get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/1.2/patches/2225551/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2225551,
    "url": "http://patchwork.ozlabs.org/api/1.2/patches/2225551/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/linux-pci/patch/b378529b4afc4f2a6e393498fe9b9b7f056f95c4.1776755661.git.ionut.nechita@windriver.com/",
    "project": {
        "id": 28,
        "url": "http://patchwork.ozlabs.org/api/1.2/projects/28/?format=api",
        "name": "Linux PCI development",
        "link_name": "linux-pci",
        "list_id": "linux-pci.vger.kernel.org",
        "list_email": "linux-pci@vger.kernel.org",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<b378529b4afc4f2a6e393498fe9b9b7f056f95c4.1776755661.git.ionut.nechita@windriver.com>",
    "list_archive_url": null,
    "date": "2026-04-21T07:19:32",
    "name": "[v12,2/2] PCI: Fix AB-BA deadlock between device_lock and pci_rescan_remove_lock in remove_store",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "f02d328612670fc004b87f615aa7d84f4ff767f6",
    "submitter": {
        "id": 92607,
        "url": "http://patchwork.ozlabs.org/api/1.2/people/92607/?format=api",
        "name": "Ionut Nechita (Wind River)",
        "email": "ionut.nechita@windriver.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/linux-pci/patch/b378529b4afc4f2a6e393498fe9b9b7f056f95c4.1776755661.git.ionut.nechita@windriver.com/mbox/",
    "series": [
        {
            "id": 500747,
            "url": "http://patchwork.ozlabs.org/api/1.2/series/500747/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/linux-pci/list/?series=500747",
            "date": "2026-04-21T07:19:30",
            "name": "PCI/IOV: Fix SR-IOV locking races and AB-BA deadlock",
            "version": 12,
            "mbox": "http://patchwork.ozlabs.org/series/500747/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2225551/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2225551/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "\n <linux-pci+bounces-52822-incoming=patchwork.ozlabs.org@vger.kernel.org>",
        "X-Original-To": [
            "incoming@patchwork.ozlabs.org",
            "linux-pci@vger.kernel.org"
        ],
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=windriver.com header.i=@windriver.com\n header.a=rsa-sha256 header.s=PPS06212021 header.b=CYjPogzN;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c0a:e001:db::12fc:5321; helo=sea.lore.kernel.org;\n envelope-from=linux-pci+bounces-52822-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)",
            "smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=windriver.com header.i=@windriver.com\n header.b=\"CYjPogzN\"",
            "smtp.subspace.kernel.org;\n arc=fail smtp.client-ip=205.220.166.238",
            "smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=windriver.com",
            "smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=windriver.com"
        ],
        "Received": [
            "from sea.lore.kernel.org (sea.lore.kernel.org\n [IPv6:2600:3c0a:e001:db::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0DY41F9Sz1yGs\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 17:30:48 +1000 (AEST)",
            "from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id D3A2530AE9EF\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 07:23:50 +0000 (UTC)",
            "from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 148113A16AD;\n\tTue, 21 Apr 2026 07:21:05 +0000 (UTC)",
            "from mx0a-0064b401.pphosted.com (mx0a-0064b401.pphosted.com\n [205.220.166.238])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 832B23A1682;\n\tTue, 21 Apr 2026 07:21:03 +0000 (UTC)",
            "from pps.filterd (m0250810.ppops.net [127.0.0.1])\n\tby mx0a-0064b401.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id\n 63L4U27w411528;\n\tTue, 21 Apr 2026 00:20:28 -0700",
            "from bl0pr03cu003.outbound.protection.outlook.com\n (mail-eastusazon11012008.outbound.protection.outlook.com [52.101.53.8])\n\tby mx0a-0064b401.pphosted.com (PPS) with ESMTPS id 4dm580awnw-1\n\t(version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT);\n\tTue, 21 Apr 2026 00:20:28 -0700 (PDT)",
            "from SJ2PR11MB7546.namprd11.prod.outlook.com (2603:10b6:a03:4cc::8)\n by MN2PR11MB4695.namprd11.prod.outlook.com (2603:10b6:208:260::13) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9846.16; Tue, 21 Apr\n 2026 07:20:25 +0000",
            "from SJ2PR11MB7546.namprd11.prod.outlook.com\n ([fe80::ca9b:dcf:8881:bced]) by SJ2PR11MB7546.namprd11.prod.outlook.com\n ([fe80::ca9b:dcf:8881:bced%4]) with mapi id 15.20.9846.016; Tue, 21 Apr 2026\n 07:20:25 +0000"
        ],
        "ARC-Seal": [
            "i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776756065; cv=fail;\n b=AIbA6JTku7OxjugQD5JfwcicoGl2iJ6kFQvtW2pXDofQtq9q+wlRppMQg0KfXSvJdweW6cR62/71jYTzQ38I/PBCn+MQZevducVc2fVrqkgFtWu+pZ7N/P0tc2Y/2I/uiNBWSgVfS0AEQh6IKYqctnAGzdxpunTWtaOJxOr8fc8=",
            "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=hspPyKfhgoe7LSDwc7R9CokqhWHkq9NkxodycqZhc2fQZgymP3nGU/dka+VmrpCj8nNLNVL2grNpIBeBdrvsyja6GHNxQ4Cv5+S5833xobbHF3GCqxqY+U6taXL02XRM6nFhdwO6CvFIZ0wg+8g+s0BPd7R+8oGmM64HVt8aj8dKEngVzS6SVu31NyNnCFFChocCULXiwh+96q8OL5lI2azWDzypVQW+UTdDSVzM6Cnp+HE6itHB/7gV9mP4raoyzXqUXpAepRqpSBpFEGYmHDSEyPeODFTEcEWK1hhNLofB2Ahb3qSpi+VL28OLcn38p8ngIqF7uIuh+H9PFKJLcA=="
        ],
        "ARC-Message-Signature": [
            "i=2; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776756065; c=relaxed/simple;\n\tbh=vrJgq2ubLedxXwnejb8xqvFNi+iBVzJof5NUXTpqQ60=;\n\th=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:\n\t Content-Type:MIME-Version;\n b=ltPpI4e+3S1+74+mSxiXOmNv+WssK99ormQfzhbphTqBcd8b1Qg32tjy8Lh81wBvND8KlWdEsthj7NT5ruOUyM8UuT4+IPhVOL5uOc5XdEhjt2N3rZaUUGgKRF0SF0m4v7Wuu93XknPyesGsqgFGuk6/duHCPGSQUABz5ECSVjM=",
            "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=edruRNhOFxoTqLpoRttq5X20SXLnytn48rYp1IqcNcs=;\n b=YqVHBpLigeK6D0ViiY5coqQbMsxRJC3t4yEpgO/ieeovxY8zUO/J+UqwnMlLGywp5tFxYQp/CUdNVxDNr0KoMzqL79NIn7g7Eq5Ez2bDwZwQu5PVMXiQnK1GSsdWUC8WJwt6TmA/4TwfAm3rVnER4veDnHAm+oGlYaOCWhGzH4PRGuP72gYIm99tq+WUaoR34NlNi4zijFqzKcAMs2B9wrXOiOR/UDZLzYCCM3DNpaHJCB+kFeu0brQqFWmrxmydwEiMBEbv5/eCRkbhiHZpdjBeE4K33u1DhYQ0B0Uu17CvC8wcAX9c8PKno668I4OnXRG1QAEX7zYR2MwtQ/fg6g=="
        ],
        "ARC-Authentication-Results": [
            "i=2; smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=windriver.com;\n spf=pass smtp.mailfrom=windriver.com;\n dkim=pass (2048-bit key) header.d=windriver.com header.i=@windriver.com\n header.b=CYjPogzN; arc=fail smtp.client-ip=205.220.166.238",
            "i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=windriver.com; dmarc=pass action=none\n header.from=windriver.com; dkim=pass header.d=windriver.com; arc=none"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=windriver.com;\n\t h=cc:content-transfer-encoding:content-type:date:from\n\t:in-reply-to:message-id:mime-version:references:subject:to; s=\n\tPPS06212021; bh=edruRNhOFxoTqLpoRttq5X20SXLnytn48rYp1IqcNcs=; b=\n\tCYjPogzNUvdXmEt2k5w/+Y1WUra8/t4+4YNV1vtPObd94M50obhHRF8KV6D+BdCk\n\tw84130TndOivrWyIINS2joFyZB1oS+oh69CMTI1pL4dBmLqLHs94Jem+n/s4+e/o\n\tDTGMmYyDBulBhO705jnCaMvuzlRNryAmtJUHdUTovsphC/OSgvnR+8fI4DVsm1aj\n\tJ0SaWHoafv54G3cPwSZRk5KNy/iKcbDBOVTWdfWN9TTEuMpQtSTr/J7oRQ+n0N2Z\n\tzl0DKW5IHU+CgDC+msacxLLgRl0r29Y2Q9pXqD5W3L9RMFdK4oOeLYnXMsASENxW\n\tdvs2DrO6yGN6ZzAqW7St/g==",
        "From": "\"Ionut Nechita (Wind River)\" <ionut.nechita@windriver.com>",
        "To": "linux-pci@vger.kernel.org, bhelgaas@google.com",
        "Cc": "helgaas@kernel.org, sebott@linux.ibm.com, schnelle@linux.ibm.com,\n        bblock@linux.ibm.com, linux@roeck-us.net, lukas@wunner.de,\n        stable@vger.kernel.org, linux-kernel@vger.kernel.org,\n        intel-xe@lists.freedesktop.org, matthew.brost@intel.com,\n        michal.wajdeczko@intel.com, piotr.piorkowski@intel.com,\n        dtatulea@nvidia.com, mani@kernel.org, kbusch@kernel.org,\n        lkml@mageta.org, alifm@linux.ibm.com, julianr@linux.ibm.com,\n        ionut_n2001@yahoo.com, sunlightlinux@gmail.com",
        "Subject": "[PATCH v12 2/2] PCI: Fix AB-BA deadlock between device_lock and\n pci_rescan_remove_lock in remove_store",
        "Date": "Tue, 21 Apr 2026 10:19:32 +0300",
        "Message-ID": "\n <b378529b4afc4f2a6e393498fe9b9b7f056f95c4.1776755661.git.ionut.nechita@windriver.com>",
        "X-Mailer": "git-send-email 2.53.0",
        "In-Reply-To": "<cover.1776755661.git.ionut.nechita@windriver.com>",
        "References": "<cover.1776755661.git.ionut.nechita@windriver.com>",
        "Content-Transfer-Encoding": "8bit",
        "Content-Type": "text/plain",
        "X-ClientProxiedBy": "VIXP296CA0001.AUTP296.PROD.OUTLOOK.COM\n (2603:10a6:800:2a9::16) To SJ2PR11MB7546.namprd11.prod.outlook.com\n (2603:10b6:a03:4cc::8)",
        "Precedence": "bulk",
        "X-Mailing-List": "linux-pci@vger.kernel.org",
        "List-Id": "<linux-pci.vger.kernel.org>",
        "List-Subscribe": "<mailto:linux-pci+subscribe@vger.kernel.org>",
        "List-Unsubscribe": "<mailto:linux-pci+unsubscribe@vger.kernel.org>",
        "MIME-Version": "1.0",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-TrafficTypeDiagnostic": "SJ2PR11MB7546:EE_|MN2PR11MB4695:EE_",
        "X-MS-Office365-Filtering-Correlation-Id": "8590fd5e-f50d-4987-1765-08de9f767540",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "\n\tBCL:0;ARA:13230040|366016|376014|7416014|52116014|10070799003|1800799024|56012099003|22082099003|18002099003;",
        "X-Microsoft-Antispam-Message-Info": "\n\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",
        "X-Forefront-Antispam-Report": "\n\tCIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SJ2PR11MB7546.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(376014)(7416014)(52116014)(10070799003)(1800799024)(56012099003)(22082099003)(18002099003);DIR:OUT;SFP:1101;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "2",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n H0UahBbuzl1GPYCg+r8dSaIFgAzBG9+Jhl2nmblEwFW5fzcNoHpylpBY/46vwIK+1u5pRbr4qm+r2XH/RAele0HXuxU7SOkbozStOeRR0LlmeKgtEwMnIkb9U6wDRpUXY5RsEzhbh5GdEjt0pY+fKDrXtYryZRYsCk9JH6GZn5SYrxKpXFuCHpKFHryNUvGaMUOe2gSfwFBke7dyLWru4u1Qi07maCYGW2ClAHdsP0KbejUzyoMRnLroN+pxuftr5/l2KKjXU0AVIsdpQoo+rAK0fyxPunluiNfKOy3En8MUW12y4ND5RHSA9SlXZEij6gcqTsbipYBCkmAInQf4wBMqkcP5j0POK5EdhRjc0LGYBzia1b9MSu3croceC/fDm1/eAavBYc6K2FMhXWLlCXJY5inwfm7ukPFvLiJu4SZkSBaKNY6l6R5V7bvfROkiielnmjaYamtU+2F8qlDlihn6IsHJMD9v3m0nDSNtLVSDh5ZhQfecy8s8TRSvSU8Y/EZ3u0qGUXyzFQW+9G3SEwQqMAPO6FmE75xqmMUaJgrdevalTKodul5L4zX23suxpqvfusZDsS3j7eOy1V0JdG29b0h+utJCD8FAV8+jtZnNWtrKSlcFtCiCmO3IqOTy+aLQ4bLLY85Eif+o+Ay/MuAUHWn7rXUDYRlgDS921XTdljRtzaC5U3YCkO5hs7VwU8/Chal4LaYk0VUuRm39fv4Xzi6Jm7fyf9s7pd/H9JSrrXb9+oQVCvk4hrAnr8uLDxT+c89vN8Ito+Rx6558I5HY2LmV1N3Ex7UCHEeT57o//sE4V2eNhDAe3aZ7Oc8IZhnIHXKCTM3aB9I542+x9/0r2Xor/28OrzPYY0dvmhdBU8J+K7ImTO7RZMgh43hF7Ef2NLew95QQej41tmKO2k5QXu5+Zwz3Bt3/F66K6MQQ6C68vBCh/ft2abIVQldTDXT7CS7pGwnU5lrANritPV7z0BECeSCs8FcAEtMYX4AABv8QoK2pUzZacKJr3W9d7Z+KMwb9R7JscZeBDgE8AeBFmtFnkeZiA4Qeho6SFljitxEL+9uuvtldt9GLR4NUFbI6aG1UQpivHJw3aDPMBM8d1OGhJWWHbRb/Jn9fljJZY7SIykv4er6uIhGuXpmX2vfQe+miXZwHHNJ7NUFdP+zxIfwiUjNXCC+D3M9we9zNtZaTq81NBr0bQtSv3RHED6pkUdanIqXsPj7cF7mjvrihjJu7HXJVz8LaqNMNewmMYRXvre939BT4GQm3TX4ZGHf2YYbs7MoMizz+3zC/EqDBTq9pK71ikTlZrA3+JRUu+KHHHSFcDyB6hhpYgq0y4yHmKmVuI5ig4eBNwsVH759abWfopqomvAvLFlI5owk4fyrN5Rb9MlpeUQBh6qEWFmOFMBJ6FWbgtPrsvdvLpA66cPAfMwHOye0FV1YtTe/b+r7I/2cC2Ho4+y0qIMvA6rBQO7aYW11YMOJVIJUlJKop5IWfPvA1fPRl4sO5eha/Pep2chCqeYSyC28r6wTkVhBtaEPyH/jkHI/5rN/r5QtyRLv61604QpVA3U7uxQfCrT8uWvuBrB3oguXw7NHqTFD4jhMIR3swGIccwijo/8V2EuTetaibeXTc9Ar/Xy+vVl680kmA1wrgwbZrS/jUnuVIIHc/KU+Lz5xzjW550kpMLqt/qMnFyPjiG85kzy6PXesDlra/XlRLl3ZhDpSBiFLaiv186do1ZcIexW+0AY980lBtHSVmMamV6wGs4bbYyfOhac/0ABTVAui9U5kozWe4IPAP",
        "X-MS-Exchange-AntiSpam-MessageData-1": "vfxu/O1Gm/pDz1g1q7hRw1gu1tbYoX5v9bg=",
        "X-Exchange-RoutingPolicyChecked": "\n\tKLABhi5k5Vj7sqYUB7kWzK0TFVOgXM1vhHmUsZWhYr41Zq7UI27dEHhuuJt3BXwmI5ml3d31Lt/NCpTpmwRYJGPLE/emHlP7n454TCZwPTXmMhcchOenTTNp5OPdIoAsBdNry6eW10oyWFWOigrNmfLSa12bUqcH0WBHMXVOzOuNIVxBRRDuOalEZQXErP93lkT33XEoTV9bcZAXVse7w+js4XXlSlBqn4WXboTc/G9B+QXa67rP1yXcEcsFcyMpwhMIUotzgDNjPHKrRbyA9akXL8JSwFSOyUFokPgetvGVG4gFKG1PlfE40Qa2fZLcMKMDRr3z1CSuZM43249Q5A==",
        "X-OriginatorOrg": "windriver.com",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n 8590fd5e-f50d-4987-1765-08de9f767540",
        "X-MS-Exchange-CrossTenant-AuthSource": "SJ2PR11MB7546.namprd11.prod.outlook.com",
        "X-MS-Exchange-CrossTenant-AuthAs": "Internal",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "21 Apr 2026 07:20:25.6289\n (UTC)",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted",
        "X-MS-Exchange-CrossTenant-Id": "8ddb2873-a1ad-4a18-ae4e-4644631433be",
        "X-MS-Exchange-CrossTenant-MailboxType": "HOSTED",
        "X-MS-Exchange-CrossTenant-UserPrincipalName": "\n 2SuMh1+xQBKOmC1iGeeNYPOuwX/wPij7YV2OGMjlz3PdSRZ+ykW3D7APFZnR34TiSVIFgM4U2hf3rUI9zq8lv97/glrBxZ1K7EoRq9Q/mu4=",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "MN2PR11MB4695",
        "X-Proofpoint-Spam-Details-Enc": "AW1haW4tMjYwNDIxMDA3MCBTYWx0ZWRfXyXWquYledp6l\n XPVMysv/9YVCh4BKsvZDeNpSZmDgmBm/bmQUMYsUIkV1Ji9IGTQMDKCp6hH9uQQ68k5B9X8AWQo\n g2RlSAVYHzkjS6+VPX2dyIdsAWMR4ZUnTQ92MxR2ZrAl26ionrH78UwfHLULV+LgyKlhD8LN+e2\n B0XWhuC/ReiL0dAkeMeRdH2SeQ/3NOXlAjL4QxS+Z24WUsCuw4T7+l9aiziZpBWk1mZdeeFvJdS\n znyG4ENdd42lmY3BHt7OGWGV1yKv3mcbjTBqjeP2Ho3yC35qsrwXuQlSZhPx57sqtWRFX9H+Zi7\n g2fEsNrtNoe6M7W0AxvgMKscxYPaAoc7o5FMGZb6gZFehyJXh9KjomFDuwZ3T8yCD/oP+2KqdTy\n lpx5WSgHQiq96wpeWrOqc1h2syhuA1Or4nV+RmRJyMOCbQew86qaan8KQKmuczQimc0H4GgCred\n xgh4me3TlhqslArQMYg==",
        "X-Authority-Analysis": "v=2.4 cv=LLVWhpW9 c=1 sm=1 tr=0 ts=69e7253c cx=c_pps\n a=JgOmb2+ItGzuqF5frRSN9Q==:117 a=6eWqkTHjU83fiwn7nKZWdM+Sl24=:19\n a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19\n a=xqWC_Br6kY4A:10 a=A5OVakUREuEA:10 a=VkNPw1HP01LnGYTKEx00:22\n a=bi6dqmuHe4P4UrxVR6um:22 a=HK-ge7EqtdluswH-FwHe:22 a=VwQbUJbxAAAA:8\n a=_jlGtV7tAAAA:8 a=p2eoyRXnAAAA:8 a=t7CeM3EgAAAA:8 a=VnNF1IyMAAAA:8\n a=mm2UkWPFonPHBTd3Hn4A:9 a=nlm17XC03S6CtCLSeiRr:22 a=KSHYvF9M28j0gckGFaEs:22\n a=FdTzh2GWekK77mhwV6Dw:22",
        "X-Proofpoint-GUID": "Tb9VWSpBDrjyQLWCkzJkCZkoDmbNkzcn",
        "X-Proofpoint-ORIG-GUID": "Tb9VWSpBDrjyQLWCkzJkCZkoDmbNkzcn",
        "X-Proofpoint-Virus-Version": "vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-04-21_01,2026-04-20_02,2025-10-01_01",
        "X-Proofpoint-Spam-Details": "rule=outbound_notspam policy=outbound score=0\n malwarescore=0 adultscore=0 impostorscore=0 spamscore=0 clxscore=1015\n lowpriorityscore=0 phishscore=0 priorityscore=1501 bulkscore=0 suspectscore=0\n classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0\n reason=mlx scancount=1 engine=8.22.0-2604070000 definitions=main-2604210070"
    },
    "content": "From: Ionut Nechita <ionut.nechita@windriver.com>\n\nremove_store() calls pci_stop_and_remove_bus_device_locked() which\ntakes pci_rescan_remove_lock first, then device_lock during driver\nrelease.  Meanwhile, unbind_store() takes device_lock first (via\ndevice_driver_detach), and the driver's .remove() callback may call\npci_disable_sriov() -> sriov_del_vfs() -> pci_lock_rescan_remove().\n\nThis creates an AB-BA deadlock:\n\n  CPU0 (remove_store)               CPU1 (unbind_store)\n  --------------------              --------------------\n  pci_lock_rescan_remove()\n                                    device_lock()\n                                    driver .remove()\n                                      sriov_del_vfs()\n                                        pci_lock_rescan_remove()  <-- WAITS\n  pci_stop_bus_device()\n    device_release_driver()\n      device_lock()                                               <-- WAITS\n\nFix this by first marking the device as dead using kill_device() to\nprevent any new driver from binding, then calling device_release_driver()\nbefore pci_stop_and_remove_bus_device_locked().\n\nMarking the device dead closes the race window between unbinding and\nremoval where a new driver could theoretically bind: once the dead flag\nis set, the device core will refuse any new driver probe.\n\nAfter device_release_driver() returns, the driver is already unbound,\nso the subsequent device_release_driver() call inside\npci_stop_and_remove_bus_device_locked() becomes a no-op.\n\nFixes: a5338e365c45 (\"PCI/IOV: Fix race between SR-IOV enable/disable and hotplug\")\nReported-by: Guenter Roeck <linux@roeck-us.net>\nCloses: https://lore.kernel.org/linux-pci/0ca9e675-478c-411d-be32-e2d81439288f@roeck-us.net/\nReported-by: Benjamin Block <bblock@linux.ibm.com>\nCloses: https://lore.kernel.org/linux-pci/20260317090149.GA3835708@chlorum.ategam.org/\nSuggested-by: Benjamin Block <bblock@linux.ibm.com>\nCc: stable@vger.kernel.org\nReviewed-by: Niklas Schnelle <schnelle@linux.ibm.com>\nReviewed-by: Benjamin Block <bblock@linux.ibm.com>\nTested-by: Benjamin Block <bblock@linux.ibm.com>\nSigned-off-by: Ionut Nechita <ionut.nechita@windriver.com>\n---\n drivers/pci/pci-sysfs.c | 30 +++++++++++++++++++++++++++++-\n 1 file changed, 29 insertions(+), 1 deletion(-)",
    "diff": "diff --git a/drivers/pci/pci-sysfs.c b/drivers/pci/pci-sysfs.c\nindex d37860841260..1426328e9f05 100644\n--- a/drivers/pci/pci-sysfs.c\n+++ b/drivers/pci/pci-sysfs.c\n@@ -521,8 +521,36 @@ static ssize_t remove_store(struct device *dev, struct device_attribute *attr,\n \tif (kstrtoul(buf, 0, &val) < 0)\n \t\treturn -EINVAL;\n \n-\tif (val && device_remove_file_self(dev, attr))\n+\tif (val && device_remove_file_self(dev, attr)) {\n+\t\t/*\n+\t\t * Mark the device as dead so that no new driver can bind\n+\t\t * between the unbind and the removal below.  Once the\n+\t\t * dead flag is set, the device core will refuse any new\n+\t\t * driver probe.\n+\t\t */\n+\t\tdevice_lock(dev);\n+\t\tkill_device(dev);\n+\t\tdevice_unlock(dev);\n+\n+\t\t/*\n+\t\t * Unbind the driver before removing the device to avoid\n+\t\t * an AB-BA deadlock between device_lock and\n+\t\t * pci_rescan_remove_lock.  Without this, remove_store\n+\t\t * takes pci_rescan_remove_lock first (via\n+\t\t * pci_stop_and_remove_bus_device_locked) and then\n+\t\t * device_lock during driver release, while a concurrent\n+\t\t * unbind_store (or sriov_numvfs_store) takes device_lock\n+\t\t * first and then pci_rescan_remove_lock (via\n+\t\t * sriov_del_vfs), creating a circular dependency.\n+\t\t *\n+\t\t * By unbinding first, the driver's .remove() callback\n+\t\t * (including any SR-IOV VF cleanup) completes before\n+\t\t * pci_rescan_remove_lock is acquired, ensuring both\n+\t\t * paths take locks in the same order.\n+\t\t */\n+\t\tdevice_release_driver(dev);\n \t\tpci_stop_and_remove_bus_device_locked(to_pci_dev(dev));\n+\t}\n \treturn count;\n }\n static DEVICE_ATTR_IGNORE_LOCKDEP(remove, 0220, NULL,\n",
    "prefixes": [
        "v12",
        "2/2"
    ]
}