get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/1.1/patches/2229394/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2229394,
    "url": "http://patchwork.ozlabs.org/api/1.1/patches/2229394/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/linuxppc-dev/patch/20260428081855.1249045-3-songmuchun@bytedance.com/",
    "project": {
        "id": 2,
        "url": "http://patchwork.ozlabs.org/api/1.1/projects/2/?format=api",
        "name": "Linux PPC development",
        "link_name": "linuxppc-dev",
        "list_id": "linuxppc-dev.lists.ozlabs.org",
        "list_email": "linuxppc-dev@lists.ozlabs.org",
        "web_url": "https://github.com/linuxppc/wiki/wiki",
        "scm_url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git",
        "webscm_url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/"
    },
    "msgid": "<20260428081855.1249045-3-songmuchun@bytedance.com>",
    "date": "2026-04-28T08:18:51",
    "name": "[v8,2/6] mm/memory_hotplug: Fix incorrect altmap passing in error path",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "ba7653b51e9a580a78fa4faab5ace07cee5635d3",
    "submitter": {
        "id": 78930,
        "url": "http://patchwork.ozlabs.org/api/1.1/people/78930/?format=api",
        "name": "Muchun Song",
        "email": "songmuchun@bytedance.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/linuxppc-dev/patch/20260428081855.1249045-3-songmuchun@bytedance.com/mbox/",
    "series": [
        {
            "id": 501789,
            "url": "http://patchwork.ozlabs.org/api/1.1/series/501789/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/linuxppc-dev/list/?series=501789",
            "date": "2026-04-28T08:18:50",
            "name": "[v8,1/6] mm/sparse-vmemmap: Fix vmemmap accounting underflow",
            "version": 8,
            "mbox": "http://patchwork.ozlabs.org/series/501789/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2229394/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2229394/checks/",
    "tags": {},
    "headers": {
        "Return-Path": "\n <linuxppc-dev+bounces-20223-incoming=patchwork.ozlabs.org@lists.ozlabs.org>",
        "X-Original-To": [
            "incoming@patchwork.ozlabs.org",
            "linuxppc-dev@lists.ozlabs.org"
        ],
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=bytedance.com header.i=@bytedance.com\n header.a=rsa-sha256 header.s=google header.b=DJz6Izlh;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ozlabs.org\n (client-ip=112.213.38.117; helo=lists.ozlabs.org;\n envelope-from=linuxppc-dev+bounces-20223-incoming=patchwork.ozlabs.org@lists.ozlabs.org;\n receiver=patchwork.ozlabs.org)",
            "lists.ozlabs.org;\n arc=none smtp.remote-ip=\"2607:f8b0:4864:20::52c\"",
            "lists.ozlabs.org;\n dmarc=pass (p=quarantine dis=none) header.from=bytedance.com",
            "lists.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=bytedance.com header.i=@bytedance.com\n header.a=rsa-sha256 header.s=google header.b=DJz6Izlh;\n\tdkim-atps=neutral",
            "lists.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=bytedance.com\n (client-ip=2607:f8b0:4864:20::52c; helo=mail-pg1-x52c.google.com;\n envelope-from=songmuchun@bytedance.com; receiver=lists.ozlabs.org)"
        ],
        "Received": [
            "from lists.ozlabs.org (lists.ozlabs.org [112.213.38.117])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1 raw public key)\n server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g4YHz4NlLz1yHX\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 28 Apr 2026 18:19:27 +1000 (AEST)",
            "from boromir.ozlabs.org (localhost [127.0.0.1])\n\tby lists.ozlabs.org (Postfix) with ESMTP id 4g4YHm5LQtz2yvF;\n\tTue, 28 Apr 2026 18:19:16 +1000 (AEST)",
            "from mail-pg1-x52c.google.com (mail-pg1-x52c.google.com\n [IPv6:2607:f8b0:4864:20::52c])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n\t(No client certificate requested)\n\tby lists.ozlabs.org (Postfix) with ESMTPS id 4g4YHm0MfBz2ySf\n\tfor <linuxppc-dev@lists.ozlabs.org>; Tue, 28 Apr 2026 18:19:15 +1000 (AEST)",
            "by mail-pg1-x52c.google.com with SMTP id\n 41be03b00d2f7-c7973f67f4dso3296695a12.1\n        for <linuxppc-dev@lists.ozlabs.org>;\n Tue, 28 Apr 2026 01:19:15 -0700 (PDT)",
            "from n232-176-004.byted.org ([36.110.163.101])\n        by smtp.gmail.com with ESMTPSA id\n 98e67ed59e1d1-3649003650esm2181356a91.8.2026.04.28.01.19.09\n        (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n        Tue, 28 Apr 2026 01:19:13 -0700 (PDT)"
        ],
        "ARC-Seal": "i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707; t=1777364356;\n\tcv=none;\n b=M2OWWsKauAN7S7cG7YOlh1QfAgEaSmjODBZAHAnU+BQ0ZgdwehNRh6INflh6esF1EAWUFneVzZqkc/gR76cLplWxki/mnz309rUQNjKHL0mpQBcvJNCKmjJ95dxHkl+KeXc2f55GXS9aaq56BGtRSj91DOLby8kmJTZ96MpClpDgushjLNenlbW0kzY/QqShAfKt+8IGAYRuPQMtgKBEgvnxoTY7VhDVZnyPBCbGn+P+ge9irMyqOlERp7K1v4QbLJp9Uy67+3UzO4jY6xbWwW1Z+XE0Gut+9xQIJv4heWZchJ3QbnCaRixO/aDrGuBQ1Ee1M0degIiKWlCw9i9Maw==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707;\n\tt=1777364356; c=relaxed/relaxed;\n\tbh=HM345nkBQh5gaxmYsV6Qr69X0RaLtEwieY1kCbsL1/U=;\n\th=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References:\n\t MIME-Version;\n b=QVVBdu8X0AALjQieNeK++tmzQTvZegB1eq+WigoY3aTPkX9VGGqmdeATXBCblbo43CXk0E25BhKEzfiaXsmGRdkYyoA//saMz5igzE2cLw9YT/Hq1FMzuCQbe+kS5AFHUN5qSo1KP387LlHvZwFsSuH1Shm2aNDI0s+a9h9iPFgaE/Z/fxSiwjrnBauxtJyQtwTkHk+mWz8TuYytI2ZywW1f80dwVlWQ3H+kNU6Md6rOorzJ8NQHkiZg1UlQ4pFejWf1tC9J0gGGquQnoV0LvFUb6SaAPhh8PldKwdgYpd1ytJ5ElKFZ+Zq8D/E79MiEpsDYfO9YGN5cceQX5BUy1A==",
        "ARC-Authentication-Results": "i=1; lists.ozlabs.org;\n dmarc=pass (p=quarantine dis=none) header.from=bytedance.com;\n dkim=pass (2048-bit key;\n unprotected) header.d=bytedance.com header.i=@bytedance.com\n header.a=rsa-sha256 header.s=google header.b=DJz6Izlh; dkim-atps=neutral;\n spf=pass (client-ip=2607:f8b0:4864:20::52c; helo=mail-pg1-x52c.google.com;\n envelope-from=songmuchun@bytedance.com;\n receiver=lists.ozlabs.org) smtp.mailfrom=bytedance.com",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=bytedance.com; s=google; t=1777364354; x=1777969154;\n darn=lists.ozlabs.org;\n        h=content-transfer-encoding:mime-version:references:in-reply-to\n         :message-id:date:subject:cc:to:from:from:to:cc:subject:date\n         :message-id:reply-to;\n        bh=HM345nkBQh5gaxmYsV6Qr69X0RaLtEwieY1kCbsL1/U=;\n        b=DJz6Izlhw8oJY2gbU+sGSMlQwbVrExoOW094ukCLEofeNcieLZeE/vP7ynFs7blaHF\n         WrQo09IHKTn9dwYqy4B+iNysm6rF+aXVjo4PD8Um5YQVK1jUNBs1Crq6J64r69OWpD0Q\n         Qo4B6iFseARZn96ytFi5GAQssFs6w4nQvIYGzrdQi1h3Xpj/xou0pFkop0GhpS9DQPXW\n         XNia/aYI1DhWQ+Q3g3bbPubEw9XvkoCK1sE627Hc+q2IND0+XaC4FgLBUtV+UzwLw8ix\n         iNbxA6zDnUeIxTW+urC9/uGgyXbWlFOoO/S3WtYfdBQvwFJbHJ01vRwjQR5Xmtl6rQ2K\n         qgRA==",
        "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=1e100.net; s=20251104; t=1777364354; x=1777969154;\n        h=content-transfer-encoding:mime-version:references:in-reply-to\n         :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n         :to:cc:subject:date:message-id:reply-to;\n        bh=HM345nkBQh5gaxmYsV6Qr69X0RaLtEwieY1kCbsL1/U=;\n        b=LQUAaxzvH+OXOPqnpvEmTwKtxrpzZDAIB+3bfoKzzfYZwSL+7705HBxSOQOSq51uea\n         8LCrqXuSPWXie+yDmGg9RLsKgojOF1/JENgLD31U7GzLDrItpu1B7gft9/Tm2PzpcPRO\n         ARnLr1kY4Mu//EsQZTtL+FiUmV8AJ3M3vM1evBC/aUlSDNC0XkXRnWSlzr7q/OlJt7l0\n         QM5IDF8k/NkgimN8cNr7JrDadcvw+kM1Mm4B48KXss89Uxc/Z6Ja8RuqakkRZOh6yXVd\n         QTiwWvkJBs0mCC7UNWN54t2du3RwwnLQLt51TLWebZfyOfkJZ2IbFp1aMxjEWa2ttdSW\n         DNdg==",
        "X-Forwarded-Encrypted": "i=1;\n AFNElJ8bRRR9hEMhfV1rvmW08p0MGES0Z/BGoTMy9GnsAEX7MS2nk4i80eZa3oe8o3SkJcYEiKuSI3gfJRmBxEc=@lists.ozlabs.org",
        "X-Gm-Message-State": "AOJu0YzrOVGs8UtzHwuhN1rzPE4Rfwr+xtBC9pWIRDScFUdAA4rxeL0Z\n\ta/JNKeUqY+TkzTgjVMtxklm+UtOrV/wsYBvgx61lzp7qGYRXyxugJl6mSGKkod0KAZs=",
        "X-Gm-Gg": "AeBDietyJPaXPBxKJqduZGzmlGghLmAgHuhCBoX37zkXMwupinwTraKxYIjqo02vt+R\n\trJzSy0BbAM9B4yU96bLZ8f/ZbdWbLZtqq+nMYiJbIG8Ebo7w+y0aNEBbmdfFj4SCQ4CxAI5a9dR\n\tZ9+GvX+/H2UUK/yOpcr3uB+vxK4g+9kGlxTI6w1k/WY8XTVJxDqO6eylYmKavJFbgTQQc/4tVQj\n\tNT2M0F4ooIEwYyHzu+d6EKeiCfx72BN7yWwIPkCYJdYZpssx59ywZV4fWxL2uFgvJdTZomfK/sw\n\tSyq6/4c5gsGa+AGJYWZxSVCXHhg8ZYzQqoxjnaJCSEHqYZ4G2phfNzm6kdPwN8diLhtXCWm8SVy\n\teeWK/XPG9bX+8iy2PgN5PQkbxBtYDvg8Di+pyrGnRNp40aYEA0SXbAjvEmAPFMGAiNTOivSsrbs\n\t7s1gw/dxcCMOWT8aG7D726OI7t/tmSPHdcpfZDZn5Dtr+RuPwmwE6ruxQ=",
        "X-Received": "by 2002:a17:90b:5804:b0:35f:b230:5889 with SMTP id\n 98e67ed59e1d1-36491ccd608mr1594024a91.6.1777364354086;\n        Tue, 28 Apr 2026 01:19:14 -0700 (PDT)",
        "From": "Muchun Song <songmuchun@bytedance.com>",
        "To": "Andrew Morton <akpm@linux-foundation.org>,\n\tDavid Hildenbrand <david@kernel.org>,\n\tMuchun Song <muchun.song@linux.dev>,\n\tOscar Salvador <osalvador@suse.de>,\n\tMichael Ellerman <mpe@ellerman.id.au>,\n\tMadhavan Srinivasan <maddy@linux.ibm.com>",
        "Cc": "Lorenzo Stoakes <ljs@kernel.org>,\n\t\"Liam R . Howlett\" <Liam.Howlett@oracle.com>,\n\tVlastimil Babka <vbabka@kernel.org>,\n\tMike Rapoport <rppt@kernel.org>,\n\tSuren Baghdasaryan <surenb@google.com>,\n\tMichal Hocko <mhocko@suse.com>,\n\tNicholas Piggin <npiggin@gmail.com>,\n\tChristophe Leroy <chleroy@kernel.org>,\n\taneesh.kumar@linux.ibm.com,\n\tjoao.m.martins@oracle.com,\n\tlinux-mm@kvack.org,\n\tlinuxppc-dev@lists.ozlabs.org,\n\tlinux-kernel@vger.kernel.org,\n\tMuchun Song <songmuchun@bytedance.com>,\n\tstable@vger.kernel.org",
        "Subject": "[PATCH v8 2/6] mm/memory_hotplug: Fix incorrect altmap passing in\n error path",
        "Date": "Tue, 28 Apr 2026 16:18:51 +0800",
        "Message-Id": "<20260428081855.1249045-3-songmuchun@bytedance.com>",
        "X-Mailer": "git-send-email 2.20.1",
        "In-Reply-To": "<20260428081855.1249045-1-songmuchun@bytedance.com>",
        "References": "<20260428081855.1249045-1-songmuchun@bytedance.com>",
        "X-Mailing-List": "linuxppc-dev@lists.ozlabs.org",
        "List-Id": "<linuxppc-dev.lists.ozlabs.org>",
        "List-Help": "<mailto:linuxppc-dev+help@lists.ozlabs.org>",
        "List-Owner": "<mailto:linuxppc-dev+owner@lists.ozlabs.org>",
        "List-Post": "<mailto:linuxppc-dev@lists.ozlabs.org>",
        "List-Archive": "<https://lore.kernel.org/linuxppc-dev/>,\n  <https://lists.ozlabs.org/pipermail/linuxppc-dev/>",
        "List-Subscribe": "<mailto:linuxppc-dev+subscribe@lists.ozlabs.org>,\n  <mailto:linuxppc-dev+subscribe-digest@lists.ozlabs.org>,\n  <mailto:linuxppc-dev+subscribe-nomail@lists.ozlabs.org>",
        "List-Unsubscribe": "<mailto:linuxppc-dev+unsubscribe@lists.ozlabs.org>",
        "Precedence": "list",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "X-Spam-Status": "No, score=-0.2 required=3.0 tests=DKIM_SIGNED,DKIM_VALID,\n\tDKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS\n\tautolearn=disabled version=4.0.1 OzLabs 8",
        "X-Spam-Checker-Version": "SpamAssassin 4.0.1 (2024-03-25) on lists.ozlabs.org"
    },
    "content": "In create_altmaps_and_memory_blocks(), when arch_add_memory() succeeds\nwith memmap_on_memory enabled, the vmemmap pages are allocated from\nparams.altmap. If create_memory_block_devices() subsequently fails, the\nerror path calls arch_remove_memory() with a NULL altmap instead of\nparams.altmap.\n\nThis is a bug that could lead to memory corruption. Since altmap is\nNULL, vmemmap_free() falls back to freeing the vmemmap pages into the\nsystem buddy allocator via free_pages() instead of the altmap.\narch_remove_memory() then immediately destroys the physical linear\nmapping for this memory. This injects unowned pages into the buddy\nallocator, causing machine checks or memory corruption if the system\nlater attempts to allocate and use those freed pages.\n\nFix this by passing params.altmap to arch_remove_memory() in the error\npath.\n\nFixes: 6b8f0798b85a (\"mm/memory_hotplug: split memmap_on_memory requests across memblocks\")\nCc: stable@vger.kernel.org\nSigned-off-by: Muchun Song <songmuchun@bytedance.com>\nAcked-by: David Hildenbrand (Arm) <david@kernel.org>\n---\n mm/memory_hotplug.c | 2 +-\n 1 file changed, 1 insertion(+), 1 deletion(-)",
    "diff": "diff --git a/mm/memory_hotplug.c b/mm/memory_hotplug.c\nindex 4426abb05655..e3352284f635 100644\n--- a/mm/memory_hotplug.c\n+++ b/mm/memory_hotplug.c\n@@ -1469,7 +1469,7 @@ static int create_altmaps_and_memory_blocks(int nid, struct memory_group *group,\n \t\tret = create_memory_block_devices(cur_start, memblock_size, nid,\n \t\t\t\t\t\t  params.altmap, group);\n \t\tif (ret) {\n-\t\t\tarch_remove_memory(cur_start, memblock_size, NULL);\n+\t\t\tarch_remove_memory(cur_start, memblock_size, params.altmap);\n \t\t\tkfree(params.altmap);\n \t\t\tgoto out;\n \t\t}\n",
    "prefixes": [
        "v8",
        "2/6"
    ]
}