From: Laurent Pinchart <laurent.pinchart@ideasonboard.com>
To: Sasha Levin <sashal@kernel.org>
Cc: Steven Rostedt <rostedt@goodmis.org>,
Richard Weinberger <richard@nod.at>,
Linus Torvalds <torvalds@linuxfoundation.org>,
Thorsten Leemhuis <linux@leemhuis.info>,
Geert Uytterhoeven <geert@linux-m68k.org>,
Andrew Morton <akpm@linux-foundation.org>,
Konstantin Ryabitsev <konstantin@linuxfoundation.org>,
users <users@kernel.org>, ksummit <ksummit@lists.linux.dev>
Subject: Re: slowly decommission bugzilla?
Date: Sun, 1 Mar 2026 16:35:26 +0100 [thread overview]
Message-ID: <20260301153526.GE2860169@killaraus.ideasonboard.com> (raw)
In-Reply-To: <aaRZ1EIDE-SlqWOo@laps>
On Sun, Mar 01, 2026 at 10:23:00AM -0500, Sasha Levin wrote:
> On Sat, Feb 28, 2026 at 03:56:11PM -0500, Steven Rostedt wrote:
> >On Sat, 28 Feb 2026 21:28:57 +0100 (CET)
> > Richard Weinberger <richard@nod.at> wrote:
> >
> >> Wouldn't that only work if the report is able to upload the kernel debug
> >> info too?
> >
> > Yes, this would be nice if we had the help from the distros that could
> > automate this process.
>
> So I've been poking at using LLMs for this.
>
> decode_stacktrace.sh is great when you have a debug build handy, but
> asking a random bug reporter to obtain debuginfo, set up the tooling,
> and run the script is quite the hurdle.
>
> The debuginfo problem is solvable on the server side though. Given a
> kernel version string from the oops, an LLM can figure out which distro
> and package version the reporter is running, pull the right debuginfo
> (or build from the matching config/tag if no debuginfo package exists),
> and run decode_stacktrace.sh itself.
Do we really have to use non-deterministic tools that will inevitably
produce correct-looking but otherwise useless backtraces from time to
time, confusing developers and wasting time for everybody, when we can
instead easily develop tools that will work in a deterministic fashion ?
I'm getting *really* sick of people pushing for LLM usage when it's
clearly the wrong tool. Please stop.
> In the example below it figured
> out this was an Arch chaotic-aur build, found no debuginfo package
> available, so it built vmlinux from the v7.0-rc1 tag with the Arch
> PKGBUILD config and verified the disassembly matched the crash dump
> byte-for-byte. That's the kind of thing no reporter is ever going to
> do, but a bot can do it routinely.
>
> As an example, this bug report came in today with no replies:
>
> https://lore.kernel.org/all/DGRCO9SL0T5U.JTINSHJQ9KPK@imlonghao.com/
>
> I fed it to an LLM. It decoded the stack trace (as described above),
> then traced the crash to iptfs_reassem_cont() at xfrm_iptfs.c:905:
> skb_put() on a non-linear skb. It identified the offending commit
> (5f2b6a9095743), the code author (Christian Hopps), the relevant
> maintainers, and a couple more vulnerable call sites in the same
> function. Not perfect, but enough to get the report to the right people
> with useful context already attached.
>
> What I'd like to propose: set up something like bug@kernel.org with a
> bot that watches it. When a report comes in, it:
>
> 1. Pulls the oops/stack trace from the email (if exists)
> 2. Figures out the kernel version, obtains or builds debuginfo, and
> decodes the stack trace
> 3. Reads the relevant source, identifies root cause, offending commit,
> and the right maintainers/lists
> 4. Forwards the report with its analysis to the right list, Cc'ing
> the right people
>
> One email address, no tooling required from the reporter, bugs get to
> the right list with a decoded stack trace and first-pass analysis. The
> analysis will be wrong sometimes, but even just the decoded trace and
> correct routing is better than what bugzilla gives us today.
>
> For reference, below is the full output of the LLM analysis of the bug
> report linked above. This is what the bot would attach when forwarding
> a report to maintainers:
>
>
> ==============================================================================
> 1. Bug Summary
> ==============================================================================
>
> A kernel panic occurs in the XFRM IP-TFS (IP Traffic Flow Security, RFC 9347)
> reassembly path when receiving inner packets that span three or more IPTFS
> tunnel packets. The crash is a BUG() in skb_put() (net/core/skbuff.c:2651),
> triggered by the SKB_LINEAR_ASSERT() macro, which fires because skb_put() is
> called on a socket buffer that has already been made non-linear by a prior
> fragment-sharing operation. The panic is trivially reproducible: establish an
> IPsec tunnel with IPTFS AGGFRAG mode using strongSwan, then send a ping with
> payload larger than the tunnel MTU ("ping -s 3333"). The receiving end panics
> in interrupt context.
>
> Kernel versions : 7.0.0-rc1-1-mainline, 6.18.13-arch1-1, NixOS 6.18.13
> Distributions : Arch Linux, NixOS
> Architecture : x86_64 (SMP, PREEMPT full)
> Subsystem : XFRM / IPsec / IP-TFS (net/xfrm/xfrm_iptfs.c)
> Module : xfrm_iptfs
> Severity : Critical -- kernel panic in IRQ context, immediate crash
> Reporter : Hao Long <me@imlonghao.com>
> Date : 2026-03-01
>
> ==============================================================================
> 2. Code Analysis
> ==============================================================================
>
> --- Files and functions involved ---
>
> net/xfrm/xfrm_iptfs.c:905 iptfs_reassem_cont() -- FAULTING CALLER
> net/xfrm/xfrm_iptfs.c:1266 iptfs_input_ordered()
> net/xfrm/xfrm_iptfs.c:1725 iptfs_input()
> net/core/skbuff.c:2651 skb_put() -- BUG site
> include/linux/skbuff.h:2699 SKB_LINEAR_ASSERT() -- the assertion macro
>
> The crash site is net/xfrm/xfrm_iptfs.c line 905 in iptfs_reassem_cont():
>
> /* Try share then copy. */
> if (fragwalk &&
> iptfs_skb_can_add_frags(newskb, fragwalk, data, copylen)) {
> iptfs_skb_add_frags(newskb, fragwalk, data, copylen); /* line 902 */
> } else {
> /* copy fragment data into newskb */
> if (skb_copy_seq_read(st, data, skb_put(newskb, copylen), /* line 905 -- BUG */
> copylen)) {
>
> skb_put() (net/core/skbuff.c:2648-2657) contains:
>
> void *skb_put(struct sk_buff *skb, unsigned int len)
> {
> void *tmp = skb_tail_pointer(skb);
> SKB_LINEAR_ASSERT(skb); /* line 2651 -- BUG_ON(skb_is_nonlinear(skb)) */
> skb->tail += len;
> ...
> }
>
> SKB_LINEAR_ASSERT expands to BUG_ON(skb->data_len != 0). A non-linear skb
> (one with data in page fragments or a frag_list, indicated by data_len > 0)
> cannot be extended with skb_put() -- only the linear head area is addressable
> via skb_put().
>
> There are two additional skb_put() calls on newskb in the same function that
> are vulnerable to the same issue:
>
> net/xfrm/xfrm_iptfs.c:845 memcpy(skb_put(newskb, runtlen), ...)
> net/xfrm/xfrm_iptfs.c:870 skb_copy_seq_read(st, data, skb_put(newskb, copylen), ...)
>
> Line 845 is unlikely to trigger because it operates on a freshly allocated
> newskb. Line 870 (IP header completion path) could trigger under the same
> conditions as line 905 if the IP header is not yet complete when a non-linear
> newskb is being continued.
>
> --- Recent commits touching the relevant code ---
>
> 5f2b6a9095743 xfrm: iptfs: add skb-fragment sharing code <-- INTRODUCED THE BUG
> 3f3339885fb34 xfrm: iptfs: add reusing received skb for the tunnel egress packet
> 0756947654468 xfrm: iptfs: handle received fragmented inner packets
> 6c82d24336718 xfrm: iptfs: add basic receive packet (tunnel egress) handling
> 8579d342ea2b3 xfrm: iptfs: add fragmenting of larger than MTU user packets
> b96ba312e21c9 xfrm: iptfs: share page fragments of inner packets
> 0e4fbf013fa56 xfrm: iptfs: add user packet (tunnel ingress) handling
> 4b3faf610cc63 xfrm: iptfs: add new iptfs xfrm mode impl
> ed58b186c7737 xfrm: iptfs: add tracepoint functionality
> 6be02e3e4f376 xfrm: iptfs: handle reordering of received packets
>
> Author of the faulting code (git blame on lines 895-910):
>
> 5f2b6a9095743a (Christian Hopps 2024-11-14 02:07:10 -0500) -- all lines
>
> The entire fragment-sharing block (lines 891-911) was added in commit
> 5f2b6a9095743 by Christian Hopps as part of the 17-patch IPTFS series merged
> via Steffen Klassert's ipsec-next tree for 6.14-rc1.
>
> --- Root cause hypothesis ---
>
> The bug is a logic error in multi-packet reassembly with fragment sharing:
>
> 1. A large inner IP packet (e.g., 3333-byte ICMP echo) arrives at the IPTFS
> tunnel endpoint fragmented across multiple IPTFS tunnel packets.
>
> 2. For the first continuation packet, iptfs_reassem_cont() is called. The
> conditions at lines 892-894 are satisfied:
>
> if (!skb_has_frag_list(skb) && !skb_has_frag_list(newskb) &&
> (skb->head_frag || skb->len == skb->data_len) &&
> skb->pp_recycle == newskb->pp_recycle)
>
> and iptfs_skb_can_add_frags() returns true, so iptfs_skb_add_frags()
> (line 902) shares page fragments from the incoming skb into newskb. This
> makes newskb NON-LINEAR: newskb->data_len > 0, newskb->nr_frags > 0.
>
> 3. newskb is saved in xtfs->ra_newskb and the function returns, awaiting the
> next continuation packet.
>
> 4. When the second (or subsequent) continuation packet arrives,
> iptfs_reassem_cont() is called again with the same (now non-linear) newskb.
> This time, one of the fragment-sharing preconditions fails -- for example:
>
> - The new incoming skb may not have head_frag set AND skb->len != skb->data_len
> - iptfs_skb_can_add_frags() returns false (e.g., MAX_SKB_FRAGS reached)
> - The pp_recycle flags don't match
>
> 5. Execution falls to the else branch (line 903), which calls:
>
> skb_put(newskb, copylen)
>
> But newskb is non-linear from step 2. SKB_LINEAR_ASSERT fires. Kernel panic.
>
> Register state from the crash confirms this analysis:
> RSI = 0x30 (copylen = 48 bytes being appended)
> RAX = 0x56e (current skb->len = 1390, including fragment data)
>
> --- Affects mainline, stable, or distro-specific? ---
>
> This affects MAINLINE and all kernels containing commit 5f2b6a9095743, which
> was merged for the 6.14-rc1 merge window. It is not distro-specific -- it was
> reproduced on Arch Linux and NixOS with three different kernel versions
> (6.18.13 and 7.0.0-rc1).
>
> ==============================================================================
> 3. Prior Reports
> ==============================================================================
>
> --- Identical report (this bug) ---
>
> Subject: [BUG] Kernel Panic in iptfs_reassem_cont when handling large packets
> Author: Hao Long <me@imlonghao.com>
> Date: 2026-03-01
> URL: https://lore.kernel.org/netdev/DGRCO9SL0T5U.JTINSHJQ9KPK@imlonghao.com/
> Status: NO REPLIES as of analysis time
>
> --- Related patch (different bug, same file, same day) ---
>
> Subject: [PATCH] xfrm: iptfs: validate inner IPv4 header length in IPTFS payload
> Author: Roshan Kumar <roshaen09@gmail.com>
> Date: 2026-03-01
> URL: https://lore.kernel.org/all/20260301105638.11479-1-roshaen09@gmail.com/
> Fixes: 6c82d2433671 ("xfrm: iptfs: add basic receive packet (tunnel egress) handling")
> Note: Fixes a different bug -- infinite loop with tot_len=0 inner IPv4
> header. Does NOT fix the skb_put crash.
