get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2195835/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2195835,
    "url": "http://patchwork.ozlabs.org/api/patches/2195835/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260212062522.99565-13-anisinha@redhat.com/",
    "project": {
        "id": 14,
        "url": "http://patchwork.ozlabs.org/api/projects/14/?format=api",
        "name": "QEMU Development",
        "link_name": "qemu-devel",
        "list_id": "qemu-devel.nongnu.org",
        "list_email": "qemu-devel@nongnu.org",
        "web_url": "",
        "scm_url": "",
        "webscm_url": "",
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260212062522.99565-13-anisinha@redhat.com>",
    "list_archive_url": null,
    "date": "2026-02-12T06:24:56",
    "name": "[v4,12/31] kvm/i386: reload firmware for confidential guest reset",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "202aa83f0fcb500f52f52bb2cae0797829341a58",
    "submitter": {
        "id": 86030,
        "url": "http://patchwork.ozlabs.org/api/people/86030/?format=api",
        "name": "Ani Sinha",
        "email": "anisinha@redhat.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260212062522.99565-13-anisinha@redhat.com/mbox/",
    "series": [
        {
            "id": 491935,
            "url": "http://patchwork.ozlabs.org/api/series/491935/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/qemu-devel/list/?series=491935",
            "date": "2026-02-12T06:24:45",
            "name": "Introduce support for confidential guest reset (x86)",
            "version": 4,
            "mbox": "http://patchwork.ozlabs.org/series/491935/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2195835/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2195835/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=bt75U2Cw;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=google header.b=V7n82+V4;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)"
        ],
        "Received": [
            "from lists.gnu.org (lists.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fBQMl0BWbz1xvb\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 12 Feb 2026 17:27:46 +1100 (AEDT)",
            "from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1vqQ9g-0007pK-6R; Thu, 12 Feb 2026 01:26:24 -0500",
            "from eggs.gnu.org ([2001:470:142:3::10])\n by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <anisinha@redhat.com>)\n id 1vqQ9c-0007mS-AU\n for qemu-devel@nongnu.org; Thu, 12 Feb 2026 01:26:20 -0500",
            "from us-smtp-delivery-124.mimecast.com ([170.10.133.124])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <anisinha@redhat.com>)\n id 1vqQ9a-0005Fs-Vl\n for qemu-devel@nongnu.org; Thu, 12 Feb 2026 01:26:20 -0500",
            "from mail-pj1-f70.google.com (mail-pj1-f70.google.com\n [209.85.216.70]) by relay.mimecast.com with ESMTP with STARTTLS\n (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id\n us-mta-6-kAIUa2EiMAmMbYyDrXAF3A-1; Thu, 12 Feb 2026 01:26:14 -0500",
            "by mail-pj1-f70.google.com with SMTP id\n 98e67ed59e1d1-35449510446so2831354a91.0\n for <qemu-devel@nongnu.org>; Wed, 11 Feb 2026 22:26:14 -0800 (PST)",
