Cover Letter Detail
Show a cover letter.
GET /api/1.2/covers/2225549/?format=api
{ "id": 2225549, "url": "http://patchwork.ozlabs.org/api/1.2/covers/2225549/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linux-pci/cover/cover.1776755661.git.ionut.nechita@windriver.com/", "project": { "id": 28, "url": "http://patchwork.ozlabs.org/api/1.2/projects/28/?format=api", "name": "Linux PCI development", "link_name": "linux-pci", "list_id": "linux-pci.vger.kernel.org", "list_email": "linux-pci@vger.kernel.org", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<cover.1776755661.git.ionut.nechita@windriver.com>", "list_archive_url": null, "date": "2026-04-21T07:19:30", "name": "[v12,0/2] PCI/IOV: Fix SR-IOV locking races and AB-BA deadlock", "submitter": { "id": 92607, "url": "http://patchwork.ozlabs.org/api/1.2/people/92607/?format=api", "name": "Ionut Nechita (Wind River)", "email": "ionut.nechita@windriver.com" }, "mbox": "http://patchwork.ozlabs.org/project/linux-pci/cover/cover.1776755661.git.ionut.nechita@windriver.com/mbox/", "series": [ { "id": 500747, "url": "http://patchwork.ozlabs.org/api/1.2/series/500747/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linux-pci/list/?series=500747", "date": "2026-04-21T07:19:30", "name": "PCI/IOV: Fix SR-IOV locking races and AB-BA deadlock", "version": 12, "mbox": "http://patchwork.ozlabs.org/series/500747/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/covers/2225549/comments/", "headers": { "Return-Path": "\n <linux-pci+bounces-52821-incoming=patchwork.ozlabs.org@vger.kernel.org>", "X-Original-To": [ "incoming@patchwork.ozlabs.org", "linux-pci@vger.kernel.org" ], "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=windriver.com header.i=@windriver.com\n header.a=rsa-sha256 header.s=PPS06212021 header.b=HBF/fQpA;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c09:e001:a7::12fc:5321; helo=sto.lore.kernel.org;\n envelope-from=linux-pci+bounces-52821-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)", "smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=windriver.com header.i=@windriver.com\n header.b=\"HBF/fQpA\"", "smtp.subspace.kernel.org;\n arc=fail smtp.client-ip=205.220.166.238", "smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=windriver.com", "smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=windriver.com" ], "Received": [ "from sto.lore.kernel.org (sto.lore.kernel.org\n [IPv6:2600:3c09:e001:a7::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0DVq37BNz1yCv\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 17:28:51 +1000 (AEST)", "from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sto.lore.kernel.org (Postfix) with ESMTP id 8BF353028009\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 07:23:38 +0000 (UTC)", "from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 8B650388E4D;\n\tTue, 21 Apr 2026 07:21:01 +0000 (UTC)", "from mx0a-0064b401.pphosted.com (mx0a-0064b401.pphosted.com\n [205.220.166.238])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 8BA173876C7;\n\tTue, 21 Apr 2026 07:20:59 +0000 (UTC)", "from pps.filterd (m0250809.ppops.net [127.0.0.1])\n\tby mx0a-0064b401.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id\n 63L4P3ri791542;\n\tTue, 21 Apr 2026 00:20:02 -0700", "from sn4pr2101cu001.outbound.protection.outlook.com\n (mail-southcentralusazon11012004.outbound.protection.outlook.com\n [40.93.195.4])\n\tby mx0a-0064b401.pphosted.com (PPS) with ESMTPS id 4dm9fctsbq-1\n\t(version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT);\n\tTue, 21 Apr 2026 00:20:02 -0700 (PDT)", "from SJ2PR11MB7546.namprd11.prod.outlook.com (2603:10b6:a03:4cc::8)\n by MN2PR11MB4695.namprd11.prod.outlook.com (2603:10b6:208:260::13) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9846.16; Tue, 21 Apr\n 2026 07:19:58 +0000", "from SJ2PR11MB7546.namprd11.prod.outlook.com\n ([fe80::ca9b:dcf:8881:bced]) by SJ2PR11MB7546.namprd11.prod.outlook.com\n ([fe80::ca9b:dcf:8881:bced%4]) with mapi id 15.20.9846.016; Tue, 21 Apr 2026\n 07:19:58 +0000" ], "ARC-Seal": [ "i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776756061; cv=fail;\n b=JL1235HnAukaKw1jU3QYGUZsANlUW+kWt5GnCCQ/wihe1WqzPJd8EXHAwmPJgXVbSSl/vwYvXtJ2h2glYGl+arIQohaZzgu8pmYriItHvutA+TmH5/EeGCHNUb49BWb68OnExP8ZmtNSs/h2EKD5a+KNs0cmDth84S16qeZ+Zd8=", "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=Nab2Oz2umQVU1pOcwjNQKvD5YUw8gddzTPmsq6VFat8dzC4lc7XYr9RuDnqTXyelv9tMWtAt0B5wHTgvn2ltHmKHBAqDy+dRMmcNznw1WbHn3/vp0aPABWA7UPzaGWxf0p6FHH4uGQJqGV2tiDBdbLrMvhyymvaQgaBmwiARb10JlpG+ugwLaIMqMDyi4Se/wuiQ4K9FwzadC3PFoInm1V8p0TXp4rWXfEN/72hOhlJWUm+keI3eDTbYjXL59T6q/+jeJHU9P9L9upeKQwdTNreMbf/+ZiWWbwFP8F4VJz3aOmFeCEIa+BAlvkyQXDh/DbPwpmbylNw8hF6uoUBMKw==" ], "ARC-Message-Signature": [ "i=2; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776756061; c=relaxed/simple;\n\tbh=TbRnsEoV/zQU/lZ7WRiOkg51Aesh32FdloyvCvsj/5o=;\n\th=From:To:Cc:Subject:Date:Message-ID:Content-Type:MIME-Version;\n b=WZ0Sbe5mywS2tD9pEMiySy2GS8vu8aYhztiM3XMlVLBYd7eSRDinjv1WHpnMAJ6CxZQ6DTi653DKOEUhCa4aAIkju22A2o9y8yGOKJrNRHiUDuNYmDFyGxNdcOWA/ZJ7ic5YK9ygQQeTXckT3AWJ5EEQO8yRUseeStGPlFRtEYU=", "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=yVt1lXOjoqKJOt3Sluka4whKxntqJUUMLjccwd7PEZI=;\n b=R54BbNeKLTM4KsApAd5spLQjW90mSQQpyl9wO+D+0tp0NLDjT2nVddA2Wi/ok2dUwuZDdwUR383xRCYoXqZpuERqUxTNZWsVsQaXXcvJPjLxSyP58G4qTfQDqhTsjqIphHMZ64BlnJKCqZfGr0oG803b2jds8R2hLFmEBbvTBXMSIe2B+pQIt0y2xhbE9LvhFqVMlgn4a7rFkm2ERSMgPO6Nb5osqwlnvknjYd/AIB+Uwv55Shdw+dq+RCMprBwtY6LtsVxr0pWYWa5tHbGZjNTG3nblsb3z7zm6LUxSJ5BsdLvbIAOVORUzm3YBv27f/Y7554VMQsPrfGvaSLlVmA==" ], "ARC-Authentication-Results": [ "i=2; smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=windriver.com;\n spf=pass smtp.mailfrom=windriver.com;\n dkim=pass (2048-bit key) header.d=windriver.com header.i=@windriver.com\n header.b=HBF/fQpA; arc=fail smtp.client-ip=205.220.166.238", "i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=windriver.com; dmarc=pass action=none\n header.from=windriver.com; dkim=pass header.d=windriver.com; arc=none" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=windriver.com;\n\t h=cc:content-transfer-encoding:content-type:date:from\n\t:message-id:mime-version:subject:to; s=PPS06212021; bh=yVt1lXOjo\n\tqKJOt3Sluka4whKxntqJUUMLjccwd7PEZI=; b=HBF/fQpAojdE+V+oNwCbkR1Ch\n\tOUPJmTK5Q+LT/p7gfoJwWIi52UOIRAmwJTQfs2OjuO/4qeuefMS1Lt+hr0bBjrFR\n\tYvnNgrk4d75ly8ExXw9Y9LpHnw77dqK7nhvHwUQLnuYawRLE9/Fpr1OCTiYUB4pm\n\t5ow8L091bA66Et5LbbrBHJMtsAO/sNgZECD1cqS1D1w0UFp1sXx3aGHx4VZ0qQKP\n\tW4AygzZ3qBOeS+7hjB1Coj7VifWIzDgyjbJJ6h5aqkXMqHsnGgDY1Vlb7NbqSm8r\n\t/p5HMaDtGN3UC2DRiAlFIqazONOJ3JUahTbCxHxiOqJQe9iHFA3Lbl4qasn6A==", "From": "\"Ionut Nechita (Wind River)\" <ionut.nechita@windriver.com>", "To": "linux-pci@vger.kernel.org, bhelgaas@google.com", "Cc": "helgaas@kernel.org, sebott@linux.ibm.com, schnelle@linux.ibm.com,\n bblock@linux.ibm.com, linux@roeck-us.net, lukas@wunner.de,\n stable@vger.kernel.org, linux-kernel@vger.kernel.org,\n intel-xe@lists.freedesktop.org, matthew.brost@intel.com,\n michal.wajdeczko@intel.com, piotr.piorkowski@intel.com,\n dtatulea@nvidia.com, mani@kernel.org, kbusch@kernel.org,\n lkml@mageta.org, alifm@linux.ibm.com, julianr@linux.ibm.com,\n ionut_n2001@yahoo.com, sunlightlinux@gmail.com", "Subject": "[PATCH v12 0/2] PCI/IOV: Fix SR-IOV locking races and AB-BA deadlock", "Date": "Tue, 21 Apr 2026 10:19:30 +0300", "Message-ID": "<cover.1776755661.git.ionut.nechita@windriver.com>", "X-Mailer": "git-send-email 2.53.0", "Content-Transfer-Encoding": "8bit", "Content-Type": "text/plain", "X-ClientProxiedBy": "VIXP296CA0001.AUTP296.PROD.OUTLOOK.COM\n (2603:10a6:800:2a9::16) To SJ2PR11MB7546.namprd11.prod.outlook.com\n (2603:10b6:a03:4cc::8)", "Precedence": "bulk", "X-Mailing-List": "linux-pci@vger.kernel.org", "List-Id": "<linux-pci.vger.kernel.org>", "List-Subscribe": "<mailto:linux-pci+subscribe@vger.kernel.org>", "List-Unsubscribe": "<mailto:linux-pci+unsubscribe@vger.kernel.org>", "MIME-Version": "1.0", "X-MS-PublicTrafficType": "Email", "X-MS-TrafficTypeDiagnostic": "SJ2PR11MB7546:EE_|MN2PR11MB4695:EE_", "X-MS-Office365-Filtering-Correlation-Id": "3ac0bb47-747f-4f8b-d46a-08de9f76645c", "X-MS-Exchange-SenderADCheck": "1", "X-MS-Exchange-AntiSpam-Relay": "0", "X-Microsoft-Antispam": "\n\tBCL:0;ARA:13230040|366016|376014|7416014|52116014|10070799003|1800799024|56012099003|18002099003;", "X-Microsoft-Antispam-Message-Info": "\n\tEYd4J/yDEaJDNXG7IZePC6wci94NAaJNEK256hSQrbRdexjbShUE4KjvQbVGGQVMKlssVu/YzSKrLI55ePvVyyqlxu3SzYLK7+QnTFbFnNijP52TBk8lf4giahQIeRKct3TfRC5cANlZulwFrrQxegdfznZUUb9d1bvIz3slHRvdQwr6b6pH5xcIoM04NDQTtRko9OkfqXb3oiVH8YGt6Mj3258eszws2MPBqyEsi6UT+dBRusx46nUD8O7M3bhiEv0NeDTZizALaNhiAr9VLc3UfmD/lK2n9VJed+zecbja0TXSDajnnBKyh6swR6OjXLszn5FpLK2yyRqTDJf0IC3v4vV/Y75rUj8V2W/8311/+rqeQHQeXI2B6GL6wiuiWE9xmLRV48bD3ANomKI2ImFDzKZkc52so2WnS7EcsokWzwC19jwEuEPJLRtH4e2Xt8bPXmGmOexKoRNY8uTGYbLQBXmR8Eh8W4b7ZPRKC8mr5l807ILgQJO7VM2cgQf5J6HMA7wtxXCNos3qOhQ+mZUAMOxAellrxBvR8+VZXMnDcI9ZzaaMjdKdmDcltbPw+F46YD2N0Q7Vgl0W0RjScDHsQrkGvuJqb8amBWcY/YucVsVnoLmnO53wxsglMG1pcM21fhRqkFGv7qvrjIB+vIuasgGEu/5SbB0cNi33jSzFYsmF9CjpMbTxQSkWvBrvs8UvssUoc4mRUgJgy8HqRIFLJcY8Hq0CPx1YxXyWX9C1fQJv27H8xKgJTWfZW03z", "X-Forefront-Antispam-Report": "\n\tCIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SJ2PR11MB7546.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(376014)(7416014)(52116014)(10070799003)(1800799024)(56012099003)(18002099003);DIR:OUT;SFP:1101;", "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "2", "X-MS-Exchange-AntiSpam-MessageData-0": "\n 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", "X-MS-Exchange-AntiSpam-MessageData-1": "IRF/gzUJRgf9FCwjQ5fTDD2QMIT7h0UV1uE=", "X-Exchange-RoutingPolicyChecked": "\n\tY47rKQZQozsnexzzA918Jw6KFnhQ9XRYf69r4E/WnxHnA6iNbJMD44lzij8/MBhiwYnGlPJWl+t4MLieXjY3uCzQ8oEbWwTXyXkU4/MdQgmxKxdwsck3jKIpeqJOfddOhvlfOj22fgARLuarcz2W1xeAITa4ESFa6fRCChJD3ByowC+BIjh/ImJNa8yyHV8aL7/FpJ7MDNpWvShF0nWWbGPlQxyrapLH58rPGzmw5fYvk8wwutE0Gd+0Z5UT1u6bdkNtBDtAyHuipIpRwSFOW3Bp/KLtMY0IrNHGfhhE5tDxmkWw8hZfM69nSQDCaZ0BXUSlRvr3K9rvAekwt3TSAg==", "X-OriginatorOrg": "windriver.com", "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n 3ac0bb47-747f-4f8b-d46a-08de9f76645c", "X-MS-Exchange-CrossTenant-AuthSource": "SJ2PR11MB7546.namprd11.prod.outlook.com", "X-MS-Exchange-CrossTenant-AuthAs": "Internal", "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "21 Apr 2026 07:19:57.9947\n (UTC)", "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted", "X-MS-Exchange-CrossTenant-Id": "8ddb2873-a1ad-4a18-ae4e-4644631433be", "X-MS-Exchange-CrossTenant-MailboxType": "HOSTED", "X-MS-Exchange-CrossTenant-UserPrincipalName": "\n L6SyyJWbdN+BG3qLWcVqNKf0VxQEqdDMMxbGIhngnyc2HYmj1ubOnj0IWsz9rERUAY72ZT+e9ziQxhsBWAMMxQN0m/NlCZWG46uPzOhGDrA=", "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "MN2PR11MB4695", "X-Proofpoint-ORIG-GUID": "ruGxn52gBBFYsz6Iylis3ia3enobIo7k", "X-Proofpoint-GUID": "ruGxn52gBBFYsz6Iylis3ia3enobIo7k", "X-Proofpoint-Spam-Details-Enc": "AW1haW4tMjYwNDIxMDA3MCBTYWx0ZWRfX3VKP3ENjozZH\n Jog+W8WZKhj8ImuBOLJoDkH+0TBclcv3aP5/cQMn7NicciBFEnLzvZPai7oMsHrVWf8bsQAIeX+\n bLkErA19UnBgD47QsJtohnckVZV5lShEls7EZJXO/VdkcTbjLBbqIJWeL3URbPzpczAGC6yli5t\n 9MhiDWKU75Ea9ewWsVcec7A2bs/ehd37UgLe9nFp++VKFWAiFflly6hRvQfKDeWz3Q3CC849EEd\n 33k0I5sKJVim8fYqFnnhFe7/ip+7svrz3tdNiNf8SfnOu7OwAxuaHrQC86abG+bPF9c+tE7uIBM\n zMuKQ+h64HKznjVfsPxrppJ+CsHH7QSvqfzf7/ZK6nXH5+jn+GA8dXT+xi6vwpGokJDmP6kzFIw\n pv8QsIZ9IOKUstda2BQBCF6151WiGn3eCS1ItSBn7hDZWMXFjseeMJCkhHSmuFPd4nm/1U/GGV4\n qRBUs805NBmJyWfsJdQ==", "X-Authority-Analysis": "v=2.4 cv=WKZPmHsR c=1 sm=1 tr=0 ts=69e72522 cx=c_pps\n a=eN70jGNn7EKSdYhrfilGAg==:117 a=6eWqkTHjU83fiwn7nKZWdM+Sl24=:19\n a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19\n a=xqWC_Br6kY4A:10 a=A5OVakUREuEA:10 a=VkNPw1HP01LnGYTKEx00:22\n a=bi6dqmuHe4P4UrxVR6um:22 a=iKiJcTA2PjBS6x5JeXcw:22 a=VwQbUJbxAAAA:8\n a=VnNF1IyMAAAA:8 a=t7CeM3EgAAAA:8 a=0kW7uK-nrfiYIzTTHL0A:9\n a=FdTzh2GWekK77mhwV6Dw:22", "X-Proofpoint-Virus-Version": "vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-04-21_01,2026-04-20_02,2025-10-01_01", "X-Proofpoint-Spam-Details": "rule=outbound_notspam policy=outbound score=0\n clxscore=1015 suspectscore=0 bulkscore=0 impostorscore=0 phishscore=0\n spamscore=0 adultscore=0 malwarescore=0 priorityscore=1501 lowpriorityscore=0\n classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0\n reason=mlx scancount=1 engine=8.22.0-2604070000 definitions=main-2604210070" }, "content": "From: Ionut Nechita <ionut.nechita@windriver.com>\n\nHi Bjorn,\n\nThis is v12 of the fix for the SR-IOV race between driver .remove()\nand concurrent hotplug events.\n\nChanges since v11 (Mar 26):\n - Patch 2/2: added Reviewed-by from Niklas Schnelle (IBM) and\n Reviewed-by + Tested-by from Benjamin Block (IBM)\n - Rebased on linux-next (next-20260420)\n - No code changes\n\nChanges since v10 (Mar 18):\n - Patch 2/2: added kill_device() before device_release_driver() to\n prevent a new driver from binding between unbind and removal,\n closing the TOCTOU race window identified by Benjamin Block\n - Patch 1/2 unchanged from v10\n\nChanges since v9 (Mar 10):\n - NEW patch 2/2: fix AB-BA deadlock in remove_store() by calling\n device_release_driver() before pci_stop_and_remove_bus_device_locked(),\n as suggested by Benjamin Block (addresses Guenter Roeck's report)\n - Patch 1/2 unchanged from v9\n\nChanges since v8 (Mar 9):\n - Added Reviewed-by from Niklas Schnelle (IBM) and Tested-by (s390)\n - Added Fixes tags for the three related commits\n - Removed rescan/remove locking from sriov_numvfs_store() since\n locking is now handled in sriov_add_vfs() and sriov_del_vfs()\n - Rebased on linux-next (20260309)\n\nThe AB-BA deadlock:\n\n CPU0 (remove_store) CPU1 (unbind_store)\n -------------------- --------------------\n pci_lock_rescan_remove()\n device_lock()\n driver .remove()\n sriov_del_vfs()\n pci_lock_rescan_remove() <-- WAITS\n pci_stop_bus_device()\n device_release_driver()\n device_lock() <-- WAITS\n\nPatch 2/2 fixes this by:\n 1. Marking the device as dead via kill_device() so no new driver\n can bind (prevents TOCTOU race between unbind and removal)\n 2. Calling device_release_driver() before\n pci_stop_and_remove_bus_device_locked(), so both paths take\n locks in the same order: device_lock first, then\n pci_rescan_remove_lock\n\nNote: the concurrent unbind_store + hotplug-event case (where the\nhotplug handler takes pci_rescan_remove_lock before device_lock)\nremains a known limitation. This is a pre-existing issue that\nBenjamin Block is addressing separately in:\n https://lore.kernel.org/linux-pci/354b9e4a54ced67f3c89df198041df19434fe4c8.1773235561.git.bblock@linux.ibm.com/\n\nThis race has been independently observed by multiple organizations:\n - IBM (s390 platform-generated hot-unplug events racing with\n sriov_del_vfs during PF driver unload)\n - NVIDIA (tested by Dragos Tatulea in earlier versions)\n - Intel (xe driver hitting lockdep warnings and deadlocks when\n calling pci_disable_sriov from .remove)\n - Wind River (original reporter and patch author)\n\nTest environment:\n - Tested on s390 by Benjamin Block and Niklas Schnelle (IBM)\n - Tested on x86_64 with Intel and NVIDIA SR-IOV devices (earlier\n versions)\n\nBased on linux-next (next-20260420).\n\nLink: https://lore.kernel.org/linux-pci/20260214193235.262219-3-ionut.nechita@windriver.com/ [v1]\nLink: https://lore.kernel.org/linux-pci/20260219212648.82606-1-ionut.nechita@windriver.com/ [v2]\nLink: https://lore.kernel.org/lkml/20260225202434.18737-1-ionut.nechita@windriver.com/ [v3]\nLink: https://lore.kernel.org/linux-pci/20260228120138.51197-2-ionut.nechita@windriver.com/ [v4]\nLink: https://lore.kernel.org/linux-pci/20260303080903.28693-1-ionut.nechita@windriver.com/ [v5]\nLink: https://lore.kernel.org/linux-pci/20260306082108.17322-1-ionut.nechita@windriver.com/ [v6]\nLink: https://lore.kernel.org/linux-pci/20260308135352.80346-1-ionut.nechita@windriver.com/ [v7]\nLink: https://lore.kernel.org/linux-pci/20260309194920.16459-1-ionut.nechita@windriver.com/ [v8]\nLink: https://lore.kernel.org/linux-pci/20260310074303.17480-1-ionut.nechita@windriver.com/ [v9]\nLink: https://lore.kernel.org/linux-pci/20260318210316.61975-1-ionut.nechita@windriver.com/ [v10]\nLink: https://lore.kernel.org/linux-pci/20260326083534.23602-1-ionut.nechita@windriver.com/ [v11]\n\nIonut Nechita (Wind River) (2):\n PCI/IOV: Make pci_lock_rescan_remove() reentrant and protect\n sriov_add_vfs/sriov_del_vfs\n PCI: Fix AB-BA deadlock between device_lock and pci_rescan_remove_lock\n in remove_store\n\n drivers/pci/iov.c | 9 +++++----\n drivers/pci/pci-sysfs.c | 30 +++++++++++++++++++++++++++++-\n drivers/pci/probe.c | 11 +++++++++--\n 3 files changed, 43 insertions(+), 7 deletions(-)" }