Changelog in Linux kernel 6.6.84

 
ACPI: resource: IRQ override for Eluktronics MECH-17 [+ + +]
Author: Gannon Kolding <gannon.kolding@gmail.com>
Date:   Mon Jan 27 02:39:02 2025 -0700

    ACPI: resource: IRQ override for Eluktronics MECH-17
    
    [ Upstream commit 607ab6f85f4194b644ea95ac5fe660ef575db3b4 ]
    
    The Eluktronics MECH-17 (GM7RG7N) needs IRQ overriding for the
    keyboard to work.
    
    Adding a DMI_MATCH entry for this laptop model makes the internal
    keyboard function normally.
    
    Signed-off-by: Gannon Kolding <gannon.kolding@gmail.com>
    Link: https://patch.msgid.link/20250127093902.328361-1-gannon.kolding@gmail.com
    Signed-off-by: Rafael J. Wysocki <rafael.j.wysocki@intel.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
alpha/elf: Fix misc/setarch test of util-linux by removing 32bit support [+ + +]
Author: Eric W. Biederman <ebiederm@xmission.com>
Date:   Sun Jan 12 23:39:01 2025 -0600

    alpha/elf: Fix misc/setarch test of util-linux by removing 32bit support
    
    [ Upstream commit b029628be267cba3c7684ec684749fe3e4372398 ]
    
    Richard Henderson <richard.henderson@linaro.org> writes[1]:
    
    > There was a Spec benchmark (I forget which) which was memory bound and ran
    > twice as fast with 32-bit pointers.
    >
    > I copied the idea from DEC to the ELF abi, but never did all the other work
    > to allow the toolchain to take advantage.
    >
    > Amusingly, a later Spec changed the benchmark data sets to not fit into a
    > 32-bit address space, specifically because of this.
    >
    > I expect one could delete the ELF bit and personality and no one would
    > notice. Not even the 10 remaining Alpha users.
    
    In [2] it was pointed out that parts of setarch weren't working
    properly on alpha because it has it's own SET_PERSONALITY
    implementation.  In the discussion that followed Richard Henderson
    pointed out that the 32bit pointer support for alpha was never
    completed.
    
    Fix this by removing alpha's 32bit pointer support.
    
    As a bit of paranoia refuse to execute any alpha binaries that have
    the EF_ALPHA_32BIT flag set.  Just in case someone somewhere has
    binaries that try to use alpha's 32bit pointer support.
    
    Link: https://lkml.kernel.org/r/CAFXwXrkgu=4Qn-v1PjnOR4SG0oUb9LSa0g6QXpBq4ttm52pJOQ@mail.gmail.com [1]
    Link: https://lkml.kernel.org/r/20250103140148.370368-1-glaubitz@physik.fu-berlin.de [2]
    Signed-off-by: Eric W. Biederman <ebiederm@xmission.com>
    Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
    Reviewed-by: Arnd Bergmann <arnd@arndb.de>
    Reviewed-by: John Paul Adrian Glaubitz <glaubitz@physik.fu-berlin.de>
    Tested-by: John Paul Adrian Glaubitz <glaubitz@physik.fu-berlin.de>
    Link: https://lore.kernel.org/r/87y0zfs26i.fsf_-_@email.froward.int.ebiederm.org
    Signed-off-by: Kees Cook <kees@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
ALSA: hda/realtek: Limit mic boost on Positivo ARN50 [+ + +]
Author: Edson Juliano Drosdeck <edson.drosdeck@gmail.com>
Date:   Sat Feb 1 11:39:30 2025 -0300

    ALSA: hda/realtek: Limit mic boost on Positivo ARN50
    
    [ Upstream commit 76b0a22d4cf7dc9091129560fdc04e73eb9db4cb ]
    
    The internal mic boost on the Positivo ARN50 is too high.
    Fix this by applying the ALC269_FIXUP_LIMIT_INT_MIC_BOOST fixup to the machine
    to limit the gain.
    
    Signed-off-by: Edson Juliano Drosdeck <edson.drosdeck@gmail.com>
    Link: https://patch.msgid.link/20250201143930.25089-1-edson.drosdeck@gmail.com
    Signed-off-by: Takashi Iwai <tiwai@suse.de>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
apple-nvme: Release power domains when probe fails [+ + +]
Author: Hector Martin <marcan@marcan.st>
Date:   Thu Feb 13 11:12:59 2025 -0500

    apple-nvme: Release power domains when probe fails
    
    [ Upstream commit eefa72a15ea03fd009333aaa9f0e360b2578e434 ]
    
    Signed-off-by: Hector Martin <marcan@marcan.st>
    Reviewed-by: Neal Gompa <neal@gompa.dev>
    Reviewed-by: Sven Peter <sven@svenpeter.dev>
    Signed-off-by: Alyssa Rosenzweig <alyssa@rosenzweig.io>
    Signed-off-by: Keith Busch <kbusch@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
arm64: mm: Populate vmemmap at the page level if not section aligned [+ + +]
Author: Zhenhua Huang <quic_zhenhuah@quicinc.com>
Date:   Tue Mar 4 15:27:00 2025 +0800

    arm64: mm: Populate vmemmap at the page level if not section aligned
    
    commit d4234d131b0a3f9e65973f1cdc71bb3560f5d14b upstream.
    
    On the arm64 platform with 4K base page config, SECTION_SIZE_BITS is set
    to 27, making one section 128M. The related page struct which vmemmap
    points to is 2M then.
    Commit c1cc1552616d ("arm64: MMU initialisation") optimizes the
    vmemmap to populate at the PMD section level which was suitable
    initially since hot plug granule is always one section(128M). However,
    commit ba72b4c8cf60 ("mm/sparsemem: support sub-section hotplug")
    introduced a 2M(SUBSECTION_SIZE) hot plug granule, which disrupted the
    existing arm64 assumptions.
    
    The first problem is that if start or end is not aligned to a section
    boundary, such as when a subsection is hot added, populating the entire
    section is wasteful.
    
    The next problem is if we hotplug something that spans part of 128 MiB
    section (subsections, let's call it memblock1), and then hotplug something
    that spans another part of a 128 MiB section(subsections, let's call it
    memblock2), and subsequently unplug memblock1, vmemmap_free() will clear
    the entire PMD entry which also supports memblock2 even though memblock2
    is still active.
    
    Assuming hotplug/unplug sizes are guaranteed to be symmetric. Do the
    fix similar to x86-64: populate to pages levels if start/end is not aligned
    with section boundary.
    
    Cc: stable@vger.kernel.org # v5.4+
    Fixes: ba72b4c8cf60 ("mm/sparsemem: support sub-section hotplug")
    Acked-by: David Hildenbrand <david@redhat.com>
    Signed-off-by: Zhenhua Huang <quic_zhenhuah@quicinc.com>
    Reviewed-by: Oscar Salvador <osalvador@suse.de>
    Reviewed-by: Catalin Marinas <catalin.marinas@arm.com>
    Link: https://lore.kernel.org/r/20250304072700.3405036-1-quic_zhenhuah@quicinc.com
    Signed-off-by: Will Deacon <will@kernel.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
ASoC: amd: yc: Support mic on another Lenovo ThinkPad E16 Gen 2 model [+ + +]
Author: Thomas Mizrahi <thomasmizra@gmail.com>
Date:   Sat Mar 8 01:06:28 2025 -0300

    ASoC: amd: yc: Support mic on another Lenovo ThinkPad E16 Gen 2 model
    
    commit 0704a15b930cf97073ce091a0cd7ad32f2304329 upstream.
    
    The internal microphone on the Lenovo ThinkPad E16 model requires a
    quirk entry to work properly. This was fixed in a previous patch (linked
    below), but depending on the specific variant of the model, the product
    name may be "21M5" or "21M6".
    
    The following patch fixed this issue for the 21M5 variant:
      https://lore.kernel.org/all/20240725065442.9293-1-tiwai@suse.de/
    
    This patch adds support for the microphone on the 21M6 variant.
    
    Link: https://github.com/ramaureirac/thinkpad-e14-linux/issues/31
    Cc: stable@vger.kernel.org
    Signed-off-by: Thomas Mizrahi <thomasmizra@gmail.com>
    Link: https://patch.msgid.link/20250308041303.198765-1-thomasmizra@gmail.com
    Signed-off-by: Mark Brown <broonie@kernel.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

ASoC: arizona/madera: use fsleep() in up/down DAPM event delays. [+ + +]
Author: Vitaly Rodionov <vitalyr@opensource.cirrus.com>
Date:   Wed Feb 5 16:08:46 2025 +0000

    ASoC: arizona/madera: use fsleep() in up/down DAPM event delays.
    
    [ Upstream commit 679074942c2502a95842a80471d8fb718165ac77 ]
    
    Using `fsleep` instead of `msleep` resolves some customer complaints
    regarding the precision of up/down DAPM event timing. `fsleep()`
    automatically selects the appropriate sleep function, making the delay
    time more predictable.
    
    Signed-off-by: Vitaly Rodionov <vitalyr@opensource.cirrus.com>
    Link: https://patch.msgid.link/20250205160849.500306-1-vitalyr@opensource.cirrus.com
    Reviewed-by: Charles Keepax <ckeepax@opensource.cirrus.com>
    Signed-off-by: Mark Brown <broonie@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

ASoC: codecs: wm0010: Fix error handling path in wm0010_spi_probe() [+ + +]
Author: Christophe JAILLET <christophe.jaillet@wanadoo.fr>
Date:   Mon Mar 10 18:45:36 2025 +0100

    ASoC: codecs: wm0010: Fix error handling path in wm0010_spi_probe()
    
    [ Upstream commit ed92bc5264c4357d4fca292c769ea9967cd3d3b6 ]
    
    Free some resources in the error handling path of the probe, as already
    done in the remove function.
    
    Fixes: e3523e01869d ("ASoC: wm0010: Add initial wm0010 DSP driver")
    Fixes: fd8b96574456 ("ASoC: wm0010: Clear IRQ as wake source and include missing header")
    Signed-off-by: Christophe JAILLET <christophe.jaillet@wanadoo.fr>
    Reviewed-by: Charles Keepax <ckeepax@opensource.cirrus.com>
    Link: https://patch.msgid.link/5139ba1ab8c4c157ce04e56096a0f54a1683195c.1741549792.git.christophe.jaillet@wanadoo.fr
    Signed-off-by: Mark Brown <broonie@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

ASoC: cs42l43: Fix maximum ADC Volume [+ + +]
Author: Charles Keepax <ckeepax@opensource.cirrus.com>
Date:   Thu Mar 6 13:32:54 2025 +0000

    ASoC: cs42l43: Fix maximum ADC Volume
    
    [ Upstream commit e26f1cfeac6712516bfeed80890da664f4f2e88a ]
    
    The range of ADC volume is -1 -> 3 (-6 to 18dB) so the number of levels
    should actually be 4.
    
    Fixes: fc918cbe874e ("ASoC: cs42l43: Add support for the cs42l43")
    Signed-off-by: Charles Keepax <ckeepax@opensource.cirrus.com>
    Link: https://patch.msgid.link/20250306133254.1861046-1-ckeepax@opensource.cirrus.com
    Signed-off-by: Mark Brown <broonie@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

ASoC: ops: Consistently treat platform_max as control value [+ + +]
Author: Charles Keepax <ckeepax@opensource.cirrus.com>
Date:   Fri Feb 28 15:14:56 2025 +0000

    ASoC: ops: Consistently treat platform_max as control value
    
    [ Upstream commit 0eba2a7e858907a746ba69cd002eb9eb4dbd7bf3 ]
    
    This reverts commit 9bdd10d57a88 ("ASoC: ops: Shift tested values in
    snd_soc_put_volsw() by +min"), and makes some additional related
    updates.
    
    There are two ways the platform_max could be interpreted; the maximum
    register value, or the maximum value the control can be set to. The
    patch moved from treating the value as a control value to a register
    one. When the patch was applied it was technically correct as
    snd_soc_limit_volume() also used the register interpretation. However,
    even then most of the other usages treated platform_max as a
    control value, and snd_soc_limit_volume() has since been updated to
    also do so in commit fb9ad24485087 ("ASoC: ops: add correct range
    check for limiting volume"). That patch however, missed updating
    snd_soc_put_volsw() back to the control interpretation, and fixing
    snd_soc_info_volsw_range(). The control interpretation makes more
    sense as limiting is typically done from the machine driver, so it is
    appropriate to use the customer facing representation rather than the
    internal codec representation. Update all the code to consistently use
    this interpretation of platform_max.
    
    Finally, also add some comments to the soc_mixer_control struct to
    hopefully avoid further patches switching between the two approaches.
    
    Fixes: fb9ad24485087 ("ASoC: ops: add correct range check for limiting volume")
    Signed-off-by: Charles Keepax <ckeepax@opensource.cirrus.com>
    Link: https://patch.msgid.link/20250228151456.3703342-1-ckeepax@opensource.cirrus.com
    Signed-off-by: Mark Brown <broonie@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

ASoC: rsnd: adjust convert rate limitation [+ + +]
Author: Kuninori Morimoto <kuninori.morimoto.gx@renesas.com>
Date:   Wed Feb 5 00:20:48 2025 +0000

    ASoC: rsnd: adjust convert rate limitation
    
    [ Upstream commit 89f9cf185885d4358aa92b48e51d0f09b71775aa ]
    
    Current rsnd driver supports Synchronous SRC Mode, but HW allow to update
    rate only within 1% from current rate. Adjust to it.
    
    Becially, this feature is used to fine-tune subtle difference that occur
    during sampling rate conversion in SRC. So, it should be called within 1%
    margin of rate difference.
    
    If there was difference over 1%, it will apply with 1% increments by using
    loop without indicating error message.
    
    Cc: Yoshihiro Shimoda <yoshihiro.shimoda.uh@renesas.com>
    Signed-off-by: Kuninori Morimoto <kuninori.morimoto.gx@renesas.com>
    Reviewed-by: Yoshihiro Shimoda <yoshihiro.shimoda.uh@renesas.com>
    Tested-by: Yoshihiro Shimoda <yoshihiro.shimoda.uh@renesas.com>
    Link: https://patch.msgid.link/871pwd2qe8.wl-kuninori.morimoto.gx@renesas.com
    Signed-off-by: Mark Brown <broonie@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

ASoC: rsnd: don't indicate warning on rsnd_kctrl_accept_runtime() [+ + +]
Author: Kuninori Morimoto <kuninori.morimoto.gx@renesas.com>
Date:   Wed Feb 5 00:20:42 2025 +0000

    ASoC: rsnd: don't indicate warning on rsnd_kctrl_accept_runtime()
    
    [ Upstream commit c3fc002b206c6c83d1e3702b979733002ba6fb2c ]
    
    rsnd_kctrl_accept_runtime() (1) is used for runtime convert rate
    (= Synchronous SRC Mode). Now, rsnd driver has 2 kctrls for it
    
    (A):    "SRC Out Rate Switch"
    (B):    "SRC Out Rate"          // it calls (1)
    
    (A): can be called anytime
    (B): can be called only runtime, and will indicate warning if it was used
       at non-runtime.
    
    To use runtime convert rate (= Synchronous SRC Mode), user might uses
    command in below order.
    
    (X):    > amixer set "SRC Out Rate" on
            > aplay xxx.wav &
    (Y):    > amixer set "SRC Out Rate" 48010 // convert rate to 48010Hz
    
    (Y): calls B
    (X): calls both A and B.
    
    In this case, when user calls (X), it calls both (A) and (B), but it is not
    yet start running. So, (B) will indicate warning.
    
    This warning was added by commit b5c088689847 ("ASoC: rsnd: add warning
    message to rsnd_kctrl_accept_runtime()"), but the message sounds like the
    operation was not correct. Let's update warning message.
    
    The message is very SRC specific, implement it in src.c
    
    Signed-off-by: Kuninori Morimoto <kuninori.morimoto.gx@renesas.com>
    Reviewed-by: Yoshihiro Shimoda <yoshihiro.shimoda.uh@renesas.com>
    Link: https://patch.msgid.link/8734gt2qed.wl-kuninori.morimoto.gx@renesas.com
    Signed-off-by: Mark Brown <broonie@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

ASoC: rsnd: indicate unsupported clock rate [+ + +]
Author: Kuninori Morimoto <kuninori.morimoto.gx@renesas.com>
Date:   Wed Feb 5 00:20:36 2025 +0000

    ASoC: rsnd: indicate unsupported clock rate
    
    [ Upstream commit 796106e29e5df6cd4b4e2b51262a8a19e9fa0625 ]
    
    It will indicate "unsupported clock rate" when setup clock failed.
    But it is unclear what kind of rate was failed. Indicate it.
    
    Signed-off-by: Kuninori Morimoto <kuninori.morimoto.gx@renesas.com>
    Reviewed-by: Yoshihiro Shimoda <yoshihiro.shimoda.uh@renesas.com>
    Link: https://patch.msgid.link/874j192qej.wl-kuninori.morimoto.gx@renesas.com
    Signed-off-by: Mark Brown <broonie@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

ASoC: rt722-sdca: add missing readable registers [+ + +]
Author: Bard Liao <yung-chuan.liao@linux.intel.com>
Date:   Mon Mar 10 16:04:40 2025 +0800

    ASoC: rt722-sdca: add missing readable registers
    
    [ Upstream commit 247fba13416af65b155949bae582d55c310f58b6 ]
    
    SDW_SDCA_CTL(FUNC_NUM_MIC_ARRAY, RT722_SDCA_ENT_FU15,
    RT722_SDCA_CTL_FU_CH_GAIN, CH_01) ... SDW_SDCA_CTL(FUNC_NUM_MIC_ARRAY,
    RT722_SDCA_ENT_FU15, RT722_SDCA_CTL_FU_CH_GAIN, CH_04) are used by the
    "FU15 Boost Volume" control, but not marked as readable.
    And the mbq size are 2 for those registers.
    
    Fixes: 7f5d6036ca005 ("ASoC: rt722-sdca: Add RT722 SDCA driver")
    Signed-off-by: Bard Liao <yung-chuan.liao@linux.intel.com>
    Reviewed-by: Ranjani Sridharan <ranjani.sridharan@linux.intel.com>
    Reviewed-by: Shuming Fan <shumingf@realtek.com>
    Link: https://patch.msgid.link/20250310080440.58797-1-yung-chuan.liao@linux.intel.com
    Signed-off-by: Mark Brown <broonie@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

ASoC: simple-card-utils.c: add missing dlc->of_node [+ + +]
Author: Kuninori Morimoto <kuninori.morimoto.gx@renesas.com>
Date:   Tue Feb 4 23:50:08 2025 +0000

    ASoC: simple-card-utils.c: add missing dlc->of_node
    
    [ Upstream commit dabbd325b25edb5cdd99c94391817202dd54b651 ]
    
    commit 90de551c1bf ("ASoC: simple-card-utils.c: enable multi Component
    support") added muiti Component support, but was missing to add
    dlc->of_node. Because of it, Sound device list will indicates strange
    name if it was DPCM connection and driver supports dai->driver->dai_args,
    like below
    
            > aplay -l
            card X: sndulcbmix [xxxx], device 0: fe.(null).rsnd-dai.0 (*) []
            ...                                     ^^^^^^
    
    It will be fixed by this patch
    
            > aplay -l
            card X: sndulcbmix [xxxx], device 0: fe.sound@ec500000.rsnd-dai.0 (*) []
            ...                                     ^^^^^^^^^^^^^^
    
    Signed-off-by: Kuninori Morimoto <kuninori.morimoto.gx@renesas.com>
    Reviewed-by: Daniel Baluta <daniel.baluta@nxp.com>
    Link: https://patch.msgid.link/87ikpp2rtb.wl-kuninori.morimoto.gx@renesas.com
    Signed-off-by: Mark Brown <broonie@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

ASoC: SOF: amd: Handle IPC replies before FW_BOOT_COMPLETE [+ + +]
Author: Cristian Ciocaltea <cristian.ciocaltea@collabora.com>
Date:   Fri Feb 7 13:46:04 2025 +0200

    ASoC: SOF: amd: Handle IPC replies before FW_BOOT_COMPLETE
    
    [ Upstream commit ac84ca815adb4171a4276b1d44096b75f6a150b7 ]
    
    In some cases, e.g. during resuming from suspend, there is a possibility
    that some IPC reply messages get received by the host while the DSP
    firmware has not yet reached the complete boot state.
    
    Detect when this happens and do not attempt to process the unexpected
    replies from DSP.  Instead, provide proper debugging support.
    
    Signed-off-by: Cristian Ciocaltea <cristian.ciocaltea@collabora.com>
    Link: https://patch.msgid.link/20250207-sof-vangogh-fixes-v1-3-67824c1e4c9a@collabora.com
    Signed-off-by: Mark Brown <broonie@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

ASoC: SOF: Intel: hda: add softdep pre to snd-hda-codec-hdmi module [+ + +]
Author: Terry Cheong <htcheong@chromium.org>
Date:   Thu Feb 6 11:47:23 2025 +0200

    ASoC: SOF: Intel: hda: add softdep pre to snd-hda-codec-hdmi module
    
    [ Upstream commit 33b7dc7843dbdc9b90c91d11ba30b107f9138ffd ]
    
    In enviornment without KMOD requesting module may fail to load
    snd-hda-codec-hdmi, resulting in HDMI audio not usable.
    Add softdep to loading HDMI codec module first to ensure we can load it
    correctly.
    
    Signed-off-by: Terry Cheong <htcheong@chromium.org>
    Reviewed-by: Bard Liao <yung-chuan.liao@linux.intel.com>
    Reviewed-by: Johny Lin <lpg76627@gmail.com>
    Reviewed-by: Péter Ujfalusi <peter.ujfalusi@linux.intel.com>
    Signed-off-by: Peter Ujfalusi <peter.ujfalusi@linux.intel.com>
    Link: https://patch.msgid.link/20250206094723.18013-1-peter.ujfalusi@linux.intel.com
    Signed-off-by: Mark Brown <broonie@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

ASoC: tas2764: Fix power control mask [+ + +]
Author: Hector Martin <marcan@marcan.st>
Date:   Tue Feb 18 18:35:35 2025 +1000

    ASoC: tas2764: Fix power control mask
    
    [ Upstream commit a3f172359e22b2c11b750d23560481a55bf86af1 ]
    
    Reviewed-by: Neal Gompa <neal@gompa.dev>
    Signed-off-by: Hector Martin <marcan@marcan.st>
    Signed-off-by: James Calligeros <jcalligeros99@gmail.com>
    Link: https://patch.msgid.link/20250218-apple-codec-changes-v2-1-932760fd7e07@gmail.com
    Signed-off-by: Mark Brown <broonie@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

ASoC: tas2764: Set the SDOUT polarity correctly [+ + +]
Author: Hector Martin <marcan@marcan.st>
Date:   Tue Feb 18 18:36:02 2025 +1000

    ASoC: tas2764: Set the SDOUT polarity correctly
    
    [ Upstream commit f5468beeab1b1adfc63c2717b1f29ef3f49a5fab ]
    
    TX launch polarity needs to be the opposite of RX capture polarity, to
    generate the right bit slot alignment.
    
    Reviewed-by: Neal Gompa <neal@gompa.dev>
    Signed-off-by: Hector Martin <marcan@marcan.st>
    Signed-off-by: James Calligeros <jcalligeros99@gmail.com>
    Link: https://patch.msgid.link/20250218-apple-codec-changes-v2-28-932760fd7e07@gmail.com
    Signed-off-by: Mark Brown <broonie@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

ASoC: tas2770: Fix volume scale [+ + +]
Author: Hector Martin <marcan@marcan.st>
Date:   Sat Feb 8 00:54:35 2025 +0000

    ASoC: tas2770: Fix volume scale
    
    [ Upstream commit 579cd64b9df8a60284ec3422be919c362de40e41 ]
    
    The scale starts at -100dB, not -128dB.
    
    Signed-off-by: Hector Martin <marcan@marcan.st>
    Signed-off-by: Mark Brown <broonie@kernel.org>
    Link: https://patch.msgid.link/20250208-asoc-tas2770-v1-1-cf50ff1d59a3@kernel.org
    Signed-off-by: Mark Brown <broonie@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
block: fix 'kmem_cache of name 'bio-108' already exists' [+ + +]
Author: Ming Lei <ming.lei@redhat.com>
Date:   Fri Feb 28 21:26:56 2025 +0800

    block: fix 'kmem_cache of name 'bio-108' already exists'
    
    [ Upstream commit b654f7a51ffb386131de42aa98ed831f8c126546 ]
    
    Device mapper bioset often has big bio_slab size, which can be more than
    1000, then 8byte can't hold the slab name any more, cause the kmem_cache
    allocation warning of 'kmem_cache of name 'bio-108' already exists'.
    
    Fix the warning by extending bio_slab->name to 12 bytes, but fix output
    of /proc/slabinfo
    
    Reported-by: Guangwu Zhang <guazhang@redhat.com>
    Signed-off-by: Ming Lei <ming.lei@redhat.com>
    Link: https://lore.kernel.org/r/20250228132656.2838008-1-ming.lei@redhat.com
    Signed-off-by: Jens Axboe <axboe@kernel.dk>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
Bluetooth: hci_event: Fix enabling passive scanning [+ + +]
Author: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
Date:   Fri Feb 28 13:12:54 2025 -0500

    Bluetooth: hci_event: Fix enabling passive scanning
    
    [ Upstream commit 0bdd88971519cfa8a76d1a4dde182e74cfbd5d5c ]
    
    Passive scanning shall only be enabled when disconnecting LE links,
    otherwise it may start result in triggering scanning when e.g. an ISO
    link disconnects:
    
    > HCI Event: LE Meta Event (0x3e) plen 29
          LE Connected Isochronous Stream Established (0x19)
            Status: Success (0x00)
            Connection Handle: 257
            CIG Synchronization Delay: 0 us (0x000000)
            CIS Synchronization Delay: 0 us (0x000000)
            Central to Peripheral Latency: 10000 us (0x002710)
            Peripheral to Central Latency: 10000 us (0x002710)
            Central to Peripheral PHY: LE 2M (0x02)
            Peripheral to Central PHY: LE 2M (0x02)
            Number of Subevents: 1
            Central to Peripheral Burst Number: 1
            Peripheral to Central Burst Number: 1
            Central to Peripheral Flush Timeout: 2
            Peripheral to Central Flush Timeout: 2
            Central to Peripheral MTU: 320
            Peripheral to Central MTU: 160
            ISO Interval: 10.00 msec (0x0008)
    ...
    > HCI Event: Disconnect Complete (0x05) plen 4
            Status: Success (0x00)
            Handle: 257
            Reason: Remote User Terminated Connection (0x13)
    < HCI Command: LE Set Extended Scan Enable (0x08|0x0042) plen 6
            Extended scan: Enabled (0x01)
            Filter duplicates: Enabled (0x01)
            Duration: 0 msec (0x0000)
            Period: 0.00 sec (0x0000)
    
    Fixes: 9fcb18ef3acb ("Bluetooth: Introduce LE auto connect options")
    Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

Bluetooth: L2CAP: Fix corrupted list in hci_chan_del [+ + +]
Author: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
Date:   Thu Feb 6 15:54:45 2025 -0500

    Bluetooth: L2CAP: Fix corrupted list in hci_chan_del
    
    commit ab4eedb790cae44313759b50fe47da285e2519d5 upstream.
    
    This fixes the following trace by reworking the locking of l2cap_conn
    so instead of only locking when changing the chan_l list this promotes
    chan_lock to a general lock of l2cap_conn so whenever it is being held
    it would prevents the likes of l2cap_conn_del to run:
    
    list_del corruption, ffff888021297e00->prev is LIST_POISON2 (dead000000000122)
    ------------[ cut here ]------------
    kernel BUG at lib/list_debug.c:61!
    Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
    CPU: 1 UID: 0 PID: 5896 Comm: syz-executor213 Not tainted 6.14.0-rc1-next-20250204-syzkaller #0
    Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
    RIP: 0010:__list_del_entry_valid_or_report+0x12c/0x190 lib/list_debug.c:59
    Code: 8c 4c 89 fe 48 89 da e8 32 8c 37 fc 90 0f 0b 48 89 df e8 27 9f 14 fd 48 c7 c7 a0 c0 60 8c 4c 89 fe 48 89 da e8 15 8c 37 fc 90 <0f> 0b 4c 89 e7 e8 0a 9f 14 fd 42 80 3c 2b 00 74 08 4c 89 e7 e8 cb
    RSP: 0018:ffffc90003f6f998 EFLAGS: 00010246
    RAX: 000000000000004e RBX: dead000000000122 RCX: 01454d423f7fbf00
    RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000
    RBP: dffffc0000000000 R08: ffffffff819f077c R09: 1ffff920007eded0
    R10: dffffc0000000000 R11: fffff520007eded1 R12: dead000000000122
    R13: dffffc0000000000 R14: ffff8880352248d8 R15: ffff888021297e00
    FS:  00007f7ace6686c0(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 00007f7aceeeb1d0 CR3: 000000003527c000 CR4: 00000000003526f0
    DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
    DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
    Call Trace:
     <TASK>
     __list_del_entry_valid include/linux/list.h:124 [inline]
     __list_del_entry include/linux/list.h:215 [inline]
     list_del_rcu include/linux/rculist.h:168 [inline]
     hci_chan_del+0x70/0x1b0 net/bluetooth/hci_conn.c:2858
     l2cap_conn_free net/bluetooth/l2cap_core.c:1816 [inline]
     kref_put include/linux/kref.h:65 [inline]
     l2cap_conn_put+0x70/0xe0 net/bluetooth/l2cap_core.c:1830
     l2cap_sock_shutdown+0xa8a/0x1020 net/bluetooth/l2cap_sock.c:1377
     l2cap_sock_release+0x79/0x1d0 net/bluetooth/l2cap_sock.c:1416
     __sock_release net/socket.c:642 [inline]
     sock_close+0xbc/0x240 net/socket.c:1393
     __fput+0x3e9/0x9f0 fs/file_table.c:448
     task_work_run+0x24f/0x310 kernel/task_work.c:227
     ptrace_notify+0x2d2/0x380 kernel/signal.c:2522
     ptrace_report_syscall include/linux/ptrace.h:415 [inline]
     ptrace_report_syscall_exit include/linux/ptrace.h:477 [inline]
     syscall_exit_work+0xc7/0x1d0 kernel/entry/common.c:173
     syscall_exit_to_user_mode_prepare kernel/entry/common.c:200 [inline]
     __syscall_exit_to_user_mode_work kernel/entry/common.c:205 [inline]
     syscall_exit_to_user_mode+0x24a/0x340 kernel/entry/common.c:218
     do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89
     entry_SYSCALL_64_after_hwframe+0x77/0x7f
    RIP: 0033:0x7f7aceeaf449
    Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
    RSP: 002b:00007f7ace668218 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
    RAX: fffffffffffffffc RBX: 00007f7acef39328 RCX: 00007f7aceeaf449
    RDX: 000000000000000e RSI: 0000000020000100 RDI: 0000000000000004
    RBP: 00007f7acef39320 R08: 0000000000000000 R09: 0000000000000000
    R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
    R13: 0000000000000004 R14: 00007f7ace668670 R15: 000000000000000b
     </TASK>
    Modules linked in:
    ---[ end trace 0000000000000000 ]---
    RIP: 0010:__list_del_entry_valid_or_report+0x12c/0x190 lib/list_debug.c:59
    Code: 8c 4c 89 fe 48 89 da e8 32 8c 37 fc 90 0f 0b 48 89 df e8 27 9f 14 fd 48 c7 c7 a0 c0 60 8c 4c 89 fe 48 89 da e8 15 8c 37 fc 90 <0f> 0b 4c 89 e7 e8 0a 9f 14 fd 42 80 3c 2b 00 74 08 4c 89 e7 e8 cb
    RSP: 0018:ffffc90003f6f998 EFLAGS: 00010246
    RAX: 000000000000004e RBX: dead000000000122 RCX: 01454d423f7fbf00
    RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000
    RBP: dffffc0000000000 R08: ffffffff819f077c R09: 1ffff920007eded0
    R10: dffffc0000000000 R11: fffff520007eded1 R12: dead000000000122
    R13: dffffc0000000000 R14: ffff8880352248d8 R15: ffff888021297e00
    FS:  00007f7ace6686c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000
    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 00007f7acef05b08 CR3: 000000003527c000 CR4: 00000000003526f0
    DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
    DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
    
    Reported-by: syzbot+10bd8fe6741eedd2be2e@syzkaller.appspotmail.com
    Tested-by: syzbot+10bd8fe6741eedd2be2e@syzkaller.appspotmail.com
    Fixes: b4f82f9ed43a ("Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd")
    Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
    Signed-off-by: Dan Carpenter <dan.carpenter@linaro.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd [+ + +]
Author: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
Date:   Thu Jan 16 10:35:03 2025 -0500

    Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd
    
    [ Upstream commit b4f82f9ed43aefa79bec2504ae8c29be0c0f5d1d ]
    
    After the hci sync command releases l2cap_conn, the hci receive data work
    queue references the released l2cap_conn when sending to the upper layer.
    Add hci dev lock to the hci receive data work queue to synchronize the two.
    
