[libvirt PATCH] docs: kbase: Tune how CPU support for SEV should be queried
Daniel P. Berrangé
berrange at redhat.com
Thu Sep 10 13:30:58 UTC 2020
On Thu, Sep 10, 2020 at 03:22:51PM +0200, Erik Skultety wrote:
> #useless_use_of_cat
>
You also changed semantics to avoid accidental sub-string matches....
> Signed-off-by: Erik Skultety <eskultet at redhat.com>
> ---
>
> Dedicated to everyone who felt deeply offended by the useless use of cat :).
>
> docs/kbase/launch_security_sev.rst | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/docs/kbase/launch_security_sev.rst b/docs/kbase/launch_security_sev.rst
> index 4a37c0c379..8f58413261 100644
> --- a/docs/kbase/launch_security_sev.rst
> +++ b/docs/kbase/launch_security_sev.rst
> @@ -38,7 +38,7 @@ You can manually check whether SEV is among the CPU flags with:
>
> ::
>
> - $ cat /proc/cpuinfo | grep sev
> + $ grep -w sev /proc/cpuinfo
> ...
> sme ssbd sev ibpb
Reviewed-by: Daniel P. Berrangé <berrange at redhat.com>
Regards,
Daniel
--
|: https://berrange.com -o- https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org -o- https://fstop138.berrange.com :|
|: https://entangle-photo.org -o- https://www.instagram.com/dberrange :|
More information about the libvir-list
mailing list