Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/2214380/?format=api
{ "id": 2214380, "url": "http://patchwork.ozlabs.org/api/patches/2214380/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linuxppc-dev/patch/20260321053121.614022-1-sourabhjain@linux.ibm.com/", "project": { "id": 2, "url": "http://patchwork.ozlabs.org/api/projects/2/?format=api", "name": "Linux PPC development", "link_name": "linuxppc-dev", "list_id": "linuxppc-dev.lists.ozlabs.org", "list_email": "linuxppc-dev@lists.ozlabs.org", "web_url": "https://github.com/linuxppc/wiki/wiki", "scm_url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git", "webscm_url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/", "list_archive_url": "https://lore.kernel.org/linuxppc-dev/", "list_archive_url_format": "https://lore.kernel.org/linuxppc-dev/{}/", "commit_url_format": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id={}" }, "msgid": "<20260321053121.614022-1-sourabhjain@linux.ibm.com>", "list_archive_url": "https://lore.kernel.org/linuxppc-dev/20260321053121.614022-1-sourabhjain@linux.ibm.com/", "date": "2026-03-21T05:31:17", "name": "[1/2] powerpc/kdump: fix KASAN sanitization flag for core_$(BITS).o", "commit_ref": null, "pull_url": null, "state": "changes-requested", "archived": false, "hash": "99a804af0bc9a81beb6bc5774553a5d21b4091e5", "submitter": { "id": 77202, "url": "http://patchwork.ozlabs.org/api/people/77202/?format=api", "name": "Sourabh Jain", "email": "sourabhjain@linux.ibm.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/linuxppc-dev/patch/20260321053121.614022-1-sourabhjain@linux.ibm.com/mbox/", "series": [ { "id": 496950, "url": "http://patchwork.ozlabs.org/api/series/496950/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linuxppc-dev/list/?series=496950", "date": "2026-03-21T05:31:17", "name": "[1/2] powerpc/kdump: fix KASAN sanitization flag for core_$(BITS).o", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/496950/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2214380/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2214380/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "\n <linuxppc-dev+bounces-18534-incoming=patchwork.ozlabs.org@lists.ozlabs.org>", "X-Original-To": [ "incoming@patchwork.ozlabs.org", "linuxppc-dev@lists.ozlabs.org" ], "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=ibm.com header.i=@ibm.com header.a=rsa-sha256\n header.s=pp1 header.b=bZvzwRZd;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ozlabs.org\n (client-ip=2404:9400:21b9:f100::1; helo=lists.ozlabs.org;\n envelope-from=linuxppc-dev+bounces-18534-incoming=patchwork.ozlabs.org@lists.ozlabs.org;\n receiver=patchwork.ozlabs.org)", "lists.ozlabs.org;\n arc=none smtp.remote-ip=148.163.156.1", "lists.ozlabs.org;\n dmarc=pass (p=none dis=none) header.from=linux.ibm.com", "lists.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=ibm.com header.i=@ibm.com header.a=rsa-sha256\n header.s=pp1 header.b=bZvzwRZd;\n\tdkim-atps=neutral", "lists.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=linux.ibm.com\n (client-ip=148.163.156.1; helo=mx0a-001b2d01.pphosted.com;\n envelope-from=sourabhjain@linux.ibm.com; receiver=lists.ozlabs.org)" ], "Received": [ "from lists.ozlabs.org (lists.ozlabs.org\n [IPv6:2404:9400:21b9:f100::1])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fd7NF5NF4z1xy1\n\tfor <incoming@patchwork.ozlabs.org>; Sat, 21 Mar 2026 16:31:57 +1100 (AEDT)", "from boromir.ozlabs.org (localhost [127.0.0.1])\n\tby lists.ozlabs.org (Postfix) with ESMTP id 4fd7NC06JVz2ygn;\n\tSat, 21 Mar 2026 16:31:55 +1100 (AEDT)", "from mx0a-001b2d01.pphosted.com (mx0a-001b2d01.pphosted.com\n [148.163.156.1])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n\t(No client certificate requested)\n\tby lists.ozlabs.org (Postfix) with ESMTPS id 4fd7N93f66z2xP9\n\tfor <linuxppc-dev@lists.ozlabs.org>; Sat, 21 Mar 2026 16:31:52 +1100 (AEDT)", "from pps.filterd (m0353729.ppops.net [127.0.0.1])\n\tby mx0a-001b2d01.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id\n 62L3sFSh4146040;\n\tSat, 21 Mar 2026 05:31:39 GMT", "from ppma23.wdc07v.mail.ibm.com\n (5d.69.3da9.ip4.static.sl-reverse.com [169.61.105.93])\n\tby mx0a-001b2d01.pphosted.com (PPS) with ESMTPS id 4d1ktxg6dn-1\n\t(version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT);\n\tSat, 21 Mar 2026 05:31:38 +0000 (GMT)", "from pps.filterd (ppma23.wdc07v.mail.ibm.com [127.0.0.1])\n\tby ppma23.wdc07v.mail.ibm.com (8.18.1.2/8.18.1.2) with ESMTP id\n 62L449Qg006315;\n\tSat, 21 Mar 2026 05:31:37 GMT", "from smtprelay02.fra02v.mail.ibm.com ([9.218.2.226])\n\tby ppma23.wdc07v.mail.ibm.com (PPS) with ESMTPS id 4cwkgktkf4-1\n\t(version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT);\n\tSat, 21 Mar 2026 05:31:37 +0000", "from smtpav04.fra02v.mail.ibm.com (smtpav04.fra02v.mail.ibm.com\n [10.20.54.103])\n\tby smtprelay02.fra02v.mail.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id\n 62L5VXJ340632678\n\t(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);\n\tSat, 21 Mar 2026 05:31:33 GMT", "from smtpav04.fra02v.mail.ibm.com (unknown [127.0.0.1])\n\tby IMSVA (Postfix) with ESMTP id C0ECB20043;\n\tSat, 21 Mar 2026 05:31:33 +0000 (GMT)", "from smtpav04.fra02v.mail.ibm.com (unknown [127.0.0.1])\n\tby IMSVA (Postfix) with ESMTP id C12E220040;\n\tSat, 21 Mar 2026 05:31:29 +0000 (GMT)", "from li-4f5ba44c-27d4-11b2-a85c-a08f5b49eada.ibm.com.domain.name\n (unknown [9.124.222.162])\n\tby smtpav04.fra02v.mail.ibm.com (Postfix) with ESMTP;\n\tSat, 21 Mar 2026 05:31:29 +0000 (GMT)" ], "ARC-Seal": "i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707; t=1774071114;\n\tcv=none;\n b=Dbvk8W+UUBxbf+jrPZrUZjhNvbUqexowkyPJ/sUSeV5KTwqm/hEVqHVi6f9ioJqBp+JLE/dZeGM9Kw4m26L3d+OWzCBhfuUKCwB0vA+e4g5Y/+sNRF5HEyEYyO1P9ZtoSiEq+U/GyRV/l/folLmELv284w4AuPyzg3AlbRZgO5NBvYzRuxnb3egaTmoXYvOr1a/tMZI+40yHx+h+FyWvR/FjjiRLd6f7q6YGzyUMRANH1Hn6X9OI+BancNmAeVo4HAgHicL2kB9yEg2BZjAX+D0K0+rTmtE5W4jRVhyS/yMUAOUTxURXGv5FlnOzFKnyp5g4gwVRmalldZZgzZ7cfw==", "ARC-Message-Signature": "i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707;\n\tt=1774071114; c=relaxed/relaxed;\n\tbh=cIYxnN9MOeKKWDKDK/F6SLeoGpu1U4pJOkgZ/mNra3E=;\n\th=From:To:Cc:Subject:Date:Message-ID:MIME-Version:Content-Type;\n b=BM3l/Jf7GjllBiZFeMriCiMO9IRk1ZsY7ueu1Ofdxbef+rNdhShpARQTw7t6YaJue2DLoeYJ0fmo4smJMoM/FV9b523e8TYQWCvhxAktyN2JUhzdtRCjTRqZzgayoNfhyXc6kN0pN6LAZvobAF3+3iTnEFoilTsJL1NlIofrpY9XPOvsgYy4v8oaDcEOulr4nY0KzpzPi3s4n4C9m4fWu/Hs2t7PxYcF5BbPT42DhVJsQBhvkTQWaYZoXH80mwUtS8TjhKYzjxVu9l8bvxw+qt4871jLsKbp6R8ycRQksXeSN7s1nDW/bKmQUD+G5vVONk8EmU5mS8l7lpetH6ffJQ==", "ARC-Authentication-Results": "i=1; lists.ozlabs.org;\n dmarc=pass (p=none dis=none) header.from=linux.ibm.com;\n dkim=pass (2048-bit key;\n unprotected) header.d=ibm.com header.i=@ibm.com header.a=rsa-sha256\n header.s=pp1 header.b=bZvzwRZd; dkim-atps=neutral;\n spf=pass (client-ip=148.163.156.1; helo=mx0a-001b2d01.pphosted.com;\n envelope-from=sourabhjain@linux.ibm.com;\n receiver=lists.ozlabs.org) smtp.mailfrom=linux.ibm.com", "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=cc\n\t:content-transfer-encoding:content-type:date:from:message-id\n\t:mime-version:subject:to; s=pp1; bh=cIYxnN9MOeKKWDKDK/F6SLeoGpu1\n\tU4pJOkgZ/mNra3E=; b=bZvzwRZd1XLSAw6DPxyqBO/uLGzQenqsCPxhHUUj+PYH\n\tuxPUYdqnZS5z5Ytel/tUydpDyCbP1DkZBMCR8kf9W9jo4RwIp/Gmpa7lrwCoM3we\n\tpVuvKSa37ZUu/ipiv54dwWTG9ein8KOq9eiXO8eq2jCfrdt97CBx/ZBcYxP+vHXK\n\tSzfsMVVAC6s2mVNxeDTifKFxtmMpszfMoYpCI9NCMTQu5twXfkHXGT90uNJ5aJ/d\n\tSZxQuCzD+p9NJohQi+Oz/X0SNY59NyEP92ZRb1g5y17GdujRBDix5Caa2jP58M21\n\tSttyIkSOUvS03YfEjElJKF0CSOs6KwpXcQJKmxtSdQ==", "From": "Sourabh Jain <sourabhjain@linux.ibm.com>", "To": "linuxppc-dev@lists.ozlabs.org", "Cc": "Sourabh Jain <sourabhjain@linux.ibm.com>,\n Venkat Rao Bagalkote <venkat88@linux.ibm.com>,\n Aboorva Devarajan <aboorvad@linux.ibm.com>,\n Aditya Gupta <adityag@linux.ibm.com>, Daniel Axtens <dja@axtens.net>,\n Hari Bathini <hbathini@linux.ibm.com>,\n Madhavan Srinivasan <maddy@linux.ibm.com>,\n Mahesh Salgaonkar <mahesh@linux.ibm.com>,\n Michael Ellerman <mpe@ellerman.id.au>,\n \"Ritesh Harjani (IBM)\" <ritesh.list@gmail.com>,\n Shivang Upadhyay <shivangu@linux.ibm.com>", "Subject": "[PATCH 1/2] powerpc/kdump: fix KASAN sanitization flag for\n core_$(BITS).o", "Date": "Sat, 21 Mar 2026 11:01:17 +0530", "Message-ID": "<20260321053121.614022-1-sourabhjain@linux.ibm.com>", "X-Mailer": "git-send-email 2.52.0", "X-Mailing-List": "linuxppc-dev@lists.ozlabs.org", "List-Id": "<linuxppc-dev.lists.ozlabs.org>", "List-Help": "<mailto:linuxppc-dev+help@lists.ozlabs.org>", "List-Owner": "<mailto:linuxppc-dev+owner@lists.ozlabs.org>", "List-Post": "<mailto:linuxppc-dev@lists.ozlabs.org>", "List-Archive": "<https://lore.kernel.org/linuxppc-dev/>,\n <https://lists.ozlabs.org/pipermail/linuxppc-dev/>", "List-Subscribe": "<mailto:linuxppc-dev+subscribe@lists.ozlabs.org>,\n <mailto:linuxppc-dev+subscribe-digest@lists.ozlabs.org>,\n <mailto:linuxppc-dev+subscribe-nomail@lists.ozlabs.org>", "List-Unsubscribe": "<mailto:linuxppc-dev+unsubscribe@lists.ozlabs.org>", "Precedence": "list", "MIME-Version": "1.0", "Content-Type": "text/plain; charset=y", "Content-Transfer-Encoding": "8bit", "X-TM-AS-GCONF": "00", "X-Proofpoint-Reinject": "loops=2 maxloops=12", "X-Authority-Analysis": "v=2.4 cv=IqITsb/g c=1 sm=1 tr=0 ts=69be2d3b cx=c_pps\n a=3Bg1Hr4SwmMryq2xdFQyZA==:117 a=3Bg1Hr4SwmMryq2xdFQyZA==:17\n a=qf4gfuq51q0A:10 a=Yq5XynenixoA:10 a=VkNPw1HP01LnGYTKEx00:22\n a=RnoormkPH1_aCDwRdu11:22 a=uAbxVGIbfxUO_5tXvNgY:22 a=VwQbUJbxAAAA:8\n a=VnNF1IyMAAAA:8 a=JuTF4qcAAAAA:8 a=pGLkceISAAAA:8 a=t0Qa3vZ5fVEj1awjsuUA:9\n a=3ZKOabzyN94A:10 a=k40Crp0UdiQA:10 a=WlT8qwTXB_Kj6um4hl3b:22", "X-Proofpoint-Spam-Details-Enc": "AW1haW4tMjYwMzIxMDA0MCBTYWx0ZWRfX37Xoklecv4m+\n CsGZTzUmuGdHnvs5I+tooYDjTUseOuvkpSQKGdzD+KQOBHgSQBO+cLSfFXxGwYyxkjZ5u105U0f\n DD/n1oyPO/5sbPCVZ0WlWAnW5Wlqsg+FSyivIguO9/z10kVPvIZRMvwF/4OapCKtwmyXeqh7QPl\n 1x3ny12brfb8GoVOimuQCIm4xXY/UDIM44xQYTd3r4mUoaZGBXqcMwuHfiV5kXOxqSBFEiFZCMG\n /h3Ly655p/SithQzW4fLH2SNmnkRXDwh2VtJMFjKzoOF+jntuWbsluSlrZXEP6s6C+w/QlwRuW6\n X5e4k49nfW6UBYhCqama3gVMoxnELJBkq5vB0v7r154qhBSrS0TlDyF2nmaOJCrdsYl2bv4lTsR\n Q9gMdEoCaccOgEmPhMVoFFSzraJ34Us60BLObt3kALwyT0v7FM2dWXFTjG5U3KgoISQ0ON2UUsY\n 21pbFM+XMM9aWOjBb5g==", "X-Proofpoint-GUID": "OwKcb6BrtJHqXgwbOxatl3kzDiBfkKyB", "X-Proofpoint-ORIG-GUID": "NIvEsZX8PoV7upU3Tz8e5Ox8gkC4x8DJ", "X-Proofpoint-Virus-Version": "vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-03-21_02,2026-03-20_02,2025-10-01_01", "X-Proofpoint-Spam-Details": "rule=outbound_notspam policy=outbound score=0\n malwarescore=0 clxscore=1011 spamscore=0 impostorscore=0 suspectscore=0\n phishscore=0 bulkscore=0 adultscore=0 priorityscore=1501 lowpriorityscore=0\n classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0\n reason=mlx scancount=1 engine=8.22.0-2603050001 definitions=main-2603210040", "X-Spam-Status": "No, score=-0.7 required=3.0 tests=DKIM_SIGNED,DKIM_VALID,\n\tRCVD_IN_DNSWL_LOW,RCVD_IN_MSPIKE_H4,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,\n\tSPF_PASS autolearn=disabled version=4.0.1 OzLabs 8", "X-Spam-Checker-Version": "SpamAssassin 4.0.1 (2024-03-25) on lists.ozlabs.org" }, "content": "KASAN instrumentation is intended to be disabled for the kexec core\ncode, but the existing Makefile entry misses the object suffix. As a\nresult, the flag is not applied correctly to core_$(BITS).o.\n\nSo when KASAN is enabled, kexec_copy_flush and copy_segments in\nkexec/core_64.c are instrumented, which can result in accesses to\nshadow memory via normal address translation paths. Since these run\nwith the MMU disabled, such accesses may trigger page faults\n(bad_page_fault) that cannot be handled in the kdump path, ultimately\ncausing a hang and preventing the kdump kernel from booting. The same\nis true for kexec as well, since the same functions are used there.\n\nUpdate the entry to include the “.o” suffix so that KASAN\ninstrumentation is properly disabled for this object file.\n\nFixes: 2ab2d5794f14 (\"powerpc/kasan: Disable address sanitization in kexec paths\")\nReported-by: Venkat Rao Bagalkote <venkat88@linux.ibm.com>\nCloses: https://lore.kernel.org/all/1dee8891-8bcc-46b4-93f3-fc3a774abd5b@linux.ibm.com/\nCc: Aboorva Devarajan <aboorvad@linux.ibm.com>\nCc: Aditya Gupta <adityag@linux.ibm.com>\nCc: Daniel Axtens <dja@axtens.net>\nCc: Hari Bathini <hbathini@linux.ibm.com>\nCc: Madhavan Srinivasan <maddy@linux.ibm.com>\nCc: Mahesh Salgaonkar <mahesh@linux.ibm.com>\nCc: Michael Ellerman <mpe@ellerman.id.au>\nCc: Ritesh Harjani (IBM) <ritesh.list@gmail.com>\nCc: Shivang Upadhyay <shivangu@linux.ibm.com>\nSigned-off-by: Sourabh Jain <sourabhjain@linux.ibm.com>\n---\n arch/powerpc/kexec/Makefile | 2 +-\n 1 file changed, 1 insertion(+), 1 deletion(-)", "diff": "diff --git a/arch/powerpc/kexec/Makefile b/arch/powerpc/kexec/Makefile\nindex 470eb0453e17..ec7a0eed75dc 100644\n--- a/arch/powerpc/kexec/Makefile\n+++ b/arch/powerpc/kexec/Makefile\n@@ -16,4 +16,4 @@ GCOV_PROFILE_core_$(BITS).o := n\n KCOV_INSTRUMENT_core_$(BITS).o := n\n UBSAN_SANITIZE_core_$(BITS).o := n\n KASAN_SANITIZE_core.o := n\n-KASAN_SANITIZE_core_$(BITS) := n\n+KASAN_SANITIZE_core_$(BITS).o := n\n", "prefixes": [ "1/2" ] }