get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2196593/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2196593,
    "url": "http://patchwork.ozlabs.org/api/patches/2196593/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260215112543.4817-5-mohamed@unpredictable.fr/",
    "project": {
        "id": 14,
        "url": "http://patchwork.ozlabs.org/api/projects/14/?format=api",
        "name": "QEMU Development",
        "link_name": "qemu-devel",
        "list_id": "qemu-devel.nongnu.org",
        "list_email": "qemu-devel@nongnu.org",
        "web_url": "",
        "scm_url": "",
        "webscm_url": "",
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260215112543.4817-5-mohamed@unpredictable.fr>",
    "list_archive_url": null,
    "date": "2026-02-15T11:25:33",
    "name": "[v10,04/14] accel, hw/arm, include/system/hvf: infrastructure changes for HVF vGIC",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "a8671cc380bb0c0cb34e47adaeea08f21c060177",
    "submitter": {
        "id": 91318,
        "url": "http://patchwork.ozlabs.org/api/people/91318/?format=api",
        "name": "Mohamed Mediouni",
        "email": "mohamed@unpredictable.fr"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260215112543.4817-5-mohamed@unpredictable.fr/mbox/",
    "series": [
        {
            "id": 492211,
            "url": "http://patchwork.ozlabs.org/api/series/492211/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/qemu-devel/list/?series=492211",
            "date": "2026-02-15T11:25:32",
            "name": "HVF: Add support for platform vGIC and nested virtualisation",
            "version": 10,
            "mbox": "http://patchwork.ozlabs.org/series/492211/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2196593/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2196593/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=unpredictable.fr header.i=@unpredictable.fr\n header.a=rsa-sha256 header.s=sig1 header.b=gkm5A0dq;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)"
        ],
        "Received": [
            "from lists.gnu.org (lists.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fDNsw3sT3z1xpY\n\tfor <incoming@patchwork.ozlabs.org>; Sun, 15 Feb 2026 22:27:16 +1100 (AEDT)",
            "from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1vraGS-0005Gj-9w; Sun, 15 Feb 2026 06:26:12 -0500",
            "from eggs.gnu.org ([2001:470:142:3::10])\n by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <mohamed@unpredictable.fr>)\n id 1vraGL-0005Es-H0\n for qemu-devel@nongnu.org; Sun, 15 Feb 2026 06:26:07 -0500",
            "from p-west2-cluster1-host6-snip4-10.eps.apple.com ([57.103.68.63]\n helo=outbound.mr.icloud.com)\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <mohamed@unpredictable.fr>)\n id 1vraGG-0007wk-4M\n for qemu-devel@nongnu.org; Sun, 15 Feb 2026 06:26:04 -0500",
            "from outbound.mr.icloud.com (unknown [127.0.0.2])\n by p00-icloudmta-asmtp-us-west-2a-100-percent-0 (Postfix) with ESMTPS id\n A439218002A9; Sun, 15 Feb 2026 11:25:57 +0000 (UTC)",
            "from localhost.localdomain (unknown [17.57.152.38])\n by p00-icloudmta-asmtp-us-west-2a-100-percent-0 (Postfix) with ESMTPSA id\n 2D0741800294; Sun, 15 Feb 2026 11:25:55 +0000 (UTC)"
