{"id":2225549,"url":"http://patchwork.ozlabs.org/api/1.2/covers/2225549/?format=json","web_url":"http://patchwork.ozlabs.org/project/linux-pci/cover/cover.1776755661.git.ionut.nechita@windriver.com/","project":{"id":28,"url":"http://patchwork.ozlabs.org/api/1.2/projects/28/?format=json","name":"Linux PCI development","link_name":"linux-pci","list_id":"linux-pci.vger.kernel.org","list_email":"linux-pci@vger.kernel.org","web_url":null,"scm_url":null,"webscm_url":null,"list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<cover.1776755661.git.ionut.nechita@windriver.com>","list_archive_url":null,"date":"2026-04-21T07:19:30","name":"[v12,0/2] PCI/IOV: Fix SR-IOV locking races and AB-BA deadlock","submitter":{"id":92607,"url":"http://patchwork.ozlabs.org/api/1.2/people/92607/?format=json","name":"Ionut Nechita (Wind River)","email":"ionut.nechita@windriver.com"},"mbox":"http://patchwork.ozlabs.org/project/linux-pci/cover/cover.1776755661.git.ionut.nechita@windriver.com/mbox/","series":[{"id":500747,"url":"http://patchwork.ozlabs.org/api/1.2/series/500747/?format=json","web_url":"http://patchwork.ozlabs.org/project/linux-pci/list/?series=500747","date":"2026-04-21T07:19:30","name":"PCI/IOV: Fix SR-IOV locking races and AB-BA deadlock","version":12,"mbox":"http://patchwork.ozlabs.org/series/500747/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/covers/2225549/comments/","headers":{"Return-Path":"\n <linux-pci+bounces-52821-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linux-pci@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=windriver.com header.i=@windriver.com\n header.a=rsa-sha256 header.s=PPS06212021 header.b=HBF/fQpA;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c09:e001:a7::12fc:5321; helo=sto.lore.kernel.org;\n envelope-from=linux-pci+bounces-52821-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=windriver.com header.i=@windriver.com\n header.b=\"HBF/fQpA\"","smtp.subspace.kernel.org;\n arc=fail smtp.client-ip=205.220.166.238","smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=windriver.com","smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=windriver.com"],"Received":["from sto.lore.kernel.org (sto.lore.kernel.org\n [IPv6:2600:3c09:e001:a7::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0DVq37BNz1yCv\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 17:28:51 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sto.lore.kernel.org (Postfix) with ESMTP id 8BF353028009\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 07:23:38 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 8B650388E4D;\n\tTue, 21 Apr 2026 07:21:01 +0000 (UTC)","from mx0a-0064b401.pphosted.com (mx0a-0064b401.pphosted.com\n [205.220.166.238])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 8BA173876C7;\n\tTue, 21 Apr 2026 07:20:59 +0000 (UTC)","from pps.filterd (m0250809.ppops.net [127.0.0.1])\n\tby mx0a-0064b401.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id\n 63L4P3ri791542;\n\tTue, 21 Apr 2026 00:20:02 -0700","from sn4pr2101cu001.outbound.protection.outlook.com\n (mail-southcentralusazon11012004.outbound.protection.outlook.com\n [40.93.195.4])\n\tby mx0a-0064b401.pphosted.com (PPS) with ESMTPS id 4dm9fctsbq-1\n\t(version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT);\n\tTue, 21 Apr 2026 00:20:02 -0700 (PDT)","from SJ2PR11MB7546.namprd11.prod.outlook.com (2603:10b6:a03:4cc::8)\n by MN2PR11MB4695.namprd11.prod.outlook.com (2603:10b6:208:260::13) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9846.16; Tue, 21 Apr\n 2026 07:19:58 +0000","from SJ2PR11MB7546.namprd11.prod.outlook.com\n ([fe80::ca9b:dcf:8881:bced]) by SJ2PR11MB7546.namprd11.prod.outlook.com\n ([fe80::ca9b:dcf:8881:bced%4]) with mapi id 15.20.9846.016; Tue, 21 Apr 2026\n 07:19:58 +0000"],"ARC-Seal":["i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776756061; cv=fail;\n b=JL1235HnAukaKw1jU3QYGUZsANlUW+kWt5GnCCQ/wihe1WqzPJd8EXHAwmPJgXVbSSl/vwYvXtJ2h2glYGl+arIQohaZzgu8pmYriItHvutA+TmH5/EeGCHNUb49BWb68OnExP8ZmtNSs/h2EKD5a+KNs0cmDth84S16qeZ+Zd8=","i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=Nab2Oz2umQVU1pOcwjNQKvD5YUw8gddzTPmsq6VFat8dzC4lc7XYr9RuDnqTXyelv9tMWtAt0B5wHTgvn2ltHmKHBAqDy+dRMmcNznw1WbHn3/vp0aPABWA7UPzaGWxf0p6FHH4uGQJqGV2tiDBdbLrMvhyymvaQgaBmwiARb10JlpG+ugwLaIMqMDyi4Se/wuiQ4K9FwzadC3PFoInm1V8p0TXp4rWXfEN/72hOhlJWUm+keI3eDTbYjXL59T6q/+jeJHU9P9L9upeKQwdTNreMbf/+ZiWWbwFP8F4VJz3aOmFeCEIa+BAlvkyQXDh/DbPwpmbylNw8hF6uoUBMKw=="],"ARC-Message-Signature":["i=2; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776756061; c=relaxed/simple;\n\tbh=TbRnsEoV/zQU/lZ7WRiOkg51Aesh32FdloyvCvsj/5o=;\n\th=From:To:Cc:Subject:Date:Message-ID:Content-Type:MIME-Version;\n b=WZ0Sbe5mywS2tD9pEMiySy2GS8vu8aYhztiM3XMlVLBYd7eSRDinjv1WHpnMAJ6CxZQ6DTi653DKOEUhCa4aAIkju22A2o9y8yGOKJrNRHiUDuNYmDFyGxNdcOWA/ZJ7ic5YK9ygQQeTXckT3AWJ5EEQO8yRUseeStGPlFRtEYU=","i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=yVt1lXOjoqKJOt3Sluka4whKxntqJUUMLjccwd7PEZI=;\n b=R54BbNeKLTM4KsApAd5spLQjW90mSQQpyl9wO+D+0tp0NLDjT2nVddA2Wi/ok2dUwuZDdwUR383xRCYoXqZpuERqUxTNZWsVsQaXXcvJPjLxSyP58G4qTfQDqhTsjqIphHMZ64BlnJKCqZfGr0oG803b2jds8R2hLFmEBbvTBXMSIe2B+pQIt0y2xhbE9LvhFqVMlgn4a7rFkm2ERSMgPO6Nb5osqwlnvknjYd/AIB+Uwv55Shdw+dq+RCMprBwtY6LtsVxr0pWYWa5tHbGZjNTG3nblsb3z7zm6LUxSJ5BsdLvbIAOVORUzm3YBv27f/Y7554VMQsPrfGvaSLlVmA=="],"ARC-Authentication-Results":["i=2; smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=windriver.com;\n spf=pass smtp.mailfrom=windriver.com;\n dkim=pass (2048-bit key) header.d=windriver.com header.i=@windriver.com\n header.b=HBF/fQpA; arc=fail smtp.client-ip=205.220.166.238","i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=windriver.com; dmarc=pass action=none\n header.from=windriver.com; dkim=pass header.d=windriver.com; arc=none"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=windriver.com;\n\t h=cc:content-transfer-encoding:content-type:date:from\n\t:message-id:mime-version:subject:to; s=PPS06212021; bh=yVt1lXOjo\n\tqKJOt3Sluka4whKxntqJUUMLjccwd7PEZI=; b=HBF/fQpAojdE+V+oNwCbkR1Ch\n\tOUPJmTK5Q+LT/p7gfoJwWIi52UOIRAmwJTQfs2OjuO/4qeuefMS1Lt+hr0bBjrFR\n\tYvnNgrk4d75ly8ExXw9Y9LpHnw77dqK7nhvHwUQLnuYawRLE9/Fpr1OCTiYUB4pm\n\t5ow8L091bA66Et5LbbrBHJMtsAO/sNgZECD1cqS1D1w0UFp1sXx3aGHx4VZ0qQKP\n\tW4AygzZ3qBOeS+7hjB1Coj7VifWIzDgyjbJJ6h5aqkXMqHsnGgDY1Vlb7NbqSm8r\n\t/p5HMaDtGN3UC2DRiAlFIqazONOJ3JUahTbCxHxiOqJQe9iHFA3Lbl4qasn6A==","From":"\"Ionut Nechita (Wind River)\" <ionut.nechita@windriver.com>","To":"linux-pci@vger.kernel.org, bhelgaas@google.com","Cc":"helgaas@kernel.org, sebott@linux.ibm.com, schnelle@linux.ibm.com,\n        bblock@linux.ibm.com, linux@roeck-us.net, lukas@wunner.de,\n        stable@vger.kernel.org, linux-kernel@vger.kernel.org,\n        intel-xe@lists.freedesktop.org, matthew.brost@intel.com,\n        michal.wajdeczko@intel.com, piotr.piorkowski@intel.com,\n        dtatulea@nvidia.com, mani@kernel.org, kbusch@kernel.org,\n        lkml@mageta.org, alifm@linux.ibm.com, julianr@linux.ibm.com,\n        ionut_n2001@yahoo.com, sunlightlinux@gmail.com","Subject":"[PATCH v12 0/2] PCI/IOV: Fix SR-IOV locking races and AB-BA deadlock","Date":"Tue, 21 Apr 2026 10:19:30 +0300","Message-ID":"<cover.1776755661.git.ionut.nechita@windriver.com>","X-Mailer":"git-send-email 2.53.0","Content-Transfer-Encoding":"8bit","Content-Type":"text/plain","X-ClientProxiedBy":"VIXP296CA0001.AUTP296.PROD.OUTLOOK.COM\n (2603:10a6:800:2a9::16) To SJ2PR11MB7546.namprd11.prod.outlook.com\n (2603:10b6:a03:4cc::8)","Precedence":"bulk","X-Mailing-List":"linux-pci@vger.kernel.org","List-Id":"<linux-pci.vger.kernel.org>","List-Subscribe":"<mailto:linux-pci+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:linux-pci+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","X-MS-PublicTrafficType":"Email","X-MS-TrafficTypeDiagnostic":"SJ2PR11MB7546:EE_|MN2PR11MB4695:EE_","X-MS-Office365-Filtering-Correlation-Id":"3ac0bb47-747f-4f8b-d46a-08de9f76645c","X-MS-Exchange-SenderADCheck":"1","X-MS-Exchange-AntiSpam-Relay":"0","X-Microsoft-Antispam":"\n\tBCL:0;ARA:13230040|366016|376014|7416014|52116014|10070799003|1800799024|56012099003|18002099003;","X-Microsoft-Antispam-Message-Info":"\n\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","X-Forefront-Antispam-Report":"\n\tCIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SJ2PR11MB7546.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(376014)(7416014)(52116014)(10070799003)(1800799024)(56012099003)(18002099003);DIR:OUT;SFP:1101;","X-MS-Exchange-AntiSpam-MessageData-ChunkCount":"2","X-MS-Exchange-AntiSpam-MessageData-0":"\n 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","X-MS-Exchange-AntiSpam-MessageData-1":"IRF/gzUJRgf9FCwjQ5fTDD2QMIT7h0UV1uE=","X-Exchange-RoutingPolicyChecked":"\n\tY47rKQZQozsnexzzA918Jw6KFnhQ9XRYf69r4E/WnxHnA6iNbJMD44lzij8/MBhiwYnGlPJWl+t4MLieXjY3uCzQ8oEbWwTXyXkU4/MdQgmxKxdwsck3jKIpeqJOfddOhvlfOj22fgARLuarcz2W1xeAITa4ESFa6fRCChJD3ByowC+BIjh/ImJNa8yyHV8aL7/FpJ7MDNpWvShF0nWWbGPlQxyrapLH58rPGzmw5fYvk8wwutE0Gd+0Z5UT1u6bdkNtBDtAyHuipIpRwSFOW3Bp/KLtMY0IrNHGfhhE5tDxmkWw8hZfM69nSQDCaZ0BXUSlRvr3K9rvAekwt3TSAg==","X-OriginatorOrg":"windriver.com","X-MS-Exchange-CrossTenant-Network-Message-Id":"\n 3ac0bb47-747f-4f8b-d46a-08de9f76645c","X-MS-Exchange-CrossTenant-AuthSource":"SJ2PR11MB7546.namprd11.prod.outlook.com","X-MS-Exchange-CrossTenant-AuthAs":"Internal","X-MS-Exchange-CrossTenant-OriginalArrivalTime":"21 Apr 2026 07:19:57.9947\n (UTC)","X-MS-Exchange-CrossTenant-FromEntityHeader":"Hosted","X-MS-Exchange-CrossTenant-Id":"8ddb2873-a1ad-4a18-ae4e-4644631433be","X-MS-Exchange-CrossTenant-MailboxType":"HOSTED","X-MS-Exchange-CrossTenant-UserPrincipalName":"\n L6SyyJWbdN+BG3qLWcVqNKf0VxQEqdDMMxbGIhngnyc2HYmj1ubOnj0IWsz9rERUAY72ZT+e9ziQxhsBWAMMxQN0m/NlCZWG46uPzOhGDrA=","X-MS-Exchange-Transport-CrossTenantHeadersStamped":"MN2PR11MB4695","X-Proofpoint-ORIG-GUID":"ruGxn52gBBFYsz6Iylis3ia3enobIo7k","X-Proofpoint-GUID":"ruGxn52gBBFYsz6Iylis3ia3enobIo7k","X-Proofpoint-Spam-Details-Enc":"AW1haW4tMjYwNDIxMDA3MCBTYWx0ZWRfX3VKP3ENjozZH\n Jog+W8WZKhj8ImuBOLJoDkH+0TBclcv3aP5/cQMn7NicciBFEnLzvZPai7oMsHrVWf8bsQAIeX+\n bLkErA19UnBgD47QsJtohnckVZV5lShEls7EZJXO/VdkcTbjLBbqIJWeL3URbPzpczAGC6yli5t\n 9MhiDWKU75Ea9ewWsVcec7A2bs/ehd37UgLe9nFp++VKFWAiFflly6hRvQfKDeWz3Q3CC849EEd\n 33k0I5sKJVim8fYqFnnhFe7/ip+7svrz3tdNiNf8SfnOu7OwAxuaHrQC86abG+bPF9c+tE7uIBM\n zMuKQ+h64HKznjVfsPxrppJ+CsHH7QSvqfzf7/ZK6nXH5+jn+GA8dXT+xi6vwpGokJDmP6kzFIw\n pv8QsIZ9IOKUstda2BQBCF6151WiGn3eCS1ItSBn7hDZWMXFjseeMJCkhHSmuFPd4nm/1U/GGV4\n qRBUs805NBmJyWfsJdQ==","X-Authority-Analysis":"v=2.4 cv=WKZPmHsR c=1 sm=1 tr=0 ts=69e72522 cx=c_pps\n a=eN70jGNn7EKSdYhrfilGAg==:117 a=6eWqkTHjU83fiwn7nKZWdM+Sl24=:19\n a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19\n a=xqWC_Br6kY4A:10 a=A5OVakUREuEA:10 a=VkNPw1HP01LnGYTKEx00:22\n a=bi6dqmuHe4P4UrxVR6um:22 a=iKiJcTA2PjBS6x5JeXcw:22 a=VwQbUJbxAAAA:8\n a=VnNF1IyMAAAA:8 a=t7CeM3EgAAAA:8 a=0kW7uK-nrfiYIzTTHL0A:9\n a=FdTzh2GWekK77mhwV6Dw:22","X-Proofpoint-Virus-Version":"vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-04-21_01,2026-04-20_02,2025-10-01_01","X-Proofpoint-Spam-Details":"rule=outbound_notspam policy=outbound score=0\n clxscore=1015 suspectscore=0 bulkscore=0 impostorscore=0 phishscore=0\n spamscore=0 adultscore=0 malwarescore=0 priorityscore=1501 lowpriorityscore=0\n classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0\n reason=mlx scancount=1 engine=8.22.0-2604070000 definitions=main-2604210070"},"content":"From: Ionut Nechita <ionut.nechita@windriver.com>\n\nHi Bjorn,\n\nThis is v12 of the fix for the SR-IOV race between driver .remove()\nand concurrent hotplug events.\n\nChanges since v11 (Mar 26):\n  - Patch 2/2: added Reviewed-by from Niklas Schnelle (IBM) and\n    Reviewed-by + Tested-by from Benjamin Block (IBM)\n  - Rebased on linux-next (next-20260420)\n  - No code changes\n\nChanges since v10 (Mar 18):\n  - Patch 2/2: added kill_device() before device_release_driver() to\n    prevent a new driver from binding between unbind and removal,\n    closing the TOCTOU race window identified by Benjamin Block\n  - Patch 1/2 unchanged from v10\n\nChanges since v9 (Mar 10):\n  - NEW patch 2/2: fix AB-BA deadlock in remove_store() by calling\n    device_release_driver() before pci_stop_and_remove_bus_device_locked(),\n    as suggested by Benjamin Block (addresses Guenter Roeck's report)\n  - Patch 1/2 unchanged from v9\n\nChanges since v8 (Mar 9):\n  - Added Reviewed-by from Niklas Schnelle (IBM) and Tested-by (s390)\n  - Added Fixes tags for the three related commits\n  - Removed rescan/remove locking from sriov_numvfs_store() since\n    locking is now handled in sriov_add_vfs() and sriov_del_vfs()\n  - Rebased on linux-next (20260309)\n\nThe AB-BA deadlock:\n\n  CPU0 (remove_store)               CPU1 (unbind_store)\n  --------------------              --------------------\n  pci_lock_rescan_remove()\n                                    device_lock()\n                                    driver .remove()\n                                      sriov_del_vfs()\n                                        pci_lock_rescan_remove()  <-- WAITS\n  pci_stop_bus_device()\n    device_release_driver()\n      device_lock()                                               <-- WAITS\n\nPatch 2/2 fixes this by:\n  1. Marking the device as dead via kill_device() so no new driver\n     can bind (prevents TOCTOU race between unbind and removal)\n  2. Calling device_release_driver() before\n     pci_stop_and_remove_bus_device_locked(), so both paths take\n     locks in the same order: device_lock first, then\n     pci_rescan_remove_lock\n\nNote: the concurrent unbind_store + hotplug-event case (where the\nhotplug handler takes pci_rescan_remove_lock before device_lock)\nremains a known limitation.  This is a pre-existing issue that\nBenjamin Block is addressing separately in:\n  https://lore.kernel.org/linux-pci/354b9e4a54ced67f3c89df198041df19434fe4c8.1773235561.git.bblock@linux.ibm.com/\n\nThis race has been independently observed by multiple organizations:\n  - IBM (s390 platform-generated hot-unplug events racing with\n    sriov_del_vfs during PF driver unload)\n  - NVIDIA (tested by Dragos Tatulea in earlier versions)\n  - Intel (xe driver hitting lockdep warnings and deadlocks when\n    calling pci_disable_sriov from .remove)\n  - Wind River (original reporter and patch author)\n\nTest environment:\n  - Tested on s390 by Benjamin Block and Niklas Schnelle (IBM)\n  - Tested on x86_64 with Intel and NVIDIA SR-IOV devices (earlier\n    versions)\n\nBased on linux-next (next-20260420).\n\nLink: https://lore.kernel.org/linux-pci/20260214193235.262219-3-ionut.nechita@windriver.com/ [v1]\nLink: https://lore.kernel.org/linux-pci/20260219212648.82606-1-ionut.nechita@windriver.com/ [v2]\nLink: https://lore.kernel.org/lkml/20260225202434.18737-1-ionut.nechita@windriver.com/ [v3]\nLink: https://lore.kernel.org/linux-pci/20260228120138.51197-2-ionut.nechita@windriver.com/ [v4]\nLink: https://lore.kernel.org/linux-pci/20260303080903.28693-1-ionut.nechita@windriver.com/ [v5]\nLink: https://lore.kernel.org/linux-pci/20260306082108.17322-1-ionut.nechita@windriver.com/ [v6]\nLink: https://lore.kernel.org/linux-pci/20260308135352.80346-1-ionut.nechita@windriver.com/ [v7]\nLink: https://lore.kernel.org/linux-pci/20260309194920.16459-1-ionut.nechita@windriver.com/ [v8]\nLink: https://lore.kernel.org/linux-pci/20260310074303.17480-1-ionut.nechita@windriver.com/ [v9]\nLink: https://lore.kernel.org/linux-pci/20260318210316.61975-1-ionut.nechita@windriver.com/ [v10]\nLink: https://lore.kernel.org/linux-pci/20260326083534.23602-1-ionut.nechita@windriver.com/ [v11]\n\nIonut Nechita (Wind River) (2):\n  PCI/IOV: Make pci_lock_rescan_remove() reentrant and protect\n    sriov_add_vfs/sriov_del_vfs\n  PCI: Fix AB-BA deadlock between device_lock and pci_rescan_remove_lock\n    in remove_store\n\n drivers/pci/iov.c       |  9 +++++----\n drivers/pci/pci-sysfs.c | 30 +++++++++++++++++++++++++++++-\n drivers/pci/probe.c     | 11 +++++++++--\n 3 files changed, 43 insertions(+), 7 deletions(-)"}