1 # SPDX-License-Identifier: GPL-2.0-only
2 menu "Xen driver support"
6 bool "Xen memory balloon driver"
9 The balloon driver allows the Xen domain to request more memory from
10 the system to expand the domain's memory allocation, or alternatively
11 return unneeded memory to the system.
13 config XEN_BALLOON_MEMORY_HOTPLUG
14 bool "Memory hotplug support for Xen balloon driver"
15 depends on XEN_BALLOON && MEMORY_HOTPLUG
17 Memory hotplug support for Xen balloon driver allows expanding memory
18 available for the system above limit declared at system startup.
19 It is very useful on critical systems which require long
20 run without rebooting.
22 Memory could be hotplugged in following steps:
24 1) target domain: ensure that memory auto online policy is in
25 effect by checking /sys/devices/system/memory/auto_online_blocks
26 file (should be 'online').
28 2) control domain: xl mem-max <target-domain> <maxmem>
29 where <maxmem> is >= requested memory size,
31 3) control domain: xl mem-set <target-domain> <memory>
32 where <memory> is requested memory size; alternatively memory
33 could be added by writing proper value to
34 /sys/devices/system/xen_memory/xen_memory0/target or
35 /sys/devices/system/xen_memory/xen_memory0/target_kb on the
38 Alternatively, if memory auto onlining was not requested at step 1
39 the newly added memory can be manually onlined in the target domain
40 by doing the following:
42 for i in /sys/devices/system/memory/memory*/state; do \
43 [ "`cat "$i"`" = offline ] && echo online > "$i"; done
45 or by adding the following line to udev rules:
47 SUBSYSTEM=="memory", ACTION=="add", RUN+="/bin/sh -c '[ -f /sys$devpath/state ] && echo online > /sys$devpath/state'"
49 config XEN_BALLOON_MEMORY_HOTPLUG_LIMIT
50 int "Hotplugged memory limit (in GiB) for a PV guest"
54 depends on XEN_HAVE_PVMMU
55 depends on XEN_BALLOON_MEMORY_HOTPLUG
57 Maxmium amount of memory (in GiB) that a PV guest can be
58 expanded to when using memory hotplug.
60 A PV guest can have more memory than this limit if is
61 started with a larger maximum.
63 This value is used to allocate enough space in internal
64 tables needed for physical memory administration.
66 config XEN_SCRUB_PAGES_DEFAULT
67 bool "Scrub pages before returning them to system by default"
68 depends on XEN_BALLOON
71 Scrub pages before returning them to the system for reuse by
72 other domains. This makes sure that any confidential data
73 is not accidentally visible to other domains. It is more
74 secure, but slightly less efficient. This can be controlled with
75 xen_scrub_pages=0 parameter and
76 /sys/devices/system/xen_memory/xen_memory0/scrub_pages.
77 This option only sets the default value.
82 tristate "Xen /dev/xen/evtchn device"
85 The evtchn driver allows a userspace process to trigger event
86 channels and to receive notification of an event channel
91 bool "Backend driver support"
94 Support for backend device drivers that provide I/O services
95 to other virtual machines.
98 tristate "Xen filesystem"
102 The xen filesystem provides a way for domains to share
103 information with each other and with the hypervisor.
104 For example, by reading and writing the "xenbus" file, guests
105 may pass arbitrary information to the initial domain.
106 If in doubt, say yes.
108 config XEN_COMPAT_XENFS
109 bool "Create compatibility mount point /proc/xen"
113 The old xenstore userspace tools expect to find "xenbus"
114 under /proc/xen, but "xenbus" is now found at the root of the
115 xenfs filesystem. Selecting this causes the kernel to create
116 the compatibility mount point /proc/xen if it is running on
118 If in doubt, say yes.
120 config XEN_SYS_HYPERVISOR
121 bool "Create xen entries under /sys/hypervisor"
123 select SYS_HYPERVISOR
126 Create entries under /sys/hypervisor describing the Xen
127 hypervisor environment. When running native or in another
128 virtual environment, /sys/hypervisor will still be present,
129 but will have no xen contents.
131 config XEN_XENBUS_FRONTEND
135 tristate "userspace grant access device driver"
140 Allows userspace processes to use grants.
142 config XEN_GNTDEV_DMABUF
143 bool "Add support for dma-buf grant access device driver extension"
144 depends on XEN_GNTDEV && XEN_GRANT_DMA_ALLOC && DMA_SHARED_BUFFER
146 Allows userspace processes and kernel modules to use Xen backed
147 dma-buf implementation. With this extension grant references to
148 the pages of an imported dma-buf can be exported for other domain
149 use and grant references coming from a foreign domain can be
150 converted into a local dma-buf for local export.
152 config XEN_GRANT_DEV_ALLOC
153 tristate "User-space grant reference allocator driver"
157 Allows userspace processes to create pages with access granted
158 to other domains. This can be used to implement frontend drivers
159 or as part of an inter-domain shared memory channel.
161 config XEN_GRANT_DMA_ALLOC
162 bool "Allow allocating DMA capable buffers with grant reference module"
163 depends on XEN && HAS_DMA
165 Extends grant table module API to allow allocating DMA capable
166 buffers and mapping foreign grant references on top of it.
167 The resulting buffer is similar to one allocated by the balloon
168 driver in that proper memory reservation is made by
169 ({increase|decrease}_reservation and VA mappings are updated if
171 This is useful for sharing foreign buffers with HW drivers which
172 cannot work with scattered buffers provided by the balloon driver,
173 but require DMAable memory instead.
179 config XEN_PCIDEV_BACKEND
180 tristate "Xen PCI-device backend driver"
181 depends on PCI && X86 && XEN
182 depends on XEN_BACKEND
185 The PCI device backend driver allows the kernel to export arbitrary
186 PCI devices to other guests. If you select this to be a module, you
187 will need to make sure no other driver has bound to the device(s)
188 you want to make visible to other guests.
190 The parameter "passthrough" allows you specify how you want the PCI
191 devices to appear in the guest. You can choose the default (0) where
192 PCI topology starts at 00.00.0, or (1) for passthrough if you want
193 the PCI devices topology appear the same as in the host.
195 The "hide" parameter (only applicable if backend driver is compiled
196 into the kernel) allows you to bind the PCI devices to this module
197 from the default device drivers. The argument is the list of PCI BDFs:
198 xen-pciback.hide=(03:00.0)(04:00.0)
202 config XEN_PVCALLS_FRONTEND
203 tristate "XEN PV Calls frontend driver"
204 depends on INET && XEN
205 select XEN_XENBUS_FRONTEND
207 Experimental frontend for the Xen PV Calls protocol
208 (https://xenbits.xen.org/docs/unstable/misc/pvcalls.html). It
209 sends a small set of POSIX calls to the backend, which
212 config XEN_PVCALLS_BACKEND
213 bool "XEN PV Calls backend driver"
214 depends on INET && XEN && XEN_BACKEND
216 Experimental backend for the Xen PV Calls protocol
217 (https://xenbits.xen.org/docs/unstable/misc/pvcalls.html). It
218 allows PV Calls frontends to send POSIX calls to the backend,
219 which implements them.
223 config XEN_SCSI_BACKEND
224 tristate "XEN SCSI backend driver"
225 depends on XEN && XEN_BACKEND && TARGET_CORE
227 The SCSI backend driver allows the kernel to export its SCSI Devices
228 to other guests via a high-performance shared-memory interface.
229 Only needed for systems running as XEN driver domains (e.g. Dom0) and
230 if guests need generic access to SCSI devices.
238 bool "Xen stub drivers"
239 depends on XEN && X86_64 && BROKEN
241 Allow kernel to install stub drivers, to reserve space for Xen drivers,
242 i.e. memory hotplug and cpu hotplug, and to block native drivers loaded,
243 so that real Xen drivers can be modular.
245 To enable Xen features like cpu and memory hotplug, select Y here.
247 config XEN_ACPI_HOTPLUG_MEMORY
248 tristate "Xen ACPI memory hotplug"
249 depends on XEN_DOM0 && XEN_STUB && ACPI
251 This is Xen ACPI memory hotplug.
253 Currently Xen only support ACPI memory hot-add. If you want
254 to hot-add memory at runtime (the hot-added memory cannot be
255 removed until machine stop), select Y/M here, otherwise select N.
257 config XEN_ACPI_HOTPLUG_CPU
258 tristate "Xen ACPI cpu hotplug"
259 depends on XEN_DOM0 && XEN_STUB && ACPI
260 select ACPI_CONTAINER
262 Xen ACPI cpu enumerating and hotplugging
264 For hotplugging, currently Xen only support ACPI cpu hotadd.
265 If you want to hotadd cpu at runtime (the hotadded cpu cannot
266 be removed until machine stop), select Y/M here.
268 config XEN_ACPI_PROCESSOR
269 tristate "Xen ACPI processor"
270 depends on XEN && XEN_DOM0 && X86 && ACPI_PROCESSOR && CPU_FREQ
273 This ACPI processor uploads Power Management information to the Xen
276 To do that the driver parses the Power Management data and uploads
277 said information to the Xen hypervisor. Then the Xen hypervisor can
278 select the proper Cx and Pxx states. It also registers itself as the
279 SMM so that other drivers (such as ACPI cpufreq scaling driver) will
282 To compile this driver as a module, choose M here: the module will be
283 called xen_acpi_processor If you do not know what to choose, select
284 M here. If the CPUFREQ drivers are built in, select Y here.
287 bool "Xen platform mcelog"
288 depends on XEN_DOM0 && X86_64 && X86_MCE
290 Allow kernel fetching MCE error from Xen platform and
291 converting it into Linux mcelog format for mcelog tools
293 config XEN_HAVE_PVMMU
298 depends on (ARM || ARM64 || X86_64) && EFI
300 config XEN_AUTO_XLATE
302 depends on ARM || ARM64 || XEN_PVHVM
304 Support for auto-translated physmap guests.
308 depends on X86 && ACPI
312 depends on X86 && XEN_DOM0 && XENFS
313 default y if KALLSYMS
315 Exports hypervisor symbols (along with their types and addresses) via
316 /proc/xen/xensyms file, similar to /proc/kallsyms
321 config XEN_FRONT_PGDIR_SHBUF