Linux/linux e1914adarch/arm64/kvm mmu.c arm.c, arch/arm64/kvm/hyp/nvhe mem_protect.c

Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm

Pull kvm fixes from Paolo Bonzini:
 "arm64:

   - Add the pKVM side of the workaround for ARM's erratum 4193714,
     provided that the EL3 firmware does its part of the job. KVM will
     refuse to initialise otherwise

   - Correctly handle 52bit VAs for guest EL2 stage-1 translations when
     running under NV with E2H==0

   - Correctly deal with permission faults in guest_memfd memslots

   - Fix the steal-time selftest after the infrastructure was reworked

   - Make sure the host cannot pass a non-sensical clock update to the
     EL2 tracing infrastructure


    [72 lines not shown]
DeltaFile
+46-1arch/arm64/kvm/hyp/nvhe/mem_protect.c
+14-29arch/x86/kvm/svm/nested.c
+21-8arch/arm64/kvm/mmu.c
+21-2arch/x86/kvm/mmu/mmu.c
+21-0arch/arm64/kvm/arm.c
+15-2arch/x86/kvm/vmx/vmx.c
+138-4218 files not shown
+204-6524 files

Linux/linux 1f63dd8kernel/liveupdate kexec_handover.c, mm memfd_luo.c

Merge tag 'fixes-2026-05-13' of git://git.kernel.org/pub/scm/linux/kernel/git/liveupdate/linux

Pull liveupdate fixes from Mike Rapoport:
 "A few fixes for kexec handover and liveupdate:

   - make sure KHO is skipped for crash kernel

   - fix error reporting in memfd preservation if it fails mid-loop

   - don't allow preserving memfds whose page count exceeds UINT_MAX

   - fix documentation of memfd seals preservation to match the code"

* tag 'fixes-2026-05-13' of git://git.kernel.org/pub/scm/linux/kernel/git/liveupdate/linux:
  mm/memfd_luo: document preservation of file seals
  mm/memfd_luo: reject memfds whose page count exceeds UINT_MAX
  mm/memfd_luo: report error when restoring a folio fails mid-loop
  kho: skip KHO for crash kernel
DeltaFile
+19-6mm/memfd_luo.c
+1-1kernel/liveupdate/kexec_handover.c
+20-72 files

Linux/linux 2d5d3fcarch/x86/kvm/vmx vmx.c capabilities.h

KVM: VMX: introduce module parameter to disable CET

There have been reports of host hangs caused by CET virtualization.
Until these are analyzed further, introduce a module parameter that
makes it possible to easily disable it.

Link: https://lore.kernel.org/all/85548beb-1486-40f9-beb4-632c78e3360b@proxmox.com/
Cc: David Riley <d.riley at proxmox.com>
Signed-off-by: Paolo Bonzini <pbonzini at redhat.com>
DeltaFile
+15-2arch/x86/kvm/vmx/vmx.c
+1-0arch/x86/kvm/vmx/capabilities.h
+16-22 files

Linux/linux ef7e0c5arch/s390/kvm pci.c interrupt.c

Merge tag 'kvm-s390-master-7.1-1' of git://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux into HEAD

KVM: s390: pci: fix array indexing

For large amounts of PCI devices its possible to overrun the arrays as
the index was miscalculated in 2 places.
DeltaFile
+4-6arch/s390/kvm/pci.c
+1-2arch/s390/kvm/interrupt.c
+5-82 files

Linux/linux 3098c07arch/x86/kvm emulate.c

KVM: x86: Swap the dst and src operand for MOVNTDQA

Swap the MOVNTDQA operands, as MOVNTDQA does NOT in fact have "the same
characteristics as 0F E7 (MOVNTDQ)"; MOVNTDQA loads from memory and stores
to registers, while MOVNTDQ loads from registers and stores to memory.

Per the SDM:

 MOVNTDQ - Move packed integer values in xmm1 to m128 using non-temporal
           hint.

 MOVNTDQA - Move double quadword from m128 to xmm1 using non-temporal hint
            if WC memory type.

Reported-by: Josh Eads <josheads at google.com>
Fixes: c57d9bafbd0b ("KVM: x86: Add support for emulating MOVNTDQA")
Cc: stable at vger.kernel.org
Signed-off-by: Sean Christopherson <seanjc at google.com>
Message-ID: <20260506213514.2781948-1-seanjc at google.com>
Signed-off-by: Paolo Bonzini <pbonzini at redhat.com>
DeltaFile
+1-1arch/x86/kvm/emulate.c
+1-11 files

Linux/linux 6b72d05arch/x86/kvm/mmu mmu.c

KVM: x86: use again the flush argument of __link_shadow_page()

Except in the case of parentless nested-TDP pages, mmu_page_zap_pte()
clears the SPTE but leaves the invalid_list empty.  In this case, using
kvm_flush_remote_tlbs() as kvm_mmu_remote_flush_or_zap() does is overkill.
Avoid flushing the entirety of the remote TLBs unless the invalid_list
was populated: instead, use a more efficient gfn-targeting flush (if
available) and skip it altogether if the caller guarantees that a TLB
flush is not necessary.

Based-on: <20260503201029.106481-1-pbonzini at redhat.com>
Signed-off-by: Paolo Bonzini <pbonzini at redhat.com>
Message-ID: <20260503210917.121840-1-pbonzini at redhat.com>
Signed-off-by: Paolo Bonzini <pbonzini at redhat.com>
DeltaFile
+21-2arch/x86/kvm/mmu/mmu.c
+21-21 files

Linux/linux 87c8101tools/testing/selftests/kvm guest_memfd_test.c

KVM: selftests: Ensure gmem file sizes are multiple of host page size

When creating a guest_memfd file and associated memslot to validate shared
guest memory, size the file+memslot to the maximum of the host or guest
page size.  Attempting to allocate a single guest page will fail if the
host page size is greater than the guest page size, as KVM requires that
the size of memslots and guest_memfd files are a multiple of the host page
size.

For simplicity, verify the entire file can be shared between guest and host,
e.g. instead of trying to validate "partial" mappings.

Fixes: 42188667be38 ("KVM: selftests: Add guest_memfd testcase to fault-in on !mmap()'d memory")
Reported-by: Zenghui Yu <zenghui.yu at linux.dev>
Closes: https://lore.kernel.org/all/0064952b-048c-455d-ad89-e27e5cb82591@linux.dev
Signed-off-by: Sean Christopherson <seanjc at google.com>
Message-ID: <20260512155634.772602-1-seanjc at google.com>
Signed-off-by: Paolo Bonzini <pbonzini at redhat.com>
DeltaFile
+7-2tools/testing/selftests/kvm/guest_memfd_test.c
+7-21 files

Linux/linux 4a9ee4farch/arm64/kvm mmu.c arm.c, arch/arm64/kvm/hyp/nvhe mem_protect.c pkvm.c

Merge tag 'kvmarm-fixes-7.1-2' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD

KVM/arm64 fixes for 7.1, take #2

- Add the pKVM side of the workaround for ARM's erratum 4193714, provided
  that the EL3 firmware does its part of the job. KVM will refuse to
  initialise otherwise.

- Correctly handle 52bit VAs for guest EL2 stage-1 translations when
  running under NV with E2H==0.

- Correctly deal with permission faults in guest_memfd memslots.

- Fix the steal-time selftest after the infrastructure was reworked.

- Make sure the host cannot pass a non-sensical clock update to the
  EL2 tracing infrastructure.

- Appoint Steffen Eiden as a reviewer in anticipation of the KVM/s390

    [16 lines not shown]
DeltaFile
+46-1arch/arm64/kvm/hyp/nvhe/mem_protect.c
+21-8arch/arm64/kvm/mmu.c
+21-0arch/arm64/kvm/arm.c
+15-1arch/arm64/kvm/hyp/nvhe/pkvm.c
+6-0include/linux/arm-smccc.h
+2-1arch/arm64/kvm/hyp/vhe/switch.c
+111-116 files not shown
+120-1312 files

Linux/linux 80f4a7bDocumentation/virt/kvm/x86 amd-memory-encryption.rst

Documentation: kvm: update links in the references section of AMD Memory Encryption

Replace non-working links in the reference section with the working ones.

Signed-off-by: Ninad Naik <ninadnaik07 at gmail.com>
Link: https://patch.msgid.link/20260511174302.811918-1-ninadnaik07@gmail.com/
Reviewed-by: Liam Merwick <liam.merwick at oracle.com>
Signed-off-by: Paolo Bonzini <pbonzini at redhat.com>
DeltaFile
+4-4Documentation/virt/kvm/x86/amd-memory-encryption.rst
+4-41 files

Linux/linux 5bd1ddbarch/x86/kvm/svm nested.c svm.c

KVM: nSVM: Never use L0's PAUSE loop exiting while L2 is running

Never use L0's (KVM's) PAUSE loop exiting controls while L2 is running,
and instead always configure vmcb02 according to L1's exact capabilities
and desires.

The purpose of intercepting PAUSE after N attempts is to detect when the
vCPU may be stuck waiting on a lock, so that KVM can schedule in a
different vCPU that may be holding said lock.  Barring a very interesting
setup, L1 and L2 do not share locks, and it's extremely unlikely that an
L1 vCPU would hold a spinlock while running L2.  I.e. having a vCPU
executing in L1 yield to a vCPU running in L2 will not allow the L1 vCPU
to make forward progress, and vice versa.

While teaching KVM's "on spin" logic to only yield to other vCPUs in L2 is
doable, in all likelihood it would do more harm than good for most setups.
KVM has limited visibility into which L2 "vCPUs" belong to the same VM,
and thus share a locking domain.  And even if L2 vCPUs are in the same
VM, KVM has no visilibity into L2 vCPU's that are scheduled out by the

    [34 lines not shown]
DeltaFile
+14-29arch/x86/kvm/svm/nested.c
+13-2arch/x86/kvm/svm/svm.c
+27-312 files

Linux/linux 2b72f16arch/x86/kvm trace.h

KVM: x86: Fix Xen hypercall tracepoint argument assignment

TRACE_EVENT(kvm_xen_hypercall) stores a5 in __entry->a4 instead of
__entry->a5.

That overwrites the recorded a4 argument and leaves a5 unset in the
trace entry. Fix the typo so both arguments are captured correctly.

Signed-off-by: Qiang Ma <maqianga at uniontech.com>
Link: https://patch.msgid.link/20260512015313.1685784-1-maqianga@uniontech.com/
Cc: stable at vger.kernel.org
Signed-off-by: Paolo Bonzini <pbonzini at redhat.com>
DeltaFile
+1-1arch/x86/kvm/trace.h
+1-11 files

Linux/linux 577a8d3virt/kvm dirty_ring.c

KVM: Reject wrapped offset in kvm_reset_dirty_gfn()

kvm_reset_dirty_gfn() guards the gfn range with

        if (!memslot || (offset + __fls(mask)) >= memslot->npages)
                return;

but offset is u64 and the addition is unchecked.  The check can be
silently bypassed by a u64 wrap.

The dirty ring backing those entries is MAP_SHARED at
KVM_DIRTY_LOG_PAGE_OFFSET of the vcpu fd, so the VMM can rewrite the
slot and offset fields of any entry between when the kernel pushes
them and when KVM_RESET_DIRTY_RINGS consumes them.  On reset,
kvm_dirty_ring_reset() re-reads the values via READ_ONCE() and feeds
them straight back into this check; only the flags handshake is
treated as the handover, the slot/offset payload is taken on trust.

Crafting two entries

    [32 lines not shown]
DeltaFile
+2-1virt/kvm/dirty_ring.c
+2-11 files

Linux/linux 1d5dcaainclude/asm-generic kprobes.h, include/linux fprobe.h

Merge tag 'probes-fixes-v7.1-rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/trace/linux-trace

Pull probes fixes from Masami Hiramatsu:

 - kprobes: skip non-symbol addresses in kprobe_add_ksym_blacklist()

   Since the ftrace adds its NOPs at .kprobes.text section (which stores
   an array), a wrong entry is added when loading a module which uses
   "__kprobes" attribute.

