ksummit.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
From: Laurent Pinchart <laurent.pinchart@ideasonboard.com>
To: Sasha Levin <sashal@kernel.org>
Cc: Steven Rostedt <rostedt@goodmis.org>,
	Richard Weinberger <richard@nod.at>,
	Linus Torvalds <torvalds@linuxfoundation.org>,
	Thorsten Leemhuis <linux@leemhuis.info>,
	Geert Uytterhoeven <geert@linux-m68k.org>,
	Andrew Morton <akpm@linux-foundation.org>,
	Konstantin Ryabitsev <konstantin@linuxfoundation.org>,
	users <users@kernel.org>, ksummit <ksummit@lists.linux.dev>
Subject: Re: slowly decommission bugzilla?
Date: Sun, 1 Mar 2026 16:35:26 +0100	[thread overview]
Message-ID: <20260301153526.GE2860169@killaraus.ideasonboard.com> (raw)
In-Reply-To: <aaRZ1EIDE-SlqWOo@laps>

On Sun, Mar 01, 2026 at 10:23:00AM -0500, Sasha Levin wrote:
> On Sat, Feb 28, 2026 at 03:56:11PM -0500, Steven Rostedt wrote:
> >On Sat, 28 Feb 2026 21:28:57 +0100 (CET)
> > Richard Weinberger <richard@nod.at> wrote:
> >
> >> Wouldn't that only work if the report is able to upload the kernel debug
> >> info too?
> >
> > Yes, this would be nice if we had the help from the distros that could
> > automate this process.
> 
> So I've been poking at using LLMs for this.
> 
> decode_stacktrace.sh is great when you have a debug build handy, but
> asking a random bug reporter to obtain debuginfo, set up the tooling,
> and run the script is quite the hurdle.
> 
> The debuginfo problem is solvable on the server side though. Given a
> kernel version string from the oops, an LLM can figure out which distro
> and package version the reporter is running, pull the right debuginfo
> (or build from the matching config/tag if no debuginfo package exists),
> and run decode_stacktrace.sh itself.

Do we really have to use non-deterministic tools that will inevitably
produce correct-looking but otherwise useless backtraces from time to
time, confusing developers and wasting time for everybody, when we can
instead easily develop tools that will work in a deterministic fashion ?
I'm getting *really* sick of people pushing for LLM usage when it's
clearly the wrong tool. Please stop.

> In the example below it figured
> out this was an Arch chaotic-aur build, found no debuginfo package
> available, so it built vmlinux from the v7.0-rc1 tag with the Arch
> PKGBUILD config and verified the disassembly matched the crash dump
> byte-for-byte. That's the kind of thing no reporter is ever going to
> do, but a bot can do it routinely.
> 
> As an example, this bug report came in today with no replies:
> 
>    https://lore.kernel.org/all/DGRCO9SL0T5U.JTINSHJQ9KPK@imlonghao.com/
> 
> I fed it to an LLM. It decoded the stack trace (as described above),
> then traced the crash to iptfs_reassem_cont() at xfrm_iptfs.c:905:
> skb_put() on a non-linear skb. It identified the offending commit
> (5f2b6a9095743), the code author (Christian Hopps), the relevant
> maintainers, and a couple more vulnerable call sites in the same
> function. Not perfect, but enough to get the report to the right people
> with useful context already attached.
> 
> What I'd like to propose: set up something like bug@kernel.org with a
> bot that watches it. When a report comes in, it:
> 
>   1. Pulls the oops/stack trace from the email (if exists)
>   2. Figures out the kernel version, obtains or builds debuginfo, and
>      decodes the stack trace
>   3. Reads the relevant source, identifies root cause, offending commit,
>      and the right maintainers/lists
>   4. Forwards the report with its analysis to the right list, Cc'ing
>      the right people
> 
> One email address, no tooling required from the reporter, bugs get to
> the right list with a decoded stack trace and first-pass analysis. The
> analysis will be wrong sometimes, but even just the decoded trace and
> correct routing is better than what bugzilla gives us today.
> 
> For reference, below is the full output of the LLM analysis of the bug
> report linked above. This is what the bot would attach when forwarding
> a report to maintainers:
> 
> 
> ==============================================================================
> 1. Bug Summary
> ==============================================================================
> 
> A kernel panic occurs in the XFRM IP-TFS (IP Traffic Flow Security, RFC 9347)
> reassembly path when receiving inner packets that span three or more IPTFS
> tunnel packets. The crash is a BUG() in skb_put() (net/core/skbuff.c:2651),
> triggered by the SKB_LINEAR_ASSERT() macro, which fires because skb_put() is
> called on a socket buffer that has already been made non-linear by a prior
> fragment-sharing operation. The panic is trivially reproducible: establish an
> IPsec tunnel with IPTFS AGGFRAG mode using strongSwan, then send a ping with
> payload larger than the tunnel MTU ("ping -s 3333"). The receiving end panics
> in interrupt context.
> 
> Kernel versions : 7.0.0-rc1-1-mainline, 6.18.13-arch1-1, NixOS 6.18.13
> Distributions   : Arch Linux, NixOS
> Architecture    : x86_64 (SMP, PREEMPT full)
> Subsystem       : XFRM / IPsec / IP-TFS (net/xfrm/xfrm_iptfs.c)
> Module          : xfrm_iptfs
> Severity        : Critical -- kernel panic in IRQ context, immediate crash
> Reporter        : Hao Long <me@imlonghao.com>
> Date            : 2026-03-01
> 
> ==============================================================================
> 2. Code Analysis
> ==============================================================================
> 
> --- Files and functions involved ---
> 
>    net/xfrm/xfrm_iptfs.c:905    iptfs_reassem_cont()   -- FAULTING CALLER
>    net/xfrm/xfrm_iptfs.c:1266   iptfs_input_ordered()
>    net/xfrm/xfrm_iptfs.c:1725   iptfs_input()
>    net/core/skbuff.c:2651        skb_put()              -- BUG site
>    include/linux/skbuff.h:2699   SKB_LINEAR_ASSERT()    -- the assertion macro
> 
> The crash site is net/xfrm/xfrm_iptfs.c line 905 in iptfs_reassem_cont():
> 
>      /* Try share then copy. */
>      if (fragwalk &&
>          iptfs_skb_can_add_frags(newskb, fragwalk, data, copylen)) {
>              iptfs_skb_add_frags(newskb, fragwalk, data, copylen);  /* line 902 */
>      } else {
>              /* copy fragment data into newskb */
>              if (skb_copy_seq_read(st, data, skb_put(newskb, copylen),  /* line 905 -- BUG */
>                                    copylen)) {
> 
> skb_put() (net/core/skbuff.c:2648-2657) contains:
> 
>      void *skb_put(struct sk_buff *skb, unsigned int len)
>      {
>              void *tmp = skb_tail_pointer(skb);
>              SKB_LINEAR_ASSERT(skb);             /* line 2651 -- BUG_ON(skb_is_nonlinear(skb)) */
>              skb->tail += len;
>              ...
>      }
> 
> SKB_LINEAR_ASSERT expands to BUG_ON(skb->data_len != 0). A non-linear skb
> (one with data in page fragments or a frag_list, indicated by data_len > 0)
> cannot be extended with skb_put() -- only the linear head area is addressable
> via skb_put().
> 
> There are two additional skb_put() calls on newskb in the same function that
> are vulnerable to the same issue:
> 
>    net/xfrm/xfrm_iptfs.c:845    memcpy(skb_put(newskb, runtlen), ...)
>    net/xfrm/xfrm_iptfs.c:870    skb_copy_seq_read(st, data, skb_put(newskb, copylen), ...)
> 
> Line 845 is unlikely to trigger because it operates on a freshly allocated
> newskb. Line 870 (IP header completion path) could trigger under the same
> conditions as line 905 if the IP header is not yet complete when a non-linear
> newskb is being continued.
> 
> --- Recent commits touching the relevant code ---
> 
>    5f2b6a9095743  xfrm: iptfs: add skb-fragment sharing code          <-- INTRODUCED THE BUG
>    3f3339885fb34  xfrm: iptfs: add reusing received skb for the tunnel egress packet
>    0756947654468  xfrm: iptfs: handle received fragmented inner packets
>    6c82d24336718  xfrm: iptfs: add basic receive packet (tunnel egress) handling
>    8579d342ea2b3  xfrm: iptfs: add fragmenting of larger than MTU user packets
>    b96ba312e21c9  xfrm: iptfs: share page fragments of inner packets
>    0e4fbf013fa56  xfrm: iptfs: add user packet (tunnel ingress) handling
>    4b3faf610cc63  xfrm: iptfs: add new iptfs xfrm mode impl
>    ed58b186c7737  xfrm: iptfs: add tracepoint functionality
>    6be02e3e4f376  xfrm: iptfs: handle reordering of received packets
> 
> Author of the faulting code (git blame on lines 895-910):
> 
>    5f2b6a9095743a (Christian Hopps  2024-11-14 02:07:10 -0500)  -- all lines
> 
> The entire fragment-sharing block (lines 891-911) was added in commit
> 5f2b6a9095743 by Christian Hopps as part of the 17-patch IPTFS series merged
> via Steffen Klassert's ipsec-next tree for 6.14-rc1.
> 
> --- Root cause hypothesis ---
> 
> The bug is a logic error in multi-packet reassembly with fragment sharing:
> 
> 1. A large inner IP packet (e.g., 3333-byte ICMP echo) arrives at the IPTFS
>     tunnel endpoint fragmented across multiple IPTFS tunnel packets.
> 
> 2. For the first continuation packet, iptfs_reassem_cont() is called. The
>     conditions at lines 892-894 are satisfied:
> 
>         if (!skb_has_frag_list(skb) && !skb_has_frag_list(newskb) &&
>             (skb->head_frag || skb->len == skb->data_len) &&
>             skb->pp_recycle == newskb->pp_recycle)
> 
>     and iptfs_skb_can_add_frags() returns true, so iptfs_skb_add_frags()
>     (line 902) shares page fragments from the incoming skb into newskb. This
>     makes newskb NON-LINEAR: newskb->data_len > 0, newskb->nr_frags > 0.
> 
> 3. newskb is saved in xtfs->ra_newskb and the function returns, awaiting the
>     next continuation packet.
> 
> 4. When the second (or subsequent) continuation packet arrives,
>     iptfs_reassem_cont() is called again with the same (now non-linear) newskb.
>     This time, one of the fragment-sharing preconditions fails -- for example:
> 
>     - The new incoming skb may not have head_frag set AND skb->len != skb->data_len
>     - iptfs_skb_can_add_frags() returns false (e.g., MAX_SKB_FRAGS reached)
>     - The pp_recycle flags don't match
> 
> 5. Execution falls to the else branch (line 903), which calls:
> 
>         skb_put(newskb, copylen)
> 
>     But newskb is non-linear from step 2. SKB_LINEAR_ASSERT fires. Kernel panic.
> 
> Register state from the crash confirms this analysis:
>    RSI = 0x30 (copylen = 48 bytes being appended)
>    RAX = 0x56e (current skb->len = 1390, including fragment data)
> 
> --- Affects mainline, stable, or distro-specific? ---
> 
> This affects MAINLINE and all kernels containing commit 5f2b6a9095743, which
> was merged for the 6.14-rc1 merge window. It is not distro-specific -- it was
> reproduced on Arch Linux and NixOS with three different kernel versions
> (6.18.13 and 7.0.0-rc1).
> 
> ==============================================================================
> 3. Prior Reports
> ==============================================================================
> 
> --- Identical report (this bug) ---
> 
>    Subject: [BUG] Kernel Panic in iptfs_reassem_cont when handling large packets
>    Author:  Hao Long <me@imlonghao.com>
>    Date:    2026-03-01
>    URL:     https://lore.kernel.org/netdev/DGRCO9SL0T5U.JTINSHJQ9KPK@imlonghao.com/
>    Status:  NO REPLIES as of analysis time
> 
> --- Related patch (different bug, same file, same day) ---
> 
>    Subject: [PATCH] xfrm: iptfs: validate inner IPv4 header length in IPTFS payload
>    Author:  Roshan Kumar <roshaen09@gmail.com>
>    Date:    2026-03-01
>    URL:     https://lore.kernel.org/all/20260301105638.11479-1-roshaen09@gmail.com/
>    Fixes:   6c82d2433671 ("xfrm: iptfs: add basic receive packet (tunnel egress) handling")
>    Note:    Fixes a different bug -- infinite loop with tot_len=0 inner IPv4
>             header. Does NOT fix the skb_put crash.
> 
> --- Original patch series that introduced the code ---
> 
>    Subject: [PATCH ipsec-next 00/17] Add IP-TFS mode to xfrm
>    Author:  Steffen Klassert <steffen.klassert@secunet.com>
>    Date:    2025-01-09
>    URL:     https://lore.kernel.org/netdev/20250109094321.2268124-1-steffen.klassert@secunet.com/
> 
> No existing fix patch for this specific crash was found. This is a NEW,
> UNRESOLVED bug. It is not a known regression from a specific commit (it has
> existed since the fragment-sharing code was first merged).
> 
> ==============================================================================
> 4. Decoded Stack Trace
> ==============================================================================
> 
> Debug symbols: Built vmlinux and xfrm_iptfs.ko from v7.0-rc1 tag using the
> Arch Linux PKGBUILD config (CONFIG_DEBUG_INFO=y, CONFIG_DEBUG_INFO_DWARF5=y).
> Verified by disassembly that the compiled code is BYTE-IDENTICAL to the
> chaotic-aur prebuilt linux-mainline-7.0rc1-1 package: the entire
> iptfs_reassem_cont function (365 instructions) and skb_put function produce
> zero diff between local, chaotic-aur, and crash-dump code bytes. The 1-byte
> difference in the return-thunk jmp target (0xe9 0xc4 vs 0xe9 0xd4) is KASLR
> runtime patching. Relocation records confirm +0x128 is call skb_put, +0x144
> is call skb_copy_seq_read.
> 
> Note: Actual debug packages are not available for this kernel. The AUR
> PKGBUILD has "!debug" and explicitly strips vmlinux. No debuginfod server
> (Arch, elfutils, Fedora, Ubuntu) indexes build ID
> b84afef9bed61122840347d0d1295877239d5881.
> 
> Full decoded output from scripts/decode_stacktrace.sh:
> 
> [  412.126912] ------------[ cut here ]------------
> [  412.126945] kernel BUG at net/core/skbuff.c:2651!
> [  412.126974] Oops: invalid opcode: 0000 [#1] SMP PTI
> [  412.127009] CPU: 2 UID: 0 PID: 0 Comm: swapper/2 Not tainted 7.0.0-rc1-1-mainline #1 PREEMPT(full)
> [  412.127061] Hardware name: Vultr VC2, BIOS
> [  412.127076] RIP: 0010:skb_put (net/core/skbuff.c:2651 (discriminator 3))       <<<< BUG: SKB_LINEAR_ASSERT
> All code
> ========
>     0:   bc 00 00 00 01          mov    $0x1000000,%esp
>     5:   77 70                   ja     0x77
>     7:   48 89 c2                mov    %rax,%rdx
>     a:   48 03 87 c8 00 00 00    add    0xc8(%rdi),%rax
>    11:   01 f2                   add    %esi,%edx
>    13:   89 97 bc 00 00 00       mov    %edx,0xbc(%rdi)
>    19:   39 97 c0 00 00 00       cmp    %edx,0xc0(%rdi)
>    1f:   0f 82 c0 c2 14 ff       jb     0xffffffffff14c2e5
>    25:   e9 c4 a0 2f 00          jmp    0x2fa0ee
>    2a:*  0f 0b                   ud2             <-- trapping instruction (BUG())
> Code starting with the faulting instruction
> ===========================================
>     0:   0f 0b                   ud2
> [  412.127288] Call Trace:
> [  412.127298]  <IRQ>
> [  412.127308] iptfs_reassem_cont (net/xfrm/xfrm_iptfs.c:905 (discriminator 1)) xfrm_iptfs   <<<< FAULTING CALLER
> [  412.127335] iptfs_input_ordered (net/xfrm/xfrm_iptfs.c:1266) xfrm_iptfs
> [  412.127356] iptfs_input (net/xfrm/xfrm_iptfs.c:1725 (discriminator 4)) xfrm_iptfs
> [  412.127373]  ? esp_input+0x1f7/0x330 [esp4]
> [  412.127399]  xfrm_input (net/xfrm/xfrm_input.c:695)
> [  412.127449]  xfrm4_esp_rcv (net/ipv4/xfrm4_protocol.c:104 (discriminator 1))
> [  412.127473]  ip_protocol_deliver_rcu (net/ipv4/ip_input.c:207 (discriminator 7))
> [  412.127497]  ip_local_deliver_finish (include/linux/rcupdate.h:883 net/ipv4/ip_input.c:242)
> [  412.127509]  __netif_receive_skb_core.constprop.0 (net/core/dev.c:2507 net/core/dev.c:6109)
> [  412.127529]  ? kmalloc_reserve (net/core/skbuff.c:616 (discriminator 107))
> [  412.127540]  ? __alloc_skb (net/core/skbuff.c:714 (discriminator 1))
> [  412.127551]  ? napi_alloc_skb (net/core/skbuff.c:853)
> [  412.127568]  ? page_to_skb+0x2a9/0x400 [virtio_net]
> [  412.127610]  __netif_receive_skb_list_core (net/core/dev.c:6232)
> [  412.127628]  netif_receive_skb_list_internal (net/core/dev.c:6300 net/core/dev.c:6389)
> [  412.127645]  napi_complete_done (include/linux/list.h:45 include/net/gro.h:524 net/core/dev.c:6757)
> [  412.127660]  ? virtnet_rq_get_buf+0x2d/0x60 [virtio_net]
> [  412.127684]  virtnet_poll+0x6de/0xdbd [virtio_net]
> [  412.127710]  __napi_poll (arch/x86/include/asm/jump_label.h:37 include/trace/events/napi.h:14 net/core/dev.c:7685)
> [  412.127723]  ? skb_defer_free_flush (net/core/dev.c:6802 (discriminator 3))
> [  412.127745]  net_rx_action (net/core/dev.c:7747 net/core/dev.c:7899)
> [  412.127761]  handle_softirqs (arch/x86/include/asm/jump_label.h:37 include/trace/events/irq.h:142 kernel/softirq.c:623)
> [  412.127802]  __irq_exit_rcu (kernel/softirq.c:657 kernel/softirq.c:496 kernel/softirq.c:723)
> [  412.127817]  common_interrupt (arch/x86/kernel/irq.c:326 (discriminator 49))
> [  412.127848]  </IRQ>
> [  412.127858]  <TASK>
> [  412.127867]  asm_common_interrupt (arch/x86/include/asm/idtentry.h:688)
> [  412.127904] RIP: 0010:pv_native_safe_halt (arch/x86/kernel/paravirt.c:63)
> [  412.127926]  default_idle
> [  412.127926]  default_idle_call
> [  412.127926]  do_idle
> [  412.127926]  cpu_startup_entry
> [  412.127926]  start_secondary
> [  412.127926]  common_startup_64
> [  412.127926]  </TASK>
> 
> --- Most relevant frames ---
> 
>    #0  skb_put()                  net/core/skbuff.c:2651
>        BUG_ON(skb_is_nonlinear(skb)) fires -- skb->data_len != 0 because page
>        fragments were previously added by iptfs_skb_add_frags().
> 
>    #1  iptfs_reassem_cont()       net/xfrm/xfrm_iptfs.c:905      <<<< ROOT CAUSE
>        The call: skb_put(newskb, copylen)
>        This is the else-branch fallback copy path after the fragment-sharing
>        check at lines 900-901 fails. newskb was made non-linear by a prior
>        invocation that took the fragment-sharing path at line 902.
> 
>    #2  iptfs_input_ordered()      net/xfrm/xfrm_iptfs.c:1266
>        Calls iptfs_reassem_cont() to continue reassembly of a fragmented
>        inner packet using the next IPTFS tunnel packet in sequence.
> 
>    #3  iptfs_input()              net/xfrm/xfrm_iptfs.c:1725
>        Entry point for IPTFS tunnel packet processing (xfrm input callback).
> 
> --- Inline expansions / compiler artifacts ---
> 
>    - "discriminator 1" at xfrm_iptfs.c:905 indicates this is a specific
>      branch path within the source line (the else branch).
>    - "discriminator 3" at skbuff.c:2651 indicates the BUG_ON expansion
>      within skb_put().
>    - ip_local_deliver_finish shows inlining from include/linux/rcupdate.h:883
>      (rcu_read_lock/unlock wrappers).
>    - napi_complete_done shows inlining from include/net/gro.h:524
>      (GRO list flush helpers).
> 
> ==============================================================================
> 5. Contacts
> ==============================================================================
> 
> --- Maintainers (from scripts/get_maintainer.pl -f net/xfrm/xfrm_iptfs.c) ---
> 
>    Steffen Klassert <steffen.klassert@secunet.com>   (maintainer: NETWORKING [IPSEC])
>    Herbert Xu <herbert@gondor.apana.org.au>           (maintainer: NETWORKING [IPSEC])
>    "David S. Miller" <davem@davemloft.net>            (maintainer: NETWORKING [IPSEC])
>    Eric Dumazet <edumazet@google.com>                 (maintainer: NETWORKING [GENERAL])
>    Jakub Kicinski <kuba@kernel.org>                   (maintainer: NETWORKING [GENERAL])
>    Paolo Abeni <pabeni@redhat.com>                    (maintainer: NETWORKING [GENERAL])
> 
> --- Reviewer ---
> 
>    Simon Horman <horms@kernel.org>                    (reviewer: NETWORKING [GENERAL])
> 
> --- Code author (wrote the faulting code) ---
> 
>    Christian Hopps <chopps@labn.net>
>      Author of commit 5f2b6a9095743 ("xfrm: iptfs: add skb-fragment sharing code")
>      Author of the entire xfrm_iptfs.c file (all commits 4b3faf610cc63 through
>      ed58b186c7737, November 2024).
> 
> --- Git signers / recent contributors ---
> 
>    Kees Cook <kees@kernel.org>                        (commit_signer: 50%, recent treewide changes)
>    Neil Armstrong <neil.armstrong@linaro.org>          (commit_signer: 50%)
> 
> --- Mailing lists ---
> 
>    netdev@vger.kernel.org       (primary -- NETWORKING [IPSEC])
>    linux-kernel@vger.kernel.org
> 
> ==============================================================================
> 6. Recommended Next Steps
> ==============================================================================
> 
> --- Does a fix already exist? ---
> 
> No. No fix patch exists on lore.kernel.org or in mainline as of 2026-03-01.
> This is a new, unresolved bug.
> 
> --- Is more information needed from the reporter? ---
> 
> No. The bug report is complete: it includes kernel version, reproduction steps,
> full stack trace, and confirmation across three kernel/distro combinations. The
> root cause is clear from code analysis.
> 
> --- Suggested patch direction ---
> 
> The fix must ensure that skb_put() is never called on a non-linear newskb in
> iptfs_reassem_cont(). The most straightforward approach:
> 
>    Option A (simplest): In the else branch at line 903, before calling
>    skb_put(), linearize newskb if it is non-linear:
> 
>        } else {
>                if (skb_is_nonlinear(newskb) &&
>                    __skb_linearize(newskb))
>                        goto abandon;
>                if (skb_copy_seq_read(st, data, skb_put(newskb, copylen), ...))
> 
>    This preserves correctness at the cost of a copy when the fallback path is
>    taken after prior fragment sharing. The same fix should be applied to the
>    skb_put() at line 870 (IP header completion path).
> 
>    Option B (more targeted): Always add remaining data as fragments instead of
>    falling back to skb_put(). When the fragwalk path fails, allocate new page
>    fragments and add them to the skb rather than trying to copy into the linear
>    head. This avoids the linearization cost but is more complex.
> 
>    Option C (conservative): Disable fragment sharing when reassembly will span
>    more than two tunnel packets, ensuring newskb stays linear throughout
>    reassembly. Simplest to reason about but gives up the optimization for
>    large packets.
