KVM disables "virtualize APIC-accesses" if the APIC-access page cannot be mapped (the feature is effectively disabled anyways if the guest can't access the page), i.e. KVM doesn't incorrectly signal VMFail on a legal-but-unbacked APIC-access page. Cc: Paolo Bonzini <pbonzini@xxxxxxxxxx> Signed-off-by: Sean Christopherson <sean.j.christopherson@xxxxxxxxx> --- x86/vmx_tests.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/x86/vmx_tests.c b/x86/vmx_tests.c index 031bf66..196c00d 100644 --- a/x86/vmx_tests.c +++ b/x86/vmx_tests.c @@ -3579,7 +3579,7 @@ static void test_apic_access_addr(void) test_vmcs_page_reference(CPU_VIRT_APIC_ACCESSES, APIC_ACCS_ADDR, "APIC-access address", - "virtualize APIC-accesses", true, false); + "virtualize APIC-accesses", false, false); } static bool set_bit_pattern(u8 mask, u32 *secondary) -- 2.18.0