diff --git a/misc/config_tools/schema/VMtypes.xsd b/misc/config_tools/schema/VMtypes.xsd index 7b9046cd7..3cc93c613 100644 --- a/misc/config_tools/schema/VMtypes.xsd +++ b/misc/config_tools/schema/VMtypes.xsd @@ -60,6 +60,11 @@ + + + If the GUEST_FLAG_NVMX_ENABLED is set, GUEST_FLAG_LAPIC_PASSTHROUGH must be set as well. + + diff --git a/misc/config_tools/schema/config.xsd b/misc/config_tools/schema/config.xsd index 778098e7c..4ce021be8 100644 --- a/misc/config_tools/schema/config.xsd +++ b/misc/config_tools/schema/config.xsd @@ -422,6 +422,12 @@ its ``id`` attribute. When it is enabled, specify which target VM's vUART the cu + + + + SOS cannot use LAPIC passthrough unless GUEST_FLAG_NVMX_ENABLED is set. + + @@ -445,6 +451,12 @@ to launch post-launched User VMs. + + + + Per VM GUEST_FLAG_NVMX_ENABLED can be set only if CONFIG_NVMX_ENABLED is set. + + diff --git a/misc/hv_prebuild/vm_cfg_checks.c b/misc/hv_prebuild/vm_cfg_checks.c index 3c628cb0b..8620c1580 100644 --- a/misc/hv_prebuild/vm_cfg_checks.c +++ b/misc/hv_prebuild/vm_cfg_checks.c @@ -140,9 +140,6 @@ bool sanitize_vm_config(void) } break; case SOS_VM: - if ((vm_config->severity != (uint8_t)SEVERITY_SOS) || ((vm_config->guest_flags & GUEST_FLAG_LAPIC_PASSTHROUGH) != 0U)) { - ret = false; - } break; case POST_LAUNCHED_VM: if ((vm_config->severity == (uint8_t)SEVERITY_SAFETY_VM) || (vm_config->severity == (uint8_t)SEVERITY_SOS)) {