Changelog in Linux kernel 5.15.200

 
ALSA: hda/realtek: add HP Laptop 15s-eq1xxx mute LED quirk [+ + +]
Author: Ruslan Krupitsa <krupitsarus@outlook.com>
Date:   Fri Jan 2 02:53:36 2026 +0300

    ALSA: hda/realtek: add HP Laptop 15s-eq1xxx mute LED quirk
    
    [ Upstream commit 9ed7a28225af02b74f61e7880d460db49db83758 ]
    
    HP Laptop 15s-eq1xxx with ALC236 codec does not enable the
    mute LED automatically. This patch adds a quirk entry for
    subsystem ID 0x8706 using the ALC236_FIXUP_HP_MUTE_LED_COEFBIT2
    fixup, enabling correct mute LED behavior.
    
    Signed-off-by: Ruslan Krupitsa <krupitsarus@outlook.com>
    Link: https://patch.msgid.link/AS8P194MB112895B8EC2D87D53A876085BBBAA@AS8P194MB1128.EURP194.PROD.OUTLOOK.COM
    Signed-off-by: Takashi Iwai <tiwai@suse.de>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
ARM: 9468/1: fix memset64() on big-endian [+ + +]
Author: Thomas Weissschuh <thomas.weissschuh@linutronix.de>
Date:   Wed Jan 7 11:01:49 2026 +0100

    ARM: 9468/1: fix memset64() on big-endian
    
    commit 23ea2a4c72323feb6e3e025e8a6f18336513d5ad upstream.
    
    On big-endian systems the 32-bit low and high halves need to be swapped
    for the underlying assembly implementation to work correctly.
    
    Fixes: fd1d362600e2 ("ARM: implement memset32 & memset64")
    Cc: stable@vger.kernel.org
    Signed-off-by: Thomas Weißschuh <thomas.weissschuh@linutronix.de>
    Reviewed-by: Matthew Wilcox (Oracle) <willy@infradead.org>
    Reviewed-by: Arnd Bergmann <arnd@arndb.de>
    Signed-off-by: Russell King (Oracle) <rmk+kernel@armlinux.org.uk>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

ARM: spear: Do not use timer namespace for timer_shutdown() function [+ + +]
Author: Steven Rostedt (Google) <rostedt@goodmis.org>
Date:   Sat Nov 29 01:05:27 2025 +0900

    ARM: spear: Do not use timer namespace for timer_shutdown() function
    
    [ Upstream commit 80b55772d41d8afec68dbc4ff0368a9fe5d1f390 ]
    
    A new "shutdown" timer state is being added to the generic timer code. One
    of the functions to change the timer into the state is called
    "timer_shutdown()". This means that there can not be other functions called
    "timer_shutdown()" as the timer code owns the "timer_*" name space.
    
    Rename timer_shutdown() to spear_timer_shutdown() to avoid this conflict.
    
    Signed-off-by: Steven Rostedt (Google) <rostedt@goodmis.org>
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Tested-by: Guenter Roeck <linux@roeck-us.net>
    Reviewed-by: Guenter Roeck <linux@roeck-us.net>
    Reviewed-by: Jacob Keller <jacob.e.keller@intel.com>
    Reviewed-by: Anna-Maria Behnsen <anna-maria@linutronix.de>
    Acked-by: Arnd Bergmann <arnd@arndb.de>
    Acked-by: Viresh Kumar <viresh.kumar@linaro.org>
    Link: https://lkml.kernel.org/r/20221106212701.822440504@goodmis.org
    Link: https://lore.kernel.org/all/20221105060155.228348078@goodmis.org/
    Link: https://lore.kernel.org/r/20221110064146.810953418@goodmis.org
    Link: https://lore.kernel.org/r/20221123201624.513863211@linutronix.de
    Signed-off-by: Jeongjun Park <aha310510@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
ASoC: amd: fix memory leak in acp3x pdm dma ops [+ + +]
Author: Chris Bainbridge <chris.bainbridge@gmail.com>
Date:   Mon Feb 2 20:50:33 2026 +0000

    ASoC: amd: fix memory leak in acp3x pdm dma ops
    
    [ Upstream commit 7f67ba5413f98d93116a756e7f17cd2c1d6c2bd6 ]
    
    Fixes: 4a767b1d039a8 ("ASoC: amd: add acp3x pdm driver dma ops")
    Signed-off-by: Chris Bainbridge <chris.bainbridge@gmail.com>
    Link: https://patch.msgid.link/20260202205034.7697-1-chris.bainbridge@gmail.com
    Signed-off-by: Mark Brown <broonie@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

ASoC: davinci-evm: Fix reference leak in davinci_evm_probe [+ + +]
Author: Kery Qi <qikeyu2017@gmail.com>
Date:   Wed Jan 7 23:48:37 2026 +0800

    ASoC: davinci-evm: Fix reference leak in davinci_evm_probe
    
    [ Upstream commit 5b577d214fcc109707bcb77b4ae72a31cfd86798 ]
    
    The davinci_evm_probe() function calls of_parse_phandle() to acquire
    device nodes for "ti,audio-codec" and "ti,mcasp-controller". These
    functions return device nodes with incremented reference counts.
    
    However, in several error paths (e.g., when the second of_parse_phandle(),
    snd_soc_of_parse_card_name(), or devm_snd_soc_register_card() fails),
    the function returns directly without releasing the acquired nodes,
    leading to reference leaks.
    
    This patch adds an error handling path 'err_put' to properly release
    the device nodes using of_node_put() and clean up the pointers when
    an error occurs.
    
    Signed-off-by: Kery Qi <qikeyu2017@gmail.com>
    Link: https://patch.msgid.link/20260107154836.1521-2-qikeyu2017@gmail.com
    Signed-off-by: Mark Brown <broonie@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

ASoC: tlv320adcx140: Propagate error codes during probe [+ + +]
Author: Dimitrios Katsaros <patcherwork@gmail.com>
Date:   Tue Jan 13 11:58:46 2026 +0100

    ASoC: tlv320adcx140: Propagate error codes during probe
    
    [ Upstream commit d89aad92cfd15edbd704746f44c98fe687f9366f ]
    
    When scanning for the reset pin, we could get an -EPROBE_DEFER.
    The driver would assume that no reset pin had been defined,
    which would mean that the chip would never be powered.
    
    Now we both respect any error we get from devm_gpiod_get_optional.
    We also now properly report the missing GPIO definition when
    'gpio_reset' is NULL.
    
    Signed-off-by: Dimitrios Katsaros <patcherwork@gmail.com>
    Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
    Link: https://patch.msgid.link/20260113-sound-soc-codecs-tvl320adcx140-v4-3-8f7ecec525c8@pengutronix.de
    Signed-off-by: Mark Brown <broonie@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
binderfs: fix ida_alloc_max() upper bound [+ + +]
Author: Carlos Llamas <cmllamas@google.com>
Date:   Tue Jan 27 23:55:11 2026 +0000

    binderfs: fix ida_alloc_max() upper bound
    
    commit ec4ddc90d201d09ef4e4bef8a2c6d9624525ad68 upstream.
    
    The 'max' argument of ida_alloc_max() takes the maximum valid ID and not
    the "count". Using an ID of BINDERFS_MAX_MINOR (1 << 20) for dev->minor
    would exceed the limits of minor numbers (20-bits). Fix this off-by-one
    error by subtracting 1 from the 'max'.
    
    Cc: stable@vger.kernel.org
    Fixes: 3ad20fe393b3 ("binder: implement binderfs")
    Signed-off-by: Carlos Llamas <cmllamas@google.com>
    Link: https://patch.msgid.link/20260127235545.2307876-2-cmllamas@google.com
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
block,bfq: fix aux stat accumulation destination [+ + +]
Author: shechenglong <shechenglong@xfusion.com>
Date:   Sun Dec 28 21:04:26 2025 +0800

    block,bfq: fix aux stat accumulation destination
    
    [ Upstream commit 04bdb1a04d8a2a89df504c1e34250cd3c6e31a1c ]
    
    Route bfqg_stats_add_aux() time accumulation into the destination
    stats object instead of the source, aligning with other stat fields.
    
    Reviewed-by: Yu Kuai <yukuai@fnnas.com>
    Signed-off-by: shechenglong <shechenglong@xfusion.com>
    Signed-off-by: Jens Axboe <axboe@kernel.dk>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
Bluetooth: hci_event: call disconnect callback before deleting conn [+ + +]
Author: Pauli Virtanen <pav@iki.fi>
Date:   Mon Jun 19 01:04:32 2023 +0300

    Bluetooth: hci_event: call disconnect callback before deleting conn
    
    commit 7f7cfcb6f0825652973b780f248603e23f16ee90 upstream.
    
    In hci_cs_disconnect, we do hci_conn_del even if disconnection failed.
    
    ISO, L2CAP and SCO connections refer to the hci_conn without
    hci_conn_get, so disconn_cfm must be called so they can clean up their
    conn, otherwise use-after-free occurs.
    
    ISO:
    ==========================================================
    iso_sock_connect:880: sk 00000000eabd6557
    iso_connect_cis:356: 70:1a:b8:98:ff:a2 -> 28:3d:c2:4a:7e:da
    ...
    iso_conn_add:140: hcon 000000001696f1fd conn 00000000b6251073
    hci_dev_put:1487: hci0 orig refcnt 17
    __iso_chan_add:214: conn 00000000b6251073
    iso_sock_clear_timer:117: sock 00000000eabd6557 state 3
    ...
    hci_rx_work:4085: hci0 Event packet
    hci_event_packet:7601: hci0: event 0x0f
    hci_cmd_status_evt:4346: hci0: opcode 0x0406
    hci_cs_disconnect:2760: hci0: status 0x0c
    hci_sent_cmd_data:3107: hci0 opcode 0x0406
    hci_conn_del:1151: hci0 hcon 000000001696f1fd handle 2560
    hci_conn_unlink:1102: hci0: hcon 000000001696f1fd
    hci_conn_drop:1451: hcon 00000000d8521aaf orig refcnt 2
    hci_chan_list_flush:2780: hcon 000000001696f1fd
    hci_dev_put:1487: hci0 orig refcnt 21
    hci_dev_put:1487: hci0 orig refcnt 20
    hci_req_cmd_complete:3978: opcode 0x0406 status 0x0c
    ... <no iso_* activity on sk/conn> ...
    iso_sock_sendmsg:1098: sock 00000000dea5e2e0, sk 00000000eabd6557
    BUG: kernel NULL pointer dereference, address: 0000000000000668
    PGD 0 P4D 0
    Oops: 0000 [#1] PREEMPT SMP PTI
    Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-1.fc38 04/01/2014
    RIP: 0010:iso_sock_sendmsg (net/bluetooth/iso.c:1112) bluetooth
    ==========================================================
    
    L2CAP:
    ==================================================================
    hci_cmd_status_evt:4359: hci0: opcode 0x0406
    hci_cs_disconnect:2760: hci0: status 0x0c
    hci_sent_cmd_data:3085: hci0 opcode 0x0406
    hci_conn_del:1151: hci0 hcon ffff88800c999000 handle 3585
    hci_conn_unlink:1102: hci0: hcon ffff88800c999000
    hci_chan_list_flush:2780: hcon ffff88800c999000
    hci_chan_del:2761: hci0 hcon ffff88800c999000 chan ffff888018ddd280
    ...
    BUG: KASAN: slab-use-after-free in hci_send_acl+0x2d/0x540 [bluetooth]
    Read of size 8 at addr ffff888018ddd298 by task bluetoothd/1175
    
    CPU: 0 PID: 1175 Comm: bluetoothd Tainted: G            E      6.4.0-rc4+ #2
    Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-1.fc38 04/01/2014
    Call Trace:
     <TASK>
     dump_stack_lvl+0x5b/0x90
     print_report+0xcf/0x670
     ? __virt_addr_valid+0xf8/0x180
     ? hci_send_acl+0x2d/0x540 [bluetooth]
     kasan_report+0xa8/0xe0
     ? hci_send_acl+0x2d/0x540 [bluetooth]
     hci_send_acl+0x2d/0x540 [bluetooth]
     ? __pfx___lock_acquire+0x10/0x10
     l2cap_chan_send+0x1fd/0x1300 [bluetooth]
     ? l2cap_sock_sendmsg+0xf2/0x170 [bluetooth]
     ? __pfx_l2cap_chan_send+0x10/0x10 [bluetooth]
     ? lock_release+0x1d5/0x3c0
     ? mark_held_locks+0x1a/0x90
     l2cap_sock_sendmsg+0x100/0x170 [bluetooth]
     sock_write_iter+0x275/0x280
     ? __pfx_sock_write_iter+0x10/0x10
     ? __pfx___lock_acquire+0x10/0x10
     do_iter_readv_writev+0x176/0x220
     ? __pfx_do_iter_readv_writev+0x10/0x10
     ? find_held_lock+0x83/0xa0
     ? selinux_file_permission+0x13e/0x210
     do_iter_write+0xda/0x340
     vfs_writev+0x1b4/0x400
     ? __pfx_vfs_writev+0x10/0x10
     ? __seccomp_filter+0x112/0x750
     ? populate_seccomp_data+0x182/0x220
     ? __fget_light+0xdf/0x100
     ? do_writev+0x19d/0x210
     do_writev+0x19d/0x210
     ? __pfx_do_writev+0x10/0x10
     ? mark_held_locks+0x1a/0x90
     do_syscall_64+0x60/0x90
     ? lockdep_hardirqs_on_prepare+0x149/0x210
     ? do_syscall_64+0x6c/0x90
     ? lockdep_hardirqs_on_prepare+0x149/0x210
     entry_SYSCALL_64_after_hwframe+0x72/0xdc
    RIP: 0033:0x7ff45cb23e64
    Code: 15 d1 1f 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 80 3d 9d a7 0d 00 00 74 13 b8 14 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 89 54 24 1c 48 89
    RSP: 002b:00007fff21ae09b8 EFLAGS: 00000202 ORIG_RAX: 0000000000000014
    RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007ff45cb23e64
    RDX: 0000000000000001 RSI: 00007fff21ae0aa0 RDI: 0000000000000017
    RBP: 00007fff21ae0aa0 R08: 000000000095a8a0 R09: 0000607000053f40
    R10: 0000000000000001 R11: 0000000000000202 R12: 00007fff21ae0ac0
    R13: 00000fffe435c150 R14: 00007fff21ae0a80 R15: 000060f000000040
     </TASK>
    
    Allocated by task 771:
     kasan_save_stack+0x33/0x60
     kasan_set_track+0x25/0x30
     __kasan_kmalloc+0xaa/0xb0
     hci_chan_create+0x67/0x1b0 [bluetooth]
     l2cap_conn_add.part.0+0x17/0x590 [bluetooth]
     l2cap_connect_cfm+0x266/0x6b0 [bluetooth]
     hci_le_remote_feat_complete_evt+0x167/0x310 [bluetooth]
     hci_event_packet+0x38d/0x800 [bluetooth]
     hci_rx_work+0x287/0xb20 [bluetooth]
     process_one_work+0x4f7/0x970
     worker_thread+0x8f/0x620
     kthread+0x17f/0x1c0
     ret_from_fork+0x2c/0x50
    
    Freed by task 771:
     kasan_save_stack+0x33/0x60
     kasan_set_track+0x25/0x30
     kasan_save_free_info+0x2e/0x50
     ____kasan_slab_free+0x169/0x1c0
     slab_free_freelist_hook+0x9e/0x1c0
     __kmem_cache_free+0xc0/0x310
     hci_chan_list_flush+0x46/0x90 [bluetooth]
     hci_conn_cleanup+0x7d/0x330 [bluetooth]
     hci_cs_disconnect+0x35d/0x530 [bluetooth]
     hci_cmd_status_evt+0xef/0x2b0 [bluetooth]
     hci_event_packet+0x38d/0x800 [bluetooth]
     hci_rx_work+0x287/0xb20 [bluetooth]
     process_one_work+0x4f7/0x970
     worker_thread+0x8f/0x620
     kthread+0x17f/0x1c0
     ret_from_fork+0x2c/0x50
    ==================================================================
    
    Fixes: b8d290525e39 ("Bluetooth: clean up connection in hci_cs_disconnect")
    Signed-off-by: Pauli Virtanen <pav@iki.fi>
    Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
    Signed-off-by: Bin Lan <lanbincn@139.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

Bluetooth: hci_qca: Fix the teardown problem for real [+ + +]
Author: Thomas Gleixner <tglx@kernel.org>
Date:   Sat Nov 29 01:05:39 2025 +0900

    Bluetooth: hci_qca: Fix the teardown problem for real
    
    [ Upstream commit e0d3da982c96aeddc1bbf1cf9469dbb9ebdca657 ]
    
    While discussing solutions for the teardown problem which results from
    circular dependencies between timers and workqueues, where timers schedule
    work from their timer callback and workqueues arm the timers from work
    items, it was discovered that the recent fix to the QCA code is incorrect.
    
