diff mbox

[kvm-unit-tests,4/4] x86: vmx: remove xfail from invalid APIC-access page tests

Message ID 20180718202651.19802-5-sean.j.christopherson@intel.com (mailing list archive)
State New, archived
Headers show

Commit Message

Sean Christopherson July 18, 2018, 8:26 p.m. UTC
KVM disables "virtualize APIC-accesses" if the APIC-access page
cannot be mapped (the feature is effectively disabled anyways if
the guest can't access the page), i.e. KVM doesn't incorrectly
signal VMFail on a legal-but-unbacked APIC-access page.

Cc: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Sean Christopherson <sean.j.christopherson@intel.com>
---
 x86/vmx_tests.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

Comments

Krish Sadhukhan July 19, 2018, 12:36 a.m. UTC | #1
On 07/18/2018 01:26 PM, Sean Christopherson wrote:
> KVM disables "virtualize APIC-accesses" if the APIC-access page
> cannot be mapped (the feature is effectively disabled anyways if
> the guest can't access the page), i.e. KVM doesn't incorrectly
> signal VMFail on a legal-but-unbacked APIC-access page.
>
> Cc: Paolo Bonzini <pbonzini@redhat.com>
> Signed-off-by: Sean Christopherson <sean.j.christopherson@intel.com>
> ---
>   x86/vmx_tests.c | 2 +-
>   1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/x86/vmx_tests.c b/x86/vmx_tests.c
> index 031bf66..196c00d 100644
> --- a/x86/vmx_tests.c
> +++ b/x86/vmx_tests.c
> @@ -3579,7 +3579,7 @@ static void test_apic_access_addr(void)
>   
>   	test_vmcs_page_reference(CPU_VIRT_APIC_ACCESSES, APIC_ACCS_ADDR,
>   				 "APIC-access address",
> -				 "virtualize APIC-accesses", true, false);
> +				 "virtualize APIC-accesses", false, false);
>   }
>   
>   static bool set_bit_pattern(u8 mask, u32 *secondary)
Reviewed-by: Krish Sadhukhan <krish.sadhukhan@oracle.com>
Peter Shier July 19, 2018, 9 p.m. UTC | #2
On Wed, Jul 18, 2018 at 5:37 PM Krish Sadhukhan
<krish.sadhukhan@oracle.com> wrote:
>
>
>
> On 07/18/2018 01:26 PM, Sean Christopherson wrote:
> > KVM disables "virtualize APIC-accesses" if the APIC-access page
> > cannot be mapped (the feature is effectively disabled anyways if
> > the guest can't access the page), i.e. KVM doesn't incorrectly
> > signal VMFail on a legal-but-unbacked APIC-access page.
> >
> Reviewed-by: Krish Sadhukhan <krish.sadhukhan@oracle.com>
Reviewed-by: Peter Shier <pshier@google.com>
diff mbox

Patch

diff --git a/x86/vmx_tests.c b/x86/vmx_tests.c
index 031bf66..196c00d 100644
--- a/x86/vmx_tests.c
+++ b/x86/vmx_tests.c
@@ -3579,7 +3579,7 @@  static void test_apic_access_addr(void)
 
 	test_vmcs_page_reference(CPU_VIRT_APIC_ACCESSES, APIC_ACCS_ADDR,
 				 "APIC-access address",
-				 "virtualize APIC-accesses", true, false);
+				 "virtualize APIC-accesses", false, false);
 }
 
 static bool set_bit_pattern(u8 mask, u32 *secondary)