commit:     7c26232904d6e8afce4197aacf2e2fa2a2afdcf1
Author:     Mike Pagano <mpagano <AT> gentoo <DOT> org>
AuthorDate: Wed Jan  4 11:37:35 2023 +0000
Commit:     Mike Pagano <mpagano <AT> gentoo <DOT> org>
CommitDate: Wed Jan  4 11:37:35 2023 +0000
URL:        https://gitweb.gentoo.org/proj/linux-patches.git/commit/?id=7c262329

Linux patch 6.1.3

Signed-off-by: Mike Pagano <mpagano <AT> gentoo.org>

 0000_README            |    4 +
 1002_linux-6.1.3.patch | 2606 ++++++++++++++++++++++++++++++++++++++++++++++++
 2 files changed, 2610 insertions(+)

diff --git a/0000_README b/0000_README
index 7f1d2ce2..1fe5b8d9 100644
--- a/0000_README
+++ b/0000_README
@@ -51,6 +51,10 @@ Patch:  1001_linux-6.1.2.patch
 From:   http://www.kernel.org
 Desc:   Linux 6.1.2
 
+Patch:  1002_linux-6.1.3.patch
+From:   http://www.kernel.org
+Desc:   Linux 6.1.3
+
 Patch:  1500_XATTR_USER_PREFIX.patch
 From:   https://bugs.gentoo.org/show_bug.cgi?id=470644
 Desc:   Support for namespace user.pax.* on tmpfs.

diff --git a/1002_linux-6.1.3.patch b/1002_linux-6.1.3.patch
new file mode 100644
index 00000000..6909dce5
--- /dev/null
+++ b/1002_linux-6.1.3.patch
@@ -0,0 +1,2606 @@
+diff --git a/Documentation/trace/kprobes.rst b/Documentation/trace/kprobes.rst
+index 48cf778a24680..fc7ce76eab655 100644
+--- a/Documentation/trace/kprobes.rst
++++ b/Documentation/trace/kprobes.rst
+@@ -131,8 +131,7 @@ For example, if the function is non-recursive and is 
called with a
+ spinlock held, maxactive = 1 should be enough.  If the function is
+ non-recursive and can never relinquish the CPU (e.g., via a semaphore
+ or preemption), NR_CPUS should be enough.  If maxactive <= 0, it is
+-set to a default value.  If CONFIG_PREEMPT is enabled, the default
+-is max(10, 2*NR_CPUS).  Otherwise, the default is NR_CPUS.
++set to a default value: max(10, 2*NR_CPUS).
+ 
+ It's not a disaster if you set maxactive too low; you'll just miss
+ some probes.  In the kretprobe struct, the nmissed field is set to
+diff --git a/Makefile b/Makefile
+index 2ecc568c779fa..a69d14983a489 100644
+--- a/Makefile
++++ b/Makefile
+@@ -1,7 +1,7 @@
+ # SPDX-License-Identifier: GPL-2.0
+ VERSION = 6
+ PATCHLEVEL = 1
+-SUBLEVEL = 2
++SUBLEVEL = 3
+ EXTRAVERSION =
+ NAME = Hurr durr I'ma ninja sloth
+ 
+diff --git a/arch/powerpc/kernel/rtas.c b/arch/powerpc/kernel/rtas.c
+index e847f9b1c5b9f..767ab166933ba 100644
+--- a/arch/powerpc/kernel/rtas.c
++++ b/arch/powerpc/kernel/rtas.c
+@@ -889,6 +889,7 @@ void __noreturn rtas_halt(void)
+ 
+ /* Must be in the RMO region, so we place it here */
+ static char rtas_os_term_buf[2048];
++static s32 ibm_os_term_token = RTAS_UNKNOWN_SERVICE;
+ 
+ void rtas_os_term(char *str)
+ {
+@@ -900,16 +901,20 @@ void rtas_os_term(char *str)
+        * this property may terminate the partition which we want to avoid
+        * since it interferes with panic_timeout.
+        */
+-      if (RTAS_UNKNOWN_SERVICE == rtas_token("ibm,os-term") ||
+-          RTAS_UNKNOWN_SERVICE == rtas_token("ibm,extended-os-term"))
++      if (ibm_os_term_token == RTAS_UNKNOWN_SERVICE)
+               return;
+ 
+       snprintf(rtas_os_term_buf, 2048, "OS panic: %s", str);
+ 
++      /*
++       * Keep calling as long as RTAS returns a "try again" status,
++       * but don't use rtas_busy_delay(), which potentially
++       * schedules.
++       */
+       do {
+-              status = rtas_call(rtas_token("ibm,os-term"), 1, 1, NULL,
++              status = rtas_call(ibm_os_term_token, 1, 1, NULL,
+                                  __pa(rtas_os_term_buf));
+-      } while (rtas_busy_delay(status));
++      } while (rtas_busy_delay_time(status));
+ 
+       if (status != 0)
+               printk(KERN_EMERG "ibm,os-term call failed %d\n", status);
+@@ -1277,6 +1282,13 @@ void __init rtas_initialize(void)
+       no_entry = of_property_read_u32(rtas.dev, "linux,rtas-entry", &entry);
+       rtas.entry = no_entry ? rtas.base : entry;
+ 
++      /*
++       * Discover these now to avoid device tree lookups in the
++       * panic path.
++       */
++      if (of_property_read_bool(rtas.dev, "ibm,extended-os-term"))
++              ibm_os_term_token = rtas_token("ibm,os-term");
++
+       /* If RTAS was found, allocate the RMO buffer for it and look for
+        * the stop-self token if any
+        */
+diff --git a/block/bfq-iosched.c b/block/bfq-iosched.c
+index 3e3bd1a466464..7b894df32e320 100644
+--- a/block/bfq-iosched.c
++++ b/block/bfq-iosched.c
+@@ -5383,8 +5383,8 @@ static void bfq_exit_icq_bfqq(struct bfq_io_cq *bic, 
bool is_sync)
+               unsigned long flags;
+ 
+               spin_lock_irqsave(&bfqd->lock, flags);
+-              bfq_exit_bfqq(bfqd, bfqq);
+               bic_set_bfqq(bic, NULL, is_sync);
++              bfq_exit_bfqq(bfqd, bfqq);
+               spin_unlock_irqrestore(&bfqd->lock, flags);
+       }
+ }
+diff --git a/block/blk.h b/block/blk.h
+index a186ea20f39d8..8b75a95b28d60 100644
+--- a/block/blk.h
++++ b/block/blk.h
+@@ -436,7 +436,7 @@ static inline struct kmem_cache 
*blk_get_queue_kmem_cache(bool srcu)
+ }
+ struct request_queue *blk_alloc_queue(int node_id, bool alloc_srcu);
+ 
+-int disk_scan_partitions(struct gendisk *disk, fmode_t mode);
++int disk_scan_partitions(struct gendisk *disk, fmode_t mode, void *owner);
+ 
+ int disk_alloc_events(struct gendisk *disk);
+ void disk_add_events(struct gendisk *disk);
+diff --git a/block/genhd.c b/block/genhd.c
+index 647f7d8d88312..c4765681a8b4b 100644
+--- a/block/genhd.c
++++ b/block/genhd.c
+@@ -356,7 +356,7 @@ void disk_uevent(struct gendisk *disk, enum kobject_action 
action)
+ }
+ EXPORT_SYMBOL_GPL(disk_uevent);
+ 
+-int disk_scan_partitions(struct gendisk *disk, fmode_t mode)
++int disk_scan_partitions(struct gendisk *disk, fmode_t mode, void *owner)
+ {
+       struct block_device *bdev;
+ 
+@@ -366,6 +366,9 @@ int disk_scan_partitions(struct gendisk *disk, fmode_t 
mode)
+               return -EINVAL;
+       if (disk->open_partitions)
+               return -EBUSY;
++      /* Someone else has bdev exclusively open? */
++      if (disk->part0->bd_holder && disk->part0->bd_holder != owner)
++              return -EBUSY;
+ 
+       set_bit(GD_NEED_PART_SCAN, &disk->state);
+       bdev = blkdev_get_by_dev(disk_devt(disk), mode, NULL);
+@@ -500,7 +503,7 @@ int __must_check device_add_disk(struct device *parent, 
struct gendisk *disk,
+ 
+               bdev_add(disk->part0, ddev->devt);
+               if (get_capacity(disk))
+-                      disk_scan_partitions(disk, FMODE_READ);
++                      disk_scan_partitions(disk, FMODE_READ, NULL);
+ 
+               /*
+                * Announce the disk and partitions after all partitions are
+diff --git a/block/ioctl.c b/block/ioctl.c
+index 60121e89052bc..96617512982e5 100644
+--- a/block/ioctl.c
++++ b/block/ioctl.c
+@@ -467,9 +467,10 @@ static int blkdev_bszset(struct block_device *bdev, 
fmode_t mode,
+  * user space. Note the separate arg/argp parameters that are needed
+  * to deal with the compat_ptr() conversion.
+  */
+-static int blkdev_common_ioctl(struct block_device *bdev, fmode_t mode,
+-                              unsigned cmd, unsigned long arg, void __user 
*argp)
++static int blkdev_common_ioctl(struct file *file, fmode_t mode, unsigned cmd,
++                             unsigned long arg, void __user *argp)
+ {
++      struct block_device *bdev = I_BDEV(file->f_mapping->host);
+       unsigned int max_sectors;
+ 
+       switch (cmd) {
+@@ -527,7 +528,8 @@ static int blkdev_common_ioctl(struct block_device *bdev, 
fmode_t mode,
+                       return -EACCES;
+               if (bdev_is_partition(bdev))
+                       return -EINVAL;
+-              return disk_scan_partitions(bdev->bd_disk, mode & ~FMODE_EXCL);
++              return disk_scan_partitions(bdev->bd_disk, mode & ~FMODE_EXCL,
++                                          file);
+       case BLKTRACESTART:
+       case BLKTRACESTOP:
+       case BLKTRACETEARDOWN:
+@@ -605,7 +607,7 @@ long blkdev_ioctl(struct file *file, unsigned cmd, 
unsigned long arg)
+               break;
+       }
+ 
+-      ret = blkdev_common_ioctl(bdev, mode, cmd, arg, argp);
++      ret = blkdev_common_ioctl(file, mode, cmd, arg, argp);
+       if (ret != -ENOIOCTLCMD)
+               return ret;
+ 
+@@ -674,7 +676,7 @@ long compat_blkdev_ioctl(struct file *file, unsigned cmd, 
unsigned long arg)
+               break;
+       }
+ 
+-      ret = blkdev_common_ioctl(bdev, mode, cmd, arg, argp);
++      ret = blkdev_common_ioctl(file, mode, cmd, arg, argp);
+       if (ret == -ENOIOCTLCMD && disk->fops->compat_ioctl)
+               ret = disk->fops->compat_ioctl(bdev, mode, cmd, arg);
+ 
+diff --git a/drivers/acpi/resource.c b/drivers/acpi/resource.c
+index f27914aedbd5a..16dcd31d124fe 100644
+--- a/drivers/acpi/resource.c
++++ b/drivers/acpi/resource.c
+@@ -432,10 +432,24 @@ static const struct dmi_system_id asus_laptop[] = {
+                       DMI_MATCH(DMI_BOARD_NAME, "S5602ZA"),
+               },
+       },
++      {
++              .ident = "Asus ExpertBook B2502",
++              .matches = {
++                      DMI_MATCH(DMI_SYS_VENDOR, "ASUSTeK COMPUTER INC."),
++                      DMI_MATCH(DMI_BOARD_NAME, "B2502CBA"),
++              },
++      },
+       { }
+ };
+ 
+-static const struct dmi_system_id lenovo_82ra[] = {
++static const struct dmi_system_id lenovo_laptop[] = {
++      {
++              .ident = "LENOVO IdeaPad Flex 5 14ALC7",
++              .matches = {
++                      DMI_MATCH(DMI_SYS_VENDOR, "LENOVO"),
++                      DMI_MATCH(DMI_PRODUCT_NAME, "82R9"),
++              },
++      },
+       {
+               .ident = "LENOVO IdeaPad Flex 5 16ALC7",
+               .matches = {
+@@ -446,6 +460,17 @@ static const struct dmi_system_id lenovo_82ra[] = {
+       { }
+ };
+ 
++static const struct dmi_system_id schenker_gm_rg[] = {
++      {
++              .ident = "XMG CORE 15 (M22)",
++              .matches = {
++                      DMI_MATCH(DMI_SYS_VENDOR, "SchenkerTechnologiesGmbH"),
++                      DMI_MATCH(DMI_BOARD_NAME, "GMxRGxx"),
++              },
++      },
++      { }
++};
++
+ struct irq_override_cmp {
+       const struct dmi_system_id *system;
+       unsigned char irq;
+@@ -458,8 +483,9 @@ struct irq_override_cmp {
+ static const struct irq_override_cmp override_table[] = {
+       { medion_laptop, 1, ACPI_LEVEL_SENSITIVE, ACPI_ACTIVE_LOW, 0, false },
+       { asus_laptop, 1, ACPI_LEVEL_SENSITIVE, ACPI_ACTIVE_LOW, 0, false },
+-      { lenovo_82ra, 6, ACPI_LEVEL_SENSITIVE, ACPI_ACTIVE_LOW, 0, true },
+-      { lenovo_82ra, 10, ACPI_LEVEL_SENSITIVE, ACPI_ACTIVE_LOW, 0, true },
++      { lenovo_laptop, 6, ACPI_LEVEL_SENSITIVE, ACPI_ACTIVE_LOW, 0, true },
++      { lenovo_laptop, 10, ACPI_LEVEL_SENSITIVE, ACPI_ACTIVE_LOW, 0, true },
++      { schenker_gm_rg, 1, ACPI_EDGE_SENSITIVE, ACPI_ACTIVE_LOW, 1, true },
+ };
+ 
+ static bool acpi_dev_irq_override(u32 gsi, u8 triggering, u8 polarity,
+diff --git a/drivers/acpi/video_detect.c b/drivers/acpi/video_detect.c
+index ffa19d418847f..13f10fbcd7f03 100644
+--- a/drivers/acpi/video_detect.c
++++ b/drivers/acpi/video_detect.c
+@@ -34,6 +34,7 @@
+ #include <linux/module.h>
+ #include <linux/pci.h>
+ #include <linux/platform_data/x86/nvidia-wmi-ec-backlight.h>
++#include <linux/pnp.h>
+ #include <linux/types.h>
+ #include <linux/workqueue.h>
+ #include <acpi/video.h>
+@@ -105,6 +106,26 @@ static bool nvidia_wmi_ec_supported(void)
+ }
+ #endif
+ 
++static bool apple_gmux_backlight_present(void)
++{
++      struct acpi_device *adev;
++      struct device *dev;
++
++      adev = acpi_dev_get_first_match_dev(GMUX_ACPI_HID, NULL, -1);
++      if (!adev)
++              return false;
++
++      dev = acpi_get_first_physical_node(adev);
++      if (!dev)
++              return false;
++
++      /*
++       * drivers/platform/x86/apple-gmux.c only supports old style
++       * Apple GMUX with an IO-resource.
++       */
++      return pnp_get_resource(to_pnp_dev(dev), IORESOURCE_IO, 0) != NULL;
++}
++
+ /* Force to use vendor driver when the ACPI device is known to be
+  * buggy */
+ static int video_detect_force_vendor(const struct dmi_system_id *d)
+@@ -755,7 +776,7 @@ static enum acpi_backlight_type 
__acpi_video_get_backlight_type(bool native)
+       if (nvidia_wmi_ec_present)
+               return acpi_backlight_nvidia_wmi_ec;
+ 
+-      if (apple_gmux_present())
++      if (apple_gmux_backlight_present())
+               return acpi_backlight_apple_gmux;
+ 
+       /* Chromebooks should always prefer native backlight control. */
+diff --git a/drivers/acpi/x86/s2idle.c b/drivers/acpi/x86/s2idle.c
+index 5350c73564b60..c7afce465a071 100644
+--- a/drivers/acpi/x86/s2idle.c
++++ b/drivers/acpi/x86/s2idle.c
+@@ -28,10 +28,6 @@ static bool sleep_no_lps0 __read_mostly;
+ module_param(sleep_no_lps0, bool, 0644);
+ MODULE_PARM_DESC(sleep_no_lps0, "Do not use the special LPS0 device 
interface");
+ 
+-static bool prefer_microsoft_dsm_guid __read_mostly;
+-module_param(prefer_microsoft_dsm_guid, bool, 0644);
+-MODULE_PARM_DESC(prefer_microsoft_dsm_guid, "Prefer using Microsoft GUID in 
LPS0 device _DSM evaluation");
+-
+ static const struct acpi_device_id lps0_device_ids[] = {
+       {"PNP0D80", },
+       {"", },
+@@ -369,27 +365,15 @@ out:
+ }
+ 
+ struct amd_lps0_hid_device_data {
+-      const unsigned int rev_id;
+       const bool check_off_by_one;
+-      const bool prefer_amd_guid;
+ };
+ 
+ static const struct amd_lps0_hid_device_data amd_picasso = {
+-      .rev_id = 0,
+       .check_off_by_one = true,
+-      .prefer_amd_guid = false,
+ };
+ 
+ static const struct amd_lps0_hid_device_data amd_cezanne = {
+-      .rev_id = 0,
+-      .check_off_by_one = false,
+-      .prefer_amd_guid = false,
+-};
+-
+-static const struct amd_lps0_hid_device_data amd_rembrandt = {
+-      .rev_id = 2,
+       .check_off_by_one = false,
+-      .prefer_amd_guid = true,
+ };
+ 
+ static const struct acpi_device_id amd_hid_ids[] = {
+@@ -397,69 +381,27 @@ static const struct acpi_device_id amd_hid_ids[] = {
+       {"AMD0005",     (kernel_ulong_t)&amd_picasso,   },
+       {"AMDI0005",    (kernel_ulong_t)&amd_picasso,   },
+       {"AMDI0006",    (kernel_ulong_t)&amd_cezanne,   },
+-      {"AMDI0007",    (kernel_ulong_t)&amd_rembrandt, },
+       {}
+ };
+ 
+-static int lps0_prefer_microsoft(const struct dmi_system_id *id)
++static int lps0_prefer_amd(const struct dmi_system_id *id)
+ {
+-      pr_debug("Preferring Microsoft GUID.\n");
+-      prefer_microsoft_dsm_guid = true;
++      pr_debug("Using AMD GUID w/ _REV 2.\n");
++      rev_id = 2;
+       return 0;
+ }
+-
+ static const struct dmi_system_id s2idle_dmi_table[] __initconst = {
+       {
+               /*
+-               * ASUS TUF Gaming A17 FA707RE
+-               * https://bugzilla.kernel.org/show_bug.cgi?id=216101
+-               */
+-              .callback = lps0_prefer_microsoft,
+-              .matches = {
+-                      DMI_MATCH(DMI_SYS_VENDOR, "ASUSTeK COMPUTER INC."),
+-                      DMI_MATCH(DMI_PRODUCT_NAME, "ASUS TUF Gaming A17"),
+-              },
+-      },
+-      {
+-              /* ASUS ROG Zephyrus G14 (2022) */
+-              .callback = lps0_prefer_microsoft,
+-              .matches = {
+-                      DMI_MATCH(DMI_SYS_VENDOR, "ASUSTeK COMPUTER INC."),
+-                      DMI_MATCH(DMI_PRODUCT_NAME, "ROG Zephyrus G14 GA402"),
+-              },
+-      },
+-      {
+-              /*
+-               * Lenovo Yoga Slim 7 Pro X 14ARH7
+-               * https://bugzilla.kernel.org/show_bug.cgi?id=216473 : 82V2
+-               * https://bugzilla.kernel.org/show_bug.cgi?id=216438 : 82TL
+-               */
+-              .callback = lps0_prefer_microsoft,
+-              .matches = {
+-                      DMI_MATCH(DMI_BOARD_VENDOR, "LENOVO"),
+-                      DMI_MATCH(DMI_PRODUCT_NAME, "82"),
+-              },
+-      },
+-      {
+-              /*
+-               * ASUSTeK COMPUTER INC. ROG Flow X13 GV301RE_GV301RE
+-               * https://gitlab.freedesktop.org/drm/amd/-/issues/2148
++               * AMD Rembrandt based HP EliteBook 835/845/865 G9
++               * Contains specialized AML in AMD/_REV 2 path to avoid
++               * triggering a bug in Qualcomm WLAN firmware. This may be
++               * removed in the future if that firmware is fixed.
+                */
+-              .callback = lps0_prefer_microsoft,
++              .callback = lps0_prefer_amd,
+               .matches = {
+-                      DMI_MATCH(DMI_SYS_VENDOR, "ASUSTeK COMPUTER INC."),
+-                      DMI_MATCH(DMI_PRODUCT_NAME, "ROG Flow X13 GV301"),
+-              },
+-      },
+-      {
+-              /*
+-               * ASUSTeK COMPUTER INC. ROG Flow X16 GV601RW_GV601RW
+-               * https://gitlab.freedesktop.org/drm/amd/-/issues/2148
+-               */
+-              .callback = lps0_prefer_microsoft,
+-              .matches = {
+-                      DMI_MATCH(DMI_SYS_VENDOR, "ASUSTeK COMPUTER INC."),
+-                      DMI_MATCH(DMI_PRODUCT_NAME, "ROG Flow X16 GV601"),
++                      DMI_MATCH(DMI_BOARD_VENDOR, "HP"),
++                      DMI_MATCH(DMI_BOARD_NAME, "8990"),
+               },
+       },
+       {}
+@@ -484,16 +426,14 @@ static int lps0_device_attach(struct acpi_device *adev,
+               if (dev_id->id[0])
+                       data = (const struct amd_lps0_hid_device_data *) 
dev_id->driver_data;
+               else
+-                      data = &amd_rembrandt;
+-              rev_id = data->rev_id;
++                      data = &amd_cezanne;
+               lps0_dsm_func_mask = validate_dsm(adev->handle,
+                                       ACPI_LPS0_DSM_UUID_AMD, rev_id, 
&lps0_dsm_guid);
+               if (lps0_dsm_func_mask > 0x3 && data->check_off_by_one) {
+                       lps0_dsm_func_mask = (lps0_dsm_func_mask << 1) | 0x1;
+                       acpi_handle_debug(adev->handle, "_DSM UUID %s: Adjusted 
function mask: 0x%x\n",
+                                         ACPI_LPS0_DSM_UUID_AMD, 
lps0_dsm_func_mask);
+-              } else if (lps0_dsm_func_mask_microsoft > 0 && 
data->prefer_amd_guid &&
+-                              !prefer_microsoft_dsm_guid) {
++              } else if (lps0_dsm_func_mask_microsoft > 0 && rev_id) {
+                       lps0_dsm_func_mask_microsoft = -EINVAL;
+                       acpi_handle_debug(adev->handle, "_DSM Using AMD 
method\n");
+               }
+@@ -501,8 +441,7 @@ static int lps0_device_attach(struct acpi_device *adev,
+               rev_id = 1;
+               lps0_dsm_func_mask = validate_dsm(adev->handle,
+                                       ACPI_LPS0_DSM_UUID, rev_id, 
&lps0_dsm_guid);
+-              if (!prefer_microsoft_dsm_guid)
+-                      lps0_dsm_func_mask_microsoft = -EINVAL;
++              lps0_dsm_func_mask_microsoft = -EINVAL;
+       }
+ 
+       if (lps0_dsm_func_mask < 0 && lps0_dsm_func_mask_microsoft < 0)
+diff --git a/drivers/ata/ahci.c b/drivers/ata/ahci.c
+index 639de2d75d636..53ab2306da009 100644
+--- a/drivers/ata/ahci.c
++++ b/drivers/ata/ahci.c
+@@ -84,6 +84,7 @@ enum board_ids {
+ static int ahci_init_one(struct pci_dev *pdev, const struct pci_device_id 
*ent);
+ static void ahci_remove_one(struct pci_dev *dev);
+ static void ahci_shutdown_one(struct pci_dev *dev);
++static void ahci_intel_pcs_quirk(struct pci_dev *pdev, struct ahci_host_priv 
*hpriv);
+ static int ahci_vt8251_hardreset(struct ata_link *link, unsigned int *class,
+                                unsigned long deadline);
+ static int ahci_avn_hardreset(struct ata_link *link, unsigned int *class,
+@@ -677,6 +678,25 @@ static void ahci_pci_save_initial_config(struct pci_dev 
*pdev,
+       ahci_save_initial_config(&pdev->dev, hpriv);
+ }
+ 
++static int ahci_pci_reset_controller(struct ata_host *host)
++{
++      struct pci_dev *pdev = to_pci_dev(host->dev);
++      struct ahci_host_priv *hpriv = host->private_data;
++      int rc;
++
++      rc = ahci_reset_controller(host);
++      if (rc)
++              return rc;
++
++      /*
++       * If platform firmware failed to enable ports, try to enable
++       * them here.
++       */
++      ahci_intel_pcs_quirk(pdev, hpriv);
++
++      return 0;
++}
++
+ static void ahci_pci_init_controller(struct ata_host *host)
+ {
+       struct ahci_host_priv *hpriv = host->private_data;
+@@ -871,7 +891,7 @@ static int ahci_pci_device_runtime_resume(struct device 
*dev)
+       struct ata_host *host = pci_get_drvdata(pdev);
+       int rc;
+ 
+-      rc = ahci_reset_controller(host);
++      rc = ahci_pci_reset_controller(host);
+       if (rc)
+               return rc;
+       ahci_pci_init_controller(host);
+@@ -907,7 +927,7 @@ static int ahci_pci_device_resume(struct device *dev)
+               ahci_mcp89_apple_enable(pdev);
+ 
+       if (pdev->dev.power.power_state.event == PM_EVENT_SUSPEND) {
+-              rc = ahci_reset_controller(host);
++              rc = ahci_pci_reset_controller(host);
+               if (rc)
+                       return rc;
+ 
+@@ -1785,12 +1805,6 @@ static int ahci_init_one(struct pci_dev *pdev, const 
struct pci_device_id *ent)
+       /* save initial config */
+       ahci_pci_save_initial_config(pdev, hpriv);
+ 
+-      /*
+-       * If platform firmware failed to enable ports, try to enable
+-       * them here.
+-       */
+-      ahci_intel_pcs_quirk(pdev, hpriv);
+-
+       /* prepare host */
+       if (hpriv->cap & HOST_CAP_NCQ) {
+               pi.flags |= ATA_FLAG_NCQ;
+@@ -1900,7 +1914,7 @@ static int ahci_init_one(struct pci_dev *pdev, const 
struct pci_device_id *ent)
+       if (rc)
+               return rc;
+ 
+-      rc = ahci_reset_controller(host);
++      rc = ahci_pci_reset_controller(host);
+       if (rc)
+               return rc;
+ 
+diff --git a/drivers/char/tpm/eventlog/acpi.c 
b/drivers/char/tpm/eventlog/acpi.c
+index 1b18ce5ebab1e..0913d3eb8d518 100644
+--- a/drivers/char/tpm/eventlog/acpi.c
++++ b/drivers/char/tpm/eventlog/acpi.c
+@@ -90,16 +90,21 @@ int tpm_read_log_acpi(struct tpm_chip *chip)
+                       return -ENODEV;
+ 
+               if (tbl->header.length <
+-                              sizeof(*tbl) + sizeof(struct acpi_tpm2_phy))
++                              sizeof(*tbl) + sizeof(struct acpi_tpm2_phy)) {
++                      acpi_put_table((struct acpi_table_header *)tbl);
+                       return -ENODEV;
++              }
+ 
+               tpm2_phy = (void *)tbl + sizeof(*tbl);
+               len = tpm2_phy->log_area_minimum_length;
+ 
+               start = tpm2_phy->log_area_start_address;
+-              if (!start || !len)
++              if (!start || !len) {
++                      acpi_put_table((struct acpi_table_header *)tbl);
+                       return -ENODEV;
++              }
+ 
++              acpi_put_table((struct acpi_table_header *)tbl);
+               format = EFI_TCG2_EVENT_LOG_FORMAT_TCG_2;
+       } else {
+               /* Find TCPA entry in RSDT (ACPI_LOGICAL_ADDRESSING) */
+@@ -120,8 +125,10 @@ int tpm_read_log_acpi(struct tpm_chip *chip)
+                       break;
+               }
+ 
++              acpi_put_table((struct acpi_table_header *)buff);
+               format = EFI_TCG2_EVENT_LOG_FORMAT_TCG_1_2;
+       }
++
+       if (!len) {
+               dev_warn(&chip->dev, "%s: TCPA log area empty\n", __func__);
+               return -EIO;
+@@ -156,5 +163,4 @@ err:
+       kfree(log->bios_event_log);
+       log->bios_event_log = NULL;
+       return ret;
+-
+ }
+diff --git a/drivers/char/tpm/tpm_crb.c b/drivers/char/tpm/tpm_crb.c
+index 65f8f179a27f0..16fc481d60950 100644
+--- a/drivers/char/tpm/tpm_crb.c
++++ b/drivers/char/tpm/tpm_crb.c
+@@ -676,12 +676,16 @@ static int crb_acpi_add(struct acpi_device *device)
+ 
+       /* Should the FIFO driver handle this? */
+       sm = buf->start_method;
+-      if (sm == ACPI_TPM2_MEMORY_MAPPED)
+-              return -ENODEV;
++      if (sm == ACPI_TPM2_MEMORY_MAPPED) {
++              rc = -ENODEV;
++              goto out;
++      }
+ 
+       priv = devm_kzalloc(dev, sizeof(struct crb_priv), GFP_KERNEL);
+-      if (!priv)
+-              return -ENOMEM;
++      if (!priv) {
++              rc = -ENOMEM;
++              goto out;
++      }
+ 
+       if (sm == ACPI_TPM2_COMMAND_BUFFER_WITH_ARM_SMC) {
+               if (buf->header.length < (sizeof(*buf) + sizeof(*crb_smc))) {
+@@ -689,7 +693,8 @@ static int crb_acpi_add(struct acpi_device *device)
+                               FW_BUG "TPM2 ACPI table has wrong size %u for 
start method type %d\n",
+                               buf->header.length,
+                               ACPI_TPM2_COMMAND_BUFFER_WITH_ARM_SMC);
+-                      return -EINVAL;
++                      rc = -EINVAL;
++                      goto out;
+               }
+               crb_smc = ACPI_ADD_PTR(struct tpm2_crb_smc, buf, sizeof(*buf));
+               priv->smc_func_id = crb_smc->smc_func_id;
+@@ -700,17 +705,23 @@ static int crb_acpi_add(struct acpi_device *device)
+ 
+       rc = crb_map_io(device, priv, buf);
+       if (rc)
+-              return rc;
++              goto out;
+ 
+       chip = tpmm_chip_alloc(dev, &tpm_crb);
+-      if (IS_ERR(chip))
+-              return PTR_ERR(chip);
++      if (IS_ERR(chip)) {
++              rc = PTR_ERR(chip);
++              goto out;
++      }
+ 
+       dev_set_drvdata(&chip->dev, priv);
+       chip->acpi_dev_handle = device->handle;
+       chip->flags = TPM_CHIP_FLAG_TPM2;
+ 
+-      return tpm_chip_register(chip);
++      rc = tpm_chip_register(chip);
++
++out:
++      acpi_put_table((struct acpi_table_header *)buf);
++      return rc;
+ }
+ 
+ static int crb_acpi_remove(struct acpi_device *device)
+diff --git a/drivers/char/tpm/tpm_tis.c b/drivers/char/tpm/tpm_tis.c
+index bcff6429e0b4f..ed5dabd3c72d6 100644
+--- a/drivers/char/tpm/tpm_tis.c
++++ b/drivers/char/tpm/tpm_tis.c
+@@ -125,6 +125,7 @@ static int check_acpi_tpm2(struct device *dev)
+       const struct acpi_device_id *aid = acpi_match_device(tpm_acpi_tbl, dev);
+       struct acpi_table_tpm2 *tbl;
+       acpi_status st;
++      int ret = 0;
+ 
+       if (!aid || aid->driver_data != DEVICE_IS_TPM2)
+               return 0;
+@@ -132,8 +133,7 @@ static int check_acpi_tpm2(struct device *dev)
+       /* If the ACPI TPM2 signature is matched then a global ACPI_SIG_TPM2
+        * table is mandatory
+        */
+-      st =
+-          acpi_get_table(ACPI_SIG_TPM2, 1, (struct acpi_table_header **)&tbl);
++      st = acpi_get_table(ACPI_SIG_TPM2, 1, (struct acpi_table_header 
**)&tbl);
+       if (ACPI_FAILURE(st) || tbl->header.length < sizeof(*tbl)) {
+               dev_err(dev, FW_BUG "failed to get TPM2 ACPI table\n");
+               return -EINVAL;
+@@ -141,9 +141,10 @@ static int check_acpi_tpm2(struct device *dev)
+ 
+       /* The tpm2_crb driver handles this device */
+       if (tbl->start_method != ACPI_TPM2_MEMORY_MAPPED)
+-              return -ENODEV;
++              ret = -ENODEV;
+ 
+-      return 0;
++      acpi_put_table((struct acpi_table_header *)tbl);
++      return ret;
+ }
+ #else
+ static int check_acpi_tpm2(struct device *dev)
+diff --git a/drivers/hid/hid-ids.h b/drivers/hid/hid-ids.h
+index 8f58c3c1bec31..e27fb27a36bfa 100644
+--- a/drivers/hid/hid-ids.h
++++ b/drivers/hid/hid-ids.h
+@@ -995,7 +995,10 @@
+ #define USB_DEVICE_ID_ORTEK_IHOME_IMAC_A210S  0x8003
+ 
+ #define USB_VENDOR_ID_PLANTRONICS     0x047f
++#define USB_DEVICE_ID_PLANTRONICS_BLACKWIRE_3210_SERIES       0xc055
+ #define USB_DEVICE_ID_PLANTRONICS_BLACKWIRE_3220_SERIES       0xc056
++#define USB_DEVICE_ID_PLANTRONICS_BLACKWIRE_3215_SERIES       0xc057
++#define USB_DEVICE_ID_PLANTRONICS_BLACKWIRE_3225_SERIES       0xc058
+ 
+ #define USB_VENDOR_ID_PANASONIC               0x04da
+ #define USB_DEVICE_ID_PANABOARD_UBT780        0x1044
+diff --git a/drivers/hid/hid-multitouch.c b/drivers/hid/hid-multitouch.c
+index 91a4d3fc30e08..372cbdd223e09 100644
+--- a/drivers/hid/hid-multitouch.c
++++ b/drivers/hid/hid-multitouch.c
+@@ -1967,6 +1967,10 @@ static const struct hid_device_id mt_devices[] = {
+               HID_DEVICE(BUS_I2C, HID_GROUP_MULTITOUCH_WIN_8,
+                       USB_VENDOR_ID_ELAN, 0x313a) },
+ 
++      { .driver_data = MT_CLS_WIN_8_FORCE_MULTI_INPUT,
++              HID_DEVICE(BUS_I2C, HID_GROUP_MULTITOUCH_WIN_8,
++                      USB_VENDOR_ID_ELAN, 0x3148) },
++
+       /* Elitegroup panel */
+       { .driver_data = MT_CLS_SERIAL,
+               MT_USB_DEVICE(USB_VENDOR_ID_ELITEGROUP,
+diff --git a/drivers/hid/hid-plantronics.c b/drivers/hid/hid-plantronics.c
+index e81b7cec2d124..3d414ae194acb 100644
+--- a/drivers/hid/hid-plantronics.c
++++ b/drivers/hid/hid-plantronics.c
+@@ -198,9 +198,18 @@ err:
+ }
+ 
+ static const struct hid_device_id plantronics_devices[] = {
++      { HID_USB_DEVICE(USB_VENDOR_ID_PLANTRONICS,
++                                       
USB_DEVICE_ID_PLANTRONICS_BLACKWIRE_3210_SERIES),
++              .driver_data = PLT_QUIRK_DOUBLE_VOLUME_KEYS },
+       { HID_USB_DEVICE(USB_VENDOR_ID_PLANTRONICS,
+                                        
USB_DEVICE_ID_PLANTRONICS_BLACKWIRE_3220_SERIES),
+               .driver_data = PLT_QUIRK_DOUBLE_VOLUME_KEYS },
++      { HID_USB_DEVICE(USB_VENDOR_ID_PLANTRONICS,
++                                       
USB_DEVICE_ID_PLANTRONICS_BLACKWIRE_3215_SERIES),
++              .driver_data = PLT_QUIRK_DOUBLE_VOLUME_KEYS },
++      { HID_USB_DEVICE(USB_VENDOR_ID_PLANTRONICS,
++                                       
USB_DEVICE_ID_PLANTRONICS_BLACKWIRE_3225_SERIES),
++              .driver_data = PLT_QUIRK_DOUBLE_VOLUME_KEYS },
+       { HID_USB_DEVICE(USB_VENDOR_ID_PLANTRONICS, HID_ANY_ID) },
+       { }
+ };
+diff --git a/drivers/iommu/mtk_iommu.c b/drivers/iommu/mtk_iommu.c
+index dad2f238ffbf2..56d007582b6fa 100644
+--- a/drivers/iommu/mtk_iommu.c
++++ b/drivers/iommu/mtk_iommu.c
+@@ -454,7 +454,7 @@ static irqreturn_t mtk_iommu_isr(int irq, void *dev_id)
+               fault_larb = 
data->plat_data->larbid_remap[fault_larb][sub_comm];
+       }
+ 
+-      if (report_iommu_fault(&dom->domain, bank->parent_dev, fault_iova,
++      if (!dom || report_iommu_fault(&dom->domain, bank->parent_dev, 
fault_iova,
+                              write ? IOMMU_FAULT_WRITE : IOMMU_FAULT_READ)) {
+               dev_err_ratelimited(
+                       bank->parent_dev,
+diff --git a/drivers/md/md.c b/drivers/md/md.c
+index a467b492d4ad3..fd82881761d34 100644
+--- a/drivers/md/md.c
++++ b/drivers/md/md.c
+@@ -509,13 +509,14 @@ static void md_end_flush(struct bio *bio)
+       struct md_rdev *rdev = bio->bi_private;
+       struct mddev *mddev = rdev->mddev;
+ 
++      bio_put(bio);
++
+       rdev_dec_pending(rdev, mddev);
+ 
+       if (atomic_dec_and_test(&mddev->flush_pending)) {
+               /* The pre-request flush has finished */
+               queue_work(md_wq, &mddev->flush_work);
+       }
+-      bio_put(bio);
+ }
+ 
+ static void md_submit_flush_data(struct work_struct *ws);
+@@ -913,10 +914,12 @@ static void super_written(struct bio *bio)
+       } else
+               clear_bit(LastDev, &rdev->flags);
+ 
++      bio_put(bio);
++
++      rdev_dec_pending(rdev, mddev);
++
+       if (atomic_dec_and_test(&mddev->pending_writes))
+               wake_up(&mddev->sb_wait);
+-      rdev_dec_pending(rdev, mddev);
+-      bio_put(bio);
+ }
+ 
+ void md_super_write(struct mddev *mddev, struct md_rdev *rdev,
+diff --git a/drivers/mfd/mt6360-core.c b/drivers/mfd/mt6360-core.c
+index 6eaa6775b8885..d3b32eb798377 100644
+--- a/drivers/mfd/mt6360-core.c
++++ b/drivers/mfd/mt6360-core.c
+@@ -402,7 +402,7 @@ static int mt6360_regmap_read(void *context, const void 
*reg, size_t reg_size,
+       struct mt6360_ddata *ddata = context;
+       u8 bank = *(u8 *)reg;
+       u8 reg_addr = *(u8 *)(reg + 1);
+-      struct i2c_client *i2c = ddata->i2c[bank];
++      struct i2c_client *i2c;
+       bool crc_needed = false;
+       u8 *buf;
+       int buf_len = MT6360_ALLOC_READ_SIZE(val_size);
+@@ -410,6 +410,11 @@ static int mt6360_regmap_read(void *context, const void 
*reg, size_t reg_size,
+       u8 crc;
+       int ret;
+ 
++      if (bank >= MT6360_SLAVE_MAX)
++              return -EINVAL;
++
++      i2c = ddata->i2c[bank];
++
+       if (bank == MT6360_SLAVE_PMIC || bank == MT6360_SLAVE_LDO) {
+               crc_needed = true;
+               ret = mt6360_xlate_pmicldo_addr(&reg_addr, val_size);
+@@ -453,13 +458,18 @@ static int mt6360_regmap_write(void *context, const void 
*val, size_t val_size)
+       struct mt6360_ddata *ddata = context;
