nVMX x86: Add check for APIC-access address

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



According to the sub-section titled 'VM-Execution Control Fields' in the
section titled 'Basic VM-Entry Checks' in Intel SDM vol. 3C, the following
vmentry check must be enforced:

    If the “virtualize APIC-accesses” VM-execution control is 1, the
    APIC-access address must satisfy the following checks:

	- Bits 11:0 of the address must be 0.
	- The address should not set any bits beyond the processor’s
	  physical-address width.

This patch adds,
	i)  the necessary KVM check to enforce the rule
	ii) a unit test to validate the rule


[PATCH nVMX 1/2] x86: Add check for APIC access address for vmentry of L2
[PATCH nVMX TEST 2/2] x86: Add test for checking APIC-access page on vmentry of L2

 arch/x86/kvm/vmx.c | 13 +++++++++++++
 1 file changed, 13 insertions(+)

Krish Sadhukhan (1):
      x86: Add check for APIC access address for vmentry of L2 guests

 x86/vmx_tests.c | 59 ++++++++++++++++++++++++++++++++++++++++++++++++++---------
 1 file changed, 50 insertions(+), 9 deletions(-)

Krish Sadhukhan (1):
      x86: Add test for checking APIC-access page on vmentry of L2 guests



[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux