get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2225773/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2225773,
    "url": "http://patchwork.ozlabs.org/api/patches/2225773/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/linux-pci/patch/20260421-io_projection-v2-4-4c251c692ef4@garyguo.net/",
    "project": {
        "id": 28,
        "url": "http://patchwork.ozlabs.org/api/projects/28/?format=api",
        "name": "Linux PCI development",
        "link_name": "linux-pci",
        "list_id": "linux-pci.vger.kernel.org",
        "list_email": "linux-pci@vger.kernel.org",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260421-io_projection-v2-4-4c251c692ef4@garyguo.net>",
    "list_archive_url": null,
    "date": "2026-04-21T14:56:15",
    "name": "[v2,04/11] rust: io: add missing safety requirement in `IoCapable` methods",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "ebf4fe468b9f15e790beda5caa48c1c618889a75",
    "submitter": {
        "id": 76823,
        "url": "http://patchwork.ozlabs.org/api/people/76823/?format=api",
        "name": "Gary Guo",
        "email": "gary@garyguo.net"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/linux-pci/patch/20260421-io_projection-v2-4-4c251c692ef4@garyguo.net/mbox/",
    "series": [
        {
            "id": 500833,
            "url": "http://patchwork.ozlabs.org/api/series/500833/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/linux-pci/list/?series=500833",
            "date": "2026-04-21T14:56:19",
            "name": "rust: I/O type generalization and projection",
            "version": 2,
            "mbox": "http://patchwork.ozlabs.org/series/500833/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2225773/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2225773/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "\n <linux-pci+bounces-52844-incoming=patchwork.ozlabs.org@vger.kernel.org>",
        "X-Original-To": [
            "incoming@patchwork.ozlabs.org",
            "linux-pci@vger.kernel.org"
        ],
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=garyguo.net header.i=@garyguo.net header.a=rsa-sha256\n header.s=selector1 header.b=vQPuSpRS;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c15:e001:75::12fc:5321; helo=sin.lore.kernel.org;\n envelope-from=linux-pci+bounces-52844-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)",
            "smtp.subspace.kernel.org;\n\tdkim=pass (1024-bit key) header.d=garyguo.net header.i=@garyguo.net\n header.b=\"vQPuSpRS\"",
            "smtp.subspace.kernel.org;\n arc=fail smtp.client-ip=52.101.196.82",
            "smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=garyguo.net",
            "smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=garyguo.net",
            "dkim=none (message not signed)\n header.d=none;dmarc=none action=none header.from=garyguo.net;"
        ],
        "Received": [
            "from sin.lore.kernel.org (sin.lore.kernel.org\n [IPv6:2600:3c15:e001:75::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0QWs1ygfz1yGt\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 01:00:25 +1000 (AEST)",
            "from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sin.lore.kernel.org (Postfix) with ESMTP id 430093015FFD\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 14:57:22 +0000 (UTC)",
            "from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 526BE3DA7F5;\n\tTue, 21 Apr 2026 14:56:40 +0000 (UTC)",
            "from LO3P265CU004.outbound.protection.outlook.com\n (mail-uksouthazon11020082.outbound.protection.outlook.com [52.101.196.82])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 531943DA5D8;\n\tTue, 21 Apr 2026 14:56:38 +0000 (UTC)",
            "from LOVP265MB8871.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:488::16)\n by CWLP265MB5523.GBRP265.PROD.OUTLOOK.COM (2603:10a6:400:1b9::6) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9846.16; Tue, 21 Apr\n 2026 14:56:29 +0000",
            "from LOVP265MB8871.GBRP265.PROD.OUTLOOK.COM\n ([fe80::1c3:ceba:21b4:9986]) by LOVP265MB8871.GBRP265.PROD.OUTLOOK.COM\n ([fe80::1c3:ceba:21b4:9986%4]) with mapi id 15.20.9846.016; Tue, 21 Apr 2026\n 14:56:28 +0000"
        ],
        "ARC-Seal": [
            "i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776783400; cv=fail;\n b=LvrrcJT8JL49c6rQonsZoNR3US2R1P5Z3isoMpxZL9zNdf+WiQ5uY1aMwDUySI8prodck809ZDRFdPzBNEFU5J3d0+GhteVQhYNg/h73GtPn3NXewfly6K5lrkpe5oUpz/Hb7TdoB4J5bVThn8G80Yj+xRDlMjKwEJ7qhh3T1gs=",
            "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=I+r1DNLQt5Vbi02/Gn+32d443GmuEvCo7/c0R/jXZygbSIVOJp6iU55MP1ojkt51AFy7mRSI0U6q4P7/JXPOjW0EEl03Lh6Km7mrwMpfNh8Y8TouRJfzc5wSbhjb0ealklVJDAWCe1pgF6QapDMI0sRr/VqCLJCN5TE8eYzwwpsv83Dynp3mw0QM22wXEWRbo4+YiXKxjUIRRtBuAb8A9ntOP+vqxtOycyGIDtR31Hx2ORQu6fSHX1uqflAkDBwKXDhTCUIb+qLkf52kJ2NPhUAbk5tyKHBRBW6yJMdy6PseQ/ksbqYvwnxuxgPNSZ+LPNCFcC1KCRgUrnxIA3i/zg=="
        ],
        "ARC-Message-Signature": [
            "i=2; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776783400; c=relaxed/simple;\n\tbh=uAP2XusktosMg6Sijfjq1oOzEOUFYQ++m7dbhH46Bzc=;\n\th=From:Date:Subject:Content-Type:Message-Id:References:In-Reply-To:\n\t To:Cc:MIME-Version;\n b=PJRj3wDhRihCgCqdWBYY1fWTx5Sh7p1+af95VMXW5mfpG+esibC9wXFtUoNFNAuYvOUkbiX01j0VC3WWIVM+xA2AUnptqdsr+EOgpMDS16AheSwSzw5rm+eM6d+qws/piqbplUDIcIlmmDYlLUZAL+ZPIKlLWczKbhQdzKVEZlg=",
            "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=9MS5uMU0rcBULjS2MOKbxruodp5TKYeruE7ZCaGTkKU=;\n b=pukbv0okIDjzX5MTHQ8+/v5yWnHTOOjmWLSDLuzZ/ladF5ngco2M37fBGAfIQvYSKZNMV9Z8hHhDSRaaQgyE9zM+wIOgRu0+TVomWy5W+dsUDcvTQ6LoAHTDTz0sKBgXDYDTML6c6aV9JL+7w7coFrARmo3k8riFO4t7qKKMKchmuzq9W2poP6z0MfB23rYjlCHYW5wo+GczK3Dj+c7XpuwSzrzIN469Ssjl0Y5GyuYp2+jZ7o4JEiiCjHG1oq+xhg1/8eAnznUALW5s2WbPwUJOIC9d9NOdpZSSZYDWbVaAq1IUrxm11U/FR0cGgxew6TRj9G7gcFOq1Ci/IEnwNw=="
        ],
        "ARC-Authentication-Results": [
            "i=2; smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=garyguo.net;\n spf=pass smtp.mailfrom=garyguo.net;\n dkim=pass (1024-bit key) header.d=garyguo.net header.i=@garyguo.net\n header.b=vQPuSpRS; arc=fail smtp.client-ip=52.101.196.82",
            "i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=garyguo.net; dmarc=pass action=none header.from=garyguo.net;\n dkim=pass header.d=garyguo.net; arc=none"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=garyguo.net;\n s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=9MS5uMU0rcBULjS2MOKbxruodp5TKYeruE7ZCaGTkKU=;\n b=vQPuSpRS/CB9bjpsmDQecdvBxt6r2wJuPMjY8m2iUu6UFdgIzOnGAwDLT5NoSio81BZ2pNLoosEhB9OFY/B8kU+4l5Ov6P6uK9cLCx7QhZi7y/rI4K/rEjtY0PfefTUkt+LoBReokZbRjDf6lU+V7a/eGFCdWfu2zxZo0AtPoLs=",
        "From": "Gary Guo <gary@garyguo.net>",
        "Date": "Tue, 21 Apr 2026 15:56:15 +0100",
        "Subject": "[PATCH v2 04/11] rust: io: add missing safety requirement in\n `IoCapable` methods",
        "Content-Type": "text/plain; charset=\"utf-8\"",
        "Content-Transfer-Encoding": "7bit",
        "Message-Id": "<20260421-io_projection-v2-4-4c251c692ef4@garyguo.net>",
        "References": "<20260421-io_projection-v2-0-4c251c692ef4@garyguo.net>",
        "In-Reply-To": "<20260421-io_projection-v2-0-4c251c692ef4@garyguo.net>",
        "To": "Greg Kroah-Hartman <gregkh@linuxfoundation.org>,\n  \"Rafael J. Wysocki\" <rafael@kernel.org>, Danilo Krummrich <dakr@kernel.org>,\n  Miguel Ojeda <ojeda@kernel.org>, Boqun Feng <boqun@kernel.org>,\n  Gary Guo <gary@garyguo.net>,\n =?utf-8?q?Bj=C3=B6rn_Roy_Baron?= <bjorn3_gh@protonmail.com>,\n  Benno Lossin <lossin@kernel.org>, Andreas Hindborg <a.hindborg@kernel.org>,\n  Alice Ryhl <aliceryhl@google.com>, Trevor Gross <tmgross@umich.edu>,\n  Daniel Almeida <daniel.almeida@collabora.com>,\n  Bjorn Helgaas <bhelgaas@google.com>,\n =?utf-8?q?Krzysztof_Wilczy=C5=84ski?= <kwilczynski@kernel.org>,\n  Abdiel Janulgue <abdiel.janulgue@gmail.com>,\n  Robin Murphy <robin.murphy@arm.com>,\n  Alexandre Courbot <acourbot@nvidia.com>, David Airlie <airlied@gmail.com>,\n  Simona Vetter <simona@ffwll.ch>",
        "Cc": "driver-core@lists.linux.dev, rust-for-linux@vger.kernel.org,\n linux-kernel@vger.kernel.org, linux-pci@vger.kernel.org,\n nouveau@lists.freedesktop.org, dri-devel@lists.freedesktop.org",
        "X-Mailer": "b4 0.15.1",
        "X-Developer-Signature": "v=1; a=ed25519-sha256; t=1776783386; l=1265;\n i=gary@garyguo.net; s=20221204; h=from:subject:message-id;\n bh=uAP2XusktosMg6Sijfjq1oOzEOUFYQ++m7dbhH46Bzc=;\n b=T/DxIPKbR50JPwauKc5lcbKe8Mc0kJXvMEuqXWE5g5y+xfPhMfFcBFVAWT1k6UbmxYseMW83l\n Vqf7hzomrTsByj538hlbVQpY6MU0PDoCPP/DtuIXFbeRxCMabFiZje2",
        "X-Developer-Key": "i=gary@garyguo.net; a=ed25519;\n pk=vB3uIX95SM4eVrIqo1DWNWKDKD2xzB+yLLLr0yOPYMo=",
        "X-ClientProxiedBy": "LO4P123CA0142.GBRP123.PROD.OUTLOOK.COM\n (2603:10a6:600:193::21) To LOVP265MB8871.GBRP265.PROD.OUTLOOK.COM\n (2603:10a6:600:488::16)",
        "Precedence": "bulk",
        "X-Mailing-List": "linux-pci@vger.kernel.org",
        "List-Id": "<linux-pci.vger.kernel.org>",
        "List-Subscribe": "<mailto:linux-pci+subscribe@vger.kernel.org>",
        "List-Unsubscribe": "<mailto:linux-pci+unsubscribe@vger.kernel.org>",
        "MIME-Version": "1.0",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-TrafficTypeDiagnostic": "LOVP265MB8871:EE_|CWLP265MB5523:EE_",
        "X-MS-Office365-Filtering-Correlation-Id": "5da74dcf-26b1-4093-b139-08de9fb62adc",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "\n\tBCL:0;ARA:13230040|1800799024|376014|7416014|10070799003|366016|921020|22082099003|18002099003|56012099003;",
        "X-Microsoft-Antispam-Message-Info": "\n\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",
        "X-Forefront-Antispam-Report": "\n\tCIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:LOVP265MB8871.GBRP265.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(7416014)(10070799003)(366016)(921020)(22082099003)(18002099003)(56012099003);DIR:OUT;SFP:1102;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1",
        "X-MS-Exchange-AntiSpam-MessageData-0": "=?utf-8?q?y7ULbfLRzHh5eF5tpSkAZmaNnriH?=\n\t=?utf-8?q?LTjXTiuKT+X3GtmHUJH2KmGUB5dVUdAQgLY76/D490Io+qjS546f0K/zRKnDfwJ4H?=\n\t=?utf-8?q?N9X+n26gmcuH4qOJhXUwn0Ps9hZz1jALANhu1FmFwmev1EhWesciZ3O/FIMQNtH4o?=\n\t=?utf-8?q?x8CW/luE3DfNl8OODgnId6kuxAXKekNhTTfpjCqYkTHKj1MqvgDb4BUkQ66SC7tdv?=\n\t=?utf-8?q?89+kYrz1xxus5W1NSrGawIbfb+iMwDJy+colt1X0eAUipiMqfZjLNmVHyBLHDsXFh?=\n\t=?utf-8?q?VBXOIi0AwzOiwCN9en2gQqbsL1FEQJqCyBQbfeE15D+hMWtdia6mBg8FiQUJbEQXV?=\n\t=?utf-8?q?nU77km3bXIuBhkDvlw80UBMh4vXMDDdJVLHYZ5f2l13p2Z73JKYurfu0F+NAOPI9e?=\n\t=?utf-8?q?JTbClWkQr4BpVQtCvoUo2Lm43BIRf37jvlAhiwIlVtnMTSPvgwiLr2HdoMShZPfwZ?=\n\t=?utf-8?q?accDS77TprXwMZ+4ffMNeLsG+o02t3jefOyrBFEqIcKKF4sMf89XN0RSasIBFqop1?=\n\t=?utf-8?q?zPWBfqxh3AOczQy718pli57pElj5e/oEsMSoodsMDylWQUUVdqfQb24XFxlxpEGcz?=\n\t=?utf-8?q?jEdf2liYyiIFfq7KBUeonMgkhA1AWySTGp1U6oPYzKuXpRohB1YZMa3D/ABegsZ7j?=\n\t=?utf-8?q?hvjnHDTndBa+V2fB4LZ2tVo8TDatCOENwVb3Xm0CaDJY/cXw/aGdVXWF7N9ak5Yt4?=\n\t=?utf-8?q?F7MK1/BOqd6XLIJmvGDVdfo7feHsC08X3iuxjcFpmcWWtX52pSoJsQH861wqe9jX9?=\n\t=?utf-8?q?o1Eva6fLx8ydnGomwiQ+t6piLcYFYAhBZ0fBwRjzWe/8R/Ufuh76gOrTf+UE+NK2W?=\n\t=?utf-8?q?9iHqRAAvPj8I81sPUFjd0ksIG9KqdRA2LBxDKcIB8l5EJ1bWyDxoRO3eMFYMYAM4K?=\n\t=?utf-8?q?Wnk6FcMMS0udBpohdKJvEHXx/JHHs3CzO/p4uDQ+U3CNnAjY4NONurbvfYnFhaabP?=\n\t=?utf-8?q?ra8/NfkSPK06x7JqeuAM0ZyCPujRu6RFLdSKqb5EY8EpWjzfdSm9b38OHk2pkGkrS?=\n\t=?utf-8?q?2U/5KEpiZfcSMBux0TrWuT5W2nI3e4w7D7serXNyV1A3FnnLCYPX5HR1/BF4D5dPM?