Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp822807ybz; Fri, 24 Apr 2020 09:51:04 -0700 (PDT) X-Google-Smtp-Source: APiQypJvSFjqBALT0SG/uC7bAOGukcIjCLkC3XTueuEuFMpXrPpCvndgA627NqbsOyzqiKKgiR1A X-Received: by 2002:a17:907:2101:: with SMTP id qn1mr8304140ejb.207.1587747064442; Fri, 24 Apr 2020 09:51:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587747064; cv=none; d=google.com; s=arc-20160816; b=yFZdAdRarCZ2c1JIqa2fyJ1rrIhWxAmgLET/CT00encQ1o15vGsGXvR6R3roN0r38e axgTqHxt9Ae23E2nwSzx0tcTL3TGRPPm00SMeot2sWu+pu77ZLY2/wZcSwS1iSSn593B eBke6+3JvBnI0wrsRzZ2ShIDhFIHlsGI2l0Kg588o12yr549jYdewIVmU/Yd+6NSHnXx 09FTAyr8TkTqRfHq+aTROH+YW2yz5qB172cNOiwGOJDbW27agOaHXdYEawxUYRX9Mzif mclB1yiaBzXm2GsMJQzNQy/WFltMOWTgnfJLWE/tstB/+0Kf1DrA6BG86IRSun+6m27T uCjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=cQ0U4YlT849CQPwyVCVpxHVxc9T7Jg9hLHUSbMcjETs=; b=CiiZy5UJMEBm0A16rQRa7PNRzolsJF6Q/Qre0P3STpoPifbqg9FYu+5t10XDy6U+WC WrdUqV4WLIK6ZOrD2L3fZyWBmvvXV105WAXMEUFDUc60qjulf6q83bXIQiV2oPcQ7JtV kUBc6fsVSoPrr3YGqQ2/nd25bTMSDSwSya1VNIb9JA3gH7jITssXNeJjZghHANai0lPI Psttg45QB/JYL92LuL5Qfv4LieMAU+MnjcpBwKLDSJMgYqkC0u6SSxCHODhr8hINmnzu j2p1yW4s/imqyyJcvEvLO5nwTG/EVPRTMIFA3VDkECfTaAZ1sWMJ5gdDOKL2cwCSOWak 5NHw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w8si3165763eju.477.2020.04.24.09.50.40; Fri, 24 Apr 2020 09:51:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728140AbgDXQq6 (ORCPT + 99 others); Fri, 24 Apr 2020 12:46:58 -0400 Received: from 14.mo6.mail-out.ovh.net ([46.105.56.113]:45376 "EHLO 14.mo6.mail-out.ovh.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726698AbgDXQq6 (ORCPT ); Fri, 24 Apr 2020 12:46:58 -0400 X-Greylist: delayed 4200 seconds by postgrey-1.27 at vger.kernel.org; Fri, 24 Apr 2020 12:46:57 EDT Received: from player694.ha.ovh.net (unknown [10.108.35.232]) by mo6.mail-out.ovh.net (Postfix) with ESMTP id C3DC2209742 for ; Fri, 24 Apr 2020 17:27:06 +0200 (CEST) Received: from sk2.org (82-65-25-201.subs.proxad.net [82.65.25.201]) (Authenticated sender: steve@sk2.org) by player694.ha.ovh.net (Postfix) with ESMTPSA id B3E1C11A58320; Fri, 24 Apr 2020 15:26:59 +0000 (UTC) From: Stephen Kitt To: Paolo Bonzini , Jonathan Corbet , kvm@vger.kernel.org, linux-doc@vger.kernel.org Cc: linux-kernel@vger.kernel.org, Stephen Kitt Subject: [PATCH] docs: virt/kvm: close inline string literal Date: Fri, 24 Apr 2020 17:26:37 +0200 Message-Id: <20200424152637.120876-1-steve@sk2.org> X-Mailer: git-send-email 2.25.3 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Ovh-Tracer-Id: 381117119294557646 X-VR-SPAMSTATE: OK X-VR-SPAMSCORE: -100 X-VR-SPAMCAUSE: gggruggvucftvghtrhhoucdtuddrgeduhedrhedugdekgecutefuodetggdotefrodftvfcurfhrohhfihhlvgemucfqggfjpdevjffgvefmvefgnecuuegrihhlohhuthemucehtddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenucfjughrpefhvffufffkofgggfestdekredtredttdenucfhrhhomhepufhtvghphhgvnhcumfhithhtuceoshhtvghvvgesshhkvddrohhrgheqnecukfhppedtrddtrddtrddtpdekvddrieehrddvhedrvddtudenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepmhhouggvpehsmhhtphdqohhuthdphhgvlhhopehplhgrhigvrheileegrdhhrgdrohhvhhdrnhgvthdpihhnvghtpedtrddtrddtrddtpdhmrghilhhfrhhomhepshhtvghvvgesshhkvddrohhrghdprhgtphhtthhopehlihhnuhigqdhkvghrnhgvlhesvhhgvghrrdhkvghrnhgvlhdrohhrgh Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This fixes Documentation/virt/kvm/amd-memory-encryption.rst:76: WARNING: Inline literal start-string without end-string. Fixes: 2da1ed62d55c ("KVM: SVM: document KVM_MEM_ENCRYPT_OP, let userspace detect if SEV is available") Signed-off-by: Stephen Kitt --- Documentation/virt/kvm/amd-memory-encryption.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Documentation/virt/kvm/amd-memory-encryption.rst b/Documentation/virt/kvm/amd-memory-encryption.rst index c3129b9ba5cb..57c01f531e61 100644 --- a/Documentation/virt/kvm/amd-memory-encryption.rst +++ b/Documentation/virt/kvm/amd-memory-encryption.rst @@ -74,7 +74,7 @@ should point to a file descriptor that is opened on the ``/dev/sev`` device, if needed (see individual commands). On output, ``error`` is zero on success, or an error code. Error codes -are defined in ```. +are defined in ````. KVM implements the following commands to support common lifecycle events of SEV guests, such as launching, running, snapshotting, migrating and decommissioning. -- 2.25.3