On 07/18/2018 01:26 PM, Sean Christopherson wrote:
KVM disables "virtualize APIC-accesses" if the APIC-access page
cannot be mapped (the feature is effectively disabled anyways if
the guest can't access the page), i.e. KVM doesn't incorrectly
signal VMFail on a legal-but-unbacked APIC-access page.
Cc: Paolo Bonzini <pbonzini@xxxxxxxxxx>
Signed-off-by: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
---
x86/vmx_tests.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/x86/vmx_tests.c b/x86/vmx_tests.c
index 031bf66..196c00d 100644
--- a/x86/vmx_tests.c
+++ b/x86/vmx_tests.c
@@ -3579,7 +3579,7 @@ static void test_apic_access_addr(void)
test_vmcs_page_reference(CPU_VIRT_APIC_ACCESSES, APIC_ACCS_ADDR,
"APIC-access address",
- "virtualize APIC-accesses", true, false);
+ "virtualize APIC-accesses", false, false);
}
static bool set_bit_pattern(u8 mask, u32 *secondary)
Reviewed-by: Krish Sadhukhan <krish.sadhukhan@xxxxxxxxxx>