From mboxrd@z Thu Jan 1 00:00:00 1970 From: Andrew Cooper Subject: Re: [PATCH v6 08/10] x86: Enable Supervisor Mode Access Prevention (SMAP) for Xen Date: Wed, 7 May 2014 12:47:28 +0100 Message-ID: <536A1D50.1020204@citrix.com> References: <1399450782-14735-1-git-send-email-feng.wu@intel.com> <1399450782-14735-9-git-send-email-feng.wu@intel.com> <536A0A43.2090001@citrix.com> <536A38D7020000780000FE48@mail.emea.novell.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <536A38D7020000780000FE48@mail.emea.novell.com> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: Jan Beulich Cc: kevin.tian@intel.com, Feng Wu , ian.campbell@citrix.com, eddie.dong@intel.com, xen-devel@lists.xen.org, jun.nakajima@intel.com List-Id: xen-devel@lists.xenproject.org On 07/05/14 12:44, Jan Beulich wrote: >>>> On 07.05.14 at 12:26, wrote: >> On 07/05/14 09:19, Feng Wu wrote: >>> --- a/docs/misc/xen-command-line.markdown >>> +++ b/docs/misc/xen-command-line.markdown >>> @@ -912,6 +912,13 @@ Set the serial transmit buffer size. >>> >>> Flag to enable Supervisor Mode Execution Protection >>> >>> +### smap >> ### smap (Intel) >> >> I know it is inconsistent, but I am trying to get the vendor and arch >> specific command line arguments identified. > Actually I disagree - there's nothing inherently Intel here, i.e. nothing > keeps AMD from adding respective functionality. It would be a different > think for VMX or VT-d specific functionality that's being controlled via > command line options. > > Jan > Fair enough. I retract my correction. ~Andrew