blob: d43153fec18ea87d821b3f4e66cce6d433631ad1 [file] [log] [blame]
Thomas Gleixnerec8f24b2019-05-19 13:07:45 +01001# SPDX-License-Identifier: GPL-2.0-only
Randy Dunlap27fb7f02010-03-05 13:44:18 -08002menu "Xen driver support"
3 depends on XEN
4
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -07005config XEN_BALLOON
6 bool "Xen memory balloon driver"
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -07007 default y
8 help
9 The balloon driver allows the Xen domain to request more memory from
10 the system to expand the domain's memory allocation, or alternatively
11 return unneeded memory to the system.
12
Daniel Kiper080e2be2011-07-25 17:12:06 -070013config XEN_BALLOON_MEMORY_HOTPLUG
14 bool "Memory hotplug support for Xen balloon driver"
Daniel Kiper080e2be2011-07-25 17:12:06 -070015 depends on XEN_BALLOON && MEMORY_HOTPLUG
Roger Pau Monne2abb65a2020-03-24 16:00:15 +010016 default y
Daniel Kiper080e2be2011-07-25 17:12:06 -070017 help
18 Memory hotplug support for Xen balloon driver allows expanding memory
19 available for the system above limit declared at system startup.
20 It is very useful on critical systems which require long
21 run without rebooting.
22
Roger Pau Monne0df683f2020-03-24 16:00:14 +010023 It's also very useful for non PV domains to obtain unpopulated physical
24 memory ranges to use in order to map foreign memory or grants.
25
Daniel Kiper080e2be2011-07-25 17:12:06 -070026 Memory could be hotplugged in following steps:
27
Vitaly Kuznetsov703fc132016-03-15 14:56:52 -070028 1) target domain: ensure that memory auto online policy is in
29 effect by checking /sys/devices/system/memory/auto_online_blocks
30 file (should be 'online').
31
32 2) control domain: xl mem-max <target-domain> <maxmem>
Daniel Kiper080e2be2011-07-25 17:12:06 -070033 where <maxmem> is >= requested memory size,
34
Vitaly Kuznetsov703fc132016-03-15 14:56:52 -070035 3) control domain: xl mem-set <target-domain> <memory>
Daniel Kiper080e2be2011-07-25 17:12:06 -070036 where <memory> is requested memory size; alternatively memory
37 could be added by writing proper value to
38 /sys/devices/system/xen_memory/xen_memory0/target or
Vitaly Kuznetsov703fc132016-03-15 14:56:52 -070039 /sys/devices/system/xen_memory/xen_memory0/target_kb on the
40 target domain.
Daniel Kiper080e2be2011-07-25 17:12:06 -070041
Vitaly Kuznetsov703fc132016-03-15 14:56:52 -070042 Alternatively, if memory auto onlining was not requested at step 1
43 the newly added memory can be manually onlined in the target domain
44 by doing the following:
Daniel Kiper080e2be2011-07-25 17:12:06 -070045
Vitaly Kuznetsov703fc132016-03-15 14:56:52 -070046 for i in /sys/devices/system/memory/memory*/state; do \
47 [ "`cat "$i"`" = offline ] && echo online > "$i"; done
48
49 or by adding the following line to udev rules:
Daniel Kiper080e2be2011-07-25 17:12:06 -070050
51 SUBSYSTEM=="memory", ACTION=="add", RUN+="/bin/sh -c '[ -f /sys$devpath/state ] && echo online > /sys$devpath/state'"
52
Roger Pau Monne2b514ec2021-03-24 13:24:23 +010053config XEN_MEMORY_HOTPLUG_LIMIT
Juergen Gross633d6f12015-03-20 13:55:38 +010054 int "Hotplugged memory limit (in GiB) for a PV guest"
Juergen Grossa13f2ef2020-06-29 10:35:39 +020055 default 512
Juergen Gross633d6f12015-03-20 13:55:38 +010056 depends on XEN_HAVE_PVMMU
Roger Pau Monne2b514ec2021-03-24 13:24:23 +010057 depends on MEMORY_HOTPLUG
Juergen Gross633d6f12015-03-20 13:55:38 +010058 help
Colin Ian King78806722022-10-07 21:35:00 +010059 Maximum amount of memory (in GiB) that a PV guest can be
Juergen Gross633d6f12015-03-20 13:55:38 +010060 expanded to when using memory hotplug.