        ],
        "Dkim-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=unpredictable.fr;\n s=sig1; t=1771154759; x=1773746759;\n bh=59TJPyifQdYiPo+R2EjYdFKf7iChqKxw+V2UadvNjas=;\n h=From:To:Subject:Date:Message-ID:MIME-Version:x-icloud-hme;\n b=gkm5A0dqkQEXMfBKt9BCbbzN88Wr/e5R0+HnjhpCsHEImxRQn21OvHW0mwTv5QUH7L1VtX6bQKn9Mby+p9uPouqjSmpONXjFsZ1jv43tK5xYenhUd13XJNdx5hQaQK5iUrFeZaSVRm/adkf2xRm8AtDAJxvEtTgl4XNivIQXbR9huocJ6i4PO3vJ8af96yZ2xmzw76IxD4bpZVWfEE4+ODvNuh9ArGmbcw/lDbzeL2VfAijOsuKUG/Oj5NZM4/LvjUrPBXtcY7M22bsXDZqrAlQsp5QK2FOVWP/rDmG2gaZHn0GGvJefXiIc14DAUGxjeS/YQp6j7dZjdoKk+AybiQ==",
        "mail-alias-created-date": "1752046281608",
        "From": "Mohamed Mediouni <mohamed@unpredictable.fr>",
        "To": "qemu-devel@nongnu.org",
        "Cc": "qemu-arm@nongnu.org, Peter Maydell <peter.maydell@linaro.org>,\n Mads Ynddal <mads@ynddal.dk>, Roman Bolshakov <rbolshakov@ddn.com>,\n Phil Dennis-Jordan <phil@philjordan.eu>, Alexander Graf <agraf@csgraf.de>,\n Paolo Bonzini <pbonzini@redhat.com>, Cameron Esfahani <dirty@apple.com>,\n Mohamed Mediouni <mohamed@unpredictable.fr>",
        "Subject": "[PATCH v10 04/14] accel, hw/arm,\n include/system/hvf: infrastructure changes for HVF vGIC",
        "Date": "Sun, 15 Feb 2026 12:25:33 +0100",
        "Message-ID": "<20260215112543.4817-5-mohamed@unpredictable.fr>",
        "X-Mailer": "git-send-email 2.50.1",
        "In-Reply-To": "<20260215112543.4817-1-mohamed@unpredictable.fr>",
        "References": "<20260215112543.4817-1-mohamed@unpredictable.fr>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "X-Proofpoint-Spam-Details-Enc": "AW1haW4tMjYwMjE1MDA5MiBTYWx0ZWRfXyBEWuiq55QM2\n lMcuMFf8eegJPJuM5sVgs6GDG3KTQrZNrBbQdj5wYCKm9Ealtj5LBgoGOIz5MgAL9JTbwo4ESyp\n OO7L8NljuwAfqh5zDRvLIt8BQO62rgB9IqbLJBavUDfSkT2HKEiXrBEVBKdpD3tSa8G7rdBNJs+\n q1gaAQZUQ6S30C7ic/XhLdI2UA/2pulTGWN3wSbmoW40KCX+N5W/qUVe/1JZLmNtkquBZO3pRrv\n q2hbBlzc+v9JkiFcJf7bD+toHspSwl9WyqNg9WTVTEtsQySAljKmirDaKc/LB+bThCEBwO+N2EM\n NfzqvJVw0KIikEdjuz0x8xgTFAnLN4PQE3RS8FAf1k+RU2RGWokP9Xe/B1r28Y=",
        "X-Authority-Info-Out": "v=2.4 cv=FMQWBuos c=1 sm=1 tr=0 ts=6991ad46\n cx=c_apl:c_apl_out:c_pps a=9OgfyREA4BUYbbCgc0Y0oA==:117\n a=9OgfyREA4BUYbbCgc0Y0oA==:17 a=HzLeVaNsDn8A:10 a=VkNPw1HP01LnGYTKEx00:22\n a=Mpw57Om8IfrbqaoTuvik:22 a=GgsMoib0sEa3-_RKJdDe:22 a=n4FVybPFTm1vobq06wUA:9",
        "X-Proofpoint-GUID": "0S9OHb8sbkc-nVZUEIxVrkAB8pr3_gxi",
        "X-Proofpoint-ORIG-GUID": "0S9OHb8sbkc-nVZUEIxVrkAB8pr3_gxi",
        "X-Proofpoint-Virus-Version": "vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1121,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-02-15_04,2026-02-13_01,2025-10-01_01",
        "X-Proofpoint-Spam-Details": "rule=notspam policy=default score=0\n lowpriorityscore=0 bulkscore=0 mlxlogscore=999 suspectscore=0 malwarescore=0\n mlxscore=0 spamscore=0 phishscore=0 adultscore=0 clxscore=1030\n classifier=spam authscore=0 adjust=0 reason=mlx scancount=1\n engine=8.22.0-2601150000 definitions=main-2602150092",
        "X-JNJ": "\n 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",
        "Received-SPF": "pass client-ip=57.103.68.63;\n envelope-from=mohamed@unpredictable.fr; helo=outbound.mr.icloud.com",
        "X-Spam_score_int": "-27",
        "X-Spam_score": "-2.8",
        "X-Spam_bar": "--",
        "X-Spam_report": "(-2.8 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,\n DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001,\n RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001,\n SPF_HELO_PASS=-0.001,\n SPF_PASS=-0.001 autolearn=unavailable autolearn_force=no",
        "X-Spam_action": "no action",
        "X-BeenThere": "qemu-devel@nongnu.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "qemu development <qemu-devel.nongnu.org>",
        "List-Unsubscribe": "<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>",
        "List-Archive": "<https://lists.nongnu.org/archive/html/qemu-devel>",
        "List-Post": "<mailto:qemu-devel@nongnu.org>",
        "List-Help": "<mailto:qemu-devel-request@nongnu.org?subject=help>",
        "List-Subscribe": "<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>",
        "Errors-To": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org",
        "Sender": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org"
    },
    "content": "Misc changes needed for HVF vGIC enablement.\n\nNote: x86_64 macOS exposes interrupt controller virtualisation since macOS 12.\nKeeping an #ifdef here in case we end up supporting that...\n\nHowever, given that x86_64 macOS is on its way out, it'll probably (?) not be supported in Qemu.\n\nSigned-off-by: Mohamed Mediouni <mohamed@unpredictable.fr>\n---\n accel/hvf/hvf-all.c        | 50 ++++++++++++++++++++++++++++++++++++++\n accel/stubs/hvf-stub.c     |  1 +\n hw/arm/virt.c              | 23 +++++++++++++++---\n hw/intc/arm_gicv3_common.c |  3 +++\n include/system/hvf.h       |  3 +++\n system/vl.c                |  2 ++\n 6 files changed, 78 insertions(+), 4 deletions(-)",
    "diff": "diff --git a/accel/hvf/hvf-all.c b/accel/hvf/hvf-all.c\nindex 033c677b6f..929f53fd37 100644\n--- a/accel/hvf/hvf-all.c\n+++ b/accel/hvf/hvf-all.c\n@@ -10,6 +10,8 @@\n \n #include \"qemu/osdep.h\"\n #include \"qemu/error-report.h\"\n+#include \"qapi/error.h\"\n+#include \"qapi/qapi-visit-common.h\"\n #include \"accel/accel-ops.h\"\n #include \"exec/cpu-common.h\"\n #include \"system/address-spaces.h\"\n@@ -22,6 +24,7 @@\n #include \"trace.h\"\n \n bool hvf_allowed;\n+bool hvf_kernel_irqchip;\n \n const char *hvf_return_string(hv_return_t ret)\n {\n@@ -217,6 +220,43 @@ static int hvf_gdbstub_sstep_flags(AccelState *as)\n     return SSTEP_ENABLE | SSTEP_NOIRQ;\n }\n \n+static void hvf_set_kernel_irqchip(Object *obj, Visitor *v,\n+                                   const char *name, void *opaque,\n+                                   Error **errp)\n+{\n+    OnOffSplit mode;\n+    if (!visit_type_OnOffSplit(v, name, &mode, errp)) {\n+        return;\n+    }\n+\n+    switch (mode) {\n+    case ON_OFF_SPLIT_ON:\n+#ifdef HOST_X86_64\n+        /* macOS 12 onwards exposes an HVF virtual APIC. */\n+        error_setg(errp, \"HVF: kernel irqchip is not currently implemented for x86.\");\n+        break;\n+#else\n+        hvf_kernel_irqchip = true;\n+        break;\n+#endif\n+\n+    case ON_OFF_SPLIT_OFF:\n+        hvf_kernel_irqchip = false;\n+        break;\n+\n+    case ON_OFF_SPLIT_SPLIT:\n+        error_setg(errp, \"HVF: split irqchip is not supported on HVF.