[{"id":1768856,"web_url":"http://patchwork.ozlabs.org/comment/1768856/","msgid":"<0de462c2-f6cd-9c07-fee0-f78a6b7d560a@canonical.com>","list_archive_url":null,"date":"2017-09-14T22:13:27","subject":"ACK: [SRU][Xenial][PATCH 0/7] Fixes for LP#1715812","submitter":{"id":2900,"url":"http://patchwork.ozlabs.org/api/people/2900/","name":"Colin Ian King","email":"colin.king@canonical.com"},"content":"On 08/09/17 08:01, Daniel Axtens wrote:\n> (This is the Xenial patchset. Some patches required minor backporting.)\n> \n> [SRU Justification]\n> \n> [Impact]\n> A host can lose access to another host whose MAC address changes if\n> they have active connections to other hosts that share a route. The\n> ARP cache does not time out as expected - instead the old MAC address\n> is continuously reconfirmed.\n> \n> [Fix]\n> Apply series [1], which changes the algorithm for neighbour confirmation.\n> That is, from upstream:\n> 51ce8bd4d17a net: pending_confirm is not used anymore\n> 0dec879f636f net: use dst_confirm_neigh for UDP, RAW, ICMP, L2TP\n> 63fca65d0863 net: add confirm_neigh method to dst_ops\n> c3a2e8370534 tcp: replace dst_confirm with sk_dst_confirm\n> c86a773c7802 sctp: add dst_pending_confirm flag\n> 4ff0620354f2 net: add dst_pending_confirm flag to skbuff\n> 9b8805a32559 sock: add sk_dst_pending_confirm flag\n> \n> [Test case]\n> Create 3 real or virtual systems, all hooked up to a switch.\n> One system needs an active-backup bond with fail_over_mac=1 num_grat_arp=0.\n> \n> Put all the systems in the same subnet, e.g. 192.168.200.0/24\n> \n> Call the system with the bond A, and the other two systems B and C.\n> \n> On B, run in 3 shells:\n>  - netperf -t TCP_RR to C\n>  - ping -f A\n>  - watch 'ip -s neigh show 192.168.200.0/24'\n> \n> On A, cause the bond to fail over.\n> \n> Observe that:\n> \n>  - without the patches, B intermittently fails to notice the change in\n>    A's MAC address. This presents as the ping failing and not\n>    recovering, and the arp table showing the old mac address never\n>    timing out and never being replace with a new mac address.\n> \n>  - with the patches, the arp cache times out and B sends another mac\n>    probe and detects A's new address.\n> \n> It helps to use taskset to put ping and netperf on the same CPU, or use single-CPU vms.\n> \n> See [2] for more details.\n> \n> [References]\n> [2] Original report: https://www.mail-archive.com/netdev@vger.kernel.org/msg138762.html\n> [1]: https://www.spinics.net/lists/linux-rdma/msg45907.html\n> \n> Julian Anastasov (7):\n>   sock: add sk_dst_pending_confirm flag\n>   net: add dst_pending_confirm flag to skbuff\n>   sctp: add dst_pending_confirm flag\n>   tcp: replace dst_confirm with sk_dst_confirm\n>   net: add confirm_neigh method to dst_ops\n>   net: use dst_confirm_neigh for UDP, RAW, ICMP, L2TP\n>   net: pending_confirm is not used anymore\n> \n>  drivers/net/vrf.c          |  5 ++++-\n>  include/linux/skbuff.h     | 12 ++++++++++++\n>  include/net/arp.h          | 16 ++++++++++++++++\n>  include/net/dst.h          | 21 +++++++++------------\n>  include/net/dst_ops.h      |  2 ++\n>  include/net/ndisc.h        | 17 +++++++++++++++++\n>  include/net/sctp/sctp.h    |  6 ++----\n>  include/net/sctp/structs.h |  4 ++++\n>  include/net/sock.h         | 25 +++++++++++++++++++++++++\n>  net/core/dst.c             |  1 -\n>  net/core/sock.c            |  2 ++\n>  net/ipv4/ip_output.c       | 11 ++++++++++-\n>  net/ipv4/ping.c            |  3 ++-\n>  net/ipv4/raw.c             |  6 +++++-\n>  net/ipv4/route.c           | 19 +++++++++++++++++++\n>  net/ipv4/tcp_input.c       | 12 +++---------\n>  net/ipv4/tcp_metrics.c     |  7 ++-----\n>  net/ipv4/tcp_output.c      |  2 ++\n>  net/ipv4/udp.c             |  3 ++-\n>  net/ipv6/ip6_output.c      |  7 +++++++\n>  net/ipv6/raw.c             |  6 +++++-\n>  net/ipv6/route.c           | 43 ++++++++++++++++++++++++++++++-------------\n>  net/ipv6/udp.c             |  3 ++-\n>  net/l2tp/l2tp_ip6.c        |  3 ++-\n>  net/sctp/associola.c       |  3 +--\n>  net/sctp/output.c          | 10 +++++++++-\n>  net/sctp/outqueue.c        |  2 +-\n>  net/sctp/sm_make_chunk.c   |  6 ++----\n>  net/sctp/sm_sideeffect.c   |  2 +-\n>  net/sctp/socket.c          |  4 ++--\n>  net/sctp/transport.c       | 16 +++++++++++++++-\n>  net/xfrm/xfrm_policy.c     | 19 +++++++++++++++++++\n>  32 files changed, 234 insertions(+), 64 deletions(-)\n> \nFirstly, this patchset does touch a fair amount of code across the\nnetwork stack, so I was originally reluctant to say this is OK for a\nSRU. However, these are correct looking upstream packports and clean\ncherry picks that legitimately address bug, so it seems reasonable to\napply these.\n\nI noticed that [PATCH 3/7] sctp: add dst_pending_confirm flag, commit\nc86a773c78025f5b825bacd7b846f4fa60dc0317 has a trivial \"cosmetic\" fix to\nit from upstream:\n\ncommit 486a43db2e26b87125b5629e1ade516f90833934\nAuthor: Xin Long <lucien.xin@gmail.com>\nDate:   Sat Mar 18 19:12:22 2017 +0800\n\n    sctp: remove temporary variable confirm from sctp_packet_transmit\n\nhowever, this is a trivial fix and probably can be ignored.\n\nI've given these patches a workout with a network stress-test and I see\nno regressions.  After reading some notes on this patch set from Jay\nalso increases my confidence in Ack'ing this patch set... so...\n\nAcked-by: Colin Ian King <colin.king@canonical.com>","headers":{"Return-Path":"<kernel-team-bounces@lists.ubuntu.com>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@bilbo.ozlabs.org","Authentication-Results":"ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=lists.ubuntu.com\n\t(client-ip=91.189.94.19; helo=huckleberry.canonical.com;\n\tenvelope-from=kernel-team-bounces@lists.ubuntu.com;\n\treceiver=<UNKNOWN>)","Received":["from huckleberry.canonical.com (huckleberry.canonical.com\n\t[91.189.94.19])\n\tby ozlabs.org (Postfix) with ESMTP id 3xtXqL4XgLz9s3T;\n\tFri, 15 Sep 2017 08:13:34 +1000 (AEST)","from localhost ([127.0.0.1] helo=huckleberry.canonical.com)\n\tby huckleberry.canonical.com with esmtp (Exim 4.86_2)\n\t(envelope-from <kernel-team-bounces@lists.ubuntu.com>)\n\tid 1dscO2-0002jC-7D; Thu, 14 Sep 2017 22:13:30 +0000","from youngberry.canonical.com ([91.189.89.112])\n\tby huckleberry.canonical.com with esmtps\n\t(TLS1.0:DHE_RSA_AES_128_CBC_SHA1:128)\n\t(Exim 4.86_2) (envelope-from <colin.king@canonical.com>)\n\tid 1dscNz-0002ij-Ur\n\tfor kernel-team@lists.canonical.com; Thu, 14 Sep 2017 22:13:27 +0000","from cpc104638-craw9-2-0-cust581.16-3.cable.virginm.net\n\t([82.33.66.70] helo=[192.168.0.18])\n\tby youngberry.canonical.com with esmtpsa\n\t(TLS1.0:DHE_RSA_AES_128_CBC_SHA1:16)\n\t(Exim 4.76) (envelope-from <colin.king@canonical.com>)\n\tid 1dscNz-0007KX-N9; Thu, 14 Sep 2017 22:13:27 +0000"],"Subject":"ACK: [SRU][Xenial][PATCH 0/7] Fixes for LP#1715812","To":"Daniel Axtens <daniel.axtens@canonical.com>,\n\tkernel-team@lists.canonical.com","References":"<20170908070142.4440-1-daniel.axtens@canonical.com>","From":"Colin Ian King <colin.king@canonical.com>","Message-ID":"<0de462c2-f6cd-9c07-fee0-f78a6b7d560a@canonical.com>","Date":"Thu, 14 Sep 2017 23:13:27 +0100","User-Agent":"Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101\n\tThunderbird/45.8.0","MIME-Version":"1.0","In-Reply-To":"<20170908070142.4440-1-daniel.axtens@canonical.com>","X-BeenThere":"kernel-team@lists.ubuntu.com","X-Mailman-Version":"2.1.20","Precedence":"list","List-Id":"Kernel team discussions <kernel-team.lists.ubuntu.com>","List-Unsubscribe":"<https://lists.ubuntu.com/mailman/options/kernel-team>,\n\t<mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe>","List-Archive":"<https://lists.ubuntu.com/archives/kernel-team>","List-Post":"<mailto:kernel-team@lists.ubuntu.com>","List-Help":"<mailto:kernel-team-request@lists.ubuntu.com?subject=help>","List-Subscribe":"<https://lists.ubuntu.com/mailman/listinfo/kernel-team>,\n\t<mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe>","Content-Type":"text/plain; charset=\"utf-8\"","Content-Transfer-Encoding":"base64","Errors-To":"kernel-team-bounces@lists.ubuntu.com","Sender":"\"kernel-team\" <kernel-team-bounces@lists.ubuntu.com>"}},{"id":1769076,"web_url":"http://patchwork.ozlabs.org/comment/1769076/","msgid":"<f072ebce-21dd-1aa8-6008-5c00f8fcd67e@canonical.com>","list_archive_url":null,"date":"2017-09-15T09:29:29","subject":"ACK/cmnt: [SRU][Xenial][PATCH 0/7] Fixes for LP#1715812","submitter":{"id":2898,"url":"http://patchwork.ozlabs.org/api/people/2898/","name":"Stefan Bader","email":"stefan.bader@canonical.com"},"content":"On 08.09.2017 09:01, Daniel Axtens wrote:\n> (This is the Xenial patchset. Some patches required minor backporting.)\n> \n> [SRU Justification]\n> \n> [Impact]\n> A host can lose access to another host whose MAC address changes if\n> they have active connections to other hosts that share a route. The\n> ARP cache does not time out as expected - instead the old MAC address\n> is continuously reconfirmed.\n> \n> [Fix]\n> Apply series [1], which changes the algorithm for neighbour confirmation.\n> That is, from upstream:\n> 51ce8bd4d17a net: pending_confirm is not used anymore\n> 0dec879f636f net: use dst_confirm_neigh for UDP, RAW, ICMP, L2TP\n> 63fca65d0863 net: add confirm_neigh method to dst_ops\n> c3a2e8370534 tcp: replace dst_confirm with sk_dst_confirm\n> c86a773c7802 sctp: add dst_pending_confirm flag\n> 4ff0620354f2 net: add dst_pending_confirm flag to skbuff\n> 9b8805a32559 sock: add sk_dst_pending_confirm flag\n> \n> [Test case]\n> Create 3 real or virtual systems, all hooked up to a switch.\n> One system needs an active-backup bond with fail_over_mac=1 num_grat_arp=0.\n> \n> Put all the systems in the same subnet, e.g. 192.168.200.0/24\n> \n> Call the system with the bond A, and the other two systems B and C.\n> \n> On B, run in 3 shells:\n>  - netperf -t TCP_RR to C\n>  - ping -f A\n>  - watch 'ip -s neigh show 192.168.200.0/24'\n> \n> On A, cause the bond to fail over.\n> \n> Observe that:\n> \n>  - without the patches, B intermittently fails to notice the change in\n>    A's MAC address. This presents as the ping failing and not\n>    recovering, and the arp table showing the old mac address never\n>    timing out and never being replace with a new mac address.\n> \n>  - with the patches, the arp cache times out and B sends another mac\n>    probe and detects A's new address.\n> \n> It helps to use taskset to put ping and netperf on the same CPU, or use single-CPU vms.\n> \n> See [2] for more details.\n> \n> [References]\n> [2] Original report: https://www.mail-archive.com/netdev@vger.kernel.org/msg138762.html\n> [1]: https://www.spinics.net/lists/linux-rdma/msg45907.html\n> \n> Julian Anastasov (7):\n>   sock: add sk_dst_pending_confirm flag\n>   net: add dst_pending_confirm flag to skbuff\n>   sctp: add dst_pending_confirm flag\n>   tcp: replace dst_confirm with sk_dst_confirm\n>   net: add confirm_neigh method to dst_ops\n>   net: use dst_confirm_neigh for UDP, RAW, ICMP, L2TP\n>   net: pending_confirm is not used anymore\n> \n>  drivers/net/vrf.c          |  5 ++++-\n>  include/linux/skbuff.h     | 12 ++++++++++++\n>  include/net/arp.h          | 16 ++++++++++++++++\n>  include/net/dst.h          | 21 +++++++++------------\n>  include/net/dst_ops.h      |  2 ++\n>  include/net/ndisc.h        | 17 +++++++++++++++++\n>  include/net/sctp/sctp.h    |  6 ++----\n>  include/net/sctp/structs.h |  4 ++++\n>  include/net/sock.h         | 25 +++++++++++++++++++++++++\n>  net/core/dst.c             |  1 -\n>  net/core/sock.c            |  2 ++\n>  net/ipv4/ip_output.c       | 11 ++++++++++-\n>  net/ipv4/ping.c            |  3 ++-\n>  net/ipv4/raw.c             |  6 +++++-\n>  net/ipv4/route.c           | 19 +++++++++++++++++++\n>  net/ipv4/tcp_input.c       | 12 +++---------\n>  net/ipv4/tcp_metrics.c     |  7 ++-----\n>  net/ipv4/tcp_output.c      |  2 ++\n>  net/ipv4/udp.c             |  3 ++-\n>  net/ipv6/ip6_output.c      |  7 +++++++\n>  net/ipv6/raw.c             |  6 +++++-\n>  net/ipv6/route.c           | 43 ++++++++++++++++++++++++++++++-------------\n>  net/ipv6/udp.c             |  3 ++-\n>  net/l2tp/l2tp_ip6.c        |  3 ++-\n>  net/sctp/associola.c       |  3 +--\n>  net/sctp/output.c          | 10 +++++++++-\n>  net/sctp/outqueue.c        |  2 +-\n>  net/sctp/sm_make_chunk.c   |  6 ++----\n>  net/sctp/sm_sideeffect.c   |  2 +-\n>  net/sctp/socket.c          |  4 ++--\n>  net/sctp/transport.c       | 16 +++++++++++++++-\n>  net/xfrm/xfrm_policy.c     | 19 +++++++++++++++++++\n>  32 files changed, 234 insertions(+), 64 deletions(-)\n> \nAcked-by: Stefan Bader <stefan.bader@canonical.com>\n\nTrusting Colin did test the backports individually (because the related bug\nreport does not explicitly state whether the test case has ben run with test\nkernels for Zesty and/or Xenial).\n\nOne thing I forgot to mention in the Zesty ACK: I also only found that one fixup\nwhich Colin mentioned. The only noticeable difference would be that the stack\nusage is minimally lower due to the dropped local variable. I would not thing\nthis warrants its inclusion but would leave it to Daniel or Jay to decide.\n\n-Stefan","headers":{"Return-Path":"<kernel-team-bounces@lists.ubuntu.com>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@bilbo.ozlabs.org","Authentication-Results":"ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=lists.ubuntu.com\n\t(client-ip=91.189.94.19; helo=huckleberry.canonical.com;\n\tenvelope-from=kernel-team-bounces@lists.ubuntu.com;\n\treceiver=<UNKNOWN>)","Received":["from huckleberry.canonical.com (huckleberry.canonical.com\n\t[91.189.94.19])\n\tby ozlabs.org (Postfix) with ESMTP id 3xtqqN2mlBz9rxj;\n\tFri, 15 Sep 2017 19:29:36 +1000 (AEST)","from localhost ([127.0.0.1] helo=huckleberry.canonical.com)\n\tby huckleberry.canonical.com with esmtp (Exim 4.86_2)\n\t(envelope-from <kernel-team-bounces@lists.ubuntu.com>)\n\tid 1dsmwF-0003Mw-Vz; Fri, 15 Sep 2017 09:29:31 +0000","from youngberry.canonical.com ([91.189.89.112])\n\tby huckleberry.canonical.com with esmtps\n\t(TLS1.0:DHE_RSA_AES_128_CBC_SHA1:128)\n\t(Exim 4.86_2) (envelope-from <stefan.bader@canonical.com>)\n\tid 1dsmwE-0003Mp-1d\n\tfor kernel-team@lists.ubuntu.com; Fri, 15 Sep 2017 09:29:30 +0000","from 1.general.smb.uk.vpn ([10.172.193.28])\n\tby youngberry.canonical.com with esmtpsa\n\t(TLS1.0:DHE_RSA_AES_128_CBC_SHA1:16)\n\t(Exim 4.76) (envelope-from <stefan.bader@canonical.com>)\n\tid 1dsmwD-0002jM-Ps\n\tfor kernel-team@lists.ubuntu.com; Fri, 15 Sep 2017 09:29:29 +0000"],"Subject":"ACK/cmnt: [SRU][Xenial][PATCH 0/7] Fixes for LP#1715812","To":"kernel-team@lists.ubuntu.com","References":"<20170908070142.4440-1-daniel.axtens@canonical.com>","From":"Stefan Bader <stefan.bader@canonical.com>","Message-ID":"<f072ebce-21dd-1aa8-6008-5c00f8fcd67e@canonical.com>","Date":"Fri, 15 Sep 2017 11:29:29 +0200","User-Agent":"Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101\n\tThunderbird/52.2.1","MIME-Version":"1.0","In-Reply-To":"<20170908070142.4440-1-daniel.axtens@canonical.com>","X-BeenThere":"kernel-team@lists.ubuntu.com","X-Mailman-Version":"2.1.20","Precedence":"list","List-Id":"Kernel team discussions <kernel-team.lists.ubuntu.com>","List-Unsubscribe":"<https://lists.ubuntu.com/mailman/options/kernel-team>,\n\t<mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe>","List-Archive":"<https://lists.ubuntu.com/archives/kernel-team>","List-Post":"<mailto:kernel-team@lists.ubuntu.com>","List-Help":"<mailto:kernel-team-request@lists.ubuntu.com?subject=help>","List-Subscribe":"<https://lists.ubuntu.com/mailman/listinfo/kernel-team>,\n\t<mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe>","Content-Type":"multipart/mixed;\n\tboundary=\"===============7894104373038221396==\"","Errors-To":"kernel-team-bounces@lists.ubuntu.com","Sender":"\"kernel-team\" <kernel-team-bounces@lists.ubuntu.com>"}},{"id":1769205,"web_url":"http://patchwork.ozlabs.org/comment/1769205/","msgid":"<5b94f929-e768-9218-7ee4-58c6f27b20ff@canonical.com>","list_archive_url":null,"date":"2017-09-15T13:53:59","subject":"APPLIED X: [SRU][Xenial][PATCH 0/7] Fixes for LP#1715812","submitter":{"id":2898,"url":"http://patchwork.ozlabs.org/api/people/2898/","name":"Stefan Bader","email":"stefan.bader@canonical.com"},"content":"On 08.09.2017 09:01, Daniel Axtens wrote:\n> (This is the Xenial patchset. Some patches required minor backporting.)\n> \n> [SRU Justification]\n> \n> [Impact]\n> A host can lose access to another host whose MAC address changes if\n> they have active connections to other hosts that share a route. The\n> ARP cache does not time out as expected - instead the old MAC address\n> is continuously reconfirmed.\n> \n> [Fix]\n> Apply series [1], which changes the algorithm for neighbour confirmation.\n> That is, from upstream:\n> 51ce8bd4d17a net: pending_confirm is not used anymore\n> 0dec879f636f net: use dst_confirm_neigh for UDP, RAW, ICMP, L2TP\n> 63fca65d0863 net: add confirm_neigh method to dst_ops\n> c3a2e8370534 tcp: replace dst_confirm with sk_dst_confirm\n> c86a773c7802 sctp: add dst_pending_confirm flag\n> 4ff0620354f2 net: add dst_pending_confirm flag to skbuff\n> 9b8805a32559 sock: add sk_dst_pending_confirm flag\n> \n> [Test case]\n> Create 3 real or virtual systems, all hooked up to a switch.\n> One system needs an active-backup bond with fail_over_mac=1 num_grat_arp=0.\n> \n> Put all the systems in the same subnet, e.g. 192.168.200.0/24\n> \n> Call the system with the bond A, and the other two systems B and C.\n> \n> On B, run in 3 shells:\n>  - netperf -t TCP_RR to C\n>  - ping -f A\n>  - watch 'ip -s neigh show 192.168.200.0/24'\n> \n> On A, cause the bond to fail over.\n> \n> Observe that:\n> \n>  - without the patches, B intermittently fails to notice the change in\n>    A's MAC address. This presents as the ping failing and not\n>    recovering, and the arp table showing the old mac address never\n>    timing out and never being replace with a new mac address.\n> \n>  - with the patches, the arp cache times out and B sends another mac\n>    probe and detects A's new address.\n> \n> It helps to use taskset to put ping and netperf on the same CPU, or use single-CPU vms.\n> \n> See [2] for more details.\n> \n> [References]\n> [2] Original report: https://www.mail-archive.com/netdev@vger.kernel.org/msg138762.html\n> [1]: https://www.spinics.net/lists/linux-rdma/msg45907.html\n> \n> Julian Anastasov (7):\n>   sock: add sk_dst_pending_confirm flag\n>   net: add dst_pending_confirm flag to skbuff\n>   sctp: add dst_pending_confirm flag\n>   tcp: replace dst_confirm with sk_dst_confirm\n>   net: add confirm_neigh method to dst_ops\n>   net: use dst_confirm_neigh for UDP, RAW, ICMP, L2TP\n>   net: pending_confirm is not used anymore\n> \n>  drivers/net/vrf.c          |  5 ++++-\n>  include/linux/skbuff.h     | 12 ++++++++++++\n>  include/net/arp.h          | 16 ++++++++++++++++\n>  include/net/dst.h          | 21 +++++++++------------\n>  include/net/dst_ops.h      |  2 ++\n>  include/net/ndisc.h        | 17 +++++++++++++++++\n>  include/net/sctp/sctp.h    |  6 ++----\n>  include/net/sctp/structs.h |  4 ++++\n>  include/net/sock.h         | 25 +++++++++++++++++++++++++\n>  net/core/dst.c             |  1 -\n>  net/core/sock.c            |  2 ++\n>  net/ipv4/ip_output.c       | 11 ++++++++++-\n>  net/ipv4/ping.c            |  3 ++-\n>  net/ipv4/raw.c             |  6 +++++-\n>  net/ipv4/route.c           | 19 +++++++++++++++++++\n>  net/ipv4/tcp_input.c       | 12 +++---------\n>  net/ipv4/tcp_metrics.c     |  7 ++-----\n>  net/ipv4/tcp_output.c      |  2 ++\n>  net/ipv4/udp.c             |  3 ++-\n>  net/ipv6/ip6_output.c      |  7 +++++++\n>  net/ipv6/raw.c             |  6 +++++-\n>  net/ipv6/route.c           | 43 ++++++++++++++++++++++++++++++-------------\n>  net/ipv6/udp.c             |  3 ++-\n>  net/l2tp/l2tp_ip6.c        |  3 ++-\n>  net/sctp/associola.c       |  3 +--\n>  net/sctp/output.c          | 10 +++++++++-\n>  net/sctp/outqueue.c        |  2 +-\n>  net/sctp/sm_make_chunk.c   |  6 ++----\n>  net/sctp/sm_sideeffect.c   |  2 +-\n>  net/sctp/socket.c          |  4 ++--\n>  net/sctp/transport.c       | 16 +++++++++++++++-\n>  net/xfrm/xfrm_policy.c     | 19 +++++++++++++++++++\n>  32 files changed, 234 insertions(+), 64 deletions(-)\n> \nApplied to Xenial master-next","headers":{"Return-Path":"<kernel-team-bounces@lists.ubuntu.com>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@bilbo.ozlabs.org","Authentication-Results":"ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=lists.ubuntu.com\n\t(client-ip=91.189.94.19; helo=huckleberry.canonical.com;\n\tenvelope-from=kernel-team-bounces@lists.ubuntu.com;\n\treceiver=<UNKNOWN>)","Received":["from huckleberry.canonical.com (huckleberry.canonical.com\n\t[91.189.94.19])\n\tby ozlabs.org (Postfix) with ESMTP id 3xtxhY58Ftz9sxR;\n\tFri, 15 Sep 2017 23:54:05 +1000 (AEST)","from localhost ([127.0.0.1] helo=huckleberry.canonical.com)\n\tby huckleberry.canonical.com with esmtp (Exim 4.86_2)\n\t(envelope-from <kernel-team-bounces@lists.ubuntu.com>)\n\tid 1dsr4D-0004KJ-Lw; Fri, 15 Sep 2017 13:54:01 +0000","from youngberry.canonical.com ([91.189.89.112])\n\tby huckleberry.canonical.com with esmtps\n\t(TLS1.0:DHE_RSA_AES_128_CBC_SHA1:128)\n\t(Exim 4.86_2) (envelope-from <stefan.bader@canonical.com>)\n\tid 1dsr4C-0004Jz-FX\n\tfor kernel-team@lists.ubuntu.com; Fri, 15 Sep 2017 13:54:00 +0000","from 1.general.smb.uk.vpn ([10.172.193.28])\n\tby youngberry.canonical.com with esmtpsa\n\t(TLS1.0:DHE_RSA_AES_128_CBC_SHA1:16)\n\t(Exim 4.76) (envelope-from <stefan.bader@canonical.com>)\n\tid 1dsr4C-000637-7H\n\tfor kernel-team@lists.ubuntu.com; Fri, 15 Sep 2017 13:54:00 +0000"],"Subject":"APPLIED X: [SRU][Xenial][PATCH 0/7] Fixes for LP#1715812","To":"kernel-team@lists.ubuntu.com","References":"<20170908070142.4440-1-daniel.axtens@canonical.com>","From":"Stefan Bader <stefan.bader@canonical.com>","Message-ID":"<5b94f929-e768-9218-7ee4-58c6f27b20ff@canonical.com>","Date":"Fri, 15 Sep 2017 15:53:59 +0200","User-Agent":"Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101\n\tThunderbird/52.2.1","MIME-Version":"1.0","In-Reply-To":"<20170908070142.4440-1-daniel.axtens@canonical.com>","X-BeenThere":"kernel-team@lists.ubuntu.com","X-Mailman-Version":"2.1.20","Precedence":"list","List-Id":"Kernel team discussions <kernel-team.lists.ubuntu.com>","List-Unsubscribe":"<https://lists.ubuntu.com/mailman/options/kernel-team>,\n\t<mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe>","List-Archive":"<https://lists.ubuntu.com/archives/kernel-team>","List-Post":"<mailto:kernel-team@lists.ubuntu.com>","List-Help":"<mailto:kernel-team-request@lists.ubuntu.com?subject=help>","List-Subscribe":"<https://lists.ubuntu.com/mailman/listinfo/kernel-team>,\n\t<mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe>","Content-Type":"multipart/mixed;\n\tboundary=\"===============8782162611016675664==\"","Errors-To":"kernel-team-bounces@lists.ubuntu.com","Sender":"\"kernel-team\" <kernel-team-bounces@lists.ubuntu.com>"}}]