Cover Letter Detail
Show a cover letter.
GET /api/covers/2216261/?format=api
{ "id": 2216261, "url": "http://patchwork.ozlabs.org/api/covers/2216261/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linux-pci/cover/20260326083534.23602-1-ionut.nechita@windriver.com/", "project": { "id": 28, "url": "http://patchwork.ozlabs.org/api/projects/28/?format=api", "name": "Linux PCI development", "link_name": "linux-pci", "list_id": "linux-pci.vger.kernel.org", "list_email": "linux-pci@vger.kernel.org", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20260326083534.23602-1-ionut.nechita@windriver.com>", "list_archive_url": null, "date": "2026-03-26T08:35:32", "name": "[v11,0/2] PCI/IOV: Fix SR-IOV locking races and AB-BA deadlock", "submitter": { "id": 92607, "url": "http://patchwork.ozlabs.org/api/people/92607/?format=api", "name": "Ionut Nechita (Wind River)", "email": "ionut.nechita@windriver.com" }, "mbox": "http://patchwork.ozlabs.org/project/linux-pci/cover/20260326083534.23602-1-ionut.nechita@windriver.com/mbox/", "series": [ { "id": 497550, "url": "http://patchwork.ozlabs.org/api/series/497550/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linux-pci/list/?series=497550", "date": "2026-03-26T08:35:33", "name": "PCI/IOV: Fix SR-IOV locking races and AB-BA deadlock", "version": 11, "mbox": "http://patchwork.ozlabs.org/series/497550/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/covers/2216261/comments/", "headers": { "Return-Path": "\n <linux-pci+bounces-51159-incoming=patchwork.ozlabs.org@vger.kernel.org>", "X-Original-To": [ "incoming@patchwork.ozlabs.org", "linux-pci@vger.kernel.org" ], "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=windriver.com header.i=@windriver.com\n header.a=rsa-sha256 header.s=PPS06212021 header.b=MpCqQKKm;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c15:e001:75::12fc:5321; helo=sin.lore.kernel.org;\n envelope-from=linux-pci+bounces-51159-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)", "smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=windriver.com header.i=@windriver.com\n header.b=\"MpCqQKKm\"", "smtp.subspace.kernel.org;\n arc=fail smtp.client-ip=205.220.178.238", "smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=windriver.com", "smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=windriver.com" ], "Received": [ "from sin.lore.kernel.org (sin.lore.kernel.org\n [IPv6:2600:3c15:e001:75::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fhHHk4msPz1y1x\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 26 Mar 2026 19:38:58 +1100 (AEDT)", "from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sin.lore.kernel.org (Postfix) with ESMTP id 60A67303ECC4\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 26 Mar 2026 08:36:47 +0000 (UTC)", "from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id F3D91341062;\n\tThu, 26 Mar 2026 08:36:39 +0000 (UTC)", "from mx0b-0064b401.pphosted.com (mx0b-0064b401.pphosted.com\n [205.220.178.238])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 733D13B7779;\n\tThu, 26 Mar 2026 08:36:35 +0000 (UTC)", "from pps.filterd (m0250811.ppops.net [127.0.0.1])\n\tby mx0a-0064b401.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id\n 62Q78KW22227557;\n\tThu, 26 Mar 2026 08:35:55 GMT", "from co1pr03cu002.outbound.protection.outlook.com\n (mail-westus2azon11010010.outbound.protection.outlook.com [52.101.46.10])\n\tby mx0a-0064b401.pphosted.com (PPS) with ESMTPS id 4d1gj868js-1\n\t(version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT);\n\tThu, 26 Mar 2026 08:35:54 +0000 (GMT)", "from SJ2PR11MB7546.namprd11.prod.outlook.com (2603:10b6:a03:4cc::8)\n by CH3PR11MB8364.namprd11.prod.outlook.com (2603:10b6:610:174::19) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9745.9; Thu, 26 Mar\n 2026 08:35:52 +0000", "from SJ2PR11MB7546.namprd11.prod.outlook.com\n ([fe80::ca9b:dcf:8881:bced]) by SJ2PR11MB7546.namprd11.prod.outlook.com\n ([fe80::ca9b:dcf:8881:bced%5]) with mapi id 15.20.9769.004; Thu, 26 Mar 2026\n 08:35:51 +0000" ], "ARC-Seal": [ "i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1774514199; cv=fail;\n b=HtxxEJwtrObYqGXW7JQTia1A6gYLkjZ8unmQEYlLw/f4c7+fUqMSS02++Jgcy6HAYuK/WYqnCq3ksy6qWuRTNmG5U+wahiijEOehyCisWREShQ8U6O1AjIDOoaJFS7jV2FH7ca5xEee3tfagSSNlAWxsCTKFIAHoL6UwjK0qULc=", "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=Jg+X8NtpNLJ2YuL9GlpiBUgfX5DXS6OkrcjzTc67IXxolRO9ZJMBazUCjLnAFF2DcSC4RmxVwljTqIG4rTGOLKwFBfP9X5swUmu7a8Yhn1Uv4VK/IKsNhkTEA6+BFI1v4+WmBlzsnmYfvi07QHxAUX2i8cpx2hwSVP3ekpxzQvzqYQ0JN+d+VTMYgvenVSMwG+97G6r1fdyXYOoo3sb7/r5aUn7qEkPHSUFzqhiEFE3q674qrxX3PTpgK1ZX8LR9VKVcGz+ll+ixk6wC/WY7WoFR1Ex1tLDc8kld8+9g3q/kDZMEVSa9duBkAAJ+l1wbUAjpEwm60Ezf36i4IJ8hMg==" ], "ARC-Message-Signature": [ "i=2; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1774514199; c=relaxed/simple;\n\tbh=Fi+eX1MtL88V8Z3JP0wYp70ZH2iLBCftVV3bMvouAZI=;\n\th=From:To:Cc:Subject:Date:Message-ID:Content-Type:MIME-Version;\n b=JDjyD/nOp7YPRn0V51yvKmzMUl/y21HkPhB6HqRFjtM5hcI69jsZN5TP9BKPeix/wTu2SQZ18yi0TM7yjABZ0tO/dpNx4BX62xHqIPIGqGv3qcn6dEMeB/jQk56IgF2SIF6mnEGG1O6n1APzqwxQd7Hvc4aP5MNgA1y5ytkjFW8=", "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=Dnf/TLYWHmDJKp+MZOzQ411AFdnxBxNccl7xm+1Eh1Q=;\n b=ZBNnhDsot9xdmP4Q3tBCr7pwkEjgJTsQRXx6wpRwAI6Ya31RR112cW5LUX/Cyp/xYc9ga8QmVxzUbVw8+u5klHacwqpm8nUW201AhY35f1LUwX1WXlGTzthybO+8Sm8W7Wf6C80ikZol4pFbqp+TQ95YRRKgIl5WrbmOs14YLPOjti03co5RrP/o+pN4IUiVFlegejkuuAp5XFwY2YEQhnY5CIu7DK9AViGqetQwgSnLEkOFn+lxv+f7bnHMniKK04eZ9C2l68gBPjnIC8W41IrTWwvXnxIkTYMcujJa0HVU08thfw4T+EVcMqdIYCVZnHBItRrU1JNGN7fi6V5cyw==" ], "ARC-Authentication-Results": [ "i=2; smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=windriver.com;\n spf=pass smtp.mailfrom=windriver.com;\n dkim=pass (2048-bit key) header.d=windriver.com header.i=@windriver.com\n header.b=MpCqQKKm; arc=fail smtp.client-ip=205.220.178.238", "i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=windriver.com; dmarc=pass action=none\n header.from=windriver.com; dkim=pass header.d=windriver.com; arc=none" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=windriver.com;\n\t