>
> --- Original patch series that introduced the code ---
>
> Subject: [PATCH ipsec-next 00/17] Add IP-TFS mode to xfrm
> Author: Steffen Klassert <steffen.klassert@secunet.com>
> Date: 2025-01-09
> URL: https://lore.kernel.org/netdev/20250109094321.2268124-1-steffen.klassert@secunet.com/
>
> No existing fix patch for this specific crash was found. This is a NEW,
> UNRESOLVED bug. It is not a known regression from a specific commit (it has
> existed since the fragment-sharing code was first merged).
>
> ==============================================================================
> 4. Decoded Stack Trace
> ==============================================================================
>
> Debug symbols: Built vmlinux and xfrm_iptfs.ko from v7.0-rc1 tag using the
> Arch Linux PKGBUILD config (CONFIG_DEBUG_INFO=y, CONFIG_DEBUG_INFO_DWARF5=y).
> Verified by disassembly that the compiled code is BYTE-IDENTICAL to the
> chaotic-aur prebuilt linux-mainline-7.0rc1-1 package: the entire
> iptfs_reassem_cont function (365 instructions) and skb_put function produce
> zero diff between local, chaotic-aur, and crash-dump code bytes. The 1-byte
> difference in the return-thunk jmp target (0xe9 0xc4 vs 0xe9 0xd4) is KASLR
> runtime patching. Relocation records confirm +0x128 is call skb_put, +0x144
> is call skb_copy_seq_read.
>
> Note: Actual debug packages are not available for this kernel. The AUR
> PKGBUILD has "!debug" and explicitly strips vmlinux. No debuginfod server
> (Arch, elfutils, Fedora, Ubuntu) indexes build ID
> b84afef9bed61122840347d0d1295877239d5881.
>
> Full decoded output from scripts/decode_stacktrace.sh:
>
> [ 412.126912] ------------[ cut here ]------------
> [ 412.126945] kernel BUG at net/core/skbuff.c:2651!
> [ 412.126974] Oops: invalid opcode: 0000 [#1] SMP PTI
> [ 412.127009] CPU: 2 UID: 0 PID: 0 Comm: swapper/2 Not tainted 7.0.0-rc1-1-mainline #1 PREEMPT(full)
> [ 412.127061] Hardware name: Vultr VC2, BIOS
> [ 412.127076] RIP: 0010:skb_put (net/core/skbuff.c:2651 (discriminator 3)) <<<< BUG: SKB_LINEAR_ASSERT
> All code
> ========
> 0: bc 00 00 00 01 mov $0x1000000,%esp
> 5: 77 70 ja 0x77
> 7: 48 89 c2 mov %rax,%rdx
> a: 48 03 87 c8 00 00 00 add 0xc8(%rdi),%rax
> 11: 01 f2 add %esi,%edx
> 13: 89 97 bc 00 00 00 mov %edx,0xbc(%rdi)
> 19: 39 97 c0 00 00 00 cmp %edx,0xc0(%rdi)
> 1f: 0f 82 c0 c2 14 ff jb 0xffffffffff14c2e5
> 25: e9 c4 a0 2f 00 jmp 0x2fa0ee
> 2a:* 0f 0b ud2 <-- trapping instruction (BUG())
> Code starting with the faulting instruction
> ===========================================
> 0: 0f 0b ud2
> [ 412.127288] Call Trace:
> [ 412.127298] <IRQ>
> [ 412.127308] iptfs_reassem_cont (net/xfrm/xfrm_iptfs.c:905 (discriminator 1)) xfrm_iptfs <<<< FAULTING CALLER
> [ 412.127335] iptfs_input_ordered (net/xfrm/xfrm_iptfs.c:1266) xfrm_iptfs
> [ 412.127356] iptfs_input (net/xfrm/xfrm_iptfs.c:1725 (discriminator 4)) xfrm_iptfs
