Single branch specified, using that and the previous one: remotes/brancher/net-next-2024-11-07--15-00 (v6.12-rc5-1391-gb802cf34a829) remotes/brancher/net-next-2024-11-07--18-00 (v6.12-rc5-1405-gcb7ba6c289e6) ==== BASE IDENTICAL ==== ==== COMMIT DIFF ==== diff --git a/tmp/tmp.KEaz0IzrGb b/tmp/tmp.6IryF5PVWP index ff3ba7dfb0e1..2b0dac57b9f1 100644 --- a/tmp/tmp.KEaz0IzrGb +++ b/tmp/tmp.6IryF5PVWP @@ -1,9 +1,18 @@ selftests: net: enable profiling -Revert "configs/debug: make sure PROVE_RCU_LIST=y takes effect" fs/9p: use kvzalloc/kvfree to allocate struct p9_rdir and its buffer tc_action dbg profile patch forwarding: set timeout to 3 hours +net: netpoll: flush skb pool during cleanup +net: netpoll: Individualize the skb pool +net: dlink: add support for reporting stats via `ethtool -S` +net: hns3: fix kernel crash when 1588 is sent on HIP08 devices +net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue +net: hns3: initialize reset_timer before hclgevf_misc_irq_init() +net: hns3: don't auto enable misc vector +net: hns3: Resolved the issue that the debugfs query result is inconsistent. +net: hns3: fix missing features due to dev->features configuration too early +net: hns3: fixed reset failure issues caused by the incorrect reset type octeon_ep_vf: add protective null checks in napi callbacks for cnxk cards octeon_ep_vf: add protective null checks in napi callbacks for cn9k cards octeon_ep_vf: Fix null dereferences to IQ/OQ pointers @@ -11,6 +20,18 @@ octeon_ep: add protective null checks in napi callbacks for cnxk cards octeon_ep: add protective null checks in napi callbacks for cn9k cards octeon_ep: Fix null dereferences to IQ/OQ pointers octeon_ep: Add checks to fix double free crashes. +selftest: net: test SO_PRIORITY ancillary data with cmsg_sender +net: support SO_PRIORITY cmsg +net: Introduce sk_set_prio_allowed helper function +net: ip: make ip_route_use_hint() return drop reasons +net: ip: make ip_mkroute_input/__mkroute_input return drop reasons +net: ip: make ip_route_input() return drop reasons +net: ip: make ip_route_input_noref() return drop reasons +net: ip: make ip_route_input_rcu() return drop reasons +net: ip: make ip_route_input_slow() return drop reasons +net: ip: make ip_mc_validate_source() return drop reason +net: ip: make ip_route_input_mc() return drop reason +net: ip: make fib_validate_source() support drop reasons net: ethernet: ti: am65-cpsw: enable DSCP to priority map for RX net: ethernet: ti: am65-cpsw: update pri_thread_map as per IEEE802.1Q-2014 octeon_ep: add ndo ops for VFs in PF driver @@ -18,7 +39,6 @@ net: atlantic: use irq_update_affinity_hint() nfp: use irq_update_affinity_hint() geneve: Use pcpu stats to update rx_dropped counter. netfilter: nf_tables: wait for rcu grace period on net_device removal -ipmr: Fix access to mfc_cache_list without lock held mptcp: fix possible integer overflow in mptcp_reset_tout_timer net: stmmac: dwmac4: Receive Watchdog Timeout is not in abnormal interrupt summary net: stmmac: dwmac4: Fix the MTL_OP_MODE_*_MASK operation @@ -28,7 +48,6 @@ net: enetc: add LSO support for i.MX95 ENETC PF net: enetc: update max chained Tx BD number for i.MX95 ENETC net: enetc: add Tx checksum offload for i.MX95 ENETC net: enetc: add Rx checksum offload for i.MX95 ENETC -selftests: wireguards: use nft by default selftests: wireguard: load nf_conntrack if it's not present drivers: net: ionic: add missed debugfs cleanup to ionic_probe() error path net: fix data-races around sk->sk_forward_alloc @@ -56,20 +75,15 @@ net: sparx5: use phy_interface_mode_is_rgmii() net: sparx5: use is_port_rgmii() throughout net: sparx5: add function for RGMII port check net: sparx5: do some preparation work -virtio/vsock: Put vsock_connected_sockets_vsk() to use -virtio/vsock: Improve MSG_ZEROCOPY error handling -virtio/vsock: Fix sk_error_queue memory leak -virtio/vsock: Fix accept_queue memory leak bnxt_en: use irq_update_affinity_hint() r8169: align WAKE_PHY handling with r8125/r8126 vendor drivers r8169: improve rtl_set_d3_pll_down r8169: improve __rtl8169_set_wol -Fix u32's systematic failure to free IDR entries for hnodes. +net: sched: cls_u32: Fix u32's systematic failure to free IDR entries for hnodes. phonet: do not call synchronize_rcu() from phonet_route_del() rxrpc: Fix missing locking causing hanging calls rxrpc: Add a tracepoint for aborts being proposed mISDN: Fix typos -net: txgbe: fix lost GPIO interrupt hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer selftests: hsr: Add test for VLAN net: ti: icssg-prueth: Add VLAN support for HSR mode