Linux/linux 6779b50. MAINTAINERS, drivers/pci/controller pcie-brcmstb.c

Merge tag 'pci-v7.1-fixes-2' of git://git.kernel.org/pub/scm/linux/kernel/git/pci/pci

Pull PCI fixes from Bjorn Helgaas:

 - Remove obsolete PCIe maintainer addresses (Florian Eckert, Hans
   Zhang)

 - Restore a brcmstb link speed assignment that was inadvertently
   removed, reducing bcm2712 performance (Florian Fainelli)

* tag 'pci-v7.1-fixes-2' of git://git.kernel.org/pub/scm/linux/kernel/git/pci/pci:
  PCI: brcmstb: Assign pcie->gen from of_pci_get_max_link_speed()
  MAINTAINERS: Remove Jianjun Wang as PCIe mediatek maintainer
  MAINTAINERS: Remove Chuanhua Lei as PCIe intel-gw maintainer
DeltaFile
+1-3MAINTAINERS
+3-1drivers/pci/controller/pcie-brcmstb.c
+4-42 files

Linux/linux 68993ceDocumentation/networking/device_drivers/ethernet/3com 3c509.rst, drivers/net/dsa mt7530.c

Merge tag 'net-7.1-rc5' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net

Pull networking fixes from Jakub Kicinski:
 "Including fixes from Bluetooth, wireless and netfilter.

  Craziness continues with no end in sight. Even discounting the driver
  revert this is a pretty huge PR for standards of the previous era. I'd
  speculate - we haven't seen the worst of it, yet. Good news, I guess,
  is that so far we haven't seen many (any?) cases of "AI reported a
  bug, we fixed it and a real user regressed".

  Current release - fix to a fix:

   - Bluetooth: btmtk: accept too short WMT FUNC_CTRL events

   - vsock/virtio: relax the recently added memory limit a little

  Current release - regressions:


    [53 lines not shown]
DeltaFile
+1,543-0drivers/net/ethernet/3com/3c509.c
+249-0Documentation/networking/device_drivers/ethernet/3com/3c509.rst
+122-65net/netfilter/ipvs/ip_vs_ctl.c
+93-67drivers/net/dsa/mt7530.c
+67-93net/rxrpc/rxgk.c
+112-19drivers/net/wireless/ath/ath11k/wmi.c
+2,186-244181 files not shown
+4,452-1,287187 files

Linux/linux 6d3b267drivers/block rbd.c

Merge tag 'ceph-for-7.1-rc5' of https://github.com/ceph/ceph-client

Pull ceph fix from Ilya Dryomov:
 "A fix for an 'rbd unmap' race condition which popped up on a
  production setup where many RBD devices are frequently mapped and
  unmapped, marked for stable"

* tag 'ceph-for-7.1-rc5' of https://github.com/ceph/ceph-client:
  rbd: eliminate a race in lock_dwork draining on unmap
DeltaFile
+8-12drivers/block/rbd.c
+8-121 files

Linux/linux 7acfa2carch/arm64/include/asm ring_buffer.h, arch/microblaze/include/asm Kbuild

Merge tag 'trace-ringbuffer-v7.1-rc4' of git://git.kernel.org/pub/scm/linux/kernel/git/trace/linux-trace

Pull ring-buffer fixes from Steven Rostedt:

 - Fix reporting MISSED EVENTS in trace iterator

   When the "trace" file is read with tracing enabled, if the writer
   were to pass the iterator reader, it resets, sets a "missed_events"
   flag and continues. The tracing output checks for missed events and
   if there are some, it prints out "[LOST EVENTS]" to let the user know
   events were dropped.

   But the clearing of the missed_events happened when the tracing
   system queried the ring buffer iterator about missed events. This was
   premature as the ring buffer is per CPU, and the tracing code reads
   all the CPU buffers and checks for missed events when it is read. If
   the CPU iterator that had missed events isn't printed next, the
   output for the LOST EVENTS is lost.


    [37 lines not shown]
DeltaFile
+25-5kernel/trace/ring_buffer.c
+13-0include/asm-generic/ring_buffer.h
+10-0arch/arm64/include/asm/ring_buffer.h
+2-2kernel/trace/simple_ring_buffer.c
+2-1kernel/trace/Makefile
+1-0arch/microblaze/include/asm/Kbuild
+53-819 files not shown
+72-825 files

Linux/linux 0e3c08fdrivers/net/wireless/ath/ath10k wmi.c, drivers/net/wireless/ath/ath11k wmi.c

Merge tag 'wireless-2026-05-21' of https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless

Johannes Berg says:

====================
Quite a few more updates:
 - cfg80211/mac80211:
   - various security(-ish) fixes
   - fix A-MSDU subframe handling
   - fix multi-link element parsing
 - ath10: avoid sending commands to dead device
 - ath11k:
   - fix WMI buffer leaks on error conditions
   - fix UAF in RX MSDU coalesce path
   - allow peer ID 0 on RX path (legal for mobile devices)
   - reinitialize shared SRNG pointers on restart
 - ath12k:
   - fix 20 MHz-only parsing of EHT-MCS map
 - iwlwifi:

    [34 lines not shown]
DeltaFile
+112-19drivers/net/wireless/ath/ath11k/wmi.c
+64-43net/mac80211/parse.c
+18-9drivers/net/wireless/intel/iwlwifi/mvm/mac-ctxt.c
+8-9drivers/net/wireless/ath/ath10k/wmi.c
+14-1drivers/net/wireless/intel/iwlwifi/mld/tx.c
+4-10drivers/net/wireless/intel/iwlwifi/mvm/utils.c
+220-9115 files not shown
+276-12421 files

Linux/linux 758c807drivers/firmware/efi efi.c sysfb_efi.c, include/linux efi.h

Merge tag 'efi-fixes-for-v7.1-2' of git://git.kernel.org/pub/scm/linux/kernel/git/efi/efi

Pull EFI fixes from Ard Biesheuvel:

 - Permit ACPI PRM runtime firmware calls when acpi_init() runs

 - Add another Lenovo Ideapad framebuffer quirk

 - Cosmetic tweak

* tag 'efi-fixes-for-v7.1-2' of git://git.kernel.org/pub/scm/linux/kernel/git/efi/efi:
  efi: sysfb_efi: Extend quirk to cover IdeaPad Duet 3 10IGL5-LTE
  efi: efi.h: Remove extra semicolon
  efi: Allocate runtime workqueue before ACPI init
DeltaFile
+16-12drivers/firmware/efi/efi.c
+6-3drivers/firmware/efi/sysfb_efi.c
+1-1include/linux/efi.h
+23-163 files

Linux/linux c33f944drivers/net/ethernet/freescale/enetc enetc_msg.c enetc_pf.c

Merge branch 'net-enetc-sr-iov-robustness-and-security-fixes'

Wei Fang says:

====================
net: enetc: SR-IOV robustness and security fixes

This patch series addresses a number of robustness, security, and
correctness issues in the ENETC driver's SR-IOV subsystem, focusing
primarily on the VF-to-PF mailbox communication path.

The series can be grouped into the following categories:

1. DoS and security fixes:
   - Prevent an unbounded loop DoS in the VF-to-PF message handler,
     which could be triggered by a malicious or misbehaving VF.
   - Fix a TOCTOU (Time-of-Check-Time-of-Use) race and add proper
     validation of VF MAC addresses to prevent spoofing or invalid
     configuration from being applied.

    [34 lines not shown]
DeltaFile
+59-49drivers/net/ethernet/freescale/enetc/enetc_msg.c
+56-19drivers/net/ethernet/freescale/enetc/enetc_pf.c
+12-3drivers/net/ethernet/freescale/enetc/enetc_hw.h
+1-0drivers/net/ethernet/freescale/enetc/enetc_pf.h
+128-714 files

Linux/linux 9e68817drivers/net/ethernet/freescale/enetc enetc_pf.c

net: enetc: avoid VF->PF mailbox timeout during SR-IOV teardown

During SR-IOV teardown, enetc_msg_psi_free() disables the MR interrupt
before pci_disable_sriov() removes the VFs. If a VF sends a mailbox
message during this window, the PF cannot receive it, causing the VF to
timeout waiting for a reply.

Since the timeout occurs during SR-IOV teardown when the VF is about to
be removed anyway, it has no functional impact on operation. However,
more messages will be added in the future, some visible error logs may
confuse users. So fix it by calling pci_disable_sriov() first to remove
all VFs, then safely clean up the mailbox resources. This eliminates the
race window where VFs could send messages to an unresponsive PF.

Fixes: beb74ac878c8 ("enetc: Add vf to pf messaging support")
Signed-off-by: Wei Fang <wei.fang at nxp.com>
Reviewed-by: Harshitha Ramamurthy <hramamurthy at google.com>
Link: https://patch.msgid.link/20260520064421.91569-10-wei.fang@nxp.com
Signed-off-by: Jakub Kicinski <kuba at kernel.org>
DeltaFile
+1-1drivers/net/ethernet/freescale/enetc/enetc_pf.c
+1-11 files

Linux/linux 54362b0drivers/net/ethernet/freescale/enetc enetc_msg.c

net: enetc: fix init and teardown order to prevent use of unsafe resources

Sashiko reported a potential issue in enetc_msg_psi_init() where the IRQ
handler is registered before DMA resources are fully initialized [1].

The current initialization sequence is:

  1. request_irq(enetc_msg_psi_msix)    <- IRQ handler registered
  2. INIT_WORK(&pf->msg_task, ...)      <- work_struct initialized
  3. enetc_msg_alloc_mbx()              <- mailbox DMA allocated

This ordering is unsafe because if a spurious interrupt or pending
interrupt from a previous device state fires immediately after
request_irq() returns, the registered ISR enetc_msg_psi_msix() will
execute and unconditionally call:

  schedule_work(&pf->msg_task)

At this point, pf->msg_task has not been initialized by INIT_WORK(), so

    [47 lines not shown]
DeltaFile
+18-17drivers/net/ethernet/freescale/enetc/enetc_msg.c
+18-171 files

Linux/linux c666fa6drivers/net/ethernet/freescale/enetc enetc_pf.c

net: enetc: fix TOCTOU race and validate VF MAC address

Sashiko reported that the PF driver accepts arbitrary MAC address from
from VF mailbox messages without proper validation, creating a security
vulnerability [1].

In enetc_msg_pf_set_vf_primary_mac_addr(), the MAC address is extracted
directly from the message buffer (cmd->mac.sa_data) and programmed into
hardware via pf->ops->set_si_primary_mac() without any validity checks.
A malicious VF can configure a multicast, broadcast, or all-zero MAC
address. Therefore, a validation to check the MAC address provided by VF
is required.

However, simply checking the MAC address is not enough, because it also
has the potential TOCTOU race [2]: The code reads the MAC address from
the DMA buffer to validate it via is_valid_ether_addr(), if validation
passes, reads the same DMA buffer a second time when calling
enetc_pf_set_primary_mac_addr() to program the hardware. A malicious VF
can exploit this window by overwriting the MAC address in the DMA buffer

    [15 lines not shown]
DeltaFile
+30-9drivers/net/ethernet/freescale/enetc/enetc_pf.c
+30-91 files

Linux/linux adb4599drivers/net/ethernet/freescale/enetc enetc_msg.c

net: enetc: fix DMA write to freed memory in enetc_msg_free_mbx()

The teardown sequence in enetc_msg_psi_free() frees the DMA buffer before
clearing the device's DMA address registers. If a VF sends a message or a
pending DMA transfer completes within this window, the hardware will
perform a DMA write into the kernel memory that has already been returned
to the allocator.

The result is silent memory corruption that can affect arbitrary kernel
data structures. Therefore, clear the DMA address registers before the
DMA buffer is freed.

Fixes: beb74ac878c8 ("enetc: Add vf to pf messaging support")
Signed-off-by: Wei Fang <wei.fang at nxp.com>
Reviewed-by: Harshitha Ramamurthy <hramamurthy at google.com>
Link: https://patch.msgid.link/20260520064421.91569-7-wei.fang@nxp.com
Signed-off-by: Jakub Kicinski <kuba at kernel.org>
DeltaFile
+3-3drivers/net/ethernet/freescale/enetc/enetc_msg.c
+3-31 files

Linux/linux f262f5ddrivers/net/ethernet/freescale/enetc enetc_pf.c enetc_pf.h

net: enetc: fix race condition in VF MAC address configuration

Sashiko reported a potential race condition between the VF message
handler and administrative VF MAC configuration from the host [1].

The VF message handler (enetc_msg_pf_set_vf_primary_mac_addr) runs
asynchronously in a workqueue context and accesses vf_state->flags
without any locking. Concurrently, the host can administratively
change the VF MAC address via enetc_pf_set_vf_mac(), which executes
under RTNL lock and modifies both vf_state->flags and hardware
registers.

This creates two race windows:

1) TOCTOU race on vf_state->flags: The check of ENETC_VF_FLAG_PF_SET_MAC
   and subsequent MAC programming are not atomic, allowing the flag state
   to change between check and use.

2) Torn MAC address writes: Hardware MAC programming requires multiple

    [18 lines not shown]
DeltaFile
+10-0drivers/net/ethernet/freescale/enetc/enetc_pf.c
+1-0drivers/net/ethernet/freescale/enetc/enetc_pf.h
+11-02 files

Linux/linux 4a995d3drivers/net/ethernet/freescale/enetc enetc_pf.c

net: enetc: add ratelimiting to VF mailbox error messages

Sashiko reported that a buggy or malicious guest VM can flood the host
kernel log by repeatedly sending VF-to-PF messages at a high rate,
degrading host performance and hiding important system logs [1].

Fix by replacing dev_err()/dev_warn() with dev_err_ratelimited(),
limiting output to the default kernel ratelimit. This ensures errors are
still logged for debugging while preventing log flooding attacks.

Link: https://sashiko.dev/#/patchset/20260511080805.2052495-1-wei.fang%40nxp.com #1
Fixes: beb74ac878c8 ("enetc: Add vf to pf messaging support")
Signed-off-by: Wei Fang <wei.fang at nxp.com>
Reviewed-by: Harshitha Ramamurthy <hramamurthy at google.com>
Link: https://patch.msgid.link/20260520064421.91569-4-wei.fang@nxp.com
Signed-off-by: Jakub Kicinski <kuba at kernel.org>
DeltaFile
+6-4drivers/net/ethernet/freescale/enetc/enetc_pf.c
+6-41 files

Linux/linux f8ae63ddrivers/net/ethernet/freescale/enetc enetc_msg.c enetc_hw.h

net: enetc: fix unbounded loop and interrupt handling in VF-to-PF messaging

The enetc_msg_task() function has several issues that need to be addressed:

1. Unbounded loop causing potential DoS:

enetc_msg_task() processes VF-to-PF mailbox messages in an unbounded
for(;;) loop that keeps polling ENETC_PSIMSGRR until no MR bits are set.
A malicious guest VM can exploit this by continuously sending messages at
a high rate - immediately sending a new message as soon as the PF
acknowledges the previous one. Since the worker thread never yields or
enforces a processing budget, the mr_mask check frequently evaluates to
non-zero, causing the PF to spin indefinitely and starving other tasks.

Fix this by replacing the unbounded loop with a single snapshot read at
task entry. The task processes only the VFs whose MR bits were set at
that point, then re-enables message interrupts before returning. This
bounds work per invocation to at most num_vfs iterations. No messages are
lost because the message interrupt is disabled in enetc_msg_psi_msix()

    [42 lines not shown]
DeltaFile
+37-28drivers/net/ethernet/freescale/enetc/enetc_msg.c
+12-3drivers/net/ethernet/freescale/enetc/enetc_hw.h
+49-312 files

Linux/linux 5027266drivers/net/ethernet/freescale/enetc enetc_pf.c

net: enetc: fix missing error code when pf->vf_state allocation fails

In enetc_pf_probe(), when the memory allocation for pf->vf_state fails,
the code jumps to the error handling label but the variable 'err' is not
assigned an appropriate error code beforehand. This causes the function
to return 0 (success) on an allocation failure path, misleading the
caller into thinking the probe succeeded. So set err to -ENOMEM before
jumping to the error handling label when the allocation for pf->vf_state
returns NULL.

Fixes: e15c5506dd39 ("net: enetc: allocate vf_state during PF probes")
Signed-off-by: Wei Fang <wei.fang at nxp.com>
Reviewed-by: Harshitha Ramamurthy <hramamurthy at google.com>
Link: https://patch.msgid.link/20260520064421.91569-3-wei.fang@nxp.com
Signed-off-by: Jakub Kicinski <kuba at kernel.org>
DeltaFile
+3-1drivers/net/ethernet/freescale/enetc/enetc_pf.c
+3-11 files

Linux/linux 8c84c5edrivers/net/ethernet/freescale/enetc enetc_pf.c

net: enetc: fix incorrect mailbox message status returned to VFs

There are two cases where VFs receive an incorrect success status from
the PF mailbox message handler, misleading them into believing their
requests have been fulfilled:

In enetc_msg_handle_rxmsg(), *status is pre-initialized to
ENETC_MSG_CMD_STATUS_OK. When an unsupported command type is received,
the default case only logs an error without updating *status, so it
remains as ENETC_MSG_CMD_STATUS_OK.

In enetc_msg_pf_set_vf_primary_mac_addr(), when the PF has already
assigned a MAC address for the VF (ENETC_VF_FLAG_PF_SET_MAC is set),
the function rejects the request but returns ENETC_MSG_CMD_STATUS_OK
instead of ENETC_MSG_CMD_STATUS_FAIL.

Therefore, correct the status value for the two cases mentioned above.

Fixes: beb74ac878c8 ("enetc: Add vf to pf messaging support")

    [4 lines not shown]
DeltaFile
+6-4drivers/net/ethernet/freescale/enetc/enetc_pf.c
+6-41 files

Linux/linux bdd3957net/bridge br_netlink.c, net/core rtnetlink.c

net: bridge: prevent too big nested attributes in br_fill_linkxstats()

After commit ff205bf8c554 ("netlink: add one debug check in nla_nest_end()")
syzbot found that br_fill_linkxstats() can send corrupted netlink packets.

Make sure the nested attribute size is bounded.

Fixes: a60c090361ea ("bridge: netlink: export per-vlan stats")
Reported-by: syzbot+a35f9259d08f907c06e6 at syzkaller.appspotmail.com
Closes: https://lore.kernel.org/netdev/6a0b0da3.050a0220.175f0c.0000.GAE@google.com/
Signed-off-by: Eric Dumazet <edumazet at google.com>
Reviewed-by: Ido Schimmel <idosch at nvidia.com>
Acked-by: Nikolay Aleksandrov <razor at blackwall.org>
Link: https://patch.msgid.link/20260520114207.1394241-1-edumazet@google.com
Signed-off-by: Jakub Kicinski <kuba at kernel.org>
DeltaFile
+10-0net/bridge/br_netlink.c
+3-2net/core/rtnetlink.c
+13-22 files

Linux/linux 979c017net/l2tp l2tp_core.c

l2tp: use list_del_rcu in l2tp_session_unhash

An unprivileged local user can pin a host CPU indefinitely in
l2tp_session_get_by_ifname() by issuing L2TP_CMD_SESSION_GET on
L2TP_ATTR_IFNAME concurrently with L2TP_CMD_SESSION_CREATE and
L2TP_CMD_SESSION_DELETE on the same tunnel. All three commands take
GENL_UNS_ADMIN_PERM, so CAP_NET_ADMIN in the netns user namespace
suffices; on any host that has l2tp_core loaded the trigger is
reachable from a standard `unshare -Urn` sandbox.

l2tp_session_unhash() removes a session from tunnel->session_list
with list_del_init(), but that list is walked by
l2tp_session_get_by_ifname() with list_for_each_entry_rcu() under
rcu_read_lock_bh(). list_del_init() leaves the deleted entry's
next/prev self-pointing; a reader that has loaded the entry and
then advances pos->list.next reads &session->list, container_of()s
back to the same session, and list_for_each_entry_rcu() never
reaches the list head. The CPU stays in strcmp() inside the
walker, with BH and preemption disabled, so RCU grace periods on

    [19 lines not shown]
DeltaFile
+1-1net/l2tp/l2tp_core.c
+1-11 files

Linux/linux dd3802farch/arm/mach-versatile integrator_cp.c, arch/riscv/boot/dts/microchip mpfs-icicle-kit.dts

Merge tag 'soc-fixes-7.1' of git://git.kernel.org/pub/scm/linux/kernel/git/soc/soc

Pull SoC fixes from Arnd Bergmann:

 - The ff-a firmware driver gets 11 individual bugfixes for a number of
   issues with robustness to buggy firmware or client implementations.
   Another firmware fix address suspend to RAM via PSCI firmware.

 - The final code change is for the old Arm Integrator reference
   platform that recently started exposing an old NULL pointer
   dereference bug.

 - The MAINTAINERS file gets two updates, notably James Tai and Yu-Chun
   Lin are stepping up as co-maintainers for the Realtek platform.

 - The remaining patches are all for devicetree files. Two of these are
   for riscv boards, the rest are all for enesas Arm platforms,
   addressing build time checking issues as well as minor configuration
   problems.

    [23 lines not shown]
DeltaFile
+102-44drivers/firmware/arm_ffa/driver.c
+0-28arch/riscv/boot/dts/starfive/jh7110.dtsi
+1-26arch/riscv/boot/dts/starfive/jh7110-common.dtsi
+19-0arch/riscv/boot/dts/microchip/mpfs-icicle-kit.dts
+4-9arch/arm/mach-versatile/integrator_cp.c
+10-0drivers/firmware/psci/psci.c
+136-10717 files not shown
+184-13223 files

Linux/linux 9a17302drivers/net/ethernet/broadcom/genet bcmgenet.c

net: bcmgenet: keep RBUF EEE/PM disabled

Setting RBUF_EEE_EN | RBUF_PM_EN in RBUF_ENERGY_CTRL breaks the RX
path on GENET hardware once MAC EEE becomes active. RX traffic stops
flowing while the link stays up and the usual descriptor/RX error
counters remain quiet. In that state the MAC still accepts frames
(rbuf_ovflow_cnt keeps climbing) but RBUF no longer forwards them to
DMA, so rx_packets is no longer incremented at the netdev level. On
some boards the corruption ends up as a paging fault in
skb_release_data via bcmgenet_rx_poll on an LPI exit.

Reproduced on Pi 4B (BCM2711 + BCM54213PE) and confirmed by Florian
Fainelli on an internal Broadcom 4908-family board with the same crash
signature. RBUF_PM_EN is not publicly documented.

This shows up more often now that phy_support_eee() enables EEE by
default, but it also affects older kernels as soon as TX LPI is
turned on via ethtool, so it is not specific to recent changes.


    [11 lines not shown]
DeltaFile
+4-5drivers/net/ethernet/broadcom/genet/bcmgenet.c
+4-51 files

Linux/linux c5fcca7Documentation .renames.txt, Documentation/networking/device_drivers/ethernet index.rst

Merge branch 'ethernet-3c509-bring-driver-back-and-make-some-fixes'

Maciej W. Rozycki says:

====================
ethernet: 3c509: Bring driver back and make some fixes

 As per the previous discussions[1][2] this patch series brings the 3c509
driver back.  Picking up net rather than net-next as I consider it a fix
to accidental removal and so that any downstream users do not suffer from
disruption when using released kernels.

 In the course of making the coding style changes requested I have come
across an actual bug in transceiver type selection code, where the old
setting is not masked out before ORing in the new one, causing no change
to be actually made in a requested transition from BNC to AUI.  I guess
this code must have been executed exceedingly rarely, as it's always been
wrong ever since it was added in 2.5.42 back in 2002.


    [17 lines not shown]
DeltaFile
+1,543-0drivers/net/ethernet/3com/3c509.c
+249-0Documentation/networking/device_drivers/ethernet/3com/3c509.rst
+14-0drivers/net/ethernet/3com/Kconfig
+1-0arch/powerpc/configs/ppc6xx_defconfig
+1-0Documentation/.renames.txt
+1-0Documentation/networking/device_drivers/ethernet/index.rst
+1,809-01 files not shown
+1,810-07 files

Linux/linux 75756cbDocumentation/networking/device_drivers/ethernet/3com 3c509.rst

ethernet: 3c509: Update documentation to match MAINTAINERS

There has been apparently a single message only ever publicly posted by
David Ruggiero, back in 2002, which added this documentation piece among
others, and MAINTAINERS was never updated accordingly.  It is therefore
doubtful that his maintainer status has actually come into effect.  Just
replace the reference then so as not to confuse people.

Signed-off-by: Maciej W. Rozycki <macro at orcam.me.uk>
Link: https://patch.msgid.link/alpine.DEB.2.21.2605201207380.1450@angie.orcam.me.uk
Signed-off-by: Jakub Kicinski <kuba at kernel.org>
DeltaFile
+1-1Documentation/networking/device_drivers/ethernet/3com/3c509.rst
+1-11 files

Linux/linux 014767cdrivers/net/ethernet/3com 3c509.c

ethernet: 3c509: Fix most coding style issues

Update the driver for our current coding style according to output from
`checkpatch.pl' and manual code review, where no change to binary code
results, as indicated by `objdump -dr'.  Exceptions are as follows:

- incomplete reverse xmas tree in set_multicast_list(), as that would
  change binary output,

- referring el3_start_xmit() verbatim rather than via `__func__' with
  pr_debug(), likewise,

- a bunch of pr_cont() calls, likewise,

- a long udelay() call in el3_netdev_set_ecmd() made under a spinlock,
  likewise plus it's not eligible for conversion to a sleep in the first
  place,

- a blank line at the start of a block in el3_interrupt(), to improve

    [9 lines not shown]
DeltaFile
+470-377drivers/net/ethernet/3com/3c509.c
+470-3771 files

Linux/linux 28db033Documentation .renames.txt, Documentation/networking/device_drivers/ethernet index.rst

Revert "drivers: net: 3com: 3c509: Remove this driver"

This reverts commit 91f3a27ae9f66d81a5906461762c37c8a2bcab06.

Contrary to the assumption stated with the original commit description
this driver is in use and I'm going to maintain it for the foreseeable
future.

Signed-off-by: Maciej W. Rozycki <macro at orcam.me.uk>
Link: https://patch.msgid.link/alpine.DEB.2.21.2605201204260.1450@angie.orcam.me.uk
Signed-off-by: Jakub Kicinski <kuba at kernel.org>
DeltaFile
+1,448-0drivers/net/ethernet/3com/3c509.c
+249-0Documentation/networking/device_drivers/ethernet/3com/3c509.rst
+14-0drivers/net/ethernet/3com/Kconfig
+1-0drivers/net/ethernet/3com/Makefile
+1-0Documentation/.renames.txt
+1-0Documentation/networking/device_drivers/ethernet/index.rst
+1,714-01 files not shown
+1,715-07 files

Linux/linux 240117bdrivers/net/ethernet/3com 3c509.c

ethernet: 3c509: Add GPL 2.0 SPDX license identifier

This driver has landed with Linux 0.99.13k, which was covered by the GNU
General Public License version 2, and no further conditions as to
licensing terms have been specified within the copyright notice included
with the driver itself.

Signed-off-by: Maciej W. Rozycki <macro at orcam.me.uk>
Link: https://patch.msgid.link/alpine.DEB.2.21.2605201206370.1450@angie.orcam.me.uk
Signed-off-by: Jakub Kicinski <kuba at kernel.org>
DeltaFile
+1-0drivers/net/ethernet/3com/3c509.c
+1-01 files

Linux/linux 029a6b3drivers/net/ethernet/3com 3c509.c

ethernet: 3c509: Fix AUI transceiver type selection

The transceiver type is held in bits 15:14 of the Address Configuration
Register, with the values of 0b00, 0b01, and 0b11 denoting TP, AUI, and
BNC types respectively.  Therefore switching from BNC to AUI requires
bits to be cleared before setting bit 14 or the setting won't change.

NB this has always been wrong ever since this code was added in 2.5.42.

Signed-off-by: Maciej W. Rozycki <macro at orcam.me.uk>
Link: https://patch.msgid.link/alpine.DEB.2.21.2605201205160.1450@angie.orcam.me.uk
Signed-off-by: Jakub Kicinski <kuba at kernel.org>
DeltaFile
+1-0drivers/net/ethernet/3com/3c509.c
+1-01 files

Linux/linux 3287e81tools/net/ynl/pyynl/lib ynl.py

tools: ynl: support listening on all nsids

A new method ntf_listen_all_nsid() to enable listening on events from
all namespaces.  Useful for testing cross-namespace functionality.

recv() replaced with recvmsg() to be able to receive NSID through the
ancillary data.

Signed-off-by: Ilya Maximets <i.maximets at ovn.org>
Link: https://patch.msgid.link/20260520172317.175168-4-i.maximets@ovn.org
Signed-off-by: Jakub Kicinski <kuba at kernel.org>
DeltaFile
+32-5tools/net/ynl/pyynl/lib/ynl.py
+32-51 files

Linux/linux 4db79a3net/core gro.c

net: gro: don't merge zcopy skbs

skb_gro_receive() can currently copy frags between the source and GRO
skb, without checking the zerocopy status, and in particular the
SKBFL_MANAGED_FRAG_REFS flag.

When SKBFL_MANAGED_FRAG_REFS is set, the skb doesn't hold a reference
on the pages in shinfo->frags. Appending those frags to another skb's
frags without fixing up the page refcount can lead to UAF.

When either the last skb in the GRO chain (the one we would append
frags to) or the source skb is zerocopy, don't merge the skbs.

Fixes: 753f1ca4e1e5 ("net: introduce managed frags infrastructure")
Reported-by: Huzaifa Sidhpurwala <huzaifas at redhat.com>
Signed-off-by: Sabrina Dubroca <sd at queasysnail.net>
Reviewed-by: Willem de Bruijn <willemb at google.com>
Link: https://patch.msgid.link/c3b7f906bbfcbdfd7b4fa9d6c18a438870df85be.1779307748.git.sd@queasysnail.net
Signed-off-by: Jakub Kicinski <kuba at kernel.org>
DeltaFile
+3-0net/core/gro.c
+3-01 files

Linux/linux 3d4432ddrivers/net/ethernet/amd/pds_core devlink.c

pds_core: ensure null-termination for firmware version strings

The driver passes fw_version directly to devlink_info_version_stored_put()
without ensuring null-termination. While current firmware null-terminates
these strings, the driver should not rely on this behavior. Add explicit
null-termination to prevent potential issues if firmware behavior changes.

Fixes: 45d76f492938 ("pds_core: set up device and adminq")
Signed-off-by: Nikhil P. Rao <nikhil.rao at amd.com>
Link: https://patch.msgid.link/20260520205842.1486718-1-nikhil.rao@amd.com
Signed-off-by: Jakub Kicinski <kuba at kernel.org>
DeltaFile
+4-2drivers/net/ethernet/amd/pds_core/devlink.c
+4-21 files

Linux/linux 985d4a5drivers/net/ethernet/airoha airoha_eth.c

net: airoha: Disable GDM2 forwarding before configuring GDM2 loopback

Hw design requires to disable GDM2 forwarding before configuring GDM2
loopback in airoha_set_gdm2_loopback routine.

Fixes: 9cd451d414f6e ("net: airoha: Add loopback support for GDM2")
Tested-by: Madhur Agrawal <madhur.agrawal at airoha.com>
Signed-off-by: Lorenzo Bianconi <lorenzo at kernel.org>
Link: https://patch.msgid.link/20260520-airoha-disable-gdm2-fwd-v1-1-1eeea5dffc2f@kernel.org
Signed-off-by: Jakub Kicinski <kuba at kernel.org>
DeltaFile
+6-4drivers/net/ethernet/airoha/airoha_eth.c
+6-41 files