   To solve this, add "notrace" to __kprobes functions

 - test_kprobes: clear kprobes between test runs

   Clear all kprobes in the test program after running a test set,
   because Kunit test can run several times

 - fprobe: Fix unregister_fprobe() to wait for RCU grace period


    [8 lines not shown]
DeltaFile
+18-11lib/tests/test_kprobes.c
+21-2kernel/trace/fprobe.c
+5-0include/linux/fprobe.h
+2-1kernel/trace/bpf_trace.c
+1-1include/asm-generic/kprobes.h
+47-155 files

Linux/linux c21b90farch/x86/include/asm msr-index.h, arch/x86/kernel/cpu amd.c

x86/CPU/AMD: Prevent improper isolation of shared resources in Zen2's op cache

Make sure resources are not improperly shared in the op cache and
cause instruction corruption this way.

Signed-off-by: Prathyushi Nangia <prathyushi.nangia at amd.com>
Co-developed-by: Borislav Petkov (AMD) <bp at alien8.de>
Signed-off-by: Borislav Petkov (AMD) <bp at alien8.de>
Cc: stable at vger.kernel.org
Signed-off-by: Linus Torvalds <torvalds at linux-foundation.org>
DeltaFile
+2-1arch/x86/include/asm/msr-index.h
+3-0arch/x86/kernel/cpu/amd.c
+2-1tools/arch/x86/include/asm/msr-index.h
+7-23 files

Linux/linux 50897c9lib/kunit Kconfig

Merge tag 'linux_kselftest-kunit-fixes-7.1-rc4' of git://git.kernel.org/pub/scm/linux/kernel/git/shuah/linux-kselftest

Pull kunit fixes from Shuah Khan:
 "Fix to decouple KUNIT_DEBUGFS and KUNIT_ALL_TESTS options and fix
  KUNIT_DEBUGFS dependencies so it depends on DEBUG_FS without which it
  will not be useful"

* tag 'linux_kselftest-kunit-fixes-7.1-rc4' of git://git.kernel.org/pub/scm/linux/kernel/git/shuah/linux-kselftest:
  kunit: config: KUNIT_DEBUGFS should depend on DEBUG_FS
  kunit: config: Enable KUNIT_DEBUGFS by default
DeltaFile
+3-2lib/kunit/Kconfig
+3-21 files

Linux/linux c1fa0bbkernel exit.c

exit: prevent preemption of oopsing TASK_DEAD task

When an already-exiting task oopses, make_task_dead() currently calls
do_task_dead() with preemption enabled.  That is forbidden:
do_task_dead() calls __schedule(), which has a comment saying "WARNING:
must be called with preemption disabled!".

If an oopsing task is preempted in do_task_dead(), between becoming
TASK_DEAD and entering the scheduler explicitly, bad things happen:
finish_task_switch() assumes that once the scheduler has switched away
from a TASK_DEAD task, the task can never run again and its stack is no
longer needed; but that assumption apparently doesn't hold if the dead
task was preempted (the SM_PREEMPT case).

This means that the scheduler ends up repeatedly dropping references on
the dead task's stack, which can lead to use-after-free or double-free
of the entire task stack; in other words, two tasks can end up running
on the same stack, resulting in various kinds of memory corruption.


    [9 lines not shown]
DeltaFile
+1-0kernel/exit.c
+1-01 files

Linux/linux 657b594include/linux fprobe.h, kernel/trace fprobe.c bpf_trace.c

fprobe: Fix unregister_fprobe() to wait for RCU grace period

Commit 4346ba1604093 ("fprobe: Rewrite fprobe on function-graph tracer")
changed fprobe to register struct fprobe to an rcu-hlist, but it forgot
to wait for RCU GP. Thus there can be use-after-free if the fprobe is
released right after unregistering. This can be happened on fprobe
event and sample module code.

To fix this issue, add synchronize_rcu() in unregister_fprobe().

Note that BPF is OK because fprobe is used as a part of
bpf_kprobe_multi_link. This unregisters its fprobe in
bpf_kprobe_multi_link_release() and it is deallocated via
bpf_kprobe_multi_link_dealloc(), which is invoked from
bpf_link_defer_dealloc_rcu_gp() RCU callback.

