[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v6 08/10] x86: Enable Supervisor Mode Access Prevention (SMAP) for Xen
On 07/05/14 12:44, Jan Beulich wrote: >>>> On 07.05.14 at 12:26, <andrew.cooper3@xxxxxxxxxx> wrote: >> On 07/05/14 09:19, Feng Wu wrote: >>> --- a/docs/misc/xen-command-line.markdown >>> +++ b/docs/misc/xen-command-line.markdown >>> @@ -912,6 +912,13 @@ Set the serial transmit buffer size. >>> >>> Flag to enable Supervisor Mode Execution Protection >>> >>> +### smap >> ### smap (Intel) >> >> I know it is inconsistent, but I am trying to get the vendor and arch >> specific command line arguments identified. > Actually I disagree - there's nothing inherently Intel here, i.e. nothing > keeps AMD from adding respective functionality. It would be a different > think for VMX or VT-d specific functionality that's being controlled via > command line options. > > Jan > Fair enough. I retract my correction. ~Andrew _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |