From: Andrew Cooper Date: Thu, 18 Aug 2016 15:15:39 +0000 (+0100) Subject: xen/Kconfig: Misc tweaks X-Git-Tag: archive/raspbian/4.8.0-1+rpi1~1^2~500 X-Git-Url: https://dgit.raspbian.org/?a=commitdiff_plain;h=d5498f7fd64add3b4810c418f9fa671a81901e36;p=xen.git xen/Kconfig: Misc tweaks * Drop one piece of trailing whitespace * Reposition LATE_HWDOM so it sits properly nested inside XSM in menuconfig Signed-off-by: Andrew Cooper Acked-by: Jan Beulich Reviewed-by: Doug Goldstein --- diff --git a/xen/common/Kconfig b/xen/common/Kconfig index b2d3d61187..43318749a9 100644 --- a/xen/common/Kconfig +++ b/xen/common/Kconfig @@ -54,26 +54,6 @@ config KEXEC If unsure, say Y. -config LATE_HWDOM - bool "dedicated hardware domain" - default n - depends on XSM && X86 - ---help--- - Allows the creation of a dedicated hardware domain distinct from - domain 0 that manages devices without needing access to other - privileged functionality such as the ability to manage domains. - This requires that the actual domain 0 be a stub domain that - constructs the actual hardware domain instead of initializing the - hardware itself. Because the hardware domain needs access to - hypercalls not available to unprivileged guests, an XSM policy - is required to properly define the privilege of these domains. - - This feature does nothing if the "hardware_dom" boot parameter is - not present. If this feature is being used for security, it should - be combined with an IOMMU in strict mode. - - If unsure, say N. - config TMEM def_bool y prompt "Transcendent Memory Support" if EXPERT = "y" @@ -151,6 +131,26 @@ config XSM_POLICY If unsure, say Y. +config LATE_HWDOM + bool "Dedicated hardware domain" + default n + depends on XSM && X86 + ---help--- + Allows the creation of a dedicated hardware domain distinct from + domain 0 that manages devices without needing access to other + privileged functionality such as the ability to manage domains. + This requires that the actual domain 0 be a stub domain that + constructs the actual hardware domain instead of initializing the + hardware itself. Because the hardware domain needs access to + hypercalls not available to unprivileged guests, an XSM policy + is required to properly define the privilege of these domains. + + This feature does nothing if the "hardware_dom" boot parameter is + not present. If this feature is being used for security, it should + be combined with an IOMMU in strict mode. + + If unsure, say N. + menu "Schedulers" visible if EXPERT = "y" @@ -183,7 +183,7 @@ config SCHED_ARINC653 choice prompt "Default Scheduler?" - default SCHED_CREDIT_DEFAULT + default SCHED_CREDIT_DEFAULT config SCHED_CREDIT_DEFAULT bool "Credit Scheduler" if SCHED_CREDIT