From patchwork Wed Aug 30 18:32:55 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Sergej Proskurin X-Patchwork-Id: 9930595 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id BB0C9603B4 for ; Wed, 30 Aug 2017 18:35:53 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id B2D65285C8 for ; Wed, 30 Aug 2017 18:35:53 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id A7C8D28717; Wed, 30 Aug 2017 18:35:53 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.2 required=2.0 tests=BAYES_00, RCVD_IN_DNSWL_MED autolearn=ham version=3.3.1 Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 3027928700 for ; Wed, 30 Aug 2017 18:35:53 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1dn7ny-0001yk-Mr; Wed, 30 Aug 2017 18:33:34 +0000 Received: from mail6.bemta5.messagelabs.com ([195.245.231.135]) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1dn7nv-0001j4-3P for xen-devel@lists.xenproject.org; Wed, 30 Aug 2017 18:33:31 +0000 Received: from [85.158.139.211] by server-3.bemta-5.messagelabs.com id D6/FD-02044-AF407A95; Wed, 30 Aug 2017 18:33:30 +0000 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrMLMWRWlGSWpSXmKPExsXSPJ+BQ/cny/J Ig4PPjS2+b5nM5MDocfjDFZYAxijWzLyk/IoE1oxZv9ULZvJXHG6czdzA+JGni5GLQ0hgI6PE 0gnH2CGcTYwSbdumAjmcHGwCBhJTXq9kBbFFBJQk7q2azARSxCywnFFi+4RXjCAJYQFniflrL rCB2CwCqhItG4+AxXkFbCUeLzsDNkhCQF7i3IPbzCA2J1D8zIEZYEOFBGwk7s09zzyBkXsBI8 MqRo3i1KKy1CJdQ0O9pKLM9IyS3MTMHF1DA1O93NTi4sT01JzEpGK95PzcTYxADzMAwQ7Gle3 OhxglOZiURHlXMC+PFOJLyk+pzEgszogvKs1JLT7EKMPBoSTBOwskJ1iUmp5akZaZAww1mLQE B4+SCG83SJq3uCAxtzgzHSJ1ilGXY8Pq9V+YhFjy8vNSpcR5F4MUCYAUZZTmwY2Ahf0lRlkpY V5GoKOEeApSi3IzS1DlXzGKczAqCfMGgkzhycwrgdv0CugIJqAjYr2WghxRkoiQkmpgtOAMf8 Bkr9jq900h86XkhxXqT9YcyL0omThZa+vp8y5nM959kl/oHum+uiDq2J2N5ZEsnVnbitf08vG 7zYsTUfMUW3hTfoc8S7VAU1nZHLV7bsyff3C9VvCrun3RrvF7EHNH47aESaE+/2/8/ZprmjxR xEScYb66zZJZVxrE7O84XbxYlWutxFKckWioxVxUnAgAg2icjnYCAAA= X-Env-Sender: proskurin@sec.in.tum.de X-Msg-Ref: server-11.tower-206.messagelabs.com!1504118009!88489698!1 X-Originating-IP: [131.159.0.8] X-SpamReason: No, hits=0.0 required=7.0 tests= X-StarScan-Received: X-StarScan-Version: 9.4.45; banners=-,-,- X-VirusChecked: Checked Received: (qmail 15884 invoked from network); 30 Aug 2017 18:33:29 -0000 Received: from mail-out1.informatik.tu-muenchen.de (HELO mail-out1.informatik.tu-muenchen.de) (131.159.0.8) by server-11.tower-206.messagelabs.com with DHE-RSA-AES256-GCM-SHA384 encrypted SMTP; 30 Aug 2017 18:33:29 -0000 Received: from files.sec.in.tum.de (files.sec.in.tum.de [131.159.50.1]) by services.sec.in.tum.de (Postfix) with ESMTP id A604A10CB7DF7; Wed, 30 Aug 2017 20:33:09 +0200 (CEST) Received: from thanatos.sec.in.tum.de (thanatos.sec.in.tum.de [131.159.50.57]) by files.sec.in.tum.de (Postfix) with ESMTP id 989DB491F5; Wed, 30 Aug 2017 20:33:09 +0200 (CEST) From: Sergej Proskurin To: xen-devel@lists.xenproject.org Date: Wed, 30 Aug 2017 20:32:55 +0200 Message-Id: <20170830183258.14612-37-proskurin@sec.in.tum.de> X-Mailer: git-send-email 2.14.1 In-Reply-To: <20170830183258.14612-1-proskurin@sec.in.tum.de> References: <20170830183258.14612-1-proskurin@sec.in.tum.de> Cc: Tamas K Lengyel , Ian Jackson , Wei Liu , Sergej Proskurin Subject: [Xen-devel] [PATCH v4 36/39] altp2m: Document external-only use on ARM X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" X-Virus-Scanned: ClamAV using ClamSMTP From: Tamas K Lengyel Currently, the altp2m feature has been used and thus documented for the x86 architecture. As we aim to introduce altp2m to ARM, in this commit, we adjust the documentation by pointing out x86 only parts and thus make clear that the modes XEN_ALTP2M_external and XEN_ALTP2M_disabled are also valid for the ARM architecture. Signed-off-by: Sergej Proskurin Signed-off-by: Tamas K Lengyel Acked-by: Wei Liu --- Cc: Ian Jackson Cc: Wei Liu --- v4: We added this patch to our patch series. --- docs/man/xl.cfg.pod.5.in | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/docs/man/xl.cfg.pod.5.in b/docs/man/xl.cfg.pod.5.in index 79cb2eaea7..259cf18ea6 100644 --- a/docs/man/xl.cfg.pod.5.in +++ b/docs/man/xl.cfg.pod.5.in @@ -1380,7 +1380,7 @@ guest Operating Systems. =item B -B<(x86 only)> Specifies the access mode to the alternate-p2m capability. +Specifies the access mode to the alternate-p2m capability. Alternate-p2m allows a guest to manage multiple p2m guest physical "memory views" (as opposed to a single p2m). You may want this option if you want to access-control/isolate @@ -1398,8 +1398,8 @@ Altp2m is disabled for the domain (default). =item B -The mixed mode allows access to the altp2m interface for both in-guest -and external tools as well. +B<(x86 only)> The mixed mode allows access to the altp2m interface for both +in-guest and external tools as well. =item B @@ -1407,7 +1407,7 @@ Enables access to the alternate-p2m capability by external privileged tools. =item B -Enables limited access to the alternate-p2m capability, +B<(x86 only)> Enables limited access to the alternate-p2m capability, ie. giving the guest access only to enable/disable the VMFUNC and #VE features. =back