Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/2194499/?format=api
{ "id": 2194499, "url": "http://patchwork.ozlabs.org/api/patches/2194499/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linux-pci/patch/20260209075706.16367-2-ionut.nechita@windriver.com/", "project": { "id": 28, "url": "http://patchwork.ozlabs.org/api/projects/28/?format=api", "name": "Linux PCI development", "link_name": "linux-pci", "list_id": "linux-pci.vger.kernel.org", "list_email": "linux-pci@vger.kernel.org", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20260209075706.16367-2-ionut.nechita@windriver.com>", "list_archive_url": null, "date": "2026-02-09T07:57:07", "name": "PCI/IOV: Fix recursive locking deadlock on pci_rescan_remove_lock", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "6b3b04dc7c1f0c74313f1e964e5d2289c1520fd4", "submitter": { "id": 92607, "url": "http://patchwork.ozlabs.org/api/people/92607/?format=api", "name": "Ionut Nechita (Wind River)", "email": "ionut.nechita@windriver.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/linux-pci/patch/20260209075706.16367-2-ionut.nechita@windriver.com/mbox/", "series": [ { "id": 491472, "url": "http://patchwork.ozlabs.org/api/series/491472/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linux-pci/list/?series=491472", "date": "2026-02-09T07:57:07", "name": "PCI/IOV: Fix recursive locking deadlock on pci_rescan_remove_lock", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/491472/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2194499/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2194499/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "\n <linux-pci+bounces-46984-incoming=patchwork.ozlabs.org@vger.kernel.org>", "X-Original-To": [ "incoming@patchwork.ozlabs.org", "linux-pci@vger.kernel.org" ], "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=windriver.com header.i=@windriver.com\n header.a=rsa-sha256 header.s=PPS06212021 header.b=IpiMa47u;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=172.234.253.10; helo=sea.lore.kernel.org;\n envelope-from=linux-pci+bounces-46984-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)", "smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=windriver.com header.i=@windriver.com\n header.b=\"IpiMa47u\"", "smtp.subspace.kernel.org;\n arc=fail smtp.client-ip=205.220.178.238", "smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=windriver.com", "smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=windriver.com" ], "Received": [ "from sea.lore.kernel.org (sea.lore.kernel.org [172.234.253.10])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4f8cWf15s5z1xtr\n\tfor <incoming@patchwork.ozlabs.org>; Mon, 09 Feb 2026 18:58:22 +1100 (AEDT)", "from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id 5450E3005D2A\n\tfor <incoming@patchwork.ozlabs.org>; Mon, 9 Feb 2026 07:58:20 +0000 (UTC)", "from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 828EC339856;\n\tMon, 9 Feb 2026 07:58:19 +0000 (UTC)", "from mx0b-0064b401.pphosted.com (mx0b-0064b401.pphosted.com\n [205.220.178.238])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id F37A4339843;\n\tMon, 9 Feb 2026 07:58:17 +0000 (UTC)", "from pps.filterd (m0250812.ppops.net [127.0.0.1])\n\tby mx0a-0064b401.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id\n 6197ZmlM1324158;\n\tMon, 9 Feb 2026 07:58:07 GMT", "from bl0pr03cu003.outbound.protection.outlook.com\n (mail-eastusazon11012059.outbound.protection.outlook.com [52.101.53.59])\n\tby mx0a-0064b401.pphosted.com (PPS) with ESMTPS id 4c5vc59jh1-1\n\t(version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT);\n\tMon, 09 Feb 2026 07:58:07 +0000 (GMT)", "from MN2PR11MB3885.namprd11.prod.outlook.com (2603:10b6:208:151::27)\n by MW4PR11MB7125.namprd11.prod.outlook.com (2603:10b6:303:219::12) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9587.18; Mon, 9 Feb\n 2026 07:58:05 +0000", "from MN2PR11MB3885.namprd11.prod.outlook.com\n ([fe80::a8bb:9703:986e:845]) by MN2PR11MB3885.namprd11.prod.outlook.com\n ([fe80::a8bb:9703:986e:845%4]) with mapi id 15.20.9587.016; Mon, 9 Feb 2026\n 07:58:05 +0000" ], "ARC-Seal": [ "i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1770623899; cv=fail;\n b=MJ5IC6TrTGbK6UK3hTr6qTGY48FfREsr8VYkA8NLj9jqalsV20kY9I0qWFmzUFjNkwGkx4vnnd10nbFYZ3GYZhOS1LglGLsPmhMyppYeC5OxHcPV8piKSaZd+fMEzZ5YGO3ET/jl/gfTkXl5I0llydnoGyJHx3nHRZ6gLHMK+bI=", "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=RtXYrF90HDFqxphOw0zPS1ZDOHMmqQJjYo/ZzicQHDmj0qAUaoTfOqosCrefEflxKCZHvKYnMYBOyMSUv3Imue6TBtyJVfmQlMYIsixmaKPj3vSsphvytNgl0ocHe+4nSyYTJjkfYJNcAOLA6LHQBbFbNgM6dwFoH5jZN6xkjtFE2EFKlDUmgDe5vt3RcEap/hHDsagdbWIxvphoz5rKYIJ2zyGHxQqzqRwHjEo0Yv19OPhHNA0GZIM9TGRdnlUIeNymMeAziYbgG4TrC2BrKOlkQmgz5IvcS+/x6guClmIWe0O0wz3cNreYFxynZHDmJmQ1vyIYgRGgRFFhzZcuDg==" ], "ARC-Message-Signature": [ "i=2; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1770623899; c=relaxed/simple;\n\tbh=DTa3SDtmhtZQy/MIrd0GJVJXCcx5e2F0ly0LrrsUHwA=;\n\th=From:To:Cc:Subject:Date:Message-ID:Content-Type:MIME-Version;\n b=gYPgUSDjjPJxY3AerhNQogeTnuvY0786Pdi0o6txqgegb4EDcJvd5K/zNovF5Rb1/eayGmTWtnA/T0uA06I7f0FPY4lFNbrhsC/irfKZg04uG8k/CkhTGLSUctos+jCWTNp34AkQiix+LCRCl5fwlWMy0l1splL6hCS8sDpHQ7A=", "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=AX7Hp4VBm94ylDSe5j22hwmdsT8pzzm4W7CSsy9VyPM=;\n b=D5fUiteYGI6Fy/2VutgXKetoWWjFEzSqcm1EqJ6cpfpUj9lBr7VL1DidueDTrjeWm1+HDBqbBj3Sja7oPL6tWNnqi7eNNaVUPf8OJzN+o5sh6zALdsUNzO5mB3qS5TfPNvkgA35iyuUM5OpX1ZOkrqj85OzFRrgAcoB1ZtdzAFdRTpdKCtSN1yOCbCgqdfw7ZaMlIu7IYt9s/OdgzcfR66q6/XPvomCp+ku/wZG3Qnu+fsY/20YtelP4jXn2HdcLS5SB/PabyBClNBrelc40b169GgJqO3wIPOdljkbKaNqN1vTS19zgn0ylISVouEQerDNbG34eOq5An6fNRoy8GA==" ], "ARC-Authentication-Results": [ "i=2; smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=windriver.com;\n spf=pass smtp.mailfrom=windriver.com;\n dkim=pass (2048-bit key) header.d=windriver.com header.i=@windriver.com\n header.b=IpiMa47u; arc=fail smtp.client-ip=205.220.178.238", "i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=windriver.com; dmarc=pass action=none\n header.from=windriver.com; dkim=pass header.d=windriver.com; arc=none" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=windriver.com;\n\t h=cc:content-transfer-encoding:content-type:date:from\n\t:message-id:mime-version:subject:to; s=PPS06212021; bh=AX7Hp4VBm\n\t94ylDSe5j22hwmdsT8pzzm4W7CSsy9VyPM=; b=IpiMa47uM7HupQruFziul3y1v\n\tDnhF+yvxojb5nndNDIwlQdh63zOKfw4JcsAcZVLEAs+UEWjqbeql1VkDX7tlQ5ZQ\n\trNy8LWqSixI8cN5x9uUSXaLKrKjAEN8C20YqC2Y3h91/SoVZJan3aIZQf5MwyYEO\n\t80cxnHY3TARXXmBaU97aDgTqTVOBtcmoIZoppWEtUzBphKxuMz7J2lafai3Y3exu\n\tyMJi6H3GkSwB1mjOID9Pqhjksu+ztveWoGuzezRR6QZKJn6Bx+jvQ6vdcWJUHM1R\n\t9ia/ocNX+P8E/TqVslRDNoQ5L/aZge49UbF3bzUkGyQV1JQiFprrpPirnCYlA==", "From": "\"Ionut Nechita (Wind River)\" <ionut.nechita@windriver.com>", "To": "Bjorn Helgaas <bhelgaas@google.com>, linux-pci@vger.kernel.org", "Cc": "Sebastian Andrzej Siewior <bigeasy@linutronix.de>,\n Clark Williams <clrkwllms@kernel.org>,\n Steven Rostedt <rostedt@goodmis.org>, linux-rt-devel@lists.linux.dev,\n linux-kernel@vger.kernel.org,\n Ionut Nechita <ionut.nechita@windriver.com>,\n Ionut Nechita <ionut_n2001@yahoo.com>", "Subject": "[PATCH] PCI/IOV: Fix recursive locking deadlock on\n pci_rescan_remove_lock", "Date": "Mon, 9 Feb 2026 09:57:07 +0200", "Message-ID": "<20260209075706.16367-2-ionut.nechita@windriver.com>", "X-Mailer": "git-send-email 2.52.0", "Content-Transfer-Encoding": "8bit", "Content-Type": "text/plain", "X-ClientProxiedBy": "VI1PR04CA0072.eurprd04.prod.outlook.com\n (2603:10a6:802:2::43) To MN2PR11MB3885.namprd11.prod.outlook.com\n (2603:10b6:208:151::27)", "Precedence": "bulk", "X-Mailing-List": "linux-pci@vger.kernel.org", "List-Id": "<linux-pci.vger.kernel.org>", "List-Subscribe": "<mailto:linux-pci+subscribe@vger.kernel.org>", "List-Unsubscribe": "<mailto:linux-pci+unsubscribe@vger.kernel.org>", "MIME-Version": "1.0", "X-MS-PublicTrafficType": "Email", "X-MS-TrafficTypeDiagnostic": "MN2PR11MB3885:EE_|MW4PR11MB7125:EE_", "X-MS-Office365-Filtering-Correlation-Id": "a5e674b0-ab46-4fb6-74b4-08de67b0f490", "X-MS-Exchange-SenderADCheck": "1", "X-MS-Exchange-AntiSpam-Relay": "0", "X-Microsoft-Antispam": "\n\tBCL:0;ARA:13230040|366016|1800799024|376014|10070799003|52116014;", "X-Microsoft-Antispam-Message-Info": "\n