[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [xtf test] 100874: all pass - PUSHED
Konrad Rzeszutek Wilk writes ("Re: [Xen-devel] [xtf test] 100874: all pass - PUSHED"): > On Mon, Sep 19, 2016 at 02:51:03PM +0100, Wei Liu wrote: > > ... depends on the security support status of that particular > > feature. > > To enable it you had to provide the 'allowsuperpage' parameter so by default > nobody would use it. Which means no security support (like the #UD traping > for cross-vendor migration). > > I somehow assumed that any non-default enabled parameters by default > would not receive any security support. > > Like running an 'debug=y' kernel or such? I can't find any documentation saying that security support is limited to the default configuration. The allowsuperpage command line option is documented in docs/misc/xen-command-line.markdown and has no health warning. Ian. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |