Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/2216260/?format=api
{ "id": 2216260, "url": "http://patchwork.ozlabs.org/api/patches/2216260/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linux-pci/patch/20260326083534.23602-3-ionut.nechita@windriver.com/", "project": { "id": 28, "url": "http://patchwork.ozlabs.org/api/projects/28/?format=api", "name": "Linux PCI development", "link_name": "linux-pci", "list_id": "linux-pci.vger.kernel.org", "list_email": "linux-pci@vger.kernel.org", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20260326083534.23602-3-ionut.nechita@windriver.com>", "list_archive_url": null, "date": "2026-03-26T08:35:34", "name": "[v11,2/2] PCI: Fix AB-BA deadlock between device_lock and pci_rescan_remove_lock in remove_store", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "f02d328612670fc004b87f615aa7d84f4ff767f6", "submitter": { "id": 92607, "url": "http://patchwork.ozlabs.org/api/people/92607/?format=api", "name": "Ionut Nechita (Wind River)", "email": "ionut.nechita@windriver.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/linux-pci/patch/20260326083534.23602-3-ionut.nechita@windriver.com/mbox/", "series": [ { "id": 497550, "url": "http://patchwork.ozlabs.org/api/series/497550/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linux-pci/list/?series=497550", "date": "2026-03-26T08:35:33", "name": "PCI/IOV: Fix SR-IOV locking races and AB-BA deadlock", "version": 11, "mbox": "http://patchwork.ozlabs.org/series/497550/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2216260/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2216260/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "\n <linux-pci+bounces-51161-incoming=patchwork.ozlabs.org@vger.kernel.org>", "X-Original-To": [ "incoming@patchwork.ozlabs.org", "linux-pci@vger.kernel.org" ], "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=windriver.com header.i=@windriver.com\n header.a=rsa-sha256 header.s=PPS06212021 header.b=rgdeJ+Gq;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c09:e001:a7::12fc:5321; helo=sto.lore.kernel.org;\n envelope-from=linux-pci+bounces-51161-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)", "smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=windriver.com header.i=@windriver.com\n header.b=\"rgdeJ+Gq\"", "smtp.subspace.kernel.org;\n arc=fail smtp.client-ip=205.220.166.238", "smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=windriver.com", "smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=windriver.com" ], "Received": [ "from sto.lore.kernel.org (sto.lore.kernel.org\n [IPv6:2600:3c09:e001:a7::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fhHH04lQXz1y1x\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 26 Mar 2026 19:38:20 +1100 (AEDT)", "from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sto.lore.kernel.org (Postfix) with ESMTP id 3FC61305F255\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 26 Mar 2026 08:37:02 +0000 (UTC)", "from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 019AF3BA225;\n\tThu, 26 Mar 2026 08:36:47 +0000 (UTC)", "from mx0a-0064b401.pphosted.com (mx0a-0064b401.pphosted.com\n [205.220.166.238])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 3F5C33B8D7E;\n\tThu, 26 Mar 2026 08:36:42 +0000 (UTC)", "from pps.filterd (m0250809.ppops.net [127.0.0.1])\n\tby mx0a-0064b401.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id\n 62Q5tY783254232;\n\tThu, 26 Mar 2026 01:36:05 -0700", "from ch1pr05cu001.outbound.protection.outlook.com\n (mail-northcentralusazon11010032.outbound.protection.outlook.com\n [52.101.193.32])\n\tby mx0a-0064b401.pphosted.com (PPS) with ESMTPS id 4d1tucwwt0-1\n\t(version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT);\n\tThu, 26 Mar 2026 01:36:05 -0700 (PDT)", "from SJ2PR11MB7546.namprd11.prod.outlook.com (2603:10b6:a03:4cc::8)\n by CH3PR11MB8364.namprd11.prod.outlook.com (2603:10b6:610:174::19) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9745.9; Thu, 26 Mar\n 2026 08:36:03 +0000", "from SJ2PR11MB7546.namprd11.prod.outlook.com\n ([fe80::ca9b:dcf:8881:bced]) by SJ2PR11MB7546.namprd11.prod.outlook.com\n ([fe80::ca9b:dcf:8881:bced%5]) with mapi id 15.20.9769.004; Thu, 26 Mar 2026\n 08:36:02 +0000" ], "ARC-Seal": [ "i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1774514206; cv=fail;\n b=ZgzDi7gWZTddzZL9kwK2kgduTjHvHPR2O11sBFFznafqkyOJYFug0rlILPZMjCNnUTh/gkQsjTliwswHLCYUnYVLk+d08YB1/24+NmV9wZtlIZZp6h1YLmAJNU0WOlP8oB713x2T1u16CQH+BrYSZVhGBNZibtREeWqKpjp13TY=", "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=fuzcXwyGVUUgQs4QPeHVpuhDzd+LClvOgeytYu1zLpNa2IZwcaNQ7WBTihGvv7vsN7/5yVE1nSgF9wlS6RRh2dJYB94LXXyyhU0H67HS6KLtDf4DiP+aA7rKY/d4O5VZDuaW21xC8NGZ9DOc8nnVOkNBHga8LWeBu8JCB1j9IZrxYa3jzICpb/7kLrmKKQTKSPojFYgfAUnBGUjaR+ppyZtNBl+4PLXN0sUV/FIES4tp5J6WqmhHIWE1sscJs3MzFQ9k7uaS49Smq8GP7466r/XBkkraJNOgZMiGP3w/LRXKDoOt5cqbJifODOC5fW3Hi0PzEkT2zgNz8p7nmttnMw==" ], "ARC-Message-Signature": [ "i=2; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1774514206; c=relaxed/simple;\n\tbh=48i0pAdoCCxy5O09jEHvsBf0wxabneaT0tk1lwBe/p0=;\n\th=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:\n\t Content-Type:MIME-Version;\n b=VDZwpLdobGSsmTwKGu++CsxIKArgEThJeXgVHnkGP3c+5P/TfZNLfxW6dWnD/YaLNnYVo/ZwjalSgeOaRWIp+DOI8BCV/PQXyvR/TdShI00sKCv2jseSzyhq3YeOtpln1X6VoZd3bzQkwtpAG2X/YT1qNxdt19NHswXpFcSKd8s=", "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=3SM+NIariRpcaLI0B0mvChlztVVSNmTS8X3y4DpeDjc=;\n b=dmYCk/MRUZTlE6r8Byn+XmN0EHoWVmk8+hjQsJ8DRWbaVvGPTKhrsMeglRlLiizdDfKbZLrUGF1RSV0J0hI3iFPbdle87GWEhG+aFotkvxTng3GDu5SA3zzFsRx0GSYxvtTF10CDwc6L14CR8nUzXUEriTao/PMDEVTbuU3o7al5BzkZlKG765Zw33BPVUvIVA9S1cXjyqz6BFr2rZfElvXG+6u8lCRDHJR4E3IDNDoRr3/fYm7x8wa/TL+k8QeKTLjtnCfHYyrQmOY8KZ6sgaUP+Pd2R1034REa59riGs78S1rh4+56Z015ddkxTenDV0Pe3IrjYmX/uuaE00K2gg==" ], "ARC-Authentication-Results": [ "i=2; smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=windriver.com;\n spf=pass smtp.mailfrom=windriver.com;\n dkim=pass (2048-bit key) header.d=windriver.com header.i=@windriver.com\n header.b=rgdeJ+Gq; arc=fail smtp.client-ip=205.220.166.238", "i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=windriver.com; dmarc=pass action=none\n header.from=windriver.com; dkim=pass header.d=windriver.com; arc=none" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=windriver.com;\n\t h=cc:content-transfer-encoding:content-type:date:from\n\t:in-reply-to:message-id:mime-version:references:subject:to; s=\n\tPPS06212021; bh=3SM+NIariRpcaLI0B0mvChlztVVSNmTS8X3y4DpeDjc=; b=\n\trgdeJ+GqUEKH+76nTbx4+jHKrzv79Et5qZZVRe8cx0eEeB0P/8dn1rgthacyytI+\n\tnled4gLCJIkawL7bsA9pi5Zx/LCNwyXxTwsoBKGO9siZ+UVH1sZEQZdF9Vemf9jQ\n\tmPBfAvju4H5jkYpqlgyG4vJ6XreFoxF+dE82YpE8o4YeZQEyAJ+GmLzx3g/AoN6b\n\tZDqKpiosGkE6KqCnAoQvT70zjv48ZWS/TLZHN1eYJUHLa09qUJRLZqeuUZ6nwzb9\n\tGdYMDY6oXPcpHRuoci6YM6WRQNAOxEurocOCD8WmzFlVybuGxJ5W7igqlrDuLBMd\n\tFW1/AJMpRnYxX8ib0gnhqg==", "From": "\"Ionut Nechita (Wind River)\" <ionut.nechita@windriver.com>", "To": "linux-pci@vger.kernel.org, bhelgaas@google.com", "Cc": "helgaas@kernel.org, sebott@linux.ibm.com, schnelle@linux.ibm.com,\n bblock@linux.ibm.com, linux@roeck-us.net, lukas@wunner.de,\n stable@vger.kernel.org, linux-kernel@vger.kernel.org,\n intel-xe@lists.freedesktop.org, matthew.brost@intel.com,\n michal.wajdeczko@intel.com, piotr.piorkowski@intel.com,\n dtatulea@nvidia.com, mani@kernel.org, kbusch@kernel.org,\n lkml@mageta.org, alifm@linux.ibm.com, julianr@linux.ibm.com,\n ionut_n2001@yahoo.com, sunlightlinux@gmail.com,\n \"Ionut Nechita (Wind River)\" <ionut.nechita@windriver.com>", "Subject": "[PATCH v11 2/2] PCI: Fix AB-BA deadlock between device_lock and\n pci_rescan_remove_lock in remove_store", "Date": "Thu, 26 Mar 2026 10:35:34 +0200", "Message-ID": "<20260326083534.23602-3-ionut.nechita@windriver.com>", "X-Mailer": "git-send-email 2.53.0", "In-Reply-To": "<20260326083534.23602-1-ionut.nechita@windriver.com>", "References": "<20260326083534.23602-1-ionut.nechita@windriver.com>", "Content-Transfer-Encoding": "8bit", "Content-Type": "text/plain", "X-ClientProxiedBy": "BE1P281CA0360.DEUP281.PROD.OUTLOOK.COM\n (2603:10a6:b10:82::24) To SJ2PR11MB7546.namprd11.prod.outlook.com\n (2603:10b6:a03:4cc::8)", "Precedence": "bulk", "X-Mailing-List": "linux-pci@vger.kernel.org", "List-Id": "<linux-pci.vger.kernel.org>", "List-Subscribe": "<mailto:linux-pci+subscribe@vger.kernel.org>", "List-Unsubscribe": "<mailto:linux-pci+unsubscribe@vger.kernel.org>", "MIME-Version": "1.0", "X-MS-PublicTrafficType": "Email", "X-MS-TrafficTypeDiagnostic": "SJ2PR11MB7546:EE_|CH3PR11MB8364:EE_", "X-MS-Office365-Filtering-Correlation-Id": "8f6dc00f-b154-4d5c-dbf3-08de8b12b6e6", "X-MS-Exchange-SenderADCheck": "1", "X-MS-Exchange-AntiSpam-Relay": "0", "X-Microsoft-Antispam": "\n\tBCL:0;ARA:13230040|1800799024|366016|7416014|376014|10070799003|52116014|18002099003|56012099003|22082099003;", "X-Microsoft-Antispam-Message-Info": "\n\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", "X-Forefront-Antispam-Report": "\n\tCIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SJ2PR11MB7546.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(7416014)(376014)(10070799003)(52116014)(18002099003)(56012099003)(22082099003);DIR:OUT;SFP:1101;", "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "2", "X-MS-Exchange-AntiSpam-MessageData-0": "\n 