    That commit fixes the obvious problem of using del_timer() instead of
    del_timer_sync() and reorders the teardown calls to
    
       destroy_workqueue(wq);
       del_timer_sync(t);
    
    This makes it less likely to explode, but it's still broken:
    
       destroy_workqueue(wq);
       /* After this point @wq cannot be touched anymore */
    
       ---> timer expires
             queue_work(wq) <---- Results in a NULL pointer dereference
                                  deep in the work queue core code.
       del_timer_sync(t);
    
    Use the new timer_shutdown_sync() function to ensure that the timers are
    disarmed, no timer callbacks are running and the timers cannot be armed
    again. This restores the original teardown sequence:
    
       timer_shutdown_sync(t);
       destroy_workqueue(wq);
    
    which is now correct because the timer core silently ignores potential
    rearming attempts which can happen when destroy_workqueue() drains pending
    work before mopping up the workqueue.
    
    Fixes: 72ef98445aca ("Bluetooth: hci_qca: Use del_timer_sync() before freeing")
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Tested-by: Guenter Roeck <linux@roeck-us.net>
    Reviewed-by: Jacob Keller <jacob.e.keller@intel.com>
    Reviewed-by: Anna-Maria Behnsen <anna-maria@linutronix.de>
    Acked-by: Luiz Augusto von Dentz <luiz.dentz@gmail.com>
    Link: https://lore.kernel.org/all/87iljhsftt.ffs@tglx
    Link: https://lore.kernel.org/r/20221123201625.435907114@linutronix.de
    Signed-off-by: Jeongjun Park <aha310510@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
clocksource/drivers/arm_arch_timer: Do not use timer namespace for timer_shutdown() function [+ + +]
Author: Steven Rostedt (Google) <rostedt@goodmis.org>
Date:   Sat Nov 29 01:05:28 2025 +0900

    clocksource/drivers/arm_arch_timer: Do not use timer namespace for timer_shutdown() function
    
    [ Upstream commit 73737a5833ace25a8408b0d3b783637cb6bf29d1 ]
    
    A new "shutdown" timer state is being added to the generic timer code. One
    of the functions to change the timer into the state is called
    "timer_shutdown()". This means that there can not be other functions
    called "timer_shutdown()" as the timer code owns the "timer_*" name space.
    
    Rename timer_shutdown() to arch_timer_shutdown() to avoid this conflict.
    
    Signed-off-by: Steven Rostedt (Google) <rostedt@goodmis.org>
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Tested-by: Guenter Roeck <linux@roeck-us.net>
    Reviewed-by: Guenter Roeck <linux@roeck-us.net>
    Reviewed-by: Jacob Keller <jacob.e.keller@intel.com>
    Reviewed-by: Anna-Maria Behnsen <anna-maria@linutronix.de>
    Acked-by: Marc Zyngier <maz@kernel.org>
    Link: https://lkml.kernel.org/r/20221106212702.002251651@goodmis.org
    Link: https://lore.kernel.org/all/20221105060155.409832154@goodmis.org/
    Link: https://lore.kernel.org/r/20221110064146.981725531@goodmis.org
    Link: https://lore.kernel.org/r/20221123201624.574672568@linutronix.de
    Signed-off-by: Jeongjun Park <aha310510@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
clocksource/drivers/sp804: Do not use timer namespace for timer_shutdown() function [+ + +]
Author: Steven Rostedt (Google) <rostedt@goodmis.org>
Date:   Sat Nov 29 01:05:29 2025 +0900

    clocksource/drivers/sp804: Do not use timer namespace for timer_shutdown() function
    
    [ Upstream commit 6e1fc2591f116dfb20b65cf27356475461d61bd8 ]
    
    A new "shutdown" timer state is being added to the generic timer code. One
    of the functions to change the timer into the state is called
    "timer_shutdown()". This means that there can not be other functions
    called "timer_shutdown()" as the timer code owns the "timer_*" name space.
    
    Rename timer_shutdown() to evt_timer_shutdown() to avoid this conflict.
    
    Signed-off-by: Steven Rostedt (Google) <rostedt@goodmis.org>
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Tested-by: Guenter Roeck <linux@roeck-us.net>
    Reviewed-by: Guenter Roeck <linux@roeck-us.net>
    Reviewed-by: Jacob Keller <jacob.e.keller@intel.com>
    Reviewed-by: Anna-Maria Behnsen <anna-maria@linutronix.de>
    Link: https://lkml.kernel.org/r/20221106212702.182883323@goodmis.org
    Link: https://lore.kernel.org/all/20221105060155.592778858@goodmis.org/
    Link: https://lore.kernel.org/r/20221110064147.158230501@goodmis.org
    Link: https://lore.kernel.org/r/20221123201624.634354813@linutronix.de
    Signed-off-by: Jeongjun Park <aha310510@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
Documentation: Remove bogus claim about del_timer_sync() [+ + +]
Author: Thomas Gleixner <tglx@kernel.org>
Date:   Sat Nov 29 01:05:26 2025 +0900

    Documentation: Remove bogus claim about del_timer_sync()
    
    [ Upstream commit b0b0aa5d858d4d2fe39a5e4486e0550e858108f6 ]
    
    del_timer_sync() does not return the number of times it tried to delete the
    timer which rearms itself. It's clearly documented:
    
     The function returns whether it has deactivated a pending timer or not.
    
    This part of the documentation is from 2003 where del_timer_sync() really
    returned the number of deletion attempts for unknown reasons. The code
    was rewritten in 2005, but the documentation was not updated.
    
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Reviewed-by: Jacob Keller <jacob.e.keller@intel.com>
    Reviewed-by: Anna-Maria Behnsen <anna-maria@linutronix.de>
    Link: https://lore.kernel.org/r/20221123201624.452282769@linutronix.de
    Signed-off-by: Jeongjun Park <aha310510@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

Documentation: Replace del_timer/del_timer_sync() [+ + +]
Author: Thomas Gleixner <tglx@kernel.org>
Date:   Sat Nov 29 01:05:33 2025 +0900

    Documentation: Replace del_timer/del_timer_sync()
    
    [ Upstream commit 87bdd932e85881895d4720255b40ac28749c4e32 ]
    
    Adjust to the new preferred function names.
    
    Suggested-by: Steven Rostedt <rostedt@goodmis.org>
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Reviewed-by: Jacob Keller <jacob.e.keller@intel.com>
    Reviewed-by: Anna-Maria Behnsen <anna-maria@linutronix.de>
    Link: https://lore.kernel.org/r/20221123201625.075320635@linutronix.de
    Signed-off-by: Jeongjun Park <aha310510@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
dpaa2-switch: add bounds check for if_id in IRQ handler [+ + +]
Author: Junrui Luo <moonafterrain@outlook.com>
Date:   Thu Jan 29 00:55:13 2026 +0800

    dpaa2-switch: add bounds check for if_id in IRQ handler
    
    [ Upstream commit 31a7a0bbeb006bac2d9c81a2874825025214b6d8 ]
    
    The IRQ handler extracts if_id from the upper 16 bits of the hardware
    status register and uses it to index into ethsw->ports[] without
    validation. Since if_id can be any 16-bit value (0-65535) but the ports
    array is only allocated with sw_attr.num_ifs elements, this can lead to
    an out-of-bounds read potentially.
    
    Add a bounds check before accessing the array, consistent with the
    existing validation in dpaa2_switch_rx().
    
    Reported-by: Yuhao Jiang <danisjiang@gmail.com>
    Reported-by: Junrui Luo <moonafterrain@outlook.com>
    Fixes: 24ab724f8a46 ("dpaa2-switch: use the port index in the IRQ handler")
    Signed-off-by: Junrui Luo <moonafterrain@outlook.com>
    Link: https://patch.msgid.link/SYBPR01MB7881D420AB43FF1A227B84AFAF91A@SYBPR01MB7881.ausprd01.prod.outlook.com
    Signed-off-by: Jakub Kicinski <kuba@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

dpaa2-switch: prevent ZERO_SIZE_PTR dereference when num_ifs is zero [+ + +]
Author: Junrui Luo <moonafterrain@outlook.com>
Date:   Wed Jan 28 16:07:34 2026 +0800

    dpaa2-switch: prevent ZERO_SIZE_PTR dereference when num_ifs is zero
    
    [ Upstream commit ed48a84a72fefb20a82dd90a7caa7807e90c6f66 ]
    
    The driver allocates arrays for ports, FDBs, and filter blocks using
    kcalloc() with ethsw->sw_attr.num_ifs as the element count. When the
    device reports zero interfaces (either due to hardware configuration
    or firmware issues), kcalloc(0, ...) returns ZERO_SIZE_PTR (0x10)
    instead of NULL.
    
    Later in dpaa2_switch_probe(), the NAPI initialization unconditionally
    accesses ethsw->ports[0]->netdev, which attempts to dereference
    ZERO_SIZE_PTR (address 0x10), resulting in a kernel panic.
    
    Add a check to ensure num_ifs is greater than zero after retrieving
    device attributes. This prevents the zero-sized allocations and
    subsequent invalid pointer dereference.
    
    Reported-by: Yuhao Jiang <danisjiang@gmail.com>
    Reported-by: Junrui Luo <moonafterrain@outlook.com>
    Fixes: 0b1b71370458 ("staging: dpaa2-switch: handle Rx path on control interface")
    Signed-off-by: Junrui Luo <moonafterrain@outlook.com>
    Reviewed-by: Andrew Lunn <andrew@lunn.ch>
    Link: https://patch.msgid.link/SYBPR01MB7881BEABA8DA896947962470AF91A@SYBPR01MB7881.ausprd01.prod.outlook.com
    Signed-off-by: Jakub Kicinski <kuba@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
gfs2: Fix NULL pointer dereference in gfs2_log_flush [+ + +]
Author: Andreas Gruenbacher <agruenba@redhat.com>
Date:   Mon Mar 11 15:51:59 2024 +0100

    gfs2: Fix NULL pointer dereference in gfs2_log_flush
    
    commit 35264909e9d1973ab9aaa2a1b07cda70f12bb828 upstream.
    
    In gfs2_jindex_free(), set sdp->sd_jdesc to NULL under the log flush
    lock to provide exclusion against gfs2_log_flush().
    
    In gfs2_log_flush(), check if sdp->sd_jdesc is non-NULL before
    dereferencing it.  Otherwise, we could run into a NULL pointer
    dereference when outstanding glock work races with an unmount
    (glock_work_func -> run_queue -> do_xmote -> inode_go_sync ->
    gfs2_log_flush).
    
    Signed-off-by: Andreas Gruenbacher <agruenba@redhat.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    [ The context change is due to the commit 4d927b03a688
      ("gfs2: Rename gfs2_withdrawn to gfs2_withdrawing_or_withdrawn") in v6.8
      which is irrelevant to the logic of this patch. ]
    Signed-off-by: Rahul Sharma <black.hawk@163.com>

 
gve: Correct ethtool rx_dropped calculation [+ + +]
Author: Max Yuan <maxyuan@google.com>
Date:   Sat Feb 7 14:30:47 2026 -0500

    gve: Correct ethtool rx_dropped calculation
    
    [ Upstream commit c7db85d579a1dccb624235534508c75fbf2dfe46 ]
    
    The gve driver's "rx_dropped" statistic, exposed via `ethtool -S`,
    incorrectly includes `rx_buf_alloc_fail` counts. These failures
    represent an inability to allocate receive buffers, not true packet
    drops where a received packet is discarded. This misrepresentation can
    lead to inaccurate diagnostics.
    
    This patch rectifies the ethtool "rx_dropped" calculation. It removes
    `rx_buf_alloc_fail` from the total and adds `xdp_tx_errors` and
    `xdp_redirect_errors`, which represent legitimate packet drops within
    the XDP path.
    
    Cc: stable@vger.kernel.org
    Fixes: 433e274b8f7b ("gve: Add stats for gve.")
    Signed-off-by: Max Yuan <maxyuan@google.com>
    Reviewed-by: Jordan Rhee <jordanrhee@google.com>
    Reviewed-by: Joshua Washington <joshwash@google.com>
    Reviewed-by: Matt Olson <maolson@google.com>
    Signed-off-by: Harshitha Ramamurthy <hramamurthy@google.com>
    Reviewed-by: Jacob Keller <jacob.e.keller@intel.com>
    Link: https://patch.msgid.link/20260202193925.3106272-3-hramamurthy@google.com
    Signed-off-by: Jakub Kicinski <kuba@kernel.org>
    [ removed rx_buf_alloc_fail from rx_dropped calculation ]
    Signed-off-by: Sasha Levin <sashal@kernel.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

gve: Fix stats report corruption on queue count change [+ + +]
Author: Debarghya Kundu <debarghyak@google.com>
Date:   Sat Feb 7 13:09:30 2026 -0500

    gve: Fix stats report corruption on queue count change
    
    [ Upstream commit 7b9ebcce0296e104a0d82a6b09d68564806158ff ]
    
    The driver and the NIC share a region in memory for stats reporting.
    The NIC calculates its offset into this region based on the total size
    of the stats region and the size of the NIC's stats.
    
    When the number of queues is changed, the driver's stats region is
    resized. If the queue count is increased, the NIC can write past
    the end of the allocated stats region, causing memory corruption.
    If the queue count is decreased, there is a gap between the driver
    and NIC stats, leading to incorrect stats reporting.
    
    This change fixes the issue by allocating stats region with maximum
    size, and the offset calculation for NIC stats is changed to match
    with the calculation of the NIC.
    
    Cc: stable@vger.kernel.org
    Fixes: 24aeb56f2d38 ("gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags.")
    Signed-off-by: Debarghya Kundu <debarghyak@google.com>
    Reviewed-by: Joshua Washington <joshwash@google.com>
    Signed-off-by: Harshitha Ramamurthy <hramamurthy@google.com>
    Reviewed-by: Jacob Keller <jacob.e.keller@intel.com>
    Link: https://patch.msgid.link/20260202193925.3106272-2-hramamurthy@google.com
    Signed-off-by: Jakub Kicinski <kuba@kernel.org>
    [ Same changes as 6.1 + context ]
    Signed-off-by: Sasha Levin <sashal@kernel.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() [+ + +]
Author: Kang Chen <k.chen@smail.nju.edu.cn>
Date:   Tue Sep 9 11:13:16 2025 +0800

    hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()
    
    commit bea3e1d4467bcf292c8e54f080353d556d355e26 upstream.
    
