Linux/linux 45255eaDocumentation/admin-guide/pm amd-pstate.rst intel_pstate.rst, drivers/cpufreq amd-pstate-ut.c amd-pstate.c

Merge tag 'pm-7.1-rc5' of git://git.kernel.org/pub/scm/linux/kernel/git/rafael/linux-pm

Pull power management fixes from Rafael Wysocki:
 "These fix maximum frequency computation in the intel_pstate driver for
  two processor models, update its documentation and fix issues related
  to the dynamic EPP support (added during the current development
  cycle) in the amd-pstate driver:

   - Fix maximum frequency computation in the intel_pstate driver for
     Raptor Lake-E and Bartlett Lake that are SMP platforms derived from
     hybrid ones (Rafael Wysocki, Henry Tseng)

   - Fix the description of asymmetric packing with SMT in the
     intel_pstate driver documentation (Ricardo Neri)

   - Fix multiple amd-pstate driver issues related to dynamic EPP
     support added recently, including making it opt-in only (K Prateek
     Nayak, Mario Limonciello)"


    [11 lines not shown]
DeltaFile
+29-7drivers/cpufreq/amd-pstate-ut.c
+18-9drivers/cpufreq/amd-pstate.c
+0-12drivers/cpufreq/Kconfig.x86
+5-6Documentation/admin-guide/pm/amd-pstate.rst
+6-5Documentation/admin-guide/pm/intel_pstate.rst
+2-1drivers/cpufreq/intel_pstate.c
+60-406 files

Linux/linux 28222dcdrivers/acpi battery.c

Merge tag 'acpi-7.1-rc5' of git://git.kernel.org/pub/scm/linux/kernel/git/rafael/linux-pm

Pull ACPI support fix from Rafael Wysocki:
 "Unbreak system wakeup on critical battery status in the ACPI battery
  driver inadvertently broken during the 7.0 development cycle"

* tag 'acpi-7.1-rc5' of git://git.kernel.org/pub/scm/linux/kernel/git/rafael/linux-pm:
  ACPI: battery: Fix system wakeup on critical battery status
DeltaFile
+3-1drivers/acpi/battery.c
+3-11 files

Linux/linux ef7f594arch/arm64/include/asm tlb.h insn.h

Merge tag 'arm64-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux

Pull arm64 fixes from Catalin Marinas:

 - Handle probe on hinted conditional branch instructions.

   BC.cond instructions can be simulated in the same way as B.cond
   instructions, so extend the decode mask for B.cond to cover BC.cond

 - Flush the walk cache when unsharing PMD tables. Recent changes to
   huge_pmd_unshare() introduced mmu_gather::unshared_tables but the
   arm64 code was still treating the TLB flushing as only targeting leaf
   entries (TLBI VALE1IS).

   Fix it by using non-leaf-only instructions (TLBI VAE1IS) when
   tlb->unshared_tables is set

* tag 'arm64-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux:
  arm64: tlb: Flush walk cache when unsharing PMD tables
  arm64: probes: Handle probes on hinted conditional branch instructions
DeltaFile
+2-1arch/arm64/include/asm/tlb.h
+1-1arch/arm64/include/asm/insn.h
+3-22 files

Linux/linux cbadb98arch/s390/kernel perf_pai.c topology.c, drivers/s390/cio chsc_sch.c chsc.c

Merge tag 's390-7.1-3' of git://git.kernel.org/pub/scm/linux/kernel/git/s390/linux

Pull s390 fixes from Alexander Gordeev:

 - Fix PAI NNPA mismatch between counting and recording, where sampling
   reports twice the value

 - Fix loss of PAI counter increments during recording on systems with
   many CPUs under heavy load, while counting is not affected

 - On some supported machines, CHSC cannot access memory outside the DMA
   zone, causing CHSC command failures. Restore GFP_DMA flag when
   allocating memory for CHSC control blocks

 - Align the numbering scheme for higher-level topology structures like
   socket, book, drawer with other hardware identifiers e.g. in sysfs,
   procfs and tools like lscpu

* tag 's390-7.1-3' of git://git.kernel.org/pub/scm/linux/kernel/git/s390/linux:

    [4 lines not shown]
DeltaFile
+21-10arch/s390/kernel/perf_pai.c
+10-10drivers/s390/cio/chsc_sch.c
+7-3arch/s390/kernel/topology.c
+2-2drivers/s390/cio/chsc.c
+1-1drivers/s390/cio/scm.c
+41-265 files

Linux/linux 46de408mm slab_common.c slub.c

Merge tag 'slab-for-7.1-rc4' of git://git.kernel.org/pub/scm/linux/kernel/git/vbabka/slab

Pull slab fix from Vlastimil Babka:

 - Stable fix for a missing cpus_read_lock in one of the cpu sheaves
   flushing paths (Qing Wang)

* tag 'slab-for-7.1-rc4' of git://git.kernel.org/pub/scm/linux/kernel/git/vbabka/slab:
  mm/slub: hold cpus_read_lock around flush_rcu_sheaves_on_cache()
DeltaFile
+2-0mm/slab_common.c
+1-0mm/slub.c
+3-02 files

Linux/linux 1c04dcdkernel/dma debug.c direct.c

Merge tag 'dma-mapping-7.1-2026-05-22' of git://git.kernel.org/pub/scm/linux/kernel/git/mszyprowski/linux

Pull dma-mapping fixes from Marek Szyprowski:
 "Two minor updates for the DMA-mapping code, mainly fixing some rare
  corner cases (Petr Tesarik, Jianpeng Chang)"

* tag 'dma-mapping-7.1-2026-05-22' of git://git.kernel.org/pub/scm/linux/kernel/git/mszyprowski/linux:
  dma-mapping: move dma_map_resource() sanity check into debug code
  dma-direct: fix use of max_pfn
DeltaFile
+8-1kernel/dma/debug.c
+2-2kernel/dma/direct.c
+0-4kernel/dma/mapping.c
+10-73 files

Linux/linux 2388400kernel/trace tracing_map.c trace_events_hist.c

Merge tag 'trace-v7.1-rc4' of git://git.kernel.org/pub/scm/linux/kernel/git/trace/linux-trace

Pull tracing fixes from Steven Rostedt:

 - Avoid NULL return from hist_field_name()

   The function hist_field_name() is directly passed to a strcat() which
   does not handle "NULL" characters. Return a zero length string when
   size is greater than the limit.

   This is used only to output already created histograms and no field
   currently is greater than the limit. But it should still not return
   NULL.

 - Do not call map->ops->elt_free() on allocation failure

   When elt_alloc() fails, it should not call the map->ops->elt_free()
   function if it exists, as that function may not be able to handle the
   free on allocation failures. The ->elt_free() should only be called

    [5 lines not shown]
DeltaFile
+13-4kernel/trace/tracing_map.c
+2-4kernel/trace/trace_events_hist.c
+15-82 files

Linux/linux c2ff476arch/arm64/include/asm tlb.h

arm64: tlb: Flush walk cache when unsharing PMD tables

When huge_pmd_unshare() is called to unshare a PMD table, the
tlb_unshare_pmd_ptdesc() function sets tlb->unshared_tables=true
but the aarch64 tlb_flush() only checked tlb->freed_tables to
determine whether to use TLBF_NONE (vae1is, invalidates walk
cache) or TLBF_NOWALKCACHE (vale1is, leaf-only).

This caused the stale PMD page table entry to remain in the walk cache
after unshare, potentially leading to incorrect page table walks.

Fix by including unshared_tables in the check, so that when
unsharing tables, TLBF_NONE is used and the walk cache is properly
invalidated.

Here is the detailed distinction between vae1is and vale1is:

| Instruction Combination  | Actual Invalidation Scope                         |
| ------------------------ | --------------------------------------------------|

    [9 lines not shown]
DeltaFile
+2-1arch/arm64/include/asm/tlb.h
+2-11 files

Linux/linux 6779b50. MAINTAINERS, drivers/pci/controller pcie-brcmstb.c

Merge tag 'pci-v7.1-fixes-2' of git://git.kernel.org/pub/scm/linux/kernel/git/pci/pci

Pull PCI fixes from Bjorn Helgaas:

 - Remove obsolete PCIe maintainer addresses (Florian Eckert, Hans
   Zhang)

 - Restore a brcmstb link speed assignment that was inadvertently
   removed, reducing bcm2712 performance (Florian Fainelli)