For BPF, this also introduced unregister_fprobe_async() which does
NOT wait for RCU grace priod.


    [3 lines not shown]
DeltaFile
+21-2kernel/trace/fprobe.c
+5-0include/linux/fprobe.h
+2-1kernel/trace/bpf_trace.c
+28-33 files

Linux/linux 5d69190. Makefile

Linux 7.1-rc3
DeltaFile
+1-1Makefile
+1-11 files

Linux/linux afaa0a4drivers/edac versalnet_edac.c

Merge tag 'edac_urgent_for_v7.1_rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/ras/ras

Pull EDAC fix from Borislav Petkov:

 - Fix a string leak in the versalnet driver

* tag 'edac_urgent_for_v7.1_rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/ras/ras:
  EDAC/versalnet: Fix device name memory leak
DeltaFile
+2-8drivers/edac/versalnet_edac.c
+2-81 files

Linux/linux aa54b1dnet/rxrpc call_event.c conn_event.c

rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present

The DATA-packet handler in rxrpc_input_call_event() and the RESPONSE
handler in rxrpc_verify_response() copy the skb to a linear one before
calling into the security ops only when skb_cloned() is true.  An skb
that is not cloned but still carries externally-owned paged fragments
(e.g. SKBFL_SHARED_FRAG set by splice() into a UDP socket via
__ip_append_data, or a chained skb_has_frag_list()) falls through to
the in-place decryption path, which binds the frag pages directly into
the AEAD/skcipher SGL via skb_to_sgvec().

Extend the gate to also unshare when skb_has_frag_list() or
skb_has_shared_frag() is true.  This catches the splice-loopback vector
and other externally-shared frag sources while preserving the
zero-copy fast path for skbs whose frags are kernel-private (e.g. NIC
page_pool RX, GRO).  The OOM/trace handling already in place is reused.

Fixes: d0d5c0cd1e71 ("rxrpc: Use skb_unshare() rather than skb_cow_data()")
Cc: stable at vger.kernel.org

    [4 lines not shown]
DeltaFile
+3-1net/rxrpc/call_event.c
+2-1net/rxrpc/conn_event.c
+5-22 files

Linux/linux a1a10cd. MAINTAINERS, drivers/clk clk-eyeq.c clk-rk808.c

Merge tag 'clk-fixes-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/clk/linux

Pull clk driver fixes from Stephen Boyd:

 - Mark the DDR bus clk critical in the SpaceMiT driver so that
   boot doesn't fail

 - Fix boot on Mobile EyeQ by creating the auxiliary device for
   the ethernet PHY

 - Plug an OF node leak in Rockchip rk808 clk driver

* tag 'clk-fixes-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/clk/linux:
  clk: rk808: fix OF node reference imbalance
  MAINTAINERS: add myself as a reviewer for the clk subsystem
  reset: eyeq: drop device_set_of_node_from_dev() done by parent
  clk: eyeq: add EyeQ5 children auxiliary device for generic PHYs
  clk: eyeq: use the auxiliary device creation helper
  clk: spacemit: k3: mark top_dclk as CLK_IS_CRITICAL
DeltaFile
+15-45drivers/clk/clk-eyeq.c
+2-22drivers/reset/reset-eyeq.c
+1-1drivers/clk/spacemit/ccu-k3.c
+1-1drivers/clk/clk-rk808.c
+1-0MAINTAINERS
+20-695 files

Linux/linux 515186bkernel/bpf liveness.c, net/core filter.c sock_map.c

Merge tag 'bpf-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf

Pull bpf fixes from Alexei Starovoitov:

 - Fix sk_local_storage diag dump via netlink (Amery Hung)

 - Fix off-by-one in arena direct-value access (Junyoung Jang)

 - Reject TCP_NODELAY in bpf-tcp congestion control (KaFai Wan)

 - Fix type confusion in bpf_*_sock() (Kuniyuki Iwashima)

 - Reject TX-only AF_XDP sockets (Linpu Yu)

 - Don't run arg-tracking analysis twice on main subprog (Paul Chaignon)

 - Fix NULL pointer dereference in bpf_sk_storage_clone and fib lookup
   (Weiming Shi)


    [20 lines not shown]
DeltaFile
+48-7net/core/filter.c
+25-14net/core/sock_map.c
+25-1tools/include/uapi/linux/stddef.h
+7-18kernel/bpf/liveness.c
+16-1tools/testing/selftests/bpf/prog_tests/sockopt_sk.c
+16-0tools/testing/selftests/bpf/progs/sockopt_sk.c
+137-4110 files not shown
+189-5116 files

Linux/linux 3ac1a46kernel/bpf arena.c

bpf: Fix off-by-one boundary validation in arena direct-value access

BPF_MAP_TYPE_ARENA accepts BPF_PSEUDO_MAP_VALUE offsets at exactly
the end of the arena mapping (off == arena_size). The boundary check
in arena_map_direct_value_addr() uses `>` instead of `>=`, which
incorrectly allows a one-past-end pointer to be accepted.

Change the condition to `>=` to correctly reject offsets that fall
outside the valid arena user_vm range.

Fixes: 317460317a02 ("bpf: Introduce bpf_arena.")
Signed-off-by: Junyoung Jang <graypanda.inzag at gmail.com>
Reviewed-by: Emil Tsalapatis <emil at etsalapatis.com>
Link: https://lore.kernel.org/r/20260426172505.1947915-1-graypanda.inzag@gmail.com
Signed-off-by: Alexei Starovoitov <ast at kernel.org>

DeltaFile
+1-1kernel/bpf/arena.c
+1-11 files

Linux/linux bf6d507net/xdp xskmap.c

xskmap: reject TX-only AF_XDP sockets

XSKMAP entries are used as redirect targets for incoming XDP frames.
A TX-only AF_XDP socket lacks an Rx ring and cannot handle redirected
traffic, but xsk_map_update_elem() currently allows such sockets to
be inserted into the map.

Redirecting packets to such a socket on the veth generic-XDP path
causes a kernel crash in xsk_generic_rcv().

This became possible after xsk_is_setup_for_bpf_map() was removed from
the XSKMAP update path, which allowed bound TX-only sockets to be
inserted into the map.

Reject TX-only sockets during XSKMAP updates to avoid the crash.
They remain fully operational for pure Tx purposes outside XSKMAP.

Fixes: 968be23ceaca ("xsk: Fix possible segfault at xskmap entry insertion")
Reported-by: Juefei Pu <tomapufckgml at gmail.com>

    [8 lines not shown]
DeltaFile
+4-0net/xdp/xskmap.c
+4-01 files

Linux/linux 512809bkernel/bpf liveness.c

bpf: Don't run arg-tracking analysis twice on main subprog

Because subprog 0, the main subprog, is considered a global function,
we end up running the arg-tracking dataflow analysis twice on it. That
results in slightly longer verification but mostly in more verbose
verifier logs. This patch fixes it by keeping only the iteration over
global subprogs.

When running over all of Cilium's programs with BPF_LOG_LEVEL2, this
reduces verbosity by ~20% on average.

Fixes: bf0c571f7feb6 ("bpf: introduce forward arg-tracking dataflow analysis")
Signed-off-by: Paul Chaignon <paul.chaignon at gmail.com>
Acked-by: Eduard Zingerman <eddyz87 at gmail.com>
Link: https://lore.kernel.org/r/e4d7b53d4963ef520541a782f5fc8108a168877c.1778176504.git.paul.chaignon@gmail.com
Signed-off-by: Alexei Starovoitov <ast at kernel.org>
DeltaFile
+7-18kernel/bpf/liveness.c
+7-181 files

Linux/linux 1bfaee9fs/overlayfs util.c

Merge tag 'fsverity-for-linus' of git://git.kernel.org/pub/scm/fs/fsverity/linux

Pull fsverity fix from Eric Biggers:
 "Fix a regression in overlayfs caused by an fsverity API change"

* tag 'fsverity-for-linus' of git://git.kernel.org/pub/scm/fs/fsverity/linux:
  ovl: fix verity lazy-load guard broken by fsverity_active() semantic change
DeltaFile
+1-1fs/overlayfs/util.c
+1-11 files