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", "X-MS-Exchange-AntiSpam-MessageData-1": "WFdOJCaVjUj3Ozf9TqdZcUNp5ewORib8VRs=", "X-Exchange-RoutingPolicyChecked": "\n\tlloaMjf8FX4+J+ou7fDAX8GtZ2/BnKZS16NbZE9qJbBZLSJNVO1V/AYKXhVzcALragN5mcYRuvm1V44nstZqYtX+YuOL9KOQD1Ueaife+UY+COEYXNCm6Nkfc4pXKZNnNXHgOJCzm4fR4lWPgGPOAUArkvOVxYnUPWDTD9qKiF10SmiCLncOyFE2lh4dZ1ebdoIMbpF5WwrjS8NSLgrkvuz025xkUJmL5ZMea4/i+lq9ApUk2Hucu0fKLf1cTTlUcYsVECsDcARcOvoS7cJP0cTMHDrH59nSJIjEu9JzbtdGOIj9C/r70zkK6+N3ROb0jKaImQSPyWKJ7g6/cLrtYw==", "X-OriginatorOrg": "windriver.com", "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n 8f6dc00f-b154-4d5c-dbf3-08de8b12b6e6", "X-MS-Exchange-CrossTenant-AuthSource": "SJ2PR11MB7546.namprd11.prod.outlook.com", "X-MS-Exchange-CrossTenant-AuthAs": "Internal", "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "26 Mar 2026 08:36:02.8941\n (UTC)", "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted", "X-MS-Exchange-CrossTenant-Id": "8ddb2873-a1ad-4a18-ae4e-4644631433be", "X-MS-Exchange-CrossTenant-MailboxType": "HOSTED", "X-MS-Exchange-CrossTenant-UserPrincipalName": "\n l16TT5wPodm1bO3VOsVrhbrVeq73XQjk8sl/TxmtogzMnwpeZ+DbwZr9wiu04Db1wn7+QYJhJh00XyOGtAkzPG9S6cmnH/xYxtTfPRLjTCI=", "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "CH3PR11MB8364", "X-Proofpoint-GUID": "tcwv_GEcNwPnnWyaYzDQuy9JqtEkBjsF", "X-Proofpoint-ORIG-GUID": "tcwv_GEcNwPnnWyaYzDQuy9JqtEkBjsF", "X-Authority-Analysis": "v=2.4 cv=deCNHHXe c=1 sm=1 tr=0 ts=69c4eff5 cx=c_pps\n a=eJMC1fB0Wmzbl6MXJ2sZyA==:117 a=6eWqkTHjU83fiwn7nKZWdM+Sl24=:19\n a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19\n a=xqWC_Br6kY4A:10 a=Yq5XynenixoA:10 a=VkNPw1HP01LnGYTKEx00:22\n a=bi6dqmuHe4P4UrxVR6um:22 a=iKiJcTA2PjBS6x5JeXcw:22 a=VwQbUJbxAAAA:8\n a=_jlGtV7tAAAA:8 a=p2eoyRXnAAAA:8 a=VnNF1IyMAAAA:8 a=t7CeM3EgAAAA:8\n a=mm2UkWPFonPHBTd3Hn4A:9 a=nlm17XC03S6CtCLSeiRr:22 a=KSHYvF9M28j0gckGFaEs:22\n a=FdTzh2GWekK77mhwV6Dw:22", "X-Proofpoint-Spam-Details-Enc": "AW1haW4tMjYwMzI2MDA2MiBTYWx0ZWRfXxJsW3GGekayT\n GOapsRutveNggg4Fa7eovwxI+5IB9uHMd9ZrFwkgMXgN4WdKK4OFedJF+rQ/voXmy3HUxE/NSM0\n Y3kWmOKIZnDGW0vsjuUWDo4gIXNH9ASm1pWXzmyAnk2+JA9EFWCcYzbPRsnrhT0EUlrIGjZ/hZx\n 1lfPz8X3xU2fo0ql49j6sat1i51AE2zdqlG6Zn5sonMU3dGOm6NS2O06k5O7qvIlzBXfS/je6mK\n p8JjWe4cAxiG0EiFYkERI5AeNFs7sdrgXZ3/dkS2wV5+Dudbq7D66xhgdyCO5TjKH9btaNYNFhP\n liNzIRe15FgU9C0MBjxPrr/XzvDpjFWM+KlbeFyI/vSfD5KoC+8qA6qTqZzi14zEk5aFeJEcc1U\n rx+b+Abdi99gzRTbQbspKndZfCqS5I7ybsMPdhf4EjYmGr+GXkpYKqKcOpvuFfRb2jzkakT38/F\n T/gkiNd6Z8tjcd9Io1Q==", "X-Proofpoint-Virus-Version": "vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-03-26_02,2026-03-24_01,2025-10-01_01", "X-Proofpoint-Spam-Details": "rule=outbound_notspam policy=outbound score=0\n clxscore=1015 malwarescore=0 spamscore=0 phishscore=0 priorityscore=1501\n impostorscore=0 lowpriorityscore=0 suspectscore=0 adultscore=0 bulkscore=0\n classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0\n reason=mlx scancount=1 engine=8.22.0-2603050001 definitions=main-2603260062" }, "content": "remove_store() calls pci_stop_and_remove_bus_device_locked() which\ntakes pci_rescan_remove_lock first, then device_lock during driver\nrelease. Meanwhile, unbind_store() takes device_lock first (via\ndevice_driver_detach), and the driver's .remove() callback may call\npci_disable_sriov() -> sriov_del_vfs() -> pci_lock_rescan_remove().\n\nThis creates an AB-BA deadlock:\n\n CPU0 (remove_store) CPU1 (unbind_store)\n -------------------- --------------------\n pci_lock_rescan_remove()\n device_lock()\n driver .remove()\n sriov_del_vfs()\n pci_lock_rescan_remove() <-- WAITS\n pci_stop_bus_device()\n device_release_driver()\n device_lock() <-- WAITS\n\nFix this by first marking the device as dead using kill_device() to\nprevent any new driver from binding, then calling device_release_driver()\nbefore pci_stop_and_remove_bus_device_locked().\n\nMarking the device dead closes the race window between unbinding and\nremoval where a new driver could theoretically bind: once the dead flag\nis set, the device core will refuse any new driver probe.\n\nAfter device_release_driver() returns, the driver is already unbound,\nso the subsequent device_release_driver() call inside\npci_stop_and_remove_bus_device_locked() becomes a no-op.\n\nFixes: a5338e365c45 (\"PCI/IOV: Fix race between SR-IOV enable/disable and hotplug\")\nReported-by: Guenter Roeck <linux@roeck-us.net>\nCloses: https://lore.kernel.org/linux-pci/0ca9e675-478c-411d-be32-e2d81439288f@roeck-us.net/\nReported-by: Benjamin Block <bblock@linux.ibm.com>\nCloses: https://lore.kernel.org/linux-pci/20260317090149.GA3835708@chlorum.ategam.org/\nSuggested-by: Benjamin Block <bblock@linux.ibm.com>\nCc: stable@vger.kernel.org\nSigned-off-by: Ionut Nechita <ionut.nechita@windriver.com>\n---\n drivers/pci/pci-sysfs.c | 30 +++++++++++++++++++++++++++++-\n 1 file changed, 29 insertions(+), 1 deletion(-)", "diff": "diff --git a/drivers/pci/pci-sysfs.c b/drivers/pci/pci-sysfs.c\nindex a2f8a5d6190fd..e87aa96c02bde 100644\n--- a/drivers/pci/pci-sysfs.c\n+++ b/drivers/pci/pci-sysfs.c\n@@ -518,8 +518,36 @@ static ssize_t remove_store(struct device *dev, struct device_attribute *attr,\n \tif (kstrtoul(buf, 0, &val) < 0)\n \t\treturn -EINVAL;\n \n-\tif (val && device_remove_file_self(dev, attr))\n+\tif (val && device_remove_file_self(dev, attr)) {\n+\t\t/*\n+\t\t * Mark the device as dead so that no new driver can bind\n+\t\t * between the unbind and the removal below. Once the\n+\t\t * dead flag is set, the device core will refuse any new\n+\t\t * driver probe.\n+\t\t */\n+\t\tdevice_lock(dev);\n+\t\tkill_device(dev);\n+\t\tdevice_unlock(dev);\n+\n+\t\t/*\n+\t\t * Unbind the driver before removing the device to avoid\n+\t\t * an AB-BA deadlock between device_lock and\n+\t\t * pci_rescan_remove_lock. Without this, remove_store\n+\t\t * takes pci_rescan_remove_lock first (via\n+\t\t * pci_stop_and_remove_bus_device_locked) and then\n+\t\t * device_lock during driver release, while a concurrent\n+\t\t * unbind_store (or sriov_numvfs_store) takes device_lock\n+\t\t * first and then pci_rescan_remove_lock (via\n+\t\t * sriov_del_vfs), creating a circular dependency.\n+\t\t *\n+\t\t * By unbinding first, the driver's .remove() callback\n+\t\t * (including any SR-IOV VF cleanup) completes before\n+\t\t * pci_rescan_remove_lock is acquired, ensuring both\n+\t\t * paths take locks in the same order.\n+\t\t */\n+\t\tdevice_release_driver(dev);\n \t\tpci_stop_and_remove_bus_device_locked(to_pci_dev(dev));\n+\t}\n \treturn count;\n }\n static DEVICE_ATTR_IGNORE_LOCKDEP(remove, 0220, NULL,\n", "prefixes": [ "v11", "2/2" ] }