xref: /linux/drivers/xen/Kconfig (revision be709d48329a500621d2a05835283150ae137b45)
1menu "Xen driver support"
2	depends on XEN
3
4config XEN_BALLOON
5	bool "Xen memory balloon driver"
6	default y
7	help
8	  The balloon driver allows the Xen domain to request more memory from
9	  the system to expand the domain's memory allocation, or alternatively
10	  return unneeded memory to the system.
11
12config XEN_SELFBALLOONING
13	bool "Dynamically self-balloon kernel memory to target"
14	depends on XEN && XEN_BALLOON && CLEANCACHE && SWAP && XEN_TMEM
15	help
16	  Self-ballooning dynamically balloons available kernel memory driven
17	  by the current usage of anonymous memory ("committed AS") and
18	  controlled by various sysfs-settable parameters.  Configuring
19	  FRONTSWAP is highly recommended; if it is not configured, self-
20	  ballooning is disabled by default. If FRONTSWAP is configured,
21	  frontswap-selfshrinking is enabled by default but can be disabled
22	  with the 'tmem.selfshrink=0' kernel boot parameter; and self-ballooning
23	  is enabled by default but can be disabled with the 'tmem.selfballooning=0'
24	  kernel boot parameter.  Note that systems without a sufficiently
25	  large swap device should not enable self-ballooning.
26
27config XEN_BALLOON_MEMORY_HOTPLUG
28	bool "Memory hotplug support for Xen balloon driver"
29	depends on XEN_BALLOON && MEMORY_HOTPLUG
30	help
31	  Memory hotplug support for Xen balloon driver allows expanding memory
32	  available for the system above limit declared at system startup.
33	  It is very useful on critical systems which require long
34	  run without rebooting.
35
36	  Memory could be hotplugged in following steps:
37
38	    1) target domain: ensure that memory auto online policy is in
39	       effect by checking /sys/devices/system/memory/auto_online_blocks
40	       file (should be 'online').
41
42	    2) control domain: xl mem-max <target-domain> <maxmem>
43	       where <maxmem> is >= requested memory size,
44
45	    3) control domain: xl mem-set <target-domain> <memory>
46	       where <memory> is requested memory size; alternatively memory
47	       could be added by writing proper value to
48	       /sys/devices/system/xen_memory/xen_memory0/target or
49	       /sys/devices/system/xen_memory/xen_memory0/target_kb on the
50	       target domain.
51
52	  Alternatively, if memory auto onlining was not requested at step 1
53	  the newly added memory can be manually onlined in the target domain
54	  by doing the following:
55
56		for i in /sys/devices/system/memory/memory*/state; do \
57		  [ "`cat "$i"`" = offline ] && echo online > "$i"; done
58
59	  or by adding the following line to udev rules:
60
61	  SUBSYSTEM=="memory", ACTION=="add", RUN+="/bin/sh -c '[ -f /sys$devpath/state ] && echo online > /sys$devpath/state'"
62
63config XEN_BALLOON_MEMORY_HOTPLUG_LIMIT
64	int "Hotplugged memory limit (in GiB) for a PV guest"
65	default 512 if X86_64
66	default 4 if X86_32
67	range 0 64 if X86_32
68	depends on XEN_HAVE_PVMMU
69	depends on XEN_BALLOON_MEMORY_HOTPLUG
70	help
71	  Maxmium amount of memory (in GiB) that a PV guest can be
72	  expanded to when using memory hotplug.
73
74	  A PV guest can have more memory than this limit if is
75	  started with a larger maximum.
76
77	  This value is used to allocate enough space in internal
78	  tables needed for physical memory administration.
79
80config XEN_SCRUB_PAGES_DEFAULT
81	bool "Scrub pages before returning them to system by default"
82	depends on XEN_BALLOON
83	default y
84	help
85	  Scrub pages before returning them to the system for reuse by
86	  other domains.  This makes sure that any confidential data
87	  is not accidentally visible to other domains.  It is more
88	  secure, but slightly less efficient. This can be controlled with
89	  xen_scrub_pages=0 parameter and
90	  /sys/devices/system/xen_memory/xen_memory0/scrub_pages.
91	  This option only sets the default value.
92
93	  If in doubt, say yes.
94
95config XEN_DEV_EVTCHN
96	tristate "Xen /dev/xen/evtchn device"
97	default y
98	help
99	  The evtchn driver allows a userspace process to trigger event
100	  channels and to receive notification of an event channel
101	  firing.
102	  If in doubt, say yes.
103
104config XEN_BACKEND
105	bool "Backend driver support"
106	default XEN_DOM0
107	help
108	  Support for backend device drivers that provide I/O services
109	  to other virtual machines.