Tfqr2LV2tQBJ6BOPy5vgv9ij8XyJy6zMJgZIVkXVy7GqfCqD5GZ6rO+Ii+ZzecTWfCTeWrDeS58xYwRbh40LhOogoLlakOSsVgcYuQqHa2EGL8ksvd8jR7yIBN7Ia1lP/++fNmIFkXDRb01vBVHLliENmSzmO+bYmh28eb4iz5xdvCFgcs74zRlZTnXjdrCJ460XfcS61MpeXZ+qvoG6Y0VFav1oF7USuAnaIPc5HgR5pEZKfUKLQ9kr2Q7P7JqRwo/cr56rWJcl/lrxyIhgDnHGlSgwwcyiTw3dfDbSYFHxAEPMbWcj01O8Xu93panE69L70pojPBKMvLLXWdRYg16IxP0ImWN6+PDWH5oPzDMi7zoSrqsQuYXMKo4Qtl7k9duIWfP5NaI5pJGimwF35T+QRero5lqJglfFII4vEzFc7iFFVwci5LdaRNXr2ihi+1vjzy5B4vqikmVGnrCKyfEomUOMFRJaZd5z/6d3akasEtnrNkxkML6qLyucSDINw1/NXoNOstEfJf0foDUOp79zrwbXkOZXGTA1bRPtknCRVWsvRu3ojQ++wxeOlX6A3tN1zUr3PnD0rMerLG6NssJnTbnA0uJoi8ypbXOdw4kWka6XLqjRllorzdE75PpGx3+k1znV0LNn2jQyiGc0BcvuJADN2A4hqpSVFwFkr1XVIiH8i2EE5qxfmhnhFF4fMjPrrGOhkF7Ty0yP0nN8pdfozFbzDz9wiI1vZ7xjdVjT10LXf9PulinJMaprG2quG0cyEUegysmuCXY6XJ5nwO80nBNKzX+h+zD2bZgD8fZRkW4ZF9gvHYqU+k/aP0gY2zvUEzZt6xaJLZVUBoO+1vn44oyZgGx/CswVu9Ozz8HZjuvqQzmMwg0cRzJkC43yhrMnO9Rlbc7qt6ijOM0WAvT2LVJkJi7lCXo61Sj8jLYR1Mxwex6xXnBcXikfpBPw5mcDRdfPsIAAXIZs46v9w7jcZouKUgfMLlS6+gifGZ6r3zu/ZbNrUnmvexOZpB3MiTHjYNebTTcG33k3gzjhWGm1yl4Gq8xBavGutEaUkPP03EW+ek3jG/Wl/X2DtajQmL3T1FCd+CLlERllTtcIr7HYwDQsU8psjnXTk6qVsIND6rABhSh0SvWJ6uSzFfsqWMtZO1FUsP6Pwl5KyjceJwp330w5IulLtLiYpIotlabhtMFtULOkVKr/2CYgI+/WAMzpliEYgEtSGaZ+9PDnhYB3SZ5oX0K/4ZZ9oy7xr/j4x3k66KIcjojf2OPBfF09GvHeOzqjzTuqamMoOM2rctg+XszfcMkXD+KTkfQel7znwZgSrUDw31Wu0FxOQLr0kI/w9CnSUUZOiLG5CJ0jC8IRj9GGk3ocLMtKhseygbeL5h2+40JXZluQvgdb2+vuTcFhsuu8seUrszNPIhBRvqJlWW03UBdEiGh2Q9vJyUOfoPx2c+advmgZi1dcm+cKiC1HhI/7phh0+WnrskAGATICKUCvOFLW/7rHZ0t8cKbvY/JVLuPZN2C7wg5G5e3XTftq3ABA8D27FBXwNxG/CsD/ph0cmpuPzRDQdPpI9Gg=", "X-Forefront-Antispam-Report": "\n\tCIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN2PR11MB3885.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(1800799024)(376014)(10070799003)(52116014);DIR:OUT;SFP:1101;", "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "2", "X-MS-Exchange-AntiSpam-MessageData-0": "\n b/e6a7hW60+Zb0iLhGsbvmOfnxlO38YeTk17fXg/a86giYfqVbdvDDuRPoKcXefJiHuXVhpOb7k0CFySd8tlT5GVUOQ2PsDsSvhCUHrf2R6+D7gdJTnJOYDKpZMz74vrxnKoPQRrpUDn7jGEH+AS58cJkCxYwBHhhccwJ2sD0oFAo3ClU0LO5imtyNCJmjcOZVnn59kdNjwd88eeUD8N1AvfnLuVx/9a79FEjrnHVjy6uVWhPxMWxp2RHh70UDcuXaL19vt1Gd4vQtEOPAL69VYm/RLcroACi+FIvT6QxNS3TbRVkeY/e+5dFXdCm+Ro/pz2vfvbF5+1z4F/lMGfiadmSDvD1JrxwbVUe6sAshHkh+Qj6pKH/34YCbZ2+MsQzdaqSziRUclL/heXNinW7cKQKePi2ngZjpuPEsHCKqQe8jOlJANemHJVA8s0lTMras1Mit1hwKE2dVicQKG5kiTtj7n7/S3JXuo89LHHju+z+CH8EYeUUS9XQCt9fPkYayQaiGl/+AEWJyhlxXxMLcB+IDXQIM6ge4q8rvfZM6Zq5zJD8qVrelY6XNO6TOr3AarGTRbEwYBsgDX55CemT7TcmG4VRfJwAHJwJ9DpuHHl6LIJ/7qQUDeG3/QgM877qt2zIlw4Nxr9Pg3UERT37O2Ra824k0JxaLv46AEmoz0HhB/vIw9zopnZIAq08KnaqT17T20gJ7mPm7UqIQdu8ohwjI/oWw1BBsJCTMWm9mbmKhO+B4vd5PbKv2OAbPcOJz+QrCTGPZ4iADZHHFFweI607CJF3Ev1dB3brGcZru22bFafctIfxEWwb2/KZe+phFH95KwJ9ViwtASENhtM4w8btT/SdaTCnUTIRdMe0BdwWpNUFdYieppVc3WUWA6DKVezVSEttkNls1qLkpHeU5dMTPzp9gWTEU80TBxQtjxpRxDqSUx65864twI+99KPXihJNS3pTDF/OHWRsPtCbsMARbt1VsIB2fbAjMpkqT6BzUoxiD9906RVIJaTmJSF4+uJsccWkE7MPT3I0obPw0GWsdktegabFSdYqazp8Zro8g3/rpyoivDWuQr1Q9Krny2Z68VwXM+KkzlU4XMw7ejQP8qYu6fhQ0tFVPwyhFA+1qbsddTnqgnq9IYJruGIs4VKPbsvr4SOi1rtgRLbZW/RZkWJMv9ktFsL5FWXWxU3wjzXNCt9O2vAO0FyYJXiWK+5cE8RB01q0XhlsWKsXtknBU79gmmMqnZFK/iuvwj0jdEGNvQPfhsJWb2WMIopfQCLCxgW8MjdkbbkRTcrL/OOq/3M9eHJG0eKjqKq7o9mLxi2m8R9/IDC/w8TWdt24+rzwqDNy1NEyANOW7IcaUaDcdHf/dNBM08oNMbiXMrLsT7Fw/vit9YkMnroTng3IlQzZT9QQ0sJlFVIEc+weN5fMu7tzUraWq2p4Mr0SJxx0r17NDRsuh9++s4n3FGcWFM9pztZ1RI4hPeMRbWsnEalmI5h7/d7eWvooJnUL1PN6QzVnKEC5AlCEZm760ng41IOQ/zEqJfssrZVkQ+81C0WHPmdjTVHgwxWO0hQSCQc9qc14ZkMZ7lZEKWGWVKMyjqTAukCnh0LGMqE2tb/MzsfwDcCbo/9dPmeX3UdTlq/vNymlagFU7kQr7jAqLH4fRL+Za6n0IkxZSfeJmmk2BnI2KlJnLhCrKzRqJQAeKg0bnSD6KBFMLrviB+2As4d2GkkfPGMuzRs8E87FR/pmW8ZuInPbODQznOfsmEEbA3yJytdXNbwnkwOX3OZ2TmLzF2n58EL", "X-MS-Exchange-AntiSpam-MessageData-1": "w0EtwL0zmGXAxAucUh7fMPZhIZDHyOI+oBE=", "X-OriginatorOrg": "windriver.com", "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n a5e674b0-ab46-4fb6-74b4-08de67b0f490", "X-MS-Exchange-CrossTenant-AuthSource": "MN2PR11MB3885.namprd11.prod.outlook.com", "X-MS-Exchange-CrossTenant-AuthAs": "Internal", "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "09 Feb 2026 07:58:04.9552\n (UTC)", "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted", "X-MS-Exchange-CrossTenant-Id": "8ddb2873-a1ad-4a18-ae4e-4644631433be", "X-MS-Exchange-CrossTenant-MailboxType": "HOSTED", "X-MS-Exchange-CrossTenant-UserPrincipalName": "\n ma2RAfwMfv1scpkK+jhxkWI0CBq6EPdTbsblNOFXtv17OD/kn8Uugiq+TLTlBeifwovodUSs0xbe5UtPeLjn7gPJv//dvK8p76ktsyEfz7M=", "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "MW4PR11MB7125", "X-Authority-Analysis": "v=2.4 cv=dPyrWeZb c=1 sm=1 tr=0 ts=6989938f cx=c_pps\n a=BKMVb8u7xwlFrvPG8etDZw==:117 a=6eWqkTHjU83fiwn7nKZWdM+Sl24=:19\n a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19\n a=xqWC_Br6kY4A:10 a=HzLeVaNsDn8A:10 a=VkNPw1HP01LnGYTKEx00:22\n a=Mpw57Om8IfrbqaoTuvik:22 a=GgsMoib0sEa3-_RKJdDe:22 a=t7CeM3EgAAAA:8\n a=6pPjT_HeCsJMgyK8P9cA:9 a=FdTzh2GWekK77mhwV6Dw:22", "X-Proofpoint-Spam-Details-Enc": "AW1haW4tMjYwMjA5MDA2NCBTYWx0ZWRfXykRmJARuleVA\n pb6+tzz69dMHcPtWaLRJjqoKXYQ6ROSzm25ZV1k655bxR2O7991CDC1CF01p8N8RlAwg69wkZIV\n kWQGrnogtWmgxizSqR6WuCck+htm9w1u/76WBmeU4g0kYGvE03pbjuaFr5wO2b81ALw0s+hsvDY\n vWq0e03sjeRMcG98D/6zzzytgxL77mLxjMh8pb6ZXGbL+y6kCw4OBR4eqBf4v4GVxPEaN0J31FN\n kp++kDfvUxxYlOpgKeZA6MVrUJxCPr7UW0C/rC7NjeN5z/4uJhL9PK02BlXxQ1XAjQGyDZAlTln\n JZFCZ3j9qNuNta29rWEX6fAu5RlsvNN4tzpqfo8jt0oPMoLb9FUphEseM8yJGqwnW14Q3Jgns/9\n cP7maFQA1GxrSgAM7G6UBmhzSpvLqWh5bmhxMrygWCIKGG84FB5SBPQji7eRXqCPje9mNllWAUR\n