Appengine-App-Id-Alias: syzkaller Message-ID: <696d2952.050a0220.3390f1.0022.GAE@google.com> Subject: [syzbot] [io-uring?] memory leak in iovec_from_user (5) From: syzbot To: axboe@kernel.dk, io-uring@vger.kernel.org, linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8" X-Spam-Score: 0.8 (/) X-Spam-Report: Spam detection software, running on the system "witcher.mxrouting.net", has performed the tests listed below against this email. Information: https://mxroutedocs.com/directadmin/spamfilters/ --- Content analysis details: (0.8 points) --- pts rule name description ---- ---------------------- ----------------------------------------- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: storage.googleapis.com] 0.0 RCVD_IN_DNSWL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to DNSWL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#DnsBlocklists-dnsbl-block for more information. [172.232.135.74 listed in list.dnswl.org] 0.3 FROM_LOCAL_HEX From: localpart has long hexadecimal sequence 1.5 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level mail domains are different -1.0 MAILING_LIST_MULTI Multiple indicators imply a widely-seen list manager SpamTally: Final spam score: 8 Hello, syzbot found the following issue on: HEAD commit: c537e12daeec Merge tag 'bpf-fixes' of git://git.kernel.org.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=17c91d9a580000 kernel config: https://syzkaller.appspot.com/x/.config?x=87bc41cae23d2144 dashboard link: https://syzkaller.appspot.com/bug?extid=321914d39d7553cca1e7 compiler: gcc (Debian 12.2.0-14+deb12u1) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 syz repro: https://syzkaller.appspot.com/x/repro.syz?x=16a8d5fa580000 Downloadable assets: disk image: https://storage.googleapis.com/syzbot-assets/b4f60c3c9800/disk-c537e12d.raw.xz vmlinux: https://storage.googleapis.com/syzbot-assets/5f2c0a541579/vmlinux-c537e12d.xz kernel image: https://storage.googleapis.com/syzbot-assets/32dcd74ba443/bzImage-c537e12d.xz IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: syzbot+321914d39d7553cca1e7@syzkaller.appspotmail.com BUG: memory leak unreferenced object 0xffff8881228893e0 (size 32): comm "syz.6.23", pid 6169, jiffies 4294942659 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ backtrace (crc ccaa009e): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4958 [inline] slab_alloc_node mm/slub.c:5263 [inline] __do_kmalloc_node mm/slub.c:5656 [inline] __kmalloc_noprof+0x3e0/0x660 mm/slub.c:5669 kmalloc_noprof include/linux/slab.h:961 [inline] kmalloc_array_noprof include/linux/slab.h:1003 [inline] iovec_from_user lib/iov_iter.c:1321 [inline] iovec_from_user+0x108/0x140 lib/iov_iter.c:1304 __import_iovec+0x71/0x350 lib/iov_iter.c:1375 io_import_vec io_uring/rw.c:99 [inline] __io_import_rw_buffer+0x1e2/0x260 io_uring/rw.c:120 io_import_rw_buffer io_uring/rw.c:139 [inline] io_rw_do_import io_uring/rw.c:313 [inline] io_prep_rw+0xb5/0x120 io_uring/rw.c:325 io_prep_rwv io_uring/rw.c:343 [inline] io_prep_writev+0x23/0x80 io_uring/rw.c:363 io_init_req io_uring/io_uring.c:2235 [inline] io_submit_sqe io_uring/io_uring.c:2282 [inline] io_submit_sqes+0x40d/0xf40 io_uring/io_uring.c:2435 __do_sys_io_uring_enter+0x841/0xcf0 io_uring/io_uring.c:3285 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888122889400 (size 32): comm "syz.6.23", pid 6169, jiffies 4294942659 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ backtrace (crc ccaa009e): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4958 [inline] slab_alloc_node mm/slub.c:5263 [inline] __do_kmalloc_node mm/slub.c:5656 [inline] __kmalloc_noprof+0x3e0/0x660 mm/slub.c:5669 kmalloc_noprof include/linux/slab.h:961 [inline] kmalloc_array_noprof include/linux/slab.h:1003 [inline] iovec_from_user lib/iov_iter.c:1321 [inline] iovec_from_user+0x108/0x140 lib/iov_iter.c:1304 __import_iovec+0x71/0x350 lib/iov_iter.c:1375 io_import_vec io_uring/rw.c:99 [inline] __io_import_rw_buffer+0x1e2/0x260 io_uring/rw.c:120 io_import_rw_buffer io_uring/rw.c:139 [inline] io_rw_do_import io_uring/rw.c:313 [inline] io_prep_rw+0xb5/0x120 io_uring/rw.c:325 io_prep_rwv io_uring/rw.c:343 [inline] io_prep_writev+0x23/0x80 io_uring/rw.c:363 io_init_req io_uring/io_uring.c:2235 [inline] io_submit_sqe io_uring/io_uring.c:2282 [inline] io_submit_sqes+0x40d/0xf40 io_uring/io_uring.c:2435 __do_sys_io_uring_enter+0x841/0xcf0 io_uring/io_uring.c:3285 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888122889420 (size 32): comm "syz.6.23", pid 6169, jiffies 4294942659 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ backtrace (crc ccaa009e): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4958 [inline] slab_alloc_node mm/slub.c:5263 [inline] __do_kmalloc_node mm/slub.c:5656 [inline] __kmalloc_noprof+0x3e0/0x660 mm/slub.c:5669 kmalloc_noprof include/linux/slab.h:961 [inline] kmalloc_array_noprof include/linux/slab.h:1003 [inline] iovec_from_user lib/iov_iter.c:1321 [inline] iovec_from_user+0x108/0x140 lib/iov_iter.c:1304 __import_iovec+0x71/0x350 lib/iov_iter.c:1375 io_import_vec io_uring/rw.c:99 [inline] __io_import_rw_buffer+0x1e2/0x260 io_uring/rw.c:120 io_import_rw_buffer io_uring/rw.c:139 [inline] io_rw_do_import io_uring/rw.c:313 [inline] io_prep_rw+0xb5/0x120 io_uring/rw.c:325 io_prep_rwv io_uring/rw.c:343 [inline] io_prep_writev+0x23/0x80 io_uring/rw.c:363 io_init_req io_uring/io_uring.c:2235 [inline] io_submit_sqe io_uring/io_uring.c:2282 [inline] io_submit_sqes+0x40d/0xf40 io_uring/io_uring.c:2435 __do_sys_io_uring_enter+0x841/0xcf0 io_uring/io_uring.c:3285 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888122889440 (size 32): comm "syz.6.23", pid 6169, jiffies 4294942659 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ backtrace (crc ccaa009e): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4958 [inline] slab_alloc_node mm/slub.c:5263 [inline] __do_kmalloc_node mm/slub.c:5656 [inline] __kmalloc_noprof+0x3e0/0x660 mm/slub.c:5669 kmalloc_noprof include/linux/slab.h:961 [inline] kmalloc_array_noprof include/linux/slab.h:1003 [inline] iovec_from_user lib/iov_iter.c:1321 [inline] iovec_from_user+0x108/0x140 lib/iov_iter.c:1304 __import_iovec+0x71/0x350 lib/iov_iter.c:1375 io_import_vec io_uring/rw.c:99 [inline] __io_import_rw_buffer+0x1e2/0x260 io_uring/rw.c:120 io_import_rw_buffer io_uring/rw.c:139 [inline] io_rw_do_import io_uring/rw.c:313 [inline] io_prep_rw+0xb5/0x120 io_uring/rw.c:325 io_prep_rwv io_uring/rw.c:343 [inline] io_prep_writev+0x23/0x80 io_uring/rw.c:363 io_init_req io_uring/io_uring.c:2235 [inline] io_submit_sqe io_uring/io_uring.c:2282 [inline] io_submit_sqes+0x40d/0xf40 io_uring/io_uring.c:2435 __do_sys_io_uring_enter+0x841/0xcf0 io_uring/io_uring.c:3285 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888122889460 (size 32): comm "syz.6.23", pid 6169, jiffies 4294942659 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ backtrace (crc ccaa009e): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4958 [inline] slab_alloc_node mm/slub.c:5263 [inline] __do_kmalloc_node mm/slub.c:5656 [inline] __kmalloc_noprof+0x3e0/0x660 mm/slub.c:5669 kmalloc_noprof include/linux/slab.h:961 [inline] kmalloc_array_noprof include/linux/slab.h:1003 [inline] iovec_from_user lib/iov_iter.c:1321 [inline] iovec_from_user+0x108/0x140 lib/iov_iter.c:1304 __import_iovec+0x71/0x350 lib/iov_iter.c:1375 io_import_vec io_uring/rw.c:99 [inline] __io_import_rw_buffer+0x1e2/0x260 io_uring/rw.c:120 io_import_rw_buffer io_uring/rw.c:139 [inline] io_rw_do_import io_uring/rw.c:313 [inline] io_prep_rw+0xb5/0x120 io_uring/rw.c:325 io_prep_rwv io_uring/rw.c:343 [inline] io_prep_writev+0x23/0x80 io_uring/rw.c:363 io_init_req io_uring/io_uring.c:2235 [inline] io_submit_sqe io_uring/io_uring.c:2282 [inline] io_submit_sqes+0x40d/0xf40 io_uring/io_uring.c:2435 __do_sys_io_uring_enter+0x841/0xcf0 io_uring/io_uring.c:3285 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888122889480 (size 32): comm "syz.6.23", pid 6169, jiffies 4294942659 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ backtrace (crc ccaa009e): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4958 [inline] slab_alloc_node mm/slub.c:5263 [inline] __do_kmalloc_node mm/slub.c:5656 [inline] __kmalloc_noprof+0x3e0/0x660 mm/slub.c:5669 kmalloc_noprof include/linux/slab.h:961 [inline] kmalloc_array_noprof include/linux/slab.h:1003 [inline] iovec_from_user lib/iov_iter.c:1321 [inline] iovec_from_user+0x108/0x140 lib/iov_iter.c:1304 __import_iovec+0x71/0x350 lib/iov_iter.c:1375 io_import_vec io_uring/rw.c:99 [inline] __io_import_rw_buffer+0x1e2/0x260 io_uring/rw.c:120 io_import_rw_buffer io_uring/rw.c:139 [inline] io_rw_do_import io_uring/rw.c:313 [inline] io_prep_rw+0xb5/0x120 io_uring/rw.c:325 io_prep_rwv io_uring/rw.c:343 [inline] io_prep_writev+0x23/0x80 io_uring/rw.c:363 io_init_req io_uring/io_uring.c:2235 [inline] io_submit_sqe io_uring/io_uring.c:2282 [inline] io_submit_sqes+0x40d/0xf40 io_uring/io_uring.c:2435 __do_sys_io_uring_enter+0x841/0xcf0 io_uring/io_uring.c:3285 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f connection error: failed to recv *flatrpc.ExecutorMessageRawT: EOF --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this issue. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot. If the report is already addressed, let syzbot know by replying with: #syz fix: exact-commit-title If you want syzbot to run the reproducer, reply with: #syz test: git://repo/address.git branch-or-commit-hash If you attach or paste a git patch, syzbot will apply it before testing. If you want to overwrite report's subsystems, reply with: #syz set subsystems: new-subsystem (See the list of subsystem names on the web dashboard) If the report is a duplicate of another one, reply with: #syz dup: exact-subject-of-another-report If you want to undo deduplication, reply with: #syz undup From - Sun Jan 18 18:42:01 2026 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Return-Path: Delivered-To: hi@josie.lol Received: from witcher.mxrouting.net by witcher.mxrouting.net with LMTP id aIw6F3UpbWmbDhwAYBR5ng (envelope-from ) for ; Sun, 18 Jan 2026 18:41:57 +0000 Return-path: Envelope-to: hi@josie.lol Delivery-date: Sun, 18 Jan 2026 18:41:57 +0000 Received: from sea.lore.kernel.org ([172.234.253.10]) by witcher.mxrouting.net with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384 (Exim 4.98) (envelope-from ) id 1vhXim-00000007jmp-47Qe for hi@josie.lol; Sun, 18 Jan 2026 18:41:57 +0000 Received: from smtp.subspace.kernel.org (conduit.subspace.kernel.org [100.90.174.1]) by sea.lore.kernel.org (Postfix) with ESMTP id 23EFB3007C76 for ; Sun, 18 Jan 2026 18:41:48 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 8C6512FD696; Sun, 18 Jan 2026 18:41:47 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=mac.com header.i=@mac.com header.b="lS58KSQU" X-Original-To: stable@vger.kernel.org Received: from outbound.mr.icloud.com (p-west2-cluster5-host3-snip4-2.eps.apple.com [57.103.71.85]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 48A45238C3B for ; Sun, 18 Jan 2026 18:41:46 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=57.103.71.85 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1768761707; cv=none; b=nkhH24MDloeLsGRR4rXv66PaERJqd4DaNeUpDoiKNCowEcd0HM48MFeTHb/p1W3XIlW0v5CDsOBxxVG7BHStSvGIlzKsaENCFsclfFcfl2DxMbGF3kvzj/+oMw/Ga17n3XiZyMBGWdhSCAJUyCGLkMIG8lVzhrl/xnO9w90Z+Lw= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1768761707; c=relaxed/simple; bh=pjtbuDlqoDmoMLqut2ibzsqKWg9OJwsmzEZB5/sUYBc=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=rISaY/xLoetTOd3XSuT5/cQxUACTLlBGNLhRXegA2jvV5OmwOR8TxwdEwOuXwLAyu+8DM6lxs7/QlNoK2TJNc1NGS/M8siLysq4sdW32+TNjV+u441RqHXy4uWj9xYQbXRE9aLzPEfaid/ne/Cl5SrEXxsjqolUK8XV0B5vOAYY= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=mac.com; spf=pass smtp.mailfrom=mac.com; dkim=pass (2048-bit key) header.d=mac.com header.i=@mac.com header.b=lS58KSQU; arc=none smtp.client-ip=57.103.71.85 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=mac.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=mac.com Received: from outbound.mr.icloud.com (unknown [127.0.0.2]) by p00-icloudmta-asmtp-us-west-2a-60-percent-0 (Postfix) with ESMTPS id 51D0518001CC; Sun, 18 Jan 2026 18:41:45 +0000 (UTC) Dkim-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mac.com; s=1a1hai; bh=xjvMi6GFGlbqgGmmeOFvWqPwsPoBgy/JjXDenAmtqfw=; h=Message-ID:Date:MIME-Version:Subject:To:From:Content-Type:x-icloud-hme; b=lS58KSQUIXGRZPrvj3fnSokrXvpFexaSb6sRzGfpY/OYR+egnKsRRmUc9ESl+eWQXWwSJNaO8I5zPqGsPL4BgPrUkllQmXj9PoPahiCP4k9ac64btshfIOPENqiABavwfnaowdyZNBFKLaR/Ww0118D2zyKduIcJ0qq4uVkm7MU1A8nOLxCmGxpQrFWNsxQBf9ko5VUlyM8ksme652oJGU92iFYlQPrEHXnDtWOMcesxDIAQ4JETW0RJ+fywKREn/1LkmgZ3tbXF81Dpv4ruurTEzlKDORLONlbiwPUo6yKMa+6ZEmg/UYFIQPaxwgfckwkedI5zQ01pVRd6rkxn0g== Received: from [192.168.1.216] (unknown [17.57.152.38]) by p00-icloudmta-asmtp-us-west-2a-60-percent-0 (Postfix) with ESMTPSA id CBF3218001FD; Sun, 18 Jan 2026 18:41:43 +0000 (UTC) Message-ID: <4c70fe51-56c3-4292-9eda-f0f4535718fe@mac.com> Date: Sun, 18 Jan 2026 12:41:42 -0600 Precedence: bulk X-Mailing-List: stable@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v2] powerpc: Add reloc_offset() to font bitmap pointer used for bootx_printf() To: Madhavan Srinivasan , Michael Ellerman , Nicholas Piggin , Christophe Leroy , Finn Thain Cc: Stan Johnson , "Dr. David Alan Gilbert" , Benjamin Herrenschmidt , stable@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org References: <22b3b247425a052b079ab84da926706b3702c2c7.1762731022.git.fthain@linux-m68k.org> <176680916368.22434.818943585854783800.b4-ty@linux.ibm.com> Content-Language: en-US From: Cedar Maxwell In-Reply-To: <176680916368.22434.818943585854783800.b4-ty@linux.ibm.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Authority-Info: v=2.4 cv=XrP3+FF9 c=1 sm=1 tr=0 ts=696d2969 cx=c_apl:c_apl_out:c_pps a=9OgfyREA4BUYbbCgc0Y0oA==:117 a=9OgfyREA4BUYbbCgc0Y0oA==:17 a=IkcTkHD0fZMA:10 a=vUbySO9Y5rIA:10 a=x7bEGLp0ZPQA:10 a=fPXO8E_wjBMA:10 a=VkNPw1HP01LnGYTKEx00:22 a=VwQbUJbxAAAA:8 a=JXPk7LadgWurrYbJNRoA:9 a=QEXdDO2ut3YA:10 X-Proofpoint-Spam-Details-Enc: AW1haW4tMjYwMTE4MDE2NCBTYWx0ZWRfXwERN4npg9hhe QcSRTksUbDg8c5Aw8/AqjSopXXaAJ0IBhSDzpPGLBk39SaKa+6Yshw4eLS2GY57C/aZbh6SYq8M cgYuZqXW/WGKH6k7Srg5FNe1jK49aY9oAvVAF6igfb347JBnRsgN2ZIWmvpc6g+QT3gzusEFntS dOUbbLq7G1rUv0scG3vSUNQYI5rMLdJyz81qyJTeunI9+Zotbj37PwcIhuhQXa93Py8rTYVOf6t UCiC1q5u0666KCqRIFvcl2XEyMhguV44R5MPCVuRd3Mb16D9W/UX7x2J4j121FS7vKO9FgpsaPt vBOKSZGQDy+W3fNQPC4 X-Proofpoint-GUID: _RSHnb2iLwpQezYNpt68GTNW8-_s-jgY X-Proofpoint-ORIG-GUID: _RSHnb2iLwpQezYNpt68GTNW8-_s-jgY X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1121,Hydra:6.1.9,FMLib:17.12.100.49 definitions=2026-01-17_03,2026-01-15_02,2025-10-01_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 phishscore=0 adultscore=0 suspectscore=0 mlxscore=0 malwarescore=0 spamscore=0 mlxlogscore=999 clxscore=1011 bulkscore=0 classifier=spam authscore=0 adjust=0 reason=mlx scancount=1 engine=8.22.0-2510240001 definitions=main-2601180164 X-JNJ: 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 X-DKIM: signer='mac.com' status='pass' reason='' DKIMCheck: Server passes DKIM test, 0 Spam score X-Spam-Score: 0.4 (/) X-Spam-Report: Spam detection software, running on the system "witcher.mxrouting.net", has performed the tests listed below against this email. Information: https://mxroutedocs.com/directadmin/spamfilters/ --- Content analysis details: (0.4 points) --- pts rule name description ---- ---------------------- ----------------------------------------- 0.0 RCVD_IN_DNSWL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to DNSWL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#DnsBlocklists-dnsbl-block for more information. [172.234.253.10 listed in list.dnswl.org] 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider [cedarmaxwell[at]mac.com] 1.5 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level mail domains are different -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.0 FREEMAIL_FORGED_FROMDOMAIN 2nd level domains in From and EnvelopeFrom freemail headers are different -1.0 MAILING_LIST_MULTI Multiple indicators imply a widely-seen list manager SpamTally: Final spam score: 4 Maddy (and everyone else), Thank you all for your hard work in solving this issue! Cedar Maxwell On 12/26/25 10:23 PM, Madhavan Srinivasan wrote: > On Mon, 10 Nov 2025 10:30:22 +1100, Finn Thain wrote: >> Since Linux v6.7, booting using BootX on an Old World PowerMac produces >> an early crash. Stan Johnson writes, "the symptoms are that the screen >> goes blank and the backlight stays on, and the system freezes (Linux >> doesn't boot)." >> >> Further testing revealed that the failure can be avoided by disabling >> CONFIG_BOOTX_TEXT. Bisection revealed that the regression was caused by >> a change to the font bitmap pointer that's used when btext_init() begins >> painting characters on the display, early in the boot process. >> >> [...] > Applied to powerpc/fixes. > > [1/1] powerpc: Add reloc_offset() to font bitmap pointer used for bootx_printf() > https://git.kernel.org/powerpc/c/b94b73567561642323617155bf4ee24ef0d258fe > > cheers From - Sun Jan 18 18:44:52 2026 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Return-Path: Delivered-To: hi@josie.lol Received: from witcher.mxrouting.net by witcher.mxrouting.net with LMTP id 6GfRCyAqbWlD2hoAYBR5ng (envelope-from ) for ; Sun, 18 Jan 2026 18:44:48 +0000 Return-path: Envelope-to: hi@josie.lol Delivery-date: Sun, 18 Jan 2026 18:44:48 +0000 Received: from sea.lore.kernel.org ([172.234.253.10]) by witcher.mxrouting.net with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384 (Exim 4.98) (envelope-from ) id 1vhXlX-00000007oAO-3YWc for hi@josie.lol; Sun, 18 Jan 2026 18:44:48 +0000 Received: from smtp.subspace.kernel.org (conduit.subspace.kernel.org [100.90.174.1]) by sea.lore.kernel.org (Postfix) with ESMTP id 43F6A3005FF1 for ; Sun, 18 Jan 2026 18:44:46 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1])