110
111config XENFS
112	tristate "Xen filesystem"
113	select XEN_PRIVCMD
114	default y
115	help
116	  The xen filesystem provides a way for domains to share
117	  information with each other and with the hypervisor.
118	  For example, by reading and writing the "xenbus" file, guests
119	  may pass arbitrary information to the initial domain.
120	  If in doubt, say yes.
121
122config XEN_COMPAT_XENFS
123       bool "Create compatibility mount point /proc/xen"
124       depends on XENFS
125       default y
126       help
127         The old xenstore userspace tools expect to find "xenbus"
128         under /proc/xen, but "xenbus" is now found at the root of the
129         xenfs filesystem.  Selecting this causes the kernel to create
130         the compatibility mount point /proc/xen if it is running on
131         a xen platform.
132         If in doubt, say yes.
133
134config XEN_SYS_HYPERVISOR
135       bool "Create xen entries under /sys/hypervisor"
136       depends on SYSFS
137       select SYS_HYPERVISOR
138       default y
139       help
140         Create entries under /sys/hypervisor describing the Xen
141	 hypervisor environment.  When running native or in another
142	 virtual environment, /sys/hypervisor will still be present,
143	 but will have no xen contents.
144
145config XEN_XENBUS_FRONTEND
146	tristate
147
148config XEN_GNTDEV
149	tristate "userspace grant access device driver"
150	depends on XEN
151	default m
152	select MMU_NOTIFIER
153	help
154	  Allows userspace processes to use grants.
155
156config XEN_GNTDEV_DMABUF
157	bool "Add support for dma-buf grant access device driver extension"
158	depends on XEN_GNTDEV && XEN_GRANT_DMA_ALLOC && DMA_SHARED_BUFFER
159	help
160	  Allows userspace processes and kernel modules to use Xen backed
161	  dma-buf implementation. With this extension grant references to
162	  the pages of an imported dma-buf can be exported for other domain
163	  use and grant references coming from a foreign domain can be
164	  converted into a local dma-buf for local export.
165
166config XEN_GRANT_DEV_ALLOC
167	tristate "User-space grant reference allocator driver"
168	depends on XEN
169	default m
170	help
171	  Allows userspace processes to create pages with access granted
172	  to other domains. This can be used to implement frontend drivers
173	  or as part of an inter-domain shared memory channel.
174
175config XEN_GRANT_DMA_ALLOC
176	bool "Allow allocating DMA capable buffers with grant reference module"
177	depends on XEN && HAS_DMA
178	help
179	  Extends grant table module API to allow allocating DMA capable
180	  buffers and mapping foreign grant references on top of it.
181	  The resulting buffer is similar to one allocated by the balloon
182	  driver in that proper memory reservation is made by
183	  ({increase|decrease}_reservation and VA mappings are updated if
184	  needed).
185	  This is useful for sharing foreign buffers with HW drivers which
186	  cannot work with scattered buffers provided by the balloon driver,
187	  but require DMAable memory instead.
188
189config SWIOTLB_XEN
190	def_bool y
191	select SWIOTLB
192
193config XEN_TMEM
194	tristate
195	depends on !ARM && !ARM64
196	default m if (CLEANCACHE || FRONTSWAP)
197	help
198	  Shim to interface in-kernel Transcendent Memory hooks
199	  (e.g. cleancache and frontswap) to Xen tmem hypercalls.
200
201config XEN_PCIDEV_BACKEND
202	tristate "Xen PCI-device backend driver"
203	depends on PCI && X86 && XEN
204	depends on XEN_BACKEND
205	default m
206	help
207	  The PCI device backend driver allows the kernel to export arbitrary
208	  PCI devices to other guests. If you select this to be a module, you
209	  will need to make sure no other driver has bound to the device(s)
210	  you want to make visible to other guests.
211
212	  The parameter "passthrough" allows you specify how you want the PCI
213	  devices to appear in the guest. You can choose the default (0) where
214	  PCI topology starts at 00.00.0, or (1) for passthrough if you want
215	  the PCI devices topology appear the same as in the host.
216
217	  The "hide" parameter (only applicable if backend driver is compiled
218	  into the kernel) allows you to bind the PCI devices to this module
219	  from the default device drivers. The argument is the list of PCI BDFs:
220	  xen-pciback.hide=(03:00.0)(04:00.0)
221
222	  If in doubt, say m.
223
224config XEN_PVCALLS_FRONTEND
225	tristate "XEN PV Calls frontend driver"
226	depends on INET && XEN
227	select XEN_XENBUS_FRONTEND
228	help
229	  Experimental frontend for the Xen PV Calls protocol
230	  (https://xenbits.xen.org/docs/unstable/misc/pvcalls.html). It
231	  sends a small set of POSIX calls to the backend, which
232	  implements them.