61
62 A PV guest can have more memory than this limit if is
63 started with a larger maximum.
64
65 This value is used to allocate enough space in internal
66 tables needed for physical memory administration.
67
Marek Marczykowski-Górecki197ecb32018-09-07 18:49:08 +020068config XEN_SCRUB_PAGES_DEFAULT
69 bool "Scrub pages before returning them to system by default"
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070070 depends on XEN_BALLOON
71 default y
72 help
73 Scrub pages before returning them to the system for reuse by
74 other domains. This makes sure that any confidential data
Geert Uytterhoevenaf320de2018-09-26 10:43:13 +020075 is not accidentally visible to other domains. It is more
Marek Marczykowski-Górecki197ecb32018-09-07 18:49:08 +020076 secure, but slightly less efficient. This can be controlled with
77 xen_scrub_pages=0 parameter and
78 /sys/devices/system/xen_memory/xen_memory0/scrub_pages.
79 This option only sets the default value.
80
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070081 If in doubt, say yes.
Alex Zeffertt1107ba82009-01-07 18:07:11 -080082
Ian Campbellf7116282009-02-06 19:21:19 -080083config XEN_DEV_EVTCHN
84 tristate "Xen /dev/xen/evtchn device"
Ian Campbellf7116282009-02-06 19:21:19 -080085 default y
86 help
Masanari Iida6b2aac42012-04-14 00:14:11 +090087 The evtchn driver allows a userspace process to trigger event
Ian Campbellf7116282009-02-06 19:21:19 -080088 channels and to receive notification of an event channel
89 firing.
90 If in doubt, say yes.
91
Ian Campbelldf660252009-02-09 12:05:51 -080092config XEN_BACKEND
Jeremy Fitzhardinge329620a2009-03-21 23:29:34 -070093 bool "Backend driver support"
Jason Andryukea9e57d2018-09-25 07:36:55 -040094 default XEN_DOM0
Ian Campbelldf660252009-02-09 12:05:51 -080095 help
96 Support for backend device drivers that provide I/O services
97 to other virtual machines.
98
Alex Zeffertt1107ba82009-01-07 18:07:11 -080099config XENFS
100 tristate "Xen filesystem"
Bastian Blankd8414d32011-12-16 11:34:33 -0500101 select XEN_PRIVCMD
Alex Zeffertt1107ba82009-01-07 18:07:11 -0800102 default y
103 help
104 The xen filesystem provides a way for domains to share
105 information with each other and with the hypervisor.
106 For example, by reading and writing the "xenbus" file, guests
107 may pass arbitrary information to the initial domain.
108 If in doubt, say yes.
109
110config XEN_COMPAT_XENFS
Krzysztof Kozlowski23c1cce2019-11-21 04:20:16 +0100111 bool "Create compatibility mount point /proc/xen"
112 depends on XENFS
113 default y
114 help
115 The old xenstore userspace tools expect to find "xenbus"
116 under /proc/xen, but "xenbus" is now found at the root of the
117 xenfs filesystem. Selecting this causes the kernel to create
118 the compatibility mount point /proc/xen if it is running on
119 a xen platform.
120 If in doubt, say yes.
Alex Zeffertt1107ba82009-01-07 18:07:11 -0800121
Jeremy Fitzhardingecff7e812009-03-10 14:39:59 -0700122config XEN_SYS_HYPERVISOR
Krzysztof Kozlowski23c1cce2019-11-21 04:20:16 +0100123 bool "Create xen entries under /sys/hypervisor"
124 depends on SYSFS
125 select SYS_HYPERVISOR
126 default y
127 help
128 Create entries under /sys/hypervisor describing the Xen
129 hypervisor environment. When running native or in another
130 virtual environment, /sys/hypervisor will still be present,
131 but will have no xen contents.
Randy Dunlap27fb7f02010-03-05 13:44:18 -0800132
Ian Campbell2de06cc2009-02-09 12:05:51 -0800133config XEN_XENBUS_FRONTEND
Linus Torvalds9c4bc1c2011-01-13 18:46:48 -0800134 tristate
135
Gerd Hoffmannab315232010-12-14 18:40:46 +0000136config XEN_GNTDEV
137 tristate "userspace grant access device driver"
138 depends on XEN
Stefano Stabellini1f169f62011-02-10 12:08:21 +0000139 default m
Gerd Hoffmannab315232010-12-14 18:40:46 +0000140 select MMU_NOTIFIER
141 help
142 Allows userspace processes to use grants.
Ian Campbell6bac7f92010-12-10 14:39:15 +0000143
Oleksandr Andrushchenko932d6562018-07-20 12:01:48 +0300144config XEN_GNTDEV_DMABUF
145 bool "Add support for dma-buf grant access device driver extension"
Jason Gunthorpefa6614d2019-10-28 17:10:25 -0300146 depends on XEN_GNTDEV && XEN_GRANT_DMA_ALLOC
147 select DMA_SHARED_BUFFER
Oleksandr Andrushchenko932d6562018-07-20 12:01:48 +0300148 help
149 Allows userspace processes and kernel modules to use Xen backed
150 dma-buf implementation. With this extension grant references to
151 the pages of an imported dma-buf can be exported for other domain
152 use and grant references coming from a foreign domain can be
153 converted into a local dma-buf for local export.
154
Daniel De Graafdd314052011-02-07 17:23:05 -0500155config XEN_GRANT_DEV_ALLOC
156 tristate "User-space grant reference allocator driver"
157 depends on XEN
Stefano Stabellini1f169f62011-02-10 12:08:21 +0000158 default m
Daniel De Graafdd314052011-02-07 17:23:05 -0500159 help
160 Allows userspace processes to create pages with access granted
161 to other domains. This can be used to implement frontend drivers
162 or as part of an inter-domain shared memory channel.
163
Oleksandr Andrushchenko9bdc73042018-07-20 12:01:45 +0300164config XEN_GRANT_DMA_ALLOC
165 bool "Allow allocating DMA capable buffers with grant reference module"
166 depends on XEN && HAS_DMA
167 help
168 Extends grant table module API to allow allocating DMA capable
169 buffers and mapping foreign grant references on top of it.
170 The resulting buffer is similar to one allocated by the balloon
171 driver in that proper memory reservation is made by
172 ({increase|decrease}_reservation and VA mappings are updated if
173 needed).
174 This is useful for sharing foreign buffers with HW drivers which
175 cannot work with scattered buffers provided by the balloon driver,
176 but require DMAable memory instead.
177
Konrad Rzeszutek Wilkb097186f2010-05-11 10:05:49 -0400178config SWIOTLB_XEN
179 def_bool y
Jan Beulich794d5b82021-09-17 12:50:38 +0200180 depends on XEN_PV || ARM || ARM64
Christoph Hellwig2f9237d2020-07-08 09:30:00 +0200181 select DMA_OPS
Konrad Rzeszutek Wilk27756092010-10-08 11:06:20 -0400182 select SWIOTLB
Konrad Rzeszutek Wilkb097186f2010-05-11 10:05:49 -0400183
Oleksandr Andrushchenkoa67efff2021-10-28 17:36:20 +0300184config XEN_PCI_STUB
185 bool
186
187config XEN_PCIDEV_STUB
188 tristate "Xen PCI-device stub driver"
189 depends on PCI && !X86 && XEN
190 depends on XEN_BACKEND
191 select XEN_PCI_STUB
192 default m
193 help
194 The PCI device stub driver provides limited version of the PCI
195 device backend driver without para-virtualized support for guests.
196 If you select this to be a module, you will need to make sure no
197 other driver has bound to the device(s) you want to make visible to
198 other guests.
199
200 The "hide" parameter (only applicable if backend driver is compiled
201 into the kernel) allows you to bind the PCI devices to this module
202 from the default device drivers. The argument is the list of PCI BDFs:
203 xen-pciback.hide=(03:00.0)(04:00.0)
204
205 If in doubt, say m.
206
Konrad Rzeszutek Wilk30edc142009-10-13 17:22:20 -0400207config XEN_PCIDEV_BACKEND
208 tristate "Xen PCI-device backend driver"
209 depends on PCI && X86 && XEN
210 depends on XEN_BACKEND
Oleksandr Andrushchenkoa67efff2021-10-28 17:36:20 +0300211 select XEN_PCI_STUB
Konrad Rzeszutek Wilk2ebdc422011-07-11 16:49:41 -0400212 default m
Konrad Rzeszutek Wilk30edc142009-10-13 17:22:20 -0400213 help
214 The PCI device backend driver allows the kernel to export arbitrary
215 PCI devices to other guests. If you select this to be a module, you
216 will need to make sure no other driver has bound to the device(s)
217 you want to make visible to other guests.
218
Konrad Rzeszutek Wilk2ebdc422011-07-11 16:49:41 -0400219 The parameter "passthrough" allows you specify how you want the PCI
220 devices to appear in the guest. You can choose the default (0) where
221 PCI topology starts at 00.00.0, or (1) for passthrough if you want
222 the PCI devices topology appear the same as in the host.
Konrad Rzeszutek Wilk30edc142009-10-13 17:22:20 -0400223
Konrad Rzeszutek Wilk2ebdc422011-07-11 16:49:41 -0400224 The "hide" parameter (only applicable if backend driver is compiled
225 into the kernel) allows you to bind the PCI devices to this module
226 from the default device drivers. The argument is the list of PCI BDFs:
227 xen-pciback.hide=(03:00.0)(04:00.0)
Konrad Rzeszutek Wilk30edc142009-10-13 17:22:20 -0400228
Konrad Rzeszutek Wilk2ebdc422011-07-11 16:49:41 -0400229 If in doubt, say m.
Bastian Blankd8414d32011-12-16 11:34:33 -0500230
Stefano Stabellini5eee1492017-10-30 15:41:03 -0700231config XEN_PVCALLS_FRONTEND
232 tristate "XEN PV Calls frontend driver"
233 depends on INET && XEN
Stefano Stabellini5eee1492017-10-30 15:41:03 -0700234 select XEN_XENBUS_FRONTEND
235 help
236 Experimental frontend for the Xen PV Calls protocol
237 (https://xenbits.xen.org/docs/unstable/misc/pvcalls.html). It
238 sends a small set of POSIX calls to the backend, which
239 implements them.
240
Stefano Stabellini42d30782017-07-06 11:01:08 -0700241config XEN_PVCALLS_BACKEND
Jan Beulich45da2342021-09-07 14:17:13 +0200242 tristate "XEN PV Calls backend driver"
Stefano Stabellini42d30782017-07-06 11:01:08 -0700243 depends on INET && XEN && XEN_BACKEND
Stefano Stabellini42d30782017-07-06 11:01:08 -0700244 help
245 Experimental backend for the Xen PV Calls protocol
246 (https://xenbits.xen.org/docs/unstable/misc/pvcalls.html). It
247 allows PV Calls frontends to send POSIX calls to the backend,
248 which implements them.
249
250 If in doubt, say n.
251
Juergen Grossd9d660f2014-08-28 06:44:12 +0200252config XEN_SCSI_BACKEND
253 tristate "XEN SCSI backend driver"
254 depends on XEN && XEN_BACKEND && TARGET_CORE
255 help
256 The SCSI backend driver allows the kernel to export its SCSI Devices
257 to other guests via a high-performance shared-memory interface.