h=cc:content-transfer-encoding:content-type:date:from\n\t:message-id:mime-version:subject:to; s=PPS06212021; bh=Dnf/TLYWH\n\tmDJKp+MZOzQ411AFdnxBxNccl7xm+1Eh1Q=; b=MpCqQKKmGcLCB49/F7kxWM+to\n\tMzpqdXa4gLiQsHZagGE2/WTINyVnJr6bv2tsADLzaxxp7miRm/bahnEVjLyYWE0/\n\t6JXAbtBvBmFg73u3QSDtLtqMcIdrhigp3UUyq3+dOqI6UsTuGe1nCJmomPESOHA6\n\tMWn+IdgF9D9SWM7qJU5CwGggEIxaYSKsCLNBrv/V5HJROAy8fFgwlj14QtdQ6IxD\n\t64SLSWrNWOQmJF53jaZibaCYLFPz1StsOcFMeJlqHV6zAy0uSflRRC4DQyzEjiqF\n\toKOOzkjQ51GmTcISaZ5gPFvUFKcoWBalt1eRZAZCUVMfUrsgMa/Azeh4dVEYQ==", "From": "\"Ionut Nechita (Wind River)\" <ionut.nechita@windriver.com>", "To": "linux-pci@vger.kernel.org, bhelgaas@google.com", "Cc": "helgaas@kernel.org, sebott@linux.ibm.com, schnelle@linux.ibm.com,\n bblock@linux.ibm.com, linux@roeck-us.net, lukas@wunner.de,\n stable@vger.kernel.org, linux-kernel@vger.kernel.org,\n intel-xe@lists.freedesktop.org, matthew.brost@intel.com,\n michal.wajdeczko@intel.com, piotr.piorkowski@intel.com,\n dtatulea@nvidia.com, mani@kernel.org, kbusch@kernel.org,\n lkml@mageta.org, alifm@linux.ibm.com, julianr@linux.ibm.com,\n ionut_n2001@yahoo.com, sunlightlinux@gmail.com,\n \"Ionut Nechita (Wind River)\" <ionut.nechita@windriver.com>", "Subject": "[PATCH v11 0/2] PCI/IOV: Fix SR-IOV locking races and AB-BA deadlock", "Date": "Thu, 26 Mar 2026 10:35:32 +0200", "Message-ID": "<20260326083534.23602-1-ionut.nechita@windriver.com>", "X-Mailer": "git-send-email 2.53.0", "Content-Transfer-Encoding": "8bit", "Content-Type": "text/plain", "X-ClientProxiedBy": "BE1P281CA0360.DEUP281.PROD.OUTLOOK.COM\n (2603:10a6:b10:82::24) To SJ2PR11MB7546.namprd11.prod.outlook.com\n (2603:10b6:a03:4cc::8)", "Precedence": "bulk", "X-Mailing-List": "linux-pci@vger.kernel.org", "List-Id": "<linux-pci.vger.kernel.org>", "List-Subscribe": "<mailto:linux-pci+subscribe@vger.kernel.org>", "List-Unsubscribe": "<mailto:linux-pci+unsubscribe@vger.kernel.org>", "MIME-Version": "1.0", "X-MS-PublicTrafficType": "Email", "X-MS-TrafficTypeDiagnostic": "SJ2PR11MB7546:EE_|CH3PR11MB8364:EE_", "X-MS-Office365-Filtering-Correlation-Id": "e7f59919-be30-47b6-5bb1-08de8b12affd", "X-MS-Exchange-SenderADCheck": "1", "X-MS-Exchange-AntiSpam-Relay": "0", "X-Microsoft-Antispam": "\n\tBCL:0;ARA:13230040|1800799024|366016|7416014|376014|10070799003|52116014|18002099003|56012099003;", "X-Microsoft-Antispam-Message-Info": "\n\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", "X-Forefront-Antispam-Report": "\n\tCIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SJ2PR11MB7546.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(7416014)(376014)(10070799003)(52116014)(18002099003)(56012099003);DIR:OUT;SFP:1101;", "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "2", "X-MS-Exchange-AntiSpam-MessageData-0": "\n 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", "X-MS-Exchange-AntiSpam-MessageData-1": "wL+c2uxKrSa8gIGL/YxfyMs7fBhA1B+wSoQ=", "X-Exchange-RoutingPolicyChecked": "\n\tPphQp5pyxxcsXuvzRPx0T8xrRZFCOhXrQw8kv90e/GKhl6UDmiG27Grq6TPydU6D2XO7t9tR43MyhX+uggIpBYEH/0Le6Lo22uopazO8ZIwopdokY70pXtfOoYYEusv9g/MsKBP+j8SgHI+8Horco/CLmvMiEP4A1TJ/beKNtn5JTnuPUXDmxd0UyFf1lnfqatXshFuI2HUXItuiyxDiQBRDVvW6oWLBtnPSjWyNyPp60cAK8b1gQsutI/i+QKfPKq2w229sV7g1K7Sv+gcXY97v52BLzWnABM57FTwdDlN/Da96wTW/D/Y8C80RluHLpXzJsDUCWGliyCD/AOYYfA==", "X-OriginatorOrg": "windriver.com", "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n