mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2024-12-22 05:35:25 +00:00
docs: formatdomain: Remove 'launchSecurity' anchor
Signed-off-by: Peter Krempa <pkrempa@redhat.com> Reviewed-by: Ján Tomko <jtomko@redhat.com>
This commit is contained in:
parent
e8cdf37ebf
commit
a781f7980c
@ -8177,7 +8177,6 @@ At least one ``cipher`` element must be nested within the ``keywrap`` element.
|
||||
|
||||
Note: DEA/TDEA is synonymous with DES/TDES.
|
||||
|
||||
:anchor:`<a id="launchSecurity"/>`
|
||||
|
||||
Launch Security
|
||||
---------------
|
||||
|
@ -568,7 +568,7 @@ s390-pv capability
|
||||
|
||||
Reports whether the hypervisor supports the Protected Virtualization. In order
|
||||
to use Protected Virtualization with libvirt have a look at the `launchSecurity
|
||||
element in the domain XML <formatdomain.html#launchSecurity>`__. For more
|
||||
element in the domain XML <formatdomain.html#launch-security>`__. For more
|
||||
details on the Protected Virtualization feature please see `Protected
|
||||
Virtualization on s390 <kbase/s390_protected_virt.html>`__.
|
||||
|
||||
@ -583,7 +583,7 @@ transparently encrypted with a key unique to that VM.
|
||||
|
||||
For more details on the SEV feature, please follow resources in the AMD
|
||||
developer's document store. In order to use SEV with libvirt have a look at `SEV
|
||||
in domain XML <formatdomain.html#launchSecurity>`__
|
||||
in domain XML <formatdomain.html#launch-security>`__
|
||||
|
||||
``cbitpos``
|
||||
When memory encryption is enabled, one of the physical address bits (aka the
|
||||
|
@ -154,7 +154,7 @@ VM Configuration
|
||||
================
|
||||
|
||||
SEV is enabled in the XML by specifying the
|
||||
`<launchSecurity> <https://libvirt.org/formatdomain.html#launchSecurity>`__
|
||||
`<launchSecurity> <https://libvirt.org/formatdomain.html#launch-security>`__
|
||||
element. However, specifying ``launchSecurity`` isn't enough to boot an
|
||||
SEV VM. Further configuration requirements are discussed below.
|
||||
|
||||
|
@ -128,7 +128,7 @@ As the virtio data structures of secure guests are not accessible
|
||||
by the host, it is necessary to use shared memory ('bounce buffers').
|
||||
|
||||
Since libvirt 7.6.0 the
|
||||
`<launchSecurity> <https://libvirt.org/formatdomain.html#launchSecurity>`__
|
||||
`<launchSecurity> <https://libvirt.org/formatdomain.html#launch-security>`__
|
||||
element with type ``s390-pv`` should be used on protected virtualization guests.
|
||||
Without ``launchSecurity`` you must enable all virtio devices to use shared
|
||||
buffers by configuring them with platform_iommu enabled.
|
||||
|
Loading…
Reference in New Issue
Block a user