diff options
author | Nadav Amit <namit@vmware.com> | 2020-07-10 11:33:18 -0700 |
---|---|---|
committer | Paolo Bonzini <pbonzini@redhat.com> | 2020-07-10 16:45:07 -0400 |
commit | a6051f06a15c2d69cadcae565648247663a9e72e (patch) | |
tree | 48ea153211881c8b65b8c61d44c29da54042610c | |
parent | d86ef5851964521c4558e73e43187912718e6746 (diff) | |
download | kvm-unit-tests-a6051f06a15c2d69cadcae565648247663a9e72e.tar.gz |
x86: svm: present bit is set on nested page-faults
On nested page-faults due to write-protect or reserved bits, the
present-bit in EXITINFO1 is set, as confirmed on bare-metal. Set the
expected result accordingly.
This indicates that KVM has a bug.
Signed-off-by: Nadav Amit <namit@vmware.com>
Message-Id: <20200710183320.27266-3-namit@vmware.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
-rw-r--r-- | x86/svm_tests.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/x86/svm_tests.c b/x86/svm_tests.c index af50252..3b0d019 100644 --- a/x86/svm_tests.c +++ b/x86/svm_tests.c @@ -815,7 +815,7 @@ static bool npt_rw_pfwalk_check(struct svm_test *test) *pte |= (1ULL << 1); return (vmcb->control.exit_code == SVM_EXIT_NPF) - && (vmcb->control.exit_info_1 == 0x200000006ULL) + && (vmcb->control.exit_info_1 == 0x200000007ULL) && (vmcb->control.exit_info_2 == read_cr3()); } @@ -834,7 +834,7 @@ static bool npt_rsvd_pfwalk_check(struct svm_test *test) pdpe[0] &= ~(1ULL << 8); return (vmcb->control.exit_code == SVM_EXIT_NPF) - && (vmcb->control.exit_info_1 == 0x20000000eULL); + && (vmcb->control.exit_info_1 == 0x20000000fULL); } static void npt_l1mmio_prepare(struct svm_test *test) |