Linux/linux 26fd6bfdrivers/mtd/nand/spi core.c winbond.c, drivers/mtd/spi-nor debugfs.c

Merge tag 'mtd/fixes-for-7.1-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/mtd/linux

Pull mtd fixes from Miquel Raynal:
 "Besides an out-of-bound bug, this is about properly supporting Winbond
  octal SPI NAND chips which use a specific pattern for stuffing more
  address bits in some operations. This uses the spi-mem flag in SPI
  NAND that was added to the spi-mem layer just before the merge window
  through the spi tree"

* tag 'mtd/fixes-for-7.1-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/mtd/linux:
  mtd: spinand: winbond: Fix ODTR write VCR on W35NxxJW
  mtd: spinand: winbond: Set the packed page read flag to W35N02/04JW
  mtd: spinand: Add support for packed read data ODTR commands
  mtd: spi-nor: debugfs: fix out-of-bounds read in spi_nor_params_show()
DeltaFile
+21-3drivers/mtd/nand/spi/core.c
+7-0include/linux/mtd/spinand.h
+3-3drivers/mtd/nand/spi/winbond.c
+3-1drivers/mtd/spi-nor/debugfs.c
+34-74 files

Linux/linux cae4ef6drivers/acpi acpi_tad.c video_detect.c, drivers/acpi/apei einj-core.c

Merge tag 'acpi-7.1-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/rafael/linux-pm

Pull ACPI support fixes from Rafael Wysocki:
 "These fix leftover issues in the ACPI Time and Alarm Device (TAD)
  driver on top of the recently merged updates of it and address
  assorted issues in the ACPI support code:

   - Fix removal code ordering in the ACPI TAD driver, refine timer
     value computations and checks in its RTC class device interface,
     make it use the __ATTRIBUTE_GROUPS() macro, and fix a comment in it
     (Rafael Wysocki)

   - Fix EINJV2 memory error injection in APEI (Tony Luck)

   - Add missing notifier_block structure forward declaration to
     acpi_bus.h (Bartosz Golaszewski)

   - Fix related_cpus inconsistency during CPU hotplug in the ACPI CPPC
     library (Jinjie Ruan)

    [14 lines not shown]
DeltaFile
+30-25drivers/acpi/apei/einj-core.c
+19-16drivers/acpi/acpi_tad.c
+8-0drivers/acpi/video_detect.c
+3-3drivers/acpi/cppc_acpi.c
+6-0include/acpi/actbl1.h
+2-0include/acpi/acpi_bus.h
+68-446 files

Linux/linux 74b54e9fs/smb/client fs_context.c smb2ops.c

Merge tag 'v7.1-rc2-smb3-client-fixes' of git://git.samba.org/sfrench/cifs-2.6

Pull smb client fixes from Steve French:

 - multichannel crediting fix

 - memory allocation improvement for smb2_compound_op

 - remove some dead code

* tag 'v7.1-rc2-smb3-client-fixes' of git://git.samba.org/sfrench/cifs-2.6:
  cifs: change_conf needs to be called for session setup
  smb: client: change allocation requirements in smb2_compound_op
  smb/client: remove unused smb3_parse_opt()
DeltaFile
+0-31fs/smb/client/fs_context.c
+11-0fs/smb/client/smb2ops.c
+1-1fs/smb/client/smb2inode.c
+0-1fs/smb/client/cifsproto.h
+12-334 files

Linux/linux 36a96eddrivers/acpi video_detect.c cppc_acpi.c, drivers/acpi/apei einj-core.c

Merge branches 'acpi-apei', 'acpi-bus', 'acpi-cppc' and 'acpi-video'

Merge assorted ACPI support fixes for 7.1-rc2:

 - Fix EINJV2 memory error injection in APEI (Tony Luck)

 - Add missing notifier_block structure forward declaration to
   acpi_bus.h (Bartosz Golaszewski)

 - Fix related_cpus inconsistency during CPU hotplug in the ACPI CPPC
   library (Jinjie Ruan)

 - Add a quirk to force native backlight on HP OMEN 16 (8A44) in the
   ACPI video bus driver (Shivam Kalra)

* acpi-apei:
  ACPI: APEI: EINJ: Fix EINJV2 memory error injection
  ACPICA: Provide #defines for EINJV2 error types


