Re: [PATCH] KVM: SVM: Treat SVM as unsupported when running as an SEV guest

2021-02-03 Thread Paolo Bonzini
On 02/02/21 22:20, Sean Christopherson wrote: Don't let KVM load when running as an SEV guest, regardless of what CPUID says. Memory is encrypted with a key that is not accessible to the host (L0), thus it's impossible for L0 to emulate SVM, e.g. it'll see garbage when reading the VMCB. Technic

[PATCH] KVM: SVM: Treat SVM as unsupported when running as an SEV guest

2021-02-02 Thread Sean Christopherson
Don't let KVM load when running as an SEV guest, regardless of what CPUID says. Memory is encrypted with a key that is not accessible to the host (L0), thus it's impossible for L0 to emulate SVM, e.g. it'll see garbage when reading the VMCB. Technically, KVM could decrypt all memory that needs to