|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen master] xen/Kconfig: Misc tweaks
commit d5498f7fd64add3b4810c418f9fa671a81901e36
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
AuthorDate: Thu Aug 18 16:15:39 2016 +0100
Commit: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
CommitDate: Thu Sep 1 10:56:02 2016 +0100
xen/Kconfig: Misc tweaks
* Drop one piece of trailing whitespace
* Reposition LATE_HWDOM so it sits properly nested inside XSM in menuconfig
Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
Reviewed-by: Doug Goldstein <cardoe@xxxxxxxxxx>
---
xen/common/Kconfig | 42 +++++++++++++++++++++---------------------
1 file changed, 21 insertions(+), 21 deletions(-)
diff --git a/xen/common/Kconfig b/xen/common/Kconfig
index b2d3d61..4331874 100644
--- a/xen/common/Kconfig
+++ b/xen/common/Kconfig
@@ -54,26 +54,6 @@ config KEXEC
If unsure, say Y.
-config LATE_HWDOM
- bool "dedicated hardware domain"
- default n
- depends on XSM && X86
- ---help---
- Allows the creation of a dedicated hardware domain distinct from
- domain 0 that manages devices without needing access to other
- privileged functionality such as the ability to manage domains.
- This requires that the actual domain 0 be a stub domain that
- constructs the actual hardware domain instead of initializing the
- hardware itself. Because the hardware domain needs access to
- hypercalls not available to unprivileged guests, an XSM policy
- is required to properly define the privilege of these domains.
-
- This feature does nothing if the "hardware_dom" boot parameter is
- not present. If this feature is being used for security, it should
- be combined with an IOMMU in strict mode.
-
- If unsure, say N.
-
config TMEM
def_bool y
prompt "Transcendent Memory Support" if EXPERT = "y"
@@ -151,6 +131,26 @@ config XSM_POLICY
If unsure, say Y.
+config LATE_HWDOM
+ bool "Dedicated hardware domain"
+ default n
+ depends on XSM && X86
+ ---help---
+ Allows the creation of a dedicated hardware domain distinct from
+ domain 0 that manages devices without needing access to other
+ privileged functionality such as the ability to manage domains.
+ This requires that the actual domain 0 be a stub domain that
+ constructs the actual hardware domain instead of initializing the
+ hardware itself. Because the hardware domain needs access to
+ hypercalls not available to unprivileged guests, an XSM policy
+ is required to properly define the privilege of these domains.
+
+ This feature does nothing if the "hardware_dom" boot parameter is
+ not present. If this feature is being used for security, it should
+ be combined with an IOMMU in strict mode.
+
+ If unsure, say N.
+
menu "Schedulers"
visible if EXPERT = "y"
@@ -183,7 +183,7 @@ config SCHED_ARINC653
choice
prompt "Default Scheduler?"
- default SCHED_CREDIT_DEFAULT
+ default SCHED_CREDIT_DEFAULT
config SCHED_CREDIT_DEFAULT
bool "Credit Scheduler" if SCHED_CREDIT
--
generated by git-patchbot for /home/xen/git/xen.git#master
_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxx
https://lists.xenproject.org/xen-changelog
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |