Li Zhijian <zhijianx.li@xxxxxxxxx> writes: > 0Day robot noticed that "FAIL: EPT - MMIO access" since kernel commit > d1766202: ("x86/kvm/lapic: always disable MMIO interface in x2APIC mode") > > As the changelog said, MMIO accessing is disabled in x2APIC mode > which is a common feature in modern CPUs, so disable x2APIC mode when the tests > try to access lapic MMIO accrodingly > > CC: Rong Chen <rong.a.chen@xxxxxxxxx> > CC: Philip Li <philip.li@xxxxxxxxx> > CC: 0day robot <lkp@xxxxxxxxx> > CC: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx> > Signed-off-by: Li Zhijian <zhijianx.li@xxxxxxxxx> Yesterday I sent a patch fixing the issue: https://www.spinics.net/lists/kvm/msg176052.html the patch is different but the idea is the same. > --- > x86/unittests.cfg | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/x86/unittests.cfg b/x86/unittests.cfg > index 3b21a85..883dd82 100644 > --- a/x86/unittests.cfg > +++ b/x86/unittests.cfg > @@ -340,7 +340,7 @@ groups = vmx > > [vmx_EPT_AD_disabled] > file = vmx.flat > -extra_params = -cpu host,+vmx -append EPT_A/D_disabled > +extra_params = -cpu host,+vmx,-x2apic -append EPT_A/D_disabled > arch = x86_64 > groups = vmx -- Vitaly