|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen staging] docs/cmdline: Move XSM to be in alphabetical order
commit 3fdb28e3bc6589a61850484ad4170aa8ef953fe2
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
AuthorDate: Fri Dec 7 13:43:25 2018 +0000
Commit: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
CommitDate: Mon Dec 10 15:55:01 2018 +0000
docs/cmdline: Move XSM to be in alphabetical order
Adjust the default line to note that the default is now selectable in
Kconfig.
Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
---
docs/misc/xen-command-line.markdown | 32 ++++++++++++++++----------------
1 file changed, 16 insertions(+), 16 deletions(-)
diff --git a/docs/misc/xen-command-line.markdown
b/docs/misc/xen-command-line.markdown
index 8097b7a374..9b7688d0e8 100644
--- a/docs/misc/xen-command-line.markdown
+++ b/docs/misc/xen-command-line.markdown
@@ -870,22 +870,6 @@ hardware domain is architecture dependent.
Note that specifying zero as domU value means zero, while for dom0 it means
to use the default.
-### xsm
-> `= dummy | flask | silo`
-
-> Default: `dummy`
-
-Specify which XSM module should be enabled. This option is only available if
-the hypervisor was compiled with XSM support.
-
-* `dummy`: this is the default choice. Basic restriction for common deployment
- (the dummy module) will be applied. It's also used when XSM is compiled out.
-* `flask`: this is the policy based access control. To choose this, the
- separated option in kconfig must also be enabled.
-* `silo`: this will deny any unmediated communication channels between
- unprivileged VMs. To choose this, the separated option in kconfig must also
- be enabled.
-
### flask
> `= permissive | enforcing | late | disabled`
@@ -2180,3 +2164,19 @@ for dom0 or guest domains only.
> Default: `true`
Permit use of the `xsave/xrstor` instructions.
+
+### xsm
+> `= dummy | flask | silo`
+
+> Default: selectable via Kconfig. Depends on enabled XSM modules.
+
+Specify which XSM module should be enabled. This option is only available if
+the hypervisor was compiled with CONFIG\_XSM enabled.
+
+* `dummy`: this is the default choice. Basic restriction for common deployment
+ (the dummy module) will be applied. It's also used when XSM is compiled out.
+* `flask`: this is the policy based access control. To choose this, the
+ separated option in kconfig must also be enabled.
+* `silo`: this will deny any unmediated communication channels between
+ unprivileged VMs. To choose this, the separated option in kconfig must also
+ be enabled.
--
generated by git-patchbot for /home/xen/git/xen.git#staging
_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/xen-changelog
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |