Skip to content

Commit 9031b42

Browse files
sean-jcbonzini
authored andcommitted
KVM: nVMX: Always handle #VEs in L0 (never forward #VEs from L2 to L1)
Always handle #VEs, e.g. due to prove EPT Violation #VE failures, in L0, as KVM does not expose any #VE capabilities to L1, i.e. any and all #VEs are KVM's responsibility. Fixes: 8131cf5 ("KVM: VMX: Introduce test mode related to EPT violation VE") Signed-off-by: Sean Christopherson <[email protected]> Message-ID: <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
1 parent d1b32ec commit 9031b42

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

arch/x86/kvm/vmx/nested.c

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6233,6 +6233,8 @@ static bool nested_vmx_l0_wants_exit(struct kvm_vcpu *vcpu,
62336233
else if (is_alignment_check(intr_info) &&
62346234
!vmx_guest_inject_ac(vcpu))
62356235
return true;
6236+
else if (is_ve_fault(intr_info))
6237+
return true;
62366238
return false;
62376239
case EXIT_REASON_EXTERNAL_INTERRUPT:
62386240
return true;

0 commit comments

Comments
 (0)