Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/2195841/?format=api
{ "id": 2195841, "url": "http://patchwork.ozlabs.org/api/patches/2195841/?format=api", "web_url": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260212062522.99565-20-anisinha@redhat.com/", "project": { "id": 14, "url": "http://patchwork.ozlabs.org/api/projects/14/?format=api", "name": "QEMU Development", "link_name": "qemu-devel", "list_id": "qemu-devel.nongnu.org", "list_email": "qemu-devel@nongnu.org", "web_url": "", "scm_url": "", "webscm_url": "", "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20260212062522.99565-20-anisinha@redhat.com>", "list_archive_url": null, "date": "2026-02-12T06:25:03", "name": "[v4,19/31] i386/sev: free existing launch update data and kernel hashes data on init", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "9197389789bf42b3d37eddf950ae664d313777f6", "submitter": { "id": 86030, "url": "http://patchwork.ozlabs.org/api/people/86030/?format=api", "name": "Ani Sinha", "email": "anisinha@redhat.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260212062522.99565-20-anisinha@redhat.com/mbox/", "series": [ { "id": 491935, "url": "http://patchwork.ozlabs.org/api/series/491935/?format=api", "web_url": "http://patchwork.ozlabs.org/project/qemu-devel/list/?series=491935", "date": "2026-02-12T06:24:45", "name": "Introduce support for confidential guest reset (x86)", "version": 4, "mbox": "http://patchwork.ozlabs.org/series/491935/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2195841/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2195841/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=aslgK+0M;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=google header.b=s1jOxxPn;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)" ], "Received": [ "from lists.gnu.org (lists.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fBQNc4pLnz1xvb\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 12 Feb 2026 17:28:32 +1100 (AEDT)", "from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1vqQAJ-0000Ai-0R; Thu, 12 Feb 2026 01:27:03 -0500", "from eggs.gnu.org ([2001:470:142:3::10])\n by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <anisinha@redhat.com>)\n id 1vqQ9x-0008DE-V7\n for qemu-devel@nongnu.org; Thu, 12 Feb 2026 01:26:43 -0500", "from us-smtp-delivery-124.mimecast.com ([170.10.133.124])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <anisinha@redhat.com>)\n id 1vqQ9w-0005Ic-0T\n for qemu-devel@nongnu.org; Thu, 12 Feb 2026 01:26:41 -0500", "from mail-pj1-f69.google.com (mail-pj1-f69.google.com\n [209.85.216.69]) by relay.mimecast.com with ESMTP with STARTTLS\n (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id\n us-mta-282-Jpk5HuFOOBGG-MpYLcLVmg-1; Thu, 12 Feb 2026 01:26:36 -0500", "by mail-pj1-f69.google.com with SMTP id\n 98e67ed59e1d1-35301003062so17083099a91.2\n for <qemu-devel@nongnu.org>; Wed, 11 Feb 2026 22:26:35 -0800 (PST)", "from rhel9-box.lan ([122.164.27.113])\n by smtp.googlemail.com with ESMTPSA id\n 98e67ed59e1d1-3567e7d95d8sm4894122a91.2.2026.02.11.22.26.31\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Wed, 11 Feb 2026 22:26:34 -0800 (PST)" ], "DKIM-Signature": [ "v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n s=mimecast20190719; t=1770877599;\n h=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n to:to:cc:cc:mime-version:mime-version:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references;\n bh=6P5ZMHhQ1gBULl+0OpCFy+J1BWjsvb7Pt0GdIxytUuE=;\n b=aslgK+0MHk5X4bse6+AQL0+yKKzAGrfvpX3a14A2oWKp8taswV4nU6yVLgoR6Me9TvEXgC\n /gI/2/jcBTyQfNO9jIbAShvslYpZIWGcLwn/8WyeOCS9j+YFRdWW+dVlwxCtoKG3RIpw7+\n r6GRsOUwgRJ+tLhFBp4YGVkNsm+W+ys=", "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=redhat.com; s=google; t=1770877595; x=1771482395; darn=nongnu.org;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:from:to:cc:subject:date\n :message-id:reply-to;\n bh=6P5ZMHhQ1gBULl+0OpCFy+J1BWjsvb7Pt0GdIxytUuE=;\n b=s1jOxxPnJbG5GNG9fvGTgqG5FcY35bgemKJL9nUY/S287HWbVThwMYsKXyPNbHWXlc\n xFLcIBqcuImrDr5f6OKOaoz1Cr9q9b+AMQWyB2afMjUfmH+TQuBhVShUdk/PZqS1NeyU\n +aDlso9iJI3g2RHEAsVKwuXkK1Ckt7bqPLsuVsefxW/VWQD5A3io66GZ6pddYg/cLuEe\n tMnhL3kuzb1kf6bNUVC03XGrvJUtcObxCUNv18Qo9ApdtvcGmltNK77x/C0gUQBuo/Ap\n VCbx12bDI60eaZf65xpNyERaBKx9BatzGpG7Yn4+MhiV7sedyVsVZ5UX3dDjZ1bwCKaf\n o1+A==" ], "X-MC-Unique": "Jpk5HuFOOBGG-MpYLcLVmg-1", "X-Mimecast-MFC-AGG-ID": "Jpk5HuFOOBGG-MpYLcLVmg_1770877595", "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20230601; t=1770877595; x=1771482395;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=6P5ZMHhQ1gBULl+0OpCFy+J1BWjsvb7Pt0GdIxytUuE=;\n b=dT2mmCJGM5Kaql+qhWhrTSNvqN3g1I/Xq8EhCaWV/y8V8r+K0gEruNLKCqVDrGBByk\n zkHv8rZH5UeJo1UBkmnE24+KEqBPb21sjY+JCLSszphsBQdPEVKugpKi4HidAGekbmQ5\n 5140B6oGgFyXzbQw8YP/80z0BUMBO3m/5g3vs7agiXnxfu9N8sJpXlJzB+Zhgc95slr+\n Vfse24ESs/lPE3atVsFLlVlxAE7IuI32KkyfdZF0n55kx+iGLQp3R9fNmnKHRCLAdH25\n DNZUFb7hY+Bz5epzqcrcjKKiCjAtmYyLCkbQdaTF8zD4P+7e/96p5rvQ/+01kHfNLhZN\n fmiA==", "X-Forwarded-Encrypted": "i=1;\n AJvYcCV4E4V+lBajTimKkuJvUyCTTLRv6+HOY2AY7MeLNLRJ62XLGvh2HuQiG2lxbr//BJwB4SB1GkT6GVC3@nongnu.org", "X-Gm-Message-State": "AOJu0YyzBaP6yYmKuKPtv+DGaPj4Ul0p81Pzgp0Pic3GUuSXuC5GNzLM\n fB1IefyB8tC+84qrgwkIh1g6vNWhgY2ToKVzmF0qd1JYXtHGxwyYf1VC8y9At3VDr5cWXnAtx7+\n t1Mx0cyJ+GNC5NhTsUkUloRcbWPI+iGRg5uGfiVrL4EpJCahjXeOz8cBr", "X-Gm-Gg": "AZuq6aLq+Way1OCiGjoHt7ebaFKXBwXjftOhAvp4ZUyLGqIj0AorT5eGWj1etKiETnN\n MBOJmU9RdyN3L5dDRsC3QVTmlNLws45uC/5sd0zISNqvHtuh1NZzX2xfKNVLU7z69wI2fisYyhC\n 1jL99iMUQ95qKa8XCtvG4dec3ztfaNMEzhAew8QSvjFTf2c2g3w32JOG0haq9MSCnWYJk8sX9oG\n Z4ZSQdb1+uWKICD5d+A1DBWZ3HLhmG0WIsqBHdGcXEXFDC1BqitbBCbToOP0nd9abWyaWxbZU4C\n hOSB4J0l6prqqDpJB95OtBXUHsgpVlBEZYvKFFxfghWWbMIn2M91E2G+6RMM9SDiz+sTQ1Q5w+p\n b8NMJeMiG/puGQTxUAePhUplW+toCVFoy6Irtqmq4q45SJqN4yKdcPi4=", "X-Received": [ "by 2002:a17:90a:d887:b0:356:72f3:acaf with SMTP id\n 98e67ed59e1d1-3568f525fd2mr1628237a91.32.1770877595003;\n Wed, 11 Feb 2026 22:26:35 -0800 (PST)", "by 2002:a17:90a:d887:b0:356:72f3:acaf with SMTP id\n 98e67ed59e1d1-3568f525fd2mr1628229a91.32.1770877594670;\n Wed, 11 Feb 2026 22:26:34 -0800 (PST)" ], "From": "Ani Sinha <anisinha@redhat.com>", "To": "Paolo Bonzini <pbonzini@redhat.com>,\n Marcelo Tosatti <mtosatti@redhat.com>,\n Zhao Liu <zhao1.liu@intel.com>", "Cc": "kraxel@redhat.com, Ani Sinha <anisinha@redhat.com>, kvm@vger.kernel.org,\n qemu-devel@nongnu.org", "Subject": "[PATCH v4 19/31] i386/sev: free existing launch update data and\n kernel hashes data on init", "Date": "Thu, 12 Feb 2026 11:55:03 +0530", "Message-ID": "<20260212062522.99565-20-anisinha@redhat.com>", "X-Mailer": "git-send-email 2.42.0", "In-Reply-To": "<20260212062522.99565-1-anisinha@redhat.com>", "References": "<20260212062522.99565-1-anisinha@redhat.com>", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit", "Received-SPF": "pass client-ip=170.10.133.124;\n envelope-from=anisinha@redhat.com;\n helo=us-smtp-delivery-124.mimecast.com", "X-Spam_score_int": "-20", "X-Spam_score": "-2.1", "X-Spam_bar": "--", "X-Spam_report": "(-2.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001,\n DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=0.001,\n RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001,\n SPF_HELO_PASS=-0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no", "X-Spam_action": "no action", "X-BeenThere": "qemu-devel@nongnu.org", "X-Mailman-Version": "2.1.29", "Precedence": "list", "List-Id": "qemu development <qemu-devel.nongnu.org>", "List-Unsubscribe": "<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>", "List-Archive": "<https://lists.nongnu.org/archive/html/qemu-devel>", "List-Post": "<mailto:qemu-devel@nongnu.org>", "List-Help": "<mailto:qemu-devel-request@nongnu.org?subject=help>", "List-Subscribe": "<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>", "Errors-To": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org", "Sender": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org" }, "content": "If there is existing launch update data and kernel hashes data, they need to be\nfreed when initialization code is executed. This is important for resettable\nconfidential guests where the initialization happens once every reset.\n\nSigned-off-by: Ani Sinha <anisinha@redhat.com>\n---\n target/i386/sev.c | 12 ++++++++++++\n 1 file changed, 12 insertions(+)", "diff": "diff --git a/target/i386/sev.c b/target/i386/sev.c\nindex 647f4bf63d..b3893e431c 100644\n--- a/target/i386/sev.c\n+++ b/target/i386/sev.c\n@@ -1773,6 +1773,7 @@ static int sev_common_kvm_init(ConfidentialGuestSupport *cgs, Error **errp)\n uint32_t ebx;\n uint32_t host_cbitpos;\n struct sev_user_data_status status = {};\n+ SevLaunchUpdateData *data, *next_elm;\n SevCommonState *sev_common = SEV_COMMON(cgs);\n SevCommonStateClass *klass = SEV_COMMON_GET_CLASS(cgs);\n X86ConfidentialGuestClass *x86_klass =\n@@ -1780,6 +1781,11 @@ static int sev_common_kvm_init(ConfidentialGuestSupport *cgs, Error **errp)\n \n sev_common->state = SEV_STATE_UNINIT;\n \n+ /* free existing launch update data if any */\n+ QTAILQ_FOREACH_SAFE(data, &launch_update, next, next_elm) {\n+ g_free(data);\n+ }\n+\n host_cpuid(0x8000001F, 0, NULL, &ebx, NULL, NULL);\n host_cbitpos = ebx & 0x3f;\n \n@@ -1968,6 +1974,8 @@ static int sev_snp_kvm_init(ConfidentialGuestSupport *cgs, Error **errp)\n {\n MachineState *ms = MACHINE(qdev_get_machine());\n X86MachineState *x86ms = X86_MACHINE(ms);\n+ SevCommonState *sev_common = SEV_COMMON(cgs);\n+ SevSnpGuestState *sev_snp_guest = SEV_SNP_GUEST(sev_common);\n \n if (x86ms->smm == ON_OFF_AUTO_AUTO) {\n x86ms->smm = ON_OFF_AUTO_OFF;\n@@ -1976,6 +1984,10 @@ static int sev_snp_kvm_init(ConfidentialGuestSupport *cgs, Error **errp)\n return -1;\n }\n \n+ /* free existing kernel hashes data if any */\n+ g_free(sev_snp_guest->kernel_hashes_data);\n+ sev_snp_guest->kernel_hashes_data = NULL;\n+\n return 0;\n }\n \n", "prefixes": [ "v4", "19/31" ] }