Show a cover letter.

GET /api/covers/2216261/?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2216261,
    "url": "http://patchwork.ozlabs.org/api/covers/2216261/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/linux-pci/cover/20260326083534.23602-1-ionut.nechita@windriver.com/",
    "project": {
        "id": 28,
        "url": "http://patchwork.ozlabs.org/api/projects/28/?format=api",
        "name": "Linux PCI development",
        "link_name": "linux-pci",
        "list_id": "linux-pci.vger.kernel.org",
        "list_email": "linux-pci@vger.kernel.org",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260326083534.23602-1-ionut.nechita@windriver.com>",
    "list_archive_url": null,
    "date": "2026-03-26T08:35:32",
    "name": "[v11,0/2] PCI/IOV: Fix SR-IOV locking races and AB-BA deadlock",
    "submitter": {
        "id": 92607,
        "url": "http://patchwork.ozlabs.org/api/people/92607/?format=api",
        "name": "Ionut Nechita (Wind River)",
        "email": "ionut.nechita@windriver.com"
    },
    "mbox": "http://patchwork.ozlabs.org/project/linux-pci/cover/20260326083534.23602-1-ionut.nechita@windriver.com/mbox/",
    "series": [
        {
            "id": 497550,
            "url": "http://patchwork.ozlabs.org/api/series/497550/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/linux-pci/list/?series=497550",
            "date": "2026-03-26T08:35:33",
            "name": "PCI/IOV: Fix SR-IOV locking races and AB-BA deadlock",
            "version": 11,
            "mbox": "http://patchwork.ozlabs.org/series/497550/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/covers/2216261/comments/",
    "headers": {
        "Return-Path": "\n <linux-pci+bounces-51159-incoming=patchwork.ozlabs.org@vger.kernel.org>",
        "X-Original-To": [
            "incoming@patchwork.ozlabs.org",
            "linux-pci@vger.kernel.org"
        ],
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=windriver.com header.i=@windriver.com\n header.a=rsa-sha256 header.s=PPS06212021 header.b=MpCqQKKm;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c15:e001:75::12fc:5321; helo=sin.lore.kernel.org;\n envelope-from=linux-pci+bounces-51159-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)",
            "smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=windriver.com header.i=@windriver.com\n header.b=\"MpCqQKKm\"",
            "smtp.subspace.kernel.org;\n arc=fail smtp.client-ip=205.220.178.238",
            "smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=windriver.com",
            "smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=windriver.com"
        ],
        "Received": [
            "from sin.lore.kernel.org (sin.lore.kernel.org\n [IPv6:2600:3c15:e001:75::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fhHHk4msPz1y1x\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 26 Mar 2026 19:38:58 +1100 (AEDT)",
            "from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sin.lore.kernel.org (Postfix) with ESMTP id 60A67303ECC4\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 26 Mar 2026 08:36:47 +0000 (UTC)",
            "from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id F3D91341062;\n\tThu, 26 Mar 2026 08:36:39 +0000 (UTC)",
            "from mx0b-0064b401.pphosted.com (mx0b-0064b401.pphosted.com\n [205.220.178.238])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 733D13B7779;\n\tThu, 26 Mar 2026 08:36:35 +0000 (UTC)",
            "from pps.filterd (m0250811.ppops.net [127.0.0.1])\n\tby mx0a-0064b401.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id\n 62Q78KW22227557;\n\tThu, 26 Mar 2026 08:35:55 GMT",
            "from co1pr03cu002.outbound.protection.outlook.com\n (mail-westus2azon11010010.outbound.protection.outlook.com [52.101.46.10])\n\tby mx0a-0064b401.pphosted.com (PPS) with ESMTPS id 4d1gj868js-1\n\t(version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT);\n\tThu, 26 Mar 2026 08:35:54 +0000 (GMT)",
            "from SJ2PR11MB7546.namprd11.prod.outlook.com (2603:10b6:a03:4cc::8)\n by CH3PR11MB8364.namprd11.prod.outlook.com (2603:10b6:610:174::19) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9745.9; Thu, 26 Mar\n 2026 08:35:52 +0000",
            "from SJ2PR11MB7546.namprd11.prod.outlook.com\n ([fe80::ca9b:dcf:8881:bced]) by SJ2PR11MB7546.namprd11.prod.outlook.com\n ([fe80::ca9b:dcf:8881:bced%5]) with mapi id 15.20.9769.004; Thu, 26 Mar 2026\n 08:35:51 +0000"
        ],
        "ARC-Seal": [
            "i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1774514199; cv=fail;\n b=HtxxEJwtrObYqGXW7JQTia1A6gYLkjZ8unmQEYlLw/f4c7+fUqMSS02++Jgcy6HAYuK/WYqnCq3ksy6qWuRTNmG5U+wahiijEOehyCisWREShQ8U6O1AjIDOoaJFS7jV2FH7ca5xEee3tfagSSNlAWxsCTKFIAHoL6UwjK0qULc=",
            "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=Jg+X8NtpNLJ2YuL9GlpiBUgfX5DXS6OkrcjzTc67IXxolRO9ZJMBazUCjLnAFF2DcSC4RmxVwljTqIG4rTGOLKwFBfP9X5swUmu7a8Yhn1Uv4VK/IKsNhkTEA6+BFI1v4+WmBlzsnmYfvi07QHxAUX2i8cpx2hwSVP3ekpxzQvzqYQ0JN+d+VTMYgvenVSMwG+97G6r1fdyXYOoo3sb7/r5aUn7qEkPHSUFzqhiEFE3q674qrxX3PTpgK1ZX8LR9VKVcGz+ll+ixk6wC/WY7WoFR1Ex1tLDc8kld8+9g3q/kDZMEVSa9duBkAAJ+l1wbUAjpEwm60Ezf36i4IJ8hMg=="
        ],
        "ARC-Message-Signature": [
            "i=2; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1774514199; c=relaxed/simple;\n\tbh=Fi+eX1MtL88V8Z3JP0wYp70ZH2iLBCftVV3bMvouAZI=;\n\th=From:To:Cc:Subject:Date:Message-ID:Content-Type:MIME-Version;\n b=JDjyD/nOp7YPRn0V51yvKmzMUl/y21HkPhB6HqRFjtM5hcI69jsZN5TP9BKPeix/wTu2SQZ18yi0TM7yjABZ0tO/dpNx4BX62xHqIPIGqGv3qcn6dEMeB/jQk56IgF2SIF6mnEGG1O6n1APzqwxQd7Hvc4aP5MNgA1y5ytkjFW8=",
            "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=Dnf/TLYWHmDJKp+MZOzQ411AFdnxBxNccl7xm+1Eh1Q=;\n b=ZBNnhDsot9xdmP4Q3tBCr7pwkEjgJTsQRXx6wpRwAI6Ya31RR112cW5LUX/Cyp/xYc9ga8QmVxzUbVw8+u5klHacwqpm8nUW201AhY35f1LUwX1WXlGTzthybO+8Sm8W7Wf6C80ikZol4pFbqp+TQ95YRRKgIl5WrbmOs14YLPOjti03co5RrP/o+pN4IUiVFlegejkuuAp5XFwY2YEQhnY5CIu7DK9AViGqetQwgSnLEkOFn+lxv+f7bnHMniKK04eZ9C2l68gBPjnIC8W41IrTWwvXnxIkTYMcujJa0HVU08thfw4T+EVcMqdIYCVZnHBItRrU1JNGN7fi6V5cyw=="
        ],
        "ARC-Authentication-Results": [
            "i=2; smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=windriver.com;\n spf=pass smtp.mailfrom=windriver.com;\n dkim=pass (2048-bit key) header.d=windriver.com header.i=@windriver.com\n header.b=MpCqQKKm; arc=fail smtp.client-ip=205.220.178.238",
