1 config VFIO_IOMMU_TYPE1
6 config VFIO_IOMMU_SPAPR_TCE
8 depends on VFIO && SPAPR_TCE_IOMMU
13 depends on EEH && VFIO_IOMMU_SPAPR_TCE
18 depends on VFIO && EVENTFD
22 tristate "VFIO Non-Privileged userspace driver framework"
24 select VFIO_IOMMU_TYPE1 if (X86 || S390 || ARM_SMMU || ARM_SMMU_V3)
25 select VFIO_IOMMU_SPAPR_TCE if (PPC_POWERNV || PPC_PSERIES)
26 select VFIO_SPAPR_EEH if (PPC_POWERNV || PPC_PSERIES)
29 VFIO provides a framework for secure userspace device drivers.
30 See Documentation/vfio.txt for more details.
32 If you don't know what to do here, say N.
34 menuconfig VFIO_NOIOMMU
35 bool "VFIO No-IOMMU support"
38 VFIO is built on the ability to isolate devices using the IOMMU.
39 Only with an IOMMU can userspace access to DMA capable devices be
40 considered secure. VFIO No-IOMMU mode enables IOMMU groups for
41 devices without IOMMU backing for the purpose of re-using the VFIO
42 infrastructure in a non-secure mode. Use of this mode will result
43 in an unsupportable kernel and will therefore taint the kernel.
44 Device assignment to virtual machines is also not possible with
45 this mode since there is no IOMMU to provide DMA translation.
47 If you don't know what to do here, say N.
49 source "drivers/vfio/pci/Kconfig"
50 source "drivers/vfio/platform/Kconfig"
51 source "virt/lib/Kconfig"