commit:     4a4b885ea408461972fde710f9c18a1f04ca6cd5
Author:     Mike Pagano <mpagano <AT> gentoo <DOT> org>
AuthorDate: Wed Mar 24 12:06:01 2021 +0000
Commit:     Mike Pagano <mpagano <AT> gentoo <DOT> org>
CommitDate: Wed Mar 24 12:06:01 2021 +0000
URL:        https://gitweb.gentoo.org/proj/linux-patches.git/commit/?id=4a4b885e

Linux patch 4.4.263

Signed-off-by: Mike Pagano <mpagano <AT> gentoo.org>

 0000_README              |   4 +
 1262_linux-4.4.263.patch | 650 +++++++++++++++++++++++++++++++++++++++++++++++
 2 files changed, 654 insertions(+)

diff --git a/0000_README b/0000_README
index 77ec9dd..01ee91c 100644
--- a/0000_README
+++ b/0000_README
@@ -1091,6 +1091,10 @@ Patch:  1261_linux-4.4.262.patch
 From:   http://www.kernel.org
 Desc:   Linux 4.4.262
 
+Patch:  1262_linux-4.4.263.patch
+From:   http://www.kernel.org
+Desc:   Linux 4.4.263
+
 Patch:  1500_XATTR_USER_PREFIX.patch
 From:   https://bugs.gentoo.org/show_bug.cgi?id=470644
 Desc:   Support for namespace user.pax.* on tmpfs.

diff --git a/1262_linux-4.4.263.patch b/1262_linux-4.4.263.patch
new file mode 100644
index 0000000..3c388ae
--- /dev/null
+++ b/1262_linux-4.4.263.patch
@@ -0,0 +1,650 @@
+diff --git a/Makefile b/Makefile
+index 11acd6dd024a2..3f578adbe7fe6 100644
+--- a/Makefile
++++ b/Makefile
+@@ -1,6 +1,6 @@
+ VERSION = 4
+ PATCHLEVEL = 4
+-SUBLEVEL = 262
++SUBLEVEL = 263
+ EXTRAVERSION =
+ NAME = Blurry Fish Butt
+ 
+diff --git a/arch/x86/kernel/apic/io_apic.c b/arch/x86/kernel/apic/io_apic.c
+index 5e8fc9809da3f..497ad354e1234 100644
+--- a/arch/x86/kernel/apic/io_apic.c
++++ b/arch/x86/kernel/apic/io_apic.c
+@@ -1040,6 +1040,16 @@ static int mp_map_pin_to_irq(u32 gsi, int idx, int 
ioapic, int pin,
+       if (idx >= 0 && test_bit(mp_irqs[idx].srcbus, mp_bus_not_pci)) {
+               irq = mp_irqs[idx].srcbusirq;
+               legacy = mp_is_legacy_irq(irq);
++              /*
++               * IRQ2 is unusable for historical reasons on systems which
++               * have a legacy PIC. See the comment vs. IRQ2 further down.
++               *
++               * If this gets removed at some point then the related code
++               * in lapic_assign_system_vectors() needs to be adjusted as
++               * well.
++               */
++              if (legacy && irq == PIC_CASCADE_IR)
++                      return -EINVAL;
+       }
+ 
+       mutex_lock(&ioapic_mutex);
+diff --git a/drivers/pci/hotplug/rpadlpar_sysfs.c 
b/drivers/pci/hotplug/rpadlpar_sysfs.c
+index a796301ea03fb..ca9d832bd9f83 100644
+--- a/drivers/pci/hotplug/rpadlpar_sysfs.c
++++ b/drivers/pci/hotplug/rpadlpar_sysfs.c
+@@ -39,12 +39,11 @@ static ssize_t add_slot_store(struct kobject *kobj, struct 
kobj_attribute *attr,
+       if (nbytes >= MAX_DRC_NAME_LEN)
+               return 0;
+ 
+-      memcpy(drc_name, buf, nbytes);
++      strscpy(drc_name, buf, nbytes + 1);
+ 
+       end = strchr(drc_name, '\n');
+-      if (!end)
+-              end = &drc_name[nbytes];
+-      *end = '\0';
++      if (end)
++              *end = '\0';
+ 
+       rc = dlpar_add_slot(drc_name);
+       if (rc)
+@@ -70,12 +69,11 @@ static ssize_t remove_slot_store(struct kobject *kobj,
+       if (nbytes >= MAX_DRC_NAME_LEN)
+               return 0;
+ 
+-      memcpy(drc_name, buf, nbytes);
++      strscpy(drc_name, buf, nbytes + 1);
+ 
+       end = strchr(drc_name, '\n');
+-      if (!end)
+-              end = &drc_name[nbytes];
+-      *end = '\0';
++      if (end)
++              *end = '\0';
+ 
+       rc = dlpar_remove_slot(drc_name);
+       if (rc)
+diff --git a/drivers/platform/chrome/cros_ec_dev.c 
b/drivers/platform/chrome/cros_ec_dev.c
+index 2b331d5b9e799..e16d82bb36a9d 100644
+--- a/drivers/platform/chrome/cros_ec_dev.c
++++ b/drivers/platform/chrome/cros_ec_dev.c
+@@ -137,6 +137,10 @@ static long ec_device_ioctl_xcmd(struct cros_ec_dev *ec, 
void __user *arg)
+       if (copy_from_user(&u_cmd, arg, sizeof(u_cmd)))
+               return -EFAULT;
+ 
++      if ((u_cmd.outsize > EC_MAX_MSG_BYTES) ||
++          (u_cmd.insize > EC_MAX_MSG_BYTES))
++              return -EINVAL;
++
+       s_cmd = kmalloc(sizeof(*s_cmd) + max(u_cmd.outsize, u_cmd.insize),
+                       GFP_KERNEL);
+       if (!s_cmd)
+diff --git a/drivers/platform/chrome/cros_ec_proto.c 
b/drivers/platform/chrome/cros_ec_proto.c
+index 5c285f2b3a650..d20190c8f0c06 100644
+--- a/drivers/platform/chrome/cros_ec_proto.c
++++ b/drivers/platform/chrome/cros_ec_proto.c
+@@ -311,8 +311,8 @@ int cros_ec_query_all(struct cros_ec_device *ec_dev)
+                       ec_dev->max_response = EC_PROTO2_MAX_PARAM_SIZE;
+                       ec_dev->max_passthru = 0;
+                       ec_dev->pkt_xfer = NULL;
+-                      ec_dev->din_size = EC_MSG_BYTES;
+-                      ec_dev->dout_size = EC_MSG_BYTES;
++                      ec_dev->din_size = EC_PROTO2_MSG_BYTES;
++                      ec_dev->dout_size = EC_PROTO2_MSG_BYTES;
+               } else {
+                       /*
+                        * It's possible for a test to occur too early when
+diff --git a/drivers/scsi/lpfc/lpfc_debugfs.c 
b/drivers/scsi/lpfc/lpfc_debugfs.c
+index 25aa9b98d53aa..034d09f8d3417 100644
+--- a/drivers/scsi/lpfc/lpfc_debugfs.c
++++ b/drivers/scsi/lpfc/lpfc_debugfs.c
+@@ -1061,7 +1061,7 @@ lpfc_debugfs_dif_err_write(struct file *file, const char 
__user *buf,
+       memset(dstbuf, 0, 32);
+       size = (nbytes < 32) ? nbytes : 32;
+       if (copy_from_user(dstbuf, buf, size))
+-              return 0;
++              return -EFAULT;
+ 
+       if (dent == phba->debug_InjErrLBA) {
+               if ((buf[0] == 'o') && (buf[1] == 'f') && (buf[2] == 'f'))
+@@ -1069,7 +1069,7 @@ lpfc_debugfs_dif_err_write(struct file *file, const char 
__user *buf,
+       }
+ 
+       if ((tmp == 0) && (kstrtoull(dstbuf, 0, &tmp)))
+-              return 0;
++              return -EINVAL;
+ 
+       if (dent == phba->debug_writeGuard)
+               phba->lpfc_injerr_wgrd_cnt = (uint32_t)tmp;
+diff --git a/drivers/usb/gadget/composite.c b/drivers/usb/gadget/composite.c
+index 5688df02d9ab9..bb72d55a58b5a 100644
+--- a/drivers/usb/gadget/composite.c
++++ b/drivers/usb/gadget/composite.c
+@@ -933,7 +933,7 @@ static void collect_langs(struct usb_gadget_strings **sp, 
__le16 *buf)
+       while (*sp) {
+               s = *sp;
+               language = cpu_to_le16(s->language);
+-              for (tmp = buf; *tmp && tmp < &buf[126]; tmp++) {
++              for (tmp = buf; *tmp && tmp < &buf[USB_MAX_STRING_LEN]; tmp++) {
+                       if (*tmp == language)
+                               goto repeat;
+               }
+@@ -1008,7 +1008,7 @@ static int get_string(struct usb_composite_dev *cdev,
+                       collect_langs(sp, s->wData);
+               }
+ 
+-              for (len = 0; len <= 126 && s->wData[len]; len++)
++              for (len = 0; len <= USB_MAX_STRING_LEN && s->wData[len]; len++)
+                       continue;
+               if (!len)
+                       return -EINVAL;
+diff --git a/drivers/usb/gadget/configfs.c b/drivers/usb/gadget/configfs.c
+index 98f1ce1d61b0b..0ef3f4e452428 100644
+--- a/drivers/usb/gadget/configfs.c
++++ b/drivers/usb/gadget/configfs.c
+@@ -111,21 +111,27 @@ struct gadget_config_name {
+       struct list_head list;
+ };
+ 
++#define USB_MAX_STRING_WITH_NULL_LEN  (USB_MAX_STRING_LEN+1)
++
+ static int usb_string_copy(const char *s, char **s_copy)
+ {
+       int ret;
+       char *str;
+       char *copy = *s_copy;
+       ret = strlen(s);
+-      if (ret > 126)
++      if (ret > USB_MAX_STRING_LEN)
+               return -EOVERFLOW;
+ 
+-      str = kstrdup(s, GFP_KERNEL);
+-      if (!str)
+-              return -ENOMEM;
++      if (copy) {
++              str = copy;
++      } else {
++              str = kmalloc(USB_MAX_STRING_WITH_NULL_LEN, GFP_KERNEL);
++              if (!str)
++                      return -ENOMEM;
++      }
++      strcpy(str, s);
+       if (str[ret - 1] == '\n')
+               str[ret - 1] = '\0';
+-      kfree(copy);
+       *s_copy = str;
+       return 0;
+ }
+diff --git a/drivers/usb/gadget/usbstring.c b/drivers/usb/gadget/usbstring.c
+index 73a4dfba0edbf..0173a9969b9a0 100644
+--- a/drivers/usb/gadget/usbstring.c
++++ b/drivers/usb/gadget/usbstring.c
+@@ -59,9 +59,9 @@ usb_gadget_get_string (struct usb_gadget_strings *table, int 
id, u8 *buf)
+               return -EINVAL;
+ 
+       /* string descriptors have length, tag, then UTF16-LE text */
+-      len = min ((size_t) 126, strlen (s->s));
++      len = min((size_t)USB_MAX_STRING_LEN, strlen(s->s));
+       len = utf8s_to_utf16s(s->s, len, UTF16_LITTLE_ENDIAN,
+-                      (wchar_t *) &buf[2], 126);
++                      (wchar_t *) &buf[2], USB_MAX_STRING_LEN);
+       if (len < 0)
+               return -EINVAL;
+       buf [0] = (len + 1) * 2;
+diff --git a/fs/btrfs/ctree.c b/fs/btrfs/ctree.c
+index 85b64475d8083..fbb4c81f63112 100644
+--- a/fs/btrfs/ctree.c
++++ b/fs/btrfs/ctree.c
+@@ -1431,7 +1431,9 @@ get_old_root(struct btrfs_root *root, u64 time_seq)
+                       btrfs_warn(root->fs_info,
+                               "failed to read tree block %llu from 
get_old_root", logical);
+               } else {
++                      btrfs_tree_read_lock(old);
+                       eb = btrfs_clone_extent_buffer(old);
++                      btrfs_tree_read_unlock(old);
+                       free_extent_buffer(old);
+               }
+       } else if (old_root) {
+diff --git a/fs/ext4/block_validity.c b/fs/ext4/block_validity.c
+index d5055b3adcccd..176a8382e3725 100644
+--- a/fs/ext4/block_validity.c
++++ b/fs/ext4/block_validity.c
+@@ -23,6 +23,7 @@ struct ext4_system_zone {
+       struct rb_node  node;
+       ext4_fsblk_t    start_blk;
+       unsigned int    count;
++      u32             ino;
+ };
+ 
+ static struct kmem_cache *ext4_system_zone_cachep;
+@@ -43,7 +44,8 @@ void ext4_exit_system_zone(void)
+ static inline int can_merge(struct ext4_system_zone *entry1,
+                    struct ext4_system_zone *entry2)
+ {
+-      if ((entry1->start_blk + entry1->count) == entry2->start_blk)
++      if ((entry1->start_blk + entry1->count) == entry2->start_blk &&
++          entry1->ino == entry2->ino)
+               return 1;
+       return 0;
+ }
+@@ -55,9 +57,9 @@ static inline int can_merge(struct ext4_system_zone *entry1,
+  */
+ static int add_system_zone(struct ext4_sb_info *sbi,
+                          ext4_fsblk_t start_blk,
+-                         unsigned int count)
++                         unsigned int count, u32 ino)
+ {
+-      struct ext4_system_zone *new_entry = NULL, *entry;
++      struct ext4_system_zone *new_entry, *entry;
+       struct rb_node **n = &sbi->system_blks.rb_node, *node;
+       struct rb_node *parent = NULL, *new_node = NULL;
+ 
+@@ -68,30 +70,21 @@ static int add_system_zone(struct ext4_sb_info *sbi,
+                       n = &(*n)->rb_left;
+               else if (start_blk >= (entry->start_blk + entry->count))
+                       n = &(*n)->rb_right;
+-              else {
+-                      if (start_blk + count > (entry->start_blk +
+-                                               entry->count))
+-                              entry->count = (start_blk + count -
+-                                              entry->start_blk);
+-                      new_node = *n;
+-                      new_entry = rb_entry(new_node, struct ext4_system_zone,
+-                                           node);
+-                      break;
+-              }
++              else    /* Unexpected overlap of system zones. */
++                      return -EFSCORRUPTED;
+       }
+ 
+-      if (!new_entry) {
+-              new_entry = kmem_cache_alloc(ext4_system_zone_cachep,
+-                                           GFP_KERNEL);
+-              if (!new_entry)
+-                      return -ENOMEM;
+-              new_entry->start_blk = start_blk;
+-              new_entry->count = count;
+-              new_node = &new_entry->node;
++      new_entry = kmem_cache_alloc(ext4_system_zone_cachep,
++                                   GFP_KERNEL);
++      if (!new_entry)
++              return -ENOMEM;
++      new_entry->start_blk = start_blk;
++      new_entry->count = count;
++      new_entry->ino = ino;
++      new_node = &new_entry->node;
+ 
+-              rb_link_node(new_node, parent, n);
+-              rb_insert_color(new_node, &sbi->system_blks);
+-      }
++      rb_link_node(new_node, parent, n);
++      rb_insert_color(new_node, &sbi->system_blks);
+ 
+       /* Can we merge to the left? */
+       node = rb_prev(new_node);
+@@ -163,16 +156,16 @@ static int ext4_protect_reserved_inode(struct 
super_block *sb, u32 ino)
+               if (n == 0) {
+                       i++;
+               } else {
+-                      if (!ext4_data_block_valid(sbi, map.m_pblk, n)) {
+-                              ext4_error(sb, "blocks %llu-%llu from inode %u "
++                      err = add_system_zone(sbi, map.m_pblk, n, ino);
++                      if (err < 0) {
++                              if (err == -EFSCORRUPTED) {
++                                      ext4_error(sb,
++                                         "blocks %llu-%llu from inode %u "
+                                          "overlap system zone", map.m_pblk,
+                                          map.m_pblk + map.m_len - 1, ino);
+-                              err = -EFSCORRUPTED;
++                              }
+                               break;
+                       }
+-                      err = add_system_zone(sbi, map.m_pblk, n);
+-                      if (err < 0)
+-                              break;
+                       i += n;
+               }
+       }
+@@ -201,16 +194,16 @@ int ext4_setup_system_zone(struct super_block *sb)
+               if (ext4_bg_has_super(sb, i) &&
+                   ((i < 5) || ((i % flex_size) == 0)))
+                       add_system_zone(sbi, ext4_group_first_block_no(sb, i),
+-                                      ext4_bg_num_gdb(sb, i) + 1);
++                                      ext4_bg_num_gdb(sb, i) + 1, 0);
+               gdp = ext4_get_group_desc(sb, i, NULL);
+-              ret = add_system_zone(sbi, ext4_block_bitmap(sb, gdp), 1);
++              ret = add_system_zone(sbi, ext4_block_bitmap(sb, gdp), 1, 0);
+               if (ret)
+                       return ret;
+-              ret = add_system_zone(sbi, ext4_inode_bitmap(sb, gdp), 1);
++              ret = add_system_zone(sbi, ext4_inode_bitmap(sb, gdp), 1, 0);
+               if (ret)
+                       return ret;
+               ret = add_system_zone(sbi, ext4_inode_table(sb, gdp),
+-                              sbi->s_itb_per_group);
++                              sbi->s_itb_per_group, 0);
+               if (ret)
+                       return ret;
+       }
+@@ -243,10 +236,11 @@ void ext4_release_system_zone(struct super_block *sb)
+  * start_blk+count) is valid; 0 if some part of the block region
+  * overlaps with filesystem metadata blocks.
+  */
+-int ext4_data_block_valid(struct ext4_sb_info *sbi, ext4_fsblk_t start_blk,
+-                        unsigned int count)
++int ext4_inode_block_valid(struct inode *inode, ext4_fsblk_t start_blk,
++                         unsigned int count)
+ {
+       struct ext4_system_zone *entry;
++      struct ext4_sb_info *sbi = EXT4_SB(inode->i_sb);
+       struct rb_node *n = sbi->system_blks.rb_node;
+ 
+       if ((start_blk <= le32_to_cpu(sbi->s_es->s_first_data_block)) ||
+@@ -262,6 +256,8 @@ int ext4_data_block_valid(struct ext4_sb_info *sbi, 
ext4_fsblk_t start_blk,
+               else if (start_blk >= (entry->start_blk + entry->count))
+                       n = n->rb_right;
+               else {
++                      if (entry->ino == inode->i_ino)
++                              return 1;
+                       sbi->s_es->s_last_error_block = cpu_to_le64(start_blk);
+                       return 0;
+               }
+@@ -284,8 +280,7 @@ int ext4_check_blockref(const char *function, unsigned int 
line,
+       while (bref < p+max) {
+               blk = le32_to_cpu(*bref++);
+               if (blk &&
+-                  unlikely(!ext4_data_block_valid(EXT4_SB(inode->i_sb),
+-                                                  blk, 1))) {
++                  unlikely(!ext4_inode_block_valid(inode, blk, 1))) {
+                       es->s_last_error_block = cpu_to_le64(blk);
+                       ext4_error_inode(inode, function, line, blk,
+                                        "invalid block");
+diff --git a/fs/ext4/ext4.h b/fs/ext4/ext4.h
+index abffa2488ae91..40e3716b4f2e0 100644
+--- a/fs/ext4/ext4.h
++++ b/fs/ext4/ext4.h
+@@ -3134,9 +3134,9 @@ extern void ext4_release_system_zone(struct super_block 
*sb);
+ extern int ext4_setup_system_zone(struct super_block *sb);
+ extern int __init ext4_init_system_zone(void);
+ extern void ext4_exit_system_zone(void);
+-extern int ext4_data_block_valid(struct ext4_sb_info *sbi,
+-                               ext4_fsblk_t start_blk,
+-                               unsigned int count);
++extern int ext4_inode_block_valid(struct inode *inode,
++                                ext4_fsblk_t start_blk,
++                                unsigned int count);
+ extern int ext4_check_blockref(const char *, unsigned int,
+                              struct inode *, __le32 *, unsigned int);
+ 
+diff --git a/fs/ext4/extents.c b/fs/ext4/extents.c
+index fc2746e14c42a..71005a944151a 100644
+--- a/fs/ext4/extents.c
++++ b/fs/ext4/extents.c
+@@ -384,7 +384,7 @@ static int ext4_valid_extent(struct inode *inode, struct 
ext4_extent *ext)
+        */
+       if (lblock + len <= lblock)
+               return 0;
+-      return ext4_data_block_valid(EXT4_SB(inode->i_sb), block, len);
++      return ext4_inode_block_valid(inode, block, len);
+ }
+ 
+ static int ext4_valid_extent_idx(struct inode *inode,
+@@ -392,7 +392,7 @@ static int ext4_valid_extent_idx(struct inode *inode,
+ {
+       ext4_fsblk_t block = ext4_idx_pblock(ext_idx);
+ 
+-      return ext4_data_block_valid(EXT4_SB(inode->i_sb), block, 1);
++      return ext4_inode_block_valid(inode, block, 1);
+ }
+ 
+ static int ext4_valid_extent_entries(struct inode *inode,
+@@ -549,14 +549,10 @@ __read_extent_tree_block(const char *function, unsigned 
int line,
+       }
+       if (buffer_verified(bh) && !(flags & EXT4_EX_FORCE_CACHE))
+               return bh;
+-      if (!ext4_has_feature_journal(inode->i_sb) ||
+-          (inode->i_ino !=
+-           le32_to_cpu(EXT4_SB(inode->i_sb)->s_es->s_journal_inum))) {
+-              err = __ext4_ext_check(function, line, inode,
+-                                     ext_block_hdr(bh), depth, pblk);
+-              if (err)
+-                      goto errout;
+-      }
++      err = __ext4_ext_check(function, line, inode,
++                             ext_block_hdr(bh), depth, pblk);
++      if (err)
++              goto errout;
+       set_buffer_verified(bh);
+       /*
+        * If this is a leaf block, cache all of its entries
+diff --git a/fs/ext4/indirect.c b/fs/ext4/indirect.c
+index 08f3a0c0f4682..4f610cd8041b4 100644
+--- a/fs/ext4/indirect.c
++++ b/fs/ext4/indirect.c
+@@ -946,8 +946,7 @@ static int ext4_clear_blocks(handle_t *handle, struct 
inode *inode,
+       else if (ext4_should_journal_data(inode))
+               flags |= EXT4_FREE_BLOCKS_FORGET;
+ 
+-      if (!ext4_data_block_valid(EXT4_SB(inode->i_sb), block_to_free,
+-                                 count)) {
++      if (!ext4_inode_block_valid(inode, block_to_free, count)) {
+               EXT4_ERROR_INODE(inode, "attempt to clear invalid "
+                                "blocks %llu len %lu",
+                                (unsigned long long) block_to_free, count);
+@@ -1109,8 +1108,7 @@ static void ext4_free_branches(handle_t *handle, struct 
inode *inode,
+                       if (!nr)
+                               continue;               /* A hole */
+ 
+-                      if (!ext4_data_block_valid(EXT4_SB(inode->i_sb),
+-                                                 nr, 1)) {
++                      if (!ext4_inode_block_valid(inode, nr, 1)) {
+                               EXT4_ERROR_INODE(inode,
+                                                "invalid indirect mapped "
+                                                "block %lu (level %d)",
+diff --git a/fs/ext4/inode.c b/fs/ext4/inode.c
+index 881601691bd4a..4c32a484f8bc4 100644
+--- a/fs/ext4/inode.c
++++ b/fs/ext4/inode.c
+@@ -381,8 +381,7 @@ static int __check_block_validity(struct inode *inode, 
const char *func,
+           (inode->i_ino ==
+            le32_to_cpu(EXT4_SB(inode->i_sb)->s_es->s_journal_inum)))
+               return 0;
+-      if (!ext4_data_block_valid(EXT4_SB(inode->i_sb), map->m_pblk,
+-                                 map->m_len)) {
++      if (!ext4_inode_block_valid(inode, map->m_pblk, map->m_len)) {
+               ext4_error_inode(inode, func, line, map->m_pblk,
+                                "lblock %lu mapped to illegal pblock %llu "
+                                "(length %d)", (unsigned long) map->m_lblk,
+@@ -4437,7 +4436,7 @@ struct inode *__ext4_iget(struct super_block *sb, 
unsigned long ino,
+ 
+       ret = 0;
+       if (ei->i_file_acl &&
+-          !ext4_data_block_valid(EXT4_SB(sb), ei->i_file_acl, 1)) {
++          !ext4_inode_block_valid(inode, ei->i_file_acl, 1)) {
+               ext4_error_inode(inode, function, line, 0,
+                                "iget: bad extended attribute block %llu",
+                                ei->i_file_acl);
+@@ -4627,7 +4626,7 @@ static int ext4_do_update_inode(handle_t *handle,
+       struct ext4_inode_info *ei = EXT4_I(inode);
+       struct buffer_head *bh = iloc->bh;
+       struct super_block *sb = inode->i_sb;
+-      int err = 0, rc, block;
++      int err = 0, block;
+       int need_datasync = 0, set_large_file = 0;
+       uid_t i_uid;
+       gid_t i_gid;
+@@ -4727,9 +4726,9 @@ static int ext4_do_update_inode(handle_t *handle,
+                                             bh->b_data);
+ 
+       BUFFER_TRACE(bh, "call ext4_handle_dirty_metadata");
+-      rc = ext4_handle_dirty_metadata(handle, NULL, bh);
+-      if (!err)
+-              err = rc;
++      err = ext4_handle_dirty_metadata(handle, NULL, bh);
++      if (err)
++              goto out_brelse;
+       ext4_clear_inode_state(inode, EXT4_STATE_NEW);
+       if (set_large_file) {
+               BUFFER_TRACE(EXT4_SB(sb)->s_sbh, "get write access");
+diff --git a/fs/ext4/mballoc.c b/fs/ext4/mballoc.c
+index 812e0ba25a08b..ac87f7e5d6a4f 100644
+--- a/fs/ext4/mballoc.c
++++ b/fs/ext4/mballoc.c
+@@ -2960,7 +2960,7 @@ ext4_mb_mark_diskspace_used(struct 
ext4_allocation_context *ac,
+       block = ext4_grp_offs_to_block(sb, &ac->ac_b_ex);
+ 
+       len = EXT4_C2B(sbi, ac->ac_b_ex.fe_len);
+-      if (!ext4_data_block_valid(sbi, block, len)) {
++      if (!ext4_inode_block_valid(ac->ac_inode, block, len)) {
+               ext4_error(sb, "Allocating blocks %llu-%llu which overlap "
+                          "fs metadata", block, block+len);
+               /* File system mounted not to panic on error
+@@ -4718,7 +4718,7 @@ void ext4_free_blocks(handle_t *handle, struct inode 
*inode,
+ 
+       sbi = EXT4_SB(sb);
+       if (!(flags & EXT4_FREE_BLOCKS_VALIDATED) &&
+-          !ext4_data_block_valid(sbi, block, count)) {
++          !ext4_inode_block_valid(inode, block, count)) {
+               ext4_error(sb, "Freeing blocks not in datazone - "
+                          "block = %llu, count = %lu", block, count);
+               goto error_return;
+diff --git a/fs/ext4/namei.c b/fs/ext4/namei.c
+index d5b3216585cfb..6168bcdadeba8 100644
+--- a/fs/ext4/namei.c
++++ b/fs/ext4/namei.c
+@@ -3375,6 +3375,31 @@ static int ext4_setent(handle_t *handle, struct 
ext4_renament *ent,
+       return 0;
+ }
+ 
++static void ext4_resetent(handle_t *handle, struct ext4_renament *ent,
++                        unsigned ino, unsigned file_type)
++{
++      struct ext4_renament old = *ent;
++      int retval = 0;
++
++      /*
++       * old->de could have moved from under us during make indexed dir,
++       * so the old->de may no longer valid and need to find it again
++       * before reset old inode info.
++       */
++      old.bh = ext4_find_entry(old.dir, &old.dentry->d_name, &old.de, NULL);
++      if (IS_ERR(old.bh))
++              retval = PTR_ERR(old.bh);
++      if (!old.bh)
++              retval = -ENOENT;
++      if (retval) {
++              ext4_std_error(old.dir->i_sb, retval);
++              return;
++      }
++
++      ext4_setent(handle, &old, ino, file_type);
++      brelse(old.bh);
++}
++
+ static int ext4_find_delete_entry(handle_t *handle, struct inode *dir,
+                                 const struct qstr *d_name)
+ {
+@@ -3674,8 +3699,8 @@ static int ext4_rename(struct inode *old_dir, struct 
dentry *old_dentry,
+ end_rename:
+       if (whiteout) {
+               if (retval) {
+-                      ext4_setent(handle, &old,
+-                              old.inode->i_ino, old_file_type);
++                      ext4_resetent(handle, &old,
++                                    old.inode->i_ino, old_file_type);
+                       drop_nlink(whiteout);
+               }
+               unlock_new_inode(whiteout);
+diff --git a/fs/ext4/super.c b/fs/ext4/super.c
+index 7a5a1602ee01d..d4ecae25d8073 100644
+--- a/fs/ext4/super.c
++++ b/fs/ext4/super.c
+@@ -4968,7 +4968,10 @@ static int ext4_remount(struct super_block *sb, int 
*flags, char *data)
+               ext4_register_li_request(sb, first_not_zeroed);
+       }
+ 
+-      ext4_setup_system_zone(sb);
++      err = ext4_setup_system_zone(sb);
++      if (err)
++              goto restore_opts;
++
+       if (sbi->s_journal == NULL && !(old_sb_flags & MS_RDONLY))
+               ext4_commit_super(sb, 1);
+ 
+diff --git a/include/linux/mfd/cros_ec.h b/include/linux/mfd/cros_ec.h
+index 3ab3cede28eac..93c14e9df6309 100644
+--- a/include/linux/mfd/cros_ec.h
++++ b/include/linux/mfd/cros_ec.h
+@@ -50,9 +50,11 @@ enum {
+                                       EC_MSG_TX_TRAILER_BYTES,
+       EC_MSG_RX_PROTO_BYTES   = 3,
+ 
+-      /* Max length of messages */
+-      EC_MSG_BYTES            = EC_PROTO2_MAX_PARAM_SIZE +
++      /* Max length of messages for proto 2*/
++      EC_PROTO2_MSG_BYTES             = EC_PROTO2_MAX_PARAM_SIZE +
+                                       EC_MSG_TX_PROTO_BYTES,
++
++      EC_MAX_MSG_BYTES                = 64 * 1024,
+ };
+ 
+ /*
+diff --git a/include/uapi/linux/usb/ch9.h b/include/uapi/linux/usb/ch9.h
+index ec6c8543732f2..9ca4b43122d7c 100644
+--- a/include/uapi/linux/usb/ch9.h
++++ b/include/uapi/linux/usb/ch9.h
+@@ -333,6 +333,9 @@ struct usb_config_descriptor {
+ 
+ /*-------------------------------------------------------------------------*/
+ 
++/* USB String descriptors can contain at most 126 characters. */
++#define USB_MAX_STRING_LEN    126
++
+ /* USB_DT_STRING: String descriptor */
+ struct usb_string_descriptor {
+       __u8  bLength;
+diff --git a/kernel/irq/manage.c b/kernel/irq/manage.c
+index 14aaaa61e905e..f5bb63cbb6b45 100644
+--- a/kernel/irq/manage.c
++++ b/kernel/irq/manage.c
+@@ -872,11 +872,15 @@ irq_forced_thread_fn(struct irq_desc *desc, struct 
irqaction *action)
+       irqreturn_t ret;
+ 
+       local_bh_disable();
++      if (!IS_ENABLED(CONFIG_PREEMPT_RT_BASE))
++              local_irq_disable();
+       ret = action->thread_fn(action->irq, action->dev_id);
+       if (ret == IRQ_HANDLED)
+               atomic_inc(&desc->threads_handled);
+ 
+       irq_finalize_oneshot(desc, action);
++      if (!IS_ENABLED(CONFIG_PREEMPT_RT_BASE))
++              local_irq_enable();
+       local_bh_enable();
+       return ret;
+ }
+diff --git a/net/sunrpc/svc_xprt.c b/net/sunrpc/svc_xprt.c
+index a7cd031656801..7629982040c42 100644
+--- a/net/sunrpc/svc_xprt.c
++++ b/net/sunrpc/svc_xprt.c
+@@ -1011,7 +1011,7 @@ static int svc_close_list(struct svc_serv *serv, struct 
list_head *xprt_list, st
+       struct svc_xprt *xprt;
+       int ret = 0;
+ 
+-      spin_lock(&serv->sv_lock);
++      spin_lock_bh(&serv->sv_lock);
+       list_for_each_entry(xprt, xprt_list, xpt_list) {
+               if (xprt->xpt_net != net)
+                       continue;
+@@ -1019,7 +1019,7 @@ static int svc_close_list(struct svc_serv *serv, struct 
list_head *xprt_list, st
+               set_bit(XPT_CLOSE, &xprt->xpt_flags);
+               svc_xprt_enqueue(xprt);
+       }
+-      spin_unlock(&serv->sv_lock);
++      spin_unlock_bh(&serv->sv_lock);
+       return ret;
+ }
+ 

Reply via email to