Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/2226648/?format=api
{ "id": 2226648, "url": "http://patchwork.ozlabs.org/api/patches/2226648/?format=api", "web_url": "http://patchwork.ozlabs.org/project/ubuntu-kernel/patch/20260422175746.329799-2-mehmet.basaran@canonical.com/", "project": { "id": 15, "url": "http://patchwork.ozlabs.org/api/projects/15/?format=api", "name": "Ubuntu Kernel", "link_name": "ubuntu-kernel", "list_id": "kernel-team.lists.ubuntu.com", "list_email": "kernel-team@lists.ubuntu.com", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20260422175746.329799-2-mehmet.basaran@canonical.com>", "list_archive_url": null, "date": "2026-04-22T17:57:46", "name": "[1/1] Revert \"iommu: disable SVA when CONFIG_X86 is set\"", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "fb9368f4940ed35a75f84149a3d72257f13ae34a", "submitter": { "id": 89305, "url": "http://patchwork.ozlabs.org/api/people/89305/?format=api", "name": "Mehmet Basaran", "email": "mehmet.basaran@canonical.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/ubuntu-kernel/patch/20260422175746.329799-2-mehmet.basaran@canonical.com/mbox/", "series": [ { "id": 501057, "url": "http://patchwork.ozlabs.org/api/series/501057/?format=api", "web_url": "http://patchwork.ozlabs.org/project/ubuntu-kernel/list/?series=501057", "date": "2026-04-22T17:57:45", "name": "Revert \"iommu: disable SVA when CONFIG_X86 is set\"", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/501057/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2226648/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2226648/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<kernel-team-bounces@lists.ubuntu.com>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (4096-bit key;\n unprotected) header.d=canonical.com header.i=@canonical.com\n header.a=rsa-sha256 header.s=20251003 header.b=Gd+f+2rd;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com\n (client-ip=185.125.189.65; helo=lists.ubuntu.com;\n envelope-from=kernel-team-bounces@lists.ubuntu.com;\n receiver=patchwork.ozlabs.org)" ], "Received": [ "from lists.ubuntu.com (lists.ubuntu.com [185.125.189.65])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g16QL2qD2z1yHB\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 23 Apr 2026 03:58:01 +1000 (AEST)", "from localhost ([127.0.0.1] helo=lists.ubuntu.com)\n\tby lists.ubuntu.com with esmtp (Exim 4.86_2)\n\t(envelope-from <kernel-team-bounces@lists.ubuntu.com>)\n\tid 1wFbpg-0000qy-Ea; Wed, 22 Apr 2026 17:57:52 +0000", "from smtp-relay-internal-1.internal ([10.131.114.114]\n helo=smtp-relay-internal-1.canonical.com)\n by lists.ubuntu.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.86_2) (envelope-from <mehmet.basaran@canonical.com>)\n id 1wFbpe-0000nA-J6\n for kernel-team@lists.ubuntu.com; Wed, 22 Apr 2026 17:57:50 +0000", "from mail-wr1-f70.google.com (mail-wr1-f70.google.com\n [209.85.221.70])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by smtp-relay-internal-1.canonical.com (Postfix) with ESMTPS id 6DA313F60A\n for <kernel-team@lists.ubuntu.com>; Wed, 22 Apr 2026 17:57:50 +0000 (UTC)", "by mail-wr1-f70.google.com with SMTP id\n ffacd0b85a97d-43d7d03e1e7so4471219f8f.3\n for <kernel-team@lists.ubuntu.com>; Wed, 