Re: [PATCH v10 0/2] Enable Secure TSC for SEV-SNP

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




On 8/4/2025 4:07 PM, Nikunj A Dadhania wrote:
> Patches are based on kvm/next with [1] applied
> 
> Testing Secure TSC
> ------------------
> 
> Secure TSC guest patches are available as part of v6.14.
> 
> QEMU changes:
> https://github.com/AMDESE/qemu/tree/snp-securetsc-latest
> 
> QEMU command line SEV-SNP with Secure TSC:
> 
>   qemu-system-x86_64 -cpu EPYC-Milan-v2 -smp 4 \
>     -object memory-backend-memfd,id=ram1,size=1G,share=true,prealloc=false,reserve=false \
>     -object sev-snp-guest,id=sev0,cbitpos=51,reduced-phys-bits=1,secure-tsc=on,stsc-freq=2000000000 \
>     -machine q35,confidential-guest-support=sev0,memory-backend=ram1 \
>     ...
> 
> Changelog:
> ----------
> v10:
> * Rebased on kvm/next
> * Collect RB from Kai Huang
> 
> v9: https://lore.kernel.org/kvm/20250716060836.2231613-1-nikunj@xxxxxxx/
> * Set guest_tsc_protected during guest vCPU creation (Kai Huang)
> * Improve error handling (Kai Huang)
> * Disable MSR_AMD64_GUEST_TSC_FREQ write interception (Sean)
> 
> 
> 1. https://lore.kernel.org/kvm/20250804090945.267199-1-nikunj@xxxxxxx/
Hi Sean,

A gentle reminder for review/merge.

Regards,
Nikunj




[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux