Linux Kernels 6.19.11 and Others Get Stability Updates With Ext4 and Bluetooth Fixes
The latest Linux Kernels 6.19.11, 6.18.21, 6.12.80, and 6.6.131 have dropped for download with a focus on maintenance rather than flashy features. Most of the work in this cycle addresses memory safety bugs and fixes regression issues that annoyed developers and server administrators alike. Readers looking to update should find improved stability for filesystems like ext4 alongside better handling of Bluetooth protocols and DMA engines. The patch series includes many critical fixes for use-after-free vulnerabilities that could crash systems under heavy load.
Filesystem Updates Keep ext4 Safe from Data Loss
The ext4 filesystem received the most attention this cycle, with several patches aimed at preventing corruption during mount operations and block allocation. A revert of a perf jevents commit is included to prevent build failures on arm64 hardware, ensuring that performance monitoring tools compile cleanly without breaking dependent drivers. Extensive work was done on the mballoc subsystem to handle corrupted block groups more gracefully, which prevents errors when writing files on older or remounted filesystems. Users can expect fewer panic messages if the system is unmounted while writeback tasks are active in the background.
One specific fix addresses the potential for infinite loops during directory creation when metadata is inconsistent. The kernel now validates inode bounds more aggressively before accessing extent trees to stop slab-out-of-bounds reads from occurring. A separate change ensures that recently deleted files do not hold stale references that confuse allocation routines during initialization phases. These adjustments make the filesystem behave more predictably in environments where disk space might be tight or fragmentation is high.
Hardware Drivers Gain Memory Safety Patches for DMA Engines
Developers working on embedded systems and hardware acceleration found several critical updates for the dmaengine subsystem, particularly within the Xilinx and Intel drivers. A fix in the xilinx_dma driver addresses reset timeouts that occurred when two channels were active simultaneously due to shared interrupt registers. This change ensures that interrupts are enabled correctly whenever a transfer starts instead of relying solely on probe-time configuration.
The Intel IDXD workqueue driver saw improvements around memory leaks during function level resets and event log handling. By checking for valid event log support before attempting deallocation, the system avoids dereferencing NULL pointers when hardware capabilities are missing. These fixes are important for systems that rely on hardware acceleration for encryption or data movement tasks to remain stable after a reboot.
Bluetooth and Core Subsystems Address Regressions
Networking and Bluetooth stacks received patches to handle scenarios where previous commits caused regressions in stack communication protocols. A fix in the Bluetooth L2CAP layer prevents identifiers from being reused improperly, which stopped certain networks from responding to requests on specific hardware stacks. This resolves connection drops that occurred when multiple links tried to negotiate identifications over a single channel.
Core memory management saw updates to prevent races between page walks and split operations during virtualization setups. The mm subsystem now validates PUD entries before descending into lower page tables to avoid crashes in VM environments running large BARs for DMA mapping. This ensures that NUMA statistics can be read without triggering kernel faults when other threads are accessing memory regions concurrently.
The stable kernel team prioritized these fixes because they address bugs that could cause system hangs or data loss rather than adding new functionality. Users who maintain production servers should apply these updates to minimize downtime caused by subtle races in the kernel scheduler and filesystem layers. Seeing a lot of Rust-related documentation work suggests that the project is maturing its tooling for static analysis in the future, which might reduce similar bugs before they reach this list.
Linux kernel 6.19.11 released
Linux kernel version 6.19.11 is now available:
Full source: https://cdn.kernel.org/pub/linux/kernel/v6.x/linux-6.19.11.tar.xz
Patch: https://cdn.kernel.org/pub/linux/kernel/v6.x/patch-6.19.11.xz
PGP Signature: https://cdn.kernel.org/pub/linux/kernel/v6.x/linux-6.19.11.tar.sign
You can view the summary of the changes at the following URL:
https://git.kernel.org/stable/ds/v6.19.11/v6.19.10
Linux kernel 6.18.21 released
Linux kernel version 6.18.21 is now available:
Full source: https://cdn.kernel.org/pub/linux/kernel/v6.x/linux-6.18.21.tar.xz
Patch: https://cdn.kernel.org/pub/linux/kernel/v6.x/patch-6.18.21.xz
PGP Signature: https://cdn.kernel.org/pub/linux/kernel/v6.x/linux-6.18.21.tar.sign
You can view the summary of the changes at the following URL:
https://git.kernel.org/stable/ds/v6.18.21/v6.18.20
Linux kernel 6.12.80 released
Linux kernel version 6.12.80 is now available:
Full source: https://cdn.kernel.org/pub/linux/kernel/v6.x/linux-6.12.80.tar.xz
Patch: https://cdn.kernel.org/pub/linux/kernel/v6.x/patch-6.12.80.xz
PGP Signature: https://cdn.kernel.org/pub/linux/kernel/v6.x/linux-6.12.80.tar.sign
You can view the summary of the changes at the following URL:
https://git.kernel.org/stable/ds/v6.12.80/v6.12.79
Linux kernel 6.6.131 released
Linux kernel version 6.6.131 is now available:
Full source: https://cdn.kernel.org/pub/linux/kernel/v6.x/linux-6.6.131.tar.xz
Patch: https://cdn.kernel.org/pub/linux/kernel/v6.x/patch-6.6.131.xz
PGP Signature: https://cdn.kernel.org/pub/linux/kernel/v6.x/linux-6.6.131.tar.sign
You can view the summary of the changes at the following URL:
https://git.kernel.org/stable/ds/v6.6.131/v6.6.130