            "from rhel9-box.lan ([122.164.27.113])\n by smtp.googlemail.com with ESMTPSA id\n 98e67ed59e1d1-3567e7d95d8sm4894122a91.2.2026.02.11.22.26.10\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Wed, 11 Feb 2026 22:26:13 -0800 (PST)"
        ],
        "DKIM-Signature": [
            "v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n s=mimecast20190719; t=1770877578;\n h=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n to:to:cc:cc:mime-version:mime-version:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references;\n bh=3B3ktj7wTRZtGaUxqIgngJ0a4ysK1is7v0SePu1Te4o=;\n b=bt75U2CwOV9ih5WAGbX2YEHDxZnauE0fMMdtiSxX8MxhrNOmHj9G9J/1oz0rrqPl2vPBe6\n BgbFpVGCGraqSdKeqelvSHY6SiftZICC9Rfn0Ty2oCs1WCWKenFV4MRxG9PG9tumyPacg7\n PZxQXoY32u31y+LfIW9iCsshgSNjuHU=",
            "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=redhat.com; s=google; t=1770877574; x=1771482374; darn=nongnu.org;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:from:to:cc:subject:date\n :message-id:reply-to;\n bh=3B3ktj7wTRZtGaUxqIgngJ0a4ysK1is7v0SePu1Te4o=;\n b=V7n82+V4nqq+mVamQJf5N3zrAyiV7dPc/yBpQtonst1gjnf/K0C8z6GEqUgu2nK2Dr\n Vh1PaTB6AtxEC+PpoKfFxGZb/uQ8WE5ro5DHe+AZ9SO1W5ai5X2rLdo2txe5mc9Hm6Yp\n KLSZ7P67onU1/Mk/b2sedRuoqiGh3eU1w2AYVOM6g5n7HERGH5X+8tZqKwT1asGWDmJ2\n alRtNx00E9/UTlDDKpNiDuFmkMDPkIGN8BZmTmWBO4FU1H/1QPUxMqi6tYCOeP1Z/yBY\n IBWAjtOfLjledFA1CtI9I6Di+YQROgXj47v3rMrI5SGQBtzG6qlesKp6ojD0Mi0lUFFf\n Fc5g=="
        ],
        "X-MC-Unique": "kAIUa2EiMAmMbYyDrXAF3A-1",
        "X-Mimecast-MFC-AGG-ID": "kAIUa2EiMAmMbYyDrXAF3A_1770877574",
        "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20230601; t=1770877574; x=1771482374;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=3B3ktj7wTRZtGaUxqIgngJ0a4ysK1is7v0SePu1Te4o=;\n b=A+669BJIGARS1sr9vXeZ6nqEA2CjK5iA3H9KtbE6EMxoX/y/Pe0l43NX60wPaYxSZ9\n sjYYxIMNbpoLxlX408gqVXOLW9LZVURKSP3Y8MVrDDfcSHMgdOmkHK+AS5hjo5To0DMk\n 1gRTM8f/4FpGwkZYPhRQhCERGkbulRZfM7v237jRg5DJnvsKkWIZVqh2PGt4El89PweE\n q8Q0X5tSv1SQjLRnm8Ph1TO5q/Bx9ra/oXWjGp9mddydG1gxGsQyQxDzAI+hGJzU02Wd\n 7kSuFFCiVphhjYCWVjTiDMs5sgW7YeNiiiCy/kWLsDbF+tzhWrTVuMiCBX5EEkPox0mh\n 4ttg==",
        "X-Forwarded-Encrypted": "i=1;\n AJvYcCWMvD+zRUbtC6lxivXbtyDybTRq5dyLCOfAgGG9GnoB5MhOz8K1F6uX8cxn+k18+S9rnFRxRQuYpm3F@nongnu.org",
        "X-Gm-Message-State": "AOJu0Yz8cCZXuEyMtUm0O9vZVAtQICYP/PUmRkYRkol/qXc6JDUWPhi0\n a7r4dzje1Mk4gG1i5RMbhsU3fuZwgj6hEStv+4VdXPfWL2TIizEoStUUFGSYRZCXTsiTA1ogKd4\n FFCWpWNHVPKkjGcqLBBZW8vDcOQl99wtjkdxO2y3nON/6rYsvcNKdjx30",
        "X-Gm-Gg": "AZuq6aKRqYoLFX1QndNtlirFAmMxShrztW5eoChJhKKjmbIuwjc7okQantkrEbrJdRL\n uvcK6pfUbT8314tU02fT1gEBukcNT+JIepjSSJTBlBFLl5vYdpGfHTv/0LIyhWlkX4zLm8BUSDS\n wprDvdnF/Rnq4nIoHVfHAxsptXo7UV9l7STlywBAmpvE2YVb87e1skxU2rB0PKTP2R99AyA6p/G\n rjWlvxXKTnqw2KULnliJZYV9vNz2W/xSaZybC6O6WRWV1nM+Pd8q8MIdFFPFGeLG2bpOauPdFIC\n YyWtqitzkhxGvplbWaRtolhpDcYxZVS4aAxBSek1l9tK2jEu4VozDfC60Aczb9CkgXjz7nhX1WF\n FbVtxEKbYm9F92sONFLkorvNNQGG3j10RjY975amP+FJs6FL2loHfAX4=",
        "X-Received": [
            "by 2002:a17:90b:5287:b0:356:22ef:57ba with SMTP id\n 98e67ed59e1d1-35693cbd17bmr1186775a91.7.1770877573702;\n Wed, 11 Feb 2026 22:26:13 -0800 (PST)",
            "by 2002:a17:90b:5287:b0:356:22ef:57ba with SMTP id\n 98e67ed59e1d1-35693cbd17bmr1186763a91.7.1770877573345;\n Wed, 11 Feb 2026 22:26:13 -0800 (PST)"
        ],
        "From": "Ani Sinha <anisinha@redhat.com>",
        "To": "Paolo Bonzini <pbonzini@redhat.com>, Marcelo Tosatti <mtosatti@redhat.com>",
        "Cc": "kraxel@redhat.com, Ani Sinha <anisinha@redhat.com>, kvm@vger.kernel.org,\n qemu-devel@nongnu.org",
        "Subject": "[PATCH v4 12/31] kvm/i386: reload firmware for confidential guest\n reset",
        "Date": "Thu, 12 Feb 2026 11:54:56 +0530",
        "Message-ID": "<20260212062522.99565-13-anisinha@redhat.com>",
        "X-Mailer": "git-send-email 2.42.0",
        "In-Reply-To": "<20260212062522.99565-1-anisinha@redhat.com>",
        "References": "<20260212062522.99565-1-anisinha@redhat.com>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "Received-SPF": "pass client-ip=170.10.133.124;\n envelope-from=anisinha@redhat.com;\n helo=us-smtp-delivery-124.mimecast.com",
        "X-Spam_score_int": "-20",
        "X-Spam_score": "-2.1",
        "X-Spam_bar": "--",
        "X-Spam_report": "(-2.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001,\n DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=0.001,\n RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001,\n SPF_HELO_PASS=-0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no",
        "X-Spam_action": "no action",
        "X-BeenThere": "qemu-devel@nongnu.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "qemu development <qemu-devel.nongnu.org>",
        "List-Unsubscribe": "<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>",
        "List-Archive": "<https://lists.nongnu.org/archive/html/qemu-devel>",
        "List-Post": "<mailto:qemu-devel@nongnu.org>",
        "List-Help": "<mailto:qemu-devel-request@nongnu.org?subject=help>",
        "List-Subscribe": "<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>",
        "Errors-To": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org",
        "Sender": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org"
    },
    "content": "When IGVM is not being used by the confidential guest, the guest firmware has\nto be reloaded explicitly again into memory. This is because, the memory into\nwhich the firmware was loaded before reset was encrypted and is thus lost\nupon reset. When IGVM is used, it is expected that the IGVM will contain the\nguest firmware and the execution of the IGVM directives will set up the guest\nfirmware memory.\n\nSigned-off-by: Ani Sinha <anisinha@redhat.com>\n---\n target/i386/kvm/kvm.c | 9 ++++++++-\n 1 file changed, 8 insertions(+), 1 deletion(-)",
    "diff": "diff --git a/target/i386/kvm/kvm.c b/target/i386/kvm/kvm.c\nindex e82a6e9eda..eec2f27a0f 100644\n--- a/target/i386/kvm/kvm.c\n+++ b/target/i386/kvm/kvm.c\n@@ -3281,7 +3281,14 @@ int kvm_arch_on_vmfd_change(MachineState *ms, KVMState *s)\n \n     if (object_dynamic_cast(OBJECT(ms), TYPE_X86_MACHINE)) {\n         X86MachineState *x86ms = X86_MACHINE(ms);\n-\n+        /*\n+         * For confidential guests, reload bios ROM if IGVM is not specified.\n+         * If an IGVM file is specified then the firmware must be provided\n+         * in the IGVM file.\n+         */\n+        if (ms->cgs && !x86ms->igvm) {\n+                x86_bios_rom_reload(x86ms);\n+        }\n         if (x86_machine_is_smm_enabled(x86ms)) {\n             memory_listener_register(&smram_listener.listener,\n                                      &smram_address_space);\n",
    "prefixes": [
        "v4",
        "12/31"
    ]
}