    [8 lines not shown]
DeltaFile
+30-25drivers/acpi/apei/einj-core.c
+8-0drivers/acpi/video_detect.c
+3-3drivers/acpi/cppc_acpi.c
+6-0include/acpi/actbl1.h
+2-0include/acpi/acpi_bus.h
+49-285 files

Linux/linux 08d0d34drivers/net/bonding bond_3ad.c, drivers/net/ethernet/intel/ice ice_dpll.c

Merge tag 'net-7.1-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net

Pull networking fixes from Paolo Abeni:
 "Including fixes from netfilter.

  Current release - regressions:

   - ipmr: free mr_table after RCU grace period.

  Previous releases - regressions:

   - core: add net_iov_init() and use it to initialize ->page_type

   - sched: taprio: fix NULL pointer dereference in class dump

   - netfilter: nf_tables:
      - use list_del_rcu for netlink hooks
      - fix strict mode inbound policy matching


    [53 lines not shown]
DeltaFile
+225-89net/netfilter/nf_tables_api.c
+113-104net/sched/sch_cake.c
+118-34net/netfilter/nf_conntrack_sip.c
+134-12drivers/net/ethernet/intel/ice/ice_dpll.c
+60-49drivers/net/bonding/bond_3ad.c
+58-50net/ipv4/ipmr.c
+708-33868 files not shown
+1,351-60374 files

Linux/linux 6cd7026drivers/ata/pata_parport pata_parport.c

Merge tag 'ata-7.1-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/libata/linux

Pull ata fix from Niklas Cassel:

 - Fix a reference leak on device_register() failure in pata_parport

* tag 'ata-7.1-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/libata/linux:
  ata: pata_parport: switch to dynamic root device
DeltaFile
+7-14drivers/ata/pata_parport/pata_parport.c
+7-141 files

Linux/linux 2aa0a36sound/core/oss pcm_oss.c, sound/drivers aloop.c

Merge tag 'sound-7.1-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound

Pull sound fixes from Takashi Iwai:
 "A bunch of small fixes. One minor fix is found in the core side for
  data race in PCM OSS layer, while remaining changes are various
  device-specific fixes and quirks.

   - Core: PCM OSS data race fix

   - HD-audio: Fixes for TAS2781, CS35L56, and Realtek/Conexant quirks;
     avoidance of a WARN_ON for HDMI channel mapping

   - USB-audio: Improvements in UAC3 parsing robustness (leaks, size
     checks) and fixes for potential endless loops

   - ASoC: Driver-specific fixes for CS35L56, Intel bytcr_wm5102,
     Spacemit, AW88395, and others, plus a new quirk for Steam Deck
     OLED


    [25 lines not shown]
DeltaFile
+25-37sound/usb/stream.c
+34-15sound/soc/spacemit/k1_i2s.c
+30-13sound/drivers/aloop.c
+21-10sound/hda/codecs/side-codecs/cs35l56_hda.c
+23-6sound/core/oss/pcm_oss.c
+25-1sound/soc/codecs/wcd937x.c
+158-8226 files not shown
+266-12232 files

Linux/linux 1e01abenet/sched cls_flower.c

net/sched: cls_flower: revert unintended changes

While applying the blamed commit 4ca07b9239bd ("net: mctp i2c: check
length before marking flow active"), I unintentionally included
unrelated and unacceptable changes.

Revert them.

Fixes: 4ca07b9239bd ("net: mctp i2c: check length before marking flow active")
Reported-by: Jeremy Kerr <jk at codeconstruct.com.au>
Closes: https://lore.kernel.org/netdev/bd8704fe0bd53e278add5cde4873256656623e2e.camel@codeconstruct.com.au/
Signed-off-by: Paolo Abeni <pabeni at redhat.com>
Link: https://patch.msgid.link/043026a53ff84da88b17648c4b0d17f0331749cb.1777447863.git.pabeni@redhat.com
Signed-off-by: Paolo Abeni <pabeni at redhat.com>
DeltaFile
+1-3net/sched/cls_flower.c
+1-31 files

Linux/linux 051ffb0drivers/net/ethernet/sfc efx_devlink.c

sfc: fix error code in efx_devlink_info_running_versions()

Return -EIO if efx_mcdi_rpc() doesn't return enough space.

Fixes: 14743ddd2495 ("sfc: add devlink info support for ef100")
Signed-off-by: Dan Carpenter <error27 at gmail.com>
Reviewed-by: Edward Cree <ecree.xilinx at gmail.com>
Link: https://patch.msgid.link/afGpsbLRHL4_H0KS@stanley.mountain
Signed-off-by: Paolo Abeni <pabeni at redhat.com>
DeltaFile
+1-1drivers/net/ethernet/sfc/efx_devlink.c
+1-11 files

Linux/linux 5868949net/tls tls_strp.c tls_sw.c

net: tls: fix strparser anchor skb leak on offload RX setup failure

When tls_set_device_offload_rx() fails at tls_dev_add(), the error path
calls tls_sw_free_resources_rx() to clean up the SW context that was
initialized by tls_set_sw_offload(). This function calls
tls_sw_release_resources_rx() (which stops the strparser via
tls_strp_stop()) and tls_sw_free_ctx_rx() (which kfrees the context),
but never frees the anchor skb that was allocated by alloc_skb(0) in
tls_strp_init().

Note that tls_sw_free_resources_rx() is exclusively used for this
"failed to start offload" code path, there's no other caller.

The leak did not exist before commit 84c61fe1a75b ("tls: rx: do not use
the standard strparser"), because the standard strparser doesn't try
to pre-allocate an skb.

The normal close path in tls_sk_proto_close() handles cleanup by calling
tls_sw_strparser_done() (which calls tls_strp_done()) after dropping

    [8 lines not shown]
DeltaFile
+6-0net/tls/tls_strp.c
+4-0net/tls/tls_sw.c
+1-0net/tls/tls.h
+11-03 files

Linux/linux 4788859drivers/dpll dpll_netlink.c, drivers/net/ethernet/intel/iavf iavf_virtchnl.c iavf_main.c

Merge branch 'intel-wired-lan-update-2026-04-27-ice-iavf'

Jacob Keller says:

====================
Intel Wired LAN Update 2026-04-27 (ice, iavf)

Petr Oros from RedHat has accumulated a number of fixes for the Intel ice
and iavf drivers, bundled together in this series.

First, a series of 4 fixes to resolve issues with the iavf driver logic for
handling VLAN filters. This includes keeping VLAN filters while the
interface is brought down, waiting for confirmation on filter deletion
before deleting filters from the driver tracking structures, and handling
the VIRTCHNL_OP_ADD_VLAN for the old v1 VLAN_ADD command.

A fix for a crash in ice_reset_all_vfs(), properly checking for errors when
ice_vf_rebuild_vsi() fails.


    [22 lines not shown]
DeltaFile
+134-12drivers/net/ethernet/intel/ice/ice_dpll.c
+36-40drivers/net/ethernet/intel/iavf/iavf_virtchnl.c
+12-40drivers/net/ethernet/intel/iavf/iavf_main.c
+10-0drivers/dpll/dpll_netlink.c
+4-5drivers/net/ethernet/intel/iavf/iavf.h
+6-1drivers/net/ethernet/intel/ice/ice_vf_lib.c
+202-985 files not shown
+207-10211 files

Linux/linux 620055cdrivers/dpll dpll_netlink.c dpll_netlink.h, include/linux dpll.h

dpll: export __dpll_pin_change_ntf() for use under dpll_lock

Export __dpll_pin_change_ntf() so that drivers can send pin change
notifications from within pin callbacks, which are already called
under dpll_lock. Using dpll_pin_change_ntf() in that context would
deadlock.

Add lockdep_assert_held() to catch misuse without the lock held.

Acked-by: Vadim Fedorenko <vadim.fedorenko at linux.dev>
Signed-off-by: Ivan Vecera <ivecera at redhat.com>
Signed-off-by: Petr Oros <poros at redhat.com>
Tested-by: Alexander Nowlin <alexander.nowlin at intel.com>
Reviewed-by: Arkadiusz Kubalewski <arkadiusz.kubalewski at intel.com>
Signed-off-by: Jacob Keller <jacob.e.keller at intel.com>
Link: https://patch.msgid.link/20260427-jk-iwl-net-petr-oros-fixes-v1-9-cdcb48303fd8@intel.com
Signed-off-by: Paolo Abeni <pabeni at redhat.com>
DeltaFile
+10-0drivers/dpll/dpll_netlink.c
+0-2drivers/dpll/dpll_netlink.h
+1-0include/linux/dpll.h
+11-23 files

Linux/linux 6f9d839drivers/net/ethernet/intel/ice ice_dpll.c

ice: fix SMA and U.FL pin state changes affecting paired pin

SMA and U.FL pins share physical signal paths in pairs (SMA1/U.FL1 and
SMA2/U.FL2) controlled by the PCA9575 GPIO expander.  Each pair can
only have one active pin at a time: SMA1 output and U.FL1 output share
the same CGU output, SMA2 input and U.FL2 input share the same CGU
input.  The PCA9575 register bits determine which connector in each
pair owns the signal path.

The driver does not account for this pairing in two places:

ice_dpll_ufl_pin_state_set() modifies PCA9575 bits and disables the
backing CGU pin without checking whether the U.FL pin is currently
active.  Disconnecting an already inactive U.FL pin flips bits that
the paired SMA pin relies on, breaking its connection.

ice_dpll_sma_direction_set() does not propagate direction changes to
the paired U.FL pin.  For SMA2/U.FL2 the ICE_SMA2_UFL2_RX_DIS bit is
never managed, so U.FL2 stays disconnected after SMA2 switches to

    [16 lines not shown]
DeltaFile
+49-1drivers/net/ethernet/intel/ice/ice_dpll.c
+49-11 files

Linux/linux 9e5deaddrivers/net/ethernet/intel/ice ice_dpll.c

ice: add dpll peer notification for paired SMA and U.FL pins

SMA and U.FL pins share physical signal paths in pairs (SMA1/U.FL1 and
SMA2/U.FL2).  When one pin's state changes via a PCA9575 GPIO write,
the paired pin's state also changes, but no notification is sent for
the peer pin.  Userspace consumers monitoring the peer via dpll netlink
subscribe never learn about the update.

Add ice_dpll_sw_pin_notify_peer() which sends a change notification for
the paired SW pin.  Call it from ice_dpll_pin_sma_direction_set(),
ice_dpll_sma_pin_state_set(), and ice_dpll_ufl_pin_state_set() after
pf->dplls.lock is released.  Use __dpll_pin_change_ntf() because
dpll_lock is still held by the dpll netlink layer (dpll_pin_pre_doit).

Fixes: 2dd5d03c77e2 ("ice: redesign dpll sma/u.fl pins control")
Signed-off-by: Petr Oros <poros at redhat.com>
Tested-by: Alexander Nowlin <alexander.nowlin at intel.com>
Reviewed-by: Arkadiusz Kubalewski <arkadiusz.kubalewski at intel.com>
Reviewed-by: Aleksandr Loktionov <aleksandr.loktionov at intel.com>

    [3 lines not shown]
DeltaFile
+32-0drivers/net/ethernet/intel/ice/ice_dpll.c
+32-01 files

Linux/linux 1a41b58drivers/net/ethernet/intel/ice ice_dpll.c

ice: fix missing dpll notifications for SW pins

The SMA/U.FL pin redesign (commit 2dd5d03c77e2 ("ice: redesign dpll
sma/u.fl pins control")) introduced software-controlled pins that wrap
backing CGU input/output pins, but never updated the notification and
data paths to propagate pin events to these SW wrappers.

The periodic work sends dpll_pin_change_ntf() only for direct CGU input
pins.  SW pins that wrap these inputs never receive change or phase
offset notifications, so userspace consumers such as synce4l monitoring
SMA pins via dpll netlink never learn about state transitions or phase
offset updates.  Similarly, ice_dpll_phase_offset_get() reads the SW
pin's own phase_offset field which is never updated; the PPS monitor
writes to the backing CGU input's field instead.

