Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/1.2/patches/2225560/?format=api
{ "id": 2225560, "url": "http://patchwork.ozlabs.org/api/1.2/patches/2225560/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linux-pci/patch/4625becce42253d53a615efccc33c7d91ccf5312.1776756380.git.ionut.nechita@windriver.com/", "project": { "id": 28, "url": "http://patchwork.ozlabs.org/api/1.2/projects/28/?format=api", "name": "Linux PCI development", "link_name": "linux-pci", "list_id": "linux-pci.vger.kernel.org", "list_email": "linux-pci@vger.kernel.org", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<4625becce42253d53a615efccc33c7d91ccf5312.1776756380.git.ionut.nechita@windriver.com>", "list_archive_url": null, "date": "2026-04-21T07:34:21", "name": "[v13,2/2] PCI: Fix AB-BA deadlock between device_lock and pci_rescan_remove_lock in remove_store", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "f02d328612670fc004b87f615aa7d84f4ff767f6", "submitter": { "id": 92607, "url": "http://patchwork.ozlabs.org/api/1.2/people/92607/?format=api", "name": "Ionut Nechita (Wind River)", "email": "ionut.nechita@windriver.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/linux-pci/patch/4625becce42253d53a615efccc33c7d91ccf5312.1776756380.git.ionut.nechita@windriver.com/mbox/", "series": [ { "id": 500749, "url": "http://patchwork.ozlabs.org/api/1.2/series/500749/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linux-pci/list/?series=500749", "date": "2026-04-21T07:34:20", "name": "PCI/IOV: Fix SR-IOV locking races and AB-BA deadlock", "version": 13, "mbox": "http://patchwork.ozlabs.org/series/500749/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2225560/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2225560/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "\n <linux-pci+bounces-52825-incoming=patchwork.ozlabs.org@vger.kernel.org>", "X-Original-To": [ "incoming@patchwork.ozlabs.org", "linux-pci@vger.kernel.org" ], "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=windriver.com header.i=@windriver.com\n header.a=rsa-sha256 header.s=PPS06212021 header.b=IytWxjgV;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c04:e001:36c::12fc:5321; helo=tor.lore.kernel.org;\n envelope-from=linux-pci+bounces-52825-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)", "smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=windriver.com header.i=@windriver.com\n header.b=\"IytWxjgV\"", "smtp.subspace.kernel.org;\n arc=fail smtp.client-ip=205.220.178.238", "smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=windriver.com", "smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=windriver.com" ], "Received": [ "from tor.lore.kernel.org (tor.lore.kernel.org\n [IPv6:2600:3c04:e001:36c::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0Dls65L4z1yGs\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 17:40:09 +1000 (AEST)", "from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby tor.lore.kernel.org (Postfix) with ESMTP id 9700530616F8\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 07:35:48 +0000 (UTC)", "from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 8EA8938757F;\n\tTue, 21 Apr 2026 07:35:35 +0000 (UTC)", "from mx0b-0064b401.pphosted.com (mx0b-0064b401.pphosted.com\n [205.220.178.238])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id E579E38A706;\n\tTue, 21 Apr 2026 07:35:33 +0000 (UTC)", "from pps.filterd (m0250811.ppops.net [127.0.0.1])\n\tby mx0a-0064b401.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id\n 63L517XA383621;\n\tTue, 21 Apr 2026 07:35:08 GMT", "from bl2pr02cu003.outbound.protection.outlook.com\n (mail-eastusazon11011009.outbound.protection.outlook.com [52.101.52.9])\n\tby mx0a-0064b401.pphosted.com (PPS) with ESMTPS id 4dky5yb2w8-1\n\t(version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT);\n\tTue, 21 Apr 2026 07:35:07 +0000 (GMT)", "from SJ2PR11MB7546.namprd11.prod.outlook.com (2603:10b6:a03:4cc::8)\n by SA1PR11MB6782.namprd11.prod.outlook.com (2603:10b6:806:25e::11) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9846.16; Tue, 21 Apr\n 2026 07:35:05 +0000", "from SJ2PR11MB7546.namprd11.prod.outlook.com\n ([fe80::ca9b:dcf:8881:bced]) by SJ2PR11MB7546.namprd11.prod.outlook.com\n ([fe80::ca9b:dcf:8881:bced%4]) with mapi id 15.20.9846.016; Tue, 21 Apr 2026\n 07:35:05 +0000" ], "ARC-Seal": [ "i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776756935; cv=fail;\n b=Nhpwk6jo7+BYuMR7aHxa3tSqpG1wOHaNeEL28f3R5zrFhTG7j9cn/Xjp97XYS8hkG4dMmmVR6IL+hBSXPDeuwo5soe1O6xhHrupg3u6G7SSNTJuEZ1J4niOpWc6mx4aAr5kZGSccbcnMCEvZIc7LJfp8UzqYCbUYl0ke6lHY+Nw=", "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=I6TKjxpQU5nu+bM17pmeNhTue5lE2+/OlzDAKiR+2sizhCB6GUvK/TEWHtIyZkC9WAddrOi4OSV3YV2ptnmuac3+hjLpytjH+1jwm+8SP+JQPB+Mjix2imbrhrY0hZ5OSdQs/odxq8BJ0sKiVkVEjk/MIZkT6HX3QTu101fzUOvOHNwrJJ0L7DPMM6kwrQhLqoScD029/gaI/DoVcWz4yeadrJ+U/563+Uggl7urB2oPbxgOei14ZaMaOotgNtupdg79LxE5xklVuXUHTnTuIswVTRWN/fqvnAxJWv4+5WSSpOIcy21FY8ALHY2N2KxefU0kDQUOnTK3HzMtIre7FA==" ], "ARC-Message-Signature": [ "i=2; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776756935; c=relaxed/simple;\n\tbh=vrJgq2ubLedxXwnejb8xqvFNi+iBVzJof5NUXTpqQ60=;\n\th=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:\n\t Content-Type:MIME-Version;\n b=XrcdaWOcBmHtBuAY7l4TmjiloHePWnWj7G/SoN/AP1mCkzLvBOajgAB1zrjPH4gzV32dJFY2+9Ro6y0wRn/ENU8vbbICCd+r/clQU5oUe7MIne2RzH0UfCeqqqDLo7sZhi7bq8y9DzugH/IxC5JZxa463Yxd2TxoLQauuQxuU7A=", "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=edruRNhOFxoTqLpoRttq5X20SXLnytn48rYp1IqcNcs=;\n b=JWHjZ9uzt6AgrvU9Jc4Lne/6yLXxfKPD5i1qlQ8xDuwdWn8+1APipM8AGZcKuTb9G7xwhhdC+jQUoSGuKaxiSuT0yrfuSgBiPC5/zAmXyVcMeF6llgiG821/aiMFKDL9Va6+N7f8VvYPXmLVXrKxFEWBlT9p6CX1Fnlkf6iHUqV/OnRZwVowXrZf/zinThkD1DyB7Ee7ycCBjaNwRbBImdp/O0QmBmwKIdwWbTO4fEut2L2vSfiiQA/2mIsURGHNK4aZ44Ucj1HAV382PpUT94ex4OaymkBZFp4QoA+igjLRUQbDY+yEskgpBYj6LI7bLLoIkla7dTmMFoE4ChkXnQ==" ], "ARC-Authentication-Results": [ "i=2; smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=windriver.com;\n