APPLIED: [Eoan][SRU][Pull] Eoan update: 5.3.18 upstream stable release
Kleber Souza
kleber.souza at canonical.com
Mon Jan 6 13:54:42 UTC 2020
On 2019-12-18 20:49, Connor Kuehl wrote:
> BugLink: https://bugs.launchpad.net/bugs/1856870
>
> Note: This PR is based on another PR that has been sent to this ML. Please apply:
>
> "[Eoan][SRU][Pull] Eoan update: 5.3.17 upstream stable release"
>
> before applying this one.
>
> ----------------------------------------------------------------
> The following changes since commit 13271d05283d0c8ba9b1799013ccdd289390b5b7:
>
> UBUNTU: upstream stable to v5.3.17 (2019-12-18 09:06:35 -0800)
>
> are available in the Git repository at:
>
> git://git.launchpad.net/~connork/+git/eoan update-to-5.3.18
>
> for you to fetch changes up to 8a6b0e7f4a7c9e15ef5db4b7c963f623e2bf1e24:
>
> UBUNTU: upstream stable to v5.3.18 (2019-12-18 09:09:59 -0800)
Applied to eoan/master-next branch.
Thanks,
Kleber
>
> ----------------------------------------------------------------
> Aaron Conole (1):
> openvswitch: support asymmetric conntrack
>
> Alexander Lobakin (1):
> net: dsa: fix flow dissection on Tx path
>
> Cong Wang (1):
> gre: refetch erspan header from skb->data after pskb_may_pull()
>
> Connor Kuehl (1):
> UBUNTU: upstream stable to v5.3.18
>
> Dust Li (1):
> net: sched: fix dump qlen for sch_mq/sch_mqprio with NOLOCK subqueues
>
> Eran Ben Elisha (1):
> net/mlx5e: Fix TXQ indices to be sequential
>
> Eric Dumazet (2):
> inet: protect against too small mtu values.
> tcp: md5: fix potential overestimation of TCP option space
>
> Greg Kroah-Hartman (1):
> Linux 5.3.18
>
> Grygorii Strashko (1):
> net: ethernet: ti: cpsw: fix extra rx interrupt
>
> Guillaume Nault (3):
> tcp: fix rejected syncookies due to stale timestamps
> tcp: tighten acceptance of ACKs not matching a child socket
> tcp: Protect accesses to .ts_recent_stamp with {READ,WRITE}_ONCE()
>
> Huy Nguyen (1):
> net/mlx5e: Query global pause state before setting prio2buffer
>
> Jonathan Lemon (2):
> page_pool: do not release pool until inflight == 0.
> xdp: obtain the mem_id mutex before trying to remove an entry.
>
> Martin Varghese (2):
> Fixed updating of ethertype in function skb_mpls_pop
> net: Fixed updating of ethertype in skb_mpls_push()
>
> Mian Yousaf Kaukab (1):
> net: thunderx: start phy before starting autonegotiation
>
> Nikolay Aleksandrov (1):
> net: bridge: deny dev_set_mac_address() when unregistering
>
> Sabrina Dubroca (2):
> net: ipv6: add net argument to ip6_dst_lookup_flow
> net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup
>
> Taehee Yoo (2):
> tipc: fix ordering of tipc module init and exit routine
> hsr: fix a NULL pointer dereference in hsr_dev_xmit()
>
> Valentin Vidic (1):
> net/tls: Fix return values to avoid ENOTSUPP
>
> Vladyslav Tarasiuk (1):
> mqprio: Fix out-of-bounds access in mqprio_dump
>
> Makefile | 2 +-
> debian.master/upstream-stable | 2 +-
> drivers/infiniband/core/addr.c | 7 +-
> drivers/infiniband/sw/rxe/rxe_net.c | 8 +-
> drivers/net/ethernet/cavium/thunder/thunder_bgx.c | 2 +-
> drivers/net/ethernet/mellanox/mlx5/core/en.h | 2 +-
> .../ethernet/mellanox/mlx5/core/en/port_buffer.c | 27 ++++-
> .../net/ethernet/mellanox/mlx5/core/en/tc_tun.c | 8 +-
> drivers/net/ethernet/mellanox/mlx5/core/en_main.c | 31 ++----
> drivers/net/ethernet/mellanox/mlx5/core/en_stats.c | 2 +-
> drivers/net/ethernet/mellanox/mlx5/core/en_tx.c | 2 +-
> drivers/net/ethernet/stmicro/stmmac/stmmac_main.c | 4 +-
> drivers/net/ethernet/ti/cpsw.c | 2 +-
> drivers/net/geneve.c | 4 +-
> drivers/net/vxlan.c | 8 +-
> include/linux/netdevice.h | 5 +
> include/linux/skbuff.h | 5 +-
> include/linux/time.h | 13 +++
> include/net/ip.h | 5 +
> include/net/ipv6.h | 2 +-
> include/net/ipv6_stubs.h | 6 +-
> include/net/page_pool.h | 52 +++------
> include/net/tcp.h | 27 +++--
> include/net/xdp_priv.h | 4 -
> include/trace/events/xdp.h | 19 +---
> net/bridge/br_device.c | 6 +
> net/core/dev.c | 3 +-
> net/core/flow_dissector.c | 5 +-
> net/core/lwt_bpf.c | 4 +-
> net/core/page_pool.c | 122 +++++++++++++--------
> net/core/skbuff.c | 10 +-
> net/core/xdp.c | 117 +++++++-------------
> net/dccp/ipv6.c | 6 +-
> net/hsr/hsr_device.c | 9 +-
> net/ipv4/devinet.c | 5 -
> net/ipv4/gre_demux.c | 2 +-
> net/ipv4/ip_output.c | 13 ++-
> net/ipv4/tcp_output.c | 5 +-
> net/ipv6/addrconf_core.c | 11 +-
> net/ipv6/af_inet6.c | 4 +-
> net/ipv6/datagram.c | 2 +-
> net/ipv6/inet6_connection_sock.c | 4 +-
> net/ipv6/ip6_output.c | 8 +-
> net/ipv6/raw.c | 2 +-
> net/ipv6/syncookies.c | 2 +-
> net/ipv6/tcp_ipv6.c | 4 +-
> net/l2tp/l2tp_ip6.c | 2 +-
> net/mpls/af_mpls.c | 7 +-
> net/openvswitch/actions.c | 6 +-
> net/openvswitch/conntrack.c | 11 ++
> net/sched/act_mpls.c | 7 +-
> net/sched/sch_mq.c | 1 +
> net/sched/sch_mqprio.c | 3 +-
> net/sctp/ipv6.c | 4 +-
> net/tipc/core.c | 29 ++---
> net/tipc/udp_media.c | 9 +-
> net/tls/tls_device.c | 8 +-
> net/tls/tls_main.c | 4 +-
> net/tls/tls_sw.c | 8 +-
> tools/testing/selftests/net/tls.c | 8 +-
> 60 files changed, 370 insertions(+), 330 deletions(-)
>
More information about the kernel-team
mailing list