Received: by 2002:a05:6520:1682:b0:147:d1a0:b502 with SMTP id ck2csp5599345lkb; Mon, 11 Oct 2021 09:42:04 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx8Yp0H+gU6mA82oFYxAxpAyb9/BF+9yXvtPns4IipYugJW3w9cqY/Xu1DkOdKtLw699YLD X-Received: by 2002:a17:906:4a09:: with SMTP id w9mr25200652eju.419.1633970523475; Mon, 11 Oct 2021 09:42:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633970523; cv=none; d=google.com; s=arc-20160816; b=xgV75Ut0KqDzjX/y529YtDqP0SjhqFgo68QBMdEfakINWlnCluLe5Dxz6Wvxix9qHB BsO3utQMQyoYl3uj/ScH6nYybZ2jn4zp8TdX1fTF0xmgq4rhK8acsRrw/HY3QHOtCQtS K3ZOAC7BZagct2q2E0VQ+O8E8rvjVATELBkG2mFOX7McagMHHYwWqIPmyKEaAGJX5F7T O5zkLw0pokv2D75q2lSRKpsBYu/ooDO9pRXqmY+5CyohcTgqNkFnT5n1B06stFAjV7mg KS6B1m14mskWLu7pS8yqGIrl4N5z8DAsY5fFLm8+xI1ZOZFM7QpXLAyvSxoEQteJ1ie9 h2uA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:to:from; bh=0QdFEyq/wAQVBtLF06aafkRuiL/lxiS5OPI3zz083Y0=; b=lMQ6OPesM5METCiVdn6SHM6Vc0fRkxfy7HU74zfMxx7f2JvYbJcsnoCpQt7iB3FN+U Vt245qMznpKO9PQK50vLGG5hRSyVWnIIs8EdkA/a7QOO0pQB380MK37CLQZb5WKUMUHq Q0CAlFG6F9UozUdrIkIzznghK/1GvEnnWHXYOY2h5mJ8ntKITsQ1epx4eRRNCPxMlr3X Jnz+ZNN8uexaelJjNkFRonUhTWLKCHc5puIhXm27vei4aYDjdz0+iTUfsdcK1UvXnvLn tL35ELsF2hkbkoFQ83A2YSO0I0UyXFlSlrd6FLyswFB9+A9oDojbrTRVEEp1pW9irYMZ +ujA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f14si10111638edc.609.2021.10.11.09.41.37; Mon, 11 Oct 2021 09:42:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243584AbhJKPjM (ORCPT + 99 others); Mon, 11 Oct 2021 11:39:12 -0400 Received: from foss.arm.com ([217.140.110.172]:34614 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S243263AbhJKPjJ (ORCPT ); Mon, 11 Oct 2021 11:39:09 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id A6DB9101E; Mon, 11 Oct 2021 08:37:08 -0700 (PDT) Received: from monolith.cable.virginm.net (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id E367F3F694; Mon, 11 Oct 2021 08:37:06 -0700 (PDT) From: Alexandru Elisei To: corbet@lwn.net, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, catalin.marinas@arm.com, will@kernel.org, maz@kernel.org, james.morse@arm.com, suzuki.poulose@arm.com, kvmarm@lists.cs.columbia.edu, linux-arm-kernel@lists.infradead.org Subject: [PATCH] Documentation: admin-guide: Document side effects when pKVM is enabled Date: Mon, 11 Oct 2021 16:38:35 +0100 Message-Id: <20211011153835.291147-1-alexandru.elisei@arm.com> X-Mailer: git-send-email 2.33.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Recent changes to KVM for arm64 has made it impossible for the host to hibernate or use kexec when protected mode is enabled via the kernel command line. There are people who rely on kexec (for example, developers who use kexec as a quick way to test a new kernel), let's document this change in behaviour, so it doesn't catch them by surprise and we have a place to point people to if it does. Signed-off-by: Alexandru Elisei --- Based on the tip of the pkvm/restrict-hypercalls series [1] [1] https://git.kernel.org/pub/scm/linux/kernel/git/maz/arm-platforms.git/log/?h=kvm-arm64/pkvm/restrict-hypercalls Documentation/admin-guide/kernel-parameters.txt | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt index 91ba391f9b32..741e33fd444a 100644 --- a/Documentation/admin-guide/kernel-parameters.txt +++ b/Documentation/admin-guide/kernel-parameters.txt @@ -2372,7 +2372,9 @@ state is kept private from the host. Not valid if the kernel is running in EL2. - Defaults to VHE/nVHE based on hardware support. + Defaults to VHE/nVHE based on hardware support. Setting + mode to "protected" will disable kexec and hibernation + for the host. kvm-arm.vgic_v3_group0_trap= [KVM,ARM] Trap guest accesses to GICv3 group-0 -- 2.33.0