    [1]
    BUG: KASAN: slab-use-after-free in l2cap_send_cmd+0x187/0x8d0 net/bluetooth/l2cap_core.c:954
    Read of size 8 at addr ffff8880271a4000 by task kworker/u9:2/5837
    
    CPU: 0 UID: 0 PID: 5837 Comm: kworker/u9:2 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0
    Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
    Workqueue: hci1 hci_rx_work
    Call Trace:
     <TASK>
     __dump_stack lib/dump_stack.c:94 [inline]
     dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
     print_address_description mm/kasan/report.c:378 [inline]
     print_report+0x169/0x550 mm/kasan/report.c:489
     kasan_report+0x143/0x180 mm/kasan/report.c:602
     l2cap_build_cmd net/bluetooth/l2cap_core.c:2964 [inline]
     l2cap_send_cmd+0x187/0x8d0 net/bluetooth/l2cap_core.c:954
     l2cap_sig_send_rej net/bluetooth/l2cap_core.c:5502 [inline]
     l2cap_sig_channel net/bluetooth/l2cap_core.c:5538 [inline]
     l2cap_recv_frame+0x221f/0x10db0 net/bluetooth/l2cap_core.c:6817
     hci_acldata_packet net/bluetooth/hci_core.c:3797 [inline]
     hci_rx_work+0x508/0xdb0 net/bluetooth/hci_core.c:4040
     process_one_work kernel/workqueue.c:3229 [inline]
     process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310
     worker_thread+0x870/0xd30 kernel/workqueue.c:3391
     kthread+0x2f0/0x390 kernel/kthread.c:389
     ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
     ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
     </TASK>
    
    Allocated by task 5837:
     kasan_save_stack mm/kasan/common.c:47 [inline]
     kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
     poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
     __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:394
     kasan_kmalloc include/linux/kasan.h:260 [inline]
     __kmalloc_cache_noprof+0x243/0x390 mm/slub.c:4329
     kmalloc_noprof include/linux/slab.h:901 [inline]
     kzalloc_noprof include/linux/slab.h:1037 [inline]
     l2cap_conn_add+0xa9/0x8e0 net/bluetooth/l2cap_core.c:6860
     l2cap_connect_cfm+0x115/0x1090 net/bluetooth/l2cap_core.c:7239
     hci_connect_cfm include/net/bluetooth/hci_core.h:2057 [inline]
     hci_remote_features_evt+0x68e/0xac0 net/bluetooth/hci_event.c:3726
     hci_event_func net/bluetooth/hci_event.c:7473 [inline]
     hci_event_packet+0xac2/0x1540 net/bluetooth/hci_event.c:7525
     hci_rx_work+0x3f3/0xdb0 net/bluetooth/hci_core.c:4035
     process_one_work kernel/workqueue.c:3229 [inline]
     process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310
     worker_thread+0x870/0xd30 kernel/workqueue.c:3391
     kthread+0x2f0/0x390 kernel/kthread.c:389
     ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
     ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
    
    Freed by task 54:
     kasan_save_stack mm/kasan/common.c:47 [inline]
     kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
     kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:582
     poison_slab_object mm/kasan/common.c:247 [inline]
     __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264
     kasan_slab_free include/linux/kasan.h:233 [inline]
     slab_free_hook mm/slub.c:2353 [inline]
     slab_free mm/slub.c:4613 [inline]
     kfree+0x196/0x430 mm/slub.c:4761
     l2cap_connect_cfm+0xcc/0x1090 net/bluetooth/l2cap_core.c:7235
     hci_connect_cfm include/net/bluetooth/hci_core.h:2057 [inline]
     hci_conn_failed+0x287/0x400 net/bluetooth/hci_conn.c:1266
     hci_abort_conn_sync+0x56c/0x11f0 net/bluetooth/hci_sync.c:5603
     hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:332
     process_one_work kernel/workqueue.c:3229 [inline]
     process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310
     worker_thread+0x870/0xd30 kernel/workqueue.c:3391
     kthread+0x2f0/0x390 kernel/kthread.c:389
     ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
     ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
    
    Reported-by: syzbot+31c2f641b850a348a734@syzkaller.appspotmail.com
    Closes: https://syzkaller.appspot.com/bug?extid=31c2f641b850a348a734
    Tested-by: syzbot+31c2f641b850a348a734@syzkaller.appspotmail.com
    Signed-off-by: Edward Adam Davis <eadavis@qq.com>
    Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
bonding: fix incorrect MAC address setting to receive NS messages [+ + +]
Author: Hangbin Liu <liuhangbin@gmail.com>
Date:   Thu Mar 6 02:39:22 2025 +0000

    bonding: fix incorrect MAC address setting to receive NS messages
    
    [ Upstream commit 0c5e145a350de3b38cd5ae77a401b12c46fb7c1d ]
    
    When validation on the backup slave is enabled, we need to validate the
    Neighbor Solicitation (NS) messages received on the backup slave. To
    receive these messages, the correct destination MAC address must be added
    to the slave. However, the target in bonding is a unicast address, which
    we cannot use directly. Instead, we should first convert it to a
    Solicited-Node Multicast Address and then derive the corresponding MAC
    address.
    
    Fix the incorrect MAC address setting on both slave_set_ns_maddr() and
    slave_set_ns_maddrs(). Since the two function names are similar. Add
    some description for the functions. Also only use one mac_addr variable
    in slave_set_ns_maddr() to save some code and logic.
    
    Fixes: 8eb36164d1a6 ("bonding: add ns target multicast address to slave device")
    Acked-by: Jay Vosburgh <jv@jvosburgh.net>
    Reviewed-by: Nikolay Aleksandrov <razor@blackwall.org>
    Signed-off-by: Hangbin Liu <liuhangbin@gmail.com>
    Reviewed-by: Simon Horman <horms@kernel.org>
    Link: https://patch.msgid.link/20250306023923.38777-2-liuhangbin@gmail.com
    Signed-off-by: Paolo Abeni <pabeni@redhat.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
bpf: Use raw_spinlock_t in ringbuf [+ + +]
Author: Wander Lairson Costa <wander.lairson@gmail.com>
Date:   Fri Sep 20 16:06:59 2024 -0300

    bpf: Use raw_spinlock_t in ringbuf
    
    commit 8b62645b09f870d70c7910e7550289d444239a46 upstream.
    
    The function __bpf_ringbuf_reserve is invoked from a tracepoint, which
    disables preemption. Using spinlock_t in this context can lead to a
    "sleep in atomic" warning in the RT variant. This issue is illustrated
    in the example below:
    
    BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48
    in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 556208, name: test_progs
    preempt_count: 1, expected: 0
    RCU nest depth: 1, expected: 1
    INFO: lockdep is turned off.
    Preemption disabled at:
    [<ffffd33a5c88ea44>] migrate_enable+0xc0/0x39c
    CPU: 7 PID: 556208 Comm: test_progs Tainted: G
    Hardware name: Qualcomm SA8775P Ride (DT)
    Call trace:
     dump_backtrace+0xac/0x130
     show_stack+0x1c/0x30
     dump_stack_lvl+0xac/0xe8
     dump_stack+0x18/0x30
     __might_resched+0x3bc/0x4fc
     rt_spin_lock+0x8c/0x1a4
     __bpf_ringbuf_reserve+0xc4/0x254
     bpf_ringbuf_reserve_dynptr+0x5c/0xdc
     bpf_prog_ac3d15160d62622a_test_read_write+0x104/0x238
     trace_call_bpf+0x238/0x774
     perf_call_bpf_enter.isra.0+0x104/0x194
     perf_syscall_enter+0x2f8/0x510
     trace_sys_enter+0x39c/0x564
     syscall_trace_enter+0x220/0x3c0
     do_el0_svc+0x138/0x1dc
     el0_svc+0x54/0x130
     el0t_64_sync_handler+0x134/0x150
     el0t_64_sync+0x17c/0x180
    
    Switch the spinlock to raw_spinlock_t to avoid this error.
    
    Fixes: 457f44363a88 ("bpf: Implement BPF ring buffer and verifier support for it")
    Reported-by: Brian Grech <bgrech@redhat.com>
    Signed-off-by: Wander Lairson Costa <wander.lairson@gmail.com>
    Signed-off-by: Wander Lairson Costa <wander@redhat.com>
    Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
    Acked-by: Daniel Borkmann <daniel@iogearbox.net>
    Link: https://lore.kernel.org/r/20240920190700.617253-1-wander@redhat.com
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    Signed-off-by: Jianqi Ren <jianqi.ren.cn@windriver.com>
    Signed-off-by: He Zhe <zhe.he@windriver.com>

 
cifs: Fix integer overflow while processing acdirmax mount option [+ + +]
Author: Murad Masimov <m.masimov@mt-integration.ru>
Date:   Tue Mar 11 17:22:04 2025 +0300

    cifs: Fix integer overflow while processing acdirmax mount option
    
    [ Upstream commit 5b29891f91dfb8758baf1e2217bef4b16b2b165b ]
    
    User-provided mount parameter acdirmax of type u32 is intended to have
    an upper limit, but before it is validated, the value is converted from
    seconds to jiffies which can lead to an integer overflow.
    
    Found by Linux Verification Center (linuxtesting.org) with SVACE.
    
    Fixes: 4c9f948142a5 ("cifs: Add new mount parameter "acdirmax" to allow caching directory metadata")
    Signed-off-by: Murad Masimov <m.masimov@mt-integration.ru>
    Signed-off-by: Steve French <stfrench@microsoft.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

cifs: Fix integer overflow while processing acregmax mount option [+ + +]
Author: Murad Masimov <m.masimov@mt-integration.ru>
Date:   Tue Mar 11 17:22:03 2025 +0300

    cifs: Fix integer overflow while processing acregmax mount option
    
    [ Upstream commit 7489161b1852390b4413d57f2457cd40b34da6cc ]
    
    User-provided mount parameter acregmax of type u32 is intended to have
    an upper limit, but before it is validated, the value is converted from
    seconds to jiffies which can lead to an integer overflow.
    
    Found by Linux Verification Center (linuxtesting.org) with SVACE.
    
    Fixes: 5780464614f6 ("cifs: Add new parameter "acregmax" for distinct file and directory metadata timeout")
    Signed-off-by: Murad Masimov <m.masimov@mt-integration.ru>
    Signed-off-by: Steve French <stfrench@microsoft.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

cifs: Fix integer overflow while processing actimeo mount option [+ + +]
Author: Murad Masimov <m.masimov@mt-integration.ru>
Date:   Tue Mar 11 17:22:05 2025 +0300

    cifs: Fix integer overflow while processing actimeo mount option
    
    [ Upstream commit 64f690ee22c99e16084e0e45181b2a1eed2fa149 ]
    
    User-provided mount parameter actimeo of type u32 is intended to have
    an upper limit, but before it is validated, the value is converted from
    seconds to jiffies which can lead to an integer overflow.
    
    Found by Linux Verification Center (linuxtesting.org) with SVACE.
    
    Fixes: 6d20e8406f09 ("cifs: add attribute cache timeout (actimeo) tunable")
    Signed-off-by: Murad Masimov <m.masimov@mt-integration.ru>
    Signed-off-by: Steve French <stfrench@microsoft.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

cifs: Fix integer overflow while processing closetimeo mount option [+ + +]
Author: Murad Masimov <m.masimov@mt-integration.ru>
Date:   Tue Mar 11 17:22:06 2025 +0300

    cifs: Fix integer overflow while processing closetimeo mount option
    
    [ Upstream commit d5a30fddfe2f2e540f6c43b59cf701809995faef ]
    
    User-provided mount parameter closetimeo of type u32 is intended to have
    an upper limit, but before it is validated, the value is converted from
    seconds to jiffies which can lead to an integer overflow.
    
    Found by Linux Verification Center (linuxtesting.org) with SVACE.
    
    Fixes: 5efdd9122eff ("smb3: allow deferred close timeout to be configurable")
    Signed-off-by: Murad Masimov <m.masimov@mt-integration.ru>
    Signed-off-by: Steve French <stfrench@microsoft.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

cifs: Throw -EOPNOTSUPP error on unsupported reparse point type from parse_reparse_point() [+ + +]
Author: Pali Rohár <pali@kernel.org>
Date:   Wed Sep 18 00:16:05 2024 +0200

    cifs: Throw -EOPNOTSUPP error on unsupported reparse point type from parse_reparse_point()
    
    [ Upstream commit cad3fc0a4c8cef07b07ceddc137f582267577250 ]
    
    This would help to track and detect by caller if the reparse point type was
    processed or not.
    
    Signed-off-by: Pali Rohár <pali@kernel.org>
    Signed-off-by: Steve French <stfrench@microsoft.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

cifs: Treat unhandled directory name surrogate reparse points as mount directory nodes [+ + +]
Author: Pali Rohár <pali@kernel.org>
Date:   Wed Sep 18 00:28:25 2024 +0200

    cifs: Treat unhandled directory name surrogate reparse points as mount directory nodes
    
    [ Upstream commit b587fd128660d48cd2122f870f720ff8e2b4abb3 ]
    
    If the reparse point was not handled (indicated by the -EOPNOTSUPP from
    ops->parse_reparse_point() call) but reparse tag is of type name surrogate
    directory type, then treat is as a new mount point.
    
    Name surrogate reparse point represents another named entity in the system.
    
    From SMB client point of view, this another entity is resolved on the SMB
    server, and server serves its content automatically. Therefore from Linux
    client point of view, this name surrogate reparse point of directory type
    crosses mount point.
    
    Signed-off-by: Pali Rohár <pali@kernel.org>
    Signed-off-by: Steve French <stfrench@microsoft.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

cifs: Validate content of WSL reparse point buffers [+ + +]
Author: Pali Rohár <pali@kernel.org>
Date:   Sat Sep 21 01:29:33 2024 +0200

    cifs: Validate content of WSL reparse point buffers
    
    [ Upstream commit 1f48660667efb97c3cf70485c7e1977af718b48b ]
    
    WSL socket, fifo, char and block devices have empty reparse buffer.
    Validate the length of the reparse buffer.
    
    Signed-off-by: Pali Rohár <pali@kernel.org>
    Signed-off-by: Steve French <stfrench@microsoft.com>
    Stable-dep-of: cad3fc0a4c8c ("cifs: Throw -EOPNOTSUPP error on unsupported reparse point type from parse_reparse_point()")
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
clk: samsung: update PLL locktime for PLL142XX used on FSD platform [+ + +]
Author: Varada Pavani <v.pavani@samsung.com>
Date:   Tue Feb 25 18:49:18 2025 +0530

    clk: samsung: update PLL locktime for PLL142XX used on FSD platform
    
    commit 53517a70873c7a91675f7244768aad5006cc45de upstream.
    
    Currently PLL142XX locktime is 270. As per spec, it should be 150. Hence
    update PLL142XX controller locktime to 150.
    
    Cc: stable@vger.kernel.org
    Fixes: 4f346005aaed ("clk: samsung: fsd: Add initial clock support")
    Signed-off-by: Varada Pavani <v.pavani@samsung.com>
    Link: https://lore.kernel.org/r/20250225131918.50925-3-v.pavani@samsung.com
    Signed-off-by: Krzysztof Kozlowski <krzysztof.kozlowski@linaro.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
clockevents/drivers/i8253: Fix stop sequence for timer 0 [+ + +]
Author: David Woodhouse <dwmw@amazon.co.uk>
Date:   Fri Aug 2 14:55:55 2024 +0100

    clockevents/drivers/i8253: Fix stop sequence for timer 0
    
    commit 531b2ca0a940ac9db03f246c8b77c4201de72b00 upstream.
    
    According to the data sheet, writing the MODE register should stop the
    counter (and thus the interrupts). This appears to work on real hardware,
    at least modern Intel and AMD systems. It should also work on Hyper-V.
    
    However, on some buggy virtual machines the mode change doesn't have any
    effect until the counter is subsequently loaded (or perhaps when the IRQ
    next fires).
    
    So, set MODE 0 and then load the counter, to ensure that those buggy VMs
    do the right thing and the interrupts stop. And then write MODE 0 *again*
    to stop the counter on compliant implementations too.
    
    Apparently, Hyper-V keeps firing the IRQ *repeatedly* even in mode zero
    when it should only happen once, but the second MODE write stops that too.
    
    Userspace test program (mostly written by tglx):
    =====
     #include <stdio.h>
     #include <unistd.h>
     #include <stdlib.h>
     #include <stdint.h>
     #include <sys/io.h>
    
    static __always_inline void __out##bwl(type value, uint16_t port)       \
    {                                                                       \
            asm volatile("out" #bwl " %" #bw "0, %w1"                       \
                         : : "a"(value), "Nd"(port));                       \
    }                                                                       \
                                                                            \
    static __always_inline type __in##bwl(uint16_t port)                    \
    {                                                                       \
            type value;                                                     \
            asm volatile("in" #bwl " %w1, %" #bw "0"                        \
                         : "=a"(value) : "Nd"(port));                       \
            return value;                                                   \
    }
    
    BUILDIO(b, b, uint8_t)
    
     #define inb __inb
     #define outb __outb
    
     #define PIT_MODE       0x43
     #define PIT_CH0        0x40
     #define PIT_CH2        0x42
    
    static int is8254;
    
    static void dump_pit(void)
    {
            if (is8254) {
                    // Latch and output counter and status
                    outb(0xC2, PIT_MODE);
                    printf("%02x %02x %02x\n", inb(PIT_CH0), inb(PIT_CH0), inb(PIT_CH0));
            } else {
                    // Latch and output counter
                    outb(0x0, PIT_MODE);
                    printf("%02x %02x\n", inb(PIT_CH0), inb(PIT_CH0));
            }
    }
    
    int main(int argc, char* argv[])
    {
            int nr_counts = 2;
    
            if (argc > 1)
                    nr_counts = atoi(argv[1]);
    
            if (argc > 2)
                    is8254 = 1;
    
            if (ioperm(0x40, 4, 1) != 0)
                    return 1;
    
            dump_pit();
    
            printf("Set oneshot\n");
            outb(0x38, PIT_MODE);
            outb(0x00, PIT_CH0);
            outb(0x0F, PIT_CH0);
    
            dump_pit();
            usleep(1000);
            dump_pit();
    
            printf("Set periodic\n");
            outb(0x34, PIT_MODE);
            outb(0x00, PIT_CH0);
            outb(0x0F, PIT_CH0);
    
            dump_pit();
            usleep(1000);
            dump_pit();
            dump_pit();
            usleep(100000);
            dump_pit();
            usleep(100000);
            dump_pit();
    
            printf("Set stop (%d counter writes)\n", nr_counts);
            outb(0x30, PIT_MODE);
            while (nr_counts--)
                    outb(0xFF, PIT_CH0);
    
            dump_pit();
            usleep(100000);
            dump_pit();
            usleep(100000);
            dump_pit();
    
            printf("Set MODE 0\n");
            outb(0x30, PIT_MODE);
    
            dump_pit();
            usleep(100000);
            dump_pit();
            usleep(100000);
            dump_pit();
    
            return 0;
    }
    =====
    
    Suggested-by: Sean Christopherson <seanjc@google.com>
    Co-developed-by: Li RongQing <lirongqing@baidu.com>
    Signed-off-by: Li RongQing <lirongqing@baidu.com>
    Signed-off-by: David Woodhouse <dwmw@amazon.co.uk>
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Tested-by: Michael Kelley <mhkelley@outlook.com>
    Link: https://lore.kernel.org/all/20240802135555.564941-2-dwmw2@infradead.org
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
 
dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature [+ + +]
Author: Kent Overstreet <kent.overstreet@linux.dev>
Date:   Sat Mar 8 10:50:08 2025 -0500

    dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature
    
    commit 57e9417f69839cb10f7ffca684c38acd28ceb57b upstream.
    
    Fix memory corruption due to incorrect parameter being passed to bio_init
    
    Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
    Signed-off-by: Mikulas Patocka <mpatocka@redhat.com>
    Cc: stable@vger.kernel.org      # v6.5+
    Fixes: 1d9a94389853 ("dm flakey: clone pages on write bio before corrupting them")
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
Drivers: hv: vmbus: Don't release fb_mmio resource in vmbus_free_mmio() [+ + +]
Author: Michael Kelley <mhklinux@outlook.com>
Date:   Sun Mar 9 20:52:08 2025 -0700

    Drivers: hv: vmbus: Don't release fb_mmio resource in vmbus_free_mmio()
    
    [ Upstream commit 73fe9073c0cc28056cb9de0c8a516dac070f1d1f ]
    
    The VMBus driver manages the MMIO space it owns via the hyperv_mmio
    resource tree. Because the synthetic video framebuffer portion of the
    MMIO space is initially setup by the Hyper-V host for each guest, the
    VMBus driver does an early reserve of that portion of MMIO space in the
    hyperv_mmio resource tree. It saves a pointer to that resource in
    fb_mmio. When a VMBus driver requests MMIO space and passes "true"
    for the "fb_overlap_ok" argument, the reserved framebuffer space is
    used if possible. In that case it's not necessary to do another request
    against the "shadow" hyperv_mmio resource tree because that resource
    was already requested in the early reserve steps.
    
    However, the vmbus_free_mmio() function currently does no special
    handling for the fb_mmio resource. When a framebuffer device is
    removed, or the driver is unbound, the current code for
    vmbus_free_mmio() releases the reserved resource, leaving fb_mmio
    pointing to memory that has been freed. If the same or another
    driver is subsequently bound to the device, vmbus_allocate_mmio()
    checks against fb_mmio, and potentially gets garbage. Furthermore
    a second unbind operation produces this "nonexistent resource" error
    because of the unbalanced behavior between vmbus_allocate_mmio() and
    vmbus_free_mmio():
    
    [   55.499643] resource: Trying to free nonexistent
                            resource <0x00000000f0000000-0x00000000f07fffff>
    
    Fix this by adding logic to vmbus_free_mmio() to recognize when
    MMIO space in the fb_mmio reserved area would be released, and don't
    release it. This filtering ensures the fb_mmio resource always exists,
    and makes vmbus_free_mmio() more parallel with vmbus_allocate_mmio().
    
    Fixes: be000f93e5d7 ("drivers:hv: Track allocations of children of hv_vmbus in private resource tree")
    Signed-off-by: Michael Kelley <mhklinux@outlook.com>
    Tested-by: Saurabh Sengar <ssengar@linux.microsoft.com>
    Reviewed-by: Saurabh Sengar <ssengar@linux.microsoft.com>
    Link: https://lore.kernel.org/r/20250310035208.275764-1-mhklinux@outlook.com
    Signed-off-by: Wei Liu <wei.liu@kernel.org>
    Message-ID: <20250310035208.275764-1-mhklinux@outlook.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
drm/amd/display: Assign normalized_pix_clk when color depth = 14 [+ + +]
Author: Alex Hung <alex.hung@amd.com>
Date:   Thu Feb 27 16:36:25 2025 -0700

    drm/amd/display: Assign normalized_pix_clk when color depth = 14
    
    commit 79e31396fdd7037c503e6add15af7cb00633ea92 upstream.
    
    [WHY & HOW]
    A warning message "WARNING: CPU: 4 PID: 459 at ... /dc_resource.c:3397
    calculate_phy_pix_clks+0xef/0x100 [amdgpu]" occurs because the
    display_color_depth == COLOR_DEPTH_141414 is not handled. This is
    observed in Radeon RX 6600 XT.
    
    It is fixed by assigning pix_clk * (14 * 3) / 24 - same as the rests.
    
    Also fixes the indentation in get_norm_pix_clk.
    
    Reviewed-by: Harry Wentland <harry.wentland@amd.com>
    Signed-off-by: Alex Hung <alex.hung@amd.com>
    Signed-off-by: Tom Chung <chiahsuan.chung@amd.com>
    Tested-by: Daniel Wheeler <daniel.wheeler@amd.com>
    Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
    (cherry picked from commit 274a87eb389f58eddcbc5659ab0b180b37e92775)
    Cc: stable@vger.kernel.org
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

drm/amd/display: Disable unneeded hpd interrupts during dm_init [+ + +]
Author: Leo Li <sunpeng.li@amd.com>
Date:   Thu Feb 20 16:20:26 2025 -0500

    drm/amd/display: Disable unneeded hpd interrupts during dm_init
    
    commit 40b8c14936bd2726354c856251f6baed9869e760 upstream.
    
    [Why]
    
    It seems HPD interrupts are enabled by default for all connectors, even
    if the hpd source isn't valid. An eDP for example, does not have a valid
    hpd source (but does have a valid hpdrx source; see construct_phy()).
    Thus, eDPs should have their hpd interrupt disabled.
    
    In the past, this wasn't really an issue. Although the driver gets
    interrupted, then acks by writing to hw registers, there weren't any
    subscribed handlers that did anything meaningful (see
    register_hpd_handlers()).
    
    But things changed with the introduction of IPS. s2idle requires that
    the driver allows IPS for DMUB fw to put hw to sleep. Since register
    access requires hw to be awake, the driver will block IPS entry to do
    so. And no IPS means no hw sleep during s2idle.
    
    This was the observation on DCN35 systems with an eDP. During suspend,
    the eDP toggled its hpd pin as part of the panel power down sequence.
    The driver was then interrupted, and acked by writing to registers,
    blocking IPS entry.
    
    [How]
    
    Since DC marks eDP connections as having invalid hpd sources (see
    construct_phy()), DM should disable them at the hw level. Do so in
    amdgpu_dm_hpd_init() by disabling all hpd ints first, then selectively
    enabling ones for connectors that have valid hpd sources.
    
    Cc: Mario Limonciello <mario.limonciello@amd.com>
    Cc: Alex Deucher <alexander.deucher@amd.com>
    Reviewed-by: Harry Wentland <harry.wentland@amd.com>
    Signed-off-by: Leo Li <sunpeng.li@amd.com>
    Signed-off-by: Tom Chung <chiahsuan.chung@amd.com>
    Tested-by: Daniel Wheeler <daniel.wheeler@amd.com>
    Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
    (cherry picked from commit 7b1ba19eb15f88e70782642ce2d934211269337b)
    Cc: stable@vger.kernel.org
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

drm/amd/display: Fix slab-use-after-free on hdcp_work [+ + +]
Author: Mario Limonciello <mario.limonciello@amd.com>
Date:   Fri Feb 28 13:18:14 2025 -0600

    drm/amd/display: Fix slab-use-after-free on hdcp_work
    
    commit e65e7bea220c3ce8c4c793b4ba35557f4994ab2b upstream.
    
    [Why]
    A slab-use-after-free is reported when HDCP is destroyed but the
    property_validate_dwork queue is still running.
    
    [How]
    Cancel the delayed work when destroying workqueue.
    
    Closes: https://gitlab.freedesktop.org/drm/amd/-/issues/4006
    Fixes: da3fd7ac0bcf ("drm/amd/display: Update CP property based on HW query")
    Cc: Alex Deucher <alexander.deucher@amd.com>
    Reviewed-by: Alex Hung <alex.hung@amd.com>
    Signed-off-by: Mario Limonciello <mario.limonciello@amd.com>
    Signed-off-by: Tom Chung <chiahsuan.chung@amd.com>
    Tested-by: Daniel Wheeler <daniel.wheeler@amd.com>
    Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
    (cherry picked from commit 725a04ba5a95e89c89633d4322430cfbca7ce128)
    Cc: stable@vger.kernel.org
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

drm/amd/display: Restore correct backlight brightness after a GPU reset [+ + +]
Author: Mario Limonciello <mario.limonciello@amd.com>
Date:   Sun Feb 23 00:04:35 2025 -0600

    drm/amd/display: Restore correct backlight brightness after a GPU reset
    
    commit 5760388d9681ac743038b846b9082b9023969551 upstream.
    
    [Why]
    GPU reset will attempt to restore cached state, but brightness doesn't
    get restored. It will come back at 100% brightness, but userspace thinks
    it's the previous value.
    
    [How]
    When running resume sequence if GPU is in reset restore brightness
    to previous value.
    
    Acked-by: Wayne Lin <Wayne.Lin@amd.com>
    Signed-off-by: Mario Limonciello <mario.limonciello@amd.com>
    Signed-off-by: Tom Chung <chiahsuan.chung@amd.com>
    Tested-by: Daniel Wheeler <daniel.wheeler@amd.com>
    Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
    (cherry picked from commit 5e19e2b57b6bb640d68dfc7991e1e182922cf867)
    Cc: stable@vger.kernel.org
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
drm/atomic: Filter out redundant DPMS calls [+ + +]
Author: Ville Syrjälä <ville.syrjala@linux.intel.com>
Date:   Wed Feb 19 18:02:39 2025 +0200

    drm/atomic: Filter out redundant DPMS calls
    
    commit de93ddf88088f7624b589d0ff3af9effb87e8f3b upstream.
    
    Video players (eg. mpv) do periodic XResetScreenSaver() calls to
    keep the screen on while the video playing. The modesetting ddx
    plumbs these straight through into the kernel as DPMS setproperty
    ioctls, without any filtering whatsoever. When implemented via
    atomic these end up as empty commits on the crtc (which will
    nonetheless take one full frame), which leads to a dropped
    frame every time XResetScreenSaver() is called.
    
    Let's just filter out redundant DPMS property changes in the
    kernel to avoid this issue.
    
    v2: Explain the resulting commits a bit better (Sima)
        Document the behaviour in uapi docs (Sima)
    
    Cc: stable@vger.kernel.org
    Testcase: igt/kms_flip/flip-vs-dpms-on-nop
    Reviewed-by: Simona Vetter <simona.vetter@ffwll.ch>
    Signed-off-by: Ville Syrjälä <ville.syrjala@linux.intel.com>
    Link: https://patchwork.freedesktop.org/patch/msgid/20250219160239.17502-1-ville.syrjala@linux.intel.com
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
drm/dp_mst: Fix locking when skipping CSN before topology probing [+ + +]
Author: Imre Deak <imre.deak@intel.com>
Date:   Fri Mar 7 20:31:52 2025 +0200

    drm/dp_mst: Fix locking when skipping CSN before topology probing
    
    commit 12d8f318347b1d4feac48e8ac351d3786af39599 upstream.
    
    The handling of the MST Connection Status Notify message is skipped if
    the probing of the topology is still pending. Acquiring the
    drm_dp_mst_topology_mgr::probe_lock for this in
    drm_dp_mst_handle_up_req() is problematic: the task/work this function
    is called from is also responsible for handling MST down-request replies
    (in drm_dp_mst_handle_down_rep()). Thus drm_dp_mst_link_probe_work() -
    holding already probe_lock - could be blocked waiting for an MST
    down-request reply while drm_dp_mst_handle_up_req() is waiting for
    probe_lock while processing a CSN message. This leads to the probe
    work's down-request message timing out.
    
    A scenario similar to the above leading to a down-request timeout is
    handling a CSN message in drm_dp_mst_handle_conn_stat(), holding the
    probe_lock and sending down-request messages while a second CSN message
    sent by the sink subsequently is handled by drm_dp_mst_handle_up_req().
    
    Fix the above by moving the logic to skip the CSN handling to
    drm_dp_mst_process_up_req(). This function is called from a work
    (separate from the task/work handling new up/down messages), already
    holding probe_lock. This solves the above timeout issue, since handling
    of down-request replies won't be blocked by probe_lock.
    
    Fixes: ddf983488c3e ("drm/dp_mst: Skip CSN if topology probing is not done yet")
    Cc: Wayne Lin <Wayne.Lin@amd.com>
    Cc: Lyude Paul <lyude@redhat.com>
    Cc: stable@vger.kernel.org # v6.6+
    Reviewed-by: Wayne Lin <Wayne.Lin@amd.com>
    Reviewed-by: Lyude Paul <lyude@redhat.com>
    Signed-off-by: Imre Deak <imre.deak@intel.com>
    Link: https://patchwork.freedesktop.org/patch/msgid/20250307183152.3822170-1-imre.deak@intel.com
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
drm/gma500: Add NULL check for pci_gfx_root in mid_get_vbt_data() [+ + +]
Author: Ivan Abramov <i.abramov@mt-integration.ru>
Date:   Thu Mar 6 14:20:45 2025 +0300

    drm/gma500: Add NULL check for pci_gfx_root in mid_get_vbt_data()
    
    [ Upstream commit 9af152dcf1a06f589f44a74da4ad67e365d4db9a ]
    
    Since pci_get_domain_bus_and_slot() can return NULL, add NULL check for
    pci_gfx_root in the mid_get_vbt_data().
    
    This change is similar to the checks implemented in mid_get_fuse_settings()
    and mid_get_pci_revID(), which were introduced by commit 0cecdd818cd7
    ("gma500: Final enables for Oaktrail") as "additional minor
    bulletproofing".
    
    Found by Linux Verification Center (linuxtesting.org) with SVACE.
    
    Fixes: f910b411053f ("gma500: Add the glue to the various BIOS and firmware interfaces")
    Signed-off-by: Ivan Abramov <i.abramov@mt-integration.ru>
    Signed-off-by: Patrik Jakobsson <patrik.r.jakobsson@gmail.com>
    Link: https://patchwork.freedesktop.org/patch/msgid/20250306112046.17144-1-i.abramov@mt-integration.ru
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
drm/hyperv: Fix address space leak when Hyper-V DRM device is removed [+ + +]
Author: Michael Kelley <mhklinux@outlook.com>
Date:   Mon Feb 10 11:34:41 2025 -0800

    drm/hyperv: Fix address space leak when Hyper-V DRM device is removed
    
    [ Upstream commit aed709355fd05ef747e1af24a1d5d78cd7feb81e ]
    
    When a Hyper-V DRM device is probed, the driver allocates MMIO space for
    the vram, and maps it cacheable. If the device removed, or in the error
    path for device probing, the MMIO space is released but no unmap is done.
    Consequently the kernel address space for the mapping is leaked.
    
    Fix this by adding iounmap() calls in the device removal path, and in the
    error path during device probing.
    
    Fixes: f1f63cbb705d ("drm/hyperv: Fix an error handling path in hyperv_vmbus_probe()")
    Fixes: a0ab5abced55 ("drm/hyperv : Removing the restruction of VRAM allocation with PCI bar size")
    Signed-off-by: Michael Kelley <mhklinux@outlook.com>
    Reviewed-by: Saurabh Sengar <ssengar@linux.microsoft.com>
    Tested-by: Saurabh Sengar <ssengar@linux.microsoft.com>
    Link: https://lore.kernel.org/r/20250210193441.2414-1-mhklinux@outlook.com
    Signed-off-by: Wei Liu <wei.liu@kernel.org>
    Message-ID: <20250210193441.2414-1-mhklinux@outlook.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
drm/i915/cdclk: Do cdclk post plane programming later [+ + +]
Author: Ville Syrjälä <ville.syrjala@linux.intel.com>
Date:   Tue Feb 18 23:18:55 2025 +0200

    drm/i915/cdclk: Do cdclk post plane programming later
    
    commit 6266f4a78131c795631440ea9c7b66cdfd399484 upstream.
    
    We currently call intel_set_cdclk_post_plane_update() far
    too early. When pipes are active during the reprogramming
    the current spot only works for the cd2x divider update
    case, as that is synchronize to the pipe's vblank. Squashing
    and crawling are not synchronized in any way, so doing the
    programming while the pipes/planes are potentially still using
    the old hardware state could lead to underruns.
    
    Move the post plane reprgramming to a spot where we know
    that the pipes/planes have switched over the new hardware
    state.
    
    Cc: stable@vger.kernel.org
    Signed-off-by: Ville Syrjälä <ville.syrjala@linux.intel.com>
    Link: https://patchwork.freedesktop.org/patch/msgid/20250218211913.27867-2-ville.syrjala@linux.intel.com
    Reviewed-by: Vinod Govindapillai <vinod.govindapillai@intel.com>
    (cherry picked from commit fb64f5568c0e0b5730733d70a012ae26b1a55815)
    Signed-off-by: Rodrigo Vivi <rodrigo.vivi@intel.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
drm/nouveau: Do not override forced connector status [+ + +]
Author: Thomas Zimmermann <tzimmermann@suse.de>
Date:   Tue Jan 14 10:57:25 2025 +0100

    drm/nouveau: Do not override forced connector status
    
    [ Upstream commit 01f1d77a2630e774ce33233c4e6723bca3ae9daa ]
    
    Keep user-forced connector status even if it cannot be programmed. Same
    behavior as for the rest of the drivers.
    
    Signed-off-by: Thomas Zimmermann <tzimmermann@suse.de>
    Signed-off-by: Lyude Paul <lyude@redhat.com>
    Link: https://patchwork.freedesktop.org/patch/msgid/20250114100214.195386-1-tzimmermann@suse.de
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
drm/vkms: Round fixp2int conversion in lerp_u16 [+ + +]
Author: Harry Wentland <harry.wentland@amd.com>
Date:   Thu Dec 19 21:33:08 2024 -0700

    drm/vkms: Round fixp2int conversion in lerp_u16
    
    [ Upstream commit 8ec43c58d3be615a71548bc09148212013fb7e5f ]
    
    fixp2int always rounds down, fixp2int_ceil rounds up. We need
    the new fixp2int_round.
    
    Signed-off-by: Alex Hung <alex.hung@amd.com>
    Signed-off-by: Harry Wentland <harry.wentland@amd.com>
    Reviewed-by: Louis Chauvet <louis.chauvet@bootlin.com>
    Link: https://patchwork.freedesktop.org/patch/msgid/20241220043410.416867-3-alex.hung@amd.com
    Signed-off-by: Louis Chauvet <louis.chauvet@bootlin.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
eth: bnxt: do not update checksum in bnxt_xdp_build_skb() [+ + +]
Author: Taehee Yoo <ap420073@gmail.com>
Date:   Sun Mar 9 13:42:15 2025 +0000

    eth: bnxt: do not update checksum in bnxt_xdp_build_skb()
    
    [ Upstream commit c03e7d05aa0e2f7e9a9ce5ad8a12471a53f941dc ]
    
    The bnxt_rx_pkt() updates ip_summed value at the end if checksum offload
    is enabled.
    When the XDP-MB program is attached and it returns XDP_PASS, the
    bnxt_xdp_build_skb() is called to update skb_shared_info.
    The main purpose of bnxt_xdp_build_skb() is to update skb_shared_info,
    but it updates ip_summed value too if checksum offload is enabled.
    This is actually duplicate work.
    
    When the bnxt_rx_pkt() updates ip_summed value, it checks if ip_summed
    is CHECKSUM_NONE or not.
    It means that ip_summed should be CHECKSUM_NONE at this moment.
    But ip_summed may already be updated to CHECKSUM_UNNECESSARY in the
    XDP-MB-PASS path.
    So the by skb_checksum_none_assert() WARNS about it.
    
    This is duplicate work and updating ip_summed in the
    bnxt_xdp_build_skb() is not needed.
    
    Splat looks like:
    WARNING: CPU: 3 PID: 5782 at ./include/linux/skbuff.h:5155 bnxt_rx_pkt+0x479b/0x7610 [bnxt_en]
    Modules linked in: bnxt_re bnxt_en rdma_ucm rdma_cm iw_cm ib_cm ib_uverbs veth xt_nat xt_tcpudp xt_conntrack nft_chain_nat xt_MASQUERADE nf_]
    CPU: 3 UID: 0 PID: 5782 Comm: socat Tainted: G        W          6.14.0-rc4+ #27
    Tainted: [W]=WARN
    Hardware name: ASUS System Product Name/PRIME Z690-P D4, BIOS 0603 11/01/2021
    RIP: 0010:bnxt_rx_pkt+0x479b/0x7610 [bnxt_en]
    Code: 54 24 0c 4c 89 f1 4c 89 ff c1 ea 1f ff d3 0f 1f 00 49 89 c6 48 85 c0 0f 84 4c e5 ff ff 48 89 c7 e8 ca 3d a0 c8 e9 8f f4 ff ff <0f> 0b f
    RSP: 0018:ffff88881ba09928 EFLAGS: 00010202
    RAX: 0000000000000000 RBX: 00000000c7590303 RCX: 0000000000000000
    RDX: 1ffff1104e7d1610 RSI: 0000000000000001 RDI: ffff8881c91300b8
    RBP: ffff88881ba09b28 R08: ffff888273e8b0d0 R09: ffff888273e8b070
    R10: ffff888273e8b010 R11: ffff888278b0f000 R12: ffff888273e8b080
    R13: ffff8881c9130e00 R14: ffff8881505d3800 R15: ffff888273e8b000
    FS:  00007f5a2e7be080(0000) GS:ffff88881ba00000(0000) knlGS:0000000000000000
    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 00007fff2e708ff8 CR3: 000000013e3b0000 CR4: 00000000007506f0
    PKRU: 55555554
    Call Trace:
     <IRQ>
     ? __warn+0xcd/0x2f0
     ? bnxt_rx_pkt+0x479b/0x7610
     ? report_bug+0x326/0x3c0
     ? handle_bug+0x53/0xa0
     ? exc_invalid_op+0x14/0x50
     ? asm_exc_invalid_op+0x16/0x20
     ? bnxt_rx_pkt+0x479b/0x7610
     ? bnxt_rx_pkt+0x3e41/0x7610
     ? __pfx_bnxt_rx_pkt+0x10/0x10
     ? napi_complete_done+0x2cf/0x7d0
     __bnxt_poll_work+0x4e8/0x1220
     ? __pfx___bnxt_poll_work+0x10/0x10
     ? __pfx_mark_lock.part.0+0x10/0x10
     bnxt_poll_p5+0x36a/0xfa0
     ? __pfx_bnxt_poll_p5+0x10/0x10
     __napi_poll.constprop.0+0xa0/0x440
     net_rx_action+0x899/0xd00
    ...
    
    Following ping.py patch adds xdp-mb-pass case. so ping.py is going
    to be able to reproduce this issue.
    
    Fixes: 1dc4c557bfed ("bnxt: adding bnxt_xdp_build_skb to build skb from multibuffer xdp_buff")
    Signed-off-by: Taehee Yoo <ap420073@gmail.com>
    Reviewed-by: Somnath Kotur <somnath.kotur@broadcom.com>
    Link: https://patch.msgid.link/20250309134219.91670-5-ap420073@gmail.com
    Signed-off-by: Jakub Kicinski <kuba@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
fbdev: hyperv_fb: iounmap() the correct memory when removing a device [+ + +]
Author: Michael Kelley <mhklinux@outlook.com>
Date:   Sun Feb 9 15:52:52 2025 -0800

    fbdev: hyperv_fb: iounmap() the correct memory when removing a device
    
    [ Upstream commit 7241c886a71797cc51efc6fadec7076fcf6435c2 ]
    
    When a Hyper-V framebuffer device is removed, or the driver is unbound
    from a device, any allocated and/or mapped memory must be released. In
    particular, MMIO address space that was mapped to the framebuffer must
    be unmapped. Current code unmaps the wrong address, resulting in an
    error like:
    
    [ 4093.980597] iounmap: bad address 00000000c936c05c
    
    followed by a stack dump.
    
    Commit d21987d709e8 ("video: hyperv: hyperv_fb: Support deferred IO for
    Hyper-V frame buffer driver") changed the kind of address stored in
    info->screen_base, and the iounmap() call in hvfb_putmem() was not
    updated accordingly.
    
    Fix this by updating hvfb_putmem() to unmap the correct address.
    
    Fixes: d21987d709e8 ("video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver")
    Signed-off-by: Michael Kelley <mhklinux@outlook.com>
    Reviewed-by: Saurabh Sengar <ssengar@linux.microsoft.com>
    Link: https://lore.kernel.org/r/20250209235252.2987-1-mhklinux@outlook.com
    Signed-off-by: Wei Liu <wei.liu@kernel.org>
    Message-ID: <20250209235252.2987-1-mhklinux@outlook.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
fuse: don't truncate cached, mutated symlink [+ + +]
Author: Miklos Szeredi <mszeredi@redhat.com>
Date:   Thu Feb 20 11:02:58 2025 +0100

    fuse: don't truncate cached, mutated symlink
    
    [ Upstream commit b4c173dfbb6c78568578ff18f9e8822d7bd0e31b ]
    
    Fuse allows the value of a symlink to change and this property is exploited
    by some filesystems (e.g. CVMFS).
    
    It has been observed, that sometimes after changing the symlink contents,
    the value is truncated to the old size.
    
    This is caused by fuse_getattr() racing with fuse_reverse_inval_inode().
    fuse_reverse_inval_inode() updates the fuse_inode's attr_version, which
    results in fuse_change_attributes() exiting before updating the cached
    attributes
    
    This is okay, as the cached attributes remain invalid and the next call to
    fuse_change_attributes() will likely update the inode with the correct
    values.
    
    The reason this causes problems is that cached symlinks will be
    returned through page_get_link(), which truncates the symlink to
    inode->i_size.  This is correct for filesystems that don't mutate
    symlinks, but in this case it causes bad behavior.
    
    The solution is to just remove this truncation.  This can cause a
    regression in a filesystem that relies on supplying a symlink larger than
    the file size, but this is unlikely.  If that happens we'd need to make
    this behavior conditional.
    
    Reported-by: Laura Promberger <laura.promberger@cern.ch>
    Tested-by: Sam Lewis <samclewis@google.com>
    Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
    Link: https://lore.kernel.org/r/20250220100258.793363-1-mszeredi@redhat.com
    Reviewed-by: Bernd Schubert <bschubert@ddn.com>
    Signed-off-by: Christian Brauner <brauner@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
gre: Fix IPv6 link-local address generation. [+ + +]
Author: Guillaume Nault <gnault@redhat.com>
Date:   Fri Mar 7 20:28:53 2025 +0100

    gre: Fix IPv6 link-local address generation.
    
    [ Upstream commit 183185a18ff96751db52a46ccf93fff3a1f42815 ]
    
    Use addrconf_addr_gen() to generate IPv6 link-local addresses on GRE
    devices in most cases and fall back to using add_v4_addrs() only in
    case the GRE configuration is incompatible with addrconf_addr_gen().
    
    GRE used to use addrconf_addr_gen() until commit e5dd729460ca
    ("ip/ip6_gre: use the same logic as SIT interfaces when computing v6LL
    address") restricted this use to gretap and ip6gretap devices, and
    created add_v4_addrs() (borrowed from SIT) for non-Ethernet GRE ones.
    
    The original problem came when commit 9af28511be10 ("addrconf: refuse
    isatap eui64 for INADDR_ANY") made __ipv6_isatap_ifid() fail when its
    addr parameter was 0. The commit says that this would create an invalid
    address, however, I couldn't find any RFC saying that the generated
    interface identifier would be wrong. Anyway, since gre over IPv4
    devices pass their local tunnel address to __ipv6_isatap_ifid(), that
    commit broke their IPv6 link-local address generation when the local
    address was unspecified.
    
    Then commit e5dd729460ca ("ip/ip6_gre: use the same logic as SIT
    interfaces when computing v6LL address") tried to fix that case by
    defining add_v4_addrs() and calling it to generate the IPv6 link-local
    address instead of using addrconf_addr_gen() (apart for gretap and
    ip6gretap devices, which would still use the regular
    addrconf_addr_gen(), since they have a MAC address).
    
    That broke several use cases because add_v4_addrs() isn't properly
    integrated into the rest of IPv6 Neighbor Discovery code. Several of
    these shortcomings have been fixed over time, but add_v4_addrs()
    remains broken on several aspects. In particular, it doesn't send any
    Router Sollicitations, so the SLAAC process doesn't start until the
    interface receives a Router Advertisement. Also, add_v4_addrs() mostly
    ignores the address generation mode of the interface
    (/proc/sys/net/ipv6/conf/*/addr_gen_mode), thus breaking the
    IN6_ADDR_GEN_MODE_RANDOM and IN6_ADDR_GEN_MODE_STABLE_PRIVACY cases.
    
    Fix the situation by using add_v4_addrs() only in the specific scenario
    where the normal method would fail. That is, for interfaces that have
    all of the following characteristics:
    
      * run over IPv4,
      * transport IP packets directly, not Ethernet (that is, not gretap
        interfaces),
      * tunnel endpoint is INADDR_ANY (that is, 0),
      * device address generation mode is EUI64.
    
    In all other cases, revert back to the regular addrconf_addr_gen().
    
    Also, remove the special case for ip6gre interfaces in add_v4_addrs(),
    since ip6gre devices now always use addrconf_addr_gen() instead.
    
    Fixes: e5dd729460ca ("ip/ip6_gre: use the same logic as SIT interfaces when computing v6LL address")
    Signed-off-by: Guillaume Nault <gnault@redhat.com>
    Reviewed-by: Ido Schimmel <idosch@nvidia.com>
    Link: https://patch.msgid.link/559c32ce5c9976b269e6337ac9abb6a96abe5096.1741375285.git.gnault@redhat.com
    Signed-off-by: Paolo Abeni <pabeni@redhat.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
HID: apple: disable Fn key handling on the Omoton KB066 [+ + +]
Author: Alex Henrie <alexhenrie24@gmail.com>
Date:   Sun Feb 23 22:36:30 2025 -0700

    HID: apple: disable Fn key handling on the Omoton KB066
    
    commit 221cea1003d8a412e5ec64a58df7ab19b654f490 upstream.
    
    Remove the fixup to make the Omoton KB066's F6 key F6 when not holding
    Fn. That was really just a hack to allow typing F6 in fnmode>0, and it
    didn't fix any of the other F keys that were likewise untypable in
    fnmode>0. Instead, because the Omoton's Fn key is entirely internal to
    the keyboard, completely disable Fn key translation when an Omoton is
    detected, which will prevent the hid-apple driver from interfering with
    the keyboard's built-in Fn key handling. All of the F keys, including
    F6, are then typable when Fn is held.
    
    The Omoton KB066 and the Apple A1255 both have HID product code
    05ac:022c. The self-reported name of every original A1255 when they left
    the factory was "Apple Wireless Keyboard". By default, Mac OS changes
    the name to "<username>'s keyboard" when pairing with the keyboard, but
    Mac OS allows the user to set the internal name of Apple keyboards to
    anything they like. The Omoton KB066's name, on the other hand, is not
    configurable: It is always "Bluetooth Keyboard". Because that name is so
    generic that a user might conceivably use the same name for a real Apple
    keyboard, detect Omoton keyboards based on both having that exact name
    and having HID product code 022c.
    
    Fixes: 819083cb6eed ("HID: apple: fix up the F6 key on the Omoton KB066 keyboard")
    Signed-off-by: Alex Henrie <alexhenrie24@gmail.com>
    Reviewed-by: Aditya Garg <gargaditya08@live.com>
    Signed-off-by: Jiri Kosina <jkosina@suse.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

HID: apple: fix up the F6 key on the Omoton KB066 keyboard [+ + +]
Author: Alex Henrie <alexhenrie24@gmail.com>
Date:   Thu Jan 16 23:12:17 2025 -0700

    HID: apple: fix up the F6 key on the Omoton KB066 keyboard
    
    [ Upstream commit 819083cb6eedcc8495cbf84845877bcc741b93b3 ]
    
    The Omoton KB066 is an Apple A1255 keyboard clone (HID product code
    05ac:022c). On both keyboards, the F6 key becomes Num Lock when the Fn
    key is held. But unlike its Apple exemplar, when the Omoton's F6 key is
    pressed without Fn, it sends the usage code 0xC0301 from the reserved
    section of the consumer page instead of the standard F6 usage code
    0x7003F from the keyboard page. The nonstandard code is translated to
    KEY_UNKNOWN and becomes useless on Linux. The Omoton KB066 is a pretty
    popular keyboard, judging from its 29,058 reviews on Amazon at time of
    writing, so let's account for its quirk to make it more usable.
    
    By the way, it would be nice if we could automatically set fnmode to 0
    for Omoton keyboards because they handle the Fn key internally and the
    kernel's Fn key handling creates undesirable side effects such as making
    F1 and F2 always Brightness Up and Brightness Down in fnmode=1 (the
    default) or always F1 and F2 in fnmode=2. Unfortunately I don't think
    there's a way to identify Bluetooth keyboards more specifically than the
    HID product code which is obviously inaccurate. Users of Omoton
    keyboards will just have to set fnmode to 0 manually to get full Fn key
    functionality.
    
    Signed-off-by: Alex Henrie <alexhenrie24@gmail.com>
    Signed-off-by: Jiri Kosina <jkosina@suse.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

HID: hid-apple: Apple Magic Keyboard a3203 USB-C support [+ + +]
Author: Ievgen Vovk <YevgenVovk@ukr.net>
Date:   Sun Jan 12 13:13:14 2025 +0900

    HID: hid-apple: Apple Magic Keyboard a3203 USB-C support
    
    [ Upstream commit 2813e00dcd748cef47d2bffaa04071de93fddf00 ]
    
    Add Apple Magic Keyboard 2024 model (with USB-C port) device ID (0320)
    to those recognized by the hid-apple driver. Keyboard is otherwise
    compatible with the existing implementation for its earlier 2021 model.
    
    Signed-off-by: Ievgen Vovk <YevgenVovk@ukr.net>
    Signed-off-by: Jiri Kosina <jkosina@suse.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

HID: ignore non-functional sensor in HP 5MP Camera [+ + +]
Author: Chia-Lin Kao (AceLan) <acelan.kao@canonical.com>
Date:   Wed Jan 15 15:00:20 2025 +0800

    HID: ignore non-functional sensor in HP 5MP Camera
    
    [ Upstream commit 363236d709e75610b628c2a4337ccbe42e454b6d ]
    
    The HP 5MP Camera (USB ID 0408:5473) reports a HID sensor interface that
    is not actually implemented. Attempting to access this non-functional
    sensor via iio_info causes system hangs as runtime PM tries to wake up
    an unresponsive sensor.
    
      [453] hid-sensor-hub 0003:0408:5473.0003: Report latency attributes: ffffffff:ffffffff
      [453] hid-sensor-hub 0003:0408:5473.0003: common attributes: 5:1, 2:1, 3:1 ffffffff:ffffffff
    
    Add this device to the HID ignore list since the sensor interface is
    non-functional by design and should not be exposed to userspace.
    
    Signed-off-by: Chia-Lin Kao (AceLan) <acelan.kao@canonical.com>
    Acked-by: Srinivas Pandruvada <srinivas.pandruvada@linux.intel.com>
    Signed-off-by: Jiri Kosina <jkosina@suse.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

HID: intel-ish-hid: fix the length of MNG_SYNC_FW_CLOCK in doorbell [+ + +]
Author: Zhang Lixu <lixu.zhang@intel.com>
Date:   Wed Jan 22 09:29:00 2025 +0800

    HID: intel-ish-hid: fix the length of MNG_SYNC_FW_CLOCK in doorbell
    
    [ Upstream commit 4b54ae69197b9f416baa0fceadff7e89075f8454 ]
    
    The timestamps in the Firmware log and HID sensor samples are incorrect.
    They show 1970-01-01 because the current IPC driver only uses the first
    8 bytes of bootup time when synchronizing time with the firmware. The
    firmware converts the bootup time to UTC time, which results in the
    display of 1970-01-01.
    
    In write_ipc_from_queue(), when sending the MNG_SYNC_FW_CLOCK message,
    the clock is updated according to the definition of ipc_time_update_msg.
    However, in _ish_sync_fw_clock(), the message length is specified as the
    size of uint64_t when building the doorbell. As a result, the firmware
    only receives the first 8 bytes of struct ipc_time_update_msg.
    This patch corrects the length in the doorbell to ensure the entire
    ipc_time_update_msg is sent, fixing the timestamp issue.
    
    Signed-off-by: Zhang Lixu <lixu.zhang@intel.com>
    Acked-by: Srinivas Pandruvada <srinivas.pandruvada@linux.intel.com>
    Signed-off-by: Jiri Kosina <jkosina@suse.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

HID: intel-ish-hid: Send clock sync message immediately after reset [+ + +]
Author: Zhang Lixu <lixu.zhang@intel.com>
Date:   Wed Jan 22 09:29:01 2025 +0800

    HID: intel-ish-hid: Send clock sync message immediately after reset
    
    [ Upstream commit 7e0d1cff12b895f44f4ddc8cf50311bc1f775201 ]
    
    The ISH driver performs a clock sync with the firmware once at system
    startup and then every 20 seconds. If a firmware reset occurs right
    after a clock sync, the driver would wait 20 seconds before performing
    another clock sync with the firmware. This is particularly problematic
    with the introduction of the "load firmware from host" feature, where
    the driver performs a clock sync with the bootloader and then has to
    wait 20 seconds before syncing with the main firmware.
    
    This patch clears prev_sync immediately upon receiving an IPC reset,
    so that the main firmware and driver will perform a clock sync
    immediately after completing the IPC handshake.
    
    Signed-off-by: Zhang Lixu <lixu.zhang@intel.com>
    Acked-by: Srinivas Pandruvada <srinivas.pandruvada@linux.intel.com>
    Signed-off-by: Jiri Kosina <jkosina@suse.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

HID: topre: Fix n-key rollover on Realforce R3S TKL boards [+ + +]
Author: Daniel Brackenbury <daniel.brackenbury@gmail.com>
Date:   Tue Jan 28 20:08:49 2025 -0500

    HID: topre: Fix n-key rollover on Realforce R3S TKL boards
    
    [ Upstream commit 9271af9d846c7e49c8709b58d5853cb73c00b193 ]
    
    Newer model R3* Topre Realforce keyboards share an issue with their older
    R2 cousins where a report descriptor fixup is needed in order for n-key
    rollover to work correctly, otherwise only 6-key rollover is available.
    This patch adds some new hardware IDs for the R3S 87-key keyboard and
    makes amendments to the existing hid-topre driver in order to change the
    correct byte in the new model.
    
    Signed-off-by: Daniel Brackenbury <daniel.brackenbury@gmail.com>
    Signed-off-by: Jiri Kosina <jkosina@suse.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
hrtimer: Use and report correct timerslack values for realtime tasks [+ + +]
Author: Felix Moessbauer <felix.moessbauer@siemens.com>
Date:   Wed Aug 14 14:10:32 2024 +0200

    hrtimer: Use and report correct timerslack values for realtime tasks
    
    commit ed4fb6d7ef68111bb539283561953e5c6e9a6e38 upstream.
    
    The timerslack_ns setting is used to specify how much the hardware
    timers should be delayed, to potentially dispatch multiple timers in a
    single interrupt. This is a performance optimization. Timers of
    realtime tasks (having a realtime scheduling policy) should not be
    delayed.
    
    This logic was inconsitently applied to the hrtimers, leading to delays
    of realtime tasks which used timed waits for events (e.g. condition
    variables). Due to the downstream override of the slack for rt tasks,
    the procfs reported incorrect (non-zero) timerslack_ns values.
    
    This is changed by setting the timer_slack_ns task attribute to 0 for
    all tasks with a rt policy. By that, downstream users do not need to
    specially handle rt tasks (w.r.t. the slack), and the procfs entry
    shows the correct value of "0". Setting non-zero slack values (either
    via procfs or PR_SET_TIMERSLACK) on tasks with a rt policy is ignored,
    as stated in "man 2 PR_SET_TIMERSLACK":
    
      Timer slack is not applied to threads that are scheduled under a
      real-time scheduling policy (see sched_setscheduler(2)).
    
    The special handling of timerslack on rt tasks in downstream users
    is removed as well.
    
    Signed-off-by: Felix Moessbauer <felix.moessbauer@siemens.com>
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Link: https://lore.kernel.org/all/20240814121032.368444-2-felix.moessbauer@siemens.com
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
hrtimers: Mark is_migration_base() with __always_inline [+ + +]
Author: Andy Shevchenko <andriy.shevchenko@linux.intel.com>
Date:   Thu Jan 16 18:07:45 2025 +0200

    hrtimers: Mark is_migration_base() with __always_inline
    
    [ Upstream commit 27af31e44949fa85550176520ef7086a0d00fd7b ]
    
    When is_migration_base() is unused, it prevents kernel builds
    with clang, `make W=1` and CONFIG_WERROR=y:
    
    kernel/time/hrtimer.c:156:20: error: unused function 'is_migration_base' [-Werror,-Wunused-function]
      156 | static inline bool is_migration_base(struct hrtimer_clock_base *base)
          |                    ^~~~~~~~~~~~~~~~~
    
    Fix this by marking it with __always_inline.
    
    [ tglx: Use __always_inline instead of __maybe_unused and move it into the
            usage sites conditional ]
    
    Signed-off-by: Andy Shevchenko <andriy.shevchenko@linux.intel.com>
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Link: https://lore.kernel.org/all/20250116160745.243358-1-andriy.shevchenko@linux.intel.com
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
i2c: ali1535: Fix an error handling path in ali1535_probe() [+ + +]
Author: Christophe JAILLET <christophe.jaillet@wanadoo.fr>
Date:   Mon Mar 3 20:53:08 2025 +0100

    i2c: ali1535: Fix an error handling path in ali1535_probe()
    
    [ Upstream commit 9b5463f349d019a261f1e80803447efca3126151 ]
    
    If i2c_add_adapter() fails, the request_region() call in ali1535_setup()
    must be undone by a corresponding release_region() call, as done in the
    remove function.
    
    Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2")
    Signed-off-by: Christophe JAILLET <christophe.jaillet@wanadoo.fr>
    Signed-off-by: Andi Shyti <andi.shyti@kernel.org>
    Link: https://lore.kernel.org/r/0daf63d7a2ce74c02e2664ba805bbfadab7d25e5.1741031571.git.christophe.jaillet@wanadoo.fr
    Signed-off-by: Sasha Levin <sashal@kernel.org>

i2c: ali15x3: Fix an error handling path in ali15x3_probe() [+ + +]
Author: Christophe JAILLET <christophe.jaillet@wanadoo.fr>
Date:   Mon Mar 3 20:58:06 2025 +0100

    i2c: ali15x3: Fix an error handling path in ali15x3_probe()
    
    [ Upstream commit 6e55caaf30c88209d097e575a169b1dface1ab69 ]
    
    If i2c_add_adapter() fails, the request_region() call in ali15x3_setup()
    must be undone by a corresponding release_region() call, as done in the
    remove function.
    
    Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2")
    Signed-off-by: Christophe JAILLET <christophe.jaillet@wanadoo.fr>
    Signed-off-by: Andi Shyti <andi.shyti@kernel.org>
    Link: https://lore.kernel.org/r/9b2090cbcc02659f425188ea05f2e02745c4e67b.1741031878.git.christophe.jaillet@wanadoo.fr
    Signed-off-by: Sasha Levin <sashal@kernel.org>

i2c: sis630: Fix an error handling path in sis630_probe() [+ + +]
Author: Christophe JAILLET <christophe.jaillet@wanadoo.fr>
Date:   Mon Mar 3 21:26:54 2025 +0100

    i2c: sis630: Fix an error handling path in sis630_probe()
    
    [ Upstream commit 2b22459792fcb4def9f0936d64575ac11a95a58d ]
    
    If i2c_add_adapter() fails, the request_region() call in sis630_setup()
    must be undone by a corresponding release_region() call, as done in the
    remove function.
    
    Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2")
    Signed-off-by: Christophe JAILLET <christophe.jaillet@wanadoo.fr>
    Link: https://lore.kernel.org/r/3d607601f2c38e896b10207963c6ab499ca5c307.1741033587.git.christophe.jaillet@wanadoo.fr
    Signed-off-by: Andi Shyti <andi.shyti@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
ice: fix memory leak in aRFS after reset [+ + +]
Author: Grzegorz Nitka <grzegorz.nitka@intel.com>
Date:   Thu Jan 23 09:15:39 2025 +0100

    ice: fix memory leak in aRFS after reset
    
    [ Upstream commit 23d97f18901ef5e4e264e3b1777fe65c760186b5 ]
    
    Fix aRFS (accelerated Receive Flow Steering) structures memory leak by
    adding a checker to verify if aRFS memory is already allocated while
    configuring VSI. aRFS objects are allocated in two cases:
    - as part of VSI initialization (at probe), and
    - as part of reset handling
    
    However, VSI reconfiguration executed during reset involves memory
    allocation one more time, without prior releasing already allocated
    resources. This led to the memory leak with the following signature:
    
    [root@os-delivery ~]# cat /sys/kernel/debug/kmemleak
    unreferenced object 0xff3c1ca7252e6000 (size 8192):
      comm "kworker/0:0", pid 8, jiffies 4296833052
      hex dump (first 32 bytes):
        00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
        00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
      backtrace (crc 0):
        [<ffffffff991ec485>] __kmalloc_cache_noprof+0x275/0x340
        [<ffffffffc0a6e06a>] ice_init_arfs+0x3a/0xe0 [ice]
        [<ffffffffc09f1027>] ice_vsi_cfg_def+0x607/0x850 [ice]
        [<ffffffffc09f244b>] ice_vsi_setup+0x5b/0x130 [ice]
        [<ffffffffc09c2131>] ice_init+0x1c1/0x460 [ice]
        [<ffffffffc09c64af>] ice_probe+0x2af/0x520 [ice]
        [<ffffffff994fbcd3>] local_pci_probe+0x43/0xa0
        [<ffffffff98f07103>] work_for_cpu_fn+0x13/0x20
        [<ffffffff98f0b6d9>] process_one_work+0x179/0x390
        [<ffffffff98f0c1e9>] worker_thread+0x239/0x340
        [<ffffffff98f14abc>] kthread+0xcc/0x100
        [<ffffffff98e45a6d>] ret_from_fork+0x2d/0x50
        [<ffffffff98e083ba>] ret_from_fork_asm+0x1a/0x30
        ...
    
    Fixes: 28bf26724fdb ("ice: Implement aRFS")
    Reviewed-by: Michal Swiatkowski <michal.swiatkowski@linux.intel.com>
    Signed-off-by: Grzegorz Nitka <grzegorz.nitka@intel.com>
    Reviewed-by: Simon Horman <horms@kernel.org>
    Tested-by: Rinitha S <sx.rinitha@intel.com> (A Contingent worker at Intel)
    Signed-off-by: Tony Nguyen <anthony.l.nguyen@intel.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
Input: ads7846 - fix gpiod allocation [+ + +]
Author: H. Nikolaus Schaller <hns@goldelico.com>
Date:   Sat Feb 1 12:43:24 2025 +0100

    Input: ads7846 - fix gpiod allocation
    
    commit c9ccb88f534ca760d06590b67571c353a2f0cbcd upstream.
    
    commit 767d83361aaa ("Input: ads7846 - Convert to use software nodes")
    
    has simplified the code but accidentially converted a devm_gpiod_get()
    to gpiod_get(). This leaves the gpio reserved on module remove and the
    driver can no longer be loaded again.
    
    Fixes: 767d83361aaa ("Input: ads7846 - Convert to use software nodes")
    Cc: stable@vger.kernel.org
    Signed-off-by: H. Nikolaus Schaller <hns@goldelico.com>
    Link: https://lore.kernel.org/r/6e9b143f19cdfda835711a8a7a3966e5a2494cff.1738410204.git.hns@goldelico.com
    Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

Input: i8042 - add required quirks for missing old boardnames [+ + +]
Author: Werner Sembach <wse@tuxedocomputers.com>
Date:   Sat Feb 22 00:01:23 2025 +0100

    Input: i8042 - add required quirks for missing old boardnames
    
    commit 9ed468e17d5b80e7116fd35842df3648e808ae47 upstream.
    
    Some older Clevo barebones have problems like no or laggy keyboard after
    resume or boot which can be fixed with the SERIO_QUIRK_FORCENORESTORE
    quirk.
    
    The PB71RD keyboard is sometimes laggy after resume and the PC70DR, PB51RF,
    P640RE, and PCX0DX_GN20 keyboard is sometimes unresponsive after resume.
    This quirk fixes that.
    
    Cc: stable@vger.kernel.org
    Signed-off-by: Werner Sembach <wse@tuxedocomputers.com>
    Link: https://lore.kernel.org/r/20250221230137.70292-2-wse@tuxedocomputers.com
    Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

Input: i8042 - swap old quirk combination with new quirk for more devices [+ + +]
Author: Werner Sembach <wse@tuxedocomputers.com>
Date:   Sat Feb 22 00:01:25 2025 +0100

    Input: i8042 - swap old quirk combination with new quirk for more devices
    
    commit d85862ccca452eeb19329e9f4f9a6ce1d1e53561 upstream.
    
    Some older Clevo barebones have problems like no or laggy keyboard after
    resume or boot which can be fixed with the SERIO_QUIRK_FORCENORESTORE
    quirk.
    
    We could not activly retest these devices because we no longer have them in
    our archive, but based on the other old Clevo barebones we tested where the
    new quirk had the same or a better behaviour I think it would be good to
    apply it on these too.
    
    Cc: stable@vger.kernel.org
    Signed-off-by: Werner Sembach <wse@tuxedocomputers.com>
    Link: https://lore.kernel.org/r/20250221230137.70292-4-wse@tuxedocomputers.com
    Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

Input: i8042 - swap old quirk combination with new quirk for NHxxRZQ [+ + +]
Author: Werner Sembach <wse@tuxedocomputers.com>
Date:   Sat Feb 22 00:01:22 2025 +0100

    Input: i8042 - swap old quirk combination with new quirk for NHxxRZQ
    
    commit 729d163232971672d0f41b93c02092fb91f0e758 upstream.
    
    Some older Clevo barebones have problems like no or laggy keyboard after
    resume or boot which can be fixed with the SERIO_QUIRK_FORCENORESTORE
    quirk.
    
    With the old i8042 quirks this devices keyboard is sometimes laggy after
    resume. With the new quirk this issue doesn't happen.
    
    Cc: stable@vger.kernel.org
    Signed-off-by: Werner Sembach <wse@tuxedocomputers.com>
    Link: https://lore.kernel.org/r/20250221230137.70292-1-wse@tuxedocomputers.com
    Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

Input: i8042 - swap old quirk combination with new quirk for several devices [+ + +]
Author: Werner Sembach <wse@tuxedocomputers.com>
Date:   Sat Feb 22 00:01:24 2025 +0100

    Input: i8042 - swap old quirk combination with new quirk for several devices
    
    commit 75ee4ebebbbe8dc4b55ba37f388924fa96bf1564 upstream.
    
    Some older Clevo barebones have problems like no or laggy keyboard after
    resume or boot which can be fixed with the SERIO_QUIRK_FORCENORESTORE
    quirk.
    
    While the old quirk combination did not show negative effects on these
    devices specifically, the new quirk works just as well and seems more
    stable in general.
    
    Cc: stable@vger.kernel.org
    Signed-off-by: Werner Sembach <wse@tuxedocomputers.com>
    Link: https://lore.kernel.org/r/20250221230137.70292-3-wse@tuxedocomputers.com
    Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

Input: iqs7222 - preserve system status register [+ + +]
Author: Jeff LaBundy <jeff@labundy.com>
Date:   Sun Mar 9 20:29:59 2025 -0500

    Input: iqs7222 - preserve system status register
    
    commit a2add513311b48cc924a699a8174db2c61ed5e8a upstream.
    
    Some register groups reserve a byte at the end of their continuous
    address space. Depending on the variant of silicon, this field may
    share the same memory space as the lower byte of the system status
    register (0x10).
    
    In these cases, caching the reserved byte and writing it later may
    effectively reset the device depending on what happened in between
    the read and write operations.
    
    Solve this problem by avoiding any access to this last byte within
    offending register groups. This method replaces a workaround which
    attempted to write the reserved byte with up-to-date contents, but
    left a small window in which updates by the device could have been
    clobbered.
    
    Now that the driver does not touch these reserved bytes, the order
    in which the device's registers are written no longer matters, and
    they can be written in their natural order. The new method is also
    much more generic, and can be more easily extended to new variants
    of silicon with different register maps.
    
    As part of this change, the register read and write functions must
    be gently updated to support byte access instead of word access.
    
    Fixes: 2e70ef525b73 ("Input: iqs7222 - acknowledge reset before writing registers")
    Signed-off-by: Jeff LaBundy <jeff@labundy.com>
    Link: https://lore.kernel.org/r/Z85Alw+d9EHKXx2e@nixie71
    Cc: stable@vger.kernel.org
    Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

Input: xpad - add 8BitDo SN30 Pro, Hyperkin X91 and Gamesir G7 SE controllers [+ + +]
Author: Nilton Perim Neto <niltonperimneto@gmail.com>
Date:   Mon Feb 3 07:13:09 2025 -0800

    Input: xpad - add 8BitDo SN30 Pro, Hyperkin X91 and Gamesir G7 SE controllers
    
    commit 36e093c8dcc585d0a9e79a005f721f01f3365eba upstream.
    
    Add 8BitDo SN30 Pro, Hyperkin X91 and Gamesir G7 SE to the list of
    recognized controllers, and update vendor comments to match.
    
    Signed-off-by: Nilton Perim Neto <niltonperimneto@gmail.com>
    Link: https://lore.kernel.org/r/20250122214814.102311-2-niltonperimneto@gmail.com
    Cc: stable@vger.kernel.org
    Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

Input: xpad - add multiple supported devices [+ + +]
Author: Pavel Rojtberg <rojtberg@gmail.com>
Date:   Mon Feb 3 07:22:27 2025 -0800

    Input: xpad - add multiple supported devices
    
    commit 3492321e2e60ddfe91aa438bb9ac209016f48f7a upstream.
    
    This is based on multiple commits at https://github.com/paroj/xpad
    that had bouncing email addresses and were not signed off.
    
    Signed-off-by: Pavel Rojtberg <rojtberg@gmail.com>
    Link: https://lore.kernel.org/r/20250123175404.23254-1-rojtberg@gmail.com
    Cc: stable@vger.kernel.org
    Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

Input: xpad - add support for TECNO Pocket Go [+ + +]
Author: Antheas Kapenekakis <lkml@antheas.dev>
Date:   Mon Feb 24 23:00:29 2025 -0800

    Input: xpad - add support for TECNO Pocket Go
    
    commit 95a54a96f657fd069d2a9922b6c2d293a72a001f upstream.
    
    TECNO Pocket Go is a kickstarter handheld by manufacturer TECNO Mobile.
    It poses a unique feature: it does not have a display. Instead, the
    handheld is essentially a pc in a controller. As customary, it has an
    xpad endpoint, a keyboard endpoint, and a vendor endpoint for its
    vendor software.
    
    Signed-off-by: Antheas Kapenekakis <lkml@antheas.dev>
    Link: https://lore.kernel.org/r/20250222170010.188761-3-lkml@antheas.dev
    Cc: stable@vger.kernel.org
    Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

Input: xpad - add support for ZOTAC Gaming Zone [+ + +]
Author: Antheas Kapenekakis <lkml@antheas.dev>
Date:   Mon Feb 24 22:59:34 2025 -0800

    Input: xpad - add support for ZOTAC Gaming Zone
    
    commit 709329c48214ad2acf12eed1b5c0eb798e40a64c upstream.
    
    ZOTAC Gaming Zone is ZOTAC's 2024 handheld release. As it is common
    with these handhelds, it uses a hybrid USB device with an xpad
    endpoint, a keyboard endpoint, and a vendor-specific endpoint for
    RGB control et al.
    
    Signed-off-by: Antheas Kapenekakis <lkml@antheas.dev>
    Link: https://lore.kernel.org/r/20250222170010.188761-2-lkml@antheas.dev
    Cc: stable@vger.kernel.org
    Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

Input: xpad - rename QH controller to Legion Go S [+ + +]
Author: Antheas Kapenekakis <lkml@antheas.dev>
Date:   Mon Feb 24 23:01:55 2025 -0800

    Input: xpad - rename QH controller to Legion Go S
    
    commit 659a7614dd72e2835ac0b220c2fa68fabd8d1df9 upstream.
    
    The QH controller is actually the controller of the Legion Go S, with
    the manufacturer string wch.cn and product name Legion Go S in its
    USB descriptor. A cursory lookup of the VID reveals the same.
    
    Therefore, rename the xpad entries to match.
    
    Signed-off-by: Antheas Kapenekakis <lkml@antheas.dev>
    Link: https://lore.kernel.org/r/20250222170010.188761-4-lkml@antheas.dev
    Cc: stable@vger.kernel.org
    Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
io-wq: backoff when retrying worker creation [+ + +]
Author: Uday Shankar <ushankar@purestorage.com>
Date:   Sat Feb 8 13:42:13 2025 -0700

    io-wq: backoff when retrying worker creation
    
    [ Upstream commit 13918315c5dc5a515926c8799042ea6885c2b734 ]
    
    When io_uring submission goes async for the first time on a given task,
    we'll try to create a worker thread to handle the submission. Creating
    this worker thread can fail due to various transient conditions, such as
    an outstanding signal in the forking thread, so we have retry logic with
    a limit of 3 retries. However, this retry logic appears to be too
    aggressive/fast - we've observed a thread blowing through the retry
    limit while having the same outstanding signal the whole time. Here's an
    excerpt of some tracing that demonstrates the issue:
    
    First, signal 26 is generated for the process. It ends up getting routed
    to thread 92942.
    
     0)   cbd-92284    /* signal_generate: sig=26 errno=0 code=-2 comm=psblkdASD pid=92934 grp=1 res=0 */
    
    This causes create_io_thread in the signalled thread to fail with
    ERESTARTNOINTR, and thus a retry is queued.
    
    13) task_th-92942  /* io_uring_queue_async_work: ring 000000007325c9ae, request 0000000080c96d8e, user_data 0x0, opcode URING_CMD, flags 0x8240001, normal queue, work 000000006e96dd3f */
    13) task_th-92942  io_wq_enqueue() {
    13) task_th-92942    _raw_spin_lock();
    13) task_th-92942    io_wq_activate_free_worker();
    13) task_th-92942    _raw_spin_lock();
    13) task_th-92942    create_io_worker() {
    13) task_th-92942      __kmalloc_cache_noprof();
    13) task_th-92942      __init_swait_queue_head();
    13) task_th-92942      kprobe_ftrace_handler() {
    13) task_th-92942        get_kprobe();
    13) task_th-92942        aggr_pre_handler() {
    13) task_th-92942          pre_handler_kretprobe();
    13) task_th-92942          /* create_enter: (create_io_thread+0x0/0x50) fn=0xffffffff8172c0e0 arg=0xffff888996bb69c0 node=-1 */
    13) task_th-92942        } /* aggr_pre_handler */
    ...
    13) task_th-92942        } /* copy_process */
    13) task_th-92942      } /* create_io_thread */
    13) task_th-92942      kretprobe_rethook_handler() {
    13) task_th-92942        /* create_exit: (create_io_worker+0x8a/0x1a0 <- create_io_thread) arg1=0xfffffffffffffdff */
    13) task_th-92942      } /* kretprobe_rethook_handler */
    13) task_th-92942    queue_work_on() {
    ...
    
    The CPU is then handed to a kworker to process the queued retry:
    
    ------------------------------------------
     13) task_th-92942  => kworker-54154
    ------------------------------------------
    13) kworker-54154  io_workqueue_create() {
    13) kworker-54154    io_queue_worker_create() {
    13) kworker-54154      task_work_add() {
    13) kworker-54154        wake_up_state() {
    13) kworker-54154          try_to_wake_up() {
    13) kworker-54154            _raw_spin_lock_irqsave();
    13) kworker-54154            _raw_spin_unlock_irqrestore();
    13) kworker-54154          } /* try_to_wake_up */
    13) kworker-54154        } /* wake_up_state */
    13) kworker-54154        kick_process();
    13) kworker-54154      } /* task_work_add */
    13) kworker-54154    } /* io_queue_worker_create */
    13) kworker-54154  } /* io_workqueue_create */
    
    And then we immediately switch back to the original task to try creating
    a worker again. This fails, because the original task still hasn't
    handled its signal.
    
    -----------------------------------------
     13) kworker-54154  => task_th-92942
    ------------------------------------------
    13) task_th-92942  create_worker_cont() {
    13) task_th-92942    kprobe_ftrace_handler() {
    13) task_th-92942      get_kprobe();
    13) task_th-92942      aggr_pre_handler() {
    13) task_th-92942        pre_handler_kretprobe();
    13) task_th-92942        /* create_enter: (create_io_thread+0x0/0x50) fn=0xffffffff8172c0e0 arg=0xffff888996bb69c0 node=-1 */
    13) task_th-92942      } /* aggr_pre_handler */
    13) task_th-92942    } /* kprobe_ftrace_handler */
    13) task_th-92942    create_io_thread() {
    13) task_th-92942      copy_process() {
    13) task_th-92942        task_active_pid_ns();
    13) task_th-92942        _raw_spin_lock_irq();
    13) task_th-92942        recalc_sigpending();
    13) task_th-92942        _raw_spin_lock_irq();
    13) task_th-92942      } /* copy_process */
    13) task_th-92942    } /* create_io_thread */
    13) task_th-92942    kretprobe_rethook_handler() {
    13) task_th-92942      /* create_exit: (create_worker_cont+0x35/0x1b0 <- create_io_thread) arg1=0xfffffffffffffdff */
    13) task_th-92942    } /* kretprobe_rethook_handler */
    13) task_th-92942    io_worker_release();
    13) task_th-92942    queue_work_on() {
    13) task_th-92942      clear_pending_if_disabled();
    13) task_th-92942      __queue_work() {
    13) task_th-92942      } /* __queue_work */
    13) task_th-92942    } /* queue_work_on */
    13) task_th-92942  } /* create_worker_cont */
    
    The pattern repeats another couple times until we blow through the retry
    counter, at which point we give up. All outstanding work is canceled,
    and the io_uring command which triggered all this is failed with
    ECANCELED:
    
    13) task_th-92942  io_acct_cancel_pending_work() {
    ...
    13) task_th-92942  /* io_uring_complete: ring 000000007325c9ae, req 0000000080c96d8e, user_data 0x0, result -125, cflags 0x0 extra1 0 extra2 0  */
    
    Finally, the task gets around to processing its outstanding signal 26,
    but it's too late.
    
    13) task_th-92942  /* signal_deliver: sig=26 errno=0 code=-2 sa_handler=59566a0 sa_flags=14000000 */
    
    Try to address this issue by adding a small scaling delay when retrying
    worker creation. This should give the forking thread time to handle its
    signal in the above case. This isn't a particularly satisfying solution,
    as sufficiently paradoxical scheduling would still have us hitting the
    same issue, and I'm open to suggestions for something better. But this
    is likely to prevent this (already rare) issue from hitting in practice.
    
    Signed-off-by: Uday Shankar <ushankar@purestorage.com>
    Link: https://lore.kernel.org/r/20250208-wq_retry-v2-1-4f6f5041d303@purestorage.com
    Signed-off-by: Jens Axboe <axboe@kernel.dk>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
io_uring/kbuf: use vm_insert_pages() for mmap'ed pbuf ring [+ + +]
Author: Jens Axboe <axboe@kernel.dk>
Date:   Tue Mar 12 20:24:21 2024 -0600

    io_uring/kbuf: use vm_insert_pages() for mmap'ed pbuf ring
    
    Commit 87585b05757dc70545efb434669708d276125559 upstream.
    
    Rather than use remap_pfn_range() for this and manually free later,
    switch to using vm_insert_page() and have it Just Work.
    
    This requires a bit of effort on the mmap lookup side, as the ctx
    uring_lock isn't held, which  otherwise protects buffer_lists from being
    torn down, and it's not safe to grab from mmap context that would
    introduce an ABBA deadlock between the mmap lock and the ctx uring_lock.
    Instead, lookup the buffer_list under RCU, as the the list is RCU freed
    already. Use the existing reference count to determine whether it's
    possible to safely grab a reference to it (eg if it's not zero already),
    and drop that reference when done with the mapping. If the mmap
    reference is the last one, the buffer_list and the associated memory can
    go away, since the vma insertion has references to the inserted pages at
    that point.
    
    Signed-off-by: Jens Axboe <axboe@kernel.dk>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

io_uring/kbuf: vmap pinned buffer ring [+ + +]
Author: Jens Axboe <axboe@kernel.dk>
Date:   Tue Mar 12 10:42:27 2024 -0600

    io_uring/kbuf: vmap pinned buffer ring
    
    Commit e270bfd22a2a10d1cfbaddf23e79b6d0b405d21e upstream.
    
    This avoids needing to care about HIGHMEM, and it makes the buffer
    indexing easier as both ring provided buffer methods are now virtually
    mapped in a contigious fashion.
    
    Signed-off-by: Jens Axboe <axboe@kernel.dk>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
io_uring: don't attempt to mmap larger than what the user asks for [+ + +]
Author: Jens Axboe <axboe@kernel.dk>
Date:   Wed May 29 09:38:38 2024 -0600

    io_uring: don't attempt to mmap larger than what the user asks for
    
    Commit 06fe9b1df1086b42718d632aa57e8f7cd1a66a21 upstream.
    
    If IORING_FEAT_SINGLE_MMAP is ignored, as can happen if an application
    uses an ancient liburing or does setup manually, then 3 mmap's are
    required to map the ring into userspace. The kernel will still have
    collapsed the mappings, however userspace may ask for mapping them
    individually. If so, then we should not use the full number of ring
    pages, as it may exceed the partial mapping. Doing so will yield an
    -EFAULT from vm_insert_pages(), as we pass in more pages than what the
    application asked for.
    
    Cap the number of pages to match what the application asked for, for
    the particular mapping operation.
    
    Reported-by: Lucas Mülling <lmulling@proton.me>
    Link: https://github.com/axboe/liburing/issues/1157
    Fixes: 3ab1db3c6039 ("io_uring: get rid of remap_pfn_range() for mapping rings/sqes")
    Signed-off-by: Jens Axboe <axboe@kernel.dk>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

io_uring: fix corner case forgetting to vunmap [+ + +]
Author: Pavel Begunkov <asml.silence@gmail.com>
Date:   Mon Nov 25 23:10:31 2024 +0000

    io_uring: fix corner case forgetting to vunmap
    
    Commit 43eef70e7e2ac74e7767731dd806720c7fb5e010 upstream.
    
    io_pages_unmap() is a bit tricky in trying to figure whether the pages
    were previously vmap'ed or not. In particular If there is juts one page
    it belives there is no need to vunmap. Paired io_pages_map(), however,
    could've failed io_mem_alloc_compound() and attempted to
    io_mem_alloc_single(), which does vmap, and that leads to unpaired vmap.
    
    The solution is to fail if io_mem_alloc_compound() can't allocate a
    single page. That's the easiest way to deal with it, and those two
    functions are getting removed soon, so no need to overcomplicate it.
    
    Cc: stable@vger.kernel.org
    Fixes: 3ab1db3c6039e ("io_uring: get rid of remap_pfn_range() for mapping rings/sqes")
    Signed-off-by: Pavel Begunkov <asml.silence@gmail.com>
    Link: https://lore.kernel.org/r/477e75a3907a2fe83249e49c0a92cd480b2c60e0.1732569842.git.asml.silence@gmail.com
    Signed-off-by: Jens Axboe <axboe@kernel.dk>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

io_uring: fix error pbuf checking [+ + +]
Author: Pavel Begunkov <asml.silence@gmail.com>
Date:   Thu Jul 18 20:00:53 2024 +0100

    io_uring: fix error pbuf checking
    
    Commit bcc87d978b834c298bbdd9c52454c5d0a946e97e upstream.
    
    Syz reports a problem, which boils down to NULL vs IS_ERR inconsistent
    error handling in io_alloc_pbuf_ring().
    
    KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
    RIP: 0010:__io_remove_buffers+0xac/0x700 io_uring/kbuf.c:341
    Call Trace:
     <TASK>
     io_put_bl io_uring/kbuf.c:378 [inline]
     io_destroy_buffers+0x14e/0x490 io_uring/kbuf.c:392
     io_ring_ctx_free+0xa00/0x1070 io_uring/io_uring.c:2613
     io_ring_exit_work+0x80f/0x8a0 io_uring/io_uring.c:2844
     process_one_work kernel/workqueue.c:3231 [inline]
     process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3312
     worker_thread+0x86d/0xd40 kernel/workqueue.c:3390
     kthread+0x2f0/0x390 kernel/kthread.c:389
     ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
     ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
    
    Cc: stable@vger.kernel.org
    Reported-by: syzbot+2074b1a3d447915c6f1c@syzkaller.appspotmail.com
    Fixes: 87585b05757dc ("io_uring/kbuf: use vm_insert_pages() for mmap'ed pbuf ring")
    Signed-off-by: Pavel Begunkov <asml.silence@gmail.com>
    Link: https://lore.kernel.org/r/c5f9df20560bd9830401e8e48abc029e7cfd9f5e.1721329239.git.asml.silence@gmail.com
    Signed-off-by: Jens Axboe <axboe@kernel.dk>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

io_uring: get rid of remap_pfn_range() for mapping rings/sqes [+ + +]
Author: Jens Axboe <axboe@kernel.dk>
Date:   Wed Mar 13 09:56:14 2024 -0600

    io_uring: get rid of remap_pfn_range() for mapping rings/sqes
    
    Commit 3ab1db3c6039e02a9deb9d5091d28d559917a645 upstream.
    
    Rather than use remap_pfn_range() for this and manually free later,
    switch to using vm_insert_pages() and have it Just Work.
    
    If possible, allocate a single compound page that covers the range that
    is needed. If that works, then we can just use page_address() on that
    page. If we fail to get a compound page, allocate single pages and use
    vmap() to map them into the kernel virtual address space.
    
    This just covers the rings/sqes, the other remaining user of the mmap
    remap_pfn_range() user will be converted separately. Once that is done,
    we can kill the old alloc/free code.
    
    Signed-off-by: Jens Axboe <axboe@kernel.dk>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

io_uring: unify io_pin_pages() [+ + +]
Author: Jens Axboe <axboe@kernel.dk>
Date:   Wed Mar 13 14:58:14 2024 -0600

    io_uring: unify io_pin_pages()
    
    Commit 1943f96b3816e0f0d3d6686374d6e1d617c8b42c upstream.
    
    Move it into io_uring.c where it belongs, and use it in there as well
    rather than have two implementations of this.
    
    Signed-off-by: Jens Axboe <axboe@kernel.dk>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

io_uring: use unpin_user_pages() where appropriate [+ + +]
Author: Jens Axboe <axboe@kernel.dk>
Date:   Wed Mar 13 15:01:03 2024 -0600

    io_uring: use unpin_user_pages() where appropriate
    
    Commit 18595c0a58ae29ac6a996c5b664610119b73182d upstream.
    
    There are a few cases of open-rolled loops around unpin_user_page(), use
    the generic helper instead.
    
    Signed-off-by: Jens Axboe <axboe@kernel.dk>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

io_uring: use vmap() for ring mapping [+ + +]
Author: Jens Axboe <axboe@kernel.dk>
Date:   Wed Mar 13 14:10:40 2024 -0600

    io_uring: use vmap() for ring mapping
    
    Commit 09fc75e0c035a2cabb8caa15cec6e85159dd94f0 upstream.
    
    This is the last holdout which does odd page checking, convert it to
    vmap just like what is done for the non-mmap path.
    
    Signed-off-by: Jens Axboe <axboe@kernel.dk>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
ipvs: prevent integer overflow in do_ip_vs_get_ctl() [+ + +]
Author: Dan Carpenter <dan.carpenter@linaro.org>
Date:   Mon Mar 10 10:45:53 2025 +0300

    ipvs: prevent integer overflow in do_ip_vs_get_ctl()
    
    [ Upstream commit 80b78c39eb86e6b55f56363b709eb817527da5aa ]
    
    The get->num_services variable is an unsigned int which is controlled by
    the user.  The struct_size() function ensures that the size calculation
    does not overflow an unsigned long, however, we are saving the result to
    an int so the calculation can overflow.
    
    Both "len" and "get->num_services" come from the user.  This check is
    just a sanity check to help the user and ensure they are using the API
    correctly.  An integer overflow here is not a big deal.  This has no
    security impact.
    
    Save the result from struct_size() type size_t to fix this integer
    overflow bug.
    
    Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2")
    Signed-off-by: Dan Carpenter <dan.carpenter@linaro.org>
    Acked-by: Julian Anastasov <ja@ssi.bg>
    Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() [+ + +]
Author: Chengen Du <chengen.du@canonical.com>
Date:   Tue Jan 14 12:12:34 2025 +0800

    iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()
    
    [ Upstream commit 07e0d99a2f701123ad3104c0f1a1e66bce74d6e5 ]
    
    When performing an iSCSI boot using IPv6, iscsistart still reads the
    /sys/firmware/ibft/ethernetX/subnet-mask entry. Since the IPv6 prefix
    length is 64, this causes the shift exponent to become negative,
    triggering a UBSAN warning. As the concept of a subnet mask does not
    apply to IPv6, the value is set to ~0 to suppress the warning message.
    
    Signed-off-by: Chengen Du <chengen.du@canonical.com>
    Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
ksmbd: fix use-after-free in ksmbd_free_work_struct [+ + +]
Author: Namjae Jeon <linkinjeon@kernel.org>
Date:   Wed Mar 5 21:21:43 2025 +0900

    ksmbd: fix use-after-free in ksmbd_free_work_struct
    
    commit bb39ed47065455604729404729d9116868638d31 upstream.
    
    ->interim_entry of ksmbd_work could be deleted after oplock is freed.
    We don't need to manage it with linked list. The interim request could be
    immediately sent whenever a oplock break wait is needed.
    
    Cc: stable@vger.kernel.org
    Reported-by: Norbert Szetei <norbert@doyensec.com>
    Tested-by: Norbert Szetei <norbert@doyensec.com>
    Signed-off-by: Namjae Jeon <linkinjeon@kernel.org>
    Signed-off-by: Steve French <stfrench@microsoft.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

ksmbd: prevent connection release during oplock break notification [+ + +]
Author: Namjae Jeon <linkinjeon@kernel.org>
Date:   Thu Mar 6 14:14:58 2025 +0900

    ksmbd: prevent connection release during oplock break notification
    
    commit 3aa660c059240e0c795217182cf7df32909dd917 upstream.
    
    ksmbd_work could be freed when after connection release.
    Increment r_count of ksmbd_conn to indicate that requests
    are not finished yet and to not release the connection.
    
    Cc: stable@vger.kernel.org
    Reported-by: Norbert Szetei <norbert@doyensec.com>
    Tested-by: Norbert Szetei <norbert@doyensec.com>
    Signed-off-by: Namjae Jeon <linkinjeon@kernel.org>
    Signed-off-by: Steve French <stfrench@microsoft.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
lib/buildid: Handle memfd_secret() files in build_id_parse() [+ + +]
Author: Andrii Nakryiko <andrii@kernel.org>
Date:   Thu Oct 17 10:47:13 2024 -0700

    lib/buildid: Handle memfd_secret() files in build_id_parse()
    
    commit 5ac9b4e935dfc6af41eee2ddc21deb5c36507a9f upstream.
    
    >From memfd_secret(2) manpage:
    
      The memory areas backing the file created with memfd_secret(2) are
      visible only to the processes that have access to the file descriptor.
      The memory region is removed from the kernel page tables and only the
      page tables of the processes holding the file descriptor map the
      corresponding physical memory. (Thus, the pages in the region can't be
      accessed by the kernel itself, so that, for example, pointers to the
      region can't be passed to system calls.)
    
    We need to handle this special case gracefully in build ID fetching
    code. Return -EFAULT whenever secretmem file is passed to build_id_parse()
    family of APIs. Original report and repro can be found in [0].
    
      [0] https://lore.kernel.org/bpf/ZwyG8Uro%2FSyTXAni@ly-workstation/
    
    Fixes: de3ec364c3c3 ("lib/buildid: add single folio-based file reader abstraction")
    Reported-by: Yi Lai <yi1.lai@intel.com>
    Suggested-by: Shakeel Butt <shakeel.butt@linux.dev>
    Signed-off-by: Andrii Nakryiko <andrii@kernel.org>
    Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
    Acked-by: Shakeel Butt <shakeel.butt@linux.dev>
    Link: https://lore.kernel.org/bpf/20241017175431.6183-A-hca@linux.ibm.com
    Link: https://lore.kernel.org/bpf/20241017174713.2157873-1-andrii@kernel.org
    [ Chen Linxuan: backport same logic without folio-based changes ]
    Fixes: 88a16a130933 ("perf: Add build id data in mmap2 event")
    Signed-off-by: Chen Linxuan <chenlinxuan@deepin.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
Linux: Linux 6.6.84 [+ + +]
Author: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Date:   Sat Mar 22 12:50:50 2025 -0700

    Linux 6.6.84
    
    Link: https://lore.kernel.org/r/20250319143019.983527953@linuxfoundation.org
    Tested-by: Jon Hunter <jonathanh@nvidia.com>
    Tested-by: Ron Economos <re@w6rz.net>
    Tested-by: Miguel Ojeda <ojeda@kernel.org>
    Tested-by: Mark Brown <broonie@kernel.org>
    Tested-by: Hardik Garg <hargar@linux.microsoft.com>
    Tested-by: Peter Schneider <pschneider1968@googlemail.com>
    Link: https://lore.kernel.org/r/20250320165654.807128435@linuxfoundation.org
    Tested-by: Florian Fainelli <florian.fainelli@broadcom.com>
    Tested-by: Harshit Mogalapalli <harshit.m.mogalapalli@oracle.com>
    Tested-by: Linux Kernel Functional Testing <lkft@linaro.org>
    Tested-by: Frank Scheiner <frank.scheiner@web.de>
    Tested-by: Jon Hunter <jonathanh@nvidia.com>
    Tested-by: Hardik Garg <hargar@linux.microsoft.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
mm: add nommu variant of vm_insert_pages() [+ + +]
Author: Jens Axboe <axboe@kernel.dk>
Date:   Sat Mar 16 07:21:43 2024 -0600

    mm: add nommu variant of vm_insert_pages()
    
    Commit 62346c6cb28b043f2a6e95337d9081ec0b37b5f5 upstream.
    
    An identical one exists for vm_insert_page(), add one for
    vm_insert_pages() to avoid needing to check for CONFIG_MMU in code using
    it.
    
    Acked-by: Johannes Weiner <hannes@cmpxchg.org>
    Signed-off-by: Jens Axboe <axboe@kernel.dk>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

mm: split critical region in remap_file_pages() and invoke LSMs in between [+ + +]
Author: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
Date:   Fri Oct 18 18:14:15 2024 +0200

    mm: split critical region in remap_file_pages() and invoke LSMs in between
    
    commit 58a039e679fe72bd0efa8b2abe669a7914bb4429 upstream.
    
    Commit ea7e2d5e49c0 ("mm: call the security_mmap_file() LSM hook in
    remap_file_pages()") fixed a security issue, it added an LSM check when
    trying to remap file pages, so that LSMs have the opportunity to evaluate
    such action like for other memory operations such as mmap() and
    mprotect().
    
    However, that commit called security_mmap_file() inside the mmap_lock
    lock, while the other calls do it before taking the lock, after commit
    8b3ec6814c83 ("take security_mmap_file() outside of ->mmap_sem").
    
    This caused lock inversion issue with IMA which was taking the mmap_lock
    and i_mutex lock in the opposite way when the remap_file_pages() system
    call was called.
    
    Solve the issue by splitting the critical region in remap_file_pages() in
    two regions: the first takes a read lock of mmap_lock, retrieves the VMA
    and the file descriptor associated, and calculates the 'prot' and 'flags'
    variables; the second takes a write lock on mmap_lock, checks that the VMA
    flags and the VMA file descriptor are the same as the ones obtained in the
    first critical region (otherwise the system call fails), and calls
    do_mmap().
    
    In between, after releasing the read lock and before taking the write
    lock, call security_mmap_file(), and solve the lock inversion issue.
    
    Link: https://lkml.kernel.org/r/20241018161415.3845146-1-roberto.sassu@huaweicloud.com
    Fixes: ea7e2d5e49c0 ("mm: call the security_mmap_file() LSM hook in remap_file_pages()")
    Signed-off-by: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
    Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com>
    Reported-by: syzbot+1cd571a672400ef3a930@syzkaller.appspotmail.com
    Closes: https://lore.kernel.org/linux-security-module/66f7b10e.050a0220.46d20.0036.GAE@google.com/
    Tested-by: Roberto Sassu <roberto.sassu@huawei.com>
    Reviewed-by: Roberto Sassu <roberto.sassu@huawei.com>
    Reviewed-by: Jann Horn <jannh@google.com>
    Reviewed-by: Lorenzo Stoakes <lorenzo.stoakes@oracle.com>
    Reviewed-by: Liam R. Howlett <Liam.Howlett@Oracle.com>
    Reviewed-by: Paul Moore <paul@paul-moore.com>
    Tested-by: syzbot+1cd571a672400ef3a930@syzkaller.appspotmail.com
    Cc: Jarkko Sakkinen <jarkko@kernel.org>
    Cc: Dmitry Kasatkin <dmitry.kasatkin@gmail.com>
    Cc: Eric Snowberg <eric.snowberg@oracle.com>
    Cc: James Morris <jmorris@namei.org>
    Cc: Mimi Zohar <zohar@linux.ibm.com>
    Cc: "Serge E. Hallyn" <serge@hallyn.com>
    Cc: Shu Han <ebpqwerty472123@gmail.com>
    Cc: Vlastimil Babka <vbabka@suse.cz>
    Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
    Signed-off-by: Jianqi Ren <jianqi.ren.cn@windriver.com>
    Signed-off-by: He Zhe <zhe.he@windriver.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
mptcp: safety check before fallback [+ + +]
Author: Matthieu Baerts (NGI0) <matttbe@kernel.org>
Date:   Mon Feb 24 19:11:52 2025 +0100

    mptcp: safety check before fallback
    
    [ Upstream commit db75a16813aabae3b78c06b1b99f5e314c1f55d3 ]
    
    Recently, some fallback have been initiated, while the connection was
    not supposed to fallback.
    
    Add a safety check with a warning to detect when an wrong attempt to
    fallback is being done. This should help detecting any future issues
    quicker.
    
    Acked-by: Paolo Abeni <pabeni@redhat.com>
    Signed-off-by: Matthieu Baerts (NGI0) <matttbe@kernel.org>
    Link: https://patch.msgid.link/20250224-net-mptcp-misc-fixes-v1-3-f550f636b435@kernel.org
    Signed-off-by: Jakub Kicinski <kuba@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
net/mlx5: Bridge, fix the crash caused by LAG state check [+ + +]
Author: Jianbo Liu <jianbol@nvidia.com>
Date:   Tue Mar 11 00:01:43 2025 +0200

    net/mlx5: Bridge, fix the crash caused by LAG state check
    
    [ Upstream commit 4b8eeed4fb105770ce6dc84a2c6ef953c7b71cbb ]
    
    When removing LAG device from bridge, NETDEV_CHANGEUPPER event is
    triggered. Driver finds the lower devices (PFs) to flush all the
    offloaded entries. And mlx5_lag_is_shared_fdb is checked, it returns
    false if one of PF is unloaded. In such case,
    mlx5_esw_bridge_lag_rep_get() and its caller return NULL, instead of
    the alive PF, and the flush is skipped.
    
    Besides, the bridge fdb entry's lastuse is updated in mlx5 bridge
    event handler. But this SWITCHDEV_FDB_ADD_TO_BRIDGE event can be
    ignored in this case because the upper interface for bond is deleted,
    and the entry will never be aged because lastuse is never updated.
    
    To make things worse, as the entry is alive, mlx5 bridge workqueue
    keeps sending that event, which is then handled by kernel bridge
    notifier. It causes the following crash when accessing the passed bond
    netdev which is already destroyed.
    
    To fix this issue, remove such checks. LAG state is already checked in
    commit 15f8f168952f ("net/mlx5: Bridge, verify LAG state when adding
    bond to bridge"), driver still need to skip offload if LAG becomes
    invalid state after initialization.
    
     Oops: stack segment: 0000 [#1] SMP
     CPU: 3 UID: 0 PID: 23695 Comm: kworker/u40:3 Tainted: G           OE      6.11.0_mlnx #1
     Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
     Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
     Workqueue: mlx5_bridge_wq mlx5_esw_bridge_update_work [mlx5_core]
     RIP: 0010:br_switchdev_event+0x2c/0x110 [bridge]
     Code: 44 00 00 48 8b 02 48 f7 00 00 02 00 00 74 69 41 54 55 53 48 83 ec 08 48 8b a8 08 01 00 00 48 85 ed 74 4a 48 83 fe 02 48 89 d3 <4c> 8b 65 00 74 23 76 49 48 83 fe 05 74 7e 48 83 fe 06 75 2f 0f b7
     RSP: 0018:ffffc900092cfda0 EFLAGS: 00010297
     RAX: ffff888123bfe000 RBX: ffffc900092cfe08 RCX: 00000000ffffffff
     RDX: ffffc900092cfe08 RSI: 0000000000000001 RDI: ffffffffa0c585f0
     RBP: 6669746f6e690a30 R08: 0000000000000000 R09: ffff888123ae92c8
     R10: 0000000000000000 R11: fefefefefefefeff R12: ffff888123ae9c60
     R13: 0000000000000001 R14: ffffc900092cfe08 R15: 0000000000000000
     FS:  0000000000000000(0000) GS:ffff88852c980000(0000) knlGS:0000000000000000
     CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
     CR2: 00007f15914c8734 CR3: 0000000002830005 CR4: 0000000000770ef0
     DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
     DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
     PKRU: 55555554
     Call Trace:
      <TASK>
      ? __die_body+0x1a/0x60
      ? die+0x38/0x60
      ? do_trap+0x10b/0x120
      ? do_error_trap+0x64/0xa0
      ? exc_stack_segment+0x33/0x50
      ? asm_exc_stack_segment+0x22/0x30
      ? br_switchdev_event+0x2c/0x110 [bridge]
      ? sched_balance_newidle.isra.149+0x248/0x390
      notifier_call_chain+0x4b/0xa0
      atomic_notifier_call_chain+0x16/0x20
      mlx5_esw_bridge_update+0xec/0x170 [mlx5_core]
      mlx5_esw_bridge_update_work+0x19/0x40 [mlx5_core]
      process_scheduled_works+0x81/0x390
      worker_thread+0x106/0x250
      ? bh_worker+0x110/0x110
      kthread+0xb7/0xe0
      ? kthread_park+0x80/0x80
      ret_from_fork+0x2d/0x50
      ? kthread_park+0x80/0x80
      ret_from_fork_asm+0x11/0x20
      </TASK>
    
    Fixes: ff9b7521468b ("net/mlx5: Bridge, support LAG")
    Signed-off-by: Jianbo Liu <jianbol@nvidia.com>
    Reviewed-by: Vlad Buslov <vladbu@nvidia.com>
    Signed-off-by: Tariq Toukan <tariqt@nvidia.com>
    Reviewed-by: Michal Swiatkowski <michal.swiatkowski@linux.intel.com>
    Link: https://patch.msgid.link/1741644104-97767-6-git-send-email-tariqt@nvidia.com
    Signed-off-by: Paolo Abeni <pabeni@redhat.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

net/mlx5: Fill out devlink dev info only for PFs [+ + +]
Author: Jiri Pirko <jiri@resnulli.us>
Date:   Thu Mar 6 23:25:29 2025 +0200

    net/mlx5: Fill out devlink dev info only for PFs
    
    [ Upstream commit d749d901b2168389f060b654fdaa08acf6b367d2 ]
    
    Firmware version query is supported on the PFs. Due to this
    following kernel warning log is observed:
    
    [  188.590344] mlx5_core 0000:08:00.2: mlx5_fw_version_query:816:(pid 1453): fw query isn't supported by the FW
    
    Fix it by restricting the query and devlink info to the PF.
    
    Fixes: 8338d9378895 ("net/mlx5: Added devlink info callback")
    Signed-off-by: Jiri Pirko <jiri@nvidia.com>
    Reviewed-by: Kalesh AP <kalesh-anakkur.purayil@broadcom.com>
    Signed-off-by: Tariq Toukan <tariqt@nvidia.com>
    Reviewed-by: Parav Pandit <parav@nvidia.com>
    Link: https://patch.msgid.link/20250306212529.429329-1-tariqt@nvidia.com
    Signed-off-by: Jakub Kicinski <kuba@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

net/mlx5: handle errors in mlx5_chains_create_table() [+ + +]
Author: Wentao Liang <vulab@iscas.ac.cn>
Date:   Fri Mar 7 10:18:20 2025 +0800

    net/mlx5: handle errors in mlx5_chains_create_table()
    
    [ Upstream commit eab0396353be1c778eba1c0b5180176f04dd21ce ]
    
    In mlx5_chains_create_table(), the return value of mlx5_get_fdb_sub_ns()
    and mlx5_get_flow_namespace() must be checked to prevent NULL pointer
    dereferences. If either function fails, the function should log error
    message with mlx5_core_warn() and return error pointer.
    
    Fixes: 39ac237ce009 ("net/mlx5: E-Switch, Refactor chains and priorities")
    Signed-off-by: Wentao Liang <vulab@iscas.ac.cn>
    Reviewed-by: Tariq Toukan <tariqt@nvidia.com>
    Link: https://patch.msgid.link/20250307021820.2646-1-vulab@iscas.ac.cn
    Signed-off-by: Jakub Kicinski <kuba@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

net/mlx5: Lag, Check shared fdb before creating MultiPort E-Switch [+ + +]
Author: Shay Drory <shayd@nvidia.com>
Date:   Tue Mar 11 00:01:42 2025 +0200

    net/mlx5: Lag, Check shared fdb before creating MultiPort E-Switch
    
    [ Upstream commit 32966984bee1defd9f5a8f9be274d7c32f911ba1 ]
    
    Currently, MultiPort E-Switch is requesting to create a LAG with shared
    FDB without checking the LAG is supporting shared FDB.
    Add the check.
    
    Fixes: a32327a3a02c ("net/mlx5: Lag, Control MultiPort E-Switch single FDB mode")
    Signed-off-by: Shay Drory <shayd@nvidia.com>
    Reviewed-by: Mark Bloch <mbloch@nvidia.com>
    Signed-off-by: Tariq Toukan <tariqt@nvidia.com>
    Reviewed-by: Michal Swiatkowski <michal.swiatkowski@linux.intel.com>
    Link: https://patch.msgid.link/1741644104-97767-5-git-send-email-tariqt@nvidia.com
    Signed-off-by: Paolo Abeni <pabeni@redhat.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
net/mlx5e: Prevent bridge link show failure for non-eswitch-allowed devices [+ + +]
Author: Carolina Jubran <cjubran@nvidia.com>
Date:   Tue Mar 11 00:01:44 2025 +0200

    net/mlx5e: Prevent bridge link show failure for non-eswitch-allowed devices
    
    [ Upstream commit e92df790d07a8eea873efcb84776e7b71f81c7d5 ]
    
    mlx5_eswitch_get_vepa returns -EPERM if the device lacks
    eswitch_manager capability, blocking mlx5e_bridge_getlink from
    retrieving VEPA mode. Since mlx5e_bridge_getlink implements
    ndo_bridge_getlink, returning -EPERM causes bridge link show to fail
    instead of skipping devices without this capability.
    
    To avoid this, return -EOPNOTSUPP from mlx5e_bridge_getlink when
    mlx5_eswitch_get_vepa fails, ensuring the command continues processing
    other devices while ignoring those without the necessary capability.
    
    Fixes: 4b89251de024 ("net/mlx5: Support ndo bridge_setlink and getlink")
    Signed-off-by: Carolina Jubran <cjubran@nvidia.com>
    Reviewed-by: Jianbo Liu <jianbol@nvidia.com>
    Signed-off-by: Tariq Toukan <tariqt@nvidia.com>
    Reviewed-by: Michal Swiatkowski <michal.swiatkowski@linux.intel.com>
    Link: https://patch.msgid.link/1741644104-97767-7-git-send-email-tariqt@nvidia.com
    Signed-off-by: Paolo Abeni <pabeni@redhat.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
net: dsa: mv88e6xxx: Verify after ATU Load ops [+ + +]
Author: Joseph Huang <Joseph.Huang@garmin.com>
Date:   Thu Mar 6 12:23:05 2025 -0500

    net: dsa: mv88e6xxx: Verify after ATU Load ops
    
    [ Upstream commit dc5340c3133a3ebe54853fd299116149e528cfaa ]
    
    ATU Load operations could fail silently if there's not enough space
    on the device to hold the new entry. When this happens, the symptom
    depends on the unknown flood settings. If unknown multicast flood is
    disabled, the multicast packets are dropped when the ATU table is
    full. If unknown multicast flood is enabled, the multicast packets
    will be flooded to all ports. Either way, IGMP snooping is broken
    when the ATU Load operation fails silently.
    
    Do a Read-After-Write verification after each fdb/mdb add operation
    to make sure that the operation was really successful, and return
    -ENOSPC otherwise.
    
    Fixes: defb05b9b9b4 ("net: dsa: mv88e6xxx: Add support for fdb_add, fdb_del, and fdb_getnext")
    Signed-off-by: Joseph Huang <Joseph.Huang@garmin.com>
    Reviewed-by: Andrew Lunn <andrew@lunn.ch>
    Link: https://patch.msgid.link/20250306172306.3859214-1-Joseph.Huang@garmin.com
    Signed-off-by: Jakub Kicinski <kuba@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

net: Handle napi_schedule() calls from non-interrupt [+ + +]
Author: Frederic Weisbecker <frederic@kernel.org>
Date:   Sun Feb 23 23:17:08 2025 +0100

    net: Handle napi_schedule() calls from non-interrupt
    
    [ Upstream commit 77e45145e3039a0fb212556ab3f8c87f54771757 ]
    
    napi_schedule() is expected to be called either:
    
    * From an interrupt, where raised softirqs are handled on IRQ exit
    
    * From a softirq disabled section, where raised softirqs are handled on
      the next call to local_bh_enable().
    
    * From a softirq handler, where raised softirqs are handled on the next
      round in do_softirq(), or further deferred to a dedicated kthread.
    
    Other bare tasks context may end up ignoring the raised NET_RX vector
    until the next random softirq handling opportunity, which may not
    happen before a while if the CPU goes idle afterwards with the tick
    stopped.
    
    Such "misuses" have been detected on several places thanks to messages
    of the kind:
    
            "NOHZ tick-stop error: local softirq work is pending, handler #08!!!"
    
    For example:
    
           __raise_softirq_irqoff
            __napi_schedule
            rtl8152_runtime_resume.isra.0
            rtl8152_resume
            usb_resume_interface.isra.0
            usb_resume_both
            __rpm_callback
            rpm_callback
            rpm_resume
            __pm_runtime_resume
            usb_autoresume_device
            usb_remote_wakeup
            hub_event
            process_one_work
            worker_thread
            kthread
            ret_from_fork
            ret_from_fork_asm
    
    And also:
    
    * drivers/net/usb/r8152.c::rtl_work_func_t
    * drivers/net/netdevsim/netdev.c::nsim_start_xmit
    
    There is a long history of issues of this kind:
    
            019edd01d174 ("ath10k: sdio: Add missing BH locking around napi_schdule()")
            330068589389 ("idpf: disable local BH when scheduling napi for marker packets")
            e3d5d70cb483 ("net: lan78xx: fix "softirq work is pending" error")
            e55c27ed9ccf ("mt76: mt7615: add missing bh-disable around rx napi schedule")
            c0182aa98570 ("mt76: mt7915: add missing bh-disable around tx napi enable/schedule")
            970be1dff26d ("mt76: disable BH around napi_schedule() calls")
            019edd01d174 ("ath10k: sdio: Add missing BH locking around napi_schdule()")
            30bfec4fec59 ("can: rx-offload: can_rx_offload_threaded_irq_finish(): add new  function to be called from threaded interrupt")
            e63052a5dd3c ("mlx5e: add add missing BH locking around napi_schdule()")
            83a0c6e58901 ("i40e: Invoke softirqs after napi_reschedule")
            bd4ce941c8d5 ("mlx4: Invoke softirqs after napi_reschedule")
            8cf699ec849f ("mlx4: do not call napi_schedule() without care")
            ec13ee80145c ("virtio_net: invoke softirqs after __napi_schedule")
    
    This shows that relying on the caller to arrange a proper context for
    the softirqs to be handled while calling napi_schedule() is very fragile
    and error prone. Also fixing them can also prove challenging if the
    caller may be called from different kinds of contexts.
    
    Therefore fix this from napi_schedule() itself with waking up ksoftirqd
    when softirqs are raised from task contexts.
    
    Reported-by: Paul Menzel <pmenzel@molgen.mpg.de>
    Reported-by: Jakub Kicinski <kuba@kernel.org>
    Reported-by: Francois Romieu <romieu@fr.zoreil.com>
    Closes: https://lore.kernel.org/lkml/354a2690-9bbf-4ccb-8769-fa94707a9340@molgen.mpg.de/
    Cc: Breno Leitao <leitao@debian.org>
    Signed-off-by: Frederic Weisbecker <frederic@kernel.org>
    Reviewed-by: Eric Dumazet <edumazet@google.com>
    Link: https://patch.msgid.link/20250223221708.27130-1-frederic@kernel.org
    Signed-off-by: Jakub Kicinski <kuba@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

net: mctp i2c: Copy headers if cloned [+ + +]
Author: Matt Johnston <matt@codeconstruct.com.au>
Date:   Thu Mar 6 10:33:20 2025 +0800

    net: mctp i2c: Copy headers if cloned
    
    [ Upstream commit df8ce77ba8b7c012a3edd1ca7368b46831341466 ]
    
    Use skb_cow_head() prior to modifying the TX SKB. This is necessary
    when the SKB has been cloned, to avoid modifying other shared clones.
    
    Signed-off-by: Matt Johnston <matt@codeconstruct.com.au>
    Fixes: f5b8abf9fc3d ("mctp i2c: MCTP I2C binding driver")
    Link: https://patch.msgid.link/20250306-matt-mctp-i2c-cow-v1-1-293827212681@codeconstruct.com.au
    Signed-off-by: Jakub Kicinski <kuba@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

net: openvswitch: remove misbehaving actions length check [+ + +]
Author: Ilya Maximets <i.maximets@ovn.org>
Date:   Sat Mar 8 01:45:59 2025 +0100

    net: openvswitch: remove misbehaving actions length check
    
    [ Upstream commit a1e64addf3ff9257b45b78bc7d743781c3f41340 ]
    
    The actions length check is unreliable and produces different results
    depending on the initial length of the provided netlink attribute and
    the composition of the actual actions inside of it.  For example, a
    user can add 4088 empty clone() actions without triggering -EMSGSIZE,
    on attempt to add 4089 such actions the operation will fail with the
    -EMSGSIZE verdict.  However, if another 16 KB of other actions will
    be *appended* to the previous 4089 clone() actions, the check passes
    and the flow is successfully installed into the openvswitch datapath.
    
    The reason for a such a weird behavior is the way memory is allocated.
    When ovs_flow_cmd_new() is invoked, it calls ovs_nla_copy_actions(),
    that in turn calls nla_alloc_flow_actions() with either the actual
    length of the user-provided actions or the MAX_ACTIONS_BUFSIZE.  The
    function adds the size of the sw_flow_actions structure and then the
    actually allocated memory is rounded up to the closest power of two.
    
    So, if the user-provided actions are larger than MAX_ACTIONS_BUFSIZE,
    then MAX_ACTIONS_BUFSIZE + sizeof(*sfa) rounded up is 32K + 24 -> 64K.
    Later, while copying individual actions, we look at ksize(), which is
    64K, so this way the MAX_ACTIONS_BUFSIZE check is not actually
    triggered and the user can easily allocate almost 64 KB of actions.
    
    However, when the initial size is less than MAX_ACTIONS_BUFSIZE, but
    the actions contain ones that require size increase while copying
    (such as clone() or sample()), then the limit check will be performed
    during the reserve_sfa_size() and the user will not be allowed to
    create actions that yield more than 32 KB internally.
    
    This is one part of the problem.  The other part is that it's not
    actually possible for the userspace application to know beforehand
    if the particular set of actions will be rejected or not.
    
    Certain actions require more space in the internal representation,
    e.g. an empty clone() takes 4 bytes in the action list passed in by
    the user, but it takes 12 bytes in the internal representation due
    to an extra nested attribute, and some actions require less space in
    the internal representations, e.g. set(tunnel(..)) normally takes
    64+ bytes in the action list provided by the user, but only needs to
    store a single pointer in the internal implementation, since all the
    data is stored in the tunnel_info structure instead.
    
    And the action size limit is applied to the internal representation,
    not to the action list passed by the user.  So, it's not possible for
    the userpsace application to predict if the certain combination of
    actions will be rejected or not, because it is not possible for it to
    calculate how much space these actions will take in the internal
    representation without knowing kernel internals.
    
    All that is causing random failures in ovs-vswitchd in userspace and
    inability to handle certain traffic patterns as a result.  For example,
    it is reported that adding a bit more than a 1100 VMs in an OpenStack
    setup breaks the network due to OVS not being able to handle ARP
    traffic anymore in some cases (it tries to install a proper datapath
    flow, but the kernel rejects it with -EMSGSIZE, even though the action
    list isn't actually that large.)
    
    Kernel behavior must be consistent and predictable in order for the
    userspace application to use it in a reasonable way.  ovs-vswitchd has
    a mechanism to re-direct parts of the traffic and partially handle it
    in userspace if the required action list is oversized, but that doesn't
    work properly if we can't actually tell if the action list is oversized
    or not.
    
    Solution for this is to check the size of the user-provided actions
    instead of the internal representation.  This commit just removes the
    check from the internal part because there is already an implicit size
    check imposed by the netlink protocol.  The attribute can't be larger
    than 64 KB.  Realistically, we could reduce the limit to 32 KB, but
    we'll be risking to break some existing setups that rely on the fact
    that it's possible to create nearly 64 KB action lists today.
    
    Vast majority of flows in real setups are below 100-ish bytes.  So
    removal of the limit will not change real memory consumption on the
    system.  The absolutely worst case scenario is if someone adds a flow
    with 64 KB of empty clone() actions.  That will yield a 192 KB in the
    internal representation consuming 256 KB block of memory.  However,
    that list of actions is not meaningful and also a no-op.  Real world
    very large action lists (that can occur for a rare cases of BUM
    traffic handling) are unlikely to contain a large number of clones and
    will likely have a lot of tunnel attributes making the internal
    representation comparable in size to the original action list.
    So, it should be fine to just remove the limit.
    
    Commit in the 'Fixes' tag is the first one that introduced the
    difference between internal representation and the user-provided action
    lists, but there were many more afterwards that lead to the situation
    we have today.
    
    Fixes: 7d5437c709de ("openvswitch: Add tunneling interface.")
    Signed-off-by: Ilya Maximets <i.maximets@ovn.org>
    Reviewed-by: Aaron Conole <aconole@redhat.com>
    Link: https://patch.msgid.link/20250308004609.2881861-1-i.maximets@ovn.org
    Signed-off-by: Paolo Abeni <pabeni@redhat.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

net: switchdev: Convert blocking notification chain to a raw one [+ + +]
Author: Amit Cohen <amcohen@nvidia.com>
Date:   Wed Mar 5 14:15:09 2025 +0200

    net: switchdev: Convert blocking notification chain to a raw one
    
    [ Upstream commit 62531a1effa87bdab12d5104015af72e60d926ff ]
    
    A blocking notification chain uses a read-write semaphore to protect the
    integrity of the chain. The semaphore is acquired for writing when
    adding / removing notifiers to / from the chain and acquired for reading
    when traversing the chain and informing notifiers about an event.
    
    In case of the blocking switchdev notification chain, recursive
    notifications are possible which leads to the semaphore being acquired
    twice for reading and to lockdep warnings being generated [1].
    
    Specifically, this can happen when the bridge driver processes a
    SWITCHDEV_BRPORT_UNOFFLOADED event which causes it to emit notifications
    about deferred events when calling switchdev_deferred_process().
    
    Fix this by converting the notification chain to a raw notification
    chain in a similar fashion to the netdev notification chain. Protect
    the chain using the RTNL mutex by acquiring it when modifying the chain.
    Events are always informed under the RTNL mutex, but add an assertion in
    call_switchdev_blocking_notifiers() to make sure this is not violated in
    the future.
    
    Maintain the "blocking" prefix as events are always emitted from process
    context and listeners are allowed to block.
    
    [1]:
    WARNING: possible recursive locking detected
    6.14.0-rc4-custom-g079270089484 #1 Not tainted
    --------------------------------------------
    ip/52731 is trying to acquire lock:
    ffffffff850918d8 ((switchdev_blocking_notif_chain).rwsem){++++}-{4:4}, at: blocking_notifier_call_chain+0x58/0xa0
    
    but task is already holding lock:
    ffffffff850918d8 ((switchdev_blocking_notif_chain).rwsem){++++}-{4:4}, at: blocking_notifier_call_chain+0x58/0xa0
    
    other info that might help us debug this:
    Possible unsafe locking scenario:
    CPU0
    ----
    lock((switchdev_blocking_notif_chain).rwsem);
    lock((switchdev_blocking_notif_chain).rwsem);
    
    *** DEADLOCK ***
    May be due to missing lock nesting notation
    3 locks held by ip/52731:
     #0: ffffffff84f795b0 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x727/0x1dc0
     #1: ffffffff8731f628 (&net->rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x790/0x1dc0
     #2: ffffffff850918d8 ((switchdev_blocking_notif_chain).rwsem){++++}-{4:4}, at: blocking_notifier_call_chain+0x58/0xa0
    
    stack backtrace:
    ...
    ? __pfx_down_read+0x10/0x10
    ? __pfx_mark_lock+0x10/0x10
    ? __pfx_switchdev_port_attr_set_deferred+0x10/0x10
    blocking_notifier_call_chain+0x58/0xa0
    switchdev_port_attr_notify.constprop.0+0xb3/0x1b0
    ? __pfx_switchdev_port_attr_notify.constprop.0+0x10/0x10
    ? mark_held_locks+0x94/0xe0
    ? switchdev_deferred_process+0x11a/0x340
    switchdev_port_attr_set_deferred+0x27/0xd0
    switchdev_deferred_process+0x164/0x340
    br_switchdev_port_unoffload+0xc8/0x100 [bridge]
    br_switchdev_blocking_event+0x29f/0x580 [bridge]
    notifier_call_chain+0xa2/0x440
    blocking_notifier_call_chain+0x6e/0xa0
    switchdev_bridge_port_unoffload+0xde/0x1a0
    ...
    
    Fixes: f7a70d650b0b6 ("net: bridge: switchdev: Ensure deferred event delivery on unoffload")
    Signed-off-by: Amit Cohen <amcohen@nvidia.com>
    Reviewed-by: Ido Schimmel <idosch@nvidia.com>
    Reviewed-by: Simon Horman <horms@kernel.org>
    Reviewed-by: Vladimir Oltean <olteanv@gmail.com>
    Tested-by: Vladimir Oltean <olteanv@gmail.com>
    Link: https://patch.msgid.link/20250305121509.631207-1-amcohen@nvidia.com
    Signed-off-by: Paolo Abeni <pabeni@redhat.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

net: wwan: mhi_wwan_mbim: Silence sequence number glitch errors [+ + +]
Author: Stephan Gerhold <stephan.gerhold@linaro.org>
Date:   Wed Feb 12 12:15:35 2025 +0100

    net: wwan: mhi_wwan_mbim: Silence sequence number glitch errors
    
    [ Upstream commit 0d1fac6d26aff5df21bb4ec980d9b7a11c410b96 ]
    
    When using the Qualcomm X55 modem on the ThinkPad X13s, the kernel log is
    constantly being filled with errors related to a "sequence number glitch",
    e.g.:
    
            [ 1903.284538] sequence number glitch prev=16 curr=0
            [ 1913.812205] sequence number glitch prev=50 curr=0
            [ 1923.698219] sequence number glitch prev=142 curr=0
            [ 2029.248276] sequence number glitch prev=1555 curr=0
            [ 2046.333059] sequence number glitch prev=70 curr=0
            [ 2076.520067] sequence number glitch prev=272 curr=0
            [ 2158.704202] sequence number glitch prev=2655 curr=0
            [ 2218.530776] sequence number glitch prev=2349 curr=0
            [ 2225.579092] sequence number glitch prev=6 curr=0
    
    Internet connectivity is working fine, so this error seems harmless. It
    looks like modem does not preserve the sequence number when entering low
    power state; the amount of errors depends on how actively the modem is
    being used.
    