* tag 'pci-v7.1-fixes-2' of git://git.kernel.org/pub/scm/linux/kernel/git/pci/pci:
  PCI: brcmstb: Assign pcie->gen from of_pci_get_max_link_speed()
  MAINTAINERS: Remove Jianjun Wang as PCIe mediatek maintainer
  MAINTAINERS: Remove Chuanhua Lei as PCIe intel-gw maintainer
DeltaFile
+1-3MAINTAINERS
+3-1drivers/pci/controller/pcie-brcmstb.c
+4-42 files

Linux/linux 68993ceDocumentation/networking/device_drivers/ethernet/3com 3c509.rst, drivers/net/dsa mt7530.c

Merge tag 'net-7.1-rc5' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net

Pull networking fixes from Jakub Kicinski:
 "Including fixes from Bluetooth, wireless and netfilter.

  Craziness continues with no end in sight. Even discounting the driver
  revert this is a pretty huge PR for standards of the previous era. I'd
  speculate - we haven't seen the worst of it, yet. Good news, I guess,
  is that so far we haven't seen many (any?) cases of "AI reported a
  bug, we fixed it and a real user regressed".

  Current release - fix to a fix:

   - Bluetooth: btmtk: accept too short WMT FUNC_CTRL events

   - vsock/virtio: relax the recently added memory limit a little

  Current release - regressions:


    [53 lines not shown]
DeltaFile
+1,543-0drivers/net/ethernet/3com/3c509.c
+249-0Documentation/networking/device_drivers/ethernet/3com/3c509.rst
+122-65net/netfilter/ipvs/ip_vs_ctl.c
+67-93net/rxrpc/rxgk.c
+93-67drivers/net/dsa/mt7530.c
+112-19drivers/net/wireless/ath/ath11k/wmi.c
+2,186-244181 files not shown
+4,452-1,287187 files

Linux/linux 6d3b267drivers/block rbd.c

Merge tag 'ceph-for-7.1-rc5' of https://github.com/ceph/ceph-client

Pull ceph fix from Ilya Dryomov:
 "A fix for an 'rbd unmap' race condition which popped up on a
  production setup where many RBD devices are frequently mapped and
  unmapped, marked for stable"

* tag 'ceph-for-7.1-rc5' of https://github.com/ceph/ceph-client:
  rbd: eliminate a race in lock_dwork draining on unmap
DeltaFile
+8-12drivers/block/rbd.c
+8-121 files

Linux/linux 7acfa2carch/alpha/include/asm Kbuild, arch/arm64/include/asm ring_buffer.h

Merge tag 'trace-ringbuffer-v7.1-rc4' of git://git.kernel.org/pub/scm/linux/kernel/git/trace/linux-trace

Pull ring-buffer fixes from Steven Rostedt:

 - Fix reporting MISSED EVENTS in trace iterator

   When the "trace" file is read with tracing enabled, if the writer
   were to pass the iterator reader, it resets, sets a "missed_events"
   flag and continues. The tracing output checks for missed events and
   if there are some, it prints out "[LOST EVENTS]" to let the user know
   events were dropped.

   But the clearing of the missed_events happened when the tracing
   system queried the ring buffer iterator about missed events. This was
   premature as the ring buffer is per CPU, and the tracing code reads
   all the CPU buffers and checks for missed events when it is read. If
   the CPU iterator that had missed events isn't printed next, the
   output for the LOST EVENTS is lost.


    [37 lines not shown]
DeltaFile
+25-5kernel/trace/ring_buffer.c
+13-0include/asm-generic/ring_buffer.h
+10-0arch/arm64/include/asm/ring_buffer.h
+2-2kernel/trace/simple_ring_buffer.c
+2-1kernel/trace/Makefile
+1-0arch/alpha/include/asm/Kbuild
+53-819 files not shown
+72-825 files

Linux/linux 0e3c08fdrivers/net/wireless/ath/ath10k wmi.c, drivers/net/wireless/ath/ath11k wmi.c

Merge tag 'wireless-2026-05-21' of https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless

Johannes Berg says:

====================
Quite a few more updates:
 - cfg80211/mac80211:
   - various security(-ish) fixes
   - fix A-MSDU subframe handling
   - fix multi-link element parsing
 - ath10: avoid sending commands to dead device
 - ath11k:
   - fix WMI buffer leaks on error conditions
   - fix UAF in RX MSDU coalesce path
   - allow peer ID 0 on RX path (legal for mobile devices)
   - reinitialize shared SRNG pointers on restart
 - ath12k:
   - fix 20 MHz-only parsing of EHT-MCS map
 - iwlwifi:

    [34 lines not shown]
DeltaFile
+112-19drivers/net/wireless/ath/ath11k/wmi.c
+64-43net/mac80211/parse.c
+18-9drivers/net/wireless/intel/iwlwifi/mvm/mac-ctxt.c
+8-9drivers/net/wireless/ath/ath10k/wmi.c
+14-1drivers/net/wireless/intel/iwlwifi/mld/tx.c
+4-10drivers/net/wireless/intel/iwlwifi/mvm/utils.c
+220-9115 files not shown
+276-12421 files

Linux/linux 758c807drivers/firmware/efi efi.c sysfb_efi.c, include/linux efi.h

Merge tag 'efi-fixes-for-v7.1-2' of git://git.kernel.org/pub/scm/linux/kernel/git/efi/efi

Pull EFI fixes from Ard Biesheuvel:

 - Permit ACPI PRM runtime firmware calls when acpi_init() runs

 - Add another Lenovo Ideapad framebuffer quirk

 - Cosmetic tweak

* tag 'efi-fixes-for-v7.1-2' of git://git.kernel.org/pub/scm/linux/kernel/git/efi/efi:
  efi: sysfb_efi: Extend quirk to cover IdeaPad Duet 3 10IGL5-LTE
  efi: efi.h: Remove extra semicolon
  efi: Allocate runtime workqueue before ACPI init
DeltaFile
+16-12drivers/firmware/efi/efi.c
+6-3drivers/firmware/efi/sysfb_efi.c
+1-1include/linux/efi.h
+23-163 files

Linux/linux c33f944drivers/net/ethernet/freescale/enetc enetc_msg.c enetc_pf.c

Merge branch 'net-enetc-sr-iov-robustness-and-security-fixes'

Wei Fang says:

====================
net: enetc: SR-IOV robustness and security fixes

This patch series addresses a number of robustness, security, and
correctness issues in the ENETC driver's SR-IOV subsystem, focusing
primarily on the VF-to-PF mailbox communication path.

The series can be grouped into the following categories:

1. DoS and security fixes:
   - Prevent an unbounded loop DoS in the VF-to-PF message handler,
     which could be triggered by a malicious or misbehaving VF.
   - Fix a TOCTOU (Time-of-Check-Time-of-Use) race and add proper
     validation of VF MAC addresses to prevent spoofing or invalid
     configuration from being applied.

    [34 lines not shown]
DeltaFile
+59-49drivers/net/ethernet/freescale/enetc/enetc_msg.c
+56-19drivers/net/ethernet/freescale/enetc/enetc_pf.c
+12-3drivers/net/ethernet/freescale/enetc/enetc_hw.h
+1-0drivers/net/ethernet/freescale/enetc/enetc_pf.h
+128-714 files

Linux/linux 9e68817drivers/net/ethernet/freescale/enetc enetc_pf.c

net: enetc: avoid VF->PF mailbox timeout during SR-IOV teardown

During SR-IOV teardown, enetc_msg_psi_free() disables the MR interrupt
before pci_disable_sriov() removes the VFs. If a VF sends a mailbox
message during this window, the PF cannot receive it, causing the VF to
timeout waiting for a reply.

Since the timeout occurs during SR-IOV teardown when the VF is about to
be removed anyway, it has no functional impact on operation. However,
more messages will be added in the future, some visible error logs may
confuse users. So fix it by calling pci_disable_sriov() first to remove
all VFs, then safely clean up the mailbox resources. This eliminates the
race window where VFs could send messages to an unresponsive PF.