Fix by introducing ice_dpll_pin_ntf(), a wrapper around
dpll_pin_change_ntf() that also notifies any registered SMA/U.FL pin
whose backing CGU input matches.  Replace all direct
dpll_pin_change_ntf() calls in the periodic notification paths with

    [12 lines not shown]
DeltaFile
+36-11drivers/net/ethernet/intel/ice/ice_dpll.c
+36-111 files

Linux/linux bbcbe4edrivers/net/ethernet/intel/iavf iavf_virtchnl.c iavf_main.c

iavf: wait for PF confirmation before removing VLAN filters

The VLAN filter DELETE path was asymmetric with the ADD path: ADD
waits for PF confirmation (ADD -> ADDING -> ACTIVE), but DELETE
immediately frees the filter struct after sending the DEL message
without waiting for the PF response.

This is problematic because:
 - If the PF rejects the DEL, the filter remains in HW but the driver
   has already freed the tracking structure, losing sync.
 - Race conditions between DEL pending and other operations
   (add, reset) cannot be properly resolved if the filter struct
   is already gone.

Add IAVF_VLAN_REMOVING state to make the DELETE path symmetric:

  REMOVE -> REMOVING (send DEL) -> PF confirms -> kfree
                                -> PF rejects  -> ACTIVE


    [28 lines not shown]
DeltaFile
+25-12drivers/net/ethernet/intel/iavf/iavf_virtchnl.c
+8-5drivers/net/ethernet/intel/iavf/iavf_main.c
+1-0drivers/net/ethernet/intel/iavf/iavf.h
+34-173 files

Linux/linux 70ad216drivers/net/ethernet/intel/ice ice_common.c ice_main.c, drivers/net/ethernet/intel/ice/devlink devlink.c

ice: fix infinite recursion in ice_cfg_tx_topo via ice_init_dev_hw

On certain E810 configurations where firmware supports Tx scheduler
topology switching (tx_sched_topo_comp_mode_en), ice_cfg_tx_topo()
may need to apply a new 5-layer or 9-layer topology from the DDP
package. If the AQ command to set the topology fails (e.g. due to
invalid DDP data or firmware limitations), the global configuration
lock must still be cleared via a CORER reset.

Commit 86aae43f21cf ("ice: don't leave device non-functional if Tx
scheduler config fails") correctly fixed this by refactoring
ice_cfg_tx_topo() to always trigger CORER after acquiring the global
lock and re-initialize hardware via ice_init_hw() afterwards.

However, commit 8a37f9e2ff40 ("ice: move ice_deinit_dev() to the end
of deinit paths") later moved ice_init_dev_hw() into ice_init_hw(),
breaking the reinit path introduced by 86aae43f21cf. This creates an
infinite recursive call chain:


    [30 lines not shown]
DeltaFile
+2-0drivers/net/ethernet/intel/ice/devlink/devlink.c
+0-2drivers/net/ethernet/intel/ice/ice_common.c
+2-0drivers/net/ethernet/intel/ice/ice_main.c
+4-23 files

Linux/linux 34d3331drivers/net/ethernet/intel/iavf iavf_virtchnl.c

iavf: add VIRTCHNL_OP_ADD_VLAN to success completion handler

The V1 ADD_VLAN opcode had no success handler; filters sent via V1
stayed in ADDING state permanently.  Add a fallthrough case so V1
filters also transition ADDING -> ACTIVE on PF confirmation.

Critically, add an `if (v_retval) break` guard: the error switch in
iavf_virtchnl_completion() does NOT return after handling errors,
it falls through to the success switch.  Without this guard, a
PF-rejected ADD would incorrectly mark ADDING filters as ACTIVE,
creating a driver/HW mismatch where the driver believes the filter
is installed but the PF never accepted it.

For V2, this is harmless: iavf_vlan_add_reject() in the error
block already kfree'd all ADDING filters, so the success handler
finds nothing to transition.

Fixes: 968996c070ef ("iavf: Fix VLAN_V2 addition/rejection")
Signed-off-by: Petr Oros <poros at redhat.com>

    [6 lines not shown]
DeltaFile
+4-0drivers/net/ethernet/intel/iavf/iavf_virtchnl.c
+4-01 files

Linux/linux f2ce65bdrivers/net/ethernet/intel/iavf iavf_main.c iavf_virtchnl.c

iavf: stop removing VLAN filters from PF on interface down

When a VF goes down, the driver currently sends DEL_VLAN to the PF for
every VLAN filter (ACTIVE -> DISABLE -> send DEL -> INACTIVE), then
re-adds them all on UP (INACTIVE -> ADD -> send ADD -> ADDING ->
ACTIVE). This round-trip is unnecessary because:

 1. The PF disables the VF's queues via VIRTCHNL_OP_DISABLE_QUEUES,
    which already prevents all RX/TX traffic regardless of VLAN filter
    state.

 2. The VLAN filters remaining in PF HW while the VF is down is
    harmless - packets matching those filters have nowhere to go with
    queues disabled.

 3. The DEL+ADD cycle during down/up creates race windows where the
    VLAN filter list is incomplete. With spoofcheck enabled, the PF
    enables TX VLAN filtering on the first non-zero VLAN add, blocking
    traffic for any VLANs not yet re-added.

    [22 lines not shown]
DeltaFile
+4-35drivers/net/ethernet/intel/iavf/iavf_main.c
+6-27drivers/net/ethernet/intel/iavf/iavf_virtchnl.c
+2-4drivers/net/ethernet/intel/iavf/iavf.h
+12-663 files

Linux/linux 54ef024drivers/net/ethernet/intel/ice ice_vf_lib.c

ice: fix NULL pointer dereference in ice_reset_all_vfs()

ice_reset_all_vfs() ignores the return value of ice_vf_rebuild_vsi().
When the VSI rebuild fails (e.g. during NVM firmware update via
nvmupdate64e), ice_vsi_rebuild() tears down the VSI on its error path,
leaving txq_map and rxq_map as NULL. The subsequent unconditional call
to ice_vf_post_vsi_rebuild() leads to a NULL pointer dereference in
ice_ena_vf_q_mappings() when it accesses vsi->txq_map[0].

The single-VF reset path in ice_reset_vf() already handles this
correctly by checking the return value of ice_vf_reconfig_vsi() and
skipping ice_vf_post_vsi_rebuild() on failure.

Apply the same pattern to ice_reset_all_vfs(): check the return value
of ice_vf_rebuild_vsi() and skip ice_vf_post_vsi_rebuild() and
ice_eswitch_attach_vf() on failure. The VF is left safely disabled
(ICE_VF_STATE_INIT not set, VFGEN_RSTAT not set to VFACTIVE) and can
be recovered via a VFLR triggered by a PCI reset of the VF
(sysfs reset or driver rebind).

    [75 lines not shown]
DeltaFile
+6-1drivers/net/ethernet/intel/ice/ice_vf_lib.c
+6-11 files

Linux/linux 56a643adrivers/net/ethernet/intel/ice ice_dpll.c

ice: fix missing SMA pin initialization in DPLL subsystem

The DPLL SMA/U.FL pin redesign introduced ice_dpll_sw_pin_frequency_get()
which gates frequency reporting on the pin's active flag. This flag is
determined by ice_dpll_sw_pins_update() from the PCA9575 GPIO expander
state. Before the redesign, SMA pins were exposed as direct HW
input/output pins and ice_dpll_frequency_get() returned the CGU
frequency unconditionally — the PCA9575 state was never consulted.

The PCA9575 powers on with all outputs high, setting ICE_SMA1_DIR_EN,
ICE_SMA1_TX_EN, ICE_SMA2_DIR_EN and ICE_SMA2_TX_EN. Nothing in the
driver writes the register during initialization, so
ice_dpll_sw_pins_update() sees all pins as inactive and
ice_dpll_sw_pin_frequency_get() permanently returns 0 Hz for every
SW pin.

Fix this by writing a default SMA configuration in
ice_dpll_init_info_sw_pins(): clear all SMA bits, then set SMA1 and
SMA2 as active inputs (DIR_EN=0) with U.FL1 output and U.FL2 input

    [16 lines not shown]
DeltaFile
+17-0drivers/net/ethernet/intel/ice/ice_dpll.c
+17-01 files

Linux/linux 70d62b6drivers/net/ethernet/intel/iavf iavf_virtchnl.c iavf.h

iavf: rename IAVF_VLAN_IS_NEW to IAVF_VLAN_ADDING

Rename the IAVF_VLAN_IS_NEW state to IAVF_VLAN_ADDING to better
describe what the state represents: an ADD request has been sent to
the PF and is waiting for a response.