    A similar issue has also been seen on USB-based MBIM modems [1]. However,
    in cdc_ncm.c the "sequence number glitch" message is a debug message
    instead of an error. Apply the same to the mhi_wwan_mbim.c driver to
    silence these errors when using the modem.
    
    [1]: https://lists.freedesktop.org/archives/libmbim-devel/2016-November/000781.html
    
    Signed-off-by: Stephan Gerhold <stephan.gerhold@linaro.org>
    Reviewed-by: Loic Poulain <loic.poulain@linaro.org>
    Acked-by: Manivannan Sadhasivam <manivannan.sadhasivam@linaro.org>
    Link: https://patch.msgid.link/20250212-mhi-wwan-mbim-sequence-glitch-v1-1-503735977cbd@linaro.org
    Signed-off-by: Jakub Kicinski <kuba@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
net_sched: Prevent creation of classes with TC_H_ROOT [+ + +]
Author: Cong Wang <xiyou.wangcong@gmail.com>
Date:   Thu Mar 6 15:23:54 2025 -0800

    net_sched: Prevent creation of classes with TC_H_ROOT
    
    [ Upstream commit 0c3057a5a04d07120b3d0ec9c79568fceb9c921e ]
    
    The function qdisc_tree_reduce_backlog() uses TC_H_ROOT as a termination
    condition when traversing up the qdisc tree to update parent backlog
    counters. However, if a class is created with classid TC_H_ROOT, the
    traversal terminates prematurely at this class instead of reaching the
    actual root qdisc, causing parent statistics to be incorrectly maintained.
    In case of DRR, this could lead to a crash as reported by Mingi Cho.
    
    Prevent the creation of any Qdisc class with classid TC_H_ROOT
    (0xFFFFFFFF) across all qdisc types, as suggested by Jamal.
    
    Reported-by: Mingi Cho <mincho@theori.io>
    Signed-off-by: Cong Wang <xiyou.wangcong@gmail.com>
    Reviewed-by: Simon Horman <horms@kernel.org>
    Fixes: 066a3b5b2346 ("[NET_SCHED] sch_api: fix qdisc_tree_decrease_qlen() loop")
    Link: https://patch.msgid.link/20250306232355.93864-2-xiyou.wangcong@gmail.com
    Signed-off-by: Jakub Kicinski <kuba@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree() [+ + +]
Author: Kohei Enju <enjuk@amazon.com>
Date:   Sun Mar 9 17:07:38 2025 +0900

    netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree()
    
    [ Upstream commit d653bfeb07ebb3499c403404c21ac58a16531607 ]
    
    Since commit b36e4523d4d5 ("netfilter: nf_conncount: fix garbage
    collection confirm race"), `cpu` and `jiffies32` were introduced to
    the struct nf_conncount_tuple.
    
    The commit made nf_conncount_add() initialize `conn->cpu` and
    `conn->jiffies32` when allocating the struct.
    In contrast, count_tree() was not changed to initialize them.
    
    By commit 34848d5c896e ("netfilter: nf_conncount: Split insert and
    traversal"), count_tree() was split and the relevant allocation
    code now resides in insert_tree().
    Initialize `conn->cpu` and `conn->jiffies32` in insert_tree().
    
    BUG: KMSAN: uninit-value in find_or_evict net/netfilter/nf_conncount.c:117 [inline]
    BUG: KMSAN: uninit-value in __nf_conncount_add+0xd9c/0x2850 net/netfilter/nf_conncount.c:143
     find_or_evict net/netfilter/nf_conncount.c:117 [inline]
     __nf_conncount_add+0xd9c/0x2850 net/netfilter/nf_conncount.c:143
     count_tree net/netfilter/nf_conncount.c:438 [inline]
     nf_conncount_count+0x82f/0x1e80 net/netfilter/nf_conncount.c:521
     connlimit_mt+0x7f6/0xbd0 net/netfilter/xt_connlimit.c:72
     __nft_match_eval net/netfilter/nft_compat.c:403 [inline]
     nft_match_eval+0x1a5/0x300 net/netfilter/nft_compat.c:433
     expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]
     nft_do_chain+0x426/0x2290 net/netfilter/nf_tables_core.c:288
     nft_do_chain_ipv4+0x1a5/0x230 net/netfilter/nft_chain_filter.c:23
     nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
     nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626
     nf_hook_slow_list+0x24d/0x860 net/netfilter/core.c:663
     NF_HOOK_LIST include/linux/netfilter.h:350 [inline]
     ip_sublist_rcv+0x17b7/0x17f0 net/ipv4/ip_input.c:633
     ip_list_rcv+0x9ef/0xa40 net/ipv4/ip_input.c:669
     __netif_receive_skb_list_ptype net/core/dev.c:5936 [inline]
     __netif_receive_skb_list_core+0x15c5/0x1670 net/core/dev.c:5983
     __netif_receive_skb_list net/core/dev.c:6035 [inline]
     netif_receive_skb_list_internal+0x1085/0x1700 net/core/dev.c:6126
     netif_receive_skb_list+0x5a/0x460 net/core/dev.c:6178
     xdp_recv_frames net/bpf/test_run.c:280 [inline]
     xdp_test_run_batch net/bpf/test_run.c:361 [inline]
     bpf_test_run_xdp_live+0x2e86/0x3480 net/bpf/test_run.c:390
     bpf_prog_test_run_xdp+0xf1d/0x1ae0 net/bpf/test_run.c:1316
     bpf_prog_test_run+0x5e5/0xa30 kernel/bpf/syscall.c:4407
     __sys_bpf+0x6aa/0xd90 kernel/bpf/syscall.c:5813
     __do_sys_bpf kernel/bpf/syscall.c:5902 [inline]
     __se_sys_bpf kernel/bpf/syscall.c:5900 [inline]
     __ia32_sys_bpf+0xa0/0xe0 kernel/bpf/syscall.c:5900
     ia32_sys_call+0x394d/0x4180 arch/x86/include/generated/asm/syscalls_32.h:358
     do_syscall_32_irqs_on arch/x86/entry/common.c:165 [inline]
     __do_fast_syscall_32+0xb0/0x110 arch/x86/entry/common.c:387
     do_fast_syscall_32+0x38/0x80 arch/x86/entry/common.c:412
     do_SYSENTER_32+0x1f/0x30 arch/x86/entry/common.c:450
     entry_SYSENTER_compat_after_hwframe+0x84/0x8e
    
    Uninit was created at:
     slab_post_alloc_hook mm/slub.c:4121 [inline]
     slab_alloc_node mm/slub.c:4164 [inline]
     kmem_cache_alloc_noprof+0x915/0xe10 mm/slub.c:4171
     insert_tree net/netfilter/nf_conncount.c:372 [inline]
     count_tree net/netfilter/nf_conncount.c:450 [inline]
     nf_conncount_count+0x1415/0x1e80 net/netfilter/nf_conncount.c:521
     connlimit_mt+0x7f6/0xbd0 net/netfilter/xt_connlimit.c:72
     __nft_match_eval net/netfilter/nft_compat.c:403 [inline]
     nft_match_eval+0x1a5/0x300 net/netfilter/nft_compat.c:433
     expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]
     nft_do_chain+0x426/0x2290 net/netfilter/nf_tables_core.c:288
     nft_do_chain_ipv4+0x1a5/0x230 net/netfilter/nft_chain_filter.c:23
     nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
     nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626
     nf_hook_slow_list+0x24d/0x860 net/netfilter/core.c:663
     NF_HOOK_LIST include/linux/netfilter.h:350 [inline]
     ip_sublist_rcv+0x17b7/0x17f0 net/ipv4/ip_input.c:633
     ip_list_rcv+0x9ef/0xa40 net/ipv4/ip_input.c:669
     __netif_receive_skb_list_ptype net/core/dev.c:5936 [inline]
     __netif_receive_skb_list_core+0x15c5/0x1670 net/core/dev.c:5983
     __netif_receive_skb_list net/core/dev.c:6035 [inline]
     netif_receive_skb_list_internal+0x1085/0x1700 net/core/dev.c:6126
     netif_receive_skb_list+0x5a/0x460 net/core/dev.c:6178
     xdp_recv_frames net/bpf/test_run.c:280 [inline]
     xdp_test_run_batch net/bpf/test_run.c:361 [inline]
     bpf_test_run_xdp_live+0x2e86/0x3480 net/bpf/test_run.c:390
     bpf_prog_test_run_xdp+0xf1d/0x1ae0 net/bpf/test_run.c:1316
     bpf_prog_test_run+0x5e5/0xa30 kernel/bpf/syscall.c:4407
     __sys_bpf+0x6aa/0xd90 kernel/bpf/syscall.c:5813
     __do_sys_bpf kernel/bpf/syscall.c:5902 [inline]
     __se_sys_bpf kernel/bpf/syscall.c:5900 [inline]
     __ia32_sys_bpf+0xa0/0xe0 kernel/bpf/syscall.c:5900
     ia32_sys_call+0x394d/0x4180 arch/x86/include/generated/asm/syscalls_32.h:358
     do_syscall_32_irqs_on arch/x86/entry/common.c:165 [inline]
     __do_fast_syscall_32+0xb0/0x110 arch/x86/entry/common.c:387
     do_fast_syscall_32+0x38/0x80 arch/x86/entry/common.c:412
     do_SYSENTER_32+0x1f/0x30 arch/x86/entry/common.c:450
     entry_SYSENTER_compat_after_hwframe+0x84/0x8e
    
    Reported-by: syzbot+83fed965338b573115f7@syzkaller.appspotmail.com
    Closes: https://syzkaller.appspot.com/bug?extid=83fed965338b573115f7
    Fixes: b36e4523d4d5 ("netfilter: nf_conncount: fix garbage collection confirm race")
    Signed-off-by: Kohei Enju <enjuk@amazon.com>
    Reviewed-by: Florian Westphal <fw@strlen.de>
    Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

netfilter: nf_conncount: garbage collection is not skipped when jiffies wrap around [+ + +]
Author: Nicklas Bo Jensen <njensen@akamai.com>
Date:   Thu Feb 27 13:32:34 2025 +0000

    netfilter: nf_conncount: garbage collection is not skipped when jiffies wrap around
    
    [ Upstream commit df08c94baafb001de6cf44bb7098bb557f36c335 ]
    
    nf_conncount is supposed to skip garbage collection if it has already
    run garbage collection in the same jiffy. Unfortunately, this is broken
    when jiffies wrap around which this patch fixes.
    
    The problem is that last_gc in the nf_conncount_list struct is an u32,
    but jiffies is an unsigned long which is 8 bytes on my systems. When
    those two are compared it only works until last_gc wraps around.
    
    See bug report: https://bugzilla.netfilter.org/show_bug.cgi?id=1778
    for more details.
    
    Fixes: d265929930e2 ("netfilter: nf_conncount: reduce unnecessary GC")
    Signed-off-by: Nicklas Bo Jensen <njensen@akamai.com>
    Reviewed-by: Florian Westphal <fw@strlen.de>
    Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

netfilter: nf_tables: allow clone callbacks to sleep [+ + +]
Author: Florian Westphal <fw@strlen.de>
Date:   Tue Mar 18 23:15:22 2025 +0100

    netfilter: nf_tables: allow clone callbacks to sleep
    
    commit fa23e0d4b756d25829e124d6b670a4c6bbd4bf7e upstream.
    
    Sven Auhagen reports transaction failures with following error:
      ./main.nft:13:1-26: Error: Could not process rule: Cannot allocate memory
      percpu: allocation failed, size=16 align=8 atomic=1, atomic alloc failed, no space left
    
    This points to failing pcpu allocation with GFP_ATOMIC flag.
    However, transactions happen from user context and are allowed to sleep.
    
    One case where we can call into percpu allocator with GFP_ATOMIC is
    nft_counter expression.
    
    Normally this happens from control plane, so this could use GFP_KERNEL
    instead.  But one use case, element insertion from packet path,
    needs to use GFP_ATOMIC allocations (nft_dynset expression).
    
    At this time, .clone callbacks always use GFP_ATOMIC for this reason.
    
    Add gfp_t argument to the .clone function and pass GFP_KERNEL or
    GFP_ATOMIC flag depending on context, this allows all clone memory
    allocations to sleep for the normal (transaction) case.
    
    Cc: Sven Auhagen <sven.auhagen@voleatech.de>
    Signed-off-by: Florian Westphal <fw@strlen.de>
    Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

netfilter: nf_tables: bail out if stateful expression provides no .clone [+ + +]
Author: Pablo Neira Ayuso <pablo@netfilter.org>
Date:   Tue Mar 18 23:15:21 2025 +0100

    netfilter: nf_tables: bail out if stateful expression provides no .clone
    
    commit 3c13725f43dcf43ad8a9bcd6a9f12add19a8f93e upstream.
    
    All existing NFT_EXPR_STATEFUL provide a .clone interface, remove
    fallback to copy content of stateful expression since this is never
    exercised and bail out if .clone interface is not defined.
    
    Stable-dep-of: fa23e0d4b756 ("netfilter: nf_tables: allow clone callbacks to sleep")
    Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

netfilter: nf_tables: use timestamp to check for set element timeout [+ + +]
Author: Pablo Neira Ayuso <pablo@netfilter.org>
Date:   Tue Feb 6 00:11:40 2024 +0100

    netfilter: nf_tables: use timestamp to check for set element timeout
    
    commit 7395dfacfff65e9938ac0889dafa1ab01e987d15 upstream.
    
    Add a timestamp field at the beginning of the transaction, store it
    in the nftables per-netns area.
    
    Update set backend .insert, .deactivate and sync gc path to use the
    timestamp, this avoids that an element expires while control plane
    transaction is still unfinished.
    
    .lookup and .update, which are used from packet path, still use the
    current time to check if the element has expired. And .get path and dump
    also since this runs lockless under rcu read size lock. Then, there is
    async gc which also needs to check the current time since it runs
    asynchronously from a workqueue.
    
    Fixes: c3e1b005ed1c ("netfilter: nf_tables: add set element timeout support")
    Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
    Signed-off-by: Jianqi Ren <jianqi.ren.cn@windriver.com>
    Signed-off-by: He Zhe <zhe.he@windriver.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

netfilter: nft_ct: Use __refcount_inc() for per-CPU nft_ct_pcpu_template. [+ + +]
Author: Sebastian Andrzej Siewior <bigeasy@linutronix.de>
Date:   Mon Feb 17 17:02:42 2025 +0100

    netfilter: nft_ct: Use __refcount_inc() for per-CPU nft_ct_pcpu_template.
    
    [ Upstream commit 5cfe5612ca9590db69b9be29dc83041dbf001108 ]
    
    nft_ct_pcpu_template is a per-CPU variable and relies on disabled BH for its
    locking. The refcounter is read and if its value is set to one then the
    refcounter is incremented and variable is used - otherwise it is already
    in use and left untouched.
    
    Without per-CPU locking in local_bh_disable() on PREEMPT_RT the
    read-then-increment operation is not atomic and therefore racy.
    
    This can be avoided by using unconditionally __refcount_inc() which will
    increment counter and return the old value as an atomic operation.
    In case the returned counter is not one, the variable is in use and we
    need to decrement counter. Otherwise we can use it.
    
    Use __refcount_inc() instead of read and a conditional increment.
    
    Fixes: edee4f1e9245 ("netfilter: nft_ct: add zone id set support")
    Signed-off-by: Sebastian Andrzej Siewior <bigeasy@linutronix.de>
    Reviewed-by: Florian Westphal <fw@strlen.de>
    Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

netfilter: nft_exthdr: fix offset with ipv4_find_option() [+ + +]
Author: Alexey Kashavkin <akashavkin@gmail.com>
Date:   Sun Mar 2 00:14:36 2025 +0300

    netfilter: nft_exthdr: fix offset with ipv4_find_option()
    
    [ Upstream commit 6edd78af9506bb182518da7f6feebd75655d9a0e ]
    
    There is an incorrect calculation in the offset variable which causes
    the nft_skb_copy_to_reg() function to always return -EFAULT. Adding the
    start variable is redundant. In the __ip_options_compile() function the
    correct offset is specified when finding the function. There is no need
    to add the size of the iphdr structure to the offset.
    
    Fixes: dbb5281a1f84 ("netfilter: nf_tables: add support for matching IPv4 options")
    Signed-off-by: Alexey Kashavkin <akashavkin@gmail.com>
    Reviewed-by: Florian Westphal <fw@strlen.de>
    Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
netpoll: hold rcu read lock in __netpoll_send_skb() [+ + +]
Author: Breno Leitao <leitao@debian.org>
Date:   Thu Mar 6 05:16:18 2025 -0800

    netpoll: hold rcu read lock in __netpoll_send_skb()
    
    [ Upstream commit 505ead7ab77f289f12d8a68ac83da068e4d4408b ]
    
    The function __netpoll_send_skb() is being invoked without holding the
    RCU read lock. This oversight triggers a warning message when
    CONFIG_PROVE_RCU_LIST is enabled:
    
            net/core/netpoll.c:330 suspicious rcu_dereference_check() usage!
    
             netpoll_send_skb
             netpoll_send_udp
             write_ext_msg
             console_flush_all
             console_unlock
             vprintk_emit
    
    To prevent npinfo from disappearing unexpectedly, ensure that
    __netpoll_send_skb() is protected with the RCU read lock.
    
    Fixes: 2899656b494dcd1 ("netpoll: take rcu_read_lock_bh() in netpoll_send_skb_on_dev()")
    Signed-off-by: Breno Leitao <leitao@debian.org>
    Reviewed-by: Simon Horman <horms@kernel.org>
    Link: https://patch.msgid.link/20250306-netpoll_rcu_v2-v2-1-bc4f5c51742a@debian.org
    Signed-off-by: Jakub Kicinski <kuba@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
nvme-fc: do not ignore connectivity loss during connecting [+ + +]
Author: Daniel Wagner <wagi@kernel.org>
Date:   Thu Jan 9 14:30:49 2025 +0100

    nvme-fc: do not ignore connectivity loss during connecting
    
    [ Upstream commit ee59e3820ca92a9f4307ae23dfc7229dc8b8d400 ]
    
    When a connectivity loss occurs while nvme_fc_create_assocation is
    being executed, it's possible that the ctrl ends up stuck in the LIVE
    state:
    
      1) nvme nvme10: NVME-FC{10}: create association : ...
      2) nvme nvme10: NVME-FC{10}: controller connectivity lost.
                      Awaiting Reconnect
         nvme nvme10: queue_size 128 > ctrl maxcmd 32, reducing to maxcmd
      3) nvme nvme10: Could not set queue count (880)
         nvme nvme10: Failed to configure AEN (cfg 900)
      4) nvme nvme10: NVME-FC{10}: controller connect complete
      5) nvme nvme10: failed nvme_keep_alive_end_io error=4
    
    A connection attempt starts 1) and the ctrl is in state CONNECTING.
    Shortly after the LLDD driver detects a connection lost event and calls
    nvme_fc_ctrl_connectivity_loss 2). Because we are still in CONNECTING
    state, this event is ignored.
    
    nvme_fc_create_association continues to run in parallel and tries to
    communicate with the controller and these commands will fail. Though
    these errors are filtered out, e.g in 3) setting the I/O queues numbers
    fails which leads to an early exit in nvme_fc_create_io_queues. Because
    the number of IO queues is 0 at this point, there is nothing left in
    nvme_fc_create_association which could detected the connection drop.
    Thus the ctrl enters LIVE state 4).
    
    Eventually the keep alive handler times out 5) but because nothing is
    being done, the ctrl stays in LIVE state.
    
    There is already the ASSOC_FAILED flag to track connectivity loss event
    but this bit is set too late in the recovery code path. Move this into
    the connectivity loss event handler and synchronize it with the state
    change. This ensures that the ASSOC_FAILED flag is seen by
    nvme_fc_create_io_queues and it does not enter the LIVE state after a
    connectivity loss event. If the connectivity loss event happens after we
    entered the LIVE state the normal error recovery path is executed.
    
    Signed-off-by: Daniel Wagner <wagi@kernel.org>
    Reviewed-by: Hannes Reinecke <hare@suse.de>
    Reviewed-by: Sagi Grimberg <sagi@grimberg.me>
    Signed-off-by: Keith Busch <kbusch@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

nvme-fc: go straight to connecting state when initializing [+ + +]
Author: Daniel Wagner <wagi@kernel.org>
Date:   Thu Jan 9 14:30:47 2025 +0100

    nvme-fc: go straight to connecting state when initializing
    
    [ Upstream commit d3d380eded7ee5fc2fc53b3b0e72365ded025c4a ]
    
    The initial controller initialization mimiks the reconnect loop
    behavior by switching from NEW to RESETTING and then to CONNECTING.
    
    The transition from NEW to CONNECTING is a valid transition, so there is
    no point entering the RESETTING state. TCP and RDMA also transition
    directly to CONNECTING state.
    
    Reviewed-by: Sagi Grimberg <sagi@grimberg.me>
    Reviewed-by: Hannes Reinecke <hare@suse.de>
    Reviewed-by: Christoph Hellwig <hch@lst.de>
    Signed-off-by: Daniel Wagner <wagi@kernel.org>
    Signed-off-by: Keith Busch <kbusch@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

nvme-fc: rely on state transitions to handle connectivity loss [+ + +]
Author: Daniel Wagner <wagi@kernel.org>
Date:   Fri Feb 14 09:02:04 2025 +0100

    nvme-fc: rely on state transitions to handle connectivity loss
    
    commit f13409bb3f9140dad7256febcb478f0c9600312c upstream.
    
    It's not possible to call nvme_state_ctrl_state with holding a spin
    lock, because nvme_state_ctrl_state calls cancel_delayed_work_sync
    when fastfail is enabled.
    
    Instead syncing the ASSOC_FLAG and state transitions using a lock, it's
    possible to only rely on the state machine transitions. That means
    nvme_fc_ctrl_connectivity_loss should unconditionally call
    nvme_reset_ctrl which avoids the read race on the ctrl state variable.
    Actually, it's not necessary to test in which state the ctrl is, the
    reset work will only scheduled when the state machine is in LIVE state.
    
    In nvme_fc_create_association, the LIVE state can only be entered if it
    was previously CONNECTING. If this is not possible then the reset
    handler got triggered. Thus just error out here.
    
    Fixes: ee59e3820ca9 ("nvme-fc: do not ignore connectivity loss during connecting")
    Closes: https://lore.kernel.org/all/denqwui6sl5erqmz2gvrwueyxakl5txzbbiu3fgebryzrfxunm@iwxuthct377m/
    Reported-by: Shinichiro Kawasaki <shinichiro.kawasaki@wdc.com>
    Tested-by: Shin'ichiro Kawasaki <shinichiro.kawasaki@wdc.com>
    Reviewed-by: Sagi Grimberg <sagi@grimberg.me>
    Signed-off-by: Daniel Wagner <wagi@kernel.org>
    Signed-off-by: Keith Busch <kbusch@kernel.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
nvme-pci: quirk Acer FA100 for non-uniqueue identifiers [+ + +]
Author: Christopher Lentocha <christopherericlentocha@gmail.com>
Date:   Tue Feb 18 08:59:29 2025 -0500

    nvme-pci: quirk Acer FA100 for non-uniqueue identifiers
    
    [ Upstream commit fcd875445866a5219cf2be3101e276b21fc843f3 ]
    
    In order for two Acer FA100 SSDs to work in one PC (in the case of
    myself, a Lenovo Legion T5 28IMB05), and not show one drive and not
    the other, and sometimes mix up what drive shows up (randomly), these
    two lines of code need to be added, and then both of the SSDs will
    show up and not conflict when booting off of one of them. If you boot
    up your computer with both SSDs installed without this patch, you may
    also randomly get into a kernel panic (if the initrd is not set up) or
    stuck in the initrd "/init" process, it is set up, however, if you do
    apply this patch, there should not be problems with booting or seeing
    both contents of the drive. Tested with the btrfs filesystem with a
    RAID configuration of having the root drive '/' combined to make two
    256GB Acer FA100 SSDs become 512GB in total storage.
    
    Kernel Logs with patch applied (`dmesg -t | grep -i nvm`):
    
    ```
    ...
    nvme 0000:04:00.0: platform quirk: setting simple suspend
    nvme nvme0: pci function 0000:04:00.0
    nvme 0000:05:00.0: platform quirk: setting simple suspend
    nvme nvme1: pci function 0000:05:00.0
    nvme nvme1: missing or invalid SUBNQN field.
    nvme nvme1: allocated 64 MiB host memory buffer.
    nvme nvme0: missing or invalid SUBNQN field.
    nvme nvme0: allocated 64 MiB host memory buffer.
    nvme nvme1: 8/0/0 default/read/poll queues
    nvme nvme1: Ignoring bogus Namespace Identifiers
    nvme nvme0: 8/0/0 default/read/poll queues
    nvme nvme0: Ignoring bogus Namespace Identifiers
    nvme0n1: p1 p2
    ...
    ```
    
    Kernel Logs with patch not applied (`dmesg -t | grep -i nvm`):
    
    ```
    ...
    nvme 0000:04:00.0: platform quirk: setting simple suspend
    nvme nvme0: pci function 0000:04:00.0
    nvme 0000:05:00.0: platform quirk: setting simple suspend
    nvme nvme1: pci function 0000:05:00.0
    nvme nvme0: missing or invalid SUBNQN field.
    nvme nvme1: missing or invalid SUBNQN field.
    nvme nvme0: allocated 64 MiB host memory buffer.
    nvme nvme1: allocated 64 MiB host memory buffer.
    nvme nvme0: 8/0/0 default/read/poll queues
    nvme nvme1: 8/0/0 default/read/poll queues
    nvme nvme1: globally duplicate IDs for nsid 1
    nvme nvme1: VID:DID 1dbe:5216 model:Acer SSD FA100 256GB firmware:1.Z.J.2X
    nvme0n1: p1 p2
    ...
    ```
    
    Signed-off-by: Christopher Lentocha <christopherericlentocha@gmail.com>
    Reviewed-by: Christoph Hellwig <hch@lst.de>
    Signed-off-by: Keith Busch <kbusch@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
nvme-tcp: add basic support for the C2HTermReq PDU [+ + +]
Author: Maurizio Lombardi <mlombard@redhat.com>
Date:   Mon Feb 17 17:08:27 2025 +0100

    nvme-tcp: add basic support for the C2HTermReq PDU
    
    [ Upstream commit 84e009042d0f3dfe91bec60bcd208ee3f866cbcd ]
    
    Previously, the NVMe/TCP host driver did not handle the C2HTermReq PDU,
    instead printing "unsupported pdu type (3)" when received. This patch adds
    support for processing the C2HTermReq PDU, allowing the driver
    to print the Fatal Error Status field.
    
    Example of output:
    nvme nvme4: Received C2HTermReq (FES = Invalid PDU Header Field)
    
    Signed-off-by: Maurizio Lombardi <mlombard@redhat.com>
    Reviewed-by: Sagi Grimberg <sagi@grimberg.me>
    Signed-off-by: Keith Busch <kbusch@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

nvme-tcp: Fix a C2HTermReq error message [+ + +]
Author: Maurizio Lombardi <mlombard@redhat.com>
Date:   Mon Feb 24 15:40:58 2025 +0100

    nvme-tcp: Fix a C2HTermReq error message
    
    commit afb41b08c44e5386f2f52fa859010ac4afd2b66f upstream.
    
    In H2CTermReq, a FES with value 0x05 means "R2T Limit Exceeded"; but
    in C2HTermReq the same value has a different meaning (Data Transfer Limit
    Exceeded).
    
    Fixes: 84e009042d0f ("nvme-tcp: add basic support for the C2HTermReq PDU")
    Signed-off-by: Maurizio Lombardi <mlombard@redhat.com>
    Reviewed-by: Sagi Grimberg <sagi@grimberg.me>
    Signed-off-by: Keith Busch <kbusch@kernel.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
nvme: only allow entering LIVE from CONNECTING state [+ + +]
Author: Daniel Wagner <wagi@kernel.org>
Date:   Fri Feb 14 09:02:03 2025 +0100

    nvme: only allow entering LIVE from CONNECTING state
    
    [ Upstream commit d2fe192348f93fe3a0cb1e33e4aba58e646397f4 ]
    
    The fabric transports and also the PCI transport are not entering the
    LIVE state from NEW or RESETTING. This makes the state machine more
    restrictive and allows to catch not supported state transitions, e.g.
    directly switching from RESETTING to LIVE.
    
    Reviewed-by: Sagi Grimberg <sagi@grimberg.me>
    Signed-off-by: Daniel Wagner <wagi@kernel.org>
    Signed-off-by: Keith Busch <kbusch@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
nvmet-rdma: recheck queue state is LIVE in state lock in recv done [+ + +]
Author: Ruozhu Li <david.li@jaguarmicro.com>
Date:   Sun Feb 16 20:49:56 2025 +0800

    nvmet-rdma: recheck queue state is LIVE in state lock in recv done
    
    [ Upstream commit 3988ac1c67e6e84d2feb987d7b36d5791174b3da ]
    
    The queue state checking in nvmet_rdma_recv_done is not in queue state
    lock.Queue state can transfer to LIVE in cm establish handler between
    state checking and state lock here, cause a silent drop of nvme connect
    cmd.
    Recheck queue state whether in LIVE state in state lock to prevent this
    issue.
    
    Signed-off-by: Ruozhu Li <david.li@jaguarmicro.com>
    Reviewed-by: Sagi Grimberg <sagi@grimberg.me>
    Signed-off-by: Keith Busch <kbusch@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
objtool: Ignore dangling jump table entries [+ + +]
Author: Josh Poimboeuf <jpoimboe@kernel.org>
Date:   Tue Jan 14 13:57:58 2025 -0800

    objtool: Ignore dangling jump table entries
    
    [ Upstream commit 3724062ca2b1364f02cf44dbea1a552227844ad1 ]
    
    Clang sometimes leaves dangling unused jump table entries which point to
    the end of the function.  Ignore them.
    
    Closes: https://lore.kernel.org/20250113235835.vqgvb7cdspksy5dn@jpoimboe
    Reported-by: Klaus Kusche <klaus.kusche@computerix.info>
    Signed-off-by: Josh Poimboeuf <jpoimboe@kernel.org>
    Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
    Link: https://lkml.kernel.org/r/ee25c0b7e80113e950bd1d4c208b671d35774ff4.1736891751.git.jpoimboe@kernel.org
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
perf/x86/intel: Use better start period for frequency mode [+ + +]
Author: Kan Liang <kan.liang@linux.intel.com>
Date:   Fri Jan 17 07:19:13 2025 -0800

    perf/x86/intel: Use better start period for frequency mode
    
    [ Upstream commit a26b24b2e21f6222635a95426b9ef9eec63d69b1 ]
    
    Freqency mode is the current default mode of Linux perf. A period of 1 is
    used as a starting period. The period is auto-adjusted on each tick or an
    overflow, to meet the frequency target.
    
    The start period of 1 is too low and may trigger some issues:
    
    - Many HWs do not support period 1 well.
      https://lore.kernel.org/lkml/875xs2oh69.ffs@tglx/
    
    - For an event that occurs frequently, period 1 is too far away from the
      real period. Lots of samples are generated at the beginning.
      The distribution of samples may not be even.
    
    - A low starting period for frequently occurring events also challenges
      virtualization, which has a longer path to handle a PMI.
    
    The limit_period value only checks the minimum acceptable value for HW.
    It cannot be used to set the start period, because some events may
    need a very low period. The limit_period cannot be set too high. It
    doesn't help with the events that occur frequently.
    
    It's hard to find a universal starting period for all events. The idea
    implemented by this patch is to only give an estimate for the popular
    HW and HW cache events. For the rest of the events, start from the lowest
    possible recommended value.
    
