Alex Williamson | 73fa0d1 | 2012-07-31 08:16:23 -0600 | [diff] [blame] | 1 | config VFIO_IOMMU_TYPE1 |
| 2 | tristate |
| 3 | depends on VFIO |
| 4 | default n |
| 5 | |
Alexey Kardashevskiy | 5ffd229 | 2013-05-21 13:33:10 +1000 | [diff] [blame] | 6 | config VFIO_IOMMU_SPAPR_TCE |
| 7 | tristate |
| 8 | depends on VFIO && SPAPR_TCE_IOMMU |
Michael Ellerman | d88423f | 2017-02-08 13:13:25 -0700 | [diff] [blame] | 9 | default VFIO |
Alexey Kardashevskiy | 5ffd229 | 2013-05-21 13:33:10 +1000 | [diff] [blame] | 10 | |
Gavin Shan | 92d18a6 | 2014-08-08 10:36:20 -0600 | [diff] [blame] | 11 | config VFIO_SPAPR_EEH |
| 12 | tristate |
| 13 | depends on EEH && VFIO_IOMMU_SPAPR_TCE |
Michael Ellerman | d88423f | 2017-02-08 13:13:25 -0700 | [diff] [blame] | 14 | default VFIO |
Gavin Shan | 92d18a6 | 2014-08-08 10:36:20 -0600 | [diff] [blame] | 15 | |
Alex Williamson | 71be342 | 2015-03-17 08:33:38 -0600 | [diff] [blame] | 16 | config VFIO_VIRQFD |
| 17 | tristate |
| 18 | depends on VFIO && EVENTFD |
| 19 | default n |
| 20 | |
Alex Williamson | cba3345 | 2012-07-31 08:16:22 -0600 | [diff] [blame] | 21 | menuconfig VFIO |
| 22 | tristate "VFIO Non-Privileged userspace driver framework" |
| 23 | depends on IOMMU_API |
Will Deacon | 8a0a01b | 2015-05-27 17:26:00 +0100 | [diff] [blame] | 24 | select VFIO_IOMMU_TYPE1 if (X86 || S390 || ARM_SMMU || ARM_SMMU_V3) |
Arnd Bergmann | 4379d2a | 2014-03-27 11:58:58 -0600 | [diff] [blame] | 25 | select ANON_INODES |
Alex Williamson | cba3345 | 2012-07-31 08:16:22 -0600 | [diff] [blame] | 26 | help |
| 27 | VFIO provides a framework for secure userspace device drivers. |
| 28 | See Documentation/vfio.txt for more details. |
| 29 | |
| 30 | If you don't know what to do here, say N. |
Alex Williamson | 89e1f7d | 2012-07-31 08:16:24 -0600 | [diff] [blame] | 31 | |
Alex Williamson | 03a76b6 | 2015-12-21 15:13:33 -0700 | [diff] [blame] | 32 | menuconfig VFIO_NOIOMMU |
| 33 | bool "VFIO No-IOMMU support" |
| 34 | depends on VFIO |
| 35 | help |
| 36 | VFIO is built on the ability to isolate devices using the IOMMU. |
| 37 | Only with an IOMMU can userspace access to DMA capable devices be |
| 38 | considered secure. VFIO No-IOMMU mode enables IOMMU groups for |
| 39 | devices without IOMMU backing for the purpose of re-using the VFIO |
| 40 | infrastructure in a non-secure mode. Use of this mode will result |
| 41 | in an unsupportable kernel and will therefore taint the kernel. |
| 42 | Device assignment to virtual machines is also not possible with |
| 43 | this mode since there is no IOMMU to provide DMA translation. |
| 44 | |
| 45 | If you don't know what to do here, say N. |
| 46 | |
Alex Williamson | 89e1f7d | 2012-07-31 08:16:24 -0600 | [diff] [blame] | 47 | source "drivers/vfio/pci/Kconfig" |
Antonios Motakis | 5316153 | 2015-03-16 14:08:44 -0600 | [diff] [blame] | 48 | source "drivers/vfio/platform/Kconfig" |
Kirti Wankhede | 7b96953 | 2016-11-17 02:16:13 +0530 | [diff] [blame] | 49 | source "drivers/vfio/mdev/Kconfig" |
Feng Wu | 6d7425f | 2015-09-18 22:29:50 +0800 | [diff] [blame] | 50 | source "virt/lib/Kconfig" |