diff options
author | Paolo Bonzini <pbonzini@redhat.com> | 2020-03-31 16:45:49 +0200 |
---|---|---|
committer | Paolo Bonzini <pbonzini@redhat.com> | 2020-03-31 16:45:49 +0200 |
commit | 4f4af841f06a085f97a685041c89630472002e3e (patch) | |
tree | 9f5ed7c93cdac9af6238e320aa41a430c188cbce /Documentation/virt | |
parent | Merge tag 'kvmarm-5.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmar... (diff) | |
parent | KVM: PPC: Book3S HV: Add a capability for enabling secure guests (diff) | |
download | linux-4f4af841f06a085f97a685041c89630472002e3e.tar.xz linux-4f4af841f06a085f97a685041c89630472002e3e.zip |
Merge tag 'kvm-ppc-next-5.7-1' of git://git.kernel.org/pub/scm/linux/kernel/git/paulus/powerpc into HEAD
KVM PPC update for 5.7
* Add a capability for enabling secure guests under the Protected
Execution Framework ultravisor
* Various bug fixes and cleanups.
Diffstat (limited to 'Documentation/virt')
-rw-r--r-- | Documentation/virt/kvm/api.rst | 17 |
1 files changed, 17 insertions, 0 deletions
diff --git a/Documentation/virt/kvm/api.rst b/Documentation/virt/kvm/api.rst index acebf6c731a3..efbbe570aa9b 100644 --- a/Documentation/virt/kvm/api.rst +++ b/Documentation/virt/kvm/api.rst @@ -5785,6 +5785,23 @@ it hard or impossible to use it correctly. The availability of KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2 signals that those bugs are fixed. Userspace should not try to use KVM_CAP_MANUAL_DIRTY_LOG_PROTECT. +7.19 KVM_CAP_PPC_SECURE_GUEST +------------------------------ + +:Architectures: ppc + +This capability indicates that KVM is running on a host that has +ultravisor firmware and thus can support a secure guest. On such a +system, a guest can ask the ultravisor to make it a secure guest, +one whose memory is inaccessible to the host except for pages which +are explicitly requested to be shared with the host. The ultravisor +notifies KVM when a guest requests to become a secure guest, and KVM +has the opportunity to veto the transition. + +If present, this capability can be enabled for a VM, meaning that KVM +will allow the transition to secure guest mode. Otherwise KVM will +veto the transition. + 8. Other capabilities. ====================== |