1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253 |
- # SPDX-License-Identifier: GPL-2.0-only
- menuconfig VFIO
- tristate "VFIO Non-Privileged userspace driver framework"
- select IOMMU_API
- select VFIO_IOMMU_TYPE1 if MMU && (X86 || S390 || ARM || ARM64)
- select INTERVAL_TREE
- help
- VFIO provides a framework for secure userspace device drivers.
- See Documentation/driver-api/vfio.rst for more details.
- If you don't know what to do here, say N.
- if VFIO
- config VFIO_IOMMU_TYPE1
- tristate
- default n
- config VFIO_IOMMU_SPAPR_TCE
- tristate
- depends on SPAPR_TCE_IOMMU
- default VFIO
- config VFIO_SPAPR_EEH
- tristate
- depends on EEH && VFIO_IOMMU_SPAPR_TCE
- default VFIO
- config VFIO_VIRQFD
- tristate
- select EVENTFD
- default n
- config VFIO_NOIOMMU
- bool "VFIO No-IOMMU support"
- help
- VFIO is built on the ability to isolate devices using the IOMMU.
- Only with an IOMMU can userspace access to DMA capable devices be
- considered secure. VFIO No-IOMMU mode enables IOMMU groups for
- devices without IOMMU backing for the purpose of re-using the VFIO
- infrastructure in a non-secure mode. Use of this mode will result
- in an unsupportable kernel and will therefore taint the kernel.
- Device assignment to virtual machines is also not possible with
- this mode since there is no IOMMU to provide DMA translation.
- If you don't know what to do here, say N.
- source "drivers/vfio/pci/Kconfig"
- source "drivers/vfio/platform/Kconfig"
- source "drivers/vfio/mdev/Kconfig"
- source "drivers/vfio/fsl-mc/Kconfig"
- endif
- source "virt/lib/Kconfig"
|