<=21=5Bend=
if=5D--><=21--
--><=21-- padding-right/left is 10px instead of 16px because the images=
already have a lateral padding of 6px --><=21--=5Bif mso =7C IE=5D>
<=21=5Bendi=
f=5D--> <=21--
--><=21-- padding-right/left is 10px instead of 16px because the images=
already have a lateral padding of 6px --><=21--=5Bif mso =7C IE=5D>
<=
span class=3D=22footnote=22 style=3D=22font-family: Farfetch Basis,Helvetic=
a Neue,Arial,sans-serif; font-size: 14px; line-height: 1=2E285; color: =232=
22;=22>FARFETCH, The Bower, 211 Old Street London, EC1V 9NR
Please note this is our registered office and returns cannot be accepted he=
re=2E
UK company number 06400760 =7C =C2=A9 2026 FARFETCH
<=21--=5Bif mso =
=7C IE=5D><=21=5Bendif=5D--> <=21--
--><=21-- -->
------alt_border_FeFOYqacPP_1--
------msg_border_cLo6sd8KHK--
From - Mon Feb 02 11:36:51 2026
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path:
Delivered-To: hi@josie.lol
Received: from witcher.mxrouting.net
by witcher.mxrouting.net with LMTP
id gEd+ClGMgGkqMQQAYBR5ng
(envelope-from )
for ; Mon, 02 Feb 2026 11:36:49 +0000
Return-path:
Envelope-to: hi@josie.lol
Delivery-date: Mon, 02 Feb 2026 11:36:49 +0000
Received: from lists.archlinux.org ([95.217.236.249])
by witcher.mxrouting.net with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384
(Exim 4.98)
(envelope-from )
id 1vmsEa-00000001gk3-3O09
for hi@josie.lol;
Mon, 02 Feb 2026 11:36:49 +0000
Received: from [95.217.236.249] (localhost [IPv6:::1])
by lists.archlinux.org (Postfix) with ESMTP id E0BD462599C8;
Mon, 02 Feb 2026 11:36:43 +0000 (UTC)
Received: from outbound.pv.icloud.com
(p-west1-cluster2-host3-snip4-10.eps.apple.com [57.103.64.241])
by lists.archlinux.org (Postfix) with ESMTPS id 34AF86259988
for ; Mon, 02 Feb 2026 11:36:34 +0000 (UTC)
Authentication-Results: lists.archlinux.org;
dkim=pass header.d=keiminem.com header.s=sig1 header.b=T9q43VAE;
spf=pass (lists.archlinux.org: domain of me0kmin27@keiminem.com designates
57.103.64.241 as permitted sender) smtp.mailfrom=me0kmin27@keiminem.com;
dmarc=none
Received: from outbound.pv.icloud.com (unknown [127.0.0.2])
by p00-icloudmta-asmtp-us-west-1a-60-percent-0 (Postfix) with ESMTPS id
2B88E1800125;
Mon, 2 Feb 2026 11:36:30 +0000 (UTC)
Dkim-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=keiminem.com; s=sig1;
t=1770032192; x=1772624192; bh=m/d4pcMdSLLJzxZ+VejeCA8YrLOzjlLzpBBdAUDjr+8=;
h=From:Content-Type:Mime-Version:Subject:Message-Id:Date:To:x-icloud-hme;
b=T9q43VAEPyhOps/Akiq4ToBFAfJ/tHpaO6A/3xYN6mnZW38IYi8eE30yA8r9euw7oTn7dVnkjDwmZZlyyzP3p+XlbETW+a5YPfzp/K0VhSbt4lqQD5DKinn9sdIb3IJ2tPebQT8jfPABLHkPaT9Up6ig2oZydrsaJePamBdQW9htRfELwIXcLcevJ3Tjz99Uroyf/DMM7nvuu9f9q4iVIBKQZtSiyBhbQ2EItJA4QlFzqwLGnflDj3LTwQyKKF5YJRfF4zOj9N8r0j57EYIDBx4kjtJ8paGEAl2qyAB6kNntKGGNvtmMHfay7qvIkGNxYSGEQNpOGYwTiSbWuetknA==
mail-alias-created-date: 1706968207944
Received: from smtpclient.apple (unknown [17.56.9.36])
by p00-icloudmta-asmtp-us-west-1a-60-percent-0 (Postfix) with ESMTPSA id
EFAFF18000A5;
Mon, 2 Feb 2026 11:36:29 +0000 (UTC)
From: me0kmin27@keiminem.com
Content-Type: multipart/alternative;
boundary="Apple-Mail=_61FA035F-8A07-4317-B156-49F5B3EFAC26"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3864.300.41.1.7\))
Subject: =?utf-8?Q?Notice=3A_Scheduled_Server_Migration_for_mirror2=2Ekeim?=
=?utf-8?Q?inem=2Ecom_=28Service_Interruption_Feb_7=E2=80=9311=2C_2026=29?=
Message-Id: <559D8E29-B088-4B31-8B76-00929B60237B@keiminem.com>
Date: Mon, 2 Feb 2026 20:36:17 +0900
To: arch-mirrors@lists.archlinux.org,
devel@kali.org
X-Mailer: Apple Mail (2.3864.300.41.1.7)
X-Authority-Info-Out: v=2.4 cv=OMgqHCaB c=1 sm=1 tr=0 ts=69808c3f
cx=c_apl:c_apl_out:c_pps a=azHRBMxVc17uSn+fyuI/eg==:117
a=azHRBMxVc17uSn+fyuI/eg==:17 a=7lXjQGgpAAAA:8 a=HzLeVaNsDn8A:10
a=5KLPUuaC_9wA:10 a=sWKEhP36mHoA:10 a=VkNPw1HP01LnGYTKEx00:22
a=6yIvrPaHY6X74A-Q5cYA:9 a=CjuIK1q_8ugA:10 a=zZCYzV9kfG8A:10
a=kgzTpUHOoEKcIbRfdrEA:9 a=_W_S_7VecoQA:10 a=McvtP8tDxTSjM1prPDLW:22
X-Proofpoint-Spam-Details-Enc: AW1haW4tMjYwMjAyMDA5MSBTYWx0ZWRfX9a0uczbhlvRs
0datQGds00FM23VFCDC4PzjnFWRTCiYq2oE9koZkDEXfDBNx/HUcUQyb9uUoG6Y5haYAydGoq4p
1AmvDt9OcEf5iIqG1mzkpxHkSYib+W2D7QwIT1c3tM9wSuofU0F764BPRKhqHpCx6AM4B2dgSO7
kUAj6pwExc07cCrqDKVIrDUbB92XOgX5PVla5Q10dRMMKurBOksbK7USlAYZiFGFpxwjLpwYhAX
UiQJ4IBGU+RReiqwP4f/MPhkaFm3digQ7TB3fS/11kFWq4l4NRm2QVd/4JqCsgexygDaG8B+kfr
cjinvUOO68d7kOeEmtJXZEA9WFje7xssVqrrawI8E68KPpgQSNgUWZr7q8d4iw=
X-Proofpoint-GUID: Q2zUr9p8WK7-_p0G8tdq2N8iuY5yyb3Q
X-Proofpoint-ORIG-GUID: Q2zUr9p8WK7-_p0G8tdq2N8iuY5yyb3Q
X-Proofpoint-Virus-Version: vendor=baseguard
engine=ICAP:2.0.293,Aquarius:18.0.1121,Hydra:6.1.5nsubscribe=One-Click
Content-Type: multipart/alternative; boundary="_----------=_MCPart_409666979"
MIME-Version: 1.0
X-DKIM: signer='zuercher-museen.ch' status='pass' reason=''
DKIMCheck: Server passes DKIM test, 0 Spam score
X-DKIM: signer='info@zuercher-museen.ch' status='pass' reason=''
X-Spam-Score: 3.9 (+++)
X-Spam-Report: Spam detection software, running on the system "witcher.mxrouting.net", has
performed the tests listed below against this email.
Information: https://mxroutedocs.com/directadmin/spamfilters/
---
Content analysis details: (3.9 points)
---
pts rule name description
---- ---------------------- -----------------------------------------
0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was
blocked. See
http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
for more information.
[URIs: mcusercontent.com]
0.0 RCVD_IN_DNSWL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to
DNSWL was blocked. See
http://wiki.apache.org/spamassassin/DnsBlocklists#DnsBlocklists-dnsbl-block
for more information.
[148.105.11.152 listed in list.dnswl.org]
1.5 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level
mail domains are different
1.0 HTML_FONT_LOW_CONTRAST BODY: HTML font color similar or
identical to background
1.5 HTML_MESSAGE BODY: HTML included in message
0.0 MIME_QP_LONG_LINE RAW: Quoted-printable line longer than 76
chars
0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
valid
-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
author's domain
-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
0.0 T_KAM_HTML_FONT_INVALID Test for Invalidly Named or Formatted
Colors in HTML
SpamTally: Final spam score: 39
This is a multi-part message in MIME format
--_----------=_MCPart_409666979
Content-Type: text/plain; charset="utf-8"; format="fixed"
Content-Transfer-Encoding: quoted-printable
N (https://mailchi.mp/b734ff54ac40/aktuelles-und-angesagtes-aus-den-museen=
-10991016?e=3De3f2120410) ewsletter in Browser =C3=B6ffnen (https://mailchi.=
mp/b734ff54ac40/aktuelles-und-angesagtes-aus-den-museen-10991016?e=3De3f2120410)
**
Newsletter
02 / 2026
------------------------------------------------------------
Liebe Leserinnen und Leser
Der Februar ist eine Zeit des =C3=9Cbergangs: Die Tage werden sp=C3=BCrbar=
l=C3=A4nger=2C und mit dem zunehmenden Licht w=C3=A4chst auch die Lust au=
f neue Perspektiven. Die nachfolgenden Museums-Highlights er=C3=B6ffnen ne=
ue Zug=C3=A4nge und laden zum Erkunden ein.
** Aktuell im Museum
------------------------------------------------------------
** Kaarel Kurismaa: Intermezzo
------------------------------------------------------------
**
------------------------------------------------------------
** 07.02.=E2=80=9325.05.2026=2C Kunsthalle Z=C3=BCrich
------------------------------------------------------------
Die erste institutionelle Einzelausstellung von Kaarel Kurismaa (*1939=2C=
P=C3=A4rnu=2C Estland) ausserhalb seiner Heimat. Kurismaa ist ein multidi=
sziplin=C3=A4rer K=C3=BCnstler=2C der in den Bereichen kinetische Kunst=2C=
Klangkunst=2C Skulptur=2C Malerei und Design arbeitet. Erstmals werden se=
ine ikonischen kinetischen Klangskulpturen=2C die er in den sp=C3=A4ten 19=
90er- und fr=C3=BChen 2000er-Jahren entwickelte=2C in Z=C3=BCrich pr=C3=A4=
sentiert.
=E2=9E=94 (https://zuercher-museen.ch/museen/kunsthalle-zuerich/kaarel-ku=
rismaa-intermezzo) Mehr Informationen (https://zuercher-museen.ch/museen/k=
unsthalle-zuerich/kaarel-kurismaa-intermezzo)
Bild: Kaarel Kurismaa=2C Racing the Waves=2C 2001=2C Videostill=2C Courtes=
y der K=C3=BCnstler und Tartu Art Museum
** More than Human =E2=80=93 Design mit der Natur
------------------------------------------------------------
**
------------------------------------------------------------
** Bis So=2C 31.05.2026=2C Museum f=C3=BCr Gestaltung Z=C3=BCrich=2C Ausst=
ellungsstrasse
------------------------------------------------------------
Angesichts von Klimakrise und globalem Artenr=C3=BCckgang fragt die Ausste=
llung=2C wie Gestaltung =C3=BCber menschliche Bed=C3=BCrfnisse hinausdenke=
n kann. Gezeigt werden innovative Projekte aus Design=2C Architektur=2C Ku=
nst und Technologie. Sie erkunden neue Formen einer nachhaltigen Koexisten=
z von Mensch und Umwelt.
=E2=9E=94 (https://zuercher-museen.ch/museen/museum-fuer-gestaltung-zueri=
ch-ausstellungsstrasse/more-than-human-design-mit-der-natur) Mehr Informat=
ionen (https://zuercher-museen.ch/museen/museum-fuer-gestaltung-zuerich-au=
sstellungsstrasse/more-than-human-design-mit-der-natur)
Bild: Alexandra Daisy Ginsberg=2C Pollinator Pathmaker in Human Vision=2C=
2023 =C2=A9 Alexandra Daisy Ginsberg Ltd
** Tipp
------------------------------------------------------------
** F=C3=BChrung =C2=ABVon der Wirtschaftsgeschichte bis zu Innovationen=C2=
=BB
------------------------------------------------------------
**
------------------------------------------------------------
** Do=2C 05.02.2026=2C 18=E2=80=9319 Uhr=2C Schweizer Finanzmuseum
------------------------------------------------------------
Jeden ersten Donnerstag im Monat findet eine =C3=B6ffentliche F=C3=BChrung=
durch das Schweizer Finanzmuseum statt. Der Rundgang bietet einen kompakt=
en Einblick in die Dauer- und die jeweils aktuelle Sonderausstellung =E2=
=80=93 =C2=ABkunst.macht.geld=C2=BB (https://zuercher-museen.ch/museen/sch=
weizer-finanzmuseum/kunst-macht-geld) =E2=80=93 und spannt den Bogen von d=
er Wirtschaftsgeschichte bis zu Innovationen der Finanzwelt. Der Museumsei=
ntritt berechtigt zur Teilnahme=2C eine Voranmeldung ist nicht erforderlic=
h.
=E2=9E=94 (https://zuercher-museen.ch/museen/schweizer-finanzmuseum/oeffe=
ntliche-fuehrung-05-02-2026) Weiterlesen (https://zuercher-museen.ch/musee=
n/schweizer-finanzmuseum/oeffentliche-fuehrung-05-02-2026)
Foto: Corinne Sch=C3=A4dler
** Eine Frage an ...
------------------------------------------------------------
=2E.. Prof. Dr. Corinna Reinhardt=2C Direktorin Arch=C3=A4ologischen Sammlun=
g UZH
Wie ver=C3=A4ndern digitale Werkzeuge unseren Blick auf die Antike =E2=80=
=93 und wo sehen Sie darin Chancen=2C Geschichte neu zu erz=C3=A4hlen oder=
sogar =C2=ABerlebbar=C2=BB zu machen?
In der Arch=C3=A4ologie dienen Rekonstruktionen seit jeher dazu=2C Erkennt=
nisse einem heterogenen Publikum visuell zug=C3=A4nglich zu machen. Digita=
le Technologien f=C3=BChren dieses Anliegen zeitgem=C3=A4ss fort und er=C3=
=B6ffnen neue Wege=2C die fragmentierte Antike anschaulich zu entdecken. I=
hre besondere St=C3=A4rke liegt in der Interaktivit=C3=A4t: Digitale Werkz=
euge erm=C3=B6glichen einen eigenst=C3=A4ndigen Zugang zum antiken Erbe=2C=
der unsere Vorstellungskraft kreativ anregt und neue Impulse f=C3=BCr die=
Forschung liefern kann. Wenn wir digitale Modelle von Museumsobjekten dre=
hen oder in ihr Inneres blicken=2C kann jede*r selbstst=C3=A4ndig neue Asp=
ekte entdecken. Wenn wir uns per Virtual Reality in die historische Umgebu=
ng versetzen=2C erleben wir die historische Tiefendimension dieses Ortes.=
Dabei schl=C3=BCpfen wir gewissermassen in die Rolle der damaligen Mensch=
en und k=C3=B6nnen uns ihr Umfeld=2C ihre Lebensbedingungen und Handlungen=
besser vorstellen. Die verminderte Distanz birgt jedoch auch Herausforder=
ungen f=C3=BCr die Erforschung der Antike.
** Angesagt
------------------------------------------------------------
** Angebote f=C3=BCr Menschen mit H=C3=B6rbehinderung
------------------------------------------------------------
**
------------------------------------------------------------
Geb=C3=A4rdensprachliche F=C3=BChrungen=2C visuell aufbereitete Rundg=C3=
=A4nge und digitale Zusatzinformationen: Die Z=C3=BCrcher Museen bauen ihr=
e inklusiven Angebote kontinuierlich aus. Die =C3=9Cbersicht versammelt ak=
tuelle inklusive Angebote aus Z=C3=BCrcher Museen.
=E2=9E=94 (https://zuercher-museen.ch/blog/angebote-fuer-menschen-mit-hoe=
rbehinderung) Weiterlesen (https://zuercher-museen.ch/blog/angebote-fuer-m=
enschen-mit-hoerbehinderung)
** Trouvaille
------------------------------------------------------------
https://vimeo.com/1160199732
Lieblingsecken und besondere Objekte im Museum =E2=80=93 heute von Eveline=
Weissen=2C Anthropologin am Naturhistorischen Museum der Universit=C3=A4t=
Z=C3=BCrich.
**
------------------------------------------------------------
** Interessiert am vollen Programm? (https://zuercher-museen.ch/agenda)
------------------------------------------------------------
** =E2=9E=94 Hier geht=E2=80=99s zur Agenda der Z=C3=BCrcher Museen (http=
s://zuercher-museen.ch/agenda)
------------------------------------------------------------
https://www.zkb.ch/
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
** Instagram (https://www.instagram.com/zuerchermuseen/)
** Facebook (https://www.facebook.com/zuerchermuseen)
** Website (https://zuercher-museen.ch)
Copyright =C2=A9 2026 Verein Z=C3=BCrcher Museen=2C alle Rechte vorbehalte=
n. Sie erhalten diese E-Mail=2C weil Sie sich f=C3=BCr unseren Newsletter=
registriert haben oder auf unserer Kundenliste eingetragen sind.
Unsere Anschrift:
Verein Z=C3=BCrcher Museen
Mainaustrasse 15
Z=C3=BCrich 8008
Switzerland
Sie k=C3=B6nnen hier die ** Newsletter-Einstellungen anpassen (https://zue=
rcher-museen.us1.list-manage.com/profile?u=3D8592f016d59ce674e0e5b9454&id=
=3D7d469b2508&e=3De3f2120410&c=3D3d4fe5e2ac)
oder den ** Newsletter abbestellen (https://zuercher-museen.us1.list-manag=
e.com/unsubscribe?u=3D8592f016d59ce674e0e5b9454&id=3D7d469b2508&t=3Db&e=3D=
e3f2120410&c=3D3d4fe5e2ac)
=2E
Email Marketing Powered by Mailchimp
https://login.mailchimp.com/signup/email-referral/?aid=3D8592f016d59ce674e=
0e5b9454
--_----------=_MCPart_409666979
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Der Februar in den Z=C3=BCrcher MuseenNeue=
Perspektiven und ausgew=C3=A4hlte Highlights
Der Februar ist eine Zeit des =C3=9Cbergangs: Die Tage werden sp=C3=BCrbar=
l=C3=A4nger=2C und mit dem zunehmenden Licht w=C3=A4chst auch die Lust au=
f neue Perspektiven. Die nachfolgenden Museums-Highlights er=C3=B6ffnen ne=
ue Zug=C3=A4nge und laden zum Erkunden ein.
Die e=
rste institutionelle Einzelausstellung von Kaarel Kurismaa (*1939=2C P=C3=
=A4rnu=2C Estland) ausserhalb seiner Heimat. Kurismaa ist ein multidiszipl=
in=C3=A4rer K=C3=BCnstler=2C der in den Bereichen kinetische Kunst=2C Klan=
gkunst=2C Skulptur=2C Malerei und Design arbeitet. Erstmals werden seine i=
konischen kinetischen Klangskulpturen=2C die er in den sp=C3=A4ten 1990er-=
und fr=C3=BChen 2000er-Jahren entwickelte=2C in Z=C3=BCrich pr=C3=A4senti=
ert.
Bild: Kaarel Kurismaa=2C Racing the Wa=
ves=2C 2001=2C Videostill=2C Courtesy der K=C3=BCnstler und Tartu Art Muse=
um
=09=09=09=09
=09=09=09=09
=09
=09=09=09
=09=09=09=09
More than Human =E2=80=93 Design mit der Natur
<=
/h4>
Bis So=2C 31.05.2026=2C Museum f=C3=BCr Gestaltung Z=C3=BCrich=2C Ausstel=
lungsstrasse
Anges=
ichts von Klimakrise und globalem Artenr=C3=BCckgang fragt die Ausstellung=
=2C wie Gestaltung =C3=BCber menschliche Bed=C3=BCrfnisse hinausdenken kan=
n. Gezeigt werden innovative Projekte aus Design=2C Architektur=2C Kunst u=
nd Technologie. Sie erkunden neue Formen einer nachhaltigen Koexistenz von=
Mensch und Umwelt.
Bild: Alexandra Daisy Ginsberg=2C Poll=
inator Pathmaker in Human Vision=2C 2023 =C2=A9 Alexandra Daisy Ginsberg L=
td
=09=09=09=09
=09=09=09=09
=09
=09=09=09=09
Tip=
p
=09=09=09=09
=09=09=09=09
=09
=09=09=09
=09=09=09=09
F=C3=BChrung =C2=ABVon der Wirtschaftsgeschichte bis=
zu Innovationen=C2=BB
<=
/h4>
Do=2C 05.02.2026=2C 18=E2=80=9319 Uhr=2C Schweizer Finanzmuseum
Jeden=
ersten Donnerstag im Monat findet eine =C3=B6ffentliche F=C3=BChrung durc=
h das Schweizer Finanzmuseum statt. Der Rundgang bietet einen kompakt=
en Einblick in die Dauer- und die jeweils aktuelle Sonderausstellung =E2=
=80=93 =C2=ABkunst.macht.geld=C2=BB=
=E2=80=93 und spannt den Bogen von der Wirtschaftsgeschichte bis zu I=
nnovationen der Finanzwelt. Der Museumseintritt berechtigt zur Teilnahme=
=2C eine Voranmeldung ist nicht erforderlich.
... Prof. Dr. Corinna Reinhardt=2C Direktorin Arch=C3=A4olo=
gischen Sammlung UZH
Wie ver=C3=A4ndern digitale Werkzeuge unseren Blick auf die Antike=
=E2=80=93 und wo sehen Sie darin Chancen=2C Geschichte neu zu erz=C3=A4hl=
en oder sogar =C2=ABerlebbar=C2=BB zu machen?
In de=
r Arch=C3=A4ologie dienen Rekonstruktionen seit jeher dazu=2C Erkenntnisse=
einem heterogenen Publikum visuell zug=C3=A4nglich zu machen. Digitale Te=
chnologien f=C3=BChren dieses Anliegen zeitgem=C3=A4ss fort und er=C3=B6ff=
nen neue Wege=2C die fragmentierte Antike anschaulich zu entdecken. Ihre b=
esondere St=C3=A4rke liegt in der Interaktivit=C3=A4t: Digitale Werkzeuge=
erm=C3=B6glichen einen eigenst=C3=A4ndigen Zugang zum antiken Erbe=2C der=
unsere Vorstellungskraft kreativ anregt und neue Impulse f=C3=BCr die For=
schung liefern kann. Wenn wir digitale Modelle von Museumsobjekten drehen=
oder in ihr Inneres blicken=2C kann jede*r selbstst=C3=A4ndig neue A=
spekte entdecken. Wenn wir uns per Virtual Reality in die historische Umge=
bung versetzen=2C erleben wir die historische Tiefendimension dieses Ortes=
=2E Dabei schl=C3=BCpfen wir gewissermassen in die Rolle der damaligen Mensc=
hen und k=C3=B6nnen uns ihr Umfeld=2C ihre Lebensbedingungen und Handlunge=
n besser vorstellen. Die verminderte Distanz birgt jedoch auch Herausforde=
rungen f=C3=BCr die Erforschung der Antike.
=09
=09=09=09=09
Ang=
esagt
=09=09=09=09
=09=09=09=09
=09
=09=09=09
=09=09=09=09
Angebote f=C3=BCr Menschen mit H=C3=B6rbehinderung
<=
/h4>
Geb=
=C3=A4rdensprachliche F=C3=BChrungen=2C visuell aufbereitete Rundg=C3=A4ng=
e und digitale Zusatzinformationen: Die Z=C3=BCrcher Museen bauen ihr=
e inklusiven Angebote kontinuierlich aus. Die =C3=9Cbersicht versammelt ak=
tuelle inklusive Angebote aus Z=C3=BCrcher Museen.
Lieblingsecken und besondere=
Objekte im Museum =E2=80=93 heute von Eveline Weissen=2C Anthropolog=
in am Naturhistorischen Museum der Universit=C3=A4t Z=C3=BCrich.
Copyright =C2=
=A9 2026 Verein Z=C3=BCrcher Museen=2C alle Rechte vorbehalten. Sie e=
rhalten diese E-Mail=2C weil Sie sich f=C3=BCr unseren Newsletter registri=
ert haben oder auf unserer Kundenliste eingetragen sind.
--_----------=_MCPart_409666979--
From - Wed Feb 04 11:01:04 2026
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path:
Delivered-To: hi@josie.lol
Received: from witcher.mxrouting.net
by witcher.mxrouting.net with LMTP
id wJWoGu8mg2nWljgAYBR5ng
(envelope-from )
for ; Wed, 04 Feb 2026 11:01:03 +0000
Return-path:
Envelope-to: hi@josie.lol
Delivery-date: Wed, 04 Feb 2026 11:01:03 +0000
Received: from o9.mailer.shopify.com ([149.72.238.129])
by witcher.mxrouting.net with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384
(Exim 4.98)
(envelope-from )
id 1vnad3-0000000GmFg-0weI
for hi@josie.lol;
Wed, 04 Feb 2026 11:01:03 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hak5.org;
h=content-type:date:from:mime-version:subject:to:cc:content-type:date:
from:subject:to;
s=uq4; bh=d7ScxZY8lzLpKS0mQa+M5p1b5I2lM3M12SrhekBX86Y=;
b=Odtapso9hWsvNjN1uNmpwkwj8R7gLOU9kJy2LhSVK+LmBu1R0H6mayQpwmmkD0zrBLrd
3sVpdd7j5dFbNT4JcDCo9nXheIc6UVzu9FGiyaoXYeA/EIyzH3Wa2TEH8iDJEGb5gEcghT
WCLOK1y7m0LyRzCSAFxWCKqq2zMtusf+jwEyqVGNoKrOk5nu9AFMYC4g0B9CddBQK9crJl
/Zlwbmbwg/GjT9IdK9DgHSSkukIRjORK+vM9rmc0oGD8Wvj4A9UwsfA1czVZCSUyrW2cdD
XLLCuhPDJtS7HqiYte1x0XLECNxTiIspLOFo2J5gLfTiUqJX7UQPQS2Qr+bevNKA==
Received: by recvd-f4c7d868-m86sg with SMTP id recvd-f4c7d868-m86sg-1-698326EC-101
2026-02-04 11:01:00.684929175 +0000 UTC m=+4193219.307685189
Received: from MTE0MjcyODA (unknown)
by geopod-ismtpd-36 (SG) with HTTP
id hclzE4N8SXe_6maY7YN_jQ
Wed, 04 Feb 2026 11:01:00.675 +0000 (UTC)
Content-Type: multipart/alternative; boundary=4170a7151b6f434041cbcc55524d73dc9e656916c9a3b4f33767edcb2f9e
Date: Wed, 04 Feb 2026 11:01:00 +0000 (UTC)
From: Hak5
Mime-Version: 1.0
Message-ID:
Subject: Order #412409 confirmed
Feedback-Id: s_682142:shopify
X-SG-EID:
=?us-ascii?Q?u001=2E+CT7ro9TZp8Xhp=2Fa7Gh68KcJLoQb5EjIg7rel2Ty2esnMMT78JXaa9Tvr?=
=?us-ascii?Q?ePc=2F376Tiv=2F07mq=2Fn6kGwZkHOvocI2l12KGcXst?=
=?us-ascii?Q?7+GOvx9lrdZ=2FYMfeSWMq4GJiPneXhbIX7r8Hvu0?=
=?us-ascii?Q?Y2XAWu5BbrZtZBpH1UCfyDHCQAkh7qY80dnlAGF?=
=?us-ascii?Q?uHXvyDo=2F60FEsVm0Ra54dchzs2fTcn9X06Om0Na?=
=?us-ascii?Q?A=3D=3D?=
X-SG-ID:
=?us-ascii?Q?u001=2ESdBcvi+Evd=2FbQef8eZF3BpTL9BgbK5wfSJMJGMsmprDITwp3LLcgXu9gv?=
=?us-ascii?Q?F1Oq5oTf1VY9MM=2F=2FZCviT=2FP37sq39QcxNzdQvwk?=
=?us-ascii?Q?O6iVrTtPhtXmpKEt1xkwwbYB1LAG04ZTLQ=2FwDGz?=
=?us-ascii?Q?G6yiyXB=2FwnMrNyC3g0+K1QE+Aos25L7ZOZEm3x3?=
=?us-ascii?Q?WNYTKLwn=2FKSw+SawdBshCLZ0XVwloP=2FvxTAqUbL?=
=?us-ascii?Q?lGp4pkC6ANoRnTfz3PiYDZ0HzOLxwvGKuE6b6lu?=
=?us-ascii?Q?9bXZmEMvQUu8vsXKTtqOgKsYlPT2kOZ1sCqezQT?=
=?us-ascii?Q?=2F00K0fgBk1lk7KaSN9dWddqBs5FwyyyY4v=2Fxj1G?=
=?us-ascii?Q?Qy40G5uoiXap28De2f1bCIPlB+p77P06910yGH4?=
=?us-ascii?Q?X=2FGqbpCuoxeYLJVr3GqtRahH3PVWoZpgS3yxjqm?=
=?us-ascii?Q?Yhgjh+GczWU+7FD3HAD45Q98V9KXN+HYL8E3Fil?=
=?us-ascii?Q?TPfwHLmERzDQKvGVo2fnOWcErSNTXdh1dgVocgr?=
=?us-ascii?Q?G=2FQkedqbkk=2F46vz2lQJhkt5gXxx5PB=2F8huZb95e?=
=?us-ascii?Q?Xn37dIUHGS54UYIlE4qQRjVimMhB1P7=2FbWoBNEE?=
=?us-ascii?Q?iP3a=2FzIuFNLepJuw1Kr1=2F2S=2FVn5q4fxjAaI8pHJ?=
=?u RtOoHBnbl0raQeizpBr82GJANyr8Fnz1R8tEZcls=
From: Greg Kroah-Hartman
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman ,
patches@lists.linux.dev,
gongqi <550230171hxy@gmail.com>,
Dmitry Torokhov
Subject: [PATCH 5.15 085/206] Input: i8042 - add quirks for MECHREVO Wujie 15X Pro
Date: Wed, 4 Feb 2026 15:38:36 +0100
Message-ID: <20260204143901.272224160@linuxfoundation.org>
X-Mailer: git-send-email 2.53.0
In-Reply-To: <20260204143858.193781818@linuxfoundation.org>
References: <20260204143858.193781818@linuxfoundation.org>
User-Agent: quilt/0.69
X-stable: review
X-Patchwork-Hint: ignore
Precedence: bulk
X-Mailing-List: stable@vger.kernel.org
List-Id:
List-Subscribe:
List-Unsubscribe:
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-DKIM: signer='linuxfoundation.org' status='pass' reason=''
DKIMCheck: Server passes DKIM test, 0 Spam score
X-Spam-Score: 0.4 (/)
X-Spam-Report: Spam detection software, running on the system "witcher.mxrouting.net", has
performed the tests listed below against this email.
Information: https://mxroutedocs.com/directadmin/spamfilters/
---
Content analysis details: (0.4 points)
---
pts rule name description
---- ---------------------- -----------------------------------------
0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was
blocked. See
http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
for more information.
[URIs: linuxfoundation.org]
0.0 RCVD_IN_DNSWL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to
DNSWL was blocked. See
http://wiki.apache.org/spamassassin/DnsBlocklists#DnsBlocklists-dnsbl-block
for more information.
[104.64.211.4 listed in list.dnswl.org]
1.5 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level
mail domains are different
0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
valid
-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
author's domain
-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
-1.0 MAILING_LIST_MULTI Multiple indicators imply a widely-seen list
manager
-0.0 DKIMWL_WL_HIGH DKIMwl.org - High trust sender
SpamTally: Final spam score: 4
5.15-stable review patch. If anyone has any objections, please let me know.
------------------
From: gongqi <550230171hxy@gmail.com>
commit 19a5d9ba6208e9006a2a9d5962aea4d6e427d8ab upstream.
The MECHREVO Wujie 15X Pro requires several i8042 quirks to function
correctly. Specifically, NOMUX, RESET_ALWAYS, NOLOOP, and NOPNP are
needed to ensure the keyboard and touchpad work reliably.
Signed-off-by: gongqi <550230171hxy@gmail.com>
Link: https://patch.msgid.link/20260122155501.376199-3-550230171hxy@gmail.com
Cc: stable@vger.kernel.org
Signed-off-by: Dmitry Torokhov
Signed-off-by: Greg Kroah-Hartman
---
drivers/input/serio/i8042-acpipnpio.h | 7 +++++++
1 file changed, 7 insertions(+)
--- a/drivers/input/serio/i8042-acpipnpio.h
+++ b/drivers/input/serio/i8042-acpipnpio.h
@@ -1168,6 +1168,13 @@ static const struct dmi_system_id i8042_
.driver_data = (void *)(SERIO_QUIRK_NOMUX | SERIO_QUIRK_RESET_ALWAYS |
SERIO_QUIRK_NOLOOP | SERIO_QUIRK_NOPNP)
},
+ {
+ .matches = {
+ DMI_MATCH(DMI_BOARD_NAME, "WUJIE Series-X5SP4NAG"),
+ },
+ .driver_data = (void *)(SERIO_QUIRK_NOMUX | SERIO_QUIRK_RESET_ALWAYS |
+ SERIO_QUIRK_NOLOOP | SERIO_QUIRK_NOPNP)
+ },
/*
* A lot of modern Clevo barebones have touchpad and/or keyboard issues
* after suspend fixable with nomux + reset + noloop + nopnp. Luckily,
From - Wed Feb 04 15:06:18 2026
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path:
Delivered-To: hi@josie.lol
Received: from witcher.mxrouting.net
by witcher.mxrouting.net with LMTP
id EC6COmVgg2nAExgAYBR5ng
(envelope-from )
for ; Wed, 04 Feb 2026 15:06:13 +0000
Return-path:
Envelope-to: hi@josie.lol
Delivery-date: Wed, 04 Feb 2026 15:06:14 +0000
Received: from sin.lore.kernel.org ([104.64.211.4])
by witcher.mxrouting.net with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384
(Exim 4.98)
(envelope-from )
id 1vneSL-00000006mXX-1Wur
for hi@josie.lol;
Wed, 04 Feb 2026 15:06:13 +0000
Received: from smtp.subspace.kernel.org (conduit.subspace.kernel.org [100.90.174.1])
by sin.lore.kernel.org (Postfix) with ESMTP id D8B90306497E
for ; Wed, 4 Feb 2026 14:57:50 +0000 (UTC)
Received: from localhost.localdomain (localhost.localdomain [127.0.0.1])
by smtp.subspace.kernel.org (Postfix) with ESMTP id 938A24219F9;
Wed, 4 Feb 2026 14:56:14 +0000 (UTC)
Authentication-Results: smtp.subspace.kernel.org;
dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="L5uKBMsP"
X-Original-To: stable@vger.kernel.org
Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by smtp.subspace.kernel.org (Postfix) with ESMTPS id 71710280CD2;
Wed, 4 Feb 2026 14:56:14 +0000 (UTC)
Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201
ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;
t=1770216974; cv=none; b=ctl14FM3LNbx8oUetSCExBSEML19B8S5xQQxiKjOn3O8GqtefCBH4wKKKDt4a29VPKhs7gKJIBmcmmk/lylro6jNNRfCszyZg0gJUgXxtCJWqw/S9JCSZ0ZXDJsm/GwuLsjnXG3JDendn1o1TblS13hFym3gV6TZ5IVUuNMxffo=
ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org;
s=arc-20240116; t=1770216974; c=relaxed/simple;
bh=/B6saTJQgcqTAyx6KNLmsK5leikSOtH4QpIQFD21FSY=;
h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:
MIME-Version; b=L8ea+U0/BA/YBN/vqOE/Pdw8JR4pGsQY/6pv6xdgfhAAaILY0QMXz9zJCaUZDutNdTSSZh+Isnb3aezGMRSuWeqllTB+/ntXzPim8+RYxcHWG40XkCDDnJsOwNr3+D1Vr10CFb98cfFD56TsoH1r1Vo760lgNlaS7odPNIJP9YY=
ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=L5uKBMsP; arc=none smtp.client-ip=10.30.226.201
Received: by smtp.kernel.org (Postfix) with ESMTPSA id BDED1C4CEF7;
Wed, 4 Feb 2026 14:56:13 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org;
s=korg; t=1770216974;
bh=/B6saTJQgcqTAyx6KNLmsK5leikSOtH4QpIQFD21FSY=;
h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
b=L5uKBMsPTxomkljhT8RPymOgXgNUqllRfJptccqetpppJ0UfCMrXfYT/3RXsGyuJv
HULaRFa7iGw2uFqlgDmsMHkOjRhM4cFVndcY68eROx75huXEK4TFMV1VpEomJMGiiw
/TCm9W6ZJGIIUN5OnT/gfKNTJ4ur4uI9Pxfpf//A=
From: Greg Kroah-Hartman
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman ,
patches@lists.linux.dev,
feng ,
Dmitry Torokhov
Subject: [PATCH 5.15 086/206] Input: i8042 - add quirk for ASUS Zenbook UX425QA_UM425QA
Date: Wed, 4 Feb 2026 15:38:37 +0100
Message-ID: <20260204143901.308493557@linuxfoundation.org>
X-Mailer: git-send-email 2.53.0
In-Reply-To: <20260204143858.193781818@linuxfoundation.org>
References: <20260204143858.193781818@linuxfoundation.org>
User-Agent: quilt/0.69
X-stable: review
X-Patchwork-Hint: ignore
Precedence: bulk
X-Mailing-List: stable@vger.kernel.org
List-Id:
List-Subscribe:
List-Unsubscribe:
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-DKIM: signer='linuxfoundation.org' status='pass' reason=''
DKIMCheck: Server passes DKIM test, 0 Spam score
X-Spam-Score: 0.4 (/)
X-Spam-Report: Spam detection software, running on the system "witcher.mxrouting.net", has
performed the tests listed below against this email.
Information: https://mxroutedocs.com/directadmin/spamfilters/
---
Content analysis details: (0.4 points)
---
pts rule name description
---- ---------------------- -----------------------------------------
0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was
blocked. See
http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
for more information.
[URIs: msgid.link]
0.0 RCVD_IN_DNSWL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to
DNSWL was blocked. See
http://wiki.apache.org/spamassassin/DnsBlocklists#DnsBlocklists-dnsbl-block
for more information.
[104.64.211.4 listed in list.dnswl.org]
1.5 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level
mail domains are different
0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
valid
-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
author's domain
-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
-1.0 MAILING_LIST_MULTI Multiple indicators imply a widely-seen list
manager
-0.0 DKIMWL_WL_HIGH DKIMwl.org - High trust sender
SpamTally: Final spam score: 4
5.15-stable review patch. If anyone has any objections, please let me know.
------------------
From: feng
commit 2934325f56150ad8dab8ab92cbe2997242831396 upstream.
The ASUS Zenbook UX425QA_UM425QA fails to initialize the keyboard after
a cold boot.
A quirk already exists for "ZenBook UX425", but some Zenbooks report
"Zenbook" with a lowercase 'b'. Since DMI matching is case-sensitive,
the existing quirk is not applied to these "extra special" Zenbooks.
Testing confirms that this model needs the same quirks as the ZenBook
UX425 variants.
Signed-off-by: feng
Link: https://patch.msgid.link/20260122013957.11184-1-alec.jiang@gmail.com
Cc: stable@vger.kernel.org
Signed-off-by: Dmitry Torokhov
Signed-off-by: Greg Kroah-Hartman
---
drivers/input/serio/i8042-acpipnpio.h | 11 +++++++++++
1 file changed, 11 insertions(+)
--- a/drivers/input/serio/i8042-acpipnpio.h
+++ b/drivers/input/serio/i8042-acpipnpio.h
@@ -114,6 +114,17 @@ static const struct dmi_system_id i8042_
.driver_data = (void *)(SERIO_QUIRK_NOMUX | SERIO_QUIRK_RESET_NEVER)
},
{
+ /*
+ * ASUS Zenbook UX425QA_UM425QA
+ * Some Zenbooks report "Zenbook" with a lowercase b.
+ */
+ .matches = {
+ DMI_MATCH(DMI_SYS_VENDOR, "ASUSTeK COMPUTER INC."),
+ DMI_MATCH(DMI_PRODUCT_NAME, "Zenbook UX425QA_UM425QA"),
+ },
+ .driver_data = (void *)(SERIO_QUIRK_PROBE_DEFER | SERIO_QUIRK_RESET_NEVER)
+ },
+ {
/* ASUS ZenBook UX425UA/QA */
.matches = {
DMI_MATCH(DMI_SYS_VENDOR, "ASUSTeK COMPUTER INC."),
From - Wed Feb 04 15:06:25 2026
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path:
Delivered-To: hi@josie.lol
Received: from witcher.mxrouting.net
by witcher.mxrouting.net with LMTP
id YIkfAWxgg2lM9xYAYBR5ng
(envelope-from )
for ; Wed, 04 Feb 2026 15:06:20 +0000
Return-path:
Envelope-to: hi@josie.lol
Delivery-date: Wed, 04 Feb 2026 15:06:20 +0000
Received: from tor.lore.kernel.org ([172.105.105.114])
by witcher.mxrouting.net with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384
(Exim 4.98)
(envelope-from )
id 1vneSR-00000006mm5-3FVS
for hi@josie.lol;
Wed, 04 Feb 2026 15:06:19 +0000
Received: from smtp.subspace.kernel.org (conduit.subspace.kernel.org [100.90.174.1])
by tor.lore.kernel.org (Postfix) with ESMTP id DBEF0302C766
for ; Wed, 4 Feb 2026 15:02:41 +0000 (UTC)
Received: from localhost.localdomain (localhost.localdomain [127.0.0.1])
by smtp.subspace.kernel.org (Postfix) with ESMTP id 1EDD92BD012;
Wed, 4 Feb 2026 15:02:40 +0000 (UTC)
Authentication-Results: smtp.subspace.kernel.org;
dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="UMjp3euW"
X-Original-To: stable@vger.kernel.org
Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by smtp.subspace.kernel.org (Postfix) with ESMTPS id F0B7F28853E;
Wed, 4 Feb 2026 15:02:39 +0000 (UTC)
Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201
ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;
t=1770217360; cv=none; b=KPNVa1nUTbrT4M4NJdqM9mjvS/wCrBSAcmGD/65yknUCj/oOa0AU0B7sCCz6pnkUemq0UnjJrgW2kes1mvoFK17uOZweTnDFvGUsmvYIm8pdYBZwLw7s82hA4rJA2UDgaPlIArAsJo72wR4aB8S6WNRGOucYLbryQD4obmXDQZY=
ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org;
s=arc-20240116; t=1770217360; c=relaxed/simple;
bh=KXrrdqLHf2w3gui6a6OP9RndNRjyav3YMWNapFMBU6U=;
h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:
MIME-Version; b=OCHh4cgfvMi1zp8uhiC/vYV2CxDLQ87FZaISqzqAx/COWznO/G0ry/Ro2xiLIDrhIY0dytbdONk5yYRXcUN+KQI+BcV/Z5D8MlQmdssaueuzwmu6koW2fgTdffdNAeEdN6yn4gs5rY0UgqOCKM6FYPe3IOGgC2DiCoB6LiH2+x8=
ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=UMjp3euW; arc=none smtp.client-ip=10.30.226.201
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 71BCFC4CEF7;
Wed, 4 Feb 2026 15:02:39 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org;
s=korg; t=1770217359;
bh=KXrrdqLHf2w3gui6a6OP9RndNRjyav3YMWNapFMBU6U=;
h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
b=UMjp3euWTdIkgknju7ndg+OiBcLGTJWhFffPu7RTSoVTJv6WfJ+Rnpdi24AQPwaSk
Yw6oYTnhO7yJypjufIIyz47Eah5/R6KpU4h7UWAwRVwhB/4D6z2uT86cBsSeXCNbYg
wGzl1byax4xtTNbEtNxo5H1TcZoPelV7x1Ab+pR8=
From: Greg Kroah-Hartman
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman ,
patches@lists.linux.dev,
Marco Angaroni ,
Geliang Tang ,
"Matthieu Baerts (NGI0)" ,
Jakub Kicinski ,
Sasha Levin
Subject: [PATCH 5.15 199/206] mptcp: avoid dup SUB_CLOSED events after disconnect
Date: Wed, 4 Feb 2026 15:40:30 +0100
Message-ID: <20260204143905.395067641@linuxfoundation.org>
X-Mailer: git-send-email 2.53.0
In-Reply-To: <20260204143858.193781818@linuxfoundation.org>
References: <20260204143858.193781818@linuxfoundation.org>
User-Agent: quilt/0.69
X-stable: review
X-Patchwork-Hint: ignore
Precedence: bulk
X-Mailing-List: stable@vger.kernel.org
List-Id:
List-Subscribe:
List-Unsubscribe:
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-DKIM: signer='linuxfoundation.org' status='pass' reason=''
DKIMCheck: Server passes DKIM test, 0 Spam score
X-Spam-Score: 0.4 (/)
X-Spam-Report: Spam detection software, running on the system "witcher.mxrouting.net", has
performed the tests listed below against this email.
Information: https://mxroutedocs.com/directadmin/spamfilters/
---
Content analysis details: (0.4 points)
---
pts rule name description
---- ---------------------- -----------------------------------------
0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was
blocked. See
http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
for more information.
[URIs: linuxfoundation.org]
0.0 RCVD_IN_DNSWL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to
DNSWL was blocked. See
http://wiki.apache.org/spamassassin/DnsBlocklists#DnsBlocklists-dnsbl-block
for more information.
[172.105.105.114 listed in list.dnswl.org]
1.5 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level
mail domains are different
0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
valid
-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
author's domain
-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
-1.0 MAILING_LIST_MULTI Multiple indicators imply a widely-seen list
manager
-0.0 DKIMWL_WL_HIGH DKIMwl.org - High trust sender
SpamTally: Final spam score: 4
5.15-stable review patch. If anyone has any objections, please let me know.
------------------
From: "Matthieu Baerts (NGI0)"
[ Upstream commit 280d654324e33f8e6e3641f76764694c7b64c5db ]
In case of subflow disconnect(), which can also happen with the first
subflow in case of errors like timeout or reset, mptcp_subflow_ctx_reset
will reset most fields from the mptcp_subflow_context structure,
including close_event_done. Then, when another subflow is closed, yet
another SUB_CLOSED event for the disconnected initial subflow is sent.
Because of the previous reset, there are no source address and
destination port.
A solution is then to also check the subflow's local id: it shouldn't be
negative anyway.
Another solution would be not to reset subflow->close_event_done at
disconnect time, but when reused. But then, probably the whole reset
could be done when being reused. Let's not change this logic, similar
to TCP with tcp_disconnect().
Fixes: d82809b6c5f2 ("mptcp: avoid duplicated SUB_CLOSED events")
Cc: stable@vger.kernel.org
Reported-by: Marco Angaroni
Closes: https://github.com/multipath-tcp/mptcp_net-next/issues/603
Reviewed-by: Geliang Tang
Signed-off-by: Matthieu Baerts (NGI0)
Link: https://patch.msgid.link/20260127-net-mptcp-dup-nl-events-v1-1-7f71e1bc4feb@kernel.org
Signed-off-by: Jakub Kicinski
[ Adjust context ]
Signed-off-by: Sasha Levin
Signed-off-by: Greg Kroah-Hartman
---
net/mptcp/protocol.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
--- a/net/mptcp/protocol.c
+++ b/net/mptcp/protocol.c
@@ -2398,8 +2398,8 @@ static void __mptcp_close_ssk(struct soc
void mptcp_close_ssk(struct sock *sk, struct sock *ssk,
struct mptcp_subflow_context *subflow)
{
- /* The first subflow can already be closed and still in the list */
- if (subflow->close_event_done)
+ /* The first subflow can already be closed or disconnected */
+ if (subflow->close_event_done || READ_ONCE(subflow->local_id) < 0)
return;
subflow->close_event_done = true;
From - Wed Feb 04 15:06:27 2026
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path:
Delivered-To: hi@josie.lol
Received: from witcher.mxrouting.net
by witcher.mxrouting.net with LMTP
id MEafDW9gg2lM9xYAYBR5ng
(envelope-from )
for ; Wed, 04 Feb 2026 15:06:23 +0000
Return-path:
Envelope-to: hi@josie.lol
Delivery-date: Wed, 04 Feb 2026 15:06:23 +0000
Received: from sea.lore.kernel.org ([172.234.253.10])
by witcher.mxrouting.net with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384
(Exim 4.98)
(envelope-from )
id 1vneSU-00000006mrn-3Z75
for hi@josie.lol;
Wed, 04 Feb 2026 15:06:23 +0000
Received: from smtp.subspace.kernel.org (conduit.subspace.kernel.org [100.90.174.1])
by sea.lore.kernel.org (Postfix) with ESMTP id A28283166589
for ; Wed, 4 Feb 2026 14:57:02 +0000 (UTC)
Received: from localhost.localdomain (localhost.localdomain [127.0.0.1])
by smtp.subspace.kernel.org (Postfix) with ESMTP id A2569423A95;
Wed, 4 Feb 2026 14:55:01 +0000 (UTC)
Authentication-Results: smtp.subspace.kernel.org;
dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="SpJygPYh"
X-Original-To: stable@vger.kernel.org
Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7E369423A91;
Wed, 4 Feb 2026 14:55:01 +0000 (UTC)
Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201
ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;
t=1770216901; cv=none; b=eFZSIEaPg41DboSNLvQNiYDT4TxhdY3FAXezeSSzzuFsmqRK0upctSBGZOQfL9Bo9i2jhTSINvXdL2o76dIAd38xg1TwD5FYGUP5e0aZBZfERKoOEcBSXDeDPHgbOw3f/nmS4W42erQujnYGt/kZ9nqm7j9ULRKw/5pW3JlM7sk=
ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org;
s=arc-20240116; t=1770216901; c=relaxed/simple;
bh=sPyKGl6tmLsD13/njDltul/yw6XYLRz7epmmeGqd3Gk=;
h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:
MIME-Version; b=BsMDSm7SOpjduGjs0cCxo6I5Oumg59oghwSlivVe+lE5y6eM10fhSeetNRalhYXW8PDHSp2r1LGu+ejiN2MtBDvbyqbJ/+LFrbFE8xImQD6op+OX9XjrrOyljCKpxHZKDfOPOKjIC7zlqJXXEcW5lvp8kxeqlgLtX/CJIFE/c18=
ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=SpJygPYh; arc=none smtp.client-ip=10.30.226.201
Received: by smtp.kernel.org (Postfix) with ESMTPSA id E8C25C19424;
Wed, 4 Feb 2026 14:55:00 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org;
s=korg; t=1770216901;
bh=sPyKGl6tmLsD13/njDltul/yw6XYLRz7epmmeGqd3Gk=;
h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
b=SpJygPYhUks3zpCTj22sRdk87ilFRhOv4F3/3TsBjw4B8Aw3+Y0CU+R3oUw3KHej7
cxLhhHAxTYmCcflROSqa1MgbHP+3hu/7p0LxbXTbhMPMbtk2q+mjz5u+zHhRci8zQC
Uv2bj4eWgfM2pEOet1s+RXy8swh66Jk9a/1mIAuk=
From: Greg Kroah-Hartman
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman ,
patches@lists.linux.dev,
Ethan Nelson-Moore ,
Peter Korsgaard ,
Jakub Kicinski ,
Sasha Levin
Subject: [PATCH 5.15 066/206] net: usb: dm9601: remove broken SR9700 support
Date: Wed, 4 Feb 2026 15:38:17 +0100
Message-ID: <20260204143900.591732978@linuxfoundation.org>
X-Mailer: git-send-email 2.53.0
In-Reply-To: <20260204143858.193781818@linuxfoundation.org>
References: <20260204143858.193781818@linuxfoundation.org>
User-Agent: quilt/0.69
X-stable: review
X-Patchwork-Hint: ignore
Precedence: bulk
X-Mailing-List: stable@vger.kernel.org
List-Id:
List-Subscribe:
List-Unsubscribe:
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-DKIM: signer='linuxfoundation.org' status='pass' reason=''
DKIMCheck: Server passes DKIM test, 0 Spam score
X-Spam-Score: 0.4 (/)
X-Spam-Report: Spam detection software, running on the system "witcher.mxrouting.net", has
performed the tests listed below against this email.
Information: https://mxroutedocs.com/directadmin/spamfilters/
---
Content analysis details: (0.4 points)
---
pts rule name description
---- ---------------------- -----------------------------------------
0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was
blocked. See
http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
for more information.
[URIs: msgid.link]
0.0 RCVD_IN_DNSWL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to
DNSWL was blocked. See
http://wiki.apache.org/spamassassin/DnsBlocklists#DnsBlocklists-dnsbl-block
for more information.
[172.234.253.10 listed in list.dnswl.org]
1.5 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level
mail domains are different
0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
valid
-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
author's domain
-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
-1.0 MAILING_LIST_MULTI Multiple indicators imply a widely-seen list
manager
-0.0 DKIMWL_WL_HIGH DKIMwl.org - High trust sender
SpamTally: Final spam score: 4
5.15-stable review patch. If anyone has any objections, please let me know.
------------------
From: Ethan Nelson-Moore
[ Upstream commit 7d7dbafefbe74f5a25efc4807af093b857a7612e ]
The SR9700 chip sends more than one packet in a USB transaction,
like the DM962x chips can optionally do, but the dm9601 driver does not
support this mode, and the hardware does not have the DM962x
MODE_CTL register to disable it, so this driver drops packets on SR9700
devices. The sr9700 driver correctly handles receiving more than one
packet per transaction.
While the dm9601 driver could be improved to handle this, the easiest
way to fix this issue in the short term is to remove the SR9700 device
ID from the dm9601 driver so the sr9700 driver is always used. This
device ID should not have been in more than one driver to begin with.
The "Fixes" commit was chosen so that the patch is automatically
included in all kernels that have the sr9700 driver, even though the
issue affects dm9601.
Fixes: c9b37458e956 ("USB2NET : SR9700 : One chip USB 1.1 USB2NET SR9700Device Driver Support")
Signed-off-by: Ethan Nelson-Moore
Acked-by: Peter Korsgaard
Link: https://patch.msgid.link/20260113063924.74464-1-enelsonmoore@gmail.com
Signed-off-by: Jakub Kicinski
Signed-off-by: Sasha Levin
---
drivers/net/usb/dm9601.c | 4 ----
1 file changed, 4 deletions(-)
diff --git a/drivers/net/usb/dm9601.c b/drivers/net/usb/dm9601.c
index f7357d884d6aa..2d98238293a64 100644
--- a/drivers/net/usb/dm9601.c
+++ b/drivers/net/usb/dm9601.c
@@ -603,10 +603,6 @@ static const struct usb_device_id products[] = {
USB_DEVICE(0x0fe6, 0x8101), /* DM9601 USB to Fast Ethernet Adapter */
.driver_info = (unsigned long)&dm9601_info,
},
- {
- USB_DEVICE(0x0fe6, 0x9700), /* DM9601 USB to Fast Ethernet Adapter */
- .driver_info = (unsigned long)&dm9601_info,
- },
{
USB_DEVICE(0x0a46, 0x9000), /* DM9000E */
.driver_info = (unsigned long)&dm9601_info,
--
2.51.0
From - Wed Feb 04 15:06:28 2026
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path:
Delivered-To: hi@josie.lol
Received: from witcher.mxrouting.net
by witcher.mxrouting.net with LMTP
id oLL+IW9gg2nghhgAYBR5ng
(envelope-from )
for ; Wed, 04 Feb 2026 15:06:23 +0000
Return-path:
Envelope-to: hi@josie.lol
Delivery-date: Wed, 04 Feb 2026 15:06:23 +0000
Received: from tor.lore.kernel.org ([172.105.105.114])
by witcher.mxrouting.net with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384
(Exim 4.98)
(envelope-from )
id 1vneSV-00000006msg-1LRP
for hi@josie.lol;
Wed, 04 Feb 2026 15:06:23 +0000
Received: from smtp.subspace.kernel.org (conduit.subspace.kernel.org [100.90.174.1])
by tor.lore.kernel.org (Postfix) with ESMTP id A7F71302F421
for ; Wed, 4 Feb 2026 15:02:45 +0000 (UTC)
Received: from localhost.localdomain (localhost.localdomain [127.0.0.1])
by smtp.subspace.kernel.org (Postfix) with ESMTP id BCCDD28853E;
Wed, 4 Feb 2026 15:02:43 +0000 (UTC)
Authentication-Results: smtp.subspace.kernel.org;
dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="SnBxBnlK"
X-Original-To: stable@vger.kernel.org
Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by smtp.subspace.kernel.org (Postfix) with ESMTPS id 9A1F21C84A6;
Wed, 4 Feb 2026 15:02:43 +0000 (UTC)
Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201
ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;
t=1770217363; cv=none; b=dgUpVnrrC6z6iVj7YWbk//nEpj6ZAYZIHaJYcrg9RFAiD12yzudE3bHdZlD3pwDh006BJOgaQZ3phG4ov0r+rhlfWOevXO+emO6f0WwCSYYAp/DWRf0avVli5AXvvNS4lbemZRvfW0b0cQ65QgmnO0pfMvn+qm4qwpR0peOxbdw=
ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org;
s=arc-20240116; t=1770217363; c=relaxed/simple;
bh=cytjmjqsXuHusPDUTXhT/3Uh6CY+/LzgUuHCJsiaVNo=;
h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:
MIME-Version; b=SaWZb3Zz4lI+Gt1hR4b1PH21imMrwuLYOudVumTIkQbLHMCFQx5prXyGDdp0LLkFATbOKIuq3jQNya2pXdENEwi4BW6QYQcvcNXlwq55YyrF4anOcVeYfekskbeRTnzpL0oCC+eaEmRhFqBzu2hruAJ52c4BI27KeX1spYwRCy8=
ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=SnBxBnlK; arc=none smtp.client-ip=10.30.226.201
Received: by smtp.kernel.org (Postfix) with ESMTPSA id DA798C4CEF7;
Wed, 4 Feb 2026 15:02:42 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org;
s=korg; t=1770217363;
bh=cytjmjqsXuHusPDUTXhT/3Uh6CY+/LzgUuHCJsiaVNo=;
h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
b=SnBxBnlKzJuw/2mJ2mu5A2fFR3FtqCoDFgwLTgTIWJr+sOZ5WoGlm3tQW+k/FavR/
HjkA8JsbW6CT9RWvis3Ebpa45HubzTNL7V5qTw2G2yFYt2Htru3vbE98MwsSSWFxH8
h608YQ3o1lULz+110zEdHmkBkIIQh1ToeUmfKefY=
From: Greg Kroah-Hartman
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman ,
patches@lists.linux.dev,
Marek Szyprowski ,
Bartosz Golaszewski ,
Martin Blumenstingl ,
Neil Armstrong ,
Linus Walleij ,
Sasha Levin
Subject: [PATCH 5.15 200/206] pinctrl: meson: mark the GPIO controller as sleeping
Date: Wed, 4 Feb 2026 15:40:31 +0100
Message-ID: <20260204143905.431859575@linuxfoundation.org>
X-Mailer: git-send-email 2.53.0
In-Reply-To: <20260204143858.193781818@linuxfoundation.org>
References: <20260204143858.193781818@linuxfoundation.org>
User-Agent: quilt/0.69
X-stable: review
X-Patchwork-Hint: ignore
Precedence: bulk
X-Mailing-List: stable@vger.kernel.org
List-Id:
List-Subscribe:
List-Unsubscribe:
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-DKIM: signer='linuxfoundation.org' status='pass' reason=''
DKIMCheck: Server passes DKIM test, 0 Spam score
X-Spam-Score: 0.4 (/)
X-Spam-Report: Spam detection software, running on the system "witcher.mxrouting.net", has
performed the tests listed below against this email.
Information: https://mxroutedocs.com/directadmin/spamfilters/
---
Content analysis details: (0.4 points)
---
pts rule name description
---- ---------------------- -----------------------------------------
0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was
blocked. See
http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
for more information.
[URIs: linuxfoundation.org]
0.0 RCVD_IN_DNSWL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to
DNSWL was blocked. See
http://wiki.apache.org/spamassassin/DnsBlocklists#DnsBlocklists-dnsbl-block
for more information.
[172.105.105.114 listed in list.dnswl.org]
1.5 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level
mail domains are different
0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
valid
-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
author's domain
-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
-1.0 MAILING_LIST_MULTI Multiple indicators imply a widely-seen list
manager
-0.0 DKIMWL_WL_HIGH DKIMwl.org - High trust sender
SpamTally: Final spam score: 4
5.15-stable review patch. If anyone has any objections, please let me know.
------------------
From: Bartosz Golaszewski
[ Upstream commit 28f24068387169722b508bba6b5257cb68b86e74 ]
The GPIO controller is configured as non-sleeping but it uses generic
pinctrl helpers which use a mutex for synchronization.
This can cause the following lockdep splat with shared GPIOs enabled on
boards which have multiple devices using the same GPIO:
BUG: sleeping function called from invalid context at
kernel/locking/mutex.c:591
in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 142, name:
kworker/u25:3
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
INFO: lockdep is turned off.
irq event stamp: 46379
hardirqs last enabled at (46379): []
_raw_spin_unlock_irqrestore+0x74/0x78
hardirqs last disabled at (46378): []
_raw_spin_lock_irqsave+0x84/0x88
softirqs last enabled at (46330): []
handle_softirqs+0x4c4/0x4dc
softirqs last disabled at (46295): []
__do_softirq+0x14/0x20
CPU: 1 UID: 0 PID: 142 Comm: kworker/u25:3 Tainted: G C
6.19.0-rc4-next-20260105+ #11963 PREEMPT
Tainted: [C]=CRAP
Hardware name: Khadas VIM3 (DT)
Workqueue: events_unbound deferred_probe_work_func
Call trace:
show_stack+0x18/0x24 (C)
dump_stack_lvl+0x90/0xd0
dump_stack+0x18/0x24
__might_resched+0x144/0x248
__might_sleep+0x48/0x98
__mutex_lock+0x5c/0x894
mutex_lock_nested+0x24/0x30
pinctrl_get_device_gpio_range+0x44/0x128
pinctrl_gpio_set_config+0x40/0xdc
gpiochip_generic_config+0x28/0x3c
gpio_do_set_config+0xa8/0x194
gpiod_set_config+0x34/0xfc
gpio_shared_proxy_set_config+0x6c/0xfc [gpio_shared_proxy]
gpio_do_set_config+0xa8/0x194
gpiod_set_transitory+0x4c/0xf0
gpiod_configure_flags+0xa4/0x480
gpiod_find_and_request+0x1a0/0x574
gpiod_get_index+0x58/0x84
devm_gpiod_get_index+0x20/0xb4
devm_gpiod_get+0x18/0x24
mmc_pwrseq_emmc_probe+0x40/0xb8
platform_probe+0x5c/0xac
really_probe+0xbc/0x298
__driver_probe_device+0x78/0x12c
driver_probe_device+0xdc/0x164
__device_attach_driver+0xb8/0x138
bus_for_each_drv+0x80/0xdc
__device_attach+0xa8/0x1b0
Fixes: 6ac730951104 ("pinctrl: add driver for Amlogic Meson SoCs")
Cc: stable@vger.kernel.org
Reported-by: Marek Szyprowski
Closes: https://lore.kernel.org/all/00107523-7737-4b92-a785-14ce4e93b8cb@samsung.com/
Signed-off-by: Bartosz Golaszewski
Reviewed-by: Martin Blumenstingl
Reviewed-by: Neil Armstrong
Signed-off-by: Linus Walleij
[ Adjust context ]
Signed-off-by: Sasha Levin
Signed-off-by: Greg Kroah-Hartman
---
drivers/pinctrl/meson/pinctrl-meson.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
--- a/drivers/pinctrl/meson/pinctrl-meson.c
+++ b/drivers/pinctrl/meson/pinctrl-meson.c
@@ -617,7 +617,7 @@ static int meson_gpiolib_register(struct
pc->chip.set = meson_gpio_set;
pc->chip.base = -1;
pc->chip.ngpio = pc->data->num_pins;
- pc->chip.can_sleep = false;
+ pc->chip.can_sleep = true;
pc->chip.of_node = pc->of_node;
pc->chip.of_gpio_n_cells = 2;
From - Wed Feb 04 15:06:35 2026
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path:
Delivered-To: hi@josie.lol
Received: from witcher.mxrouting.net
by witcher.mxrouting.net with LMTP
id IH0qEHZgg2mvhxgAYBR5ng
(envelope-from )
for ; Wed, 04 Feb 2026 15:06:30 +0000
Return-path:
Envelope-to: hi@josie.lol
Delivery-date: Wed, 04 Feb 2026 15:06:30 +0000
Received: from sea.lore.kernel.org ([172.234.253.10])
by witcher.mxrouting.net with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384
(Exim 4.98)
(envelope-from )
id 1vneSb-00000006n5s-2brl
for hi@josie.lol;
Wed, 04 Feb 2026 15:06:29 +0000
Received: from smtp.subspace.kernel.org (conduit.subspace.kernel.org [100.90.174.1])
by sea.lore.kernel.org (Postfix) with ESMTP id F229A31682B7
for ; Wed, 4 Feb 2026 14:57:05 +0000 (UTC)
Received: from localhost.localdomain (localhost.localdomain [127.0.0.1])
by smtp.subspace.kernel.org (Postfix) with ESMTP id 224CE41C2E1;
Wed, 4 Feb 2026 14:55:08 +0000 (UTC)
Authentication-Results: smtp.subspace.kernel.org;
dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="cj6ETjLE"
X-Original-To: stable@vger.kernel.org
Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by smtp.subspace.kernel.org (Postfix) with ESMTPS id 002A441B37D;
Wed, 4 Feb 2026 14:55:07 +0000 (UTC)
Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201
ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;
t=1770216908; cv=none; b=DltjMYZCpE1+gvcK8V3mRTyUSHBUlfOb2TRLAE+SQcOPySZFGZt3Z6AyGz30muB/m3UWYZhTjLpMF4hCOk2WD9t2lcTiuxNjAvBpXu5mNKALApJR2iqdZpDYSsFaJ3fQNhRQTiRbdO2UxveZ1XcLoWTKceHuqa4C+72U3wuxWC8=
ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org;
s=arc-20240116; t=1770216908; c=relaxed/simple;
bh=y/oOAhnZjcHCdv1+fVtqnDRVr0fmfK/1TUJXwDAjTRE=;
h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:
MIME-Version; b=oZcJNXcgjHJPqSd9yoO9mx37VAe0UKiLiKjTEF8qNUDjvaEk0fi7iwdQRNPUYHwH6JHdhN2PO89QNwYNY/7YvGvG2bA3WWFVc9DFq6BoLGuHhBrpkE7VJNgvGcxM9zvWwTaI3B/7g3vMpCBzvQX2Kdq2MgPk/vCKfDTMwjlRZnA=
ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=cj6ETjLE; arc=none smtp.client-ip=10.30.226.201
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 38EFFC4CEF7;
Wed, 4 Feb 2026 14:55:07 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org;
s=korg; t=1770216907;
bh=y/oOAhnZjcHCdv1+fVtqnDRVr0fmfK/1TUJXwDAjTRE=;
h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
b=cj6ETjLEiIPFEwpu/jL+bJLSmk/k1vlvoBfVWcBmG9pJ3j1/pbFi2s8ujdJlShF9m
ilpVGzXRWc60lTjdp4rGyh49SL8hZ5QgfDvv6ZPxZKbjgBZjOQkr2TdSHIivRduaGL
QUFIj5nSBAd5KQ8Ux3V7P+eozXLKVfZLOvFD43mg=
From: Greg Kroah-Hartman
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman ,
patches@lists.linux.dev,
David Ahern ,
Hangbin Liu ,
Jakub Kicinski ,
Sasha Levin
Subject: [PATCH 5.15 068/206] selftests/net: convert fib-onlink-tests.sh to run it in unique namespace
Date: Wed, 4 Feb 2026 15:38:19 +0100
Message-ID: <20260204143900.662437485@linuxfoundation.org>
X-Mailer: git-send-email 2.53.0
In-Reply-To: <20260204143858.193781818@linuxfoundation.org>
References: <20260204143858.193781818@linuxfoundation.org>
User-Agent: quilt/0.69
X-stable: review
X-Patchwork-Hint: ignore
Precedence: bulk
X-Mailing-List: stable@vger.kernel.org
List-Id:
List-Subscribe:
List-Unsubscribe:
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-DKIM: signer='linuxfoundation.org' status='pass' reason=''
DKIMCheck: Server passes DKIM test, 0 Spam score
X-Spam-Score: 0.4 (/)
X-Spam-Report: Spam detection software, running on the system "witcher.mxrouting.net", has
performed the tests listed below against this email.
Information: https://mxroutedocs.com/directadmin/spamfilters/
---
Content analysis details: (0.4 points)
---
pts rule name description
---- ---------------------- -----------------------------------------
0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was
blocked. See
http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
for more information.
[URIs: linuxfoundation.org]
0.0 RCVD_IN_DNSWL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to
DNSWL was blocked. See
http://wiki.apache.org/spamassassin/DnsBlocklists#DnsBlocklists-dnsbl-block
for more information.
[172.234.253.10 listed in list.dnswl.org]
1.5 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level
mail domains are different
0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
valid
-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
author's domain
-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
-1.0 MAILING_LIST_MULTI Multiple indicators imply a widely-seen list
manager
-0.0 DKIMWL_WL_HIGH DKIMwl.org - High trust sender
SpamTally: Final spam score: 4
5.15-stable review patch. If anyone has any objections, please let me know.
------------------
From: Hangbin Liu
[ Upstream commit 3a06833b2adc0a902f2469ad4ce41ccd64f1f3ab ]
Remove PEER_CMD, which is not used in this test
Here is the test result after conversion.
]# ./fib-onlink-tests.sh
Error: ipv4: FIB table does not exist.
Flush terminated
Error: ipv6: FIB table does not exist.
Flush terminated
########################################
Configuring interfaces
...
TEST: Gateway resolves to wrong nexthop device - VRF [ OK ]
Tests passed: 38
Tests failed: 0
Acked-by: David Ahern
Signed-off-by: Hangbin Liu
Link: https://lore.kernel.org/r/20231213060856.4030084-11-liuhangbin@gmail.com
Signed-off-by: Jakub Kicinski
Stable-dep-of: 4f5f148dd7c0 ("selftests: net: fib-onlink-tests: Convert to use namespaces by default")
Signed-off-by: Sasha Levin
---
tools/testing/selftests/net/fib-onlink-tests.sh | 9 +++------
1 file changed, 3 insertions(+), 6 deletions(-)
diff --git a/tools/testing/selftests/net/fib-onlink-tests.sh b/tools/testing/selftests/net/fib-onlink-tests.sh
index c287b90b8af80..ec2d6ceb1f08d 100755
--- a/tools/testing/selftests/net/fib-onlink-tests.sh
+++ b/tools/testing/selftests/net/fib-onlink-tests.sh
@@ -3,6 +3,7 @@
# IPv4 and IPv6 onlink tests
+source lib.sh
PAUSE_ON_FAIL=${PAUSE_ON_FAIL:=no}
VERBOSE=0
@@ -74,9 +75,6 @@ TEST_NET4IN6[2]=10.2.1.254
# mcast address
MCAST6=ff02::1
-
-PEER_NS=bart
-PEER_CMD="ip netns exec ${PEER_NS}"
VRF=lisa
VRF_TABLE=1101
PBR_TABLE=101
@@ -176,8 +174,7 @@ setup()
set -e
# create namespace
- ip netns add ${PEER_NS}
- ip -netns ${PEER_NS} li set lo up
+ setup_ns PEER_NS
# add vrf table
ip li add ${VRF} type vrf table ${VRF_TABLE}
@@ -219,7 +216,7 @@ setup()
cleanup()
{
# make sure we start from a clean slate
- ip netns del ${PEER_NS} 2>/dev/null
+ cleanup_ns ${PEER_NS} 2>/dev/null
for n in 1 3 5 7; do
ip link del ${NETIFS[p${n}]} 2>/dev/null
done
--
2.51.0
From - Wed Feb 04 15:06:35 2026
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path:
Delivered-To: hi@josie.lol
Received: from witcher.mxrouting.net
by witcher.mxrouting.net with LMTP
id iGvFN3Zgg2lchRMAYBR5ng
(envelope-from )
for ; Wed, 04 Feb 2026 15:06:30 +0000
Return-path:
Envelope-to: hi@josie.lol
Delivery-date: Wed, 04 Feb 2026 15:06:31 +0000
Received: from tor.lore.kernel.org ([172.105.105.114])
by witcher.mxrouting.net with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384
(Exim 4.98)
(envelope-from )
id 1vneSb-00000006n61-2IKE
for hi@josie.lol;
Wed, 04 Feb 2026 15:06:30 +0000
Received: from smtp.subspace.kernel.org (conduit.subspace.kernel.org [100.90.174.1])
by tor.lore.kernel.org (Postfix) with ESMTP id 5A76E3030D24
for ; Wed, 4 Feb 2026 15:02:52 +0000 (UTC)
Received: from localhost.localdomain (localhost.localdomain [127.0.0.1])
by smtp.subspace.kernel.org (Postfix) with ESMTP id 560832BE03C;
Wed, 4 Feb 2026 15:02:50 +0000 (UTC)
Authentication-Results: smtp.subspace.kernel.org;
dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="gNTQFq+r"
X-Original-To: stable@vger.kernel.org
Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by smtp.subspace.kernel.org (Postfix) with ESMTPS id 33ABD28853E;
Wed, 4 Feb 2026 15:02:50 +0000 (UTC)
Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201
ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;
t=1770217370; cv=none; b=W2t0uB0SkCXpa/7c6zpaj9JBIYuwQTIySivWfU6yaeg73bKOiZao/esoicNI/jVN8d+XWVyBTpfY4Pa7zdy/noytrKvfGex422ohHBMaOOGOfdhmcZQDKAW8+P32eRmesn0+U8dyPg+vcjOFuyXpM4aXwY0nGMzzw7opt+v4b9I=
ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org;
s=arc-20240116; t=1770217370; c=relaxed/simple;
bh=DquUkTpWjVi7jbM9Zf69QazA2CGiESSuQVN+F90KtT4=;
h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:
MIME-Version; b=Sm+ScOuvR0/OqbXagHYfWahH8gJpDstVsh9kHI0a0JQUHqeo8rQLNH7veRLU58LyojP+TlJIj9+tQtuKfmdDfYd1ZtAR74kzWCWJidTe9tvRHV8G8EYnkXzwawzd+2SJyA32+RdcitJvSDi0huff73pTCqYdnRJo7bedZibUZ7o=
ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=gNTQFq+r; arc=none smtp.client-ip=10.30.226.201
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9E536C4CEF7;
Wed, 4 Feb 2026 15:02:49 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org;
s=korg; t=1770217370;
bh=DquUkTpWjVi7jbM9Zf69QazA2CGiESSuQVN+F90KtT4=;
h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
b=gNTQFq+rxJw+v+AN8kAjtWVQzHT2EtRPD3vNDxNLpcgsQYTdzVN0+3LdD57ZgHgfI
WF1phrLcXmDEst75aywoe9jzvCZwwYcDf160de5bA982emE6KzHOtc9k2sArLp4Aqp
5RnEWQkf4YRKMGk8qMVpwtfBIxRAJ4vptx/PLu3g=
From: Greg Kroah-Hartman
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman ,
patches@lists.linux.dev,
Samasth Norway Ananda ,
Takashi Iwai ,
Sasha Levin
Subject: [PATCH 5.15 170/206] ALSA: scarlett2: Fix buffer overflow in config retrieval
Date: Wed, 4 Feb 2026 15:40:01 +0100
Message-ID: <20260204143904.331794827@linuxfoundation.org>
X-Mailer: git-send-email 2.53.0
In-Reply-To: <20260204143858.193781818@linuxfoundation.org>
References: <20260204143858.193781818@linuxfoundation.org>
User-Agent: quilt/0.69
X-stable: review
X-Patchwork-Hint: ignore
Precedence: bulk
X-Mailing-List: stable@vger.kernel.org
List-Id:
List-Subscribe:
List-Unsubscribe:
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-DKIM: signer='linuxfoundation.org' status='pass' reason=''
DKIMCheck: Server passes DKIM test, 0 Spam score
X-Spam-Score: 0.4 (/)
X-Spam-Report: Spam detection software, running on the system "witcher.mxrouting.net", has
performed the tests listed below against this email.
Information: https://mxroutedocs.com/directadmin/spamfilters/
---
Content analysis details: (0.4 points)
---
pts rule name description
---- ---------------------- -----------------------------------------
0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was
blocked. See
http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
for more information.
[URIs: msgid.link]
0.0 RCVD_IN_DNSWL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to
DNSWL was blocked. See
http://wiki.apache.org/spamassassin/DnsBlocklists#DnsBlocklists-dnsbl-block
for more information.
[172.105.105.114 listed in list.dnswl.org]
1.5 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level
mail domains are different
0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
valid
-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
author's domain
-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
-1.0 MAILING_LIST_MULTI Multiple indicators imply a widely-seen list
manager
-0.0 DKIMWL_WL_HIGH DKIMwl.org - High trust sender
SpamTally: Final spam score: 4
5.15-stable review patch. If anyone has any objections, please let me know.
------------------
From: Samasth Norway Ananda
[ Upstream commit 6f5c69f72e50d51be3a8c028ae7eda42c82902cb ]
The scarlett2_usb_get_config() function has a logic error in the
endianness conversion code that can cause buffer overflows when
count > 1.
The code checks `if (size == 2)` where `size` is the total buffer size in
bytes, then loops `count` times treating each element as u16 (2 bytes).
This causes the loop to access `count * 2` bytes when the buffer only
has `size` bytes allocated.
Fix by checking the element size (config_item->size) instead of the
total buffer size. This ensures the endianness conversion matches the
actual element type.
Fixes: ac34df733d2d ("ALSA: usb-audio: scarlett2: Update get_config to do endian conversion")
Cc: stable@vger.kernel.org
Signed-off-by: Samasth Norway Ananda
Link: https://patch.msgid.link/20260117012706.1715574-1-samasth.norway.ananda@oracle.com
Signed-off-by: Takashi Iwai
[ add 32-bit handling block ]
Signed-off-by: Sasha Levin
Signed-off-by: Greg Kroah-Hartman
---
sound/usb/mixer_scarlett_gen2.c | 7 ++++++-
1 file changed, 6 insertions(+), 1 deletion(-)
--- a/sound/usb/mixer_scarlett_gen2.c
+++ b/sound/usb/mixer_scarlett_gen2.c
@@ -1194,11 +1194,16 @@ static int scarlett2_usb_get_config(
err = scarlett2_usb_get(mixer, config_item->offset, buf, size);
if (err < 0)
return err;
- if (size == 2) {
+ if (config_item->size == 16) {
u16 *buf_16 = buf;
for (i = 0; i < count; i++, buf_16++)
*buf_16 = le16_to_cpu(*(__le16 *)buf_16);
+ } else if (config_item->size == 32) {
+ u32 *buf_32 = (u32 *)buf;
+
+ for (i = 0; i < count; i++, buf_32++)
+ *buf_32 = le32_to_cpu(*(__le32 *)buf_32);
}
return 0;
}
From - Wed Feb 04 15:06:42 2026
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path:
Delivered-To: hi@josie.lol
Received: from witcher.mxrouting.net
by witcher.mxrouting.net with LMTP
id 6OHTKndgg2lchRMAYBR5ng
(envelope-from )
for ; Wed, 04 Feb 2026 15:06:31 +0000
Return-path:
Envelope-to: hi@josie.lol
Delivery-date: Wed, 04 Feb 2026 15:06:31 +0000
Received: from sea.lore.kernel.org ([172.234.253.10])
by witcher.mxrouting.net with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384
(Exim 4.98)
(envelope-from )
id 1vneSd-00000006n7K-0B0a
for hi@josie.lol;
Wed, 04 Feb 2026 15:06:31 +0000
Received: from smtp.subspace.kernel.org (conduit.subspace.kernel.org [100.90.174.1])
by sea.lore.kernel.org (Postfix) with ESMTP id 23CD930BD7AF
for ; Wed, 4 Feb 2026 14:57:08 +0000 (UTC)
Received: from localhost.localdomain (localhost.localdomain [127.0.0.1])
by smtp.subspace.kernel.org (Postfix) with ESMTP id 5C24941B37D;
Wed, 4 Feb 2026 14:55:14 +0000 (UTC)
Authentication-Results: smtp.subspace.kernel.org;
dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="gGyyOokC"
X-Original-To: stable@vger.kernel.org
Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by smtp.subspace.kernel.org (Postfix) with ESMTPS id 393DF41B34E;
Wed, 4 Feb 2026 14:55:14 +0000 (UTC)
Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201
ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;
t=1770216914; cv=none; b=PMf2pfloXAcnJKpAIIS44GPAQ1AXifggsCjBQLZz57FDGZxDEvOUfBcMTB6NenDpupBhZccXGTiB+q0ABDaeDFqH7Hk8On//xV70WiXmjQ2GCXzVNr2PXY0tLzGXXnN1nlGQLRcJsAypSJMS1hjy4qE41GnxEy60MJmzj9a1Vfs=
ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org;
s=arc-20240116; t=1770216914; c=relaxed/simple;
bh=lZktKEqcTiR9XB+5lC+MYbgoub58/S5CehekVM5DVQI=;
h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:
MIME-Version; b=WfgMx4w/NI8yu5nlGg3wmd5X+IzA2uT1tM8nuI1pXNeOxwMW3reO3jcpZMBrlmVmfoNkTA6Jk7zvJ7G/D7uVNaRr3l2z8DgKghH42BVoUWJzI/3+8MMWyr0Uss8T9PeeiXmpOGS1S4vWj6ub7+q+IIRT9icB7itE7Sa4luwU6VE=
ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=gGyyOokC; arc=none smtp.client-ip=10.30.226.201
Received: by smtp.kernel.org (Postfix) with ESMTPSA id B6266C4CEF7;
Wed, 4 Feb 2026 14:55:13 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org;
s=korg; t=1770216914;
bh=lZktKEqcTiR9XB+5lC+MYbgoub58/S5CehekVM5DVQI=;
h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
b=gGyyOokC7a4QtFxtqwzN0lYC0hthzlk/KxncKIQwedRuL8Crjxbwpnacf3ZopBi1Q
EKqn4P7lmOG8LIP8iI3nwkvP5Y0kVkgblxD2pNvJ7Ft7fAafyqtwXlsmss3Fdmng6b
FItcru1KqalCrjPyYjVjarCSypr5r3gcE+SZJxsM=
From: Greg Kroah-Hartman
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman ,
patches@lists.linux.dev,
Zhen Chen ,
Xin Long ,
Jakub Kicinski ,
Sasha Levin
Subject: [PATCH 5.15 070/206] sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT
Date: Wed, 4 Feb 2026 15:38:21 +0100
Message-ID: <20260204143900.734741941@linuxfoundation.org>
X-Mailer: git-send-email 2.53.0
In-Reply-To: <20260204143858.193781818@linuxfoundation.org>
References: <20260204143858.193781818@linuxfoundation.org>
User-Agent: quilt/0.69
X-stable: review
X-Patchwork-Hint: ignore
Precedence: bulk
X-Mailing-List: stable@vger.kernel.org
List-Id:
List-Subscribe:
List-Unsubscribe:
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-DKIM: signer='linuxfoundation.org' status='pass' reason=''
DKIMCheck: Server passes DKIM test, 0 Spam score
X-Spam-Score: 0.4 (/)
X-Spam-Report: Spam detection software, running on the system "witcher.mxrouting.net", has
performed the tests listed below against this email.
Information: https://mxroutedocs.com/directadmin/spamfilters/
---
Content analysis details: (0.4 points)
---
pts rule name description
---- ---------------------- -----------------------------------------
0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was
blocked. See
http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
for more information.
[URIs: linuxfoundation.org]
0.0 RCVD_IN_DNSWL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to
DNSWL was blocked. See
http://wiki.apache.org/spamassassin/DnsBlocklists#DnsBlocklists-dnsbl-block
for more information.
[172.234.253.10 listed in list.dnswl.org]
1.5 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level
mail domains are different
0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
valid
-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
author's domain
-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
-1.0 MAILING_LIST_MULTI Multiple indicators imply a widely-seen list
manager
-0.0 DKIMWL_WL_HIGH DKIMwl.org - High trust sender
SpamTally: Final spam score: 4
5.15-stable review patch. If anyone has any objections, please let me know.
------------------
From: Xin Long
[ Upstream commit a80c9d945aef55b23b54838334345f20251dad83 ]
A null-ptr-deref was reported in the SCTP transmit path when SCTP-AUTH key
initialization fails:
==================================================================
KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]
CPU: 0 PID: 16 Comm: ksoftirqd/0 Tainted: G W 6.6.0 #2
RIP: 0010:sctp_packet_bundle_auth net/sctp/output.c:264 [inline]
RIP: 0010:sctp_packet_append_chunk+0xb36/0x1260 net/sctp/output.c:401
Call Trace:
sctp_packet_transmit_chunk+0x31/0x250 net/sctp/output.c:189
sctp_outq_flush_data+0xa29/0x26d0 net/sctp/outqueue.c:1111
sctp_outq_flush+0xc80/0x1240 net/sctp/outqueue.c:1217
sctp_cmd_interpreter.isra.0+0x19a5/0x62c0 net/sctp/sm_sideeffect.c:1787
sctp_side_effects net/sctp/sm_sideeffect.c:1198 [inline]
sctp_do_sm+0x1a3/0x670 net/sctp/sm_sideeffect.c:1169
sctp_assoc_bh_rcv+0x33e/0x640 net/sctp/associola.c:1052
sctp_inq_push+0x1dd/0x280 net/sctp/inqueue.c:88
sctp_rcv+0x11ae/0x3100 net/sctp/input.c:243
sctp6_rcv+0x3d/0x60 net/sctp/ipv6.c:1127
The issue is triggered when sctp_auth_asoc_init_active_key() fails in
sctp_sf_do_5_1C_ack() while processing an INIT_ACK. In this case, the
command sequence is currently:
- SCTP_CMD_PEER_INIT
- SCTP_CMD_TIMER_STOP (T1_INIT)
- SCTP_CMD_TIMER_START (T1_COOKIE)
- SCTP_CMD_NEW_STATE (COOKIE_ECHOED)
- SCTP_CMD_ASSOC_SHKEY
- SCTP_CMD_GEN_COOKIE_ECHO
If SCTP_CMD_ASSOC_SHKEY fails, asoc->shkey remains NULL, while
asoc->peer.auth_capable and asoc->peer.peer_chunks have already been set by
SCTP_CMD_PEER_INIT. This allows a DATA chunk with auth = 1 and shkey = NULL
to be queued by sctp_datamsg_from_user().
Since command interpretation stops on failure, no COOKIE_ECHO should been
sent via SCTP_CMD_GEN_COOKIE_ECHO. However, the T1_COOKIE timer has already
been started, and it may enqueue a COOKIE_ECHO into the outqueue later. As
a result, the DATA chunk can be transmitted together with the COOKIE_ECHO
in sctp_outq_flush_data(), leading to the observed issue.
Similar to the other places where it calls sctp_auth_asoc_init_active_key()
right after sctp_process_init(), this patch moves the SCTP_CMD_ASSOC_SHKEY
immediately after SCTP_CMD_PEER_INIT, before stopping T1_INIT and starting
T1_COOKIE. This ensures that if shared key generation fails, authenticated
DATA cannot be sent. It also allows the T1_INIT timer to retransmit INIT,
giving the client another chance to process INIT_ACK and retry key setup.
Fixes: 730fc3d05cd4 ("[SCTP]: Implete SCTP-AUTH parameter processing")
Reported-by: Zhen Chen
Tested-by: Zhen Chen
Signed-off-by: Xin Long
Link: https://patch.msgid.link/44881224b375aa8853f5e19b4055a1a56d895813.1768324226.git.lucien.xin@gmail.com
Signed-off-by: Jakub Kicinski
Signed-off-by: Sasha Levin
---
net/sctp/sm_statefuns.c | 10 +++++-----
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/net/sctp/sm_statefuns.c b/net/sctp/sm_statefuns.c
index f9882e0e67b1b..dc758ad0051e0 100644
--- a/net/sctp/sm_statefuns.c
+++ b/net/sctp/sm_statefuns.c
@@ -601,6 +601,11 @@ enum sctp_disposition sctp_sf_do_5_1C_ack(struct net *net,
sctp_add_cmd_sf(commands, SCTP_CMD_PEER_INIT,
SCTP_PEER_INIT(initchunk));
+ /* SCTP-AUTH: generate the association shared keys so that
+ * we can potentially sign the COOKIE-ECHO.
+ */
+ sctp_add_cmd_sf(commands, SCTP_CMD_ASSOC_SHKEY, SCTP_NULL());
+
/* Reset init error count upon receipt of INIT-ACK. */
sctp_add_cmd_sf(commands, SCTP_CMD_INIT_COUNTER_RESET, SCTP_NULL());
@@ -615,11 +620,6 @@ enum sctp_disposition sctp_sf_do_5_1C_ack(struct net *net,
sctp_add_cmd_sf(commands, SCTP_CMD_NEW_STATE,
SCTP_STATE(SCTP_STATE_COOKIE_ECHOED));
- /* SCTP-AUTH: generate the association shared keys so that
- * we can potentially sign the COOKIE-ECHO.
- */
- sctp_add_cmd_sf(commands, SCTP_CMD_ASSOC_SHKEY, SCTP_NULL());
-
/* 5.1 C) "A" shall then send the State Cookie received in the
* INIT ACK chunk in a COOKIE ECHO chunk, ...
*/
--
2.51.0
From - Wed Feb 04 15:06:42 2026
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path:
Delivered-To: hi@josie.lol
Received: from witcher.mxrouting.net
by witcher.mxrouting.net with LMTP
id UINzO3xgg2nghhgAYBR5ng
(envelope-from )
for ; Wed, 04 Feb 2026 15:06:36 +0000
Return-path:
Envelope-to: hi@josie.lol
Delivery-date: Wed, 04 Feb 2026 15:06:37 +0000
Received: from sto.lore.kernel.org ([172.232.135.74])
by witcher.mxrouting.net with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384
(Exim 4.98)
(envelope-from )
id 1vneSi-00000006nIm-2YiP
for hi@josie.lol;
Wed, 04 Feb 2026 15:06:36 +0000
Received: from smtp.subspace.kernel.org (conduit.subspace.kernel.org [100.90.174.1])
by sto.lore.kernel.org (Postfix) with ESMTP id 45DA7302B364
for ; Wed, 4 Feb 2026 15:02:10 +0000 (UTC)
Received: from localhost.localdomain (localhost.localdomain [127.0.0.1])
by smtp.subspace.kernel.org (Postfix) with ESMTP id E415728853A;
Wed, 4 Feb 2026 15:02:09 +0000 (UTC)
Authentication-Results: smtp.subspace.kernel.org;
dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="hIqIdXI8"
X-Original-To: stable@vger.kernel.org
Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by smtp.subspace.kernel.org (Postfix) with ESMTPS id C1A10285404;
Wed, 4 Feb 2026 15:02:09 +0000 (UTC)
Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201
ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;
t=1770217329; cv=none; b=Kw6H7u0YhxPIeqSwA149u9Q3KtG5fG9t0Vh+wq9Ajhm2TMcMwzfw6ZJpfgyqQ1dQDxDtTnsk6iKj8lsLeCjckqfVkCchjtT4IFk1LR0yChZCT+H6Go1XDdBPQFkFqvfdKo8ixYgDv4Qwx5yaMg4cyXrmCsR4UIkWUW1nm//IdQo=
ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org;
s=arc-20240116; t=1770217329; c=relaxed/simple;
bh=7NqI4bhQE/IocWjm82ZA/pWsaxPhcP+1D1uBC6Jo/as=;
h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:
MIME-Version; b=Xp3ob0JIqtIWKuEJqPjzW6YmuhFwxv3pDdgxml5dod4pUTGoCO/kvZeonIAELiQCbdHDjIx9iRqEUI0AMYi32J3nUsUwjOES6XnPSKtQJJfTWbg/x+LAMu4Y6W69jGqudWLKk3RvoNnkyn2xbC7QcqUk7I04MlqAPXL37zwFuBw=
ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=hIqIdXI8; arc=none smtp.client-ip=10.30.226.201
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2EB1EC4CEF7;
Wed, 4 Feb 2026 15:02:08 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org;
s=korg; t=1770217329;
bh=7NqI4bhQE/IocWjm82ZA/pWsaxPhcP+1D1uBC6Jo/as=;
h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
b=hIqIdXI8+VW/4ipxl49k2jRWDqtcshl1DWHI24oHmiJ6LleKzRXbFEfKwQ8+ilmGm
7gGEaef0mVolfc/fZcA7HcHGJS+D6e7KHWEVTB4Dl/jZw6NGMs2V1RZjR4DYMlVec1
uYQcCtqU7YhqaAd7cBN/9au0C3aoa8uaVIJG3pGo=
From: Greg Kroah-Hartman
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman ,
patches@lists.linux.dev,
Marc Kleine-Budde
Subject: [PATCH 5.15 191/206] can: esd_usb: esd_usb_read_bulk_callback(): fix URB memory leak
Date: Wed, 4 Feb 2026 15:40:22 +0100
Message-ID: <20260204143905.103860466@linuxfoundation.org>
X-Mailer: git-send-email 2.53.0
In-Reply-To: <20260204143858.193781818@linuxfoundation.org>
References: <20260204143858.193781818@linuxfoundation.org>
User-Agent: quilt/0.69
X-stable: review
X-Patchwork-Hint: ignore
Precedence: bulk
X-Mailing-List: stable@vger.kernel.org
List-Id:
List-Subscribe:
List-Unsubscribe:
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-DKIM: signer='linuxfoundation.org' status='pass' reason=''
DKIMCheck: Server passes DKIM test, 0 Spam score
X-Spam-Score: 0.4 (/)
X-Spam-Report: Spam detection software, running on the system "witcher.mxrouting.net", has
performed the tests listed below against this email.
Information: https://mxroutedocs.com/directadmin/spamfilters/
---
Content analysis details: (0.4 points)
---
pts rule name description
---- ---------------------- -----------------------------------------
0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was
blocked. See
http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
for more information.
[URIs: msgid.link]
0.0 RCVD_IN_DNSWL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to
DNSWL was blocked. See
http://wiki.apache.org/spamassassin/DnsBlocklists#DnsBlocklists-dnsbl-block
for more information.
[172.232.135.74 listed in list.dnswl.org]
1.5 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level
mail domains are different
0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
valid
-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
author's domain
-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
-1.0 MAILING_LIST_MULTI Multiple indicators imply a widely-seen list
manager
-0.0 DKIMWL_WL_HIGH DKIMwl.org - High trust sender
SpamTally: Final spam score: 4
5.15-stable review patch. If anyone has any objections, please let me know.
------------------
From: Marc Kleine-Budde
commit 5a4391bdc6c8357242f62f22069c865b792406b3 upstream.
Fix similar memory leak as in commit 7352e1d5932a ("can: gs_usb:
gs_usb_receive_bulk_callback(): fix URB memory leak").
In esd_usb_open(), the URBs for USB-in transfers are allocated, added to
the dev->rx_submitted anchor and submitted. In the complete callback
esd_usb_read_bulk_callback(), the URBs are processed and resubmitted. In
esd_usb_close() the URBs are freed by calling
usb_kill_anchored_urbs(&dev->rx_submitted).
