[{"id":3673360,"web_url":"http://patchwork.ozlabs.org/comment/3673360/","msgid":"<cy0fmtdb.ritesh.list@gmail.com>","date":"2026-04-04T01:01:04","subject":"Re: [PATCH v2 2/2] powerpc/vmx: avoid KASAN instrumentation in\n enter_vmx_ops() for kexec","submitter":{"id":79126,"url":"http://patchwork.ozlabs.org/api/people/79126/","name":"Ritesh Harjani (IBM)","email":"ritesh.list@gmail.com"},"content":"Sourabh Jain <sourabhjain@linux.ibm.com> writes:\n\n> The kexec sequence invokes enter_vmx_ops() via copy_page() with the MMU\n> disabled. In this context, code must not rely on normal virtual address\n> translations or trigger page faults.\n>\n> With KASAN enabled, functions get instrumented and may access shadow\n> memory using regular address translation. When executed with the MMU\n> off, this can lead to page faults (bad_page_fault) from which the\n> kernel cannot recover in the kexec path, resulting in a hang.\n>\n> The kexec path sets preempt_count to HARDIRQ_OFFSET before entering\n> the MMU-off copy sequence.\n>\n> current_thread_info()->preempt_count = HARDIRQ_OFFSET\n>   kexec_sequence(..., copy_with_mmu_off = 1)\n>     -> kexec_copy_flush(image)\n>          copy_segments()\n>            -> copy_page(dest, addr)\n> \t         bl enter_vmx_ops()\n>                    if (in_interrupt())\n>                      return 0\n> \t         beq .Lnonvmx_copy\n>\n> Since kexec sets preempt_count to HARDIRQ_OFFSET, in_interrupt()\n> evaluates to true and enter_vmx_ops() returns early.\n>\n> As in_interrupt() (and preempt_count()) are always inlined, mark\n> enter_vmx_ops() with __no_sanitize_address to avoid KASAN\n> instrumentation and shadow memory access with MMU disabled, helping\n> kexec boot fine with KASAN enabled.\n>\n\nNice! LGTM. Please feel free to add:\nReviewed-by: Ritesh Harjani (IBM) <ritesh.list@gmail.com>\n\n> Cc: Aditya Gupta <adityag@linux.ibm.com>\n> Cc: Daniel Axtens <dja@axtens.net>\n> Cc: Hari Bathini <hbathini@linux.ibm.com>\n> Cc: Madhavan Srinivasan <maddy@linux.ibm.com>\n> Cc: Mahesh Salgaonkar <mahesh@linux.ibm.com>\n> Cc: Michael Ellerman <mpe@ellerman.id.au>\n> Cc: Ritesh Harjani (IBM) <ritesh.list@gmail.com>\n> Cc: Shivang Upadhyay <shivangu@linux.ibm.com>\n> Cc: Venkat Rao Bagalkote <venkat88@linux.ibm.com>\n> Reported-by: Aboorva Devarajan <aboorvad@linux.ibm.com>\n> Signed-off-by: Sourabh Jain <sourabhjain@linux.ibm.com>\n> ---\n> Changelog:\n>\n> v2:\n> - Remove __no_sanitize_address from exit_vmx_ops\n> - Add a comment explaining that marking only enter_vmx_ops\n>   with __no_sanitize_address is sufficient for kexec to\n>   function properly with KASAN enabled\n>\n> v1:\n> https://lore.kernel.org/all/20260321053121.614022-1-sourabhjain@linux.ibm.com/\n> ---\n>  arch/powerpc/lib/vmx-helper.c | 9 ++++++++-\n>  1 file changed, 8 insertions(+), 1 deletion(-)\n>\n> diff --git a/arch/powerpc/lib/vmx-helper.c b/arch/powerpc/lib/vmx-helper.c\n> index 554b248002b4..57e897b60db8 100644\n> --- a/arch/powerpc/lib/vmx-helper.c\n> +++ b/arch/powerpc/lib/vmx-helper.c\n> @@ -52,7 +52,14 @@ int exit_vmx_usercopy(void)\n>  }\n>  EXPORT_SYMBOL(exit_vmx_usercopy);\n>  \n> -int enter_vmx_ops(void)\n> +/*\n> + * Can be called from kexec copy_page() path with MMU off. The kexec\n> + * code sets preempt_count to HARDIRQ_OFFSET so we return early here.\n> + * Since in_interrupt() is always inline, __no_sanitize_address on this\n> + * function is sufficient to avoid KASAN shadow memory accesses in real\n> + * mode.\n> + */\n> +int __no_sanitize_address enter_vmx_ops(void)\n>  {\n>  \tif (in_interrupt())\n>  \t\treturn 0;\n> -- \n> 2.52.0","headers":{"Return-Path":"\n <linuxppc-dev+bounces-19300-incoming=patchwork.ozlabs.org@lists.ozlabs.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linuxppc-dev@lists.ozlabs.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256\n header.s=20251104 header.b=UJI5fEzF;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ozlabs.org\n (client-ip=2404:9400:21b9:f100::1; helo=lists.ozlabs.org;\n envelope-from=linuxppc-dev+bounces-19300-incoming=patchwork.ozlabs.org@lists.ozlabs.org;\n receiver=patchwork.ozlabs.org)","lists.ozlabs.org;\n arc=none smtp.remote-ip=\"2607:f8b0:4864:20::42f\"","lists.ozlabs.org;\n dmarc=pass (p=none dis=none) header.from=gmail.com","lists.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256\n header.s=20251104 header.b=UJI5fEzF;\n\tdkim-atps=neutral","lists.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=gmail.com\n (client-ip=2607:f8b0:4864:20::42f; helo=mail-pf1-x42f.google.com;\n envelope-from=ritesh.list@gmail.com; receiver=lists.ozlabs.org)"],"Received":["from lists.ozlabs.org (lists.ozlabs.org\n [IPv6:2404:9400:21b9:f100::1])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1 raw public key)\n server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fncn42JJnz1yCs\n\tfor <incoming@patchwork.ozlabs.org>; Sat, 04 Apr 2026 12:04:24 +1100 (AEDT)","from boromir.ozlabs.org (localhost [127.0.0.1])\n\tby lists.ozlabs.org (Postfix) with ESMTP id 4fncn32p5yz2yC9;\n\tSat, 04 Apr 2026 12:04:23 +1100 (AEDT)","from mail-pf1-x42f.google.com (mail-pf1-x42f.google.com\n [IPv6:2607:f8b0:4864:20::42f])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n\t(No client certificate requested)\n\tby lists.ozlabs.org (Postfix) with ESMTPS id 4fncn21shNz2xQr\n\tfor <linuxppc-dev@lists.ozlabs.org>; Sat, 04 Apr 2026 12:04:22 +1100 (AEDT)","by mail-pf1-x42f.google.com with SMTP id\n d2e1a72fcca58-82748257f5fso2082698b3a.1\n        for <linuxppc-dev@lists.ozlabs.org>;\n Fri, 03 Apr 2026 18:04:21 -0700 (PDT)","from pve-server ([49.205.216.49])\n        by smtp.gmail.com with ESMTPSA id\n d2e1a72fcca58-82cf9b261absm8279923b3a.7.2026.04.03.18.04.15\n        (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n        Fri, 03 Apr 2026 18:04:19 -0700 (PDT)"],"ARC-Seal":"i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707; t=1775264663;\n\tcv=none;\n b=DC8SwuaXh288se1yq8xzJjADoMdL4PJgr7m1wbO+gAzl6kIjLYnRI4+kS6NF6Cqvosm3IjL92YFyTQVWuyc+p8CAvK0DVnAnrbBPvZljZbvigEtZJH1ZCWRnvnv+W7OqxiBqD7Ju1PYEC31B02No8D6tF4ImKlJZhsj9Xh3s7SZABKhFSiIMkN+K/Z+uwywPxpjyxGVRVWZedQY0Zbq6Tg14D9+f8mr0tZKEry5RhQUCtDFZnvK7tCYv7mt4LP6iWRQtcat0EiOOH0Y6ExZOxIcZAWg17EIxGa6O2SXEr7Nx7+MYX/U0cRGjQh7z4iRiQnwjQZcfP/xnCw47MaGz6A==","ARC-Message-Signature":"i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707;\n\tt=1775264663; c=relaxed/relaxed;\n\tbh=edNGcFx1CXG5zY263vAjylqpwkQzI0eE+O2C6Le7MCw=;\n\th=From:To:Cc:Subject:In-Reply-To:Date:Message-ID:References;\n b=jAIihlNO6pV6EzSANzq0STNkXMTRFz33qVVfAGcvsNzVRzVtqUCbeuWeCMWiEMDCd+IM5knsjdCSjNKbK1S4akZy3FK13+yptR++vP3jzUJapk4+S38XqFb0xQGFrsQs+nktMwjh1StIZhh0UZtTDCDZmDcAgTccbz+QDa/9Gj/iMt57OJe4kCuRzDh2UmX3g0Z1TaachBAJ8KTpUUVSne8jk0HBAMgTNMn9O/Z1CJ4xobykl3onUYd9d2ywAff9KATq4Qsf/mJ3i3Nqik9bHMeheMQn3XAQuKQrI6O+tI73CYSGGJIj5/BDCfPrjfoRveLY2rB2A6cbvRM/Kd2G3A==","ARC-Authentication-Results":"i=1; lists.ozlabs.org;\n dmarc=pass (p=none dis=none) header.from=gmail.com; dkim=pass (2048-bit key;\n unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256\n header.s=20251104 header.b=UJI5fEzF; dkim-atps=neutral;\n spf=pass (client-ip=2607:f8b0:4864:20::42f; helo=mail-pf1-x42f.google.com;\n envelope-from=ritesh.list@gmail.com;\n receiver=lists.ozlabs.org) smtp.mailfrom=gmail.com","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=gmail.com; s=20251104; t=1775264660; x=1775869460;\n darn=lists.ozlabs.org;\n        h=references:message-id:date:in-reply-to:subject:cc:to:from:from:to\n         :cc:subject:date:message-id:reply-to;\n        bh=edNGcFx1CXG5zY263vAjylqpwkQzI0eE+O2C6Le7MCw=;\n        b=UJI5fEzFJo9igbOboDKFEBCRnytS3CzrBW/rXCWUk28e25OO4CL6jHVf9N5lHZmXrW\n         obri7dybXjrNUG9vyahSVXAcvDzFkZW39YldVJHukdd5Jy79wWeB88247tF3E6p3vrxy\n         uxKi3XMJsiFIWj5MnFkelyk3MW9qdCpEDcmrAFyILTS5CrvVfnKIFFYkyaSXD7FcnN7i\n         LTlIXPDIvkXZlUT1wApxDlfbZUCl4lurwBtwKiLlXw005HhqgGyd60+QIr23mib45Jm5\n         Objz1b7GTnYfvaMskUvTqzZ6hoWdIDnoEki9+la3ryp0Z9/hxzXzn6H3GDxFJmvMMt8x\n         IzuA==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=1e100.net; s=20251104; t=1775264660; x=1775869460;\n        h=references:message-id:date:in-reply-to:subject:cc:to:from:x-gm-gg\n         :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to;\n        bh=edNGcFx1CXG5zY263vAjylqpwkQzI0eE+O2C6Le7MCw=;\n        b=lYZ7/BB+LZg5czKjhXif1jYusswCS2Smo75bfnPsLog4AZ7ORSRFS5w8yKOVp4eYRt\n         asIN9IeGSxwweoUibtYbJlAqPXjoVp6OAtFdaEzv8NlZEVSEJbQp0y2fEFyB2SO+SQ5/\n         +kHoODnGrB92g6tC7oqo3uZfBXfSaoapIHjzqc0lPB4PygxisSQqtC1R6l/UBDWISCEn\n         mWh1ZS6NmE4tq2EYRJC6JumDAkC+/PaJnOdagzvOjhYXbkdAqiR17OEMQBN94WuP/mb0\n         eDJVPqaI+YQNImRltKQXoNPMsGoXC+B8xefqfGG08/iWGgwntzPb7YlCDHbHH3N1OaGh\n         Lc3A==","X-Forwarded-Encrypted":"i=1;\n AJvYcCVyBwsJcPX4q95Ijsl3mEV2MyXZL/IMcJLTzuK7RuS5nBof02oxr/ZiPzx4Ny8Dd2jNBLN5MpbbkbNC96c=@lists.ozlabs.org","X-Gm-Message-State":"AOJu0Yyd5wiasUVbNFu9IKu8fWR3K0+FRRCxgELxUFQps6FGsD1SjrFx\n\tGDXet6cQZYnJ2XfRvCAz/aXYSoPQVAtaHdfx0Jc+CH6Y1ecJ10GWrFX8","X-Gm-Gg":"AeBDietAJMzRThUBx3ux6ywmDP2+RnrEvjvp40Tg20Am+zGRbqCl+4+FI/YzkK03hZZ\n\tUSsiZHkIjhvtXy00oZ1CgG8st/S1IiUE0matC5ParNyWDEh/IzhWElON8MMUaI8D2nakdVdFTRv\n\tMogkt0/VOmjy4AnvR5yDtvYehJm3gWk3LogurVQSHmzZgbG70qAM+X6fyfOv4W2IEghaU0kf4/o\n\tkkjWRAohMjpJzZQwVPBUMMuVmk+EuKf97objMCXJHfWwzOGbQlcRPhlT0optoEB/vsbKtPhX8yJ\n\tpiQ5X3fk7Rl8FcAyaOhqbSh5e8Ck23KbtkzN2xdQonowjsjPpl877wxUJuRBVPncWd4A3SBLTsf\n\tJ0aey1enmDn/R20DKDorhggjFDPDX41Gn+L4K873/4xtvZEHL/jv1snDAu0g4CGvxshanYpdCMl\n\tHCboEy3safrDYaRUfTMEN3Pg==","X-Received":"by 2002:a05:6a00:198b:b0:81f:5acb:55fc with SMTP id\n d2e1a72fcca58-82d0db5d24emr3887653b3a.10.1775264659884;\n        Fri, 03 Apr 2026 18:04:19 -0700 (PDT)","From":"Ritesh Harjani (IBM) <ritesh.list@gmail.com>","To":"Sourabh Jain <sourabhjain@linux.ibm.com>, linuxppc-dev@lists.ozlabs.org","Cc":"Sourabh Jain <sourabhjain@linux.ibm.com>,\n Aditya Gupta <adityag@linux.ibm.com>, Daniel Axtens <dja@axtens.net>,\n Hari Bathini <hbathini@linux.ibm.com>,\n Madhavan Srinivasan <maddy@linux.ibm.com>,\n Mahesh Salgaonkar <mahesh@linux.ibm.com>,\n Michael Ellerman <mpe@ellerman.id.au>,\n Shivang Upadhyay <shivangu@linux.ibm.com>,\n Venkat Rao Bagalkote <venkat88@linux.ibm.com>,\n Aboorva Devarajan <aboorvad@linux.ibm.com>","Subject":"Re: [PATCH v2 2/2] powerpc/vmx: avoid KASAN instrumentation in\n enter_vmx_ops() for kexec","In-Reply-To":"<20260403190123.1383198-2-sourabhjain@linux.ibm.com>","Date":"Sat, 04 Apr 2026 06:31:04 +0530","Message-ID":"<cy0fmtdb.ritesh.list@gmail.com>","References":"<20260403190123.1383198-1-sourabhjain@linux.ibm.com>\n <20260403190123.1383198-2-sourabhjain@linux.ibm.com>","X-Spam-Status":"No, score=-0.2 required=3.0 tests=DKIM_SIGNED,DKIM_VALID,\n\tDKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,RCVD_IN_DNSWL_NONE,\n\tSPF_HELO_NONE,SPF_PASS autolearn=disabled version=4.0.1 OzLabs 8","X-Spam-Checker-Version":"SpamAssassin 4.0.1 (2024-03-25) on lists.ozlabs.org","X-Mailing-List":"linuxppc-dev@lists.ozlabs.org","List-Id":"<linuxppc-dev.lists.ozlabs.org>","List-Help":"<mailto:linuxppc-dev+help@lists.ozlabs.org>","List-Owner":"<mailto:linuxppc-dev+owner@lists.ozlabs.org>","List-Post":"<mailto:linuxppc-dev@lists.ozlabs.org>","List-Archive":"<https://lore.kernel.org/linuxppc-dev/>,\n  <https://lists.ozlabs.org/pipermail/linuxppc-dev/>","List-Subscribe":"<mailto:linuxppc-dev+subscribe@lists.ozlabs.org>,\n  <mailto:linuxppc-dev+subscribe-digest@lists.ozlabs.org>,\n  <mailto:linuxppc-dev+subscribe-nomail@lists.ozlabs.org>","List-Unsubscribe":"<mailto:linuxppc-dev+unsubscribe@lists.ozlabs.org>","Precedence":"list"}},{"id":3673371,"web_url":"http://patchwork.ozlabs.org/comment/3673371/","msgid":"<9551d2b5-1821-4aaf-a5d2-2be56f98f45c@linux.ibm.com>","date":"2026-04-04T03:21:51","subject":"Re: [PATCH v2 2/2] powerpc/vmx: avoid KASAN instrumentation in\n enter_vmx_ops() for kexec","submitter":{"id":77202,"url":"http://patchwork.ozlabs.org/api/people/77202/","name":"Sourabh Jain","email":"sourabhjain@linux.ibm.com"},"content":"On 04/04/26 06:31, Ritesh Harjani (IBM) wrote:\n> Sourabh Jain <sourabhjain@linux.ibm.com> writes:\n>\n>> The kexec sequence invokes enter_vmx_ops() via copy_page() with the MMU\n>> disabled. In this context, code must not rely on normal virtual address\n>> translations or trigger page faults.\n>>\n>> With KASAN enabled, functions get instrumented and may access shadow\n>> memory using regular address translation. When executed with the MMU\n>> off, this can lead to page faults (bad_page_fault) from which the\n>> kernel cannot recover in the kexec path, resulting in a hang.\n>>\n>> The kexec path sets preempt_count to HARDIRQ_OFFSET before entering\n>> the MMU-off copy sequence.\n>>\n>> current_thread_info()->preempt_count = HARDIRQ_OFFSET\n>>    kexec_sequence(..., copy_with_mmu_off = 1)\n>>      -> kexec_copy_flush(image)\n>>           copy_segments()\n>>             -> copy_page(dest, addr)\n>> \t         bl enter_vmx_ops()\n>>                     if (in_interrupt())\n>>                       return 0\n>> \t         beq .Lnonvmx_copy\n>>\n>> Since kexec sets preempt_count to HARDIRQ_OFFSET, in_interrupt()\n>> evaluates to true and enter_vmx_ops() returns early.\n>>\n>> As in_interrupt() (and preempt_count()) are always inlined, mark\n>> enter_vmx_ops() with __no_sanitize_address to avoid KASAN\n>> instrumentation and shadow memory access with MMU disabled, helping\n>> kexec boot fine with KASAN enabled.\n>>\n> Nice! LGTM. Please feel free to add:\n> Reviewed-by: Ritesh Harjani (IBM) <ritesh.list@gmail.com>\n\nThanks, Ritesh!\n\nWill add your Reviewed-by tag in the next version.\n\n- Sourabh Jain","headers":{"Return-Path":"\n <linuxppc-dev+bounces-19303-incoming=patchwork.ozlabs.org@lists.ozlabs.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linuxppc-dev@lists.ozlabs.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=ibm.com header.i=@ibm.com header.a=rsa-sha256\n header.s=pp1 header.b=TSHOZf84;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ozlabs.org\n (client-ip=112.213.38.117; helo=lists.ozlabs.org;\n envelope-from=linuxppc-dev+bounces-19303-incoming=patchwork.ozlabs.org@lists.ozlabs.org;\n receiver=patchwork.ozlabs.org)","lists.ozlabs.org;\n arc=none smtp.remote-ip=148.163.156.1","lists.ozlabs.org;\n dmarc=pass (p=none dis=none) header.from=linux.ibm.com","lists.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=ibm.com header.i=@ibm.com header.a=rsa-sha256\n header.s=pp1 header.b=TSHOZf84;\n\tdkim-atps=neutral","lists.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=linux.ibm.com\n (client-ip=148.163.156.1; helo=mx0a-001b2d01.pphosted.com;\n envelope-from=sourabhjain@linux.ibm.com; receiver=lists.ozlabs.org)"],"Received":["from lists.ozlabs.org (lists.ozlabs.org [112.213.38.117])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1 raw public key)\n server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fngr33TtJz1yD3\n\tfor <incoming@patchwork.ozlabs.org>; Sat, 04 Apr 2026 14:22:11 +1100 (AEDT)","from boromir.ozlabs.org (localhost [127.0.0.1])\n\tby lists.ozlabs.org (Postfix) with ESMTP id 4fngr32f4Lz2yYs;\n\tSat, 04 Apr 2026 14:22:11 +1100 (AEDT)","from mx0a-001b2d01.pphosted.com (mx0a-001b2d01.pphosted.com\n [148.163.156.1])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n\t(No client certificate requested)\n\tby lists.ozlabs.org (Postfix) with ESMTPS id 4fngr24B49z2xQr\n\tfor <linuxppc-dev@lists.ozlabs.org>; Sat, 04 Apr 2026 14:22:10 +1100 (AEDT)","from pps.filterd (m0356517.ppops.net [127.0.0.1])\n\tby mx0a-001b2d01.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id\n 63431WSS3067657;\n\tSat, 4 Apr 2026 03:22:02 GMT","from ppma22.wdc07v.mail.ibm.com\n (5c.69.3da9.ip4.static.sl-reverse.com [169.61.105.92])\n\tby mx0a-001b2d01.pphosted.com (PPS) with ESMTPS id 4datc2g1a1-1\n\t(version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT);\n\tSat, 04 Apr 2026 03:22:01 +0000 (GMT)","from pps.filterd (ppma22.wdc07v.mail.ibm.com [127.0.0.1])\n\tby ppma22.wdc07v.mail.ibm.com (8.18.1.2/8.18.1.2) with ESMTP id\n 6340eNBa005973;\n\tSat, 4 Apr 2026 03:22:00 GMT","from smtprelay01.fra02v.mail.ibm.com ([9.218.2.227])\n\tby ppma22.wdc07v.mail.ibm.com (PPS) with ESMTPS id 4d6spygdhw-1\n\t(version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT);\n\tSat, 04 Apr 2026 03:22:00 +0000","from smtpav01.fra02v.mail.ibm.com (smtpav01.fra02v.mail.ibm.com\n [10.20.54.100])\n\tby smtprelay01.fra02v.mail.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id\n 6343Lube53805386\n\t(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);\n\tSat, 4 Apr 2026 03:21:56 GMT","from smtpav01.fra02v.mail.ibm.com (unknown [127.0.0.1])\n\tby IMSVA (Postfix) with ESMTP id 1E1C620043;\n\tSat,  4 Apr 2026 03:21:56 +0000 (GMT)","from smtpav01.fra02v.mail.ibm.com (unknown [127.0.0.1])\n\tby IMSVA (Postfix) with ESMTP id CC87420040;\n\tSat,  4 Apr 2026 03:21:52 +0000 (GMT)","from [9.39.18.186] (unknown [9.39.18.186])\n\tby smtpav01.fra02v.mail.ibm.com (Postfix) with ESMTP;\n\tSat,  4 Apr 2026 03:21:52 +0000 (GMT)"],"ARC-Seal":"i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707; t=1775272931;\n\tcv=none;\n