From patchwork Fri Mar 18 16:46:03 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Douglas Goldstein X-Patchwork-Id: 8621921 Return-Path: X-Original-To: patchwork-xen-devel@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork2.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.136]) by patchwork2.web.kernel.org (Postfix) with ESMTP id 71BEAC0553 for ; Fri, 18 Mar 2016 16:49:16 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id 82B0F20377 for ; Fri, 18 Mar 2016 16:49:15 +0000 (UTC) Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id A1A2620373 for ; Fri, 18 Mar 2016 16:49:14 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1agxXY-00044M-HS; Fri, 18 Mar 2016 16:46:20 +0000 Received: from mail6.bemta14.messagelabs.com ([193.109.254.103]) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1agxXX-00044G-0M for xen-devel@lists.xen.org; Fri, 18 Mar 2016 16:46:19 +0000 Received: from [193.109.254.147] by server-13.bemta-14.messagelabs.com id 2F/16-02874-AD03CE65; Fri, 18 Mar 2016 16:46:18 +0000 X-Env-Sender: cardoe@cardoe.com X-Msg-Ref: server-3.tower-27.messagelabs.com!1458319576!32027171!1 X-Originating-IP: [209.85.161.193] X-SpamReason: No, hits=0.5 required=7.0 tests=BODY_RANDOM_LONG X-StarScan-Received: X-StarScan-Version: 8.11; banners=-,-,- X-VirusChecked: Checked Received: (qmail 26598 invoked from network); 18 Mar 2016 16:46:17 -0000 Received: from mail-yw0-f193.google.com (HELO mail-yw0-f193.google.com) (209.85.161.193) by server-3.tower-27.messagelabs.com with AES128-GCM-SHA256 encrypted SMTP; 18 Mar 2016 16:46:17 -0000 Received: by mail-yw0-f193.google.com with SMTP id p65so10542340ywb.3 for ; Fri, 18 Mar 2016 09:46:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cardoe.com; s=google; h=from:to:cc:subject:date:message-id; bh=RNrKwK2iWv23IefXra/SQfMcqNs0CWbsx8kQtH5AMs4=; b=Dri867oIw9SoVB8y8A29PkRly3Ou92Y4IBuItNAYYUD/FATiRcswOie2CikN5LkSVP BlqIDXqC6my9t9jOtON0yiTt4lv92W9WvSPzQFv3cUutiwX1YFkLBcm62m7tQ7DEEFn5 aUtcJA5SGwPpf2P7Wy3ozw6AQACZ0mWelZO98= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=RNrKwK2iWv23IefXra/SQfMcqNs0CWbsx8kQtH5AMs4=; b=jNSjZtMbcqmTvVST5e8Z6tpkd9NXQirxoTpyQy0Kppp0pqxIZTgX0UuN6FliEf7Wp5 ixz5Y6jSMaUkC3zDrFZtcWJEuTjiiOVReRDOVvVb4BsQdF5Pn9cM0DOm/btRYmTwxqUo iC2BU4DHUGVt5i8Do8OIfCjxxe2pIbDFPYoe1th44xqbFbHp0NxJvM2ymar+gB5CPOh7 jGDHgVAvj5iDNrIc1rgmPlC8Kc8xTWfaeRXFkyN2CUPKdYH5Rat+4umUFpDqAMl+IPPx 9mkNDp2yaP+0CVy1Zj2emakHAtsJMvYNBdCpWxU9XBFTfYnJmg1eC/sP0iCO6QnvLT3x Qb4Q== X-Gm-Message-State: AD7BkJLbEZldbIjBkPBiADsOSpmW7Q6IlRzq+xuYIfgycixn0kfv/AcyA66dJQwy/oIAUw== X-Received: by 10.13.207.129 with SMTP id r123mr2166259ywd.274.1458319576287; Fri, 18 Mar 2016 09:46:16 -0700 (PDT) Received: from swanson.lan (c-68-46-196-185.hsd1.al.comcast.net. [68.46.196.185]) by smtp.gmail.com with ESMTPSA id u70sm8820793ywu.45.2016.03.18.09.46.14 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Fri, 18 Mar 2016 09:46:15 -0700 (PDT) From: Doug Goldstein To: xen-devel@lists.xen.org Date: Fri, 18 Mar 2016 11:46:03 -0500 Message-Id: <1458319563-25983-1-git-send-email-cardoe@cardoe.com> X-Mailer: git-send-email 2.7.3 Cc: Keir Fraser , Doug Goldstein , Ian Jackson , Tim Deegan , Jan Beulich , Daniel De Graaf Subject: [Xen-devel] [PATCH v2] docs: update FLASK cmd line instructions X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" X-Spam-Status: No, score=-2.7 required=5.0 tests=BAYES_00,DKIM_SIGNED, RCVD_IN_BL_SPAMCOP_NET, RCVD_IN_DNSWL_MED, T_DKIM_INVALID, UNPARSEABLE_RELAY autolearn=unavailable version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP The command line instructions for FLASK include a note on how to compile Xen with FLASK but the note was out of date after the change to Kconfig. Signed-off-by: Doug Goldstein Reviewed-by: Konrad Rzeszutek Wilk Acked-by: Daniel De Graaf --- CC: Ian Jackson CC: Jan Beulich CC: Keir Fraser CC: Tim Deegan CC: Konrad Rzeszutek Wilk CC: Daniel De Graaf change since v1: - add menuconfig and config entries as suggested by Konrad - caught another place mentioning XSM_ENABLE --- docs/misc/xen-command-line.markdown | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/docs/misc/xen-command-line.markdown b/docs/misc/xen-command-line.markdown index ca77e3b..e4e4437 100644 --- a/docs/misc/xen-command-line.markdown +++ b/docs/misc/xen-command-line.markdown @@ -665,8 +665,10 @@ to use the default. > Default: `permissive` Specify how the FLASK security server should be configured. This option is only -available if the hypervisor was compiled with XSM support (which can be enabled -by setting XSM\_ENABLE = y in .config). +available if the hypervisor was compiled with FLASK support. This can be +enabled by running either: +- make -C xen config and enabling XSM and FLASK. +- make -C xen menuconfig and enabling 'FLux Advanced Security Kernel support' and 'Xen Security Modules support' * `permissive`: This is intended for development and is not suitable for use with untrusted guests. If a policy is provided by the bootloader, it will be @@ -805,7 +807,7 @@ Paging (HAP). Enable late hardware domain creation using the specified domain ID. This is intended to be used when domain 0 is a stub domain which builds a disaggregated system including a hardware domain with the specified domain ID. This option is -supported only when compiled with XSM\_ENABLE=y on x86. +supported only when compiled with XSM on x86. ### hest\_disable > ` = `