Patches are based on kvm-x86/next with [1] applied Testing Secure TSC ----------------- Secure TSC guest patches are available as part of v6.14. QEMU changes: https://github.com/AMDESE/qemu/tree/snp-securetsc-latest QEMU command line SEV-SNP with Secure TSC: qemu-system-x86_64 -cpu EPYC-Milan-v2 -smp 4 \ -object memory-backend-memfd,id=ram1,size=1G,share=true,prealloc=false,reserve=false \ -object sev-snp-guest,id=sev0,cbitpos=51,reduced-phys-bits=1,secure-tsc=on,stsc-freq=2000000000 \ -machine q35,confidential-guest-support=sev0,memory-backend=ram1 \ ... Changelog: ---------- v9: * Set guest_tsc_protected during guest vCPU creation (Kai Huang) * Improve error handling (Kai Huang) * Disable MSR_AMD64_GUEST_TSC_FREQ write interception (Sean) v8: https://lore.kernel.org/kvm/20250707101029.927906-1-nikunj@xxxxxxx/ * Commit message improvements (Kai Huang) * Remove 'desired_tsc_khz' from 'struct kvm_sev_snp_launch_start' (Kai Huang) Nikunj A Dadhania (2): x86/cpufeatures: Add SNP Secure TSC KVM: SVM: Enable Secure TSC for SNP guests arch/x86/include/asm/cpufeatures.h | 1 + arch/x86/include/asm/svm.h | 1 + arch/x86/kvm/svm/sev.c | 27 +++++++++++++++++++++++++++ arch/x86/kvm/svm/svm.c | 2 ++ arch/x86/kvm/svm/svm.h | 2 ++ 5 files changed, 33 insertions(+) base-commit: 87198fb0208a774d0cb8844744c67ee8680eafab prerequisite-patch-id: 797bfc24c79c6b63fcc12cd93664fa04d99e2cd3 1. https://lore.kernel.org/all/20250716055604.2229864-1-nikunj@xxxxxxx -- 2.43.0