Blame view

drivers/vfio/Kconfig 1.43 KB
81f7e3824   Eric Lee   Initial Release, ...
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  config VFIO_IOMMU_TYPE1
  	tristate
  	depends on VFIO
  	default n
  
  config VFIO_IOMMU_SPAPR_TCE
  	tristate
  	depends on VFIO && SPAPR_TCE_IOMMU
  	default VFIO
  
  config VFIO_SPAPR_EEH
  	tristate
  	depends on EEH && VFIO_IOMMU_SPAPR_TCE
  	default VFIO
  
  config VFIO_VIRQFD
  	tristate
  	depends on VFIO && EVENTFD
  	default n
  
  menuconfig VFIO
  	tristate "VFIO Non-Privileged userspace driver framework"
  	depends on IOMMU_API
  	select VFIO_IOMMU_TYPE1 if (X86 || S390 || ARM_SMMU || ARM_SMMU_V3)
  	select ANON_INODES
  	help
  	  VFIO provides a framework for secure userspace device drivers.
  	  See Documentation/vfio.txt for more details.
  
  	  If you don't know what to do here, say N.
  
  menuconfig VFIO_NOIOMMU
  	bool "VFIO No-IOMMU support"
  	depends on VFIO
  	help
  	  VFIO is built on the ability to isolate devices using the IOMMU.
  	  Only with an IOMMU can userspace access to DMA capable devices be
  	  considered secure.  VFIO No-IOMMU mode enables IOMMU groups for
  	  devices without IOMMU backing for the purpose of re-using the VFIO
  	  infrastructure in a non-secure mode.  Use of this mode will result
  	  in an unsupportable kernel and will therefore taint the kernel.
  	  Device assignment to virtual machines is also not possible with
  	  this mode since there is no IOMMU to provide DMA translation.
  
  	  If you don't know what to do here, say N.
  
  source "drivers/vfio/pci/Kconfig"
  source "drivers/vfio/platform/Kconfig"
  source "drivers/vfio/mdev/Kconfig"
  source "virt/lib/Kconfig"