Skip to content

Commit 6af6142

Browse files
sean-jcbonzini
authored andcommitted
KVM: x86: Disable KVM_INTEL_PROVE_VE by default
Disable KVM's "prove #VE" support by default, as it provides no functional value, and even its sanity checking benefits are relatively limited. I.e. it should be fully opt-in even on debug kernels, especially since EPT Violation #VE suppression appears to be buggy on some CPUs. Opportunistically add a line in the help text to make it abundantly clear that KVM_INTEL_PROVE_VE should never be enabled in a production environment. Suggested-by: Paolo Bonzini <[email protected]> Signed-off-by: Sean Christopherson <[email protected]> Message-ID: <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
1 parent a5dc0c9 commit 6af6142

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

arch/x86/kvm/Kconfig

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -97,15 +97,17 @@ config KVM_INTEL
9797

9898
config KVM_INTEL_PROVE_VE
9999
bool "Check that guests do not receive #VE exceptions"
100-
default KVM_PROVE_MMU || DEBUG_KERNEL
101-
depends on KVM_INTEL
100+
depends on KVM_INTEL && EXPERT
102101
help
103-
104102
Checks that KVM's page table management code will not incorrectly
105103
let guests receive a virtualization exception. Virtualization
106104
exceptions will be trapped by the hypervisor rather than injected
107105
in the guest.
108106

107+
Note: some CPUs appear to generate spurious EPT Violations #VEs
108+
that trigger KVM's WARN, in particular with eptad=0 and/or nested
109+
virtualization.
110+
109111
If unsure, say N.
110112

111113
config X86_SGX_KVM

0 commit comments

Comments
 (0)