Cover Letter Detail
Show a cover letter.
GET /api/covers/811333/?format=api
{ "id": 811333, "url": "http://patchwork.ozlabs.org/api/covers/811333/?format=api", "web_url": "http://patchwork.ozlabs.org/project/ubuntu-kernel/cover/20170908070018.4141-1-daniel.axtens@canonical.com/", "project": { "id": 15, "url": "http://patchwork.ozlabs.org/api/projects/15/?format=api", "name": "Ubuntu Kernel", "link_name": "ubuntu-kernel", "list_id": "kernel-team.lists.ubuntu.com", "list_email": "kernel-team@lists.ubuntu.com", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20170908070018.4141-1-daniel.axtens@canonical.com>", "list_archive_url": null, "date": "2017-09-08T07:00:11", "name": "[SRU,Zesty,0/7] Fixes for LP#1715812", "submitter": { "id": 71548, "url": "http://patchwork.ozlabs.org/api/people/71548/?format=api", "name": "Daniel Axtens", "email": "daniel.axtens@canonical.com" }, "mbox": "http://patchwork.ozlabs.org/project/ubuntu-kernel/cover/20170908070018.4141-1-daniel.axtens@canonical.com/mbox/", "series": [ { "id": 2111, "url": "http://patchwork.ozlabs.org/api/series/2111/?format=api", "web_url": "http://patchwork.ozlabs.org/project/ubuntu-kernel/list/?series=2111", "date": "2017-09-08T07:00:11", "name": "Fixes for LP#1715812", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/2111/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/covers/811333/comments/", "headers": { "Return-Path": "<kernel-team-bounces@lists.ubuntu.com>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@bilbo.ozlabs.org", "Authentication-Results": "ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=lists.ubuntu.com\n\t(client-ip=91.189.94.19; helo=huckleberry.canonical.com;\n\tenvelope-from=kernel-team-bounces@lists.ubuntu.com;\n\treceiver=<UNKNOWN>)", "Received": [ "from huckleberry.canonical.com (huckleberry.canonical.com\n\t[91.189.94.19])\n\tby ozlabs.org (Postfix) with ESMTP id 3xpSrg4Ftxz9sDB;\n\tFri, 8 Sep 2017 17:00:35 +1000 (AEST)", "from localhost ([127.0.0.1] helo=huckleberry.canonical.com)\n\tby huckleberry.canonical.com with esmtp (Exim 4.86_2)\n\t(envelope-from <kernel-team-bounces@lists.ubuntu.com>)\n\tid 1dqDHB-0000eH-Fg; Fri, 08 Sep 2017 07:00:29 +0000", "from youngberry.canonical.com ([91.189.89.112])\n\tby huckleberry.canonical.com with esmtps\n\t(TLS1.0:DHE_RSA_AES_128_CBC_SHA1:128)\n\t(Exim 4.86_2) (envelope-from <daniel.axtens@canonical.com>)\n\tid 1dqDHA-0000e8-12\n\tfor kernel-team@lists.canonical.com; Fri, 08 Sep 2017 07:00:28 +0000", "from mail-pg0-f69.google.com ([74.125.83.69])\n\tby youngberry.canonical.com with esmtps\n\t(TLS1.0:RSA_AES_128_CBC_SHA1:16)\n\t(Exim 4.76) (envelope-from <daniel.axtens@canonical.com>)\n\tid 1dqDH9-00039L-Kr\n\tfor kernel-team@lists.canonical.com; Fri, 08 Sep 2017 07:00:27 +0000", "by mail-pg0-f69.google.com with SMTP id v82so3627871pgb.5\n\tfor <kernel-team@lists.canonical.com>;\n\tFri, 08 Sep 2017 00:00:27 -0700 (PDT)", "from localhost.localdomain (124-171-202-56.dyn.iinet.net.au.\n\t[124.171.202.56]) by smtp.gmail.com with ESMTPSA id\n\t125sm2138129pff.5.2017.09.08.00.00.23\n\tfor <kernel-team@lists.canonical.com>\n\t(version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);\n\tFri, 08 Sep 2017 00:00:25 -0700 (PDT)" ], "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=1e100.net; s=20161025;\n\th=x-gm-message-state:from:to:subject:date:message-id;\n\tbh=9yVBcz+Ngd81LgHfTfHxIP3dlfDyHih/vH7zw8xkUZU=;\n\tb=OyGq44IkzZCXEzvoxYqW8kyhdzOPZ7YHZFFmBNHueMO9uxz3moVNKUJh0g3ms+amZ4\n\tSB7EyPU6zXfq5B4xwR6O3q0de6D/i0N9jSEMcKBla1Pso3Em7vp5a4kxj8PU7TNwarzL\n\ttTp8RmlL8hEBpx8PDhhhPaWTiy52fV1RJc9BhgnD6vmHNRlMHVVuCxfCHGQGGF89qR/d\n\tc5dnYFuxrj3CowG+fIYnyQXbe1Z2AAUr+CB4OS09VentYQS4WMi973+q/8L50KJZRya8\n\tWNqF/GEMNRmEIDRz5IPuurKxeE+qZEhGiZpRVxibRUCUfzj4OMUoA1eNBavBXkvGseIR\n\twTfg==", "X-Gm-Message-State": "AHPjjUg6dA+C3P6FPAm0oiKeRmTkfcbXbpy66iBtajA7Pa1Jq9cKUVd8\n\tvU9MAUQL7hRwFRvIuAWNhOZJg41J/LWD2Fo6d9eDDwa/vkJrKeHp134O+EP3igDxBK5OQ6SHSYq\n\tRpzyglI7jyJ7klhIX78YQsc2tltrmTjIa2idYnJQ=", "X-Received": [ "by 10.84.234.197 with SMTP id i5mr2363233plt.184.1504854026180; \n\tFri, 08 Sep 2017 00:00:26 -0700 (PDT)", "by 10.84.234.197 with SMTP id i5mr2363204plt.184.1504854025828; \n\tFri, 08 Sep 2017 00:00:25 -0700 (PDT)" ], "X-Google-Smtp-Source": "ADKCNb7Sc87zk8u2B9+cisfz5gph8Rhnthq7/D2AU3Eoc5rMTNDVglSjtf112njBMqgL+sNLl4YtFg==", "From": "Daniel Axtens <daniel.axtens@canonical.com>", "To": "kernel-team@lists.canonical.com", "Subject": "[SRU][Zesty][PATCH 0/7] Fixes for LP#1715812", "Date": "Fri, 8 Sep 2017 17:00:11 +1000", "Message-Id": "<20170908070018.4141-1-daniel.axtens@canonical.com>", "X-Mailer": "git-send-email 2.11.0", "X-BeenThere": "kernel-team@lists.ubuntu.com", "X-Mailman-Version": "2.1.20", "Precedence": "list", "List-Id": "Kernel team discussions <kernel-team.lists.ubuntu.com>", "List-Unsubscribe": "<https://lists.ubuntu.com/mailman/options/kernel-team>,\n\t<mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe>", "List-Archive": "<https://lists.ubuntu.com/archives/kernel-team>", "List-Post": "<mailto:kernel-team@lists.ubuntu.com>", "List-Help": "<mailto:kernel-team-request@lists.ubuntu.com?subject=help>", "List-Subscribe": "<https://lists.ubuntu.com/mailman/listinfo/kernel-team>,\n\t<mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe>", "MIME-Version": "1.0", "Content-Type": "text/plain; charset=\"utf-8\"", "Content-Transfer-Encoding": "base64", "Errors-To": "kernel-team-bounces@lists.ubuntu.com", "Sender": "\"kernel-team\" <kernel-team-bounces@lists.ubuntu.com>" }, "content": "(This is the Zesty patch-set. These are all clean cherry-picks.)\n\n[SRU Justification]\n\n[Impact]\nA host can lose access to another host whose MAC address changes if\nthey have active connections to other hosts that share a route. The\nARP cache does not time out as expected - instead the old MAC address\nis continuously reconfirmed.\n\n[Fix]\nApply series [1], which changes the algorithm for neighbour confirmation.