However, this does not take into account that the USB framework unanchors
the URB before the complete function is called. This means that once an
in-URB has been completed, it is no longer anchored and is ultimately not
released in esd_usb_close().
Fix the memory leak by anchoring the URB in the
esd_usb_read_bulk_callback() to the dev->rx_submitted anchor.
Fixes: 96d8e90382dc ("can: Add driver for esd CAN-USB/2 device")
Cc: stable@vger.kernel.org
Link: https://patch.msgid.link/20260116-can_usb-fix-memory-leak-v2-2-4b8cb2915571@pengutronix.de
Signed-off-by: Marc Kleine-Budde
Signed-off-by: Greg Kroah-Hartman
---
drivers/net/can/usb/esd_usb2.c | 9 ++++++++-
1 file changed, 8 insertions(+), 1 deletion(-)
--- a/drivers/net/can/usb/esd_usb2.c
+++ b/drivers/net/can/usb/esd_usb2.c
@@ -440,13 +440,20 @@ resubmit_urb:
urb->transfer_buffer, RX_BUFFER_SIZE,
esd_usb2_read_bulk_callback, dev);
+ usb_anchor_urb(urb, &dev->rx_submitted);
+
retval = usb_submit_urb(urb, GFP_ATOMIC);
+ if (!retval)
+ return;
+
+ usb_unanchor_urb(urb);
+
if (retval == -ENODEV) {
for (i = 0; i < dev->net_count; i++) {
if (dev->nets[i])
netif_device_detach(dev->nets[i]->netdev);
}
- } else if (retval) {
+ } else {
dev_err(dev->udev->dev.parent,
"failed resubmitting read bulk urb: %d\n", retval);
}
From - Wed Feb 04 15:06:47 2026
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path:
Delivered-To: hi@josie.lol
Received: from witcher.mxrouting.net
by witcher.mxrouting.net with LMTP
id SAtENoJgg2lKhhQAYBR5ng
(envelope-from )
for ; Wed, 04 Feb 2026 15:06:42 +0000
Return-path:
Envelope-to: hi@josie.lol
Delivery-date: Wed, 04 Feb 2026 15:06:43 +0000
Received: from sto.lore.kernel.org ([172.232.135.74])
by witcher.mxrouting.net with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384
(Exim 4.98)
(envelope-from )
id 1vneSo-00000006nWK-1aY5
for hi@josie.lol;
Wed, 04 Feb 2026 15:06:42 +0000
Received: from smtp.subspace.kernel.org (conduit.subspace.kernel.org [100.90.174.1])
by sto.lore.kernel.org (Postfix) with ESMTP id 8696D302D898
for ; Wed, 4 Feb 2026 15:02:23 +0000 (UTC)
Received: from localhost.localdomain (localhost.localdomain [127.0.0.1])
by smtp.subspace.kernel.org (Postfix) with ESMTP id 302B528853E;
Wed, 4 Feb 2026 15:02:23 +0000 (UTC)
Authentication-Results: smtp.subspace.kernel.org;
dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="hDRRXJ+3"
X-Original-To: stable@vger.kernel.org
Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0D53C285404;
Wed, 4 Feb 2026 15:02:23 +0000 (UTC)
Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201
ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;
t=1770217343; cv=none; b=LyotURzKeSGF0RVA65gFyElDZ2jAj9N0pkXLCCEaZn/t79/5ctsvpFZwtwjiIg304o5PN2CyPxCfJuGi/FU16P04RBmrsKe4IjkBvq0owYegenKqSyQJCRTBjVx7LOoZZpC4W6m6WEMGAx60wG4ORwUGcZkhTZrWh3rLiKn2eqY=
ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org;
s=arc-20240116; t=1770217343; c=relaxed/simple;
bh=CYhUmA9DwIvZsWpj3SSzaiAgjiIrEDgvrd7pQEzuWko=;
h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:
MIME-Version; b=K6ebkw9HT9/ICCKn+viSKDCuURydBpdX7NhEvwklzBymg3fSKBFRYkyyCk03rP6k77IUkuduDS/4ph6OxAsk6Lqresps3NCqDAJplkWCrR4Mybll0aMduZeK22sACKcYXmhyLHVtj0aT3MzMOboKGw0czKVxUT7hG2Ok2ntLHbQ=
ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=hDRRXJ+3; arc=none smtp.client-ip=10.30.226.201
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8AACFC4CEF7;
Wed, 4 Feb 2026 15:02:22 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org;
s=korg; t=1770217342;
bh=CYhUmA9DwIvZsWpj3SSzaiAgjiIrEDgvrd7pQEzuWko=;
h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
b=hDRRXJ+3HLO6d9GDEnHv6eF71jeyegnPmB12tJKf8ZfS82dWn+quPkTTG9yLkm6oQ
wQYqjCaiFQhxRwnijH6l6eiXfs6+0+VrET3zDVGqfocblNTd1Tvgsv/t5mukSJOYly
kQoSkryqc+14NQMMep5pyaTlu5Spa7AW1UKAjIYo=
From: Greg Kroah-Hartman
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman ,
patches@lists.linux.dev,
Nilay Shroff ,
Christoph Hellwig ,
Keith Busch ,
Sasha Levin
Subject: [PATCH 5.15 168/206] nvme-pci: do not directly handle subsys reset fallout
Date: Wed, 4 Feb 2026 15:39:59 +0100
Message-ID: <20260204143904.258847414@linuxfoundation.org>
X-Mailer: git-send-email 2.53.0
In-Reply-To: <20260204143858.193781818@linuxfoundation.org>
References: <20260204143858.193781818@linuxfoundation.org>
User-Agent: quilt/0.69
X-stable: review
X-Patchwork-Hint: ignore
Precedence: bulk
X-Mailing-List: stable@vger.kernel.org
List-Id:
List-Subscribe:
List-Unsubscribe:
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-DKIM: signer='linuxfoundation.org' status='pass' reason=''
DKIMCheck: Server passes DKIM test, 0 Spam score
X-Spam-Score: 0.4 (/)
X-Spam-Report: Spam detection software, running on the system "witcher.mxrouting.net", has
performed the tests listed below against this email.
Information: https://mxroutedocs.com/directadmin/spamfilters/
---
Content analysis details: (0.4 points)
---
pts rule name description
---- ---------------------- -----------------------------------------
0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was
blocked. See
http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
for more information.
[URIs: linuxfoundation.org]
0.0 RCVD_IN_DNSWL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to
DNSWL was blocked. See
http://wiki.apache.org/spamassassin/DnsBlocklists#DnsBlocklists-dnsbl-block
for more information.
[172.232.135.74 listed in list.dnswl.org]
1.5 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level
mail domains are different
0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
valid
-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
author's domain
-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
-1.0 MAILING_LIST_MULTI Multiple indicators imply a widely-seen list
manager
-0.0 DKIMWL_WL_HIGH DKIMwl.org - High trust sender
SpamTally: Final spam score: 4
5.15-stable review patch. If anyone has any objections, please let me know.
------------------
From: Keith Busch
[ Upstream commit 210b1f6576e8b367907e7ff51ef425062e1468e4 ]
Scheduling reset_work after a nvme subsystem reset is expected to fail
on pcie, but this also prevents potential handling the platform's pcie
services may provide that might successfully recovering the link without
re-enumeration. Such examples include AER, DPC, and power's EEH.
Provide a pci specific operation that safely initiates a subsystem
reset, and instead of scheduling reset work, read back the status
register to trigger a pcie read error.
Since this only affects pci, the other fabrics drivers subscribe to a
generic nvmf subsystem reset that is exactly the same as before. The
loop fabric doesn't use it because nvmet doesn't support setting that
property anyway.
And since we're using the magic NSSR value in two places now, provide a
symbolic define for it.
Reported-by: Nilay Shroff
Reviewed-by: Christoph Hellwig
Signed-off-by: Keith Busch
Stable-dep-of: 0edb475ac0a7 ("nvme: fix PCIe subsystem reset controller state transition")
Signed-off-by: Sasha Levin
Signed-off-by: Greg Kroah-Hartman
---
drivers/nvme/host/fabrics.c | 15 +++++++++++++++
drivers/nvme/host/fabrics.h | 1 +
drivers/nvme/host/fc.c | 1 +
drivers/nvme/host/nvme.h | 14 +++-----------
drivers/nvme/host/pci.c | 36 ++++++++++++++++++++++++++++++++++++
drivers/nvme/host/rdma.c | 1 +
drivers/nvme/host/tcp.c | 1 +
include/linux/nvme.h | 3 +++
8 files changed, 61 insertions(+), 11 deletions(-)
--- a/drivers/nvme/host/fabrics.c
+++ b/drivers/nvme/host/fabrics.c
@@ -254,6 +254,21 @@ int nvmf_reg_write32(struct nvme_ctrl *c
}
EXPORT_SYMBOL_GPL(nvmf_reg_write32);
+int nvmf_subsystem_reset(struct nvme_ctrl *ctrl)
+{
+ int ret;
+
+ if (!nvme_wait_reset(ctrl))
+ return -EBUSY;
+
+ ret = ctrl->ops->reg_write32(ctrl, NVME_REG_NSSR, NVME_SUBSYS_RESET);
+ if (ret)
+ return ret;
+
+ return nvme_try_sched_reset(ctrl);
+}
+EXPORT_SYMBOL_GPL(nvmf_subsystem_reset);
+
/**
* nvmf_log_connect_error() - Error-parsing-diagnostic print out function for
* connect() errors.
--- a/drivers/nvme/host/fabrics.h
+++ b/drivers/nvme/host/fabrics.h
@@ -182,6 +182,7 @@ nvmf_ctlr_matches_baseopts(struct nvme_c
int nvmf_reg_read32(struct nvme_ctrl *ctrl, u32 off, u32 *val);
int nvmf_reg_read64(struct nvme_ctrl *ctrl, u32 off, u64 *val);
int nvmf_reg_write32(struct nvme_ctrl *ctrl, u32 off, u32 val);
+int nvmf_subsystem_reset(struct nvme_ctrl *ctrl);
int nvmf_connect_admin_queue(struct nvme_ctrl *ctrl);
int nvmf_connect_io_queue(struct nvme_ctrl *ctrl, u16 qid);
int nvmf_register_transport(struct nvmf_transport_ops *ops);
--- a/drivers/nvme/host/fc.c
+++ b/drivers/nvme/host/fc.c
@@ -3361,6 +3361,7 @@ static const struct nvme_ctrl_ops nvme_f
.reg_read32 = nvmf_reg_read32,
.reg_read64 = nvmf_reg_read64,
.reg_write32 = nvmf_reg_write32,
+ .subsystem_reset = nvmf_subsystem_reset,
.free_ctrl = nvme_fc_free_ctrl,
.submit_async_event = nvme_fc_submit_async_event,
.delete_ctrl = nvme_fc_delete_ctrl,
--- a/drivers/nvme/host/nvme.h
+++ b/drivers/nvme/host/nvme.h
@@ -514,6 +514,7 @@ struct nvme_ctrl_ops {
int (*reg_read64)(struct nvme_ctrl *ctrl, u32 off, u64 *val);
void (*free_ctrl)(struct nvme_ctrl *ctrl);
void (*submit_async_event)(struct nvme_ctrl *ctrl);
+ int (*subsystem_reset)(struct nvme_ctrl *ctrl);
void (*delete_ctrl)(struct nvme_ctrl *ctrl);
void (*stop_ctrl)(struct nvme_ctrl *ctrl);
int (*get_address)(struct nvme_ctrl *ctrl, char *buf, int size);
@@ -583,18 +584,9 @@ int nvme_try_sched_reset(struct nvme_ctr
static inline int nvme_reset_subsystem(struct nvme_ctrl *ctrl)
{
- int ret;
-
- if (!ctrl->subsystem)
+ if (!ctrl->subsystem || !ctrl->ops->subsystem_reset)
return -ENOTTY;
- if (!nvme_wait_reset(ctrl))
- return -EBUSY;
-
- ret = ctrl->ops->reg_write32(ctrl, NVME_REG_NSSR, 0x4E564D65);
- if (ret)
- return ret;
-
- return nvme_try_sched_reset(ctrl);
+ return ctrl->ops->subsystem_reset(ctrl);
}
/*
--- a/drivers/nvme/host/pci.c
+++ b/drivers/nvme/host/pci.c
@@ -1121,6 +1121,41 @@ static void nvme_pci_submit_async_event(
spin_unlock(&nvmeq->sq_lock);
}
+static int nvme_pci_subsystem_reset(struct nvme_ctrl *ctrl)
+{
+ struct nvme_dev *dev = to_nvme_dev(ctrl);
+ int ret = 0;
+
+ /*
+ * Taking the shutdown_lock ensures the BAR mapping is not being
+ * altered by reset_work. Holding this lock before the RESETTING state
+ * change, if successful, also ensures nvme_remove won't be able to
+ * proceed to iounmap until we're done.
+ */
+ mutex_lock(&dev->shutdown_lock);
+ if (!dev->bar_mapped_size) {
+ ret = -ENODEV;
+ goto unlock;
+ }
+
+ if (!nvme_change_ctrl_state(ctrl, NVME_CTRL_RESETTING)) {
+ ret = -EBUSY;
+ goto unlock;
+ }
+
+ writel(NVME_SUBSYS_RESET, dev->bar + NVME_REG_NSSR);
+ nvme_change_ctrl_state(ctrl, NVME_CTRL_LIVE);
+
+ /*
+ * Read controller status to flush the previous write and trigger a
+ * pcie read error.
+ */
+ readl(dev->bar + NVME_REG_CSTS);
+unlock:
+ mutex_unlock(&dev->shutdown_lock);
+ return ret;
+}
+
static int adapter_delete_queue(struct nvme_dev *dev, u8 opcode, u16 id)
{
struct nvme_command c = { };
@@ -2905,6 +2940,7 @@ static const struct nvme_ctrl_ops nvme_p
.reg_read64 = nvme_pci_reg_read64,
.free_ctrl = nvme_pci_free_ctrl,
.submit_async_event = nvme_pci_submit_async_event,
+ .subsystem_reset = nvme_pci_subsystem_reset,
.get_address = nvme_pci_get_address,
};
--- a/drivers/nvme/host/rdma.c
+++ b/drivers/nvme/host/rdma.c
@@ -2287,6 +2287,7 @@ static const struct nvme_ctrl_ops nvme_r
.reg_read32 = nvmf_reg_read32,
.reg_read64 = nvmf_reg_read64,
.reg_write32 = nvmf_reg_write32,
+ .subsystem_reset = nvmf_subsystem_reset,
.free_ctrl = nvme_rdma_free_ctrl,
.submit_async_event = nvme_rdma_submit_async_event,
.delete_ctrl = nvme_rdma_delete_ctrl,
--- a/drivers/nvme/host/tcp.c
+++ b/drivers/nvme/host/tcp.c
@@ -2559,6 +2559,7 @@ static const struct nvme_ctrl_ops nvme_t
.reg_read32 = nvmf_reg_read32,
.reg_read64 = nvmf_reg_read64,
.reg_write32 = nvmf_reg_write32,
+ .subsystem_reset = nvmf_subsystem_reset,
.free_ctrl = nvme_tcp_free_ctrl,
.submit_async_event = nvme_tcp_submit_async_event,
.delete_ctrl = nvme_tcp_delete_ctrl,
--- a/include/linux/nvme.h
+++ b/include/linux/nvme.h
@@ -27,6 +27,9 @@
#define NVME_NSID_ALL 0xffffffff
+/* Special NSSR value, 'NVMe' */
+#define NVME_SUBSYS_RESET 0x4E564D65
+
enum nvme_subsys_type {
NVME_NQN_DISC = 1, /* Discovery type target subsystem */
NVME_NQN_NVME = 2, /* NVME type target subsystem */
From - Wed Feb 04 15:06:47 2026
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path:
Delivered-To: hi@josie.lol
Received: from witcher.mxrouting.net
by witcher.mxrouting.net with LMTP
id KFwpAoNgg2nj7hUAYBR5ng
(envelope-from )
for ; Wed, 04 Feb 2026 15:06:43 +0000
Return-path:
Envelope-to: hi@josie.lol
Delivery-date: Wed, 04 Feb 2026 15:06:43 +0000
Received: from tor.lore.kernel.org ([172.105.105.114])
by witcher.mxrouting.net with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384
(Exim 4.98)
(envelope-from )
id 1vneSo-00000006nWs-2Hdo
for hi@josie.lol;
Wed, 04 Feb 2026 15:06:43 +0000
Received: from smtp.subspace.kernel.org (conduit.subspace.kernel.org [100.90.174.1])
by tor.lore.kernel.org (Postfix) with ESMTP id 17A463033E79
for ; Wed, 4 Feb 2026 15:03:06 +0000 (UTC)
Received: from localhost.localdomain (localhost.localdomain [127.0.0.1])
by smtp.subspace.kernel.org (Postfix) with ESMTP id 171232BD012;
Wed, 4 Feb 2026 15:03:04 +0000 (UTC)
Authentication-Results: smtp.subspace.kernel.org;
dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="VOyT75RC"
X-Original-To: stable@vger.kernel.org
Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by smtp.subspace.kernel.org (Postfix) with ESMTPS id E70EF28853A;
Wed, 4 Feb 2026 15:03:03 +0000 (UTC)
Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201
ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;
t=1770217384; cv=none; b=DAEzw2F1czWUyrH26c/rtI7tdq4pPmWmjBV/czGMc+7EUqGLYDWRqRze1qsJQUOvCj2P+Sy8awLr+a8xDeVaJEPyYZUJ7usiVynfeFSK/IpML0/PkRjhVct1CEy43V7/ymI6HwBa742gFAS/h5FkuW5KHm6DDp4kA4crDq/4jlI=
ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org;
s=arc-20240116; t=1770217384; c=relaxed/simple;
bh=siHnWQ88A6aNOVMjDYXIpFRLAi5z3hE0qIRVjLW0YZo=;
h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:
MIME-Version; b=rtNvvVmbz/tLKPfbKpqFFK22j2Ds0OcXjrgqQd+2mQU7C689r+xxyKSUyMsvz0K7bO+ZrKHtX+FdkBIud7DL+vI4120RDauATxQSZNqUgU+r3OFVrM7B1+4dfR25sxnkwxEjgayS2LGEiYuz/ywblxFMCAZCEIf/XcqMyFlgSDs=
ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=VOyT75RC; arc=none smtp.client-ip=10.30.226.201
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 4168FC4CEF7;
Wed, 4 Feb 2026 15:03:03 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org;
s=korg; t=1770217383;
bh=siHnWQ88A6aNOVMjDYXIpFRLAi5z3hE0qIRVjLW0YZo=;
h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
b=VOyT75RCmtAFQi0MAcyynYbQy+m0MjxsCBKRpErhL2bc5+Xi7zQ25kXn3y3IsAj3o
qsvnvwHSGXLtv1xf1FJ6lE+nU5ivVSJLq2pIHhXHM3K8OrugGcFWL5aqNJzZuPJk4t
z/DwYr7CCsr1AxIHJdkjcPZD2Sb0Zx7MB4RjSPTM=
From: Greg Kroah-Hartman
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman ,
patches@lists.linux.dev,
Pedro Demarchi Gomes ,
David Hildenbrand ,
craftfever ,
Chengming Zhou ,
xu xin ,
Andrew Morton
Subject: [PATCH 5.15 174/206] ksm: use range-walk function to jump over holes in scan_get_next_rmap_item
Date: Wed, 4 Feb 2026 15:40:05 +0100
Message-ID: <20260204143904.478616966@linuxfoundation.org>
X-Mailer: git-send-email 2.53.0
In-Reply-To: <20260204143858.193781818@linuxfoundation.org>
References: <20260204143858.193781818@linuxfoundation.org>
User-Agent: quilt/0.69
X-stable: review
X-Patchwork-Hint: ignore
Precedence: bulk
X-Mailing-List: stable@vger.kernel.org
List-Id:
List-Subscribe:
List-Unsubscribe:
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-DKIM: signer='linuxfoundation.org' status='pass' reason=''
DKIMCheck: Server passes DKIM test, 0 Spam score
X-Spam-Score: 0.4 (/)
X-Spam-Report: Spam detection software, running on the system "witcher.mxrouting.net", has
performed the tests listed below against this email.
Information: https://mxroutedocs.com/directadmin/spamfilters/
---
Content analysis details: (0.4 points)
---
pts rule name description
---- ---------------------- -----------------------------------------
0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was
blocked. See
http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
for more information.
[URIs: linuxfoundation.org]
0.0 RCVD_IN_DNSWL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to
DNSWL was blocked. See
http://wiki.apache.org/spamassassin/DnsBlocklists#DnsBlocklists-dnsbl-block
for more information.
[172.105.105.114 listed in list.dnswl.org]
1.5 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level
mail domains are different
0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
valid
-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
author's domain
-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
-1.0 MAILING_LIST_MULTI Multiple indicators imply a widely-seen list
manager
-0.0 DKIMWL_WL_HIGH DKIMwl.org - High trust sender
SpamTally: Final spam score: 4
5.15-stable review patch. If anyone has any objections, please let me know.
------------------
From: Pedro Demarchi Gomes
[ Upstream commit f5548c318d6520d4fa3c5ed6003eeb710763cbc5 ]
Currently, scan_get_next_rmap_item() walks every page address in a VMA to
locate mergeable pages. This becomes highly inefficient when scanning
large virtual memory areas that contain mostly unmapped regions, causing
ksmd to use large amount of cpu without deduplicating much pages.
This patch replaces the per-address lookup with a range walk using
walk_page_range(). The range walker allows KSM to skip over entire
unmapped holes in a VMA, avoiding unnecessary lookups. This problem was
previously discussed in [1].
Consider the following test program which creates a 32 TiB mapping in the
virtual address space but only populates a single page:
/* 32 TiB */
const size_t size = 32ul * 1024 * 1024 * 1024 * 1024;
int main() {
char *area = mmap(NULL, size, PROT_READ | PROT_WRITE,
MAP_NORESERVE | MAP_PRIVATE | MAP_ANON, -1, 0);
if (area == MAP_FAILED) {
perror("mmap() failed\n");
return -1;
}
/* Populate a single page such that we get an anon_vma. */
*area = 0;
/* Enable KSM. */
madvise(area, size, MADV_MERGEABLE);
pause();
return 0;
}
$ ./ksm-sparse &
$ echo 1 > /sys/kernel/mm/ksm/run
Without this patch ksmd uses 100% of the cpu for a long time (more then 1
hour in my test machine) scanning all the 32 TiB virtual address space
that contain only one mapped page. This makes ksmd essentially deadlocked
not able to deduplicate anything of value. With this patch ksmd walks
only the one mapped page and skips the rest of the 32 TiB virtual address
space, making the scan fast using little cpu.
Link: https://lkml.kernel.org/r/20251023035841.41406-1-pedrodemargomes@gmail.com
Link: https://lkml.kernel.org/r/20251022153059.22763-1-pedrodemargomes@gmail.com
Link: https://lore.kernel.org/linux-mm/423de7a3-1c62-4e72-8e79-19a6413e420c@redhat.com/ [1]
Fixes: 31dbd01f3143 ("ksm: Kernel SamePage Merging")
Signed-off-by: Pedro Demarchi Gomes
Co-developed-by: David Hildenbrand
Signed-off-by: David Hildenbrand
Reported-by: craftfever
Closes: https://lkml.kernel.org/r/020cf8de6e773bb78ba7614ef250129f11a63781@murena.io
Suggested-by: David Hildenbrand
Acked-by: David Hildenbrand
Cc: Chengming Zhou
Cc: xu xin
Cc:
Signed-off-by: Andrew Morton
[ change folio to page, replace pmdp_get_lockless with pmd_read_atomic and pmdp_get with
READ_ONCE(*pmdp) ]
Signed-off-by: Pedro Demarchi Gomes
Signed-off-by: Greg Kroah-Hartman
---
mm/ksm.c | 115 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++------
1 file changed, 105 insertions(+), 10 deletions(-)
--- a/mm/ksm.c
+++ b/mm/ksm.c
@@ -38,6 +38,7 @@
#include
#include
#include
+#include
#include
#include "internal.h"
@@ -2214,6 +2215,89 @@ static struct rmap_item *get_next_rmap_i
return rmap_item;
}
+struct ksm_next_page_arg {
+ struct page *page;
+ unsigned long addr;
+};
+
+static int ksm_next_page_pmd_entry(pmd_t *pmdp, unsigned long addr, unsigned long end,
+ struct mm_walk *walk)
+{
+ struct ksm_next_page_arg *private = walk->private;
+ struct vm_area_struct *vma = walk->vma;
+ pte_t *start_ptep = NULL, *ptep, pte;
+ struct mm_struct *mm = walk->mm;
+ struct page *page;
+ spinlock_t *ptl;
+ pmd_t pmd;
+
+ if (ksm_test_exit(mm))
+ return 0;
+
+ cond_resched();
+
+ pmd = pmd_read_atomic(pmdp);
+ if (!pmd_present(pmd))
+ return 0;
+
+ if (IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE) && pmd_leaf(pmd)) {
+ ptl = pmd_lock(mm, pmdp);
+ pmd = READ_ONCE(*pmdp);
+
+ if (!pmd_present(pmd)) {
+ goto not_found_unlock;
+ } else if (pmd_leaf(pmd)) {
+ page = vm_normal_page_pmd(vma, addr, pmd);
+ if (!page)
+ goto not_found_unlock;
+
+ if (is_zone_device_page(page) || !PageAnon(page))
+ goto not_found_unlock;
+
+ page += ((addr & (PMD_SIZE - 1)) >> PAGE_SHIFT);
+ goto found_unlock;
+ }
+ spin_unlock(ptl);
+ }
+
+ start_ptep = pte_offset_map_lock(mm, pmdp, addr, &ptl);
+ if (!start_ptep)
+ return 0;
+
+ for (ptep = start_ptep; addr < end; ptep++, addr += PAGE_SIZE) {
+ pte = ptep_get(ptep);
+
+ if (!pte_present(pte))
+ continue;
+
+ page = vm_normal_page(vma, addr, pte);
+ if (!page)
+ continue;
+
+ if (is_zone_device_page(page) || !PageAnon(page))
+ continue;
+ goto found_unlock;
+ }
+
+not_found_unlock:
+ spin_unlock(ptl);
+ if (start_ptep)
+ pte_unmap(start_ptep);
+ return 0;
+found_unlock:
+ get_page(page);
+ spin_unlock(ptl);
+ if (start_ptep)
+ pte_unmap(start_ptep);
+ private->page = page;
+ private->addr = addr;
+ return 1;
+}
+
+static struct mm_walk_ops ksm_next_page_ops = {
+ .pmd_entry = ksm_next_page_pmd_entry,
+};
+
static struct rmap_item *scan_get_next_rmap_item(struct page **page)
{
struct mm_struct *mm;
@@ -2293,29 +2377,40 @@ next_mm:
ksm_scan.address = vma->vm_end;
while (ksm_scan.address < vma->vm_end) {
+ struct ksm_next_page_arg ksm_next_page_arg;
+ struct page *tmp_page = NULL;
+ int found;
+
if (ksm_test_exit(mm))
break;
- *page = follow_page(vma, ksm_scan.address, FOLL_GET);
- if (IS_ERR_OR_NULL(*page)) {
- ksm_scan.address += PAGE_SIZE;
- cond_resched();
- continue;
+
+ found = walk_page_range_vma(vma, ksm_scan.address,
+ vma->vm_end,
+ &ksm_next_page_ops,
+ &ksm_next_page_arg);
+
+ if (found > 0) {
+ tmp_page = ksm_next_page_arg.page;
+ ksm_scan.address = ksm_next_page_arg.addr;
+ } else {
+ VM_WARN_ON_ONCE(found < 0);
+ ksm_scan.address = vma->vm_end - PAGE_SIZE;
}
- if (PageAnon(*page)) {
- flush_anon_page(vma, *page, ksm_scan.address);
- flush_dcache_page(*page);
+ if (tmp_page) {
+ flush_anon_page(vma, tmp_page, ksm_scan.address);
+ flush_dcache_page(tmp_page);
rmap_item = get_next_rmap_item(slot,
ksm_scan.rmap_list, ksm_scan.address);
if (rmap_item) {
ksm_scan.rmap_list =
&rmap_item->rmap_list;
ksm_scan.address += PAGE_SIZE;
+ *page = tmp_page;
} else
- put_page(*page);
+ put_page(tmp_page);
mmap_read_unlock(mm);
return rmap_item;
}
- put_page(*page);
ksm_scan.address += PAGE_SIZE;
cond_resched();
}
From - Wed Feb 04 15:06:51 2026
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path:
Delivered-To: hi@josie.lol
Received: from witcher.mxrouting.net
by witcher.mxrouting.net with LMTP
id 2G4dBYZgg2nj7hUAYBR5ng
(envelope-from )
for ; Wed, 04 Feb 2026 15:06:46 +0000
Return-path:
Envelope-to: hi@josie.lol
Delivery-date: Wed, 04 Feb 2026 15:06:46 +0000
Received: from sto.lore.kernel.org ([172.232.135.74])
by witcher.mxrouting.net with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384
(Exim 4.98)
(envelope-from )
id 1vneSr-00000006ncm-2sc9
for hi@josie.lol;
Wed, 04 Feb 2026 15:06:46 +0000
Received: from smtp.subspace.kernel.org (conduit.subspace.kernel.org [100.90.174.1])
by sto.lore.kernel.org (Postfix) with ESMTP id 7D3A4302D9DC
for ; Wed, 4 Feb 2026 15:02:30 +0000 (UTC)
Received: from localhost.localdomain (localhost.localdomain [127.0.0.1])
by smtp.subspace.kernel.org (Postfix) with ESMTP id 282992BE7C6;
Wed, 4 Feb 2026 15:02:30 +0000 (UTC)
Authentication-Results: smtp.subspace.kernel.org;
dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="oB7305LG"
X-Original-To: stable@vger.kernel.org
Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by smtp.subspace.kernel.org (Postfix) with ESMTPS id 046E82BE03C;
Wed, 4 Feb 2026 15:02:30 +0000 (UTC)
Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201
ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;
t=1770217350; cv=none; b=Ue9M6ecdREvHlU5UI14SP8DIpvx3zN4iSCFaYoDUQe3VNrzGO0Dpk0Z44GBzkYiTLZPbRAj/dgN2BxvDQvUbi7ugD6j3dL+10pSm7LkXGWRssG1V0c9YgOjtaM82Hms0uni1bWFqt1CijLHB8AiaA2wKis4Y03hqprJ2EEHvFN8=
ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org;
s=arc-20240116; t=1770217350; c=relaxed/simple;
bh=uuKpyF77GyDERDuIIuaeWYB959SaWgDt751+wITbuY0=;
h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:
MIME-Version; b=rT6hdW6meaPiCJq0EM9/aizwzPaB32NBefep2ouwr+KfDDstZE5hxFjhB4SMde5sGN8DeGOXlGxSEOuOohyi1amxj9Nq37re72o6takrtTJa2+o3HCk5iBnX/jn/EScXkiKxUAkDXD6tkd4EgQ+0rpPOIg3cM8//18VlQY2WD0A=
ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=oB7305LG; arc=none smtp.client-ip=10.30.226.201
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3DFE2C19423;
Wed, 4 Feb 2026 15:02:29 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org;
s=korg; t=1770217349;
bh=uuKpyF77GyDERDuIIuaeWYB959SaWgDt751+wITbuY0=;
h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
b=oB7305LG+f5cHnCkfAPNhwdnDfTcX4LChevslIxVEmJrEq5iEKnty0ac+ElsHiYT7
SdtxCT8iovSzqOCK7t/s/imYLpdg46l6o2tBNavLKhi6GdO1Ao8TeposliBnlYueec
MNrJJFG5gSnEQMPKnfBDzDu2J2gCdAqI+onXfg04=
From: Greg Kroah-Hartman
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman ,
patches@lists.linux.dev,
Abel Vesa ,
Bartosz Golaszewski ,
Konrad Dybcio ,
Abel Vesa ,
Linus Walleij