Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp4030782ybi; Mon, 3 Jun 2019 04:39:07 -0700 (PDT) X-Google-Smtp-Source: APXvYqycYbepUGDHvxvS2+jHhY2XmwN2OGleABR7e4A0KabU4OD2C3Yh5LzAnk/5TtEPVYakJvBA X-Received: by 2002:a62:3707:: with SMTP id e7mr29223978pfa.36.1559561947507; Mon, 03 Jun 2019 04:39:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559561947; cv=none; d=google.com; s=arc-20160816; b=ApsWB61apVln879dunnkOwKZ80ZZolLX7GywdX1uAXj0jRzx+az9K9NlLGMiOmahJu OG7M2XWrtRyFpnB8lhaE0ePEe7fKVt/DP+U0DHEWS7HEUoXTafANqA3h8EYHlBL44DND HfbX12PJzpCFz5kmdUmhSoIYWgO1s9tvNT9krb0Xu562CEqCqCWutJCgo6laMgmi/kO2 83lJu1059JC7WxDQvMEtZEYolvgcpkEw3h1DgaumFR3x/l8pHxFU9pt3eUtO4lWajA4N JCPFyCcEFkz4jmB8wWgJRbW1IBBkebRrauKo0KSiVd6YYyZ6Qd4p4xcPOI+EzJMwSZEH kTPA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=GTZuogWqV86z5SFd/GRU8srRxKWq+rGy18PdnBIO2bA=; b=WKd/qKsxDQ8iGe98zc2Ns4Yy450XM/D0F22m7m8J3Eh28jaN+l/JDO/UJ+4UD0cTcv g1XCEEsCUz2gPHawoSX8Kviu8XQyUlMWbU4vzm89jvKAMZRjWQbS3VgrcL3eefQuweuT 7qgoQOi2AcrajEf1EjqpbOGDWpH5ZNnbilx8N++PGG0xv2H/k634sZgmdzaChihORLmo jrZH10jRx5eYgkF2O1qVcvot0rIC2jGzRcVpKKnqiLYFHXHj3HwtTPoS+XvJ9V7oyjaJ LmVjnBW4sIs3So9+T6oi1PTNo0074jm68996yFp+9UdYaapyhFv1G0bjQLCTwFuFRxox jHag== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=zwRPeSAc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 2si18142864ple.275.2019.06.03.04.38.51; Mon, 03 Jun 2019 04:39:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=zwRPeSAc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728980AbfFCJOP (ORCPT + 99 others); Mon, 3 Jun 2019 05:14:15 -0400 Received: from mail.kernel.org ([198.145.29.99]:34812 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728954AbfFCJOL (ORCPT ); Mon, 3 Jun 2019 05:14:11 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4088927ED9; Mon, 3 Jun 2019 09:14:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1559553250; bh=exZYYG+nCLzd6TZ9W5M1ttx5hyWneBu2JDtE2pErC9k=; h=From:To:Cc:Subject:Date:From; b=zwRPeSAcVFm5MyC4fqdzEGJOWlzAaFt/zcFt8iRX2qJlX/I2i/L0XuDG+xLpb9rVF DV/qBtO8DhxH1tJC9nT8JcMOJ5P+wXq20XVDZslvfNVvDZcDBXTBBBHg8syIzhhaaP /3z+UU88XXWUxuqLVD7uWU6KLSOWbwktTC6LV0qQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 5.1 00/40] 5.1.7-stable review Date: Mon, 3 Jun 2019 11:08:53 +0200 Message-Id: <20190603090522.617635820@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-5.1.7-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-5.1.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 5.1.7-rc1 X-KernelTest-Deadline: 2019-06-05T09:05+00:00 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 5.1.7 release. There are 40 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Wed 05 Jun 2019 09:04:46 AM UTC. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.1.7-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.1.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 5.1.7-rc1 Junwei Hu tipc: fix modprobe tipc failed after switch order of device registration David S. Miller Revert "tipc: fix modprobe tipc failed after switch order of device registration" Daniel Axtens crypto: vmx - ghash: do nosimd fallback manually Willem de Bruijn net: correct zerocopy refcnt with udp MSG_MORE Vishal Kulkarni cxgb4: Revert "cxgb4: Remove SGE_HOST_PAGE_SIZE dependency on page size" Jakub Kicinski net/tls: don't ignore netdev notifications if no TLS features Jakub Kicinski net/tls: fix state removal with feature flags off Jakub Kicinski selftests/tls: add test for sleeping even though there is data Jakub Kicinski net/tls: fix no wakeup on partial reads Jakub Kicinski selftests/tls: test for lowat overshoot with multiple records Jakub Kicinski net/tls: fix lowat calculation if some data came from previous record Michael Chan bnxt_en: Reduce memory usage when running in kdump kernel. Michael Chan bnxt_en: Fix possible BUG() condition when calling pci_disable_msix(). Michael Chan bnxt_en: Fix aggregation buffer leak under OOM condition. Weifeng Voon net: stmmac: dma channel control register need to be init first Tan, Tee Min net: stmmac: fix ethtool flow control not able to get/set Saeed Mahameed net/mlx5e: Disable rxhash when CQE compress is enabled Parav Pandit net/mlx5: Allocate root ns memory using kzalloc to match kfree Chris Packham tipc: Avoid copying bytes beyond the supplied data Parav Pandit net/mlx5: Avoid double free in fs init error unwinding path Kloetzke Jan usbnet: fix kernel crash after disconnect Heiner Kallweit r8169: fix MAC address being lost in PCI D3 Jisheng Zhang net: stmmac: fix reset gpio free missing Vlad Buslov net: sched: don't use tc_action->order during action dump Russell King net: phy: marvell10g: report if the PHY fails to boot firmware Antoine Tenart net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value Jisheng Zhang net: mvneta: Fix err code path of probe Eric Dumazet net-gro: fix use-after-free read in napi_gro_frags() Andy Duan net: fec: fix the clk mismatch in failed_reset path Rasmus Villemoes net: dsa: mv88e6xxx: fix handling of upper half of STATS_TYPE_PORT Jiri Pirko mlxsw: spectrum_acl: Avoid warning after identical rules insertion Eric Dumazet llc: fix skb leak in llc_build_and_send_ui_pkt() David Ahern ipv6: Fix redirect with VRF Mike Manning ipv6: Consider sk_bound_dev_if when binding a raw socket to an address Eric Dumazet ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST Eric Dumazet ipv4/igmp: fix another memory leak in igmpv3_del_delrec() Eric Dumazet inet: switch IP ID generator to siphash Maxime Chevallier ethtool: Check for vlan etype or vlan tci when parsing flow_rule Raju Rangoju cxgb4: offload VLAN flows regardless of VLAN ethtype Jarod Wilson bonding/802.3ad: fix slave link initialization transition states ------------- Diffstat: Makefile | 4 +- drivers/crypto/vmx/ghash.c | 212 +++++++++------------ drivers/net/bonding/bond_main.c | 15 +- drivers/net/dsa/mv88e6xxx/chip.c | 2 +- drivers/net/ethernet/broadcom/bnxt/bnxt.c | 19 +- drivers/net/ethernet/broadcom/bnxt/bnxt.h | 6 +- drivers/net/ethernet/broadcom/bnxt/bnxt_ethtool.c | 2 +- drivers/net/ethernet/broadcom/bnxt/bnxt_ulp.c | 2 +- .../net/ethernet/chelsio/cxgb4/cxgb4_tc_flower.c | 5 +- drivers/net/ethernet/chelsio/cxgb4/t4_hw.c | 11 ++ drivers/net/ethernet/freescale/fec_main.c | 2 +- drivers/net/ethernet/marvell/mvneta.c | 4 +- drivers/net/ethernet/marvell/mvpp2/mvpp2_main.c | 10 +- drivers/net/ethernet/mellanox/mlx5/core/en_main.c | 13 ++ drivers/net/ethernet/mellanox/mlx5/core/fs_core.c | 6 +- .../net/ethernet/mellanox/mlxsw/spectrum_acl_erp.c | 11 +- drivers/net/ethernet/realtek/r8169.c | 3 + .../net/ethernet/stmicro/stmmac/stmmac_ethtool.c | 4 +- drivers/net/ethernet/stmicro/stmmac/stmmac_main.c | 8 +- drivers/net/ethernet/stmicro/stmmac/stmmac_mdio.c | 3 +- drivers/net/phy/marvell10g.c | 13 ++ drivers/net/usb/usbnet.c | 6 + include/linux/siphash.h | 5 + include/net/netns/ipv4.h | 2 + include/uapi/linux/tipc_config.h | 10 +- net/core/dev.c | 2 +- net/core/ethtool.c | 8 +- net/core/skbuff.c | 6 +- net/ipv4/igmp.c | 47 +++-- net/ipv4/ip_output.c | 4 +- net/ipv4/route.c | 12 +- net/ipv6/ip6_output.c | 4 +- net/ipv6/output_core.c | 30 +-- net/ipv6/raw.c | 2 + net/ipv6/route.c | 6 + net/llc/llc_output.c | 2 + net/sched/act_api.c | 3 +- net/tipc/core.c | 32 ++-- net/tipc/subscr.h | 5 +- net/tipc/topsrv.c | 14 +- net/tls/tls_device.c | 9 +- net/tls/tls_sw.c | 19 +- tools/testing/selftests/net/tls.c | 34 ++++ 43 files changed, 360 insertions(+), 257 deletions(-)