get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2224145/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2224145,
    "url": "http://patchwork.ozlabs.org/api/patches/2224145/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/linux-pci/patch/12a224061de4fff9e0725909fd0ba4e14996ff08.1776381841.git.nicolinc@nvidia.com/",
    "project": {
        "id": 28,
        "url": "http://patchwork.ozlabs.org/api/projects/28/?format=api",
        "name": "Linux PCI development",
        "link_name": "linux-pci",
        "list_id": "linux-pci.vger.kernel.org",
        "list_email": "linux-pci@vger.kernel.org",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<12a224061de4fff9e0725909fd0ba4e14996ff08.1776381841.git.nicolinc@nvidia.com>",
    "list_archive_url": null,
    "date": "2026-04-16T23:28:34",
    "name": "[v3,05/11] iommu: Change group->devices to RCU-protected list",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "734f8359c61ef6188a36fec7851bf51f6db31d1b",
    "submitter": {
        "id": 82183,
        "url": "http://patchwork.ozlabs.org/api/people/82183/?format=api",
        "name": "Nicolin Chen",
        "email": "nicolinc@nvidia.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/linux-pci/patch/12a224061de4fff9e0725909fd0ba4e14996ff08.1776381841.git.nicolinc@nvidia.com/mbox/",
    "series": [
        {
            "id": 500217,
            "url": "http://patchwork.ozlabs.org/api/series/500217/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/linux-pci/list/?series=500217",
            "date": "2026-04-16T23:28:31",
            "name": "iommu/arm-smmu-v3: Quarantine device upon ATC invalidation timeout",
            "version": 3,
            "mbox": "http://patchwork.ozlabs.org/series/500217/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2224145/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2224145/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "\n <linux-pci+bounces-52665-incoming=patchwork.ozlabs.org@vger.kernel.org>",
        "X-Original-To": [
            "incoming@patchwork.ozlabs.org",
            "linux-pci@vger.kernel.org"
        ],
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=Nvidia.com header.i=@Nvidia.com header.a=rsa-sha256\n header.s=selector2 header.b=QkkrE/iP;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=172.105.105.114; helo=tor.lore.kernel.org;\n envelope-from=linux-pci+bounces-52665-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)",
            "smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=Nvidia.com header.i=@Nvidia.com\n header.b=\"QkkrE/iP\"",
            "smtp.subspace.kernel.org;\n arc=fail smtp.client-ip=52.101.193.40",
            "smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=nvidia.com",
            "smtp.subspace.kernel.org;\n spf=fail smtp.mailfrom=nvidia.com"
        ],
        "Received": [
            "from tor.lore.kernel.org (tor.lore.kernel.org [172.105.105.114])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fxZ7w30xJz1yD3\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 17 Apr 2026 09:33:16 +1000 (AEST)",
            "from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby tor.lore.kernel.org (Postfix) with ESMTP id 47963304A224\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 16 Apr 2026 23:29:37 +0000 (UTC)",
            "from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id CC9DD37107F;\n\tThu, 16 Apr 2026 23:29:35 +0000 (UTC)",
            "from CH1PR05CU001.outbound.protection.outlook.com\n (mail-northcentralusazon11010040.outbound.protection.outlook.com\n [52.101.193.40])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 8347538C41F;\n\tThu, 16 Apr 2026 23:29:34 +0000 (UTC)",
            "from SJ2PR07CA0021.namprd07.prod.outlook.com (2603:10b6:a03:505::23)\n by CH3PR12MB9217.namprd12.prod.outlook.com (2603:10b6:610:195::10) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9818.25; Thu, 16 Apr\n 2026 23:29:28 +0000",
            "from SJ1PEPF00002315.namprd03.prod.outlook.com\n (2603:10b6:a03:505:cafe::9c) by SJ2PR07CA0021.outlook.office365.com\n (2603:10b6:a03:505::23) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9769.52 via Frontend Transport; Thu,\n 16 Apr 2026 23:29:28 +0000",
            "from mail.nvidia.com (216.228.117.160) by\n SJ1PEPF00002315.mail.protection.outlook.com (10.167.242.169) with Microsoft\n SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.20.9769.17 via Frontend Transport; Thu, 16 Apr 2026 23:29:28 +0000",
            "from rnnvmail205.nvidia.com (10.129.68.10) by mail.nvidia.com\n (10.129.200.66) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Thu, 16 Apr\n 2026 16:29:08 -0700",
            "from rnnvmail203.nvidia.com (10.129.68.9) by rnnvmail205.nvidia.com\n (10.129.68.10) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Thu, 16 Apr\n 2026 16:29:08 -0700",
            "from Asurada-Nvidia.nvidia.com (10.127.8.11) by mail.nvidia.com\n (10.129.68.9) with Microsoft SMTP Server id 15.2.2562.20 via Frontend\n Transport; Thu, 16 Apr 2026 16:29:02 -0700"
        ],
        "ARC-Seal": [
            "i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776382175; cv=fail;\n b=lLczulHwyT7XYZ+9sj+8HTLop9o8SFxWQt9jL0U0nlIeXemYBw6z7fBJUpi9TLAU0uI3zWLVcikMZkv/gS695/41WbLJ1OuD525kuC3vuWE2ke5qMcdoYyCfei292mlUjQS8oQsz1hiQNRRoFomtSHPIgN4lmYMVlB8WDAZHEd4=",
            "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=WgtfLaqw+Kmr/A6bbWyvJgMkpApb5sF7dFS+GeElckpw0fwvytcnWPqiRgru1f2ZcUycVMz+nVAA7aNTOQnh7zyh+z0qyLIpdlqMQQ6EUtJLa1DcuqTZk8nwJIbUb6mMSYsOU5A9E5/aHWSv/6LUItwpud5aHHU9vJk9FQmxE5hl7v1vHoEPSZGEPeAwt9IwQjEKiR+g70j5CYihpmGZ6aGR41QqqXVpLLNwA11sjcI19si6J2vh661t9lZ83QSc9n2oh0Tx0W5O0kT5gQqBfzGDKAr+InMxcWLMBfkhF7KXbrxkABNasrtWL2YmBg9wW1o/GQ3piJk4JVBqtdr8GQ=="
        ],
        "ARC-Message-Signature": [
            "i=2; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776382175; c=relaxed/simple;\n\tbh=rr2Gk4T1i1Z0dOcA1twxVLiZZfojFOV+K8r6gr1VkHs=;\n\th=From:To:CC:Subject:Date:Message-ID:In-Reply-To:References:\n\t MIME-Version:Content-Type;\n b=MBV7shqGiVZyPMQMxV60SddExSJF9ZPhY6iuii53DTkK8efHBclKV0B//DCFRcs2mEIwyZTrk5ztY3lhMbSCyPSQpNHmIKEz0cxO+supzUqg7Hqoew0gHGPCDFVN9k6lYUHg3Z74Mxpw7/DqCwAUKYdg7rsiZd6sRD9vHN/YPHE=",
            "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=v98KoNOsXSoGeFPVYMYy1ve31A6imaK8SVF0nJNIZYU=;\n b=TPOEt24K1MSHgI5IQh55gKPoHsz9p+VFUHg8KKn8UUseSNrzbCbGLcD5YHuP6MI3+IhR/qv7JmmVWPz/Oks0BmCX9mxvKYzGHDG7u7B6kBg8gG/1EQjWvr8mqZp167jz0VmmC+HXj7oF2V5M2WkfW0tkWseq9067hwWj+UhxqEEtc2pDEAwHMSIywOrKb+zgsTxCRiy6fUY9myVgwHT+DHvuRUuFkLf43VJ7S+W6eexi4lUox9NnyNqavbUKcmd37nowzt7np/6GE6QxfVXtCOHAJjcQEWoanLREc60FSLTsMn3topAD6PmJGuLtUMJeaZ6ZwTtBltNUkaPzQhh0NA=="
        ],
        "ARC-Authentication-Results": [
            "i=2; smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=nvidia.com;\n spf=fail smtp.mailfrom=nvidia.com;\n dkim=pass (2048-bit key) header.d=Nvidia.com header.i=@Nvidia.com\n header.b=QkkrE/iP; arc=fail smtp.client-ip=52.101.193.40",
            "i=1; mx.microsoft.com 1; spf=pass (sender ip is\n 216.228.117.160) smtp.rcpttodomain=kernel.org smtp.mailfrom=nvidia.com;\n dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com;\n dkim=none (message not signed); arc=none (0)"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com;\n s=selector2;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=v98KoNOsXSoGeFPVYMYy1ve31A6imaK8SVF0nJNIZYU=;\n b=QkkrE/iPPNP2xihADeZp5dZ0cnV1kq6tD0zRf1QAN36tosyxk3D1zikRwhCOathyXSjKLVYxCfX2ZBFmEkOF8Googj380k1txim8FCDsTd088nBvz63YlzWjPcmOI5T12Wdx6091UiF7x9wRYtegu0CXgbMwYJz8AfdUqXH0tRqf+tzeSKcLGX/qFz722IvIrukhoCjaSeM3z8ai9uI1xzQTs117aVYPY304YjUiiySkMiGCCc4l+Q5LyavFm4NbYHJT7ojwYqgZEQkJ1SgZqwg0I27zZbkX4TuC9jacV5G6Tc0GzQDn5uFMyrTX8wZaVfv+7v/rYiVaKm0OvpP0Eg==",
        "X-MS-Exchange-Authentication-Results": "spf=pass (sender IP is 216.228.117.160)\n smtp.mailfrom=nvidia.com; dkim=none (message not signed)\n header.d=none;dmarc=pass action=none header.from=nvidia.com;",
        "Received-SPF": "Pass (protection.outlook.com: domain of nvidia.com designates\n 216.228.117.160 as permitted sender) receiver=protection.outlook.com;\n client-ip=216.228.117.160; helo=mail.nvidia.com; pr=C",
        "From": "Nicolin Chen <nicolinc@nvidia.com>",
        "To": "Will Deacon <will@kernel.org>, Robin Murphy <robin.murphy@arm.com>, \"Joerg\n Roedel\" <joro@8bytes.org>, Bjorn Helgaas <bhelgaas@google.com>, \"Jason\n Gunthorpe\" <jgg@nvidia.com>",
        "CC": "\"Rafael J . Wysocki\" <rafael@kernel.org>, Len Brown <lenb@kernel.org>,\n\tPranjal Shrivastava <praan@google.com>, Mostafa Saleh <smostafa@google.com>,\n\tLu Baolu <baolu.lu@linux.intel.com>, Kevin Tian <kevin.tian@intel.com>,\n\t<linux-arm-kernel@lists.infradead.org>, <iommu@lists.linux.dev>,\n\t<linux-kernel@vger.kernel.org>, <linux-acpi@vger.kernel.org>,\n\t<linux-pci@vger.kernel.org>, <vsethi@nvidia.com>, Shuai Xue\n\t<xueshuai@linux.alibaba.com>",
        "Subject": "[PATCH v3 05/11] iommu: Change group->devices to RCU-protected list",
        "Date": "Thu, 16 Apr 2026 16:28:34 -0700",
        "Message-ID": "\n <12a224061de4fff9e0725909fd0ba4e14996ff08.1776381841.git.nicolinc@nvidia.com>",
        "X-Mailer": "git-send-email 2.43.0",
        "In-Reply-To": "<cover.1776381841.git.nicolinc@nvidia.com>",
        "References": "<cover.1776381841.git.nicolinc@nvidia.com>",
        "Precedence": "bulk",
        "X-Mailing-List": "linux-pci@vger.kernel.org",
        "List-Id": "<linux-pci.vger.kernel.org>",
        "List-Subscribe": "<mailto:linux-pci+subscribe@vger.kernel.org>",
        "List-Unsubscribe": "<mailto:linux-pci+unsubscribe@vger.kernel.org>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "Content-Type": "text/plain",
        "X-NV-OnPremToCloud": "ExternallySecured",
        "X-EOPAttributedMessage": "0",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-TrafficTypeDiagnostic": "SJ1PEPF00002315:EE_|CH3PR12MB9217:EE_",
        "X-MS-Office365-Filtering-Correlation-Id": "b9d50827-81c4-45b4-9464-08de9c10012a",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "\n\tBCL:0;ARA:13230040|7416014|376014|36860700016|82310400026|1800799024|18002099003|56012099003|22082099003;",
        "X-Microsoft-Antispam-Message-Info": "\n\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",
        "X-Forefront-Antispam-Report": "\n\tCIP:216.228.117.160;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:mail.nvidia.com;PTR:dc6edge1.nvidia.com;CAT:NONE;SFS:(13230040)(7416014)(376014)(36860700016)(82310400026)(1800799024)(18002099003)(56012099003)(22082099003);DIR:OUT;SFP:1101;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n\tR+a7cUsTqsfN5ONYdFhoWchu2GHPlEpIqSX8M8EZCF27MxhuJYPVM7lpdv2m32CgAY0NHbOjZQPtpneiXVPvtPORpD3gJe3nBl6SRB4hQrHSQHdVKcrZK2HBM8VOqJ5hRnR/d5MMxry4LQ9a36fFIQ9E0D1ShLNkMrB7jYfEA5P+NDFbQ+bK19jOL/9dX7FuphzKSbT9VwVdJD3B1TriVOvQRQHLRkSP1eTdyPuzyZd5Rf4l92iHGrFevWzQpBwbFQFFfnIF5OQNuSs0iTpSo3lrtJpfrqJ8s4T67ePm9HFY6mcuejcfzESV6afRl9rJ1okRM/gS2sR2cE5XIDuEB8teqi75f3Ink3VesGJ4Rd/AmHZyBlXM8kNOUAP6meg+D7agk8upkIuTDz9ijlib73/GP087NEVFIqoD/W/MaVMSsaoC3BrMptYmiuX8yadj",
