =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =20 -Qemu Clipboard +QEMU Clipboard -------------- =20 .. kernel-doc:: include/ui/clipboard.h diff --git a/docs/interop/nbd.txt b/docs/interop/nbd.txt index 10ce098a29b..bdb0f2a41ac 100644 --- a/docs/interop/nbd.txt +++ b/docs/interop/nbd.txt @@ -1,4 +1,4 @@ -Qemu supports the NBD protocol, and has an internal NBD client (see +QEMU supports the NBD protocol, and has an internal NBD client (see block/nbd.c), an internal NBD server (see blockdev-nbd.c), and an external NBD server tool (see qemu-nbd.c). The common code is placed in nbd/*. @@ -7,11 +7,11 @@ The NBD protocol is specified here: https://github.com/NetworkBlockDevice/nbd/blob/master/doc/proto.md =20 The following paragraphs describe some specific properties of NBD -protocol realization in Qemu. +protocol realization in QEMU. =20 =3D Metadata namespaces =3D =20 -Qemu supports the "base:allocation" metadata context as defined in the +QEMU supports the "base:allocation" metadata context as defined in the NBD protocol specification, and also defines an additional metadata namespace "qemu". =20 diff --git a/docs/interop/qcow2.txt b/docs/interop/qcow2.txt index 0463f761efb..f7dc304ff69 100644 --- a/docs/interop/qcow2.txt +++ b/docs/interop/qcow2.txt @@ -313,7 +313,7 @@ The fields of the bitmaps extension are: The number of bitmaps contained in the image. Must be greater than or equal to 1. =20 - Note: Qemu currently only supports up to 65535 bitmaps = per + Note: QEMU currently only supports up to 65535 bitmaps = per image. =20 4 - 7: Reserved, must be zero. @@ -775,7 +775,7 @@ Structure of a bitmap directory entry: 2: extra_data_compatible This flags is meaningful when the extra data is unknown to the software (currently any extra data= is - unknown to Qemu). + unknown to QEMU). If it is set, the bitmap may be used as expected,= extra data must be left as is. If it is not set, the bitmap must not be used, but @@ -793,7 +793,7 @@ Structure of a bitmap directory entry: 17: granularity_bits Granularity bits. Valid values: 0 - 63. =20 - Note: Qemu currently supports only values 9 - 31. + Note: QEMU currently supports only values 9 - 31. =20 Granularity is calculated as granularity =3D 1 << granularity_bits @@ -804,7 +804,7 @@ Structure of a bitmap directory entry: 18 - 19: name_size Size of the bitmap name. Must be non-zero. =20 - Note: Qemu currently doesn't support values greater th= an + Note: QEMU currently doesn't support values greater th= an 1023. =20 20 - 23: extra_data_size diff --git a/docs/multiseat.txt b/docs/multiseat.txt index 11850c96ff8..2b297e979d6 100644 --- a/docs/multiseat.txt +++ b/docs/multiseat.txt @@ -123,7 +123,7 @@ Background info is here: guest side with pci-bridge-seat ------------------------------- =20 -Qemu version 2.4 and newer has a new pci-bridge-seat device which +QEMU version 2.4 and newer has a new pci-bridge-seat device which can be used instead of pci-bridge. Just swap the device name in the qemu command line above. The only difference between the two devices is the pci id. We can match the pci id instead of the device path diff --git a/docs/system/device-url-syntax.rst.inc b/docs/system/device-url= -syntax.rst.inc index d15a0215087..7dbc525fa80 100644 --- a/docs/system/device-url-syntax.rst.inc +++ b/docs/system/device-url-syntax.rst.inc @@ -15,7 +15,7 @@ These are specified using a special URL syntax. 