From: Andrew Cooper Date: Fri, 7 Dec 2018 13:43:25 +0000 (+0000) Subject: docs/cmdline: Move XSM to be in alphabetical order X-Git-Tag: archive/raspbian/4.14.0+80-gd101b417b7-1+rpi1^2~63^2~2775 X-Git-Url: https://dgit.raspbian.org/?a=commitdiff_plain;h=3fdb28e3bc6589a61850484ad4170aa8ef953fe2;p=xen.git docs/cmdline: Move XSM to be in alphabetical order Adjust the default line to note that the default is now selectable in Kconfig. Signed-off-by: Andrew Cooper Acked-by: Jan Beulich --- diff --git a/docs/misc/xen-command-line.markdown b/docs/misc/xen-command-line.markdown index 8097b7a374..9b7688d0e8 100644 --- a/docs/misc/xen-command-line.markdown +++ b/docs/misc/xen-command-line.markdown @@ -870,22 +870,6 @@ hardware domain is architecture dependent. Note that specifying zero as domU value means zero, while for dom0 it means to use the default. -### xsm -> `= dummy | flask | silo` - -> Default: `dummy` - -Specify which XSM module should be enabled. This option is only available if -the hypervisor was compiled with XSM support. - -* `dummy`: this is the default choice. Basic restriction for common deployment - (the dummy module) will be applied. It's also used when XSM is compiled out. -* `flask`: this is the policy based access control. To choose this, the - separated option in kconfig must also be enabled. -* `silo`: this will deny any unmediated communication channels between - unprivileged VMs. To choose this, the separated option in kconfig must also - be enabled. - ### flask > `= permissive | enforcing | late | disabled` @@ -2180,3 +2164,19 @@ for dom0 or guest domains only. > Default: `true` Permit use of the `xsave/xrstor` instructions. + +### xsm +> `= dummy | flask | silo` + +> Default: selectable via Kconfig. Depends on enabled XSM modules. + +Specify which XSM module should be enabled. This option is only available if +the hypervisor was compiled with CONFIG\_XSM enabled. + +* `dummy`: this is the default choice. Basic restriction for common deployment + (the dummy module) will be applied. It's also used when XSM is compiled out. +* `flask`: this is the policy based access control. To choose this, the + separated option in kconfig must also be enabled. +* `silo`: this will deny any unmediated communication channels between + unprivileged VMs. To choose this, the separated option in kconfig must also + be enabled.