For SEV-ES guests, Ensure KVM's model of EFER is up-to-date after a CR0 load, and let userspace set tracked state via KVM_SET_SREGS, relying on the vendor code to not propagate the changes to hardware (VMCB in this case). Peter, patch 02 is different than what I sent to you off list. I'm still 100% convinced that the load_pdptrs() call is flawed, but Maxim has an in-progress series that's tackling the PDPTR save/restore mess. Sean Christopherson (2): KVM: SVM: Update EFER software model on CR0 trap for SEV-ES KVM: x86: Allow userspace to update tracked sregs for protected guests arch/x86/kvm/svm/svm.c | 8 +++-- arch/x86/kvm/x86.c | 73 ++++++++++++++++++++++++------------------ 2 files changed, 47 insertions(+), 34 deletions(-) -- 2.31.1.607.g51e8a6a459-goog