b=evYUhoj3W1wFkigdNSyRPVOUy/PPkSZZnyY9X58w58WbNTumsiTu8OytofRFkL+MhBDpUKG5oXR2HYe4Klytwd0DgKIaI5fE13v3UBiybtXEMF86y4SPkddLJ+IXLoneXx4LCc63eiLPOQOnbNUi9YB2n1qiroXGCRCnEa2Uv4ejcFtFZXSuE0XP/F/uJGaA1uLPwLjhVNjTF3KD20VsVjJAPPAt7eyx1+zaW5DxtDPIxtsKn1g8pS5cWqXhrCYl9LHSF/o+IYp40XQN4kiUFHEXNr4ejhoc1qLappbuk6NOkc7AWmH2cB0Y5312zrfWZmA5fDTdJ6Uh76FvblH2rg==","ARC-Message-Signature":"i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707;\n\tt=1775272931; c=relaxed/relaxed;\n\tbh=yfQoA6KbryDg4fIMgiq1/OMsv57x+4IJDIVcB77NifA=;\n\th=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From:\n\t In-Reply-To:Content-Type;\n b=WPAx1m2mSW6h+YhKpNfR0fZZ2xtf4WJCEbrZAEWxLBlbUKrxTqbNisuL5hTG1ERYBUbYiTsuI6PtXDrvwkhgtT2774eD/RXbiF9beMgZ0Hivr8x6Yc4kaVVMNr7Cj+QyQWEsHvnxpws3w7yNGwZ63hsX99/sbnXcMI5pwfVFRSLxYApsF7c2miaBtxSgXzYPSIrWxPPfPYjPVCGxZZzk2itl2hBxjqnmoofRMabAjJSQFbv+30pG67Ya8X8sIzDsnPbx7Nz653yyzY75gBYT+aDzBy5BBdl3bad7jHoyGFqxymYCXfdp7cm7zXxkVsCTK9fz5vLD2zJljg1Djhzhcw==","ARC-Authentication-Results":"i=1; lists.ozlabs.org;\n dmarc=pass (p=none dis=none) header.from=linux.ibm.com;\n dkim=pass (2048-bit key;\n unprotected) header.d=ibm.com header.i=@ibm.com header.a=rsa-sha256\n header.s=pp1 header.b=TSHOZf84; dkim-atps=neutral;\n spf=pass (client-ip=148.163.156.1; helo=mx0a-001b2d01.pphosted.com;\n envelope-from=sourabhjain@linux.ibm.com;\n receiver=lists.ozlabs.org) smtp.mailfrom=linux.ibm.com","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=cc\n\t:content-transfer-encoding:content-type:date:from:in-reply-to\n\t:message-id:mime-version:references:subject:to; s=pp1; bh=yfQoA6\n\tKbryDg4fIMgiq1/OMsv57x+4IJDIVcB77NifA=; b=TSHOZf84tl9+U324fsMVVp\n\tRc7urZBsIhN/0653phycwrexZBP+bTGUxG4taGSg3s/NK3F3YBoz0xWQFQxrV5nI\n\tPFn0JEUPs5UcktlJWJNMYO4pejPvknDnwzL7/wCSjHmwZjfvNPRYcfeK3ji53GVD\n\t3/Mul8h+DFhUZBG8O3iR8RjP6Rp9Dlh9fUVk/6wSCftj/TvC3XAoO2f1lt6rXDbR\n\tMdErihVZjltlqy5di3HphXpldXl+GAZieQJS6iNddbG9mpVQDUCjtqCzgdhAIkDR\n\tbjE6EwiEfPIeLvYQ92fwUzdKMjHuWXmUwEyIi8kog8QXP6pHcNamgzVAJD3o4JkQ\n\t==","Message-ID":"<9551d2b5-1821-4aaf-a5d2-2be56f98f45c@linux.ibm.com>","Date":"Sat, 4 Apr 2026 08:51:51 +0530","X-Mailing-List":"linuxppc-dev@lists.ozlabs.org","List-Id":"<linuxppc-dev.lists.ozlabs.org>","List-Help":"<mailto:linuxppc-dev+help@lists.ozlabs.org>","List-Owner":"<mailto:linuxppc-dev+owner@lists.ozlabs.org>","List-Post":"<mailto:linuxppc-dev@lists.ozlabs.org>","List-Archive":"<https://lore.kernel.org/linuxppc-dev/>,\n  <https://lists.ozlabs.org/pipermail/linuxppc-dev/>","List-Subscribe":"<mailto:linuxppc-dev+subscribe@lists.ozlabs.org>,\n  <mailto:linuxppc-dev+subscribe-digest@lists.ozlabs.org>,\n  <mailto:linuxppc-dev+subscribe-nomail@lists.ozlabs.org>","List-Unsubscribe":"<mailto:linuxppc-dev+unsubscribe@lists.ozlabs.org>","Precedence":"list","MIME-Version":"1.0","User-Agent":"Mozilla Thunderbird","Subject":"Re: [PATCH v2 2/2] powerpc/vmx: avoid KASAN instrumentation in\n enter_vmx_ops() for kexec","To":"\"Ritesh Harjani (IBM)\" <ritesh.list@gmail.com>,\n        linuxppc-dev@lists.ozlabs.org","Cc":"Aditya Gupta <adityag@linux.ibm.com>, Daniel Axtens <dja@axtens.net>,\n        Hari Bathini <hbathini@linux.ibm.com>,\n        Madhavan Srinivasan <maddy@linux.ibm.com>,\n        Mahesh Salgaonkar <mahesh@linux.ibm.com>,\n        Michael Ellerman <mpe@ellerman.id.au>,\n        Shivang Upadhyay <shivangu@linux.ibm.com>,\n        Venkat Rao Bagalkote <venkat88@linux.ibm.com>,\n        Aboorva Devarajan <aboorvad@linux.ibm.com>","References":"<20260403190123.1383198-1-sourabhjain@linux.ibm.com>\n <20260403190123.1383198-2-sourabhjain@linux.ibm.com>\n <cy0fmtdb.ritesh.list@gmail.com>","Content-Language":"en-US","From":"Sourabh Jain <sourabhjain@linux.ibm.com>","In-Reply-To":"<cy0fmtdb.ritesh.list@gmail.com>","Content-Type":"text/plain; charset=UTF-8; format=flowed","Content-Transfer-Encoding":"7bit","X-TM-AS-GCONF":"00","X-Proofpoint-Reinject":"loops=2 maxloops=12","X-Proofpoint-Spam-Details-Enc":"AW1haW4tMjYwNDA0MDAyNiBTYWx0ZWRfX/W5/QUfZuU0a\n A35G5+VYnQJc1UshTekKN8lk8AJRFn04946+oNXp174/elNY19pVWmFoZETAg5izqTQG5H67x1S\n Z7olVdFqYhxOTgIGuoqQcCB0IXjznJQLhXGQn/AiNe8HM+RGpx7hVpJTefIcXPkKmrOfQqysQqZ\n EK3epSIcZ76IffTyIyxWOZmATxwOXt2QGbJiLFaZA5ZtUg0QMGjNGw9BqSO+d8wrlM5EnCmk/oA\n 6R3B6cRMrtDzriBzTfnlAWf4195Jl1Tis8eg6PrzzBeovtbgyuQ7QoLrcfIa7q4KmgRPT73JvWY\n mVjGGzvLRcqa4B524nv7q3eBvmLYtLHUGObCVQRPOlwoD+KoC0H7Lo7FTp1TT7SNQA8AxDs6Bgm\n dj3Piza4WmtdHpzFXne30J0i3C5yWdejb2b/qtcJcut+v7s1gMDujeZtry+8+lKIMQdlneYorKS\n 2Kl88k48wvuL/UdE+5w==","X-Proofpoint-GUID":"-EhTmvLWDnG5IF-IWVFiMyQoTvUfWvDu","X-Proofpoint-ORIG-GUID":"azhPCGsONs67eW3VwqD9nGQD_EMYrCWS","X-Authority-Analysis":"v=2.4 cv=HJvO14tv c=1 sm=1 tr=0 ts=69d083d9 cx=c_pps\n a=5BHTudwdYE3Te8bg5FgnPg==:117 a=5BHTudwdYE3Te8bg5FgnPg==:17\n a=IkcTkHD0fZMA:10 a=A5OVakUREuEA:10 a=VkNPw1HP01LnGYTKEx00:22\n a=RnoormkPH1_aCDwRdu11:22 a=U7nrCbtTmkRpXpFmAIza:22 a=VnNF1IyMAAAA:8\n a=pGLkceISAAAA:8 a=ZSKijxZ-s5Cc9RuwcvIA:9 a=QEXdDO2ut3YA:10","X-Proofpoint-Virus-Version":"vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-04-03_07,2026-04-03_01,2025-10-01_01","X-Proofpoint-Spam-Details":"rule=outbound_notspam policy=outbound score=0\n impostorscore=0 suspectscore=0 clxscore=1015 lowpriorityscore=0 adultscore=0\n malwarescore=0 spamscore=0 phishscore=0 priorityscore=1501 bulkscore=0\n classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0\n reason=mlx scancount=1 engine=8.22.0-2603050001 definitions=main-2604040026","X-Spam-Status":"No, score=-0.7 required=3.0 tests=DKIM_SIGNED,DKIM_VALID,\n\tRCVD_IN_DNSWL_LOW,RCVD_IN_MSPIKE_H4,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,\n\tSPF_PASS autolearn=disabled version=4.0.1 OzLabs 8","X-Spam-Checker-Version":"SpamAssassin 4.0.1 (2024-03-25) on lists.ozlabs.org"}}]