* Re: [REGRESSION] x86_32 boot hang in 6.19-rc7 caused by b505f1944535 ("x86/kfence: avoid writing L1TF-vulnerable PTEs")
[not found] ` <CAKFNMokwjw68ubYQM9WkzOuH51wLznHpEOMSqtMoV1Rn9JV_gw@mail.gmail.com>
@ 2026-01-26 20:24 ` Andrew Morton
2026-01-26 20:36 ` Dave Hansen
0 siblings, 1 reply; 2+ messages in thread
From: Andrew Morton @ 2026-01-26 20:24 UTC (permalink / raw)
To: Ryusuke Konishi
Cc: Andrew Cooper, Marco Elver, LKML, Alexander Potapenko,
Dmitry Vyukov, Thomas Gleixner, Ingo Molnar, Borislav Petkov,
Dave Hansen, X86 ML, H. Peter Anvin, Jann Horn, kasan-dev, stable,
Greg Kroah-Hartman
On Tue, 27 Jan 2026 04:07:04 +0900 Ryusuke Konishi <konishi.ryusuke@gmail.com> wrote:
> Hi All,
>
> I am reporting a boot regression in v6.19-rc7 on an x86_32
> environment. The kernel hangs immediately after "Booting the kernel"
> and does not produce any early console output.
>
> A git bisect identified the following commit as the first bad commit:
> b505f1944535 ("x86/kfence: avoid writing L1TF-vulnerable PTEs")
Thanks. b505f1944535 had cc:stable so let's add some cc's to alert
-stable maintainers.
I see that b505f1944535 prevented a Xen warning, but did it have any
other runtime effects? If not, a prompt revert may be the way to
proceed for now.
> Environment and Config:
> - Guest Arch: x86_32 (one of my test VMs)
> - Memory Config: # CONFIG_X86_PAE is not set
> - KFENCE Config: CONFIG_KFENCE=y
> - Host/Hypervisor: x86_64 host running KVM
>
> The system fails to boot at a very early stage. I have confirmed that
> reverting commit b505f1944535 on top of v6.19-rc7 completely resolves
> the issue, and the kernel boots normally.
>
> Could you please verify if this change is compatible with x86_32
> (non-PAE) configurations?
> I am happy to provide my full .config or test any potential fixes.
>
> Best regards,
> Ryusuke Konishi
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: [REGRESSION] x86_32 boot hang in 6.19-rc7 caused by b505f1944535 ("x86/kfence: avoid writing L1TF-vulnerable PTEs")
2026-01-26 20:24 ` [REGRESSION] x86_32 boot hang in 6.19-rc7 caused by b505f1944535 ("x86/kfence: avoid writing L1TF-vulnerable PTEs") Andrew Morton
@ 2026-01-26 20:36 ` Dave Hansen
0 siblings, 0 replies; 2+ messages in thread
From: Dave Hansen @ 2026-01-26 20:36 UTC (permalink / raw)
To: Andrew Morton, Ryusuke Konishi
Cc: Andrew Cooper, Marco Elver, LKML, Alexander Potapenko,
Dmitry Vyukov, Thomas Gleixner, Ingo Molnar, Borislav Petkov,
Dave Hansen, X86 ML, H. Peter Anvin, Jann Horn, kasan-dev, stable,
Greg Kroah-Hartman
On 1/26/26 12:24, Andrew Morton wrote:
> I see that b505f1944535 prevented a Xen warning, but did it have any
> other runtime effects? If not, a prompt revert may be the way to
> proceed for now.
Yeah, that's fine.
At the same time ... KFENCE folks: I wonder if you've been testing on
highmem and/or 32-bit x86 builds or if there's much value to keeping
KFENCE maintained there.
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2026-01-26 20:36 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <20260106180426.710013-1-andrew.cooper3@citrix.com>
[not found] ` <20260107151700.c7b9051929548391e92cfb3e@linux-foundation.org>
[not found] ` <CAKFNMokwjw68ubYQM9WkzOuH51wLznHpEOMSqtMoV1Rn9JV_gw@mail.gmail.com>
2026-01-26 20:24 ` [REGRESSION] x86_32 boot hang in 6.19-rc7 caused by b505f1944535 ("x86/kfence: avoid writing L1TF-vulnerable PTEs") Andrew Morton
2026-01-26 20:36 ` Dave Hansen
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox