From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2B97A2820A9; Mon, 13 Apr 2026 16:15:05 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1776096906; cv=none; b=uNPFVMy9pybIBVUWf5QoQjcylp8hADaKKAyL1QtDVULSR3TvroDByV7J2odCPy3/jrce0M356vAvCwWIBb9SqowCHaCDEZuPePfaf1iAU6MTk/f5tZH0tUyFycMKNsqhAJtYv/G3Vj2wbsaJgBu1OH+RTxtPtNFiGa7TJknrBAE= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1776096906; c=relaxed/simple; bh=1p1WFVcVXjIL0iCXQ4rNU+KqLT3YyxKb/zJIpkN7aR0=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version:Content-Type; b=UwNbwEfgmzMSnS3LomFsrA2VCz8USxBowz5Ad4XnTz6Egmh2q/2puAum3AyOK+YJ+5zwNDfaMthoUVBE6G/k8Tu5mVr3h3clMoMG6fnSInrielVyPEhlfZZCKWvyIae9nVtCKxc+5EvwR3rFVVx21iTkluhb2X3RiXNPiFTQ8o0= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=Z6VbItXT; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="Z6VbItXT" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5263BC2BCAF; Mon, 13 Apr 2026 16:15:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1776096905; bh=1p1WFVcVXjIL0iCXQ4rNU+KqLT3YyxKb/zJIpkN7aR0=; h=From:To:Cc:Subject:Date:From; b=Z6VbItXT0ngGvIn1kCH6f48BN4biyX2cQ5vJ9kE1fwuSQXdmuWJVB3yu04zhCiM3e o4izaUtt/LQ7HqSPhYSfdsy3KzHajlVntqrKB8hWuqc2YvvARicAqf5AW32zeFNg4V B2Kv/dNImlPU4LY6KvhNkoNYCxBR5q69zxPBNGN0= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@nabladev.com, jonathanh@nvidia.com, f.fainelli@gmail.com, sudipm.mukherjee@gmail.com, rwarsow@gmx.de, conor@kernel.org, hargar@microsoft.com, broonie@kernel.org, achill@achill.org, sr@sladewatkins.com Subject: [PATCH 6.6 00/50] 6.6.135-rc1 review Date: Mon, 13 Apr 2026 18:00:27 +0200 Message-ID: <20260413155724.497323914@linuxfoundation.org> X-Mailer: git-send-email 2.53.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: quilt/0.69 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v6.x/stable-review/patch-6.6.135-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-6.6.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 6.6.135-rc1 X-KernelTest-Deadline: 2026-04-15T15:57+00:00 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This is the start of the stable review cycle for the 6.6.135 release. There are 50 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Wed, 15 Apr 2026 15:57:08 +0000. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v6.x/stable-review/patch-6.6.135-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-6.6.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 6.6.135-rc1 Manivannan Sadhasivam Revert "PCI: Enable ACS after configuring IOMMU for OF platforms" David Howells rxrpc: Fix missing error checks for rxkad encryption/decryption failure David Howells rxrpc: Fix key/keyring checks in setsockopt(RXRPC_SECURITY_KEY/KEYRING) Luxiao Xu rxrpc: fix reference count leak in rxrpc_server_keyring() Yuqi Xu rxrpc: reject undecryptable rxkad response tickets Douya Le rxrpc: Only put the call ref if one was acquired Anderson Nascimento rxrpc: Fix key reference count leak from call->key David Howells rxrpc: Fix call removal to use RCU safe deletion David Carlier net: lan966x: fix page_pool error handling in lan966x_fdma_rx_alloc_page_pool() Baolin Wang mm: filemap: fix nr_pages calculation overflow in filemap_map_pages() Tyllis Xu net: stmmac: fix integer underflow in chain mode Pengpeng Hou net: qualcomm: qca_uart: report the consumed byte on RX skb allocation failure Johan Hovold mmc: vub300: fix NULL-deref on disconnect Jacky Bai pmdomain: imx8mp-blk-ctrl: Keep the NOC_HDCP clock enabled Michael Guralnik net/mlx5: Update the list of the PCI supported devices Sebastian Brzezinka drm/i915/gt: fix refcount underflow in intel_engine_park_heartbeat Haoze Xie batman-adv: hold claim backbone gateways by reference David Carlier net: altera-tse: fix skb leak on DMA mapping error in tse_start_xmit() Muhammad Alifa Ramdhan net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption Borislav Petkov (AMD) EDAC/mc: Fix error path ordering in edac_mc_alloc() Lukas Wunner X.509: Fix out-of-bounds access when parsing extensions Ruide Cao batman-adv: reject oversized global TT response buffers Pengpeng Hou nfc: pn533: allocate rx skb before consuming bytes Shawn Guo arm64: dts: hisilicon: hi3798cv200: Add missing dma-ranges Shawn Guo arm64: dts: hisilicon: poplar: Correct PCIe reset GPIO polarity