\nThat is, from upstream:\n51ce8bd4d17a net: pending_confirm is not used anymore\n0dec879f636f net: use dst_confirm_neigh for UDP, RAW, ICMP, L2TP\n63fca65d0863 net: add confirm_neigh method to dst_ops\nc3a2e8370534 tcp: replace dst_confirm with sk_dst_confirm\nc86a773c7802 sctp: add dst_pending_confirm flag\n4ff0620354f2 net: add dst_pending_confirm flag to skbuff\n9b8805a32559 sock: add sk_dst_pending_confirm flag\n\n[Test case]\nCreate 3 real or virtual systems, all hooked up to a switch.\nOne system needs an active-backup bond with fail_over_mac=1 num_grat_arp=0.\n\nPut all the systems in the same subnet, e.g. 192.168.200.0/24\n\nCall the system with the bond A, and the other two systems B and C.\n\nOn B, run in 3 shells:\n - netperf -t TCP_RR to C\n - ping -f A\n - watch 'ip -s neigh show 192.168.200.0/24'\n\nOn A, cause the bond to fail over.\n\nObserve that:\n\n - without the patches, B intermittently fails to notice the change in\n A's MAC address. This presents as the ping failing and not\n recovering, and the arp table showing the old mac address never\n timing out and never being replace with a new mac address.\n\n - with the patches, the arp cache times out and B sends another mac\n probe and detects A's new address.\n\nIt helps to use taskset to put ping and netperf on the same CPU, or\nuse single-CPU vms.\n\nSee [2] for more details.\n\n[References]\n[2] Original report: https://www.mail-archive.com/netdev@vger.kernel.org/msg138762.html\n[1]: https://www.spinics.net/lists/linux-rdma/msg45907.html\n\nJulian Anastasov (7):\n sock: add sk_dst_pending_confirm flag\n net: add dst_pending_confirm flag to skbuff\n sctp: add dst_pending_confirm flag\n tcp: replace dst_confirm with sk_dst_confirm\n net: add confirm_neigh method to dst_ops\n net: use dst_confirm_neigh for UDP, RAW, ICMP, L2TP\n net: pending_confirm is not used anymore\n\n drivers/net/vrf.c | 5 ++++-\n include/linux/skbuff.h | 12 ++++++++++++\n include/net/arp.h | 16 ++++++++++++++++\n include/net/dst.h | 21 +++++++++------------\n include/net/dst_ops.h | 2 ++\n include/net/ndisc.h | 17 +++++++++++++++++\n include/net/sctp/sctp.h | 6 ++----\n include/net/sctp/structs.h | 4 ++++\n include/net/sock.h | 26 ++++++++++++++++++++++++++\n net/core/dst.c | 1 -\n net/core/sock.c | 2 ++\n net/ipv4/ip_output.c | 11 ++++++++++-\n net/ipv4/ping.c | 3 ++-\n net/ipv4/raw.c | 6 +++++-\n net/ipv4/route.c | 19 +++++++++++++++++++\n net/ipv4/tcp_input.c | 12 +++---------\n net/ipv4/tcp_metrics.c | 7 ++-----\n net/ipv4/tcp_output.c | 2 ++\n net/ipv4/udp.c | 3 ++-\n net/ipv6/ip6_output.c | 7 +++++++\n net/ipv6/raw.c | 6 +++++-\n net/ipv6/route.c | 43 ++++++++++++++++++++++++++++++-------------\n net/ipv6/udp.c | 3 ++-\n net/l2tp/l2tp_ip6.c | 3 ++-\n net/sctp/associola.c | 3 +--\n net/sctp/output.c | 10 +++++++++-\n net/sctp/outqueue.c | 2 +-\n net/sctp/sm_make_chunk.c | 6 ++----\n net/sctp/sm_sideeffect.c | 2 +-\n net/sctp/socket.c | 4 ++--\n net/sctp/transport.c | 16 +++++++++++++++-\n net/xfrm/xfrm_policy.c | 19 +++++++++++++++++++\n 32 files changed, 235 insertions(+), 64 deletions(-)" }