get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/1.1/patches/2227430/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2227430,
    "url": "http://patchwork.ozlabs.org/api/1.1/patches/2227430/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260423170229.64655-10-philmd@linaro.org/",
    "project": {
        "id": 14,
        "url": "http://patchwork.ozlabs.org/api/1.1/projects/14/?format=api",
        "name": "QEMU Development",
        "link_name": "qemu-devel",
        "list_id": "qemu-devel.nongnu.org",
        "list_email": "qemu-devel@nongnu.org",
        "web_url": "",
        "scm_url": "",
        "webscm_url": ""
    },
    "msgid": "<20260423170229.64655-10-philmd@linaro.org>",
    "date": "2026-04-23T17:02:21",
    "name": "[09/16] accel/hvf: avoid executable mappings for RAM-device memory",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "151d8f70f2a69d70f172fa8d995baeefcb6d1989",
    "submitter": {
        "id": 85046,
        "url": "http://patchwork.ozlabs.org/api/1.1/people/85046/?format=api",
        "name": "Philippe Mathieu-Daudé",
        "email": "philmd@linaro.org"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260423170229.64655-10-philmd@linaro.org/mbox/",
    "series": [
        {
            "id": 501223,
            "url": "http://patchwork.ozlabs.org/api/1.1/series/501223/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/qemu-devel/list/?series=501223",
            "date": "2026-04-23T17:02:12",
            "name": "accel/hvf: Assorted collection of patches queued before v11 release",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/501223/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2227430/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2227430/checks/",
    "tags": {},
    "headers": {
        "Return-Path": "<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=linaro.org header.i=@linaro.org header.a=rsa-sha256\n header.s=google header.b=YADR1bWN;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists1p.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)"
        ],
        "Received": [
            "from lists1p.gnu.org (lists1p.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g1jD3643cz1y2d\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 24 Apr 2026 03:06:11 +1000 (AEST)",
            "from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists1p.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1wFxTi-00028A-Uv; Thu, 23 Apr 2026 13:04:39 -0400",
            "from eggs.gnu.org ([2001:470:142:3::10])\n by lists1p.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <philmd@linaro.org>) id 1wFxSt-0001Dx-6p\n for qemu-devel@nongnu.org; Thu, 23 Apr 2026 13:03:48 -0400",
            "from mail-wm1-x32e.google.com ([2a00:1450:4864:20::32e])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.90_1) (envelope-from <philmd@linaro.org>) id 1wFxSo-0005fk-To\n for qemu-devel@nongnu.org; Thu, 23 Apr 2026 13:03:45 -0400",
            "by mail-wm1-x32e.google.com with SMTP id\n 5b1f17b1804b1-4891c0620bcso42239765e9.1\n for <qemu-devel@nongnu.org>; Thu, 23 Apr 2026 10:03:42 -0700 (PDT)",
            "from localhost.localdomain (88-187-86-199.subs.proxad.net.\n [88.187.86.199]) by smtp.gmail.com with ESMTPSA id\n ffacd0b85a97d-4412150a071sm19367663f8f.21.2026.04.23.10.03.38\n (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256);\n Thu, 23 Apr 2026 10:03:39 -0700 (PDT)"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=linaro.org; s=google; t=1776963821; x=1777568621; darn=nongnu.org;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:from:to:cc:subject:date\n :message-id:reply-to;\n bh=PLkHfU6gnGPNuMZLmMU3QVfExHc0Hln8v5Rj1pdI6b4=;\n b=YADR1bWN1GJeDhY8UzbsTdhSEo3TXY2YQCRYgWe+mS9TXKsz7hIKbiG5/XSSBShJ7U\n Xhhl9eX3cy3L0ey0/0VrSPFfHFRY/CJ3xxOWGfLIc4MXRNDS3ZC4i/ZUzsdGgveuYwmD\n 9Z3Zop/H4ZtPRRZ3eGrdsLsnHFWKHmO5Nwhf3Nv6nuCrctCkB+FgRhOQdXNnJ1RtJhue\n WLlHFQ7QYlRTwcBonlZ5g9XP2sxVV2WiLPug5hoaRxtCoods/mHWMYSgvy2w6gnPsxbP\n kU6nY8ayD7+vcM63ArsB32j7nuQgNOLnMOZQlWWaoBTSIr9Yc3o1WPv3cp42pgH75zq7\n g6XA==",
        "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776963821; x=1777568621;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=PLkHfU6gnGPNuMZLmMU3QVfExHc0Hln8v5Rj1pdI6b4=;\n b=AchJo6BB2EeN+Rer+2pCzggNXXw2rg5UaY0KHRQUgVAOZhMTGCyWlPmcKhVUGTqlXt\n umL8SoPpSfPHxE0oTgQGuultxiouUD/V4i4kntq2VyyG0cnMsGQkPw+wFZEuWA3Lt2Tw\n jtylQNqu7RaRDHVruxtkJcbQzOY3t5B+IM0nlsC9tTCv1Tbte2JkJv16M2nDCaEUcBXf\n rtAeC9/t4x4m01iELo+/RuEfXshk+tbh1YLXkmYku2C5SY8ylFpN6QNVWdqTX9BQIGmU\n HWd2VjxbNmCZzulZozmguGcZeNTUfpsjbz6OssCa7R/iK6RJwHABPgZOSlurcJur6TA+\n wGBA==",
        "X-Gm-Message-State": "AOJu0YwHcS2m6ykG6D6MFirGUW7lM7z/Jrk6nvyqI+ZaQb3TjRwJMrgo\n 1gEwQNZP6E8Inm2xqDbKFZRS9kCSSFtvuHE+fK7LgT3Pg1RbZs1hsZPNXKRng0YGIRlEzJ/0BhH\n EkZjB/NU=",
        "X-Gm-Gg": "AeBDiesjetGFA4GTe/YaYZ8lZ8JRRFMZgWDsFDO5h5mN92Pi2wi59RyaG0YyNaRW98P\n rGb5gMeJ1O5DnbiLaUYtBYSVgpBk4dmbI3AFk68BViTvjSI4zbltr0D294os4qxsUVacdinFk+4\n wHONaI/vnD8gntgxgd7j7Rcy3F0pw/Ihz/j5X8+50dwYk2ypJBwKHGK7R07mjIJDSf3RVGUArb+\n JJb48eP3qNfoowF7iRXSLAB+jrE66AuxO1MEUEQChTyn4pp2FCil4U38wAa9IeE2HAjSYnPeJzR\n uyXB1vPlJ70DvdpJDSHbH4ieDFOx5Xy9qJ2825JbjFs+6nIoM/ruLtFPSu+o6rgHjqC6EDyJAM3\n 9JU3e74EwT+CZgxX0doDdOZsfBujo4CB3g41da0tKc016js3kmM16QB/hq7bn22hDpFhgrP1zqL\n JS0dkAB+6LmWfgYJhK0uq7lLpwDyrmalO4WeN8fCf+Gpap8xYhp1/Zl5ri/2bEk0jmsI13zzaDk\n rBAdvtF7fI=",
        "X-Received": "by 2002:a05:600c:a404:b0:47e:e2eb:bc22 with SMTP id\n 5b1f17b1804b1-488fb73b2a3mr333100145e9.5.1776963820706;\n Thu, 23 Apr 2026 10:03:40 -0700 (PDT)",
        "From": "=?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= <philmd@linaro.org>",
        "To": "qemu-devel@nongnu.org",
        "Cc": "Roman Bolshakov <rbolshakov@ddn.com>,\n Jonathan Cameron <jonathan.cameron@huawei.com>, Mads Ynddal <mads@ynddal.dk>,\n qemu-arm@nongnu.org, Mohamed Mediouni <mohamed@unpredictable.fr>,\n Peter Maydell <peter.maydell@linaro.org>,\n Richard Henderson <richard.henderson@linaro.org>,\n Paolo Bonzini <pbonzini@redhat.com>, Alexander Graf <agraf@csgraf.de>,\n \"Scott J. Goldman\" <scottjgo@gmail.com>, =?utf-8?q?Philippe_Mathieu-Daud?=\n\t=?utf-8?q?=C3=A9?= <philmd@linaro.org>,\n Phil Dennis-Jordan <phil@philjordan.eu>",
        "Subject": "[PATCH 09/16] accel/hvf: avoid executable mappings for RAM-device\n memory",
        "Date": "Thu, 23 Apr 2026 19:02:21 +0200",
        "Message-ID": "<20260423170229.64655-10-philmd@linaro.org>",
        "X-Mailer": "git-send-email 2.53.0",
        "In-Reply-To": "<20260423170229.64655-1-philmd@linaro.org>",
        "References": "<20260423170229.64655-1-philmd@linaro.org>",
        "MIME-Version": "1.0",
        "Content-Type": "text/plain; charset=UTF-8",
        "Content-Transfer-Encoding": "8bit",
        "Received-SPF": "pass client-ip=2a00:1450:4864:20::32e;\n envelope-from=philmd@linaro.org; helo=mail-wm1-x32e.google.com",
        "X-Spam_score_int": "-20",
        "X-Spam_score": "-2.1",
        "X-Spam_bar": "--",
        "X-Spam_report": "(-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,\n DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001,\n SPF_PASS=-0.001 autolearn=unavailable autolearn_force=no",
        "X-Spam_action": "no action",
        "X-BeenThere": "qemu-devel@nongnu.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "qemu development <qemu-devel.nongnu.org>",
        "List-Unsubscribe": "<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>",
        "List-Archive": "<https://lists.nongnu.org/archive/html/qemu-devel>",
        "List-Post": "<mailto:qemu-devel@nongnu.org>",
        "List-Help": "<mailto:qemu-devel-request@nongnu.org?subject=help>",
        "List-Subscribe": "<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>",
        "Errors-To": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org",
        "Sender": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org"
    },
    "content": "From: \"Scott J. Goldman\" <scottjgo@gmail.com>\n\nOn macOS, HVF can panic the host kernel if a guest accesses device-backed\nmemory through an executable mapping. Leave RAM-device/MMIO regions\nmapped read/write only and keep EXEC for ordinary guest RAM.\n\nThis works around the immediate crash seen with passthrough BAR\nmappings. There are still platform-specific performance issues with\nguest write-combining mappings, but uncached mappings behave much more\nlike the host-side mapping and this at least avoids the panic.\n\nSigned-off-by: Scott J. Goldman <scottjgo@gmail.com>\nReviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>\nTested-by: Philippe Mathieu-Daudé <philmd@linaro.org>\nMessage-ID: <20260405072857.66484-3-scottjgo@gmail.com>\nSigned-off-by: Philippe Mathieu-Daudé <philmd@linaro.org>\n---\n accel/hvf/hvf-all.c | 10 +++++++++-\n 1 file changed, 9 insertions(+), 1 deletion(-)",
    "diff": "diff --git a/accel/hvf/hvf-all.c b/accel/hvf/hvf-all.c\nindex 82cb3717750..0b431fab72a 100644\n--- a/accel/hvf/hvf-all.c\n+++ b/accel/hvf/hvf-all.c\n@@ -116,7 +116,15 @@ static void hvf_set_phys_mem(MemoryRegionSection *section, bool add)\n         return;\n     }\n \n-    flags = HV_MEMORY_READ | HV_MEMORY_EXEC | (writable ? HV_MEMORY_WRITE : 0);\n+    flags = HV_MEMORY_READ | (writable ? HV_MEMORY_WRITE : 0);\n+    /*\n+     * Leave RAM-device/MMIO mappings RW-only: on macOS, accessing them through\n+     * executable HVF mappings can panic the host kernel. Ordinary guest RAM\n+     * still needs EXEC.\n+     */\n+    if (!memory_region_is_ram_device(area)) {\n+        flags |= HV_MEMORY_EXEC;\n+    }\n     mem = memory_region_get_ram_ptr(area) + section->offset_within_region;\n \n     trace_hvf_vm_map(gpa, size, mem, flags,\n",
    "prefixes": [
        "09/16"
    ]
}