    BUG: KASAN: slab-out-of-bounds in hfsplus_uni2asc+0xa71/0xb90 fs/hfsplus/unicode.c:186
    Read of size 2 at addr ffff8880289ef218 by task syz.6.248/14290
    
    CPU: 0 UID: 0 PID: 14290 Comm: syz.6.248 Not tainted 6.16.4 #1 PREEMPT(full)
    Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
    Call Trace:
     <TASK>
     __dump_stack lib/dump_stack.c:94 [inline]
     dump_stack_lvl+0x116/0x1b0 lib/dump_stack.c:120
     print_address_description mm/kasan/report.c:378 [inline]
     print_report+0xca/0x5f0 mm/kasan/report.c:482
     kasan_report+0xca/0x100 mm/kasan/report.c:595
     hfsplus_uni2asc+0xa71/0xb90 fs/hfsplus/unicode.c:186
     hfsplus_listxattr+0x5b6/0xbd0 fs/hfsplus/xattr.c:738
     vfs_listxattr+0xbe/0x140 fs/xattr.c:493
     listxattr+0xee/0x190 fs/xattr.c:924
     filename_listxattr fs/xattr.c:958 [inline]
     path_listxattrat+0x143/0x360 fs/xattr.c:988
     do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
     do_syscall_64+0xcb/0x4c0 arch/x86/entry/syscall_64.c:94
     entry_SYSCALL_64_after_hwframe+0x77/0x7f
    RIP: 0033:0x7fe0e9fae16d
    Code: 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
    RSP: 002b:00007fe0eae67f98 EFLAGS: 00000246 ORIG_RAX: 00000000000000c3
    RAX: ffffffffffffffda RBX: 00007fe0ea205fa0 RCX: 00007fe0e9fae16d
    RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000000
    RBP: 00007fe0ea0480f0 R08: 0000000000000000 R09: 0000000000000000
    R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
    R13: 00007fe0ea206038 R14: 00007fe0ea205fa0 R15: 00007fe0eae48000
     </TASK>
    
    Allocated by task 14290:
     kasan_save_stack+0x24/0x50 mm/kasan/common.c:47
     kasan_save_track+0x14/0x30 mm/kasan/common.c:68
     poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
     __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394
     kasan_kmalloc include/linux/kasan.h:260 [inline]
     __do_kmalloc_node mm/slub.c:4333 [inline]
     __kmalloc_noprof+0x219/0x540 mm/slub.c:4345
     kmalloc_noprof include/linux/slab.h:909 [inline]
     hfsplus_find_init+0x95/0x1f0 fs/hfsplus/bfind.c:21
     hfsplus_listxattr+0x331/0xbd0 fs/hfsplus/xattr.c:697
     vfs_listxattr+0xbe/0x140 fs/xattr.c:493
     listxattr+0xee/0x190 fs/xattr.c:924
     filename_listxattr fs/xattr.c:958 [inline]
     path_listxattrat+0x143/0x360 fs/xattr.c:988
     do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
     do_syscall_64+0xcb/0x4c0 arch/x86/entry/syscall_64.c:94
     entry_SYSCALL_64_after_hwframe+0x77/0x7f
    
    When hfsplus_uni2asc is called from hfsplus_listxattr,
    it actually passes in a struct hfsplus_attr_unistr*.
    The size of the corresponding structure is different from that of hfsplus_unistr,
    so the previous fix (94458781aee6) is insufficient.
    The pointer on the unicode buffer is still going beyond the allocated memory.
    
    This patch introduces two warpper functions hfsplus_uni2asc_xattr_str and
    hfsplus_uni2asc_str to process two unicode buffers,
    struct hfsplus_attr_unistr* and struct hfsplus_unistr* respectively.
    When ustrlen value is bigger than the allocated memory size,
    the ustrlen value is limited to an safe size.
    
    Fixes: 94458781aee6 ("hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()")
    Signed-off-by: Kang Chen <k.chen@smail.nju.edu.cn>
    Reviewed-by: Viacheslav Dubeyko <slava@dubeyko.com>
    Signed-off-by: Viacheslav Dubeyko <slava@dubeyko.com>
    Link: https://lore.kernel.org/r/20250909031316.1647094-1-k.chen@smail.nju.edu.cn
    Signed-off-by: Viacheslav Dubeyko <slava@dubeyko.com>
    Signed-off-by: Jianqiang kang <jianqkang@sina.cn>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
HID: Apply quirk HID_QUIRK_ALWAYS_POLL to Edifier QR30 (2d99:a101) [+ + +]
Author: Rodrigo Lugathe da Conceição Alves <lugathe2@gmail.com>
Date:   Thu Nov 27 19:03:57 2025 -0300

    HID: Apply quirk HID_QUIRK_ALWAYS_POLL to Edifier QR30 (2d99:a101)
    
    [ Upstream commit 85a866809333cd2bf8ddac93d9a3e3ba8e4f807d ]
    
    The USB speaker has a bug that causes it to reboot when changing the
    brightness using the physical knob.
    
    Add a new vendor and product ID entry in hid-ids.h, and register
    the corresponding device in hid-quirks.c with the required quirk.
    
    Signed-off-by: Rodrigo Lugathe da Conceição Alves <lugathe2@gmail.com>
    Reviewed-by: Terry Junge <linuxhid@cosmicgizmosystems.com>
    Signed-off-by: Jiri Kosina <jkosina@suse.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

HID: intel-ish-hid: Reset enum_devices_done before enumeration [+ + +]
Author: Zhang Lixu <lixu.zhang@intel.com>
Date:   Fri Dec 12 10:51:50 2025 +0800

    HID: intel-ish-hid: Reset enum_devices_done before enumeration
    
    [ Upstream commit 56e230723e3a818373bd62331bccb1c6d2b3881b ]
    
    Some systems have enabled ISH without any sensors. In this case sending
    HOSTIF_DM_ENUM_DEVICES results in 0 sensors. This triggers ISH hardware
    reset on subsequent enumeration after S3/S4 resume.
    
    The enum_devices_done flag was not reset before sending the
    HOSTIF_DM_ENUM_DEVICES command. On subsequent enumeration calls (such as
    after S3/S4 resume), this flag retains its previous true value, causing the
    wait loop to be skipped and returning prematurely to hid_ishtp_cl_init().
    If 0 HID devices are found, hid_ishtp_cl_init() skips getting HID device
    descriptors and sets init_done to true. When the delayed enumeration
    response arrives with init_done already true, the driver treats it as a bad
    packet and triggers an ISH hardware reset.
    
    Set enum_devices_done to false before sending the enumeration command,
    consistent with similar functions like ishtp_get_hid_descriptor() and
    ishtp_get_report_descriptor() which reset their respective flags.
    
    Signed-off-by: Zhang Lixu <lixu.zhang@intel.com>
    Acked-by: Srinivas Pandruvada <srinivas.pandruvada@linux.intel.com>
    Signed-off-by: Benjamin Tissoires <bentiss@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

HID: multitouch: add MT_QUIRK_STICKY_FINGERS to MT_CLS_VTL [+ + +]
Author: DaytonCL <artem749507@gmail.com>
Date:   Sun Dec 14 14:34:36 2025 +0100

    HID: multitouch: add MT_QUIRK_STICKY_FINGERS to MT_CLS_VTL
    
    [ Upstream commit ff3f234ff1dcd6d626a989151db067a1b7f0f215 ]
    
    Some VTL-class touchpads (e.g. TOPS0102:00 35CC:0104) intermittently
    fail to release a finger contact. A previous slot remains logically
    active, accompanied by stale BTN_TOOL_DOUBLETAP state, causing
    gestures to stay latched and resulting in stuck two-finger
    scrolling and false right-clicks.
    
    Apply MT_QUIRK_STICKY_FINGERS to handle the unreleased contact correctly.
    
    Link: https://gitlab.freedesktop.org/libinput/libinput/-/issues/1225
    Suggested-by: Benjamin Tissoires <benjamin.tissoires@redhat.com>
    Tested-by: DaytonCL <artem749507@gmail.com>
    Signed-off-by: DaytonCL <artem749507@gmail.com>
    Signed-off-by: Benjamin Tissoires <bentiss@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

HID: playstation: Center initial joystick axes to prevent spurious events [+ + +]
Author: Siarhei Vishniakou <svv@google.com>
Date:   Tue Nov 11 15:45:19 2025 -0800

    HID: playstation: Center initial joystick axes to prevent spurious events
    
    [ Upstream commit e9143268d259d98e111a649affa061acb8e13c5b ]
    
    When a new PlayStation gamepad (DualShock 4 or DualSense) is initialized,
    the input subsystem sets the default value for its absolute axes (e.g.,
    ABS_X, ABS_Y) to 0.
    
    However, the hardware's actual neutral/resting state for these joysticks
    is 128 (0x80). This creates a mismatch.
    
    When the first HID report arrives from the device, the driver sees the
    resting value of 128. The kernel compares this to its initial state of 0
    and incorrectly interprets this as a delta (0 -> 128). Consequently, it
    generates EV_ABS events for this initial, non-existent movement.
    
    This behavior can fail userspace 'sanity check' tests (e.g., in
    Android CTS) that correctly assert no motion events should be generated
    from a device that is already at rest.
    
    This patch fixes the issue by explicitly setting the initial value of the
    main joystick axes (e.g., ABS_X, ABS_Y, ABS_RX, ABS_RY) to 128 (0x80)
    in the common ps_gamepad_create() function.
    
    This aligns the kernel's initial state with the hardware's expected
    neutral state, ensuring that the first report (at 128) produces no
    delta and thus, no spurious event.
    
    Signed-off-by: Siarhei Vishniakou <svv@google.com>
    Reviewed-by: Benjamin Tissoires <bentiss@kernel.org>
    Signed-off-by: Benjamin Tissoires <bentiss@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

HID: quirks: Add another Chicony HP 5MP Cameras to hid_ignore_list [+ + +]
Author: Chris Chiu <chris.chiu@canonical.com>
Date:   Fri Jan 2 06:56:43 2026 +0000

    HID: quirks: Add another Chicony HP 5MP Cameras to hid_ignore_list
    
    [ Upstream commit c06bc3557542307b9658fbd43cc946a14250347b ]
    
    Another Chicony Electronics HP 5MP Camera with USB ID 04F2:B882
    reports a HID sensor interface that is not actually implemented.
    
    Add the device to the HID ignore list so the bogus sensor is never
    exposed to userspace. Then the system won't hang when runtime PM
    tries to wake the unresponsive device.
    
    Signed-off-by: Chris Chiu <chris.chiu@canonical.com>
    Signed-off-by: Benjamin Tissoires <bentiss@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
hwmon: (occ) Mark occ_init_attribute() as __printf [+ + +]
Author: Arnd Bergmann <arnd@arndb.de>
Date:   Tue Feb 3 17:34:36 2026 +0100

    hwmon: (occ) Mark occ_init_attribute() as __printf
    
    [ Upstream commit 831a2b27914cc880130ffe8fb8d1e65a5324d07f ]
    
    This is a printf-style function, which gcc -Werror=suggest-attribute=format
    correctly points out:
    
    drivers/hwmon/occ/common.c: In function 'occ_init_attribute':
    drivers/hwmon/occ/common.c:761:9: error: function 'occ_init_attribute' might be a candidate for 'gnu_printf' format attribute [-Werror=suggest-attribute=format]
    
    Add the attribute to avoid this warning and ensure any incorrect
    format strings are detected here.
    
    Fixes: 744c2fe950e9 ("hwmon: (occ) Rework attribute registration for stack usage")
    Signed-off-by: Arnd Bergmann <arnd@arndb.de>
    Link: https://lore.kernel.org/r/20260203163440.2674340-1-arnd@kernel.org
    Signed-off-by: Guenter Roeck <linux@roeck-us.net>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
iommu: disable SVA when CONFIG_X86 is set [+ + +]
Author: Lu Baolu <baolu.lu@linux.intel.com>
Date:   Wed Oct 22 16:26:27 2025 +0800

    iommu: disable SVA when CONFIG_X86 is set
    
    commit 72f98ef9a4be30d2a60136dd6faee376f780d06c upstream.
    
    Patch series "Fix stale IOTLB entries for kernel address space", v7.
    
    This proposes a fix for a security vulnerability related to IOMMU Shared
    Virtual Addressing (SVA).  In an SVA context, an IOMMU can cache kernel
    page table entries.  When a kernel page table page is freed and
    reallocated for another purpose, the IOMMU might still hold stale,
    incorrect entries.  This can be exploited to cause a use-after-free or
    write-after-free condition, potentially leading to privilege escalation or
    data corruption.
    
    This solution introduces a deferred freeing mechanism for kernel page
    table pages, which provides a safe window to notify the IOMMU to
    invalidate its caches before the page is reused.
    
    
    This patch (of 8):
    
    In the IOMMU Shared Virtual Addressing (SVA) context, the IOMMU hardware
    shares and walks the CPU's page tables.  The x86 architecture maps the
    kernel's virtual address space into the upper portion of every process's
    page table.  Consequently, in an SVA context, the IOMMU hardware can walk
    and cache kernel page table entries.
    
    The Linux kernel currently lacks a notification mechanism for kernel page
    table changes, specifically when page table pages are freed and reused.
    The IOMMU driver is only notified of changes to user virtual address
    mappings.  This can cause the IOMMU's internal caches to retain stale
    entries for kernel VA.
    
    Use-After-Free (UAF) and Write-After-Free (WAF) conditions arise when
    kernel page table pages are freed and later reallocated.  The IOMMU could
    misinterpret the new data as valid page table entries.  The IOMMU might
    then walk into attacker-controlled memory, leading to arbitrary physical
    memory DMA access or privilege escalation.  This is also a
    Write-After-Free issue, as the IOMMU will potentially continue to write
    Accessed and Dirty bits to the freed memory while attempting to walk the
    stale page tables.
    
    Currently, SVA contexts are unprivileged and cannot access kernel
    mappings.  However, the IOMMU will still walk kernel-only page tables all
    the way down to the leaf entries, where it realizes the mapping is for the
    kernel and errors out.  This means the IOMMU still caches these
    intermediate page table entries, making the described vulnerability a real
    concern.
    
    Disable SVA on x86 architecture until the IOMMU can receive notification
    to flush the paging cache before freeing the CPU kernel page table pages.
    
    Link: https://lkml.kernel.org/r/20251022082635.2462433-1-baolu.lu@linux.intel.com
    Link: https://lkml.kernel.org/r/20251022082635.2462433-2-baolu.lu@linux.intel.com
    Fixes: 26b25a2b98e4 ("iommu: Bind process address spaces to devices")
    Signed-off-by: Lu Baolu <baolu.lu@linux.intel.com>
    Suggested-by: Jason Gunthorpe <jgg@nvidia.com>
    Reviewed-by: Jason Gunthorpe <jgg@nvidia.com>
    Cc: Alistair Popple <apopple@nvidia.com>
    Cc: Andy Lutomirski <luto@kernel.org>
    Cc: Borislav Betkov <bp@alien8.de>
    Cc: Dave Hansen <dave.hansen@intel.com>
    Cc: David Hildenbrand <david@redhat.com>
    Cc: Ingo Molnar <mingo@redhat.com>
    Cc: Jann Horn <jannh@google.com>
    Cc: Jean-Philippe Brucker <jean-philippe@linaro.org>
    Cc: Joerg Roedel <joro@8bytes.org>
    Cc: Kevin Tian <kevin.tian@intel.com>
    Cc: Liam Howlett <liam.howlett@oracle.com>
    Cc: Lorenzo Stoakes <lorenzo.stoakes@oracle.com>
    Cc: Matthew Wilcox (Oracle) <willy@infradead.org>
    Cc: Michal Hocko <mhocko@kernel.org>
    Cc: Mike Rapoport <rppt@kernel.org>
    Cc: Peter Zijlstra <peterz@infradead.org>
    Cc: Robin Murohy <robin.murphy@arm.com>
    Cc: Thomas Gleinxer <tglx@linutronix.de>
    Cc: "Uladzislau Rezki (Sony)" <urezki@gmail.com>
    Cc: Vasant Hegde <vasant.hegde@amd.com>
    Cc: Vinicius Costa Gomes <vinicius.gomes@intel.com>
    Cc: Vlastimil Babka <vbabka@suse.cz>
    Cc: Will Deacon <will@kernel.org>
    Cc: Yi Lai <yi1.lai@intel.com>
    Cc: <stable@vger.kernel.org>
    Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
    [ The context change is due to the commit
      be51b1d6bbff ("iommu/sva: Refactoring iommu_sva_bind/unbind_device()")
      and the commit 757636ed2607 ("iommu: Rename iommu-sva-lib.{c,h}")
      in v6.2 which are irrelevant to the logic of this patch. ]
    Signed-off-by: Rahul Sharma <black.hawk@163.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
KVM: Don't clobber irqfd routing type when deassigning irqfd [+ + +]
Author: Sean Christopherson <seanjc@google.com>
Date:   Tue Jan 13 09:46:05 2026 -0800

    KVM: Don't clobber irqfd routing type when deassigning irqfd
    
    commit b4d37cdb77a0015f51fee083598fa227cc07aaf1 upstream.
    
    When deassigning a KVM_IRQFD, don't clobber the irqfd's copy of the IRQ's
    routing entry as doing so breaks kvm_arch_irq_bypass_del_producer() on x86
    and arm64, which explicitly look for KVM_IRQ_ROUTING_MSI.  Instead, to
    handle a concurrent routing update, verify that the irqfd is still active
    before consuming the routing information.  As evidenced by the x86 and
    arm64 bugs, and another bug in kvm_arch_update_irqfd_routing() (see below),
    clobbering the entry type without notifying arch code is surprising and
    error prone.
    
    As a bonus, checking that the irqfd is active provides a convenient
    location for documenting _why_ KVM must not consume the routing entry for
    an irqfd that is in the process of being deassigned: once the irqfd is
    deleted from the list (which happens *before* the eventfd is detached), it
    will no longer receive updates via kvm_irq_routing_update(), and so KVM
    could deliver an event using stale routing information (relative to
    KVM_SET_GSI_ROUTING returning to userspace).
    
    As an even better bonus, explicitly checking for the irqfd being active
    fixes a similar bug to the one the clobbering is trying to prevent: if an
    irqfd is deactivated, and then its routing is changed,
    kvm_irq_routing_update() won't invoke kvm_arch_update_irqfd_routing()
    (because the irqfd isn't in the list).  And so if the irqfd is in bypass
    mode, IRQs will continue to be posted using the old routing information.
    
    As for kvm_arch_irq_bypass_del_producer(), clobbering the routing type
    results in KVM incorrectly keeping the IRQ in bypass mode, which is
    especially problematic on AMD as KVM tracks IRQs that are being posted to
    a vCPU in a list whose lifetime is tied to the irqfd.
    
    Without the help of KASAN to detect use-after-free, the most common
    sympton on AMD is a NULL pointer deref in amd_iommu_update_ga() due to
    the memory for irqfd structure being re-allocated and zeroed, resulting
    in irqfd->irq_bypass_data being NULL when read by
    avic_update_iommu_vcpu_affinity():
    
      BUG: kernel NULL pointer dereference, address: 0000000000000018
      #PF: supervisor read access in kernel mode
      #PF: error_code(0x0000) - not-present page
      PGD 40cf2b9067 P4D 40cf2b9067 PUD 408362a067 PMD 0
      Oops: Oops: 0000 [#1] SMP
      CPU: 6 UID: 0 PID: 40383 Comm: vfio_irq_test
      Tainted: G     U  W  O        6.19.0-smp--5dddc257e6b2-irqfd #31 NONE
      Tainted: [U]=USER, [W]=WARN, [O]=OOT_MODULE
      Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 34.78.2-0 09/05/2025
      RIP: 0010:amd_iommu_update_ga+0x19/0xe0
      Call Trace:
       <TASK>
       avic_update_iommu_vcpu_affinity+0x3d/0x90 [kvm_amd]
       __avic_vcpu_load+0xf4/0x130 [kvm_amd]
       kvm_arch_vcpu_load+0x89/0x210 [kvm]
       vcpu_load+0x30/0x40 [kvm]
       kvm_arch_vcpu_ioctl_run+0x45/0x620 [kvm]
       kvm_vcpu_ioctl+0x571/0x6a0 [kvm]
       __se_sys_ioctl+0x6d/0xb0
       do_syscall_64+0x6f/0x9d0
       entry_SYSCALL_64_after_hwframe+0x4b/0x53
      RIP: 0033:0x46893b
        </TASK>
      ---[ end trace 0000000000000000 ]---
    
    If AVIC is inhibited when the irfd is deassigned, the bug will manifest as
    list corruption, e.g. on the next irqfd assignment.
    
      list_add corruption. next->prev should be prev (ffff8d474d5cd588),
                           but was 0000000000000000. (next=ffff8d8658f86530).
      ------------[ cut here ]------------
      kernel BUG at lib/list_debug.c:31!
      Oops: invalid opcode: 0000 [#1] SMP
      CPU: 128 UID: 0 PID: 80818 Comm: vfio_irq_test
      Tainted: G     U  W  O        6.19.0-smp--f19dc4d680ba-irqfd #28 NONE
      Tainted: [U]=USER, [W]=WARN, [O]=OOT_MODULE
      Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 34.78.2-0 09/05/2025
      RIP: 0010:__list_add_valid_or_report+0x97/0xc0
      Call Trace:
       <TASK>
       avic_pi_update_irte+0x28e/0x2b0 [kvm_amd]
       kvm_pi_update_irte+0xbf/0x190 [kvm]
       kvm_arch_irq_bypass_add_producer+0x72/0x90 [kvm]
       irq_bypass_register_consumer+0xcd/0x170 [irqbypass]
       kvm_irqfd+0x4c6/0x540 [kvm]
       kvm_vm_ioctl+0x118/0x5d0 [kvm]
       __se_sys_ioctl+0x6d/0xb0
       do_syscall_64+0x6f/0x9d0
       entry_SYSCALL_64_after_hwframe+0x4b/0x53
       </TASK>
      ---[ end trace 0000000000000000 ]---
    
    On Intel and arm64, the bug is less noisy, as the end result is that the
    device keeps posting IRQs to the vCPU even after it's been deassigned.
    
    Note, the worst of the breakage can be traced back to commit cb210737675e
    ("KVM: Pass new routing entries and irqfd when updating IRTEs"), as before
    that commit KVM would pull the routing information from the per-VM routing
    table.  But as above, similar bugs have existed since support for IRQ
    bypass was added.  E.g. if a routing change finished before irq_shutdown()
    invoked kvm_arch_irq_bypass_del_producer(), VMX and SVM would see stale
    routing information and potentially leave the irqfd in bypass mode.
    
    Alternatively, x86 could be fixed by explicitly checking irq_bypass_vcpu
    instead of irq_entry.type in kvm_arch_irq_bypass_del_producer(), and arm64
    could be modified to utilize irq_bypass_vcpu in a similar manner.  But (a)
    that wouldn't fix the routing updates bug, and (b) fixing core code doesn't
    preclude x86 (or arm64) from adding such code as a sanity check (spoiler
    alert).
    
    Fixes: f70c20aaf141 ("KVM: Add an arch specific hooks in 'struct kvm_kernel_irqfd'")
    Fixes: cb210737675e ("KVM: Pass new routing entries and irqfd when updating IRTEs")
    Fixes: a0d7e2fc61ab ("KVM: arm64: vgic-v4: Only attempt vLPI mapping for actual MSIs")
    Cc: stable@vger.kernel.org
    Cc: Marc Zyngier <maz@kernel.org>
    Cc: Oliver Upton <oupton@kernel.org>
    Link: https://patch.msgid.link/20260113174606.104978-2-seanjc@google.com
    Signed-off-by: Sean Christopherson <seanjc@google.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
Linux: Linux 5.15.200 [+ + +]
Author: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Date:   Wed Feb 11 13:35:35 2026 +0100

    Linux 5.15.200
    
    Link: https://lore.kernel.org/r/20260209142301.830618238@linuxfoundation.org
    Tested-by: Brett A C Sheffield <bacs@librecast.net>
    Tested-by: Florian Fainelli <florian.fainelli@broadcom.com>
    Tested-by: Hardik Garg <hargar@linux.microsoft.com>
    Tested-by: Jon Hunter <jonathanh@nvidia.com>
    Tested-by: Mark Brown <broonie@kernel.org>
    Tested-by: Vijayendra Suman <vijayendra.suman@oracle.com>
    Tested-by: Jeffrin Jose T <jeffrin@rajagiritech.edu.in>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
macvlan: fix error recovery in macvlan_common_newlink() [+ + +]
Author: Eric Dumazet <edumazet@google.com>
Date:   Thu Jan 29 20:43:59 2026 +0000

    macvlan: fix error recovery in macvlan_common_newlink()
    
    [ Upstream commit f8db6475a83649689c087a8f52486fcc53e627e9 ]
    
    valis provided a nice repro to crash the kernel:
    
    ip link add p1 type veth peer p2
    ip link set address 00:00:00:00:00:20 dev p1
    ip link set up dev p1
    ip link set up dev p2
    
    ip link add mv0 link p2 type macvlan mode source
    ip link add invalid% link p2 type macvlan mode source macaddr add 00:00:00:00:00:20
    
    ping -c1 -I p1 1.2.3.4
    
    He also gave a very detailed analysis:
    
    <quote valis>
    
    The issue is triggered when a new macvlan link is created  with
    MACVLAN_MODE_SOURCE mode and MACVLAN_MACADDR_ADD (or
    MACVLAN_MACADDR_SET) parameter, lower device already has a macvlan
    port and register_netdevice() called from macvlan_common_newlink()
    fails (e.g. because of the invalid link name).
    
    In this case macvlan_hash_add_source is called from
    macvlan_change_sources() / macvlan_common_newlink():
    
    This adds a reference to vlan to the port's vlan_source_hash using
    macvlan_source_entry.
    
    vlan is a pointer to the priv data of the link that is being created.
    
    When register_netdevice() fails, the error is returned from
    macvlan_newlink() to rtnl_newlink_create():
    
            if (ops->newlink)
                    err = ops->newlink(dev, ¶ms, extack);
            else
                    err = register_netdevice(dev);
            if (err < 0) {
                    free_netdev(dev);
                    goto out;
            }
    
    and free_netdev() is called, causing a kvfree() on the struct
    net_device that is still referenced in the source entry attached to
    the lower device's macvlan port.
    
    Now all packets sent on the macvlan port with a matching source mac
    address will trigger a use-after-free in macvlan_forward_source().
    
    </quote valis>
    
    With all that, my fix is to make sure we call macvlan_flush_sources()
    regardless of @create value whenever "goto destroy_macvlan_port;"
    path is taken.
    
    Many thanks to valis for following up on this issue.
    
    Fixes: aa5fd0fb7748 ("driver: macvlan: Destroy new macvlan port if macvlan_common_newlink failed.")
    Signed-off-by: Eric Dumazet <edumazet@google.com>
    Reported-by: valis <sec@valis.email>
    Reported-by: syzbot+7182fbe91e58602ec1fe@syzkaller.appspotmail.com
    Closes: https: //lore.kernel.org/netdev/695fb1e8.050a0220.1c677c.039f.GAE@google.com/T/#u
    Cc: Boudewijn van der Heide <boudewijn@delta-utec.com>
    Link: https://patch.msgid.link/20260129204359.632556-1-edumazet@google.com
    Signed-off-by: Jakub Kicinski <kuba@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
mm/kfence: randomize the freelist on initialization [+ + +]
Author: Pimyn Girgis <pimyn@google.com>
Date:   Tue Jan 20 17:15:10 2026 +0100

    mm/kfence: randomize the freelist on initialization
    
    commit 870ff19251bf3910dda7a7245da826924045fedd upstream.
    
    Randomize the KFENCE freelist during pool initialization to make
    allocation patterns less predictable.  This is achieved by shuffling the
    order in which metadata objects are added to the freelist using
    get_random_u32_below().
    
    Additionally, ensure the error path correctly calculates the address range
    to be reset if initialization fails, as the address increment logic has
    been moved to a separate loop.
    
    Link: https://lkml.kernel.org/r/20260120161510.3289089-1-pimyn@google.com
    Fixes: 0ce20dd84089 ("mm: add Kernel Electric-Fence infrastructure")
    Signed-off-by: Pimyn Girgis <pimyn@google.com>
    Reviewed-by: Alexander Potapenko <glider@google.com>
    Cc: Dmitry Vyukov <dvyukov@google.com>
    Cc: Marco Elver <elver@google.com>
    Cc: Ernesto Martnez Garca <ernesto.martinezgarcia@tugraz.at>
    Cc: Greg KH <gregkh@linuxfoundation.org>
    Cc: Kees Cook <kees@kernel.org>
    Cc: <stable@vger.kernel.org>
    Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
    Signed-off-by: Pimyn Girgis <pimyn@google.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
net: liquidio: Fix off-by-one error in PF setup_nic_devices() cleanup [+ + +]
Author: Zilin Guan <zilin@seu.edu.cn>
Date:   Wed Jan 28 15:44:39 2026 +0000

    net: liquidio: Fix off-by-one error in PF setup_nic_devices() cleanup
    
    [ Upstream commit 8558aef4e8a1a83049ab906d21d391093cfa7e7f ]
    
    In setup_nic_devices(), the initialization loop jumps to the label
    setup_nic_dev_free on failure. The current cleanup loop while(i--)
    skip the failing index i, causing a memory leak.
    
    Fix this by changing the loop to iterate from the current index i
    down to 0.
    
    Also, decrement i in the devlink_alloc failure path to point to the
    last successfully allocated index.
    
    Compile tested only. Issue found using code review.
    
    Fixes: f21fb3ed364b ("Add support of Cavium Liquidio ethernet adapters")
    Suggested-by: Simon Horman <horms@kernel.org>
    Signed-off-by: Zilin Guan <zilin@seu.edu.cn>
    Reviewed-by: Kory Maincent <kory.maincent@bootlin.com>
    Link: https://patch.msgid.link/20260128154440.278369-3-zilin@seu.edu.cn
    Signed-off-by: Jakub Kicinski <kuba@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

net: liquidio: Fix off-by-one error in VF setup_nic_devices() cleanup [+ + +]
Author: Zilin Guan <zilin@seu.edu.cn>
Date:   Wed Jan 28 15:44:40 2026 +0000

    net: liquidio: Fix off-by-one error in VF setup_nic_devices() cleanup
    
    [ Upstream commit 6cbba46934aefdfb5d171e0a95aec06c24f7ca30 ]
    
    In setup_nic_devices(), the initialization loop jumps to the label
    setup_nic_dev_free on failure. The current cleanup loop while(i--)
    skip the failing index i, causing a memory leak.
    
