From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4BA3CC38A23 for ; Fri, 20 Jan 2023 18:05:02 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229898AbjATSFB (ORCPT ); Fri, 20 Jan 2023 13:05:01 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55758 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231165AbjATSE5 (ORCPT ); Fri, 20 Jan 2023 13:04:57 -0500 Received: from mail-pl1-x629.google.com (mail-pl1-x629.google.com [IPv6:2607:f8b0:4864:20::629]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B93CD63E20 for ; Fri, 20 Jan 2023 10:04:56 -0800 (PST) Received: by mail-pl1-x629.google.com with SMTP id b17so6011280pld.7 for ; Fri, 20 Jan 2023 10:04:56 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=2OuajGsQxBU53T1LkCzzlNc9v38dGdSuaz3Ry16782k=; b=cv4xGHqJsuZvK2ZarceReQkinlRWj2RKHI/IXlEeZ8KhlCt9vSO+50shUgMQe8U7Xo o/N48hI9fEfkAoRXatBZOk/BX0ATkFJL8snFudzFxL3kNQ9mKICA/iOJSXzXo2qLmZNF 8twvT7FVamMuP5tkEBBz1tL29FrI4hkbo5KtFr9UgvArdoGmLJNRcJR9SXOwhW03BQNG VvQ5wv+icw52V1um0S2V9vmsnnONdVfyOW6vf7J6e74roX9rmFAD2M2mhIVkp66B3fmX EuRuzMryXhDtQSyIsM/pnUMX+I5wmG9EwAsk0P9XQZKaRKc/AhS07ScnQZ1vfJbrvcvr XJGw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=2OuajGsQxBU53T1LkCzzlNc9v38dGdSuaz3Ry16782k=; b=jF+ZJHkdQ0FxQa7q+yn4O9RuevaL+MJg3pZehAjglxiEeG6CwplsMcdqNU3FQQf9Iu jjwLgjrbwx+pa6hILI8OS9TcgpMC3lNY8Qzq2RqOoQ71EBHqOfQwCUhwpXSJdZ1wMOo1 m3Ny7lUza5PxlkKS9h9SGl72EeyoM875IAUFf/9omov0f0T6WYTK9qD2kjXy6/eb1+mv 0+5jcgBWU0u/sJZhs8+ez0p+rL5Gdz8TNOJ1a8kIFOKCWRr/34rDQRQZe8uSpMuEjhYS 5tctes76MZN2WCqT/IRkgRt8vjb/cmvF08njRDMJxfXJn426Rr+hqgmDNZ/wiWR5p5fa /zCQ== X-Gm-Message-State: AFqh2kpezoWXuajwKFpfNYMjU5qtT6aM0rW9A1zIF2ODGOMppyIRMKBW j3E176rcHShtc/Lq6HUwfDxDnA== X-Google-Smtp-Source: AMrXdXuQhxYzud0iE3IRvL3V0n7Ork0xtZ6zEcwNtunFJm0FHpzqoz+cUMFDIt1LhNt+V+5xPvsjoQ== X-Received: by 2002:a17:903:404c:b0:191:4367:7fde with SMTP id n12-20020a170903404c00b0019143677fdemr268549pla.0.1674237896052; Fri, 20 Jan 2023 10:04:56 -0800 (PST) Received: from google.com (7.104.168.34.bc.googleusercontent.com. [34.168.104.7]) by smtp.gmail.com with ESMTPSA id f5-20020a170902684500b0019488a36e2asm11100991pln.277.2023.01.20.10.04.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 20 Jan 2023 10:04:55 -0800 (PST) Date: Fri, 20 Jan 2023 18:04:51 +0000 From: Sean Christopherson To: Bagas Sanjaya Cc: Freedesktop DRI List , Linux Kernel Mailing List , Linux Documentation , Linux KVM , Linux Next Mailing List , Oded Gabbay , Jonathan Corbet , Paolo Bonzini , Jeffrey Hugo , Ofir Bitton , Aaron Lewis , Stephen Rothwell Subject: Re: [PATCH linux-next 3/3] kvm: x86/pmu: Add blank line separator before KVM_CAP_PMU_EVENT_MASKED_EVENTS code path list Message-ID: References: <20230120123534.137413-1-bagasdotme@gmail.com> <20230120123534.137413-4-bagasdotme@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230120123534.137413-4-bagasdotme@gmail.com> Precedence: bulk List-ID: X-Mailing-List: linux-doc@vger.kernel.org On Fri, Jan 20, 2023, Bagas Sanjaya wrote: > Stephen Rothwell reported htmldocs warning when merging kvm-x86 tree: > > Documentation/virt/kvm/api.rst:5070: ERROR: Unexpected indentation. > > Fix the warning by adding a blank line separator before > KVM_CAP_PMU_EVENT_MASKED_EVENTS code path list to determine guest access. > > Link: https://lore.kernel.org/linux-next/20230120130927.3100f935@canb.auug.org.au/ > Fixes: 651daa44b11c0e ("kvm: x86/pmu: Introduce masked events to the pmu event filter") > Reported-by: Stephen Rothwell > Signed-off-by: Bagas Sanjaya > --- > Documentation/virt/kvm/api.rst | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/Documentation/virt/kvm/api.rst b/Documentation/virt/kvm/api.rst > index a477186c57c193..83e3acc9e3211d 100644 > --- a/Documentation/virt/kvm/api.rst > +++ b/Documentation/virt/kvm/api.rst > @@ -5067,6 +5067,7 @@ An encoded event will follow this layout:: > > When the guest attempts to program the PMU, these steps are followed in > determining if the guest should have access: > + > 1. Match the event select from the guest against the filter events. > 2. If a match is found, match the guest's unit mask to the mask and match > values of the included filter events. > -- Squashed this into the offending commit, thanks!