This is a pure rename with no behavioral change, preparing for a
cleanup of the VLAN filter state machine.

Signed-off-by: Petr Oros <poros at redhat.com>
Reviewed-by: Aleksandr Loktionov <aleksandr.loktionov at intel.com>
Tested-by: Rafal Romanowski <rafal.romanowski at intel.com>
Reviewed-by: Simon Horman <horms at kernel.org>
Reviewed-by: Przemek Kitszel <przemyslaw.kitszel at intel.com>
Signed-off-by: Jacob Keller <jacob.e.keller at intel.com>
Link: https://patch.msgid.link/20260427-jk-iwl-net-petr-oros-fixes-v1-1-cdcb48303fd8@intel.com
Signed-off-by: Paolo Abeni <pabeni at redhat.com>
DeltaFile
+4-4drivers/net/ethernet/intel/iavf/iavf_virtchnl.c
+1-1drivers/net/ethernet/intel/iavf/iavf.h
+5-52 files

Linux/linux e75a43cinclude/linux tracepoint.h, kernel/trace trace_branch.c trace_probe.c

Merge tag 'trace-v7.1-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/trace/linux-trace

Pull tracing fixes from Steven Rostedt:

 - Fix inverted check of registering the stats for branch tracing

   When calling register_stat_tracer() which returns zero on success and
   negative on error, the callers were checking the return of zero as an
   error and printing a warning message. Because this was just a normal
   printk() message and not a WARN(), it wasn't caught in any testing.

   Fix the check to print the warning message when an error actually
   happens.

 - Fix a typo in a comment in tracepoint.h

 - Limit the size of event probes to 3K in size

   It is possible to create a dynamic event probe via the tracefs system

    [11 lines not shown]
DeltaFile
+4-4kernel/trace/trace_branch.c
+6-0kernel/trace/trace_probe.c
+3-1kernel/trace/trace_probe.h
+1-1include/linux/tracepoint.h
+14-64 files

Linux/linux 5ef3436net/core page_pool.c

page_pool: fix memory-provider leak in page_pool_create_percpu() error path

When page_pool_create_percpu() fails on page_pool_list(), it falls
through to its err_uninit: label, which calls page_pool_uninit().
At that point page_pool_init() has already taken two references
when the user requested PP_FLAG_ALLOW_UNREADABLE_NETMEM:

        pool->mp_ops->init(pool)
        static_branch_inc(&page_pool_mem_providers);

Neither is undone by page_pool_uninit(); both are only undone by
__page_pool_destroy() (success-side teardown). The error path
therefore leaks the per-provider reference taken by mp_ops->init
(io_zcrx_ifq->refs in the io_uring zcrx provider, the dmabuf
binding refcount in the devmem provider) plus one increment of
the page_pool_mem_providers static branch on every failure of
xa_alloc_cyclic() inside page_pool_list().

The leaked io_zcrx_ifq->refs in turn pins everything

    [46 lines not shown]
DeltaFile
+5-5net/core/page_pool.c
+5-51 files

Linux/linux c4f050cdrivers/net/bonding bond_3ad.c bond_sysfs_slave.c, include/net bond_3ad.h

bonding: 3ad: implement proper RCU rules for port->aggregator

syzbot found a data-race in bond_3ad_get_active_agg_info /
bond_3ad_state_machine_handler [1] which hints at lack of proper
RCU implementation.

Add __rcu qualifier to port->aggregator, and add proper RCU API.

[1]

BUG: KCSAN: data-race in bond_3ad_get_active_agg_info / bond_3ad_state_machine_handler

write to 0xffff88813cf5c4b0 of 8 bytes by task 36 on cpu 0:
  ad_port_selection_logic drivers/net/bonding/bond_3ad.c:1659 [inline]
  bond_3ad_state_machine_handler+0x9d5/0x2d60 drivers/net/bonding/bond_3ad.c:2569
  process_one_work kernel/workqueue.c:3302 [inline]
  process_scheduled_works+0x4f0/0x9c0 kernel/workqueue.c:3385
  worker_thread+0x58a/0x780 kernel/workqueue.c:3466
  kthread+0x22a/0x280 kernel/kthread.c:436

    [53 lines not shown]
DeltaFile
+60-49drivers/net/bonding/bond_3ad.c
+11-6drivers/net/bonding/bond_sysfs_slave.c
+10-6drivers/net/bonding/bond_netlink.c
+5-3drivers/net/bonding/bond_main.c
+2-1drivers/net/bonding/bond_procfs.c
+1-1include/net/bond_3ad.h
+89-666 files

Linux/linux 4ca0129drivers/net/ethernet/airoha airoha_eth.c

net: airoha: Do not return err in ndo_stop() callback

Always complete the airoha_dev_stop() routine regardless of the
airoha_set_vip_for_gdm_port() return value, since errors from
ndo_stop() are ignored by the networking stack and the interface is
always considered down after the call.

Fixes: 23020f049327 ("net: airoha: Introduce ethernet support for EN7581 SoC")
Signed-off-by: Lorenzo Bianconi <lorenzo at kernel.org>
Link: https://patch.msgid.link/20260428-airoha-ndo-stop-not-err-v1-1-674506d29a91@kernel.org
Signed-off-by: Jakub Kicinski <kuba at kernel.org>
DeltaFile
+2-5drivers/net/ethernet/airoha/airoha_eth.c
+2-51 files

Linux/linux b316812net/vmw_vsock hyperv_transport.c

hv_sock: fix ARM64 support

VMBUS ring buffers must be page aligned. Therefore, the current value of
24K presents a challenge on ARM64 kernels (with 64K pages). So, use
VMBUS_RING_SIZE() to ensure they are always aligned and large enough to
hold all of the relevant data.

Cc: stable at vger.kernel.org
Fixes: 77ffe33363c0 ("hv_sock: use HV_HYP_PAGE_SIZE for Hyper-V communication")
Tested-by: Dexuan Cui <decui at microsoft.com>
Reviewed-by: Dexuan Cui <decui at microsoft.com>
Signed-off-by: Hamza Mahfooz <hamzamahfooz at linux.microsoft.com>
Acked-by: Stefano Garzarella <sgarzare at redhat.com>
Link: https://patch.msgid.link/20260428125339.13963-1-hamzamahfooz@linux.microsoft.com
Signed-off-by: Jakub Kicinski <kuba at kernel.org>
DeltaFile
+2-2net/vmw_vsock/hyperv_transport.c
+2-21 files

Linux/linux e73cafa. MAINTAINERS

MAINTAINERS: update the IPv4/IPv6 entry and add Ido Schimmel

The IPv4/IPv6 and routing code is not very well separated from
the TCP/UDP code. Scope it down properly by providing a more
accurate file list, instead of net/ipv4/ and net/ipv6/

Now that the entry is more accurately representing layer 3
and routing merge in the nexthop entry into it.

Add Ido Schimmel as a co-maintainer, Ido's git history speaks
for itself.

Reviewed-by: David Ahern <dsahern at kernel.org>
Reviewed-by: Ido Schimmel <idosch at nvidia.com>
Reviewed-by: Nikolay Aleksandrov <razor at blackwall.org>
Link: https://patch.msgid.link/20260428203924.1229169-1-kuba@kernel.org
Signed-off-by: Jakub Kicinski <kuba at kernel.org>
DeltaFile
+47-16MAINTAINERS
+47-161 files

Linux/linux 72e9647tools/testing/selftests/drivers/net README.rst

selftests: drv-net: clarify linters and frameworks in README

Minor clarifications in the README:
 - call out what linters we expect to be clean
 - make it clear that by "frameworks" we mean code under lib/
   not just factoring code out in the same file

Signed-off-by: Jakub Kicinski <kuba at kernel.org>

DeltaFile
+8-2tools/testing/selftests/drivers/net/README.rst
+8-21 files

Linux/linux c3388f8. MAINTAINERS

MAINTAINERS: Add myself as NFC subsystem maintainer

Add myself and update the mailing list.

Signed-off-by: David Heidelberg <david at ixit.cz>
Signed-off-by: Jakub Kicinski <kuba at kernel.org>
DeltaFile
+4-2MAINTAINERS
+4-21 files