[Part2 PATCH v4 27/29] KVM: SVM: Do not install #UD intercept when SEV is enabled

2017-09-19 Thread Brijesh Singh
On #UD, x86_emulate_instruction() fetches the data from guest memory and decodes the instruction bytes to assist further. When SEV is enabled, the instruction bytes will be encrypted using the guest-specific key and the hypervisor will no longer able to fetch the instruction bytes to assist UD

[Part2 PATCH v4 27/29] KVM: SVM: Do not install #UD intercept when SEV is enabled

2017-09-19 Thread Brijesh Singh
On #UD, x86_emulate_instruction() fetches the data from guest memory and decodes the instruction bytes to assist further. When SEV is enabled, the instruction bytes will be encrypted using the guest-specific key and the hypervisor will no longer able to fetch the instruction bytes to assist UD