=\n\t=?utf-8?q?kAg/whTJyHHQjYBETKN6DB+Q+hUM3gQhqTXrNclrYyZY+437PsrEDlrsJYOWt16Ik?=\n\t=?utf-8?q?hK6jqHr+xc1mywYv7x6YlvDSFAOmPbaD6JzvNh3BHSJ/k4cErW/vVJuqaYb3ctaDk?=\n\t=?utf-8?q?IUikDyLHPr1EWKeGy8ibB869Rn430Rd7zuoSQmX40vDjdzpCTdBFt5/4DkbOfd4aM?=\n\t=?utf-8?q?qMsVRkNGOwjaMoVXhnDiM6WDC2I7nuyFUUQ8Cka4xF1i3UPle/qI82JNLsb6hnl6Z?=\n\t=?utf-8?q?Okr6DdKF98omDPgWVXvRj99SumYvt7f9rga92mhJ0HdRwFju59AhbizL4a2734IM7?=\n\t=?utf-8?q?+M1YApIGLcMliA4Bh+xlLIji4t+5BxnSGrKzhv0jdXtSynEDhkPC3sqlgJNaP9NEV?=\n\t=?utf-8?q?UYci0SaiaSEuPG6KXxxsdkjVXvq3Es+tmBOZHh6ICooIcvrNUo/vIBaTMZ/nGqtec?=\n\t=?utf-8?q?QpYLnqy2YjGzkYccFtXBGDlAigib2txXqonEJqacMEiH44CEMbXjymog1wNOcbIRx?=\n\t=?utf-8?q?LxIfDqKnRK7Ipf2x5j6Dwg9tJstvC00RXblK//68Rv4ef1aZnrjEpTJi7metJoU4s?=\n\t=?utf-8?q?DdxcTVAOtEiEn+sb9Lk5UGW71FC6DePg=3D=3D?=",
        "X-OriginatorOrg": "garyguo.net",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n 5da74dcf-26b1-4093-b139-08de9fb62adc",
        "X-MS-Exchange-CrossTenant-AuthSource": "LOVP265MB8871.GBRP265.PROD.OUTLOOK.COM",
        "X-MS-Exchange-CrossTenant-AuthAs": "Internal",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "21 Apr 2026 14:56:28.6164\n (UTC)",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted",
        "X-MS-Exchange-CrossTenant-Id": "bbc898ad-b10f-4e10-8552-d9377b823d45",
        "X-MS-Exchange-CrossTenant-MailboxType": "HOSTED",
        "X-MS-Exchange-CrossTenant-UserPrincipalName": "\n gLXfx8rZGrWT0EWSYtOynl1DHW37qRUxvgjE/i46PJW8T4le/tpK2mJrushn6xQM+xjyhIFXWjllTkEMREJReg==",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "CWLP265MB5523"
    },
    "content": "The current safety comment on `io_read`/`io_write` does not cover the topic\nabout alignment, although this is guaranteed by checks in `Io`. Add it so\nit can be relied on by implementor of `IoCapable`.\n\nSigned-off-by: Gary Guo <gary@garyguo.net>\n---\n rust/kernel/io.rs | 6 ++++--\n 1 file changed, 4 insertions(+), 2 deletions(-)",
    "diff": "diff --git a/rust/kernel/io.rs b/rust/kernel/io.rs\nindex 1682f2a0d20d..c6d30c5b4e10 100644\n--- a/rust/kernel/io.rs\n+++ b/rust/kernel/io.rs\n@@ -216,14 +216,16 @@ pub trait IoCapable<T> {\n     ///\n     /// # Safety\n     ///\n-    /// The range `[address..address + size_of::<T>()]` must be within the bounds of `Self`.\n+    /// - The range `[address..address + size_of::<T>()]` must be within the bounds of `Self`.\n+    /// - `address` must be aligned.\n     unsafe fn io_read(&self, address: *mut T) -> T;\n \n     /// Performs an I/O write of `value` at `address`.\n     ///\n     /// # Safety\n     ///\n-    /// The range `[address..address + size_of::<T>()]` must be within the bounds of `Self`.\n+    /// - The range `[address..address + size_of::<T>()]` must be within the bounds of `Self`.\n+    /// - `address` must be aligned.\n     unsafe fn io_write(&self, value: T, address: *mut T);\n }\n \n",
    "prefixes": [
        "v2",
        "04/11"
    ]
}