            "i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=windriver.com; dmarc=pass action=none\n header.from=windriver.com; dkim=pass header.d=windriver.com; arc=none"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=windriver.com;\n\t h=cc:content-transfer-encoding:content-type:date:from\n\t:message-id:mime-version:subject:to; s=PPS06212021; bh=Dnf/TLYWH\n\tmDJKp+MZOzQ411AFdnxBxNccl7xm+1Eh1Q=; b=MpCqQKKmGcLCB49/F7kxWM+to\n\tMzpqdXa4gLiQsHZagGE2/WTINyVnJr6bv2tsADLzaxxp7miRm/bahnEVjLyYWE0/\n\t6JXAbtBvBmFg73u3QSDtLtqMcIdrhigp3UUyq3+dOqI6UsTuGe1nCJmomPESOHA6\n\tMWn+IdgF9D9SWM7qJU5CwGggEIxaYSKsCLNBrv/V5HJROAy8fFgwlj14QtdQ6IxD\n\t64SLSWrNWOQmJF53jaZibaCYLFPz1StsOcFMeJlqHV6zAy0uSflRRC4DQyzEjiqF\n\toKOOzkjQ51GmTcISaZ5gPFvUFKcoWBalt1eRZAZCUVMfUrsgMa/Azeh4dVEYQ==",
        "From": "\"Ionut Nechita (Wind River)\" <ionut.nechita@windriver.com>",
        "To": "linux-pci@vger.kernel.org, bhelgaas@google.com",
        "Cc": "helgaas@kernel.org, sebott@linux.ibm.com, schnelle@linux.ibm.com,\n        bblock@linux.ibm.com, linux@roeck-us.net, lukas@wunner.de,\n        stable@vger.kernel.org, linux-kernel@vger.kernel.org,\n        intel-xe@lists.freedesktop.org, matthew.brost@intel.com,\n        michal.wajdeczko@intel.com, piotr.piorkowski@intel.com,\n        dtatulea@nvidia.com, mani@kernel.org, kbusch@kernel.org,\n        lkml@mageta.org, alifm@linux.ibm.com, julianr@linux.ibm.com,\n        ionut_n2001@yahoo.com, sunlightlinux@gmail.com,\n        \"Ionut Nechita (Wind River)\" <ionut.nechita@windriver.com>",
        "Subject": "[PATCH v11 0/2] PCI/IOV: Fix SR-IOV locking races and AB-BA deadlock",
        "Date": "Thu, 26 Mar 2026 10:35:32 +0200",
        "Message-ID": "<20260326083534.23602-1-ionut.nechita@windriver.com>",
        "X-Mailer": "git-send-email 2.53.0",
        "Content-Transfer-Encoding": "8bit",
        "Content-Type": "text/plain",
        "X-ClientProxiedBy": "BE1P281CA0360.DEUP281.PROD.OUTLOOK.COM\n (2603:10a6:b10:82::24) To SJ2PR11MB7546.namprd11.prod.outlook.com\n (2603:10b6:a03:4cc::8)",
        "Precedence": "bulk",
        "X-Mailing-List": "linux-pci@vger.kernel.org",
        "List-Id": "<linux-pci.vger.kernel.org>",
        "List-Subscribe": "<mailto:linux-pci+subscribe@vger.kernel.org>",
        "List-Unsubscribe": "<mailto:linux-pci+unsubscribe@vger.kernel.org>",
        "MIME-Version": "1.0",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-TrafficTypeDiagnostic": "SJ2PR11MB7546:EE_|CH3PR11MB8364:EE_",
        "X-MS-Office365-Filtering-Correlation-Id": "e7f59919-be30-47b6-5bb1-08de8b12affd",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "\n\tBCL:0;ARA:13230040|1800799024|366016|7416014|376014|10070799003|52116014|18002099003|56012099003;",
        "X-Microsoft-Antispam-Message-Info": "\n\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",
        "X-Forefront-Antispam-Report": "\n\tCIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SJ2PR11MB7546.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(7416014)(376014)(10070799003)(52116014)(18002099003)(56012099003);DIR:OUT;SFP:1101;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "2",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n 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",
        "X-MS-Exchange-AntiSpam-MessageData-1": "wL+c2uxKrSa8gIGL/YxfyMs7fBhA1B+wSoQ=",
        "X-Exchange-RoutingPolicyChecked": "\n\tPphQp5pyxxcsXuvzRPx0T8xrRZFCOhXrQw8kv90e/GKhl6UDmiG27Grq6TPydU6D2XO7t9tR43MyhX+uggIpBYEH/0Le6Lo22uopazO8ZIwopdokY70pXtfOoYYEusv9g/MsKBP+j8SgHI+8Horco/CLmvMiEP4A1TJ/beKNtn5JTnuPUXDmxd0UyFf1lnfqatXshFuI2HUXItuiyxDiQBRDVvW6oWLBtnPSjWyNyPp60cAK8b1gQsutI/i+QKfPKq2w229sV7g1K7Sv+gcXY97v52BLzWnABM57FTwdDlN/Da96wTW/D/Y8C80RluHLpXzJsDUCWGliyCD/AOYYfA==",
