lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <c9439528-7185-4383-be62-e9d1cea87811@intel.com>
Date: Thu, 29 Jan 2026 15:02:43 -0800
From: Jacob Keller <jacob.e.keller@...el.com>
To: Anshumali Gaur <agaur@...vell.com>, <netdev@...r.kernel.org>,
	<linux-kernel@...r.kernel.org>
CC: Sunil Goutham <sgoutham@...vell.com>, Linu Cherian <lcherian@...vell.com>,
	Geetha sowjanya <gakula@...vell.com>, Jerin Jacob <jerinj@...vell.com>,
	hariprasad <hkelam@...vell.com>, Subbaraya Sundeep <sbhatta@...vell.com>,
	Andrew Lunn <andrew+netdev@...n.ch>, "David S. Miller" <davem@...emloft.net>,
	Eric Dumazet <edumazet@...gle.com>, Jakub Kicinski <kuba@...nel.org>, "Paolo
 Abeni" <pabeni@...hat.com>
Subject: Re: [PATCH] octeontx2-af: Fix PF driver crash with kexec kernel
 booting



On 1/29/2026 1:19 AM, Anshumali Gaur wrote:
> When both AF and PF drivers are built as modules, the PF driver in the
> kexec kernel may probe before the AF driver is ready. This leads to
> a crash due to uninitialized hardware state.
> 
> This patch ensures the PF driver properly detects and waits for AF
> driver readiness before proceeding with initialization.
> 

To me, the patch description is not sufficient to describe the what and 
why of this change.

Could you please provide a better explanation of how the addition of the 
provided shutdown handler fixes initialization?

> Fixes: 54494aa5d1e6 ("octeontx2-af: Add Marvell OcteonTX2 RVU AF driver")
> Signed-off-by: Anshumali Gaur <agaur@...vell.com>
> ---
>   drivers/net/ethernet/marvell/octeontx2/af/rvu.c | 11 +++++++++++
>   1 file changed, 11 insertions(+)
> 
> diff --git a/drivers/net/ethernet/marvell/octeontx2/af/rvu.c b/drivers/net/ethernet/marvell/octeontx2/af/rvu.c
> index 747fbdf2a908..8530df8b3fda 100644
> --- a/drivers/net/ethernet/marvell/octeontx2/af/rvu.c
> +++ b/drivers/net/ethernet/marvell/octeontx2/af/rvu.c
> @@ -3632,11 +3632,22 @@ static void rvu_remove(struct pci_dev *pdev)
>   	devm_kfree(&pdev->dev, rvu);
>   }
>   
> +static void rvu_shutdown(struct pci_dev *pdev)
> +{
> +	struct rvu *rvu = pci_get_drvdata(pdev);
> +
> +	if (!rvu)
> +		return;
> +
> +	rvu_clear_rvum_blk_revid(rvu);

Here, I guess you are clearing some data about the device status. Does 
that mean that when you initialize later you will wait for the AF driver 
to finish probing and configure this? It would be nice to explain how 
this change fixes initialization.

> +}
> +
>   static struct pci_driver rvu_driver = {
>   	.name = DRV_NAME,
>   	.id_table = rvu_id_table,
>   	.probe = rvu_probe,
>   	.remove = rvu_remove,
> +	.shutdown = rvu_shutdown,

This is the shutdown handler:
> 
>  * @shutdown:   Hook into reboot_notifier_list (kernel/sys.c).
>  *              Intended to stop any idling DMA operations.
>  *              Useful for enabling wake-on-lan (NIC) or changing
>  *              the power state of a device before reboot.
>  *              e.g. drivers/net/e100.c.

How does this have anything to do with initialization?

>   };
>   
>   static int __init rvu_init_module(void)


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