    Fix this by changing the loop to iterate from the current index i
    down to 0.
    
    Compile tested only. Issue found using code review.
    
    Fixes: 846b46873eeb ("liquidio CN23XX: VF offload features")
    Suggested-by: Simon Horman <horms@kernel.org>
    Signed-off-by: Zilin Guan <zilin@seu.edu.cn>
    Reviewed-by: Kory Maincent <kory.maincent@bootlin.com>
    Link: https://patch.msgid.link/20260128154440.278369-4-zilin@seu.edu.cn
    Signed-off-by: Jakub Kicinski <kuba@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

net: liquidio: Initialize netdev pointer before queue setup [+ + +]
Author: Zilin Guan <zilin@seu.edu.cn>
Date:   Wed Jan 28 15:44:38 2026 +0000

    net: liquidio: Initialize netdev pointer before queue setup
    
    [ Upstream commit 926ede0c85e1e57c97d64d9612455267d597bb2c ]
    
    In setup_nic_devices(), the netdev is allocated using alloc_etherdev_mq().
    However, the pointer to this structure is stored in oct->props[i].netdev
    only after the calls to netif_set_real_num_rx_queues() and
    netif_set_real_num_tx_queues().
    
    If either of these functions fails, setup_nic_devices() returns an error
    without freeing the allocated netdev. Since oct->props[i].netdev is still
    NULL at this point, the cleanup function liquidio_destroy_nic_device()
    will fail to find and free the netdev, resulting in a memory leak.
    
    Fix this by initializing oct->props[i].netdev before calling the queue
    setup functions. This ensures that the netdev is properly accessible for
    cleanup in case of errors.
    
    Compile tested only. Issue found using a prototype static analysis tool
    and code review.
    
    Fixes: c33c997346c3 ("liquidio: enhanced ethtool --set-channels feature")
    Signed-off-by: Zilin Guan <zilin@seu.edu.cn>
    Reviewed-by: Kory Maincent <kory.maincent@bootlin.com>
    Link: https://patch.msgid.link/20260128154440.278369-2-zilin@seu.edu.cn
    Signed-off-by: Jakub Kicinski <kuba@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

net: usb: sr9700: support devices with virtual driver CD [+ + +]
Author: Ethan Nelson-Moore <enelsonmoore@gmail.com>
Date:   Wed Dec 10 22:24:51 2025 -0800

    net: usb: sr9700: support devices with virtual driver CD
    
    [ Upstream commit bf4172bd870c3a34d3065cbb39192c22cbd7b18d ]
    
    Some SR9700 devices have an SPI flash chip containing a virtual driver
    CD, in which case they appear as a device with two interfaces and
    product ID 0x9702. Interface 0 is the driver CD and interface 1 is the
    Ethernet device.
    
    Link: https://github.com/name-kurniawan/usb-lan
    Link: https://www.draisberghof.de/usb_modeswitch/bb/viewtopic.php?t=2185
    Signed-off-by: Ethan Nelson-Moore <enelsonmoore@gmail.com>
    Link: https://patch.msgid.link/20251211062451.139036-1-enelsonmoore@gmail.com
    [pabeni@redhat.com: fixes link tags]
    Signed-off-by: Paolo Abeni <pabeni@redhat.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate() [+ + +]
Author: Andrew Fasano <andrew.fasano@nist.gov>
Date:   Wed Feb 4 17:46:58 2026 +0100

    netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()
    
    [ Upstream commit f41c5d151078c5348271ffaf8e7410d96f2d82f8 ]
    
    nft_map_catchall_activate() has an inverted element activity check
    compared to its non-catchall counterpart nft_mapelem_activate() and
    compared to what is logically required.
    
    nft_map_catchall_activate() is called from the abort path to re-activate
    catchall map elements that were deactivated during a failed transaction.
    It should skip elements that are already active (they don't need
    re-activation) and process elements that are inactive (they need to be
    restored). Instead, the current code does the opposite: it skips inactive
    elements and processes active ones.
    
    Compare the non-catchall activate callback, which is correct:
    
      nft_mapelem_activate():
        if (nft_set_elem_active(ext, iter->genmask))
            return 0;   /* skip active, process inactive */
    
    With the buggy catchall version:
    
      nft_map_catchall_activate():
        if (!nft_set_elem_active(ext, genmask))
            continue;   /* skip inactive, process active */
    
    The consequence is that when a DELSET operation is aborted,
    nft_setelem_data_activate() is never called for the catchall element.
    For NFT_GOTO verdict elements, this means nft_data_hold() is never
    called to restore the chain->use reference count. Each abort cycle
    permanently decrements chain->use. Once chain->use reaches zero,
    DELCHAIN succeeds and frees the chain while catchall verdict elements
    still reference it, resulting in a use-after-free.
    
    This is exploitable for local privilege escalation from an unprivileged
    user via user namespaces + nftables on distributions that enable
    CONFIG_USER_NS and CONFIG_NF_TABLES.
    
    Fix by removing the negation so the check matches nft_mapelem_activate():
    skip active elements, process inactive ones.
    
    Fixes: 628bd3e49cba ("netfilter: nf_tables: drop map element references from preparation phase")
    Signed-off-by: Andrew Fasano <andrew.fasano@nist.gov>
    Signed-off-by: Florian Westphal <fw@strlen.de>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX [+ + +]
Author: Pablo Neira Ayuso <pablo@netfilter.org>
Date:   Tue Apr 22 21:52:44 2025 +0200

    netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX
    
    commit b85e3367a5716ed3662a4fe266525190d2af76df upstream.
    
    Otherwise, it is possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof()
    when resizing hashtable because __GFP_NOWARN is unset.
    
    Similar to:
    
      b541ba7d1f5a ("netfilter: conntrack: clamp maximum hashtable size to INT_MAX")
    
    Reviewed-by: Stefano Brivio <sbrivio@redhat.com>
    Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
    [ Keerthana: Handle freeing new_lt ]
    Signed-off-by: Keerthana K <keerthana.kalyanasundaram@broadcom.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

netfilter: replace -EEXIST with -EBUSY [+ + +]
Author: Daniel Gomez <da.gomez@samsung.com>
Date:   Fri Dec 19 06:13:20 2025 +0100

    netfilter: replace -EEXIST with -EBUSY
    
    [ Upstream commit 2bafeb8d2f380c3a81d98bd7b78b854b564f9cd4 ]
    
    The -EEXIST error code is reserved by the module loading infrastructure
    to indicate that a module is already loaded. When a module's init
    function returns -EEXIST, userspace tools like kmod interpret this as
    "module already loaded" and treat the operation as successful, returning
    0 to the user even though the module initialization actually failed.
    
    Replace -EEXIST with -EBUSY to ensure correct error reporting in the module
    initialization path.
    
    Affected modules:
      * ebtable_broute ebtable_filter ebtable_nat arptable_filter
      * ip6table_filter ip6table_mangle ip6table_nat ip6table_raw
      * ip6table_security iptable_filter iptable_mangle iptable_nat
      * iptable_raw iptable_security
    
    Signed-off-by: Daniel Gomez <da.gomez@samsung.com>
    Signed-off-by: Florian Westphal <fw@strlen.de>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
nvmet-tcp: add an helper to free the cmd buffers [+ + +]
Author: Maurizio Lombardi <mlombard@redhat.com>
Date:   Tue Nov 16 16:49:19 2021 +0100

    nvmet-tcp: add an helper to free the cmd buffers
    
    [ Upstream commit 69b85e1f1d1d1e49601ec3e85d2031188657cca2 ]
    
    Makes the code easier to read and to debug.
    
    Sets the freed pointers to NULL, it will be useful
    when destroying the queues to understand if the commands'
    buffers have been released already or not.
    
    Signed-off-by: Maurizio Lombardi <mlombard@redhat.com>
    Reviewed-by: Keith Busch <kbusch@kernel.org>
    Reviewed-by: Sagi Grimberg <sagi@grimberg.me>
    Reviewed-by: John Meneghini <jmeneghi@redhat.com>
    Signed-off-by: Christoph Hellwig <hch@lst.de>
    Stable-dep-of: 52a0a9854934 ("nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec")
    Signed-off-by: Sasha Levin <sashal@kernel.org>

nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec [+ + +]
Author: YunJe Shin <yjshin0438@gmail.com>
Date:   Wed Jan 28 09:41:07 2026 +0900

    nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec
    
    [ Upstream commit 52a0a98549344ca20ad81a4176d68d28e3c05a5c ]
    
    nvmet_tcp_build_pdu_iovec() could walk past cmd->req.sg when a PDU
    length or offset exceeds sg_cnt and then use bogus sg->length/offset
    values, leading to _copy_to_iter() GPF/KASAN. Guard sg_idx, remaining
    entries, and sg->length/offset before building the bvec.
    
    Fixes: 872d26a391da ("nvmet-tcp: add NVMe over TCP target driver")
    Signed-off-by: YunJe Shin <ioerts@kookmin.ac.kr>
    Reviewed-by: Sagi Grimberg <sagi@grimberg.me>
    Reviewed-by: Joonkyo Jung <joonkyoj@yonsei.ac.kr>
    Signed-off-by: Keith Busch <kbusch@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

nvmet-tcp: don't map pages which can't come from HIGHMEM [+ + +]
Author: Fabio M. De Francesco <fmdefrancesco@gmail.com>
Date:   Wed Aug 31 00:05:33 2022 +0200

    nvmet-tcp: don't map pages which can't come from HIGHMEM
    
    [ Upstream commit 5bfaba275ae6486700194cad962574e3eb7ae60d ]
    
    kmap() is being deprecated in favor of kmap_local_page().[1]
    
    There are two main problems with kmap(): (1) It comes with an overhead as
    mapping space is restricted and protected by a global lock for
    synchronization and (2) it also requires global TLB invalidation when the
    kmap’s pool wraps and it might block when the mapping space is fully
    utilized until a slot becomes available.
    
    The pages which will be mapped are allocated in nvmet_tcp_map_data(),
    using the GFP_KERNEL flag. This assures that they cannot come from
    HIGHMEM. This imply that a straight page_address() can replace the kmap()
    of sg_page(sg) in nvmet_tcp_map_pdu_iovec(). As a side effect, we might
    also delete the field "nr_mapped" from struct "nvmet_tcp_cmd" because,
    after removing the kmap() calls, there would be no longer any need of it.
    
    In addition, there is no reason to use a kvec for the command receive
    data buffers iovec, use a bio_vec instead and let iov_iter handle the
    buffer mapping and data copy.
    
    Test with blktests on a QEMU/KVM x86_32 VM, 6GB RAM, booting a kernel with
    HIGHMEM64GB enabled.
    
    [1] "[PATCH] checkpatch: Add kmap and kmap_atomic to the deprecated
    list" https://lore.kernel.org/all/20220813220034.806698-1-ira.weiny@intel.com/
    
    Cc: Chaitanya Kulkarni <chaitanyak@nvidia.com>
    Cc: Keith Busch <kbusch@kernel.org>
    Suggested-by: Ira Weiny <ira.weiny@intel.com>
    Signed-off-by: Fabio M. De Francesco <fmdefrancesco@gmail.com>
    Suggested-by: Christoph Hellwig <hch@lst.de>
    Suggested-by: Al Viro <viro@zeniv.linux.org.uk>
    [sagi: added bio_vec plus minor naming changes]
    Signed-off-by: Sagi Grimberg <sagi@grimberg.me>
    Signed-off-by: Christoph Hellwig <hch@lst.de>
    Stable-dep-of: 52a0a9854934 ("nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec")
    Signed-off-by: Sasha Levin <sashal@kernel.org>

nvmet-tcp: fix memory leak when performing a controller reset [+ + +]
Author: Maurizio Lombardi <mlombard@redhat.com>
Date:   Tue Nov 16 16:49:20 2021 +0100

    nvmet-tcp: fix memory leak when performing a controller reset
    
    [ Upstream commit af21250bb503a02e705b461886321e394b300524 ]
    
    If a reset controller is executed while the initiator
    is performing some I/O the driver may leak the memory allocated
    for the commands' iovec.
    
    Make sure that nvmet_tcp_uninit_data_in_cmds() releases
    all the memory.
    
    Signed-off-by: Maurizio Lombardi <mlombard@redhat.com>
    Reviewed-by: Keith Busch <kbusch@kernel.org>
    Reviewed-by: Sagi Grimberg <sagi@grimberg.me>
    Reviewed-by: John Meneghini <jmeneghi@redhat.com>
    Signed-off-by: Christoph Hellwig <hch@lst.de>
    Stable-dep-of: 52a0a9854934 ("nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec")
    Signed-off-by: Sasha Levin <sashal@kernel.org>

nvmet-tcp: fix regression in data_digest calculation [+ + +]
Author: Sagi Grimberg <sagi@grimberg.me>
Date:   Fri Jun 24 00:49:53 2022 +0300

    nvmet-tcp: fix regression in data_digest calculation
    
    [ Upstream commit ed0691cf55140ce0f3fb100225645d902cce904b ]
    
    Data digest calculation iterates over command mapped iovec. However
    since commit bac04454ef9f we unmap the iovec before we handle the data
    digest, and since commit 69b85e1f1d1d we clear nr_mapped when we unmap
    the iov.
    
    Instead of open-coding the command iov traversal, simply call
    crypto_ahash_digest with the command sg that is already allocated (we
    already do that for the send path). Rename nvmet_tcp_send_ddgst to
    nvmet_tcp_calc_ddgst and call it from send and recv paths.
    
    Fixes: 69b85e1f1d1d ("nvmet-tcp: add an helper to free the cmd buffers")
    Fixes: bac04454ef9f ("nvmet-tcp: fix kmap leak when data digest in use")
    Signed-off-by: Sagi Grimberg <sagi@grimberg.me>
    Signed-off-by: Christoph Hellwig <hch@lst.de>
    Stable-dep-of: 52a0a9854934 ("nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec")
    Signed-off-by: Sasha Levin <sashal@kernel.org>

nvmet-tcp: pass iov_len instead of sg->length to bvec_set_page() [+ + +]
Author: Varun Prakash <varun@chelsio.com>
Date:   Wed Aug 9 15:56:45 2023 +0530

    nvmet-tcp: pass iov_len instead of sg->length to bvec_set_page()
    
    commit 1f0bbf28940cf5edad90ab57b62aa8197bf5e836 upstream.
    
    iov_len is the valid data length, so pass iov_len instead of sg->length to
    bvec_set_page().
    
    Fixes: 5bfaba275ae6 ("nvmet-tcp: don't map pages which can't come from HIGHMEM")
    Signed-off-by: Rakshana Sridhar <rakshanas@chelsio.com>
    Signed-off-by: Varun Prakash <varun@chelsio.com>
    Reviewed-by: Sagi Grimberg <sagi@grimberg.me>
    Reviewed-by: Christoph Hellwig <hch@lst.de>
    Signed-off-by: Keith Busch <kbusch@kernel.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
platform/x86: intel_telemetry: Fix PSS event register mask [+ + +]
Author: Kaushlendra Kumar <kaushlendra.kumar@intel.com>
Date:   Wed Dec 24 11:41:44 2025 +0530

    platform/x86: intel_telemetry: Fix PSS event register mask
    
    [ Upstream commit 39e9c376ac42705af4ed4ae39eec028e8bced9b4 ]
    
    The PSS telemetry info parsing incorrectly applies
    TELEM_INFO_SRAMEVTS_MASK when extracting event register
    count from firmware response. This reads bits 15-8 instead
    of the correct bits 7-0, causing misdetection of hardware
    capabilities.
    
