[{"id":1768854,"web_url":"http://patchwork.ozlabs.org/comment/1768854/","msgid":"<a99219ca-1dce-c0d7-3084-8a1f0775b19c@canonical.com>","list_archive_url":null,"date":"2017-09-14T22:06:37","subject":"Re: [SRU][Zesty][PATCH 0/7] Fixes for LP#1715812","submitter":{"id":2900,"url":"http://patchwork.ozlabs.org/api/people/2900/","name":"Colin Ian King","email":"colin.king@canonical.com"},"content":"On 08/09/17 08:00, Daniel Axtens wrote:\n> (This is the Zesty patch-set. These are all clean cherry-picks.)\n> \n> [SRU Justification]\n> \n> [Impact]\n> A host can lose access to another host whose MAC address changes if\n> they have active connections to other hosts that share a route. The\n> ARP cache does not time out as expected - instead the old MAC address\n> is continuously reconfirmed.\n> \n> [Fix]\n> Apply series [1], which changes the algorithm for neighbour confirmation.\n> That is, from upstream:\n> 51ce8bd4d17a net: pending_confirm is not used anymore\n> 0dec879f636f net: use dst_confirm_neigh for UDP, RAW, ICMP, L2TP\n> 63fca65d0863 net: add confirm_neigh method to dst_ops\n> c3a2e8370534 tcp: replace dst_confirm with sk_dst_confirm\n> c86a773c7802 sctp: add dst_pending_confirm flag\n> 4ff0620354f2 net: add dst_pending_confirm flag to skbuff\n> 9b8805a32559 sock: add sk_dst_pending_confirm flag\n> \n> [Test case]\n> Create 3 real or virtual systems, all hooked up to a switch.\n> One system needs an active-backup bond with fail_over_mac=1 num_grat_arp=0.\n> \n> Put all the systems in the same subnet, e.g. 192.168.200.0/24\n> \n> Call the system with the bond A, and the other two systems B and C.\n> \n> On B, run in 3 shells:\n>  - netperf -t TCP_RR to C\n>  - ping -f A\n>  - watch 'ip -s neigh show 192.168.200.0/24'\n> \n> On A, cause the bond to fail over.\n> \n> Observe that:\n> \n>  - without the patches, B intermittently fails to notice the change in\n>    A's MAC address. This presents as the ping failing and not\n>    recovering, and the arp table showing the old mac address never\n>    timing out and never being replace with a new mac address.\n> \n>  - with the patches, the arp cache times out and B sends another mac\n>    probe and detects A's new address.\n> \n> It helps to use taskset to put ping and netperf on the same CPU, or\n> use single-CPU vms.\n> \n> See [2] for more details.\n> \n> [References]\n> [2] Original report: https://www.mail-archive.com/netdev@vger.kernel.org/msg138762.html\n> [1]: https://www.spinics.net/lists/linux-rdma/msg45907.html\n> \n> Julian Anastasov (7):\n>   sock: add sk_dst_pending_confirm flag\n>   net: add dst_pending_confirm flag to skbuff\n>   sctp: add dst_pending_confirm flag\n>   tcp: replace dst_confirm with sk_dst_confirm\n>   net: add confirm_neigh method to dst_ops\n>   net: use dst_confirm_neigh for UDP, RAW, ICMP, L2TP\n>   net: pending_confirm is not used anymore\n> \n>  drivers/net/vrf.c          |  5 ++++-\n>  include/linux/skbuff.h     | 12 ++++++++++++\n>  include/net/arp.h          | 16 ++++++++++++++++\n>  include/net/dst.h          | 21 +++++++++------------\n>  include/net/dst_ops.h      |  2 ++\n>  include/net/ndisc.h        | 17 +++++++++++++++++\n>  include/net/sctp/sctp.h    |  6 ++----\n>  include/net/sctp/structs.h |  4 ++++\n>  include/net/sock.h         | 26 ++++++++++++++++++++++++++\n>  net/core/dst.c             |  1 -\n>  net/core/sock.c            |  2 ++\n>  net/ipv4/ip_output.c       | 11 ++++++++++-\n>  net/ipv4/ping.c            |  3 ++-\n>  net/ipv4/raw.c             |  6 +++++-\n>  net/ipv4/route.c           | 19 +++++++++++++++++++\n>  net/ipv4/tcp_input.c       | 12 +++---------\n>  net/ipv4/tcp_metrics.c     |  7 ++-----\n>  net/ipv4/tcp_output.c      |  2 ++\n>  net/ipv4/udp.c             |  3 ++-\n>  net/ipv6/ip6_output.c      |  7 +++++++\n>  net/ipv6/raw.c             |  6 +++++-\n>  net/ipv6/route.c           | 43 ++++++++++++++++++++++++++++++-------------\n>  net/ipv6/udp.c             |  3 ++-\n>  net/l2tp/l2tp_ip6.c        |  3 ++-\n>  net/sctp/associola.c       |  3 +--\n>  net/sctp/output.c          | 10 +++++++++-\n>  net/sctp/outqueue.c        |  2 +-\n>  net/sctp/sm_make_chunk.c   |  6 ++----\n>  net/sctp/sm_sideeffect.c   |  2 +-\n>  net/sctp/socket.c          |  4 ++--\n>  net/sctp/transport.c       | 16 +++++++++++++++-\n>  net/xfrm/xfrm_policy.c     | 19 +++++++++++++++++++\n>  32 files changed, 235 insertions(+), 64 deletions(-)\n> \n\nFirstly, this patchset does touch a fair amount of code across the\nnetwork stack, so I was originally reluctant to say this is OK for a\nSRU. However, these are all clean cherry picks and legitimately address\nbug, so it seems reasonable to apply these.\n\nI noticed that [PATCH 3/7] sctp: add dst_pending_confirm flag, commit\nc86a773c78025f5b825bacd7b846f4fa60dc0317 has a trivial \"cosmetic\" fix to\nit from upstream:\n\ncommit 486a43db2e26b87125b5629e1ade516f90833934\nAuthor: Xin Long <lucien.xin@gmail.com>\nDate:   Sat Mar 18 19:12:22 2017 +0800\n\n    sctp: remove temporary variable confirm from sctp_packet_transmit\n\nhowever, this is a trivial fix and probably can be ignored.\n\nI've given these patches a workout with a network stress-test and I see\nno regressions.  After reading some notes on this patch set from Jay\nalso increases my confidence in Ack'ing this patch set... so...\n\nAcked-by: Colin Ian King <colin.king@canonical.com>","headers":{"Return-Path":"<kernel-team-bounces@lists.ubuntu.com>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@bilbo.ozlabs.org","Authentication-Results":"ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=lists.ubuntu.com\n\t(client-ip=91.189.94.19; helo=huckleberry.canonical.com;\n\tenvelope-from=kernel-team-bounces@lists.ubuntu.com;\n\treceiver=<UNKNOWN>)","Received":["from huckleberry.canonical.com (huckleberry.canonical.com\n\t[91.189.94.19])\n\tby ozlabs.org (Postfix) with ESMTP id 3xtXgY4RjJz9s7h;\n\tFri, 15 Sep 2017 08:06:49 +1000 (AEST)","from localhost ([127.0.0.1] helo=huckleberry.canonical.com)\n\tby huckleberry.canonical.com with esmtp (Exim 4.86_2)\n\t(envelope-from <kernel-team-bounces@lists.ubuntu.com>)\n\tid 1dscHQ-0001ey-Ln; Thu, 14 Sep 2017 22:06:40 +0000","from youngberry.canonical.com ([91.189.89.112])\n\tby huckleberry.canonical.com with esmtps\n\t(TLS1.0:DHE_RSA_AES_128_CBC_SHA1:128)\n\t(Exim 4.86_2) (envelope-from <colin.king@canonical.com>)\n\tid 1dscHO-0001ec-Dj\n\tfor kernel-team@lists.ubuntu.com; Thu, 14 Sep 2017 22:06:38 +0000","from cpc104638-craw9-2-0-cust581.16-3.cable.virginm.net\n\t([82.33.66.70] helo=[192.168.0.18])\n\tby youngberry.canonical.com with esmtpsa\n\t(TLS1.0:DHE_RSA_AES_128_CBC_SHA1:16)\n\t(Exim 4.76) (envelope-from <colin.king@canonical.com>)\n\tid 1dscHO-000702-68; Thu, 14 Sep 2017 22:06:38 +0000"],"Subject":"Re: [SRU][Zesty][PATCH 0/7] Fixes for LP#1715812","To":"kernel-team@lists.ubuntu.com","References":"<20170908070018.4141-1-daniel.axtens@canonical.com>","From":"Colin Ian King <colin.king@canonical.com>","Message-ID":"<a99219ca-1dce-c0d7-3084-8a1f0775b19c@canonical.com>","Date":"Thu, 14 Sep 2017 23:06:37 +0100","User-Agent":"Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101\n\tThunderbird/45.8.0","MIME-Version":"1.0","In-Reply-To":"<20170908070018.4141-1-daniel.axtens@canonical.com>","X-BeenThere":"kernel-team@lists.ubuntu.com","X-Mailman-Version":"2.1.20","Precedence":"list","List-Id":"Kernel team discussions <kernel-team.lists.ubuntu.com>","List-Unsubscribe":"<https://lists.ubuntu.com/mailman/options/kernel-team>,\n\t<mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe>","List-Archive":"<https://lists.ubuntu.com/archives/kernel-team>","List-Post":"<mailto:kernel-team@lists.ubuntu.com>","List-Help":"<mailto:kernel-team-request@lists.ubuntu.com?subject=help>","List-Subscribe":"<https://lists.ubuntu.com/mailman/listinfo/kernel-team>,\n\t<mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe>","Content-Type":"text/plain; charset=\"utf-8\"","Content-Transfer-Encoding":"base64","Errors-To":"kernel-team-bounces@lists.ubuntu.com","Sender":"\"kernel-team\" <kernel-team-bounces@lists.ubuntu.com>"}},{"id":1769068,"web_url":"http://patchwork.ozlabs.org/comment/1769068/","msgid":"<3113df47-8679-742c-33c9-5f38743ec663@canonical.com>","list_archive_url":null,"date":"2017-09-15T09:19:13","subject":"ACK/cmnt: [SRU][Zesty][PATCH 0/7] Fixes for LP#1715812","submitter":{"id":2898,"url":"http://patchwork.ozlabs.org/api/people/2898/","name":"Stefan Bader","email":"stefan.bader@canonical.com"},"content":"On 08.09.2017 09:00, Daniel Axtens wrote:\n> (This is the Zesty patch-set. These are all clean cherry-picks.)\n> \n> [SRU Justification]\n> \n> [Impact]\n> A host can lose access to another host whose MAC address changes if\n> they have active connections to other hosts that share a route. The\n> ARP cache does not time out as expected - instead the old MAC address\n> is continuously reconfirmed.\n> \n> [Fix]\n> Apply series [1], which changes the algorithm for neighbour confirmation.\n> That is, from upstream:\n> 51ce8bd4d17a net: pending_confirm is not used anymore\n> 0dec879f636f net: use dst_confirm_neigh for UDP, RAW, ICMP, L2TP\n> 63fca65d0863 net: add confirm_neigh method to dst_ops\n> c3a2e8370534 tcp: replace dst_confirm with sk_dst_confirm\n> c86a773c7802 sctp: add dst_pending_confirm flag\n> 4ff0620354f2 net: add dst_pending_confirm flag to skbuff\n> 9b8805a32559 sock: add sk_dst_pending_confirm flag\n> \n> [Test case]\n> Create 3 real or virtual systems, all hooked up to a switch.\n> One system needs an active-backup bond with fail_over_mac=1 num_grat_arp=0.\n> \n> Put all the systems in the same subnet, e.g. 192.168.200.0/24\n> \n> Call the system with the bond A, and the other two systems B and C.