16.04.24 12:36, Andrew Cooper:
Everything else seems ok, but there's no inherent dependency between
VMX/SVM and IOMMUs. There are certain features (HAP/IOMMU pagetable
sharing, posted interrupts) which do depend on both, but the vast
majority of functionality is independent.
It would be a legi
hi Teddy,
16.04.24 11:40, Teddy Astie:
Hello Sergiy,
Also make INTEL_IOMMU/AMD_IOMMU options dependant on VMX/SVM options.
The discussion in the RFC series stated the IOMMU may be used with PV
guests, and doesn't rely on VMX/SVM support (in fact, it can be used
without HVM support in Xen).
On 16/04/2024 7:50 am, Sergiy Kibrik wrote:
> From: Xenia Ragiadakou
>
> Provide the user with configuration control over the cpu virtualization
> support
> in Xen by making SVM and VMX options user selectable.
>
> To preserve the current default behavior, both options depend on HVM and
> default
Hello Sergiy,
> Also make INTEL_IOMMU/AMD_IOMMU options dependant on VMX/SVM options.
The discussion in the RFC series stated the IOMMU may be used with PV
guests, and doesn't rely on VMX/SVM support (in fact, it can be used
without HVM support in Xen).
However, in the discussion, posted inter
From: Xenia Ragiadakou
Provide the user with configuration control over the cpu virtualization support
in Xen by making SVM and VMX options user selectable.
To preserve the current default behavior, both options depend on HVM and
default to Y.
To prevent users from unknowingly disabling virtual