spf=pass smtp.mailfrom=windriver.com;\n dkim=pass (2048-bit key) header.d=windriver.com header.i=@windriver.com\n header.b=IytWxjgV; arc=fail smtp.client-ip=205.220.178.238", "i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=windriver.com; dmarc=pass action=none\n header.from=windriver.com; dkim=pass header.d=windriver.com; arc=none" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=windriver.com;\n\t h=cc:content-transfer-encoding:content-type:date:from\n\t:in-reply-to:message-id:mime-version:references:subject:to; s=\n\tPPS06212021; bh=edruRNhOFxoTqLpoRttq5X20SXLnytn48rYp1IqcNcs=; b=\n\tIytWxjgVsJQbDcB4kEcA4bNxTQLPiAoL8YBOk/BjeOGUJ8ZQEHVTIoWDZzarj7YR\n\twvuQNmBUlAD+OksRMGb8dtfQyHKxJMZdeAJ7DU6nNQ7jny6tBNBeRlxA3+fHOQgz\n\trInYoNSBWxFlpKrMO7hMtZFLh7ijCbk7XW4ZCvXYsgJMLBRVg42iRZMYBavHUOPg\n\taEtyiKm/VJ9dnSq8G+3f7YQqMto9JL5d/IAWjtwHko24aw1dTSn4c54SASt2bfWQ\n\t05t0zTRCn0ySC8uEqRVstjboaae5rf1PvZm6VQX5ULQ1XM2KHX611UsAbxqDVSXb\n\txnwwGY8EmfkodN6BBdClvg==", "From": "\"Ionut Nechita (Wind River)\" <ionut.nechita@windriver.com>", "To": "linux-pci@vger.kernel.org, bhelgaas@google.com", "Cc": "helgaas@kernel.org, sebott@linux.ibm.com, schnelle@linux.ibm.com,\n bblock@linux.ibm.com, linux@roeck-us.net, lukas@wunner.de,\n stable@vger.kernel.org, linux-kernel@vger.kernel.org,\n intel-xe@lists.freedesktop.org, matthew.brost@intel.com,\n michal.wajdeczko@intel.com, piotr.piorkowski@intel.com,\n dtatulea@nvidia.com, mani@kernel.org, kbusch@kernel.org,\n lkml@mageta.org, alifm@linux.ibm.com, julianr@linux.ibm.com,\n ionut_n2001@yahoo.com, sunlightlinux@gmail.com", "Subject": "[PATCH v13 2/2] PCI: Fix AB-BA deadlock between device_lock and\n pci_rescan_remove_lock in remove_store", "Date": "Tue, 21 Apr 2026 10:34:21 +0300", "Message-ID": "\n <4625becce42253d53a615efccc33c7d91ccf5312.1776756380.git.ionut.nechita@windriver.com>", "X-Mailer": "git-send-email 2.53.0", "In-Reply-To": "<cover.1776756380.git.ionut.nechita@windriver.com>", "References": "<cover.1776756380.git.ionut.nechita@windriver.com>", "Content-Transfer-Encoding": "8bit", "Content-Type": "text/plain", "X-ClientProxiedBy": "VI1PR0202CA0012.eurprd02.prod.outlook.com\n (2603:10a6:803:14::25) To SJ2PR11MB7546.namprd11.prod.outlook.com\n (2603:10b6:a03:4cc::8)", "Precedence": "bulk", "X-Mailing-List": "linux-pci@vger.kernel.org", "List-Id": "<linux-pci.vger.kernel.org>", "List-Subscribe": "<mailto:linux-pci+subscribe@vger.kernel.org>", "List-Unsubscribe": "<mailto:linux-pci+unsubscribe@vger.kernel.org>", "MIME-Version": "1.0", "X-MS-PublicTrafficType": "Email", "X-MS-TrafficTypeDiagnostic": "SJ2PR11MB7546:EE_|SA1PR11MB6782:EE_", "X-MS-Office365-Filtering-Correlation-Id": "b322aa95-719b-4548-91a6-08de9f788163", "X-MS-Exchange-SenderADCheck": "1", "X-MS-Exchange-AntiSpam-Relay": "0", "X-Microsoft-Antispam": "\n\tBCL:0;ARA:13230040|1800799024|10070799003|366016|376014|7416014|52116014|22082099003|18002099003|56012099003;", "X-Microsoft-Antispam-Message-Info": "\n\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", "X-Forefront-Antispam-Report": "\n\tCIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SJ2PR11MB7546.