Patch Series

Subject KVM: SVM: Enable Secure TSC for SEV-SNP
Author seanjc@google.com
Date 2025-08-19 23:48:26 +0000 UTC
Version 11
Cc bp@alien8.de kai.huang@intel.com ketan.chaturvedi@amd.com kvm@vger.kernel.org linux-kernel@vger.kernel.org michael.roth@amd.com nikunj@amd.com pbonzini@redhat.com seanjc@google.com thomas.lendacky@amd.com vaishali.thakkar@suse.com

Patches (8)

Name Content
[PATCH v11 1/8] KVM: SEV: Drop GHCB_VERSION_DEFAULT and open code it [Body]
[PATCH v11 2/8] KVM: SEV: Enforce minimum GHCB version requirement for SEV-SNP guests [Body]
[PATCH v11 3/8] x86/cpufeatures: Add SNP Secure TSC [Body]
[PATCH v11 4/8] KVM: SVM: Move SEV-ES VMSA allocation to a dedicated sev_vcpu_create() helper [Body]
[PATCH v11 5/8] KVM: SEV: Move init of SNP guest state into sev_init_vmcb() [Body]
[PATCH v11 6/8] KVM: SEV: Set RESET GHCB MSR value during sev_es_init_vmcb() [Body]
[PATCH v11 7/8] KVM: SEV: Fold sev_es_vcpu_reset() into sev_vcpu_create() [Body]
[PATCH v11 8/8] KVM: SVM: Enable Secure TSC for SNP guests [Body]

Session 2025-08-20

ID (for dev) b7029916-dc64-4f26-91fb-a4f3d1590233
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
Build Base dfc0f6373094dd88e1eaf76c44f2ff01b65db851 [Config] passed [Log]
Build Patched dfc0f6373094dd88e1eaf76c44f2ff01b65db851 [Config] [patched] passed [Log]
Boot test: Base dfc0f6373094dd88e1eaf76c44f2ff01b65db851 [Config] passed
Boot test: Patched dfc0f6373094dd88e1eaf76c44f2ff01b65db851 [Config] [patched] passed
Fuzzing dfc0f6373094dd88e1eaf76c44f2ff01b65db851 [Config] dfc0f6373094dd88e1eaf76c44f2ff01b65db851 [Config] [patched] passed [Log] [Artifacts]