Sebastian Krzyszkowiak arm64: dts: imx8mq-librem5: Bump BUCK1 suspend voltage up to 0.85V Sebastian Krzyszkowiak Revert "arm64: dts: imx8mq-librem5: Set the DVS voltages lower" Thomas Fourier wifi: brcmsmac: Fix dma_free_coherent() size Oleh Konko tipc: fix bc_ackers underflow on duplicate GRP_ACK_MSG Yasuaki Torimaru xfrm: clear trailing padding in build_polexpire() Tuan Do netfilter: nft_ct: fix use-after-free in timeout object destroy Maarten Lankhorst Revert "drm: Fix use-after-free on framebuffers and property blobs when calling drm_dev_unplug" Florian Westphal netfilter: nft_set_pipapo: do not rely on ZERO_SIZE_PTR Andrea Mayer seg6: separate dst_cache for input and output paths in seg6 lwtunnel Matthieu Baerts (NGI0) Revert "mptcp: add needs_id for netlink appending addr" Michael Zimmermann usb: gadget: f_hid: move list and spinlock inits from bind to alloc Li Xiasong mptcp: fix soft lockup in mptcp_recvmsg() Srujana Challa virtio_net: clamp rss_max_key_size to NETDEV_RSS_KEY_LEN André Draszik scsi: ufs: core: Fix use-after free in init error and remove paths Kuninori Morimoto ASoC: simple-card-utils: Don't use __free(device_node) at graph_util_parse_dai() Maciej W. Rozycki MIPS: mm: Rewrite TLB uniquification for the hidden bit feature Maciej W. Rozycki MIPS: mm: Suppress TLB uniquification on EHINV hardware Maciej W. Rozycki MIPS: Always record SEGBITS in cpu_data.vmbits Dmitry Torokhov Input: uinput - take event lock when submitting FF request "event" Mikhail Gavrilov Input: uinput - fix circular locking dependency with ff-core Jiayuan Chen mptcp: fix slab-use-after-free in __inet_lookup_established Greg Kroah-Hartman net: rfkill: prevent unlimited numbers of rfkill events from being created Greg Kroah-Hartman xfrm_user: fix info leak in build_report() Johan Hovold wifi: rt2x00usb: fix devres lifetime Eric Biggers lib/crypto: chacha: Zeroize permuted_state before it leaves scope ------------- Diffstat: Makefile | 4 +- .../arm64/boot/dts/freescale/imx8mq-librem5-r3.dts | 2 +- arch/arm64/boot/dts/freescale/imx8mq-librem5.dtsi | 24 +- .../boot/dts/hisilicon/hi3798cv200-poplar.dts | 2 +- arch/arm64/boot/dts/hisilicon/hi3798cv200.dtsi | 1 + arch/mips/include/asm/cpu-features.h | 1 - arch/mips/include/asm/cpu-info.h | 2 - arch/mips/include/asm/mipsregs.h | 2 + arch/mips/kernel/cpu-probe.c | 13 +- arch/mips/kernel/cpu-r3k-probe.c | 2 + arch/mips/mm/tlb-r4k.c | 285 +++++++++++++++++---- crypto/asymmetric_keys/x509_cert_parser.c | 8 +- drivers/edac/edac_mc.c | 6 +- drivers/gpu/drm/drm_file.c | 5 +- drivers/gpu/drm/drm_mode_config.c | 9 +- drivers/gpu/drm/i915/gt/intel_engine_heartbeat.c | 26 +- drivers/input/misc/uinput.c | 35 ++- drivers/mmc/host/vub300.c | 2 +- drivers/net/ethernet/altera/altera_tse_main.c | 1 + drivers/net/ethernet/mellanox/mlx5/core/main.c | 1 + .../net/ethernet/microchip/lan966x/lan966x_fdma.c | 2 + drivers/net/ethernet/qualcomm/qca_uart.c | 2 +- drivers/net/ethernet/stmicro/stmmac/chain_mode.c | 11 +- drivers/net/virtio_net.c | 16 +- .../net/wireless/broadcom/brcm80211/brcmsmac/dma.c | 2 +- drivers/net/wireless/ralink/rt2x00/rt2x00usb.c | 2 +- drivers/nfc/pn533/uart.c | 11 +- drivers/pci/pci-driver.c | 8 - drivers/pci/pci.c | 10 +- drivers/pci/pci.h | 1 - drivers/pmdomain/imx/imx8mp-blk-ctrl.c | 8 +- drivers/ufs/core/ufshcd.c | 31 ++- drivers/ufs/host/ufshcd-pci.c | 2 - drivers/ufs/host/ufshcd-pltfrm.c | 25 +- drivers/usb/gadget/function/f_hid.c | 11 +- include/net/netfilter/nf_conntrack_timeout.h | 1 + include/trace/events/rxrpc.h | 2 +- include/ufs/ufshcd.h | 1 - lib/crypto/chacha.c | 4 + mm/filemap.c | 11 +- net/batman-adv/bridge_loop_avoidance.c | 27 +- net/batman-adv/translation-table.c | 9 +- net/ipv6/seg6_iptunnel.c | 41 ++- net/mptcp/pm_netlink.c | 24 +- net/mptcp/protocol.c | 13 +- net/mptcp/protocol.h | 1 + net/mptcp/subflow.c | 15 +- net/netfilter/nft_ct.c | 2 +- net/netfilter/nft_set_pipapo.c | 20 +- net/rfkill/core.c | 35 ++- net/rxrpc/af_rxrpc.c | 6 - net/rxrpc/call_object.c | 25 +- net/rxrpc/io_thread.c | 3 +- net/rxrpc/key.c | 2 +- net/rxrpc/rxkad.c | 63 +++-- net/rxrpc/server_key.c | 3 + net/tipc/group.c | 6 +- net/tls/tls_sw.c | 10 + net/xfrm/xfrm_user.c | 3 + sound/soc/generic/simple-card-utils.c | 7 +- 60 files changed, 599 insertions(+), 308 deletions(-)