All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH] KVM: x86: document behavior of measurement ioctls with len==0
@ 2021-04-20  9:34 Paolo Bonzini
  2021-04-20 19:09 ` Brijesh Singh
  0 siblings, 1 reply; 2+ messages in thread
From: Paolo Bonzini @ 2021-04-20  9:34 UTC (permalink / raw)
  To: linux-kernel, kvm; +Cc: Brijesh Singh

Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
---
 Documentation/virt/kvm/amd-memory-encryption.rst | 6 ++++++
 1 file changed, 6 insertions(+)

diff --git a/Documentation/virt/kvm/amd-memory-encryption.rst b/Documentation/virt/kvm/amd-memory-encryption.rst
index 469a6308765b..34ce2d1fcb89 100644
--- a/Documentation/virt/kvm/amd-memory-encryption.rst
+++ b/Documentation/virt/kvm/amd-memory-encryption.rst
@@ -148,6 +148,9 @@ measurement. Since the guest owner knows the initial contents of the guest at
 boot, the measurement can be verified by comparing it to what the guest owner
 expects.
 
+If len is zero on entry, the measurement blob length is written to len and
+uaddr is unused.
+
 Parameters (in): struct  kvm_sev_launch_measure
 
 Returns: 0 on success, -negative on error
@@ -271,6 +274,9 @@ report containing the SHA-256 digest of the guest memory and VMSA passed through
 commands and signed with the PEK. The digest returned by the command should match the digest
 used by the guest owner with the KVM_SEV_LAUNCH_MEASURE.
 
+If len is zero on entry, the measurement blob length is written to len and
+uaddr is unused.
+
 Parameters (in): struct kvm_sev_attestation
 
 Returns: 0 on success, -negative on error
-- 
2.26.2


^ permalink raw reply related	[flat|nested] 2+ messages in thread

* Re: [PATCH] KVM: x86: document behavior of measurement ioctls with len==0
  2021-04-20  9:34 [PATCH] KVM: x86: document behavior of measurement ioctls with len==0 Paolo Bonzini
@ 2021-04-20 19:09 ` Brijesh Singh
  0 siblings, 0 replies; 2+ messages in thread
From: Brijesh Singh @ 2021-04-20 19:09 UTC (permalink / raw)
  To: Paolo Bonzini, linux-kernel, kvm; +Cc: brijesh.singh


On 4/20/21 4:34 AM, Paolo Bonzini wrote:
> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>


Reviewed-by: Brijesh Singh <brijesh.singh@amd.com>

Thanks

> ---
>  Documentation/virt/kvm/amd-memory-encryption.rst | 6 ++++++
>  1 file changed, 6 insertions(+)
>
> diff --git a/Documentation/virt/kvm/amd-memory-encryption.rst b/Documentation/virt/kvm/amd-memory-encryption.rst
> index 469a6308765b..34ce2d1fcb89 100644
> --- a/Documentation/virt/kvm/amd-memory-encryption.rst
> +++ b/Documentation/virt/kvm/amd-memory-encryption.rst
> @@ -148,6 +148,9 @@ measurement. Since the guest owner knows the initial contents of the guest at
>  boot, the measurement can be verified by comparing it to what the guest owner
>  expects.
>  
> +If len is zero on entry, the measurement blob length is written to len and
> +uaddr is unused.
> +
>  Parameters (in): struct  kvm_sev_launch_measure
>  
>  Returns: 0 on success, -negative on error
> @@ -271,6 +274,9 @@ report containing the SHA-256 digest of the guest memory and VMSA passed through
>  commands and signed with the PEK. The digest returned by the command should match the digest
>  used by the guest owner with the KVM_SEV_LAUNCH_MEASURE.
>  
> +If len is zero on entry, the measurement blob length is written to len and
> +uaddr is unused.
> +
>  Parameters (in): struct kvm_sev_attestation
>  
>  Returns: 0 on success, -negative on error

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2021-04-20 19:09 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-04-20  9:34 [PATCH] KVM: x86: document behavior of measurement ioctls with len==0 Paolo Bonzini
2021-04-20 19:09 ` Brijesh Singh

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.