Merge tag 'linux-watchdog-4.20-rc1' of git://www.linux-watchdog.org/linux-watchdog
[linux-block.git] / drivers / xen / Kconfig
CommitLineData
27fb7f00
RD
1menu "Xen driver support"
2 depends on XEN
3
1775826c
JF
4config XEN_BALLOON
5 bool "Xen memory balloon driver"
1775826c
JF
6 default y
7 help
8 The balloon driver allows the Xen domain to request more memory from
9 the system to expand the domain's memory allocation, or alternatively
10 return unneeded memory to the system.
11
a50777c7
DM
12config XEN_SELFBALLOONING
13 bool "Dynamically self-balloon kernel memory to target"
65d4b248 14 depends on XEN && XEN_BALLOON && CLEANCACHE && SWAP && XEN_TMEM
a50777c7
DM
15 default n
16 help
17 Self-ballooning dynamically balloons available kernel memory driven
18 by the current usage of anonymous memory ("committed AS") and
19 controlled by various sysfs-settable parameters. Configuring
20 FRONTSWAP is highly recommended; if it is not configured, self-
ed4f346a 21 ballooning is disabled by default. If FRONTSWAP is configured,
a50777c7 22 frontswap-selfshrinking is enabled by default but can be disabled
54598d1b 23 with the 'tmem.selfshrink=0' kernel boot parameter; and self-ballooning
ed4f346a 24 is enabled by default but can be disabled with the 'tmem.selfballooning=0'
a50777c7
DM
25 kernel boot parameter. Note that systems without a sufficiently
26 large swap device should not enable self-ballooning.
1775826c 27
080e2be7
DK
28config XEN_BALLOON_MEMORY_HOTPLUG
29 bool "Memory hotplug support for Xen balloon driver"
30 default n
31 depends on XEN_BALLOON && MEMORY_HOTPLUG
32 help
33 Memory hotplug support for Xen balloon driver allows expanding memory
34 available for the system above limit declared at system startup.
35 It is very useful on critical systems which require long
36 run without rebooting.
37
38 Memory could be hotplugged in following steps:
39
703fc13a
VK
40 1) target domain: ensure that memory auto online policy is in
41 effect by checking /sys/devices/system/memory/auto_online_blocks
42 file (should be 'online').
43
44 2) control domain: xl mem-max <target-domain> <maxmem>
080e2be7
DK
45 where <maxmem> is >= requested memory size,
46
703fc13a 47 3) control domain: xl mem-set <target-domain> <memory>
080e2be7
DK
48 where <memory> is requested memory size; alternatively memory
49 could be added by writing proper value to
50 /sys/devices/system/xen_memory/xen_memory0/target or
703fc13a
VK
51 /sys/devices/system/xen_memory/xen_memory0/target_kb on the
52 target domain.
080e2be7 53
703fc13a
VK
54 Alternatively, if memory auto onlining was not requested at step 1
55 the newly added memory can be manually onlined in the target domain
56 by doing the following:
080e2be7 57
703fc13a
VK
58 for i in /sys/devices/system/memory/memory*/state; do \
59 [ "`cat "$i"`" = offline ] && echo online > "$i"; done
080e2be7 60
703fc13a 61 or by adding the following line to udev rules:
080e2be7 62
703fc13a 63 SUBSYSTEM=="memory", ACTION=="add", RUN+="/bin/sh -c '[ -f /sys$devpath/state ] && echo online > /sys$devpath/state'"
080e2be7 64
633d6f17
JG
65config XEN_BALLOON_MEMORY_HOTPLUG_LIMIT
66 int "Hotplugged memory limit (in GiB) for a PV guest"
67 default 512 if X86_64
68 default 4 if X86_32
69 range 0 64 if X86_32
70 depends on XEN_HAVE_PVMMU
71 depends on XEN_BALLOON_MEMORY_HOTPLUG
72 help
73 Maxmium amount of memory (in GiB) that a PV guest can be
74 expanded to when using memory hotplug.
75
76 A PV guest can have more memory than this limit if is
77 started with a larger maximum.
78
79 This value is used to allocate enough space in internal
80 tables needed for physical memory administration.
81
197ecb38
MMG
82config XEN_SCRUB_PAGES_DEFAULT
83 bool "Scrub pages before returning them to system by default"
1775826c
JF
84 depends on XEN_BALLOON
85 default y
86 help
87 Scrub pages before returning them to the system for reuse by
88 other domains. This makes sure that any confidential data
89 is not accidentally visible to other domains. Is it more
197ecb38
MMG
90 secure, but slightly less efficient. This can be controlled with
91 xen_scrub_pages=0 parameter and
92 /sys/devices/system/xen_memory/xen_memory0/scrub_pages.
93 This option only sets the default value.
94
1775826c 95 If in doubt, say yes.
1107ba88 96
f7116284
IC
97config XEN_DEV_EVTCHN
98 tristate "Xen /dev/xen/evtchn device"
f7116284
IC
99 default y
100 help
6b2aac42 101 The evtchn driver allows a userspace process to trigger event
f7116284
IC
102 channels and to receive notification of an event channel
103 firing.
104 If in doubt, say yes.
105
df660251 106config XEN_BACKEND
329620a8 107 bool "Backend driver support"
df660251
IC
108 depends on XEN_DOM0
109 default y
110 help
111 Support for backend device drivers that provide I/O services
112 to other virtual machines.
113
1107ba88
AZ
114config XENFS
115 tristate "Xen filesystem"
d8414d3c 116 select XEN_PRIVCMD
1107ba88
AZ
117 default y
118 help
119 The xen filesystem provides a way for domains to share
120 information with each other and with the hypervisor.
121 For example, by reading and writing the "xenbus" file, guests
122 may pass arbitrary information to the initial domain.
123 If in doubt, say yes.
124
125config XEN_COMPAT_XENFS
126 bool "Create compatibility mount point /proc/xen"
127 depends on XENFS
128 default y
129 help
130 The old xenstore userspace tools expect to find "xenbus"
131 under /proc/xen, but "xenbus" is now found at the root of the
132 xenfs filesystem. Selecting this causes the kernel to create
692105b8 133 the compatibility mount point /proc/xen if it is running on
1107ba88
AZ
134 a xen platform.
135 If in doubt, say yes.
136
cff7e81b
JF
137config XEN_SYS_HYPERVISOR
138 bool "Create xen entries under /sys/hypervisor"
27fb7f00 139 depends on SYSFS
cff7e81b
JF
140 select SYS_HYPERVISOR
141 default y
142 help
143 Create entries under /sys/hypervisor describing the Xen
144 hypervisor environment. When running native or in another
145 virtual environment, /sys/hypervisor will still be present,
27fb7f00
RD
146 but will have no xen contents.
147
2de06cc1 148config XEN_XENBUS_FRONTEND
9c4bc1c2
LT
149 tristate
150
ab31523c
GH
151config XEN_GNTDEV
152 tristate "userspace grant access device driver"
153 depends on XEN
1f169f66 154 default m
ab31523c
GH
155 select MMU_NOTIFIER
156 help
157 Allows userspace processes to use grants.
6bac7f9f 158
932d6562
OA
159config XEN_GNTDEV_DMABUF
160 bool "Add support for dma-buf grant access device driver extension"
161 depends on XEN_GNTDEV && XEN_GRANT_DMA_ALLOC && DMA_SHARED_BUFFER
162 help
163 Allows userspace processes and kernel modules to use Xen backed
164 dma-buf implementation. With this extension grant references to
165 the pages of an imported dma-buf can be exported for other domain
166 use and grant references coming from a foreign domain can be
167 converted into a local dma-buf for local export.
168
dd314058
DDG
169config XEN_GRANT_DEV_ALLOC
170 tristate "User-space grant reference allocator driver"
171 depends on XEN
1f169f66 172 default m
dd314058
DDG
173 help
174 Allows userspace processes to create pages with access granted
175 to other domains. This can be used to implement frontend drivers
176 or as part of an inter-domain shared memory channel.
177
9bdc7304
OA
178config XEN_GRANT_DMA_ALLOC
179 bool "Allow allocating DMA capable buffers with grant reference module"
180 depends on XEN && HAS_DMA
181 help
182 Extends grant table module API to allow allocating DMA capable
183 buffers and mapping foreign grant references on top of it.
184 The resulting buffer is similar to one allocated by the balloon
185 driver in that proper memory reservation is made by
186 ({increase|decrease}_reservation and VA mappings are updated if
187 needed).
188 This is useful for sharing foreign buffers with HW drivers which
189 cannot work with scattered buffers provided by the balloon driver,
190 but require DMAable memory instead.
191
b097186f
KRW
192config SWIOTLB_XEN
193 def_bool y
2775609c 194 select SWIOTLB
b097186f 195
afec6e04 196config XEN_TMEM
10a7a077 197 tristate
741ddbcf 198 depends on !ARM && !ARM64
10a7a077 199 default m if (CLEANCACHE || FRONTSWAP)
afec6e04
DM
200 help
201 Shim to interface in-kernel Transcendent Memory hooks
202 (e.g. cleancache and frontswap) to Xen tmem hypercalls.
203
30edc14b
KRW
204config XEN_PCIDEV_BACKEND
205 tristate "Xen PCI-device backend driver"
206 depends on PCI && X86 && XEN
207 depends on XEN_BACKEND
2ebdc426 208 default m
30edc14b
KRW
209 help
210 The PCI device backend driver allows the kernel to export arbitrary
211 PCI devices to other guests. If you select this to be a module, you
212 will need to make sure no other driver has bound to the device(s)
213 you want to make visible to other guests.
214
2ebdc426
KRW
215 The parameter "passthrough" allows you specify how you want the PCI
216 devices to appear in the guest. You can choose the default (0) where
217 PCI topology starts at 00.00.0, or (1) for passthrough if you want
218 the PCI devices topology appear the same as in the host.
30edc14b 219
2ebdc426
KRW
220 The "hide" parameter (only applicable if backend driver is compiled
221 into the kernel) allows you to bind the PCI devices to this module
222 from the default device drivers. The argument is the list of PCI BDFs:
223 xen-pciback.hide=(03:00.0)(04:00.0)
30edc14b 224
2ebdc426 225 If in doubt, say m.
d8414d3c 226
5eee149a
SS
227config XEN_PVCALLS_FRONTEND
228 tristate "XEN PV Calls frontend driver"
229 depends on INET && XEN
230 default n
231 select XEN_XENBUS_FRONTEND
232 help
233 Experimental frontend for the Xen PV Calls protocol
234 (https://xenbits.xen.org/docs/unstable/misc/pvcalls.html). It
235 sends a small set of POSIX calls to the backend, which
236 implements them.
237
42d3078a
SS
238config XEN_PVCALLS_BACKEND
239 bool "XEN PV Calls backend driver"
240 depends on INET && XEN && XEN_BACKEND
241 default n
242 help
243 Experimental backend for the Xen PV Calls protocol
244 (https://xenbits.xen.org/docs/unstable/misc/pvcalls.html). It
245 allows PV Calls frontends to send POSIX calls to the backend,
246 which implements them.
247
248 If in doubt, say n.
249
d9d660f6
JG
250config XEN_SCSI_BACKEND
251 tristate "XEN SCSI backend driver"
252 depends on XEN && XEN_BACKEND && TARGET_CORE
253 help
254 The SCSI backend driver allows the kernel to export its SCSI Devices
255 to other guests via a high-performance shared-memory interface.
256 Only needed for systems running as XEN driver domains (e.g. Dom0) and
257 if guests need generic access to SCSI devices.
258
d8414d3c
BB
259config XEN_PRIVCMD
260 tristate
261 depends on XEN
262 default m
263
dcb93b96
LJ
264config XEN_STUB
265 bool "Xen stub drivers"
76fc2537 266 depends on XEN && X86_64 && BROKEN
dcb93b96
LJ
267 default n
268 help
269 Allow kernel to install stub drivers, to reserve space for Xen drivers,
270 i.e. memory hotplug and cpu hotplug, and to block native drivers loaded,
271 so that real Xen drivers can be modular.
272
273 To enable Xen features like cpu and memory hotplug, select Y here.
274
ef92e7ca
LJ
275config XEN_ACPI_HOTPLUG_MEMORY
276 tristate "Xen ACPI memory hotplug"
277 depends on XEN_DOM0 && XEN_STUB && ACPI
278 default n
279 help
280 This is Xen ACPI memory hotplug.
281
282 Currently Xen only support ACPI memory hot-add. If you want
283 to hot-add memory at runtime (the hot-added memory cannot be
284 removed until machine stop), select Y/M here, otherwise select N.
285
39adc483
LJ
286config XEN_ACPI_HOTPLUG_CPU
287 tristate "Xen ACPI cpu hotplug"
288 depends on XEN_DOM0 && XEN_STUB && ACPI
289 select ACPI_CONTAINER
290 default n
291 help
292 Xen ACPI cpu enumerating and hotplugging
293
294 For hotplugging, currently Xen only support ACPI cpu hotadd.
295 If you want to hotadd cpu at runtime (the hotadded cpu cannot
296 be removed until machine stop), select Y/M here.
297
59a56802
KRW
298config XEN_ACPI_PROCESSOR
299 tristate "Xen ACPI processor"
c4f9d9cb 300 depends on XEN && XEN_DOM0 && X86 && ACPI_PROCESSOR && CPU_FREQ
102b208e 301 default m
59a56802 302 help
1fd14432
AM
303 This ACPI processor uploads Power Management information to the Xen
304 hypervisor.
305
306 To do that the driver parses the Power Management data and uploads
307 said information to the Xen hypervisor. Then the Xen hypervisor can
5065a706 308 select the proper Cx and Pxx states. It also registers itself as the
1fd14432
AM
309 SMM so that other drivers (such as ACPI cpufreq scaling driver) will
310 not load.
311
312 To compile this driver as a module, choose M here: the module will be
313 called xen_acpi_processor If you do not know what to choose, select
314 M here. If the CPUFREQ drivers are built in, select Y here.
59a56802 315
cef12ee5
LJ
316config XEN_MCE_LOG
317 bool "Xen platform mcelog"
318 depends on XEN_DOM0 && X86_64 && X86_MCE
319 default n
320 help
321 Allow kernel fetching MCE error from Xen platform and
322 converting it into Linux mcelog format for mcelog tools
323
c2374bf5
IC
324config XEN_HAVE_PVMMU
325 bool
326
be81c8a1
DK
327config XEN_EFI
328 def_bool y
be1aaf4e 329 depends on (ARM || ARM64 || X86_64) && EFI
be81c8a1 330
628c28ee
DV
331config XEN_AUTO_XLATE
332 def_bool y
333 depends on ARM || ARM64 || XEN_PVHVM
334 help
335 Support for auto-translated physmap guests.
336
42068cfd
HG
337config XEN_ACPI
338 def_bool y
339 depends on X86 && ACPI
340
a11f4f0a
BO
341config XEN_SYMS
342 bool "Xen symbols"
343 depends on X86 && XEN_DOM0 && XENFS
344 default y if KALLSYMS
345 help
346 Exports hypervisor symbols (along with their types and addresses) via
347 /proc/xen/xensyms file, similar to /proc/kallsyms
348
5f141548
BO
349config XEN_HAVE_VPMU
350 bool
351
27fb7f00 352endmenu