1# SPDX-License-Identifier: GPL-2.0-only 2 3config GUNYAH_HYPERCALLS 4 tristate 5 6config GUNYAH 7 tristate "Gunyah Virtualization drivers" 8 depends on ARM64 9 select GUNYAH_PLATFORM_HOOKS 10 select AUXILIARY_BUS 11 imply GUNYAH_QCOM_PLATFORM if ARCH_QCOM 12 select GUNYAH_HYPERCALLS 13 help 14 The Gunyah drivers are the helper interfaces that run in a guest VM 15 such as basic inter-VM IPC and signaling mechanisms, and higher level 16 services such as memory/device sharing, IRQ sharing, and so on. 17 18 Say Y/M here to enable the drivers needed to interact in a Gunyah 19 virtual environment. 20 21config GUNYAH_PLATFORM_HOOKS 22 tristate 23 24config GUNYAH_QCOM_PLATFORM 25 tristate "Support for Gunyah on Qualcomm platforms" 26 depends on GUNYAH 27 select GUNYAH_PLATFORM_HOOKS 28 select QCOM_SCM 29 help 30 Enable support for interacting with Gunyah on Qualcomm 31 platforms. Interaction with Qualcomm firmware requires 32 extra platform-specific support. 33 34 Say Y/M here to use Gunyah on Qualcomm platforms. 35 36config GUNYAH_IRQFD 37 tristate "Gunyah irqfd interface" 38 depends on GUNYAH 39 help 40 Enable kernel support for creating irqfds which can raise an interrupt 41 on Gunyah virtual machine. 42 43 Say Y/M here if unsure and you want to support Gunyah VMMs. 44 45config GUNYAH_IOEVENTFD 46 tristate "Gunyah ioeventfd interface" 47 depends on GUNYAH 48 help 49 Enable kernel support for creating ioeventfds which can alert userspace 50 when a Gunyah virtual machine accesses a memory address. 51 52 Say Y/M here if unsure and you want to support Gunyah VMMs. 53 54config GUNYAH_QCOM_TRUSTED_VM 55 tristate "Gunyah Qualcomm Trusted VM Support" 56 depends on GUNYAH 57 help 58 Enable kernel support for creating Qualcomm Trusted VMs. 59 They are a kind of protected VM which is authenticated by the 60 firmware. 61 62 Say Y/M here if unsure and you want to support QTVMs. 63