commit:     fcb330cbe68268dae6f613bba1a7eee0b6e9d286
Author:     Mike Pagano <mpagano <AT> gentoo <DOT> org>
AuthorDate: Thu Sep 19 10:03:21 2019 +0000
Commit:     Mike Pagano <mpagano <AT> gentoo <DOT> org>
CommitDate: Thu Sep 19 10:03:21 2019 +0000
URL:        https://gitweb.gentoo.org/proj/linux-patches.git/commit/?id=fcb330cb

Linux patch 4.14.145

Signed-off-by: Mike Pagano <mpagano <AT> gentoo.org>

 0000_README               |    4 +
 1144_linux-4.14.145.patch | 1345 +++++++++++++++++++++++++++++++++++++++++++++
 2 files changed, 1349 insertions(+)

diff --git a/0000_README b/0000_README
index af1af17..38ce5d6 100644
--- a/0000_README
+++ b/0000_README
@@ -619,6 +619,10 @@ Patch:  1143_linux-4.14.144.patch
 From:   https://www.kernel.org
 Desc:   Linux 4.14.144
 
+Patch:  1144_linux-4.14.145.patch
+From:   https://www.kernel.org
+Desc:   Linux 4.14.145
+
 Patch:  1500_XATTR_USER_PREFIX.patch
 From:   https://bugs.gentoo.org/show_bug.cgi?id=470644
 Desc:   Support for namespace user.pax.* on tmpfs.

diff --git a/1144_linux-4.14.145.patch b/1144_linux-4.14.145.patch
new file mode 100644
index 0000000..33ff4ed
--- /dev/null
+++ b/1144_linux-4.14.145.patch
@@ -0,0 +1,1345 @@
+diff --git a/Makefile b/Makefile
+index 4aa0dfec9b9b..ce521c48b35e 100644
+--- a/Makefile
++++ b/Makefile
+@@ -1,7 +1,7 @@
+ # SPDX-License-Identifier: GPL-2.0
+ VERSION = 4
+ PATCHLEVEL = 14
+-SUBLEVEL = 144
++SUBLEVEL = 145
+ EXTRAVERSION =
+ NAME = Petit Gorille
+ 
+diff --git a/arch/mips/Kconfig b/arch/mips/Kconfig
+index 8d4470f44b74..ae4450e891ab 100644
+--- a/arch/mips/Kconfig
++++ b/arch/mips/Kconfig
+@@ -800,7 +800,6 @@ config SIBYTE_SWARM
+       select SYS_SUPPORTS_HIGHMEM
+       select SYS_SUPPORTS_LITTLE_ENDIAN
+       select ZONE_DMA32 if 64BIT
+-      select SWIOTLB if ARCH_DMA_ADDR_T_64BIT && PCI
+ 
+ config SIBYTE_LITTLESUR
+       bool "Sibyte BCM91250C2-LittleSur"
+@@ -823,7 +822,6 @@ config SIBYTE_SENTOSA
+       select SYS_HAS_CPU_SB1
+       select SYS_SUPPORTS_BIG_ENDIAN
+       select SYS_SUPPORTS_LITTLE_ENDIAN
+-      select SWIOTLB if ARCH_DMA_ADDR_T_64BIT && PCI
+ 
+ config SIBYTE_BIGSUR
+       bool "Sibyte BCM91480B-BigSur"
+@@ -837,7 +835,6 @@ config SIBYTE_BIGSUR
+       select SYS_SUPPORTS_HIGHMEM
+       select SYS_SUPPORTS_LITTLE_ENDIAN
+       select ZONE_DMA32 if 64BIT
+-      select SWIOTLB if ARCH_DMA_ADDR_T_64BIT && PCI
+ 
+ config SNI_RM
+       bool "SNI RM200/300/400"
+diff --git a/arch/mips/include/asm/smp.h b/arch/mips/include/asm/smp.h
+index 9e494f8d9c03..af19d1300a4c 100644
+--- a/arch/mips/include/asm/smp.h
++++ b/arch/mips/include/asm/smp.h
+@@ -25,7 +25,17 @@ extern cpumask_t cpu_sibling_map[];
+ extern cpumask_t cpu_core_map[];
+ extern cpumask_t cpu_foreign_map[];
+ 
+-#define raw_smp_processor_id() (current_thread_info()->cpu)
++static inline int raw_smp_processor_id(void)
++{
++#if defined(__VDSO__)
++      extern int vdso_smp_processor_id(void)
++              __compiletime_error("VDSO should not call smp_processor_id()");
++      return vdso_smp_processor_id();
++#else
++      return current_thread_info()->cpu;
++#endif
++}
++#define raw_smp_processor_id raw_smp_processor_id
+ 
+ /* Map from cpu id to sequential logical cpu number.  This will only
+    not be idempotent when cpus failed to come on-line.        */
+diff --git a/arch/mips/sibyte/common/Makefile 
b/arch/mips/sibyte/common/Makefile
+index 3ef3fb658136..b3d6bf23a662 100644
+--- a/arch/mips/sibyte/common/Makefile
++++ b/arch/mips/sibyte/common/Makefile
+@@ -1,5 +1,4 @@
+ obj-y := cfe.o
+-obj-$(CONFIG_SWIOTLB)                 += dma.o
+ obj-$(CONFIG_SIBYTE_BUS_WATCHER)      += bus_watcher.o
+ obj-$(CONFIG_SIBYTE_CFE_CONSOLE)      += cfe_console.o
+ obj-$(CONFIG_SIBYTE_TBPROF)           += sb_tbprof.o
+diff --git a/arch/mips/sibyte/common/dma.c b/arch/mips/sibyte/common/dma.c
+deleted file mode 100644
+index eb47a94f3583..000000000000
+--- a/arch/mips/sibyte/common/dma.c
++++ /dev/null
+@@ -1,14 +0,0 @@
+-// SPDX-License-Identifier: GPL-2.0+
+-/*
+- *    DMA support for Broadcom SiByte platforms.
+- *
+- *    Copyright (c) 2018  Maciej W. Rozycki
+- */
+-
+-#include <linux/swiotlb.h>
+-#include <asm/bootinfo.h>
+-
+-void __init plat_swiotlb_setup(void)
+-{
+-      swiotlb_init(1);
+-}
+diff --git a/arch/mips/vdso/Makefile b/arch/mips/vdso/Makefile
+index d1a60690e690..0f455fdf822a 100644
+--- a/arch/mips/vdso/Makefile
++++ b/arch/mips/vdso/Makefile
+@@ -7,7 +7,9 @@ ccflags-vdso := \
+       $(filter -I%,$(KBUILD_CFLAGS)) \
+       $(filter -E%,$(KBUILD_CFLAGS)) \
+       $(filter -mmicromips,$(KBUILD_CFLAGS)) \
+-      $(filter -march=%,$(KBUILD_CFLAGS))
++      $(filter -march=%,$(KBUILD_CFLAGS)) \
++      $(filter -m%-float,$(KBUILD_CFLAGS)) \
++      -D__VDSO__
+ cflags-vdso := $(ccflags-vdso) \
+       $(filter -W%,$(filter-out -Wa$(comma)%,$(KBUILD_CFLAGS))) \
+       -O2 -g -fPIC -fno-strict-aliasing -fno-common -fno-builtin -G 0 \
+diff --git a/arch/powerpc/include/asm/uaccess.h 
b/arch/powerpc/include/asm/uaccess.h
+index bd6d0fb5be9f..51f00c00d7e4 100644
+--- a/arch/powerpc/include/asm/uaccess.h
++++ b/arch/powerpc/include/asm/uaccess.h
+@@ -280,6 +280,7 @@ extern unsigned long __copy_tofrom_user(void __user *to,
+ static inline unsigned long
+ raw_copy_in_user(void __user *to, const void __user *from, unsigned long n)
+ {
++      barrier_nospec();
+       return __copy_tofrom_user(to, from, n);
+ }
+ #endif /* __powerpc64__ */
+diff --git a/arch/s390/kvm/interrupt.c b/arch/s390/kvm/interrupt.c
+index 5185be314661..28f3796d23c8 100644
+--- a/arch/s390/kvm/interrupt.c
++++ b/arch/s390/kvm/interrupt.c
+@@ -1701,6 +1701,16 @@ int s390int_to_s390irq(struct kvm_s390_interrupt 
*s390int,
+       case KVM_S390_MCHK:
+               irq->u.mchk.mcic = s390int->parm64;
+               break;
++      case KVM_S390_INT_PFAULT_INIT:
++              irq->u.ext.ext_params = s390int->parm;
++              irq->u.ext.ext_params2 = s390int->parm64;
++              break;
++      case KVM_S390_RESTART:
++      case KVM_S390_INT_CLOCK_COMP:
++      case KVM_S390_INT_CPU_TIMER:
++              break;
++      default:
++              return -EINVAL;
+       }
+       return 0;
+ }
+diff --git a/arch/s390/kvm/kvm-s390.c b/arch/s390/kvm/kvm-s390.c
+index 70a446ec347d..a27fb640adbe 100644
+--- a/arch/s390/kvm/kvm-s390.c
++++ b/arch/s390/kvm/kvm-s390.c
+@@ -3730,7 +3730,7 @@ long kvm_arch_vcpu_ioctl(struct file *filp,
+       }
+       case KVM_S390_INTERRUPT: {
+               struct kvm_s390_interrupt s390int;
+-              struct kvm_s390_irq s390irq;
++              struct kvm_s390_irq s390irq = {};
+ 
+               r = -EFAULT;
+               if (copy_from_user(&s390int, argp, sizeof(s390int)))
+diff --git a/arch/x86/Makefile b/arch/x86/Makefile
+index b4c72da8a7ad..cd596ca60901 100644
+--- a/arch/x86/Makefile
++++ b/arch/x86/Makefile
+@@ -39,6 +39,7 @@ REALMODE_CFLAGS      := $(M16_CFLAGS) -g -Os -D__KERNEL__ \
+ 
+ REALMODE_CFLAGS += $(call __cc-option, $(CC), $(REALMODE_CFLAGS), 
-ffreestanding)
+ REALMODE_CFLAGS += $(call __cc-option, $(CC), $(REALMODE_CFLAGS), 
-fno-stack-protector)
++REALMODE_CFLAGS += $(call __cc-option, $(CC), $(REALMODE_CFLAGS), 
-Wno-address-of-packed-member)
+ REALMODE_CFLAGS += $(call __cc-option, $(CC), $(REALMODE_CFLAGS), 
$(cc_stack_align4))
+ export REALMODE_CFLAGS
+ 
+diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
+index f467d85b0352..a5a77a19adf6 100644
+--- a/arch/x86/kvm/vmx.c
++++ b/arch/x86/kvm/vmx.c
+@@ -7996,6 +7996,7 @@ static int handle_vmread(struct kvm_vcpu *vcpu)
+       unsigned long exit_qualification = vmcs_readl(EXIT_QUALIFICATION);
+       u32 vmx_instruction_info = vmcs_read32(VMX_INSTRUCTION_INFO);
+       gva_t gva = 0;
++      struct x86_exception e;
+ 
+       if (!nested_vmx_check_permission(vcpu))
+               return 1;
+@@ -8023,8 +8024,10 @@ static int handle_vmread(struct kvm_vcpu *vcpu)
+                               vmx_instruction_info, true, &gva))
+                       return 1;
+               /* _system ok, nested_vmx_check_permission has verified cpl=0 */
+-              kvm_write_guest_virt_system(vcpu, gva, &field_value,
+-                                          (is_long_mode(vcpu) ? 8 : 4), NULL);
++              if (kvm_write_guest_virt_system(vcpu, gva, &field_value,
++                                              (is_long_mode(vcpu) ? 8 : 4),
++                                              NULL))
++                      kvm_inject_page_fault(vcpu, &e);
+       }
+ 
+       nested_vmx_succeed(vcpu);
+diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
+index c502f2e106db..def9c844c322 100644
+--- a/arch/x86/kvm/x86.c
++++ b/arch/x86/kvm/x86.c
+@@ -4721,6 +4721,13 @@ int kvm_write_guest_virt_system(struct kvm_vcpu *vcpu, 
gva_t addr, void *val,
+       /* kvm_write_guest_virt_system can pull in tons of pages. */
+       vcpu->arch.l1tf_flush_l1d = true;
+ 
++      /*
++       * FIXME: this should call handle_emulation_failure if X86EMUL_IO_NEEDED
++       * is returned, but our callers are not ready for that and they blindly
++       * call kvm_inject_page_fault.  Ensure that they at least do not leak
++       * uninitialized kernel stack memory into cr2 and error code.
++       */
++      memset(exception, 0, sizeof(*exception));
+       return kvm_write_guest_virt_helper(addr, val, bytes, vcpu,
+                                          PFERR_WRITE_MASK, exception);
+ }
+diff --git a/drivers/base/core.c b/drivers/base/core.c
+index 1c67bf24bc23..2ec9af90cd28 100644
+--- a/drivers/base/core.c
++++ b/drivers/base/core.c
+@@ -1572,12 +1572,63 @@ static inline struct kobject *get_glue_dir(struct 
device *dev)
+  */
+ static void cleanup_glue_dir(struct device *dev, struct kobject *glue_dir)
+ {
++      unsigned int ref;
++
+       /* see if we live in a "glue" directory */
+       if (!live_in_glue_dir(glue_dir, dev))
+               return;
+ 
+       mutex_lock(&gdp_mutex);
+-      if (!kobject_has_children(glue_dir))
++      /**
++       * There is a race condition between removing glue directory
++       * and adding a new device under the glue directory.
++       *
++       * CPU1:                                         CPU2:
++       *
++       * device_add()
++       *   get_device_parent()
++       *     class_dir_create_and_add()
++       *       kobject_add_internal()
++       *         create_dir()    // create glue_dir
++       *
++       *                                               device_add()
++       *                                                 get_device_parent()
++       *                                                   kobject_get() // 
get glue_dir
++       *
++       * device_del()
++       *   cleanup_glue_dir()
++       *     kobject_del(glue_dir)
++       *
++       *                                               kobject_add()
++       *                                                 
kobject_add_internal()
++       *                                                   create_dir() // in 
glue_dir
++       *                                                     
sysfs_create_dir_ns()
++       *                                                       
kernfs_create_dir_ns(sd)
++       *
++       *       sysfs_remove_dir() // glue_dir->sd=NULL
++       *       sysfs_put()        // free glue_dir->sd
++       *
++       *                                                         // sd is 
freed
++       *                                                         
kernfs_new_node(sd)
++       *                                                           
kernfs_get(glue_dir)
++       *                                                           
kernfs_add_one()
++       *                                                           
kernfs_put()
++       *
++       * Before CPU1 remove last child device under glue dir, if CPU2 add
++       * a new device under glue dir, the glue_dir kobject reference count
++       * will be increase to 2 in kobject_get(k). And CPU2 has been called
++       * kernfs_create_dir_ns(). Meanwhile, CPU1 call sysfs_remove_dir()
++       * and sysfs_put(). This result in glue_dir->sd is freed.
++       *
++       * Then the CPU2 will see a stale "empty" but still potentially used
++       * glue dir around in kernfs_new_node().
++       *
++       * In order to avoid this happening, we also should make sure that
++       * kernfs_node for glue_dir is released in CPU1 only when refcount
++       * for glue_dir kobj is 1.