kNjtBrxc3FkdFu7cXqA==", "X-Proofpoint-GUID": "IOZZNOGCNlAugsq6GvDfZN6WaU9moG8X", "X-Proofpoint-ORIG-GUID": "IOZZNOGCNlAugsq6GvDfZN6WaU9moG8X", "X-Proofpoint-Virus-Version": "vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1121,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-02-08_05,2026-02-05_03,2025-10-01_01", "X-Proofpoint-Spam-Details": "rule=outbound_notspam policy=outbound score=0\n impostorscore=0 malwarescore=0 spamscore=0 lowpriorityscore=0 bulkscore=0\n priorityscore=1501 clxscore=1011 phishscore=0 adultscore=0 suspectscore=0\n classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0\n reason=mlx scancount=1 engine=8.22.0-2601150000 definitions=main-2602090064" }, "content": "From: Ionut Nechita <ionut.nechita@windriver.com>\n\nWhen a PCI device is hot-removed via sysfs (e.g., echo 1 > /sys/.../remove),\npci_stop_and_remove_bus_device_locked() acquires pci_rescan_remove_lock and\nthen recursively walks the bus hierarchy calling driver .remove() callbacks.\n\nIf the removed device is a PF with SR-IOV enabled (e.g., i40e, ice), the\ndriver's .remove() calls pci_disable_sriov() -> sriov_disable() ->\nsriov_del_vfs() which also tries to acquire pci_rescan_remove_lock.\nSince this is a non-recursive mutex and the same thread already holds it,\nthis results in a deadlock.\n\nOn PREEMPT_RT kernels, where mutexes are backed by rtmutex with deadlock\ndetection, this immediately triggers:\n\n WARNING: CPU: 15 PID: 11730 at kernel/locking/rtmutex.c:1663\n Call Trace:\n mutex_lock+0x47/0x60\n sriov_disable+0x2a/0x100\n i40e_free_vfs+0x415/0x470 [i40e]\n i40e_remove+0x38d/0x3e0 [i40e]\n pci_device_remove+0x3b/0xb0\n device_release_driver_internal+0x193/0x200\n pci_stop_bus_device+0x81/0xb0\n pci_stop_and_remove_bus_device_locked+0x16/0x30\n remove_store+0x79/0x90\n\nOn non-RT kernels the same recursive acquisition silently hangs the calling\nprocess, eventually causing netdev watchdog TX timeout splats.\n\nThis affects all drivers that call pci_disable_sriov() from their .remove()\ncallback (i40e, ice, and others).\n\nFix this by tracking the owner of pci_rescan_remove_lock and skipping the\nredundant acquisition in sriov_del_vfs() when the current thread already\nholds it. The VF removal is still serialized correctly because the caller\nalready holds the lock.\n\nSigned-off-by: Ionut Nechita <ionut.nechita@windriver.com>\n---\n drivers/pci/iov.c | 23 +++++++++++++++++++++--\n drivers/pci/pci.h | 1 +\n drivers/pci/probe.c | 15 +++++++++++++++\n 3 files changed, 37 insertions(+), 2 deletions(-)", "diff": "diff --git a/drivers/pci/iov.c b/drivers/pci/iov.c\nindex 00784a60ba80b..3a21cf9aaa747 100644\n--- a/drivers/pci/iov.c\n+++ b/drivers/pci/iov.c\n@@ -763,12 +763,31 @@ static int sriov_enable(struct pci_dev *dev, int nr_virtfn)\n static void sriov_del_vfs(struct pci_dev *dev)\n {\n \tstruct pci_sriov *iov = dev->sriov;\n+\tbool do_unlock = false;\n \tint i;\n \n-\tpci_lock_rescan_remove();\n+\t/*\n+\t * If the current thread already holds pci_rescan_remove_lock (e.g.,\n+\t * when pci_disable_sriov() is called from a driver's .remove() that\n+\t * was invoked by pci_stop_and_remove_bus_device_locked()), skip\n+\t * taking the lock to avoid a deadlock. The lock is non-recursive\n+\t * and on PREEMPT_RT, where mutexes are rtmutexes, the deadlock is\n+\t * detected immediately and produces an alarming WARNING splat. On\n+\t * non-RT kernels the same recursive acquisition silently hangs.\n+\t *\n+\t * The VF removal below is still serialized correctly because the\n+\t * caller already holds the lock.\n+\t */\n+\tif (!pci_rescan_remove_locked()) {\n+\t\tpci_lock_rescan_remove();\n+\t\tdo_unlock = true;\n+\t}\n+\n \tfor (i = 0; i < iov->num_VFs; i++)\n \t\tpci_iov_remove_virtfn(dev, i);\n-\tpci_unlock_rescan_remove();\n+\n+\tif (do_unlock)\n+\t\tpci_unlock_rescan_remove();\n }\n \n static void sriov_disable(struct pci_dev *dev)\ndiff --git a/drivers/pci/pci.h b/drivers/pci/pci.h\nindex 0e67014aa0013..c1055d333e08a 100644\n--- a/drivers/pci/pci.h\n+++ b/drivers/pci/pci.h\n@@ -92,6 +92,7 @@ extern const unsigned char pcie_link_speed[];\n extern bool pci_early_dump;\n \n extern struct mutex pci_rescan_remove_lock;\n+bool pci_rescan_remove_locked(void);\n \n bool pcie_cap_has_lnkctl(const struct pci_dev *dev);\n bool pcie_cap_has_lnkctl2(const struct pci_dev *dev);\ndiff --git a/drivers/pci/probe.c b/drivers/pci/probe.c\nindex 41183aed8f5d9..f058ffb51519c 100644\n--- a/drivers/pci/probe.c\n+++ b/drivers/pci/probe.c\n@@ -3540,19 +3540,34 @@ EXPORT_SYMBOL_GPL(pci_rescan_bus);\n * routines should always be executed under this mutex.\n */\n DEFINE_MUTEX(pci_rescan_remove_lock);\n+static struct task_struct *pci_rescan_remove_owner;\n \n void pci_lock_rescan_remove(void)\n {\n \tmutex_lock(&pci_rescan_remove_lock);\n+\tWRITE_ONCE(pci_rescan_remove_owner, current);\n }\n EXPORT_SYMBOL_GPL(pci_lock_rescan_remove);\n \n void pci_unlock_rescan_remove(void)\n {\n+\tWRITE_ONCE(pci_rescan_remove_owner, NULL);\n \tmutex_unlock(&pci_rescan_remove_lock);\n }\n EXPORT_SYMBOL_GPL(pci_unlock_rescan_remove);\n \n+/**\n+ * pci_rescan_remove_locked - check if current thread holds the lock\n+ *\n+ * Returns true if the current thread already holds pci_rescan_remove_lock.\n+ * This is used by PCI core functions that may be called both with and\n+ * without the lock held, to avoid recursive locking deadlocks.\n+ */\n+bool pci_rescan_remove_locked(void)\n+{\n+\treturn READ_ONCE(pci_rescan_remove_owner) == current;\n+}\n+\n static int __init pci_sort_bf_cmp(const struct device *d_a,\n \t\t\t\t const struct device *d_b)\n {\n", "prefixes": [] }