    The IOSS path correctly uses TELEM_INFO_NENABLES_MASK for
    register count. Apply the same mask to PSS parsing for
    consistency.
    
    Fixes: 9d16b482b059 ("platform:x86: Add Intel telemetry platform driver")
    Signed-off-by: Kaushlendra Kumar <kaushlendra.kumar@intel.com>
    Link: https://patch.msgid.link/20251224061144.3925519-1-kaushlendra.kumar@intel.com
    Reviewed-by: Ilpo Järvinen <ilpo.jarvinen@linux.intel.com>
    Signed-off-by: Ilpo Järvinen <ilpo.jarvinen@linux.intel.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

platform/x86: intel_telemetry: Fix swapped arrays in PSS output [+ + +]
Author: Kaushlendra Kumar <kaushlendra.kumar@intel.com>
Date:   Wed Dec 24 08:50:53 2025 +0530

    platform/x86: intel_telemetry: Fix swapped arrays in PSS output
    
    commit 25e9e322d2ab5c03602eff4fbf4f7c40019d8de2 upstream.
    
    The LTR blocking statistics and wakeup event counters are incorrectly
    cross-referenced during debugfs output rendering. The code populates
    pss_ltr_blkd[] with LTR blocking data and pss_s0ix_wakeup[] with wakeup
    data, but the display loops reference the wrong arrays.
    
    This causes the "LTR Blocking Status" section to print wakeup events
    and the "Wakes Status" section to print LTR blockers, misleading power
    management analysis and S0ix residency debugging.
    
    Fix by aligning array usage with the intended output section labels.
    
    Fixes: 87bee290998d ("platform:x86: Add Intel Telemetry Debugfs interfaces")
    Cc: stable@vger.kernel.org
    Signed-off-by: Kaushlendra Kumar <kaushlendra.kumar@intel.com>
    Link: https://patch.msgid.link/20251224032053.3915900-1-kaushlendra.kumar@intel.com
    Reviewed-by: Ilpo Järvinen <ilpo.jarvinen@linux.intel.com>
    Signed-off-by: Ilpo Järvinen <ilpo.jarvinen@linux.intel.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

platform/x86: toshiba_haps: Fix memory leaks in add/remove routines [+ + +]
Author: Rafael J. Wysocki <rafael.j.wysocki@intel.com>
Date:   Mon Jan 26 16:38:45 2026 +0200

    platform/x86: toshiba_haps: Fix memory leaks in add/remove routines
    
    [ Upstream commit 128497456756e1b952bd5a912cd073836465109d ]
    
    toshiba_haps_add() leaks the haps object allocated by it if it returns
    an error after allocating that object successfully.
    
    toshiba_haps_remove() does not free the object pointed to by
    toshiba_haps before clearing that pointer, so it becomes unreachable
    allocated memory.
    
    Address these memory leaks by using devm_kzalloc() for allocating
    the memory in question.
    
    Fixes: 23d0ba0c908a ("platform/x86: Toshiba HDD Active Protection Sensor")
    Signed-off-by: Rafael J. Wysocki <rafael.j.wysocki@intel.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
rbd: check for EOD after exclusive lock is ensured to be held [+ + +]
Author: Ilya Dryomov <idryomov@gmail.com>
Date:   Wed Jan 7 22:37:55 2026 +0100

    rbd: check for EOD after exclusive lock is ensured to be held
    
    commit bd3884a204c3b507e6baa9a4091aa927f9af5404 upstream.
    
    Similar to commit 870611e4877e ("rbd: get snapshot context after
    exclusive lock is ensured to be held"), move the "beyond EOD" check
    into the image request state machine so that it's performed after
    exclusive lock is ensured to be held.  This avoids various race
    conditions which can arise when the image is shrunk under I/O (in
    practice, mostly readahead).  In one such scenario
    
        rbd_assert(objno < rbd_dev->object_map_size);
    
    can be triggered if a close-to-EOD read gets queued right before the
    shrink is initiated and the EOD check is performed against an outdated
    mapping_size.  After the resize is done on the server side and exclusive
    lock is (re)acquired bringing along the new (now shrunk) object map, the
    read starts going through the state machine and rbd_obj_may_exist() gets
    invoked on an object that is out of bounds of rbd_dev->object_map array.
    
    Cc: stable@vger.kernel.org
    Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
    Reviewed-by: Dongsheng Yang <dongsheng.yang@linux.dev>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
ring-buffer: Avoid softlockup in ring_buffer_resize() during memory free [+ + +]
Author: Wupeng Ma <mawupeng1@huawei.com>
Date:   Sun Dec 28 14:50:07 2025 +0800

    ring-buffer: Avoid softlockup in ring_buffer_resize() during memory free
    
    [ Upstream commit 6435ffd6c7fcba330dfa91c58dc30aed2df3d0bf ]
    
    When user resize all trace ring buffer through file 'buffer_size_kb',
    then in ring_buffer_resize(), kernel allocates buffer pages for each
    cpu in a loop.
    
    If the kernel preemption model is PREEMPT_NONE and there are many cpus
    and there are many buffer pages to be freed, it may not give up cpu
    for a long time and finally cause a softlockup.
    
    To avoid it, call cond_resched() after each cpu buffer free as Commit
    f6bd2c92488c ("ring-buffer: Avoid softlockup in ring_buffer_resize()")
    does.
    
    Detailed call trace as follow:
    
      rcu: INFO: rcu_sched self-detected stall on CPU
      rcu:  24-....: (14837 ticks this GP) idle=521c/1/0x4000000000000000 softirq=230597/230597 fqs=5329
      rcu:  (t=15004 jiffies g=26003221 q=211022 ncpus=96)
      CPU: 24 UID: 0 PID: 11253 Comm: bash Kdump: loaded Tainted: G            EL      6.18.2+ #278 NONE
      pc : arch_local_irq_restore+0x8/0x20
       arch_local_irq_restore+0x8/0x20 (P)
       free_frozen_page_commit+0x28c/0x3b0
       __free_frozen_pages+0x1c0/0x678
       ___free_pages+0xc0/0xe0
       free_pages+0x3c/0x50
       ring_buffer_resize.part.0+0x6a8/0x880
       ring_buffer_resize+0x3c/0x58
       __tracing_resize_ring_buffer.part.0+0x34/0xd8
       tracing_resize_ring_buffer+0x8c/0xd0
       tracing_entries_write+0x74/0xd8
       vfs_write+0xcc/0x288
       ksys_write+0x74/0x118
       __arm64_sys_write+0x24/0x38
    
    Cc: <mathieu.desnoyers@efficios.com>
    Link: https://patch.msgid.link/20251228065008.2396573-1-mawupeng1@huawei.com
    Signed-off-by: Wupeng Ma <mawupeng1@huawei.com>
    Acked-by: Masami Hiramatsu (Google) <mhiramat@kernel.org>
    Signed-off-by: Steven Rostedt (Google) <rostedt@goodmis.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
riscv: Replace function-like macro by static inline function [+ + +]
Author: Björn Töpel <bjorn@rivosinc.com>
Date:   Sat Apr 19 13:13:59 2025 +0200

    riscv: Replace function-like macro by static inline function
    
    commit 121f34341d396b666d8a90b24768b40e08ca0d61 upstream.
    
    The flush_icache_range() function is implemented as a "function-like
    macro with unused parameters", which can result in "unused variables"
    warnings.
    
    Replace the macro with a static inline function, as advised by
    Documentation/process/coding-style.rst.
    
    Fixes: 08f051eda33b ("RISC-V: Flush I$ when making a dirty page executable")
    Signed-off-by: Björn Töpel <bjorn@rivosinc.com>
    Link: https://lore.kernel.org/r/20250419111402.1660267-1-bjorn@kernel.org
    Signed-off-by: Palmer Dabbelt <palmer@rivosinc.com>
    Signed-off-by: Ron Economos <re@w6rz.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

riscv: uprobes: Add missing fence.i after building the XOL buffer [+ + +]
Author: Björn Töpel <bjorn@rivosinc.com>
Date:   Sat Apr 19 13:14:00 2025 +0200

    riscv: uprobes: Add missing fence.i after building the XOL buffer
    
    commit 7d1d19a11cfbfd8bae1d89cc010b2cc397cd0c48 upstream.
    
    The XOL (execute out-of-line) buffer is used to single-step the
    replaced instruction(s) for uprobes. The RISC-V port was missing a
    proper fence.i (i$ flushing) after constructing the XOL buffer, which
    can result in incorrect execution of stale/broken instructions.
    
    This was found running the BPF selftests "test_progs:
    uprobe_autoattach, attach_probe" on the Spacemit K1/X60, where the
    uprobes tests randomly blew up.
    
    Reviewed-by: Guo Ren <guoren@kernel.org>
    Fixes: 74784081aac8 ("riscv: Add uprobes supported")
    Signed-off-by: Björn Töpel <bjorn@rivosinc.com>
    Link: https://lore.kernel.org/r/20250419111402.1660267-2-bjorn@kernel.org
    Signed-off-by: Palmer Dabbelt <palmer@rivosinc.com>
    Signed-off-by: Rahul Sharma <black.hawk@163.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count() [+ + +]
Author: Maurizio Lombardi <mlombard@redhat.com>
Date:   Mon Jan 12 17:53:51 2026 +0100

    scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count()
    
    [ Upstream commit 9411a89e9e7135cc459178fa77a3f1d6191ae903 ]
    
    In iscsit_dec_conn_usage_count(), the function calls complete() while
    holding the conn->conn_usage_lock. As soon as complete() is invoked, the
    waiter (such as iscsit_close_connection()) may wake up and proceed to free
    the iscsit_conn structure.
    
    If the waiter frees the memory before the current thread reaches
    spin_unlock_bh(), it results in a KASAN slab-use-after-free as the function
    attempts to release a lock within the already-freed connection structure.
    
    Fix this by releasing the spinlock before calling complete().
    
    Signed-off-by: Maurizio Lombardi <mlombard@redhat.com>
    Reported-by: Zhaojuan Guo <zguo@redhat.com>
    Reviewed-by: Mike Christie <michael.christie@oracle.com>
    Link: https://patch.msgid.link/20260112165352.138606-2-mlombard@redhat.com
    Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() [+ + +]
Author: Maurizio Lombardi <mlombard@redhat.com>
Date:   Mon Jan 12 17:53:52 2026 +0100

    scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count()
    
    [ Upstream commit 84dc6037390b8607c5551047d3970336cb51ba9a ]
    
    In iscsit_dec_session_usage_count(), the function calls complete() while
    holding the sess->session_usage_lock. Similar to the connection usage count
    logic, the waiter signaled by complete() (e.g., in the session release
    path) may wake up and free the iscsit_session structure immediately.
    
    This creates a race condition where the current thread may attempt to
    execute spin_unlock_bh() on a session structure that has already been
    deallocated, resulting in a KASAN slab-use-after-free.
    
    To resolve this, release the session_usage_lock before calling complete()
    to ensure all dereferences of the sess pointer are finished before the
    waiter is allowed to proceed with deallocation.
    
    Signed-off-by: Maurizio Lombardi <mlombard@redhat.com>
    Reported-by: Zhaojuan Guo <zguo@redhat.com>
    Reviewed-by: Mike Christie <michael.christie@oracle.com>
    Link: https://patch.msgid.link/20260112165352.138606-3-mlombard@redhat.com
    Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
smb/server: call ksmbd_session_rpc_close() on error path in create_smb2_pipe() [+ + +]
Author: ZhangGuoDong <zhangguodong@kylinos.cn>
Date:   Sun Dec 28 22:51:01 2025 +0800

    smb/server: call ksmbd_session_rpc_close() on error path in create_smb2_pipe()
    
    [ Upstream commit 7c28f8eef5ac5312794d8a52918076dcd787e53b ]
    
    When ksmbd_iov_pin_rsp() fails, we should call ksmbd_session_rpc_close().
    
    Signed-off-by: ZhangGuoDong <zhangguodong@kylinos.cn>
    Signed-off-by: ChenXiaoSong <chenxiaosong@kylinos.cn>
    Acked-by: Namjae Jeon <linkinjeon@kernel.org>
    Signed-off-by: Steve French <stfrench@microsoft.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
spi: tegra210-quad: Move curr_xfer read inside spinlock [+ + +]
Author: Breno Leitao <leitao@debian.org>
Date:   Mon Jan 26 09:50:27 2026 -0800

    spi: tegra210-quad: Move curr_xfer read inside spinlock
    
    [ Upstream commit ef13ba357656451d6371940d8414e3e271df97e3 ]
    
    Move the assignment of the transfer pointer from curr_xfer inside the
    spinlock critical section in both handle_cpu_based_xfer() and
    handle_dma_based_xfer().
    
    Previously, curr_xfer was read before acquiring the lock, creating a
    window where the timeout path could clear curr_xfer between reading it
    and using it. By moving the read inside the lock, the handlers are
    guaranteed to see a consistent value that cannot be modified by the
    timeout path.
    
    Fixes: 921fc1838fb0 ("spi: tegra210-quad: Add support for Tegra210 QSPI controller")
    Signed-off-by: Breno Leitao <leitao@debian.org>
    Acked-by: Thierry Reding <treding@nvidia.com>
    Tested-by: Jon Hunter <jonathanh@nvidia.com>
    Acked-by: Jon Hunter <jonathanh@nvidia.com>
    Link: https://patch.msgid.link/20260126-tegra_xfer-v2-2-6d2115e4f387@debian.org
    Signed-off-by: Mark Brown <broonie@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

spi: tegra210-quad: Protect curr_xfer assignment in tegra_qspi_setup_transfer_one [+ + +]
Author: Breno Leitao <leitao@debian.org>
Date:   Mon Jan 26 09:50:28 2026 -0800

    spi: tegra210-quad: Protect curr_xfer assignment in tegra_qspi_setup_transfer_one
    
    [ Upstream commit f5a4d7f5e32ba163cff893493ec1cbb0fd2fb0d5 ]
    
    When the timeout handler processes a completed transfer and signals
    completion, the transfer thread can immediately set up the next transfer
    and assign curr_xfer to point to it.
    
    If a delayed ISR from the previous transfer then runs, it checks if
    (!tqspi->curr_xfer) (currently without the lock also -- to be fixed
    soon) to detect stale interrupts, but this check passes because
    curr_xfer now points to the new transfer. The ISR then incorrectly
    processes the new transfer's context.
    
    Protect the curr_xfer assignment with the spinlock to ensure the ISR
    either sees NULL (and bails out) or sees the new value only after the
    assignment is complete.
    
    Fixes: 921fc1838fb0 ("spi: tegra210-quad: Add support for Tegra210 QSPI controller")
    Signed-off-by: Breno Leitao <leitao@debian.org>
    Tested-by: Jon Hunter <jonathanh@nvidia.com>
    Acked-by: Jon Hunter <jonathanh@nvidia.com>
    Acked-by: Thierry Reding <treding@nvidia.com>
    Link: https://patch.msgid.link/20260126-tegra_xfer-v2-3-6d2115e4f387@debian.org
    Signed-off-by: Mark Brown <broonie@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

spi: tegra210-quad: Protect curr_xfer clearing in tegra_qspi_non_combined_seq_xfer [+ + +]
Author: Breno Leitao <leitao@debian.org>
Date:   Mon Jan 26 09:50:30 2026 -0800

    spi: tegra210-quad: Protect curr_xfer clearing in tegra_qspi_non_combined_seq_xfer
    
    [ Upstream commit 6d7723e8161f3c3f14125557e19dd080e9d882be ]
    
    Protect the curr_xfer clearing in tegra_qspi_non_combined_seq_xfer()
    with the spinlock to prevent a race with the interrupt handler that
    reads this field to check if a transfer is in progress.
    
    Fixes: b4e002d8a7ce ("spi: tegra210-quad: Fix timeout handling")
    Signed-off-by: Breno Leitao <leitao@debian.org>
    Tested-by: Jon Hunter <jonathanh@nvidia.com>
    Acked-by: Jon Hunter <jonathanh@nvidia.com>
    Acked-by: Thierry Reding <treding@nvidia.com>
    Link: https://patch.msgid.link/20260126-tegra_xfer-v2-5-6d2115e4f387@debian.org
    Signed-off-by: Mark Brown <broonie@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer [+ + +]
Author: Breno Leitao <leitao@debian.org>
Date:   Mon Jan 26 09:50:29 2026 -0800

    spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer
    
    [ Upstream commit bf4528ab28e2bf112c3a2cdef44fd13f007781cd ]
    
    The curr_xfer field is read by the IRQ handler without holding the lock
    to check if a transfer is in progress. When clearing curr_xfer in the
    combined sequence transfer loop, protect it with the spinlock to prevent
    a race with the interrupt handler.
    
    Protect the curr_xfer clearing at the exit path of
    tegra_qspi_combined_seq_xfer() with the spinlock to prevent a race
    with the interrupt handler that reads this field.
    
    Without this protection, the IRQ handler could read a partially updated
    curr_xfer value, leading to NULL pointer dereference or use-after-free.
    
    Fixes: b4e002d8a7ce ("spi: tegra210-quad: Fix timeout handling")
    Signed-off-by: Breno Leitao <leitao@debian.org>
    Tested-by: Jon Hunter <jonathanh@nvidia.com>
    Acked-by: Jon Hunter <jonathanh@nvidia.com>
    Acked-by: Thierry Reding <treding@nvidia.com>
    Link: https://patch.msgid.link/20260126-tegra_xfer-v2-4-6d2115e4f387@debian.org
    Signed-off-by: Mark Brown <broonie@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

spi: tegra210-quad: Return IRQ_HANDLED when timeout already processed transfer [+ + +]
Author: Breno Leitao <leitao@debian.org>
Date:   Mon Jan 26 09:50:26 2026 -0800

    spi: tegra210-quad: Return IRQ_HANDLED when timeout already processed transfer
    
    [ Upstream commit aabd8ea0aa253d40cf5f20a609fc3d6f61e38299 ]
    
    When the ISR thread wakes up late and finds that the timeout handler
    has already processed the transfer (curr_xfer is NULL), return
    IRQ_HANDLED instead of IRQ_NONE.
    
    Use a similar approach to tegra_qspi_handle_timeout() by reading
    QSPI_TRANS_STATUS and checking the QSPI_RDY bit to determine if the
    hardware actually completed the transfer. If QSPI_RDY is set, the
    interrupt was legitimate and triggered by real hardware activity.
    The fact that the timeout path handled it first doesn't make it
    spurious. Returning IRQ_NONE incorrectly suggests the interrupt
    wasn't for this device, which can cause issues with shared interrupt
    lines and interrupt accounting.
    
    Fixes: b4e002d8a7ce ("spi: tegra210-quad: Fix timeout handling")
    Signed-off-by: Breno Leitao <leitao@debian.org>
    Signed-off-by: Usama Arif <usamaarif642@gmail.com>
    Tested-by: Jon Hunter <jonathanh@nvidia.com>
    Acked-by: Jon Hunter <jonathanh@nvidia.com>
    Acked-by: Thierry Reding <treding@nvidia.com>
    Link: https://patch.msgid.link/20260126-tegra_xfer-v2-1-6d2115e4f387@debian.org
    Signed-off-by: Mark Brown <broonie@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

spi: tegra: Fix a memory leak in tegra_slink_probe() [+ + +]
Author: Felix Gu <ustc.gu@gmail.com>
Date:   Mon Feb 2 23:15:09 2026 +0800

    spi: tegra: Fix a memory leak in tegra_slink_probe()
    
    [ Upstream commit 41d9a6795b95d6ea28439ac1e9ce8c95bbca20fc ]
    
    In tegra_slink_probe(), when platform_get_irq() fails, it directly
    returns from the function with an error code, which causes a memory leak.
    
    Replace it with a goto label to ensure proper cleanup.
    
    Fixes: eb9913b511f1 ("spi: tegra: Fix missing IRQ check in tegra_slink_probe()")
    Signed-off-by: Felix Gu <ustc.gu@gmail.com>
    Reviewed-by: Jon Hunter <jonathanh@nvidia.com>
    Link: https://patch.msgid.link/20260202-slink-v1-1-eac50433a6f9@gmail.com
    Signed-off-by: Mark Brown <broonie@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
timers: Add shutdown mechanism to the internal functions [+ + +]
Author: Thomas Gleixner <tglx@kernel.org>
Date:   Sat Nov 29 01:05:36 2025 +0900

    timers: Add shutdown mechanism to the internal functions
    
    [ Upstream commit 0cc04e80458a822300b93f82ed861a513edde194 ]
    
    Tearing down timers which have circular dependencies to other
    functionality, e.g. workqueues, where the timer can schedule work and work
    can arm timers, is not trivial.
    
    In those cases it is desired to shutdown the timer in a way which prevents
    rearming of the timer. The mechanism to do so is to set timer->function to
    NULL and use this as an indicator for the timer arming functions to ignore
    the (re)arm request.
    
    Add a shutdown argument to the relevant internal functions which makes the
    actual deactivation code set timer->function to NULL which in turn prevents
    rearming of the timer.
    
    Co-developed-by: Steven Rostedt <rostedt@goodmis.org>
    Signed-off-by: Steven Rostedt <rostedt@goodmis.org>
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Tested-by: Guenter Roeck <linux@roeck-us.net>
    Reviewed-by: Jacob Keller <jacob.e.keller@intel.com>
    Reviewed-by: Anna-Maria Behnsen <anna-maria@linutronix.de>
    Link: https://lore.kernel.org/all/20220407161745.7d6754b3@gandalf.local.home
    Link: https://lore.kernel.org/all/20221110064101.429013735@goodmis.org
    Link: https://lore.kernel.org/r/20221123201625.253883224@linutronix.de
    Signed-off-by: Jeongjun Park <aha310510@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

timers: Fix NULL function pointer race in timer_shutdown_sync() [+ + +]
Author: Yipeng Zou <zouyipeng@huawei.com>
Date:   Sat Nov 22 09:39:42 2025 +0000

    timers: Fix NULL function pointer race in timer_shutdown_sync()
    
    commit 20739af07383e6eb1ec59dcd70b72ebfa9ac362c upstream.
    
    There is a race condition between timer_shutdown_sync() and timer
    expiration that can lead to hitting a WARN_ON in expire_timers().
    
    The issue occurs when timer_shutdown_sync() clears the timer function
    to NULL while the timer is still running on another CPU. The race
    scenario looks like this:
    
    CPU0                                    CPU1
                                            <SOFTIRQ>
                                            lock_timer_base()
                                            expire_timers()
                                            base->running_timer = timer;
                                            unlock_timer_base()
                                            [call_timer_fn enter]
                                            mod_timer()
                                            ...
    timer_shutdown_sync()
    lock_timer_base()
    // For now, will not detach the timer but only clear its function to NULL
    if (base->running_timer != timer)
            ret = detach_if_pending(timer, base, true);
    if (shutdown)
            timer->function = NULL;
    unlock_timer_base()
                                            [call_timer_fn exit]
                                            lock_timer_base()
                                            base->running_timer = NULL;
                                            unlock_timer_base()
                                            ...
                                            // Now timer is pending while its function set to NULL.
                                            // next timer trigger
                                            <SOFTIRQ>
                                            expire_timers()
                                            WARN_ON_ONCE(!fn) // hit
                                            ...
    lock_timer_base()
    // Now timer will detach
    if (base->running_timer != timer)
            ret = detach_if_pending(timer, base, true);
    if (shutdown)
            timer->function = NULL;
    unlock_timer_base()
    
    The problem is that timer_shutdown_sync() clears the timer function
    regardless of whether the timer is currently running. This can leave a
    pending timer with a NULL function pointer, which triggers the
    WARN_ON_ONCE(!fn) check in expire_timers().
    
    Fix this by only clearing the timer function when actually detaching the
    timer. If the timer is running, leave the function pointer intact, which is
    safe because the timer will be properly detached when it finishes running.
    
    Fixes: 0cc04e80458a ("timers: Add shutdown mechanism to the internal functions")
    Signed-off-by: Yipeng Zou <zouyipeng@huawei.com>
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Cc: stable@vger.kernel.org
    Link: https://patch.msgid.link/20251122093942.301559-1-zouyipeng@huawei.com
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

timers: Get rid of del_singleshot_timer_sync() [+ + +]
Author: Thomas Gleixner <tglx@kernel.org>
Date:   Sat Nov 29 01:05:30 2025 +0900

    timers: Get rid of del_singleshot_timer_sync()
    
    [ Upstream commit 9a5a305686971f4be10c6d7251c8348d74b3e014 ]
    
    del_singleshot_timer_sync() used to be an optimization for deleting timers
    which are not rearmed from the timer callback function.
    
    This optimization turned out to be broken and got mapped to
    del_timer_sync() about 17 years ago.
    
    Get rid of the undocumented indirection and use del_timer_sync() directly.
    
    No functional change.
    
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Tested-by: Guenter Roeck <linux@roeck-us.net>
    Reviewed-by: Jacob Keller <jacob.e.keller@intel.com>
    Reviewed-by: Anna-Maria Behnsen <anna-maria@linutronix.de>
    Link: https://lore.kernel.org/r/20221123201624.706987932@linutronix.de
    Signed-off-by: Jeongjun Park <aha310510@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

timers: Provide timer_shutdown[_sync]() [+ + +]
Author: Thomas Gleixner <tglx@kernel.org>
Date:   Sat Nov 29 01:05:37 2025 +0900

    timers: Provide timer_shutdown[_sync]()
    
    [ Upstream commit f571faf6e443b6011ccb585d57866177af1f643c ]
    
    Tearing down timers which have circular dependencies to other
    functionality, e.g. workqueues, where the timer can schedule work and work
    can arm timers, is not trivial.
    
    In those cases it is desired to shutdown the timer in a way which prevents
    rearming of the timer. The mechanism to do so is to set timer->function to
    NULL and use this as an indicator for the timer arming functions to ignore
    the (re)arm request.
    
    Expose new interfaces for this: timer_shutdown_sync() and timer_shutdown().
    
    timer_shutdown_sync() has the same functionality as timer_delete_sync()
    plus the NULL-ification of the timer function.
    
    timer_shutdown() has the same functionality as timer_delete() plus the
    NULL-ification of the timer function.
    
    In both cases the rearming of the timer is prevented by silently discarding
    rearm attempts due to timer->function being NULL.
    
    Co-developed-by: Steven Rostedt <rostedt@goodmis.org>
    Signed-off-by: Steven Rostedt <rostedt@goodmis.org>
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Tested-by: Guenter Roeck <linux@roeck-us.net>
    Reviewed-by: Jacob Keller <jacob.e.keller@intel.com>
    Reviewed-by: Anna-Maria Behnsen <anna-maria@linutronix.de>
    Link: https://lore.kernel.org/all/20220407161745.7d6754b3@gandalf.local.home
    Link: https://lore.kernel.org/all/20221110064101.429013735@goodmis.org
    Link: https://lore.kernel.org/r/20221123201625.314230270@linutronix.de
    Signed-off-by: Jeongjun Park <aha310510@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

timers: Rename del_timer() to timer_delete() [+ + +]
Author: Thomas Gleixner <tglx@kernel.org>
Date:   Sat Nov 29 01:05:32 2025 +0900

    timers: Rename del_timer() to timer_delete()
    
    [ Upstream commit bb663f0f3c396c6d05f6c5eeeea96ced20ff112e ]
    
    The timer related functions do not have a strict timer_ prefixed namespace
    which is really annoying.
    
    Rename del_timer() to timer_delete() and provide del_timer()
    as a wrapper. Document that del_timer() is not for new code.
    
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Tested-by: Guenter Roeck <linux@roeck-us.net>
    Reviewed-by: Steven Rostedt (Google) <rostedt@goodmis.org>
    Reviewed-by: Jacob Keller <jacob.e.keller@intel.com>
    Reviewed-by: Anna-Maria Behnsen <anna-maria@linutronix.de>
    Link: https://lore.kernel.org/r/20221123201625.015535022@linutronix.de
    Signed-off-by: Jeongjun Park <aha310510@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

timers: Replace BUG_ON()s [+ + +]
Author: Thomas Gleixner <tglx@kernel.org>
Date:   Sat Nov 29 01:05:31 2025 +0900

    timers: Replace BUG_ON()s
    
    [ Upstream commit 82ed6f7ef58f9634fe4462dd721902c580f01569 ]
    
    The timer code still has a few BUG_ON()s left which are crashing the kernel
    in situations where it still can recover or simply refuse to take an
    action.
    
    Remove the one in the hotplug callback which checks for the CPU being
    offline. If that happens then the whole hotplug machinery will explode in
    colourful ways.
    
    Replace the rest with WARN_ON_ONCE() and conditional returns where
    appropriate.
    
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Tested-by: Guenter Roeck <linux@roeck-us.net>
    Reviewed-by: Jacob Keller <jacob.e.keller@intel.com>
    Reviewed-by: Anna-Maria Behnsen <anna-maria@linutronix.de>
    Link: https://lore.kernel.org/r/20221123201624.769128888@linutronix.de
    Signed-off-by: Jeongjun Park <aha310510@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

timers: Silently ignore timers with a NULL function [+ + +]
Author: Thomas Gleixner <tglx@kernel.org>
Date:   Sat Nov 29 01:05:34 2025 +0900

    timers: Silently ignore timers with a NULL function
    
    [ Upstream commit d02e382cef06cc73561dd32dfdc171c00dcc416d ]
    
    Tearing down timers which have circular dependencies to other
    functionality, e.g. workqueues, where the timer can schedule work and work
    can arm timers, is not trivial.
    
    In those cases it is desired to shutdown the timer in a way which prevents
    rearming of the timer. The mechanism to do so is to set timer->function to
    NULL and use this as an indicator for the timer arming functions to ignore
    the (re)arm request.
    
    In preparation for that replace the warnings in the relevant code paths
    with checks for timer->function == NULL. If the pointer is NULL, then
    discard the rearm request silently.
    
    Add debug_assert_init() instead of the WARN_ON_ONCE(!timer->function)
    checks so that debug objects can warn about non-initialized timers.
    
    The warning of debug objects does not warn if timer->function == NULL.  It
    warns when timer was not initialized using timer_setup[_on_stack]() or via
    DEFINE_TIMER(). If developers fail to enable debug objects and then waste
    lots of time to figure out why their non-initialized timer is not firing,
    they deserve it. Same for initializing a timer with a NULL function.
    