    Signed-off-by: Kan Liang <kan.liang@linux.intel.com>
    Signed-off-by: Ingo Molnar <mingo@kernel.org>
    Cc: Peter Zijlstra <peterz@infradead.org>
    Link: https://lore.kernel.org/r/20250117151913.3043942-3-kan.liang@linux.intel.com
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
pinctrl: bcm281xx: Fix incorrect regmap max_registers value [+ + +]
Author: Artur Weber <aweber.kernel@gmail.com>
Date:   Fri Feb 7 21:02:41 2025 +0100

    pinctrl: bcm281xx: Fix incorrect regmap max_registers value
    
    [ Upstream commit 68283c1cb573143c0b7515e93206f3503616bc10 ]
    
    The max_registers value does not take into consideration the stride;
    currently, it's set to the number of the last pin, but this does not
    accurately represent the final register.
    
    Fix this by multiplying the current value by 4.
    
    Fixes: 54b1aa5a5b16 ("ARM: pinctrl: Add Broadcom Capri pinctrl driver")
    Signed-off-by: Artur Weber <aweber.kernel@gmail.com>
    Link: https://lore.kernel.org/20250207-bcm21664-pinctrl-v1-2-e7cfac9b2d3b@gmail.com
    Signed-off-by: Linus Walleij <linus.walleij@linaro.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
platform/x86/intel: pmc: fix ltr decode in pmc_core_ltr_show() [+ + +]
Author: Dmitry Kandybka <d.kandybka@gmail.com>
Date:   Fri Jan 24 01:07:39 2025 +0300

    platform/x86/intel: pmc: fix ltr decode in pmc_core_ltr_show()
    
    [ Upstream commit 583ef25bb2a094813351a727ddec38b35a15b9f8 ]
    
    In pmc_core_ltr_show(), promote 'val' to 'u64' to avoid possible integer
    overflow. Values (10 bit) are multiplied by the scale, the result of
    expression is in a range from 1 to 34,326,183,936 which is bigger then
    UINT32_MAX. Compile tested only.
    
    Found by Linux Verification Center (linuxtesting.org) with SVACE.
    
    Signed-off-by: Dmitry Kandybka <d.kandybka@gmail.com>
    Reviewed-by: Rajneesh Bhardwaj <irenic.rajneesh@gmail.com>
    Reviewed-by: Ilpo Järvinen <ilpo.jarvinen@linux.intel.com>
    Link: https://lore.kernel.org/r/20250123220739.68087-1-d.kandybka@gmail.com
    Signed-off-by: Ilpo Järvinen <ilpo.jarvinen@linux.intel.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
platform/x86: thinkpad_acpi: Fix invalid fan speed on ThinkPad X120e [+ + +]
Author: Sybil Isabel Dorsett <sybdorsett@proton.me>
Date:   Mon Feb 3 16:33:15 2025 +0000

    platform/x86: thinkpad_acpi: Fix invalid fan speed on ThinkPad X120e
    
    [ Upstream commit 1046cac109225eda0973b898e053aeb3d6c10e1d ]
    
    On ThinkPad X120e, fan speed is reported in ticks per revolution
    rather than RPM.
    
    Recalculate the fan speed value reported for ThinkPad X120e
    to RPM based on a 22.5 kHz clock.
    
    Based on the information on
    https://www.thinkwiki.org/wiki/How_to_control_fan_speed,
    the same problem is highly likely to be relevant to at least Edge11,
    but Edge11 is not addressed in this patch.
    
    Signed-off-by: Sybil Isabel Dorsett <sybdorsett@proton.me>
    Reviewed-by: Ilpo Järvinen <ilpo.jarvinen@linux.intel.com>
    Link: https://lore.kernel.org/r/20250203163255.5525-1-sybdorsett@proton.me
    Signed-off-by: Ilpo Järvinen <ilpo.jarvinen@linux.intel.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

platform/x86: thinkpad_acpi: Support for V9 DYTC platform profiles [+ + +]
Author: Mark Pearson <mpearson-lenovo@squebb.ca>
Date:   Thu Feb 6 14:39:41 2025 -0500

    platform/x86: thinkpad_acpi: Support for V9 DYTC platform profiles
    
    [ Upstream commit 9cff907cbf8c7fb5345918dbcc7b74a01656f34f ]
    
    Newer Thinkpad AMD platforms are using V9 DYTC and this changes the
    profiles used for PSC mode. Add support for this update.
    Tested on P14s G5 AMD
    
    Signed-off-by: Mark Pearson <mpearson-lenovo@squebb.ca>
    Link: https://lore.kernel.org/r/20250206193953.58365-1-mpearson-lenovo@squebb.ca
    Reviewed-by: Ilpo Järvinen <ilpo.jarvinen@linux.intel.com>
    Signed-off-by: Ilpo Järvinen <ilpo.jarvinen@linux.intel.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
powercap: call put_device() on an error path in powercap_register_control_type() [+ + +]
Author: Joe Hattori <joe@pf.is.s.u-tokyo.ac.jp>
Date:   Fri Jan 10 10:05:54 2025 +0900

    powercap: call put_device() on an error path in powercap_register_control_type()
    
    [ Upstream commit 93c66fbc280747ea700bd6199633d661e3c819b3 ]
    
    powercap_register_control_type() calls device_register(), but does not
    release the refcount of the device when it fails.
    
    Call put_device() before returning an error to balance the refcount.
    
    Since the kfree(control_type) will be done by powercap_release(), remove
    the lines in powercap_register_control_type() before returning the error.
    
    This bug was found by an experimental verifier that I am developing.
    
    Signed-off-by: Joe Hattori <joe@pf.is.s.u-tokyo.ac.jp>
    Link: https://patch.msgid.link/20250110010554.1583411-1-joe@pf.is.s.u-tokyo.ac.jp
    [ rjw: Changelog edits ]
    Signed-off-by: Rafael J. Wysocki <rafael.j.wysocki@intel.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
qlcnic: fix memory leak issues in qlcnic_sriov_common.c [+ + +]
Author: Haoxiang Li <haoxiang_li2024@163.com>
Date:   Fri Mar 7 17:49:52 2025 +0800

    qlcnic: fix memory leak issues in qlcnic_sriov_common.c
    
    commit d2b9d97e89c79c95f8b517e4fa43fd100f936acc upstream.
    
    Add qlcnic_sriov_free_vlans() in qlcnic_sriov_alloc_vlans() if
    any sriov_vlans fails to be allocated.
    Add qlcnic_sriov_free_vlans() to free the memory allocated by
    qlcnic_sriov_alloc_vlans() if "sriov->allowed_vlans" fails to
    be allocated.
    
    Fixes: 91b7282b613d ("qlcnic: Support VLAN id config.")
    Cc: stable@vger.kernel.org
    Signed-off-by: Haoxiang Li <haoxiang_li2024@163.com>
    Link: https://patch.msgid.link/20250307094952.14874-1-haoxiang_li2024@163.com
    Signed-off-by: Paolo Abeni <pabeni@redhat.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
Revert "Bluetooth: hci_core: Fix sleeping function called from invalid context" [+ + +]
Author: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
Date:   Tue Mar 4 10:06:10 2025 -0500

    Revert "Bluetooth: hci_core: Fix sleeping function called from invalid context"
    
    [ Upstream commit ab6ab707a4d060a51c45fc13e3b2228d5f7c0b87 ]
    
    This reverts commit 4d94f05558271654670d18c26c912da0c1c15549 which has
    problems (see [1]) and is no longer needed since 581dd2dc168f
    ("Bluetooth: hci_event: Fix using rcu_read_(un)lock while iterating")
    has reworked the code where the original bug has been found.
    
    [1] Link: https://lore.kernel.org/linux-bluetooth/877c55ci1r.wl-tiwai@suse.de/T/#t
    Fixes: 4d94f0555827 ("Bluetooth: hci_core: Fix sleeping function called from invalid context")
    Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
rust: Disallow BTF generation with Rust + LTO [+ + +]
Author: Matthew Maurer <mmaurer@google.com>
Date:   Wed Jan 8 23:35:08 2025 +0000

    rust: Disallow BTF generation with Rust + LTO
    
    commit 5daa0c35a1f0e7a6c3b8ba9cb721e7d1ace6e619 upstream.
    
    The kernel cannot currently self-parse BTF containing Rust debug
    information. pahole uses the language of the CU to determine whether to
    filter out debug information when generating the BTF. When LTO is
    enabled, Rust code can cross CU boundaries, resulting in Rust debug
    information in CUs labeled as C. This results in a system which cannot
    parse its own BTF.
    
    Signed-off-by: Matthew Maurer <mmaurer@google.com>
    Cc: stable@vger.kernel.org
    Fixes: c1177979af9c ("btf, scripts: Exclude Rust CUs with pahole")
    Link: https://lore.kernel.org/r/20250108-rust-btf-lto-incompat-v1-1-60243ff6d820@google.com
    Signed-off-by: Miguel Ojeda <ojeda@kernel.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

rust: error: add missing newline to pr_warn! calls [+ + +]
Author: Alban Kurti <kurti@invicto.ai>
Date:   Thu Feb 6 21:07:53 2025 +0000

    rust: error: add missing newline to pr_warn! calls
    
    [ Upstream commit 6f5c36f56d475732981dcf624e0ac0cc7c8984c8 ]
    
    Added missing newline at the end of pr_warn! usage
    so the log is not missed.
    
    Fixes: 6551a7fe0acb ("rust: error: Add Error::from_errno{_unchecked}()")
    Reported-by: Miguel Ojeda <ojeda@kernel.org>
    Link: https://github.com/Rust-for-Linux/linux/issues/1139
    Signed-off-by: Alban Kurti <kurti@invicto.ai>
    Link: https://lore.kernel.org/r/20250206-printing_fix-v3-2-a85273b501ae@invicto.ai
    [ Replaced Closes with Link since it fixes part of the issue. - Miguel ]
    Signed-off-by: Miguel Ojeda <ojeda@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

rust: init: add missing newline to pr_info! calls [+ + +]
Author: Alban Kurti <kurti@invicto.ai>
Date:   Thu Feb 6 21:07:54 2025 +0000

    rust: init: add missing newline to pr_info! calls
    
    [ Upstream commit 6933c1067fe6df8ddb34dd68bdb2aa172cbd08c8 ]
    
    Several pr_info! calls in rust/kernel/init.rs (both in code examples
    and macro documentation) were missing a newline, causing logs to
    run together. This commit updates these calls to include a trailing
    newline, improving readability and consistency with the C side.
    
    Fixes: 6841d45a3030 ("rust: init: add `stack_pin_init!` macro")
    Fixes: 7f8977a7fe6d ("rust: init: add `{pin_}chain` functions to `{Pin}Init<T, E>`")
    Fixes: d0fdc3961270 ("rust: init: add `PinnedDrop` trait and macros")
    Fixes: 4af84c6a85c6 ("rust: init: update expanded macro explanation")
    Reported-by: Miguel Ojeda <ojeda@kernel.org>
    Link: https://github.com/Rust-for-Linux/linux/issues/1139
    Signed-off-by: Alban Kurti <kurti@invicto.ai>
    Link: https://lore.kernel.org/r/20250206-printing_fix-v3-3-a85273b501ae@invicto.ai
    [ Replaced Closes with Link since it fixes part of the issue. Added
      one more Fixes tag (still same set of stable kernels). - Miguel ]
    Signed-off-by: Miguel Ojeda <ojeda@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

rust: init: fix `Zeroable` implementation for `Option>` and `Option>` [+ + +]
Author: Benno Lossin <benno.lossin@proton.me>
Date:   Wed Mar 5 13:29:01 2025 +0000

    rust: init: fix `Zeroable` implementation for `Option<NonNull<T>>` and `Option<KBox<T>>`
    
    commit df27cef153603b18a7d094b53cc3d5264ff32797 upstream.
    
    According to [1], `NonNull<T>` and `#[repr(transparent)]` wrapper types
    such as our custom `KBox<T>` have the null pointer optimization only if
    `T: Sized`. Thus remove the `Zeroable` implementation for the unsized
    case.
    
    Link: https://doc.rust-lang.org/stable/std/option/index.html#representation [1]
    Reported-by: Alice Ryhl <aliceryhl@google.com>
    Closes: https://lore.kernel.org/rust-for-linux/CAH5fLghL+qzrD8KiCF1V3vf2YcC6aWySzkmaE2Zzrnh1gKj-hw@mail.gmail.com/
    Cc: stable@vger.kernel.org # v6.12+ (a custom patch will be needed for 6.6.y)
    Fixes: 38cde0bd7b67 ("rust: init: add `Zeroable` trait and `init::zeroed` function")
    Signed-off-by: Benno Lossin <benno.lossin@proton.me>
    Reviewed-by: Alice Ryhl <aliceryhl@google.com>
    Reviewed-by: Andreas Hindborg <a.hindborg@kernel.org>
    Link: https://lore.kernel.org/r/20250305132836.2145476-1-benno.lossin@proton.me
    [ Added Closes tag and moved up the Reported-by one. - Miguel ]
    Signed-off-by: Miguel Ojeda <ojeda@kernel.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

rust: lockdep: Remove support for dynamically allocated LockClassKeys [+ + +]
Author: Mitchell Levy <levymitchell0@gmail.com>
Date:   Fri Mar 7 15:27:00 2025 -0800

    rust: lockdep: Remove support for dynamically allocated LockClassKeys
    
    commit 966944f3711665db13e214fef6d02982c49bb972 upstream.
    
    Currently, dynamically allocated LockCLassKeys can be used from the Rust
    side without having them registered. This is a soundness issue, so
    remove them.
    
    Fixes: 6ea5aa08857a ("rust: sync: introduce `LockClassKey`")
    Suggested-by: Alice Ryhl <aliceryhl@google.com>
    Signed-off-by: Mitchell Levy <levymitchell0@gmail.com>
    Signed-off-by: Boqun Feng <boqun.feng@gmail.com>
    Signed-off-by: Ingo Molnar <mingo@kernel.org>
    Reviewed-by: Benno Lossin <benno.lossin@proton.me>
    Cc: stable@vger.kernel.org
    Link: https://lore.kernel.org/r/20250307232717.1759087-11-boqun.feng@gmail.com
    Signed-off-by: Boqun Feng <boqun.feng@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
s390/cio: Fix CHPID "configure" attribute caching [+ + +]
Author: Peter Oberparleiter <oberpar@linux.ibm.com>
Date:   Fri Jan 31 12:02:55 2025 +0100

    s390/cio: Fix CHPID "configure" attribute caching
    
    [ Upstream commit 32ae4a2992529e2c7934e422035fad1d9b0f1fb5 ]
    
    In some environments, the SCLP firmware interface used to query a
    CHPID's configured state is not supported. On these environments,
    rapidly reading the corresponding sysfs attribute produces inconsistent
    results:
    
      $ cat /sys/devices/css0/chp0.00/configure
      cat: /sys/devices/css0/chp0.00/configure: Operation not supported
      $ cat /sys/devices/css0/chp0.00/configure
      3
    
    This occurs for example when Linux is run as a KVM guest. The
    inconsistency is a result of CIO using cached results for generating
    the value of the "configure" attribute while failing to handle the
    situation where no data was returned by SCLP.
    
    Fix this by not updating the cache-expiration timestamp when SCLP
    returns no data. With the fix applied, the system response is
    consistent:
    
      $ cat /sys/devices/css0/chp0.00/configure
      cat: /sys/devices/css0/chp0.00/configure: Operation not supported
      $ cat /sys/devices/css0/chp0.00/configure
      cat: /sys/devices/css0/chp0.00/configure: Operation not supported
    
    Reviewed-by: Vineeth Vijayan <vneethv@linux.ibm.com>
    Reviewed-by: Eric Farman <farman@linux.ibm.com>
    Tested-by: Eric Farman <farman@linux.ibm.com>
    Signed-off-by: Peter Oberparleiter <oberpar@linux.ibm.com>
    Signed-off-by: Vasily Gorbik <gor@linux.ibm.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
sched/debug: Provide slice length for fair tasks [+ + +]
Author: Christian Loehle <christian.loehle@arm.com>
Date:   Wed Jan 29 17:59:44 2025 +0000

    sched/debug: Provide slice length for fair tasks
    
    [ Upstream commit 9065ce69754dece78606c8bbb3821449272e56bf ]
    
    Since commit:
    
      857b158dc5e8 ("sched/eevdf: Use sched_attr::sched_runtime to set request/slice suggestion")
    
    ... we have the userspace per-task tunable slice length, which is
    a key parameter that is otherwise difficult to obtain, so provide
    it in /proc/$PID/sched.
    
    [ mingo: Clarified the changelog. ]
    
    Signed-off-by: Christian Loehle <christian.loehle@arm.com>
    Signed-off-by: Ingo Molnar <mingo@kernel.org>
    Cc: Peter Zijlstra <peterz@infradead.org>
    Link: https://lore.kernel.org/r/453349b1-1637-42f5-a7b2-2385392b5956@arm.com
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
sched/isolation: Prevent boot crash when the boot CPU is nohz_full [+ + +]
Author: Oleg Nesterov <oleg@redhat.com>
Date:   Thu Apr 11 16:39:05 2024 +0200

    sched/isolation: Prevent boot crash when the boot CPU is nohz_full
    
    Documentation/timers/no_hz.rst states that the "nohz_full=" mask must not
    include the boot CPU, which is no longer true after:
    
      08ae95f4fd3b ("nohz_full: Allow the boot CPU to be nohz_full").
    
    However after:
    
      aae17ebb53cd ("workqueue: Avoid using isolated cpus' timers on queue_delayed_work")
    
    the kernel will crash at boot time in this case; housekeeping_any_cpu()
    returns an invalid CPU number until smp_init() brings the first
    housekeeping CPU up.
    
    Change housekeeping_any_cpu() to check the result of cpumask_any_and() and
    return smp_processor_id() in this case.
    
    This is just the simple and backportable workaround which fixes the
    symptom, but smp_processor_id() at boot time should be safe at least for
    type == HK_TYPE_TIMER, this more or less matches the tick_do_timer_boot_cpu
    logic.
    
    There is no worry about cpu_down(); tick_nohz_cpu_down() will not allow to
    offline tick_do_timer_cpu (the 1st online housekeeping CPU).
    
    [ Apply only documentation changes as commit which causes boot
      crash when boot CPU is nohz_full is not backported to stable
      kernels - Krishanth ]
    
    Reported-by: Chris von Recklinghausen <crecklin@redhat.com>
    Signed-off-by: Oleg Nesterov <oleg@redhat.com>
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Signed-off-by: Ingo Molnar <mingo@kernel.org>
    Reviewed-by: Phil Auld <pauld@redhat.com>
    Acked-by: Frederic Weisbecker <frederic@kernel.org>
    Link: https://lore.kernel.org/r/20240411143905.GA19288@redhat.com
    Closes: https://lore.kernel.org/all/20240402105847.GA24832@redhat.com/
    Signed-off-by: Krishanth Jagaduri <Krishanth.Jagaduri@sony.com>
    [ strip out upstream commit and Fixes: so tools don't get confused that
      this commit actually does anything real - gregkh]
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
sched: address a potential NULL pointer dereference in the GRED scheduler. [+ + +]
Author: Jun Yang <juny24602@gmail.com>
Date:   Wed Mar 5 23:44:10 2025 +0800

    sched: address a potential NULL pointer dereference in the GRED scheduler.
    
    [ Upstream commit 115ef44a98220fddfab37a39a19370497cd718b9 ]
    
    If kzalloc in gred_init returns a NULL pointer, the code follows the
    error handling path, invoking gred_destroy. This, in turn, calls
    gred_offload, where memset could receive a NULL pointer as input,
    potentially leading to a kernel crash.
    
    When table->opt is NULL in gred_init(), gred_change_table_def()
    is not called yet, so it is not necessary to call ->ndo_setup_tc()
    in gred_offload().
    
    Signed-off-by: Jun Yang <juny24602@gmail.com>
    Reviewed-by: Cong Wang <xiyou.wangcong@gmail.com>
    Fixes: f25c0515c521 ("net: sched: gred: dynamically allocate tc_gred_qopt_offload")
    Link: https://patch.msgid.link/20250305154410.3505642-1-juny24602@gmail.com
    Signed-off-by: Jakub Kicinski <kuba@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

sched: Clarify wake_up_q()'s write to task->wake_q.next [+ + +]
Author: Jann Horn <jannh@google.com>
Date:   Wed Jan 29 20:53:03 2025 +0100

    sched: Clarify wake_up_q()'s write to task->wake_q.next
    
    [ Upstream commit bcc6244e13b4d4903511a1ea84368abf925031c0 ]
    
    Clarify that wake_up_q() does an atomic write to task->wake_q.next, after
    which a concurrent __wake_q_add() can immediately overwrite
    task->wake_q.next again.
    
    Signed-off-by: Jann Horn <jannh@google.com>
    Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
    Link: https://lkml.kernel.org/r/20250129-sched-wakeup-prettier-v1-1-2f51f5f663fa@google.com
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
scripts: generate_rust_analyzer: add missing macros deps [+ + +]
Author: Tamir Duberstein <tamird@gmail.com>
Date:   Mon Feb 10 12:03:24 2025 -0500

    scripts: generate_rust_analyzer: add missing macros deps
    
    [ Upstream commit 2e0f91aba507a3cb59f7a12fc3ea2b7d4d6675b7 ]
    
    The macros crate has depended on std and proc_macro since its
    introduction in commit 1fbde52bde73 ("rust: add `macros` crate"). These
    dependencies were omitted from commit 8c4555ccc55c ("scripts: add
    `generate_rust_analyzer.py`") resulting in missing go-to-definition and
    autocomplete, and false-positive warnings emitted from rust-analyzer
    such as:
    
      [{
            "resource": "/Users/tamird/src/linux/rust/macros/module.rs",
            "owner": "_generated_diagnostic_collection_name_#1",
            "code": {
                    "value": "non_snake_case",
                    "target": {
                            "$mid": 1,
                            "path": "/rustc/",
                            "scheme": "https",
                            "authority": "doc.rust-lang.org",
                            "query": "search=non_snake_case"
                    }
            },
            "severity": 4,
            "message": "Variable `None` should have snake_case name, e.g. `none`",
            "source": "rust-analyzer",
            "startLineNumber": 123,
            "startColumn": 17,
            "endLineNumber": 123,
            "endColumn": 21
      }]
    
    Add the missing dependencies to improve the developer experience.
    
      [ Fiona had a different approach (thanks!) at:
    
            https://lore.kernel.org/rust-for-linux/20241205115438.234221-1-me@kloenk.dev/
    
        But Tamir and Fiona agreed to this one. - Miguel ]
    
    Fixes: 8c4555ccc55c ("scripts: add `generate_rust_analyzer.py`")
    Reviewed-by: Fiona Behrens <me@kloenk.dev>
    Diagnosed-by: Chayim Refael Friedman <chayimfr@gmail.com>
    Link: https://github.com/rust-lang/rust-analyzer/issues/17759#issuecomment-2646328275
    Signed-off-by: Tamir Duberstein <tamird@gmail.com>
    Tested-by: Andreas Hindborg <a.hindborg@kernel.org>
    Link: https://lore.kernel.org/r/20250210-rust-analyzer-macros-core-dep-v3-1-45eb4836f218@gmail.com
    [ Removed `return`. Changed tag name. Added Link. Slightly
      reworded. - Miguel ]
    Signed-off-by: Miguel Ojeda <ojeda@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
scsi: core: Use GFP_NOIO to avoid circular locking dependency [+ + +]
Author: Rik van Riel <riel@surriel.com>
Date:   Tue Jan 28 16:35:39 2025 -0500

    scsi: core: Use GFP_NOIO to avoid circular locking dependency
    
    [ Upstream commit 5363ee9d110e139584c2d92a0b640bc210588506 ]
    
    Filesystems can write to disk from page reclaim with __GFP_FS
    set. Marc found a case where scsi_realloc_sdev_budget_map() ends up in
    page reclaim with GFP_KERNEL, where it could try to take filesystem
    locks again, leading to a deadlock.
    
    WARNING: possible circular locking dependency detected
    6.13.0 #1 Not tainted
    ------------------------------------------------------
    kswapd0/70 is trying to acquire lock:
    ffff8881025d5d78 (&q->q_usage_counter(io)){++++}-{0:0}, at: blk_mq_submit_bio+0x461/0x6e0
    
    but task is already holding lock:
    ffffffff81ef5f40 (fs_reclaim){+.+.}-{0:0}, at: balance_pgdat+0x9f/0x760
    
    The full lockdep splat can be found in Marc's report:
    
    https://lkml.org/lkml/2025/1/24/1101
    
    Avoid the potential deadlock by doing the allocation with GFP_NOIO, which
    prevents both filesystem and block layer recursion.
    
    Reported-by: Marc Aurèle La France <tsi@tuyoix.net>
    Signed-off-by: Rik van Riel <riel@surriel.com>
    Link: https://lore.kernel.org/r/20250129104525.0ae8421e@fangorn
    Reviewed-by: Christoph Hellwig <hch@lst.de>
    Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

scsi: qla1280: Fix kernel oops when debug level > 2 [+ + +]
Author: Magnus Lindholm <linmag7@gmail.com>
Date:   Sat Jan 25 10:49:22 2025 +0100

    scsi: qla1280: Fix kernel oops when debug level > 2
    
    [ Upstream commit 5233e3235dec3065ccc632729675575dbe3c6b8a ]
    
    A null dereference or oops exception will eventually occur when qla1280.c
    driver is compiled with DEBUG_QLA1280 enabled and ql_debug_level > 2.  I
    think its clear from the code that the intention here is sg_dma_len(s) not
    length of sg_next(s) when printing the debug info.
    
    Signed-off-by: Magnus Lindholm <linmag7@gmail.com>
    Link: https://lore.kernel.org/r/20250125095033.26188-1-linmag7@gmail.com
    Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

scsi: ufs: core: Fix error return with query response [+ + +]
Author: Seunghui Lee <sh043.lee@samsung.com>
Date:   Sat Jan 18 11:38:08 2025 +0900

    scsi: ufs: core: Fix error return with query response
    
    [ Upstream commit 1a78a56ea65252bb089e0daace989167227f2d31 ]
    
    There is currently no mechanism to return error from query responses.
    Return the error and print the corresponding error message with it.
    
    Signed-off-by: Seunghui Lee <sh043.lee@samsung.com>
    Link: https://lore.kernel.org/r/20250118023808.24726-1-sh043.lee@samsung.com
    Reviewed-by: Bean Huo <beanhuo@micron.com>
    Reviewed-by: Bart Van Assche <bvanassche@acm.org>
    Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
sctp: Fix undefined behavior in left shift operation [+ + +]
Author: Yu-Chun Lin <eleanor15x@gmail.com>
Date:   Tue Feb 18 16:12:16 2025 +0800

    sctp: Fix undefined behavior in left shift operation
    
    [ Upstream commit 606572eb22c1786a3957d24307f5760bb058ca19 ]
    
    According to the C11 standard (ISO/IEC 9899:2011, 6.5.7):
    "If E1 has a signed type and E1 x 2^E2 is not representable in the result
    type, the behavior is undefined."
    
    Shifting 1 << 31 causes signed integer overflow, which leads to undefined
    behavior.
    
    Fix this by explicitly using '1U << 31' to ensure the shift operates on
    an unsigned type, avoiding undefined behavior.
    
    Signed-off-by: Yu-Chun Lin <eleanor15x@gmail.com>
    Link: https://patch.msgid.link/20250218081217.3468369-1-eleanor15x@gmail.com
    Signed-off-by: Jakub Kicinski <kuba@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
selftests/bpf: Fix invalid flag of recv() [+ + +]
Author: Jiayuan Chen <mrpre@163.com>
Date:   Wed Jan 22 18:09:16 2025 +0800

    selftests/bpf: Fix invalid flag of recv()
    
    [ Upstream commit a0c11149509aa905aeec10cf9998091443472b0b ]
    
    SOCK_NONBLOCK flag is only effective during socket creation, not during
    recv. Use MSG_DONTWAIT instead.
    
    Signed-off-by: Jiayuan Chen <mrpre@163.com>
    Signed-off-by: Martin KaFai Lau <martin.lau@kernel.org>
    Acked-by: Jakub Sitnicki <jakub@cloudflare.com>
    Acked-by: John Fastabend <john.fastabend@gmail.com>
    Link: https://patch.msgid.link/20250122100917.49845-5-mrpre@163.com
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
smb3: add support for IAKerb [+ + +]
Author: Steve French <stfrench@microsoft.com>
Date:   Tue Jan 28 01:04:23 2025 -0600

    smb3: add support for IAKerb
    
    [ Upstream commit eea5119fa5979c350af5783a8148eacdd4219715 ]
    
    There are now more servers which advertise support for IAKerb (passthrough
    Kerberos authentication via proxy).  IAKerb is a public extension industry
    standard Kerberos protocol that allows a client without line-of-sight
    to a Domain Controller to authenticate. There can be cases where we
    would fail to mount if the server only advertises the OID for IAKerb
    in SPNEGO/GSSAPI.  Add code to allow us to still upcall to userspace
    in these cases to obtain the Kerberos ticket.
    
    Signed-off-by: Steve French <stfrench@microsoft.com>
    Stable-dep-of: 605b249ea967 ("smb: client: Fix match_session bug preventing session reuse")
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
smb: client: Fix match_session bug preventing session reuse [+ + +]
Author: Henrique Carvalho <henrique.carvalho@suse.com>
Date:   Tue Mar 11 15:23:59 2025 -0300

    smb: client: Fix match_session bug preventing session reuse
    
    [ Upstream commit 605b249ea96770ac4fac4b8510a99e0f8442be5e ]
    
    Fix a bug in match_session() that can causes the session to not be
    reused in some cases.
    
    Reproduction steps:
    
    mount.cifs //server/share /mnt/a -o credentials=creds
    mount.cifs //server/share /mnt/b -o credentials=creds,sec=ntlmssp
    cat /proc/fs/cifs/DebugData | grep SessionId | wc -l
    
    mount.cifs //server/share /mnt/b -o credentials=creds,sec=ntlmssp
    mount.cifs //server/share /mnt/a -o credentials=creds
    cat /proc/fs/cifs/DebugData | grep SessionId | wc -l
    
    Cc: stable@vger.kernel.org
    Reviewed-by: Enzo Matsumiya <ematsumiya@suse.de>
    Signed-off-by: Henrique Carvalho <henrique.carvalho@suse.com>
    Signed-off-by: Steve French <stfrench@microsoft.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

smb: client: fix noisy when tree connecting to DFS interlink targets [+ + +]
Author: Paulo Alcantara <pc@manguebit.com>
Date:   Wed Feb 5 13:22:11 2025 -0300

    smb: client: fix noisy when tree connecting to DFS interlink targets
    
    [ Upstream commit 773dc23ff81838b6f74d7fabba5a441cc6a93982 ]
    
    When the client attempts to tree connect to a domain-based DFS
    namespace from a DFS interlink target, the server will return
    STATUS_BAD_NETWORK_NAME and the following will appear on dmesg:
    
            CIFS: VFS:  BAD_NETWORK_NAME: \\dom\dfs
    
    Since a DFS share might contain several DFS interlinks and they expire
    after 10 minutes, the above message might end up being flooded on
    dmesg when mounting or accessing them.
    
    Print this only once per share.
    
    Signed-off-by: Paulo Alcantara (Red Hat) <pc@manguebit.com>
    Signed-off-by: Steve French <stfrench@microsoft.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

smb: client: fix regression with guest option [+ + +]
Author: Paulo Alcantara <pc@manguebit.com>
Date:   Wed Mar 12 10:51:31 2025 -0300

    smb: client: fix regression with guest option
    
    commit fc99045effa81fdf509c2a97cbb7e6e8f2fd4443 upstream.
    
    When mounting a CIFS share with 'guest' mount option, mount.cifs(8)
    will set empty password= and password2= options.  Currently we only
    handle empty strings from user= and password= options, so the mount
    will fail with
    
            cifs: Bad value for 'password2'
    
    Fix this by handling empty string from password2= option as well.
    
