Compatibility of KSM with SEV and SME Enabled on Host


New Member
Apr 8, 2023
Hello Proxmox Community,

I hope you're all doing well. I'm currently exploring the functionalities of Kernel Same-page Merging (KSM) in conjunction with AMD's Secure Encrypted Virtualization (SEV) and Secure Memory Encryption (SME) features. Specifically, I'm keen to understand the interplay between these technologies when enabled on a Proxmox host.

My primary question is: If I have both SEV and SME enabled on my Proxmox host, will KSM still operate as expected and efficiently merge identical memory pages? Are there any known issues, limitations, or best practices to be aware of when using these features together?

Any insights or experiences from the community would be greatly appreciated. Thank you in advance for your assistance!

Best regards,

I do not think ksm will work as expected, since the host cannot see the memory of the guest.
There are many other problems with sev right now, for example any action that involves memory like snapshots & live-migration do not work right now or is attackable.
Last edited:
  • Like
Reactions: Petros
There is no need to disable it.

As long as you do not add something like this
-object sev-guest,id=sev0,cbitpos=47,reduced-phys-bits=1
-machine memory-encryption=sev0
to your qemu command you are not using SEV anyway.
Last edited:
  • Like
Reactions: Petros and zeuxprox


The Proxmox community has been around for many years and offers help and support for Proxmox VE, Proxmox Backup Server, and Proxmox Mail Gateway.
We think our community is one of the best thanks to people like you!

Get your subscription!

The Proxmox team works very hard to make sure you are running the best software and getting stable updates and security enhancements, as well as quick enterprise support. Tens of thousands of happy customers have a Proxmox subscription. Get yours easily in our online shop.

Buy now!