[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen master] docs/cmdline: Move XSM to be in alphabetical order
commit 3fdb28e3bc6589a61850484ad4170aa8ef953fe2 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> AuthorDate: Fri Dec 7 13:43:25 2018 +0000 Commit: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> CommitDate: Mon Dec 10 15:55:01 2018 +0000 docs/cmdline: Move XSM to be in alphabetical order Adjust the default line to note that the default is now selectable in Kconfig. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> --- docs/misc/xen-command-line.markdown | 32 ++++++++++++++++---------------- 1 file changed, 16 insertions(+), 16 deletions(-) diff --git a/docs/misc/xen-command-line.markdown b/docs/misc/xen-command-line.markdown index 8097b7a374..9b7688d0e8 100644 --- a/docs/misc/xen-command-line.markdown +++ b/docs/misc/xen-command-line.markdown @@ -870,22 +870,6 @@ hardware domain is architecture dependent. Note that specifying zero as domU value means zero, while for dom0 it means to use the default. -### xsm -> `= dummy | flask | silo` - -> Default: `dummy` - -Specify which XSM module should be enabled. This option is only available if -the hypervisor was compiled with XSM support. - -* `dummy`: this is the default choice. Basic restriction for common deployment - (the dummy module) will be applied. It's also used when XSM is compiled out. -* `flask`: this is the policy based access control. To choose this, the - separated option in kconfig must also be enabled. -* `silo`: this will deny any unmediated communication channels between - unprivileged VMs. To choose this, the separated option in kconfig must also - be enabled. - ### flask > `= permissive | enforcing | late | disabled` @@ -2180,3 +2164,19 @@ for dom0 or guest domains only. > Default: `true` Permit use of the `xsave/xrstor` instructions. + +### xsm +> `= dummy | flask | silo` + +> Default: selectable via Kconfig. Depends on enabled XSM modules. + +Specify which XSM module should be enabled. This option is only available if +the hypervisor was compiled with CONFIG\_XSM enabled. + +* `dummy`: this is the default choice. Basic restriction for common deployment + (the dummy module) will be applied. It's also used when XSM is compiled out. +* `flask`: this is the policy based access control. To choose this, the + separated option in kconfig must also be enabled. +* `silo`: this will deny any unmediated communication channels between + unprivileged VMs. To choose this, the separated option in kconfig must also + be enabled. -- generated by git-patchbot for /home/xen/git/xen.git#master _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |