{"id":2197730,"url":"http://patchwork.ozlabs.org/api/1.0/patches/2197730/?format=json","project":{"id":14,"url":"http://patchwork.ozlabs.org/api/1.0/projects/14/?format=json","name":"QEMU Development","link_name":"qemu-devel","list_id":"qemu-devel.nongnu.org","list_email":"qemu-devel@nongnu.org","web_url":"","scm_url":"","webscm_url":""},"msgid":"<20260218114233.266178-25-anisinha@redhat.com>","date":"2026-02-18T11:42:17","name":"[v5,24/34] kvm/i8254: add support for confidential guest reset","commit_ref":null,"pull_url":null,"state":"new","archived":false,"hash":"65581697de3d68705d0a8e06bbdee9c4b7c083f4","submitter":{"id":86030,"url":"http://patchwork.ozlabs.org/api/1.0/people/86030/?format=json","name":"Ani Sinha","email":"anisinha@redhat.com"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/qemu-devel/patch/20260218114233.266178-25-anisinha@redhat.com/mbox/","series":[{"id":492541,"url":"http://patchwork.ozlabs.org/api/1.0/series/492541/?format=json","date":"2026-02-18T11:41:56","name":"Introduce support for confidential guest reset (x86)","version":5,"mbox":"http://patchwork.ozlabs.org/series/492541/mbox/"}],"check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/2197730/checks/","tags":{},"headers":{"Return-Path":"<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=YTjHBx3l;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=google header.b=N0apZ3kj;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists.gnu.org (lists.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fGF8B0sZlz1xvq\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 18 Feb 2026 22:46:02 +1100 (AEDT)","from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1vsfzG-0005iN-45; Wed, 18 Feb 2026 06:44:58 -0500","from eggs.gnu.org ([2001:470:142:3::10])\n by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <anisinha@redhat.com>)\n id 1vsfya-00042j-2L\n for qemu-devel@nongnu.org; Wed, 18 Feb 2026 06:44:16 -0500","from us-smtp-delivery-124.mimecast.com ([170.10.133.124])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <anisinha@redhat.com>)\n id 1vsfyX-0007wF-Tg\n for qemu-devel@nongnu.org; Wed, 18 Feb 2026 06:44:15 -0500","from mail-pl1-f198.google.com (mail-pl1-f198.google.com\n [209.85.214.198]) by relay.mimecast.com with ESMTP with STARTTLS\n (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id\n us-mta-498-Jiy1fpikMSq0Nw0avLrKcg-1; Wed, 18 Feb 2026 06:44:01 -0500","by mail-pl1-f198.google.com with SMTP id\n d9443c01a7336-2aae146bab0so63754625ad.0\n for <qemu-devel@nongnu.org>; Wed, 18 Feb 2026 03:44:01 -0800 (PST)","from rhel9-box.lan ([117.99.83.54])\n by smtp.googlemail.com with ESMTPSA id\n d9443c01a7336-2ad1aaeab38sm127803425ad.82.2026.02.18.03.43.57\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Wed, 18 Feb 2026 03:43:59 -0800 (PST)"],"DKIM-Signature":["v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n s=mimecast20190719; t=1771415043;\n h=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n to:to:cc:cc:mime-version:mime-version:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references;\n bh=i567b0vkVMDwtdwVAwszAB2dBBQ7q9jKGjjwGdoXxsw=;\n b=YTjHBx3lFHPkaL8visi/xk3E1EyezRES20122c87Q6Vi593v73O6oSs7QDGMv2Mvm0G6OP\n 9yxlZs7x58t9EMbnW0GEJipn0b6er4AC4bHzhOteINTvV5XlfkrMVXFRWlsWWfi7O2DaSY\n M2f2oGBOZfMCpOV9Zn9Fo49p+qwga1E=","v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=redhat.com; s=google; t=1771415040; x=1772019840; darn=nongnu.org;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:from:to:cc:subject:date\n :message-id:reply-to;\n bh=i567b0vkVMDwtdwVAwszAB2dBBQ7q9jKGjjwGdoXxsw=;\n b=N0apZ3kjCh8qdVjRoBQr9AQq2A8KwLONaot4LMVBtYzcQEkerHu7Gq21E7eNq0bdcW\n 6OP+GOwjkbiJC5FbMpKDF84QjdXyzcBAdBSF6lyELukzl1ycG/s9kxnoUM0E/W9+tLis\n MMqRxHWuG3rIpXGawBWr6HLuQ8Rje92q3QZuG54/OVvywJwt3osFGNoEI1niQv7v9u6O\n 9aGih5JSmfi+Hnhbeod5PPMyvutvL5TeFSfEsVBAi98tDqrvkweiR2ixCtK5Gj3i/4kc\n po4yRvDhVoC66R7NiEDn+EOj6gVCgDqmXvXqXmVwslVFQiwpNViVwl7p8Z1XmYDpdFIt\n zOcg=="],"X-MC-Unique":"Jiy1fpikMSq0Nw0avLrKcg-1","X-Mimecast-MFC-AGG-ID":"Jiy1fpikMSq0Nw0avLrKcg_1771415040","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20230601; t=1771415040; x=1772019840;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=i567b0vkVMDwtdwVAwszAB2dBBQ7q9jKGjjwGdoXxsw=;\n b=LdI+MsRrM/K/fY8uQU39EZOSxacqa05N9hJjeR9a8G6ujXnLOMjaG3rha7Jo45O16p\n 8EYy7xK+/4yTmPDGQc8UV0TGvf23UwHPSUhEdmWw+oDe0SNS+9BPmYallcu6ZiUnA0NK\n 5maUO5j9C3MrRpXlfM8NlqszhsBMyrcb0hM65GVscwR/1qrO9tGvJHodQvWty+oyuxuI\n 3MijmtbB+P5XLZ05WzuC6VhipS+hOrR5GEnaegZZLqHs5SZLbs2srb6pmQCy6EG8PdtM\n l9u8lnTh8TN2TD0VFekfdMHVRyoV73YAIAehgfnY9uwHPVIjOdPYoxuku4qpyTPdHnwz\n m8Vg==","X-Forwarded-Encrypted":"i=1;\n AJvYcCXyhODSrpPepUkvKgvPWks3yJW4XTYbKRc+FXppN45wnIES6CEvPeUayfqFAEqU4W0R90kpJTqJruAW@nongnu.org","X-Gm-Message-State":"AOJu0YzEm9JveUUrFM702dR8eiAS6No5r6ieWUAmZGRE8Ii+Y+OCDpoZ\n i3prKu7DNz9nxcanwiuyp2ojJcC79+MjZgEXvH6jl2RzL6yZmnyKVF50zW+yK0YAAEDi0W7W35y\n urfPwhCCqRKkyar1WrNKdmh7ebqg+V8ZzFIs8JdVCWPK3aBCQRftNWCnR","X-Gm-Gg":"AZuq6aJR9tf6XTNe6cfAw2EW8GkaTBIwD3l+c3bX72tFX9Ipole91nPF+5Z9b5EFRFC\n 5rL2MQbGgZLajO7GaspiW16RBmpeyOv5Umqzc6otfuf+Yepo5zjrrswcCYCRZYA8DmvTP4H7L42\n HsGPT4I/f5oyqh+y659J8yXQEHHbEyXT/9R/VCBn8dum08ISDeEkVV1ljl/vzUSk7sP6JSdJo5R\n Uah99IEBfZgRhvl2bOvUSb8acEAeFeszNj5HTLkM0tApS2M0LPQ+R5p8ZEFwFjsFhE/+116wfSJ\n IE3SrKDrqSlr/X4RI891ii1dW1D5syMC2121mMxmf3yxCto3wV4ZK7G17moUGtK5BhkkxRKBfHZ\n I5oKCZqMMLJxPD9Gnv0nB3aOdiDKhCCHCIxDkN2UL4lN6CSZtBoXX","X-Received":["by 2002:a17:903:3d0b:b0:2a7:a9e4:babc with SMTP id\n d9443c01a7336-2ab50647207mr184076235ad.61.1771415040508;\n Wed, 18 Feb 2026 03:44:00 -0800 (PST)","by 2002:a17:903:3d0b:b0:2a7:a9e4:babc with SMTP id\n d9443c01a7336-2ab50647207mr184076035ad.61.1771415040119;\n Wed, 18 Feb 2026 03:44:00 -0800 (PST)"],"From":"Ani Sinha <anisinha@redhat.com>","To":"Paolo Bonzini <pbonzini@redhat.com>,\n Richard Henderson <richard.henderson@linaro.org>,\n Eduardo Habkost <eduardo@habkost.net>,\n \"Michael S. Tsirkin\" <mst@redhat.com>,\n Marcel Apfelbaum <marcel.apfelbaum@gmail.com>","Cc":"Ani Sinha <anisinha@redhat.com>, kraxel@redhat.com, qemu-devel@nongnu.org","Subject":"[PATCH v5 24/34] kvm/i8254: add support for confidential guest reset","Date":"Wed, 18 Feb 2026 17:12:17 +0530","Message-ID":"<20260218114233.266178-25-anisinha@redhat.com>","X-Mailer":"git-send-email 2.42.0","In-Reply-To":"<20260218114233.266178-1-anisinha@redhat.com>","References":"<20260218114233.266178-1-anisinha@redhat.com>","MIME-Version":"1.0","Content-Transfer-Encoding":"8bit","Received-SPF":"pass client-ip=170.10.133.124;\n envelope-from=anisinha@redhat.com;\n helo=us-smtp-delivery-124.mimecast.com","X-Spam_score_int":"-20","X-Spam_score":"-2.1","X-Spam_bar":"--","X-Spam_report":"(-2.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.043,\n DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001,\n RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001,\n SPF_HELO_PASS=-0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no","X-Spam_action":"no action","X-BeenThere":"qemu-devel@nongnu.org","X-Mailman-Version":"2.1.29","Precedence":"list","List-Id":"qemu development <qemu-devel.nongnu.org>","List-Unsubscribe":"<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>","List-Archive":"<https://lists.nongnu.org/archive/html/qemu-devel>","List-Post":"<mailto:qemu-devel@nongnu.org>","List-Help":"<mailto:qemu-devel-request@nongnu.org?subject=help>","List-Subscribe":"<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>","Errors-To":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org","Sender":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org"},"content":"A confidential guest reset involves closing the old virtual machine KVM file\ndescriptor and opening a new one. Since its a new KVM fd, PIT needs to be\nre-initialized again. This is done with the help of a notifier which is invoked\nupon KVM vm file descriptor change during the confidential guest reset process.\n\nSigned-off-by: Ani Sinha <anisinha@redhat.com>\n---\n hw/i386/kvm/i8254.c      | 23 +++++++++++++++++++++++\n hw/i386/kvm/trace-events |  1 +\n 2 files changed, 24 insertions(+)","diff":"diff --git a/hw/i386/kvm/i8254.c b/hw/i386/kvm/i8254.c\nindex 255047458a..70e8fd83cd 100644\n--- a/hw/i386/kvm/i8254.c\n+++ b/hw/i386/kvm/i8254.c\n@@ -35,6 +35,7 @@\n #include \"hw/core/qdev-properties-system.h\"\n #include \"system/kvm.h\"\n #include \"target/i386/kvm/kvm_i386.h\"\n+#include \"trace.h\"\n #include \"qom/object.h\"\n \n #define KVM_PIT_REINJECT_BIT 0\n@@ -52,6 +53,8 @@ struct KVMPITState {\n     LostTickPolicy lost_tick_policy;\n     bool vm_stopped;\n     int64_t kernel_clock_offset;\n+\n+    NotifierWithReturn kvmpit_vmfd_change_notifier;\n };\n \n struct KVMPITClass {\n@@ -203,6 +206,23 @@ static void kvm_pit_put(PITCommonState *pit)\n     }\n }\n \n+static int kvmpit_post_vmfd_change(NotifierWithReturn *notifier,\n+                                   void *data, Error** errp)\n+{\n+    KVMPITState *s = container_of(notifier, KVMPITState,\n+                                  kvmpit_vmfd_change_notifier);\n+\n+    /* we are not interested in pre vmfd change notification */\n+    if (((VmfdChangeNotifier *)data)->pre) {\n+        return 0;\n+    }\n+\n+    do_pit_initialize(s, errp);\n+\n+    trace_kvmpit_post_vmfd_change();\n+    return 0;\n+}\n+\n static void kvm_pit_set_gate(PITCommonState *s, PITChannelState *sc, int val)\n {\n     kvm_pit_get(s);\n@@ -292,6 +312,9 @@ static void kvm_pit_realizefn(DeviceState *dev, Error **errp)\n \n     qemu_add_vm_change_state_handler(kvm_pit_vm_state_change, s);\n \n+    s->kvmpit_vmfd_change_notifier.notify = kvmpit_post_vmfd_change;\n+    kvm_vmfd_add_change_notifier(&s->kvmpit_vmfd_change_notifier);\n+\n     kpc->parent_realize(dev, errp);\n }\n \ndiff --git a/hw/i386/kvm/trace-events b/hw/i386/kvm/trace-events\nindex 67bf7f174e..33680ff82b 100644\n--- a/hw/i386/kvm/trace-events\n+++ b/hw/i386/kvm/trace-events\n@@ -20,3 +20,4 @@ xenstore_reset_watches(void) \"\"\n xenstore_watch_event(const char *path, const char *token) \"path %s token %s\"\n xen_primary_console_create(void) \"\"\n xen_primary_console_reset(int port) \"port %u\"\n+kvmpit_post_vmfd_change(void) \"\"\n","prefixes":["v5","24/34"]}