From nobody Thu Apr 16 08:29:59 2026 Received: from mail-pl1-f173.google.com (mail-pl1-f173.google.com [209.85.214.173]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3958E430B9E for ; Sun, 1 Mar 2026 08:19:11 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.173 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772353153; cv=none; b=hbN/DqFytl3bY2VzpxuaW8S2Slf7Vd9wcSWs+wwnn9uS6Czuy5RHboJqOKsbJiAwM6l7u+Ppjcaln7YHyuT8KxaNXICzqNiN1rPWKT7D2FF2spZqgmAGPA50H/paIolXW+R5cqZ9sRGYIUap68KJpIZQqmqYyBAtJ6syWkn9xwU= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772353153; c=relaxed/simple; bh=HAn8Q0qD46S52DsoD8KOFk0HLdGDwh1bHqGsoxSYe94=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=oLv6Vv1SXUEHMF8QTC8Gm/pDW27j/a9MdCg9nLgsDUTn5PHx3EYf4ZmRL9WxZ5beqHFfT/dUKmnHreEvNrzDh6/13GDMwc4lKfJs/5Wz1yBcF9ww4Au8vhzoo/ze+lW7jV1SQcDApupkxNLfcWdK8IpmsKYlpRkW/AZ3vk/zL8Y= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=RiI89ZO6; arc=none smtp.client-ip=209.85.214.173 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="RiI89ZO6" Received: by mail-pl1-f173.google.com with SMTP id d9443c01a7336-2ae43042ea7so7797055ad.0 for ; Sun, 01 Mar 2026 00:19:11 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1772353151; x=1772957951; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=JXaV9B2nw2SEQzT6yc0N2Gk8LtML7jgrgg7/O8SJR1I=; b=RiI89ZO6bf8DdzRa0ALwKekUUjpGzfR6pYCQ0aOfscu91SC4CRDyB089PXvo1eo5c8 NRniHDOFUbuYgRaXbCfsfNlzlhvhpTeGV7qy43hjxViq9q/1XpL/8ZBNkLMrcHz08DQm RbtJUr09nl66HD5LwzD+Erdr7ayw2x7gcjKw7nX38rMTfX2Tzn0SVKyTey9sbnWuVChY kL6m7q9X287632eN4HvfjqMDpkE1ZhRQIR57m8lMb27Lc9CFeknSJECgQH3yRG9bMAuH XM2mT1SQgcb4DyJat8fZT+PeDhncadqRsBjpURxqWYmrV3JBqJ9+u9ObePwY9pvmUcq1 LCpA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1772353151; x=1772957951; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=JXaV9B2nw2SEQzT6yc0N2Gk8LtML7jgrgg7/O8SJR1I=; b=wLfOsUD5jvHyNki5ZyhjnoX/Om34UJqv9f1GUGhAGoeGCXM1d4m61YeMbjUnchyA2X ZyyFzAUcGUlBDRBrTdKsUbLPhQKckky6L4bdLb1ww//BTuwPNdzswJT7Bfhm/GRe5USP pSwZT2en6aPHofaSBdaQxGHK/b9wb4SJxCt6dpWpcCxAuR6y1/L+OZxsF8+QC7z3t7Uh syeDHCkIDD+oCroGkKVMvyXE4dOf1sRFXe/vu3atATKcUHPdVqj6Ia4bRF62IL5/7Fj1 OSBUJB+y099fax1zW1ySPdNE+FZqzy/xAsYpYdYCne33axtmzKPN1ze5avMk6bQIuGrX ML1Q== X-Forwarded-Encrypted: i=1; AJvYcCVA8zjCBt+Mdj6Xsyls884hyw01346s8RVmf3z+4/jf1DlVsWLVp1qjt8WGMFYsNufgSOeycSk/MIO3tPE=@vger.kernel.org X-Gm-Message-State: AOJu0YxmB3iw303hI5coqqAZ4zfU6OrrdFeWen/ILHpZ/wbEe8JKWVjl 4cY+HpeoL5I7nh4ygbFE+WJtmcrREnI/5sGVWZUoueYwD1Q57OdviJ4a X-Gm-Gg: ATEYQzzkY30kNi5g3FNE3I21+xLOpRcwkTxtACve3mhcmXOHpA2yul+6LEOnwEffIKV ApYMVhK/0fDW6HkVLQyNfvRyi5ycK4GUarO9mVfVjkQln7BlORtXDzQ72lYs/uNKnyJHAAl3fzc