get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2226656/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2226656,
    "url": "http://patchwork.ozlabs.org/api/patches/2226656/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/ubuntu-kernel/patch/20260422180616.336474-2-mehmet.basaran@canonical.com/",
    "project": {
        "id": 15,
        "url": "http://patchwork.ozlabs.org/api/projects/15/?format=api",
        "name": "Ubuntu Kernel",
        "link_name": "ubuntu-kernel",
        "list_id": "kernel-team.lists.ubuntu.com",
        "list_email": "kernel-team@lists.ubuntu.com",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260422180616.336474-2-mehmet.basaran@canonical.com>",
    "list_archive_url": null,
    "date": "2026-04-22T18:06:16",
    "name": "[SRU,N,1/1] Revert \"iommu: disable SVA when CONFIG_X86 is set\"",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "fb9368f4940ed35a75f84149a3d72257f13ae34a",
    "submitter": {
        "id": 89305,
        "url": "http://patchwork.ozlabs.org/api/people/89305/?format=api",
        "name": "Mehmet Basaran",
        "email": "mehmet.basaran@canonical.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/ubuntu-kernel/patch/20260422180616.336474-2-mehmet.basaran@canonical.com/mbox/",
    "series": [
        {
            "id": 501061,
            "url": "http://patchwork.ozlabs.org/api/series/501061/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/ubuntu-kernel/list/?series=501061",
            "date": "2026-04-22T18:06:15",
            "name": "Revert \"iommu: disable SVA when CONFIG_X86 is set\"",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/501061/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2226656/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2226656/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<kernel-team-bounces@lists.ubuntu.com>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (4096-bit key;\n unprotected) header.d=canonical.com header.i=@canonical.com\n header.a=rsa-sha256 header.s=20251003 header.b=jG8wmjF1;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com\n (client-ip=185.125.189.65; helo=lists.ubuntu.com;\n envelope-from=kernel-team-bounces@lists.ubuntu.com;\n receiver=patchwork.ozlabs.org)"
        ],
        "Received": [
            "from lists.ubuntu.com (lists.ubuntu.com [185.125.189.65])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g16c41gqlz1y2d\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 23 Apr 2026 04:06:28 +1000 (AEST)",
            "from localhost ([127.0.0.1] helo=lists.ubuntu.com)\n\tby lists.ubuntu.com with esmtp (Exim 4.86_2)\n\t(envelope-from <kernel-team-bounces@lists.ubuntu.com>)\n\tid 1wFbxv-0001sc-6X; Wed, 22 Apr 2026 18:06:23 +0000",
            "from smtp-relay-internal-1.internal ([10.131.114.114]\n helo=smtp-relay-internal-1.canonical.com)\n by lists.ubuntu.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.86_2) (envelope-from <mehmet.basaran@canonical.com>)\n id 1wFbxt-0001qj-Ij\n for kernel-team@lists.ubuntu.com; Wed, 22 Apr 2026 18:06:21 +0000",
            "from mail-wm1-f71.google.com (mail-wm1-f71.google.com\n [209.85.128.71])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by smtp-relay-internal-1.canonical.com (Postfix) with ESMTPS id 56D1E3F47C\n for <kernel-team@lists.ubuntu.com>; Wed, 22 Apr 2026 18:06:21 +0000 (UTC)",
            "by mail-wm1-f71.google.com with SMTP id\n 5b1f17b1804b1-488e097a270so42804835e9.1\n for <kernel-team@lists.ubuntu.com>; Wed, 22 Apr 2026 11:06:21 -0700 (PDT)",
            "from localhost ([149.86.141.144]) by smtp.gmail.com with ESMTPSA id\n 5b1f17b1804b1-488fc1c0354sm433987245e9.11.2026.04.22.11.06.18\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Wed, 22 Apr 2026 11:06:19 -0700 (PDT)"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com;\n s=20251003; t=1776881181;\n bh=RV3otKONHN7KWGzAcX02vbcalEMLJQeQrI929Apwm20=;\n h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:\n MIME-Version;\n b=jG8wmjF1AxMe64ywiurzIFZ6B7xtzIwtmVT9ppNc8Q6d/O4qCDHesNWZ0OjHlI4Z5\n P3IDWlZZgysTwSXpr9b3Cn/AZoK/lBWZU/Unc3in4NWAcqGxhE2NvQkZ+hDWVJ2Gt5\n wzzGLiDZhluHozryRSuGvDZMy/fOvubb+R9FFpiCiruxEHp5+3S+5io5+nSw7CvZCx\n S/dEcjH9uxk1JBYuXOAtuQJzfZzOSbrrMVHdI7C3HaOywCAkGyT+TlS8ATftmYcZEi\n M7Ov0asT4l5GrlmNf0WN6hsr+5NEb3GKNBMAjoaLYKdAoTaqI/89JcSQT/RTL3FvKT\n YtjIuRJb7PP9aNcsEMz4PRN32ZPcsVg66JYmd8GvhDwdYIInrXdAdFqij7qZ6qS7Zn\n vAzErWpS943R9wlSmdr8UVXb2PanVcecdbRlMqFLKhs5/E/MVtnjn/dcgzYyDVkZUq\n uBpwEXEmqNgprcDzl3YDqjwUALsGYvaxjwST2mpw3ivznXaN1Ev0FEnclGw1Yii7O+\n iKQdu7eD95TfRbDbYFY/SfG6hb3YGR9qnsAxQxFeXLiwttLp88Z/xkTY2gecc0pzMo\n EpBCF4G1fWxV5PJrYvsLBLWT6kvlHZMYCm5uh1bTCS4gu0ubUHAYIGCgsAUkIK+6Cu\n v3sO81EBaKgHRABBaFmwqggc=",
        "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776881180; x=1777485980;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=RV3otKONHN7KWGzAcX02vbcalEMLJQeQrI929Apwm20=;\n b=N6Bmu4ifVkjEh9tNQGkMsrQ0UAFS4NtWoljqlY+zbzu3HDZcKyhuu6AbZOjulze7H3\n i+HeMhE2rG+j2C1tHn7vH+loCYB5IiEHDdRItboY/Cgz5vWOnzdkybQtuflXuWcGckGV\n pE6MXUU5YU8UvLls/CRarlwc8znV4BqBf3KFAgehzoueoqXFmwgeCB+IqA7mCP3XFzg8\n /Wt5cok6TWZhPgnILFiPbbpH/W1n7gS6ncfJ9Wz7jg3wMbjxiTXaJHnLWmSaoteGxCMJ\n lnVAeUPd0tFaYJ3+gODcy2uEY6SLxwRqDt7rjqR0oACY64jIUvzApNs+xkX2PBkOAigf\n wzFA==",
        "X-Gm-Message-State": "AOJu0YwKcYlTqbiOSHO7ajqqxfEsYTzoQEQTMmLcNTkTJQU7cz5+zrQk\n l/QtzInWbaEzu2ancircjdoccxwrqD1wlRd69iiXEcW2ONgNK8zECwpyIR+a7bS149ct0BJO/KE\n uZWMeCRp1Vkaba4h5XJqNoSfb5OPQnpCfE+oQ5z2R+3Gc9AK382c8eZfu6fTILZvG2JDZXp4uIQ\n yT7alzzgtONGZlgYwb",
        "X-Gm-Gg": "AeBDieuC7Svt8v9f+vGggjKcTvcwRxePhjtqXSxTYLLSfOjZv37uXw7q/Z1V1SlPoIZ\n 16pNAI1nSovZoR2lXQPgOHk7MPtLN2triJEd+RSG1v1ctPAVH+EbqL2wmtVUzPTwqSrvApV8Vm9\n ibJOnJeSP+KAYsdni5JwIXEn2hYZV4C7/yJeVFcWmMyXN3+97m6hbqEracOjPkCMAHgAExWAFoE\n L87SIPZ5w8Y6tBRsRdt1OM07M1RkAngjmMxB+ct4SD3unjOoZrqm8wj16GN9i64m2tW7YzLn/Dr\n 4Q9+NUz40gSmvGffJAHy3lGtlkCuM7aQWwLPrIzxcPJwmWZMUJ6SdSmdpw/ldSGaEbeBORjtS0h\n cqEbYo5HmuR8VODMgR4uHHrDN4BaLhrIgDaDCPFqBzQ==",
        "X-Received": [
            "by 2002:a05:600c:628c:b0:48a:52d4:888c with SMTP id\n 5b1f17b1804b1-48a52d48985mr163053305e9.3.1776881180497;\n Wed, 22 Apr 2026 11:06:20 -0700 (PDT)",
            "by 2002:a05:600c:628c:b0:48a:52d4:888c with SMTP id\n 5b1f17b1804b1-48a52d48985mr163052725e9.3.1776881179993;\n Wed, 22 Apr 2026 11:06:19 -0700 (PDT)"
        ],
        "From": "Mehmet Basaran <mehmet.basaran@canonical.com>",
        "To": "kernel-team@lists.ubuntu.com",
        "Subject": "[SRU][N][PATCH 1/1] Revert \"iommu: disable SVA when CONFIG_X86 is\n set\"",
        "Date": "Wed, 22 Apr 2026 21:06:16 +0300",
        "Message-ID": "<20260422180616.336474-2-mehmet.basaran@canonical.com>",
        "X-Mailer": "git-send-email 2.43.0",
        "In-Reply-To": "<20260422180616.336474-1-mehmet.basaran@canonical.com>",
        "References": "<20260422180616.336474-1-mehmet.basaran@canonical.com>",
        "MIME-Version": "1.0",
        "X-BeenThere": "kernel-team@lists.ubuntu.com",
        "X-Mailman-Version": "2.1.20",
        "Precedence": "list",
        "List-Id": "Kernel team discussions <kernel-team.lists.ubuntu.com>",
        "List-Unsubscribe": "<https://lists.ubuntu.com/mailman/options/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe>",
        "List-Archive": "<https://lists.ubuntu.com/archives/kernel-team>",
        "List-Post": "<mailto:kernel-team@lists.ubuntu.com>",
        "List-Help": "<mailto:kernel-team-request@lists.ubuntu.com?subject=help>",
        "List-Subscribe": "<https://lists.ubuntu.com/mailman/listinfo/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe>",
        "Content-Type": "text/plain; charset=\"utf-8\"",
        "Content-Transfer-Encoding": "base64",
        "Errors-To": "kernel-team-bounces@lists.ubuntu.com",
        "Sender": "\"kernel-team\" <kernel-team-bounces@lists.ubuntu.com>"
    },
    "content": "BugLink: https://bugs.launchpad.net/bugs/2149766\n\nThis reverts commit 21020d6dd7b2309dbdda9610e545a2e2a278a8fc.\n\nThe issue has been brought to our attention when questing (6.17)\nkernels were unable to load amd_xdna drivers. However, this commit,\nin addition to NPUs, also affects PCIe cards which make use of\nunified memory (GPUs, Accelerators, NICs). With this commit, PCIe\ndevices will revert to using legacy method (pinning) instead of\nunified memory. As a result,\n - arguably it will be less secure,\n - there can be performance drops.\n\nCurrently, this commit is part of an 8 commit patch series:\n\"Fix stale IOTLB entries for kernel address space\", v7.\n  [PATCH v7 1/8] iommu: Disable SVA when CONFIG_X86 is set\n  [PATCH v7 2/8] mm: Add a ptdesc flag to mark kernel page tables\n  [PATCH v7 3/8] mm: Actually mark kernel page table pages\n  [PATCH v7 4/8] x86/mm: Use 'ptdesc' when freeing PMD pages\n  [PATCH v7 5/8] mm: Introduce pure page table freeing function\n  [PATCH v7 6/8] x86/mm: Use pagetable_free()\n  [PATCH v7 7/8] mm: Introduce deferred freeing for kernel page tables\n  [PATCH v7 8/8] iommu/sva: Invalidate stale IOTLB entries for kernel address space\n\nwhere \"iommu: disable SVA when CONFIG_X86 is set\" is undone by\nthe 8th commit. We only have this commit from the whole patchset.\nIdeally we should have the whole patchset applied.\n\nThis commit fixes the following issue which is old,\n26b25a2b98e4 (\"iommu: Bind process address spaces to devices\")\nand we applied this commit recently. So, reverting this commit\nwon't be introducing regressions. Affected kernel versions are:\n - 6.8 due to the reasons above.\n - 6.17 due to both the reasons above and the amd_xdna issue.\n\nSigned-off-by: Mehmet Basaran <mehmet.basaran@canonical.com>\n---\n drivers/iommu/iommu-sva.c | 3 ---\n 1 file changed, 3 deletions(-)",
    "diff": "diff --git a/drivers/iommu/iommu-sva.c b/drivers/iommu/iommu-sva.c\nindex 07f6f80ee819..65814cbc8402 100644\n--- a/drivers/iommu/iommu-sva.c\n+++ b/drivers/iommu/iommu-sva.c\n@@ -74,9 +74,6 @@ struct iommu_sva *iommu_sva_bind_device(struct device *dev, struct mm_struct *mm\n \tstruct iommu_sva *handle;\n \tint ret;\n \n-\tif (IS_ENABLED(CONFIG_X86))\n-\t\treturn ERR_PTR(-EOPNOTSUPP);\n-\n \tmutex_lock(&iommu_sva_lock);\n \n \t/* Allocate mm->pasid if necessary. */\n",
    "prefixes": [
        "SRU",
        "N",
        "1/1"
    ]
}