    Co-developed-by: Steven Rostedt <rostedt@goodmis.org>
    Signed-off-by: Steven Rostedt <rostedt@goodmis.org>
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Tested-by: Guenter Roeck <linux@roeck-us.net>
    Reviewed-by: Jacob Keller <jacob.e.keller@intel.com>
    Reviewed-by: Anna-Maria Behnsen <anna-maria@linutronix.de>
    Link: https://lore.kernel.org/all/20220407161745.7d6754b3@gandalf.local.home
    Link: https://lore.kernel.org/all/20221110064101.429013735@goodmis.org
    Link: https://lore.kernel.org/r/87wn7kdann.ffs@tglx
    Signed-off-by: Jeongjun Park <aha310510@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

timers: Split [try_to_]del_timer[_sync]() to prepare for shutdown mode [+ + +]
Author: Thomas Gleixner <tglx@kernel.org>
Date:   Sat Nov 29 01:05:35 2025 +0900

    timers: Split [try_to_]del_timer[_sync]() to prepare for shutdown mode
    
    [ Upstream commit 8553b5f2774a66b1f293b7d783934210afb8f23c ]
    
    Tearing down timers which have circular dependencies to other
    functionality, e.g. workqueues, where the timer can schedule work and work
    can arm timers, is not trivial.
    
    In those cases it is desired to shutdown the timer in a way which prevents
    rearming of the timer. The mechanism to do so is to set timer->function to
    NULL and use this as an indicator for the timer arming functions to ignore
    the (re)arm request.
    
    Split the inner workings of try_do_del_timer_sync(), del_timer_sync() and
    del_timer() into helper functions to prepare for implementing the shutdown
    functionality.
    
    No functional change.
    
    Co-developed-by: Steven Rostedt <rostedt@goodmis.org>
    Signed-off-by: Steven Rostedt <rostedt@goodmis.org>
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Tested-by: Guenter Roeck <linux@roeck-us.net>
    Reviewed-by: Jacob Keller <jacob.e.keller@intel.com>
    Reviewed-by: Anna-Maria Behnsen <anna-maria@linutronix.de>
    Link: https://lore.kernel.org/all/20220407161745.7d6754b3@gandalf.local.home
    Link: https://lore.kernel.org/all/20221110064101.429013735@goodmis.org
    Link: https://lore.kernel.org/r/20221123201625.195147423@linutronix.de
    Signed-off-by: Jeongjun Park <aha310510@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

timers: Update the documentation to reflect on the new timer_shutdown() API [+ + +]
Author: Steven Rostedt (Google) <rostedt@goodmis.org>
Date:   Sat Nov 29 01:05:38 2025 +0900

    timers: Update the documentation to reflect on the new timer_shutdown() API
    
    [ Upstream commit a31323bef2b66455920d054b160c17d4240f8fd4 ]
    
    In order to make sure that a timer is not re-armed after it is stopped
    before freeing, a new shutdown state is added to the timer code. The API
    timer_shutdown_sync() and timer_shutdown() must be called before the
    object that holds the timer can be freed.
    
    Update the documentation to reflect this new workflow.
    
    [ tglx: Updated to the new semantics and updated the zh_CN version ]
    
    Signed-off-by: Steven Rostedt (Google) <rostedt@goodmis.org>
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Tested-by: Guenter Roeck <linux@roeck-us.net>
    Reviewed-by: Jacob Keller <jacob.e.keller@intel.com>
    Reviewed-by: Anna-Maria Behnsen <anna-maria@linutronix.de>
    Link: https://lore.kernel.org/r/20221110064147.712934793@goodmis.org
    Link: https://lore.kernel.org/r/20221123201625.375284489@linutronix.de
    Signed-off-by: Jeongjun Park <aha310510@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
tipc: use kfree_sensitive() for session key material [+ + +]
Author: Daniel Hodges <hodgesd@meta.com>
Date:   Sat Jan 31 10:01:14 2026 -0800

    tipc: use kfree_sensitive() for session key material
    
    [ Upstream commit 74d9391e8849e70ded5309222d09b0ed0edbd039 ]
    
    The rx->skey field contains a struct tipc_aead_key with GCM-AES
    encryption keys used for TIPC cluster communication. Using plain
    kfree() leaves this sensitive key material in freed memory pages
    where it could potentially be recovered.
    
    Switch to kfree_sensitive() to ensure the key material is zeroed
    before the memory is freed.
    
    Fixes: 1ef6f7c9390f ("tipc: add automatic session key exchange")
    Signed-off-by: Daniel Hodges <hodgesd@meta.com>
    Link: https://patch.msgid.link/20260131180114.2121438-1-hodgesd@meta.com
    Signed-off-by: Jakub Kicinski <kuba@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
tracing: Fix ftrace event field alignments [+ + +]
Author: Steven Rostedt <rostedt@goodmis.org>
Date:   Sat Feb 7 12:55:20 2026 -0500

    tracing: Fix ftrace event field alignments
    
    [ Upstream commit 033c55fe2e326bea022c3cc5178ecf3e0e459b82 ]
    
    The fields of ftrace specific events (events used to save ftrace internal
    events like function traces and trace_printk) are generated similarly to
    how normal trace event fields are generated. That is, the fields are added
    to a trace_events_fields array that saves the name, offset, size,
    alignment and signness of the field. It is used to produce the output in
    the format file in tracefs so that tooling knows how to parse the binary
    data of the trace events.
    
    The issue is that some of the ftrace event structures are packed. The
    function graph exit event structures are one of them. The 64 bit calltime
    and rettime fields end up 4 byte aligned, but the algorithm to show to
    userspace shows them as 8 byte aligned.
    
    The macros that create the ftrace events has one for embedded structure
    fields. There's two macros for theses fields:
    
      __field_desc() and __field_packed()
    
    The difference of the latter macro is that it treats the field as packed.
    
    Rename that field to __field_desc_packed() and create replace the
    __field_packed() to be a normal field that is packed and have the calltime
    and rettime use those.
    
    This showed up on 32bit architectures for function graph time fields. It
    had:
    
     ~# cat /sys/kernel/tracing/events/ftrace/funcgraph_exit/format
    [..]
            field:unsigned long func;       offset:8;       size:4; signed:0;
            field:unsigned int depth;       offset:12;      size:4; signed:0;
            field:unsigned int overrun;     offset:16;      size:4; signed:0;
            field:unsigned long long calltime;      offset:24;      size:8; signed:0;
            field:unsigned long long rettime;       offset:32;      size:8; signed:0;
    
    Notice that overrun is at offset 16 with size 4, where in the structure
    calltime is at offset 20 (16 + 4), but it shows the offset at 24. That's
    because it used the alignment of unsigned long long when used as a
    declaration and not as a member of a structure where it would be aligned
    by word size (in this case 4).
    
    By using the proper structure alignment, the format has it at the correct
    offset:
    
     ~# cat /sys/kernel/tracing/events/ftrace/funcgraph_exit/format
    [..]
            field:unsigned long func;       offset:8;       size:4; signed:0;
            field:unsigned int depth;       offset:12;      size:4; signed:0;
            field:unsigned int overrun;     offset:16;      size:4; signed:0;
            field:unsigned long long calltime;      offset:20;      size:8; signed:0;
            field:unsigned long long rettime;       offset:28;      size:8; signed:0;
    
    Cc: stable@vger.kernel.org
    Cc: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
    Cc: Mark Rutland <mark.rutland@arm.com>
    Acked-by: Masami Hiramatsu (Google) <mhiramat@kernel.org>
    Reported-by: "jempty.liang" <imntjempty@163.com>
    Link: https://patch.msgid.link/20260204113628.53faec78@gandalf.local.home
    Fixes: 04ae87a52074e ("ftrace: Rework event_create_dir()")
    Closes: https://lore.kernel.org/all/20260130015740.212343-1-imntjempty@163.com/
    Closes: https://lore.kernel.org/all/20260202123342.2544795-1-imntjempty@163.com/
    Signed-off-by: Steven Rostedt (Google) <rostedt@goodmis.org>
    [ Context / renames ]
    Signed-off-by: Sasha Levin <sashal@kernel.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
wifi: cfg80211: Fix bitrate calculation overflow for HE rates [+ + +]
Author: Veerendranath Jakkam <veerendranath.jakkam@oss.qualcomm.com>
Date:   Fri Jan 9 20:30:04 2026 +0530

    wifi: cfg80211: Fix bitrate calculation overflow for HE rates
    
    [ Upstream commit a3034bf0746d88a00cceda9541534a5721445a24 ]
    
    An integer overflow occurs in cfg80211_calculate_bitrate_he() when
    calculating bitrates for high throughput HE configurations.
    For example, with 160 MHz bandwidth, HE-MCS 13, HE-NSS 4, and HE-GI 0,
    the multiplication (result * rate->nss) overflows the 32-bit 'result'
    variable before division by 8, leading to significantly underestimated
    bitrate values.
    
    The overflow occurs because the NSS multiplication operates on a 32-bit
    integer that cannot accommodate intermediate values exceeding
    4,294,967,295. When overflow happens, the value wraps around, producing
    incorrect bitrates for high MCS and NSS combinations.
    
    Fix this by utilizing the 64-bit 'tmp' variable for the NSS
    multiplication and subsequent divisions via do_div(). This approach
    preserves full precision throughout the entire calculation, with the
    final value assigned to 'result' only after completing all operations.
    
    Signed-off-by: Veerendranath Jakkam <veerendranath.jakkam@oss.qualcomm.com>
    Link: https://patch.msgid.link/20260109-he_bitrate_overflow-v1-1-95575e466b6e@oss.qualcomm.com
    Signed-off-by: Johannes Berg <johannes.berg@intel.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

wifi: mac80211: collect station statistics earlier when disconnect [+ + +]
Author: Baochen Qiang <baochen.qiang@oss.qualcomm.com>
Date:   Mon Dec 22 10:29:07 2025 +0800

    wifi: mac80211: collect station statistics earlier when disconnect
    
    [ Upstream commit a203dbeeca15a9b924f0d51f510921f4bae96801 ]
    
    In __sta_info_destroy_part2(), station statistics are requested after the
    IEEE80211_STA_NONE -> IEEE80211_STA_NOTEXIST transition. This is
    problematic because the driver may be unable to handle the request due to
    the STA being in the NOTEXIST state (i.e. if the driver destroys the
    underlying data when transitioning to NOTEXIST).
    
    Move the statistics collection to before the state transition to avoid
    this issue.
    
    Signed-off-by: Baochen Qiang <baochen.qiang@oss.qualcomm.com>
    Link: https://patch.msgid.link/20251222-mac80211-move-station-stats-collection-earlier-v1-1-12cd4e42c633@oss.qualcomm.com
    Signed-off-by: Johannes Berg <johannes.berg@intel.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

wifi: mac80211: don't increment crypto_tx_tailroom_needed_cnt twice [+ + +]
Author: Miri Korenblit <miriam.rachel.korenblit@intel.com>
Date:   Sun Jan 18 09:28:29 2026 +0200

    wifi: mac80211: don't increment crypto_tx_tailroom_needed_cnt twice
    
    [ Upstream commit 3f3d8ff31496874a69b131866f62474eb24ed20a ]
    
    In reconfig, in case the driver asks to disconnect during the reconfig,
    all the keys of the interface are marked as tainted.
    Then ieee80211_reenable_keys will loop over all the interface keys, and
    for each one it will
    a) increment crypto_tx_tailroom_needed_cnt
    b) call ieee80211_key_enable_hw_accel, which in turn will detect that
    this key is tainted, so it will mark it as "not in hardware", which is
    paired with crypto_tx_tailroom_needed_cnt incrementation, so we get two
    incrementations for each tainted key.
    Then we get a warning in ieee80211_free_keys.
    
    To fix it, don't increment the count in ieee80211_reenable_keys for
    tainted keys
    
    Reviewed-by: Johannes Berg <johannes.berg@intel.com>
    Signed-off-by: Miri Korenblit <miriam.rachel.korenblit@intel.com>
    Link: https://patch.msgid.link/20260118092821.4ca111fddcda.Id6e554f4b1c83760aa02d5a9e4e3080edb197aa2@changeid
    Signed-off-by: Johannes Berg <johannes.berg@intel.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

wifi: mac80211: ocb: skip rx_no_sta when interface is not joined [+ + +]
Author: Moon Hee Lee <moonhee.lee.ca@gmail.com>
Date:   Mon Dec 15 19:59:32 2025 -0800

    wifi: mac80211: ocb: skip rx_no_sta when interface is not joined
    
    [ Upstream commit ff4071c60018a668249dc6a2df7d16330543540e ]
    
    ieee80211_ocb_rx_no_sta() assumes a valid channel context, which is only
    present after JOIN_OCB.
    
    RX may run before JOIN_OCB is executed, in which case the OCB interface
    is not operational. Skip RX peer handling when the interface is not
    joined to avoid warnings in the RX path.
    
    Reported-by: syzbot+b364457b2d1d4e4a3054@syzkaller.appspotmail.com
    Closes: https://syzkaller.appspot.com/bug?extid=b364457b2d1d4e4a3054
    Tested-by: syzbot+b364457b2d1d4e4a3054@syzkaller.appspotmail.com
    Signed-off-by: Moon Hee Lee <moonhee.lee.ca@gmail.com>
    Link: https://patch.msgid.link/20251216035932.18332-1-moonhee.lee.ca@gmail.com
    Signed-off-by: Johannes Berg <johannes.berg@intel.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

wifi: wlcore: ensure skb headroom before skb_push [+ + +]
Author: Peter Åstrand <astrand@lysator.liu.se>
Date:   Wed Dec 3 08:57:08 2025 +0100

    wifi: wlcore: ensure skb headroom before skb_push
    
    [ Upstream commit e75665dd096819b1184087ba5718bd93beafff51 ]
    
    This avoids occasional skb_under_panic Oops from wl1271_tx_work. In this case, headroom is
    less than needed (typically 110 - 94 = 16 bytes).
    
    Signed-off-by: Peter Astrand <astrand@lysator.liu.se>
    Link: https://patch.msgid.link/097bd417-e1d7-acd4-be05-47b199075013@lysator.liu.se
    Signed-off-by: Johannes Berg <johannes.berg@intel.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
x86/kfence: fix booting on 32bit non-PAE systems [+ + +]
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date:   Mon Jan 26 21:10:46 2026 +0000

    x86/kfence: fix booting on 32bit non-PAE systems
    
    commit 16459fe7e0ca6520a6e8f603de4ccd52b90fd765 upstream.
    
    The original patch inverted the PTE unconditionally to avoid
    L1TF-vulnerable PTEs, but Linux doesn't make this adjustment in 2-level
    paging.
    
    Adjust the logic to use the flip_protnone_guard() helper, which is a nop
    on 2-level paging but inverts the address bits in all other paging modes.
    
    This doesn't matter for the Xen aspect of the original change.  Linux no
    longer supports running 32bit PV under Xen, and Xen doesn't support
    running any 32bit PV guests without using PAE paging.
    
    Link: https://lkml.kernel.org/r/20260126211046.2096622-1-andrew.cooper3@citrix.com
    Fixes: b505f1944535 ("x86/kfence: avoid writing L1TF-vulnerable PTEs")
    Reported-by: Ryusuke Konishi <konishi.ryusuke@gmail.com>
    Closes: https://lore.kernel.org/lkml/CAKFNMokwjw68ubYQM9WkzOuH51wLznHpEOMSqtMoV1Rn9JV_gw@mail.gmail.com/
    Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
    Tested-by: Ryusuke Konishi <konishi.ryusuke@gmail.com>
    Tested-by: Borislav Petkov (AMD) <bp@alien8.de>
    Cc: Alexander Potapenko <glider@google.com>
    Cc: Marco Elver <elver@google.com>
    Cc: Dmitry Vyukov <dvyukov@google.com>
    Cc: Thomas Gleixner <tglx@linutronix.de>
    Cc: Ingo Molnar <mingo@redhat.com>
    Cc: Dave Hansen <dave.hansen@linux.intel.com>
    Cc: "H. Peter Anvin" <hpa@zytor.com>
    Cc: Jann Horn <jannh@google.com>
    Cc: <stable@vger.kernel.org>
    Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>