> 
> The Fixes tag should be:
> 
>      Fixes: 5f2b6a9095743 ("xfrm: iptfs: add skb-fragment sharing code")
>      Reported-by: Hao Long <me@imlonghao.com>
> 
> --- Which tree should the fix target? ---
> 
>    - Mainline (net tree, via Steffen Klassert / ipsec)
>    - Then backport to stable (affects all kernels >= 6.14 that contain
>      commit 5f2b6a9095743)

-- 
Regards,

Laurent Pinchart

  reply	other threads:[~2026-03-01 15:35 UTC|newest]

Thread overview: 117+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-12-10  4:48 kernel.org tooling update Konstantin Ryabitsev
2025-12-10  8:11 ` Mauro Carvalho Chehab
2025-12-10 13:30 ` Thorsten Leemhuis
2025-12-11  3:04   ` Theodore Tso
2025-12-12 23:48   ` Stephen Hemminger
2025-12-12 23:54     ` Randy Dunlap
2025-12-16 16:21 ` Lukas Wunner
2025-12-16 20:33   ` Jeff Johnson
2025-12-17  0:47     ` Mario Limonciello
2025-12-18 13:37       ` Jani Nikula
2025-12-18 14:09         ` Mario Limonciello
2026-01-23  9:19 ` Web of Trust work [Was: kernel.org tooling update] Uwe Kleine-König
2026-01-23  9:29   ` Greg KH
2026-01-23 11:47     ` Mauro Carvalho Chehab
2026-01-23 11:58       ` Greg KH
2026-01-23 12:24         ` Mauro Carvalho Chehab
2026-01-23 12:29           ` Greg KH
2026-01-23 13:57         ` Konstantin Ryabitsev
2026-01-23 16:24     ` James Bottomley
2026-01-23 16:33       ` Greg KH
2026-01-23 16:42         ` Joe Perches
2026-01-23 17:00           ` Steven Rostedt
2026-01-23 17:23         ` James Bottomley
2026-01-23 18:23           ` Konstantin Ryabitsev
2026-01-23 21:12             ` Uwe Kleine-König
2026-01-26 16:23               ` Konstantin Ryabitsev
2026-01-26 17:32                 ` Uwe Kleine-König
2026-01-26 21:01                   ` Konstantin Ryabitsev
2026-01-26 23:23                   ` James Bottomley
2026-01-27  8:39                     ` Uwe Kleine-König
2026-01-27 21:08                       ` Linus Torvalds
2026-02-04 10:49                         ` Uwe Kleine-König
2026-02-05 10:14                           ` James Bottomley
2026-02-05 18:07                             ` Uwe Kleine-König
2026-02-05 18:23                               ` Konstantin Ryabitsev
2026-01-26 23:33                   ` Mauro Carvalho Chehab
2026-01-26 23:06                 ` Mauro Carvalho Chehab
2026-01-23 21:38             ` James Bottomley
2026-01-23 22:55             ` Mauro Carvalho Chehab
2026-01-23 16:38       ` Konstantin Ryabitsev
2026-01-23 17:02         ` Paul Moore
2026-03-08  7:21     ` Uwe Kleine-König
2026-03-08 10:24       ` Greg KH
2026-03-18 14:02         ` Greg KH
2026-01-23 18:42 ` kernel.org tooling update Randy Dunlap
2026-02-26  8:44 ` slowly decommission bugzilla? (was: Re: kernel.org tooling update) Thorsten Leemhuis
2026-02-26 14:40   ` Andrew G. Morgan
2026-02-26 17:04   ` Andrew Morton
2026-02-27 11:07     ` Jani Nikula
2026-02-27 15:16     ` Steven Rostedt
2026-02-27 15:18       ` Mark Brown
2026-02-27 15:44         ` Steven Rostedt
2026-02-27 15:18       ` slowly decommission bugzilla? Sven Peter
2026-02-27 15:35       ` slowly decommission bugzilla? (was: Re: kernel.org tooling update) Richard Weinberger
2026-02-27 16:00         ` Geert Uytterhoeven
2026-02-27 16:22           ` Richard Weinberger
2026-02-27 16:29             ` Peter Zijlstra
2026-02-27 17:07               ` James Bottomley
2026-02-28 13:41             ` slowly decommission bugzilla? Thorsten Leemhuis
2026-02-28 15:17               ` Richard Weinberger
2026-02-28 17:40                 ` Linus Torvalds
2026-02-28 18:29                   ` Richard Weinberger
2026-02-28 20:26                     ` Steven Rostedt
2026-02-28 20:28                       ` Richard Weinberger
2026-02-28 20:56                         ` Steven Rostedt
2026-03-01 15:23                           ` Sasha Levin
