[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v6 08/10] x86: Enable Supervisor Mode Access Prevention (SMAP) for Xen



On 07/05/14 12:44, Jan Beulich wrote:
>>>> On 07.05.14 at 12:26, <andrew.cooper3@xxxxxxxxxx> wrote:
>> On 07/05/14 09:19, Feng Wu wrote:
>>> --- a/docs/misc/xen-command-line.markdown
>>> +++ b/docs/misc/xen-command-line.markdown
>>> @@ -912,6 +912,13 @@ Set the serial transmit buffer size.
>>>  
>>>  Flag to enable Supervisor Mode Execution Protection
>>>  
>>> +### smap
>> ### smap (Intel)
>>
>> I know it is inconsistent, but I am trying to get the vendor and arch
>> specific command line arguments identified.
> Actually I disagree - there's nothing inherently Intel here, i.e. nothing
> keeps AMD from adding respective functionality. It would be a different
> think for VMX or VT-d specific functionality that's being controlled via
> command line options.
>
> Jan
>

Fair enough.  I retract my correction.

~Andrew

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.