+       u8 bank = *(u8 *)val;
+       u8 reg_addr = *(u8 *)(val + 1);
+-      struct i2c_client *i2c = ddata->i2c[bank];
++      struct i2c_client *i2c;
+       bool crc_needed = false;
+       u8 *buf;
+       int buf_len = MT6360_ALLOC_WRITE_SIZE(val_size);
+       int write_size = val_size - MT6360_REGMAP_REG_BYTE_SIZE;
+       int ret;
+ 
++      if (bank >= MT6360_SLAVE_MAX)
++              return -EINVAL;
++
++      i2c = ddata->i2c[bank];
++
+       if (bank == MT6360_SLAVE_PMIC || bank == MT6360_SLAVE_LDO) {
+               crc_needed = true;
+               ret = mt6360_xlate_pmicldo_addr(&reg_addr, val_size - 
MT6360_REGMAP_REG_BYTE_SIZE);
+diff --git a/drivers/mmc/host/vub300.c b/drivers/mmc/host/vub300.c
+index ab36ec4797478..72f65f32abbc7 100644
+--- a/drivers/mmc/host/vub300.c
++++ b/drivers/mmc/host/vub300.c
+@@ -2049,6 +2049,7 @@ static void vub300_enable_sdio_irq(struct mmc_host *mmc, 
int enable)
+               return;
+       kref_get(&vub300->kref);
+       if (enable) {
++              set_current_state(TASK_RUNNING);
+               mutex_lock(&vub300->irq_mutex);
+               if (vub300->irqs_queued) {
+                       vub300->irqs_queued -= 1;
+@@ -2064,6 +2065,7 @@ static void vub300_enable_sdio_irq(struct mmc_host *mmc, 
int enable)
+                       vub300_queue_poll_work(vub300, 0);
+               }
+               mutex_unlock(&vub300->irq_mutex);
++              set_current_state(TASK_INTERRUPTIBLE);
+       } else {
+               vub300->irq_enabled = 0;
+       }
+diff --git a/drivers/nvme/host/pci.c b/drivers/nvme/host/pci.c
+index 488ad7dabeb8e..115d81def5671 100644
+--- a/drivers/nvme/host/pci.c
++++ b/drivers/nvme/host/pci.c
+@@ -35,7 +35,7 @@
+ #define SQ_SIZE(q)    ((q)->q_depth << (q)->sqes)
+ #define CQ_SIZE(q)    ((q)->q_depth * sizeof(struct nvme_completion))
+ 
+-#define SGES_PER_PAGE (PAGE_SIZE / sizeof(struct nvme_sgl_desc))
++#define SGES_PER_PAGE (NVME_CTRL_PAGE_SIZE / sizeof(struct nvme_sgl_desc))
+ 
+ /*
+  * These can be higher, but we need to ensure that any command doesn't
+@@ -144,9 +144,9 @@ struct nvme_dev {
+       mempool_t *iod_mempool;
+ 
+       /* shadow doorbell buffer support: */
+-      u32 *dbbuf_dbs;
++      __le32 *dbbuf_dbs;
+       dma_addr_t dbbuf_dbs_dma_addr;
+-      u32 *dbbuf_eis;
++      __le32 *dbbuf_eis;
+       dma_addr_t dbbuf_eis_dma_addr;
+ 
+       /* host memory buffer support: */
+@@ -210,10 +210,10 @@ struct nvme_queue {
+ #define NVMEQ_SQ_CMB          1
+ #define NVMEQ_DELETE_ERROR    2
+ #define NVMEQ_POLLED          3
+-      u32 *dbbuf_sq_db;
+-      u32 *dbbuf_cq_db;
+-      u32 *dbbuf_sq_ei;
+-      u32 *dbbuf_cq_ei;
++      __le32 *dbbuf_sq_db;
++      __le32 *dbbuf_cq_db;
++      __le32 *dbbuf_sq_ei;
++      __le32 *dbbuf_cq_ei;
+       struct completion delete_done;
+ };
+ 
+@@ -340,11 +340,11 @@ static inline int nvme_dbbuf_need_event(u16 event_idx, 
u16 new_idx, u16 old)
+ }
+ 
+ /* Update dbbuf and return true if an MMIO is required */
+-static bool nvme_dbbuf_update_and_check_event(u16 value, u32 *dbbuf_db,
+-                                            volatile u32 *dbbuf_ei)
++static bool nvme_dbbuf_update_and_check_event(u16 value, __le32 *dbbuf_db,
++                                            volatile __le32 *dbbuf_ei)
+ {
+       if (dbbuf_db) {
+-              u16 old_value;
++              u16 old_value, event_idx;
+ 
+               /*
+                * Ensure that the queue is written before updating
+@@ -352,8 +352,8 @@ static bool nvme_dbbuf_update_and_check_event(u16 value, 
u32 *dbbuf_db,
+                */
+               wmb();
+ 
+-              old_value = *dbbuf_db;
+-              *dbbuf_db = value;
++              old_value = le32_to_cpu(*dbbuf_db);
++              *dbbuf_db = cpu_to_le32(value);
+ 
+               /*
+                * Ensure that the doorbell is updated before reading the event
+@@ -363,7 +363,8 @@ static bool nvme_dbbuf_update_and_check_event(u16 value, 
u32 *dbbuf_db,
+                */
+               mb();
+ 
+-              if (!nvme_dbbuf_need_event(*dbbuf_ei, value, old_value))
++              event_idx = le32_to_cpu(*dbbuf_ei);
++              if (!nvme_dbbuf_need_event(event_idx, value, old_value))
+                       return false;
+       }
+ 
+@@ -377,9 +378,9 @@ static bool nvme_dbbuf_update_and_check_event(u16 value, 
u32 *dbbuf_db,
+  */
+ static int nvme_pci_npages_prp(void)
+ {
+-      unsigned nprps = DIV_ROUND_UP(NVME_MAX_KB_SZ + NVME_CTRL_PAGE_SIZE,
+-                                    NVME_CTRL_PAGE_SIZE);
+-      return DIV_ROUND_UP(8 * nprps, PAGE_SIZE - 8);
++      unsigned max_bytes = (NVME_MAX_KB_SZ * 1024) + NVME_CTRL_PAGE_SIZE;
++      unsigned nprps = DIV_ROUND_UP(max_bytes, NVME_CTRL_PAGE_SIZE);
++      return DIV_ROUND_UP(8 * nprps, NVME_CTRL_PAGE_SIZE - 8);
+ }
+ 
+ /*
+@@ -389,7 +390,7 @@ static int nvme_pci_npages_prp(void)
+ static int nvme_pci_npages_sgl(void)
+ {
+       return DIV_ROUND_UP(NVME_MAX_SEGS * sizeof(struct nvme_sgl_desc),
+-                      PAGE_SIZE);
++                      NVME_CTRL_PAGE_SIZE);
+ }
+ 
+ static size_t nvme_pci_iod_alloc_size(void)
+@@ -713,7 +714,7 @@ static void nvme_pci_sgl_set_seg(struct nvme_sgl_desc *sge,
+               sge->length = cpu_to_le32(entries * sizeof(*sge));
+               sge->type = NVME_SGL_FMT_LAST_SEG_DESC << 4;
+       } else {
+-              sge->length = cpu_to_le32(PAGE_SIZE);
++              sge->length = cpu_to_le32(NVME_CTRL_PAGE_SIZE);
+               sge->type = NVME_SGL_FMT_SEG_DESC << 4;
+       }
+ }
+diff --git a/drivers/nvme/target/passthru.c b/drivers/nvme/target/passthru.c
+index 79af5140af8bf..adc0958755d66 100644
+--- a/drivers/nvme/target/passthru.c
++++ b/drivers/nvme/target/passthru.c
+@@ -334,14 +334,13 @@ static void nvmet_passthru_execute_cmd(struct nvmet_req 
*req)
+       }
+ 
+       /*
+-       * If there are effects for the command we are about to execute, or
+-       * an end_req function we need to use nvme_execute_passthru_rq()
+-       * synchronously in a work item seeing the end_req function and
+-       * nvme_passthru_end() can't be called in the request done callback
+-       * which is typically in interrupt context.
++       * If a command needs post-execution fixups, or there are any
++       * non-trivial effects, make sure to execute the command synchronously
++       * in a workqueue so that nvme_passthru_end gets called.
+        */
+       effects = nvme_command_effects(ctrl, ns, req->cmd->common.opcode);
+-      if (req->p.use_workqueue || effects) {
++      if (req->p.use_workqueue ||
++          (effects & ~(NVME_CMD_EFFECTS_CSUPP | NVME_CMD_EFFECTS_LBCC))) {
+               INIT_WORK(&req->p.work, nvmet_passthru_execute_cmd_work);
+               req->p.rq = rq;
+               queue_work(nvmet_wq, &req->p.work);
+diff --git a/drivers/phy/allwinner/phy-sun4i-usb.c 
b/drivers/phy/allwinner/phy-sun4i-usb.c
+index 3a3831f6059a3..5472db9e87ef8 100644
+--- a/drivers/phy/allwinner/phy-sun4i-usb.c
++++ b/drivers/phy/allwinner/phy-sun4i-usb.c
+@@ -120,6 +120,7 @@ struct sun4i_usb_phy_cfg {
+       u8 phyctl_offset;
+       bool dedicated_clocks;
+       bool phy0_dual_route;
++      bool needs_phy2_siddq;
+       int missing_phys;
+ };
+ 
+@@ -289,6 +290,50 @@ static int sun4i_usb_phy_init(struct phy *_phy)
+               return ret;
+       }
+ 
++      /* Some PHYs on some SoCs need the help of PHY2 to work. */
++      if (data->cfg->needs_phy2_siddq && phy->index != 2) {
++              struct sun4i_usb_phy *phy2 = &data->phys[2];
++
++              ret = clk_prepare_enable(phy2->clk);
++              if (ret) {
++                      reset_control_assert(phy->reset);
++                      clk_disable_unprepare(phy->clk2);
++                      clk_disable_unprepare(phy->clk);
++                      return ret;
++              }
++
++              ret = reset_control_deassert(phy2->reset);
++              if (ret) {
++                      clk_disable_unprepare(phy2->clk);
++                      reset_control_assert(phy->reset);
++                      clk_disable_unprepare(phy->clk2);
++                      clk_disable_unprepare(phy->clk);
++                      return ret;
++              }
++
++              /*
++               * This extra clock is just needed to access the
++               * REG_HCI_PHY_CTL PMU register for PHY2.
++               */
++              ret = clk_prepare_enable(phy2->clk2);
++              if (ret) {
++                      reset_control_assert(phy2->reset);
++                      clk_disable_unprepare(phy2->clk);
++                      reset_control_assert(phy->reset);
++                      clk_disable_unprepare(phy->clk2);
++                      clk_disable_unprepare(phy->clk);
++                      return ret;
++              }
++
++              if (phy2->pmu && data->cfg->hci_phy_ctl_clear) {
++                      val = readl(phy2->pmu + REG_HCI_PHY_CTL);
++                      val &= ~data->cfg->hci_phy_ctl_clear;
++                      writel(val, phy2->pmu + REG_HCI_PHY_CTL);
++              }
++
++              clk_disable_unprepare(phy->clk2);
++      }
++
+       if (phy->pmu && data->cfg->hci_phy_ctl_clear) {
+               val = readl(phy->pmu + REG_HCI_PHY_CTL);
+               val &= ~data->cfg->hci_phy_ctl_clear;
+@@ -354,6 +399,13 @@ static int sun4i_usb_phy_exit(struct phy *_phy)
+               data->phy0_init = false;
+       }
+ 
++      if (data->cfg->needs_phy2_siddq && phy->index != 2) {
++              struct sun4i_usb_phy *phy2 = &data->phys[2];
++
++              clk_disable_unprepare(phy2->clk);
++              reset_control_assert(phy2->reset);
++      }
++
+       sun4i_usb_phy_passby(phy, 0);
+       reset_control_assert(phy->reset);
+       clk_disable_unprepare(phy->clk2);
+@@ -785,6 +837,13 @@ static int sun4i_usb_phy_probe(struct platform_device 
*pdev)
+                               dev_err(dev, "failed to get clock %s\n", name);
+                               return PTR_ERR(phy->clk2);
+                       }
++              } else {
++                      snprintf(name, sizeof(name), "pmu%d_clk", i);
++                      phy->clk2 = devm_clk_get_optional(dev, name);
++                      if (IS_ERR(phy->clk2)) {
++                              dev_err(dev, "failed to get clock %s\n", name);
++                              return PTR_ERR(phy->clk2);
++                      }
+               }
+ 
+               snprintf(name, sizeof(name), "usb%d_reset", i);
+@@ -973,6 +1032,17 @@ static const struct sun4i_usb_phy_cfg sun50i_h6_cfg = {
+       .missing_phys = BIT(1) | BIT(2),
+ };
+ 
++static const struct sun4i_usb_phy_cfg sun50i_h616_cfg = {
++      .num_phys = 4,
++      .type = sun50i_h6_phy,
++      .disc_thresh = 3,
++      .phyctl_offset = REG_PHYCTL_A33,
++      .dedicated_clocks = true,
++      .phy0_dual_route = true,
++      .hci_phy_ctl_clear = PHY_CTL_SIDDQ,
++      .needs_phy2_siddq = true,
++};
++
+ static const struct of_device_id sun4i_usb_phy_of_match[] = {
+       { .compatible = "allwinner,sun4i-a10-usb-phy", .data = &sun4i_a10_cfg },
+       { .compatible = "allwinner,sun5i-a13-usb-phy", .data = &sun5i_a13_cfg },
+@@ -988,6 +1058,7 @@ static const struct of_device_id sun4i_usb_phy_of_match[] 
= {
+       { .compatible = "allwinner,sun50i-a64-usb-phy",
+         .data = &sun50i_a64_cfg},
+       { .compatible = "allwinner,sun50i-h6-usb-phy", .data = &sun50i_h6_cfg },
++      { .compatible = "allwinner,sun50i-h616-usb-phy", .data = 
&sun50i_h616_cfg },
+       { },
+ };
+ MODULE_DEVICE_TABLE(of, sun4i_usb_phy_of_match);
+diff --git a/drivers/rtc/rtc-msc313.c b/drivers/rtc/rtc-msc313.c
+index f3fde013c4b8b..8d7737e0e2e02 100644
+--- a/drivers/rtc/rtc-msc313.c
++++ b/drivers/rtc/rtc-msc313.c
+@@ -212,22 +212,12 @@ static int msc313_rtc_probe(struct platform_device *pdev)
+               return ret;
+       }
+ 
+-      clk = devm_clk_get(dev, NULL);
++      clk = devm_clk_get_enabled(dev, NULL);
+       if (IS_ERR(clk)) {
+               dev_err(dev, "No input reference clock\n");
+               return PTR_ERR(clk);
+       }
+ 
+-      ret = clk_prepare_enable(clk);
+-      if (ret) {
+-              dev_err(dev, "Failed to enable the reference clock, %d\n", ret);