Fixes: beb74ac878c8 ("enetc: Add vf to pf messaging support")
Signed-off-by: Wei Fang <wei.fang at nxp.com>
Reviewed-by: Harshitha Ramamurthy <hramamurthy at google.com>
Link: https://patch.msgid.link/20260520064421.91569-10-wei.fang@nxp.com
Signed-off-by: Jakub Kicinski <kuba at kernel.org>
DeltaFile
+1-1drivers/net/ethernet/freescale/enetc/enetc_pf.c
+1-11 files

Linux/linux 54362b0drivers/net/ethernet/freescale/enetc enetc_msg.c

net: enetc: fix init and teardown order to prevent use of unsafe resources

Sashiko reported a potential issue in enetc_msg_psi_init() where the IRQ
handler is registered before DMA resources are fully initialized [1].

The current initialization sequence is:

  1. request_irq(enetc_msg_psi_msix)    <- IRQ handler registered
  2. INIT_WORK(&pf->msg_task, ...)      <- work_struct initialized
  3. enetc_msg_alloc_mbx()              <- mailbox DMA allocated

This ordering is unsafe because if a spurious interrupt or pending
interrupt from a previous device state fires immediately after
request_irq() returns, the registered ISR enetc_msg_psi_msix() will
execute and unconditionally call:

  schedule_work(&pf->msg_task)

At this point, pf->msg_task has not been initialized by INIT_WORK(), so

    [47 lines not shown]
DeltaFile
+18-17drivers/net/ethernet/freescale/enetc/enetc_msg.c
+18-171 files

Linux/linux c666fa6drivers/net/ethernet/freescale/enetc enetc_pf.c

net: enetc: fix TOCTOU race and validate VF MAC address

Sashiko reported that the PF driver accepts arbitrary MAC address from
from VF mailbox messages without proper validation, creating a security
vulnerability [1].

In enetc_msg_pf_set_vf_primary_mac_addr(), the MAC address is extracted
directly from the message buffer (cmd->mac.sa_data) and programmed into
hardware via pf->ops->set_si_primary_mac() without any validity checks.
A malicious VF can configure a multicast, broadcast, or all-zero MAC
address. Therefore, a validation to check the MAC address provided by VF
is required.

However, simply checking the MAC address is not enough, because it also
has the potential TOCTOU race [2]: The code reads the MAC address from
the DMA buffer to validate it via is_valid_ether_addr(), if validation
passes, reads the same DMA buffer a second time when calling
enetc_pf_set_primary_mac_addr() to program the hardware. A malicious VF
can exploit this window by overwriting the MAC address in the DMA buffer

    [15 lines not shown]
DeltaFile
+30-9drivers/net/ethernet/freescale/enetc/enetc_pf.c
+30-91 files

Linux/linux adb4599drivers/net/ethernet/freescale/enetc enetc_msg.c

net: enetc: fix DMA write to freed memory in enetc_msg_free_mbx()

The teardown sequence in enetc_msg_psi_free() frees the DMA buffer before
clearing the device's DMA address registers. If a VF sends a message or a
pending DMA transfer completes within this window, the hardware will
perform a DMA write into the kernel memory that has already been returned
to the allocator.

The result is silent memory corruption that can affect arbitrary kernel
data structures. Therefore, clear the DMA address registers before the
DMA buffer is freed.

Fixes: beb74ac878c8 ("enetc: Add vf to pf messaging support")
Signed-off-by: Wei Fang <wei.fang at nxp.com>
Reviewed-by: Harshitha Ramamurthy <hramamurthy at google.com>
Link: https://patch.msgid.link/20260520064421.91569-7-wei.fang@nxp.com
Signed-off-by: Jakub Kicinski <kuba at kernel.org>
DeltaFile
+3-3drivers/net/ethernet/freescale/enetc/enetc_msg.c
+3-31 files

Linux/linux f262f5ddrivers/net/ethernet/freescale/enetc enetc_pf.c enetc_pf.h

net: enetc: fix race condition in VF MAC address configuration

Sashiko reported a potential race condition between the VF message
handler and administrative VF MAC configuration from the host [1].

The VF message handler (enetc_msg_pf_set_vf_primary_mac_addr) runs
asynchronously in a workqueue context and accesses vf_state->flags
without any locking. Concurrently, the host can administratively
change the VF MAC address via enetc_pf_set_vf_mac(), which executes
under RTNL lock and modifies both vf_state->flags and hardware
registers.

This creates two race windows:

1) TOCTOU race on vf_state->flags: The check of ENETC_VF_FLAG_PF_SET_MAC
   and subsequent MAC programming are not atomic, allowing the flag state
   to change between check and use.

2) Torn MAC address writes: Hardware MAC programming requires multiple

    [18 lines not shown]
DeltaFile
+10-0drivers/net/ethernet/freescale/enetc/enetc_pf.c
+1-0drivers/net/ethernet/freescale/enetc/enetc_pf.h
+11-02 files

Linux/linux 4a995d3drivers/net/ethernet/freescale/enetc enetc_pf.c

net: enetc: add ratelimiting to VF mailbox error messages

Sashiko reported that a buggy or malicious guest VM can flood the host
kernel log by repeatedly sending VF-to-PF messages at a high rate,
degrading host performance and hiding important system logs [1].

Fix by replacing dev_err()/dev_warn() with dev_err_ratelimited(),
limiting output to the default kernel ratelimit. This ensures errors are
still logged for debugging while preventing log flooding attacks.

Link: https://sashiko.dev/#/patchset/20260511080805.2052495-1-wei.fang%40nxp.com #1
Fixes: beb74ac878c8 ("enetc: Add vf to pf messaging support")
Signed-off-by: Wei Fang <wei.fang at nxp.com>
Reviewed-by: Harshitha Ramamurthy <hramamurthy at google.com>
Link: https://patch.msgid.link/20260520064421.91569-4-wei.fang@nxp.com
Signed-off-by: Jakub Kicinski <kuba at kernel.org>
DeltaFile
+6-4drivers/net/ethernet/freescale/enetc/enetc_pf.c
+6-41 files

Linux/linux f8ae63ddrivers/net/ethernet/freescale/enetc enetc_msg.c enetc_hw.h

net: enetc: fix unbounded loop and interrupt handling in VF-to-PF messaging

The enetc_msg_task() function has several issues that need to be addressed:

1. Unbounded loop causing potential DoS:

enetc_msg_task() processes VF-to-PF mailbox messages in an unbounded
for(;;) loop that keeps polling ENETC_PSIMSGRR until no MR bits are set.
A malicious guest VM can exploit this by continuously sending messages at
a high rate - immediately sending a new message as soon as the PF
acknowledges the previous one. Since the worker thread never yields or
enforces a processing budget, the mr_mask check frequently evaluates to
non-zero, causing the PF to spin indefinitely and starving other tasks.

Fix this by replacing the unbounded loop with a single snapshot read at
task entry. The task processes only the VFs whose MR bits were set at
that point, then re-enables message interrupts before returning. This
bounds work per invocation to at most num_vfs iterations. No messages are
lost because the message interrupt is disabled in enetc_msg_psi_msix()

    [42 lines not shown]
DeltaFile
+37-28drivers/net/ethernet/freescale/enetc/enetc_msg.c
+12-3drivers/net/ethernet/freescale/enetc/enetc_hw.h
+49-312 files

Linux/linux 5027266drivers/net/ethernet/freescale/enetc enetc_pf.c

net: enetc: fix missing error code when pf->vf_state allocation fails

In enetc_pf_probe(), when the memory allocation for pf->vf_state fails,
the code jumps to the error handling label but the variable 'err' is not
assigned an appropriate error code beforehand. This causes the function
to return 0 (success) on an allocation failure path, misleading the
caller into thinking the probe succeeded. So set err to -ENOMEM before
jumping to the error handling label when the allocation for pf->vf_state
returns NULL.

Fixes: e15c5506dd39 ("net: enetc: allocate vf_state during PF probes")
Signed-off-by: Wei Fang <wei.fang at nxp.com>
Reviewed-by: Harshitha Ramamurthy <hramamurthy at google.com>
Link: https://patch.msgid.link/20260520064421.91569-3-wei.fang@nxp.com
Signed-off-by: Jakub Kicinski <kuba at kernel.org>
DeltaFile
+3-1drivers/net/ethernet/freescale/enetc/enetc_pf.c
+3-11 files

Linux/linux 8c84c5edrivers/net/ethernet/freescale/enetc enetc_pf.c

net: enetc: fix incorrect mailbox message status returned to VFs

There are two cases where VFs receive an incorrect success status from
the PF mailbox message handler, misleading them into believing their
requests have been fulfilled:

In enetc_msg_handle_rxmsg(), *status is pre-initialized to
ENETC_MSG_CMD_STATUS_OK. When an unsupported command type is received,
the default case only logs an error without updating *status, so it
remains as ENETC_MSG_CMD_STATUS_OK.

In enetc_msg_pf_set_vf_primary_mac_addr(), when the PF has already
assigned a MAC address for the VF (ENETC_VF_FLAG_PF_SET_MAC is set),
the function rejects the request but returns ENETC_MSG_CMD_STATUS_OK
instead of ENETC_MSG_CMD_STATUS_FAIL.

Therefore, correct the status value for the two cases mentioned above.

Fixes: beb74ac878c8 ("enetc: Add vf to pf messaging support")

    [4 lines not shown]
DeltaFile
+6-4drivers/net/ethernet/freescale/enetc/enetc_pf.c
+6-41 files

Linux/linux bdd3957net/bridge br_netlink.c, net/core rtnetlink.c

net: bridge: prevent too big nested attributes in br_fill_linkxstats()

After commit ff205bf8c554 ("netlink: add one debug check in nla_nest_end()")
syzbot found that br_fill_linkxstats() can send corrupted netlink packets.

Make sure the nested attribute size is bounded.

Fixes: a60c090361ea ("bridge: netlink: export per-vlan stats")
Reported-by: syzbot+a35f9259d08f907c06e6 at syzkaller.appspotmail.com
Closes: https://lore.kernel.org/netdev/6a0b0da3.050a0220.175f0c.0000.GAE@google.com/
Signed-off-by: Eric Dumazet <edumazet at google.com>
Reviewed-by: Ido Schimmel <idosch at nvidia.com>
Acked-by: Nikolay Aleksandrov <razor at blackwall.org>
Link: https://patch.msgid.link/20260520114207.1394241-1-edumazet@google.com
Signed-off-by: Jakub Kicinski <kuba at kernel.org>
DeltaFile
+10-0net/bridge/br_netlink.c
+3-2net/core/rtnetlink.c
+13-22 files

Linux/linux 979c017net/l2tp l2tp_core.c

l2tp: use list_del_rcu in l2tp_session_unhash

An unprivileged local user can pin a host CPU indefinitely in
l2tp_session_get_by_ifname() by issuing L2TP_CMD_SESSION_GET on
L2TP_ATTR_IFNAME concurrently with L2TP_CMD_SESSION_CREATE and
L2TP_CMD_SESSION_DELETE on the same tunnel. All three commands take
GENL_UNS_ADMIN_PERM, so CAP_NET_ADMIN in the netns user namespace
suffices; on any host that has l2tp_core loaded the trigger is
reachable from a standard `unshare -Urn` sandbox.

l2tp_session_unhash() removes a session from tunnel->session_list
with list_del_init(), but that list is walked by
l2tp_session_get_by_ifname() with list_for_each_entry_rcu() under
rcu_read_lock_bh(). list_del_init() leaves the deleted entry's
next/prev self-pointing; a reader that has loaded the entry and
then advances pos->list.next reads &session->list, container_of()s
back to the same session, and list_for_each_entry_rcu() never
reaches the list head. The CPU stays in strcmp() inside the
walker, with BH and preemption disabled, so RCU grace periods on

    [19 lines not shown]
DeltaFile
+1-1net/l2tp/l2tp_core.c
+1-11 files

Linux/linux dd3802farch/arm/mach-versatile integrator_cp.c, arch/riscv/boot/dts/microchip mpfs-icicle-kit.dts

Merge tag 'soc-fixes-7.1' of git://git.kernel.org/pub/scm/linux/kernel/git/soc/soc

Pull SoC fixes from Arnd Bergmann:

 - The ff-a firmware driver gets 11 individual bugfixes for a number of
   issues with robustness to buggy firmware or client implementations.
   Another firmware fix address suspend to RAM via PSCI firmware.

 - The final code change is for the old Arm Integrator reference
   platform that recently started exposing an old NULL pointer
   dereference bug.

 - The MAINTAINERS file gets two updates, notably James Tai and Yu-Chun
   Lin are stepping up as co-maintainers for the Realtek platform.

 - The remaining patches are all for devicetree files. Two of these are
   for riscv boards, the rest are all for enesas Arm platforms,
   addressing build time checking issues as well as minor configuration
   problems.