e7f59919-be30-47b6-5bb1-08de8b12affd", "X-MS-Exchange-CrossTenant-AuthSource": "SJ2PR11MB7546.namprd11.prod.outlook.com", "X-MS-Exchange-CrossTenant-AuthAs": "Internal", "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "26 Mar 2026 08:35:51.6173\n (UTC)", "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted", "X-MS-Exchange-CrossTenant-Id": "8ddb2873-a1ad-4a18-ae4e-4644631433be", "X-MS-Exchange-CrossTenant-MailboxType": "HOSTED", "X-MS-Exchange-CrossTenant-UserPrincipalName": "\n dBUD98UnoIkFA1ZwbmGxGWaDRc1I7AG6BLJh8W2VbNleUQoEQ8eMoHf7enYbdTNECKm2p5gPEucouaIM93dSkJzmcV6Vn+O6cWAcXiW663c=", "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "CH3PR11MB8364", "X-Proofpoint-ORIG-GUID": "nXNUIq25lVruRPJll1-Yx0OTs6_fQN_n", "X-Proofpoint-Spam-Details-Enc": "AW1haW4tMjYwMzI2MDA2MSBTYWx0ZWRfXwhGF/+gY4B3P\n IsANd2EloWozoWko3wH/Rdt+QOGwZP70d/zb0J8V1fLuOIPBA5Hndg8xsIJQVTU1/51a6SjzavE\n VV9LNaBVK0xrmbpG1G3xbIO8tIdDKqDSczvC0NDtwRiwxWKjU+3UzDQwXVVZsxofcbcO4v6vYf1\n pvyxvbqBPxza/dWNc4QBBftif4n+i2Q/PI6x3Vxt1KUtC0om9/hEvd0y3m5xCqDPGl0i3s14ess\n 5Kxqiic0RG3uPvu9GrR7gax7uIhseYd1ipqyjbZUAdeLvUEZkHRaH1eWE5CdkpCyjH1PEbvY3zF\n v1mE6HSOsx0GVGsKSPA6hTvy3tDe8g7Hx+UAkXl0ls3q2ZajGCU6Ozi8qXduoB/2IN9Kq028vyE\n DTLBf5G+gigaIzbcnQOal5jcqiINCvbhOVUBvyU4Dm2f5q/YHrEz36m2dIq/Ka1kXy9ujiyHlnD\n YDBxSQL248gF2bR96VA==", "X-Authority-Analysis": "v=2.4 cv=LtqfC3dc c=1 sm=1 tr=0 ts=69c4efeb cx=c_pps\n a=Szpykk5hBk3mC7HHiWFpbQ==:117 a=6eWqkTHjU83fiwn7nKZWdM+Sl24=:19\n a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19\n a=xqWC_Br6kY4A:10 a=Yq5XynenixoA:10 a=VkNPw1HP01LnGYTKEx00:22\n a=bi6dqmuHe4P4UrxVR6um:22 a=klDOsUkWDRETUCZYPvoE:22 a=VwQbUJbxAAAA:8\n a=VnNF1IyMAAAA:8 a=t7CeM3EgAAAA:8 a=0kW7uK-nrfiYIzTTHL0A:9\n a=FdTzh2GWekK77mhwV6Dw:22", "X-Proofpoint-GUID": "nXNUIq25lVruRPJll1-Yx0OTs6_fQN_n", "X-Proofpoint-Virus-Version": "vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-03-26_02,2026-03-24_01,2025-10-01_01", "X-Proofpoint-Spam-Details": "rule=outbound_notspam policy=outbound score=0\n phishscore=0 bulkscore=0 suspectscore=0 malwarescore=0 lowpriorityscore=0\n adultscore=0 clxscore=1015 impostorscore=0 spamscore=0 priorityscore=1501\n classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0\n reason=mlx scancount=1 engine=8.22.0-2603050001 definitions=main-2603260061" }, "content": "Hi Bjorn,\n\nThis is v11 of the fix for the SR-IOV race between driver .remove()\nand concurrent hotplug events.\n\nChanges since v10 (Mar 18):\n - Patch 2/2: added kill_device() before device_release_driver() to\n prevent a new driver from binding between unbind and removal,\n closing the TOCTOU race window identified by Benjamin Block\n - Patch 1/2 unchanged from v10\n\nChanges since v9 (Mar 10):\n - NEW patch 2/2: fix AB-BA deadlock in remove_store() by calling\n device_release_driver() before pci_stop_and_remove_bus_device_locked(),\n as suggested by Benjamin Block (addresses Guenter Roeck's report)\n - Patch 1/2 unchanged from v9\n\nChanges since v8 (Mar 9):\n - Added Reviewed-by from Niklas Schnelle (IBM) and Tested-by (s390)\n - Added Fixes tags for the three related commits\n - Removed rescan/remove locking from sriov_numvfs_store() since\n locking is now handled in sriov_add_vfs() and sriov_del_vfs()\n - Rebased on linux-next (20260309)\n\nThe AB-BA deadlock:\n\n CPU0 (remove_store) CPU1 (unbind_store)\n -------------------- --------------------\n pci_lock_rescan_remove()\n device_lock()\n driver .remove()\n sriov_del_vfs()\n pci_lock_rescan_remove() <-- WAITS\n pci_stop_bus_device()\n device_release_driver()\n device_lock() <-- WAITS\n\nPatch 2/2 fixes this by:\n 1. Marking the device as dead via kill_device() so no new driver\n can bind (prevents TOCTOU race between unbind and removal)\n 2. Calling device_release_driver() before\n pci_stop_and_remove_bus_device_locked(), so both paths take\n locks in the same order: device_lock first, then\n pci_rescan_remove_lock\n\nNote: the concurrent unbind_store + hotplug-event case (where the\nhotplug handler takes pci_rescan_remove_lock before device_lock)\nremains a known limitation. This is a pre-existing issue that\nBenjamin Block is addressing separately in:\n https://lore.kernel.org/linux-pci/354b9e4a54ced67f3c89df198041df19434fe4c8.1773235561.git.bblock@linux.ibm.com/\n\nThis race has been independently observed by multiple organizations:\n - IBM (s390 platform-generated hot-unplug events racing with\n sriov_del_vfs during PF driver unload)\n - NVIDIA (tested by Dragos Tatulea in earlier versions)\n - Intel (xe driver hitting lockdep warnings and deadlocks when\n calling pci_disable_sriov from .remove)\n - Wind River (original reporter and patch author)\n\nTest environment:\n - Tested on s390 by Benjamin Block and Niklas Schnelle (IBM)\n - Tested on x86_64 with Intel and NVIDIA SR-IOV devices (earlier\n versions)\n\nBased on linux-next (next-20260325).\n\nLink: https://lore.kernel.org/linux-pci/20260214193235.262219-3-ionut.nechita@windriver.com/ [v1]\nLink: https://lore.kernel.org/linux-pci/20260219212648.82606-1-ionut.nechita@windriver.com/ [v2]\nLink: https://lore.kernel.org/lkml/20260225202434.18737-1-ionut.nechita@windriver.com/ [v3]\nLink: https://lore.kernel.org/linux-pci/20260228120138.51197-2-ionut.nechita@windriver.com/ [v4]\nLink: https://lore.kernel.org/linux-pci/20260303080903.28693-1-ionut.nechita@windriver.com/ [v5]\nLink: https://lore.kernel.org/linux-pci/20260306082108.17322-1-ionut.nechita@windriver.com/ [v6]\nLink: https://lore.kernel.org/linux-pci/20260308135352.80346-1-ionut.nechita@windriver.com/ [v7]\nLink: https://lore.kernel.org/linux-pci/20260309194920.16459-1-ionut.nechita@windriver.com/ [v8]\nLink: https://lore.kernel.org/linux-pci/20260310074303.17480-1-ionut.nechita@windriver.com/ [v9]\nLink: https://lore.kernel.org/linux-pci/20260318210316.61975-1-ionut.nechita@windriver.com/ [v10]\n\nIonut Nechita (Wind River) (2):\n PCI/IOV: Make pci_lock_rescan_remove() reentrant and protect\n sriov_add_vfs/sriov_del_vfs\n PCI: Fix AB-BA deadlock between device_lock and pci_rescan_remove_lock\n in remove_store\n\n drivers/pci/iov.c | 9 +++++----\n drivers/pci/pci-sysfs.c | 30 +++++++++++++++++++++++++++++-\n drivers/pci/probe.c | 11 +++++++++--\n 3 files changed, 43 insertions(+), 7 deletions(-)\n\n--\n2.53.0" }