> [ 412.127373] ? esp_input+0x1f7/0x330 [esp4]
> [ 412.127399] xfrm_input (net/xfrm/xfrm_input.c:695)
> [ 412.127449] xfrm4_esp_rcv (net/ipv4/xfrm4_protocol.c:104 (discriminator 1))
> [ 412.127473] ip_protocol_deliver_rcu (net/ipv4/ip_input.c:207 (discriminator 7))
> [ 412.127497] ip_local_deliver_finish (include/linux/rcupdate.h:883 net/ipv4/ip_input.c:242)
> [ 412.127509] __netif_receive_skb_core.constprop.0 (net/core/dev.c:2507 net/core/dev.c:6109)
> [ 412.127529] ? kmalloc_reserve (net/core/skbuff.c:616 (discriminator 107))
> [ 412.127540] ? __alloc_skb (net/core/skbuff.c:714 (discriminator 1))
> [ 412.127551] ? napi_alloc_skb (net/core/skbuff.c:853)
> [ 412.127568] ? page_to_skb+0x2a9/0x400 [virtio_net]
> [ 412.127610] __netif_receive_skb_list_core (net/core/dev.c:6232)
> [ 412.127628] netif_receive_skb_list_internal (net/core/dev.c:6300 net/core/dev.c:6389)
> [ 412.127645] napi_complete_done (include/linux/list.h:45 include/net/gro.h:524 net/core/dev.c:6757)
> [ 412.127660] ? virtnet_rq_get_buf+0x2d/0x60 [virtio_net]
> [ 412.127684] virtnet_poll+0x6de/0xdbd [virtio_net]
> [ 412.127710] __napi_poll (arch/x86/include/asm/jump_label.h:37 include/trace/events/napi.h:14 net/core/dev.c:7685)
> [ 412.127723] ? skb_defer_free_flush (net/core/dev.c:6802 (discriminator 3))
> [ 412.127745] net_rx_action (net/core/dev.c:7747 net/core/dev.c:7899)
> [ 412.127761] handle_softirqs (arch/x86/include/asm/jump_label.h:37 include/trace/events/irq.h:142 kernel/softirq.c:623)
> [ 412.127802] __irq_exit_rcu (kernel/softirq.c:657 kernel/softirq.c:496 kernel/softirq.c:723)
> [ 412.127817] common_interrupt (arch/x86/kernel/irq.c:326 (discriminator 49))
> [ 412.127848] </IRQ>
> [ 412.127858] <TASK>
> [ 412.127867] asm_common_interrupt (arch/x86/include/asm/idtentry.h:688)
> [ 412.127904] RIP: 0010:pv_native_safe_halt (arch/x86/kernel/paravirt.c:63)
> [ 412.127926] default_idle
> [ 412.127926] default_idle_call
> [ 412.127926] do_idle
> [ 412.127926] cpu_startup_entry
> [ 412.127926] start_secondary
> [ 412.127926] common_startup_64
> [ 412.127926] </TASK>
>
> --- Most relevant frames ---
>
> #0 skb_put() net/core/skbuff.c:2651
> BUG_ON(skb_is_nonlinear(skb)) fires -- skb->data_len != 0 because page
> fragments were previously added by iptfs_skb_add_frags().
>
> #1 iptfs_reassem_cont() net/xfrm/xfrm_iptfs.c:905 <<<< ROOT CAUSE
> The call: skb_put(newskb, copylen)
> This is the else-branch fallback copy path after the fragment-sharing
> check at lines 900-901 fails. newskb was made non-linear by a prior
> invocation that took the fragment-sharing path at line 902.
>
> #2 iptfs_input_ordered() net/xfrm/xfrm_iptfs.c:1266
> Calls iptfs_reassem_cont() to continue reassembly of a fragmented
> inner packet using the next IPTFS tunnel packet in sequence.
>
> #3 iptfs_input() net/xfrm/xfrm_iptfs.c:1725
> Entry point for IPTFS tunnel packet processing (xfrm input callback).
>
> --- Inline expansions / compiler artifacts ---
>
> - "discriminator 1" at xfrm_iptfs.c:905 indicates this is a specific
> branch path within the source line (the else branch).
> - "discriminator 3" at skbuff.c:2651 indicates the BUG_ON expansion
> within skb_put().
> - ip_local_deliver_finish shows inlining from include/linux/rcupdate.h:883
> (rcu_read_lock/unlock wrappers).
> - napi_complete_done shows inlining from include/net/gro.h:524
> (GRO list flush helpers).
>
> ==============================================================================
> 5. Contacts
> ==============================================================================
>
> --- Maintainers (from scripts/get_maintainer.pl -f net/xfrm/xfrm_iptfs.c) ---
>
> Steffen Klassert <steffen.klassert@secunet.com> (maintainer: NETWORKING [IPSEC])
> Herbert Xu <herbert@gondor.apana.org.au> (maintainer: NETWORKING [IPSEC])
> "David S. Miller" <davem@davemloft.net> (maintainer: NETWORKING [IPSEC])
> Eric Dumazet <edumazet@google.com> (maintainer: NETWORKING [GENERAL])
> Jakub Kicinski <kuba@kernel.org> (maintainer: NETWORKING [GENERAL])
> Paolo Abeni <pabeni@redhat.com> (maintainer: NETWORKING [GENERAL])
>
> --- Reviewer ---
>
> Simon Horman <horms@kernel.org> (reviewer: NETWORKING [GENERAL])
>
> --- Code author (wrote the faulting code) ---
>
> Christian Hopps <chopps@labn.net>
> Author of commit 5f2b6a9095743 ("xfrm: iptfs: add skb-fragment sharing code")
> Author of the entire xfrm_iptfs.c file (all commits 4b3faf610cc63 through
> ed58b186c7737, November 2024).
>
> --- Git signers / recent contributors ---
>
> Kees Cook <kees@kernel.org> (commit_signer: 50%, recent treewide changes)
> Neil Armstrong <neil.armstrong@linaro.org> (commit_signer: 50%)
>
> --- Mailing lists ---
>
> netdev@vger.kernel.org (primary -- NETWORKING [IPSEC])
> linux-kernel@vger.kernel.org
>
> ==============================================================================
> 6. Recommended Next Steps
> ==============================================================================
>
> --- Does a fix already exist? ---
>
> No. No fix patch exists on lore.kernel.org or in mainline as of 2026-03-01.
> This is a new, unresolved bug.
>
> --- Is more information needed from the reporter? ---
>
> No. The bug report is complete: it includes kernel version, reproduction steps,
> full stack trace, and confirmation across three kernel/distro combinations. The
> root cause is clear from code analysis.
>
> --- Suggested patch direction ---
>
> The fix must ensure that skb_put() is never called on a non-linear newskb in
> iptfs_reassem_cont(). The most straightforward approach:
>
> Option A (simplest): In the else branch at line 903, before calling
> skb_put(), linearize newskb if it is non-linear:
>
> } else {
> if (skb_is_nonlinear(newskb) &&
> __skb_linearize(newskb))
> goto abandon;
> if (skb_copy_seq_read(st, data, skb_put(newskb, copylen), ...))
>
> This preserves correctness at the cost of a copy when the fallback path is
> taken after prior fragment sharing. The same fix should be applied to the
> skb_put() at line 870 (IP header completion path).
>
> Option B (more targeted): Always add remaining data as fragments instead of
> falling back to skb_put(). When the fragwalk path fails, allocate new page
> fragments and add them to the skb rather than trying to copy into the linear
> head. This avoids the linearization cost but is more complex.
>
> Option C (conservative): Disable fragment sharing when reassembly will span
> more than two tunnel packets, ensuring newskb stays linear throughout
> reassembly. Simplest to reason about but gives up the optimization for
> large packets.
>
> The Fixes tag should be:
>
> Fixes: 5f2b6a9095743 ("xfrm: iptfs: add skb-fragment sharing code")
> Reported-by: Hao Long <me@imlonghao.com>
>
> --- Which tree should the fix target? ---
>
> - Mainline (net tree, via Steffen Klassert / ipsec)
> - Then backport to stable (affects all kernels >= 6.14 that contain
> commit 5f2b6a9095743)
--
Regards,
Laurent Pinchart
next prev parent reply other threads:[~2026-03-01 15:35 UTC|newest]
Thread overview: 117+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-12-10 4:48 kernel.org tooling update Konstantin Ryabitsev
2025-12-10 8:11 ` Mauro Carvalho Chehab
2025-12-10 13:30 ` Thorsten Leemhuis
2025-12-11 3:04 ` Theodore Tso
2025-12-12 23:48 ` Stephen Hemminger
2025-12-12 23:54 ` Randy Dunlap
2025-12-16 16:21 ` Lukas Wunner
2025-12-16 20:33 ` Jeff Johnson
2025-12-17 0:47 ` Mario Limonciello
2025-12-18 13:37 ` Jani Nikula
2025-12-18 14:09 ` Mario Limonciello
2026-01-23 9:19 ` Web of Trust work [Was: kernel.org tooling update] Uwe Kleine-König
2026-01-23 9:29 ` Greg KH
2026-01-23 11:47 ` Mauro Carvalho Chehab
2026-01-23 11:58 ` Greg KH
2026-01-23 12:24 ` Mauro Carvalho Chehab
2026-01-23 12:29 ` Greg KH
2026-01-23 13:57 ` Konstantin Ryabitsev
2026-01-23 16:24 ` James Bottomley
2026-01-23 16:33 ` Greg KH
2026-01-23 16:42 ` Joe Perches
2026-01-23 17:00 ` Steven Rostedt
2026-01-23 17:23 ` James Bottomley
2026-01-23 18:23 ` Konstantin Ryabitsev
2026-01-23 21:12 ` Uwe Kleine-König
2026-01-26 16:23 ` Konstantin Ryabitsev
2026-01-26 17:32 ` Uwe Kleine-König
2026-01-26 21:01 ` Konstantin Ryabitsev
2026-01-26 23:23 ` James Bottomley
2026-01-27 8:39 ` Uwe Kleine-König
2026-01-27 21:08 ` Linus Torvalds
2026-02-04 10:49 ` Uwe Kleine-König
2026-02-05 10:14 ` James Bottomley
2026-02-05 18:07 ` Uwe Kleine-König
2026-02-05 18:23 ` Konstantin Ryabitsev
2026-01-26 23:33 ` Mauro Carvalho Chehab
2026-01-26 23:06 ` Mauro Carvalho Chehab
2026-01-23 21:38 ` James Bottomley
2026-01-23 22:55 ` Mauro Carvalho Chehab
2026-01-23 16:38 ` Konstantin Ryabitsev
2026-01-23 17:02 ` Paul Moore
2026-03-08 7:21 ` Uwe Kleine-König
2026-03-08 10:24 ` Greg KH
2026-03-18 14:02 ` Greg KH
2026-01-23 18:42 ` kernel.org tooling update Randy Dunlap
2026-02-26 8:44 ` slowly decommission bugzilla? (was: Re: kernel.org tooling update) Thorsten Leemhuis
2026-02-26 14:40 ` Andrew G. Morgan
2026-02-26 17:04 ` Andrew Morton
2026-02-27 11:07 ` Jani Nikula
2026-02-27 15:16 ` Steven Rostedt
2026-02-27 15:18 ` Mark Brown
2026-02-27 15:44 ` Steven Rostedt
2026-02-27 15:18 ` slowly decommission bugzilla? Sven Peter
2026-02-27 15:35 ` slowly decommission bugzilla? (was: Re: kernel.org tooling update) Richard Weinberger
2026-02-27 16:00 ` Geert Uytterhoeven
2026-02-27 16:22 ` Richard Weinberger
2026-02-27 16:29 ` Peter Zijlstra
2026-02-27 17:07 ` James Bottomley
