Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/1.1/patches/2229087/?format=api
{ "id": 2229087, "url": "http://patchwork.ozlabs.org/api/1.1/patches/2229087/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linux-pci/patch/20260427193139.2109938-1-skhawaja@google.com/", "project": { "id": 28, "url": "http://patchwork.ozlabs.org/api/1.1/projects/28/?format=api", "name": "Linux PCI development", "link_name": "linux-pci", "list_id": "linux-pci.vger.kernel.org", "list_email": "linux-pci@vger.kernel.org", "web_url": null, "scm_url": null, "webscm_url": null }, "msgid": "<20260427193139.2109938-1-skhawaja@google.com>", "date": "2026-04-27T19:31:38", "name": "PCI: Init driver override spinlock in new_id_store()", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "1302f02ad2f298f5a5eeb2cf214ab287a7c5b681", "submitter": { "id": 91295, "url": "http://patchwork.ozlabs.org/api/1.1/people/91295/?format=api", "name": "Samiullah Khawaja", "email": "skhawaja@google.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/linux-pci/patch/20260427193139.2109938-1-skhawaja@google.com/mbox/", "series": [ { "id": 501712, "url": "http://patchwork.ozlabs.org/api/1.1/series/501712/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linux-pci/list/?series=501712", "date": "2026-04-27T19:31:38", "name": "PCI: Init driver override spinlock in new_id_store()", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/501712/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2229087/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2229087/checks/", "tags": {}, "headers": { "Return-Path": "\n <linux-pci+bounces-53245-incoming=patchwork.ozlabs.org@vger.kernel.org>", "X-Original-To": [ "incoming@patchwork.ozlabs.org", "linux-pci@vger.kernel.org" ], "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=google.com header.i=@google.com header.a=rsa-sha256\n header.s=20251104 header.b=DYeTMuAe;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c0a:e001:db::12fc:5321; helo=sea.lore.kernel.org;\n envelope-from=linux-pci+bounces-53245-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)", "smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=google.com header.i=@google.com\n header.b=\"DYeTMuAe\"", "smtp.subspace.kernel.org;\n arc=none smtp.client-ip=209.85.214.202", "smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=google.com", "smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=flex--skhawaja.bounces.google.com" ], "Received": [ "from sea.lore.kernel.org (sea.lore.kernel.org\n [IPv6:2600:3c0a:e001:db::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g4DGv4D05z1xvV\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 28 Apr 2026 05:32:23 +1000 (AEST)", "from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id CDDF5303D73C\n\tfor <incoming@patchwork.ozlabs.org>; Mon, 27 Apr 2026 19:32:01 +0000 (UTC)", "from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 2978041B374;\n\tMon, 27 Apr 2026 19:32:01 +0000 (UTC)", "from mail-pl1-f202.google.com (mail-pl1-f202.google.com\n [209.85.214.202])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 02AA241B362\n\tfor <linux-pci@vger.kernel.org>; Mon, 27 Apr 2026 19:31:58 +0000 (UTC)", "by mail-pl1-f202.google.com with SMTP id\n d9443c01a7336-2b2e6ee9444so114248335ad.1\n for <linux-pci@vger.kernel.org>; Mon, 27 Apr 2026 12:31:58 -0700 (PDT)" ], "ARC-Seal": "i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1777318321; cv=none;\n b=BgYMCq3EOYDJvGufTKcwuoAdsYuycVVcoYOzdlsVQz1+azQNq2rhQ/a9Gg6JWG3RVElD5fJfzEVLu6LRuPATjK+hODxyFiIQXplWwV8UvIxs2ZXRNR2P39gmduMdZPVAX1QcDzjBGVWNDo7lFr14FqlELqHIKF0aZQKeFQCPUj0=", "ARC-Message-Signature": "i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1777318321; c=relaxed/simple;\n\tbh=LVmCeMbPONRbWHAmNFPGHdz4QzY8fHP3vOP6GzcGnRU=;\n\th=Date:Mime-Version:Message-ID:Subject:From:To:Cc:Content-Type;\n b=VgyN8zzNM5NWBGBzuNRrJXZxawnu5dI7XVmZOZVzUXUEuOg/KNRRk7jb7oEu2JosMeX0PAthYWNfU2nl2mQ1EGlcysJk4fFa2ZUTMxGOpddUMUNPZnxAQ6QUGKVgW1JCa21ndIViQ/HfeHDUdWQyRGcjm6jkc/QMnPRHH20oJCM=", "ARC-Authentication-Results": "i=1; smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=google.com;\n spf=pass smtp.mailfrom=flex--skhawaja.bounces.google.com;\n dkim=pass (2048-bit key) header.d=google.com header.i=@google.com\n header.b=DYeTMuAe; arc=none smtp.client-ip=209.85.214.202", "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=google.com; s=20251104; t=1777318318; x=1777923118;\n darn=vger.kernel.org;\n h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject\n :date:message-id:reply-to;\n bh=snPdlzVdOYUMpgWp4O8YWqXKWZOQ7VLQKeDCjnOdDtE=;\n b=DYeTMuAeP/GoKy2Dhhs3rvzRf2vHU2G61rL1gUIeND9t3PYoAQNblwMmxwoYXeT68g\n H4UIdyp6ZuM1usHZpAFe5hZT4WxcFIsSaQi3c2Xcdz5BSzDe7jLBsklpFb+RRk9MCXtl\n G260v/VF5VQXMFwnbpf2igjRMfjK9OHBchx99mQE7LY93GtAg/LKIzQtZU9kdkQdvhYF\n K9nKBKQXoUNgGUK9xIWYNHr0Y4wHToTNQ0oXMDZUvcXXsnM31GYpAT4shxwMvgZgdLcH\n nfIfEgnMc78HZjnUgH69zYEl6GGV+CaaegoQmYHOZm76rx1H9i70QJSmYMZZCPH4Ob80\n PtWQ==", "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1777318318; x=1777923118;\n h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state\n :from:to:cc:subject:date:message-id:reply-to;\n bh=snPdlzVdOYUMpgWp4O8YWqXKWZOQ7VLQKeDCjnOdDtE=;\n b=U5FJuMJPukrCi0HyWwbTh8GjzTnP1JZVh9zqMgHNtIBxazcypL8WyJKWeG8PaqWIJW\n S38SIxnwadY+7cXhoZL990g6JWVVGkWja2bOqM4r5ulR/u4Zh7GLBEPQBIw6l552HjVY\n ifAyIP9Q718da8t0Cto3Hv7g6QBNJYkLXgAWlzdMi6wmrMGWKfbDklF+o/WIdLnFIh47\n QE9XctYWlZtP2srDFCDhW4e9GgyDRgLBGb4niwz06oscz/hrBPFBjHSWbweZ2iAhToXS\n ahyr0voVoL39woTH5Guqd+jbpdfLuZTCr7ADPoeHpeyYkkDeMFovwPReiZaG8gnk35Gi\n 9xbw==", "X-Forwarded-Encrypted": "i=1;\n AFNElJ/E8BBZH1PJS7vPpRhzYAT1TecNUgUkOIRpEJRPM1HsAtU9p++eC8cWoc8goL/CP/v06cHMJfUX8H4=@vger.kernel.org", "X-Gm-Message-State": "AOJu0Yw1ysyKnTet7mAZC3Z+1823b8+OgyHRDB7TJ6k/9f42KJSO05ZR\n\tHy+DzF7vj+986OqWVsdn9xJApYZK++12uhQj+BpfXJHUnlJBp1mnVlDLgjG37PdyrBzFERVpuA9\n\t4NCBvS6L4b8IjSw==", "X-Received": "from plda4.prod.google.com ([2002:a17:902:ee84:b0:2b0:af2d:2502])\n (user=skhawaja job=prod-delivery.src-stubby-dispatcher) by\n 2002:a17:903:1107:b0:2b4:5bf8:a7e1 with SMTP id\n d9443c01a7336-2b97bfd91e7mr146815ad.6.1777318318229;\n Mon, 27 Apr 2026 12:31:58 -0700 (PDT)", "Date": "Mon, 27 Apr 2026 19:31:38 +0000", "Precedence": "bulk", "X-Mailing-List": "linux-pci@vger.kernel.org", "List-Id": "<linux-pci.vger.kernel.org>", "List-Subscribe": "<mailto:linux-pci+subscribe@vger.kernel.org>", "List-Unsubscribe": "<mailto:linux-pci+unsubscribe@vger.kernel.org>", "Mime-Version": "1.0", "X-Mailer": "git-send-email 2.54.0.545.g6539524ca2-goog", "Message-ID": "<20260427193139.2109938-1-skhawaja@google.com>", "Subject": "[PATCH] PCI: Init driver override spinlock in new_id_store()", "From": "Samiullah Khawaja <skhawaja@google.com>", "To": "Bjorn Helgaas <bhelgaas@google.com>, Danilo Krummrich <dakr@kernel.org>,\n\tGui-Dong Han <hanguidong02@gmail.com>,\n Greg Kroah-Hartman <gregkh@linuxfoundation.org>,\n\tAlex Williamson <alex@shazbot.org>,\n \"open list:PCI SUBSYSTEM\" <linux-pci@vger.kernel.org>,\n\topen list <linux-kernel@vger.kernel.org>", "Cc": "dmatlack@google.com, Samiullah Khawaja <skhawaja@google.com>,\n\t\"open list:PCI SUBSYSTEM\" <linux-pci@vger.kernel.org>,\n open list <linux-kernel@vger.kernel.org>", "Content-Type": "text/plain; charset=\"UTF-8\"" }, "content": "When setting new_id of a PCI device driver using sysfs a lockdep splat\noccurs. This is because the new_id function new_id_store() checks for\ndriver_override by creating temporary pci_dev structs.\n\nSince the newly added driver_override spinlock is not init for temporary\npci_dev structs, the lockdep splat complains about it.\n\nInit the driver_override spinlock to fix this.\n\n[ 4.464296] INFO: trying to register non-static key.\n[ 4.466207] The code is fine but needs lockdep annotation, or maybe\n[ 4.468487] you didn't initialize this object before use?\n[ 4.470486] turning off the locking correctness validator.\n[ 4.472494] CPU: 2 UID: 0 PID: 177 Comm: liveupdate-iomm Not tainted 7.0.0+ #9 PREEMPT(full)\n[ 4.472497] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[ 4.472498] Call Trace:\n[ 4.472501] <TASK>\n[ 4.472503] dump_stack_lvl+0x5d/0x80\n[ 4.472508] register_lock_class+0x77e/0x790\n[ 4.472512] ? check_prev_add+0xf4/0xd30\n[ 4.472513] ? check_prev_add+0xf4/0xd30\n[ 4.472515] __lock_acquire+0x3b4/0x1b80\n[ 4.472518] ? raw_irqentry_exit_cond_resched+0x20/0x50\n[ 4.472556] lock_acquire+0xbf/0x2e0\n[ 4.472558] ? pci_match_device+0x24/0x180\n[ 4.472563] _raw_spin_lock+0x30/0x40\n[ 4.472567] ? pci_match_device+0x24/0x180\n[ 4.472569] pci_match_device+0x24/0x180\n[ 4.472571] new_id_store+0x189/0x1d0\n[ 4.472574] kernfs_fop_write_iter+0x14f/0x210\n[ 4.472578] vfs_write+0x263/0x5e0\n[ 4.472583] ksys_write+0x79/0xf0\n[ 4.472585] do_syscall_64+0x117/0xf80\n[ 4.472587] ? clear_bhb_loop+0x40/0x90\n[ 4.472590] entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 4.472592] RIP: 0033:0x7fe7bc0beeb2\n[ 4.472595] Code: 18 41 8b 93 08 03 00 00 59 5e 48 83 f8 fc 75 1a 83 e2 39 83 fa 08 75 12 e8 2b ff ff ff 0f 1f 00 49 89 ca 48 8b 44 24 20 0f 05 <48> 83 c4 18 c3 66 0f 1f 84 00 00 00 00 00 48 83 ec 10 ff 74 24 18\n[ 4.472596] RSP: 002b:00007ffcdbb1ed80 EFLAGS: 00000202 ORIG_RAX: 0000000000000001\n[ 4.472598] RAX: ffffffffffffffda RBX: 00007fe7bc2415c0 RCX: 00007fe7bc0beeb2\n[ 4.472599] RDX: 000000000000000a RSI: 00005580955433c0 RDI: 0000000000000001\n[ 4.472600] RBP: 000000000000000a R08: 0000000000000000 R09: 0000000000000000\n[ 4.472601] R10: 0000000000000000 R11: 0000000000000202 R12: 000000000000000a\n[ 4.472602] R13: 00005580955433c0 R14: 000055805932493e R15: 0000558095545490\n[ 4.472605] </TASK>\n\nFixes: cb3d1049f4ea (\"driver core: generalize driver_override in struct device\")\nFixes: 10a4206a2401 (\"PCI: use generic driver_override infrastructure\")\nSigned-off-by: Samiullah Khawaja <skhawaja@google.com>\n---\n drivers/pci/pci-driver.c | 5 +++++\n 1 file changed, 5 insertions(+)\n\n\nbase-commit: 254f49634ee16a731174d2ae34bc50bd5f45e731", "diff": "diff --git a/drivers/pci/pci-driver.c b/drivers/pci/pci-driver.c\nindex d10ece0889f0..5f453213b8c5 100644\n--- a/drivers/pci/pci-driver.c\n+++ b/drivers/pci/pci-driver.c\n@@ -215,6 +215,11 @@ static ssize_t new_id_store(struct device_driver *driver, const char *buf,\n \t\tpdev->subsystem_device = subdevice;\n \t\tpdev->class = class;\n \n+\t\t/*\n+\t\t * Initialize the embedded struct device driver_override lock to\n+\t\t * avoid the lockdep errors.\n+\t\t */\n+\t\tspin_lock_init(&pdev->dev.driver_override.lock);\n \t\tif (pci_match_device(pdrv, pdev))\n \t\t\tretval = -EEXIST;\n \n", "prefixes": [] }