Single branch specified, using that and the previous one: remotes/brancher/net-next-2025-04-25--09-00 (v6.15-rc3-668-ge21ef41d425c) remotes/brancher/net-next-2025-04-25--12-00 (v6.15-rc3-683-g2251dc8c5573) ==== BASE IDENTICAL ==== ==== COMMIT DIFF ==== diff --git a/tmp/tmp.4snl6uwt47 b/tmp/tmp.lMiAFLNeoh index 3d9d53584179..8422c382e1fe 100644 --- a/tmp/tmp.4snl6uwt47 +++ b/tmp/tmp.lMiAFLNeoh @@ -6,6 +6,21 @@ selftests: net: enable profiling tc_action dbg profile patch forwarding: set timeout to 3 hours +mdio: fix CONFIG_MDIO_DEVRES selects +net: dsa: microchip: Remove ineffective checks from ksz_set_mac_eee() +net: mana: Allocate MSI-X vectors dynamically as required +PCI: hv: Allow dynamic MSI-X vector allocation +PCI: Export pci_msix_prepare_desc() for dynamic MSI-X alloc +net: dsa: qca8k: fix led devicename when using external mdio bus +net: thunder_bgx: Don't disable PCI device manually +net: thunder_bgx: Use pure PCI devres API +net: mdio: thunder: Use pure PCI devres API +net: ethernet: sis900: Use pure PCI devres API +net: ethernet: natsemi: Use pure PCI devres API +net: tulip: Use pure PCI devres API +net: octeontx2: Use pure PCI devres API +net: prestera: Use pure PCI devres API +Documentation: networking: expand and clarify EEE_GET/EEE_SET documentation net: call inet_twsk_put() on TIMEWAIT sockets It is possible for a pointer of type struct inet_timewait_sock to be returned from the functions __inet_lookup_established() and __inet6_lookup_established(). This can cause a crash when the returned pointer is of type struct inet_timewait_sock and sock_put() is called on it. The following is a crash call stack that shows sk->sk_wmem_alloc being accessed in sk_free() during the call to sock_put() on a struct inet_timewait_sock pointer. To avoid this issue, use inet_twsk_put() instead of sock_put() when sk->sk_state is TCP_TIME_WAIT. net: libwx: fix to set pause param selftests: net: add a virtio_net deadlock selftest