Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/1.0/patches/2197730/?format=api
{ "id": 2197730, "url": "http://patchwork.ozlabs.org/api/1.0/patches/2197730/?format=api", "project": { "id": 14, "url": "http://patchwork.ozlabs.org/api/1.0/projects/14/?format=api", "name": "QEMU Development", "link_name": "qemu-devel", "list_id": "qemu-devel.nongnu.org", "list_email": "qemu-devel@nongnu.org", "web_url": "", "scm_url": "", "webscm_url": "" }, "msgid": "<20260218114233.266178-25-anisinha@redhat.com>", "date": "2026-02-18T11:42:17", "name": "[v5,24/34] kvm/i8254: add support for confidential guest reset", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "65581697de3d68705d0a8e06bbdee9c4b7c083f4", "submitter": { "id": 86030, "url": "http://patchwork.ozlabs.org/api/1.0/people/86030/?format=api", "name": "Ani Sinha", "email": "anisinha@redhat.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260218114233.266178-25-anisinha@redhat.com/mbox/", "series": [ { "id": 492541, "url": "http://patchwork.ozlabs.org/api/1.0/series/492541/?format=api", "date": "2026-02-18T11:41:56", "name": "Introduce support for confidential guest reset (x86)", "version": 5, "mbox": "http://patchwork.ozlabs.org/series/492541/mbox/" } ], "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2197730/checks/", "tags": {}, "headers": { "Return-Path": "<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=YTjHBx3l;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=google header.b=N0apZ3kj;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)" ], "Received": [ "from lists.gnu.org (lists.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fGF8B0sZlz1xvq\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 18 Feb 2026 22:46:02 +1100 (AEDT)", "from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1vsfzG-0005iN-45; Wed, 18 Feb 2026 06:44:58 -0500", "from eggs.gnu.org ([2001:470:142:3::10])\n by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <anisinha@redhat.com>)\n id 1vsfya-00042j-2L\n for qemu-devel@nongnu.org; Wed, 18 Feb 2026 06:44:16 -0500", "from us-smtp-delivery-124.mimecast.com ([170.10.133.124])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <anisinha@redhat.com>)\n id 1vsfyX-0007wF-Tg\n for qemu-devel@nongnu.org; Wed, 18 Feb 2026 06:44:15 -0500", "from mail-pl1-f198.google.com (mail-pl1-f198.google.com\n [209.85.214.198]) by relay.mimecast.com with ESMTP with STARTTLS\n (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id\n us-mta-498-Jiy1fpikMSq0Nw0avLrKcg-1; Wed, 18 Feb 2026 06:44:01 -0500", "by mail-pl1-f198.google.com with SMTP id\n d9443c01a7336-2aae146bab0so63754625ad.0\n for <qemu-devel@nongnu.org>; Wed, 18 Feb 2026 03:44:01 -0800 (PST)", "from rhel9-box.lan ([117.99.83.54])\n by smtp.googlemail.com with ESMTPSA id\n d9443c01a7336-2ad1aaeab38sm127803425ad.82.2026.02.18.03.43.57\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Wed, 18 Feb 2026 03:43:59 -0800 (PST)" ], "DKIM-Signature": [ "v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n s=mimecast20190719; t=1771415043;\n h=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n to:to:cc:cc:mime-version:mime-version:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references;\n bh=i567b0vkVMDwtdwVAwszAB2dBBQ7q9jKGjjwGdoXxsw=;\n b=YTjHBx3lFHPkaL8visi/xk3E1EyezRES20122c87Q6Vi593v73O6oSs7QDGMv2Mvm0G6OP\n 9yxlZs7x58t9EMbnW0GEJipn0b6er4AC4bHzhOteINTvV5XlfkrMVXFRWlsWWfi7O2DaSY\n