2026-03-01 15:35                             ` Laurent Pinchart [this message]
2026-03-01 15:42                               ` Sasha Levin
2026-03-01 16:13                                 ` Laurent Pinchart
2026-03-01 16:27                                   ` Sasha Levin
2026-03-06 15:01                                     ` Laurent Pinchart
2026-03-07 16:19                                       ` Sasha Levin
2026-03-01 16:15                               ` James Bottomley
2026-03-01 16:49                                 ` Laurent Pinchart
2026-03-02  8:55                                 ` Mauro Carvalho Chehab
2026-03-01 17:33                               ` Linus Torvalds
2026-03-02 20:28                                 ` [RFC] kallsyms: embed source file:line info in kernel stack traces Sasha Levin
2026-03-03  5:39                                   ` Alexey Dobriyan
2026-03-03 12:44                                     ` Sasha Levin
2026-03-03 13:17                                     ` Steven Rostedt
2026-03-03 16:35                                       ` Sasha Levin
2026-03-06 15:22                                         ` Laurent Pinchart
2026-03-03 19:09                                       ` Alexey Dobriyan
2026-03-03  6:26                                   ` Richard Weinberger
2026-03-03  6:48                                     ` Tomasz Figa
2026-03-03  9:04                                       ` Vlastimil Babka (SUSE)
2026-03-03 12:45                                         ` Sasha Levin
2026-03-03  8:11                                     ` Geert Uytterhoeven
2026-03-03  9:31                                       ` Jiri Slaby
2026-03-03 12:47                                         ` Sasha Levin
2026-03-03 12:58                                           ` James Bottomley
2026-03-03 13:08                                             ` Jürgen Groß
2026-03-03  8:09                                   ` Geert Uytterhoeven
2026-03-03 22:44                                   ` Helge Deller
2026-03-03 22:47                                     ` Sasha Levin
2026-03-01 16:01                             ` slowly decommission bugzilla? James Bottomley
2026-03-01 16:16                               ` Sasha Levin
2026-03-01 16:25                                 ` James Bottomley
2026-03-01 16:33                                   ` Sasha Levin
2026-03-06 10:37                 ` Richard Weinberger
2026-03-06 10:44                   ` Geert Uytterhoeven
2026-03-15 14:58                     ` Richard Weinberger
2026-03-16 11:28                       ` Greg KH
2026-03-16 21:56                         ` Richard Weinberger
2026-03-17  7:51                           ` Greg Kroah-Hartman
2026-04-02  4:59   ` slowly decommission bugzilla? (was: Re: kernel.org tooling update) Konstantin Ryabitsev
2026-04-02 13:07     ` Theodore Tso
2026-04-02 13:28       ` Konstantin Ryabitsev
2026-04-02 14:08         ` Theodore Tso
2026-04-02 14:21           ` Konstantin Ryabitsev
2026-04-02 14:49         ` Steven Rostedt
2026-04-02 13:51       ` James Bottomley
2026-04-02 13:42     ` slowly decommission bugzilla? Thorsten Leemhuis
2026-04-02 14:04       ` Konstantin Ryabitsev
2026-04-02 14:15         ` Richard Weinberger
2026-04-02 15:45       ` Laurent Pinchart
2026-04-02 16:04         ` Thorsten Leemhuis

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20260301153526.GE2860169@killaraus.ideasonboard.com \
    --to=laurent.pinchart@ideasonboard.com \
    --cc=akpm@linux-foundation.org \
    --cc=geert@linux-m68k.org \
    --cc=konstantin@linuxfoundation.org \
    --cc=ksummit@lists.linux.dev \
    --cc=linux@leemhuis.info \
    --cc=richard@nod.at \
    --cc=rostedt@goodmis.org \
    --cc=sashal@kernel.org \
    --cc=torvalds@linuxfoundation.org \
    --cc=users@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox