Kconfig 1.5 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253
  1. # SPDX-License-Identifier: GPL-2.0-only
  2. menuconfig VFIO
  3. tristate "VFIO Non-Privileged userspace driver framework"
  4. select IOMMU_API
  5. select VFIO_IOMMU_TYPE1 if MMU && (X86 || S390 || ARM || ARM64)
  6. select INTERVAL_TREE
  7. help
  8. VFIO provides a framework for secure userspace device drivers.
  9. See Documentation/driver-api/vfio.rst for more details.
  10. If you don't know what to do here, say N.
  11. if VFIO
  12. config VFIO_IOMMU_TYPE1
  13. tristate
  14. default n
  15. config VFIO_IOMMU_SPAPR_TCE
  16. tristate
  17. depends on SPAPR_TCE_IOMMU
  18. default VFIO
  19. config VFIO_SPAPR_EEH
  20. tristate
  21. depends on EEH && VFIO_IOMMU_SPAPR_TCE
  22. default VFIO
  23. config VFIO_VIRQFD
  24. tristate
  25. select EVENTFD
  26. default n
  27. config VFIO_NOIOMMU
  28. bool "VFIO No-IOMMU support"
  29. help
  30. VFIO is built on the ability to isolate devices using the IOMMU.
  31. Only with an IOMMU can userspace access to DMA capable devices be
  32. considered secure. VFIO No-IOMMU mode enables IOMMU groups for
  33. devices without IOMMU backing for the purpose of re-using the VFIO
  34. infrastructure in a non-secure mode. Use of this mode will result
  35. in an unsupportable kernel and will therefore taint the kernel.
  36. Device assignment to virtual machines is also not possible with
  37. this mode since there is no IOMMU to provide DMA translation.
  38. If you don't know what to do here, say N.
  39. source "drivers/vfio/pci/Kconfig"
  40. source "drivers/vfio/platform/Kconfig"
  41. source "drivers/vfio/mdev/Kconfig"
  42. source "drivers/vfio/fsl-mc/Kconfig"
  43. endif
  44. source "virt/lib/Kconfig"