M2f2oGBOZfMCpOV9Zn9Fo49p+qwga1E=", "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=redhat.com; s=google; t=1771415040; x=1772019840; darn=nongnu.org;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:from:to:cc:subject:date\n :message-id:reply-to;\n bh=i567b0vkVMDwtdwVAwszAB2dBBQ7q9jKGjjwGdoXxsw=;\n b=N0apZ3kjCh8qdVjRoBQr9AQq2A8KwLONaot4LMVBtYzcQEkerHu7Gq21E7eNq0bdcW\n 6OP+GOwjkbiJC5FbMpKDF84QjdXyzcBAdBSF6lyELukzl1ycG/s9kxnoUM0E/W9+tLis\n MMqRxHWuG3rIpXGawBWr6HLuQ8Rje92q3QZuG54/OVvywJwt3osFGNoEI1niQv7v9u6O\n 9aGih5JSmfi+Hnhbeod5PPMyvutvL5TeFSfEsVBAi98tDqrvkweiR2ixCtK5Gj3i/4kc\n po4yRvDhVoC66R7NiEDn+EOj6gVCgDqmXvXqXmVwslVFQiwpNViVwl7p8Z1XmYDpdFIt\n zOcg==" ], "X-MC-Unique": "Jiy1fpikMSq0Nw0avLrKcg-1", "X-Mimecast-MFC-AGG-ID": "Jiy1fpikMSq0Nw0avLrKcg_1771415040", "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20230601; t=1771415040; x=1772019840;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=i567b0vkVMDwtdwVAwszAB2dBBQ7q9jKGjjwGdoXxsw=;\n b=LdI+MsRrM/K/fY8uQU39EZOSxacqa05N9hJjeR9a8G6ujXnLOMjaG3rha7Jo45O16p\n 8EYy7xK+/4yTmPDGQc8UV0TGvf23UwHPSUhEdmWw+oDe0SNS+9BPmYallcu6ZiUnA0NK\n 5maUO5j9C3MrRpXlfM8NlqszhsBMyrcb0hM65GVscwR/1qrO9tGvJHodQvWty+oyuxuI\n 3MijmtbB+P5XLZ05WzuC6VhipS+hOrR5GEnaegZZLqHs5SZLbs2srb6pmQCy6EG8PdtM\n l9u8lnTh8TN2TD0VFekfdMHVRyoV73YAIAehgfnY9uwHPVIjOdPYoxuku4qpyTPdHnwz\n m8Vg==", "X-Forwarded-Encrypted": "i=1;\n AJvYcCXyhODSrpPepUkvKgvPWks3yJW4XTYbKRc+FXppN45wnIES6CEvPeUayfqFAEqU4W0R90kpJTqJruAW@nongnu.org", "X-Gm-Message-State": "AOJu0YzEm9JveUUrFM702dR8eiAS6No5r6ieWUAmZGRE8Ii+Y+OCDpoZ\n i3prKu7DNz9nxcanwiuyp2ojJcC79+MjZgEXvH6jl2RzL6yZmnyKVF50zW+yK0YAAEDi0W7W35y\n urfPwhCCqRKkyar1WrNKdmh7ebqg+V8ZzFIs8JdVCWPK3aBCQRftNWCnR", "X-Gm-Gg": "AZuq6aJR9tf6XTNe6cfAw2EW8GkaTBIwD3l+c3bX72tFX9Ipole91nPF+5Z9b5EFRFC\n 5rL2MQbGgZLajO7GaspiW16RBmpeyOv5Umqzc6otfuf+Yepo5zjrrswcCYCRZYA8DmvTP4H7L42\n HsGPT4I/f5oyqh+y659J8yXQEHHbEyXT/9R/VCBn8dum08ISDeEkVV1ljl/vzUSk7sP6JSdJo5R\n Uah99IEBfZgRhvl2bOvUSb8acEAeFeszNj5HTLkM0tApS2M0LPQ+R5p8ZEFwFjsFhE/+116wfSJ\n IE3SrKDrqSlr/X4RI891ii1dW1D5syMC2121mMxmf3yxCto3wV4ZK7G17moUGtK5BhkkxRKBfHZ\n I5oKCZqMMLJxPD9Gnv0nB3aOdiDKhCCHCIxDkN2UL4lN6CSZtBoXX", "X-Received": [ "by 2002:a17:903:3d0b:b0:2a7:a9e4:babc with SMTP id\n d9443c01a7336-2ab50647207mr184076235ad.61.1771415040508;\n Wed, 18 Feb 2026 03:44:00 -0800 (PST)", "by 2002:a17:903:3d0b:b0:2a7:a9e4:babc with SMTP id\n d9443c01a7336-2ab50647207mr184076035ad.61.1771415040119;\n Wed, 18 Feb 2026 03:44:00 -0800 (PST)" ], "From": "Ani Sinha <anisinha@redhat.com>", "To": "Paolo Bonzini <pbonzini@redhat.com>,\n Richard Henderson <richard.henderson@linaro.org>,\n Eduardo Habkost <eduardo@habkost.net>,\n \"Michael S. Tsirkin\" <mst@redhat.com>,\n Marcel Apfelbaum <marcel.apfelbaum@gmail.com>", "Cc": "Ani Sinha <anisinha@redhat.com>, kraxel@redhat.com, qemu-devel@nongnu.org", "Subject": "[PATCH v5 24/34] kvm/i8254: add support for confidential guest reset", "Date": "Wed, 18 Feb 2026 17:12:17 +0530", "Message-ID": "<20260218114233.266178-25-anisinha@redhat.com>", "X-Mailer": "git-send-email 2.42.0", "In-Reply-To": "<20260218114233.266178-1-anisinha@redhat.com>", "References": "<20260218114233.266178-1-anisinha@redhat.com>", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit", "Received-SPF": "pass client-ip=170.10.133.124;\n envelope-from=anisinha@redhat.com;\n helo=us-smtp-delivery-124.mimecast.com", "X-Spam_score_int": "-20", "X-Spam_score": "-2.1", "X-Spam_bar": "--", "X-Spam_report": "(-2.