EPT A/D disabled (enabled) in vmx from ubuntu_kvm_unit_tests failed with B-azure-4.15

Bug #1993497 reported by Po-Hsu Lin
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
ubuntu-kernel-tests
New
Undecided
Unassigned

Bug Description

This is not a regression, issue spotted after the kvm-unit-test fork update [1]

The vmx on B-azure-4.15 is not failing with "instruction intercept" test (bug 1931956) anymore, but failing with these two tests on different instances instead.

* EPT A/D disabled
  - Standard_D4s_v3-gen2
  - Standard_D4_v4

* EPT A/D enabled
  - Standard_D4_v4

Test log:
 Test suite: EPT A/D disabled
 EPT - guest level 4 page table is not mapped.
 EPT - guest level 4 page table is not mapped.
 PASS: EPT basic framework
 PASS: EPT misconfigurations
 EPT - guest level 4 page table is not mapped.
 PASS: EPT violation - page permission
 EPT - guest level 4 page table is not mapped.
 FAIL: EPT violation - paging structure
 PASS: MMIO EPT violation - read
 PASS: MMIO EPT violation - write
 PASS: EPT - MMIO access
 PASS: EPT - unsupported INVEPT

 Test suite: EPT A/D enabled
 PASS: EPT - guest page table structures A=1/D=1
 PASS: EPT - guest physical address A=1/D=0
 PASS: EPT - guest page table structures A=1/D=1
 PASS: EPT - guest physical address A=1/D=1
 PASS: EPT basic framework
 PASS: EPT misconfigurations
 PASS: EPT - guest page table structures A=1/D=1
 PASS: EPT - guest physical address A=0/D=0
 PASS: EPT violation - page permission
 EPT - guest level 4 page table is not mapped.
 FAIL: EPT violation - paging structure
 PASS: MMIO EPT violation - read
 PASS: MMIO EPT violation - write

I haven't found a way to split these tests out of vmx.

[1] https://lists.ubuntu.com/archives/kernel-team/2022-October/133765.html

Po-Hsu Lin (cypressyew)
summary: - EPT A/D disabled in vmx from ubuntu_kvm_unit_tests failed with
+ EPT A/D disabled (enabled) in vmx from ubuntu_kvm_unit_tests failed with
B-azure-4.15
Po-Hsu Lin (cypressyew)
description: updated
description: updated
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.