[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen master] xen/Kconfig: Misc tweaks
commit d5498f7fd64add3b4810c418f9fa671a81901e36 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> AuthorDate: Thu Aug 18 16:15:39 2016 +0100 Commit: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> CommitDate: Thu Sep 1 10:56:02 2016 +0100 xen/Kconfig: Misc tweaks * Drop one piece of trailing whitespace * Reposition LATE_HWDOM so it sits properly nested inside XSM in menuconfig Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Doug Goldstein <cardoe@xxxxxxxxxx> --- xen/common/Kconfig | 42 +++++++++++++++++++++--------------------- 1 file changed, 21 insertions(+), 21 deletions(-) diff --git a/xen/common/Kconfig b/xen/common/Kconfig index b2d3d61..4331874 100644 --- a/xen/common/Kconfig +++ b/xen/common/Kconfig @@ -54,26 +54,6 @@ config KEXEC If unsure, say Y. -config LATE_HWDOM - bool "dedicated hardware domain" - default n - depends on XSM && X86 - ---help--- - Allows the creation of a dedicated hardware domain distinct from - domain 0 that manages devices without needing access to other - privileged functionality such as the ability to manage domains. - This requires that the actual domain 0 be a stub domain that - constructs the actual hardware domain instead of initializing the - hardware itself. Because the hardware domain needs access to - hypercalls not available to unprivileged guests, an XSM policy - is required to properly define the privilege of these domains. - - This feature does nothing if the "hardware_dom" boot parameter is - not present. If this feature is being used for security, it should - be combined with an IOMMU in strict mode. - - If unsure, say N. - config TMEM def_bool y prompt "Transcendent Memory Support" if EXPERT = "y" @@ -151,6 +131,26 @@ config XSM_POLICY If unsure, say Y. +config LATE_HWDOM + bool "Dedicated hardware domain" + default n + depends on XSM && X86 + ---help--- + Allows the creation of a dedicated hardware domain distinct from + domain 0 that manages devices without needing access to other + privileged functionality such as the ability to manage domains. + This requires that the actual domain 0 be a stub domain that + constructs the actual hardware domain instead of initializing the + hardware itself. Because the hardware domain needs access to + hypercalls not available to unprivileged guests, an XSM policy + is required to properly define the privilege of these domains. + + This feature does nothing if the "hardware_dom" boot parameter is + not present. If this feature is being used for security, it should + be combined with an IOMMU in strict mode. + + If unsure, say N. + menu "Schedulers" visible if EXPERT = "y" @@ -183,7 +183,7 @@ config SCHED_ARINC653 choice prompt "Default Scheduler?" - default SCHED_CREDIT_DEFAULT + default SCHED_CREDIT_DEFAULT config SCHED_CREDIT_DEFAULT bool "Credit Scheduler" if SCHED_CREDIT -- generated by git-patchbot for /home/xen/git/xen.git#master _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxx https://lists.xenproject.org/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |