54 lines
		
	
	
		
			1.5 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			54 lines
		
	
	
		
			1.5 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
| # SPDX-License-Identifier: GPL-2.0-only
 | |
| menuconfig VFIO
 | |
| 	tristate "VFIO Non-Privileged userspace driver framework"
 | |
| 	select IOMMU_API
 | |
| 	select VFIO_IOMMU_TYPE1 if MMU && (X86 || S390 || ARM || ARM64)
 | |
| 	select INTERVAL_TREE
 | |
| 	help
 | |
| 	  VFIO provides a framework for secure userspace device drivers.
 | |
| 	  See Documentation/driver-api/vfio.rst for more details.
 | |
| 
 | |
| 	  If you don't know what to do here, say N.
 | |
| 
 | |
| if VFIO
 | |
| config VFIO_IOMMU_TYPE1
 | |
| 	tristate
 | |
| 	default n
 | |
| 
 | |
| config VFIO_IOMMU_SPAPR_TCE
 | |
| 	tristate
 | |
| 	depends on SPAPR_TCE_IOMMU
 | |
| 	default VFIO
 | |
| 
 | |
| config VFIO_SPAPR_EEH
 | |
| 	tristate
 | |
| 	depends on EEH && VFIO_IOMMU_SPAPR_TCE
 | |
| 	default VFIO
 | |
| 
 | |
| config VFIO_VIRQFD
 | |
| 	tristate
 | |
| 	select EVENTFD
 | |
| 	default n
 | |
| 
 | |
| config VFIO_NOIOMMU
 | |
| 	bool "VFIO No-IOMMU support"
 | |
| 	help
 | |
| 	  VFIO is built on the ability to isolate devices using the IOMMU.
 | |
| 	  Only with an IOMMU can userspace access to DMA capable devices be
 | |
| 	  considered secure.  VFIO No-IOMMU mode enables IOMMU groups for
 | |
| 	  devices without IOMMU backing for the purpose of re-using the VFIO
 | |
| 	  infrastructure in a non-secure mode.  Use of this mode will result
 | |
| 	  in an unsupportable kernel and will therefore taint the kernel.
 | |
| 	  Device assignment to virtual machines is also not possible with
 | |
| 	  this mode since there is no IOMMU to provide DMA translation.
 | |
| 
 | |
| 	  If you don't know what to do here, say N.
 | |
| 
 | |
| source "drivers/vfio/pci/Kconfig"
 | |
| source "drivers/vfio/platform/Kconfig"
 | |
| source "drivers/vfio/mdev/Kconfig"
 | |
| source "drivers/vfio/fsl-mc/Kconfig"
 | |
| endif
 | |
| 
 | |
| source "virt/lib/Kconfig"
 |