'iqn.2008-11.org.linux-kvm[:]' but this can also be set from the command line or a configuration file. =20 - Since version Qemu 2.4 it is possible to specify a iSCSI request + Since version QEMU 2.4 it is possible to specify a iSCSI request timeout to detect stalled requests and force a reestablishment of the session. The timeout is specified in seconds. The default is 0 which means no timeout. Libiscsi 1.15.0 or greater is required for this diff --git a/docs/system/i386/sgx.rst b/docs/system/i386/sgx.rst index 9aa161af1a1..f8fade5ac2d 100644 --- a/docs/system/i386/sgx.rst +++ b/docs/system/i386/sgx.rst @@ -20,13 +20,13 @@ report the same CPUID info to guest as on host for most= of SGX CPUID. With reporting the same CPUID guest is able to use full capacity of SGX, and KVM doesn't need to emulate those info. =20 -The guest's EPC base and size are determined by Qemu, and KVM needs Qemu to +The guest's EPC base and size are determined by QEMU, and KVM needs QEMU to notify such info to it before it can initialize SGX for guest. =20 Virtual EPC ~~~~~~~~~~~ =20 -By default, Qemu does not assign EPC to a VM, i.e. fully enabling SGX in a= VM +By default, QEMU does not assign EPC to a VM, i.e. fully enabling SGX in a= VM requires explicit allocation of EPC to the VM. Similar to other specialized memory types, e.g. hugetlbfs, EPC is exposed as a memory backend. =20 @@ -35,12 +35,12 @@ prior to realizing the vCPUs themselves, which occurs l= ong before generic devices are parsed and realized. This limitation means that EPC does not require -maxmem as EPC is not treated as {cold,hot}plugged memory. =20 -Qemu does not artificially restrict the number of EPC sections exposed to a -guest, e.g. Qemu will happily allow you to create 64 1M EPC sections. Be a= ware +QEMU does not artificially restrict the number of EPC sections exposed to a +guest, e.g. QEMU will happily allow you to create 64 1M EPC sections. Be a= ware that some kernels may not recognize all EPC sections, e.g. the Linux SGX d= river is hardwired to support only 8 EPC sections. =20 -The following Qemu snippet creates two EPC sections, with 64M pre-allocated +The following QEMU snippet creates two EPC sections, with 64M pre-allocated to the VM and an additional 28M mapped but not allocated:: =20 -object memory-backend-epc,id=3Dmem1,size=3D64M,prealloc=3Don \ @@ -54,7 +54,7 @@ to physical EPC. Because physical EPC is protected via ra= nge registers, the size of the physical EPC must be a power of two (though software sees a subset of the full EPC, e.g. 92M or 128M) and the EPC must be naturally aligned. KVM SGX's virtual EPC is purely a software construct and only -requires the size and location to be page aligned. Qemu enforces the EPC +requires the size and location to be page aligned. QEMU enforces the EPC size is a multiple of 4k and will ensure the base of the EPC is 4k aligned. To simplify the implementation, EPC is always located above 4g in the guest physical address space. @@ -62,7 +62,7 @@ physical address space. Migration ~~~~~~~~~ =20 -Qemu/KVM doesn't prevent live migrating SGX VMs, although from hardware's +QEMU/KVM doesn't prevent live migrating SGX VMs, although from hardware's perspective, SGX doesn't support live migration, since both EPC and the SGX key hierarchy are bound to the physical platform. However live migration can be supported in the sense if guest software stack can support recreati= ng @@ -76,7 +76,7 @@ CPUID ~~~~~ =20 Due to its myriad dependencies, SGX is currently not listed as supported -in any of Qemu's built-in CPU configuration. To expose SGX (and SGX Launch +in any of QEMU's built-in CPU configuration. To expose SGX (and SGX Launch Control) to a guest, you must either use ``-cpu host`` to pass-through the host CPU model, or explicitly enable SGX when using a built-in CPU model, e.g. via ``-cpu ,+sgx`` or ``-cpu ,+sgx,+sgxlc``. @@ -101,7 +101,7 @@ controlled via -cpu are prefixed with "sgx", e.g.:: sgx2 sgxlc =20 -The following Qemu snippet passes through the host CPU but restricts acces= s to +The following QEMU snippet passes through the host CPU but restricts acces= s to the provision and EINIT token keys:: =20 -cpu host,-sgx-provisionkey,-sgx-tokenkey @@ -112,11 +112,11 @@ in hardware cannot be forced on via '-cpu'. Virtualize SGX Launch Control ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ =20 -Qemu SGX support for Launch Control (LC) is passive, in the sense that it -does not actively change the LC configuration. Qemu SGX provides the user +QEMU SGX support for Launch Control (LC) is passive, in the sense that it +does not actively change the LC configuration. QEMU SGX provides the user the ability to set/clear the CPUID flag (and by extension the associated IA32_FEATURE_CONTROL MSR bit in fw_cfg) and saves/restores the LE Hash MSRs -when getting/putting guest state, but Qemu does not add new controls to +when getting/putting guest state, but QEMU does not add new controls to directly modify the LC configuration. Similar to hardware behavior, locki= ng the LC configuration to a non-Intel value is left to guest firmware. Unli= ke host bios setting for SGX launch control(LC), there is no special bios set= ting @@ -126,7 +126,7 @@ creating VM with SGX. Feature Control ~~~~~~~~~~~~~~~ =20 -Qemu SGX updates the ``etc/msr_feature_control`` fw_cfg entry to set the S= GX +QEMU SGX updates the ``etc/msr_feature_control`` fw_cfg entry to set the S= GX (bit 18) and SGX LC (bit 17) flags based on their respective CPUID support, i.e. existing guest firmware will automatically set SGX and SGX LC accordi= ngly, assuming said firmware supports fw_cfg.msr_feature_control. diff --git a/docs/u2f.txt b/docs/u2f.txt index 8f44994818a..7f5813a0b72 100644 --- a/docs/u2f.txt +++ b/docs/u2f.txt @@ -21,7 +21,7 @@ The second factor is materialized by a device implementin= g the U2F protocol. In case of a USB U2F security key, it is a USB HID device that implements the U2F protocol. =20 -In Qemu, the USB U2F key device offers a dedicated support of U2F, allowing +In QEMU, the USB U2F key device offers a dedicated support of U2F, allowing guest USB FIDO/U2F security keys operating in two possible modes: pass-through and emulated. =20 --=20 2.31.1 From nobody Sat May 18 19:24:33 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of redhat.com designates 170.10.133.124 as permitted sender) client-ip=170.10.133.124; envelope-from=philmd@redhat.com; helo=us-smtp-delivery-124.mimecast.com; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of redhat.com designates 170.10.133.124 as permitted sender) smtp.mailfrom=philmd@redhat.com; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1637313436; cv=none; d=zohomail.com; s=zohoarc; b=WSGLMRz2Evjue6+laPl6rPrDtossfEm2t9x8dYmupJeJCkIFG8lTfqAJfuGkjAZZG4HLCbnan4hcJpvsZeHo5UM1i3C5ZQwdP7CcGw0qPcjfndFaPnFSgUxCXwlY5s533YZN0lVkrzUeL3F8DPFNGvFzl7MWo5tMUelwMnym//k= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1637313436; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; bh=jlIlecnzhaAQeRZZJuozVjF80LuOMxu5Kmn9TZdjFTQ=; b=I/kwy+i4xwxnXmLX0QUg+vkP6bT+AX1AyazmreaQcj/yVRz9QyCQEGSxZsgEfr7caYuMEmbk/LxCOfywJJGtyeIh39MidbQx8LetIgun0SbZkOt+DnZNN9T5ahkuEfXFbHHZAVExOx3efegyrfEmGYKKhrUFx0a/Oa96CaebXuM= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of redhat.com designates 170.10.133.124 as permitted sender) smtp.mailfrom=philmd@redhat.com; dmarc=pass header.from= (p=none dis=none) Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by mx.zohomail.com with SMTPS id 1637313436546726.6786179237141; Fri, 19 Nov 2021 01:17:16 -0800 (PST) Received: from mail-wr1-f70.google.com (mail-wr1-f70.google.com [209.85.221.70]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-460-vsqG1yGSO8mqsS0ELFAONw-1; Fri, 19 Nov 2021 04:17:14 -0500 Received: by mail-wr1-f70.google.com with SMTP id v17-20020adfedd1000000b0017c5e737b02so1627372wro.18 for ; Fri, 19 Nov 2021 01:17:13 -0800 (PST) Return-Path: Return-Path: Received: from x1w.. (62.red-83-57-168.dynamicip.rima-tde.net. [83.57.168.62]) by smtp.gmail.com with ESMTPSA id g13sm3206808wrd.57.2021.11.19.01.17.11 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 19 Nov 2021 01:17:12 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1637313435; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=jlIlecnzhaAQeRZZJuozVjF80LuOMxu5Kmn9TZdjFTQ=; b=cj9F9k/AzxgsZxJJqtg8A5CRXlP+6HUf9EwZFcWIxSYxRx65ijC/0FRzeB+bxkryTIa/q7 BWyHDBgk67UD0cyBkT5/h7lvRNoktJa7M+SuEJOKGtmkbgKhKRUmB+Q8qQDJXYWByoOU8U DLGCz46zw597ANYAf6ppgHNEzfiaLXA= X-MC-Unique: vsqG1yGSO8mqsS0ELFAONw-1 X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=jlIlecnzhaAQeRZZJuozVjF80LuOMxu5Kmn9TZdjFTQ=; b=Hj0KvQaqFUxogX5TDkus058GglVjY3BEmeHmhk9m4VsURf+PytjjXTZqEB/i/JKQi/ 9T9zCGUIIKgtasp2KGiogMBKJ4KXGpAPwdUAvij8kYAN9ej2DaIsdRH7TBYFSKzh8lON KfTTrYNT0h2HBaYx9QHjYeAklA8kt6vWDHMkPjqqetGjcQTzSawyqVpV0foyXBZlFrFz x4/UkS7UIEqLVehzMuiRyfEL0MGrVbQW7sYe3m6EIGzCsjaJWGP+LgcW/68oJovmVMw5 UzpbTl0uEd1cYV3CC8an8POWIxPU+N706i6glr+WR+vUJITkz4a8JurySULsgYwMzgwb aHYA== X-Gm-Message-State: AOAM5324G+8/b+zWts/UlOOp+BXgv4UiTRM7RLhJLqhjsiPrzfXtNPEv tif8nML3VR7aIyaapfR+4lo3XC0dZlPojpMWibcnCkJ7/pvARORp1aVmOVmxB2TB/rTHs1CIO9X D6I60mQel2M4Xhg== X-Received: by 2002:a05:6000:18a7:: with SMTP id b7mr5442722wri.308.1637313432817; Fri, 19 Nov 2021 01:17:12 -0800 (PST) X-Google-Smtp-Source: ABdhPJzuuy5ZcKAtX3G+Y6lbyhVFc1uLMOQW6OLp6hdOWYScK9KF7wvUtEbMVxgqY5w7QfaBtY2WAw== X-Received: by 2002:a05:6000:18a7:: with SMTP id b7mr5442683wri.308.1637313432573; Fri, 19 Nov 2021 01:17:12 -0800 (PST) From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= To: qemu-devel@nongnu.org Cc: Cleber Rosa , John Snow , Eric Blake , Markus Armbruster , Hanna Reitz , Michael Roth , qemu-block@nongnu.org, Marcelo Tosatti , Vladimir Sementsov-Ogievskiy , Eduardo Habkost , Taylor Simpson , kvm@vger.kernel.org, Paolo Bonzini , Kevin Wolf , =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= Subject: [PATCH-for-6.2? v2 2/3] misc: Spell QEMU all caps Date: Fri, 19 Nov 2021 10:17:00 +0100 Message-Id: <20211119091701.277973-3-philmd@redhat.com> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20211119091701.277973-1-philmd@redhat.com> References: <20211119091701.277973-1-philmd@redhat.com> MIME-Version: 1.0 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=philmd@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1637313438636100001 QEMU should be written all caps. Normally checkpatch.pl warns when it is not (see commit 9964d8f9422: "checkpatch: Add QEMU specific rule"). Replace Qemu -> QEMU. Signed-off-by: Philippe Mathieu-Daud=C3=A9 