Linux/linux e92b287. Makefile, drivers/android/binder/range_alloc array.rs

Merge tag 'rust-fixes-7.1' of git://git.kernel.org/pub/scm/linux/kernel/git/ojeda/linux

Pull Rust fixes from Miguel Ojeda:
 "Toolchain and infrastructure:

    - Add 'bindgen' target to make UML 32-bit builds work with GCC

    - Disable two Clippy warnings ('collapsible_{if,match}')

  'pin-init' crate:

    - Fix unsoundness issue that created &'static references"

* tag 'rust-fixes-7.1' of git://git.kernel.org/pub/scm/linux/kernel/git/ojeda/linux:
  rust: allow `clippy::collapsible_if` globally
  rust: allow `clippy::collapsible_match` globally
  rust: pin-init: fix incorrect accessor reference lifetime
  rust: pin-init: internal: move alignment check to `make_field_check`
  rust: arch: um: Fix building 32-bit UML with GCC
DeltaFile
+84-100rust/pin-init/internal/src/init.rs
+19-9rust/pin-init/src/__internal.rs
+2-0Makefile
+2-0rust/Makefile
+0-1drivers/android/binder/range_alloc/array.rs
+107-1105 files

Linux/linux ec89572Documentation/hwmon yogafan.rst, drivers/hwmon ltc2992.c lm63.c

Merge tag 'hwmon-for-v7.1-rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/groeck/linux-staging

Pull hwmon fixes from Guenter Roeck:

 - ads7871: Fix endianness bug in 16-bit register reads

 - lm75: Fix configuration register writes and AS6200/TMP112 setup and
   alarm handling

 - lm63: Fix TOCTOU problems

 - corsair-psu: Close HID device on probe errors

 - ltc2992: Fix overflow and threshold range

 - Documentation: fix link to ideapad-laptop.c file

 - Remove stale CONFIG_SENSORS_SBRMI Makefile reference


    [10 lines not shown]
DeltaFile
+32-9drivers/hwmon/ltc2992.c
+30-9drivers/hwmon/lm63.c
+5-5drivers/hwmon/lm75.c
+5-1drivers/hwmon/ads7871.c
+2-2drivers/hwmon/corsair-psu.c
+1-1Documentation/hwmon/yogafan.rst
+75-271 files not shown
+75-287 files

Linux/linux 234d72adrivers/staging/rtl8723bs/os_dep osdep_service.c, drivers/staging/vme_user vme_fake.c

Merge tag 'staging-7.1-rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/staging

Pull staging driver fixes from Greg KH:
 "Here are two small staging driver fixes for 7.1-rc3.  They are:

   - vme_user root device leak fix

   - NULL dereference bugfix in the rtl8723bs driver

  Both of these have been in linux-next all this week with no reported
  issues"

* tag 'staging-7.1-rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/staging:
  staging: rtl8723bs: os_dep: avoid NULL pointer dereference in rtw_cbuf_alloc
  staging: vme_user: fix root device leak on init failure
DeltaFile
+2-1drivers/staging/rtl8723bs/os_dep/osdep_service.c
+2-0drivers/staging/vme_user/vme_fake.c
+4-12 files

Linux/linux fe3e5bcdrivers/usb/class usblp.c, drivers/usb/common ulpi.c

Merge tag 'usb-7.1-rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usb

Pull USB driver fixes from Greg KH:
 "Here are some small USB driver fixes for 7.1-rc3 to resolve some
  reported issues, and a new device id. These are:

   - usblp driver heap leak fixes

   - ulpi driver memory leak fix

   - typec driver fixes

   - dwc3 driver fix

   - omap dma driver fix

   - new option driver device id addition

  All of these have been in linux-next for over a week with no reported

    [11 lines not shown]
DeltaFile
+18-9drivers/usb/typec/tcpm/tcpm.c
+6-6drivers/usb/dwc3/core.c
+4-1drivers/usb/common/ulpi.c
+0-4drivers/usb/gadget/udc/omap_udc.c
+4-0drivers/usb/serial/option.c
+2-1drivers/usb/class/usblp.c
+34-216 files