    [23 lines not shown]
DeltaFile
+102-44drivers/firmware/arm_ffa/driver.c
+0-28arch/riscv/boot/dts/starfive/jh7110.dtsi
+1-26arch/riscv/boot/dts/starfive/jh7110-common.dtsi
+19-0arch/riscv/boot/dts/microchip/mpfs-icicle-kit.dts
+4-9arch/arm/mach-versatile/integrator_cp.c
+10-0drivers/firmware/psci/psci.c
+136-10717 files not shown
+184-13223 files

Linux/linux 9a17302drivers/net/ethernet/broadcom/genet bcmgenet.c

net: bcmgenet: keep RBUF EEE/PM disabled

Setting RBUF_EEE_EN | RBUF_PM_EN in RBUF_ENERGY_CTRL breaks the RX
path on GENET hardware once MAC EEE becomes active. RX traffic stops
flowing while the link stays up and the usual descriptor/RX error
counters remain quiet. In that state the MAC still accepts frames
(rbuf_ovflow_cnt keeps climbing) but RBUF no longer forwards them to
DMA, so rx_packets is no longer incremented at the netdev level. On
some boards the corruption ends up as a paging fault in
skb_release_data via bcmgenet_rx_poll on an LPI exit.

Reproduced on Pi 4B (BCM2711 + BCM54213PE) and confirmed by Florian
Fainelli on an internal Broadcom 4908-family board with the same crash
signature. RBUF_PM_EN is not publicly documented.

This shows up more often now that phy_support_eee() enables EEE by
default, but it also affects older kernels as soon as TX LPI is
turned on via ethtool, so it is not specific to recent changes.


    [11 lines not shown]
DeltaFile
+4-5drivers/net/ethernet/broadcom/genet/bcmgenet.c
+4-51 files

Linux/linux 8f0f5c4kernel/trace tracing_map.c

tracing: Do not call map->ops->elt_free() if elt_alloc() fails

In paths where tracing_map_elt_alloc() failed to allocate objects,
the map->ops->elt_alloc() call was never successful. In this case,
map->ops->elt_free() should not be called.

Link: https://sashiko.dev/#/patchset/20260520223101.34710-1-rosenp%40gmail.com

Cc: stable at vger.kernel.org
Cc: Tom Zanussi <tom.zanussi at linux.intel.com>
Cc: Mathieu Desnoyers <mathieu.desnoyers at efficios.com>
Cc: Rosen Penev <rosenp at gmail.com>
Reported-by: Sashiko <sashiko-bot at kernel.org>
Fixes: 2734b629525a ("tracing: Add per-element variable support to tracing_map")
Link: https://patch.msgid.link/177933895460.108746.5396070821443932634.stgit@devnote2
Signed-off-by: Masami Hiramatsu (Google) <mhiramat at kernel.org>
Signed-off-by: Steven Rostedt <rostedt at goodmis.org>
DeltaFile
+13-4kernel/trace/tracing_map.c
+13-41 files

Linux/linux c5fcca7Documentation .renames.txt, Documentation/networking/device_drivers/ethernet index.rst

Merge branch 'ethernet-3c509-bring-driver-back-and-make-some-fixes'

Maciej W. Rozycki says:

====================
ethernet: 3c509: Bring driver back and make some fixes

 As per the previous discussions[1][2] this patch series brings the 3c509
driver back.  Picking up net rather than net-next as I consider it a fix
to accidental removal and so that any downstream users do not suffer from
disruption when using released kernels.

 In the course of making the coding style changes requested I have come
across an actual bug in transceiver type selection code, where the old
setting is not masked out before ORing in the new one, causing no change
to be actually made in a requested transition from BNC to AUI.  I guess
this code must have been executed exceedingly rarely, as it's always been
wrong ever since it was added in 2.5.42 back in 2002.


    [17 lines not shown]
DeltaFile
+1,543-0drivers/net/ethernet/3com/3c509.c
+249-0Documentation/networking/device_drivers/ethernet/3com/3c509.rst
+14-0drivers/net/ethernet/3com/Kconfig
+1-0arch/powerpc/configs/ppc6xx_defconfig
+1-0Documentation/.renames.txt
+1-0Documentation/networking/device_drivers/ethernet/index.rst
+1,809-01 files not shown
+1,810-07 files