\n> \n> On B, run in 3 shells:\n>  - netperf -t TCP_RR to C\n>  - ping -f A\n>  - watch 'ip -s neigh show 192.168.200.0/24'\n> \n> On A, cause the bond to fail over.\n> \n> Observe that:\n> \n>  - without the patches, B intermittently fails to notice the change in\n>    A's MAC address. This presents as the ping failing and not\n>    recovering, and the arp table showing the old mac address never\n>    timing out and never being replace with a new mac address.\n> \n>  - with the patches, the arp cache times out and B sends another mac\n>    probe and detects A's new address.\n> \n> It helps to use taskset to put ping and netperf on the same CPU, or\n> use single-CPU vms.\n> \n> See [2] for more details.\n> \n> [References]\n> [2] Original report: https://www.mail-archive.com/netdev@vger.kernel.org/msg138762.html\n> [1]: https://www.spinics.net/lists/linux-rdma/msg45907.html\n> \n> Julian Anastasov (7):\n>   sock: add sk_dst_pending_confirm flag\n>   net: add dst_pending_confirm flag to skbuff\n>   sctp: add dst_pending_confirm flag\n>   tcp: replace dst_confirm with sk_dst_confirm\n>   net: add confirm_neigh method to dst_ops\n>   net: use dst_confirm_neigh for UDP, RAW, ICMP, L2TP\n>   net: pending_confirm is not used anymore\n> \n>  drivers/net/vrf.c          |  5 ++++-\n>  include/linux/skbuff.h     | 12 ++++++++++++\n>  include/net/arp.h          | 16 ++++++++++++++++\n>  include/net/dst.h          | 21 +++++++++------------\n>  include/net/dst_ops.h      |  2 ++\n>  include/net/ndisc.h        | 17 +++++++++++++++++\n>  include/net/sctp/sctp.h    |  6 ++----\n>  include/net/sctp/structs.h |  4 ++++\n>  include/net/sock.h         | 26 ++++++++++++++++++++++++++\n>  net/core/dst.c             |  1 -\n>  net/core/sock.c            |  2 ++\n>  net/ipv4/ip_output.c       | 11 ++++++++++-\n>  net/ipv4/ping.c            |  3 ++-\n>  net/ipv4/raw.c             |  6 +++++-\n>  net/ipv4/route.c           | 19 +++++++++++++++++++\n>  net/ipv4/tcp_input.c       | 12 +++---------\n>  net/ipv4/tcp_metrics.c     |  7 ++-----\n>  net/ipv4/tcp_output.c      |  2 ++\n>  net/ipv4/udp.c             |  3 ++-\n>  net/ipv6/ip6_output.c      |  7 +++++++\n>  net/ipv6/raw.c             |  6 +++++-\n>  net/ipv6/route.c           | 43 ++++++++++++++++++++++++++++++-------------\n>  net/ipv6/udp.c             |  3 ++-\n>  net/l2tp/l2tp_ip6.c        |  3 ++-\n>  net/sctp/associola.c       |  3 +--\n>  net/sctp/output.c          | 10 +++++++++-\n>  net/sctp/outqueue.c        |  2 +-\n>  net/sctp/sm_make_chunk.c   |  6 ++----\n>  net/sctp/sm_sideeffect.c   |  2 +-\n>  net/sctp/socket.c          |  4 ++--\n>  net/sctp/transport.c       | 16 +++++++++++++++-\n>  net/xfrm/xfrm_policy.c     | 19 +++++++++++++++++++\n>  32 files changed, 235 insertions(+), 64 deletions(-)\n> \nAcked-by: Stefan Bader <stefan.bader@canonical.com>\n\nAs Colin, I had my reservations on this set because it changes a relatively\nlarge number of files all over the place. But as it was successfully tested\n(both for verification and against potential regressions) and has no fixup since\n4.11 (when the last patch of the set was included), plus some explanations by\nJay, I guess this is of acceptable risk.\n\n-Stefan","headers":{"Return-Path":"<kernel-team-bounces@lists.ubuntu.com>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@bilbo.ozlabs.org","Authentication-Results":"ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=lists.ubuntu.com\n\t(client-ip=91.189.94.19; helo=huckleberry.canonical.com;\n\tenvelope-from=kernel-team-bounces@lists.ubuntu.com;\n\treceiver=<UNKNOWN>)","Received":["from huckleberry.canonical.com (huckleberry.canonical.com\n\t[91.189.94.19])\n\tby ozlabs.org (Postfix) with ESMTP id 3xtqbk1GKmz9sRm;\n\tFri, 15 Sep 2017 19:19:30 +1000 (AEST)","from localhost ([127.0.0.1] helo=huckleberry.canonical.com)\n\tby huckleberry.canonical.com with esmtp (Exim 4.86_2)\n\t(envelope-from <kernel-team-bounces@lists.ubuntu.com>)\n\tid 1dsmmR-0002VO-SX; Fri, 15 Sep 2017 09:19:23 +0000","from youngberry.canonical.com ([91.189.89.112])\n\tby huckleberry.canonical.com with esmtps\n\t(TLS1.0:DHE_RSA_AES_128_CBC_SHA1:128)\n\t(Exim 4.86_2) (envelope-from <stefan.bader@canonical.com>)\n\tid 1dsmmP-0002V7-EG\n\tfor kernel-team@lists.ubuntu.com; Fri, 15 Sep 2017 09:19:21 +0000","from 1.general.smb.uk.vpn ([10.172.193.28])\n\tby youngberry.canonical.com with esmtpsa\n\t(TLS1.0:DHE_RSA_AES_128_CBC_SHA1:16)\n\t(Exim 4.76) (envelope-from <stefan.bader@canonical.com>)\n\tid 1dsmmP-0002IZ-6I\n\tfor kernel-team@lists.ubuntu.com; Fri, 15 Sep 2017 09:19:21 +0000"],"Subject":"ACK/cmnt: [SRU][Zesty][PATCH 0/7] Fixes for LP#1715812","To":"kernel-team@lists.ubuntu.com","References":"<20170908070018.4141-1-daniel.axtens@canonical.com>","From":"Stefan Bader <stefan.bader@canonical.com>","Message-ID":"<3113df47-8679-742c-33c9-5f38743ec663@canonical.com>","Date":"Fri, 15 Sep 2017 11:19:13 +0200","User-Agent":"Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101\n\tThunderbird/52.2.1","MIME-Version":"1.0","In-Reply-To":"<20170908070018.4141-1-daniel.axtens@canonical.com>","X-BeenThere":"kernel-team@lists.ubuntu.com","X-Mailman-Version":"2.1.20","Precedence":"list","List-Id":"Kernel team discussions <kernel-team.lists.ubuntu.com>","List-Unsubscribe":"<https://lists.ubuntu.com/mailman/options/kernel-team>,\n\t<mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe>","List-Archive":"<https://lists.ubuntu.com/archives/kernel-team>","List-Post":"<mailto:kernel-team@lists.ubuntu.com>","List-Help":"<mailto:kernel-team-request@lists.ubuntu.com?subject=help>","List-Subscribe":"<https://lists.ubuntu.com/mailman/listinfo/kernel-team>,\n\t<mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe>","Content-Type":"multipart/mixed;\n\tboundary=\"===============5211570444187847047==\"","Errors-To":"kernel-team-bounces@lists.ubuntu.com","Sender":"\"kernel-team\" <kernel-team-bounces@lists.ubuntu.com>"}},{"id":1769203,"web_url":"http://patchwork.ozlabs.org/comment/1769203/","msgid":"<42845d04-e7c5-6a80-7f2f-b38c176b2ad7@canonical.com>","list_archive_url":null,"date":"2017-09-15T13:50:31","subject":"APPLIED Z: [SRU][Zesty][PATCH 0/7] Fixes for LP#1715812","submitter":{"id":2898,"url":"http://patchwork.ozlabs.org/api/people/2898/","name":"Stefan Bader","email":"stefan.bader@canonical.com"},"content":"On 08.09.2017 09:00, Daniel Axtens wrote:\n> (This is the Zesty patch-set. These are all clean cherry-picks.)