233
234config XEN_PVCALLS_BACKEND
235	bool "XEN PV Calls backend driver"
236	depends on INET && XEN && XEN_BACKEND
237	help
238	  Experimental backend for the Xen PV Calls protocol
239	  (https://xenbits.xen.org/docs/unstable/misc/pvcalls.html). It
240	  allows PV Calls frontends to send POSIX calls to the backend,
241	  which implements them.
242
243	  If in doubt, say n.
244
245config XEN_SCSI_BACKEND
246	tristate "XEN SCSI backend driver"
247	depends on XEN && XEN_BACKEND && TARGET_CORE
248	help
249	  The SCSI backend driver allows the kernel to export its SCSI Devices
250	  to other guests via a high-performance shared-memory interface.
251	  Only needed for systems running as XEN driver domains (e.g. Dom0) and
252	  if guests need generic access to SCSI devices.
253
254config XEN_PRIVCMD
255	tristate
256	depends on XEN
257	default m
258
259config XEN_STUB
260	bool "Xen stub drivers"
261	depends on XEN && X86_64 && BROKEN
262	help
263	  Allow kernel to install stub drivers, to reserve space for Xen drivers,
264	  i.e. memory hotplug and cpu hotplug, and to block native drivers loaded,
265	  so that real Xen drivers can be modular.
266
267	  To enable Xen features like cpu and memory hotplug, select Y here.
268
269config XEN_ACPI_HOTPLUG_MEMORY
270	tristate "Xen ACPI memory hotplug"
271	depends on XEN_DOM0 && XEN_STUB && ACPI
272	help
273	  This is Xen ACPI memory hotplug.
274
275	  Currently Xen only support ACPI memory hot-add. If you want
276	  to hot-add memory at runtime (the hot-added memory cannot be
277	  removed until machine stop), select Y/M here, otherwise select N.
278
279config XEN_ACPI_HOTPLUG_CPU
280	tristate "Xen ACPI cpu hotplug"
281	depends on XEN_DOM0 && XEN_STUB && ACPI
282	select ACPI_CONTAINER
283	help
284	  Xen ACPI cpu enumerating and hotplugging
285
286	  For hotplugging, currently Xen only support ACPI cpu hotadd.
287	  If you want to hotadd cpu at runtime (the hotadded cpu cannot
288	  be removed until machine stop), select Y/M here.
289
290config XEN_ACPI_PROCESSOR
291	tristate "Xen ACPI processor"
292	depends on XEN && XEN_DOM0 && X86 && ACPI_PROCESSOR && CPU_FREQ
293	default m
294	help
295          This ACPI processor uploads Power Management information to the Xen
296	  hypervisor.
297
298	  To do that the driver parses the Power Management data and uploads
299	  said information to the Xen hypervisor. Then the Xen hypervisor can
300	  select the proper Cx and Pxx states. It also registers itself as the
301	  SMM so that other drivers (such as ACPI cpufreq scaling driver) will
302	  not load.
303
304          To compile this driver as a module, choose M here: the module will be
305	  called xen_acpi_processor  If you do not know what to choose, select
306	  M here. If the CPUFREQ drivers are built in, select Y here.
307
308config XEN_MCE_LOG
309	bool "Xen platform mcelog"
310	depends on XEN_DOM0 && X86_64 && X86_MCE
311	help
312	  Allow kernel fetching MCE error from Xen platform and
313	  converting it into Linux mcelog format for mcelog tools
314
315config XEN_HAVE_PVMMU
316       bool
317
318config XEN_EFI
319	def_bool y
320	depends on (ARM || ARM64 || X86_64) && EFI
321
322config XEN_AUTO_XLATE
323	def_bool y
324	depends on ARM || ARM64 || XEN_PVHVM
325	help
326	  Support for auto-translated physmap guests.
327
328config XEN_ACPI
329	def_bool y
330	depends on X86 && ACPI
331
332config XEN_SYMS
333       bool "Xen symbols"
334       depends on X86 && XEN_DOM0 && XENFS
335       default y if KALLSYMS
336       help
337          Exports hypervisor symbols (along with their types and addresses) via
338          /proc/xen/xensyms file, similar to /proc/kallsyms
339
340config XEN_HAVE_VPMU
341       bool
342
343config XEN_FRONT_PGDIR_SHBUF
344	tristate
345
346endmenu
347