Thomas Gleixner | ec8f24b | 2019-05-19 13:07:45 +0100 | [diff] [blame] | 1 | # SPDX-License-Identifier: GPL-2.0-only |
Alex Williamson | cba3345 | 2012-07-31 08:16:22 -0600 | [diff] [blame] | 2 | menuconfig VFIO |
| 3 | tristate "VFIO Non-Privileged userspace driver framework" |
Jason Gunthorpe | 179209f | 2021-02-23 15:17:46 -0400 | [diff] [blame] | 4 | select IOMMU_API |
Jason Gunthorpe | b2b12db | 2021-03-04 21:30:03 -0400 | [diff] [blame] | 5 | select VFIO_IOMMU_TYPE1 if MMU && (X86 || S390 || ARM || ARM64) |
Alex Williamson | cba3345 | 2012-07-31 08:16:22 -0600 | [diff] [blame] | 6 | help |
| 7 | VFIO provides a framework for secure userspace device drivers. |
Mauro Carvalho Chehab | baa293e | 2019-06-27 15:39:22 -0300 | [diff] [blame] | 8 | See Documentation/driver-api/vfio.rst for more details. |
Alex Williamson | cba3345 | 2012-07-31 08:16:22 -0600 | [diff] [blame] | 9 | |
| 10 | If you don't know what to do here, say N. |
Alex Williamson | 89e1f7d | 2012-07-31 08:16:24 -0600 | [diff] [blame] | 11 | |
Jason Gunthorpe | 85c94dc | 2021-08-26 13:39:11 +0300 | [diff] [blame] | 12 | if VFIO |
| 13 | config VFIO_IOMMU_TYPE1 |
| 14 | tristate |
| 15 | default n |
| 16 | |
| 17 | config VFIO_IOMMU_SPAPR_TCE |
| 18 | tristate |
| 19 | depends on SPAPR_TCE_IOMMU |
| 20 | default VFIO |
| 21 | |
| 22 | config VFIO_SPAPR_EEH |
| 23 | tristate |
| 24 | depends on EEH && VFIO_IOMMU_SPAPR_TCE |
| 25 | default VFIO |
| 26 | |
| 27 | config VFIO_VIRQFD |
| 28 | tristate |
| 29 | select EVENTFD |
| 30 | default n |
| 31 | |
Jason Gunthorpe | 26c22cfd | 2021-07-16 15:39:12 -0300 | [diff] [blame] | 32 | config VFIO_NOIOMMU |
Alex Williamson | 03a76b6 | 2015-12-21 15:13:33 -0700 | [diff] [blame] | 33 | bool "VFIO No-IOMMU support" |
Alex Williamson | 03a76b6 | 2015-12-21 15:13:33 -0700 | [diff] [blame] | 34 | help |
| 35 | VFIO is built on the ability to isolate devices using the IOMMU. |
| 36 | Only with an IOMMU can userspace access to DMA capable devices be |
| 37 | considered secure. VFIO No-IOMMU mode enables IOMMU groups for |
| 38 | devices without IOMMU backing for the purpose of re-using the VFIO |
| 39 | infrastructure in a non-secure mode. Use of this mode will result |
| 40 | in an unsupportable kernel and will therefore taint the kernel. |
| 41 | Device assignment to virtual machines is also not possible with |
| 42 | this mode since there is no IOMMU to provide DMA translation. |
| 43 | |
| 44 | If you don't know what to do here, say N. |
| 45 | |
Alex Williamson | 89e1f7d | 2012-07-31 08:16:24 -0600 | [diff] [blame] | 46 | source "drivers/vfio/pci/Kconfig" |
Antonios Motakis | 5316153 | 2015-03-16 14:08:44 -0600 | [diff] [blame] | 47 | source "drivers/vfio/platform/Kconfig" |
Kirti Wankhede | 7b96953 | 2016-11-17 02:16:13 +0530 | [diff] [blame] | 48 | source "drivers/vfio/mdev/Kconfig" |
Bharat Bhushan | fb1ff4c | 2020-10-05 20:36:45 +0300 | [diff] [blame] | 49 | source "drivers/vfio/fsl-mc/Kconfig" |
Jason Gunthorpe | 85c94dc | 2021-08-26 13:39:11 +0300 | [diff] [blame] | 50 | endif |
| 51 | |
Feng Wu | 6d7425f | 2015-09-18 22:29:50 +0800 | [diff] [blame] | 52 | source "virt/lib/Kconfig" |