\n> \n> [SRU Justification]\n> \n> [Impact]\n> A host can lose access to another host whose MAC address changes if\n> they have active connections to other hosts that share a route. The\n> ARP cache does not time out as expected - instead the old MAC address\n> is continuously reconfirmed.\n> \n> [Fix]\n> Apply series [1], which changes the algorithm for neighbour confirmation.\n> That is, from upstream:\n> 51ce8bd4d17a net: pending_confirm is not used anymore\n> 0dec879f636f net: use dst_confirm_neigh for UDP, RAW, ICMP, L2TP\n> 63fca65d0863 net: add confirm_neigh method to dst_ops\n> c3a2e8370534 tcp: replace dst_confirm with sk_dst_confirm\n> c86a773c7802 sctp: add dst_pending_confirm flag\n> 4ff0620354f2 net: add dst_pending_confirm flag to skbuff\n> 9b8805a32559 sock: add sk_dst_pending_confirm flag\n> \n> [Test case]\n> Create 3 real or virtual systems, all hooked up to a switch.\n> One system needs an active-backup bond with fail_over_mac=1 num_grat_arp=0.\n> \n> Put all the systems in the same subnet, e.g. 192.168.200.0/24\n> \n> Call the system with the bond A, and the other two systems B and C.\n> \n> On B, run in 3 shells:\n>  - netperf -t TCP_RR to C\n>  - ping -f A\n>  - watch 'ip -s neigh show 192.168.200.0/24'\n> \n> On A, cause the bond to fail over.\n> \n> Observe that:\n> \n>  - without the patches, B intermittently fails to notice the change in\n>    A's MAC address. This presents as the ping failing and not\n>    recovering, and the arp table showing the old mac address never\n>    timing out and never being replace with a new mac address.\n> \n>  - with the patches, the arp cache times out and B sends another mac\n>    probe and detects A's new address.\n> \n> It helps to use taskset to put ping and netperf on the same CPU, or\n> use single-CPU vms.\n> \n> See [2] for more details.\n> \n> [References]\n> [2] Original report: https://www.mail-archive.com/netdev@vger.kernel.org/msg138762.html\n> [1]: https://www.spinics.net/lists/linux-rdma/msg45907.html\n> \n> Julian Anastasov (7):\n>   sock: add sk_dst_pending_confirm flag\n>   net: add dst_pending_confirm flag to skbuff\n>   sctp: add dst_pending_confirm flag\n>   tcp: replace dst_confirm with sk_dst_confirm\n>   net: add confirm_neigh method to dst_ops\n>   net: use dst_confirm_neigh for UDP, RAW, ICMP, L2TP\n>   net: pending_confirm is not used anymore\n> \n>  drivers/net/vrf.c          |  5 ++++-\n>  include/linux/skbuff.h     | 12 ++++++++++++\n>  include/net/arp.h          | 16 ++++++++++++++++\n>  include/net/dst.h          | 21 +++++++++------------\n>  include/net/dst_ops.h      |  2 ++\n>  include/net/ndisc.h        | 17 +++++++++++++++++\n>  include/net/sctp/sctp.h    |  6 ++----\n>  include/net/sctp/structs.h |  4 ++++\n>  include/net/sock.h         | 26 ++++++++++++++++++++++++++\n>  net/core/dst.c             |  1 -\n>  net/core/sock.c            |  2 ++\n>  net/ipv4/ip_output.c       | 11 ++++++++++-\n>  net/ipv4/ping.c            |  3 ++-\n>  net/ipv4/raw.c             |  6 +++++-\n>  net/ipv4/route.c           | 19 +++++++++++++++++++\n>  net/ipv4/tcp_input.c       | 12 +++---------\n>  net/ipv4/tcp_metrics.c     |  7 ++-----\n>  net/ipv4/tcp_output.c      |  2 ++\n>  net/ipv4/udp.c             |  3 ++-\n>  net/ipv6/ip6_output.c      |  7 +++++++\n>  net/ipv6/raw.c             |  6 +++++-\n>  net/ipv6/route.c           | 43 ++++++++++++++++++++++++++++++-------------\n>  net/ipv6/udp.c             |  3 ++-\n>  net/l2tp/l2tp_ip6.c        |  3 ++-\n>  net/sctp/associola.c       |  3 +--\n>  net/sctp/output.c          | 10 +++++++++-\n>  net/sctp/outqueue.c        |  2 +-\n>  net/sctp/sm_make_chunk.c   |  6 ++----\n>  net/sctp/sm_sideeffect.c   |  2 +-\n>  net/sctp/socket.c          |  4 ++--\n>  net/sctp/transport.c       | 16 +++++++++++++++-\n>  net/xfrm/xfrm_policy.c     | 19 +++++++++++++++++++\n>  32 files changed, 235 insertions(+), 64 deletions(-)\n> \nApplied to Zesty master-next","headers":{"Return-Path":"<kernel-team-bounces@lists.ubuntu.com>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@bilbo.ozlabs.org","Authentication-Results":"ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=lists.ubuntu.com\n\t(client-ip=91.189.94.19; helo=huckleberry.canonical.com;\n\tenvelope-from=kernel-team-bounces@lists.ubuntu.com;\n\treceiver=<UNKNOWN>)","Received":["from huckleberry.canonical.com (huckleberry.canonical.com\n\t[91.189.94.19])\n\tby ozlabs.org (Postfix) with ESMTP id 3xtxcZ4YHKz9rxl;\n\tFri, 15 Sep 2017 23:50:38 +1000 (AEST)","from localhost ([127.0.0.1] helo=huckleberry.canonical.com)\n\tby huckleberry.canonical.com with esmtp (Exim 4.86_2)\n\t(envelope-from <kernel-team-bounces@lists.ubuntu.com>)\n\tid 1dsr0s-0003Yu-7D; Fri, 15 Sep 2017 13:50:34 +0000","from youngberry.canonical.com ([91.189.89.112])\n\tby huckleberry.canonical.com with esmtps\n\t(TLS1.0:DHE_RSA_AES_128_CBC_SHA1:128)\n\t(Exim 4.86_2) (envelope-from <stefan.bader@canonical.com>)\n\tid 1dsr0q-0003YY-5X\n\tfor kernel-team@lists.ubuntu.com; Fri, 15 Sep 2017 13:50:32 +0000","from 1.general.smb.uk.vpn ([10.172.193.28])\n\tby youngberry.canonical.com with esmtpsa\n\t(TLS1.0:DHE_RSA_AES_128_CBC_SHA1:16)\n\t(Exim 4.76) (envelope-from <stefan.bader@canonical.com>)\n\tid 1dsr0p-0005oG-Tr\n\tfor kernel-team@lists.ubuntu.com; Fri, 15 Sep 2017 13:50:31 +0000"],"Subject":"APPLIED Z: [SRU][Zesty][PATCH 0/7] Fixes for LP#1715812","To":"kernel-team@lists.ubuntu.com","References":"<20170908070018.4141-1-daniel.axtens@canonical.com>","From":"Stefan Bader <stefan.bader@canonical.com>","Message-ID":"<42845d04-e7c5-6a80-7f2f-b38c176b2ad7@canonical.com>","Date":"Fri, 15 Sep 2017 15:50:31 +0200","User-Agent":"Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101\n\tThunderbird/52.2.1","MIME-Version":"1.0","In-Reply-To":"<20170908070018.4141-1-daniel.axtens@canonical.com>","X-BeenThere":"kernel-team@lists.ubuntu.com","X-Mailman-Version":"2.1.20","Precedence":"list","List-Id":"Kernel team discussions <kernel-team.lists.ubuntu.com>","List-Unsubscribe":"<https://lists.ubuntu.com/mailman/options/kernel-team>,\n\t<mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe>","List-Archive":"<https://lists.ubuntu.com/archives/kernel-team>","List-Post":"<mailto:kernel-team@lists.ubuntu.com>","List-Help":"<mailto:kernel-team-request@lists.ubuntu.com?subject=help>","List-Subscribe":"<https://lists.ubuntu.com/mailman/listinfo/kernel-team>,\n\t<mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe>","Content-Type":"multipart/mixed;\n\tboundary=\"===============0620527866689589080==\"","Errors-To":"kernel-team-bounces@lists.ubuntu.com","Sender":"\"kernel-team\" <kernel-team-bounces@lists.ubuntu.com>"}}]