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(10070799003)(366016)(376014)(7416014)(52116014)(22082099003)(18002099003)(56012099003);DIR:OUT;SFP:1101;", "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "2", "X-MS-Exchange-AntiSpam-MessageData-0": "\n qIsFhG+03X+RkczgDjwIpjmpZcmuMYgdaARTLFZi7FKjAwde6w2Bs18TqNrjctfJbWw2f7/D+t5vw5pbCo0p1YfIOqKEhU/uBQr8/ozkz53ltYYJbgNTGUts7Vq5VY54ay30+pC2X3s1In0rlVWNyi7udoqXps1M5vOAgunUf3beaguQ2s/sadGqRuQgS0Vg5pvjHCNvAskGM2yJEzlbclI1ndbqVY814o62ZDgCiGqFZh4I7jZJZntlWzaat9wVajWkKhlYbhU1EYdg+RjVk7IQccveIPythMlK0lI16AIWasfZQjwqdiTcqb7Sjh94Q+yM1/DR6GTp+htPRtAypOAX2FSV0c7iR4NMlWFicsIwThPnfnWNupcl+hmwVz/V+nqlSYpbCy3GyMZTqeNbjDRNWLlbiS2lvpbRmoSYcmwZo+jAsIuKlm1zhprL22qsaRaZLRiTlsPamSHcgNCxEu/g0Q7gqdH7aMSqgCytP2WWNHPsb6sOKAn0t3UeMikNO/9ksiy5cC2esVLwBzsSjX+Cfh5gT5t150qeIuDJIoInmYVj0BdJQyfvv+551alKiDRxmbnntbfZMU8EE4AaGKIVJs0AbT7WFGH+Ywv96K8CuE/4UBWc+gKwx7djAMojFW3pufwh8KHmQsm30Cxu07tgHFh4m6F/tebdsGt96KRiGtDYV/3qssGQPd7gB6m+f8zXZX2FyKco6Ss+S4kaq4wYm78Rfxr+mPIrIYMkdksNB5Z3X3tDGiUQX+3wAMHX84zx7JNb76Gmx63vFZ4mPCb4t7dNO7voCQuIks26yfB8PVm0MgEiUw8vMhTCLl+3P6ywMBIhlHCizYeBQpJAbXI7obXQ1Nd7ohg1q7rLQB8dQ8cHVK3j5MY4QFqUQHBj5c8lz51vUvv/lilAeQOlRfNlZB83Dsk5luxNLPsQpcEUa+CSJWyuvoNuJbK9Wiv2uo1sNC4arbVbIB2hMG7F1pvFsF2fWOMf0Fv5saYrY4My/7w9Ij6IiF2iZ97Wxz5igjddReY4MyZUTJk/EJjVbLaGCcxxH8XNuA+/xCDezTBBjqPR9eThyj1MoOxDg3GTxsmk+XXtWrRTpk72rGeJ1eYkOD14S54zChGRCmT6aXE7whKPxxojU0ErgYGgE/scDI0fZ8zm5OHUfpUYpaZmMyND59hJwnITxA5AwiNvpIIPU7y8IZyrDtXU0G8PXe6RBknQF2dmaQwwemPSsziVjx+k4T0d++f1Ynb8Rh0+ZKKhhx6KiGikKy7ESnnwhZ+o6FgDPa0jMRG10tjOrWqIFeKp1Zmnp2dKKxlbm3N+eQ6IirgtzVCM16liO+a+toD34UfoxPW+ChiCS9Ex1qsEPNhdOa7vLQ62Z6xDashOqndS6rKS/8I/cERmABXVV8sbvSHVsV4P1/uxfN6Vy2zhawD2Oqj+dzQeQ6LNMNgxswBeVAXHVIZTMKyVjE3zvwUo/WHlxGGPsh8CXEsJzydEGKa0BVf5V3f6eab4mMObyuDiR8kg15GB3Nj6EeV63Cdi6tfeRgLKOix9hi+6RymgF5bMMCklLNyWmclZUlBAtB+Hq800HMRCxjqNEdiU+vvfj5qmVVM0IOMPbRWJb3fJbHnFIyfsL674CSOsGd6DoNs7AjRGeCD9+92noOTSDdsE25HRrUjkNSjCHasEGNqHHGlqr205LW4s3k9mZrg3N8XQJYR6wUlQ/1/SPK3JjJdjHWx1sDd8/5A/3hR1Re7FsGHdd56EYKaV9VJj0gtEP7G57mU2sU66WmzGXjVRGwIMK/4WjXLR", "X-MS-Exchange-AntiSpam-MessageData-1": "lNLvL5G5sRH75Q9rvT0luTJlPFyjJYplDF0=", "X-Exchange-RoutingPolicyChecked": "\n\tcUgMvsmkn7RwUUZjhdc+BwIi7J2bOdLgy/W9zgYyBDaZlI8MAf5YhAqPhK4/a5ytl8ysiKmbAsQexH9KMFGaL+AFJaT1bTwaxx7sU3g5tvkRtS7DAoODycs54Xe8PTuqAlZ6uQL+7FkCy/qm9Hcysql/G1OY+aGJJKGIx22lLO9jkeH8t5VHeclYxcsfFKBdLpRTzaLL6bnrZ2rN9sYLNDFNHgEtWE3iq83k3Vl/Ys7zJeacchj4i6aLs2on2QF/5oumXqa4yIVvX5fgcxfzMEl+tpaZI/C6m0S9iRhsxGBkGC7mP4Vw5T28vZAuzXnpcwe7Z+81cMe6f10ZTjqH6A==", "X-OriginatorOrg": "windriver.com", "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n b322aa95-719b-4548-91a6-08de9f788163", "X-MS-Exchange-CrossTenant-AuthSource": "SJ2PR11MB7546.namprd11.prod.outlook.com", "X-MS-Exchange-CrossTenant-AuthAs": "Internal", "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "21 Apr 2026 07:35:05.3123\n (UTC)", "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted", "X-MS-Exchange-CrossTenant-Id": "8ddb2873-a1ad-4a18-ae4e-4644631433be", "X-MS-Exchange-CrossTenant-MailboxType": "HOSTED", "X-MS-Exchange-CrossTenant-UserPrincipalName": "\n uD+5SDO3LjsamFw6qTEV1ulOvyB4q2FMrA7HbALqx/GZduqq9+7HQZh5j5naOKGv3wuU8S6MCMNnub+2MfUjXkAa1RGGKDs3yMBRny8RzI4=", "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "SA1PR11MB6782", "X-Proofpoint-Spam-Details-Enc": "AW1haW4tMjYwNDIxMDA3MiBTYWx0ZWRfX2p5mXAUlYOao\n ooRrVfpKuc2zcgJRYqEXKwQF0p5bIMbXJFvlfdwTi+U88LphqAx3s9WqpqZ/U450eK6VcQYJ8Ri\n gvtDATHf9ouuA8piWlMWYsY/rXsWmNOvVXAkJatMb4BFFLQB1Dk5YoxCgrugBmauHT/iW1H1glV\n Ql03hUn+2fOv/ePp4RWwppDGA/tyx2UG4/1awqrMc6BVlC/2SY28/Ia3m40lx8OOUaxhq98ktoL\n kc4Qqc2hmhZfdhW4uKgmZNwQQoYkmNAmvh3LRQ1KeyNy/69O1KwEeSHp0TrB8jgMLlLEXZXGczC\n dkXrew3Zjy4vizarzHWYO/Wln9+0DmPlwiAYRP2nCZW1HvFmuwJZB79Fd0FGHq/oeh71KHPTa5u\n zewOFsN36bTG2tZxlIVrO3GpRbunlPcQ3D6eoGvZCoZmtf05sh7T9nIz2YIUvfGzjLl0uXARjtT\n N8kYC/wOksWlQhOQejQ==", "X-Proofpoint-GUID": "Qq-YpKawnwfepJfF_sJUImX8aEjDOSNQ", "X-Proofpoint-ORIG-GUID": "Qq-YpKawnwfepJfF_sJUImX8aEjDOSNQ", "X-Authority-Analysis": "v=2.4 cv=Bp+tB4X5 c=1 sm=1 tr=0 ts=69e728ab cx=c_pps\n a=kBTuJkHEWKOaoYTOH1TR3A==:117 a=6eWqkTHjU83fiwn7nKZWdM+Sl24=:19\n a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19\n a=xqWC_Br6kY4A:10 a=A5OVakUREuEA:10 a=VkNPw1HP01LnGYTKEx00:22\n a=bi6dqmuHe4P4UrxVR6um:22 a=klDOsUkWDRETUCZYPvoE:22 a=VwQbUJbxAAAA:8\n a=_jlGtV7tAAAA:8 a=p2eoyRXnAAAA:8 a=t7CeM3EgAAAA:8 a=VnNF1IyMAAAA:8\n a=mm2UkWPFonPHBTd3Hn4A:9 a=nlm17XC03S6CtCLSeiRr:22 a=KSHYvF9M28j0gckGFaEs:22\n a=FdTzh2GWekK77mhwV6Dw:22", "X-Proofpoint-Virus-Version": "vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-04-21_01,2026-04-20_02,2025-10-01_01", "X-Proofpoint-Spam-Details": "rule=outbound_notspam policy=outbound score=0\n spamscore=0 clxscore=1015 bulkscore=0 phishscore=0 impostorscore=0\n malwarescore=0 priorityscore=1501 lowpriorityscore=0 adultscore=0\n suspectscore=0 classifier=typeunknown authscore=0 authtc= authcc=\n route=outbound adjust=0 reason=mlx scancount=1 engine=8.22.0-2604070000\n definitions=main-2604210072" }, "content": "From: Ionut Nechita <ionut.nechita@windriver.com>\n\nremove_store() calls pci_stop_and_remove_bus_device_locked() which\ntakes pci_rescan_remove_lock first, then device_lock during driver\nrelease. Meanwhile, unbind_store() takes device_lock first (via\ndevice_driver_detach), and the driver's .remove() callback may call\npci_disable_sriov() -> sriov_del_vfs() -> pci_lock_rescan_remove().\n\nThis creates an AB-BA deadlock:\n\n CPU0 (remove_store) CPU1 (unbind_store)\n -------------------- --------------------\n pci_lock_rescan_remove()\n device_lock()\n driver .remove()\n sriov_del_vfs()\n pci_lock_rescan_remove() <-- WAITS\n pci_stop_bus_device()\n device_release_driver()\n device_lock() <-- WAITS\n\nFix this by first marking the device as dead using kill_device() to\nprevent any new driver from binding, then calling device_release_driver()\nbefore pci_stop_and_remove_bus_device_locked().\n\nMarking the device dead closes the race window between unbinding and\nremoval where a new driver could theoretically bind: once the dead flag\nis set, the device core will refuse any new driver probe.\n\nAfter device_release_driver() returns, the driver is already unbound,\nso the subsequent device_release_driver() call inside\npci_stop_and_remove_bus_device_locked() becomes a no-op.\n\nFixes: a5338e365c45 (\"PCI/IOV: Fix race between SR-IOV enable/disable and hotplug\")\nReported-by: Guenter Roeck <linux@roeck-us.net>\nCloses: https://lore.kernel.org/linux-pci/0ca9e675-478c-411d-be32-e2d81439288f@roeck-us.net/\nReported-by: Benjamin Block <bblock@linux.ibm.com>\nCloses: https://lore.kernel.org/linux-pci/20260317090149.GA3835708@chlorum.ategam.org/\nSuggested-by: Benjamin Block <bblock@linux.ibm.com>\nCc: stable@vger.kernel.org\nReviewed-by: Niklas Schnelle <schnelle@linux.ibm.com>\nReviewed-by: Benjamin Block <bblock@linux.ibm.com>\nTested-by: Benjamin Block <bblock@linux.ibm.com>\nSigned-off-by: Ionut Nechita <ionut.nechita@windriver.com>\n---\n drivers/pci/pci-sysfs.c | 30 +++++++++++++++++++++++++++++-\n 1 file changed, 29 insertions(+), 1 deletion(-)", "diff": "diff --git a/drivers/pci/pci-sysfs.c b/drivers/pci/pci-sysfs.c\nindex d37860841260..1426328e9f05 100644\n--- a/drivers/pci/pci-sysfs.c\n+++ b/drivers/pci/pci-sysfs.c\n@@ -521,8 +521,36 @@ static ssize_t remove_store(struct device *dev, struct device_attribute *attr,\n \tif (kstrtoul(buf, 0, &val) < 0)\n \t\treturn -EINVAL;\n \n-\tif (val && device_remove_file_self(dev, attr))\n+\tif (val && device_remove_file_self(dev, attr)) {\n+\t\t/*\n+\t\t * Mark the device as dead so that no new driver can bind\n+\t\t * between the unbind and the removal below. Once the\n+\t\t * dead flag is set, the device core will refuse any new\n+\t\t * driver probe.\n+\t\t */\n+\t\tdevice_lock(dev);\n+\t\tkill_device(dev);\n+\t\tdevice_unlock(dev);\n+\n+\t\t/*\n+\t\t * Unbind the driver before removing the device to avoid\n+\t\t * an AB-BA deadlock between device_lock and\n+\t\t * pci_rescan_remove_lock. Without this, remove_store\n+\t\t * takes pci_rescan_remove_lock first (via\n+\t\t * pci_stop_and_remove_bus_device_locked) and then\n+\t\t * device_lock during driver release, while a concurrent\n+\t\t * unbind_store (or sriov_numvfs_store) takes device_lock\n+\t\t * first and then pci_rescan_remove_lock (via\n+\t\t * sriov_del_vfs), creating a circular dependency.\n+\t\t *\n+\t\t * By unbinding first, the driver's .remove() callback\n+\t\t * (including any SR-IOV VF cleanup) completes before\n+\t\t * pci_rescan_remove_lock is acquired, ensuring both\n+\t\t * paths take locks in the same order.\n+\t\t */\n+\t\tdevice_release_driver(dev);\n \t\tpci_stop_and_remove_bus_device_locked(to_pci_dev(dev));\n+\t}\n \treturn count;\n }\n static DEVICE_ATTR_IGNORE_LOCKDEP(remove, 0220, NULL,\n", "prefixes": [ "v13", "2/2" ] }