    Link: https://bbs.archlinux.org/viewtopic.php?id=303927
    Reported-by: Adam Williamson <awilliam@redhat.com>
    Closes: https://lore.kernel.org/r/83c00b5fea81c07f6897a5dd3ef50fd3b290f56c.camel@redhat.com
    Fixes: 35f834265e0d ("smb3: fix broken reconnect when password changing on the server by allowing password rotation")
    Cc: stable@vger.kernel.org
    Signed-off-by: Paulo Alcantara (Red Hat) <pc@manguebit.com>
    Signed-off-by: Steve French <stfrench@microsoft.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
stmmac: loongson: Pass correct arg to PCI function [+ + +]
Author: Philipp Stanner <phasta@kernel.org>
Date:   Wed Feb 26 09:52:05 2025 +0100

    stmmac: loongson: Pass correct arg to PCI function
    
    [ Upstream commit 00371a3f48775967950c2fe3ec97b7c786ca956d ]
    
    pcim_iomap_regions() should receive the driver's name as its third
    parameter, not the PCI device's name.
    
    Define the driver name with a macro and use it at the appropriate
    places, including pcim_iomap_regions().
    
    Cc: stable@vger.kernel.org # v5.14+
    Fixes: 30bba69d7db4 ("stmmac: pci: Add dwmac support for Loongson")
    Signed-off-by: Philipp Stanner <phasta@kernel.org>
    Reviewed-by: Andrew Lunn <andrew@lunn.ch>
    Reviewed-by: Yanteng Si <si.yanteng@linux.dev>
    Tested-by: Henry Chen <chenx97@aosc.io>
    Link: https://patch.msgid.link/20250226085208.97891-2-phasta@kernel.org
    Signed-off-by: Jakub Kicinski <kuba@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
tcp: fix forever orphan socket caused by tcp_abort [+ + +]
Author: Xueming Feng <kuro@kuroa.me>
Date:   Mon Aug 26 18:23:27 2024 +0800

    tcp: fix forever orphan socket caused by tcp_abort
    
    commit bac76cf89816bff06c4ec2f3df97dc34e150a1c4 upstream.
    
    We have some problem closing zero-window fin-wait-1 tcp sockets in our
    environment. This patch come from the investigation.
    
    Previously tcp_abort only sends out reset and calls tcp_done when the
    socket is not SOCK_DEAD, aka orphan. For orphan socket, it will only
    purging the write queue, but not close the socket and left it to the
    timer.
    
    While purging the write queue, tp->packets_out and sk->sk_write_queue
    is cleared along the way. However tcp_retransmit_timer have early
    return based on !tp->packets_out and tcp_probe_timer have early
    return based on !sk->sk_write_queue.
    
    This caused ICSK_TIME_RETRANS and ICSK_TIME_PROBE0 not being resched
    and socket not being killed by the timers, converting a zero-windowed
    orphan into a forever orphan.
    
    This patch removes the SOCK_DEAD check in tcp_abort, making it send
    reset to peer and close the socket accordingly. Preventing the
    timer-less orphan from happening.
    
    According to Lorenzo's email in the v1 thread, the check was there to
    prevent force-closing the same socket twice. That situation is handled
    by testing for TCP_CLOSE inside lock, and returning -ENOENT if it is
    already closed.
    
    The -ENOENT code comes from the associate patch Lorenzo made for
    iproute2-ss; link attached below, which also conform to RFC 9293.
    
    At the end of the patch, tcp_write_queue_purge(sk) is removed because it
    was already called in tcp_done_with_error().
    
    p.s. This is the same patch with v2. Resent due to mis-labeled "changes
    requested" on patchwork.kernel.org.
    
    Link: https://patchwork.ozlabs.org/project/netdev/patch/1450773094-7978-3-git-send-email-lorenzo@google.com/
    Fixes: c1e64e298b8c ("net: diag: Support destroying TCP sockets.")
    Signed-off-by: Xueming Feng <kuro@kuroa.me>
    Tested-by: Lorenzo Colitti <lorenzo@google.com>
    Reviewed-by: Jason Xing <kerneljasonxing@gmail.com>
    Reviewed-by: Eric Dumazet <edumazet@google.com>
    Link: https://patch.msgid.link/20240826102327.1461482-1-kuro@kuroa.me
    Signed-off-by: Jakub Kicinski <kuba@kernel.org>
    Link: https://lore.kernel.org/lkml/Z9OZS%2Fhc+v5og6%2FU@perf/
    [youngmin: Resolved minor conflict in net/ipv4/tcp.c]
    Signed-off-by: Youngmin Nam <youngmin.nam@samsung.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

tcp: fix races in tcp_abort() [+ + +]
Author: Eric Dumazet <edumazet@google.com>
Date:   Tue May 28 12:52:52 2024 +0000

    tcp: fix races in tcp_abort()
    
    commit 5ce4645c23cf5f048eb8e9ce49e514bababdee85 upstream.
    
    tcp_abort() has the same issue than the one fixed in the prior patch
    in tcp_write_err().
    
    In order to get consistent results from tcp_poll(), we must call
    sk_error_report() after tcp_done().
    
    We can use tcp_done_with_error() to centralize this logic.
    
    Fixes: c1e64e298b8c ("net: diag: Support destroying TCP sockets.")
    Signed-off-by: Eric Dumazet <edumazet@google.com>
    Acked-by: Neal Cardwell <ncardwell@google.com>
    Link: https://lore.kernel.org/r/20240528125253.1966136-4-edumazet@google.com
    Signed-off-by: Jakub Kicinski <kuba@kernel.org>
    [youngmin: Resolved minor conflict in net/ipv4/tcp.c]
    Signed-off-by: Youngmin Nam <youngmin.nam@samsung.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
thermal/cpufreq_cooling: Remove structure member documentation [+ + +]
Author: Daniel Lezcano <daniel.lezcano@linaro.org>
Date:   Tue Feb 11 09:47:11 2025 +0100

    thermal/cpufreq_cooling: Remove structure member documentation
    
    [ Upstream commit a6768c4f92e152265590371975d44c071a5279c7 ]
    
    The structure member documentation refers to a member which does not
    exist any more. Remove it.
    
    Link: https://lore.kernel.org/all/202501220046.h3PMBCti-lkp@intel.com/
    Reported-by: kernel test robot <lkp@intel.com>
    Closes: https://lore.kernel.org/oe-kbuild-all/202501220046.h3PMBCti-lkp@intel.com/
    Signed-off-by: Daniel Lezcano <daniel.lezcano@linaro.org>
    Acked-by: Viresh Kumar <viresh.kumar@linaro.org>
    Link: https://patch.msgid.link/20250211084712.2746705-1-daniel.lezcano@linaro.org
    [ rjw: Minor changelog edits ]
    Signed-off-by: Rafael J. Wysocki <rafael.j.wysocki@intel.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
usb: phy: generic: Use proper helper for property detection [+ + +]
Author: Alexander Stein <alexander.stein@ew.tq-group.com>
Date:   Mon Jan 20 15:42:51 2025 +0100

    usb: phy: generic: Use proper helper for property detection
    
    [ Upstream commit 309005e448c1f3e4b81e4416406991b7c3339c1d ]
    
    Since commit c141ecc3cecd7 ("of: Warn when of_property_read_bool() is
    used on non-boolean properties") a warning is raised if this function
    is used for property detection. of_property_present() is the correct
    helper for this.
    
    Signed-off-by: Alexander Stein <alexander.stein@ew.tq-group.com>
    Link: https://lore.kernel.org/r/20250120144251.580981-1-alexander.stein@ew.tq-group.com
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
USB: serial: ftdi_sio: add support for Altera USB Blaster 3 [+ + +]
Author: Boon Khai Ng <boon.khai.ng@intel.com>
Date:   Wed Mar 12 11:05:44 2025 +0800

    USB: serial: ftdi_sio: add support for Altera USB Blaster 3
    
    commit 18e0885bd2ca738407036434418a26a58394a60e upstream.
    
    The Altera USB Blaster 3, available as both a cable and an on-board
    solution, is primarily used for programming and debugging FPGAs.
    
    It interfaces with host software such as Quartus Programmer,
    System Console, SignalTap, and Nios Debugger. The device utilizes
    either an FT2232 or FT4232 chip.
    
    Enabling the support for various configurations of the on-board
    USB Blaster 3 by including the appropriate VID/PID pairs,
    allowing it to function as a serial device via ftdi_sio.
    
    Note that this check-in does not include support for the
    cable solution, as it does not support UART functionality.
    The supported configurations are determined by the
    hardware design and include:
    
    1) PID 0x6022, FT2232, 1 JTAG port (Port A) + Port B as UART
    2) PID 0x6025, FT4232, 1 JTAG port (Port A) + Port C as UART
    3) PID 0x6026, FT4232, 1 JTAG port (Port A) + Port C, D as UART
    4) PID 0x6029, FT4232, 1 JTAG port (Port B) + Port C as UART
    5) PID 0x602a, FT4232, 1 JTAG port (Port B) + Port C, D as UART
    6) PID 0x602c, FT4232, 1 JTAG port (Port A) + Port B as UART
    7) PID 0x602d, FT4232, 1 JTAG port (Port A) + Port B, C as UART
    8) PID 0x602e, FT4232, 1 JTAG port (Port A) + Port B, C, D as UART
    
    These configurations allow for flexibility in how the USB Blaster 3 is
    used, depending on the specific needs of the hardware design.
    
    Signed-off-by: Boon Khai Ng <boon.khai.ng@intel.com>
    Cc: stable@vger.kernel.org
    Signed-off-by: Johan Hovold <johan@kernel.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

USB: serial: option: add Telit Cinterion FE990B compositions [+ + +]
Author: Fabio Porcedda <fabio.porcedda@gmail.com>
Date:   Tue Mar 4 10:19:38 2025 +0100

    USB: serial: option: add Telit Cinterion FE990B compositions
    
    commit 4981bb50392b7515b765da28cf8768ce624c2670 upstream.
    
    Add the following Telit Cinterion FE990B40 compositions:
    
    0x10b0: rmnet + tty (AT/NMEA) + tty (AT) + tty (AT) + tty (AT) +
            tty (diag) + DPL + QDSS (Qualcomm Debug SubSystem) + adb
    T:  Bus=01 Lev=01 Prnt=01 Port=01 Cnt=01 Dev#=  7 Spd=480  MxCh= 0
    D:  Ver= 2.10 Cls=00(>ifc ) Sub=00 Prot=00 MxPS=64 #Cfgs=  1
    P:  Vendor=1bc7 ProdID=10b0 Rev=05.15
    S:  Manufacturer=Telit Cinterion
    S:  Product=FE990
    S:  SerialNumber=28c2595e
    C:  #Ifs= 9 Cfg#= 1 Atr=e0 MxPwr=500mA
    I:  If#= 0 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=ff Prot=50 Driver=qmi_wwan
    E:  Ad=01(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=81(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=82(I) Atr=03(Int.) MxPS=   8 Ivl=32ms
    I:  If#= 1 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=ff Prot=60 Driver=option
    E:  Ad=02(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=83(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=84(I) Atr=03(Int.) MxPS=  10 Ivl=32ms
    I:  If#= 2 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=ff Prot=40 Driver=option
    E:  Ad=03(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=85(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=86(I) Atr=03(Int.) MxPS=  10 Ivl=32ms
    I:  If#= 3 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=ff Prot=40 Driver=option
    E:  Ad=04(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=87(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=88(I) Atr=03(Int.) MxPS=  10 Ivl=32ms
    I:  If#= 4 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=ff Prot=40 Driver=option
    E:  Ad=05(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=89(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=8a(I) Atr=03(Int.) MxPS=  10 Ivl=32ms
    I:  If#= 5 Alt= 0 #EPs= 2 Cls=ff(vend.) Sub=ff Prot=30 Driver=option
    E:  Ad=06(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=8b(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    I:  If#= 6 Alt= 0 #EPs= 1 Cls=ff(vend.) Sub=ff Prot=80 Driver=(none)
    E:  Ad=8c(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    I:  If#= 7 Alt= 0 #EPs= 1 Cls=ff(vend.) Sub=ff Prot=70 Driver=(none)
    E:  Ad=8d(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    I:  If#= 8 Alt= 0 #EPs= 2 Cls=ff(vend.) Sub=42 Prot=01 Driver=(none)
    E:  Ad=07(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=8e(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    
    0x10b1: MBIM + tty (AT/NMEA) + tty (AT) + tty (AT) + tty (AT) +
            tty (diag) + DPL + QDSS (Qualcomm Debug SubSystem) + adb
    T:  Bus=01 Lev=01 Prnt=01 Port=01 Cnt=01 Dev#=  8 Spd=480  MxCh= 0
    D:  Ver= 2.10 Cls=00(>ifc ) Sub=00 Prot=00 MxPS=64 #Cfgs=  1
    P:  Vendor=1bc7 ProdID=10b1 Rev=05.15
    S:  Manufacturer=Telit Cinterion
    S:  Product=FE990
    S:  SerialNumber=28c2595e
    C:  #Ifs=10 Cfg#= 1 Atr=e0 MxPwr=500mA
    I:  If#= 0 Alt= 0 #EPs= 1 Cls=02(commc) Sub=0e Prot=00 Driver=cdc_mbim
    E:  Ad=82(I) Atr=03(Int.) MxPS=  64 Ivl=32ms
    I:  If#= 1 Alt= 1 #EPs= 2 Cls=0a(data ) Sub=00 Prot=02 Driver=cdc_mbim
    E:  Ad=01(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=81(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    I:  If#= 2 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=ff Prot=60 Driver=option
    E:  Ad=02(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=83(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=84(I) Atr=03(Int.) MxPS=  10 Ivl=32ms
    I:  If#= 3 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=ff Prot=40 Driver=option
    E:  Ad=03(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=85(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=86(I) Atr=03(Int.) MxPS=  10 Ivl=32ms
    I:  If#= 4 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=ff Prot=40 Driver=option
    E:  Ad=04(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=87(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=88(I) Atr=03(Int.) MxPS=  10 Ivl=32ms
    I:  If#= 5 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=ff Prot=40 Driver=option
    E:  Ad=05(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=89(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=8a(I) Atr=03(Int.) MxPS=  10 Ivl=32ms
    I:  If#= 6 Alt= 0 #EPs= 2 Cls=ff(vend.) Sub=ff Prot=30 Driver=option
    E:  Ad=06(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=8b(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    I:  If#= 7 Alt= 0 #EPs= 1 Cls=ff(vend.) Sub=ff Prot=80 Driver=(none)
    E:  Ad=8c(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    I:  If#= 8 Alt= 0 #EPs= 1 Cls=ff(vend.) Sub=ff Prot=70 Driver=(none)
    E:  Ad=8d(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    I:  If#= 9 Alt= 0 #EPs= 2 Cls=ff(vend.) Sub=42 Prot=01 Driver=(none)
    E:  Ad=07(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=8e(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    
    0x10b2: RNDIS + tty (AT/NMEA) + tty (AT) + tty (AT) + tty (AT) +
            tty (diag) + DPL + QDSS (Qualcomm Debug SubSystem) + adb
    T:  Bus=01 Lev=01 Prnt=01 Port=01 Cnt=01 Dev#=  9 Spd=480  MxCh= 0
    D:  Ver= 2.10 Cls=00(>ifc ) Sub=00 Prot=00 MxPS=64 #Cfgs=  1
    P:  Vendor=1bc7 ProdID=10b2 Rev=05.15
    S:  Manufacturer=Telit Cinterion
    S:  Product=FE990
    S:  SerialNumber=28c2595e
    C:  #Ifs=10 Cfg#= 1 Atr=e0 MxPwr=500mA
    I:  If#= 0 Alt= 0 #EPs= 1 Cls=ef(misc ) Sub=04 Prot=01 Driver=rndis_host
    E:  Ad=82(I) Atr=03(Int.) MxPS=   8 Ivl=32ms
    I:  If#= 1 Alt= 0 #EPs= 2 Cls=0a(data ) Sub=00 Prot=00 Driver=rndis_host
    E:  Ad=01(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=81(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    I:  If#= 2 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=ff Prot=60 Driver=option
    E:  Ad=02(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=83(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=84(I) Atr=03(Int.) MxPS=  10 Ivl=32ms
    I:  If#= 3 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=ff Prot=40 Driver=option
    E:  Ad=03(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=85(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=86(I) Atr=03(Int.) MxPS=  10 Ivl=32ms
    I:  If#= 4 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=ff Prot=40 Driver=option
    E:  Ad=04(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=87(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=88(I) Atr=03(Int.) MxPS=  10 Ivl=32ms
    I:  If#= 5 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=ff Prot=40 Driver=option
    E:  Ad=05(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=89(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=8a(I) Atr=03(Int.) MxPS=  10 Ivl=32ms
    I:  If#= 6 Alt= 0 #EPs= 2 Cls=ff(vend.) Sub=ff Prot=30 Driver=option
    E:  Ad=06(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=8b(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    I:  If#= 7 Alt= 0 #EPs= 1 Cls=ff(vend.) Sub=ff Prot=80 Driver=(none)
    E:  Ad=8c(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    I:  If#= 8 Alt= 0 #EPs= 1 Cls=ff(vend.) Sub=ff Prot=70 Driver=(none)
    E:  Ad=8d(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    I:  If#= 9 Alt= 0 #EPs= 2 Cls=ff(vend.) Sub=42 Prot=01 Driver=(none)
    E:  Ad=07(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=8e(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    
    0x10b3: ECM + tty (AT/NMEA) + tty (AT) + tty (AT) + tty (AT) +
            tty (diag) + DPL + QDSS (Qualcomm Debug SubSystem) + adb
    T:  Bus=01 Lev=01 Prnt=01 Port=01 Cnt=01 Dev#= 11 Spd=480  MxCh= 0
    D:  Ver= 2.10 Cls=00(>ifc ) Sub=00 Prot=00 MxPS=64 #Cfgs=  1
    P:  Vendor=1bc7 ProdID=10b3 Rev=05.15
    S:  Manufacturer=Telit Cinterion
    S:  Product=FE990
    S:  SerialNumber=28c2595e
    C:  #Ifs=10 Cfg#= 1 Atr=e0 MxPwr=500mA
    I:  If#= 0 Alt= 0 #EPs= 1 Cls=02(commc) Sub=06 Prot=00 Driver=cdc_ether
    E:  Ad=82(I) Atr=03(Int.) MxPS=  16 Ivl=32ms
    I:  If#= 1 Alt= 1 #EPs= 2 Cls=0a(data ) Sub=00 Prot=00 Driver=cdc_ether
    E:  Ad=01(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=81(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    I:  If#= 2 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=ff Prot=60 Driver=option
    E:  Ad=02(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=83(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=84(I) Atr=03(Int.) MxPS=  10 Ivl=32ms
    I:  If#= 3 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=ff Prot=40 Driver=option
    E:  Ad=03(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=85(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=86(I) Atr=03(Int.) MxPS=  10 Ivl=32ms
    I:  If#= 4 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=ff Prot=40 Driver=option
    E:  Ad=04(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=87(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=88(I) Atr=03(Int.) MxPS=  10 Ivl=32ms
    I:  If#= 5 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=ff Prot=40 Driver=option
    E:  Ad=05(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=89(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=8a(I) Atr=03(Int.) MxPS=  10 Ivl=32ms
    I:  If#= 6 Alt= 0 #EPs= 2 Cls=ff(vend.) Sub=ff Prot=30 Driver=option
    E:  Ad=06(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=8b(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    I:  If#= 7 Alt= 0 #EPs= 1 Cls=ff(vend.) Sub=ff Prot=80 Driver=(none)
    E:  Ad=8c(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    I:  If#= 8 Alt= 0 #EPs= 1 Cls=ff(vend.) Sub=ff Prot=70 Driver=(none)
    E:  Ad=8d(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    I:  If#= 9 Alt= 0 #EPs= 2 Cls=ff(vend.) Sub=42 Prot=01 Driver=(none)
    E:  Ad=07(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=8e(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    
    Cc: stable@vger.kernel.org
    Signed-off-by: Fabio Porcedda <fabio.porcedda@gmail.com>
    Reviewed-by: Daniele Palmas <dnlplm@gmail.com>
    [ johan: use USB_DEVICE_AND_INTERFACE_INFO() and sort by protocol ]
    Signed-off-by: Johan Hovold <johan@kernel.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

USB: serial: option: fix Telit Cinterion FE990A name [+ + +]
Author: Fabio Porcedda <fabio.porcedda@gmail.com>
Date:   Tue Mar 4 10:19:39 2025 +0100

    USB: serial: option: fix Telit Cinterion FE990A name
    
    commit 6232f0d8e100a26275bbd773fc56a60af2c95322 upstream.
    
    The correct name for FE990 is FE990A so use it in order to avoid
    confusion with FE990B.
    
    Cc: stable@vger.kernel.org
    Signed-off-by: Fabio Porcedda <fabio.porcedda@gmail.com>
    Signed-off-by: Johan Hovold <johan@kernel.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

USB: serial: option: match on interface class for Telit FN990B [+ + +]
Author: Johan Hovold <johan@kernel.org>
Date:   Thu Mar 6 11:44:41 2025 +0100

    USB: serial: option: match on interface class for Telit FN990B
    
    commit 9a665fe3d967fe46edb4fd2497c7a5cc2dac2f55 upstream.
    
    The device id entries for Telit FN990B ended up matching only on the
    interface protocol. While this works, the protocol is qualified by the
    interface class (and subclass) which should have been included.
    
    Switch to matching using USB_DEVICE_AND_INTERFACE_INFO() while keeping
    the entries sorted also by protocol for consistency.
    
    Link: https://lore.kernel.org/20250227110655.3647028-2-fabio.porcedda@gmail.com/
    Cc: Fabio Porcedda <fabio.porcedda@gmail.com>
    Cc: Daniele Palmas <dnlplm@gmail.com>
    Cc: stable@vger.kernel.org
    Signed-off-by: Johan Hovold <johan@kernel.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
vboxsf: fix building with GCC 15 [+ + +]
Author: Brahmajit Das <brahmajit.xyz@gmail.com>
Date:   Tue Jan 21 21:56:48 2025 +0530

    vboxsf: fix building with GCC 15
    
    [ Upstream commit 4e7487245abcbc5a1a1aea54e4d3b33c53804bda ]
    
    Building with GCC 15 results in build error
    fs/vboxsf/super.c:24:54: error: initializer-string for array of ‘unsigned char’ is too long [-Werror=unterminated-string-initialization]
       24 | static const unsigned char VBSF_MOUNT_SIGNATURE[4] = "\000\377\376\375";
          |                                                      ^~~~~~~~~~~~~~~~~~
    cc1: all warnings being treated as errors
    
    Due to GCC having enabled -Werror=unterminated-string-initialization[0]
    by default. Separately initializing each array element of
    VBSF_MOUNT_SIGNATURE to ensure NUL termination, thus satisfying GCC 15
    and fixing the build error.
    
    [0]: https://gcc.gnu.org/onlinedocs/gcc/Warning-Options.html#index-Wno-unterminated-string-initialization
    
    Signed-off-by: Brahmajit Das <brahmajit.xyz@gmail.com>
    Link: https://lore.kernel.org/r/20250121162648.1408743-1-brahmajit.xyz@gmail.com
    Reviewed-by: Hans de Goede <hdegoede@redhat.com>
    Signed-off-by: Christian Brauner <brauner@kernel.org>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
wifi: cfg80211: cancel wiphy_work before freeing wiphy [+ + +]
Author: Miri Korenblit <miriam.rachel.korenblit@intel.com>
Date:   Thu Mar 6 12:37:59 2025 +0200

    wifi: cfg80211: cancel wiphy_work before freeing wiphy
    
    [ Upstream commit 72d520476a2fab6f3489e8388ab524985d6c4b90 ]
    
    A wiphy_work can be queued from the moment the wiphy is allocated and
    initialized (i.e. wiphy_new_nm). When a wiphy_work is queued, the
    rdev::wiphy_work is getting queued.
    
    If wiphy_free is called before the rdev::wiphy_work had a chance to run,
    the wiphy memory will be freed, and then when it eventally gets to run
    it'll use invalid memory.
    
    Fix this by canceling the work before freeing the wiphy.
    
    Fixes: a3ee4dc84c4e ("wifi: cfg80211: add a work abstraction with special semantics")
    Signed-off-by: Miri Korenblit <miriam.rachel.korenblit@intel.com>
    Reviewed-by: Johannes Berg <johannes.berg@intel.com>
    Link: https://patch.msgid.link/20250306123626.efd1d19f6e07.I48229f96f4067ef73f5b87302335e2fd750136c9@changeid
    Signed-off-by: Johannes Berg <johannes.berg@intel.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
x86/irq: Define trace events conditionally [+ + +]
Author: Arnd Bergmann <arnd@arndb.de>
Date:   Tue Feb 25 22:32:33 2025 +0100

    x86/irq: Define trace events conditionally
    
    [ Upstream commit 9de7695925d5d2d2085681ba935857246eb2817d ]
    
    When both of X86_LOCAL_APIC and X86_THERMAL_VECTOR are disabled,
    the irq tracing produces a W=1 build warning for the tracing
    definitions:
    
      In file included from include/trace/trace_events.h:27,
                     from include/trace/define_trace.h:113,
                     from arch/x86/include/asm/trace/irq_vectors.h:383,
                     from arch/x86/kernel/irq.c:29:
      include/trace/stages/init.h:2:23: error: 'str__irq_vectors__trace_system_name' defined but not used [-Werror=unused-const-variable=]
    
    Make the tracepoints conditional on the same symbosl that guard
    their usage.
    
    Signed-off-by: Arnd Bergmann <arnd@arndb.de>
    Signed-off-by: Ingo Molnar <mingo@kernel.org>
    Link: https://lore.kernel.org/r/20250225213236.3141752-1-arnd@kernel.org
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes [+ + +]
Author: Florent Revest <revest@chromium.org>
Date:   Mon Mar 10 15:42:43 2025 +0100

    x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes
    
    commit e3e89178a9f4a80092578af3ff3c8478f9187d59 upstream.
    
    Currently, load_microcode_amd() iterates over all NUMA nodes, retrieves their
    CPU masks and unconditionally accesses per-CPU data for the first CPU of each
    mask.
    
    According to Documentation/admin-guide/mm/numaperf.rst:
    
      "Some memory may share the same node as a CPU, and others are provided as
      memory only nodes."
    
    Therefore, some node CPU masks may be empty and wouldn't have a "first CPU".
    
    On a machine with far memory (and therefore CPU-less NUMA nodes):
    - cpumask_of_node(nid) is 0
    - cpumask_first(0) is CONFIG_NR_CPUS
    - cpu_data(CONFIG_NR_CPUS) accesses the cpu_info per-CPU array at an
      index that is 1 out of bounds
    
    This does not have any security implications since flashing microcode is
    a privileged operation but I believe this has reliability implications by
    potentially corrupting memory while flashing a microcode update.
    
    When booting with CONFIG_UBSAN_BOUNDS=y on an AMD machine that flashes
    a microcode update. I get the following splat:
    
      UBSAN: array-index-out-of-bounds in arch/x86/kernel/cpu/microcode/amd.c:X:Y
      index 512 is out of range for type 'unsigned long[512]'
      [...]
      Call Trace:
       dump_stack
       __ubsan_handle_out_of_bounds
       load_microcode_amd
       request_microcode_amd
       reload_store
       kernfs_fop_write_iter
       vfs_write
       ksys_write
       do_syscall_64
       entry_SYSCALL_64_after_hwframe
    
    Change the loop to go over only NUMA nodes which have CPUs before determining
    whether the first CPU on the respective node needs microcode update.
    
      [ bp: Massage commit message, fix typo. ]
    
    Fixes: 7ff6edf4fef3 ("x86/microcode/AMD: Fix mixed steppings support")
    Signed-off-by: Florent Revest <revest@chromium.org>
    Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
    Cc: stable@vger.kernel.org
    Link: https://lore.kernel.org/r/20250310144243.861978-1-revest@chromium.org
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

 
Xen/swiotlb: mark xen_swiotlb_fixup() __init [+ + +]
Author: Jan Beulich <jbeulich@suse.com>
Date:   Wed Feb 12 16:14:38 2025 +0100

    Xen/swiotlb: mark xen_swiotlb_fixup() __init
    
    [ Upstream commit 75ad02318af2e4ae669e26a79f001bd5e1f97472 ]
    
    It's sole user (pci_xen_swiotlb_init()) is __init, too.
    
    Signed-off-by: Jan Beulich <jbeulich@suse.com>
    Reviewed-by: Stefano Stabellini <sstabellini@kernel.org>
    
    Message-ID: <e1198286-99ec-41c1-b5ad-e04e285836c9@suse.com>
    Signed-off-by: Juergen Gross <jgross@suse.com>
    Signed-off-by: Sasha Levin <sashal@kernel.org>

 
zram: fix NULL pointer in comp_algorithm_show() [+ + +]
Author: Liu Shixin <liushixin2@huawei.com>
Date:   Fri Nov 8 18:01:47 2024 +0800

    zram: fix NULL pointer in comp_algorithm_show()
    
    commit f364cdeb38938f9d03061682b8ff3779dd1730e5 upstream.
    
    LTP reported a NULL pointer dereference as followed:
    
     CPU: 7 UID: 0 PID: 5995 Comm: cat Kdump: loaded Not tainted 6.12.0-rc6+ #3
     Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015
     pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
     pc : __pi_strcmp+0x24/0x140
     lr : zcomp_available_show+0x60/0x100 [zram]
     sp : ffff800088b93b90
     x29: ffff800088b93b90 x28: 0000000000000001 x27: 0000000000400cc0
     x26: 0000000000000ffe x25: ffff80007b3e2388 x24: 0000000000000000
     x23: ffff80007b3e2390 x22: ffff0004041a9000 x21: ffff80007b3e2900
     x20: 0000000000000000 x19: 0000000000000000 x18: 0000000000000000
     x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
     x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
     x11: 0000000000000000 x10: ffff80007b3e2900 x9 : ffff80007b3cb280
     x8 : 0101010101010101 x7 : 0000000000000000 x6 : 0000000000000000
     x5 : 0000000000000040 x4 : 0000000000000000 x3 : 00656c722d6f7a6c
     x2 : 0000000000000000 x1 : ffff80007b3e2900 x0 : 0000000000000000
     Call trace:
      __pi_strcmp+0x24/0x140
      comp_algorithm_show+0x40/0x70 [zram]
      dev_attr_show+0x28/0x80
      sysfs_kf_seq_show+0x90/0x140
      kernfs_seq_show+0x34/0x48
      seq_read_iter+0x1d4/0x4e8
      kernfs_fop_read_iter+0x40/0x58
      new_sync_read+0x9c/0x168
      vfs_read+0x1a8/0x1f8
      ksys_read+0x74/0x108
      __arm64_sys_read+0x24/0x38
      invoke_syscall+0x50/0x120
      el0_svc_common.constprop.0+0xc8/0xf0
      do_el0_svc+0x24/0x38
      el0_svc+0x38/0x138
      el0t_64_sync_handler+0xc0/0xc8
      el0t_64_sync+0x188/0x190
    
    The zram->comp_algs[ZRAM_PRIMARY_COMP] can be NULL in zram_add() if
    comp_algorithm_set() has not been called.  User can access the zram device
    by sysfs after device_add_disk(), so there is a time window to trigger the
    NULL pointer dereference.  Move it ahead device_add_disk() to make sure
    when user can access the zram device, it is ready.  comp_algorithm_set()
    is protected by zram->init_lock in other places and no such problem.
    
    Link: https://lkml.kernel.org/r/20241108100147.3776123-1-liushixin2@huawei.com
    Fixes: 7ac07a26dea7 ("zram: preparation for multi-zcomp support")
    Signed-off-by: Liu Shixin <liushixin2@huawei.com>
    Reviewed-by: Sergey Senozhatsky <senozhatsky@chromium.org>
    Cc: Jens Axboe <axboe@kernel.dk>
    Cc: Minchan Kim <minchan@kernel.org>
    Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
    [This fix does not backport zram_comp_params_reset which was introduced after
     v6.6, in commit f2bac7ad187d ("zram: introduce zcomp_params structure")]
    Signed-off-by: Jianqi Ren <jianqi.ren.cn@windriver.com>
    Signed-off-by: He Zhe <zhe.he@windriver.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>