Kconfig 1.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051
  1. # SPDX-License-Identifier: GPL-2.0-only
  2. config VFIO_IOMMU_TYPE1
  3. tristate
  4. depends on VFIO
  5. default n
  6. config VFIO_IOMMU_SPAPR_TCE
  7. tristate
  8. depends on VFIO && SPAPR_TCE_IOMMU
  9. default VFIO
  10. config VFIO_SPAPR_EEH
  11. tristate
  12. depends on EEH && VFIO_IOMMU_SPAPR_TCE
  13. default VFIO
  14. config VFIO_VIRQFD
  15. tristate
  16. depends on VFIO && EVENTFD
  17. default n
  18. menuconfig VFIO
  19. tristate "VFIO Non-Privileged userspace driver framework"
  20. select IOMMU_API
  21. select VFIO_IOMMU_TYPE1 if MMU && (X86 || S390 || ARM || ARM64)
  22. help
  23. VFIO provides a framework for secure userspace device drivers.
  24. See Documentation/driver-api/vfio.rst for more details.
  25. If you don't know what to do here, say N.
  26. config VFIO_NOIOMMU
  27. bool "VFIO No-IOMMU support"
  28. depends on VFIO
  29. help
  30. VFIO is built on the ability to isolate devices using the IOMMU.
  31. Only with an IOMMU can userspace access to DMA capable devices be
  32. considered secure. VFIO No-IOMMU mode enables IOMMU groups for
  33. devices without IOMMU backing for the purpose of re-using the VFIO
  34. infrastructure in a non-secure mode. Use of this mode will result
  35. in an unsupportable kernel and will therefore taint the kernel.
  36. Device assignment to virtual machines is also not possible with
  37. this mode since there is no IOMMU to provide DMA translation.
  38. If you don't know what to do here, say N.
  39. source "drivers/vfio/pci/Kconfig"
  40. source "drivers/vfio/platform/Kconfig"
  41. source "drivers/vfio/mdev/Kconfig"
  42. source "drivers/vfio/fsl-mc/Kconfig"
  43. source "virt/lib/Kconfig"