Kconfig 5.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154
  1. menu "Xen driver support"
  2. depends on XEN
  3. config XEN_BALLOON
  4. bool "Xen memory balloon driver"
  5. default y
  6. help
  7. The balloon driver allows the Xen domain to request more memory from
  8. the system to expand the domain's memory allocation, or alternatively
  9. return unneeded memory to the system.
  10. config XEN_SELFBALLOONING
  11. bool "Dynamically self-balloon kernel memory to target"
  12. depends on XEN && XEN_BALLOON && CLEANCACHE && SWAP
  13. default n
  14. help
  15. Self-ballooning dynamically balloons available kernel memory driven
  16. by the current usage of anonymous memory ("committed AS") and
  17. controlled by various sysfs-settable parameters. Configuring
  18. FRONTSWAP is highly recommended; if it is not configured, self-
  19. ballooning is disabled by default but can be enabled with the
  20. 'selfballooning' kernel boot parameter. If FRONTSWAP is configured,
  21. frontswap-selfshrinking is enabled by default but can be disabled
  22. with the 'noselfshrink' kernel boot parameter; and self-ballooning
  23. is enabled by default but can be disabled with the 'noselfballooning'
  24. kernel boot parameter. Note that systems without a sufficiently
  25. large swap device should not enable self-ballooning.
  26. config XEN_SCRUB_PAGES
  27. bool "Scrub pages before returning them to system"
  28. depends on XEN_BALLOON
  29. default y
  30. help
  31. Scrub pages before returning them to the system for reuse by
  32. other domains. This makes sure that any confidential data
  33. is not accidentally visible to other domains. Is it more
  34. secure, but slightly less efficient.
  35. If in doubt, say yes.
  36. config XEN_DEV_EVTCHN
  37. tristate "Xen /dev/xen/evtchn device"
  38. default y
  39. help
  40. The evtchn driver allows a userspace process to triger event
  41. channels and to receive notification of an event channel
  42. firing.
  43. If in doubt, say yes.
  44. config XEN_BACKEND
  45. bool "Backend driver support"
  46. depends on XEN_DOM0
  47. default y
  48. help
  49. Support for backend device drivers that provide I/O services
  50. to other virtual machines.
  51. config XENFS
  52. tristate "Xen filesystem"
  53. default y
  54. help
  55. The xen filesystem provides a way for domains to share
  56. information with each other and with the hypervisor.
  57. For example, by reading and writing the "xenbus" file, guests
  58. may pass arbitrary information to the initial domain.
  59. If in doubt, say yes.
  60. config XEN_COMPAT_XENFS
  61. bool "Create compatibility mount point /proc/xen"
  62. depends on XENFS
  63. default y
  64. help
  65. The old xenstore userspace tools expect to find "xenbus"
  66. under /proc/xen, but "xenbus" is now found at the root of the
  67. xenfs filesystem. Selecting this causes the kernel to create
  68. the compatibility mount point /proc/xen if it is running on
  69. a xen platform.
  70. If in doubt, say yes.
  71. config XEN_SYS_HYPERVISOR
  72. bool "Create xen entries under /sys/hypervisor"
  73. depends on SYSFS
  74. select SYS_HYPERVISOR
  75. default y
  76. help
  77. Create entries under /sys/hypervisor describing the Xen
  78. hypervisor environment. When running native or in another
  79. virtual environment, /sys/hypervisor will still be present,
  80. but will have no xen contents.
  81. config XEN_XENBUS_FRONTEND
  82. tristate
  83. config XEN_GNTDEV
  84. tristate "userspace grant access device driver"
  85. depends on XEN
  86. default m
  87. select MMU_NOTIFIER
  88. help
  89. Allows userspace processes to use grants.
  90. config XEN_GRANT_DEV_ALLOC
  91. tristate "User-space grant reference allocator driver"
  92. depends on XEN
  93. default m
  94. help
  95. Allows userspace processes to create pages with access granted
  96. to other domains. This can be used to implement frontend drivers
  97. or as part of an inter-domain shared memory channel.
  98. config XEN_PLATFORM_PCI
  99. tristate "xen platform pci device driver"
  100. depends on XEN_PVHVM && PCI
  101. default m
  102. help
  103. Driver for the Xen PCI Platform device: it is responsible for
  104. initializing xenbus and grant_table when running in a Xen HVM
  105. domain. As a consequence this driver is required to run any Xen PV
  106. frontend on Xen HVM.
  107. config SWIOTLB_XEN
  108. def_bool y
  109. depends on PCI
  110. select SWIOTLB
  111. config XEN_TMEM
  112. bool
  113. default y if (CLEANCACHE || FRONTSWAP)
  114. help
  115. Shim to interface in-kernel Transcendent Memory hooks
  116. (e.g. cleancache and frontswap) to Xen tmem hypercalls.
  117. config XEN_PCIDEV_BACKEND
  118. tristate "Xen PCI-device backend driver"
  119. depends on PCI && X86 && XEN
  120. depends on XEN_BACKEND
  121. default m
  122. help
  123. The PCI device backend driver allows the kernel to export arbitrary
  124. PCI devices to other guests. If you select this to be a module, you
  125. will need to make sure no other driver has bound to the device(s)
  126. you want to make visible to other guests.
  127. The parameter "passthrough" allows you specify how you want the PCI
  128. devices to appear in the guest. You can choose the default (0) where
  129. PCI topology starts at 00.00.0, or (1) for passthrough if you want
  130. the PCI devices topology appear the same as in the host.
  131. The "hide" parameter (only applicable if backend driver is compiled
  132. into the kernel) allows you to bind the PCI devices to this module
  133. from the default device drivers. The argument is the list of PCI BDFs:
  134. xen-pciback.hide=(03:00.0)(04:00.0)
  135. If in doubt, say m.
  136. endmenu