Reviewed-by: Taylor Simpson --- qapi/block-core.json | 2 +- python/qemu/machine/machine.py | 2 +- scripts/checkpatch.pl | 2 +- scripts/render_block_graph.py | 2 +- scripts/simplebench/bench-backup.py | 4 ++-- scripts/simplebench/bench_block_job.py | 2 +- target/hexagon/README | 2 +- tests/guest-debug/run-test.py | 4 ++-- tests/qemu-iotests/testenv.py | 2 +- 9 files changed, 11 insertions(+), 11 deletions(-) diff --git a/qapi/block-core.json b/qapi/block-core.json index 1d3dd9cb48e..1846a91873a 100644 --- a/qapi/block-core.json +++ b/qapi/block-core.json @@ -1839,7 +1839,7 @@ # # @id: Block graph node identifier. This @id is generated only for # x-debug-query-block-graph and does not relate to any other identifi= ers in -# Qemu. +# QEMU. # # @type: Type of graph node. Can be one of block-backend, block-job or # block-driver-state. diff --git a/python/qemu/machine/machine.py b/python/qemu/machine/machine.py index a487c397459..627c9013946 100644 --- a/python/qemu/machine/machine.py +++ b/python/qemu/machine/machine.py @@ -122,7 +122,7 @@ def __init__(self, @param console_log: (optional) path to console log file @param log_dir: where to create and keep log files @param qmp_timer: (optional) default QMP socket timeout - @note: Qemu process is not started until launch() is used. + @note: QEMU process is not started until launch() is used. ''' # pylint: disable=3Dtoo-many-arguments =20 diff --git a/scripts/checkpatch.pl b/scripts/checkpatch.pl index cb8eff233e0..aedf9beaed0 100755 --- a/scripts/checkpatch.pl +++ b/scripts/checkpatch.pl @@ -2910,7 +2910,7 @@ sub process { ERROR("use QEMU instead of Qemu or QEmu\n" . $herecurr); } =20 -# Qemu error function tests +# QEMU error function tests =20 # Find newlines in error messages my $qemu_error_funcs =3D qr{error_setg| diff --git a/scripts/render_block_graph.py b/scripts/render_block_graph.py index da6acf050d1..3147b0b843b 100755 --- a/scripts/render_block_graph.py +++ b/scripts/render_block_graph.py @@ -1,6 +1,6 @@ #!/usr/bin/env python3 # -# Render Qemu Block Graph +# Render QEMU Block Graph # # Copyright (c) 2018 Virtuozzo International GmbH. All rights reserved. # diff --git a/scripts/simplebench/bench-backup.py b/scripts/simplebench/benc= h-backup.py index 5a0675c593c..ad37af3e719 100755 --- a/scripts/simplebench/bench-backup.py +++ b/scripts/simplebench/bench-backup.py @@ -183,7 +183,7 @@ def __call__(self, parser, namespace, values, option_st= ring=3DNone): mirror use mirror job instead of backup''', formatter_class=3Dargparse.RawTextHelpForm= atter) p.add_argument('--env', nargs=3D'+', help=3D'''\ -Qemu binaries with labels and options, see below +QEMU binaries with labels and options, see below "ENV format" section''', action=3DExtendAction) p.add_argument('--dir', nargs=3D'+', help=3D'''\ @@ -209,7 +209,7 @@ def __call__(self, parser, namespace, values, option_st= ring=3DNone): p.add_argument('--target-cache', help=3D'''\ Setup cache for target nodes. Options: direct: default, use O_DIRECT and aio=3Dnative - cached: use system cache (Qemu default) and aio=3Dthreads (Qemu default) + cached: use system cache (QEMU default) and aio=3Dthreads (QEMU default) both: generate two test cases for each src:dst pair''', default=3D'direct', choices=3D('direct', 'cached', 'bot= h')) =20 diff --git a/scripts/simplebench/bench_block_job.py b/scripts/simplebench/b= ench_block_job.py index a403c35b08f..ecbcd535bcb 100755 --- a/scripts/simplebench/bench_block_job.py +++ b/scripts/simplebench/bench_block_job.py @@ -36,7 +36,7 @@ def bench_block_job(cmd, cmd_args, qemu_args): =20 cmd -- qmp command to run block-job (like blockdev-backup) cmd_args -- dict of qmp command arguments - qemu_args -- list of Qemu command line arguments, including path to Qe= mu + qemu_args -- list of QEMU command line arguments, including path to QE= MU binary =20 Returns {'seconds': int} on success and {'error': str} on failure, dic= t may diff --git a/target/hexagon/README b/target/hexagon/README index 372e24747c9..b02dbbd1701 100644 --- a/target/hexagon/README +++ b/target/hexagon/README @@ -48,7 +48,7 @@ header files in /target/hexagon gen_tcg_func_table.py -> tcg_func_table_generated.c.inc gen_helper_funcs.py -> helper_funcs_generated.c.inc =20 -Qemu helper functions have 3 parts +QEMU helper functions have 3 parts DEF_HELPER declaration indicates the signature of the helper gen_helper_ will generate a TCG call to the helper function The helper implementation diff --git a/tests/guest-debug/run-test.py b/tests/guest-debug/run-test.py index 2e58795a100..268a230ecc3 100755 --- a/tests/guest-debug/run-test.py +++ b/tests/guest-debug/run-test.py @@ -21,9 +21,9 @@ =20 def get_args(): parser =3D argparse.ArgumentParser(description=3D"A gdbstub test runne= r") - parser.add_argument("--qemu", help=3D"Qemu binary for test", + parser.add_argument("--qemu", help=3D"QEMU binary for test", required=3DTrue) - parser.add_argument("--qargs", help=3D"Qemu arguments for test") + parser.add_argument("--qargs", help=3D"QEMU arguments for test") parser.add_argument("--binary", help=3D"Binary to debug", required=3DTrue) parser.add_argument("--test", help=3D"GDB test script", diff --git a/tests/qemu-iotests/testenv.py b/tests/qemu-iotests/testenv.py index c33454fa685..b563b6d5e6d 100644 --- a/tests/qemu-iotests/testenv.py +++ b/tests/qemu-iotests/testenv.py @@ -157,7 +157,7 @@ def root(*names: str) -> str: progs =3D sorted(glob.iglob(pattern)) self.qemu_prog =3D next(p for p in progs if isxfile(p)) except StopIteration: - sys.exit("Not found any Qemu executable binary by pattern " + sys.exit("Not found any QEMU executable binary by pattern " f"'{pattern}'") =20 self.qemu_img_prog =3D os.getenv('QEMU_IMG_PROG', root('qemu-img')) --=20 2.31.1 From nobody Sat May 18 19:24:33 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of redhat.com designates 216.205.24.124 as permitted sender) client-ip=216.205.24.124; envelope-from=philmd@redhat.com; helo=us-smtp-delivery-124.mimecast.com; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of redhat.com designates 216.205.24.124 as permitted sender) smtp.mailfrom=philmd@redhat.com; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1637313443; cv=none; d=zohomail.com; s=zohoarc; b=k53icuA8WOxzsG/0bmoKQOxLjG9osWDKx/bIoqnpstBehQPOf1xQ5+Qjx+jVfw3OTsSZqXJ/M1B3rqYwVzOrLjU3bIMtSWeB1Z63jP6JIK8BWWHiWdgSbN/MLYMFbfbtlwO8Cv64UqCEEfy6jnvW8UbGBoDXLraF4TGlPMibmag= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1637313443; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; bh=gRoflLF2rC1zBazllCjukemH1mBXXWiz/W1zufMnXs0=; b=LlKJ5atIprn9IIgspBLldQWngGJ0R690j858jBvNOnWwySeLny0oXovBhIE9L+8/VTb8MzhaWTWq6kJfcNi7nHYjfz5HqJLlGQOs2MpYl6jlWTGrQvnNjPBUgizbV2l0wy8ISZU1gQrFmyf3YsqfiChlsDNAu15+26uKhUd72Co= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of redhat.com designates 216.205.24.124 as permitted sender) smtp.mailfrom=philmd@redhat.com; dmarc=pass header.from= (p=none dis=none) Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [216.205.24.124]) by