\");\n+        break;\n+\n+    default:\n+        /*\n+         * The value was checked in visit_type_OnOffSplit() above. If\n+         * we get here, then something is wrong in QEMU.\n+         */\n+        abort();\n+    }\n+}\n+\n static void hvf_accel_class_init(ObjectClass *oc, const void *data)\n {\n     AccelClass *ac = ACCEL_CLASS(oc);\n@@ -224,6 +264,16 @@ static void hvf_accel_class_init(ObjectClass *oc, const void *data)\n     ac->init_machine = hvf_accel_init;\n     ac->allowed = &hvf_allowed;\n     ac->gdbstub_supported_sstep_flags = hvf_gdbstub_sstep_flags;\n+#ifdef HOST_X86_64\n+    hvf_kernel_irqchip = false;\n+#else\n+    hvf_kernel_irqchip = true;\n+#endif\n+    object_class_property_add(oc, \"kernel-irqchip\", \"on|off|split\",\n+        NULL, hvf_set_kernel_irqchip,\n+        NULL, NULL);\n+    object_class_property_set_description(oc, \"kernel-irqchip\",\n+        \"Configure HVF irqchip\");\n }\n \n static const TypeInfo hvf_accel_type = {\ndiff --git a/accel/stubs/hvf-stub.c b/accel/stubs/hvf-stub.c\nindex 42eadc5ca9..6bd08759ba 100644\n--- a/accel/stubs/hvf-stub.c\n+++ b/accel/stubs/hvf-stub.c\n@@ -10,3 +10,4 @@\n #include \"system/hvf.h\"\n \n bool hvf_allowed;\n+bool hvf_kernel_irqchip;\ndiff --git a/hw/arm/virt.c b/hw/arm/virt.c\nindex 50865e8115..391d5e6f76 100644\n--- a/hw/arm/virt.c\n+++ b/hw/arm/virt.c\n@@ -838,7 +838,7 @@ static void create_gic(VirtMachineState *vms, MemoryRegion *mem)\n      * interrupts; there are always 32 of the former (mandated by GIC spec).\n      */\n     qdev_prop_set_uint32(vms->gic, \"num-irq\", NUM_IRQS + 32);\n-    if (!kvm_irqchip_in_kernel()) {\n+    if (!kvm_irqchip_in_kernel() && !hvf_irqchip_in_kernel()) {\n         qdev_prop_set_bit(vms->gic, \"has-security-extensions\", vms->secure);\n     }\n \n@@ -861,7 +861,8 @@ static void create_gic(VirtMachineState *vms, MemoryRegion *mem)\n         qdev_prop_set_array(vms->gic, \"redist-region-count\",\n                             redist_region_count);\n \n-        if (!kvm_irqchip_in_kernel()) {\n+        if (!kvm_irqchip_in_kernel() &&\n+         !(hvf_enabled() && hvf_irqchip_in_kernel())) {\n             if (vms->tcg_its) {\n                 object_property_set_link(OBJECT(vms->gic), \"sysmem\",\n                                          OBJECT(mem), &error_fatal);\n@@ -872,7 +873,7 @@ static void create_gic(VirtMachineState *vms, MemoryRegion *mem)\n                                  ARCH_GIC_MAINT_IRQ);\n         }\n     } else {\n-        if (!kvm_irqchip_in_kernel()) {\n+        if (!kvm_irqchip_in_kernel() && !hvf_irqchip_in_kernel()) {\n             qdev_prop_set_bit(vms->gic, \"has-virtualization-extensions\",\n                               vms->virt);\n         }\n@@ -2119,7 +2120,15 @@ static void finalize_gic_version(VirtMachineState *vms)\n         accel_name = \"KVM with kernel-irqchip=off\";\n     } else if (whpx_enabled()) {\n         gics_supported |= VIRT_GIC_VERSION_3_MASK;\n-    } else if (tcg_enabled() || hvf_enabled() || qtest_enabled())  {\n+    } else if (hvf_enabled()) {\n+        if (!hvf_irqchip_in_kernel()) {\n+            gics_supported |= VIRT_GIC_VERSION_2_MASK;\n+        }\n+        /* Hypervisor.framework doesn't expose EL2<->1 transition notifiers */\n+        if (!(!hvf_irqchip_in_kernel() && vms->virt)) {\n+            gics_supported |= VIRT_GIC_VERSION_3_MASK;\n+        }\n+    } else if (tcg_enabled() || qtest_enabled())  {\n         gics_supported |= VIRT_GIC_VERSION_2_MASK;\n         if (module_object_class_by_name(\"arm-gicv3\")) {\n             gics_supported |= VIRT_GIC_VERSION_3_MASK;\n@@ -2161,6 +2170,8 @@ static void finalize_msi_controller(VirtMachineState *vms)\n             vms->msi_controller = VIRT_MSI_CTRL_GICV2M;\n         } else if (whpx_enabled()) {\n             vms->msi_controller = VIRT_MSI_CTRL_GICV2M;\n+        }  else if (hvf_enabled() && hvf_irqchip_in_kernel()) {\n+            vms->msi_controller = VIRT_MSI_CTRL_GICV2M;\n         } else {\n             vms->msi_controller = VIRT_MSI_CTRL_ITS;\n         }\n@@ -2180,6 +2191,10 @@ static void finalize_msi_controller(VirtMachineState *vms)\n             error_report(\"ITS not supported on WHPX.\");\n             exit(1);\n         }\n+        if (hvf_enabled() && hvf_irqchip_in_kernel()) {\n+            error_report(\"ITS not supported on HVF when using the hardware vGIC.\");\n+            exit(1);\n+        }\n     }\n \n     assert(vms->msi_controller != VIRT_MSI_CTRL_AUTO);\ndiff --git a/hw/intc/arm_gicv3_common.c b/hw/intc/arm_gicv3_common.c\nindex 9c3fb2f4bf..f7ba74e6d5 100644\n--- a/hw/intc/arm_gicv3_common.c\n+++ b/hw/intc/arm_gicv3_common.c\n@@ -33,6 +33,7 @@\n #include \"hw/arm/linux-boot-if.h\"\n #include \"system/kvm.h\"\n #include \"system/whpx.h\"\n+#include \"system/hvf.h\"\n \n \n static void gicv3_gicd_no_migration_shift_bug_post_load(GICv3State *cs)\n@@ -659,6 +660,8 @@ const char *gicv3_class_name(void)\n         return \"kvm-arm-gicv3\";\n     } else if (whpx_enabled()) {\n         return TYPE_WHPX_GICV3;\n+    } else if (hvf_enabled() && hvf_irqchip_in_kernel()) {\n+        return TYPE_HVF_GICV3;\n     } else {\n         if (kvm_enabled()) {\n             error_report(\"Userspace GICv3 is not supported with KVM\");\ndiff --git a/include/system/hvf.h b/include/system/hvf.h\nindex d3dcf088b3..dc8da85979 100644\n--- a/include/system/hvf.h\n+++ b/include/system/hvf.h\n@@ -26,8 +26,11 @@\n #ifdef CONFIG_HVF_IS_POSSIBLE\n extern bool hvf_allowed;\n #define hvf_enabled() (hvf_allowed)\n+extern bool hvf_kernel_irqchip;\n+#define hvf_irqchip_in_kernel()  (hvf_kernel_irqchip)\n #else /* !CONFIG_HVF_IS_POSSIBLE */\n #define hvf_enabled() 0\n+#define hvf_irqchip_in_kernel() 0\n #endif /* !CONFIG_HVF_IS_POSSIBLE */\n \n #define TYPE_HVF_ACCEL ACCEL_CLASS_NAME(\"hvf\")\ndiff --git a/system/vl.c b/system/vl.c\nindex aa9a155041..d3f311eff8 100644\n--- a/system/vl.c\n+++ b/system/vl.c\n@@ -1778,6 +1778,8 @@ static void qemu_apply_legacy_machine_options(QDict *qdict)\n                                    false);\n         object_register_sugar_prop(ACCEL_CLASS_NAME(\"whpx\"), \"kernel-irqchip\", value,\n                                    false);\n+        object_register_sugar_prop(ACCEL_CLASS_NAME(\"hvf\"), \"kernel-irqchip\", value,\n+                                   false);\n         qdict_del(qdict, \"kernel-irqchip\");\n     }\n \n",
    "prefixes": [
        "v10",
        "04/14"
    ]
}