Linux Audio

Check our new training course

Loading...
v4.6
 1config VFIO_IOMMU_TYPE1
 2	tristate
 3	depends on VFIO
 4	default n
 5
 6config VFIO_IOMMU_SPAPR_TCE
 7	tristate
 8	depends on VFIO && SPAPR_TCE_IOMMU
 9	default n
10
11config VFIO_SPAPR_EEH
12	tristate
13	depends on EEH && VFIO_IOMMU_SPAPR_TCE
14	default n
15
16config VFIO_VIRQFD
17	tristate
18	depends on VFIO && EVENTFD
19	default n
20
21menuconfig VFIO
22	tristate "VFIO Non-Privileged userspace driver framework"
23	depends on IOMMU_API
24	select VFIO_IOMMU_TYPE1 if (X86 || S390 || ARM_SMMU || ARM_SMMU_V3)
25	select VFIO_IOMMU_SPAPR_TCE if (PPC_POWERNV || PPC_PSERIES)
26	select VFIO_SPAPR_EEH if (PPC_POWERNV || PPC_PSERIES)
27	select ANON_INODES
 
28	help
29	  VFIO provides a framework for secure userspace device drivers.
30	  See Documentation/vfio.txt for more details.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
31
32	  If you don't know what to do here, say N.
33
34menuconfig VFIO_NOIOMMU
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
35	bool "VFIO No-IOMMU support"
36	depends on VFIO
37	help
38	  VFIO is built on the ability to isolate devices using the IOMMU.
39	  Only with an IOMMU can userspace access to DMA capable devices be
40	  considered secure.  VFIO No-IOMMU mode enables IOMMU groups for
41	  devices without IOMMU backing for the purpose of re-using the VFIO
42	  infrastructure in a non-secure mode.  Use of this mode will result
43	  in an unsupportable kernel and will therefore taint the kernel.
44	  Device assignment to virtual machines is also not possible with
45	  this mode since there is no IOMMU to provide DMA translation.
46
47	  If you don't know what to do here, say N.
48
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
49source "drivers/vfio/pci/Kconfig"
50source "drivers/vfio/platform/Kconfig"
 
 
 
 
 
51source "virt/lib/Kconfig"
v6.13.7
  1# SPDX-License-Identifier: GPL-2.0-only
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
  2menuconfig VFIO
  3	tristate "VFIO Non-Privileged userspace driver framework"
  4	select IOMMU_API
  5	depends on IOMMUFD || !IOMMUFD
  6	select INTERVAL_TREE
  7	select VFIO_GROUP if SPAPR_TCE_IOMMU || IOMMUFD=n
  8	select VFIO_DEVICE_CDEV if !VFIO_GROUP
  9	select VFIO_CONTAINER if IOMMUFD=n
 10	help
 11	  VFIO provides a framework for secure userspace device drivers.
 12	  See Documentation/driver-api/vfio.rst for more details.
 13
 14	  If you don't know what to do here, say N.
 15
 16if VFIO
 17config VFIO_DEVICE_CDEV
 18	bool "Support for the VFIO cdev /dev/vfio/devices/vfioX"
 19	depends on IOMMUFD && !SPAPR_TCE_IOMMU
 20	default !VFIO_GROUP
 21	help
 22	  The VFIO device cdev is another way for userspace to get device
 23	  access. Userspace gets device fd by opening device cdev under
 24	  /dev/vfio/devices/vfioX, and then bind the device fd with an iommufd
 25	  to set up secure DMA context for device access.  This interface does
 26	  not support noiommu.
 27
 28	  If you don't know what to do here, say N.
 29
 30config VFIO_GROUP
 31	bool "Support for the VFIO group /dev/vfio/$group_id"
 32	default y
 33	help
 34	   VFIO group support provides the traditional model for accessing
 35	   devices through VFIO and is used by the majority of userspace
 36	   applications and drivers making use of VFIO.
 37
 38	   If you don't know what to do here, say Y.
 39
 40config VFIO_CONTAINER
 41	bool "Support for the VFIO container /dev/vfio/vfio"
 42	select VFIO_IOMMU_TYPE1 if MMU && (X86 || S390 || ARM || ARM64)
 43	depends on VFIO_GROUP
 44	default y
 45	help
 46	  The VFIO container is the classic interface to VFIO for establishing
 47	  IOMMU mappings. If N is selected here then IOMMUFD must be used to
 48	  manage the mappings.
 49
 50	  Unless testing IOMMUFD say Y here.
 51
 52if VFIO_CONTAINER
 53config VFIO_IOMMU_TYPE1
 54	tristate
 55	default n
 56
 57config VFIO_IOMMU_SPAPR_TCE
 58	tristate
 59	depends on SPAPR_TCE_IOMMU
 60	default VFIO
 61endif
 62
 63config VFIO_NOIOMMU
 64	bool "VFIO No-IOMMU support"
 65	depends on VFIO_GROUP
 66	help
 67	  VFIO is built on the ability to isolate devices using the IOMMU.
 68	  Only with an IOMMU can userspace access to DMA capable devices be
 69	  considered secure.  VFIO No-IOMMU mode enables IOMMU groups for
 70	  devices without IOMMU backing for the purpose of re-using the VFIO
 71	  infrastructure in a non-secure mode.  Use of this mode will result
 72	  in an unsupportable kernel and will therefore taint the kernel.
 73	  Device assignment to virtual machines is also not possible with
 74	  this mode since there is no IOMMU to provide DMA translation.
 75
 76	  If you don't know what to do here, say N.
 77
 78config VFIO_VIRQFD
 79	bool
 80	select EVENTFD
 81	default n
 82
 83config VFIO_DEBUGFS
 84	bool "Export VFIO internals in DebugFS"
 85	depends on DEBUG_FS
 86	help
 87	  Allows exposure of VFIO device internals. This option enables
 88	  the use of debugfs by VFIO drivers as required. The device can
 89	  cause the VFIO code create a top-level debug/vfio directory
 90	  during initialization, and then populate a subdirectory with
 91	  entries as required.
 92
 93source "drivers/vfio/pci/Kconfig"
 94source "drivers/vfio/platform/Kconfig"
 95source "drivers/vfio/mdev/Kconfig"
 96source "drivers/vfio/fsl-mc/Kconfig"
 97source "drivers/vfio/cdx/Kconfig"
 98endif
 99
100source "virt/lib/Kconfig"