jPGnHnW9i0ijX32e09lSAwNV3RvB38ghigVE7IHWUMwGG16kvLlkmW4UjOsVPabv8R7IkSGrL+p V+GyY2F3KA97VPOYEhuOdLQa/O0X/2Sr+cCOfIjFWA+6bQt2rCpmGzWnahCxkElh+Y6VP2wYug8 WL+zjoYzP3Q8A7QnfeVs8KBRDhEBsnBuOQb2Fktx6xkT2kfXPpCMrUfo17g714XVWWbO+7VIGNR lrZIBbyBSETpdP8rj2/+vMKlB3KOyfcxO174uSBBxP98vbsKIAWR74PoDN0OmgSOjyP45JjbZyr evv4PKscf2Rd7gI3tgCSIfdtz4eYE= X-Received: by 2002:a17:903:947:b0:2a3:bf9d:9399 with SMTP id d9443c01a7336-2ae2e47fee8mr81583175ad.35.1772353150536; Sun, 01 Mar 2026 00:19:10 -0800 (PST) Received: from linux-dev.. ([104.28.153.21]) by smtp.gmail.com with ESMTPSA id d9443c01a7336-2adfb69f277sm137489055ad.55.2026.03.01.00.19.09 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 01 Mar 2026 00:19:10 -0800 (PST) From: Afkari Zergaw To: pbonzini@redhat.com, corbet@lwn.net Cc: skhan@linuxfoundation.org, kvm@vger.kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, Afkari Zergaw Subject: [PATCH] Documentation: KVM: fix punctuation for e.g. and i.e. Date: Sun, 1 Mar 2026 08:18:51 +0000 Message-ID: <20260301081851.11533-1-afkarizergaw12@gmail.com> X-Mailer: git-send-email 2.43.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Add missing commas after "e.g." and "i.e." in the KVM API documentation to improve readability and follow standard punctuation usage. Signed-off-by: Afkari Zergaw --- Documentation/virt/kvm/api.rst | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/Documentation/virt/kvm/api.rst b/Documentation/virt/kvm/api.rst index fc5736839edd..c8500f0e913a 100644 --- a/Documentation/virt/kvm/api.rst +++ b/Documentation/virt/kvm/api.rst @@ -6346,12 +6346,12 @@ A KVM_MEM_GUEST_MEMFD region _must_ have a valid gu= est_memfd (private memory) an userspace_addr (shared memory). However, "valid" for userspace_addr simply means that the address itself must be a legal userspace address. The back= ing mapping for userspace_addr is not required to be valid/populated at the ti= me of -KVM_SET_USER_MEMORY_REGION2, e.g. shared memory can be lazily mapped/alloc= ated +KVM_SET_USER_MEMORY_REGION2, e.g., shared memory can be lazily mapped/allo= cated on-demand. =20 -When mapping a gfn into the guest, KVM selects shared vs. private, i.e con= sumes +When mapping a gfn into the guest, KVM selects shared vs. private, i.e., c= onsumes userspace_addr vs. guest_memfd, based on the gfn's KVM_MEMORY_ATTRIBUTE_PR= IVATE -state. At VM creation time, all memory is shared, i.e. the PRIVATE attrib= ute +state. At VM creation time, all memory is shared, i.e., the PRIVATE attri= bute is '0' for all gfns. Userspace can control whether memory is shared/priva= te by toggling KVM_MEMORY_ATTRIBUTE_PRIVATE via KVM_SET_MEMORY_ATTRIBUTES as nee= ded. =20 --=20 2.43.0