258 Only needed for systems running as XEN driver domains (e.g. Dom0) and
259 if guests need generic access to SCSI devices.
260
Bastian Blankd8414d32011-12-16 11:34:33 -0500261config XEN_PRIVCMD
Juergen Gross897919a2021-11-16 15:33:23 +0100262 tristate "Xen hypercall passthrough driver"
Bastian Blankd8414d32011-12-16 11:34:33 -0500263 depends on XEN
264 default m
Juergen Gross897919a2021-11-16 15:33:23 +0100265 help
266 The hypercall passthrough driver allows privileged user programs to
267 perform Xen hypercalls. This driver is normally required for systems
268 running as Dom0 to perform privileged operations, but in some
269 disaggregated Xen setups this driver might be needed for other
270 domains, too.
Bastian Blankd8414d32011-12-16 11:34:33 -0500271
Viresh Kumarf8941e62023-08-22 15:15:07 +0530272config XEN_PRIVCMD_IRQFD
273 bool "Xen irqfd support"
274 depends on XEN_PRIVCMD && XEN_VIRTIO && EVENTFD
275 help
276 Using the irqfd mechanism a virtio backend running in a daemon can
277 speed up interrupt injection into a guest.
278
Konrad Rzeszutek Wilk59a56802012-02-03 16:03:20 -0500279config XEN_ACPI_PROCESSOR
280 tristate "Xen ACPI processor"
Jan Beulichcae7d812021-09-30 14:16:47 +0200281 depends on XEN && XEN_PV_DOM0 && X86 && ACPI_PROCESSOR && CPU_FREQ
Konrad Rzeszutek Wilk102b2082012-03-13 13:28:12 -0400282 default m
Konrad Rzeszutek Wilk59a56802012-02-03 16:03:20 -0500283 help
Krzysztof Kozlowski23c1cce2019-11-21 04:20:16 +0100284 This ACPI processor uploads Power Management information to the Xen
Andrew Morton1fd14432012-05-04 14:04:12 -0700285 hypervisor.
Konrad Rzeszutek Wilk59a56802012-02-03 16:03:20 -0500286
Andrew Morton1fd14432012-05-04 14:04:12 -0700287 To do that the driver parses the Power Management data and uploads
288 said information to the Xen hypervisor. Then the Xen hypervisor can
Masanari Iida5065a702013-11-30 21:38:43 +0900289 select the proper Cx and Pxx states. It also registers itself as the
Andrew Morton1fd14432012-05-04 14:04:12 -0700290 SMM so that other drivers (such as ACPI cpufreq scaling driver) will
291 not load.
Konrad Rzeszutek Wilk59a56802012-02-03 16:03:20 -0500292
Krzysztof Kozlowski23c1cce2019-11-21 04:20:16 +0100293 To compile this driver as a module, choose M here: the module will be
Andrew Morton1fd14432012-05-04 14:04:12 -0700294 called xen_acpi_processor If you do not know what to choose, select
295 M here. If the CPUFREQ drivers are built in, select Y here.
Konrad Rzeszutek Wilk59a56802012-02-03 16:03:20 -0500296
Liu, Jinsongcef12ee2012-06-07 19:56:51 +0800297config XEN_MCE_LOG
298 bool "Xen platform mcelog"
Jan Beulichcae7d812021-09-30 14:16:47 +0200299 depends on XEN_PV_DOM0 && X86_MCE
Liu, Jinsongcef12ee2012-06-07 19:56:51 +0800300 help
301 Allow kernel fetching MCE error from Xen platform and
302 converting it into Linux mcelog format for mcelog tools
303
Ian Campbellc2374bf2012-10-03 12:17:50 +0100304config XEN_HAVE_PVMMU
Krzysztof Kozlowski23c1cce2019-11-21 04:20:16 +0100305 bool
Ian Campbellc2374bf2012-10-03 12:17:50 +0100306
Daniel Kiperbe81c8a2014-06-30 19:53:02 +0200307config XEN_EFI
308 def_bool y
Shannon Zhaobe1aaf42016-04-07 20:03:32 +0800309 depends on (ARM || ARM64 || X86_64) && EFI
Daniel Kiperbe81c8a2014-06-30 19:53:02 +0200310
David Vrabel628c28e2015-03-11 14:49:56 +0000311config XEN_AUTO_XLATE
312 def_bool y
313 depends on ARM || ARM64 || XEN_PVHVM
314 help
315 Support for auto-translated physmap guests.
316
Hanjun Guo42068cf2015-03-24 14:02:52 +0000317config XEN_ACPI
318 def_bool y
319 depends on X86 && ACPI
320
Boris Ostrovskya11f4f0a2015-08-10 16:34:32 -0400321config XEN_SYMS
Krzysztof Kozlowski23c1cce2019-11-21 04:20:16 +0100322 bool "Xen symbols"
323 depends on X86 && XEN_DOM0 && XENFS
324 default y if KALLSYMS
325 help
326 Exports hypervisor symbols (along with their types and addresses) via
327 /proc/xen/xensyms file, similar to /proc/kallsyms
Boris Ostrovskya11f4f0a2015-08-10 16:34:32 -0400328
Boris Ostrovsky5f141542015-08-10 16:34:33 -0400329config XEN_HAVE_VPMU
Krzysztof Kozlowski23c1cce2019-11-21 04:20:16 +0100330 bool
Boris Ostrovsky5f141542015-08-10 16:34:33 -0400331
Oleksandr Andrushchenkob3383972018-11-30 09:42:03 +0200332config XEN_FRONT_PGDIR_SHBUF
333 tristate
334
Roger Pau Monne9e2369c2020-09-01 10:33:26 +0200335config XEN_UNPOPULATED_ALLOC
336 bool "Use unpopulated memory ranges for guest mappings"
Oleksandr Tyshchenkob2371582021-12-09 22:05:35 +0200337 depends on ZONE_DEVICE
Roger Pau Monne9e2369c2020-09-01 10:33:26 +0200338 default XEN_BACKEND || XEN_GNTDEV || XEN_DOM0
339 help
340 Use unpopulated memory ranges in order to create mappings for guest
341 memory regions, including grant maps and foreign pages. This avoids
342 having to balloon out RAM regions in order to obtain physical memory
343 space to create such mappings.
344
Oleksandr Tyshchenko1ca55d502022-06-02 22:23:51 +0300345config XEN_GRANT_DMA_IOMMU
346 bool
347 select IOMMU_API
348
Juergen Grossd6aca352022-06-02 22:23:48 +0300349config XEN_GRANT_DMA_OPS
350 bool
351 select DMA_OPS
352
Juergen Grossfa1f5742022-06-02 22:23:49 +0300353config XEN_VIRTIO
354 bool "Xen virtio support"
355 depends on VIRTIO
356 select XEN_GRANT_DMA_OPS
Oleksandr Tyshchenko625ab902022-06-02 22:23:52 +0300357 select XEN_GRANT_DMA_IOMMU if OF
Juergen Grossfa1f5742022-06-02 22:23:49 +0300358 help
359 Enable virtio support for running as Xen guest. Depending on the
360 guest type this will require special support on the backend side
361 (qemu or kernel, depending on the virtio device types used).
362
363 If in doubt, say n.
364
Juergen Gross251e90e2022-06-22 08:38:38 +0200365config XEN_VIRTIO_FORCE_GRANT
366 bool "Require Xen virtio support to use grants"
367 depends on XEN_VIRTIO
368 help
369 Require virtio for Xen guests to use grant mappings.
370 This will avoid the need to give the backend the right to map all
371 of the guest memory. This will need support on the backend side
372 (e.g. qemu or kernel, depending on the virtio device types used).
373
Randy Dunlap27fb7f02010-03-05 13:44:18 -0800374endmenu