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.043,\n DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001,\n RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001,\n SPF_HELO_PASS=-0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no", "X-Spam_action": "no action", "X-BeenThere": "qemu-devel@nongnu.org", "X-Mailman-Version": "2.1.29", "Precedence": "list", "List-Id": "qemu development <qemu-devel.nongnu.org>", "List-Unsubscribe": "<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>", "List-Archive": "<https://lists.nongnu.org/archive/html/qemu-devel>", "List-Post": "<mailto:qemu-devel@nongnu.org>", "List-Help": "<mailto:qemu-devel-request@nongnu.org?subject=help>", "List-Subscribe": "<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>", "Errors-To": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org", "Sender": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org" }, "content": "A confidential guest reset involves closing the old virtual machine KVM file\ndescriptor and opening a new one. Since its a new KVM fd, PIT needs to be\nre-initialized again. This is done with the help of a notifier which is invoked\nupon KVM vm file descriptor change during the confidential guest reset process.\n\nSigned-off-by: Ani Sinha <anisinha@redhat.com>\n---\n hw/i386/kvm/i8254.c | 23 +++++++++++++++++++++++\n hw/i386/kvm/trace-events | 1 +\n 2 files changed, 24 insertions(+)", "diff": "diff --git a/hw/i386/kvm/i8254.c b/hw/i386/kvm/i8254.c\nindex 255047458a..70e8fd83cd 100644\n--- a/hw/i386/kvm/i8254.c\n+++ b/hw/i386/kvm/i8254.c\n@@ -35,6 +35,7 @@\n #include \"hw/core/qdev-properties-system.h\"\n #include \"system/kvm.h\"\n #include \"target/i386/kvm/kvm_i386.h\"\n+#include \"trace.h\"\n #include \"qom/object.h\"\n \n #define KVM_PIT_REINJECT_BIT 0\n@@ -52,6 +53,8 @@ struct KVMPITState {\n LostTickPolicy lost_tick_policy;\n bool vm_stopped;\n int64_t kernel_clock_offset;\n+\n+ NotifierWithReturn kvmpit_vmfd_change_notifier;\n };\n \n struct KVMPITClass {\n@@ -203,6 +206,23 @@ static void kvm_pit_put(PITCommonState *pit)\n }\n }\n \n+static int kvmpit_post_vmfd_change(NotifierWithReturn *notifier,\n+ void *data, Error** errp)\n+{\n+ KVMPITState *s = container_of(notifier, KVMPITState,\n+ kvmpit_vmfd_change_notifier);\n+\n+ /* we are not interested in pre vmfd change notification */\n+ if (((VmfdChangeNotifier *)data)->pre) {\n+ return 0;\n+ }\n+\n+ do_pit_initialize(s, errp);\n+\n+ trace_kvmpit_post_vmfd_change();\n+ return 0;\n+}\n+\n static void kvm_pit_set_gate(PITCommonState *s, PITChannelState *sc, int val)\n {\n kvm_pit_get(s);\n@@ -292,6 +312,9 @@ static void kvm_pit_realizefn(DeviceState *dev, Error **errp)\n \n qemu_add_vm_change_state_handler(kvm_pit_vm_state_change, s);\n \n+ s->kvmpit_vmfd_change_notifier.notify = kvmpit_post_vmfd_change;\n+ kvm_vmfd_add_change_notifier(&s->kvmpit_vmfd_change_notifier);\n+\n kpc->parent_realize(dev, errp);\n }\n \ndiff --git a/hw/i386/kvm/trace-events b/hw/i386/kvm/trace-events\nindex 67bf7f174e..33680ff82b 100644\n--- a/hw/i386/kvm/trace-events\n+++ b/hw/i386/kvm/trace-events\n@@ -20,3 +20,4 @@ xenstore_reset_watches(void) \"\"\n xenstore_watch_event(const char *path, const char *token) \"path %s token %s\"\n xen_primary_console_create(void) \"\"\n xen_primary_console_reset(int port) \"port %u\"\n+kvmpit_post_vmfd_change(void) \"\"\n", "prefixes": [ "v5", "24/34" ] }