Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/2219686/?format=api
{ "id": 2219686, "url": "http://patchwork.ozlabs.org/api/patches/2219686/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linuxppc-dev/patch/20260403190123.1383198-1-sourabhjain@linux.ibm.com/", "project": { "id": 2, "url": "http://patchwork.ozlabs.org/api/projects/2/?format=api", "name": "Linux PPC development", "link_name": "linuxppc-dev", "list_id": "linuxppc-dev.lists.ozlabs.org", "list_email": "linuxppc-dev@lists.ozlabs.org", "web_url": "https://github.com/linuxppc/wiki/wiki", "scm_url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git", "webscm_url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/", "list_archive_url": "https://lore.kernel.org/linuxppc-dev/", "list_archive_url_format": "https://lore.kernel.org/linuxppc-dev/{}/", "commit_url_format": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id={}" }, "msgid": "<20260403190123.1383198-1-sourabhjain@linux.ibm.com>", "list_archive_url": "https://lore.kernel.org/linuxppc-dev/20260403190123.1383198-1-sourabhjain@linux.ibm.com/", "date": "2026-04-03T19:01:15", "name": "[v2,1/2] powerpc/kdump: fix KASAN sanitization flag for core_$(BITS).o", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "99a804af0bc9a81beb6bc5774553a5d21b4091e5", "submitter": { "id": 77202, "url": "http://patchwork.ozlabs.org/api/people/77202/?format=api", "name": "Sourabh Jain", "email": "sourabhjain@linux.ibm.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/linuxppc-dev/patch/20260403190123.1383198-1-sourabhjain@linux.ibm.com/mbox/", "series": [ { "id": 498664, "url": "http://patchwork.ozlabs.org/api/series/498664/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linuxppc-dev/list/?series=498664", "date": "2026-04-03T19:01:15", "name": "[v2,1/2] powerpc/kdump: fix KASAN sanitization flag for core_$(BITS).o", "version": 2, "mbox": "http://patchwork.ozlabs.org/series/498664/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2219686/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2219686/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "\n <linuxppc-dev+bounces-19286-incoming=patchwork.ozlabs.org@lists.ozlabs.org>", "X-Original-To": [ "incoming@patchwork.ozlabs.org", "linuxppc-dev@lists.ozlabs.org" ], "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=ibm.com header.i=@ibm.com header.a=rsa-sha256\n header.s=pp1 header.b=bdLYR8IC;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ozlabs.org\n (client-ip=2404:9400:21b9:f100::1; helo=lists.ozlabs.org;\n envelope-from=linuxppc-dev+bounces-19286-incoming=patchwork.ozlabs.org@lists.ozlabs.org;\n receiver=patchwork.ozlabs.org)", "lists.ozlabs.org;\n arc=none smtp.remote-ip=148.163.156.1", "lists.ozlabs.org;\n dmarc=pass (p=none dis=none) header.from=linux.ibm.com", "lists.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=ibm.com header.i=@ibm.com header.a=rsa-sha256\n header.s=pp1 header.b=bdLYR8IC;\n\tdkim-atps=neutral", "lists.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=linux.ibm.com\n (client-ip=148.163.156.1; helo=mx0a-001b2d01.pphosted.com;\n envelope-from=sourabhjain@linux.ibm.com; receiver=lists.ozlabs.org)" ], "Received": [ "from lists.ozlabs.org (lists.ozlabs.org\n [IPv6:2404:9400:21b9:f100::1])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1 raw public key)\n server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fnSkn1tRwz1yCs\n\tfor <incoming@patchwork.ozlabs.org>; Sat, 04 Apr 2026 06:01:51 +1100 (AEDT)", "from boromir.ozlabs.org (localhost [127.0.0.1])\n\tby lists.ozlabs.org (Postfix) with ESMTP id 4fnSkk6WwJz2yjw;\n\tSat, 04 Apr 2026 06:01:50 +1100 (AEDT)", "from mx0a-001b2d01.pphosted.com (mx0a-001b2d01.pphosted.com\n [148.163.156.1])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n\t(No client certificate requested)\n\tby lists.ozlabs.org (Postfix) with ESMTPS id 4fnSkj28rnz2xSF\n\tfor <linuxppc-dev@lists.ozlabs.org>; Sat, 04 Apr 2026 06:01:48 +1100 (AEDT)", "from pps.filterd (m0356517.ppops.net [127.0.0.1])\n\tby mx0a-001b2d01.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id\n 6333qUv5361401;\n\tFri, 3 Apr 2026 19:01:38 GMT", "from ppma22.wdc07v.mail.ibm.com\n (5c.69.3da9.ip4.static.sl-reverse.com [169.61.105.92])\n\tby mx0a-001b2d01.pphosted.com (PPS) with ESMTPS id 4d66q3hwn1-1\n\t(version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT);\n\tFri, 03 Apr 2026 19:01:38 +0000 (GMT)", "from pps.filterd (ppma22.wdc07v.mail.ibm.com [127.0.0.1])\n\tby ppma22.wdc07v.mail.ibm.com (8.18.1.2/8.18.1.2) with ESMTP id\n 633Iu8XJ005757;\n\tFri, 3 Apr 2026 19:01:37 GMT", "from smtprelay02.fra02v.mail.ibm.com ([9.218.2.226])\n\tby ppma22.wdc07v.mail.ibm.com (PPS) with ESMTPS id 4d6spyf93h-1\n\t(version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT);\n\tFri, 03 Apr 2026 19:01:36 +0000", "from smtpav06.fra02v.mail.ibm.com (smtpav06.fra02v.mail.ibm.com\n [10.20.54.105])\n\tby smtprelay02.fra02v.mail.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id\n 633J1Xvb45023634\n\t(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);\n\tFri, 3 Apr 2026 19:01:33 GMT", "from smtpav06.fra02v.mail.ibm.com (unknown [127.0.0.1])\n\tby IMSVA (Postfix) with ESMTP id EE9752004D;\n\tFri, 3 Apr 2026 19:01:32 +0000 (GMT)", "from smtpav06.fra02v.mail.ibm.com (unknown [127.0.0.1])\n\tby IMSVA (Postfix) with ESMTP id 6548020040;\n\tFri, 3 Apr 2026 19:01:28 +0000 (GMT)", "from li-4f5ba44c-27d4-11b2-a85c-a08f5b49eada.ibm.com.domain.name\n (unknown [9.39.18.186])\n\tby smtpav06.fra02v.mail.ibm.com (Postfix) with ESMTP;\n\tFri, 3 Apr 2026 19:01:28 +0000 (GMT)" ], "ARC-Seal": "i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707; t=1775242910;\n\tcv=none;\n b=ZeHYetK7bQUfOZApLQ7wkHThfQejRNdU3f7RtALyIqjQYMZBIJyiNreCkGwi2Lttgs3fm4QtN/sP3O3OchHGVvSveW1jScPGR5NaTXaFkpVMEJoH+q5yxJOKM+4NHYXqgno5Dbml+3QWetqyoLtWeBh1DnS+AQq9BSxnnl3PyXlds+w8m090GUNyt+DgMg7hsjlCqrdon7qR6QP6Z6BUk6rSXUtqC4YqHk5hztT/cKEIOeCtinfIQWkWTFwHCgb0Enot2itmXw3Lhj+dT1/B13pgBCF6y8rrHaOC17Sw52H6mJmYzurzliG6QhxF/l/GHYqHVHx/O4mmKzcNQBCFUA==", "ARC-Message-Signature": "i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707;\n\tt=1775242910; c=relaxed/relaxed;\n\tbh=k0vrgXZq08zHnhqmmfYlO+hu8mNgR9cSbF3OUh9/3GM=;\n\th=From:To:Cc:Subject:Date:Message-ID:MIME-Version:Content-Type;\n b=NIIheGGODceG4DSWZHF9XwVsA392Fo5OmqQzW+OXkXmb+pnTmrGmxAZHnQUb+EJQbrKwCPuNw92y6GGWTTSyPa29ggy+tOplbGycWjIUVD/3cl4Rl3W4BmsCqKTSfmqljI08xzEOprBGojtETvsp3yZGf/FUrKqrodqUVhj5nHch+wOEoTMoc2FFZBMem53Z1ovNYjXgAXx6nxrXZzSHEpqx+2JEUayLsfERnD0aF3zcmgtGDgZB0s7aIrwhtBDH2xqPwyoPRHNIHfX7AmcyBwRhd0qjlrWIydCf6ZF+nAX3M3umJgAZrl6s0qbOqY90lcLM7gLPGoHJ8wlgiXBi9w==", "ARC-Authentication-Results": "i=1; lists.ozlabs.org;\n dmarc=pass (p=none dis=none) header.from=linux.ibm.com;\n dkim=pass (2048-bit key;\n unprotected) header.d=ibm.com header.i=@ibm.com header.a=rsa-sha256\n header.s=pp1 header.b=bdLYR8IC; dkim-atps=neutral;\n spf=pass (client-ip=148.163.156.1; helo=mx0a-001b2d01.pphosted.com;\n envelope-from=sourabhjain@linux.ibm.com;\n receiver=lists.ozlabs.org) smtp.mailfrom=linux.ibm.com", "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=cc\n\t:content-transfer-encoding:content-type:date:from:message-id\n\t:mime-version:subject:to; s=pp1; bh=k0vrgXZq08zHnhqmmfYlO+hu8mNg\n\tR9cSbF3OUh9/3GM=; b=bdLYR8IC44VhXdQyXs+EmMhL3TWOCYuTu4RJoNw5T+8C\n\t3f1zdNDcik8KWiuUPyGw/RGhbBie8YKF2NReO/deZULs5olZwU/kg/LtmR2ZEa9H\n\tDamZ4gfwA9nqfQZkGdswvIcL9KG2ROd+1jV2slspN++j1AP8xFLsIG/KdgatMgm5\n\t6KC36/SxIGSsCyWafqdEWkt0RzmtKjsxizcr7uA5Z9v9Iz8KdL75wmDGeLcZlmtP\n\t4r/ama8CxbF+i9T2JhbNJ0OLbSdXEMkf/+5BxhLTuGUU3zf+Jkl14cLAr6+z2Kxj\n\t2IDbcsCNnE+JgTpbagzJV1+/WklpQ8vPpkycuy9GIw==", "From": "Sourabh Jain <sourabhjain@linux.ibm.com>", "To": "linuxppc-dev@lists.ozlabs.org", "Cc": "Sourabh Jain <sourabhjain@linux.ibm.com>,\n Venkat Rao Bagalkote <venkat88@linux.ibm.com>,\n Aboorva Devarajan <aboorvad@linux.ibm.com>,\n Aditya Gupta <adityag@linux.ibm.com>, Daniel Axtens <dja@axtens.net>,\n Hari Bathini <hbathini@linux.ibm.com>,\n Madhavan Srinivasan <maddy@linux.ibm.com>,\n Michael Ellerman <mpe@ellerman.id.au>,\n Shivang Upadhyay <shivangu@linux.ibm.com>,\n \"Ritesh Harjani (IBM)\" <ritesh.list@gmail.com>,\n Mahesh Salgaonkar <mahesh@linux.ibm.com>", "Subject": "[PATCH v2 1/2] powerpc/kdump: fix KASAN sanitization flag for\n core_$(BITS).o", "Date": "Sat, 4 Apr 2026 00:31:15 +0530", "Message-ID": "<20260403190123.1383198-1-sourabhjain@linux.ibm.com>", "X-Mailer": "git-send-email 2.52.0", "X-Mailing-List": "linuxppc-dev@lists.ozlabs.org", "List-Id": "<linuxppc-dev.lists.ozlabs.org>", "List-Help": "<mailto:linuxppc-dev+help@lists.ozlabs.org>", "List-Owner": "<mailto:linuxppc-dev+owner@lists.ozlabs.org>", "List-Post": "<mailto:linuxppc-dev@lists.ozlabs.org>", "List-Archive": "<https://lore.kernel.org/linuxppc-dev/>,\n <https://lists.ozlabs.org/pipermail/linuxppc-dev/>", "List-Subscribe": "<mailto:linuxppc-dev+subscribe@lists.ozlabs.org>,\n <mailto:linuxppc-dev+subscribe-digest@lists.ozlabs.org>,\n <mailto:linuxppc-dev+subscribe-nomail@lists.ozlabs.org>", "List-Unsubscribe": "<mailto:linuxppc-dev+unsubscribe@lists.ozlabs.org>", "Precedence": "list", "MIME-Version": "1.0", "Content-Type": "text/plain; charset=y", "Content-Transfer-Encoding": "8bit", "X-TM-AS-GCONF": "00", "X-Proofpoint-Reinject": "loops=2 maxloops=12", "X-Proofpoint-GUID": "0B1LHM57XAH5E_ADuzGcKQ6IBHfNj_UG", "X-Authority-Analysis": "v=2.4 cv=frzRpV4f c=1 sm=1 tr=0 ts=69d00e92 cx=c_pps\n a=5BHTudwdYE3Te8bg5FgnPg==:117 a=5BHTudwdYE3Te8bg5FgnPg==:17\n a=qf4gfuq51q0A:10 a=A5OVakUREuEA:10 a=VkNPw1HP01LnGYTKEx00:22\n a=RnoormkPH1_aCDwRdu11:22 a=U7nrCbtTmkRpXpFmAIza:22 a=VwQbUJbxAAAA:8\n a=VnNF1IyMAAAA:8 a=JuTF4qcAAAAA:8 a=pGLkceISAAAA:8 a=Rbr8bO_GjACkDpKrMaMA:9\n a=3ZKOabzyN94A:10 a=k40Crp0UdiQA:10 a=WlT8qwTXB_Kj6um4hl3b:22", "X-Proofpoint-ORIG-GUID": "O308Vted1d_-6EbRme_gnJ7YOVgFe1it", "X-Proofpoint-Spam-Details-Enc": "AW1haW4tMjYwNDAzMDE2OCBTYWx0ZWRfX3ViMQ8moW1zV\n UeMvG+X00ksq4OyZBy5zAL8m5wd1Yt1Ul6Rv/A6bhF2qUw2/4IxEhMFv01VCaOEnWp3oTzb0KFm\n OHR4S/rOlXihOSi/Am+Hq3lZ50C8skqlGar5PGC862ExJ+JfwIXru6kgKbRv0c9RUUVon62Lo8B\n sTbVpxFbiJ4v3DTvKpxJLWYqnXJfBmd4YQOJgpP+4l5gm1ypevycbxRT8WcUvvkGyXnc05SmqX2\n LN+GBTewHW6ypSdzskPtRT5StQzbimXBYKxo9/eME5GNGYy/tM9YrAZuW/NPRUZizFdraPtKt76\n e7f80Js8PW5NtHEYbc3AbUCc8mEPwg1H5n332yY4cKDgazcdffI/zqtia18pcQJtBX/piEnmndX\n y9JNsOk4cMs/31fn8LhOGBpzM8g0Ag4G7cH8cJCv4XqD0/n6Fsk3wgozRucF0cYZoSXyHa5+hx2\n Ep2obOwcV0Xq6gco3Og==", "X-Proofpoint-Virus-Version": "vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-04-03_05,2026-04-03_01,2025-10-01_01", "X-Proofpoint-Spam-Details": "rule=outbound_notspam policy=outbound score=0\n impostorscore=0 spamscore=0 priorityscore=1501 malwarescore=0 clxscore=1015\n lowpriorityscore=0 bulkscore=0 adultscore=0 suspectscore=0 phishscore=0\n classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0\n reason=mlx scancount=1 engine=8.22.0-2603050001 definitions=main-2604030168", "X-Spam-Status": "No, score=-0.7 required=3.0 tests=DKIM_SIGNED,DKIM_VALID,\n\tRCVD_IN_DNSWL_LOW,RCVD_IN_MSPIKE_H4,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,\n\tSPF_PASS autolearn=disabled version=4.0.1 OzLabs 8", "X-Spam-Checker-Version": "SpamAssassin 4.0.1 (2024-03-25) on lists.ozlabs.org" }, "content": "KASAN instrumentation is intended to be disabled for the kexec core\ncode, but the existing Makefile entry misses the object suffix. As a\nresult, the flag is not applied correctly to core_$(BITS).o.\n\nSo when KASAN is enabled, kexec_copy_flush and copy_segments in\nkexec/core_64.c are instrumented, which can result in accesses to\nshadow memory via normal address translation paths. Since these run\nwith the MMU disabled, such accesses may trigger page faults\n(bad_page_fault) that cannot be handled in the kdump path, ultimately\ncausing a hang and preventing the kdump kernel from booting. The same\nis true for kexec as well, since the same functions are used there.\n\nUpdate the entry to include the “.o” suffix so that KASAN\ninstrumentation is properly disabled for this object file.\n\nFixes: 2ab2d5794f14 (\"powerpc/kasan: Disable address sanitization in kexec paths\")\nReported-by: Venkat Rao Bagalkote <venkat88@linux.ibm.com>\nCloses: https://lore.kernel.org/all/1dee8891-8bcc-46b4-93f3-fc3a774abd5b@linux.ibm.com/\nCc: Aboorva Devarajan <aboorvad@linux.ibm.com>\nCc: Aditya Gupta <adityag@linux.ibm.com>\nCc: Daniel Axtens <dja@axtens.net>\nCc: Hari Bathini <hbathini@linux.ibm.com>\nCc: Madhavan Srinivasan <maddy@linux.ibm.com>\nCc: Michael Ellerman <mpe@ellerman.id.au>\nCc: Shivang Upadhyay <shivangu@linux.ibm.com>\nReviewed-by: Ritesh Harjani (IBM) <ritesh.list@gmail.com>\nTested-by: Venkat Rao Bagalkote <venkat88@linux.ibm.com>\nAcked-by: Mahesh Salgaonkar <mahesh@linux.ibm.com>\nSigned-off-by: Sourabh Jain <sourabhjain@linux.ibm.com>\n---\nChangelog:\n\nv2:\n- Add Reviewed-by, Acked-by and Tested-by tags\n- No functional changes\n \n v1:\n https://lore.kernel.org/all/20260321053121.614022-1-sourabhjain@linux.ibm.com/\n---\n arch/powerpc/kexec/Makefile | 2 +-\n 1 file changed, 1 insertion(+), 1 deletion(-)", "diff": "diff --git a/arch/powerpc/kexec/Makefile b/arch/powerpc/kexec/Makefile\nindex 470eb0453e17..ec7a0eed75dc 100644\n--- a/arch/powerpc/kexec/Makefile\n+++ b/arch/powerpc/kexec/Makefile\n@@ -16,4 +16,4 @@ GCOV_PROFILE_core_$(BITS).o := n\n KCOV_INSTRUMENT_core_$(BITS).o := n\n UBSAN_SANITIZE_core_$(BITS).o := n\n KASAN_SANITIZE_core.o := n\n-KASAN_SANITIZE_core_$(BITS) := n\n+KASAN_SANITIZE_core_$(BITS).o := n\n", "prefixes": [ "v2", "1/2" ] }