Re: [PATCH] x86/virt: Treat SVM as unsupported when running as an SEV+ guest
From: Sean Christopherson
Date: Mon Apr 13 2026 - 10:45:12 EST
On Thu, 09 Apr 2026 12:13:41 -0700, Sean Christopherson wrote:
> When running as an SEV+ guest, treat SVM as unsupported even if CPUID (and
> other reporting, e.g. MSRs) enumerate support for SVM, as KVM doesn't
> support nested virtualization within an SEV VM (KVM would need to
> explicitly share all VMCBs and other assets with the untrusted host), let
> alone running nested VMs within SEV-ES+ guests (e.g. emulating VMLOAD,
> VMSAVE, and VMRUN all require access to guest register state). And outside
> of KVM, there is no in-tree user of SVM enabling.
>
> [...]
Applied to kvm-x86 vmxon (last week, forgot to send "thanks").
[1/1] x86/virt: Treat SVM as unsupported when running as an SEV+ guest
https://github.com/kvm-x86/linux/commit/e30aa03d032d
--
https://github.com/kvm-x86/linux/tree/next