22 Apr 2026 10:57:50 -0700 (PDT)", "from localhost ([149.86.141.144]) by smtp.gmail.com with ESMTPSA id\n ffacd0b85a97d-43fe4cb1176sm48473256f8f.3.2026.04.22.10.57.48\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Wed, 22 Apr 2026 10:57:48 -0700 (PDT)" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com;\n s=20251003; t=1776880670;\n bh=RV3otKONHN7KWGzAcX02vbcalEMLJQeQrI929Apwm20=;\n h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:\n MIME-Version;\n b=Gd+f+2rdi2Jd+PO1HkfAKxSDDMwWzo3IdbyiDIUYXFpBOCItX/we0v5unzc2R8FiY\n GXouGzXmDfXJdM88zyLGVeGYTxZDdK1wDVyXHiubQVnMUFoeISeZnulIij+aJWNAfs\n cpO46+gqaSBlsdAxSt6MHutU0AxBCfNS+QfT4s+QzcY+n5Jzd3aEtZui6NByHGPtbj\n cXS3iqlaCZCtIoeKgA6q9fVN/Ghw9AlUUQmLGMnoLF3F+IkD6jsPfk6dDFA2u/Ionf\n a3B9C7LKJwdyIcxO0io5L5hQf0bLY4QS+KY2+XlQbrjT7/EbjrZNyiKrrxq9bGmZLy\n ewMUHAXR0PXwhitMfHtf99aZU8oYvYJCQvrCMTCW03xkiQEFp5elRkduv9e2t/p2qx\n lgiKlBMBUjzxr0aYU41BKryjaQGIKVYaYcUq5olOmCkb9BtCxpuyx+xPwO+XFNKrYh\n e15QPmQBgY5KvuB9zRnKtZv7i/D3vLZ5HmYKlivIoUFrys4DKD8v56vfRig4D/b9kJ\n P48Ii/1MMwnolhR8YQW2LTmPt0zC6oBVXQsDNFScXwouzI3tD85kI6Q/C7UY+3TazC\n GkpxMr60jhIio0SADdhhkcZvCTsuwtxjadsaEb1/7zDHSGBTtNICiGIVyNuDHWbegb\n MG4GAyXRovRTeSIrrX7ES5W8=", "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776880669; x=1777485469;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=RV3otKONHN7KWGzAcX02vbcalEMLJQeQrI929Apwm20=;\n b=ehFYAmOsPLA3xhNdUYTwkFfxgC2NvRkmA1mHSLn1PCcsjM9Ccgp36r6VsYjfeWNiG0\n H0FAa/ECvknCr/uXYCt4rcBcwkpX/S7DAMlq4GsRaYyXS3iOYwLb7TWXCkuKNJk6ghx/\n ZlbniswmYTWySKMPjen0e74cH+rbJuGwz9AocKyi6ibYspPLL5COBFuBz/fUx5D07+KL\n 2RxtgudtiAellIgqujXJ/3anE+CvhOwMtttU2hgaA+5QwY0yO47rSNuZ8uMQFn8USPo0\n bpJq+ukBr2FH6rA6bQ6RuHjwf/1XWWP9DOI2Erklh6+ErBHjD7JFSAyMhovGaa+/Dl+C\n Ak0w==", "X-Gm-Message-State": "AOJu0YwlVSMWOO5l1x8tKwRjqgfx0ocO0Em3N/i81PC+bM6HUVUcEarm\n 7RHA0Wlz0RojidjouE9R3RQMhaej1V9eq0Twt9X7pU4O2vpDzWPLsRrYLzTGmHWMZeXIP9cBxUu\n TpOw8ApUdDVjR75bATLTw4U7E7M5JzkQ43uFVYnguz5r6YCBaSR9NXLJEB0CyPO3zw6LdqD/fa+\n F3O/rSy8UL6WANj6HF", "X-Gm-Gg": "AeBDieva06PoPsHWg8qNMWJcnRGoxMgfBetgoVQngIt4BTxJeBWuoseZ6ZIB7Zf+hp8\n lgRek1N5XnnA+DT0FcDQAdFG1xq2C02O82BUHkLe1AswZYGEfwUtey5yU1RkF/OEa7LJrXjqFiT\n 562y7+UdxfqgqjSQwHd5fzoFsURjZR+RezftVZd6a70UgrOQDnIisOKZT5kTMtelzdIb7lHIbBn\n B2X+IPfBmdkFpWP3n9gBjQh9665JPfVg+C/iLFZUj/+fkq1vWFocF7Ty6bqzFplBkl/3krw8q2T\n MHDaVMpwlP0HYVflc1yShmVEVtQgcCE/CGi6q1BXeIm6fqsh1osfJTmLt7/kkzKWGvgE2VSJebz\n wWPNHXloWbKbk2iapBvqBfFJm+fzRlVeFUMkQaGRPRA==", "X-Received": [ "by 2002:a05:600c:26d5:b0:489:1c1f:35df with SMTP id\n 5b1f17b1804b1-4891c1f3715mr131738025e9.10.1776880669539;\n Wed, 22 Apr 2026 10:57:49 -0700 (PDT)", "by 2002:a05:600c:26d5:b0:489:1c1f:35df with SMTP id\n 5b1f17b1804b1-4891c1f3715mr131737895e9.10.1776880669100;\n Wed, 22 Apr 2026 10:57:49 -0700 (PDT)" ], "From": "Mehmet Basaran <mehmet.basaran@canonical.com>", "To": "kernel-team@lists.ubuntu.com", "Subject": "[PATCH 1/1] Revert \"iommu: disable SVA when CONFIG_X86 is set\"", "Date": "Wed, 22 Apr 2026 20:57:46 +0300", "Message-ID": "<20260422175746.329799-2-mehmet.basaran@canonical.com>", "X-Mailer": "git-send-email 2.43.0", "In-Reply-To": "<20260422175746.329799-1-mehmet.basaran@canonical.com>", "References": "<20260422175746.329799-1-mehmet.basaran@canonical.com>", "MIME-Version": "1.0", "X-BeenThere": "kernel-team@lists.ubuntu.com", "X-Mailman-Version": "2.1.20", "Precedence": "list", "List-Id": "Kernel team discussions <kernel-team.lists.ubuntu.com>", "List-Unsubscribe": "<https://lists.ubuntu.com/mailman/options/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe>", "List-Archive": "<https://lists.ubuntu.com/archives/kernel-team>", "List-Post": "<mailto:kernel-team@lists.ubuntu.com>", "List-Help": "<mailto:kernel-team-request@lists.ubuntu.com?subject=help>", "List-Subscribe": "<https://lists.ubuntu.com/mailman/listinfo/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe>", "Content-Type": "text/plain; charset=\"utf-8\"", "Content-Transfer-Encoding": "base64", "Errors-To": "kernel-team-bounces@lists.ubuntu.com", "Sender": "\"kernel-team\" <kernel-team-bounces@lists.ubuntu.com>" }, "content": "BugLink: https://bugs.launchpad.net/bugs/2149766\n\nThis reverts commit 21020d6dd7b2309dbdda9610e545a2e2a278a8fc.\n\nThe issue has been brought to our attention when questing (6.17)\nkernels were unable to load amd_xdna drivers. However, this commit,\nin addition to NPUs, also affects PCIe cards which make use of\nunified memory (GPUs, Accelerators, NICs). With this commit, PCIe\ndevices will revert to using legacy method (pinning) instead of\nunified memory. As a result,\n - arguably it will be less secure,\n - there can be performance drops.\n\nCurrently, this commit is part of an 8 commit patch series:\n\"Fix stale IOTLB entries for kernel address space\", v7.\n [PATCH v7 1/8] iommu: Disable SVA when CONFIG_X86 is set\n [PATCH v7 2/8] mm: Add a ptdesc flag to mark kernel page tables\n [PATCH v7 3/8] mm: Actually mark kernel page table pages\n [PATCH v7 4/8] x86/mm: Use 'ptdesc' when freeing PMD pages\n [PATCH v7 5/8] mm: Introduce pure page table freeing function\n [PATCH v7 6/8] x86/mm: Use pagetable_free()\n [PATCH v7 7/8] mm: Introduce deferred freeing for kernel page tables\n [PATCH v7 8/8] iommu/sva: Invalidate stale IOTLB entries for kernel address space\n\nwhere \"iommu: disable SVA when CONFIG_X86 is set\" is undone by\nthe 8th commit. We only have this commit from the whole patchset.\nIdeally we should have the whole patchset applied.\n\nThis commit fixes the following issue which is old,\n26b25a2b98e4 (\"iommu: Bind process address spaces to devices\")\nand we applied this commit recently. So, reverting this commit\nwon't be introducing regressions. Affected kernel versions are:\n - 6.8 due to the reasons above.\n - 6.17 due to both the reasons above and the amd_xdna issue.\n\nSigned-off-by: Mehmet Basaran <mehmet.basaran@canonical.com>\n---\n drivers/iommu/iommu-sva.c | 3 ---\n 1 file changed, 3 deletions(-)", "diff": "diff --git a/drivers/iommu/iommu-sva.c b/drivers/iommu/iommu-sva.c\nindex 07f6f80ee819..65814cbc8402 100644\n--- a/drivers/iommu/iommu-sva.c\n+++ b/drivers/iommu/iommu-sva.c\n@@ -74,9 +74,6 @@ struct iommu_sva *iommu_sva_bind_device(struct device *dev, struct mm_struct *mm\n \tstruct iommu_sva *handle;\n \tint ret;\n \n-\tif (IS_ENABLED(CONFIG_X86))\n-\t\treturn ERR_PTR(-EOPNOTSUPP);\n-\n \tmutex_lock(&iommu_sva_lock);\n \n \t/* Allocate mm->pasid if necessary. */\n", "prefixes": [ "1/1" ] }