++       */
++      ref = kref_read(&glue_dir->kref);
++      if (!kobject_has_children(glue_dir) && !--ref)
+               kobject_del(glue_dir);
+       kobject_put(glue_dir);
+       mutex_unlock(&gdp_mutex);
+diff --git a/drivers/bluetooth/btusb.c b/drivers/bluetooth/btusb.c
+index dae8723dde8c..7b5a06b27746 100644
+--- a/drivers/bluetooth/btusb.c
++++ b/drivers/bluetooth/btusb.c
+@@ -1124,10 +1124,6 @@ static int btusb_open(struct hci_dev *hdev)
+       }
+ 
+       data->intf->needs_remote_wakeup = 1;
+-      /* device specific wakeup source enabled and required for USB
+-       * remote wakeup while host is suspended
+-       */
+-      device_wakeup_enable(&data->udev->dev);
+ 
+       if (test_and_set_bit(BTUSB_INTR_RUNNING, &data->flags))
+               goto done;
+@@ -1191,7 +1187,6 @@ static int btusb_close(struct hci_dev *hdev)
+               goto failed;
+ 
+       data->intf->needs_remote_wakeup = 0;
+-      device_wakeup_disable(&data->udev->dev);
+       usb_autopm_put_interface(data->intf);
+ 
+ failed:
+diff --git a/drivers/clk/rockchip/clk-mmc-phase.c 
b/drivers/clk/rockchip/clk-mmc-phase.c
+index fe7d9ed1d436..b0a18bc1a27f 100644
+--- a/drivers/clk/rockchip/clk-mmc-phase.c
++++ b/drivers/clk/rockchip/clk-mmc-phase.c
+@@ -59,10 +59,8 @@ static int rockchip_mmc_get_phase(struct clk_hw *hw)
+       u32 delay_num = 0;
+ 
+       /* See the comment for rockchip_mmc_set_phase below */
+-      if (!rate) {
+-              pr_err("%s: invalid clk rate\n", __func__);
++      if (!rate)
+               return -EINVAL;
+-      }
+ 
+       raw_value = readl(mmc_clock->reg) >> (mmc_clock->shift);
+ 
+diff --git a/drivers/crypto/talitos.c b/drivers/crypto/talitos.c
+index a0cd4f6085d0..3465a440ca02 100644
+--- a/drivers/crypto/talitos.c
++++ b/drivers/crypto/talitos.c
+@@ -943,11 +943,13 @@ static void talitos_sg_unmap(struct device *dev,
+ 
+ static void ipsec_esp_unmap(struct device *dev,
+                           struct talitos_edesc *edesc,
+-                          struct aead_request *areq)
++                          struct aead_request *areq, bool encrypt)
+ {
+       struct crypto_aead *aead = crypto_aead_reqtfm(areq);
+       struct talitos_ctx *ctx = crypto_aead_ctx(aead);
+       unsigned int ivsize = crypto_aead_ivsize(aead);
++      unsigned int authsize = crypto_aead_authsize(aead);
++      unsigned int cryptlen = areq->cryptlen - (encrypt ? 0 : authsize);
+ 
+       if (edesc->desc.hdr & DESC_HDR_TYPE_IPSEC_ESP)
+               unmap_single_talitos_ptr(dev, &edesc->desc.ptr[6],
+@@ -956,7 +958,7 @@ static void ipsec_esp_unmap(struct device *dev,
+       unmap_single_talitos_ptr(dev, &edesc->desc.ptr[2], DMA_TO_DEVICE);
+       unmap_single_talitos_ptr(dev, &edesc->desc.ptr[0], DMA_TO_DEVICE);
+ 
+-      talitos_sg_unmap(dev, edesc, areq->src, areq->dst, areq->cryptlen,
++      talitos_sg_unmap(dev, edesc, areq->src, areq->dst, cryptlen,
+                        areq->assoclen);
+ 
+       if (edesc->dma_len)
+@@ -967,7 +969,7 @@ static void ipsec_esp_unmap(struct device *dev,
+               unsigned int dst_nents = edesc->dst_nents ? : 1;
+ 
+               sg_pcopy_to_buffer(areq->dst, dst_nents, ctx->iv, ivsize,
+-                                 areq->assoclen + areq->cryptlen - ivsize);
++                                 areq->assoclen + cryptlen - ivsize);
+       }
+ }
+ 
+@@ -988,7 +990,7 @@ static void ipsec_esp_encrypt_done(struct device *dev,
+ 
+       edesc = container_of(desc, struct talitos_edesc, desc);
+ 
+-      ipsec_esp_unmap(dev, edesc, areq);
++      ipsec_esp_unmap(dev, edesc, areq, true);
+ 
+       /* copy the generated ICV to dst */
+       if (edesc->icv_ool) {
+@@ -1020,7 +1022,7 @@ static void ipsec_esp_decrypt_swauth_done(struct device 
*dev,
+ 
+       edesc = container_of(desc, struct talitos_edesc, desc);
+ 
+-      ipsec_esp_unmap(dev, edesc, req);
++      ipsec_esp_unmap(dev, edesc, req, false);
+ 
+       if (!err) {
+               char icvdata[SHA512_DIGEST_SIZE];
+@@ -1066,7 +1068,7 @@ static void ipsec_esp_decrypt_hwauth_done(struct device 
*dev,
+ 
+       edesc = container_of(desc, struct talitos_edesc, desc);
+ 
+-      ipsec_esp_unmap(dev, edesc, req);
++      ipsec_esp_unmap(dev, edesc, req, false);
+ 
+       /* check ICV auth status */
+       if (!err && ((desc->hdr_lo & DESC_HDR_LO_ICCR1_MASK) !=
+@@ -1173,6 +1175,7 @@ static int talitos_sg_map(struct device *dev, struct 
scatterlist *src,
+  * fill in and submit ipsec_esp descriptor
+  */
+ static int ipsec_esp(struct talitos_edesc *edesc, struct aead_request *areq,
++                   bool encrypt,
+                    void (*callback)(struct device *dev,
+                                     struct talitos_desc *desc,
+                                     void *context, int error))
+@@ -1182,7 +1185,7 @@ static int ipsec_esp(struct talitos_edesc *edesc, struct 
aead_request *areq,
+       struct talitos_ctx *ctx = crypto_aead_ctx(aead);
+       struct device *dev = ctx->dev;
+       struct talitos_desc *desc = &edesc->desc;
+-      unsigned int cryptlen = areq->cryptlen;
++      unsigned int cryptlen = areq->cryptlen - (encrypt ? 0 : authsize);
+       unsigned int ivsize = crypto_aead_ivsize(aead);
+       int tbl_off = 0;
+       int sg_count, ret;
+@@ -1324,7 +1327,7 @@ static int ipsec_esp(struct talitos_edesc *edesc, struct 
aead_request *areq,
+ 
+       ret = talitos_submit(dev, ctx->ch, desc, callback, areq);
+       if (ret != -EINPROGRESS) {
+-              ipsec_esp_unmap(dev, edesc, areq);
++              ipsec_esp_unmap(dev, edesc, areq, encrypt);
+               kfree(edesc);
+       }
+       return ret;
+@@ -1433,9 +1436,10 @@ static struct talitos_edesc *aead_edesc_alloc(struct 
aead_request *areq, u8 *iv,
+       unsigned int authsize = crypto_aead_authsize(authenc);
+       struct talitos_ctx *ctx = crypto_aead_ctx(authenc);
+       unsigned int ivsize = crypto_aead_ivsize(authenc);
++      unsigned int cryptlen = areq->cryptlen - (encrypt ? 0 : authsize);
+ 
+       return talitos_edesc_alloc(ctx->dev, areq->src, areq->dst,
+-                                 iv, areq->assoclen, areq->cryptlen,
++                                 iv, areq->assoclen, cryptlen,
+                                  authsize, ivsize, icv_stashing,
+                                  areq->base.flags, encrypt);
+ }
+@@ -1454,7 +1458,7 @@ static int aead_encrypt(struct aead_request *req)
+       /* set encrypt */
+       edesc->desc.hdr = ctx->desc_hdr_template | DESC_HDR_MODE0_ENCRYPT;
+ 
+-      return ipsec_esp(edesc, req, ipsec_esp_encrypt_done);
++      return ipsec_esp(edesc, req, true, ipsec_esp_encrypt_done);
+ }
+ 
+ static int aead_decrypt(struct aead_request *req)
+@@ -1466,14 +1470,13 @@ static int aead_decrypt(struct aead_request *req)
+       struct talitos_edesc *edesc;
+       void *icvdata;
+ 
+-      req->cryptlen -= authsize;
+-
+       /* allocate extended descriptor */
+       edesc = aead_edesc_alloc(req, req->iv, 1, false);
+       if (IS_ERR(edesc))
+               return PTR_ERR(edesc);
+ 
+-      if ((priv->features & TALITOS_FTR_HW_AUTH_CHECK) &&
++      if ((edesc->desc.hdr & DESC_HDR_TYPE_IPSEC_ESP) &&
++          (priv->features & TALITOS_FTR_HW_AUTH_CHECK) &&
+           ((!edesc->src_nents && !edesc->dst_nents) ||
+            priv->features & TALITOS_FTR_SRC_LINK_TBL_LEN_INCLUDES_EXTENT)) {
+ 
+@@ -1485,7 +1488,8 @@ static int aead_decrypt(struct aead_request *req)
+               /* reset integrity check result bits */
+               edesc->desc.hdr_lo = 0;
+ 
+-              return ipsec_esp(edesc, req, ipsec_esp_decrypt_hwauth_done);
++              return ipsec_esp(edesc, req, false,
++                               ipsec_esp_decrypt_hwauth_done);
+       }
+ 
+       /* Have to check the ICV with software */
+@@ -1501,7 +1505,7 @@ static int aead_decrypt(struct aead_request *req)
+       sg_pcopy_to_buffer(req->src, edesc->src_nents ? : 1, icvdata, authsize,
+                          req->assoclen + req->cryptlen - authsize);
+ 
+-      return ipsec_esp(edesc, req, ipsec_esp_decrypt_swauth_done);
++      return ipsec_esp(edesc, req, false, ipsec_esp_decrypt_swauth_done);
+ }
+ 
+ static int ablkcipher_setkey(struct crypto_ablkcipher *cipher,
+@@ -1528,6 +1532,18 @@ static int ablkcipher_setkey(struct crypto_ablkcipher 
*cipher,
+       return 0;
+ }
+ 
++static int ablkcipher_aes_setkey(struct crypto_ablkcipher *cipher,
++                                const u8 *key, unsigned int keylen)
++{
++      if (keylen == AES_KEYSIZE_128 || keylen == AES_KEYSIZE_192 ||
++          keylen == AES_KEYSIZE_256)
++              return ablkcipher_setkey(cipher, key, keylen);
++
++      crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN);
++
++      return -EINVAL;
++}
++
+ static void common_nonsnoop_unmap(struct device *dev,
+                                 struct talitos_edesc *edesc,
+                                 struct ablkcipher_request *areq)
+@@ -1656,6 +1672,14 @@ static int ablkcipher_encrypt(struct ablkcipher_request 
*areq)
+       struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq);
+       struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher);
+       struct talitos_edesc *edesc;
++      unsigned int blocksize =
++                      crypto_tfm_alg_blocksize(crypto_ablkcipher_tfm(cipher));
++
++      if (!areq->nbytes)
++              return 0;
++
++      if (areq->nbytes % blocksize)
++              return -EINVAL;
+ 
+       /* allocate extended descriptor */
+       edesc = ablkcipher_edesc_alloc(areq, true);
+@@ -1673,6 +1697,14 @@ static int ablkcipher_decrypt(struct ablkcipher_request 
*areq)
+       struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq);
+       struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher);
+       struct talitos_edesc *edesc;
++      unsigned int blocksize =
++                      crypto_tfm_alg_blocksize(crypto_ablkcipher_tfm(cipher));
++
++      if (!areq->nbytes)
++              return 0;
++
++      if (areq->nbytes % blocksize)
++              return -EINVAL;
+ 
+       /* allocate extended descriptor */
+       edesc = ablkcipher_edesc_alloc(areq, false);
+@@ -2621,6 +2653,7 @@ static struct talitos_alg_template driver_algs[] = {
+                               .min_keysize = AES_MIN_KEY_SIZE,
+                               .max_keysize = AES_MAX_KEY_SIZE,
+                               .ivsize = AES_BLOCK_SIZE,
++                              .setkey = ablkcipher_aes_setkey,
+                       }
+               },
+               .desc_hdr_template = DESC_HDR_TYPE_COMMON_NONSNOOP_NO_AFEU |
+@@ -2631,13 +2664,13 @@ static struct talitos_alg_template driver_algs[] = {
+               .alg.crypto = {
+                       .cra_name = "ctr(aes)",
+                       .cra_driver_name = "ctr-aes-talitos",
+-                      .cra_blocksize = AES_BLOCK_SIZE,
++                      .cra_blocksize = 1,
+                       .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER |
+                                    CRYPTO_ALG_ASYNC,
+                       .cra_ablkcipher = {
+                               .min_keysize = AES_MIN_KEY_SIZE,
+                               .max_keysize = AES_MAX_KEY_SIZE,
+-                              .ivsize = AES_BLOCK_SIZE,
++                              .setkey = ablkcipher_aes_setkey,
+                       }
+               },
+               .desc_hdr_template = DESC_HDR_TYPE_AESU_CTR_NONSNOOP |
+diff --git a/drivers/firmware/ti_sci.c b/drivers/firmware/ti_sci.c
+index 00cfed3c3e1a..1620722115cd 100644
+--- a/drivers/firmware/ti_sci.c
++++ b/drivers/firmware/ti_sci.c
+@@ -471,9 +471,9 @@ static int ti_sci_cmd_get_revision(struct ti_sci_info 
*info)
+       struct ti_sci_xfer *xfer;
+       int ret;
+ 
+-      /* No need to setup flags since it is expected to respond */
+       xfer = ti_sci_get_one_xfer(info, TI_SCI_MSG_VERSION,
+-                                 0x0, sizeof(struct ti_sci_msg_hdr),
++                                 TI_SCI_FLAG_REQ_ACK_ON_PROCESSED,
++                                 sizeof(struct ti_sci_msg_hdr),
+                                  sizeof(*rev_info));
+       if (IS_ERR(xfer)) {
+               ret = PTR_ERR(xfer);
+@@ -601,9 +601,9 @@ static int ti_sci_get_device_state(const struct 
ti_sci_handle *handle,
+       info = handle_to_ti_sci_info(handle);
+       dev = info->dev;
+ 
+-      /* Response is expected, so need of any flags */
+       xfer = ti_sci_get_one_xfer(info, TI_SCI_MSG_GET_DEVICE_STATE,
+-                                 0, sizeof(*req), sizeof(*resp));
++                                 TI_SCI_FLAG_REQ_ACK_ON_PROCESSED,
++                                 sizeof(*req), sizeof(*resp));
+       if (IS_ERR(xfer)) {
+               ret = PTR_ERR(xfer);
+               dev_err(dev, "Message alloc failed(%d)\n", ret);
+diff --git a/drivers/gpio/gpiolib-acpi.c b/drivers/gpio/gpiolib-acpi.c
+index 57d157e94bd6..715babaa886a 100644
+--- a/drivers/gpio/gpiolib-acpi.c
++++ b/drivers/gpio/gpiolib-acpi.c
+@@ -10,6 +10,7 @@
+  * published by the Free Software Foundation.
+  */
+ 
++#include <linux/dmi.h>
+ #include <linux/errno.h>
+ #include <linux/gpio.h>
+ #include <linux/gpio/consumer.h>
+@@ -23,6 +24,11 @@
+ 
+ #include "gpiolib.h"
+ 
++static int run_edge_events_on_boot = -1;
++module_param(run_edge_events_on_boot, int, 0444);
++MODULE_PARM_DESC(run_edge_events_on_boot,
++               "Run edge _AEI event-handlers at boot: 0=no, 1=yes, -1=auto");
++
+ /**
+  * struct acpi_gpio_event - ACPI GPIO event handler data
+  *
+@@ -231,10 +237,13 @@ static void acpi_gpiochip_request_irq(struct 
acpi_gpio_chip *acpi_gpio,
+       event->irq_requested = true;
+ 
+       /* Make sure we trigger the initial state of edge-triggered IRQs */
+-      value = gpiod_get_raw_value_cansleep(event->desc);
+-      if (((event->irqflags & IRQF_TRIGGER_RISING) && value == 1) ||
+-          ((event->irqflags & IRQF_TRIGGER_FALLING) && value == 0))
+-              event->handler(event->irq, event);
++      if (run_edge_events_on_boot &&
++          (event->irqflags & (IRQF_TRIGGER_RISING | IRQF_TRIGGER_FALLING))) {
++              value = gpiod_get_raw_value_cansleep(event->desc);
++              if (((event->irqflags & IRQF_TRIGGER_RISING) && value == 1) ||
++                  ((event->irqflags & IRQF_TRIGGER_FALLING) && value == 0))
++                      event->handler(event->irq, event);
++      }
+ }
+ 
+ static void acpi_gpiochip_request_irqs(struct acpi_gpio_chip *acpi_gpio)
+@@ -1302,3 +1311,28 @@ static int acpi_gpio_handle_deferred_request_irqs(void)
+ }
+ /* We must use _sync so that this runs after the first deferred_probe run */
+ late_initcall_sync(acpi_gpio_handle_deferred_request_irqs);
++
++static const struct dmi_system_id run_edge_events_on_boot_blacklist[] = {
++      {
++              .matches = {
++                      DMI_MATCH(DMI_SYS_VENDOR, "MINIX"),
++                      DMI_MATCH(DMI_PRODUCT_NAME, "Z83-4"),
++              }
++      },
++      {} /* Terminating entry */
++};
++
++static int acpi_gpio_setup_params(void)
++{
++      if (run_edge_events_on_boot < 0) {
++              if (dmi_check_system(run_edge_events_on_boot_blacklist))
++                      run_edge_events_on_boot = 0;
++              else
++                      run_edge_events_on_boot = 1;
++      }
++
++      return 0;
++}
++
++/* Directly after dmi_setup() which runs as core_initcall() */
++postcore_initcall(acpi_gpio_setup_params);
+diff --git a/drivers/gpio/gpiolib.c b/drivers/gpio/gpiolib.c
+index 562e90bf73c9..f1809a54fcee 100644
+--- a/drivers/gpio/gpiolib.c
++++ b/drivers/gpio/gpiolib.c
+@@ -444,12 +444,23 @@ static int linehandle_create(struct gpio_device *gdev, 
void __user *ip)
+       struct linehandle_state *lh;
+       struct file *file;
+       int fd, i, count = 0, ret;
++      u32 lflags;
+ 
+       if (copy_from_user(&handlereq, ip, sizeof(handlereq)))
+               return -EFAULT;
+       if ((handlereq.lines == 0) || (handlereq.lines > GPIOHANDLES_MAX))
+               return -EINVAL;
+ 
++      lflags = handlereq.flags;
++
++      /*
++       * Do not allow both INPUT & OUTPUT flags to be set as they are
++       * contradictory.
++       */
++      if ((lflags & GPIOHANDLE_REQUEST_INPUT) &&
++          (lflags & GPIOHANDLE_REQUEST_OUTPUT))
++              return -EINVAL;
++
+       lh = kzalloc(sizeof(*lh), GFP_KERNEL);
+       if (!lh)
+               return -ENOMEM;
+@@ -470,7 +481,6 @@ static int linehandle_create(struct gpio_device *gdev, 
void __user *ip)
+       /* Request each GPIO */
+       for (i = 0; i < handlereq.lines; i++) {
+               u32 offset = handlereq.lineoffsets[i];
+-              u32 lflags = handlereq.flags;
+               struct gpio_desc *desc;
+ 
+               if (offset >= gdev->ngpio) {
+@@ -805,7 +815,9 @@ static int lineevent_create(struct gpio_device *gdev, void 
__user *ip)
+       }
+ 
+       /* This is just wrong: we don't look for events on output lines */
+-      if (lflags & GPIOHANDLE_REQUEST_OUTPUT) {
++      if ((lflags & GPIOHANDLE_REQUEST_OUTPUT) ||
++          (lflags & GPIOHANDLE_REQUEST_OPEN_DRAIN) ||
++          (lflags & GPIOHANDLE_REQUEST_OPEN_SOURCE)) {
+               ret = -EINVAL;
+               goto out_free_label;
+       }
+@@ -819,10 +831,6 @@ static int lineevent_create(struct gpio_device *gdev, 
void __user *ip)
+ 
+       if (lflags & GPIOHANDLE_REQUEST_ACTIVE_LOW)
+               set_bit(FLAG_ACTIVE_LOW, &desc->flags);
+-      if (lflags & GPIOHANDLE_REQUEST_OPEN_DRAIN)
+-              set_bit(FLAG_OPEN_DRAIN, &desc->flags);
+-      if (lflags & GPIOHANDLE_REQUEST_OPEN_SOURCE)
+-              set_bit(FLAG_OPEN_SOURCE, &desc->flags);
+ 
+       ret = gpiod_direction_input(desc);
+       if (ret)
+diff --git a/drivers/gpu/drm/mediatek/mtk_drm_drv.c 
b/drivers/gpu/drm/mediatek/mtk_drm_drv.c
+index 034b50080304..670662128edd 100644
+--- a/drivers/gpu/drm/mediatek/mtk_drm_drv.c
++++ b/drivers/gpu/drm/mediatek/mtk_drm_drv.c
+@@ -504,12 +504,15 @@ static int mtk_drm_probe(struct platform_device *pdev)
+                       comp = devm_kzalloc(dev, sizeof(*comp), GFP_KERNEL);
+                       if (!comp) {
+                               ret = -ENOMEM;
++                              of_node_put(node);
+                               goto err_node;
+                       }
+ 
+                       ret = mtk_ddp_comp_init(dev, node, comp, comp_id, NULL);
+-                      if (ret)
++                      if (ret) {
++                              of_node_put(node);
+                               goto err_node;
++                      }
+ 
+                       private->ddp_comp[comp_id] = comp;
+               }
+diff --git a/drivers/gpu/drm/meson/meson_plane.c 
b/drivers/gpu/drm/meson/meson_plane.c
+index 0b6011b8d632..85fa39e2be34 100644
+--- a/drivers/gpu/drm/meson/meson_plane.c
++++ b/drivers/gpu/drm/meson/meson_plane.c
+@@ -124,6 +124,13 @@ static void meson_plane_atomic_update(struct drm_plane 
*plane,
+               priv->viu.osd1_blk0_cfg[0] |= OSD_BLK_MODE_32 |
+                                             OSD_COLOR_MATRIX_32_ARGB;
+               break;
++      case DRM_FORMAT_XBGR8888:
++              /* For XRGB, replace the pixel's alpha by 0xFF */
++              writel_bits_relaxed(OSD_REPLACE_EN, OSD_REPLACE_EN,
++                                  priv->io_base + _REG(VIU_OSD1_CTRL_STAT2));
++              priv->viu.osd1_blk0_cfg[0] |= OSD_BLK_MODE_32 |
++                                            OSD_COLOR_MATRIX_32_ABGR;
++              break;
+       case DRM_FORMAT_ARGB8888:
+               /* For ARGB, use the pixel's alpha */
+               writel_bits_relaxed(OSD_REPLACE_EN, 0,
+@@ -131,6 +138,13 @@ static void meson_plane_atomic_update(struct drm_plane 
*plane,
+               priv->viu.osd1_blk0_cfg[0] |= OSD_BLK_MODE_32 |
+                                             OSD_COLOR_MATRIX_32_ARGB;
+               break;
++      case DRM_FORMAT_ABGR8888:
++              /* For ARGB, use the pixel's alpha */
++              writel_bits_relaxed(OSD_REPLACE_EN, 0,
++                                  priv->io_base + _REG(VIU_OSD1_CTRL_STAT2));
++              priv->viu.osd1_blk0_cfg[0] |= OSD_BLK_MODE_32 |
++                                            OSD_COLOR_MATRIX_32_ABGR;
++              break;
+       case DRM_FORMAT_RGB888:
+               priv->viu.osd1_blk0_cfg[0] |= OSD_BLK_MODE_24 |
+                                             OSD_COLOR_MATRIX_24_RGB;
+@@ -200,7 +214,9 @@ static const struct drm_plane_funcs meson_plane_funcs = {
+ 
+ static const uint32_t supported_drm_formats[] = {
+       DRM_FORMAT_ARGB8888,
++      DRM_FORMAT_ABGR8888,
+       DRM_FORMAT_XRGB8888,
++      DRM_FORMAT_XBGR8888,
+       DRM_FORMAT_RGB888,
+       DRM_FORMAT_RGB565,
+ };
+diff --git a/drivers/isdn/capi/capi.c b/drivers/isdn/capi/capi.c
+index dde8f46bc254..91efbf0f19f9 100644
+--- a/drivers/isdn/capi/capi.c
++++ b/drivers/isdn/capi/capi.c
+@@ -687,6 +687,9 @@ capi_write(struct file *file, const char __user *buf, 
size_t count, loff_t *ppos
+       if (!cdev->ap.applid)
+               return -ENODEV;
+ 
++      if (count < CAPIMSG_BASELEN)
++              return -EINVAL;
++
+       skb = alloc_skb(count, GFP_USER);
+       if (!skb)
+               return -ENOMEM;
+@@ -697,7 +700,8 @@ capi_write(struct file *file, const char __user *buf, 
size_t count, loff_t *ppos
+       }
+       mlen = CAPIMSG_LEN(skb->data);
+       if (CAPIMSG_CMD(skb->data) == CAPI_DATA_B3_REQ) {
+-              if ((size_t)(mlen + CAPIMSG_DATALEN(skb->data)) != count) {
++              if (count < CAPI_DATA_B3_REQ_LEN ||
++                  (size_t)(mlen + CAPIMSG_DATALEN(skb->data)) != count) {
+                       kfree_skb(skb);
+                       return -EINVAL;
+               }
+@@ -710,6 +714,10 @@ capi_write(struct file *file, const char __user *buf, 
size_t count, loff_t *ppos
+       CAPIMSG_SETAPPID(skb->data, cdev->ap.applid);
+ 
+       if (CAPIMSG_CMD(skb->data) == CAPI_DISCONNECT_B3_RESP) {
++              if (count < CAPI_DISCONNECT_B3_RESP_LEN) {
++                      kfree_skb(skb);
++                      return -EINVAL;
++              }
+               mutex_lock(&cdev->lock);
+               capincci_free(cdev, CAPIMSG_NCCI(skb->data));
+               mutex_unlock(&cdev->lock);
+diff --git a/drivers/mtd/nand/mtk_nand.c b/drivers/mtd/nand/mtk_nand.c
+index d86a7d131cc0..e17f838b9b81 100644
+--- a/drivers/mtd/nand/mtk_nand.c
++++ b/drivers/mtd/nand/mtk_nand.c
+@@ -846,19 +846,21 @@ static int mtk_nfc_write_oob_std(struct mtd_info *mtd, 
struct nand_chip *chip,
+       return ret & NAND_STATUS_FAIL ? -EIO : 0;
+ }
+ 
+-static int mtk_nfc_update_ecc_stats(struct mtd_info *mtd, u8 *buf, u32 
sectors)
++static int mtk_nfc_update_ecc_stats(struct mtd_info *mtd, u8 *buf, u32 start,
++                                  u32 sectors)
+ {
+       struct nand_chip *chip = mtd_to_nand(mtd);
+       struct mtk_nfc *nfc = nand_get_controller_data(chip);
+       struct mtk_nfc_nand_chip *mtk_nand = to_mtk_nand(chip);
+       struct mtk_ecc_stats stats;
++      u32 reg_size = mtk_nand->fdm.reg_size;
+       int rc, i;
+ 
+       rc = nfi_readl(nfc, NFI_STA) & STA_EMP_PAGE;
+       if (rc) {
+               memset(buf, 0xff, sectors * chip->ecc.size);
+               for (i = 0; i < sectors; i++)
+-                      memset(oob_ptr(chip, i), 0xff, mtk_nand->fdm.reg_size);
++                      memset(oob_ptr(chip, start + i), 0xff, reg_size);
+               return 0;
+       }
+ 
+@@ -878,7 +880,7 @@ static int mtk_nfc_read_subpage(struct mtd_info *mtd, 
struct nand_chip *chip,
+       u32 spare = mtk_nand->spare_per_sector;
+       u32 column, sectors, start, end, reg;
+       dma_addr_t addr;
+-      int bitflips;
++      int bitflips = 0;
+       size_t len;
+       u8 *buf;
+       int rc;
+@@ -946,14 +948,11 @@ static int mtk_nfc_read_subpage(struct mtd_info *mtd, 
struct nand_chip *chip,
+       if (rc < 0) {
+               dev_err(nfc->dev, "subpage done timeout\n");
+               bitflips = -EIO;
+-      } else {
+-              bitflips = 0;
+-              if (!raw) {
+-                      rc = mtk_ecc_wait_done(nfc->ecc, ECC_DECODE);
+-                      bitflips = rc < 0 ? -ETIMEDOUT :
+-                              mtk_nfc_update_ecc_stats(mtd, buf, sectors);
+-                      mtk_nfc_read_fdm(chip, start, sectors);
+-              }
++      } else if (!raw) {
++              rc = mtk_ecc_wait_done(nfc->ecc, ECC_DECODE);
++              bitflips = rc < 0 ? -ETIMEDOUT :
++                      mtk_nfc_update_ecc_stats(mtd, buf, start, sectors);
++              mtk_nfc_read_fdm(chip, start, sectors);
+       }
+ 
+       dma_unmap_single(nfc->dev, addr, len, DMA_FROM_DEVICE);
+diff --git a/drivers/net/phy/phylink.c b/drivers/net/phy/phylink.c
+index 5b13c2ba1059..17acecfda542 100644
+--- a/drivers/net/phy/phylink.c
++++ b/drivers/net/phy/phylink.c
+@@ -359,8 +359,8 @@ static void phylink_get_fixed_state(struct phylink *pl, 
struct phylink_link_stat
+  *  Local device  Link partner
+  *  Pause AsymDir Pause AsymDir Result
+  *    1     X       1     X     TX+RX
+- *    0     1       1     1     RX
+- *    1     1       0     1     TX
++ *    0     1       1     1     TX
++ *    1     1       0     1     RX
+  */
+ static void phylink_resolve_flow(struct phylink *pl,
+       struct phylink_link_state *state)
+@@ -381,7 +381,7 @@ static void phylink_resolve_flow(struct phylink *pl,
+                       new_pause = MLO_PAUSE_TX | MLO_PAUSE_RX;
+               else if (pause & MLO_PAUSE_ASYM)
+                       new_pause = state->pause & MLO_PAUSE_SYM ?
+-                               MLO_PAUSE_RX : MLO_PAUSE_TX;
++                               MLO_PAUSE_TX : MLO_PAUSE_RX;
+       } else {
+               new_pause = pl->link_config.pause & MLO_PAUSE_TXRX_MASK;
+       }
+diff --git a/drivers/net/tun.c b/drivers/net/tun.c
+index 7e197ba8abe4..3086211829a7 100644
+--- a/drivers/net/tun.c
++++ b/drivers/net/tun.c
+@@ -630,7 +630,8 @@ static void tun_detach_all(struct net_device *dev)
+               module_put(THIS_MODULE);
+ }
+ 
+-static int tun_attach(struct tun_struct *tun, struct file *file, bool 
skip_filter)
++static int tun_attach(struct tun_struct *tun, struct file *file,
++                    bool skip_filter, bool publish_tun)
+ {
+       struct tun_file *tfile = file->private_data;
+       struct net_device *dev = tun->dev;
+@@ -672,7 +673,8 @@ static int tun_attach(struct tun_struct *tun, struct file 
*file, bool skip_filte
+ 
+       tfile->queue_index = tun->numqueues;
+       tfile->socket.sk->sk_shutdown &= ~RCV_SHUTDOWN;
+-      rcu_assign_pointer(tfile->tun, tun);
++      if (publish_tun)
++              rcu_assign_pointer(tfile->tun, tun);
+       rcu_assign_pointer(tun->tfiles[tun->numqueues], tfile);
+       tun->numqueues++;
+ 
+@@ -2011,7 +2013,7 @@ static int tun_set_iff(struct net *net, struct file 
*file, struct ifreq *ifr)
+               if (err < 0)
+                       return err;
+ 
+-              err = tun_attach(tun, file, ifr->ifr_flags & IFF_NOFILTER);
++              err = tun_attach(tun, file, ifr->ifr_flags & IFF_NOFILTER, 
true);
+               if (err < 0)
+                       return err;
+ 
+@@ -2100,13 +2102,17 @@ static int tun_set_iff(struct net *net, struct file 
*file, struct ifreq *ifr)
+                                      NETIF_F_HW_VLAN_STAG_TX);
+ 
+               INIT_LIST_HEAD(&tun->disabled);
+-              err = tun_attach(tun, file, false);
++              err = tun_attach(tun, file, false, false);
+               if (err < 0)
+                       goto err_free_flow;
+ 
+               err = register_netdevice(tun->dev);
+               if (err < 0)
+                       goto err_detach;
++              /* free_netdev() won't check refcnt, to aovid race
++               * with dev_put() we need publish tun after registration.
++               */
++              rcu_assign_pointer(tfile->tun, tun);
+       }
+ 
+       netif_carrier_on(tun->dev);
+@@ -2252,7 +2258,7 @@ static int tun_set_queue(struct file *file, struct ifreq 
*ifr)
+               ret = security_tun_dev_attach_queue(tun->security);
+               if (ret < 0)
+                       goto unlock;
+-              ret = tun_attach(tun, file, false);
++              ret = tun_attach(tun, file, false, true);
+       } else if (ifr->ifr_flags & IFF_DETACH_QUEUE) {
+               tun = rtnl_dereference(tfile->tun);
+               if (!tun || !(tun->flags & IFF_MULTI_QUEUE) || tfile->detached)
+diff --git a/drivers/net/usb/cdc_ether.c b/drivers/net/usb/cdc_ether.c
+index 178b956501a7..ffd15f5f836f 100644
+--- a/drivers/net/usb/cdc_ether.c
++++ b/drivers/net/usb/cdc_ether.c
+@@ -221,9 +221,16 @@ int usbnet_generic_cdc_bind(struct usbnet *dev, struct 
usb_interface *intf)
+               goto bad_desc;
+       }
+ skip:
+-      if (    rndis &&
+-              header.usb_cdc_acm_descriptor &&
+-              header.usb_cdc_acm_descriptor->bmCapabilities) {
++      /* Communcation class functions with bmCapabilities are not
++       * RNDIS.  But some Wireless class RNDIS functions use
++       * bmCapabilities for their own purpose. The failsafe is
++       * therefore applied only to Communication class RNDIS
++       * functions.  The rndis test is redundant, but a cheap
++       * optimization.
++       */
++      if (rndis && is_rndis(&intf->cur_altsetting->desc) &&
++          header.usb_cdc_acm_descriptor &&
++          header.usb_cdc_acm_descriptor->bmCapabilities) {
+                       dev_dbg(&intf->dev,
+                               "ACM capabilities %02x, not really RNDIS?\n",
+                               header.usb_cdc_acm_descriptor->bmCapabilities);
+diff --git a/drivers/nvmem/core.c b/drivers/nvmem/core.c
+index dba3f4d0a63d..b414d9d207d4 100644
+--- a/drivers/nvmem/core.c
++++ b/drivers/nvmem/core.c
+@@ -407,10 +407,17 @@ static int nvmem_setup_compat(struct nvmem_device *nvmem,
+       if (!config->base_dev)
+               return -EINVAL;
+ 
+-      if (nvmem->read_only)
+-              nvmem->eeprom = bin_attr_ro_root_nvmem;
+-      else
+-              nvmem->eeprom = bin_attr_rw_root_nvmem;
++      if (nvmem->read_only) {
++              if (config->root_only)
++                      nvmem->eeprom = bin_attr_ro_root_nvmem;
++              else
++                      nvmem->eeprom = bin_attr_ro_nvmem;
++      } else {
++              if (config->root_only)
++                      nvmem->eeprom = bin_attr_rw_root_nvmem;
++              else
++                      nvmem->eeprom = bin_attr_rw_nvmem;
++      }
+       nvmem->eeprom.attr.name = "eeprom";
+       nvmem->eeprom.size = nvmem->size;
+ #ifdef CONFIG_DEBUG_LOCK_ALLOC
+diff --git a/drivers/pci/pci-driver.c b/drivers/pci/pci-driver.c
+index e5a8bf2c9b37..7e4bec75fcde 100644
+--- a/drivers/pci/pci-driver.c
++++ b/drivers/pci/pci-driver.c
+@@ -400,7 +400,8 @@ void __weak pcibios_free_irq(struct pci_dev *dev)
+ #ifdef CONFIG_PCI_IOV
+ static inline bool pci_device_can_probe(struct pci_dev *pdev)
+ {
+-      return (!pdev->is_virtfn || pdev->physfn->sriov->drivers_autoprobe);
++      return (!pdev->is_virtfn || pdev->physfn->sriov->drivers_autoprobe ||
++              pdev->driver_override);
+ }
+ #else
+ static inline bool pci_device_can_probe(struct pci_dev *pdev)
+diff --git a/drivers/platform/x86/pmc_atom.c b/drivers/platform/x86/pmc_atom.c
+index d4d089c37944..63a6881c7078 100644
+--- a/drivers/platform/x86/pmc_atom.c
++++ b/drivers/platform/x86/pmc_atom.c
+@@ -451,6 +451,14 @@ static const struct dmi_system_id critclk_systems[] = {
+                       DMI_MATCH(DMI_BOARD_NAME, "CB3163"),
+               },
+       },
++      {
++              /* pmc_plt_clk* - are used for ethernet controllers */
++              .ident = "Beckhoff CB4063",
++              .matches = {
++                      DMI_MATCH(DMI_SYS_VENDOR, "Beckhoff Automation"),
++                      DMI_MATCH(DMI_BOARD_NAME, "CB4063"),
++              },
++      },
+       {
+               /* pmc_plt_clk* - are used for ethernet controllers */
+               .ident = "Beckhoff CB6263",
+diff --git a/fs/btrfs/compression.c b/fs/btrfs/compression.c
+index 280384bf34f1..ccd9c709375e 100644
+--- a/fs/btrfs/compression.c
++++ b/fs/btrfs/compression.c
+@@ -43,6 +43,37 @@
+ #include "extent_io.h"
+ #include "extent_map.h"
+ 
++static const char* const btrfs_compress_types[] = { "", "zlib", "lzo", "zstd" 
};
++
++const char* btrfs_compress_type2str(enum btrfs_compression_type type)
++{
++      switch (type) {
++      case BTRFS_COMPRESS_ZLIB:
++      case BTRFS_COMPRESS_LZO:
++      case BTRFS_COMPRESS_ZSTD:
++      case BTRFS_COMPRESS_NONE:
++              return btrfs_compress_types[type];
++      }
++
++      return NULL;
++}
++
++bool btrfs_compress_is_valid_type(const char *str, size_t len)
++{
++      int i;
++
++      for (i = 1; i < ARRAY_SIZE(btrfs_compress_types); i++) {
++              size_t comp_len = strlen(btrfs_compress_types[i]);
++
++              if (len < comp_len)
++                      continue;
++
++              if (!strncmp(btrfs_compress_types[i], str, comp_len))
++                      return true;
++      }
++      return false;
++}
++
+ static int btrfs_decompress_bio(struct compressed_bio *cb);
+ 
+ static inline int compressed_bio_size(struct btrfs_fs_info *fs_info,
+diff --git a/fs/btrfs/compression.h b/fs/btrfs/compression.h
+index d2781ff8f994..0b185e277df4 100644
+--- a/fs/btrfs/compression.h
++++ b/fs/btrfs/compression.h
+@@ -130,6 +130,9 @@ extern const struct btrfs_compress_op btrfs_zlib_compress;
+ extern const struct btrfs_compress_op btrfs_lzo_compress;
+ extern const struct btrfs_compress_op btrfs_zstd_compress;
+ 
++const char* btrfs_compress_type2str(enum btrfs_compression_type type);
++bool btrfs_compress_is_valid_type(const char *str, size_t len);
++
+ int btrfs_compress_heuristic(struct inode *inode, u64 start, u64 end);
+ 
+ #endif
+diff --git a/fs/btrfs/props.c b/fs/btrfs/props.c
+index 266f9069307b..b9c7d8508e35 100644
+--- a/fs/btrfs/props.c
++++ b/fs/btrfs/props.c
+@@ -386,11 +386,7 @@ int btrfs_subvol_inherit_props(struct btrfs_trans_handle 
*trans,
+ 
+ static int prop_compression_validate(const char *value, size_t len)
+ {
+-      if (!strncmp("lzo", value, 3))
+-              return 0;
+-      else if (!strncmp("zlib", value, 4))
+-              return 0;
+-      else if (!strncmp("zstd", value, 4))
++      if (btrfs_compress_is_valid_type(value, len))
+               return 0;
+ 
+       return -EINVAL;
+diff --git a/fs/btrfs/tree-log.c b/fs/btrfs/tree-log.c
+index bfd7c89c8d92..f8ef2e3fbf63 100644
+--- a/fs/btrfs/tree-log.c
++++ b/fs/btrfs/tree-log.c
+@@ -5122,7 +5122,7 @@ again:
+                                               BTRFS_I(other_inode),
+                                               LOG_OTHER_INODE, 0, LLONG_MAX,
+                                               ctx);
+-                              iput(other_inode);
++                              btrfs_add_delayed_iput(other_inode);
+                               if (err)
+                                       goto out_unlock;
+                               else
+@@ -5539,7 +5539,7 @@ process_leaf:
+                       }
+ 
+                       if (btrfs_inode_in_log(BTRFS_I(di_inode), 
trans->transid)) {
+-                              iput(di_inode);
++                              btrfs_add_delayed_iput(di_inode);
+                               break;
+                       }
+ 
+@@ -5551,7 +5551,7 @@ process_leaf:
+                       if (!ret &&
+                           btrfs_must_commit_transaction(trans, 
BTRFS_I(di_inode)))
+                               ret = 1;
+-                      iput(di_inode);
++                      btrfs_add_delayed_iput(di_inode);
+                       if (ret)
+                               goto next_dir_inode;
+                       if (ctx->log_new_dentries) {
+@@ -5698,7 +5698,7 @@ static int btrfs_log_all_parents(struct 
btrfs_trans_handle *trans,
+                       if (!ret && ctx && ctx->log_new_dentries)
+                               ret = log_new_dir_dentries(trans, root,
+                                                  BTRFS_I(dir_inode), ctx);
+-                      iput(dir_inode);
++                      btrfs_add_delayed_iput(dir_inode);
+                       if (ret)
+                               goto out;
+               }
+diff --git a/fs/ubifs/tnc.c b/fs/ubifs/tnc.c
+index ba3d0e0f8615..c7828db206bc 100644
+--- a/fs/ubifs/tnc.c
++++ b/fs/ubifs/tnc.c
+@@ -1164,8 +1164,8 @@ static struct ubifs_znode *dirty_cow_bottom_up(struct 
ubifs_info *c,
+  *   o exact match, i.e. the found zero-level znode contains key @key, then %1
+  *     is returned and slot number of the matched branch is stored in @n;
+  *   o not exact match, which means that zero-level znode does not contain
+- *     @key, then %0 is returned and slot number of the closest branch is 
stored
+- *     in @n;
++ *     @key, then %0 is returned and slot number of the closest branch or %-1
++ *     is stored in @n; In this case calling tnc_next() is mandatory.
+  *   o @key is so small that it is even less than the lowest key of the
+  *     leftmost zero-level node, then %0 is returned and %0 is stored in @n.
+  *
+@@ -1882,13 +1882,19 @@ int ubifs_tnc_lookup_nm(struct ubifs_info *c, const 
union ubifs_key *key,
+ 
+ static int search_dh_cookie(struct ubifs_info *c, const union ubifs_key *key,
+                           struct ubifs_dent_node *dent, uint32_t cookie,
+-                          struct ubifs_znode **zn, int *n)
++                          struct ubifs_znode **zn, int *n, int exact)
+ {
+       int err;
+       struct ubifs_znode *znode = *zn;
+       struct ubifs_zbranch *zbr;
+       union ubifs_key *dkey;
+ 
++      if (!exact) {
++              err = tnc_next(c, &znode, n);
++              if (err)
++                      return err;
++      }
++
+       for (;;) {
+               zbr = &znode->zbranch[*n];
+               dkey = &zbr->key;
+@@ -1930,7 +1936,7 @@ static int do_lookup_dh(struct ubifs_info *c, const 
union ubifs_key *key,
+       if (unlikely(err < 0))
+               goto out_unlock;
+ 
+-      err = search_dh_cookie(c, key, dent, cookie, &znode, &n);
++      err = search_dh_cookie(c, key, dent, cookie, &znode, &n, err);
+ 
+ out_unlock:
+       mutex_unlock(&c->tnc_mutex);
+@@ -2716,7 +2722,7 @@ int ubifs_tnc_remove_dh(struct ubifs_info *c, const 
union ubifs_key *key,
+               if (unlikely(err < 0))
+                       goto out_free;
+ 
+-              err = search_dh_cookie(c, key, dent, cookie, &znode, &n);
++              err = search_dh_cookie(c, key, dent, cookie, &znode, &n, err);
+               if (err)
+                       goto out_free;
+       }
+diff --git a/include/uapi/linux/isdn/capicmd.h 
b/include/uapi/linux/isdn/capicmd.h
+index 4941628a4fb9..5ec88e7548a9 100644
+--- a/include/uapi/linux/isdn/capicmd.h
++++ b/include/uapi/linux/isdn/capicmd.h
+@@ -16,6 +16,7 @@
+ #define CAPI_MSG_BASELEN              8
+ #define CAPI_DATA_B3_REQ_LEN          (CAPI_MSG_BASELEN+4+4+2+2+2)
+ #define CAPI_DATA_B3_RESP_LEN         (CAPI_MSG_BASELEN+4+2)
++#define CAPI_DISCONNECT_B3_RESP_LEN   (CAPI_MSG_BASELEN+4)
+ 
+ /*----- CAPI commands -----*/
+ #define CAPI_ALERT                0x01
+diff --git a/kernel/irq/resend.c b/kernel/irq/resend.c
+index 1d08f45135c2..f7a9cfe63380 100644
+--- a/kernel/irq/resend.c
++++ b/kernel/irq/resend.c
+@@ -38,6 +38,8 @@ static void resend_irqs(unsigned long arg)
+               irq = find_first_bit(irqs_resend, nr_irqs);
+               clear_bit(irq, irqs_resend);
+               desc = irq_to_desc(irq);
++              if (!desc)
++                      continue;
+               local_irq_disable();
+               desc->handle_irq(desc);
+               local_irq_enable();
+diff --git a/net/bridge/br_mdb.c b/net/bridge/br_mdb.c
+index 31ddff22563e..a7e98e52b122 100644
+--- a/net/bridge/br_mdb.c
++++ b/net/bridge/br_mdb.c
+@@ -373,7 +373,7 @@ static int nlmsg_populate_rtr_fill(struct sk_buff *skb,
+       struct nlmsghdr *nlh;
+       struct nlattr *nest;
+ 
+-      nlh = nlmsg_put(skb, pid, seq, type, sizeof(*bpm), NLM_F_MULTI);
++      nlh = nlmsg_put(skb, pid, seq, type, sizeof(*bpm), 0);
+       if (!nlh)
+               return -EMSGSIZE;
+ 
+diff --git a/net/core/dev.c b/net/core/dev.c
+index f79b513e80dc..9d6beb9de924 100644
+--- a/net/core/dev.c
++++ b/net/core/dev.c
+@@ -7698,6 +7698,8 @@ int register_netdevice(struct net_device *dev)
+       ret = notifier_to_errno(ret);
+       if (ret) {
+               rollback_registered(dev);
++              rcu_barrier();
++
+               dev->reg_state = NETREG_UNREGISTERED;
+       }
+       /*
+diff --git a/net/core/skbuff.c b/net/core/skbuff.c
+index 6d9fd7d4bdfa..b1933e1f3aef 100644
+--- a/net/core/skbuff.c
++++ b/net/core/skbuff.c
+@@ -3514,6 +3514,25 @@ struct sk_buff *skb_segment(struct sk_buff *head_skb,
+       int pos;
+       int dummy;
+ 
++      if (list_skb && !list_skb->head_frag && skb_headlen(list_skb) &&
++          (skb_shinfo(head_skb)->gso_type & SKB_GSO_DODGY)) {
++              /* gso_size is untrusted, and we have a frag_list with a linear
++               * non head_frag head.
++               *
++               * (we assume checking the first list_skb member suffices;
++               * i.e if either of the list_skb members have non head_frag
++               * head, then the first one has too).
++               *
++               * If head_skb's headlen does not fit requested gso_size, it
++               * means that the frag_list members do NOT terminate on exact
++               * gso_size boundaries. Hence we cannot perform skb_frag_t page
++               * sharing. Therefore we must fallback to copying the frag_list
++               * skbs; we do so by disabling SG.
++               */
++              if (mss != GSO_BY_FRAGS && mss != skb_headlen(head_skb))
++                      features &= ~NETIF_F_SG;
++      }
++
+       __skb_push(head_skb, doffset);
+       proto = skb_network_protocol(head_skb, &dummy);
+       if (unlikely(!proto))
+diff --git a/net/ipv4/tcp_input.c b/net/ipv4/tcp_input.c
+index 8e080f3b75bd..55253ba0681f 100644
+--- a/net/ipv4/tcp_input.c
++++ b/net/ipv4/tcp_input.c
+@@ -247,7 +247,7 @@ static void tcp_ecn_accept_cwr(struct tcp_sock *tp, const 
struct sk_buff *skb)
+ 
+ static void tcp_ecn_withdraw_cwr(struct tcp_sock *tp)
+ {
+-      tp->ecn_flags &= ~TCP_ECN_DEMAND_CWR;
++      tp->ecn_flags &= ~TCP_ECN_QUEUE_CWR;
+ }
+ 
+ static void __tcp_ecn_check_ce(struct sock *sk, const struct sk_buff *skb)
+diff --git a/net/ipv6/ping.c b/net/ipv6/ping.c
+index ac826dd338ff..d5cdba8213a4 100644
+--- a/net/ipv6/ping.c
++++ b/net/ipv6/ping.c
+@@ -233,7 +233,7 @@ static int __net_init ping_v6_proc_init_net(struct net 
*net)
+       return ping_proc_register(net, &ping_v6_seq_afinfo);
+ }
+ 
+-static void __net_init ping_v6_proc_exit_net(struct net *net)
++static void __net_exit ping_v6_proc_exit_net(struct net *net)
+ {
+       return ping_proc_unregister(net, &ping_v6_seq_afinfo);
+ }
+diff --git a/net/sched/sch_hhf.c b/net/sched/sch_hhf.c
+index 73a53c08091b..fa256f8038af 100644
+--- a/net/sched/sch_hhf.c
++++ b/net/sched/sch_hhf.c
+@@ -528,7 +528,7 @@ static int hhf_change(struct Qdisc *sch, struct nlattr 
*opt)
+               new_hhf_non_hh_weight = nla_get_u32(tb[TCA_HHF_NON_HH_WEIGHT]);
+ 
+       non_hh_quantum = (u64)new_quantum * new_hhf_non_hh_weight;
+-      if (non_hh_quantum > INT_MAX)
++      if (non_hh_quantum == 0 || non_hh_quantum > INT_MAX)
+               return -EINVAL;
+ 
+       sch_tree_lock(sch);
+diff --git a/net/sctp/protocol.c b/net/sctp/protocol.c
+index a7529aca2ac8..6af871b1c297 100644
+--- a/net/sctp/protocol.c
++++ b/net/sctp/protocol.c
+@@ -1344,7 +1344,7 @@ static int __net_init sctp_ctrlsock_init(struct net *net)
+       return status;
+ }
+ 
+-static void __net_init sctp_ctrlsock_exit(struct net *net)
++static void __net_exit sctp_ctrlsock_exit(struct net *net)
+ {
+       /* Free the control endpoint.  */
+       inet_ctl_sock_destroy(net->sctp.ctl_sock);
+diff --git a/net/sctp/sm_sideeffect.c b/net/sctp/sm_sideeffect.c
+index c3ae3e80a5a4..bf0c61adb09c 100644
+--- a/net/sctp/sm_sideeffect.c
++++ b/net/sctp/sm_sideeffect.c
+@@ -542,7 +542,7 @@ static void sctp_do_8_2_transport_strike(struct 
sctp_cmd_seq *commands,
+       if (net->sctp.pf_enable &&
+          (transport->state == SCTP_ACTIVE) &&
+          (transport->error_count < transport->pathmaxrxt) &&
+-         (transport->error_count > asoc->pf_retrans)) {
++         (transport->error_count > transport->pf_retrans)) {
+ 
+               sctp_assoc_control_transport(asoc, transport,
+                                            SCTP_TRANSPORT_PF,
+diff --git a/net/tipc/name_distr.c b/net/tipc/name_distr.c
+index 23f8899e0f8c..7ebcaff8c1c4 100644
+--- a/net/tipc/name_distr.c
++++ b/net/tipc/name_distr.c
+@@ -224,7 +224,8 @@ static void tipc_publ_purge(struct net *net, struct 
publication *publ, u32 addr)
+                      publ->key);
+       }
+ 
+-      kfree_rcu(p, rcu);
++      if (p)
++              kfree_rcu(p, rcu);
+ }
+ 
+ /**

Reply via email to