51 lines
		
	
	
		
			1.4 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			51 lines
		
	
	
		
			1.4 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
| config VFIO_IOMMU_TYPE1
 | |
| 	tristate
 | |
| 	depends on VFIO
 | |
| 	default n
 | |
| 
 | |
| config VFIO_IOMMU_SPAPR_TCE
 | |
| 	tristate
 | |
| 	depends on VFIO && SPAPR_TCE_IOMMU
 | |
| 	default VFIO
 | |
| 
 | |
| config VFIO_SPAPR_EEH
 | |
| 	tristate
 | |
| 	depends on EEH && VFIO_IOMMU_SPAPR_TCE
 | |
| 	default VFIO
 | |
| 
 | |
| config VFIO_VIRQFD
 | |
| 	tristate
 | |
| 	depends on VFIO && EVENTFD
 | |
| 	default n
 | |
| 
 | |
| menuconfig VFIO
 | |
| 	tristate "VFIO Non-Privileged userspace driver framework"
 | |
| 	depends on IOMMU_API
 | |
| 	select VFIO_IOMMU_TYPE1 if (X86 || S390 || ARM_SMMU || ARM_SMMU_V3)
 | |
| 	select ANON_INODES
 | |
| 	help
 | |
| 	  VFIO provides a framework for secure userspace device drivers.
 | |
| 	  See Documentation/vfio.txt for more details.
 | |
| 
 | |
| 	  If you don't know what to do here, say N.
 | |
| 
 | |
| menuconfig VFIO_NOIOMMU
 | |
| 	bool "VFIO No-IOMMU support"
 | |
| 	depends on VFIO
 | |
| 	help
 | |
| 	  VFIO is built on the ability to isolate devices using the IOMMU.
 | |
| 	  Only with an IOMMU can userspace access to DMA capable devices be
 | |
| 	  considered secure.  VFIO No-IOMMU mode enables IOMMU groups for
 | |
| 	  devices without IOMMU backing for the purpose of re-using the VFIO
 | |
| 	  infrastructure in a non-secure mode.  Use of this mode will result
 | |
| 	  in an unsupportable kernel and will therefore taint the kernel.
 | |
| 	  Device assignment to virtual machines is also not possible with
 | |
| 	  this mode since there is no IOMMU to provide DMA translation.
 | |
| 
 | |
| 	  If you don't know what to do here, say N.
 | |
| 
 | |
| source "drivers/vfio/pci/Kconfig"
 | |
| source "drivers/vfio/platform/Kconfig"
 | |
| source "drivers/vfio/mdev/Kconfig"
 | |
| source "virt/lib/Kconfig"
 | 
