1 # SPDX-License-Identifier: GPL-2.0
6 source "virt/kvm/Kconfig"
8 menuconfig VIRTUALIZATION
10 depends on HAVE_KVM || X86
13 Say Y here to get to see options for using your Linux host to run other
14 operating systems inside virtual machines (guests).
15 This option alone does not add any kernel code.
17 If you say N, all options in this submenu will be skipped and disabled.
22 tristate "Kernel-based Virtual Machine (KVM) support"
24 depends on HIGH_RES_TIMERS
25 depends on X86_LOCAL_APIC
26 select PREEMPT_NOTIFIERS
27 select KVM_GENERIC_MMU_NOTIFIER
28 select HAVE_KVM_IRQCHIP
29 select HAVE_KVM_PFNCACHE
30 select HAVE_KVM_DIRTY_RING_TSO
31 select HAVE_KVM_DIRTY_RING_ACQ_REL
32 select IRQ_BYPASS_MANAGER
33 select HAVE_KVM_IRQ_BYPASS
34 select HAVE_KVM_IRQ_ROUTING
36 select USER_RETURN_NOTIFIER
40 select GUEST_PERF_EVENTS
42 select HAVE_KVM_CPU_RELAX_INTERCEPT
43 select HAVE_KVM_NO_POLL
44 select KVM_XFER_TO_GUEST_WORK
45 select KVM_GENERIC_DIRTYLOG_READ_PROTECT
48 select HAVE_KVM_PM_NOTIFIER if PM
49 select KVM_GENERIC_HARDWARE_ENABLING
51 Support hosting fully virtualized guest machines using hardware
52 virtualization extensions. You will need a fairly recent
53 processor equipped with virtualization extensions. You will also
54 need to select one or more of the processor modules below.
56 This module provides access to the hardware capabilities through
57 a character device node named /dev/kvm.
59 To compile this as a module, choose M here: the module
65 bool "Compile KVM with -Werror"
66 # KASAN may cause the build to fail due to larger frames
67 default y if X86_64 && !KASAN
68 # We use the dependency on !COMPILE_TEST to not be enabled
69 # blindly in allmodconfig or allyesconfig configurations
71 depends on (X86_64 && !KASAN) || !COMPILE_TEST
74 Add -Werror to the build flags for KVM.
78 config KVM_SW_PROTECTED_VM
79 bool "Enable support for KVM software-protected VMs"
82 select KVM_GENERIC_PRIVATE_MEM
84 Enable support for KVM software-protected VMs. Currently "protected"
85 means the VM can be backed with memory provided by
86 KVM_CREATE_GUEST_MEMFD.
91 tristate "KVM for Intel (and compatible) processors support"
92 depends on KVM && IA32_FEAT_CTL
94 Provides support for KVM on processors equipped with Intel's VT
95 extensions, a.k.a. Virtual Machine Extensions (VMX).
97 To compile this as a module, choose M here: the module
98 will be called kvm-intel.
101 bool "Software Guard eXtensions (SGX) Virtualization"
102 depends on X86_SGX && KVM_INTEL
105 Enables KVM guests to create SGX enclaves.
107 This includes support to expose "raw" unreclaimable enclave memory to
108 guests via a device node, e.g. /dev/sgx_vepc.
113 tristate "KVM for AMD processors support"
114 depends on KVM && (CPU_SUP_AMD || CPU_SUP_HYGON)
116 Provides support for KVM on AMD processors equipped with the AMD-V
119 To compile this as a module, choose M here: the module
120 will be called kvm-amd.
124 bool "AMD Secure Encrypted Virtualization (SEV) support"
125 depends on KVM_AMD && X86_64
126 depends on CRYPTO_DEV_SP_PSP && !(KVM_AMD=y && CRYPTO_DEV_CCP_DD=m)
128 Provides support for launching Encrypted VMs (SEV) and Encrypted VMs
129 with Encrypted State (SEV-ES) on AMD processors.
132 bool "System Management Mode emulation"
136 Provides support for KVM to emulate System Management Mode (SMM)
137 in virtual machines. This can be used by the virtual machine
138 firmware to implement UEFI secure boot.
143 bool "Support for Xen hypercall interface"
146 Provides KVM support for the hosting Xen HVM guests and
147 passing Xen hypercalls to userspace.
149 If in doubt, say "N".
152 bool "Prove KVM MMU correctness"
153 depends on DEBUG_KERNEL
157 Enables runtime assertions in KVM's MMU that are too costly to enable
158 in anything remotely resembling a production environment, e.g. this
159 gates code that verifies a to-be-freed page table doesn't have any
162 If in doubt, say "N".
164 config KVM_EXTERNAL_WRITE_TRACKING
167 config KVM_MAX_NR_VCPUS
168 int "Maximum number of vCPUs per KVM guest"
171 default 4096 if MAXSMP
174 Set the maximum number of vCPUs per KVM guest. Larger values will increase
175 the memory footprint of each KVM guest, regardless of how many vCPUs are
176 created for a given VM.
178 endif # VIRTUALIZATION