mx.zohomail.com with SMTPS id 1637313443427294.8720742778803; Fri, 19 Nov 2021 01:17:23 -0800 (PST) Received: from mail-wm1-f70.google.com (mail-wm1-f70.google.com [209.85.128.70]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-573-K271yJGHMVekEStg6r59UA-1; Fri, 19 Nov 2021 04:17:18 -0500 Received: by mail-wm1-f70.google.com with SMTP id 138-20020a1c0090000000b00338bb803204so3028269wma.1 for ; Fri, 19 Nov 2021 01:17:18 -0800 (PST) Return-Path: Return-Path: Received: from x1w.. (62.red-83-57-168.dynamicip.rima-tde.net. [83.57.168.62]) by smtp.gmail.com with ESMTPSA id j8sm2305880wrh.16.2021.11.19.01.17.16 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 19 Nov 2021 01:17:17 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1637313442; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=gRoflLF2rC1zBazllCjukemH1mBXXWiz/W1zufMnXs0=; b=Sym+kHQozEile39ucYD1ItqEAIsGWmCmrJiP3RDo6DC8RA9aWyIGdFK11cMsi5/xC5kh4N 1k8RAzB25zaESssBA5rCn/IC+PS6NEeFQ61Q9ZuM49djw5hdFgklg/8yWAgtZFudXb0yZA cl61r6ilUII6qGNSV+VVVntuMFULeec= X-MC-Unique: K271yJGHMVekEStg6r59UA-1 X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=gRoflLF2rC1zBazllCjukemH1mBXXWiz/W1zufMnXs0=; b=gzCBALhbaygSwha9uDiWAMe22KV/YNvuUf9pXq53L0GAiBh7lPdzNGbLal//uRhLnA v7FsvplFZezWOMmImsi02siM2IqvNkchdvjDWiyXeuEdgSw10zmR39XhNJ5rSWYdT8NX 4+B414QoGUdQmiR3InXcdI4YnHaYubOKGgbD8TN5u0x3InG3s3LX8ZUnZli58jdAL4rq Qsmal1ofXnGCjN1oTx6cla1+m4e+z+ZgQyG01VZfcuQPfQIMS0+8Iq7iJtO+qRH5obA7 5m/jMZLHwf3vjPfnAg2/JGWpo5beNqV3bcrzf2TTxslzwN1sfZG3ChYmDZwWkni/Vfoz m8ig== X-Gm-Message-State: AOAM53185xn6OMx0H6YER77B14foTEm7EcvXsKv9hx8Xbq/wlzhtopVY SO32aSDc22htFef4/8MAT4TmWmYoneF5b18QLZ9jbP2vxmlfpmXmJodC3S8cwqheU9XsCA4batZ AqCguv83E2ULJQw== X-Received: by 2002:adf:f40b:: with SMTP id g11mr5714967wro.296.1637313437447; Fri, 19 Nov 2021 01:17:17 -0800 (PST) X-Google-Smtp-Source: ABdhPJzjtIV1auJ1KnpG4qWnuDniPJZ9WC7iv91EjYI8edvo1a8UkKpFC/6mc24Mh9Gkk00xmpLlIA== X-Received: by 2002:adf:f40b:: with SMTP id g11mr5714945wro.296.1637313437328; Fri, 19 Nov 2021 01:17:17 -0800 (PST) From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= To: qemu-devel@nongnu.org Cc: Cleber Rosa , John Snow , Eric Blake , Markus Armbruster , Hanna Reitz , Michael Roth , qemu-block@nongnu.org, Marcelo Tosatti , Vladimir Sementsov-Ogievskiy , Eduardo Habkost , Taylor Simpson , kvm@vger.kernel.org, Paolo Bonzini , Kevin Wolf , =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= Subject: [PATCH-for-6.2? v2 3/3] qga: Spell QEMU all caps Date: Fri, 19 Nov 2021 10:17:01 +0100 Message-Id: <20211119091701.277973-4-philmd@redhat.com> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20211119091701.277973-1-philmd@redhat.com> References: <20211119091701.277973-1-philmd@redhat.com> MIME-Version: 1.0 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=philmd@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1637313443855100001 QEMU should be written all caps. Normally checkpatch.pl warns when it is not (see commit 9964d8f9422: "checkpatch: Add QEMU specific rule"). Replace Qemu -> QEMU, update the error message to use the more descriptive "Guest Agent" name instead of "GA". Signed-off-by: Philippe Mathieu-Daud=C3=A9 --- qga/installer/qemu-ga.wxs | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/qga/installer/qemu-ga.wxs b/qga/installer/qemu-ga.wxs index 0950e8c6bec..c02e47fc036 100644 --- a/qga/installer/qemu-ga.wxs +++ b/qga/installer/qemu-ga.wxs @@ -40,14 +40,14 @@ =20 - NOT VersionNT64 + NOT VersionNT64 - +