        "X-OriginatorOrg": "Nvidia.com",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "16 Apr 2026 23:29:28.4851\n (UTC)",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n b9d50827-81c4-45b4-9464-08de9c10012a",
        "X-MS-Exchange-CrossTenant-Id": "43083d15-7273-40c1-b7db-39efd9ccc17a",
        "X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp": "\n TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a;Ip=[216.228.117.160];Helo=[mail.nvidia.com]",
        "X-MS-Exchange-CrossTenant-AuthSource": "\n\tSJ1PEPF00002315.namprd03.prod.outlook.com",
        "X-MS-Exchange-CrossTenant-AuthAs": "Anonymous",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "HybridOnPrem",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "CH3PR12MB9217"
    },
    "content": "To allow lockless iterations of the group->devices list in an ISR context\nthat cannot hold the group->mutex, change the list to be RCU protected.\n\nSigned-off-by: Nicolin Chen <nicolinc@nvidia.com>\n---\n drivers/iommu/iommu.c | 16 +++++++++-------\n 1 file changed, 9 insertions(+), 7 deletions(-)",
    "diff": "diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c\nindex 768ac728b4cc3..d1be62a07904a 100644\n--- a/drivers/iommu/iommu.c\n+++ b/drivers/iommu/iommu.c\n@@ -84,18 +84,20 @@ struct group_device {\n \t */\n \tbool blocked;\n \tunsigned int reset_depth;\n+\tstruct rcu_head rcu;\n };\n \n /* Iterate over each struct group_device in a struct iommu_group */\n #define for_each_group_device(group, pos) \\\n-\tlist_for_each_entry(pos, &(group)->devices, list)\n+\tlist_for_each_entry_rcu(pos, &(group)->devices, list, \\\n+\t\t\t\tlockdep_is_held(&(group)->mutex))\n \n static struct group_device *__dev_to_gdev(struct device *dev)\n {\n \tstruct iommu_group *group = dev->iommu_group;\n \tstruct group_device *gdev;\n \n-\tlockdep_assert_held(&group->mutex);\n+\tlockdep_assert(lockdep_is_held(&group->mutex) || rcu_read_lock_held());\n \n \tfor_each_group_device(group, gdev) {\n \t\tif (gdev->dev == dev)\n@@ -666,7 +668,7 @@ static int __iommu_probe_device(struct device *dev, struct list_head *group_list\n \t * The gdev must be in the list before calling\n \t * iommu_setup_default_domain()\n \t */\n-\tlist_add_tail(&gdev->list, &group->devices);\n+\tlist_add_tail_rcu(&gdev->list, &group->devices);\n \tWARN_ON(group->default_domain && !group->domain);\n \tif (group->default_domain)\n \t\tiommu_create_device_direct_mappings(group->default_domain, dev);\n@@ -697,7 +699,7 @@ static int __iommu_probe_device(struct device *dev, struct list_head *group_list\n \treturn 0;\n \n err_remove_gdev:\n-\tlist_del(&gdev->list);\n+\tlist_del_rcu(&gdev->list);\n \t__iommu_group_free_device(group, gdev);\n err_put_group:\n \tiommu_deinit_device(dev);\n@@ -745,7 +747,7 @@ static void __iommu_group_free_device(struct iommu_group *group,\n \t\t\tgroup->domain != group->default_domain);\n \n \tkfree(grp_dev->name);\n-\tkfree(grp_dev);\n+\tkfree_rcu(grp_dev, rcu);\n }\n \n /* Remove the iommu_group from the struct device. */\n@@ -759,7 +761,7 @@ static void __iommu_group_remove_device(struct device *dev)\n \t\tif (device->dev != dev)\n \t\t\tcontinue;\n \n-\t\tlist_del(&device->list);\n+\t\tlist_del_rcu(&device->list);\n \t\t__iommu_group_free_device(group, device);\n \t\tif (dev_has_iommu(dev))\n \t\t\tiommu_deinit_device(dev);\n@@ -1335,7 +1337,7 @@ int iommu_group_add_device(struct iommu_group *group, struct device *dev)\n \tdev->iommu_group = group;\n \n \tmutex_lock(&group->mutex);\n-\tlist_add_tail(&gdev->list, &group->devices);\n+\tlist_add_tail_rcu(&gdev->list, &group->devices);\n \tmutex_unlock(&group->mutex);\n \treturn 0;\n }\n",
    "prefixes": [
        "v3",
        "05/11"
    ]
}