blob: 67d0bf4efa16066c8437efafbcee323d71fedc41 [file] [log] [blame]
Thomas Gleixnerec8f24b2019-05-19 13:07:45 +01001# SPDX-License-Identifier: GPL-2.0-only
Alex Williamson73fa0d12012-07-31 08:16:23 -06002config VFIO_IOMMU_TYPE1
3 tristate
4 depends on VFIO
5 default n
6
Alexey Kardashevskiy5ffd2292013-05-21 13:33:10 +10007config VFIO_IOMMU_SPAPR_TCE
8 tristate
9 depends on VFIO && SPAPR_TCE_IOMMU
Michael Ellermand88423f2017-02-08 13:13:25 -070010 default VFIO
Alexey Kardashevskiy5ffd2292013-05-21 13:33:10 +100011
Gavin Shan92d18a62014-08-08 10:36:20 -060012config VFIO_SPAPR_EEH
13 tristate
14 depends on EEH && VFIO_IOMMU_SPAPR_TCE
Michael Ellermand88423f2017-02-08 13:13:25 -070015 default VFIO
Gavin Shan92d18a62014-08-08 10:36:20 -060016
Alex Williamson71be3422015-03-17 08:33:38 -060017config VFIO_VIRQFD
18 tristate
19 depends on VFIO && EVENTFD
20 default n
21
Alex Williamsoncba33452012-07-31 08:16:22 -060022menuconfig VFIO
23 tristate "VFIO Non-Privileged userspace driver framework"
Jason Gunthorpe179209f2021-02-23 15:17:46 -040024 select IOMMU_API
Jason Gunthorpeb2b12db2021-03-04 21:30:03 -040025 select VFIO_IOMMU_TYPE1 if MMU && (X86 || S390 || ARM || ARM64)
Alex Williamsoncba33452012-07-31 08:16:22 -060026 help
27 VFIO provides a framework for secure userspace device drivers.
Mauro Carvalho Chehabbaa293e2019-06-27 15:39:22 -030028 See Documentation/driver-api/vfio.rst for more details.
Alex Williamsoncba33452012-07-31 08:16:22 -060029
30 If you don't know what to do here, say N.
Alex Williamson89e1f7d2012-07-31 08:16:24 -060031
Alex Williamson03a76b62015-12-21 15:13:33 -070032menuconfig VFIO_NOIOMMU
33 bool "VFIO No-IOMMU support"
34 depends on VFIO
35 help
36 VFIO is built on the ability to isolate devices using the IOMMU.
37 Only with an IOMMU can userspace access to DMA capable devices be
38 considered secure. VFIO No-IOMMU mode enables IOMMU groups for
39 devices without IOMMU backing for the purpose of re-using the VFIO
40 infrastructure in a non-secure mode. Use of this mode will result
41 in an unsupportable kernel and will therefore taint the kernel.
42 Device assignment to virtual machines is also not possible with
43 this mode since there is no IOMMU to provide DMA translation.
44
45 If you don't know what to do here, say N.
46
Alex Williamson89e1f7d2012-07-31 08:16:24 -060047source "drivers/vfio/pci/Kconfig"
Antonios Motakis53161532015-03-16 14:08:44 -060048source "drivers/vfio/platform/Kconfig"
Kirti Wankhede7b969532016-11-17 02:16:13 +053049source "drivers/vfio/mdev/Kconfig"
Bharat Bhushanfb1ff4c2020-10-05 20:36:45 +030050source "drivers/vfio/fsl-mc/Kconfig"
Feng Wu6d7425f2015-09-18 22:29:50 +080051source "virt/lib/Kconfig"