mirror of
https://github.com/torvalds/linux.git
synced 2024-12-30 14:52:05 +00:00
docs: kvm: arm/psci.txt: convert to ReST
- Add a title for the document; - Adjust whitespaces for it to be properly formatted after parsed. Signed-off-by: Mauro Carvalho Chehab <mchehab+huawei@kernel.org> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
This commit is contained in:
parent
69bf758bc8
commit
cec0e48be3
@ -8,4 +8,5 @@ ARM
|
|||||||
:maxdepth: 2
|
:maxdepth: 2
|
||||||
|
|
||||||
hyp-abi
|
hyp-abi
|
||||||
|
psci
|
||||||
pvtime
|
pvtime
|
||||||
|
@ -1,3 +1,9 @@
|
|||||||
|
.. SPDX-License-Identifier: GPL-2.0
|
||||||
|
|
||||||
|
=========================================
|
||||||
|
Power State Coordination Interface (PSCI)
|
||||||
|
=========================================
|
||||||
|
|
||||||
KVM implements the PSCI (Power State Coordination Interface)
|
KVM implements the PSCI (Power State Coordination Interface)
|
||||||
specification in order to provide services such as CPU on/off, reset
|
specification in order to provide services such as CPU on/off, reset
|
||||||
and power-off to the guest.
|
and power-off to the guest.
|
||||||
@ -30,32 +36,42 @@ The following register is defined:
|
|||||||
- Affects the whole VM (even if the register view is per-vcpu)
|
- Affects the whole VM (even if the register view is per-vcpu)
|
||||||
|
|
||||||
* KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_1:
|
* KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_1:
|
||||||
Holds the state of the firmware support to mitigate CVE-2017-5715, as
|
Holds the state of the firmware support to mitigate CVE-2017-5715, as
|
||||||
offered by KVM to the guest via a HVC call. The workaround is described
|
offered by KVM to the guest via a HVC call. The workaround is described
|
||||||
under SMCCC_ARCH_WORKAROUND_1 in [1].
|
under SMCCC_ARCH_WORKAROUND_1 in [1].
|
||||||
|
|
||||||
Accepted values are:
|
Accepted values are:
|
||||||
KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_1_NOT_AVAIL: KVM does not offer
|
|
||||||
|
KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_1_NOT_AVAIL:
|
||||||
|
KVM does not offer
|
||||||
firmware support for the workaround. The mitigation status for the
|
firmware support for the workaround. The mitigation status for the
|
||||||
guest is unknown.
|
guest is unknown.
|
||||||
KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_1_AVAIL: The workaround HVC call is
|
KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_1_AVAIL:
|
||||||
|
The workaround HVC call is
|
||||||
available to the guest and required for the mitigation.
|
available to the guest and required for the mitigation.
|
||||||
KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_1_NOT_REQUIRED: The workaround HVC call
|
KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_1_NOT_REQUIRED:
|
||||||
|
The workaround HVC call
|
||||||
is available to the guest, but it is not needed on this VCPU.
|
is available to the guest, but it is not needed on this VCPU.
|
||||||
|
|
||||||
* KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2:
|
* KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2:
|
||||||
Holds the state of the firmware support to mitigate CVE-2018-3639, as
|
Holds the state of the firmware support to mitigate CVE-2018-3639, as
|
||||||
offered by KVM to the guest via a HVC call. The workaround is described
|
offered by KVM to the guest via a HVC call. The workaround is described
|
||||||
under SMCCC_ARCH_WORKAROUND_2 in [1].
|
under SMCCC_ARCH_WORKAROUND_2 in [1]_.
|
||||||
|
|
||||||
Accepted values are:
|
Accepted values are:
|
||||||
KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2_NOT_AVAIL: A workaround is not
|
|
||||||
|
KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2_NOT_AVAIL:
|
||||||
|
A workaround is not
|
||||||
available. KVM does not offer firmware support for the workaround.
|
available. KVM does not offer firmware support for the workaround.
|
||||||
KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2_UNKNOWN: The workaround state is
|
KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2_UNKNOWN:
|
||||||
|
The workaround state is
|
||||||
unknown. KVM does not offer firmware support for the workaround.
|
unknown. KVM does not offer firmware support for the workaround.
|
||||||
KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2_AVAIL: The workaround is available,
|
KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2_AVAIL:
|
||||||
|
The workaround is available,
|
||||||
and can be disabled by a vCPU. If
|
and can be disabled by a vCPU. If
|
||||||
KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2_ENABLED is set, it is active for
|
KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2_ENABLED is set, it is active for
|
||||||
this vCPU.
|
this vCPU.
|
||||||
KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2_NOT_REQUIRED: The workaround is
|
KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2_NOT_REQUIRED:
|
||||||
always active on this vCPU or it is not needed.
|
The workaround is always active on this vCPU or it is not needed.
|
||||||
|
|
||||||
[1] https://developer.arm.com/-/media/developer/pdf/ARM_DEN_0070A_Firmware_interfaces_for_mitigating_CVE-2017-5715.pdf
|
.. [1] https://developer.arm.com/-/media/developer/pdf/ARM_DEN_0070A_Firmware_interfaces_for_mitigating_CVE-2017-5715.pdf
|
Loading…
Reference in New Issue
Block a user