Skip to content

Commit 40e8a69

Browse files
sean-jcbonzini
authored andcommitted
KVM: VMX: Don't kill the VM on an unexpected #VE
Don't terminate the VM on an unexpected #VE, as it's extremely unlikely the #VE is fatal to the guest, and even less likely that it presents a danger to the host. Simply resume the guest on "failure", as the #VE info page's BUSY field will prevent converting any more EPT Violations to #VEs for the vCPU (at least, that's what the BUSY field is supposed to do). Signed-off-by: Sean Christopherson <[email protected]> Message-ID: <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
1 parent 803482f commit 40e8a69

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

arch/x86/kvm/vmx/vmx.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5217,8 +5217,8 @@ static int handle_exception_nmi(struct kvm_vcpu *vcpu)
52175217
if (is_invalid_opcode(intr_info))
52185218
return handle_ud(vcpu);
52195219

5220-
if (KVM_BUG_ON(is_ve_fault(intr_info), vcpu->kvm))
5221-
return -EIO;
5220+
if (WARN_ON_ONCE(is_ve_fault(intr_info)))
5221+
return 1;
52225222

52235223
error_code = 0;
52245224
if (intr_info & INTR_INFO_DELIVER_CODE_MASK)

0 commit comments

Comments
 (0)