2026-02-28 13:41 ` slowly decommission bugzilla? Thorsten Leemhuis
2026-02-28 15:17 ` Richard Weinberger
2026-02-28 17:40 ` Linus Torvalds
2026-02-28 18:29 ` Richard Weinberger
2026-02-28 20:26 ` Steven Rostedt
2026-02-28 20:28 ` Richard Weinberger
2026-02-28 20:56 ` Steven Rostedt
2026-03-01 15:23 ` Sasha Levin
2026-03-01 15:35 ` Laurent Pinchart [this message]
2026-03-01 15:42 ` Sasha Levin
2026-03-01 16:13 ` Laurent Pinchart
2026-03-01 16:27 ` Sasha Levin
2026-03-06 15:01 ` Laurent Pinchart
2026-03-07 16:19 ` Sasha Levin
2026-03-01 16:15 ` James Bottomley
2026-03-01 16:49 ` Laurent Pinchart
2026-03-02 8:55 ` Mauro Carvalho Chehab
2026-03-01 17:33 ` Linus Torvalds
2026-03-02 20:28 ` [RFC] kallsyms: embed source file:line info in kernel stack traces Sasha Levin
2026-03-03 5:39 ` Alexey Dobriyan
2026-03-03 12:44 ` Sasha Levin
2026-03-03 13:17 ` Steven Rostedt
2026-03-03 16:35 ` Sasha Levin
2026-03-06 15:22 ` Laurent Pinchart
2026-03-03 19:09 ` Alexey Dobriyan
2026-03-03 6:26 ` Richard Weinberger
2026-03-03 6:48 ` Tomasz Figa
2026-03-03 9:04 ` Vlastimil Babka (SUSE)
2026-03-03 12:45 ` Sasha Levin
2026-03-03 8:11 ` Geert Uytterhoeven
2026-03-03 9:31 ` Jiri Slaby
2026-03-03 12:47 ` Sasha Levin
2026-03-03 12:58 ` James Bottomley
2026-03-03 13:08 ` Jürgen Groß
2026-03-03 8:09 ` Geert Uytterhoeven
2026-03-03 22:44 ` Helge Deller
2026-03-03 22:47 ` Sasha Levin
2026-03-01 16:01 ` slowly decommission bugzilla? James Bottomley
2026-03-01 16:16 ` Sasha Levin
2026-03-01 16:25 ` James Bottomley
2026-03-01 16:33 ` Sasha Levin
2026-03-06 10:37 ` Richard Weinberger
2026-03-06 10:44 ` Geert Uytterhoeven
2026-03-15 14:58 ` Richard Weinberger
2026-03-16 11:28 ` Greg KH
2026-03-16 21:56 ` Richard Weinberger
2026-03-17 7:51 ` Greg Kroah-Hartman
2026-04-02 4:59 ` slowly decommission bugzilla? (was: Re: kernel.org tooling update) Konstantin Ryabitsev
2026-04-02 13:07 ` Theodore Tso
2026-04-02 13:28 ` Konstantin Ryabitsev
2026-04-02 14:08 ` Theodore Tso
2026-04-02 14:21 ` Konstantin Ryabitsev
2026-04-02 14:49 ` Steven Rostedt
2026-04-02 13:51 ` James Bottomley
2026-04-02 13:42 ` slowly decommission bugzilla? Thorsten Leemhuis
2026-04-02 14:04 ` Konstantin Ryabitsev
2026-04-02 14:15 ` Richard Weinberger
2026-04-02 15:45 ` Laurent Pinchart
2026-04-02 16:04 ` Thorsten Leemhuis
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260301153526.GE2860169@killaraus.ideasonboard.com \
--to=laurent.pinchart@ideasonboard.com \
--cc=akpm@linux-foundation.org \
--cc=geert@linux-m68k.org \
--cc=konstantin@linuxfoundation.org \
--cc=ksummit@lists.linux.dev \
--cc=linux@leemhuis.info \
--cc=richard@nod.at \
--cc=rostedt@goodmis.org \
--cc=sashal@kernel.org \
--cc=torvalds@linuxfoundation.org \
--cc=users@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox