commit:     3ba8a94069c6064059af744ab1d794fd5145f8b9
Author:     Mike Pagano <mpagano <AT> gentoo <DOT> org>
AuthorDate: Thu May 14 11:29:47 2020 +0000
Commit:     Mike Pagano <mpagano <AT> gentoo <DOT> org>
CommitDate: Thu May 14 11:29:47 2020 +0000
URL:        https://gitweb.gentoo.org/proj/linux-patches.git/commit/?id=3ba8a940

Linux patch 4.19.123

Signed-off-by: Mike Pagano <mpagano <AT> gentoo.org>

 0000_README               |    4 +
 1122_linux-4.19.123.patch | 1475 +++++++++++++++++++++++++++++++++++++++++++++
 2 files changed, 1479 insertions(+)

diff --git a/0000_README b/0000_README
index 1a8557c..18ae34a 100644
--- a/0000_README
+++ b/0000_README
@@ -527,6 +527,10 @@ Patch:  1121_linux-4.19.122.patch
 From:   https://www.kernel.org
 Desc:   Linux 4.19.122
 
+Patch:  1122_linux-4.19.123.patch
+From:   https://www.kernel.org
+Desc:   Linux 4.19.123
+
 Patch:  1500_XATTR_USER_PREFIX.patch
 From:   https://bugs.gentoo.org/show_bug.cgi?id=470644
 Desc:   Support for namespace user.pax.* on tmpfs.

diff --git a/1122_linux-4.19.123.patch b/1122_linux-4.19.123.patch
new file mode 100644
index 0000000..8b532c1
--- /dev/null
+++ b/1122_linux-4.19.123.patch
@@ -0,0 +1,1475 @@
+diff --git a/Makefile b/Makefile
+index 2a4ee629f011..68fa15edd662 100644
+--- a/Makefile
++++ b/Makefile
+@@ -1,7 +1,7 @@
+ # SPDX-License-Identifier: GPL-2.0
+ VERSION = 4
+ PATCHLEVEL = 19
+-SUBLEVEL = 122
++SUBLEVEL = 123
+ EXTRAVERSION =
+ NAME = "People's Front"
+ 
+diff --git a/arch/arm64/kvm/guest.c b/arch/arm64/kvm/guest.c
+index a6c9fbaeaefc..870e594f95ed 100644
+--- a/arch/arm64/kvm/guest.c
++++ b/arch/arm64/kvm/guest.c
+@@ -179,6 +179,13 @@ static int set_core_reg(struct kvm_vcpu *vcpu, const 
struct kvm_one_reg *reg)
+       }
+ 
+       memcpy((u32 *)regs + off, valp, KVM_REG_SIZE(reg->id));
++
++      if (*vcpu_cpsr(vcpu) & PSR_MODE32_BIT) {
++              int i;
++
++              for (i = 0; i < 16; i++)
++                      *vcpu_reg32(vcpu, i) = (u32)*vcpu_reg32(vcpu, i);
++      }
+ out:
+       return err;
+ }
+diff --git a/arch/arm64/mm/hugetlbpage.c b/arch/arm64/mm/hugetlbpage.c
+index f58ea503ad01..1d7656761316 100644
+--- a/arch/arm64/mm/hugetlbpage.c
++++ b/arch/arm64/mm/hugetlbpage.c
+@@ -218,6 +218,8 @@ pte_t *huge_pte_alloc(struct mm_struct *mm,
+               ptep = (pte_t *)pudp;
+       } else if (sz == (PAGE_SIZE * CONT_PTES)) {
+               pmdp = pmd_alloc(mm, pudp, addr);
++              if (!pmdp)
++                      return NULL;
+ 
+               WARN_ON(addr & (sz - 1));
+               /*
+diff --git a/arch/x86/entry/calling.h b/arch/x86/entry/calling.h
+index 31fbb4a7d9f6..993dd06c8923 100644
+--- a/arch/x86/entry/calling.h
++++ b/arch/x86/entry/calling.h
+@@ -98,13 +98,6 @@ For 32-bit we have the following conventions - kernel is 
built with
+ #define SIZEOF_PTREGS 21*8
+ 
+ .macro PUSH_AND_CLEAR_REGS rdx=%rdx rax=%rax save_ret=0
+-      /*
+-       * Push registers and sanitize registers of values that a
+-       * speculation attack might otherwise want to exploit. The
+-       * lower registers are likely clobbered well before they
+-       * could be put to use in a speculative execution gadget.
+-       * Interleave XOR with PUSH for better uop scheduling:
+-       */
+       .if \save_ret
+       pushq   %rsi            /* pt_regs->si */
+       movq    8(%rsp), %rsi   /* temporarily store the return address in %rsi 
*/
+@@ -114,34 +107,43 @@ For 32-bit we have the following conventions - kernel is 
built with
+       pushq   %rsi            /* pt_regs->si */
+       .endif
+       pushq   \rdx            /* pt_regs->dx */
+-      xorl    %edx, %edx      /* nospec   dx */
+       pushq   %rcx            /* pt_regs->cx */
+-      xorl    %ecx, %ecx      /* nospec   cx */
+       pushq   \rax            /* pt_regs->ax */
+       pushq   %r8             /* pt_regs->r8 */
+-      xorl    %r8d, %r8d      /* nospec   r8 */
+       pushq   %r9             /* pt_regs->r9 */
+-      xorl    %r9d, %r9d      /* nospec   r9 */
+       pushq   %r10            /* pt_regs->r10 */
+-      xorl    %r10d, %r10d    /* nospec   r10 */
+       pushq   %r11            /* pt_regs->r11 */
+-      xorl    %r11d, %r11d    /* nospec   r11*/
+       pushq   %rbx            /* pt_regs->rbx */
+-      xorl    %ebx, %ebx      /* nospec   rbx*/
+       pushq   %rbp            /* pt_regs->rbp */
+-      xorl    %ebp, %ebp      /* nospec   rbp*/
+       pushq   %r12            /* pt_regs->r12 */
+-      xorl    %r12d, %r12d    /* nospec   r12*/
+       pushq   %r13            /* pt_regs->r13 */
+-      xorl    %r13d, %r13d    /* nospec   r13*/
+       pushq   %r14            /* pt_regs->r14 */
+-      xorl    %r14d, %r14d    /* nospec   r14*/
+       pushq   %r15            /* pt_regs->r15 */
+-      xorl    %r15d, %r15d    /* nospec   r15*/
+       UNWIND_HINT_REGS
++
+       .if \save_ret
+       pushq   %rsi            /* return address on top of stack */
+       .endif
++
++      /*
++       * Sanitize registers of values that a speculation attack might
++       * otherwise want to exploit. The lower registers are likely clobbered
++       * well before they could be put to use in a speculative execution
++       * gadget.
++       */
++      xorl    %edx,  %edx     /* nospec dx  */
++      xorl    %ecx,  %ecx     /* nospec cx  */
++      xorl    %r8d,  %r8d     /* nospec r8  */
++      xorl    %r9d,  %r9d     /* nospec r9  */
++      xorl    %r10d, %r10d    /* nospec r10 */
++      xorl    %r11d, %r11d    /* nospec r11 */
++      xorl    %ebx,  %ebx     /* nospec rbx */
++      xorl    %ebp,  %ebp     /* nospec rbp */
++      xorl    %r12d, %r12d    /* nospec r12 */
++      xorl    %r13d, %r13d    /* nospec r13 */
++      xorl    %r14d, %r14d    /* nospec r14 */
++      xorl    %r15d, %r15d    /* nospec r15 */
++
+ .endm
+ 
+ .macro POP_REGS pop_rdi=1 skip_r11rcx=0
+diff --git a/arch/x86/entry/entry_64.S b/arch/x86/entry/entry_64.S
+index ccb5e3486aee..dfe26f3cfffc 100644
+--- a/arch/x86/entry/entry_64.S
++++ b/arch/x86/entry/entry_64.S
+@@ -312,7 +312,6 @@ GLOBAL(entry_SYSCALL_64_after_hwframe)
+        */
+ syscall_return_via_sysret:
+       /* rcx and r11 are already restored (see code above) */
+-      UNWIND_HINT_EMPTY
+       POP_REGS pop_rdi=0 skip_r11rcx=1
+ 
+       /*
+@@ -321,6 +320,7 @@ syscall_return_via_sysret:
+        */
+       movq    %rsp, %rdi
+       movq    PER_CPU_VAR(cpu_tss_rw + TSS_sp0), %rsp
++      UNWIND_HINT_EMPTY
+ 
+       pushq   RSP-RDI(%rdi)   /* RSP */
+       pushq   (%rdi)          /* RDI */
+@@ -575,7 +575,7 @@ END(spurious_entries_start)
+  * +----------------------------------------------------+
+  */
+ ENTRY(interrupt_entry)
+-      UNWIND_HINT_FUNC
++      UNWIND_HINT_IRET_REGS offset=16
+       ASM_CLAC
+       cld
+ 
+@@ -607,9 +607,9 @@ ENTRY(interrupt_entry)
+       pushq   5*8(%rdi)               /* regs->eflags */
+       pushq   4*8(%rdi)               /* regs->cs */
+       pushq   3*8(%rdi)               /* regs->ip */
++      UNWIND_HINT_IRET_REGS
+       pushq   2*8(%rdi)               /* regs->orig_ax */
+       pushq   8(%rdi)                 /* return address */
+-      UNWIND_HINT_FUNC
+ 
+       movq    (%rdi), %rdi
+       jmp     2f
+@@ -700,6 +700,7 @@ GLOBAL(swapgs_restore_regs_and_return_to_usermode)
+        */
+       movq    %rsp, %rdi
+       movq    PER_CPU_VAR(cpu_tss_rw + TSS_sp0), %rsp
++      UNWIND_HINT_EMPTY
+ 
+       /* Copy the IRET frame to the trampoline stack. */
+       pushq   6*8(%rdi)       /* SS */
+@@ -1744,7 +1745,7 @@ ENTRY(rewind_stack_do_exit)
+ 
+       movq    PER_CPU_VAR(cpu_current_top_of_stack), %rax
+       leaq    -PTREGS_SIZE(%rax), %rsp
+-      UNWIND_HINT_FUNC sp_offset=PTREGS_SIZE
++      UNWIND_HINT_REGS
+ 
+       call    do_exit
+ END(rewind_stack_do_exit)
+diff --git a/arch/x86/include/asm/unwind.h b/arch/x86/include/asm/unwind.h
+index 499578f7e6d7..70fc159ebe69 100644
+--- a/arch/x86/include/asm/unwind.h
++++ b/arch/x86/include/asm/unwind.h
+@@ -19,7 +19,7 @@ struct unwind_state {
+ #if defined(CONFIG_UNWINDER_ORC)
+       bool signal, full_regs;
+       unsigned long sp, bp, ip;
+-      struct pt_regs *regs;
++      struct pt_regs *regs, *prev_regs;
+ #elif defined(CONFIG_UNWINDER_FRAME_POINTER)
+       bool got_irq;
+       unsigned long *bp, *orig_sp, ip;
+diff --git a/arch/x86/kernel/unwind_orc.c b/arch/x86/kernel/unwind_orc.c
+index 89be1be1790c..169b96492b7c 100644
+--- a/arch/x86/kernel/unwind_orc.c
++++ b/arch/x86/kernel/unwind_orc.c
+@@ -131,9 +131,6 @@ static struct orc_entry *orc_find(unsigned long ip)
+ {
+       static struct orc_entry *orc;
+ 
+-      if (!orc_init)
+-              return NULL;
+-
+       if (ip == 0)
+               return &null_orc_entry;
+ 
+@@ -367,9 +364,38 @@ static bool deref_stack_iret_regs(struct unwind_state 
*state, unsigned long addr
+       return true;
+ }
+ 
++/*
++ * If state->regs is non-NULL, and points to a full pt_regs, just get the reg
++ * value from state->regs.
++ *
++ * Otherwise, if state->regs just points to IRET regs, and the previous frame
++ * had full regs, it's safe to get the value from the previous regs.  This can
++ * happen when early/late IRQ entry code gets interrupted by an NMI.
++ */
++static bool get_reg(struct unwind_state *state, unsigned int reg_off,
++                  unsigned long *val)
++{
++      unsigned int reg = reg_off/8;
++
++      if (!state->regs)
++              return false;
++
++      if (state->full_regs) {
++              *val = ((unsigned long *)state->regs)[reg];
++              return true;
++      }
++
++      if (state->prev_regs) {
++              *val = ((unsigned long *)state->prev_regs)[reg];
++              return true;
++      }
++
++      return false;
++}
++
+ bool unwind_next_frame(struct unwind_state *state)
+ {
+-      unsigned long ip_p, sp, orig_ip = state->ip, prev_sp = state->sp;
++      unsigned long ip_p, sp, tmp, orig_ip = state->ip, prev_sp = state->sp;
+       enum stack_type prev_type = state->stack_info.type;
+       struct orc_entry *orc;
+       bool indirect = false;
+@@ -423,39 +449,35 @@ bool unwind_next_frame(struct unwind_state *state)
+               break;
+ 
+       case ORC_REG_R10:
+-              if (!state->regs || !state->full_regs) {
++              if (!get_reg(state, offsetof(struct pt_regs, r10), &sp)) {
+                       orc_warn("missing regs for base reg R10 at ip %pB\n",
+                                (void *)state->ip);
+                       goto err;
+               }
+-              sp = state->regs->r10;
+               break;
+ 
+       case ORC_REG_R13:
+-              if (!state->regs || !state->full_regs) {
++              if (!get_reg(state, offsetof(struct pt_regs, r13), &sp)) {
+                       orc_warn("missing regs for base reg R13 at ip %pB\n",
+                                (void *)state->ip);
+                       goto err;
+               }
+-              sp = state->regs->r13;
+               break;
+ 
+       case ORC_REG_DI:
+-              if (!state->regs || !state->full_regs) {
++              if (!get_reg(state, offsetof(struct pt_regs, di), &sp)) {
+                       orc_warn("missing regs for base reg DI at ip %pB\n",
+                                (void *)state->ip);
+                       goto err;
+               }
+-              sp = state->regs->di;
+               break;
+ 
+       case ORC_REG_DX:
+-              if (!state->regs || !state->full_regs) {
++              if (!get_reg(state, offsetof(struct pt_regs, dx), &sp)) {
+                       orc_warn("missing regs for base reg DX at ip %pB\n",
+                                (void *)state->ip);
+                       goto err;
+               }
+-              sp = state->regs->dx;
+               break;
+ 
+       default:
+@@ -482,6 +504,7 @@ bool unwind_next_frame(struct unwind_state *state)
+ 
+               state->sp = sp;
+               state->regs = NULL;
++              state->prev_regs = NULL;
+               state->signal = false;
+               break;
+ 
+@@ -493,6 +516,7 @@ bool unwind_next_frame(struct unwind_state *state)
+               }
+ 
+               state->regs = (struct pt_regs *)sp;
++              state->prev_regs = NULL;
+               state->full_regs = true;
+               state->signal = true;
+               break;
+@@ -504,6 +528,8 @@ bool unwind_next_frame(struct unwind_state *state)
+                       goto err;
+               }
+ 
++              if (state->full_regs)
++                      state->prev_regs = state->regs;
+               state->regs = (void *)sp - IRET_FRAME_OFFSET;
+               state->full_regs = false;
+               state->signal = true;
+@@ -512,14 +538,14 @@ bool unwind_next_frame(struct unwind_state *state)
+       default:
+               orc_warn("unknown .orc_unwind entry type %d for ip %pB\n",
+                        orc->type, (void *)orig_ip);
+-              break;
++              goto err;
+       }
+ 
+       /* Find BP: */
+       switch (orc->bp_reg) {
+       case ORC_REG_UNDEFINED:
+-              if (state->regs && state->full_regs)
+-                      state->bp = state->regs->bp;
++              if (get_reg(state, offsetof(struct pt_regs, bp), &tmp))
++                      state->bp = tmp;
+               break;
+ 
+       case ORC_REG_PREV_SP:
+@@ -563,6 +589,9 @@ EXPORT_SYMBOL_GPL(unwind_next_frame);
+ void __unwind_start(struct unwind_state *state, struct task_struct *task,
+                   struct pt_regs *regs, unsigned long *first_frame)
+ {
++      if (!orc_init)
++              goto done;
++
+       memset(state, 0, sizeof(*state));
+       state->task = task;
+ 
+@@ -629,7 +658,7 @@ void __unwind_start(struct unwind_state *state, struct 
task_struct *task,
+       /* Otherwise, skip ahead to the user-specified starting frame: */
+       while (!unwind_done(state) &&
+              (!on_stack(&state->stack_info, first_frame, sizeof(long)) ||
+-                      state->sp <= (unsigned long)first_frame))
++                      state->sp < (unsigned long)first_frame))
+               unwind_next_frame(state);
+ 
+       return;
+diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
+index fe5036641c59..f08c287b6242 100644
+--- a/arch/x86/kvm/vmx.c
++++ b/arch/x86/kvm/vmx.c
+@@ -10771,14 +10771,14 @@ static void __noclone vmx_vcpu_run(struct kvm_vcpu 
*vcpu)
+       else if (static_branch_unlikely(&mds_user_clear))
+               mds_clear_cpu_buffers();
+ 
+-      asm(
++      asm volatile (
+               /* Store host registers */
+               "push %%" _ASM_DX "; push %%" _ASM_BP ";"
+               "push %%" _ASM_CX " \n\t" /* placeholder for guest rcx */
+               "push %%" _ASM_CX " \n\t"
+-              "cmp %%" _ASM_SP ", %c[host_rsp](%0) \n\t"
++              "cmp %%" _ASM_SP ", %c[host_rsp](%%" _ASM_CX ") \n\t"
+               "je 1f \n\t"
+-              "mov %%" _ASM_SP ", %c[host_rsp](%0) \n\t"
++              "mov %%" _ASM_SP ", %c[host_rsp](%%" _ASM_CX ") \n\t"
+               /* Avoid VMWRITE when Enlightened VMCS is in use */
+               "test %%" _ASM_SI ", %%" _ASM_SI " \n\t"
+               "jz 2f \n\t"
+@@ -10788,32 +10788,33 @@ static void __noclone vmx_vcpu_run(struct kvm_vcpu 
*vcpu)
+               __ex(ASM_VMX_VMWRITE_RSP_RDX) "\n\t"
+               "1: \n\t"
+               /* Reload cr2 if changed */
+-              "mov %c[cr2](%0), %%" _ASM_AX " \n\t"
++              "mov %c[cr2](%%" _ASM_CX "), %%" _ASM_AX " \n\t"
+               "mov %%cr2, %%" _ASM_DX " \n\t"
+               "cmp %%" _ASM_AX ", %%" _ASM_DX " \n\t"
+               "je 3f \n\t"
+               "mov %%" _ASM_AX", %%cr2 \n\t"
+               "3: \n\t"
+               /* Check if vmlaunch of vmresume is needed */
+-              "cmpb $0, %c[launched](%0) \n\t"
++              "cmpb $0, %c[launched](%%" _ASM_CX ") \n\t"
+               /* Load guest registers.  Don't clobber flags. */
+-              "mov %c[rax](%0), %%" _ASM_AX " \n\t"
+-              "mov %c[rbx](%0), %%" _ASM_BX " \n\t"
+-              "mov %c[rdx](%0), %%" _ASM_DX " \n\t"
+-              "mov %c[rsi](%0), %%" _ASM_SI " \n\t"
+-              "mov %c[rdi](%0), %%" _ASM_DI " \n\t"
+-              "mov %c[rbp](%0), %%" _ASM_BP " \n\t"
++              "mov %c[rax](%%" _ASM_CX "), %%" _ASM_AX " \n\t"
++              "mov %c[rbx](%%" _ASM_CX "), %%" _ASM_BX " \n\t"
++              "mov %c[rdx](%%" _ASM_CX "), %%" _ASM_DX " \n\t"
++              "mov %c[rsi](%%" _ASM_CX "), %%" _ASM_SI " \n\t"
++              "mov %c[rdi](%%" _ASM_CX "), %%" _ASM_DI " \n\t"
++              "mov %c[rbp](%%" _ASM_CX "), %%" _ASM_BP " \n\t"
+ #ifdef CONFIG_X86_64
+-              "mov %c[r8](%0),  %%r8  \n\t"
+-              "mov %c[r9](%0),  %%r9  \n\t"
+-              "mov %c[r10](%0), %%r10 \n\t"
+-              "mov %c[r11](%0), %%r11 \n\t"
+-              "mov %c[r12](%0), %%r12 \n\t"
+-              "mov %c[r13](%0), %%r13 \n\t"
+-              "mov %c[r14](%0), %%r14 \n\t"
+-              "mov %c[r15](%0), %%r15 \n\t"
++              "mov %c[r8](%%" _ASM_CX "),  %%r8  \n\t"
++              "mov %c[r9](%%" _ASM_CX "),  %%r9  \n\t"
++              "mov %c[r10](%%" _ASM_CX "), %%r10 \n\t"
++              "mov %c[r11](%%" _ASM_CX "), %%r11 \n\t"
++              "mov %c[r12](%%" _ASM_CX "), %%r12 \n\t"
++              "mov %c[r13](%%" _ASM_CX "), %%r13 \n\t"
++              "mov %c[r14](%%" _ASM_CX "), %%r14 \n\t"
++              "mov %c[r15](%%" _ASM_CX "), %%r15 \n\t"
+ #endif
+-              "mov %c[rcx](%0), %%" _ASM_CX " \n\t" /* kills %0 (ecx) */
++              /* Load guest RCX.  This kills the vmx_vcpu pointer! */
++              "mov %c[rcx](%%" _ASM_CX "), %%" _ASM_CX " \n\t"
+ 
+               /* Enter guest mode */
+               "jne 1f \n\t"
+@@ -10821,26 +10822,33 @@ static void __noclone vmx_vcpu_run(struct kvm_vcpu 
*vcpu)
+               "jmp 2f \n\t"
+               "1: " __ex(ASM_VMX_VMRESUME) "\n\t"
+               "2: "
+-              /* Save guest registers, load host registers, keep flags */
+-              "mov %0, %c[wordsize](%%" _ASM_SP ") \n\t"
+-              "pop %0 \n\t"
+-              "setbe %c[fail](%0)\n\t"
+-              "mov %%" _ASM_AX ", %c[rax](%0) \n\t"
+-              "mov %%" _ASM_BX ", %c[rbx](%0) \n\t"
+-              __ASM_SIZE(pop) " %c[rcx](%0) \n\t"
+-              "mov %%" _ASM_DX ", %c[rdx](%0) \n\t"
+-              "mov %%" _ASM_SI ", %c[rsi](%0) \n\t"
+-              "mov %%" _ASM_DI ", %c[rdi](%0) \n\t"
+-              "mov %%" _ASM_BP ", %c[rbp](%0) \n\t"
++
++              /* Save guest's RCX to the stack placeholder (see above) */
++              "mov %%" _ASM_CX ", %c[wordsize](%%" _ASM_SP ") \n\t"
++
++              /* Load host's RCX, i.e. the vmx_vcpu pointer */
++              "pop %%" _ASM_CX " \n\t"
++
++              /* Set vmx->fail based on EFLAGS.{CF,ZF} */
++              "setbe %c[fail](%%" _ASM_CX ")\n\t"
++
++              /* Save all guest registers, including RCX from the stack */
++              "mov %%" _ASM_AX ", %c[rax](%%" _ASM_CX ") \n\t"
++              "mov %%" _ASM_BX ", %c[rbx](%%" _ASM_CX ") \n\t"
++              __ASM_SIZE(pop) " %c[rcx](%%" _ASM_CX ") \n\t"
++              "mov %%" _ASM_DX ", %c[rdx](%%" _ASM_CX ") \n\t"
++              "mov %%" _ASM_SI ", %c[rsi](%%" _ASM_CX ") \n\t"
++              "mov %%" _ASM_DI ", %c[rdi](%%" _ASM_CX ") \n\t"
++              "mov %%" _ASM_BP ", %c[rbp](%%" _ASM_CX ") \n\t"
+ #ifdef CONFIG_X86_64
+-              "mov %%r8,  %c[r8](%0) \n\t"
+-              "mov %%r9,  %c[r9](%0) \n\t"
+-              "mov %%r10, %c[r10](%0) \n\t"
+-              "mov %%r11, %c[r11](%0) \n\t"
+-              "mov %%r12, %c[r12](%0) \n\t"
+-              "mov %%r13, %c[r13](%0) \n\t"
+-              "mov %%r14, %c[r14](%0) \n\t"
+-              "mov %%r15, %c[r15](%0) \n\t"
++              "mov %%r8,  %c[r8](%%" _ASM_CX ") \n\t"
++              "mov %%r9,  %c[r9](%%" _ASM_CX ") \n\t"
++              "mov %%r10, %c[r10](%%" _ASM_CX ") \n\t"
++              "mov %%r11, %c[r11](%%" _ASM_CX ") \n\t"
++              "mov %%r12, %c[r12](%%" _ASM_CX ") \n\t"
++              "mov %%r13, %c[r13](%%" _ASM_CX ") \n\t"
++              "mov %%r14, %c[r14](%%" _ASM_CX ") \n\t"
++              "mov %%r15, %c[r15](%%" _ASM_CX ") \n\t"
+ 
+               /*
+                * Clear all general purpose registers (except RSP, which is 
loaded by
+@@ -10860,7 +10868,7 @@ static void __noclone vmx_vcpu_run(struct kvm_vcpu 
*vcpu)
+               "xor %%r15d, %%r15d \n\t"
+ #endif
+               "mov %%cr2, %%" _ASM_AX "   \n\t"
+-              "mov %%" _ASM_AX ", %c[cr2](%0) \n\t"
++              "mov %%" _ASM_AX ", %c[cr2](%%" _ASM_CX ") \n\t"
+ 
+               "xor %%eax, %%eax \n\t"
+               "xor %%ebx, %%ebx \n\t"
+@@ -10874,7 +10882,8 @@ static void __noclone vmx_vcpu_run(struct kvm_vcpu 
*vcpu)
+               ".global vmx_return \n\t"
+               "vmx_return: " _ASM_PTR " 2b \n\t"
+               ".popsection"
+-            : : "c"(vmx), "d"((unsigned long)HOST_RSP), "S"(evmcs_rsp),
++            : "=c"((int){0}), "=d"((int){0}), "=S"((int){0})
++            : "c"(vmx), "d"((unsigned long)HOST_RSP), "S"(evmcs_rsp),
+               [launched]"i"(offsetof(struct vcpu_vmx, __launched)),
+               [fail]"i"(offsetof(struct vcpu_vmx, fail)),
+               [host_rsp]"i"(offsetof(struct vcpu_vmx, host_rsp)),
+diff --git a/drivers/hid/usbhid/hid-core.c b/drivers/hid/usbhid/hid-core.c
+index 11103efebbaa..1e6f8b0d00fb 100644
+--- a/drivers/hid/usbhid/hid-core.c
++++ b/drivers/hid/usbhid/hid-core.c
+@@ -685,16 +685,21 @@ static int usbhid_open(struct hid_device *hid)
+       struct usbhid_device *usbhid = hid->driver_data;
+       int res;
+ 
++      mutex_lock(&usbhid->mutex);
++
+       set_bit(HID_OPENED, &usbhid->iofl);
+ 
+-      if (hid->quirks & HID_QUIRK_ALWAYS_POLL)
+-              return 0;
++      if (hid->quirks & HID_QUIRK_ALWAYS_POLL) {
++              res = 0;
++              goto Done;
++      }
+ 
+       res = usb_autopm_get_interface(usbhid->intf);
+       /* the device must be awake to reliably request remote wakeup */
+       if (res < 0) {
+               clear_bit(HID_OPENED, &usbhid->iofl);
+-              return -EIO;
++              res = -EIO;
++              goto Done;
+       }
+ 
+       usbhid->intf->needs_remote_wakeup = 1;
+@@ -728,6 +733,9 @@ static int usbhid_open(struct hid_device *hid)
+               msleep(50);
+ 
+       clear_bit(HID_RESUME_RUNNING, &usbhid->iofl);
++
++ Done:
++      mutex_unlock(&usbhid->mutex);
+       return res;
+ }
+ 
+@@ -735,6 +743,8 @@ static void usbhid_close(struct hid_device *hid)
+ {
+       struct usbhid_device *usbhid = hid->driver_data;
+ 
++      mutex_lock(&usbhid->mutex);
++
+       /*
+        * Make sure we don't restart data acquisition due to
+        * a resumption we no longer care about by avoiding racing
+@@ -746,12 +756,13 @@ static void usbhid_close(struct hid_device *hid)
+               clear_bit(HID_IN_POLLING, &usbhid->iofl);
+       spin_unlock_irq(&usbhid->lock);
+ 
+-      if (hid->quirks & HID_QUIRK_ALWAYS_POLL)
+-              return;
++      if (!(hid->quirks & HID_QUIRK_ALWAYS_POLL)) {
++              hid_cancel_delayed_stuff(usbhid);
++              usb_kill_urb(usbhid->urbin);
++              usbhid->intf->needs_remote_wakeup = 0;
++      }
+ 
+-      hid_cancel_delayed_stuff(usbhid);
+-      usb_kill_urb(usbhid->urbin);
+-      usbhid->intf->needs_remote_wakeup = 0;
++      mutex_unlock(&usbhid->mutex);
+ }
+ 
+ /*
+@@ -1060,6 +1071,8 @@ static int usbhid_start(struct hid_device *hid)
+       unsigned int n, insize = 0;
+       int ret;
+ 
++      mutex_lock(&usbhid->mutex);
++
+       clear_bit(HID_DISCONNECTED, &usbhid->iofl);
+ 
+       usbhid->bufsize = HID_MIN_BUFFER_SIZE;
+@@ -1180,6 +1193,8 @@ static int usbhid_start(struct hid_device *hid)
+               usbhid_set_leds(hid);
+               device_set_wakeup_enable(&dev->dev, 1);
+       }
++
++      mutex_unlock(&usbhid->mutex);
+       return 0;
+ 
+ fail:
+@@ -1190,6 +1205,7 @@ fail:
+       usbhid->urbout = NULL;
+       usbhid->urbctrl = NULL;
+       hid_free_buffers(dev, hid);
++      mutex_unlock(&usbhid->mutex);
+       return ret;
+ }
+ 
+@@ -1205,6 +1221,8 @@ static void usbhid_stop(struct hid_device *hid)
+               usbhid->intf->needs_remote_wakeup = 0;
+       }
+ 
++      mutex_lock(&usbhid->mutex);
++
+       clear_bit(HID_STARTED, &usbhid->iofl);
+       spin_lock_irq(&usbhid->lock);   /* Sync with error and led handlers */
+       set_bit(HID_DISCONNECTED, &usbhid->iofl);
+@@ -1225,6 +1243,8 @@ static void usbhid_stop(struct hid_device *hid)
+       usbhid->urbout = NULL;
+ 
+       hid_free_buffers(hid_to_usb_dev(hid), hid);
++
++      mutex_unlock(&usbhid->mutex);
+ }
+ 
+ static int usbhid_power(struct hid_device *hid, int lvl)
+@@ -1385,6 +1405,7 @@ static int usbhid_probe(struct usb_interface *intf, 
const struct usb_device_id *
+       INIT_WORK(&usbhid->reset_work, hid_reset);
+       timer_setup(&usbhid->io_retry, hid_retry_timeout, 0);
+       spin_lock_init(&usbhid->lock);
++      mutex_init(&usbhid->mutex);
+ 
+       ret = hid_add_device(hid);
+       if (ret) {
+diff --git a/drivers/hid/usbhid/usbhid.h b/drivers/hid/usbhid/usbhid.h
+index da9c61d54be6..caa0ee639581 100644
+--- a/drivers/hid/usbhid/usbhid.h
++++ b/drivers/hid/usbhid/usbhid.h
+@@ -93,6 +93,7 @@ struct usbhid_device {
+       dma_addr_t outbuf_dma;                                          /* 
Output buffer dma */
+       unsigned long last_out;                                                 
/* record of last output for timeouts */
+ 
++      struct mutex mutex;                                             /* 
start/stop/open/close */
+       spinlock_t lock;                                                /* fifo 
spinlock */
+       unsigned long iofl;                                             /* I/O 
flags (CTRL_RUNNING, OUT_RUNNING) */
+       struct timer_list io_retry;                                     /* 
Retry timer */
+diff --git a/drivers/hid/wacom_sys.c b/drivers/hid/wacom_sys.c
+index 3038c975e417..8249ff3a5a8d 100644
+--- a/drivers/hid/wacom_sys.c
++++ b/drivers/hid/wacom_sys.c
+@@ -290,9 +290,11 @@ static void wacom_feature_mapping(struct hid_device *hdev,
+                       data[0] = field->report->id;
+                       ret = wacom_get_report(hdev, HID_FEATURE_REPORT,
+                                              data, n, WAC_CMD_RETRIES);
+-                      if (ret == n) {
++                      if (ret == n && features->type == HID_GENERIC) {
+                               ret = hid_report_raw_event(hdev,
+                                       HID_FEATURE_REPORT, data, n, 0);
++                      } else if (ret == 2 && features->type != HID_GENERIC) {
++                              features->touch_max = data[1];
+                       } else {
+                               features->touch_max = 16;
+                               hid_warn(hdev, "wacom_feature_mapping: "
+diff --git a/drivers/net/ethernet/broadcom/bnxt/bnxt.c 
b/drivers/net/ethernet/broadcom/bnxt/bnxt.c
+index f008c91d4566..dca58d28d82f 100644
+--- a/drivers/net/ethernet/broadcom/bnxt/bnxt.c
++++ b/drivers/net/ethernet/broadcom/bnxt/bnxt.c
+@@ -7562,6 +7562,7 @@ static netdev_features_t bnxt_fix_features(struct 
net_device *dev,
+                                          netdev_features_t features)
+ {
+       struct bnxt *bp = netdev_priv(dev);
++      netdev_features_t vlan_features;
+ 
+       if ((features & NETIF_F_NTUPLE) && !bnxt_rfs_capable(bp))
+               features &= ~NETIF_F_NTUPLE;
+@@ -7578,12 +7579,14 @@ static netdev_features_t bnxt_fix_features(struct 
net_device *dev,
+       /* Both CTAG and STAG VLAN accelaration on the RX side have to be
+        * turned on or off together.
+        */
+-      if ((features & (NETIF_F_HW_VLAN_CTAG_RX | NETIF_F_HW_VLAN_STAG_RX)) !=
+-          (NETIF_F_HW_VLAN_CTAG_RX | NETIF_F_HW_VLAN_STAG_RX)) {
++      vlan_features = features & (NETIF_F_HW_VLAN_CTAG_RX |
++                                  NETIF_F_HW_VLAN_STAG_RX);
++      if (vlan_features != (NETIF_F_HW_VLAN_CTAG_RX |
++                            NETIF_F_HW_VLAN_STAG_RX)) {
+               if (dev->features & NETIF_F_HW_VLAN_CTAG_RX)
+                       features &= ~(NETIF_F_HW_VLAN_CTAG_RX |
+                                     NETIF_F_HW_VLAN_STAG_RX);
+-              else
++              else if (vlan_features)
+                       features |= NETIF_F_HW_VLAN_CTAG_RX |
+                                   NETIF_F_HW_VLAN_STAG_RX;
+       }
+@@ -9297,8 +9300,11 @@ static pci_ers_result_t bnxt_io_slot_reset(struct 
pci_dev *pdev)
+               }
+       }
+ 
+-      if (result != PCI_ERS_RESULT_RECOVERED && netif_running(netdev))
+-              dev_close(netdev);
++      if (result != PCI_ERS_RESULT_RECOVERED) {
++              if (netif_running(netdev))
++                      dev_close(netdev);
++              pci_disable_device(pdev);
++      }
+ 
+       rtnl_unlock();
+ 
+@@ -9309,7 +9315,7 @@ static pci_ers_result_t bnxt_io_slot_reset(struct 
pci_dev *pdev)
+                        err); /* non-fatal, continue */
+       }
+ 
+-      return PCI_ERS_RESULT_RECOVERED;
++      return result;
+ }
+ 
+ /**
+diff --git a/drivers/net/ethernet/broadcom/bnxt/bnxt.h 
b/drivers/net/ethernet/broadcom/bnxt/bnxt.h
+index 585f5aef0a45..f3f5484c43e4 100644
+--- a/drivers/net/ethernet/broadcom/bnxt/bnxt.h
++++ b/drivers/net/ethernet/broadcom/bnxt/bnxt.h
+@@ -839,7 +839,6 @@ struct bnxt_vf_info {
+ #define BNXT_VF_LINK_FORCED   0x4
+ #define BNXT_VF_LINK_UP               0x8
+ #define BNXT_VF_TRUST         0x10
+-      u32     func_flags; /* func cfg flags */
+       u32     min_tx_rate;
+       u32     max_tx_rate;
+       void    *hwrm_cmd_req_addr;
+diff --git a/drivers/net/ethernet/broadcom/bnxt/bnxt_sriov.c 
b/drivers/net/ethernet/broadcom/bnxt/bnxt_sriov.c
+index 3962f6fd543c..bba6f09279d5 100644
+--- a/drivers/net/ethernet/broadcom/bnxt/bnxt_sriov.c
++++ b/drivers/net/ethernet/broadcom/bnxt/bnxt_sriov.c
+@@ -99,11 +99,10 @@ int bnxt_set_vf_spoofchk(struct net_device *dev, int 
vf_id, bool setting)
+       if (old_setting == setting)
+               return 0;
+ 
+-      func_flags = vf->func_flags;
+       if (setting)
+-              func_flags |= FUNC_CFG_REQ_FLAGS_SRC_MAC_ADDR_CHECK_ENABLE;
++              func_flags = FUNC_CFG_REQ_FLAGS_SRC_MAC_ADDR_CHECK_ENABLE;
+       else
+-              func_flags |= FUNC_CFG_REQ_FLAGS_SRC_MAC_ADDR_CHECK_DISABLE;
++              func_flags = FUNC_CFG_REQ_FLAGS_SRC_MAC_ADDR_CHECK_DISABLE;
+       /*TODO: if the driver supports VLAN filter on guest VLAN,
+        * the spoof check should also include vlan anti-spoofing
+        */
+@@ -112,7 +111,6 @@ int bnxt_set_vf_spoofchk(struct net_device *dev, int 
vf_id, bool setting)
+       req.flags = cpu_to_le32(func_flags);
+       rc = hwrm_send_message(bp, &req, sizeof(req), HWRM_CMD_TIMEOUT);
+       if (!rc) {
+-              vf->func_flags = func_flags;
+               if (setting)
+                       vf->flags |= BNXT_VF_SPOOFCHK;
+               else
+@@ -197,7 +195,6 @@ int bnxt_set_vf_mac(struct net_device *dev, int vf_id, u8 
*mac)
+       memcpy(vf->mac_addr, mac, ETH_ALEN);
+       bnxt_hwrm_cmd_hdr_init(bp, &req, HWRM_FUNC_CFG, -1, -1);
+       req.fid = cpu_to_le16(vf->fw_fid);
+-      req.flags = cpu_to_le32(vf->func_flags);
+       req.enables = cpu_to_le32(FUNC_CFG_REQ_ENABLES_DFLT_MAC_ADDR);
+       memcpy(req.dflt_mac_addr, mac, ETH_ALEN);
+       return hwrm_send_message(bp, &req, sizeof(req), HWRM_CMD_TIMEOUT);
+@@ -235,7 +232,6 @@ int bnxt_set_vf_vlan(struct net_device *dev, int vf_id, 
u16 vlan_id, u8 qos,
+ 
+       bnxt_hwrm_cmd_hdr_init(bp, &req, HWRM_FUNC_CFG, -1, -1);
+       req.fid = cpu_to_le16(vf->fw_fid);
+-      req.flags = cpu_to_le32(vf->func_flags);
+       req.dflt_vlan = cpu_to_le16(vlan_tag);
+       req.enables = cpu_to_le32(FUNC_CFG_REQ_ENABLES_DFLT_VLAN);
+       rc = hwrm_send_message(bp, &req, sizeof(req), HWRM_CMD_TIMEOUT);
+@@ -274,7 +270,6 @@ int bnxt_set_vf_bw(struct net_device *dev, int vf_id, int 
min_tx_rate,
+               return 0;
+       bnxt_hwrm_cmd_hdr_init(bp, &req, HWRM_FUNC_CFG, -1, -1);
+       req.fid = cpu_to_le16(vf->fw_fid);
+-      req.flags = cpu_to_le32(vf->func_flags);
+       req.enables = cpu_to_le32(FUNC_CFG_REQ_ENABLES_MAX_BW);
+       req.max_bw = cpu_to_le32(max_tx_rate);
+       req.enables |= cpu_to_le32(FUNC_CFG_REQ_ENABLES_MIN_BW);
+diff --git a/drivers/net/ethernet/mellanox/mlx4/main.c 
b/drivers/net/ethernet/mellanox/mlx4/main.c
+index 4afe56a6eedf..f7825c7b92fe 100644
+--- a/drivers/net/ethernet/mellanox/mlx4/main.c
++++ b/drivers/net/ethernet/mellanox/mlx4/main.c
+@@ -2539,6 +2539,7 @@ static int mlx4_allocate_default_counters(struct 
mlx4_dev *dev)
+ 
+               if (!err || err == -ENOSPC) {
+                       priv->def_counter[port] = idx;
++                      err = 0;
+               } else if (err == -ENOENT) {
+                       err = 0;
+                       continue;
+@@ -2589,7 +2590,8 @@ int mlx4_counter_alloc(struct mlx4_dev *dev, u32 *idx, 
u8 usage)
+                                  MLX4_CMD_TIME_CLASS_A, MLX4_CMD_WRAPPED);
+               if (!err)
+                       *idx = get_param_l(&out_param);
+-
++              if (WARN_ON(err == -ENOSPC))
++                      err = -EINVAL;
+               return err;
+       }
+       return __mlx4_counter_alloc(dev, idx);
+diff --git a/drivers/net/ethernet/mellanox/mlx5/core/cmd.c 
b/drivers/net/ethernet/mellanox/mlx5/core/cmd.c
+index a53736c26c0c..300456684728 100644
+--- a/drivers/net/ethernet/mellanox/mlx5/core/cmd.c
++++ b/drivers/net/ethernet/mellanox/mlx5/core/cmd.c
+@@ -862,7 +862,6 @@ static void cmd_work_handler(struct work_struct *work)
+       }
+ 
+       cmd->ent_arr[ent->idx] = ent;
+-      set_bit(MLX5_CMD_ENT_STATE_PENDING_COMP, &ent->state);
+       lay = get_inst(cmd, ent->idx);
+       ent->lay = lay;
+       memset(lay, 0, sizeof(*lay));
+@@ -884,6 +883,7 @@ static void cmd_work_handler(struct work_struct *work)
+ 
+       if (ent->callback)
+               schedule_delayed_work(&ent->cb_timeout_work, cb_timeout);
++      set_bit(MLX5_CMD_ENT_STATE_PENDING_COMP, &ent->state);
+ 
+       /* Skip sending command to fw if internal error */
+       if (pci_channel_offline(dev->pdev) ||
+@@ -896,6 +896,10 @@ static void cmd_work_handler(struct work_struct *work)
+               MLX5_SET(mbox_out, ent->out, syndrome, drv_synd);
+ 
+               mlx5_cmd_comp_handler(dev, 1UL << ent->idx, true);
++              /* no doorbell, no need to keep the entry */
++              free_ent(cmd, ent->idx);
++              if (ent->callback)
++                      free_cmd(ent);
+               return;
+       }
+ 
+diff --git a/drivers/net/macsec.c b/drivers/net/macsec.c
+index 9e2612562981..4ad3b877e5fd 100644
+--- a/drivers/net/macsec.c
++++ b/drivers/net/macsec.c
+@@ -1313,7 +1313,8 @@ static struct crypto_aead *macsec_alloc_tfm(char *key, 
int key_len, int icv_len)
+       struct crypto_aead *tfm;
+       int ret;
+ 
+-      tfm = crypto_alloc_aead("gcm(aes)", 0, 0);
++      /* Pick a sync gcm(aes) cipher to ensure order is preserved. */
++      tfm = crypto_alloc_aead("gcm(aes)", 0, CRYPTO_ALG_ASYNC);
+ 
+       if (IS_ERR(tfm))
+               return tfm;
+diff --git a/drivers/net/phy/dp83640.c b/drivers/net/phy/dp83640.c
+index 59b3f1fbabd4..4fed77833157 100644
+--- a/drivers/net/phy/dp83640.c
++++ b/drivers/net/phy/dp83640.c
+@@ -1114,7 +1114,7 @@ static struct dp83640_clock 
*dp83640_clock_get_bus(struct mii_bus *bus)
+               goto out;
+       }
+       dp83640_clock_init(clock, bus);
+-      list_add_tail(&phyter_clocks, &clock->list);
++      list_add_tail(&clock->list, &phyter_clocks);
+ out:
+       mutex_unlock(&phyter_clocks_lock);
+ 
+diff --git a/drivers/net/usb/qmi_wwan.c b/drivers/net/usb/qmi_wwan.c
+index a7804def1120..c8222cdf755d 100644
+--- a/drivers/net/usb/qmi_wwan.c
++++ b/drivers/net/usb/qmi_wwan.c
+@@ -1294,6 +1294,7 @@ static const struct usb_device_id products[] = {
+       {QMI_FIXED_INTF(0x413c, 0x81b3, 8)},    /* Dell Wireless 5809e Gobi(TM) 
4G LTE Mobile Broadband Card (rev3) */
+       {QMI_FIXED_INTF(0x413c, 0x81b6, 8)},    /* Dell Wireless 5811e */
+       {QMI_FIXED_INTF(0x413c, 0x81b6, 10)},   /* Dell Wireless 5811e */
++      {QMI_FIXED_INTF(0x413c, 0x81cc, 8)},    /* Dell Wireless 5816e */
+       {QMI_FIXED_INTF(0x413c, 0x81d7, 0)},    /* Dell Wireless 5821e */
+       {QMI_FIXED_INTF(0x413c, 0x81d7, 1)},    /* Dell Wireless 5821e 
preproduction config */
+       {QMI_FIXED_INTF(0x413c, 0x81e0, 0)},    /* Dell Wireless 5821e with 
eSIM support*/
+diff --git a/drivers/staging/gasket/gasket_core.c 
b/drivers/staging/gasket/gasket_core.c
+index d12ab560411f..9396aeb3f431 100644
+--- a/drivers/staging/gasket/gasket_core.c
++++ b/drivers/staging/gasket/gasket_core.c
+@@ -933,6 +933,10 @@ do_map_region(const struct gasket_dev *gasket_dev, struct 
vm_area_struct *vma,
+               gasket_get_bar_index(gasket_dev,
+                                    (vma->vm_pgoff << PAGE_SHIFT) +
+                                    driver_desc->legacy_mmap_address_offset);
++
++      if (bar_index < 0)
++              return DO_MAP_REGION_INVALID;
++
+       phys_base = gasket_dev->bar_data[bar_index].phys_base + phys_offset;
+       while (mapped_bytes < map_length) {
+               /*
+diff --git a/drivers/tty/vt/vt.c b/drivers/tty/vt/vt.c
+index ca8c6ddc1ca8..5c7a968a5ea6 100644
+--- a/drivers/tty/vt/vt.c
++++ b/drivers/tty/vt/vt.c
+@@ -365,9 +365,14 @@ static struct uni_screen *vc_uniscr_alloc(unsigned int 
cols, unsigned int rows)
+       return uniscr;
+ }
+ 
++static void vc_uniscr_free(struct uni_screen *uniscr)
++{
++      vfree(uniscr);
++}
++
+ static void vc_uniscr_set(struct vc_data *vc, struct uni_screen *new_uniscr)
+ {
+-      vfree(vc->vc_uni_screen);
++      vc_uniscr_free(vc->vc_uni_screen);
+       vc->vc_uni_screen = new_uniscr;
+ }
+ 
+@@ -1233,7 +1238,7 @@ static int vc_do_resize(struct tty_struct *tty, struct 
vc_data *vc,
+       err = resize_screen(vc, new_cols, new_rows, user);
+       if (err) {
+               kfree(newscreen);
+-              kfree(new_uniscr);
++              vc_uniscr_free(new_uniscr);
+               return err;
+       }
+ 
+diff --git a/drivers/usb/serial/garmin_gps.c b/drivers/usb/serial/garmin_gps.c
+index 633550ec3025..f29c3a936a08 100644
+--- a/drivers/usb/serial/garmin_gps.c
++++ b/drivers/usb/serial/garmin_gps.c
+@@ -1138,8 +1138,8 @@ static void garmin_read_process(struct garmin_data 
*garmin_data_p,
+                  send it directly to the tty port */
+               if (garmin_data_p->flags & FLAGS_QUEUING) {
+                       pkt_add(garmin_data_p, data, data_length);
+-              } else if (bulk_data ||
+-                         getLayerId(data) == GARMIN_LAYERID_APPL) {
++              } else if (bulk_data || (data_length >= sizeof(u32) &&
++                              getLayerId(data) == GARMIN_LAYERID_APPL)) {
+ 
+                       spin_lock_irqsave(&garmin_data_p->lock, flags);
+                       garmin_data_p->flags |= APP_RESP_SEEN;
+diff --git a/drivers/usb/serial/qcserial.c b/drivers/usb/serial/qcserial.c
+index 613f91add03d..ce0401d3137f 100644
+--- a/drivers/usb/serial/qcserial.c
++++ b/drivers/usb/serial/qcserial.c
+@@ -173,6 +173,7 @@ static const struct usb_device_id id_table[] = {
+       {DEVICE_SWI(0x413c, 0x81b3)},   /* Dell Wireless 5809e Gobi(TM) 4G LTE 
Mobile Broadband Card (rev3) */
+       {DEVICE_SWI(0x413c, 0x81b5)},   /* Dell Wireless 5811e QDL */
+       {DEVICE_SWI(0x413c, 0x81b6)},   /* Dell Wireless 5811e QDL */
++      {DEVICE_SWI(0x413c, 0x81cc)},   /* Dell Wireless 5816e */
+       {DEVICE_SWI(0x413c, 0x81cf)},   /* Dell Wireless 5819 */
+       {DEVICE_SWI(0x413c, 0x81d0)},   /* Dell Wireless 5819 */
+       {DEVICE_SWI(0x413c, 0x81d1)},   /* Dell Wireless 5818 */
+diff --git a/drivers/usb/storage/unusual_uas.h 
b/drivers/usb/storage/unusual_uas.h
+index 1b23741036ee..37157ed9a881 100644
+--- a/drivers/usb/storage/unusual_uas.h
++++ b/drivers/usb/storage/unusual_uas.h
+@@ -28,6 +28,13 @@
+  * and don't forget to CC: the USB development list 
<[email protected]>
+  */
+ 
++/* Reported-by: Julian Groß <[email protected]> */
++UNUSUAL_DEV(0x059f, 0x105f, 0x0000, 0x9999,
++              "LaCie",
++              "2Big Quadra USB3",
++              USB_SC_DEVICE, USB_PR_DEVICE, NULL,
++              US_FL_NO_REPORT_OPCODES),
++
+ /*
+  * Apricorn USB3 dongle sometimes returns "USBSUSBSUSBS" in response to SCSI
+  * commands in UAS mode.  Observed with the 1.28 firmware; are there others?
+diff --git a/fs/coredump.c b/fs/coredump.c
+index 1e2c87acac9b..ef7ed64947e9 100644
+--- a/fs/coredump.c
++++ b/fs/coredump.c
+@@ -753,6 +753,14 @@ void do_coredump(const siginfo_t *siginfo)
+       if (displaced)
+               put_files_struct(displaced);
+       if (!dump_interrupted()) {
++              /*
++               * umh disabled with CONFIG_STATIC_USERMODEHELPER_PATH="" would
++               * have this set to NULL.
++               */
++              if (!cprm.file) {
++                      pr_info("Core dump to |%s disabled\n", cn.corename);
++                      goto close_fail;
++              }
+               file_start_write(cprm.file);
+               core_dumped = binfmt->core_dump(&cprm);
+               file_end_write(cprm.file);
+diff --git a/include/linux/virtio_net.h b/include/linux/virtio_net.h
+index e0348cb0a1dd..f36727098df8 100644
+--- a/include/linux/virtio_net.h
++++ b/include/linux/virtio_net.h
+@@ -3,6 +3,8 @@
+ #define _LINUX_VIRTIO_NET_H
+ 
+ #include <linux/if_vlan.h>
++#include <uapi/linux/tcp.h>
++#include <uapi/linux/udp.h>
+ #include <uapi/linux/virtio_net.h>
+ 
+ static inline int virtio_net_hdr_set_proto(struct sk_buff *skb,
+@@ -28,17 +30,25 @@ static inline int virtio_net_hdr_to_skb(struct sk_buff 
*skb,
+                                       bool little_endian)
+ {
+       unsigned int gso_type = 0;
++      unsigned int thlen = 0;
++      unsigned int ip_proto;
+ 
+       if (hdr->gso_type != VIRTIO_NET_HDR_GSO_NONE) {
+               switch (hdr->gso_type & ~VIRTIO_NET_HDR_GSO_ECN) {
+               case VIRTIO_NET_HDR_GSO_TCPV4:
+                       gso_type = SKB_GSO_TCPV4;
++                      ip_proto = IPPROTO_TCP;
++                      thlen = sizeof(struct tcphdr);
+                       break;
+               case VIRTIO_NET_HDR_GSO_TCPV6:
+                       gso_type = SKB_GSO_TCPV6;
++                      ip_proto = IPPROTO_TCP;
++                      thlen = sizeof(struct tcphdr);
+                       break;
+               case VIRTIO_NET_HDR_GSO_UDP:
+                       gso_type = SKB_GSO_UDP;
++                      ip_proto = IPPROTO_UDP;
++                      thlen = sizeof(struct udphdr);
+                       break;
+               default:
+                       return -EINVAL;
+@@ -57,16 +67,22 @@ static inline int virtio_net_hdr_to_skb(struct sk_buff 
*skb,
+ 
+               if (!skb_partial_csum_set(skb, start, off))
+                       return -EINVAL;
++
++              if (skb_transport_offset(skb) + thlen > skb_headlen(skb))
++                      return -EINVAL;
+       } else {
+               /* gso packets without NEEDS_CSUM do not set transport_offset.
+                * probe and drop if does not match one of the above types.
+                */
+               if (gso_type && skb->network_header) {
++                      struct flow_keys_basic keys;
++
+                       if (!skb->protocol)
+                               virtio_net_hdr_set_proto(skb, hdr);
+ retry:
+-                      skb_probe_transport_header(skb, -1);
+-                      if (!skb_transport_header_was_set(skb)) {
++                      if (!skb_flow_dissect_flow_keys_basic(skb, &keys,
++                                                            NULL, 0, 0, 0,
++                                                            0)) {
+                               /* UFO does not specify ipv4 or 6: try both */
+                               if (gso_type & SKB_GSO_UDP &&
+                                   skb->protocol == htons(ETH_P_IP)) {
+@@ -75,6 +91,12 @@ retry:
+                               }
+                               return -EINVAL;
+                       }
++
++                      if (keys.control.thoff + thlen > skb_headlen(skb) ||
++                          keys.basic.ip_proto != ip_proto)
++                              return -EINVAL;
++
++                      skb_set_transport_header(skb, keys.control.thoff);
+               }
+       }
+ 
+diff --git a/ipc/mqueue.c b/ipc/mqueue.c
+index de4070d5472f..46d0265423f5 100644
+--- a/ipc/mqueue.c
++++ b/ipc/mqueue.c
+@@ -76,6 +76,7 @@ struct mqueue_inode_info {
+ 
+       struct sigevent notify;
+       struct pid *notify_owner;
++      u32 notify_self_exec_id;
+       struct user_namespace *notify_user_ns;
+       struct user_struct *user;       /* user who created, for accounting */
+       struct sock *notify_sock;
+@@ -662,28 +663,44 @@ static void __do_notify(struct mqueue_inode_info *info)
+        * synchronously. */
+       if (info->notify_owner &&
+           info->attr.mq_curmsgs == 1) {
+-              struct siginfo sig_i;
+               switch (info->notify.sigev_notify) {
+               case SIGEV_NONE:
+                       break;
+-              case SIGEV_SIGNAL:
+-                      /* sends signal */
++              case SIGEV_SIGNAL: {
++                      struct siginfo sig_i;
++                      struct task_struct *task;
++
++                      /* do_mq_notify() accepts sigev_signo == 0, why?? */
++                      if (!info->notify.sigev_signo)
++                              break;
+ 
+                       clear_siginfo(&sig_i);
+                       sig_i.si_signo = info->notify.sigev_signo;
+                       sig_i.si_errno = 0;
+                       sig_i.si_code = SI_MESGQ;
+                       sig_i.si_value = info->notify.sigev_value;
+-                      /* map current pid/uid into info->owner's namespaces */
+                       rcu_read_lock();
++                      /* map current pid/uid into info->owner's namespaces */
+                       sig_i.si_pid = task_tgid_nr_ns(current,
+                                               ns_of_pid(info->notify_owner));
+-                      sig_i.si_uid = from_kuid_munged(info->notify_user_ns, 
current_uid());
++                      sig_i.si_uid = from_kuid_munged(info->notify_user_ns,
++                                              current_uid());
++                      /*
++                       * We can't use kill_pid_info(), this signal should
++                       * bypass check_kill_permission(). It is from kernel
++                       * but si_fromuser() can't know this.
++                       * We do check the self_exec_id, to avoid sending
++                       * signals to programs that don't expect them.
++                       */
++                      task = pid_task(info->notify_owner, PIDTYPE_TGID);
++                      if (task && task->self_exec_id ==
++                                              info->notify_self_exec_id) {
++                              do_send_sig_info(info->notify.sigev_signo,
++                                              &sig_i, task, PIDTYPE_TGID);
++                      }
+                       rcu_read_unlock();
+-
+-                      kill_pid_info(info->notify.sigev_signo,
+-                                    &sig_i, info->notify_owner);
+                       break;
++              }
+               case SIGEV_THREAD:
+                       set_cookie(info->notify_cookie, NOTIFY_WOKENUP);
+                       netlink_sendskb(info->notify_sock, info->notify_cookie);
+@@ -1273,6 +1290,7 @@ retry:
+                       info->notify.sigev_signo = notification->sigev_signo;
+                       info->notify.sigev_value = notification->sigev_value;
+                       info->notify.sigev_notify = SIGEV_SIGNAL;
++                      info->notify_self_exec_id = current->self_exec_id;
+                       break;
+               }
+ 
+diff --git a/kernel/trace/trace.c b/kernel/trace/trace.c
+index c41f7d1ab5fa..4966410bb0f4 100644
+--- a/kernel/trace/trace.c
++++ b/kernel/trace/trace.c
+@@ -7750,6 +7750,19 @@ static int allocate_trace_buffers(struct trace_array 
*tr, int size)
+        */
+       allocate_snapshot = false;
+ #endif
++
++      /*
++       * Because of some magic with the way alloc_percpu() works on
++       * x86_64, we need to synchronize the pgd of all the tables,
++       * otherwise the trace events that happen in x86_64 page fault
++       * handlers can't cope with accessing the chance that a
++       * alloc_percpu()'d memory might be touched in the page fault trace
++       * event. Oh, and we need to audit all other alloc_percpu() and 
vmalloc()
++       * calls in tracing, because something might get triggered within a
++       * page fault trace event!
++       */
++      vmalloc_sync_mappings();
++
+       return 0;
+ }
+ 
+diff --git a/kernel/trace/trace_kprobe.c b/kernel/trace/trace_kprobe.c
+index 65b4e28ff425..c45b017bacd4 100644
+--- a/kernel/trace/trace_kprobe.c
++++ b/kernel/trace/trace_kprobe.c
+@@ -538,7 +538,7 @@ static bool __within_notrace_func(unsigned long addr)
+ 
+ static bool within_notrace_func(struct trace_kprobe *tk)
+ {
+-      unsigned long addr = addr = trace_kprobe_address(tk);
++      unsigned long addr = trace_kprobe_address(tk);
+       char symname[KSYM_NAME_LEN], *p;
+ 
+       if (!__within_notrace_func(addr))
+diff --git a/kernel/umh.c b/kernel/umh.c
+index c449858946af..52a9084f8541 100644
+--- a/kernel/umh.c
++++ b/kernel/umh.c
+@@ -522,6 +522,11 @@ EXPORT_SYMBOL_GPL(fork_usermode_blob);
+  * Runs a user-space application.  The application is started
+  * asynchronously if wait is not set, and runs as a child of system 
workqueues.
+  * (ie. it runs with full root capabilities and optimized affinity).
++ *
++ * Note: successful return value does not guarantee the helper was called at
++ * all. You can't rely on sub_info->{init,cleanup} being called even for
++ * UMH_WAIT_* wait modes as STATIC_USERMODEHELPER_PATH="" turns all helpers
++ * into a successful no-op.
+  */
+ int call_usermodehelper_exec(struct subprocess_info *sub_info, int wait)
+ {
+diff --git a/mm/page_alloc.c b/mm/page_alloc.c
+index 57888cedf244..d8c3051387d1 100644
+--- a/mm/page_alloc.c
++++ b/mm/page_alloc.c
+@@ -1422,6 +1422,7 @@ void set_zone_contiguous(struct zone *zone)
+               if (!__pageblock_pfn_to_page(block_start_pfn,
+                                            block_end_pfn, zone))
+                       return;
++              cond_resched();
+       }
+ 
+       /* We confirm that there is no hole */
+diff --git a/net/batman-adv/bat_v_ogm.c b/net/batman-adv/bat_v_ogm.c
+index bf9ea404abe7..0458de53cb64 100644
+--- a/net/batman-adv/bat_v_ogm.c
++++ b/net/batman-adv/bat_v_ogm.c
+@@ -735,7 +735,7 @@ static void batadv_v_ogm_process(const struct sk_buff 
*skb, int ogm_offset,
+ 
+       orig_node = batadv_v_ogm_orig_get(bat_priv, ogm_packet->orig);
+       if (!orig_node)
+-              return;
++              goto out;
+ 
+       neigh_node = batadv_neigh_node_get_or_create(orig_node, if_incoming,
+                                                    ethhdr->h_source);
+diff --git a/net/batman-adv/network-coding.c b/net/batman-adv/network-coding.c
+index 34caf129a9bf..7f1be5a28757 100644
+--- a/net/batman-adv/network-coding.c
++++ b/net/batman-adv/network-coding.c
+@@ -1021,15 +1021,8 @@ static struct batadv_nc_path *batadv_nc_get_path(struct 
batadv_priv *bat_priv,
+  */
+ static u8 batadv_nc_random_weight_tq(u8 tq)
+ {
+-      u8 rand_val, rand_tq;
+-
+-      get_random_bytes(&rand_val, sizeof(rand_val));
+-
+       /* randomize the estimated packet loss (max TQ - estimated TQ) */
+-      rand_tq = rand_val * (BATADV_TQ_MAX_VALUE - tq);
+-
+-      /* normalize the randomized packet loss */
+-      rand_tq /= BATADV_TQ_MAX_VALUE;
++      u8 rand_tq = prandom_u32_max(BATADV_TQ_MAX_VALUE + 1 - tq);
+ 
+       /* convert to (randomized) estimated tq again */
+       return BATADV_TQ_MAX_VALUE - rand_tq;
+diff --git a/net/batman-adv/sysfs.c b/net/batman-adv/sysfs.c
+index 09427fc6494a..976b038e53bf 100644
+--- a/net/batman-adv/sysfs.c
++++ b/net/batman-adv/sysfs.c
+@@ -1093,7 +1093,7 @@ static ssize_t batadv_store_throughput_override(struct 
kobject *kobj,
+       ret = batadv_parse_throughput(net_dev, buff, "throughput_override",
+                                     &tp_override);
+       if (!ret)
+-              return count;
++              goto out;
+ 
+       old_tp_override = atomic_read(&hard_iface->bat_v.throughput_override);
+       if (old_tp_override == tp_override)
+@@ -1126,6 +1126,7 @@ static ssize_t batadv_show_throughput_override(struct 
kobject *kobj,
+ 
+       tp_override = atomic_read(&hard_iface->bat_v.throughput_override);
+ 
++      batadv_hardif_put(hard_iface);
+       return sprintf(buff, "%u.%u MBit\n", tp_override / 10,
+                      tp_override % 10);
+ }
+diff --git a/net/netfilter/nf_nat_proto_udp.c 
b/net/netfilter/nf_nat_proto_udp.c
+index 5790f70a83b2..d85c31c2433c 100644
+--- a/net/netfilter/nf_nat_proto_udp.c
++++ b/net/netfilter/nf_nat_proto_udp.c
+@@ -66,15 +66,14 @@ static bool udp_manip_pkt(struct sk_buff *skb,
+                         enum nf_nat_manip_type maniptype)
+ {
+       struct udphdr *hdr;
+-      bool do_csum;
+ 
+       if (!skb_make_writable(skb, hdroff + sizeof(*hdr)))
+               return false;
+ 
+       hdr = (struct udphdr *)(skb->data + hdroff);
+-      do_csum = hdr->check || skb->ip_summed == CHECKSUM_PARTIAL;
++      __udp_manip_pkt(skb, l3proto, iphdroff, hdr, tuple, maniptype,
++                      !!hdr->check);
+ 
+-      __udp_manip_pkt(skb, l3proto, iphdroff, hdr, tuple, maniptype, do_csum);
+       return true;
+ }
+ 
+diff --git a/net/netfilter/nfnetlink_osf.c b/net/netfilter/nfnetlink_osf.c
+index b0bc130947c9..131f9f8c0b09 100644
+--- a/net/netfilter/nfnetlink_osf.c
++++ b/net/netfilter/nfnetlink_osf.c
+@@ -170,12 +170,12 @@ static bool nf_osf_match_one(const struct sk_buff *skb,
+ static const struct tcphdr *nf_osf_hdr_ctx_init(struct nf_osf_hdr_ctx *ctx,
+                                               const struct sk_buff *skb,
+                                               const struct iphdr *ip,
+-                                              unsigned char *opts)
++                                              unsigned char *opts,
++                                              struct tcphdr *_tcph)
+ {
+       const struct tcphdr *tcp;
+-      struct tcphdr _tcph;
+ 
+-      tcp = skb_header_pointer(skb, ip_hdrlen(skb), sizeof(struct tcphdr), 
&_tcph);
++      tcp = skb_header_pointer(skb, ip_hdrlen(skb), sizeof(struct tcphdr), 
_tcph);
+       if (!tcp)
+               return NULL;
+ 
+@@ -210,10 +210,11 @@ nf_osf_match(const struct sk_buff *skb, u_int8_t family,
+       int fmatch = FMATCH_WRONG;
+       struct nf_osf_hdr_ctx ctx;
+       const struct tcphdr *tcp;
++      struct tcphdr _tcph;
+ 
+       memset(&ctx, 0, sizeof(ctx));
+ 
+-      tcp = nf_osf_hdr_ctx_init(&ctx, skb, ip, opts);
++      tcp = nf_osf_hdr_ctx_init(&ctx, skb, ip, opts, &_tcph);
+       if (!tcp)
+               return false;
+ 
+@@ -270,10 +271,11 @@ const char *nf_osf_find(const struct sk_buff *skb,
+       struct nf_osf_hdr_ctx ctx;
+       const struct tcphdr *tcp;
+       const char *genre = NULL;
++      struct tcphdr _tcph;
+ 
+       memset(&ctx, 0, sizeof(ctx));
+ 
+-      tcp = nf_osf_hdr_ctx_init(&ctx, skb, ip, opts);
++      tcp = nf_osf_hdr_ctx_init(&ctx, skb, ip, opts, &_tcph);
+       if (!tcp)
+               return NULL;
+ 
+diff --git a/net/sched/sch_choke.c b/net/sched/sch_choke.c
+index eafc0d17d174..63bfceeb8e3c 100644
+--- a/net/sched/sch_choke.c
++++ b/net/sched/sch_choke.c
+@@ -327,7 +327,8 @@ static void choke_reset(struct Qdisc *sch)
+ 
+       sch->q.qlen = 0;
+       sch->qstats.backlog = 0;
+-      memset(q->tab, 0, (q->tab_mask + 1) * sizeof(struct sk_buff *));
++      if (q->tab)
++              memset(q->tab, 0, (q->tab_mask + 1) * sizeof(struct sk_buff *));
+       q->head = q->tail = 0;
+       red_restart(&q->vars);
+ }
+diff --git a/net/sched/sch_fq_codel.c b/net/sched/sch_fq_codel.c
+index 137692cb8b4f..a862d9990be7 100644
+--- a/net/sched/sch_fq_codel.c
++++ b/net/sched/sch_fq_codel.c
+@@ -429,7 +429,7 @@ static int fq_codel_change(struct Qdisc *sch, struct 
nlattr *opt,
+               q->quantum = max(256U, nla_get_u32(tb[TCA_FQ_CODEL_QUANTUM]));
+ 
+       if (tb[TCA_FQ_CODEL_DROP_BATCH_SIZE])
+-              q->drop_batch_size = min(1U, 
nla_get_u32(tb[TCA_FQ_CODEL_DROP_BATCH_SIZE]));
++              q->drop_batch_size = max(1U, 
nla_get_u32(tb[TCA_FQ_CODEL_DROP_BATCH_SIZE]));
+ 
+       if (tb[TCA_FQ_CODEL_MEMORY_LIMIT])
+               q->memory_limit = min(1U << 31, 
nla_get_u32(tb[TCA_FQ_CODEL_MEMORY_LIMIT]));
+diff --git a/net/sched/sch_sfq.c b/net/sched/sch_sfq.c
+index d483d6ba59b7..b89cf0971d3d 100644
+--- a/net/sched/sch_sfq.c
++++ b/net/sched/sch_sfq.c
+@@ -641,6 +641,15 @@ static int sfq_change(struct Qdisc *sch, struct nlattr 
*opt)
+       if (ctl->divisor &&
+           (!is_power_of_2(ctl->divisor) || ctl->divisor > 65536))
+               return -EINVAL;
++
++      /* slot->allot is a short, make sure quantum is not too big. */
++      if (ctl->quantum) {
++              unsigned int scaled = SFQ_ALLOT_SIZE(ctl->quantum);
++
++              if (scaled <= 0 || scaled > SHRT_MAX)
++                      return -EINVAL;
++      }
++
+       if (ctl_v1 && !red_check_params(ctl_v1->qth_min, ctl_v1->qth_max,
+                                       ctl_v1->Wlog))
+               return -EINVAL;
+diff --git a/net/sched/sch_skbprio.c b/net/sched/sch_skbprio.c
+index 52c0b6d8f1d7..3d9de52849bc 100644
+--- a/net/sched/sch_skbprio.c
++++ b/net/sched/sch_skbprio.c
+@@ -173,6 +173,9 @@ static int skbprio_change(struct Qdisc *sch, struct nlattr 
*opt,
+ {
+       struct tc_skbprio_qopt *ctl = nla_data(opt);
+ 
++      if (opt->nla_len != nla_attr_size(sizeof(*ctl)))
++              return -EINVAL;
++
+       sch->limit = ctl->limit;
+       return 0;
+ }
+diff --git a/net/sctp/sm_statefuns.c b/net/sctp/sm_statefuns.c
+index 9f4d325f3a79..c437ae93b5a9 100644
+--- a/net/sctp/sm_statefuns.c
++++ b/net/sctp/sm_statefuns.c
+@@ -1880,7 +1880,7 @@ static enum sctp_disposition sctp_sf_do_dupcook_a(
+                */
+               sctp_add_cmd_sf(commands, SCTP_CMD_REPLY, SCTP_CHUNK(repl));
+               return sctp_sf_do_9_2_start_shutdown(net, ep, asoc,
+-                                                   SCTP_ST_CHUNK(0), NULL,
++                                                   SCTP_ST_CHUNK(0), repl,
+                                                    commands);
+       } else {
+               sctp_add_cmd_sf(commands, SCTP_CMD_NEW_STATE,
+@@ -5483,7 +5483,7 @@ enum sctp_disposition sctp_sf_do_9_2_start_shutdown(
+        * in the Cumulative TSN Ack field the last sequential TSN it
+        * has received from the peer.
+        */
+-      reply = sctp_make_shutdown(asoc, NULL);
++      reply = sctp_make_shutdown(asoc, arg);
+       if (!reply)
+               goto nomem;
+ 
+@@ -6081,7 +6081,7 @@ enum sctp_disposition sctp_sf_autoclose_timer_expire(
+       disposition = SCTP_DISPOSITION_CONSUME;
+       if (sctp_outq_is_empty(&asoc->outqueue)) {
+               disposition = sctp_sf_do_9_2_start_shutdown(net, ep, asoc, type,
+-                                                          arg, commands);
++                                                          NULL, commands);
+       }
+ 
+       return disposition;
+diff --git a/net/tipc/topsrv.c b/net/tipc/topsrv.c
+index 35558656fe02..41f4464ac6cc 100644
+--- a/net/tipc/topsrv.c
++++ b/net/tipc/topsrv.c
+@@ -409,10 +409,11 @@ static int tipc_conn_rcv_from_sock(struct tipc_conn *con)
+               read_lock_bh(&sk->sk_callback_lock);
+               ret = tipc_conn_rcv_sub(srv, con, &s);
+               read_unlock_bh(&sk->sk_callback_lock);
++              if (!ret)
++                      return 0;
+       }
+-      if (ret < 0)
+-              tipc_conn_close(con);
+ 
++      tipc_conn_close(con);
+       return ret;
+ }
+ 
+diff --git a/scripts/decodecode b/scripts/decodecode
+index 9cef558528aa..eeaa435d1bd2 100755
+--- a/scripts/decodecode
++++ b/scripts/decodecode
+@@ -119,7 +119,7 @@ faultlinenum=$(( $(wc -l $T.oo  | cut -d" " -f1) - \
+ faultline=`cat $T.dis | head -1 | cut -d":" -f2-`
+ faultline=`echo "$faultline" | sed -e 's/\[/\\\[/g; s/\]/\\\]/g'`
+ 
+-cat $T.oo | sed -e "${faultlinenum}s/^\(.*:\)\(.*\)/\1\*\2\t\t<-- trapping 
instruction/"
++cat $T.oo | sed -e "${faultlinenum}s/^\([^:]*:\)\(.*\)/\1\*\2\t\t<-- trapping 
instruction/"
+ echo
+ cat $T.aa
+ cleanup
+diff --git a/tools/objtool/check.c b/tools/objtool/check.c
+index 4613d796492a..4d509734b695 100644
+--- a/tools/objtool/check.c
++++ b/tools/objtool/check.c
+@@ -1315,7 +1315,7 @@ static int update_insn_state_regs(struct instruction 
*insn, struct insn_state *s
+       struct cfi_reg *cfa = &state->cfa;
+       struct stack_op *op = &insn->stack_op;
+ 
+-      if (cfa->base != CFI_SP)
++      if (cfa->base != CFI_SP && cfa->base != CFI_SP_INDIRECT)
+               return 0;
+ 
+       /* push */
+diff --git a/virt/kvm/arm/hyp/aarch32.c b/virt/kvm/arm/hyp/aarch32.c
+index d31f267961e7..25c0e47d57cb 100644
+--- a/virt/kvm/arm/hyp/aarch32.c
++++ b/virt/kvm/arm/hyp/aarch32.c
+@@ -125,12 +125,16 @@ static void __hyp_text kvm_adjust_itstate(struct 
kvm_vcpu *vcpu)
+  */
+ void __hyp_text kvm_skip_instr32(struct kvm_vcpu *vcpu, bool is_wide_instr)
+ {
++      u32 pc = *vcpu_pc(vcpu);
+       bool is_thumb;
+ 
+       is_thumb = !!(*vcpu_cpsr(vcpu) & PSR_AA32_T_BIT);
+       if (is_thumb && !is_wide_instr)
+-              *vcpu_pc(vcpu) += 2;
++              pc += 2;
+       else
+-              *vcpu_pc(vcpu) += 4;
++              pc += 4;
++
++      *vcpu_pc(vcpu) = pc;
++
+       kvm_adjust_itstate(vcpu);
+ }
+diff --git a/virt/kvm/arm/vgic/vgic-mmio.c b/virt/kvm/arm/vgic/vgic-mmio.c
+index 762f81900529..9d06a1f8e6c0 100644
+--- a/virt/kvm/arm/vgic/vgic-mmio.c
++++ b/virt/kvm/arm/vgic/vgic-mmio.c
+@@ -381,7 +381,7 @@ static void vgic_mmio_change_active(struct kvm_vcpu *vcpu, 
struct vgic_irq *irq,
+ static void vgic_change_active_prepare(struct kvm_vcpu *vcpu, u32 intid)
+ {
+       if (vcpu->kvm->arch.vgic.vgic_model == KVM_DEV_TYPE_ARM_VGIC_V3 ||
+-          intid > VGIC_NR_PRIVATE_IRQS)
++          intid >= VGIC_NR_PRIVATE_IRQS)
+               kvm_arm_halt_guest(vcpu->kvm);
+ }
+ 
+@@ -389,7 +389,7 @@ static void vgic_change_active_prepare(struct kvm_vcpu 
*vcpu, u32 intid)
+ static void vgic_change_active_finish(struct kvm_vcpu *vcpu, u32 intid)
+ {
+       if (vcpu->kvm->arch.vgic.vgic_model == KVM_DEV_TYPE_ARM_VGIC_V3 ||
+-          intid > VGIC_NR_PRIVATE_IRQS)
++          intid >= VGIC_NR_PRIVATE_IRQS)
+               kvm_arm_resume_guest(vcpu->kvm);
+ }
+ 

Reply via email to