On 14/09/2016 04:33, Michael S. Tsirkin wrote:
> Frankly I don't understand why do you need to mess with boot at all.
> Quoting the cover letter:
> 
>       SEV is designed to protect guest VMs from a benign but vulnerable
>       (i.e. not fully malicious) hypervisor. In particular, it reduces the
>       attack
>       surface of guest VMs and can prevent certain types of VM-escape bugs
>       (e.g. hypervisor read-anywhere) from being used to steal guest data.
> 
> it seems highly unlikely that any secret data is used during boot.
> So just let guest boot normally, and encrypt afterwards.
> 
> Even assuming there are some guests that have secret data during boot,
> I would first upstream the main part of the feature for normal guests,
> then weight the extra security if any against the features and
> performance lost (like slower boot times).

If you can't trust boot, any encryption done afterwards is totally
pointless.

Paolo

Reply via email to