Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp3907985ybi; Mon, 3 Jun 2019 02:18:45 -0700 (PDT) X-Google-Smtp-Source: APXvYqxO88JSi7cywfbc6f6rQioTE3fVPcdxPBfU+jpn5Go+/CpOZB59bzSL8EOFaVJYFkUiK0mO X-Received: by 2002:aa7:8d4d:: with SMTP id s13mr21662468pfe.259.1559553525189; Mon, 03 Jun 2019 02:18:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559553525; cv=none; d=google.com; s=arc-20160816; b=DB162tptVKQNzObACfU5Gwyhj8TIiMNreo4/GfUN8ycPDMMvdZ2iYp7T30OrumwCBt 3aXIhHWK8nKHVs+EI/YzHsP+nR+4CmAmWln/FrW9SdfK4cjK9/5bX8yIb5lrA7n5Z2Ij ZhWBCyMg25Jk3qFx4PJSNGt0e8zrw2oW6OG06mzpmzaYzpC+cvktYF458Hx+JMWzAbZO GHzMRzlOnMIO4r5BASTkt8a7zMyZj8o2m3aDkyTKN1Q1JtScmNRerdNn8OTxq/hQBpA0 SuC/yX/clomX/bH5IhDbpFOx+XrsUQbu6dNYQJX4SfGsUnGSE8xM7XZMVd+maVolphWD cQZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=AibebenlHHqnG37WAZlKGHNxZ0pnBxtX96hPaQl13Sc=; b=TaFImuXseBAguEkEOot8wygwnSiHy7KU+PYnxNS5m3VyMMCI4DZEkYdvnEdAWzf/mD ErumTKPFK+lGcHtw0m6wMcXNtb5WpFwl47M3TuYyby+UIMl25ZSCCedHo+FwwKogBQYP ebfzaYYoEjoamMKHI8kYY9k67jRTGY2SMhE2dgzRLV2VZQ9rZEJbCXf/bLWCvkppluoR bUhuROoYf2vAvfi3GIUlMThdmCAZAdZWyuv1LGtC85VXEjYHoG+XtA+5VgHruggwpwVH QnjfI4JY4/QRbH/QYPhL2Qcj1uL6Az61iXtx4pOnOJRF/BRGN2FVDNKNSTv7Ud40dCkq fLfQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Q4nmJyLr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q8si13992818pll.205.2019.06.03.02.18.29; Mon, 03 Jun 2019 02:18:45 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Q4nmJyLr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728579AbfFCJMH (ORCPT + 99 others); Mon, 3 Jun 2019 05:12:07 -0400 Received: from mail.kernel.org ([198.145.29.99]:57512 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728571AbfFCJMG (ORCPT ); Mon, 3 Jun 2019 05:12:06 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 614ED27E79; Mon, 3 Jun 2019 09:12:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1559553124; bh=36HEQJkAL0awwlXXRE8WLmiNKBm5ex8Qw7VMxA0CmyI=; h=From:To:Cc:Subject:Date:From; b=Q4nmJyLryPB5tXaAX1sVDP/OLQrNzFVrCDbS3KRXy3WglH9RIW3RIwalh44dZyg9N TeSYU3c/cNu4COvKJBa2bq66bEyATzcZ3fXsl42ij1mmG6LdCLEG7alI0V/1KqElee ixDb6tkzLkN+SqLGb2hlTSRuHzfsqGUR7Rp135AU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 5.0 00/36] 5.0.21-stable review Date: Mon, 3 Jun 2019 11:08:48 +0200 Message-Id: <20190603090520.998342694@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-5.0.21-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-5.0.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 5.0.21-rc1 X-KernelTest-Deadline: 2019-06-05T09:05+00:00 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Note, this is going to be the LAST 5.0.y kernel release. After this one, it is end-of-life, please move to 5.1.y at this point in time. If there is anything wrong with the 5.1.y tree, preventing you from moving to 5.1.y, please let me know. This is the start of the stable review cycle for the 5.0.21 release. There are 36 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Wed 05 Jun 2019 09:04:48 AM UTC. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.0.21-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.0.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 5.0.21-rc1 Junwei Hu tipc: fix modprobe tipc failed after switch order of device registration David S. Miller Revert "tipc: fix modprobe tipc failed after switch order of device registration" Konrad Rzeszutek Wilk xen/pciback: Don't disable PCI_COMMAND on PCI device reset. Daniel Axtens crypto: vmx - ghash: do nosimd fallback manually Willem de Bruijn net: correct zerocopy refcnt with udp MSG_MORE Vishal Kulkarni cxgb4: Revert "cxgb4: Remove SGE_HOST_PAGE_SIZE dependency on page size" Jakub Kicinski net/tls: don't ignore netdev notifications if no TLS features Jakub Kicinski net/tls: fix state removal with feature flags off Michael Chan bnxt_en: Reduce memory usage when running in kdump kernel. Michael Chan bnxt_en: Fix possible BUG() condition when calling pci_disable_msix(). Michael Chan bnxt_en: Fix aggregation buffer leak under OOM condition. Weifeng Voon net: stmmac: dma channel control register need to be init first Tan, Tee Min net: stmmac: fix ethtool flow control not able to get/set Saeed Mahameed net/mlx5e: Disable rxhash when CQE compress is enabled Parav Pandit net/mlx5: Allocate root ns memory using kzalloc to match kfree Chris Packham tipc: Avoid copying bytes beyond the supplied data Parav Pandit net/mlx5: Avoid double free in fs init error unwinding path Kloetzke Jan usbnet: fix kernel crash after disconnect Heiner Kallweit r8169: fix MAC address being lost in PCI D3 Jisheng Zhang net: stmmac: fix reset gpio free missing Vlad Buslov net: sched: don't use tc_action->order during action dump Russell King net: phy: marvell10g: report if the PHY fails to boot firmware Antoine Tenart net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value Jisheng Zhang net: mvneta: Fix err code path of probe Eric Dumazet net-gro: fix use-after-free read in napi_gro_frags() Andy Duan net: fec: fix the clk mismatch in failed_reset path Rasmus Villemoes net: dsa: mv88e6xxx: fix handling of upper half of STATS_TYPE_PORT Jiri Pirko mlxsw: spectrum_acl: Avoid warning after identical rules insertion Eric Dumazet llc: fix skb leak in llc_build_and_send_ui_pkt() David Ahern ipv6: Fix redirect with VRF Mike Manning ipv6: Consider sk_bound_dev_if when binding a raw socket to an address Eric Dumazet ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST Eric Dumazet ipv4/igmp: fix another memory leak in igmpv3_del_delrec() Eric Dumazet inet: switch IP ID generator to siphash Raju Rangoju cxgb4: offload VLAN flows regardless of VLAN ethtype Jarod Wilson bonding/802.3ad: fix slave link initialization transition states ------------- Diffstat: Makefile | 4 +- drivers/crypto/vmx/ghash.c | 212 +++++++++------------ drivers/net/bonding/bond_main.c | 15 +- drivers/net/dsa/mv88e6xxx/chip.c | 2 +- drivers/net/ethernet/broadcom/bnxt/bnxt.c | 19 +- drivers/net/ethernet/broadcom/bnxt/bnxt.h | 6 +- drivers/net/ethernet/broadcom/bnxt/bnxt_ethtool.c | 2 +- drivers/net/ethernet/broadcom/bnxt/bnxt_ulp.c | 2 +- .../net/ethernet/chelsio/cxgb4/cxgb4_tc_flower.c | 5 +- drivers/net/ethernet/chelsio/cxgb4/t4_hw.c | 11 ++ drivers/net/ethernet/freescale/fec_main.c | 2 +- drivers/net/ethernet/marvell/mvneta.c | 4 +- drivers/net/ethernet/marvell/mvpp2/mvpp2_main.c | 10 +- drivers/net/ethernet/mellanox/mlx5/core/en_main.c | 13 ++ drivers/net/ethernet/mellanox/mlx5/core/fs_core.c | 6 +- .../net/ethernet/mellanox/mlxsw/spectrum_acl_erp.c | 11 +- drivers/net/ethernet/realtek/r8169.c | 3 + .../net/ethernet/stmicro/stmmac/stmmac_ethtool.c | 4 +- drivers/net/ethernet/stmicro/stmmac/stmmac_main.c | 8 +- drivers/net/ethernet/stmicro/stmmac/stmmac_mdio.c | 3 +- drivers/net/phy/marvell10g.c | 13 ++ drivers/net/usb/usbnet.c | 6 + drivers/xen/xen-pciback/pciback_ops.c | 2 - include/linux/siphash.h | 5 + include/net/netns/ipv4.h | 2 + include/uapi/linux/tipc_config.h | 10 +- net/core/dev.c | 2 +- net/core/skbuff.c | 6 +- net/ipv4/igmp.c | 47 +++-- net/ipv4/ip_output.c | 4 +- net/ipv4/route.c | 12 +- net/ipv6/ip6_output.c | 4 +- net/ipv6/output_core.c | 30 +-- net/ipv6/raw.c | 2 + net/ipv6/route.c | 6 + net/llc/llc_output.c | 2 + net/sched/act_api.c | 3 +- net/tipc/core.c | 32 ++-- net/tipc/subscr.h | 5 +- net/tipc/topsrv.c | 14 +- net/tls/tls_device.c | 9 +- 41 files changed, 313 insertions(+), 245 deletions(-)