From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.0 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING, SPF_HELO_NONE,SPF_PASS,T_DKIMWL_WL_HIGH,URIBL_BLOCKED,USER_AGENT_GIT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6D1C0C04AB6 for ; Mon, 3 Jun 2019 09:16:49 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 39F4027F6C for ; Mon, 3 Jun 2019 09:16:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1559553409; bh=36HEQJkAL0awwlXXRE8WLmiNKBm5ex8Qw7VMxA0CmyI=; h=From:To:Cc:Subject:Date:List-ID:From; b=D7jgyw7NcraS4gMumMy4VQxk2BCzVdkxsThB4qf1+04zaPGi+U58Ki3LlJKRZWUxK wl/JnYCJrOg1eOfOX45MLj1B4Ji1JccXHgHft0sshgZqy9To1AzMLZ+y4wTcpIJdPy 6DGCw6kk+30lhL+tQzPGVxjv1GvJHFo3Qwu609Ao= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728554AbfFCJMG (ORCPT ); Mon, 3 Jun 2019 05:12:06 -0400 Received: from mail.kernel.org ([198.145.29.99]:57512 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728571AbfFCJMG (ORCPT ); Mon, 3 Jun 2019 05:12:06 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 614ED27E79; Mon, 3 Jun 2019 09:12:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1559553124; bh=36HEQJkAL0awwlXXRE8WLmiNKBm5ex8Qw7VMxA0CmyI=; h=From:To:Cc:Subject:Date:From; b=Q4nmJyLryPB5tXaAX1sVDP/OLQrNzFVrCDbS3KRXy3WglH9RIW3RIwalh44dZyg9N TeSYU3c/cNu4COvKJBa2bq66bEyATzcZ3fXsl42ij1mmG6LdCLEG7alI0V/1KqElee ixDb6tkzLkN+SqLGb2hlTSRuHzfsqGUR7Rp135AU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 5.0 00/36] 5.0.21-stable review Date: Mon, 3 Jun 2019 11:08:48 +0200 Message-Id: <20190603090520.998342694@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-5.0.21-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-5.0.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 5.0.21-rc1 X-KernelTest-Deadline: 2019-06-05T09:05+00:00 Content-Transfer-Encoding: 8bit Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org Note, this is going to be the LAST 5.0.y kernel release. After this one, it is end-of-life, please move to 5.1.y at this point in time. If there is anything wrong with the 5.1.y tree, preventing you from moving to 5.1.y, please let me know. This is the start of the stable review cycle for the 5.0.21 release. There are 36 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Wed 05 Jun 2019 09:04:48 AM UTC. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.0.21-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.0.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 5.0.21-rc1 Junwei Hu tipc: fix modprobe tipc failed after switch order of device registration David S. Miller Revert "tipc: fix modprobe tipc failed after switch order of device registration" Konrad Rzeszutek Wilk xen/pciback: Don't disable PCI_COMMAND on PCI device reset. Daniel Axtens crypto: vmx - ghash: do nosimd fallback manually Willem de Bruijn net: correct zerocopy refcnt with udp MSG_MORE Vishal Kulkarni cxgb4: Revert "cxgb4: Remove SGE_HOST_PAGE_SIZE dependency on page size" Jakub Kicinski net/tls: don't ignore netdev notifications if no TLS features Jakub Kicinski net/tls: fix state removal with feature flags off Michael Chan bnxt_en: Reduce memory usage when running in kdump kernel. Michael Chan bnxt_en: Fix possible BUG() condition when calling pci_disable_msix(). Michael Chan bnxt_en: Fix aggregation buffer leak under OOM condition. Weifeng Voon net: stmmac: dma channel control register need to be init first Tan, Tee Min net: stmmac: fix ethtool flow control not able to get/set Saeed Mahameed net/mlx5e: Disable rxhash when CQE compress is enabled Parav Pandit net/mlx5: Allocate root ns memory using kzalloc to match kfree Chris Packham tipc: Avoid copying bytes beyond the supplied data Parav Pandit net/mlx5: Avoid double free in fs init error unwinding path Kloetzke Jan usbnet: fix kernel crash after disconnect Heiner Kallweit r8169: fix MAC address being lost in PCI D3 Jisheng Zhang net: stmmac: fix reset gpio free missing Vlad Buslov net: sched: don't use tc_action->order during action dump Russell King net: phy: marvell10g: report if the PHY fails to boot firmware Antoine Tenart net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value Jisheng Zhang net: mvneta: Fix err code path of probe Eric Dumazet net-gro: fix use-after-free read in napi_gro_frags() Andy Duan net: fec: fix the clk mismatch in failed_reset path Rasmus Villemoes net: dsa: mv88e6xxx: fix handling of upper half of STATS_TYPE_PORT Jiri Pirko mlxsw: spectrum_acl: Avoid warning after identical rules insertion Eric Dumazet llc: fix skb leak in llc_build_and_send_ui_pkt() David Ahern ipv6: Fix redirect with VRF Mike Manning ipv6: Consider sk_bound_dev_if when binding a raw socket to an address Eric Dumazet ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST Eric Dumazet ipv4/igmp: fix another memory leak in igmpv3_del_delrec() Eric Dumazet inet: switch IP ID generator to siphash Raju Rangoju cxgb4: offload VLAN flows regardless of VLAN ethtype Jarod Wilson bonding/802.3ad: fix slave link initialization transition states ------------- Diffstat: Makefile | 4 +- drivers/crypto/vmx/ghash.c | 212 +++++++++------------ drivers/net/bonding/bond_main.c | 15 +- drivers/net/dsa/mv88e6xxx/chip.c | 2 +- drivers/net/ethernet/broadcom/bnxt/bnxt.c | 19 +- drivers/net/ethernet/broadcom/bnxt/bnxt.h | 6 +- drivers/net/ethernet/broadcom/bnxt/bnxt_ethtool.c | 2 +- drivers/net/ethernet/broadcom/bnxt/bnxt_ulp.c | 2 +- .../net/ethernet/chelsio/cxgb4/cxgb4_tc_flower.c | 5 +- drivers/net/ethernet/chelsio/cxgb4/t4_hw.c | 11 ++ drivers/net/ethernet/freescale/fec_main.c | 2 +- drivers/net/ethernet/marvell/mvneta.c | 4 +- drivers/net/ethernet/marvell/mvpp2/mvpp2_main.c | 10 +- drivers/net/ethernet/mellanox/mlx5/core/en_main.c | 13 ++ drivers/net/ethernet/mellanox/mlx5/core/fs_core.c | 6 +- .../net/ethernet/mellanox/mlxsw/spectrum_acl_erp.c | 11 +- drivers/net/ethernet/realtek/r8169.c | 3 + .../net/ethernet/stmicro/stmmac/stmmac_ethtool.c | 4 +- drivers/net/ethernet/stmicro/stmmac/stmmac_main.c | 8 +- drivers/net/ethernet/stmicro/stmmac/stmmac_mdio.c | 3 +- drivers/net/phy/marvell10g.c | 13 ++ drivers/net/usb/usbnet.c | 6 + drivers/xen/xen-pciback/pciback_ops.c | 2 - include/linux/siphash.h | 5 + include/net/netns/ipv4.h | 2 + include/uapi/linux/tipc_config.h | 10 +- net/core/dev.c | 2 +- net/core/skbuff.c | 6 +- net/ipv4/igmp.c | 47 +++-- net/ipv4/ip_output.c | 4 +- net/ipv4/route.c | 12 +- net/ipv6/ip6_output.c | 4 +- net/ipv6/output_core.c | 30 +-- net/ipv6/raw.c | 2 + net/ipv6/route.c | 6 + net/llc/llc_output.c | 2 + net/sched/act_api.c | 3 +- net/tipc/core.c | 32 ++-- net/tipc/subscr.h | 5 +- net/tipc/topsrv.c | 14 +- net/tls/tls_device.c | 9 +- 41 files changed, 313 insertions(+), 245 deletions(-)