lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20241218175716.GD31418@twin.jikos.cz> Date: Wed, 18 Dec 2024 18:57:16 +0100 From: David Sterba <dsterba@...e.cz> To: Naresh Kamboju <naresh.kamboju@...aro.org> Cc: qemu-devel@...gnu.org, open list <linux-kernel@...r.kernel.org>, Linux Regressions <regressions@...ts.linux.dev>, linux-ext4 <linux-ext4@...r.kernel.org>, lkft-triage@...ts.linaro.org, linux-mm <linux-mm@...ck.org>, Linux btrfs <linux-btrfs@...r.kernel.org>, Alex Bennée <alex.bennee@...aro.org>, Anders Roxell <anders.roxell@...aro.org>, Arnd Bergmann <arnd@...db.de>, Dan Carpenter <dan.carpenter@...aro.org>, Qu Wenruo <wqu@...e.com>, David Sterba <dsterba@...e.com> Subject: Re: qemu-arm64: CONFIG_ARM64_64K_PAGES=y kernel crash on qemu-arm64 with Linux next-20241210 and above On Wed, Dec 18, 2024 at 09:22:26PM +0530, Naresh Kamboju wrote: > On Wed, 18 Dec 2024 at 17:33, Naresh Kamboju <naresh.kamboju@...aro.org> wrote: > > > > The following kernel crash noticed on qemu-arm64 while running the > > Linux next-20241210 tag (to next-20241218) kernel built with > > - CONFIG_ARM64_64K_PAGES=y > > - CONFIG_ARM64_16K_PAGES=y > > and running LTP smoke tests. > > > > First seen on Linux next-20241210. > > Good: next-20241209 > > Bad: next-20241210 and next-20241218 > > > > qemu-arm64: 9.1.2 > > > > Anyone noticed this ? > > > > Anders bisected this reported regression and found, > # first bad commit: > [9c1d66793b6faa00106ae4c866359578bfc012d2] > btrfs: validate system chunk array at btrfs_validate_super() Thanks, I'll drop the patch from linux-next for now.
Powered by blists - more mailing lists