KVM: selftests: test behavior of unmapped L2 APIC-access address
Add a regression test for commit 671ddc700fd0 ("KVM: nVMX: Don't leak
L1 MMIO regions to L2").
First, check to see that an L2 guest can be launched with a valid
APIC-access address that is backed by a page of L1 physical memory.
Next, set the APIC-access address to a (valid) L1 physical address
that is not backed by memory. KVM can't handle this situation, so
resuming L2 should result in a KVM exit for internal error
Signed-off-by: Jim Mattson <email@example.com>
Reviewed-by: Ricardo Koller <firstname.lastname@example.org>
Reviewed-by: Peter Shier <email@example.com>
Signed-off-by: Paolo Bonzini <firstname.lastname@example.org>
5 files changed