        "X-OriginatorOrg": "windriver.com",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n e7f59919-be30-47b6-5bb1-08de8b12affd",
        "X-MS-Exchange-CrossTenant-AuthSource": "SJ2PR11MB7546.namprd11.prod.outlook.com",
        "X-MS-Exchange-CrossTenant-AuthAs": "Internal",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "26 Mar 2026 08:35:51.6173\n (UTC)",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted",
        "X-MS-Exchange-CrossTenant-Id": "8ddb2873-a1ad-4a18-ae4e-4644631433be",
        "X-MS-Exchange-CrossTenant-MailboxType": "HOSTED",
        "X-MS-Exchange-CrossTenant-UserPrincipalName": "\n dBUD98UnoIkFA1ZwbmGxGWaDRc1I7AG6BLJh8W2VbNleUQoEQ8eMoHf7enYbdTNECKm2p5gPEucouaIM93dSkJzmcV6Vn+O6cWAcXiW663c=",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "CH3PR11MB8364",
        "X-Proofpoint-ORIG-GUID": "nXNUIq25lVruRPJll1-Yx0OTs6_fQN_n",
        "X-Proofpoint-Spam-Details-Enc": "AW1haW4tMjYwMzI2MDA2MSBTYWx0ZWRfXwhGF/+gY4B3P\n IsANd2EloWozoWko3wH/Rdt+QOGwZP70d/zb0J8V1fLuOIPBA5Hndg8xsIJQVTU1/51a6SjzavE\n VV9LNaBVK0xrmbpG1G3xbIO8tIdDKqDSczvC0NDtwRiwxWKjU+3UzDQwXVVZsxofcbcO4v6vYf1\n pvyxvbqBPxza/dWNc4QBBftif4n+i2Q/PI6x3Vxt1KUtC0om9/hEvd0y3m5xCqDPGl0i3s14ess\n 5Kxqiic0RG3uPvu9GrR7gax7uIhseYd1ipqyjbZUAdeLvUEZkHRaH1eWE5CdkpCyjH1PEbvY3zF\n v1mE6HSOsx0GVGsKSPA6hTvy3tDe8g7Hx+UAkXl0ls3q2ZajGCU6Ozi8qXduoB/2IN9Kq028vyE\n DTLBf5G+gigaIzbcnQOal5jcqiINCvbhOVUBvyU4Dm2f5q/YHrEz36m2dIq/Ka1kXy9ujiyHlnD\n YDBxSQL248gF2bR96VA==",
        "X-Authority-Analysis": "v=2.4 cv=LtqfC3dc c=1 sm=1 tr=0 ts=69c4efeb cx=c_pps\n a=Szpykk5hBk3mC7HHiWFpbQ==:117 a=6eWqkTHjU83fiwn7nKZWdM+Sl24=:19\n a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19\n a=xqWC_Br6kY4A:10 a=Yq5XynenixoA:10 a=VkNPw1HP01LnGYTKEx00:22\n a=bi6dqmuHe4P4UrxVR6um:22 a=klDOsUkWDRETUCZYPvoE:22 a=VwQbUJbxAAAA:8\n a=VnNF1IyMAAAA:8 a=t7CeM3EgAAAA:8 a=0kW7uK-nrfiYIzTTHL0A:9\n a=FdTzh2GWekK77mhwV6Dw:22",
        "X-Proofpoint-GUID": "nXNUIq25lVruRPJll1-Yx0OTs6_fQN_n",
        "X-Proofpoint-Virus-Version": "vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-03-26_02,2026-03-24_01,2025-10-01_01",
        "X-Proofpoint-Spam-Details": "rule=outbound_notspam policy=outbound score=0\n phishscore=0 bulkscore=0 suspectscore=0 malwarescore=0 lowpriorityscore=0\n adultscore=0 clxscore=1015 impostorscore=0 spamscore=0 priorityscore=1501\n classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0\n reason=mlx scancount=1 engine=8.22.0-2603050001 definitions=main-2603260061"
    },
    "content": "Hi Bjorn,\n\nThis is v11 of the fix for the SR-IOV race between driver .remove()\nand concurrent hotplug events.\n\nChanges since v10 (Mar 18):\n  - Patch 2/2: added kill_device() before device_release_driver() to\n    prevent a new driver from binding between unbind and removal,\n    closing the TOCTOU race window identified by Benjamin Block\n  - Patch 1/2 unchanged from v10\n\nChanges since v9 (Mar 10):\n  - NEW patch 2/2: fix AB-BA deadlock in remove_store() by calling\n    device_release_driver() before pci_stop_and_remove_bus_device_locked(),\n    as suggested by Benjamin Block (addresses Guenter Roeck's report)\n  - Patch 1/2 unchanged from v9\n\nChanges since v8 (Mar 9):\n  - Added Reviewed-by from Niklas Schnelle (IBM) and Tested-by (s390)\n  - Added Fixes tags for the three related commits\n  - Removed rescan/remove locking from sriov_numvfs_store() since\n    locking is now handled in sriov_add_vfs() and sriov_del_vfs()\n  - Rebased on linux-next (20260309)\n\nThe AB-BA deadlock:\n\n  CPU0 (remove_store)               CPU1 (unbind_store)\n  --------------------              --------------------\n  pci_lock_rescan_remove()\n                                    device_lock()\n                                    driver .remove()\n                                      sriov_del_vfs()\n                                        pci_lock_rescan_remove()  <-- WAITS\n  pci_stop_bus_device()\n    device_release_driver()\n      device_lock()                                               <-- WAITS\n\nPatch 2/2 fixes this by:\n  1. Marking the device as dead via kill_device() so no new driver\n     can bind (prevents TOCTOU race between unbind and removal)\n  2. Calling device_release_driver() before\n     pci_stop_and_remove_bus_device_locked(), so both paths take\n     locks in the same order: device_lock first, then\n     pci_rescan_remove_lock\n\nNote: the concurrent unbind_store + hotplug-event case (where the\nhotplug handler takes pci_rescan_remove_lock before device_lock)\nremains a known limitation.  This is a pre-existing issue that\nBenjamin Block is addressing separately in:\n  https://lore.kernel.org/linux-pci/354b9e4a54ced67f3c89df198041df19434fe4c8.1773235561.git.bblock@linux.ibm.com/\n\nThis race has been independently observed by multiple organizations:\n  - IBM (s390 platform-generated hot-unplug events racing with\n    sriov_del_vfs during PF driver unload)\n  - NVIDIA (tested by Dragos Tatulea in earlier versions)\n  - Intel (xe driver hitting lockdep warnings and deadlocks when\n    calling pci_disable_sriov from .remove)\n  - Wind River (original reporter and patch author)\n\nTest environment:\n  - Tested on s390 by Benjamin Block and Niklas Schnelle (IBM)\n  - Tested on x86_64 with Intel and NVIDIA SR-IOV devices (earlier\n    versions)\n\nBased on linux-next (next-20260325).\n\nLink: https://lore.kernel.org/linux-pci/20260214193235.262219-3-ionut.nechita@windriver.com/ [v1]\nLink: https://lore.kernel.org/linux-pci/20260219212648.82606-1-ionut.nechita@windriver.com/ [v2]\nLink: https://lore.kernel.org/lkml/20260225202434.18737-1-ionut.nechita@windriver.com/ [v3]\nLink: https://lore.kernel.org/linux-pci/20260228120138.51197-2-ionut.nechita@windriver.com/ [v4]\nLink: https://lore.kernel.org/linux-pci/20260303080903.28693-1-ionut.nechita@windriver.com/ [v5]\nLink: https://lore.kernel.org/linux-pci/20260306082108.17322-1-ionut.nechita@windriver.com/ [v6]\nLink: https://lore.kernel.org/linux-pci/20260308135352.80346-1-ionut.nechita@windriver.com/ [v7]\nLink: https://lore.kernel.org/linux-pci/20260309194920.16459-1-ionut.nechita@windriver.com/ [v8]\nLink: https://lore.kernel.org/linux-pci/20260310074303.17480-1-ionut.nechita@windriver.com/ [v9]\nLink: https://lore.kernel.org/linux-pci/20260318210316.61975-1-ionut.nechita@windriver.com/ [v10]\n\nIonut Nechita (Wind River) (2):\n  PCI/IOV: Make pci_lock_rescan_remove() reentrant and protect\n    sriov_add_vfs/sriov_del_vfs\n  PCI: Fix AB-BA deadlock between device_lock and pci_rescan_remove_lock\n    in remove_store\n\n drivers/pci/iov.c       |  9 +++++----\n drivers/pci/pci-sysfs.c | 30 +++++++++++++++++++++++++++++-\n drivers/pci/probe.c     | 11 +++++++++--\n 3 files changed, 43 insertions(+), 7 deletions(-)\n\n--\n2.53.0"
}