commit:     f23442a5eb74f5ba43653768abc231a8070ddaee
Author:     Mike Pagano <mpagano <AT> gentoo <DOT> org>
AuthorDate: Tue Jun 25 10:52:58 2019 +0000
Commit:     Mike Pagano <mpagano <AT> gentoo <DOT> org>
CommitDate: Tue Jun 25 10:52:58 2019 +0000
URL:        https://gitweb.gentoo.org/proj/linux-patches.git/commit/?id=f23442a5

Linux patch 4.19.56

Signed-off-by: Mike Pagano <mpagano <AT> gentoo.org>

 0000_README              |    4 +
 1055_linux-4.19.56.patch | 3375 ++++++++++++++++++++++++++++++++++++++++++++++
 2 files changed, 3379 insertions(+)

diff --git a/0000_README b/0000_README
index 545a5dd..9ed63b1 100644
--- a/0000_README
+++ b/0000_README
@@ -263,6 +263,10 @@ Patch:  1054_linux-4.19.55.patch
 From:   https://www.kernel.org
 Desc:   Linux 4.19.55
 
+Patch:  1055_linux-4.19.56.patch
+From:   https://www.kernel.org
+Desc:   Linux 4.19.56
+
 Patch:  1500_XATTR_USER_PREFIX.patch
 From:   https://bugs.gentoo.org/show_bug.cgi?id=470644
 Desc:   Support for namespace user.pax.* on tmpfs.

diff --git a/1055_linux-4.19.56.patch b/1055_linux-4.19.56.patch
new file mode 100644
index 0000000..fbc387c
--- /dev/null
+++ b/1055_linux-4.19.56.patch
@@ -0,0 +1,3375 @@
+diff --git a/Makefile b/Makefile
+index 3addd4c286fa..a76c61f77bcd 100644
+--- a/Makefile
++++ b/Makefile
+@@ -1,7 +1,7 @@
+ # SPDX-License-Identifier: GPL-2.0
+ VERSION = 4
+ PATCHLEVEL = 19
+-SUBLEVEL = 55
++SUBLEVEL = 56
+ EXTRAVERSION =
+ NAME = "People's Front"
+ 
+@@ -652,6 +652,7 @@ KBUILD_CFLAGS      += $(call 
cc-disable-warning,frame-address,)
+ KBUILD_CFLAGS += $(call cc-disable-warning, format-truncation)
+ KBUILD_CFLAGS += $(call cc-disable-warning, format-overflow)
+ KBUILD_CFLAGS += $(call cc-disable-warning, int-in-bool-context)
++KBUILD_CFLAGS += $(call cc-disable-warning, address-of-packed-member)
+ 
+ ifdef CONFIG_CC_OPTIMIZE_FOR_SIZE
+ KBUILD_CFLAGS += -Os $(call cc-disable-warning,maybe-uninitialized,)
+@@ -696,7 +697,6 @@ ifeq ($(cc-name),clang)
+ KBUILD_CPPFLAGS += $(call cc-option,-Qunused-arguments,)
+ KBUILD_CFLAGS += $(call cc-disable-warning, format-invalid-specifier)
+ KBUILD_CFLAGS += $(call cc-disable-warning, gnu)
+-KBUILD_CFLAGS += $(call cc-disable-warning, address-of-packed-member)
+ # Quiet clang warning: comparison of unsigned expression < 0 is always false
+ KBUILD_CFLAGS += $(call cc-disable-warning, tautological-compare)
+ # CLANG uses a _MergedGlobals as optimization, but this breaks modpost, as the
+diff --git a/arch/arc/boot/dts/hsdk.dts b/arch/arc/boot/dts/hsdk.dts
+index ef149f59929a..d131c54acd3e 100644
+--- a/arch/arc/boot/dts/hsdk.dts
++++ b/arch/arc/boot/dts/hsdk.dts
+@@ -175,6 +175,7 @@
+                       interrupt-names = "macirq";
+                       phy-mode = "rgmii";
+                       snps,pbl = <32>;
++                      snps,multicast-filter-bins = <256>;
+                       clocks = <&gmacclk>;
+                       clock-names = "stmmaceth";
+                       phy-handle = <&phy0>;
+@@ -183,6 +184,9 @@
+                       mac-address = [00 00 00 00 00 00]; /* Filled in by 
U-Boot */
+                       dma-coherent;
+ 
++                      tx-fifo-depth = <4096>;
++                      rx-fifo-depth = <4096>;
++
+                       mdio {
+                               #address-cells = <1>;
+                               #size-cells = <0>;
+diff --git a/arch/arc/include/asm/cmpxchg.h b/arch/arc/include/asm/cmpxchg.h
+index d819de1c5d10..3ea4112c8302 100644
+--- a/arch/arc/include/asm/cmpxchg.h
++++ b/arch/arc/include/asm/cmpxchg.h
+@@ -92,8 +92,11 @@ __cmpxchg(volatile void *ptr, unsigned long expected, 
unsigned long new)
+ 
+ #endif /* CONFIG_ARC_HAS_LLSC */
+ 
+-#define cmpxchg(ptr, o, n) ((typeof(*(ptr)))__cmpxchg((ptr), \
+-                              (unsigned long)(o), (unsigned long)(n)))
++#define cmpxchg(ptr, o, n) ({                         \
++      (typeof(*(ptr)))__cmpxchg((ptr),                \
++                                (unsigned long)(o),   \
++                                (unsigned long)(n));  \
++})
+ 
+ /*
+  * atomic_cmpxchg is same as cmpxchg
+@@ -198,8 +201,11 @@ static inline unsigned long __xchg(unsigned long val, 
volatile void *ptr,
+       return __xchg_bad_pointer();
+ }
+ 
+-#define xchg(ptr, with) ((typeof(*(ptr)))__xchg((unsigned long)(with), (ptr), 
\
+-                                               sizeof(*(ptr))))
++#define xchg(ptr, with) ({                            \
++      (typeof(*(ptr)))__xchg((unsigned long)(with),   \
++                             (ptr),                   \
++                             sizeof(*(ptr)));         \
++})
+ 
+ #endif /* CONFIG_ARC_PLAT_EZNPS */
+ 
+diff --git a/arch/arc/mm/tlb.c b/arch/arc/mm/tlb.c
+index 4097764fea23..fa18c00b0cfd 100644
+--- a/arch/arc/mm/tlb.c
++++ b/arch/arc/mm/tlb.c
+@@ -911,9 +911,11 @@ void do_tlb_overlap_fault(unsigned long cause, unsigned 
long address,
+                         struct pt_regs *regs)
+ {
+       struct cpuinfo_arc_mmu *mmu = &cpuinfo_arc700[smp_processor_id()].mmu;
+-      unsigned int pd0[mmu->ways];
+       unsigned long flags;
+-      int set;
++      int set, n_ways = mmu->ways;
++
++      n_ways = min(n_ways, 4);
++      BUG_ON(mmu->ways > 4);
+ 
+       local_irq_save(flags);
+ 
+@@ -921,9 +923,10 @@ void do_tlb_overlap_fault(unsigned long cause, unsigned 
long address,
+       for (set = 0; set < mmu->sets; set++) {
+ 
+               int is_valid, way;
++              unsigned int pd0[4];
+ 
+               /* read out all the ways of current set */
+-              for (way = 0, is_valid = 0; way < mmu->ways; way++) {
++              for (way = 0, is_valid = 0; way < n_ways; way++) {
+                       write_aux_reg(ARC_REG_TLBINDEX,
+                                         SET_WAY_TO_IDX(mmu, set, way));
+                       write_aux_reg(ARC_REG_TLBCOMMAND, TLBRead);
+@@ -937,14 +940,14 @@ void do_tlb_overlap_fault(unsigned long cause, unsigned 
long address,
+                       continue;
+ 
+               /* Scan the set for duplicate ways: needs a nested loop */
+-              for (way = 0; way < mmu->ways - 1; way++) {
++              for (way = 0; way < n_ways - 1; way++) {
+ 
+                       int n;
+ 
+                       if (!pd0[way])
+                               continue;
+ 
+-                      for (n = way + 1; n < mmu->ways; n++) {
++                      for (n = way + 1; n < n_ways; n++) {
+                               if (pd0[way] != pd0[n])
+                                       continue;
+ 
+diff --git a/arch/arm/boot/dts/am57xx-idk-common.dtsi 
b/arch/arm/boot/dts/am57xx-idk-common.dtsi
+index c9063ffca524..3fd9a1676d88 100644
+--- a/arch/arm/boot/dts/am57xx-idk-common.dtsi
++++ b/arch/arm/boot/dts/am57xx-idk-common.dtsi
+@@ -410,6 +410,7 @@
+       vqmmc-supply = <&ldo1_reg>;
+       bus-width = <4>;
+       cd-gpios = <&gpio6 27 GPIO_ACTIVE_LOW>; /* gpio 219 */
++      no-1-8-v;
+ };
+ 
+ &mmc2 {
+diff --git a/arch/arm/boot/dts/dra76x-mmc-iodelay.dtsi 
b/arch/arm/boot/dts/dra76x-mmc-iodelay.dtsi
+index baba7b00eca7..fdca48186916 100644
+--- a/arch/arm/boot/dts/dra76x-mmc-iodelay.dtsi
++++ b/arch/arm/boot/dts/dra76x-mmc-iodelay.dtsi
+@@ -22,7 +22,7 @@
+  *
+  * Datamanual Revisions:
+  *
+- * DRA76x Silicon Revision 1.0: SPRS993A, Revised July 2017
++ * DRA76x Silicon Revision 1.0: SPRS993E, Revised December 2018
+  *
+  */
+ 
+@@ -169,25 +169,25 @@
+       /* Corresponds to MMC2_HS200_MANUAL1 in datamanual */
+       mmc2_iodelay_hs200_conf: mmc2_iodelay_hs200_conf {
+               pinctrl-pin-array = <
+-                      0x190 A_DELAY_PS(384) G_DELAY_PS(0)       /* 
CFG_GPMC_A19_OEN */
+-                      0x194 A_DELAY_PS(0) G_DELAY_PS(174)       /* 
CFG_GPMC_A19_OUT */
+-                      0x1a8 A_DELAY_PS(410) G_DELAY_PS(0)       /* 
CFG_GPMC_A20_OEN */
+-                      0x1ac A_DELAY_PS(85) G_DELAY_PS(0)        /* 
CFG_GPMC_A20_OUT */
+-                      0x1b4 A_DELAY_PS(468) G_DELAY_PS(0)       /* 
CFG_GPMC_A21_OEN */
+-                      0x1b8 A_DELAY_PS(139) G_DELAY_PS(0)       /* 
CFG_GPMC_A21_OUT */
+-                      0x1c0 A_DELAY_PS(676) G_DELAY_PS(0)       /* 
CFG_GPMC_A22_OEN */
+-                      0x1c4 A_DELAY_PS(69) G_DELAY_PS(0)        /* 
CFG_GPMC_A22_OUT */
+-                      0x1d0 A_DELAY_PS(1062) G_DELAY_PS(154)    /* 
CFG_GPMC_A23_OUT */
+-                      0x1d8 A_DELAY_PS(640) G_DELAY_PS(0)       /* 
CFG_GPMC_A24_OEN */
+-                      0x1dc A_DELAY_PS(0) G_DELAY_PS(0)         /* 
CFG_GPMC_A24_OUT */
+-                      0x1e4 A_DELAY_PS(356) G_DELAY_PS(0)       /* 
CFG_GPMC_A25_OEN */
+-                      0x1e8 A_DELAY_PS(0) G_DELAY_PS(0)         /* 
CFG_GPMC_A25_OUT */
+-                      0x1f0 A_DELAY_PS(579) G_DELAY_PS(0)       /* 
CFG_GPMC_A26_OEN */
+-                      0x1f4 A_DELAY_PS(0) G_DELAY_PS(0)         /* 
CFG_GPMC_A26_OUT */
+-                      0x1fc A_DELAY_PS(435) G_DELAY_PS(0)       /* 
CFG_GPMC_A27_OEN */
+-                      0x200 A_DELAY_PS(36) G_DELAY_PS(0)        /* 
CFG_GPMC_A27_OUT */
+-                      0x364 A_DELAY_PS(759) G_DELAY_PS(0)       /* 
CFG_GPMC_CS1_OEN */
+-                      0x368 A_DELAY_PS(72) G_DELAY_PS(0)        /* 
CFG_GPMC_CS1_OUT */
++                      0x190 A_DELAY_PS(384) G_DELAY_PS(0)     /* 
CFG_GPMC_A19_OEN */
++                      0x194 A_DELAY_PS(350) G_DELAY_PS(174)   /* 
CFG_GPMC_A19_OUT */
++                      0x1a8 A_DELAY_PS(410) G_DELAY_PS(0)     /* 
CFG_GPMC_A20_OEN */
++                      0x1ac A_DELAY_PS(335) G_DELAY_PS(0)     /* 
CFG_GPMC_A20_OUT */
++                      0x1b4 A_DELAY_PS(468) G_DELAY_PS(0)     /* 
CFG_GPMC_A21_OEN */
++                      0x1b8 A_DELAY_PS(339) G_DELAY_PS(0)     /* 
CFG_GPMC_A21_OUT */
++                      0x1c0 A_DELAY_PS(676) G_DELAY_PS(0)     /* 
CFG_GPMC_A22_OEN */
++                      0x1c4 A_DELAY_PS(219) G_DELAY_PS(0)     /* 
CFG_GPMC_A22_OUT */
++                      0x1d0 A_DELAY_PS(1062) G_DELAY_PS(154)  /* 
CFG_GPMC_A23_OUT */
++                      0x1d8 A_DELAY_PS(640) G_DELAY_PS(0)     /* 
CFG_GPMC_A24_OEN */
++                      0x1dc A_DELAY_PS(150) G_DELAY_PS(0)     /* 
CFG_GPMC_A24_OUT */
++                      0x1e4 A_DELAY_PS(356) G_DELAY_PS(0)     /* 
CFG_GPMC_A25_OEN */
++                      0x1e8 A_DELAY_PS(150) G_DELAY_PS(0)     /* 
CFG_GPMC_A25_OUT */
++                      0x1f0 A_DELAY_PS(579) G_DELAY_PS(0)     /* 
CFG_GPMC_A26_OEN */
++                      0x1f4 A_DELAY_PS(200) G_DELAY_PS(0)     /* 
CFG_GPMC_A26_OUT */
++                      0x1fc A_DELAY_PS(435) G_DELAY_PS(0)     /* 
CFG_GPMC_A27_OEN */
++                      0x200 A_DELAY_PS(236) G_DELAY_PS(0)     /* 
CFG_GPMC_A27_OUT */
++                      0x364 A_DELAY_PS(759) G_DELAY_PS(0)     /* 
CFG_GPMC_CS1_OEN */
++                      0x368 A_DELAY_PS(372) G_DELAY_PS(0)     /* 
CFG_GPMC_CS1_OUT */
+             >;
+       };
+ 
+diff --git a/arch/arm/mach-imx/cpuidle-imx6sx.c 
b/arch/arm/mach-imx/cpuidle-imx6sx.c
+index fd0053e47a15..3708a71f30e6 100644
+--- a/arch/arm/mach-imx/cpuidle-imx6sx.c
++++ b/arch/arm/mach-imx/cpuidle-imx6sx.c
+@@ -15,6 +15,7 @@
+ 
+ #include "common.h"
+ #include "cpuidle.h"
++#include "hardware.h"
+ 
+ static int imx6sx_idle_finish(unsigned long val)
+ {
+@@ -110,7 +111,7 @@ int __init imx6sx_cpuidle_init(void)
+        * except for power up sw2iso which need to be
+        * larger than LDO ramp up time.
+        */
+-      imx_gpc_set_arm_power_up_timing(0xf, 1);
++      imx_gpc_set_arm_power_up_timing(cpu_is_imx6sx() ? 0xf : 0x2, 1);
+       imx_gpc_set_arm_power_down_timing(1, 1);
+ 
+       return cpuidle_register(&imx6sx_cpuidle_driver, NULL);
+diff --git a/arch/arm64/Makefile b/arch/arm64/Makefile
+index 35649ee8ad56..c12ff63265a9 100644
+--- a/arch/arm64/Makefile
++++ b/arch/arm64/Makefile
+@@ -51,6 +51,7 @@ endif
+ 
+ KBUILD_CFLAGS += -mgeneral-regs-only $(lseinstr) $(brokengasinst)
+ KBUILD_CFLAGS += -fno-asynchronous-unwind-tables
++KBUILD_CFLAGS += -Wno-psabi
+ KBUILD_AFLAGS += $(lseinstr) $(brokengasinst)
+ 
+ KBUILD_CFLAGS += $(call cc-option,-mabi=lp64)
+diff --git a/arch/arm64/include/uapi/asm/ptrace.h 
b/arch/arm64/include/uapi/asm/ptrace.h
+index ad64d2c92ef5..5dff8eccd17d 100644
+--- a/arch/arm64/include/uapi/asm/ptrace.h
++++ b/arch/arm64/include/uapi/asm/ptrace.h
+@@ -64,8 +64,6 @@
+ 
+ #ifndef __ASSEMBLY__
+ 
+-#include <linux/prctl.h>
+-
+ /*
+  * User structures for general purpose, floating point and debug registers.
+  */
+@@ -112,10 +110,10 @@ struct user_sve_header {
+ 
+ /*
+  * Common SVE_PT_* flags:
+- * These must be kept in sync with prctl interface in <linux/ptrace.h>
++ * These must be kept in sync with prctl interface in <linux/prctl.h>
+  */
+-#define SVE_PT_VL_INHERIT             (PR_SVE_VL_INHERIT >> 16)
+-#define SVE_PT_VL_ONEXEC              (PR_SVE_SET_VL_ONEXEC >> 16)
++#define SVE_PT_VL_INHERIT             ((1 << 17) /* PR_SVE_VL_INHERIT */ >> 
16)
++#define SVE_PT_VL_ONEXEC              ((1 << 18) /* PR_SVE_SET_VL_ONEXEC */ 
>> 16)
+ 
+ 
+ /*
+diff --git a/arch/arm64/kernel/ssbd.c b/arch/arm64/kernel/ssbd.c
+index 3432e5ef9f41..388f8fc13080 100644
+--- a/arch/arm64/kernel/ssbd.c
++++ b/arch/arm64/kernel/ssbd.c
+@@ -4,6 +4,7 @@
+  */
+ 
+ #include <linux/errno.h>
++#include <linux/prctl.h>
+ #include <linux/sched.h>
+ #include <linux/thread_info.h>
+ 
+diff --git a/arch/mips/kernel/uprobes.c b/arch/mips/kernel/uprobes.c
+index 4aaff3b3175c..6dbe4eab0a0e 100644
+--- a/arch/mips/kernel/uprobes.c
++++ b/arch/mips/kernel/uprobes.c
+@@ -112,9 +112,6 @@ int arch_uprobe_pre_xol(struct arch_uprobe *aup, struct 
pt_regs *regs)
+        */
+       aup->resume_epc = regs->cp0_epc + 4;
+       if (insn_has_delay_slot((union mips_instruction) aup->insn[0])) {
+-              unsigned long epc;
+-
+-              epc = regs->cp0_epc;
+               __compute_return_epc_for_insn(regs,
+                       (union mips_instruction) aup->insn[0]);
+               aup->resume_epc = regs->cp0_epc;
+diff --git a/arch/parisc/math-emu/cnv_float.h 
b/arch/parisc/math-emu/cnv_float.h
+index 933423fa5144..b0db61188a61 100644
+--- a/arch/parisc/math-emu/cnv_float.h
++++ b/arch/parisc/math-emu/cnv_float.h
+@@ -60,19 +60,19 @@
+     ((exponent < (SGL_P - 1)) ?                               \
+      (Sall(sgl_value) << (SGL_EXP_LENGTH + 1 + exponent)) : FALSE)
+ 
+-#define Int_isinexact_to_sgl(int_value)       (int_value << 33 - 
SGL_EXP_LENGTH)
++#define Int_isinexact_to_sgl(int_value)       ((int_value << 33 - 
SGL_EXP_LENGTH) != 0)
+ 
+ #define Sgl_roundnearest_from_int(int_value,sgl_value)                        
\
+     if (int_value & 1<<(SGL_EXP_LENGTH - 2))   /* round bit */                
\
+-      if ((int_value << 34 - SGL_EXP_LENGTH) || Slow(sgl_value))      \
++      if (((int_value << 34 - SGL_EXP_LENGTH) != 0) || Slow(sgl_value)) \
+               Sall(sgl_value)++
+ 
+ #define Dint_isinexact_to_sgl(dint_valueA,dint_valueB)                \
+-    ((Dintp1(dint_valueA) << 33 - SGL_EXP_LENGTH) || Dintp2(dint_valueB))
++    (((Dintp1(dint_valueA) << 33 - SGL_EXP_LENGTH) != 0) || 
Dintp2(dint_valueB))
+ 
+ #define Sgl_roundnearest_from_dint(dint_valueA,dint_valueB,sgl_value) \
+     if (Dintp1(dint_valueA) & 1<<(SGL_EXP_LENGTH - 2))                        
\
+-      if ((Dintp1(dint_valueA) << 34 - SGL_EXP_LENGTH) ||             \
++      if (((Dintp1(dint_valueA) << 34 - SGL_EXP_LENGTH) != 0) ||      \
+       Dintp2(dint_valueB) || Slow(sgl_value)) Sall(sgl_value)++
+ 
+ #define Dint_isinexact_to_dbl(dint_value)     \
+diff --git a/arch/powerpc/include/asm/ppc-opcode.h 
b/arch/powerpc/include/asm/ppc-opcode.h
+index 2b7135391231..d9d5391b2af6 100644
+--- a/arch/powerpc/include/asm/ppc-opcode.h
++++ b/arch/powerpc/include/asm/ppc-opcode.h
+@@ -336,6 +336,7 @@
+ #define PPC_INST_MULLI                        0x1c000000
+ #define PPC_INST_DIVWU                        0x7c000396
+ #define PPC_INST_DIVD                 0x7c0003d2
++#define PPC_INST_DIVDU                        0x7c000392
+ #define PPC_INST_RLWINM                       0x54000000
+ #define PPC_INST_RLWIMI                       0x50000000
+ #define PPC_INST_RLDICL                       0x78000000
+diff --git a/arch/powerpc/mm/mmu_context_book3s64.c 
b/arch/powerpc/mm/mmu_context_book3s64.c
+index dbd8f762140b..68984d85ad6b 100644
+--- a/arch/powerpc/mm/mmu_context_book3s64.c
++++ b/arch/powerpc/mm/mmu_context_book3s64.c
+@@ -53,14 +53,48 @@ int hash__alloc_context_id(void)
+ }
+ EXPORT_SYMBOL_GPL(hash__alloc_context_id);
+ 
++static int realloc_context_ids(mm_context_t *ctx)
++{
++      int i, id;
++
++      /*
++       * id 0 (aka. ctx->id) is special, we always allocate a new one, even if
++       * there wasn't one allocated previously (which happens in the exec
++       * case where ctx is newly allocated).
++       *
++       * We have to be a bit careful here. We must keep the existing ids in
++       * the array, so that we can test if they're non-zero to decide if we
++       * need to allocate a new one. However in case of error we must free the
++       * ids we've allocated but *not* any of the existing ones (or risk a
++       * UAF). That's why we decrement i at the start of the error handling
++       * loop, to skip the id that we just tested but couldn't reallocate.
++       */
++      for (i = 0; i < ARRAY_SIZE(ctx->extended_id); i++) {
++              if (i == 0 || ctx->extended_id[i]) {
++                      id = hash__alloc_context_id();
++                      if (id < 0)
++                              goto error;
++
++                      ctx->extended_id[i] = id;
++              }
++      }
++
++      /* The caller expects us to return id */
++      return ctx->id;
++
++error:
++      for (i--; i >= 0; i--) {
++              if (ctx->extended_id[i])
++                      ida_free(&mmu_context_ida, ctx->extended_id[i]);
++      }
++
++      return id;
++}
++
+ static int hash__init_new_context(struct mm_struct *mm)
+ {
+       int index;
+ 
+-      index = hash__alloc_context_id();
+-      if (index < 0)
+-              return index;
+-
+       /*
+        * The old code would re-promote on fork, we don't do that when using
+        * slices as it could cause problem promoting slices that have been
+@@ -78,6 +112,10 @@ static int hash__init_new_context(struct mm_struct *mm)
+       if (mm->context.id == 0)
+               slice_init_new_context_exec(mm);
+ 
++      index = realloc_context_ids(&mm->context);
++      if (index < 0)
++              return index;
++
+       subpage_prot_init_new_context(mm);
+ 
+       pkey_mm_init(mm);
+diff --git a/arch/powerpc/net/bpf_jit.h b/arch/powerpc/net/bpf_jit.h
+index 68dece206048..e5c1d30ee968 100644
+--- a/arch/powerpc/net/bpf_jit.h
++++ b/arch/powerpc/net/bpf_jit.h
+@@ -116,7 +116,7 @@
+                                    ___PPC_RA(a) | IMM_L(i))
+ #define PPC_DIVWU(d, a, b)    EMIT(PPC_INST_DIVWU | ___PPC_RT(d) |          \
+                                    ___PPC_RA(a) | ___PPC_RB(b))
+-#define PPC_DIVD(d, a, b)     EMIT(PPC_INST_DIVD | ___PPC_RT(d) |           \
++#define PPC_DIVDU(d, a, b)    EMIT(PPC_INST_DIVDU | ___PPC_RT(d) |          \
+                                    ___PPC_RA(a) | ___PPC_RB(b))
+ #define PPC_AND(d, a, b)      EMIT(PPC_INST_AND | ___PPC_RA(d) |            \
+                                    ___PPC_RS(a) | ___PPC_RB(b))
+diff --git a/arch/powerpc/net/bpf_jit_comp64.c 
b/arch/powerpc/net/bpf_jit_comp64.c
+index 226eec62d125..279a51bf94d0 100644
+--- a/arch/powerpc/net/bpf_jit_comp64.c
++++ b/arch/powerpc/net/bpf_jit_comp64.c
+@@ -372,12 +372,12 @@ static int bpf_jit_build_body(struct bpf_prog *fp, u32 
*image,
+               case BPF_ALU64 | BPF_DIV | BPF_X: /* dst /= src */
+               case BPF_ALU64 | BPF_MOD | BPF_X: /* dst %= src */
+                       if (BPF_OP(code) == BPF_MOD) {
+-                              PPC_DIVD(b2p[TMP_REG_1], dst_reg, src_reg);
++                              PPC_DIVDU(b2p[TMP_REG_1], dst_reg, src_reg);
+                               PPC_MULD(b2p[TMP_REG_1], src_reg,
+                                               b2p[TMP_REG_1]);
+                               PPC_SUB(dst_reg, dst_reg, b2p[TMP_REG_1]);
+                       } else
+-                              PPC_DIVD(dst_reg, dst_reg, src_reg);
++                              PPC_DIVDU(dst_reg, dst_reg, src_reg);
+                       break;
+               case BPF_ALU | BPF_MOD | BPF_K: /* (u32) dst %= (u32) imm */
+               case BPF_ALU | BPF_DIV | BPF_K: /* (u32) dst /= (u32) imm */
+@@ -405,7 +405,7 @@ static int bpf_jit_build_body(struct bpf_prog *fp, u32 
*image,
+                               break;
+                       case BPF_ALU64:
+                               if (BPF_OP(code) == BPF_MOD) {
+-                                      PPC_DIVD(b2p[TMP_REG_2], dst_reg,
++                                      PPC_DIVDU(b2p[TMP_REG_2], dst_reg,
+                                                       b2p[TMP_REG_1]);
+                                       PPC_MULD(b2p[TMP_REG_1],
+                                                       b2p[TMP_REG_1],
+@@ -413,7 +413,7 @@ static int bpf_jit_build_body(struct bpf_prog *fp, u32 
*image,
+                                       PPC_SUB(dst_reg, dst_reg,
+                                                       b2p[TMP_REG_1]);
+                               } else
+-                                      PPC_DIVD(dst_reg, dst_reg,
++                                      PPC_DIVDU(dst_reg, dst_reg,
+                                                       b2p[TMP_REG_1]);
+                               break;
+                       }
+diff --git a/arch/riscv/mm/fault.c b/arch/riscv/mm/fault.c
+index 88401d5125bc..523dbfbac03d 100644
+--- a/arch/riscv/mm/fault.c
++++ b/arch/riscv/mm/fault.c
+@@ -29,6 +29,7 @@
+ 
+ #include <asm/pgalloc.h>
+ #include <asm/ptrace.h>
++#include <asm/tlbflush.h>
+ 
+ /*
+  * This routine handles page faults.  It determines the address and the
+@@ -281,6 +282,18 @@ vmalloc_fault:
+               pte_k = pte_offset_kernel(pmd_k, addr);
+               if (!pte_present(*pte_k))
+                       goto no_context;
++
++              /*
++               * The kernel assumes that TLBs don't cache invalid
++               * entries, but in RISC-V, SFENCE.VMA specifies an
++               * ordering constraint, not a cache flush; it is
++               * necessary even after writing invalid entries.
++               * Relying on flush_tlb_fix_spurious_fault would
++               * suffice, but the extra traps reduce
++               * performance. So, eagerly SFENCE.VMA.
++               */
++              local_flush_tlb_page(addr);
++
+               return;
+       }
+ }
+diff --git a/arch/s390/include/asm/ap.h b/arch/s390/include/asm/ap.h
+index 8c00fd509c45..1a6a7092d942 100644
+--- a/arch/s390/include/asm/ap.h
++++ b/arch/s390/include/asm/ap.h
+@@ -221,16 +221,22 @@ static inline struct ap_queue_status ap_aqic(ap_qid_t 
qid,
+                                            void *ind)
+ {
+       register unsigned long reg0 asm ("0") = qid | (3UL << 24);
+-      register struct ap_qirq_ctrl reg1_in asm ("1") = qirqctrl;
+-      register struct ap_queue_status reg1_out asm ("1");
++      register union {
++              unsigned long value;
++              struct ap_qirq_ctrl qirqctrl;
++              struct ap_queue_status status;
++      } reg1 asm ("1");
+       register void *reg2 asm ("2") = ind;
+ 
++      reg1.qirqctrl = qirqctrl;
++
+       asm volatile(
+               ".long 0xb2af0000"              /* PQAP(AQIC) */
+-              : "=d" (reg1_out)
+-              : "d" (reg0), "d" (reg1_in), "d" (reg2)
++              : "+d" (reg1)
++              : "d" (reg0), "d" (reg2)
+               : "cc");
+-      return reg1_out;
++
++      return reg1.status;
+ }
+ 
+ /*
+@@ -264,17 +270,21 @@ static inline struct ap_queue_status ap_qact(ap_qid_t 
qid, int ifbit,
+ {
+       register unsigned long reg0 asm ("0") = qid | (5UL << 24)
+               | ((ifbit & 0x01) << 22);
+-      register unsigned long reg1_in asm ("1") = apinfo->val;
+-      register struct ap_queue_status reg1_out asm ("1");
++      register union {
++              unsigned long value;
++              struct ap_queue_status status;
++      } reg1 asm ("1");
+       register unsigned long reg2 asm ("2");
+ 
++      reg1.value = apinfo->val;
++
+       asm volatile(
+               ".long 0xb2af0000"              /* PQAP(QACT) */
+-              : "+d" (reg1_in), "=d" (reg1_out), "=d" (reg2)
++              : "+d" (reg1), "=d" (reg2)
+               : "d" (reg0)
+               : "cc");
+       apinfo->val = reg2;
+-      return reg1_out;
++      return reg1.status;
+ }
+ 
+ /**
+diff --git a/arch/s390/include/asm/jump_label.h 
b/arch/s390/include/asm/jump_label.h
+index 40f651292aa7..9c7dc970e966 100644
+--- a/arch/s390/include/asm/jump_label.h
++++ b/arch/s390/include/asm/jump_label.h
+@@ -10,6 +10,12 @@
+ #define JUMP_LABEL_NOP_SIZE 6
+ #define JUMP_LABEL_NOP_OFFSET 2
+ 
++#if __GNUC__ < 9
++#define JUMP_LABEL_STATIC_KEY_CONSTRAINT "X"
++#else
++#define JUMP_LABEL_STATIC_KEY_CONSTRAINT "jdd"
++#endif
++
+ /*
+  * We use a brcl 0,2 instruction for jump labels at compile time so it
+  * can be easily distinguished from a hotpatch generated instruction.
+@@ -19,9 +25,9 @@ static __always_inline bool arch_static_branch(struct 
static_key *key, bool bran
+       asm_volatile_goto("0:   brcl 0,"__stringify(JUMP_LABEL_NOP_OFFSET)"\n"
+               ".pushsection __jump_table, \"aw\"\n"
+               ".balign 8\n"
+-              ".quad 0b, %l[label], %0\n"
++              ".quad 0b, %l[label], %0+%1\n"
+               ".popsection\n"
+-              : : "X" (&((char *)key)[branch]) : : label);
++              : : JUMP_LABEL_STATIC_KEY_CONSTRAINT (key), "i" (branch) : : 
label);
+ 
+       return false;
+ label:
+@@ -33,9 +39,9 @@ static __always_inline bool arch_static_branch_jump(struct 
static_key *key, bool
+       asm_volatile_goto("0:   brcl 15, %l[label]\n"
+               ".pushsection __jump_table, \"aw\"\n"
+               ".balign 8\n"
+-              ".quad 0b, %l[label], %0\n"
++              ".quad 0b, %l[label], %0+%1\n"
+               ".popsection\n"
+-              : : "X" (&((char *)key)[branch]) : : label);
++              : : JUMP_LABEL_STATIC_KEY_CONSTRAINT (key), "i" (branch) : : 
label);
+ 
+       return false;
+ label:
+diff --git a/arch/sparc/kernel/mdesc.c b/arch/sparc/kernel/mdesc.c
+index 39a2503fa3e1..51028abe5e90 100644
+--- a/arch/sparc/kernel/mdesc.c
++++ b/arch/sparc/kernel/mdesc.c
+@@ -357,6 +357,8 @@ static int get_vdev_port_node_info(struct mdesc_handle 
*md, u64 node,
+ 
+       node_info->vdev_port.id = *idp;
+       node_info->vdev_port.name = kstrdup_const(name, GFP_KERNEL);
++      if (!node_info->vdev_port.name)
++              return -1;
+       node_info->vdev_port.parent_cfg_hdl = *parent_cfg_hdlp;
+ 
+       return 0;
+diff --git a/arch/sparc/kernel/perf_event.c b/arch/sparc/kernel/perf_event.c
+index 67b3e6b3ce5d..1ad5911f62b4 100644
+--- a/arch/sparc/kernel/perf_event.c
++++ b/arch/sparc/kernel/perf_event.c
+@@ -891,6 +891,10 @@ static int sparc_perf_event_set_period(struct perf_event 
*event,
+       s64 period = hwc->sample_period;
+       int ret = 0;
+ 
++      /* The period may have been changed by PERF_EVENT_IOC_PERIOD */
++      if (unlikely(period != hwc->last_period))
++              left = period - (hwc->last_period - left);
++
+       if (unlikely(left <= -period)) {
+               left = period;
+               local64_set(&hwc->period_left, left);
+diff --git a/arch/x86/kernel/cpu/intel_rdt_rdtgroup.c 
b/arch/x86/kernel/cpu/intel_rdt_rdtgroup.c
+index 643670fb8943..274d220d0a83 100644
+--- a/arch/x86/kernel/cpu/intel_rdt_rdtgroup.c
++++ b/arch/x86/kernel/cpu/intel_rdt_rdtgroup.c
+@@ -2379,7 +2379,7 @@ static int rdtgroup_init_alloc(struct rdtgroup *rdtgrp)
+                               if (closid_allocated(i) && i != closid) {
+                                       mode = rdtgroup_mode_by_closid(i);
+                                       if (mode == RDT_MODE_PSEUDO_LOCKSETUP)
+-                                              break;
++                                              continue;
+                                       used_b |= *ctrl;
+                                       if (mode == RDT_MODE_SHAREABLE)
+                                               d->new_ctrl |= *ctrl;
+diff --git a/arch/xtensa/kernel/setup.c b/arch/xtensa/kernel/setup.c
+index 351283b60df6..a285fbd0fd9b 100644
+--- a/arch/xtensa/kernel/setup.c
++++ b/arch/xtensa/kernel/setup.c
+@@ -310,7 +310,8 @@ extern char _SecondaryResetVector_text_start;
+ extern char _SecondaryResetVector_text_end;
+ #endif
+ 
+-static inline int mem_reserve(unsigned long start, unsigned long end)
++static inline int __init_memblock mem_reserve(unsigned long start,
++                                            unsigned long end)
+ {
+       return memblock_reserve(start, end - start);
+ }
+diff --git a/drivers/dma/dw-axi-dmac/dw-axi-dmac-platform.c 
b/drivers/dma/dw-axi-dmac/dw-axi-dmac-platform.c
+index c4eb55e3011c..c05ef7f1d7b6 100644
+--- a/drivers/dma/dw-axi-dmac/dw-axi-dmac-platform.c
++++ b/drivers/dma/dw-axi-dmac/dw-axi-dmac-platform.c
+@@ -512,7 +512,8 @@ dma_chan_prep_dma_memcpy(struct dma_chan *dchan, 
dma_addr_t dst_adr,
+       return vchan_tx_prep(&chan->vc, &first->vd, flags);
+ 
+ err_desc_get:
+-      axi_desc_put(first);
++      if (first)
++              axi_desc_put(first);
+       return NULL;
+ }
+ 
+diff --git a/drivers/dma/sprd-dma.c b/drivers/dma/sprd-dma.c
+index 55df0d41355b..1ed1c7efa288 100644
+--- a/drivers/dma/sprd-dma.c
++++ b/drivers/dma/sprd-dma.c
+@@ -663,7 +663,7 @@ static int sprd_dma_fill_desc(struct dma_chan *chan,
+       temp |= slave_cfg->src_maxburst & SPRD_DMA_FRG_LEN_MASK;
+       hw->frg_len = temp;
+ 
+-      hw->blk_len = len & SPRD_DMA_BLK_LEN_MASK;
++      hw->blk_len = slave_cfg->src_maxburst & SPRD_DMA_BLK_LEN_MASK;
+       hw->trsc_len = len & SPRD_DMA_TRSC_LEN_MASK;
+ 
+       temp = (dst_step & SPRD_DMA_TRSF_STEP_MASK) << 
SPRD_DMA_DEST_TRSF_STEP_OFFSET;
+diff --git a/drivers/fpga/dfl-afu-dma-region.c 
b/drivers/fpga/dfl-afu-dma-region.c
+index 0e81d33af856..c9a613dc9eb7 100644
+--- a/drivers/fpga/dfl-afu-dma-region.c
++++ b/drivers/fpga/dfl-afu-dma-region.c
+@@ -399,7 +399,7 @@ int afu_dma_map_region(struct dfl_feature_platform_data 
*pdata,
+                                   region->pages[0], 0,
+                                   region->length,
+                                   DMA_BIDIRECTIONAL);
+-      if (dma_mapping_error(&pdata->dev->dev, region->iova)) {
++      if (dma_mapping_error(dfl_fpga_pdata_to_parent(pdata), region->iova)) {
+               dev_err(&pdata->dev->dev, "failed to map for dma\n");
+               ret = -EFAULT;
+               goto unpin_pages;
+diff --git a/drivers/fpga/dfl.c b/drivers/fpga/dfl.c
+index a9b521bccb06..ab361ec78df4 100644
+--- a/drivers/fpga/dfl.c
++++ b/drivers/fpga/dfl.c
+@@ -40,6 +40,13 @@ enum dfl_fpga_devt_type {
+       DFL_FPGA_DEVT_MAX,
+ };
+ 
++static struct lock_class_key dfl_pdata_keys[DFL_ID_MAX];
++
++static const char *dfl_pdata_key_strings[DFL_ID_MAX] = {
++      "dfl-fme-pdata",
++      "dfl-port-pdata",
++};
++
+ /**
+  * dfl_dev_info - dfl feature device information.
+  * @name: name string of the feature platform device.
+@@ -443,11 +450,16 @@ static int build_info_commit_dev(struct 
build_feature_devs_info *binfo)
+       struct platform_device *fdev = binfo->feature_dev;
+       struct dfl_feature_platform_data *pdata;
+       struct dfl_feature_info *finfo, *p;
++      enum dfl_id_type type;
+       int ret, index = 0;
+ 
+       if (!fdev)
+               return 0;
+ 
++      type = feature_dev_id_type(fdev);
++      if (WARN_ON_ONCE(type >= DFL_ID_MAX))
++              return -EINVAL;
++
+       /*
+        * we do not need to care for the memory which is associated with
+        * the platform device. After calling platform_device_unregister(),
+@@ -463,6 +475,8 @@ static int build_info_commit_dev(struct 
build_feature_devs_info *binfo)
+       pdata->num = binfo->feature_num;
+       pdata->dfl_cdev = binfo->cdev;
+       mutex_init(&pdata->lock);
++      lockdep_set_class_and_name(&pdata->lock, &dfl_pdata_keys[type],
++                                 dfl_pdata_key_strings[type]);
+ 
+       /*
+        * the count should be initialized to 0 to make sure
+@@ -497,7 +511,7 @@ static int build_info_commit_dev(struct 
build_feature_devs_info *binfo)
+ 
+       ret = platform_device_add(binfo->feature_dev);
+       if (!ret) {
+-              if (feature_dev_id_type(binfo->feature_dev) == PORT_ID)
++              if (type == PORT_ID)
+                       dfl_fpga_cdev_add_port_dev(binfo->cdev,
+                                                  binfo->feature_dev);
+               else
+diff --git a/drivers/gpu/drm/arm/hdlcd_crtc.c 
b/drivers/gpu/drm/arm/hdlcd_crtc.c
+index e4d67b70244d..e69d996eabad 100644
+--- a/drivers/gpu/drm/arm/hdlcd_crtc.c
++++ b/drivers/gpu/drm/arm/hdlcd_crtc.c
+@@ -186,20 +186,20 @@ static void hdlcd_crtc_atomic_disable(struct drm_crtc 
*crtc,
+       clk_disable_unprepare(hdlcd->clk);
+ }
+ 
+-static int hdlcd_crtc_atomic_check(struct drm_crtc *crtc,
+-                                 struct drm_crtc_state *state)
++static enum drm_mode_status hdlcd_crtc_mode_valid(struct drm_crtc *crtc,
++              const struct drm_display_mode *mode)
+ {
+       struct hdlcd_drm_private *hdlcd = crtc_to_hdlcd_priv(crtc);
+-      struct drm_display_mode *mode = &state->adjusted_mode;
+       long rate, clk_rate = mode->clock * 1000;
+ 
+       rate = clk_round_rate(hdlcd->clk, clk_rate);
+-      if (rate != clk_rate) {
++      /* 0.1% seems a close enough tolerance for the TDA19988 on Juno */
++      if (abs(rate - clk_rate) * 1000 > clk_rate) {
+               /* clock required by mode not supported by hardware */
+-              return -EINVAL;
++              return MODE_NOCLOCK;
+       }
+ 
+-      return 0;
++      return MODE_OK;
+ }
+ 
+ static void hdlcd_crtc_atomic_begin(struct drm_crtc *crtc,
+@@ -220,7 +220,7 @@ static void hdlcd_crtc_atomic_begin(struct drm_crtc *crtc,
+ }
+ 
+ static const struct drm_crtc_helper_funcs hdlcd_crtc_helper_funcs = {
+-      .atomic_check   = hdlcd_crtc_atomic_check,
++      .mode_valid     = hdlcd_crtc_mode_valid,
+       .atomic_begin   = hdlcd_crtc_atomic_begin,
+       .atomic_enable  = hdlcd_crtc_atomic_enable,
+       .atomic_disable = hdlcd_crtc_atomic_disable,
+diff --git a/drivers/gpu/drm/arm/malidp_drv.c 
b/drivers/gpu/drm/arm/malidp_drv.c
+index 94d6dabec2dc..1ab511e33243 100644
+--- a/drivers/gpu/drm/arm/malidp_drv.c
++++ b/drivers/gpu/drm/arm/malidp_drv.c
+@@ -190,6 +190,7 @@ static void malidp_atomic_commit_hw_done(struct 
drm_atomic_state *state)
+ {
+       struct drm_device *drm = state->dev;
+       struct malidp_drm *malidp = drm->dev_private;
++      int loop = 5;
+ 
+       malidp->event = malidp->crtc.state->event;
+       malidp->crtc.state->event = NULL;
+@@ -204,8 +205,18 @@ static void malidp_atomic_commit_hw_done(struct 
drm_atomic_state *state)
+                       drm_crtc_vblank_get(&malidp->crtc);
+ 
+               /* only set config_valid if the CRTC is enabled */
+-              if (malidp_set_and_wait_config_valid(drm) < 0)
++              if (malidp_set_and_wait_config_valid(drm) < 0) {
++                      /*
++                       * make a loop around the second CVAL setting and
++                       * try 5 times before giving up.
++                       */
++                      while (loop--) {
++                              if (!malidp_set_and_wait_config_valid(drm))
++                                      break;
++                      }
+                       DRM_DEBUG_DRIVER("timed out waiting for updated 
configuration\n");
++              }
++
+       } else if (malidp->event) {
+               /* CRTC inactive means vblank IRQ is disabled, send event 
directly */
+               spin_lock_irq(&drm->event_lock);
+diff --git a/drivers/gpu/drm/vmwgfx/vmwgfx_msg.c 
b/drivers/gpu/drm/vmwgfx/vmwgfx_msg.c
+index 8b9270f31409..e4e09d47c5c0 100644
+--- a/drivers/gpu/drm/vmwgfx/vmwgfx_msg.c
++++ b/drivers/gpu/drm/vmwgfx/vmwgfx_msg.c
+@@ -136,6 +136,114 @@ static int vmw_close_channel(struct rpc_channel *channel)
+       return 0;
+ }
+ 
++/**
++ * vmw_port_hb_out - Send the message payload either through the
++ * high-bandwidth port if available, or through the backdoor otherwise.
++ * @channel: The rpc channel.
++ * @msg: NULL-terminated message.
++ * @hb: Whether the high-bandwidth port is available.
++ *
++ * Return: The port status.
++ */
++static unsigned long vmw_port_hb_out(struct rpc_channel *channel,
++                                   const char *msg, bool hb)
++{
++      unsigned long si, di, eax, ebx, ecx, edx;
++      unsigned long msg_len = strlen(msg);
++
++      if (hb) {
++              unsigned long bp = channel->cookie_high;
++
++              si = (uintptr_t) msg;
++              di = channel->cookie_low;
++
++              VMW_PORT_HB_OUT(
++                      (MESSAGE_STATUS_SUCCESS << 16) | VMW_PORT_CMD_HB_MSG,
++                      msg_len, si, di,
++                      VMW_HYPERVISOR_HB_PORT | (channel->channel_id << 16),
++                      VMW_HYPERVISOR_MAGIC, bp,
++                      eax, ebx, ecx, edx, si, di);
++
++              return ebx;
++      }
++
++      /* HB port not available. Send the message 4 bytes at a time. */
++      ecx = MESSAGE_STATUS_SUCCESS << 16;
++      while (msg_len && (HIGH_WORD(ecx) & MESSAGE_STATUS_SUCCESS)) {
++              unsigned int bytes = min_t(size_t, msg_len, 4);
++              unsigned long word = 0;
++
++              memcpy(&word, msg, bytes);
++              msg_len -= bytes;
++              msg += bytes;
++              si = channel->cookie_high;
++              di = channel->cookie_low;
++
++              VMW_PORT(VMW_PORT_CMD_MSG | (MSG_TYPE_SENDPAYLOAD << 16),
++                       word, si, di,
++                       VMW_HYPERVISOR_PORT | (channel->channel_id << 16),
++                       VMW_HYPERVISOR_MAGIC,
++                       eax, ebx, ecx, edx, si, di);
++      }
++
++      return ecx;
++}
++
++/**
++ * vmw_port_hb_in - Receive the message payload either through the
++ * high-bandwidth port if available, or through the backdoor otherwise.
++ * @channel: The rpc channel.
++ * @reply: Pointer to buffer holding reply.
++ * @reply_len: Length of the reply.
++ * @hb: Whether the high-bandwidth port is available.
++ *
++ * Return: The port status.
++ */
++static unsigned long vmw_port_hb_in(struct rpc_channel *channel, char *reply,
++                                  unsigned long reply_len, bool hb)
++{
++      unsigned long si, di, eax, ebx, ecx, edx;
++
++      if (hb) {
++              unsigned long bp = channel->cookie_low;
++
++              si = channel->cookie_high;
++              di = (uintptr_t) reply;
++
++              VMW_PORT_HB_IN(
++                      (MESSAGE_STATUS_SUCCESS << 16) | VMW_PORT_CMD_HB_MSG,
++                      reply_len, si, di,
++                      VMW_HYPERVISOR_HB_PORT | (channel->channel_id << 16),
++                      VMW_HYPERVISOR_MAGIC, bp,
++                      eax, ebx, ecx, edx, si, di);
++
++              return ebx;
++      }
++
++      /* HB port not available. Retrieve the message 4 bytes at a time. */
++      ecx = MESSAGE_STATUS_SUCCESS << 16;
++      while (reply_len) {
++              unsigned int bytes = min_t(unsigned long, reply_len, 4);
++
++              si = channel->cookie_high;
++              di = channel->cookie_low;
++
++              VMW_PORT(VMW_PORT_CMD_MSG | (MSG_TYPE_RECVPAYLOAD << 16),
++                       MESSAGE_STATUS_SUCCESS, si, di,
++                       VMW_HYPERVISOR_PORT | (channel->channel_id << 16),
++                       VMW_HYPERVISOR_MAGIC,
++                       eax, ebx, ecx, edx, si, di);
++
++              if ((HIGH_WORD(ecx) & MESSAGE_STATUS_SUCCESS) == 0)
++                      break;
++
++              memcpy(reply, &ebx, bytes);
++              reply_len -= bytes;
++              reply += bytes;
++      }
++
++      return ecx;
++}
+ 
+ 
+ /**
+@@ -148,11 +256,10 @@ static int vmw_close_channel(struct rpc_channel *channel)
+  */
+ static int vmw_send_msg(struct rpc_channel *channel, const char *msg)
+ {
+-      unsigned long eax, ebx, ecx, edx, si, di, bp;
++      unsigned long eax, ebx, ecx, edx, si, di;
+       size_t msg_len = strlen(msg);
+       int retries = 0;
+ 
+-
+       while (retries < RETRIES) {
+               retries++;
+ 
+@@ -166,23 +273,14 @@ static int vmw_send_msg(struct rpc_channel *channel, 
const char *msg)
+                       VMW_HYPERVISOR_MAGIC,
+                       eax, ebx, ecx, edx, si, di);
+ 
+-              if ((HIGH_WORD(ecx) & MESSAGE_STATUS_SUCCESS) == 0 ||
+-                  (HIGH_WORD(ecx) & MESSAGE_STATUS_HB) == 0) {
+-                      /* Expected success + high-bandwidth. Give up. */
++              if ((HIGH_WORD(ecx) & MESSAGE_STATUS_SUCCESS) == 0) {
++                      /* Expected success. Give up. */
+                       return -EINVAL;
+               }
+ 
+               /* Send msg */
+-              si  = (uintptr_t) msg;
+-              di  = channel->cookie_low;
+-              bp  = channel->cookie_high;
+-
+-              VMW_PORT_HB_OUT(
+-                      (MESSAGE_STATUS_SUCCESS << 16) | VMW_PORT_CMD_HB_MSG,
+-                      msg_len, si, di,
+-                      VMW_HYPERVISOR_HB_PORT | (channel->channel_id << 16),
+-                      VMW_HYPERVISOR_MAGIC, bp,
+-                      eax, ebx, ecx, edx, si, di);
++              ebx = vmw_port_hb_out(channel, msg,
++                                    !!(HIGH_WORD(ecx) & MESSAGE_STATUS_HB));
+ 
+               if ((HIGH_WORD(ebx) & MESSAGE_STATUS_SUCCESS) != 0) {
+                       return 0;
+@@ -211,7 +309,7 @@ STACK_FRAME_NON_STANDARD(vmw_send_msg);
+ static int vmw_recv_msg(struct rpc_channel *channel, void **msg,
+                       size_t *msg_len)
+ {
+-      unsigned long eax, ebx, ecx, edx, si, di, bp;
++      unsigned long eax, ebx, ecx, edx, si, di;
+       char *reply;
+       size_t reply_len;
+       int retries = 0;
+@@ -233,8 +331,7 @@ static int vmw_recv_msg(struct rpc_channel *channel, void 
**msg,
+                       VMW_HYPERVISOR_MAGIC,
+                       eax, ebx, ecx, edx, si, di);
+ 
+-              if ((HIGH_WORD(ecx) & MESSAGE_STATUS_SUCCESS) == 0 ||
+-                  (HIGH_WORD(ecx) & MESSAGE_STATUS_HB) == 0) {
++              if ((HIGH_WORD(ecx) & MESSAGE_STATUS_SUCCESS) == 0) {
+                       DRM_ERROR("Failed to get reply size for host 
message.\n");
+                       return -EINVAL;
+               }
+@@ -252,17 +349,8 @@ static int vmw_recv_msg(struct rpc_channel *channel, void 
**msg,
+ 
+ 
+               /* Receive buffer */
+-              si  = channel->cookie_high;
+-              di  = (uintptr_t) reply;
+-              bp  = channel->cookie_low;
+-
+-              VMW_PORT_HB_IN(
+-                      (MESSAGE_STATUS_SUCCESS << 16) | VMW_PORT_CMD_HB_MSG,
+-                      reply_len, si, di,
+-                      VMW_HYPERVISOR_HB_PORT | (channel->channel_id << 16),
+-                      VMW_HYPERVISOR_MAGIC, bp,
+-                      eax, ebx, ecx, edx, si, di);
+-
++              ebx = vmw_port_hb_in(channel, reply, reply_len,
++                                   !!(HIGH_WORD(ecx) & MESSAGE_STATUS_HB));
+               if ((HIGH_WORD(ebx) & MESSAGE_STATUS_SUCCESS) == 0) {
+                       kfree(reply);
+ 
+diff --git a/drivers/hwmon/hwmon.c b/drivers/hwmon/hwmon.c
+index fcdbac4a56e3..6b3559f58b67 100644
+--- a/drivers/hwmon/hwmon.c
++++ b/drivers/hwmon/hwmon.c
+@@ -619,7 +619,7 @@ __hwmon_device_register(struct device *dev, const char 
*name, void *drvdata,
+       if (err)
+               goto free_hwmon;
+ 
+-      if (dev && chip && chip->ops->read &&
++      if (dev && dev->of_node && chip && chip->ops->read &&
+           chip->info[0]->type == hwmon_chip &&
+           (chip->info[0]->config[0] & HWMON_C_REGISTER_TZ)) {
+               const struct hwmon_channel_info **info = chip->info;
+diff --git a/drivers/hwmon/pmbus/pmbus_core.c 
b/drivers/hwmon/pmbus/pmbus_core.c
+index 2e2b5851139c..cd24b375df1e 100644
+--- a/drivers/hwmon/pmbus/pmbus_core.c
++++ b/drivers/hwmon/pmbus/pmbus_core.c
+@@ -1230,7 +1230,8 @@ static int pmbus_add_sensor_attrs_one(struct i2c_client 
*client,
+                                     const struct pmbus_driver_info *info,
+                                     const char *name,
+                                     int index, int page,
+-                                    const struct pmbus_sensor_attr *attr)
++                                    const struct pmbus_sensor_attr *attr,
++                                    bool paged)
+ {
+       struct pmbus_sensor *base;
+       bool upper = !!(attr->gbit & 0xff00);   /* need to check STATUS_WORD */
+@@ -1238,7 +1239,7 @@ static int pmbus_add_sensor_attrs_one(struct i2c_client 
*client,
+ 
+       if (attr->label) {
+               ret = pmbus_add_label(data, name, index, attr->label,
+-                                    attr->paged ? page + 1 : 0);
++                                    paged ? page + 1 : 0);
+               if (ret)
+                       return ret;
+       }
+@@ -1271,6 +1272,30 @@ static int pmbus_add_sensor_attrs_one(struct i2c_client 
*client,
+       return 0;
+ }
+ 
++static bool pmbus_sensor_is_paged(const struct pmbus_driver_info *info,
++                                const struct pmbus_sensor_attr *attr)
++{
++      int p;
++
++      if (attr->paged)
++              return true;
++
++      /*
++       * Some attributes may be present on more than one page despite
++       * not being marked with the paged attribute. If that is the case,
++       * then treat the sensor as being paged and add the page suffix to the
++       * attribute name.
++       * We don't just add the paged attribute to all such attributes, in
++       * order to maintain the un-suffixed labels in the case where the
++       * attribute is only on page 0.
++       */
++      for (p = 1; p < info->pages; p++) {
++              if (info->func[p] & attr->func)
++                      return true;
++      }
++      return false;
++}
++
+ static int pmbus_add_sensor_attrs(struct i2c_client *client,
+                                 struct pmbus_data *data,
+                                 const char *name,
+@@ -1284,14 +1309,15 @@ static int pmbus_add_sensor_attrs(struct i2c_client 
*client,
+       index = 1;
+       for (i = 0; i < nattrs; i++) {
+               int page, pages;
++              bool paged = pmbus_sensor_is_paged(info, attrs);
+ 
+-              pages = attrs->paged ? info->pages : 1;
++              pages = paged ? info->pages : 1;
+               for (page = 0; page < pages; page++) {
+                       if (!(info->func[page] & attrs->func))
+                               continue;
+                       ret = pmbus_add_sensor_attrs_one(client, data, info,
+                                                        name, index, page,
+-                                                       attrs);
++                                                       attrs, paged);
+                       if (ret)
+                               return ret;
+                       index++;
+diff --git a/drivers/iio/temperature/mlx90632.c 
b/drivers/iio/temperature/mlx90632.c
+index 9851311aa3fd..2d54d9cac61d 100644
+--- a/drivers/iio/temperature/mlx90632.c
++++ b/drivers/iio/temperature/mlx90632.c
+@@ -81,6 +81,8 @@
+ /* Magic constants */
+ #define MLX90632_ID_MEDICAL   0x0105 /* EEPROM DSPv5 Medical device id */
+ #define MLX90632_ID_CONSUMER  0x0205 /* EEPROM DSPv5 Consumer device id */
++#define MLX90632_DSP_VERSION  5 /* DSP version */
++#define MLX90632_DSP_MASK     GENMASK(7, 0) /* DSP version in EE_VERSION */
+ #define MLX90632_RESET_CMD    0x0006 /* Reset sensor (address or global) */
+ #define MLX90632_REF_12               12LL /**< ResCtrlRef value of Ch 1 or 
Ch 2 */
+ #define MLX90632_REF_3                12LL /**< ResCtrlRef value of Channel 3 
*/
+@@ -666,10 +668,13 @@ static int mlx90632_probe(struct i2c_client *client,
+       } else if (read == MLX90632_ID_CONSUMER) {
+               dev_dbg(&client->dev,
+                       "Detected Consumer EEPROM calibration %x\n", read);
++      } else if ((read & MLX90632_DSP_MASK) == MLX90632_DSP_VERSION) {
++              dev_dbg(&client->dev,
++                      "Detected Unknown EEPROM calibration %x\n", read);
+       } else {
+               dev_err(&client->dev,
+-                      "EEPROM version mismatch %x (expected %x or %x)\n",
+-                      read, MLX90632_ID_CONSUMER, MLX90632_ID_MEDICAL);
++                      "Wrong DSP version %x (expected %x)\n",
++                      read, MLX90632_DSP_VERSION);
+               return -EPROTONOSUPPORT;
+       }
+ 
+diff --git a/drivers/infiniband/hw/hfi1/chip.c 
b/drivers/infiniband/hw/hfi1/chip.c
+index b12c8ff8ed66..d8eb4dc04d69 100644
+--- a/drivers/infiniband/hw/hfi1/chip.c
++++ b/drivers/infiniband/hw/hfi1/chip.c
+@@ -9849,6 +9849,7 @@ void hfi1_quiet_serdes(struct hfi1_pportdata *ppd)
+ 
+       /* disable the port */
+       clear_rcvctrl(dd, RCV_CTRL_RCV_PORT_ENABLE_SMASK);
++      cancel_work_sync(&ppd->freeze_work);
+ }
+ 
+ static inline int init_cpu_counters(struct hfi1_devdata *dd)
+diff --git a/drivers/infiniband/hw/hfi1/fault.c 
b/drivers/infiniband/hw/hfi1/fault.c
+index e2290f32c8d9..7eaff4dcbfd7 100644
+--- a/drivers/infiniband/hw/hfi1/fault.c
++++ b/drivers/infiniband/hw/hfi1/fault.c
+@@ -153,6 +153,7 @@ static ssize_t fault_opcodes_write(struct file *file, 
const char __user *buf,
+               char *dash;
+               unsigned long range_start, range_end, i;
+               bool remove = false;
++              unsigned long bound = 1U << BITS_PER_BYTE;
+ 
+               end = strchr(ptr, ',');
+               if (end)
+@@ -178,6 +179,10 @@ static ssize_t fault_opcodes_write(struct file *file, 
const char __user *buf,
+                                   BITS_PER_BYTE);
+                       break;
+               }
++              /* Check the inputs */
++              if (range_start >= bound || range_end >= bound)
++                      break;
++
+               for (i = range_start; i <= range_end; i++) {
+                       if (remove)
+                               clear_bit(i, fault->opcodes);
+diff --git a/drivers/infiniband/hw/hfi1/user_exp_rcv.c 
b/drivers/infiniband/hw/hfi1/user_exp_rcv.c
+index dbe7d14a5c76..4e986ca4dd35 100644
+--- a/drivers/infiniband/hw/hfi1/user_exp_rcv.c
++++ b/drivers/infiniband/hw/hfi1/user_exp_rcv.c
+@@ -324,6 +324,9 @@ int hfi1_user_exp_rcv_setup(struct hfi1_filedata *fd,
+       u32 *tidlist = NULL;
+       struct tid_user_buf *tidbuf;
+ 
++      if (!PAGE_ALIGNED(tinfo->vaddr))
++              return -EINVAL;
++
+       tidbuf = kzalloc(sizeof(*tidbuf), GFP_KERNEL);
+       if (!tidbuf)
+               return -ENOMEM;
+diff --git a/drivers/infiniband/hw/hfi1/verbs.c 
b/drivers/infiniband/hw/hfi1/verbs.c
+index 48692adbe811..27d9c4cefdc7 100644
+--- a/drivers/infiniband/hw/hfi1/verbs.c
++++ b/drivers/infiniband/hw/hfi1/verbs.c
+@@ -1418,8 +1418,6 @@ static void hfi1_fill_device_attr(struct hfi1_devdata 
*dd)
+       rdi->dparms.props.max_cq = hfi1_max_cqs;
+       rdi->dparms.props.max_ah = hfi1_max_ahs;
+       rdi->dparms.props.max_cqe = hfi1_max_cqes;
+-      rdi->dparms.props.max_mr = rdi->lkey_table.max;
+-      rdi->dparms.props.max_fmr = rdi->lkey_table.max;
+       rdi->dparms.props.max_map_per_fmr = 32767;
+       rdi->dparms.props.max_pd = hfi1_max_pds;
+       rdi->dparms.props.max_qp_rd_atom = HFI1_MAX_RDMA_ATOMIC;
+diff --git a/drivers/infiniband/hw/hfi1/verbs_txreq.c 
b/drivers/infiniband/hw/hfi1/verbs_txreq.c
+index c4ab2d5b4502..8f766dd3f61c 100644
+--- a/drivers/infiniband/hw/hfi1/verbs_txreq.c
++++ b/drivers/infiniband/hw/hfi1/verbs_txreq.c
+@@ -100,7 +100,7 @@ struct verbs_txreq *__get_txreq(struct hfi1_ibdev *dev,
+       if (ib_rvt_state_ops[qp->state] & RVT_PROCESS_RECV_OK) {
+               struct hfi1_qp_priv *priv;
+ 
+-              tx = kmem_cache_alloc(dev->verbs_txreq_cache, GFP_ATOMIC);
++              tx = kmem_cache_alloc(dev->verbs_txreq_cache, VERBS_TXREQ_GFP);
+               if (tx)
+                       goto out;
+               priv = qp->priv;
+diff --git a/drivers/infiniband/hw/hfi1/verbs_txreq.h 
b/drivers/infiniband/hw/hfi1/verbs_txreq.h
+index 1c19bbc764b2..b1a78985b4ec 100644
+--- a/drivers/infiniband/hw/hfi1/verbs_txreq.h
++++ b/drivers/infiniband/hw/hfi1/verbs_txreq.h
+@@ -72,6 +72,7 @@ struct hfi1_ibdev;
+ struct verbs_txreq *__get_txreq(struct hfi1_ibdev *dev,
+                               struct rvt_qp *qp);
+ 
++#define VERBS_TXREQ_GFP (GFP_ATOMIC | __GFP_NOWARN)
+ static inline struct verbs_txreq *get_txreq(struct hfi1_ibdev *dev,
+                                           struct rvt_qp *qp)
+       __must_hold(&qp->slock)
+@@ -79,7 +80,7 @@ static inline struct verbs_txreq *get_txreq(struct 
hfi1_ibdev *dev,
+       struct verbs_txreq *tx;
+       struct hfi1_qp_priv *priv = qp->priv;
+ 
+-      tx = kmem_cache_alloc(dev->verbs_txreq_cache, GFP_ATOMIC);
++      tx = kmem_cache_alloc(dev->verbs_txreq_cache, VERBS_TXREQ_GFP);
+       if (unlikely(!tx)) {
+               /* call slow path to get the lock */
+               tx = __get_txreq(dev, qp);
+diff --git a/drivers/infiniband/hw/qib/qib_verbs.c 
b/drivers/infiniband/hw/qib/qib_verbs.c
+index 41babbc0db58..803c3544c75b 100644
+--- a/drivers/infiniband/hw/qib/qib_verbs.c
++++ b/drivers/infiniband/hw/qib/qib_verbs.c
+@@ -1495,8 +1495,6 @@ static void qib_fill_device_attr(struct qib_devdata *dd)
+       rdi->dparms.props.max_cq = ib_qib_max_cqs;
+       rdi->dparms.props.max_cqe = ib_qib_max_cqes;
+       rdi->dparms.props.max_ah = ib_qib_max_ahs;
+-      rdi->dparms.props.max_mr = rdi->lkey_table.max;
+-      rdi->dparms.props.max_fmr = rdi->lkey_table.max;
+       rdi->dparms.props.max_map_per_fmr = 32767;
+       rdi->dparms.props.max_qp_rd_atom = QIB_MAX_RDMA_ATOMIC;
+       rdi->dparms.props.max_qp_init_rd_atom = 255;
+diff --git a/drivers/infiniband/sw/rdmavt/mr.c 
b/drivers/infiniband/sw/rdmavt/mr.c
+index 5819c9d6ffdc..39d101df229d 100644
+--- a/drivers/infiniband/sw/rdmavt/mr.c
++++ b/drivers/infiniband/sw/rdmavt/mr.c
+@@ -96,6 +96,8 @@ int rvt_driver_mr_init(struct rvt_dev_info *rdi)
+       for (i = 0; i < rdi->lkey_table.max; i++)
+               RCU_INIT_POINTER(rdi->lkey_table.table[i], NULL);
+ 
++      rdi->dparms.props.max_mr = rdi->lkey_table.max;
++      rdi->dparms.props.max_fmr = rdi->lkey_table.max;
+       return 0;
+ }
+ 
+diff --git a/drivers/infiniband/sw/rdmavt/qp.c 
b/drivers/infiniband/sw/rdmavt/qp.c
+index 5ce403c6cddb..7d03680afd91 100644
+--- a/drivers/infiniband/sw/rdmavt/qp.c
++++ b/drivers/infiniband/sw/rdmavt/qp.c
+@@ -412,7 +412,8 @@ static int alloc_qpn(struct rvt_dev_info *rdi, struct 
rvt_qpn_table *qpt,
+                       offset = qpt->incr | ((offset & 1) ^ 1);
+               }
+               /* there can be no set bits in low-order QoS bits */
+-              WARN_ON(offset & (BIT(rdi->dparms.qos_shift) - 1));
++              WARN_ON(rdi->dparms.qos_shift > 1 &&
++                      offset & ((BIT(rdi->dparms.qos_shift - 1) - 1) << 1));
+               qpn = mk_qpn(qpt, map, offset);
+       }
+ 
+diff --git a/drivers/input/misc/uinput.c b/drivers/input/misc/uinput.c
+index 26ec603fe220..83d1499fe021 100644
+--- a/drivers/input/misc/uinput.c
++++ b/drivers/input/misc/uinput.c
+@@ -1051,13 +1051,31 @@ static long uinput_ioctl(struct file *file, unsigned 
int cmd, unsigned long arg)
+ 
+ #ifdef CONFIG_COMPAT
+ 
+-#define UI_SET_PHYS_COMPAT    _IOW(UINPUT_IOCTL_BASE, 108, compat_uptr_t)
++/*
++ * These IOCTLs change their size and thus their numbers between
++ * 32 and 64 bits.
++ */
++#define UI_SET_PHYS_COMPAT            \
++      _IOW(UINPUT_IOCTL_BASE, 108, compat_uptr_t)
++#define UI_BEGIN_FF_UPLOAD_COMPAT     \
++      _IOWR(UINPUT_IOCTL_BASE, 200, struct uinput_ff_upload_compat)
++#define UI_END_FF_UPLOAD_COMPAT               \
++      _IOW(UINPUT_IOCTL_BASE, 201, struct uinput_ff_upload_compat)
+ 
+ static long uinput_compat_ioctl(struct file *file,
+                               unsigned int cmd, unsigned long arg)
+ {
+-      if (cmd == UI_SET_PHYS_COMPAT)
++      switch (cmd) {
++      case UI_SET_PHYS_COMPAT:
+               cmd = UI_SET_PHYS;
++              break;
++      case UI_BEGIN_FF_UPLOAD_COMPAT:
++              cmd = UI_BEGIN_FF_UPLOAD;
++              break;
++      case UI_END_FF_UPLOAD_COMPAT:
++              cmd = UI_END_FF_UPLOAD;
++              break;
++      }
+ 
+       return uinput_ioctl_handler(file, cmd, arg, compat_ptr(arg));
+ }
+diff --git a/drivers/input/mouse/synaptics.c b/drivers/input/mouse/synaptics.c
+index b6da0c1267e3..8e6077d8e434 100644
+--- a/drivers/input/mouse/synaptics.c
++++ b/drivers/input/mouse/synaptics.c
+@@ -179,6 +179,8 @@ static const char * const smbus_pnp_ids[] = {
+       "LEN0096", /* X280 */
+       "LEN0097", /* X280 -> ALPS trackpoint */
+       "LEN200f", /* T450s */
++      "LEN2054", /* E480 */
++      "LEN2055", /* E580 */
+       "SYN3052", /* HP EliteBook 840 G4 */
+       "SYN3221", /* HP 15-ay000 */
+       NULL
+diff --git a/drivers/input/touchscreen/silead.c 
b/drivers/input/touchscreen/silead.c
+index d196ac3d8b8c..e5c3b066bd2a 100644
+--- a/drivers/input/touchscreen/silead.c
++++ b/drivers/input/touchscreen/silead.c
+@@ -604,6 +604,7 @@ static const struct acpi_device_id silead_ts_acpi_match[] 
= {
+       { "MSSL1680", 0 },
+       { "MSSL0001", 0 },
+       { "MSSL0002", 0 },
++      { "MSSL0017", 0 },
+       { }
+ };
+ MODULE_DEVICE_TABLE(acpi, silead_ts_acpi_match);
+diff --git a/drivers/mmc/core/core.c b/drivers/mmc/core/core.c
+index 6600b3466dfb..0a74785e575b 100644
+--- a/drivers/mmc/core/core.c
++++ b/drivers/mmc/core/core.c
+@@ -144,8 +144,9 @@ void mmc_request_done(struct mmc_host *host, struct 
mmc_request *mrq)
+       int err = cmd->error;
+ 
+       /* Flag re-tuning needed on CRC errors */
+-      if ((cmd->opcode != MMC_SEND_TUNING_BLOCK &&
+-          cmd->opcode != MMC_SEND_TUNING_BLOCK_HS200) &&
++      if (cmd->opcode != MMC_SEND_TUNING_BLOCK &&
++          cmd->opcode != MMC_SEND_TUNING_BLOCK_HS200 &&
++          !host->retune_crc_disable &&
+           (err == -EILSEQ || (mrq->sbc && mrq->sbc->error == -EILSEQ) ||
+           (mrq->data && mrq->data->error == -EILSEQ) ||
+           (mrq->stop && mrq->stop->error == -EILSEQ)))
+diff --git a/drivers/mmc/core/sdio.c b/drivers/mmc/core/sdio.c
+index d8e17ea6126d..0aa99694b937 100644
+--- a/drivers/mmc/core/sdio.c
++++ b/drivers/mmc/core/sdio.c
+@@ -934,6 +934,10 @@ static int mmc_sdio_pre_suspend(struct mmc_host *host)
+  */
+ static int mmc_sdio_suspend(struct mmc_host *host)
+ {
++      /* Prevent processing of SDIO IRQs in suspended state. */
++      mmc_card_set_suspended(host->card);
++      cancel_delayed_work_sync(&host->sdio_irq_work);
++
+       mmc_claim_host(host);
+ 
+       if (mmc_card_keep_power(host) && mmc_card_wake_sdio_irq(host))
+@@ -982,13 +986,20 @@ static int mmc_sdio_resume(struct mmc_host *host)
+               err = sdio_enable_4bit_bus(host->card);
+       }
+ 
+-      if (!err && host->sdio_irqs) {
++      if (err)
++              goto out;
++
++      /* Allow SDIO IRQs to be processed again. */
++      mmc_card_clr_suspended(host->card);
++
++      if (host->sdio_irqs) {
+               if (!(host->caps2 & MMC_CAP2_SDIO_IRQ_NOTHREAD))
+                       wake_up_process(host->sdio_irq_thread);
+               else if (host->caps & MMC_CAP_SDIO_IRQ)
+                       host->ops->enable_sdio_irq(host, 1);
+       }
+ 
++out:
+       mmc_release_host(host);
+ 
+       host->pm_flags &= ~MMC_PM_KEEP_POWER;
+diff --git a/drivers/mmc/core/sdio_io.c b/drivers/mmc/core/sdio_io.c
+index d40744bbafa9..ed2d8c48ea17 100644
+--- a/drivers/mmc/core/sdio_io.c
++++ b/drivers/mmc/core/sdio_io.c
+@@ -18,6 +18,7 @@
+ #include "sdio_ops.h"
+ #include "core.h"
+ #include "card.h"
++#include "host.h"
+ 
+ /**
+  *    sdio_claim_host - exclusively claim a bus for a certain SDIO function
+@@ -725,3 +726,79 @@ int sdio_set_host_pm_flags(struct sdio_func *func, 
mmc_pm_flag_t flags)
+       return 0;
+ }
+ EXPORT_SYMBOL_GPL(sdio_set_host_pm_flags);
++
++/**
++ *    sdio_retune_crc_disable - temporarily disable retuning on CRC errors
++ *    @func: SDIO function attached to host
++ *
++ *    If the SDIO card is known to be in a state where it might produce
++ *    CRC errors on the bus in response to commands (like if we know it is
++ *    transitioning between power states), an SDIO function driver can
++ *    call this function to temporarily disable the SD/MMC core behavior of
++ *    triggering an automatic retuning.
++ *
++ *    This function should be called while the host is claimed and the host
++ *    should remain claimed until sdio_retune_crc_enable() is called.
++ *    Specifically, the expected sequence of calls is:
++ *    - sdio_claim_host()
++ *    - sdio_retune_crc_disable()
++ *    - some number of calls like sdio_writeb() and sdio_readb()
++ *    - sdio_retune_crc_enable()
++ *    - sdio_release_host()
++ */
++void sdio_retune_crc_disable(struct sdio_func *func)
++{
++      func->card->host->retune_crc_disable = true;
++}
++EXPORT_SYMBOL_GPL(sdio_retune_crc_disable);
++
++/**
++ *    sdio_retune_crc_enable - re-enable retuning on CRC errors
++ *    @func: SDIO function attached to host
++ *
++ *    This is the compement to sdio_retune_crc_disable().
++ */
++void sdio_retune_crc_enable(struct sdio_func *func)
++{
++      func->card->host->retune_crc_disable = false;
++}
++EXPORT_SYMBOL_GPL(sdio_retune_crc_enable);
++
++/**
++ *    sdio_retune_hold_now - start deferring retuning requests till release
++ *    @func: SDIO function attached to host
++ *
++ *    This function can be called if it's currently a bad time to do
++ *    a retune of the SDIO card.  Retune requests made during this time
++ *    will be held and we'll actually do the retune sometime after the
++ *    release.
++ *
++ *    This function could be useful if an SDIO card is in a power state
++ *    where it can respond to a small subset of commands that doesn't
++ *    include the retuning command.  Care should be taken when using
++ *    this function since (presumably) the retuning request we might be
++ *    deferring was made for a good reason.
++ *
++ *    This function should be called while the host is claimed.
++ */
++void sdio_retune_hold_now(struct sdio_func *func)
++{
++      mmc_retune_hold_now(func->card->host);
++}
++EXPORT_SYMBOL_GPL(sdio_retune_hold_now);
++
++/**
++ *    sdio_retune_release - signal that it's OK to retune now
++ *    @func: SDIO function attached to host
++ *
++ *    This is the complement to sdio_retune_hold_now().  Calling this
++ *    function won't make a retune happen right away but will allow
++ *    them to be scheduled normally.
++ *
++ *    This function should be called while the host is claimed.
++ */
++void sdio_retune_release(struct sdio_func *func)
++{
++      mmc_retune_release(func->card->host);
++}
++EXPORT_SYMBOL_GPL(sdio_retune_release);
+diff --git a/drivers/mmc/core/sdio_irq.c b/drivers/mmc/core/sdio_irq.c
+index 7ca7b99413f0..b299a24d33f9 100644
+--- a/drivers/mmc/core/sdio_irq.c
++++ b/drivers/mmc/core/sdio_irq.c
+@@ -38,6 +38,10 @@ static int process_sdio_pending_irqs(struct mmc_host *host)
+       unsigned char pending;
+       struct sdio_func *func;
+ 
++      /* Don't process SDIO IRQs if the card is suspended. */
++      if (mmc_card_suspended(card))
++              return 0;
++
+       /*
+        * Optimization, if there is only 1 function interrupt registered
+        * and we know an IRQ was signaled then call irq handler directly.
+diff --git a/drivers/mmc/host/sdhci-pci-o2micro.c 
b/drivers/mmc/host/sdhci-pci-o2micro.c
+index cc3ffeffd7a2..fa8d9da2ab7f 100644
+--- a/drivers/mmc/host/sdhci-pci-o2micro.c
++++ b/drivers/mmc/host/sdhci-pci-o2micro.c
+@@ -117,6 +117,7 @@ static int sdhci_o2_execute_tuning(struct mmc_host *mmc, 
u32 opcode)
+        */
+       if (mmc->ios.bus_width == MMC_BUS_WIDTH_8) {
+               current_bus_width = mmc->ios.bus_width;
++              mmc->ios.bus_width = MMC_BUS_WIDTH_4;
+               sdhci_set_bus_width(host, MMC_BUS_WIDTH_4);
+       }
+ 
+@@ -128,8 +129,10 @@ static int sdhci_o2_execute_tuning(struct mmc_host *mmc, 
u32 opcode)
+ 
+       sdhci_end_tuning(host);
+ 
+-      if (current_bus_width == MMC_BUS_WIDTH_8)
++      if (current_bus_width == MMC_BUS_WIDTH_8) {
++              mmc->ios.bus_width = MMC_BUS_WIDTH_8;
+               sdhci_set_bus_width(host, current_bus_width);
++      }
+ 
+       host->flags &= ~SDHCI_HS400_TUNING;
+       return 0;
+diff --git a/drivers/net/can/flexcan.c b/drivers/net/can/flexcan.c
+index 2646faffd36e..6f265d2e647b 100644
+--- a/drivers/net/can/flexcan.c
++++ b/drivers/net/can/flexcan.c
+@@ -165,7 +165,7 @@
+ #define FLEXCAN_MB_CNT_LENGTH(x)      (((x) & 0xf) << 16)
+ #define FLEXCAN_MB_CNT_TIMESTAMP(x)   ((x) & 0xffff)
+ 
+-#define FLEXCAN_TIMEOUT_US            (50)
++#define FLEXCAN_TIMEOUT_US            (250)
+ 
+ /* FLEXCAN hardware feature flags
+  *
+diff --git a/drivers/net/can/xilinx_can.c b/drivers/net/can/xilinx_can.c
+index 045f0845e665..3df23487487f 100644
+--- a/drivers/net/can/xilinx_can.c
++++ b/drivers/net/can/xilinx_can.c
+@@ -1424,7 +1424,7 @@ static const struct xcan_devtype_data xcan_canfd_data = {
+                XCAN_FLAG_RXMNF |
+                XCAN_FLAG_TX_MAILBOXES |
+                XCAN_FLAG_RX_FIFO_MULTI,
+-      .bittiming_const = &xcan_bittiming_const,
++      .bittiming_const = &xcan_bittiming_const_canfd,
+       .btr_ts2_shift = XCAN_BTR_TS2_SHIFT_CANFD,
+       .btr_sjw_shift = XCAN_BTR_SJW_SHIFT_CANFD,
+       .bus_clk_name = "s_axi_aclk",
+diff --git a/drivers/net/dsa/mv88e6xxx/chip.c 
b/drivers/net/dsa/mv88e6xxx/chip.c
+index dfaad1c2c2b8..411cfb806459 100644
+--- a/drivers/net/dsa/mv88e6xxx/chip.c
++++ b/drivers/net/dsa/mv88e6xxx/chip.c
+@@ -1484,7 +1484,7 @@ static int mv88e6xxx_vtu_get(struct mv88e6xxx_chip 
*chip, u16 vid,
+       int err;
+ 
+       if (!vid)
+-              return -EINVAL;
++              return -EOPNOTSUPP;
+ 
+       entry->vid = vid - 1;
+       entry->valid = false;
+diff --git a/drivers/net/ethernet/hisilicon/hns/hns_ethtool.c 
b/drivers/net/ethernet/hisilicon/hns/hns_ethtool.c
+index e2710ff48fb0..1fa0cd527ead 100644
+--- a/drivers/net/ethernet/hisilicon/hns/hns_ethtool.c
++++ b/drivers/net/ethernet/hisilicon/hns/hns_ethtool.c
+@@ -339,6 +339,7 @@ static int __lb_setup(struct net_device *ndev,
+ static int __lb_up(struct net_device *ndev,
+                  enum hnae_loop loop_mode)
+ {
++#define NIC_LB_TEST_WAIT_PHY_LINK_TIME 300
+       struct hns_nic_priv *priv = netdev_priv(ndev);
+       struct hnae_handle *h = priv->ae_handle;
+       int speed, duplex;
+@@ -365,6 +366,9 @@ static int __lb_up(struct net_device *ndev,
+ 
+       h->dev->ops->adjust_link(h, speed, duplex);
+ 
++      /* wait adjust link done and phy ready */
++      msleep(NIC_LB_TEST_WAIT_PHY_LINK_TIME);
++
+       return 0;
+ }
+ 
+diff --git a/drivers/net/ethernet/mediatek/mtk_eth_soc.c 
b/drivers/net/ethernet/mediatek/mtk_eth_soc.c
+index 6e6abdc399de..1d55f014725e 100644
+--- a/drivers/net/ethernet/mediatek/mtk_eth_soc.c
++++ b/drivers/net/ethernet/mediatek/mtk_eth_soc.c
+@@ -1784,6 +1784,7 @@ static void mtk_poll_controller(struct net_device *dev)
+ 
+ static int mtk_start_dma(struct mtk_eth *eth)
+ {
++      u32 rx_2b_offset = (NET_IP_ALIGN == 2) ? MTK_RX_2B_OFFSET : 0;
+       int err;
+ 
+       err = mtk_dma_init(eth);
+@@ -1800,7 +1801,7 @@ static int mtk_start_dma(struct mtk_eth *eth)
+               MTK_QDMA_GLO_CFG);
+ 
+       mtk_w32(eth,
+-              MTK_RX_DMA_EN | MTK_RX_2B_OFFSET |
++              MTK_RX_DMA_EN | rx_2b_offset |
+               MTK_RX_BT_32DWORDS | MTK_MULTI_EN,
+               MTK_PDMA_GLO_CFG);
+ 
+@@ -2304,13 +2305,13 @@ static int mtk_get_rxnfc(struct net_device *dev, 
struct ethtool_rxnfc *cmd,
+ 
+       switch (cmd->cmd) {
+       case ETHTOOL_GRXRINGS:
+-              if (dev->features & NETIF_F_LRO) {
++              if (dev->hw_features & NETIF_F_LRO) {
+                       cmd->data = MTK_MAX_RX_RING_NUM;
+                       ret = 0;
+               }
+               break;
+       case ETHTOOL_GRXCLSRLCNT:
+-              if (dev->features & NETIF_F_LRO) {
++              if (dev->hw_features & NETIF_F_LRO) {
+                       struct mtk_mac *mac = netdev_priv(dev);
+ 
+                       cmd->rule_cnt = mac->hwlro_ip_cnt;
+@@ -2318,11 +2319,11 @@ static int mtk_get_rxnfc(struct net_device *dev, 
struct ethtool_rxnfc *cmd,
+               }
+               break;
+       case ETHTOOL_GRXCLSRULE:
+-              if (dev->features & NETIF_F_LRO)
++              if (dev->hw_features & NETIF_F_LRO)
+                       ret = mtk_hwlro_get_fdir_entry(dev, cmd);
+               break;
+       case ETHTOOL_GRXCLSRLALL:
+-              if (dev->features & NETIF_F_LRO)
++              if (dev->hw_features & NETIF_F_LRO)
+                       ret = mtk_hwlro_get_fdir_all(dev, cmd,
+                                                    rule_locs);
+               break;
+@@ -2339,11 +2340,11 @@ static int mtk_set_rxnfc(struct net_device *dev, 
struct ethtool_rxnfc *cmd)
+ 
+       switch (cmd->cmd) {
+       case ETHTOOL_SRXCLSRLINS:
+-              if (dev->features & NETIF_F_LRO)
++              if (dev->hw_features & NETIF_F_LRO)
+                       ret = mtk_hwlro_add_ipaddr(dev, cmd);
+               break;
+       case ETHTOOL_SRXCLSRLDEL:
+-              if (dev->features & NETIF_F_LRO)
++              if (dev->hw_features & NETIF_F_LRO)
+                       ret = mtk_hwlro_del_ipaddr(dev, cmd);
+               break;
+       default:
+diff --git a/drivers/net/ipvlan/ipvlan_main.c 
b/drivers/net/ipvlan/ipvlan_main.c
+index 68b8007da82b..0115a2868933 100644
+--- a/drivers/net/ipvlan/ipvlan_main.c
++++ b/drivers/net/ipvlan/ipvlan_main.c
+@@ -178,7 +178,7 @@ static void ipvlan_port_destroy(struct net_device *dev)
+ }
+ 
+ #define IPVLAN_FEATURES \
+-      (NETIF_F_SG | NETIF_F_HW_CSUM | NETIF_F_HIGHDMA | NETIF_F_FRAGLIST | \
++      (NETIF_F_SG | NETIF_F_CSUM_MASK | NETIF_F_HIGHDMA | NETIF_F_FRAGLIST | \
+        NETIF_F_GSO | NETIF_F_TSO | NETIF_F_GSO_ROBUST | \
+        NETIF_F_TSO_ECN | NETIF_F_TSO6 | NETIF_F_GRO | NETIF_F_RXCSUM | \
+        NETIF_F_HW_VLAN_CTAG_FILTER | NETIF_F_HW_VLAN_STAG_FILTER)
+diff --git a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/sdio.c 
b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/sdio.c
+index a907d7b065fa..53e4962ceb8a 100644
+--- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/sdio.c
++++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/sdio.c
+@@ -667,6 +667,12 @@ brcmf_sdio_kso_control(struct brcmf_sdio *bus, bool on)
+ 
+       brcmf_dbg(TRACE, "Enter: on=%d\n", on);
+ 
++      sdio_retune_crc_disable(bus->sdiodev->func1);
++
++      /* Cannot re-tune if device is asleep; defer till we're awake */
++      if (on)
++              sdio_retune_hold_now(bus->sdiodev->func1);
++
+       wr_val = (on << SBSDIO_FUNC1_SLEEPCSR_KSO_SHIFT);
+       /* 1st KSO write goes to AOS wake up core if device is asleep  */
+       brcmf_sdiod_writeb(bus->sdiodev, SBSDIO_FUNC1_SLEEPCSR, wr_val, &err);
+@@ -719,6 +725,11 @@ brcmf_sdio_kso_control(struct brcmf_sdio *bus, bool on)
+       if (try_cnt > MAX_KSO_ATTEMPTS)
+               brcmf_err("max tries: rd_val=0x%x err=%d\n", rd_val, err);
+ 
++      if (on)
++              sdio_retune_release(bus->sdiodev->func1);
++
++      sdio_retune_crc_enable(bus->sdiodev->func1);
++
+       return err;
+ }
+ 
+diff --git a/drivers/nvme/host/core.c b/drivers/nvme/host/core.c
+index a867a139bb35..d8869d978c34 100644
+--- a/drivers/nvme/host/core.c
++++ b/drivers/nvme/host/core.c
+@@ -3228,7 +3228,8 @@ static int nvme_scan_ns_list(struct nvme_ctrl *ctrl, 
unsigned nn)
+ {
+       struct nvme_ns *ns;
+       __le32 *ns_list;
+-      unsigned i, j, nsid, prev = 0, num_lists = DIV_ROUND_UP(nn, 1024);
++      unsigned i, j, nsid, prev = 0;
++      unsigned num_lists = DIV_ROUND_UP_ULL((u64)nn, 1024);
+       int ret = 0;
+ 
+       ns_list = kzalloc(NVME_IDENTIFY_DATA_SIZE, GFP_KERNEL);
+diff --git a/drivers/nvme/target/io-cmd-bdev.c 
b/drivers/nvme/target/io-cmd-bdev.c
+index 7bc9f6240432..1096dd01ca22 100644
+--- a/drivers/nvme/target/io-cmd-bdev.c
++++ b/drivers/nvme/target/io-cmd-bdev.c
+@@ -239,6 +239,7 @@ u16 nvmet_bdev_parse_io_cmd(struct nvmet_req *req)
+               return 0;
+       case nvme_cmd_write_zeroes:
+               req->execute = nvmet_bdev_execute_write_zeroes;
++              req->data_len = 0;
+               return 0;
+       default:
+               pr_err("unhandled cmd %d on qid %d\n", cmd->common.opcode,
+diff --git a/drivers/parport/share.c b/drivers/parport/share.c
+index 5dc53d420ca8..7b4ee33c1935 100644
+--- a/drivers/parport/share.c
++++ b/drivers/parport/share.c
+@@ -895,6 +895,7 @@ parport_register_dev_model(struct parport *port, const 
char *name,
+       par_dev->devmodel = true;
+       ret = device_register(&par_dev->dev);
+       if (ret) {
++              kfree(par_dev->state);
+               put_device(&par_dev->dev);
+               goto err_put_port;
+       }
+@@ -912,6 +913,7 @@ parport_register_dev_model(struct parport *port, const 
char *name,
+                       spin_unlock(&port->physport->pardevice_lock);
+                       pr_debug("%s: cannot grant exclusive access for device 
%s\n",
+                                port->name, name);
++                      kfree(par_dev->state);
+                       device_unregister(&par_dev->dev);
+                       goto err_put_port;
+               }
+diff --git a/drivers/s390/net/qeth_l2_main.c b/drivers/s390/net/qeth_l2_main.c
+index b7513c5848cf..c1c35eccd5b6 100644
+--- a/drivers/s390/net/qeth_l2_main.c
++++ b/drivers/s390/net/qeth_l2_main.c
+@@ -1901,7 +1901,7 @@ static void qeth_bridgeport_an_set_cb(void *priv,
+ 
+       l2entry = (struct qdio_brinfo_entry_l2 *)entry;
+       code = IPA_ADDR_CHANGE_CODE_MACADDR;
+-      if (l2entry->addr_lnid.lnid)
++      if (l2entry->addr_lnid.lnid < VLAN_N_VID)
+               code |= IPA_ADDR_CHANGE_CODE_VLANID;
+       qeth_bridge_emit_host_event(card, anev_reg_unreg, code,
+               (struct net_if_token *)&l2entry->nit,
+diff --git a/drivers/scsi/smartpqi/smartpqi_init.c 
b/drivers/scsi/smartpqi/smartpqi_init.c
+index 411d656f2530..98f2d076f938 100644
+--- a/drivers/scsi/smartpqi/smartpqi_init.c
++++ b/drivers/scsi/smartpqi/smartpqi_init.c
+@@ -3697,8 +3697,10 @@ static int pqi_submit_raid_request_synchronous(struct 
pqi_ctrl_info *ctrl_info,
+                               return -ETIMEDOUT;
+                       msecs_blocked =
+                               jiffies_to_msecs(jiffies - start_jiffies);
+-                      if (msecs_blocked >= timeout_msecs)
+-                              return -ETIMEDOUT;
++                      if (msecs_blocked >= timeout_msecs) {
++                              rc = -ETIMEDOUT;
++                              goto out;
++                      }
+                       timeout_msecs -= msecs_blocked;
+               }
+       }
+diff --git a/drivers/scsi/ufs/ufshcd-pltfrm.c 
b/drivers/scsi/ufs/ufshcd-pltfrm.c
+index 895a9b5ac989..30c22e16b1e3 100644
+--- a/drivers/scsi/ufs/ufshcd-pltfrm.c
++++ b/drivers/scsi/ufs/ufshcd-pltfrm.c
+@@ -340,24 +340,21 @@ int ufshcd_pltfrm_init(struct platform_device *pdev,
+               goto dealloc_host;
+       }
+ 
+-      pm_runtime_set_active(&pdev->dev);
+-      pm_runtime_enable(&pdev->dev);
+-
+       ufshcd_init_lanes_per_dir(hba);
+ 
+       err = ufshcd_init(hba, mmio_base, irq);
+       if (err) {
+               dev_err(dev, "Initialization failed\n");
+-              goto out_disable_rpm;
++              goto dealloc_host;
+       }
+ 
+       platform_set_drvdata(pdev, hba);
+ 
++      pm_runtime_set_active(&pdev->dev);
++      pm_runtime_enable(&pdev->dev);
++
+       return 0;
+ 
+-out_disable_rpm:
+-      pm_runtime_disable(&pdev->dev);
+-      pm_runtime_set_suspended(&pdev->dev);
+ dealloc_host:
+       ufshcd_dealloc_host(hba);
+ out:
+diff --git a/drivers/scsi/ufs/ufshcd.c b/drivers/scsi/ufs/ufshcd.c
+index 3183fa8c5857..b8b59cfeacd1 100644
+--- a/drivers/scsi/ufs/ufshcd.c
++++ b/drivers/scsi/ufs/ufshcd.c
+@@ -1914,7 +1914,8 @@ int ufshcd_copy_query_response(struct ufs_hba *hba, 
struct ufshcd_lrb *lrbp)
+       memcpy(&query_res->upiu_res, &lrbp->ucd_rsp_ptr->qr, QUERY_OSF_SIZE);
+ 
+       /* Get the descriptor */
+-      if (lrbp->ucd_rsp_ptr->qr.opcode == UPIU_QUERY_OPCODE_READ_DESC) {
++      if (hba->dev_cmd.query.descriptor &&
++          lrbp->ucd_rsp_ptr->qr.opcode == UPIU_QUERY_OPCODE_READ_DESC) {
+               u8 *descp = (u8 *)lrbp->ucd_rsp_ptr +
+                               GENERAL_UPIU_REQUEST_SIZE;
+               u16 resp_len;
+diff --git a/drivers/staging/erofs/erofs_fs.h 
b/drivers/staging/erofs/erofs_fs.h
+index 2f8e2bf70941..7677da889f12 100644
+--- a/drivers/staging/erofs/erofs_fs.h
++++ b/drivers/staging/erofs/erofs_fs.h
+@@ -17,10 +17,16 @@
+ #define EROFS_SUPER_MAGIC_V1    0xE0F5E1E2
+ #define EROFS_SUPER_OFFSET      1024
+ 
++/*
++ * Any bits that aren't in EROFS_ALL_REQUIREMENTS should be
++ * incompatible with this kernel version.
++ */
++#define EROFS_ALL_REQUIREMENTS  0
++
+ struct erofs_super_block {
+ /*  0 */__le32 magic;           /* in the little endian */
+ /*  4 */__le32 checksum;        /* crc32c(super_block) */
+-/*  8 */__le32 features;
++/*  8 */__le32 features;        /* (aka. feature_compat) */
+ /* 12 */__u8 blkszbits;         /* support block_size == PAGE_SIZE only */
+ /* 13 */__u8 reserved;
+ 
+@@ -34,9 +40,10 @@ struct erofs_super_block {
+ /* 44 */__le32 xattr_blkaddr;
+ /* 48 */__u8 uuid[16];          /* 128-bit uuid for volume */
+ /* 64 */__u8 volume_name[16];   /* volume name */
++/* 80 */__le32 requirements;    /* (aka. feature_incompat) */
+ 
+-/* 80 */__u8 reserved2[48];     /* 128 bytes */
+-} __packed;
++/* 84 */__u8 reserved2[44];
++} __packed;                     /* 128 bytes */
+ 
+ #define __EROFS_BIT(_prefix, _cur, _pre)      enum {  \
+       _prefix ## _cur ## _BIT = _prefix ## _pre ## _BIT + \
+diff --git a/drivers/staging/erofs/internal.h 
b/drivers/staging/erofs/internal.h
+index 58d8cbc3f921..8ce37091db20 100644
+--- a/drivers/staging/erofs/internal.h
++++ b/drivers/staging/erofs/internal.h
+@@ -111,6 +111,8 @@ struct erofs_sb_info {
+ 
+       u8 uuid[16];                    /* 128-bit uuid for volume */
+       u8 volume_name[16];             /* volume name */
++      u32 requirements;
++
+       char *dev_name;
+ 
+       unsigned int mount_opt;
+diff --git a/drivers/staging/erofs/super.c b/drivers/staging/erofs/super.c
+index b0583cdb079a..b49ebdf6ebda 100644
+--- a/drivers/staging/erofs/super.c
++++ b/drivers/staging/erofs/super.c
+@@ -75,6 +75,22 @@ static void destroy_inode(struct inode *inode)
+       call_rcu(&inode->i_rcu, i_callback);
+ }
+ 
++static bool check_layout_compatibility(struct super_block *sb,
++                                     struct erofs_super_block *layout)
++{
++      const unsigned int requirements = le32_to_cpu(layout->requirements);
++
++      EROFS_SB(sb)->requirements = requirements;
++
++      /* check if current kernel meets all mandatory requirements */
++      if (requirements & (~EROFS_ALL_REQUIREMENTS)) {
++              errln("unidentified requirements %x, please upgrade kernel 
version",
++                    requirements & ~EROFS_ALL_REQUIREMENTS);
++              return false;
++      }
++      return true;
++}
++
+ static int superblock_read(struct super_block *sb)
+ {
+       struct erofs_sb_info *sbi;
+@@ -108,6 +124,9 @@ static int superblock_read(struct super_block *sb)
+               goto out;
+       }
+ 
++      if (!check_layout_compatibility(sb, layout))
++              goto out;
++
+       sbi->blocks = le32_to_cpu(layout->blocks);
+       sbi->meta_blkaddr = le32_to_cpu(layout->meta_blkaddr);
+ #ifdef CONFIG_EROFS_FS_XATTR
+diff --git a/drivers/usb/chipidea/udc.c b/drivers/usb/chipidea/udc.c
+index 9852ec5e6e01..cc7c856126df 100644
+--- a/drivers/usb/chipidea/udc.c
++++ b/drivers/usb/chipidea/udc.c
+@@ -1621,6 +1621,25 @@ static int ci_udc_pullup(struct usb_gadget *_gadget, 
int is_on)
+ static int ci_udc_start(struct usb_gadget *gadget,
+                        struct usb_gadget_driver *driver);
+ static int ci_udc_stop(struct usb_gadget *gadget);
++
++/* Match ISOC IN from the highest endpoint */
++static struct usb_ep *ci_udc_match_ep(struct usb_gadget *gadget,
++                            struct usb_endpoint_descriptor *desc,
++                            struct usb_ss_ep_comp_descriptor *comp_desc)
++{
++      struct ci_hdrc *ci = container_of(gadget, struct ci_hdrc, gadget);
++      struct usb_ep *ep;
++
++      if (usb_endpoint_xfer_isoc(desc) && usb_endpoint_dir_in(desc)) {
++              list_for_each_entry_reverse(ep, &ci->gadget.ep_list, ep_list) {
++                      if (ep->caps.dir_in && !ep->claimed)
++                              return ep;
++              }
++      }
++
++      return NULL;
++}
++
+ /**
+  * Device operations part of the API to the USB controller hardware,
+  * which don't involve endpoints (or i/o)
+@@ -1634,6 +1653,7 @@ static const struct usb_gadget_ops usb_gadget_ops = {
+       .vbus_draw      = ci_udc_vbus_draw,
+       .udc_start      = ci_udc_start,
+       .udc_stop       = ci_udc_stop,
++      .match_ep       = ci_udc_match_ep,
+ };
+ 
+ static int init_eps(struct ci_hdrc *ci)
+diff --git a/drivers/usb/host/xhci-ring.c b/drivers/usb/host/xhci-ring.c
+index b62953ee0fc6..f896a00662ef 100644
+--- a/drivers/usb/host/xhci-ring.c
++++ b/drivers/usb/host/xhci-ring.c
+@@ -1604,8 +1604,13 @@ static void handle_port_status(struct xhci_hcd *xhci,
+               usb_hcd_resume_root_hub(hcd);
+       }
+ 
+-      if (hcd->speed >= HCD_USB3 && (portsc & PORT_PLS_MASK) == XDEV_INACTIVE)
++      if (hcd->speed >= HCD_USB3 &&
++          (portsc & PORT_PLS_MASK) == XDEV_INACTIVE) {
++              slot_id = xhci_find_slot_id_by_port(hcd, xhci, hcd_portnum + 1);
++              if (slot_id && xhci->devs[slot_id])
++                      xhci->devs[slot_id]->flags |= VDEV_PORT_ERROR;
+               bus_state->port_remote_wakeup &= ~(1 << hcd_portnum);
++      }
+ 
+       if ((portsc & PORT_PLC) && (portsc & PORT_PLS_MASK) == XDEV_RESUME) {
+               xhci_dbg(xhci, "port resume event for port %d\n", port_id);
+@@ -1793,6 +1798,14 @@ static void xhci_cleanup_halted_endpoint(struct 
xhci_hcd *xhci,
+ {
+       struct xhci_virt_ep *ep = &xhci->devs[slot_id]->eps[ep_index];
+       struct xhci_command *command;
++
++      /*
++       * Avoid resetting endpoint if link is inactive. Can cause host hang.
++       * Device will be reset soon to recover the link so don't do anything
++       */
++      if (xhci->devs[slot_id]->flags & VDEV_PORT_ERROR)
++              return;
++
+       command = xhci_alloc_command(xhci, false, GFP_ATOMIC);
+       if (!command)
+               return;
+diff --git a/drivers/usb/host/xhci.c b/drivers/usb/host/xhci.c
+index f30b065095fa..4ffadca2c71a 100644
+--- a/drivers/usb/host/xhci.c
++++ b/drivers/usb/host/xhci.c
+@@ -1441,6 +1441,10 @@ static int xhci_urb_enqueue(struct usb_hcd *hcd, struct 
urb *urb, gfp_t mem_flag
+                       xhci_dbg(xhci, "urb submitted during PCI suspend\n");
+               return -ESHUTDOWN;
+       }
++      if (xhci->devs[slot_id]->flags & VDEV_PORT_ERROR) {
++              xhci_dbg(xhci, "Can't queue urb, port error, link inactive\n");
++              return -ENODEV;
++      }
+ 
+       if (usb_endpoint_xfer_isoc(&urb->ep->desc))
+               num_tds = urb->number_of_packets;
+@@ -3724,6 +3728,7 @@ static int xhci_discover_or_reset_device(struct usb_hcd 
*hcd,
+       }
+       /* If necessary, update the number of active TTs on this root port */
+       xhci_update_tt_active_eps(xhci, virt_dev, old_active_eps);
++      virt_dev->flags = 0;
+       ret = 0;
+ 
+ command_cleanup:
+@@ -5030,16 +5035,26 @@ int xhci_gen_setup(struct usb_hcd *hcd, 
xhci_get_quirks_t get_quirks)
+       } else {
+               /*
+                * Some 3.1 hosts return sbrn 0x30, use xhci supported protocol
+-               * minor revision instead of sbrn
++               * minor revision instead of sbrn. Minor revision is a two digit
++               * BCD containing minor and sub-minor numbers, only show minor.
+                */
+-              minor_rev = xhci->usb3_rhub.min_rev;
+-              if (minor_rev) {
++              minor_rev = xhci->usb3_rhub.min_rev / 0x10;
++
++              switch (minor_rev) {
++              case 2:
++                      hcd->speed = HCD_USB32;
++                      hcd->self.root_hub->speed = USB_SPEED_SUPER_PLUS;
++                      hcd->self.root_hub->rx_lanes = 2;
++                      hcd->self.root_hub->tx_lanes = 2;
++                      break;
++              case 1:
+                       hcd->speed = HCD_USB31;
+                       hcd->self.root_hub->speed = USB_SPEED_SUPER_PLUS;
++                      break;
+               }
+-              xhci_info(xhci, "Host supports USB 3.%x %s SuperSpeed\n",
++              xhci_info(xhci, "Host supports USB 3.%x %sSuperSpeed\n",
+                         minor_rev,
+-                        minor_rev ? "Enhanced" : "");
++                        minor_rev ? "Enhanced " : "");
+ 
+               xhci->usb3_rhub.hcd = hcd;
+               /* xHCI private pointer was set in xhci_pci_probe for the second
+diff --git a/drivers/usb/host/xhci.h b/drivers/usb/host/xhci.h
+index dc00f59c8e69..761b341d27b0 100644
+--- a/drivers/usb/host/xhci.h
++++ b/drivers/usb/host/xhci.h
+@@ -1010,6 +1010,15 @@ struct xhci_virt_device {
+       u8                              real_port;
+       struct xhci_interval_bw_table   *bw_table;
+       struct xhci_tt_bw_info          *tt_info;
++      /*
++       * flags for state tracking based on events and issued commands.
++       * Software can not rely on states from output contexts because of
++       * latency between events and xHC updating output context values.
++       * See xhci 1.1 section 4.8.3 for more details
++       */
++      unsigned long                   flags;
++#define VDEV_PORT_ERROR                       BIT(0) /* Port error, link 
inactive */
++
+       /* The current max exit latency for the enabled USB3 link states. */
+       u16                             current_mel;
+       /* Used for the debugfs interfaces. */
+diff --git a/fs/btrfs/reada.c b/fs/btrfs/reada.c
+index dec14b739b10..859274e38417 100644
+--- a/fs/btrfs/reada.c
++++ b/fs/btrfs/reada.c
+@@ -745,6 +745,7 @@ static void __reada_start_machine(struct btrfs_fs_info 
*fs_info)
+       u64 total = 0;
+       int i;
+ 
++again:
+       do {
+               enqueued = 0;
+               mutex_lock(&fs_devices->device_list_mutex);
+@@ -756,6 +757,10 @@ static void __reada_start_machine(struct btrfs_fs_info 
*fs_info)
+               mutex_unlock(&fs_devices->device_list_mutex);
+               total += enqueued;
+       } while (enqueued && total < 10000);
++      if (fs_devices->seed) {
++              fs_devices = fs_devices->seed;
++              goto again;
++      }
+ 
+       if (enqueued == 0)
+               return;
+diff --git a/fs/cifs/smb2maperror.c b/fs/cifs/smb2maperror.c
+index 18814f1d67d9..3c0bad577859 100644
+--- a/fs/cifs/smb2maperror.c
++++ b/fs/cifs/smb2maperror.c
+@@ -457,7 +457,7 @@ static const struct status_to_posix_error 
smb2_error_map_table[] = {
+       {STATUS_FILE_INVALID, -EIO, "STATUS_FILE_INVALID"},
+       {STATUS_ALLOTTED_SPACE_EXCEEDED, -EIO,
+       "STATUS_ALLOTTED_SPACE_EXCEEDED"},
+-      {STATUS_INSUFFICIENT_RESOURCES, -EREMOTEIO,
++      {STATUS_INSUFFICIENT_RESOURCES, -EAGAIN,
+                               "STATUS_INSUFFICIENT_RESOURCES"},
+       {STATUS_DFS_EXIT_PATH_FOUND, -EIO, "STATUS_DFS_EXIT_PATH_FOUND"},
+       {STATUS_DEVICE_DATA_ERROR, -EIO, "STATUS_DEVICE_DATA_ERROR"},
+diff --git a/fs/overlayfs/file.c b/fs/overlayfs/file.c
+index 00338b828f76..0bd276e4ccbe 100644
+--- a/fs/overlayfs/file.c
++++ b/fs/overlayfs/file.c
+@@ -409,36 +409,16 @@ static long ovl_real_ioctl(struct file *file, unsigned 
int cmd,
+       return ret;
+ }
+ 
+-static unsigned int ovl_get_inode_flags(struct inode *inode)
+-{
+-      unsigned int flags = READ_ONCE(inode->i_flags);
+-      unsigned int ovl_iflags = 0;
+-
+-      if (flags & S_SYNC)
+-              ovl_iflags |= FS_SYNC_FL;
+-      if (flags & S_APPEND)
+-              ovl_iflags |= FS_APPEND_FL;
+-      if (flags & S_IMMUTABLE)
+-              ovl_iflags |= FS_IMMUTABLE_FL;
+-      if (flags & S_NOATIME)
+-              ovl_iflags |= FS_NOATIME_FL;
+-
+-      return ovl_iflags;
+-}
+-
+-static long ovl_ioctl_set_flags(struct file *file, unsigned long arg)
++static long ovl_ioctl_set_flags(struct file *file, unsigned int cmd,
++                              unsigned long arg, unsigned int iflags)
+ {
+       long ret;
+       struct inode *inode = file_inode(file);
+-      unsigned int flags;
+-      unsigned int old_flags;
++      unsigned int old_iflags;
+ 
+       if (!inode_owner_or_capable(inode))
+               return -EACCES;
+ 
+-      if (get_user(flags, (int __user *) arg))
+-              return -EFAULT;
+-
+       ret = mnt_want_write_file(file);
+       if (ret)
+               return ret;
+@@ -447,8 +427,8 @@ static long ovl_ioctl_set_flags(struct file *file, 
unsigned long arg)
+ 
+       /* Check the capability before cred override */
+       ret = -EPERM;
+-      old_flags = ovl_get_inode_flags(inode);
+-      if (((flags ^ old_flags) & (FS_APPEND_FL | FS_IMMUTABLE_FL)) &&
++      old_iflags = READ_ONCE(inode->i_flags);
++      if (((iflags ^ old_iflags) & (S_APPEND | S_IMMUTABLE)) &&
+           !capable(CAP_LINUX_IMMUTABLE))
+               goto unlock;
+ 
+@@ -456,7 +436,7 @@ static long ovl_ioctl_set_flags(struct file *file, 
unsigned long arg)
+       if (ret)
+               goto unlock;
+ 
+-      ret = ovl_real_ioctl(file, FS_IOC_SETFLAGS, arg);
++      ret = ovl_real_ioctl(file, cmd, arg);
+ 
+       ovl_copyflags(ovl_inode_real(inode), inode);
+ unlock:
+@@ -468,17 +448,79 @@ unlock:
+ 
+ }
+ 
++static unsigned int ovl_fsflags_to_iflags(unsigned int flags)
++{
++      unsigned int iflags = 0;
++
++      if (flags & FS_SYNC_FL)
++              iflags |= S_SYNC;
++      if (flags & FS_APPEND_FL)
++              iflags |= S_APPEND;
++      if (flags & FS_IMMUTABLE_FL)
++              iflags |= S_IMMUTABLE;
++      if (flags & FS_NOATIME_FL)
++              iflags |= S_NOATIME;
++
++      return iflags;
++}
++
++static long ovl_ioctl_set_fsflags(struct file *file, unsigned int cmd,
++                                unsigned long arg)
++{
++      unsigned int flags;
++
++      if (get_user(flags, (int __user *) arg))
++              return -EFAULT;
++
++      return ovl_ioctl_set_flags(file, cmd, arg,
++                                 ovl_fsflags_to_iflags(flags));
++}
++
++static unsigned int ovl_fsxflags_to_iflags(unsigned int xflags)
++{
++      unsigned int iflags = 0;
++
++      if (xflags & FS_XFLAG_SYNC)
++              iflags |= S_SYNC;
++      if (xflags & FS_XFLAG_APPEND)
++              iflags |= S_APPEND;
++      if (xflags & FS_XFLAG_IMMUTABLE)
++              iflags |= S_IMMUTABLE;
++      if (xflags & FS_XFLAG_NOATIME)
++              iflags |= S_NOATIME;
++
++      return iflags;
++}
++
++static long ovl_ioctl_set_fsxflags(struct file *file, unsigned int cmd,
++                                 unsigned long arg)
++{
++      struct fsxattr fa;
++
++      memset(&fa, 0, sizeof(fa));
++      if (copy_from_user(&fa, (void __user *) arg, sizeof(fa)))
++              return -EFAULT;
++
++      return ovl_ioctl_set_flags(file, cmd, arg,
++                                 ovl_fsxflags_to_iflags(fa.fsx_xflags));
++}
++
+ static long ovl_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
+ {
+       long ret;
+ 
+       switch (cmd) {
+       case FS_IOC_GETFLAGS:
++      case FS_IOC_FSGETXATTR:
+               ret = ovl_real_ioctl(file, cmd, arg);
+               break;
+ 
+       case FS_IOC_SETFLAGS:
+-              ret = ovl_ioctl_set_flags(file, arg);
++              ret = ovl_ioctl_set_fsflags(file, cmd, arg);
++              break;
++
++      case FS_IOC_FSSETXATTR:
++              ret = ovl_ioctl_set_fsxflags(file, cmd, arg);
+               break;
+ 
+       default:
+diff --git a/fs/overlayfs/inode.c b/fs/overlayfs/inode.c
+index b48273e846ad..f0389849fd80 100644
+--- a/fs/overlayfs/inode.c
++++ b/fs/overlayfs/inode.c
+@@ -553,15 +553,15 @@ static void ovl_fill_inode(struct inode *inode, umode_t 
mode, dev_t rdev,
+       int xinobits = ovl_xino_bits(inode->i_sb);
+ 
+       /*
+-       * When NFS export is enabled and d_ino is consistent with st_ino
+-       * (samefs or i_ino has enough bits to encode layer), set the same
+-       * value used for d_ino to i_ino, because nfsd readdirplus compares
+-       * d_ino values to i_ino values of child entries. When called from
++       * When d_ino is consistent with st_ino (samefs or i_ino has enough
++       * bits to encode layer), set the same value used for st_ino to i_ino,
++       * so inode number exposed via /proc/locks and a like will be
++       * consistent with d_ino and st_ino values. An i_ino value inconsistent
++       * with d_ino also causes nfsd readdirplus to fail.  When called from
+        * ovl_new_inode(), ino arg is 0, so i_ino will be updated to real
+        * upper inode i_ino on ovl_inode_init() or ovl_inode_update().
+        */
+-      if (inode->i_sb->s_export_op &&
+-          (ovl_same_sb(inode->i_sb) || xinobits)) {
++      if (ovl_same_sb(inode->i_sb) || xinobits) {
+               inode->i_ino = ino;
+               if (xinobits && fsid && !(ino >> (64 - xinobits)))
+                       inode->i_ino |= (unsigned long)fsid << (64 - xinobits);
+@@ -777,6 +777,54 @@ struct inode *ovl_lookup_inode(struct super_block *sb, 
struct dentry *real,
+       return inode;
+ }
+ 
++bool ovl_lookup_trap_inode(struct super_block *sb, struct dentry *dir)
++{
++      struct inode *key = d_inode(dir);
++      struct inode *trap;
++      bool res;
++
++      trap = ilookup5(sb, (unsigned long) key, ovl_inode_test, key);
++      if (!trap)
++              return false;
++
++      res = IS_DEADDIR(trap) && !ovl_inode_upper(trap) &&
++                                !ovl_inode_lower(trap);
++
++      iput(trap);
++      return res;
++}
++
++/*
++ * Create an inode cache entry for layer root dir, that will intentionally
++ * fail ovl_verify_inode(), so any lookup that will find some layer root
++ * will fail.
++ */
++struct inode *ovl_get_trap_inode(struct super_block *sb, struct dentry *dir)
++{
++      struct inode *key = d_inode(dir);
++      struct inode *trap;
++
++      if (!d_is_dir(dir))
++              return ERR_PTR(-ENOTDIR);
++
++      trap = iget5_locked(sb, (unsigned long) key, ovl_inode_test,
++                          ovl_inode_set, key);
++      if (!trap)
++              return ERR_PTR(-ENOMEM);
++
++      if (!(trap->i_state & I_NEW)) {
++              /* Conflicting layer roots? */
++              iput(trap);
++              return ERR_PTR(-ELOOP);
++      }
++
++      trap->i_mode = S_IFDIR;
++      trap->i_flags = S_DEAD;
++      unlock_new_inode(trap);
++
++      return trap;
++}
++
+ /*
+  * Does overlay inode need to be hashed by lower inode?
+  */
+diff --git a/fs/overlayfs/namei.c b/fs/overlayfs/namei.c
+index efd372312ef1..badf039267a2 100644
+--- a/fs/overlayfs/namei.c
++++ b/fs/overlayfs/namei.c
+@@ -18,6 +18,7 @@
+ #include "overlayfs.h"
+ 
+ struct ovl_lookup_data {
++      struct super_block *sb;
+       struct qstr name;
+       bool is_dir;
+       bool opaque;
+@@ -244,6 +245,12 @@ static int ovl_lookup_single(struct dentry *base, struct 
ovl_lookup_data *d,
+               if (!d->metacopy || d->last)
+                       goto out;
+       } else {
++              if (ovl_lookup_trap_inode(d->sb, this)) {
++                      /* Caught in a trap of overlapping layers */
++                      err = -ELOOP;
++                      goto out_err;
++              }
++
+               if (last_element)
+                       d->is_dir = true;
+               if (d->last)
+@@ -819,6 +826,7 @@ struct dentry *ovl_lookup(struct inode *dir, struct dentry 
*dentry,
+       int err;
+       bool metacopy = false;
+       struct ovl_lookup_data d = {
++              .sb = dentry->d_sb,
+               .name = dentry->d_name,
+               .is_dir = false,
+               .opaque = false,
+diff --git a/fs/overlayfs/overlayfs.h b/fs/overlayfs/overlayfs.h
+index 80fb66426760..265bf9cfde08 100644
+--- a/fs/overlayfs/overlayfs.h
++++ b/fs/overlayfs/overlayfs.h
+@@ -270,6 +270,7 @@ void ovl_clear_flag(unsigned long flag, struct inode 
*inode);
+ bool ovl_test_flag(unsigned long flag, struct inode *inode);
+ bool ovl_inuse_trylock(struct dentry *dentry);
+ void ovl_inuse_unlock(struct dentry *dentry);
++bool ovl_is_inuse(struct dentry *dentry);
+ bool ovl_need_index(struct dentry *dentry);
+ int ovl_nlink_start(struct dentry *dentry, bool *locked);
+ void ovl_nlink_end(struct dentry *dentry, bool locked);
+@@ -366,6 +367,8 @@ struct ovl_inode_params {
+ struct inode *ovl_new_inode(struct super_block *sb, umode_t mode, dev_t rdev);
+ struct inode *ovl_lookup_inode(struct super_block *sb, struct dentry *real,
+                              bool is_upper);
++bool ovl_lookup_trap_inode(struct super_block *sb, struct dentry *dir);
++struct inode *ovl_get_trap_inode(struct super_block *sb, struct dentry *dir);
+ struct inode *ovl_get_inode(struct super_block *sb,
+                           struct ovl_inode_params *oip);
+ static inline void ovl_copyattr(struct inode *from, struct inode *to)
+diff --git a/fs/overlayfs/ovl_entry.h b/fs/overlayfs/ovl_entry.h
+index ec237035333a..6ed1ace8f8b3 100644
+--- a/fs/overlayfs/ovl_entry.h
++++ b/fs/overlayfs/ovl_entry.h
+@@ -29,6 +29,8 @@ struct ovl_sb {
+ 
+ struct ovl_layer {
+       struct vfsmount *mnt;
++      /* Trap in ovl inode cache */
++      struct inode *trap;
+       struct ovl_sb *fs;
+       /* Index of this layer in fs root (upper idx == 0) */
+       int idx;
+@@ -65,6 +67,10 @@ struct ovl_fs {
+       /* Did we take the inuse lock? */
+       bool upperdir_locked;
+       bool workdir_locked;
++      /* Traps in ovl inode cache */
++      struct inode *upperdir_trap;
++      struct inode *workdir_trap;
++      struct inode *indexdir_trap;
+       /* Inode numbers in all layers do not use the high xino_bits */
+       unsigned int xino_bits;
+ };
+diff --git a/fs/overlayfs/super.c b/fs/overlayfs/super.c
+index 0fb0a59a5e5c..2d028c02621f 100644
+--- a/fs/overlayfs/super.c
++++ b/fs/overlayfs/super.c
+@@ -217,6 +217,9 @@ static void ovl_free_fs(struct ovl_fs *ofs)
+ {
+       unsigned i;
+ 
++      iput(ofs->indexdir_trap);
++      iput(ofs->workdir_trap);
++      iput(ofs->upperdir_trap);
+       dput(ofs->indexdir);
+       dput(ofs->workdir);
+       if (ofs->workdir_locked)
+@@ -225,8 +228,10 @@ static void ovl_free_fs(struct ovl_fs *ofs)
+       if (ofs->upperdir_locked)
+               ovl_inuse_unlock(ofs->upper_mnt->mnt_root);
+       mntput(ofs->upper_mnt);
+-      for (i = 0; i < ofs->numlower; i++)
++      for (i = 0; i < ofs->numlower; i++) {
++              iput(ofs->lower_layers[i].trap);
+               mntput(ofs->lower_layers[i].mnt);
++      }
+       for (i = 0; i < ofs->numlowerfs; i++)
+               free_anon_bdev(ofs->lower_fs[i].pseudo_dev);
+       kfree(ofs->lower_layers);
+@@ -984,7 +989,26 @@ static const struct xattr_handler *ovl_xattr_handlers[] = 
{
+       NULL
+ };
+ 
+-static int ovl_get_upper(struct ovl_fs *ofs, struct path *upperpath)
++static int ovl_setup_trap(struct super_block *sb, struct dentry *dir,
++                        struct inode **ptrap, const char *name)
++{
++      struct inode *trap;
++      int err;
++
++      trap = ovl_get_trap_inode(sb, dir);
++      err = PTR_ERR_OR_ZERO(trap);
++      if (err) {
++              if (err == -ELOOP)
++                      pr_err("overlayfs: conflicting %s path\n", name);
++              return err;
++      }
++
++      *ptrap = trap;
++      return 0;
++}
++
++static int ovl_get_upper(struct super_block *sb, struct ovl_fs *ofs,
++                       struct path *upperpath)
+ {
+       struct vfsmount *upper_mnt;
+       int err;
+@@ -1004,6 +1028,11 @@ static int ovl_get_upper(struct ovl_fs *ofs, struct 
path *upperpath)
+       if (err)
+               goto out;
+ 
++      err = ovl_setup_trap(sb, upperpath->dentry, &ofs->upperdir_trap,
++                           "upperdir");
++      if (err)
++              goto out;
++
+       upper_mnt = clone_private_mount(upperpath);
+       err = PTR_ERR(upper_mnt);
+       if (IS_ERR(upper_mnt)) {
+@@ -1030,7 +1059,8 @@ out:
+       return err;
+ }
+ 
+-static int ovl_make_workdir(struct ovl_fs *ofs, struct path *workpath)
++static int ovl_make_workdir(struct super_block *sb, struct ovl_fs *ofs,
++                          struct path *workpath)
+ {
+       struct vfsmount *mnt = ofs->upper_mnt;
+       struct dentry *temp;
+@@ -1045,6 +1075,10 @@ static int ovl_make_workdir(struct ovl_fs *ofs, struct 
path *workpath)
+       if (!ofs->workdir)
+               goto out;
+ 
++      err = ovl_setup_trap(sb, ofs->workdir, &ofs->workdir_trap, "workdir");
++      if (err)
++              goto out;
++
+       /*
+        * Upper should support d_type, else whiteouts are visible.  Given
+        * workdir and upper are on same fs, we can do iterate_dir() on
+@@ -1105,7 +1139,8 @@ out:
+       return err;
+ }
+ 
+-static int ovl_get_workdir(struct ovl_fs *ofs, struct path *upperpath)
++static int ovl_get_workdir(struct super_block *sb, struct ovl_fs *ofs,
++                         struct path *upperpath)
+ {
+       int err;
+       struct path workpath = { };
+@@ -1136,19 +1171,16 @@ static int ovl_get_workdir(struct ovl_fs *ofs, struct 
path *upperpath)
+               pr_warn("overlayfs: workdir is in-use by another mount, 
accessing files from both mounts will result in undefined behavior.\n");
+       }
+ 
+-      err = ovl_make_workdir(ofs, &workpath);
+-      if (err)
+-              goto out;
++      err = ovl_make_workdir(sb, ofs, &workpath);
+ 
+-      err = 0;
+ out:
+       path_put(&workpath);
+ 
+       return err;
+ }
+ 
+-static int ovl_get_indexdir(struct ovl_fs *ofs, struct ovl_entry *oe,
+-                          struct path *upperpath)
++static int ovl_get_indexdir(struct super_block *sb, struct ovl_fs *ofs,
++                          struct ovl_entry *oe, struct path *upperpath)
+ {
+       struct vfsmount *mnt = ofs->upper_mnt;
+       int err;
+@@ -1167,6 +1199,11 @@ static int ovl_get_indexdir(struct ovl_fs *ofs, struct 
ovl_entry *oe,
+ 
+       ofs->indexdir = ovl_workdir_create(ofs, OVL_INDEXDIR_NAME, true);
+       if (ofs->indexdir) {
++              err = ovl_setup_trap(sb, ofs->indexdir, &ofs->indexdir_trap,
++                                   "indexdir");
++              if (err)
++                      goto out;
++
+               /*
+                * Verify upper root is exclusively associated with index dir.
+                * Older kernels stored upper fh in "trusted.overlay.origin"
+@@ -1226,8 +1263,8 @@ static int ovl_get_fsid(struct ovl_fs *ofs, struct 
super_block *sb)
+       return ofs->numlowerfs;
+ }
+ 
+-static int ovl_get_lower_layers(struct ovl_fs *ofs, struct path *stack,
+-                              unsigned int numlower)
++static int ovl_get_lower_layers(struct super_block *sb, struct ovl_fs *ofs,
++                              struct path *stack, unsigned int numlower)
+ {
+       int err;
+       unsigned int i;
+@@ -1245,16 +1282,28 @@ static int ovl_get_lower_layers(struct ovl_fs *ofs, 
struct path *stack,
+ 
+       for (i = 0; i < numlower; i++) {
+               struct vfsmount *mnt;
++              struct inode *trap;
+               int fsid;
+ 
+               err = fsid = ovl_get_fsid(ofs, stack[i].mnt->mnt_sb);
+               if (err < 0)
+                       goto out;
+ 
++              err = -EBUSY;
++              if (ovl_is_inuse(stack[i].dentry)) {
++                      pr_err("overlayfs: lowerdir is in-use as 
upperdir/workdir\n");
++                      goto out;
++              }
++
++              err = ovl_setup_trap(sb, stack[i].dentry, &trap, "lowerdir");
++              if (err)
++                      goto out;
++
+               mnt = clone_private_mount(&stack[i]);
+               err = PTR_ERR(mnt);
+               if (IS_ERR(mnt)) {
+                       pr_err("overlayfs: failed to clone lowerpath\n");
++                      iput(trap);
+                       goto out;
+               }
+ 
+@@ -1264,6 +1313,7 @@ static int ovl_get_lower_layers(struct ovl_fs *ofs, 
struct path *stack,
+                */
+               mnt->mnt_flags |= MNT_READONLY | MNT_NOATIME;
+ 
++              ofs->lower_layers[ofs->numlower].trap = trap;
+               ofs->lower_layers[ofs->numlower].mnt = mnt;
+               ofs->lower_layers[ofs->numlower].idx = i + 1;
+               ofs->lower_layers[ofs->numlower].fsid = fsid;
+@@ -1358,7 +1408,7 @@ static struct ovl_entry *ovl_get_lowerstack(struct 
super_block *sb,
+               goto out_err;
+       }
+ 
+-      err = ovl_get_lower_layers(ofs, stack, numlower);
++      err = ovl_get_lower_layers(sb, ofs, stack, numlower);
+       if (err)
+               goto out_err;
+ 
+@@ -1390,6 +1440,77 @@ out_err:
+       goto out;
+ }
+ 
++/*
++ * Check if this layer root is a descendant of:
++ * - another layer of this overlayfs instance
++ * - upper/work dir of any overlayfs instance
++ */
++static int ovl_check_layer(struct super_block *sb, struct dentry *dentry,
++                         const char *name)
++{
++      struct dentry *next = dentry, *parent;
++      int err = 0;
++
++      if (!dentry)
++              return 0;
++
++      parent = dget_parent(next);
++
++      /* Walk back ancestors to root (inclusive) looking for traps */
++      while (!err && parent != next) {
++              if (ovl_is_inuse(parent)) {
++                      err = -EBUSY;
++                      pr_err("overlayfs: %s path overlapping in-use 
upperdir/workdir\n",
++                             name);
++              } else if (ovl_lookup_trap_inode(sb, parent)) {
++                      err = -ELOOP;
++                      pr_err("overlayfs: overlapping %s path\n", name);
++              }
++              next = parent;
++              parent = dget_parent(next);
++              dput(next);
++      }
++
++      dput(parent);
++
++      return err;
++}
++
++/*
++ * Check if any of the layers or work dirs overlap.
++ */
++static int ovl_check_overlapping_layers(struct super_block *sb,
++                                      struct ovl_fs *ofs)
++{
++      int i, err;
++
++      if (ofs->upper_mnt) {
++              err = ovl_check_layer(sb, ofs->upper_mnt->mnt_root, "upperdir");
++              if (err)
++                      return err;
++
++              /*
++               * Checking workbasedir avoids hitting ovl_is_inuse(parent) of
++               * this instance and covers overlapping work and index dirs,
++               * unless work or index dir have been moved since created inside
++               * workbasedir.  In that case, we already have their traps in
++               * inode cache and we will catch that case on lookup.
++               */
++              err = ovl_check_layer(sb, ofs->workbasedir, "workdir");
++              if (err)
++                      return err;
++      }
++
++      for (i = 0; i < ofs->numlower; i++) {
++              err = ovl_check_layer(sb, ofs->lower_layers[i].mnt->mnt_root,
++                                    "lowerdir");
++              if (err)
++                      return err;
++      }
++
++      return 0;
++}
++
+ static int ovl_fill_super(struct super_block *sb, void *data, int silent)
+ {
+       struct path upperpath = { };
+@@ -1429,17 +1550,20 @@ static int ovl_fill_super(struct super_block *sb, void 
*data, int silent)
+       if (ofs->config.xino != OVL_XINO_OFF)
+               ofs->xino_bits = BITS_PER_LONG - 32;
+ 
++      /* alloc/destroy_inode needed for setting up traps in inode cache */
++      sb->s_op = &ovl_super_operations;
++
+       if (ofs->config.upperdir) {
+               if (!ofs->config.workdir) {
+                       pr_err("overlayfs: missing 'workdir'\n");
+                       goto out_err;
+               }
+ 
+-              err = ovl_get_upper(ofs, &upperpath);
++              err = ovl_get_upper(sb, ofs, &upperpath);
+               if (err)
+                       goto out_err;
+ 
+-              err = ovl_get_workdir(ofs, &upperpath);
++              err = ovl_get_workdir(sb, ofs, &upperpath);
+               if (err)
+                       goto out_err;
+ 
+@@ -1460,7 +1584,7 @@ static int ovl_fill_super(struct super_block *sb, void 
*data, int silent)
+               sb->s_flags |= SB_RDONLY;
+ 
+       if (!(ovl_force_readonly(ofs)) && ofs->config.index) {
+-              err = ovl_get_indexdir(ofs, oe, &upperpath);
++              err = ovl_get_indexdir(sb, ofs, oe, &upperpath);
+               if (err)
+                       goto out_free_oe;
+ 
+@@ -1473,6 +1597,10 @@ static int ovl_fill_super(struct super_block *sb, void 
*data, int silent)
+ 
+       }
+ 
++      err = ovl_check_overlapping_layers(sb, ofs);
++      if (err)
++              goto out_free_oe;
++
+       /* Show index=off in /proc/mounts for forced r/o mount */
+       if (!ofs->indexdir) {
+               ofs->config.index = false;
+@@ -1494,7 +1622,6 @@ static int ovl_fill_super(struct super_block *sb, void 
*data, int silent)
+       cap_lower(cred->cap_effective, CAP_SYS_RESOURCE);
+ 
+       sb->s_magic = OVERLAYFS_SUPER_MAGIC;
+-      sb->s_op = &ovl_super_operations;
+       sb->s_xattr = ovl_xattr_handlers;
+       sb->s_fs_info = ofs;
+       sb->s_flags |= SB_POSIXACL;
+diff --git a/fs/overlayfs/util.c b/fs/overlayfs/util.c
+index c9a2e3c6d537..db8bdb29b320 100644
+--- a/fs/overlayfs/util.c
++++ b/fs/overlayfs/util.c
+@@ -653,6 +653,18 @@ void ovl_inuse_unlock(struct dentry *dentry)
+       }
+ }
+ 
++bool ovl_is_inuse(struct dentry *dentry)
++{
++      struct inode *inode = d_inode(dentry);
++      bool inuse;
++
++      spin_lock(&inode->i_lock);
++      inuse = (inode->i_state & I_OVL_INUSE);
++      spin_unlock(&inode->i_lock);
++
++      return inuse;
++}
++
+ /*
+  * Does this overlay dentry need to be indexed on copy up?
+  */
+diff --git a/include/linux/mmc/host.h b/include/linux/mmc/host.h
+index beed7121c781..2ff52de1c2b8 100644
+--- a/include/linux/mmc/host.h
++++ b/include/linux/mmc/host.h
+@@ -395,6 +395,7 @@ struct mmc_host {
+       unsigned int            retune_now:1;   /* do re-tuning at next req */
+       unsigned int            retune_paused:1; /* re-tuning is temporarily 
disabled */
+       unsigned int            use_blk_mq:1;   /* use blk-mq */
++      unsigned int            retune_crc_disable:1; /* don't trigger retune 
upon crc */
+ 
+       int                     rescan_disable; /* disable card detection */
+       int                     rescan_entered; /* used with nonremovable 
devices */
+diff --git a/include/linux/mmc/sdio_func.h b/include/linux/mmc/sdio_func.h
+index 97ca105347a6..6905f3f641cc 100644
+--- a/include/linux/mmc/sdio_func.h
++++ b/include/linux/mmc/sdio_func.h
+@@ -159,4 +159,10 @@ extern void sdio_f0_writeb(struct sdio_func *func, 
unsigned char b,
+ extern mmc_pm_flag_t sdio_get_host_pm_caps(struct sdio_func *func);
+ extern int sdio_set_host_pm_flags(struct sdio_func *func, mmc_pm_flag_t 
flags);
+ 
++extern void sdio_retune_crc_disable(struct sdio_func *func);
++extern void sdio_retune_crc_enable(struct sdio_func *func);
++
++extern void sdio_retune_hold_now(struct sdio_func *func);
++extern void sdio_retune_release(struct sdio_func *func);
++
+ #endif /* LINUX_MMC_SDIO_FUNC_H */
+diff --git a/include/net/bluetooth/hci_core.h 
b/include/net/bluetooth/hci_core.h
+index 1dfb75057580..cc2d0c3b475b 100644
+--- a/include/net/bluetooth/hci_core.h
++++ b/include/net/bluetooth/hci_core.h
+@@ -182,6 +182,9 @@ struct adv_info {
+ 
+ #define HCI_MAX_SHORT_NAME_LENGTH     10
+ 
++/* Min encryption key size to match with SMP */
++#define HCI_MIN_ENC_KEY_SIZE          7
++
+ /* Default LE RPA expiry time, 15 minutes */
+ #define HCI_DEFAULT_RPA_TIMEOUT               (15 * 60)
+ 
+diff --git a/include/net/cfg80211.h b/include/net/cfg80211.h
+index 4de121e24ce5..67e0a990144a 100644
+--- a/include/net/cfg80211.h
++++ b/include/net/cfg80211.h
+@@ -3448,7 +3448,8 @@ struct cfg80211_ops {
+  *    on wiphy_new(), but can be changed by the driver if it has a good
+  *    reason to override the default
+  * @WIPHY_FLAG_4ADDR_AP: supports 4addr mode even on AP (with a single station
+- *    on a VLAN interface)
++ *    on a VLAN interface). This flag also serves an extra purpose of
++ *    supporting 4ADDR AP mode on devices which do not support AP/VLAN iftype.
+  * @WIPHY_FLAG_4ADDR_STATION: supports 4addr mode even as a station
+  * @WIPHY_FLAG_CONTROL_PORT_PROTOCOL: This device supports setting the
+  *    control port protocol ethertype. The device also honours the
+diff --git a/kernel/trace/trace.c b/kernel/trace/trace.c
+index 1bd7a758583b..181dba75a203 100644
+--- a/kernel/trace/trace.c
++++ b/kernel/trace/trace.c
+@@ -8351,12 +8351,8 @@ void ftrace_dump(enum ftrace_dump_mode oops_dump_mode)
+ 
+               cnt++;
+ 
+-              /* reset all but tr, trace, and overruns */
+-              memset(&iter.seq, 0,
+-                     sizeof(struct trace_iterator) -
+-                     offsetof(struct trace_iterator, seq));
++              trace_iterator_reset(&iter);
+               iter.iter_flags |= TRACE_FILE_LAT_FMT;
+-              iter.pos = -1;
+ 
+               if (trace_find_next_entry_inc(&iter) != NULL) {
+                       int ret;
+diff --git a/kernel/trace/trace.h b/kernel/trace/trace.h
+index 447bd96ee658..d11d7bfc3fa5 100644
+--- a/kernel/trace/trace.h
++++ b/kernel/trace/trace.h
+@@ -1895,4 +1895,22 @@ static inline void tracer_hardirqs_off(unsigned long 
a0, unsigned long a1) { }
+ 
+ extern struct trace_iterator *tracepoint_print_iter;
+ 
++/*
++ * Reset the state of the trace_iterator so that it can read consumed data.
++ * Normally, the trace_iterator is used for reading the data when it is not
++ * consumed, and must retain state.
++ */
++static __always_inline void trace_iterator_reset(struct trace_iterator *iter)
++{
++      const size_t offset = offsetof(struct trace_iterator, seq);
++
++      /*
++       * Keep gcc from complaining about overwriting more than just one
++       * member in the structure.
++       */
++      memset((char *)iter + offset, 0, sizeof(struct trace_iterator) - 
offset);
++
++      iter->pos = -1;
++}
++
+ #endif /* _LINUX_KERNEL_TRACE_H */
+diff --git a/kernel/trace/trace_kdb.c b/kernel/trace/trace_kdb.c
+index 810d78a8d14c..2905a3dd94c1 100644
+--- a/kernel/trace/trace_kdb.c
++++ b/kernel/trace/trace_kdb.c
+@@ -41,12 +41,8 @@ static void ftrace_dump_buf(int skip_lines, long cpu_file)
+ 
+       kdb_printf("Dumping ftrace buffer:\n");
+ 
+-      /* reset all but tr, trace, and overruns */
+-      memset(&iter.seq, 0,
+-                 sizeof(struct trace_iterator) -
+-                 offsetof(struct trace_iterator, seq));
++      trace_iterator_reset(&iter);
+       iter.iter_flags |= TRACE_FILE_LAT_FMT;
+-      iter.pos = -1;
+ 
+       if (cpu_file == RING_BUFFER_ALL_CPUS) {
+               for_each_tracing_cpu(cpu) {
+diff --git a/net/bluetooth/hci_conn.c b/net/bluetooth/hci_conn.c
+index bd4978ce8c45..15d1cb5aee18 100644
+--- a/net/bluetooth/hci_conn.c
++++ b/net/bluetooth/hci_conn.c
+@@ -1392,8 +1392,16 @@ auth:
+               return 0;
+ 
+ encrypt:
+-      if (test_bit(HCI_CONN_ENCRYPT, &conn->flags))
++      if (test_bit(HCI_CONN_ENCRYPT, &conn->flags)) {
++              /* Ensure that the encryption key size has been read,
++               * otherwise stall the upper layer responses.
++               */
++              if (!conn->enc_key_size)
++                      return 0;
++
++              /* Nothing else needed, all requirements are met */
+               return 1;
++      }
+ 
+       hci_conn_encrypt(conn);
+       return 0;
+diff --git a/net/bluetooth/l2cap_core.c b/net/bluetooth/l2cap_core.c
+index 2c6eabf294b3..69e3be51a2c3 100644
+--- a/net/bluetooth/l2cap_core.c
++++ b/net/bluetooth/l2cap_core.c
+@@ -1340,6 +1340,21 @@ static void l2cap_request_info(struct l2cap_conn *conn)
+                      sizeof(req), &req);
+ }
+ 
++static bool l2cap_check_enc_key_size(struct hci_conn *hcon)
++{
++      /* The minimum encryption key size needs to be enforced by the
++       * host stack before establishing any L2CAP connections. The
++       * specification in theory allows a minimum of 1, but to align
++       * BR/EDR and LE transports, a minimum of 7 is chosen.
++       *
++       * This check might also be called for unencrypted connections
++       * that have no key size requirements. Ensure that the link is
++       * actually encrypted before enforcing a key size.
++       */
++      return (!test_bit(HCI_CONN_ENCRYPT, &hcon->flags) ||
++              hcon->enc_key_size > HCI_MIN_ENC_KEY_SIZE);
++}
++
+ static void l2cap_do_start(struct l2cap_chan *chan)
+ {
+       struct l2cap_conn *conn = chan->conn;
+@@ -1357,9 +1372,14 @@ static void l2cap_do_start(struct l2cap_chan *chan)
+       if (!(conn->info_state & L2CAP_INFO_FEAT_MASK_REQ_DONE))
+               return;
+ 
+-      if (l2cap_chan_check_security(chan, true) &&
+-          __l2cap_no_conn_pending(chan))
++      if (!l2cap_chan_check_security(chan, true) ||
++          !__l2cap_no_conn_pending(chan))
++              return;
++
++      if (l2cap_check_enc_key_size(conn->hcon))
+               l2cap_start_connection(chan);
++      else
++              __set_chan_timer(chan, L2CAP_DISC_TIMEOUT);
+ }
+ 
+ static inline int l2cap_mode_supported(__u8 mode, __u32 feat_mask)
+@@ -1438,7 +1458,10 @@ static void l2cap_conn_start(struct l2cap_conn *conn)
+                               continue;
+                       }
+ 
+-                      l2cap_start_connection(chan);
++                      if (l2cap_check_enc_key_size(conn->hcon))
++                              l2cap_start_connection(chan);
++                      else
++                              l2cap_chan_close(chan, ECONNREFUSED);
+ 
+               } else if (chan->state == BT_CONNECT2) {
+                       struct l2cap_conn_rsp rsp;
+@@ -7455,7 +7478,7 @@ static void l2cap_security_cfm(struct hci_conn *hcon, u8 
status, u8 encrypt)
+               }
+ 
+               if (chan->state == BT_CONNECT) {
+-                      if (!status)
++                      if (!status && l2cap_check_enc_key_size(hcon))
+                               l2cap_start_connection(chan);
+                       else
+                               __set_chan_timer(chan, L2CAP_DISC_TIMEOUT);
+@@ -7464,7 +7487,7 @@ static void l2cap_security_cfm(struct hci_conn *hcon, u8 
status, u8 encrypt)
+                       struct l2cap_conn_rsp rsp;
+                       __u16 res, stat;
+ 
+-                      if (!status) {
++                      if (!status && l2cap_check_enc_key_size(hcon)) {
+                               if (test_bit(FLAG_DEFER_SETUP, &chan->flags)) {
+                                       res = L2CAP_CR_PEND;
+                                       stat = L2CAP_CS_AUTHOR_PEND;
+diff --git a/net/can/af_can.c b/net/can/af_can.c
+index 1684ba5b51eb..e386d654116d 100644
+--- a/net/can/af_can.c
++++ b/net/can/af_can.c
+@@ -105,6 +105,7 @@ EXPORT_SYMBOL(can_ioctl);
+ static void can_sock_destruct(struct sock *sk)
+ {
+       skb_queue_purge(&sk->sk_receive_queue);
++      skb_queue_purge(&sk->sk_error_queue);
+ }
+ 
+ static const struct can_proto *can_get_proto(int protocol)
+diff --git a/net/mac80211/ieee80211_i.h b/net/mac80211/ieee80211_i.h
+index 172aeae21ae9..35c6dfa13fa8 100644
+--- a/net/mac80211/ieee80211_i.h
++++ b/net/mac80211/ieee80211_i.h
+@@ -2183,6 +2183,9 @@ void ieee80211_tdls_cancel_channel_switch(struct wiphy 
*wiphy,
+                                         const u8 *addr);
+ void ieee80211_teardown_tdls_peers(struct ieee80211_sub_if_data *sdata);
+ void ieee80211_tdls_chsw_work(struct work_struct *wk);
++void ieee80211_tdls_handle_disconnect(struct ieee80211_sub_if_data *sdata,
++                                    const u8 *peer, u16 reason);
++const char *ieee80211_get_reason_code_string(u16 reason_code);
+ 
+ extern const struct ethtool_ops ieee80211_ethtool_ops;
+ 
+diff --git a/net/mac80211/mlme.c b/net/mac80211/mlme.c
+index 2ac749c4a6b2..1aaa73fa308e 100644
+--- a/net/mac80211/mlme.c
++++ b/net/mac80211/mlme.c
+@@ -2868,7 +2868,7 @@ static void ieee80211_rx_mgmt_auth(struct 
ieee80211_sub_if_data *sdata,
+ #define case_WLAN(type) \
+       case WLAN_REASON_##type: return #type
+ 
+-static const char *ieee80211_get_reason_code_string(u16 reason_code)
++const char *ieee80211_get_reason_code_string(u16 reason_code)
+ {
+       switch (reason_code) {
+       case_WLAN(UNSPECIFIED);
+@@ -2933,6 +2933,11 @@ static void ieee80211_rx_mgmt_deauth(struct 
ieee80211_sub_if_data *sdata,
+       if (len < 24 + 2)
+               return;
+ 
++      if (!ether_addr_equal(mgmt->bssid, mgmt->sa)) {
++              ieee80211_tdls_handle_disconnect(sdata, mgmt->sa, reason_code);
++              return;
++      }
++
+       if (ifmgd->associated &&
+           ether_addr_equal(mgmt->bssid, ifmgd->associated->bssid)) {
+               const u8 *bssid = ifmgd->associated->bssid;
+@@ -2982,6 +2987,11 @@ static void ieee80211_rx_mgmt_disassoc(struct 
ieee80211_sub_if_data *sdata,
+ 
+       reason_code = le16_to_cpu(mgmt->u.disassoc.reason_code);
+ 
++      if (!ether_addr_equal(mgmt->bssid, mgmt->sa)) {
++              ieee80211_tdls_handle_disconnect(sdata, mgmt->sa, reason_code);
++              return;
++      }
++
+       sdata_info(sdata, "disassociated from %pM (Reason: %u=%s)\n",
+                  mgmt->sa, reason_code,
+                  ieee80211_get_reason_code_string(reason_code));
+diff --git a/net/mac80211/rx.c b/net/mac80211/rx.c
+index e946ee4f335b..7523d995ea8a 100644
+--- a/net/mac80211/rx.c
++++ b/net/mac80211/rx.c
+@@ -3752,6 +3752,8 @@ static bool ieee80211_accept_frame(struct 
ieee80211_rx_data *rx)
+       case NL80211_IFTYPE_STATION:
+               if (!bssid && !sdata->u.mgd.use_4addr)
+                       return false;
++              if (ieee80211_is_robust_mgmt_frame(skb) && !rx->sta)
++                      return false;
+               if (multicast)
+                       return true;
+               return ether_addr_equal(sdata->vif.addr, hdr->addr1);
+diff --git a/net/mac80211/tdls.c b/net/mac80211/tdls.c
+index 6c647f425e05..67745d1d4c5d 100644
+--- a/net/mac80211/tdls.c
++++ b/net/mac80211/tdls.c
+@@ -1992,3 +1992,26 @@ void ieee80211_tdls_chsw_work(struct work_struct *wk)
+       }
+       rtnl_unlock();
+ }
++
++void ieee80211_tdls_handle_disconnect(struct ieee80211_sub_if_data *sdata,
++                                    const u8 *peer, u16 reason)
++{
++      struct ieee80211_sta *sta;
++
++      rcu_read_lock();
++      sta = ieee80211_find_sta(&sdata->vif, peer);
++      if (!sta || !sta->tdls) {
++              rcu_read_unlock();
++              return;
++      }
++      rcu_read_unlock();
++
++      tdls_dbg(sdata, "disconnected from TDLS peer %pM (Reason: %u=%s)\n",
++               peer, reason,
++               ieee80211_get_reason_code_string(reason));
++
++      ieee80211_tdls_oper_request(&sdata->vif, peer,
++                                  NL80211_TDLS_TEARDOWN,
++                                  WLAN_REASON_TDLS_TEARDOWN_UNREACHABLE,
++                                  GFP_ATOMIC);
++}
+diff --git a/net/mac80211/util.c b/net/mac80211/util.c
+index 3deaa01ebee4..2558a34c9df1 100644
+--- a/net/mac80211/util.c
++++ b/net/mac80211/util.c
+@@ -3523,7 +3523,9 @@ int ieee80211_check_combinations(struct 
ieee80211_sub_if_data *sdata,
+       }
+ 
+       /* Always allow software iftypes */
+-      if (local->hw.wiphy->software_iftypes & BIT(iftype)) {
++      if (local->hw.wiphy->software_iftypes & BIT(iftype) ||
++          (iftype == NL80211_IFTYPE_AP_VLAN &&
++           local->hw.wiphy->flags & WIPHY_FLAG_4ADDR_AP)) {
+               if (radar_detect)
+                       return -EINVAL;
+               return 0;
+diff --git a/net/mac80211/wpa.c b/net/mac80211/wpa.c
+index 58d0b258b684..5dd48f0a4b1b 100644
+--- a/net/mac80211/wpa.c
++++ b/net/mac80211/wpa.c
+@@ -1175,7 +1175,7 @@ ieee80211_crypto_aes_gmac_decrypt(struct 
ieee80211_rx_data *rx)
+       struct ieee80211_rx_status *status = IEEE80211_SKB_RXCB(skb);
+       struct ieee80211_key *key = rx->key;
+       struct ieee80211_mmie_16 *mmie;
+-      u8 aad[GMAC_AAD_LEN], mic[GMAC_MIC_LEN], ipn[6], nonce[GMAC_NONCE_LEN];
++      u8 aad[GMAC_AAD_LEN], *mic, ipn[6], nonce[GMAC_NONCE_LEN];
+       struct ieee80211_hdr *hdr = (struct ieee80211_hdr *)skb->data;
+ 
+       if (!ieee80211_is_mgmt(hdr->frame_control))
+@@ -1206,13 +1206,18 @@ ieee80211_crypto_aes_gmac_decrypt(struct 
ieee80211_rx_data *rx)
+               memcpy(nonce, hdr->addr2, ETH_ALEN);
+               memcpy(nonce + ETH_ALEN, ipn, 6);
+ 
++              mic = kmalloc(GMAC_MIC_LEN, GFP_ATOMIC);
++              if (!mic)
++                      return RX_DROP_UNUSABLE;
+               if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce,
+                                      skb->data + 24, skb->len - 24,
+                                      mic) < 0 ||
+                   crypto_memneq(mic, mmie->mic, sizeof(mmie->mic))) {
+                       key->u.aes_gmac.icverrors++;
++                      kfree(mic);
+                       return RX_DROP_UNUSABLE;
+               }
++              kfree(mic);
+       }
+ 
+       memcpy(key->u.aes_gmac.rx_pn, ipn, 6);
+diff --git a/net/wireless/core.c b/net/wireless/core.c
+index a88551f3bc43..2a46ec3cb72c 100644
+--- a/net/wireless/core.c
++++ b/net/wireless/core.c
+@@ -498,7 +498,7 @@ use_default_name:
+                                  &rdev->rfkill_ops, rdev);
+ 
+       if (!rdev->rfkill) {
+-              kfree(rdev);
++              wiphy_free(&rdev->wiphy);
+               return NULL;
+       }
+ 
+@@ -1335,8 +1335,12 @@ static int cfg80211_netdev_notifier_call(struct 
notifier_block *nb,
+               }
+               break;
+       case NETDEV_PRE_UP:
+-              if (!(wdev->wiphy->interface_modes & BIT(wdev->iftype)))
++              if (!(wdev->wiphy->interface_modes & BIT(wdev->iftype)) &&
++                  !(wdev->iftype == NL80211_IFTYPE_AP_VLAN &&
++                    rdev->wiphy.flags & WIPHY_FLAG_4ADDR_AP &&
++                    wdev->use_4addr))
+                       return notifier_from_errno(-EOPNOTSUPP);
++
+               if (rfkill_blocked(rdev->rfkill))
+                       return notifier_from_errno(-ERFKILL);
+               break;
+diff --git a/net/wireless/nl80211.c b/net/wireless/nl80211.c
+index c6711ead5e59..8e2f03ab4cc9 100644
+--- a/net/wireless/nl80211.c
++++ b/net/wireless/nl80211.c
+@@ -3191,8 +3191,7 @@ static int nl80211_new_interface(struct sk_buff *skb, 
struct genl_info *info)
+                       return -EINVAL;
+       }
+ 
+-      if (!rdev->ops->add_virtual_intf ||
+-          !(rdev->wiphy.interface_modes & (1 << type)))
++      if (!rdev->ops->add_virtual_intf)
+               return -EOPNOTSUPP;
+ 
+       if ((type == NL80211_IFTYPE_P2P_DEVICE || type == NL80211_IFTYPE_NAN ||
+@@ -3211,6 +3210,11 @@ static int nl80211_new_interface(struct sk_buff *skb, 
struct genl_info *info)
+                       return err;
+       }
+ 
++      if (!(rdev->wiphy.interface_modes & (1 << type)) &&
++          !(type == NL80211_IFTYPE_AP_VLAN && params.use_4addr &&
++            rdev->wiphy.flags & WIPHY_FLAG_4ADDR_AP))
++              return -EOPNOTSUPP;
++
+       err = nl80211_parse_mon_options(rdev, type, info, &params);
+       if (err < 0)
+               return err;
+@@ -4607,8 +4611,10 @@ static int nl80211_send_station(struct sk_buff *msg, 
u32 cmd, u32 portid,
+       struct nlattr *sinfoattr, *bss_param;
+ 
+       hdr = nl80211hdr_put(msg, portid, seq, flags, cmd);
+-      if (!hdr)
++      if (!hdr) {
++              cfg80211_sinfo_release_content(sinfo);
+               return -1;
++      }
+ 
+       if (nla_put_u32(msg, NL80211_ATTR_IFINDEX, dev->ifindex) ||
+           nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, mac_addr) ||
+diff --git a/scripts/checkstack.pl b/scripts/checkstack.pl
+index 34414c6efad6..a2c9e7f98e06 100755
+--- a/scripts/checkstack.pl
++++ b/scripts/checkstack.pl
+@@ -46,7 +46,7 @@ my (@stack, $re, $dre, $x, $xs, $funcre);
+       $x      = "[0-9a-f]";   # hex character
+       $xs     = "[0-9a-f ]";  # hex character or space
+       $funcre = qr/^$x* <(.*)>:$/;
+-      if ($arch eq 'aarch64') {
++      if ($arch =~ '^(aarch|arm)64$') {
+               #ffffffc0006325cc:       a9bb7bfd        stp     x29, x30, [sp, 
#-80]!
+               $re = qr/^.*stp.*sp, \#-([0-9]{1,8})\]\!/o;
+       } elsif ($arch eq 'arm') {
+diff --git a/security/apparmor/include/policy.h 
b/security/apparmor/include/policy.h
+index ab64c6b5db5a..28c098fb6208 100644
+--- a/security/apparmor/include/policy.h
++++ b/security/apparmor/include/policy.h
+@@ -214,7 +214,16 @@ static inline struct aa_profile 
*aa_get_newest_profile(struct aa_profile *p)
+       return labels_profile(aa_get_newest_label(&p->label));
+ }
+ 
+-#define PROFILE_MEDIATES(P, T)  ((P)->policy.start[(unsigned char) (T)])
++static inline unsigned int PROFILE_MEDIATES(struct aa_profile *profile,
++                                          unsigned char class)
++{
++      if (class <= AA_CLASS_LAST)
++              return profile->policy.start[class];
++      else
++              return aa_dfa_match_len(profile->policy.dfa,
++                                      profile->policy.start[0], &class, 1);
++}
++
+ static inline unsigned int PROFILE_MEDIATES_AF(struct aa_profile *profile,
+                                              u16 AF) {
+       unsigned int state = PROFILE_MEDIATES(profile, AA_CLASS_NET);
+diff --git a/security/apparmor/policy_unpack.c 
b/security/apparmor/policy_unpack.c
+index 21cb384d712a..088ea2ac8570 100644
+--- a/security/apparmor/policy_unpack.c
++++ b/security/apparmor/policy_unpack.c
+@@ -276,7 +276,7 @@ static bool unpack_nameX(struct aa_ext *e, enum aa_code 
code, const char *name)
+               char *tag = NULL;
+               size_t size = unpack_u16_chunk(e, &tag);
+               /* if a name is specified it must match. otherwise skip tag */
+-              if (name && (!size || strcmp(name, tag)))
++              if (name && (!size || tag[size-1] != '\0' || strcmp(name, tag)))
+                       goto fail;
+       } else if (name) {
+               /* if a name is specified and there is no name tag fail */
+diff --git a/tools/objtool/check.c b/tools/objtool/check.c
+index 02a47e365e52..ecf5fc77f50b 100644
+--- a/tools/objtool/check.c
++++ b/tools/objtool/check.c
+@@ -839,7 +839,7 @@ static int add_switch_table(struct objtool_file *file, 
struct instruction *insn,
+       struct symbol *pfunc = insn->func->pfunc;
+       unsigned int prev_offset = 0;
+ 
+-      list_for_each_entry_from(rela, &file->rodata->rela->rela_list, list) {
++      list_for_each_entry_from(rela, &table->rela_sec->rela_list, list) {
+               if (rela == next_table)
+                       break;
+ 
+@@ -929,6 +929,7 @@ static struct rela *find_switch_table(struct objtool_file 
*file,
+ {
+       struct rela *text_rela, *rodata_rela;
+       struct instruction *orig_insn = insn;
++      struct section *rodata_sec;
+       unsigned long table_offset;
+ 
+       /*
+@@ -956,10 +957,13 @@ static struct rela *find_switch_table(struct 
objtool_file *file,
+               /* look for a relocation which references .rodata */
+               text_rela = find_rela_by_dest_range(insn->sec, insn->offset,
+                                                   insn->len);
+-              if (!text_rela || text_rela->sym != file->rodata->sym)
++              if (!text_rela || text_rela->sym->type != STT_SECTION ||
++                  !text_rela->sym->sec->rodata)
+                       continue;
+ 
+               table_offset = text_rela->addend;
++              rodata_sec = text_rela->sym->sec;
++
+               if (text_rela->type == R_X86_64_PC32)
+                       table_offset += 4;
+ 
+@@ -967,10 +971,10 @@ static struct rela *find_switch_table(struct 
objtool_file *file,
+                * Make sure the .rodata address isn't associated with a
+                * symbol.  gcc jump tables are anonymous data.
+                */
+-              if (find_symbol_containing(file->rodata, table_offset))
++              if (find_symbol_containing(rodata_sec, table_offset))
+                       continue;
+ 
+-              rodata_rela = find_rela_by_dest(file->rodata, table_offset);
++              rodata_rela = find_rela_by_dest(rodata_sec, table_offset);
+               if (rodata_rela) {
+                       /*
+                        * Use of RIP-relative switch jumps is quite rare, and
+@@ -1055,7 +1059,7 @@ static int add_switch_table_alts(struct objtool_file 
*file)
+       struct symbol *func;
+       int ret;
+ 
+-      if (!file->rodata || !file->rodata->rela)
++      if (!file->rodata)
+               return 0;
+ 
+       for_each_sec(file, sec) {
+@@ -1201,10 +1205,33 @@ static int read_retpoline_hints(struct objtool_file 
*file)
+       return 0;
+ }
+ 
++static void mark_rodata(struct objtool_file *file)
++{
++      struct section *sec;
++      bool found = false;
++
++      /*
++       * This searches for the .rodata section or multiple .rodata.func_name
++       * sections if -fdata-sections is being used. The .str.1.1 and .str.1.8
++       * rodata sections are ignored as they don't contain jump tables.
++       */
++      for_each_sec(file, sec) {
++              if (!strncmp(sec->name, ".rodata", 7) &&
++                  !strstr(sec->name, ".str1.")) {
++                      sec->rodata = true;
++                      found = true;
++              }
++      }
++
++      file->rodata = found;
++}
++
+ static int decode_sections(struct objtool_file *file)
+ {
+       int ret;
+ 
++      mark_rodata(file);
++
+       ret = decode_instructions(file);
+       if (ret)
+               return ret;
+@@ -2176,7 +2203,6 @@ int check(const char *_objname, bool orc)
+       INIT_LIST_HEAD(&file.insn_list);
+       hash_init(file.insn_hash);
+       file.whitelist = find_section_by_name(file.elf, 
".discard.func_stack_frame_non_standard");
+-      file.rodata = find_section_by_name(file.elf, ".rodata");
+       file.c_file = find_section_by_name(file.elf, ".comment");
+       file.ignore_unreachables = no_unreachable;
+       file.hints = false;
+diff --git a/tools/objtool/check.h b/tools/objtool/check.h
+index 95700a2bcb7c..e6e8a655b556 100644
+--- a/tools/objtool/check.h
++++ b/tools/objtool/check.h
+@@ -60,8 +60,8 @@ struct objtool_file {
+       struct elf *elf;
+       struct list_head insn_list;
+       DECLARE_HASHTABLE(insn_hash, 16);
+-      struct section *rodata, *whitelist;
+-      bool ignore_unreachables, c_file, hints;
++      struct section *whitelist;
++      bool ignore_unreachables, c_file, hints, rodata;
+ };
+ 
+ int check(const char *objname, bool orc);
+diff --git a/tools/objtool/elf.c b/tools/objtool/elf.c
+index b75d004f6482..abed594a9653 100644
+--- a/tools/objtool/elf.c
++++ b/tools/objtool/elf.c
+@@ -390,6 +390,7 @@ static int read_relas(struct elf *elf)
+                       rela->offset = rela->rela.r_offset;
+                       symndx = GELF_R_SYM(rela->rela.r_info);
+                       rela->sym = find_symbol_by_index(elf, symndx);
++                      rela->rela_sec = sec;
+                       if (!rela->sym) {
+                               WARN("can't find rela entry symbol %d for %s",
+                                    symndx, sec->name);
+diff --git a/tools/objtool/elf.h b/tools/objtool/elf.h
+index de5cd2ddded9..bc97ed86b9cd 100644
+--- a/tools/objtool/elf.h
++++ b/tools/objtool/elf.h
+@@ -48,7 +48,7 @@ struct section {
+       char *name;
+       int idx;
+       unsigned int len;
+-      bool changed, text;
++      bool changed, text, rodata;
+ };
+ 
+ struct symbol {
+@@ -68,6 +68,7 @@ struct rela {
+       struct list_head list;
+       struct hlist_node hash;
+       GElf_Rela rela;
++      struct section *rela_sec;
+       struct symbol *sym;
+       unsigned int type;
+       unsigned long offset;
+diff --git a/tools/testing/selftests/cgroup/test_core.c 
b/tools/testing/selftests/cgroup/test_core.c
+index be59f9c34ea2..79053a4f4783 100644
+--- a/tools/testing/selftests/cgroup/test_core.c
++++ b/tools/testing/selftests/cgroup/test_core.c
+@@ -198,7 +198,7 @@ static int 
test_cgcore_no_internal_process_constraint_on_threads(const char *roo
+       char *parent = NULL, *child = NULL;
+ 
+       if (cg_read_strstr(root, "cgroup.controllers", "cpu") ||
+-          cg_read_strstr(root, "cgroup.subtree_control", "cpu")) {
++          cg_write(root, "cgroup.subtree_control", "+cpu")) {
+               ret = KSFT_SKIP;
+               goto cleanup;
+       }
+@@ -376,6 +376,11 @@ int main(int argc, char *argv[])
+ 
+       if (cg_find_unified_root(root, sizeof(root)))
+               ksft_exit_skip("cgroup v2 isn't mounted\n");
++
++      if (cg_read_strstr(root, "cgroup.subtree_control", "memory"))
++              if (cg_write(root, "cgroup.subtree_control", "+memory"))
++                      ksft_exit_skip("Failed to set memory controller\n");
++
+       for (i = 0; i < ARRAY_SIZE(tests); i++) {
+               switch (tests[i].fn(root)) {
+               case KSFT_PASS:
+diff --git a/tools/testing/selftests/cgroup/test_memcontrol.c 
b/tools/testing/selftests/cgroup/test_memcontrol.c
+index 6f339882a6ca..c19a97dd02d4 100644
+--- a/tools/testing/selftests/cgroup/test_memcontrol.c
++++ b/tools/testing/selftests/cgroup/test_memcontrol.c
+@@ -1205,6 +1205,10 @@ int main(int argc, char **argv)
+       if (cg_read_strstr(root, "cgroup.controllers", "memory"))
+               ksft_exit_skip("memory controller isn't available\n");
+ 
++      if (cg_read_strstr(root, "cgroup.subtree_control", "memory"))
++              if (cg_write(root, "cgroup.subtree_control", "+memory"))
++                      ksft_exit_skip("Failed to set memory controller\n");
++
+       for (i = 0; i < ARRAY_SIZE(tests); i++) {
+               switch (tests[i].fn(root)) {
+               case KSFT_PASS:
+diff --git a/tools/testing/selftests/vm/Makefile 
b/tools/testing/selftests/vm/Makefile
+index dc68340a6a96..2cf3dc49bd03 100644
+--- a/tools/testing/selftests/vm/Makefile
++++ b/tools/testing/selftests/vm/Makefile
+@@ -24,6 +24,8 @@ TEST_GEN_FILES += virtual_address_range
+ 
+ TEST_PROGS := run_vmtests
+ 
++TEST_FILES := test_vmalloc.sh
++
+ KSFT_KHDR_INSTALL := 1
+ include ../lib.mk
+ 

Reply via email to