+-              return ret;
+-      }
+-
+-      ret = devm_add_action_or_reset(dev, (void (*) (void 
*))clk_disable_unprepare, clk);
+-      if (ret)
+-              return ret;
+-
+       rate = clk_get_rate(clk);
+       writew(rate & 0xFFFF, priv->rtc_base + REG_RTC_FREQ_CW_L);
+       writew((rate >> 16) & 0xFFFF, priv->rtc_base + REG_RTC_FREQ_CW_H);
+diff --git a/drivers/soundwire/dmi-quirks.c b/drivers/soundwire/dmi-quirks.c
+index f81cdd83ec26e..7969881f126dc 100644
+--- a/drivers/soundwire/dmi-quirks.c
++++ b/drivers/soundwire/dmi-quirks.c
+@@ -90,6 +90,14 @@ static const struct dmi_system_id adr_remap_quirk_table[] = 
{
+               },
+               .driver_data = (void *)intel_tgl_bios,
+       },
++      {
++              /* quirk used for NUC15 LAPBC710 skew */
++              .matches = {
++                      DMI_MATCH(DMI_BOARD_VENDOR, "Intel Corporation"),
++                      DMI_MATCH(DMI_BOARD_NAME, "LAPBC710"),
++              },
++              .driver_data = (void *)intel_tgl_bios,
++      },
+       {
+               .matches = {
+                       DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc"),
+diff --git a/fs/binfmt_elf_fdpic.c b/fs/binfmt_elf_fdpic.c
+index 08d0c8797828c..9ce5e1f41c26f 100644
+--- a/fs/binfmt_elf_fdpic.c
++++ b/fs/binfmt_elf_fdpic.c
+@@ -434,8 +434,9 @@ static int load_elf_fdpic_binary(struct linux_binprm *bprm)
+       current->mm->start_stack = current->mm->start_brk + stack_size;
+ #endif
+ 
+-      if (create_elf_fdpic_tables(bprm, current->mm,
+-                                  &exec_params, &interp_params) < 0)
++      retval = create_elf_fdpic_tables(bprm, current->mm, &exec_params,
++                                       &interp_params);
++      if (retval < 0)
+               goto error;
+ 
+       kdebug("- start_code  %lx", current->mm->start_code);
+diff --git a/fs/eventfd.c b/fs/eventfd.c
+index c0ffee99ad238..249ca6c0b7843 100644
+--- a/fs/eventfd.c
++++ b/fs/eventfd.c
+@@ -43,21 +43,7 @@ struct eventfd_ctx {
+       int id;
+ };
+ 
+-/**
+- * eventfd_signal - Adds @n to the eventfd counter.
+- * @ctx: [in] Pointer to the eventfd context.
+- * @n: [in] Value of the counter to be added to the eventfd internal counter.
+- *          The value cannot be negative.
+- *
+- * This function is supposed to be called by the kernel in paths that do not
+- * allow sleeping. In this function we allow the counter to reach the 
ULLONG_MAX
+- * value, and we signal this as overflow condition by returning a EPOLLERR
+- * to poll(2).
+- *
+- * Returns the amount by which the counter was incremented.  This will be less
+- * than @n if the counter has overflowed.
+- */
+-__u64 eventfd_signal(struct eventfd_ctx *ctx, __u64 n)
++__u64 eventfd_signal_mask(struct eventfd_ctx *ctx, __u64 n, unsigned mask)
+ {
+       unsigned long flags;
+ 
+@@ -78,12 +64,31 @@ __u64 eventfd_signal(struct eventfd_ctx *ctx, __u64 n)
+               n = ULLONG_MAX - ctx->count;
+       ctx->count += n;
+       if (waitqueue_active(&ctx->wqh))
+-              wake_up_locked_poll(&ctx->wqh, EPOLLIN);
++              wake_up_locked_poll(&ctx->wqh, EPOLLIN | mask);
+       current->in_eventfd = 0;
+       spin_unlock_irqrestore(&ctx->wqh.lock, flags);
+ 
+       return n;
+ }
++
++/**
++ * eventfd_signal - Adds @n to the eventfd counter.
++ * @ctx: [in] Pointer to the eventfd context.
++ * @n: [in] Value of the counter to be added to the eventfd internal counter.
++ *          The value cannot be negative.
++ *
++ * This function is supposed to be called by the kernel in paths that do not
++ * allow sleeping. In this function we allow the counter to reach the 
ULLONG_MAX
++ * value, and we signal this as overflow condition by returning a EPOLLERR
++ * to poll(2).
++ *
++ * Returns the amount by which the counter was incremented.  This will be less
++ * than @n if the counter has overflowed.
++ */
++__u64 eventfd_signal(struct eventfd_ctx *ctx, __u64 n)
++{
++      return eventfd_signal_mask(ctx, n, 0);
++}
+ EXPORT_SYMBOL_GPL(eventfd_signal);
+ 
+ static void eventfd_free_ctx(struct eventfd_ctx *ctx)
+diff --git a/fs/eventpoll.c b/fs/eventpoll.c
+index 52954d4637b54..64659b1109733 100644
+--- a/fs/eventpoll.c
++++ b/fs/eventpoll.c
+@@ -491,7 +491,8 @@ static inline void ep_set_busy_poll_napi_id(struct epitem 
*epi)
+  */
+ #ifdef CONFIG_DEBUG_LOCK_ALLOC
+ 
+-static void ep_poll_safewake(struct eventpoll *ep, struct epitem *epi)
++static void ep_poll_safewake(struct eventpoll *ep, struct epitem *epi,
++                           unsigned pollflags)
+ {
+       struct eventpoll *ep_src;
+       unsigned long flags;
+@@ -522,16 +523,17 @@ static void ep_poll_safewake(struct eventpoll *ep, 
struct epitem *epi)
+       }
+       spin_lock_irqsave_nested(&ep->poll_wait.lock, flags, nests);
+       ep->nests = nests + 1;
+-      wake_up_locked_poll(&ep->poll_wait, EPOLLIN);
++      wake_up_locked_poll(&ep->poll_wait, EPOLLIN | pollflags);
+       ep->nests = 0;
+       spin_unlock_irqrestore(&ep->poll_wait.lock, flags);
+ }
+ 
+ #else
+ 
+-static void ep_poll_safewake(struct eventpoll *ep, struct epitem *epi)
++static void ep_poll_safewake(struct eventpoll *ep, struct epitem *epi,
++                           unsigned pollflags)
+ {
+-      wake_up_poll(&ep->poll_wait, EPOLLIN);
++      wake_up_poll(&ep->poll_wait, EPOLLIN | pollflags);
+ }
+ 
+ #endif
+@@ -742,7 +744,7 @@ static void ep_free(struct eventpoll *ep)
+ 
+       /* We need to release all tasks waiting for these file */
+       if (waitqueue_active(&ep->poll_wait))
+-              ep_poll_safewake(ep, NULL);
++              ep_poll_safewake(ep, NULL, 0);
+ 
+       /*
+        * We need to lock this because we could be hit by
+@@ -1208,7 +1210,7 @@ out_unlock:
+ 
+       /* We have to call this outside the lock */
+       if (pwake)
+-              ep_poll_safewake(ep, epi);
++              ep_poll_safewake(ep, epi, pollflags & EPOLL_URING_WAKE);
+ 
+       if (!(epi->event.events & EPOLLEXCLUSIVE))
+               ewake = 1;
+@@ -1553,7 +1555,7 @@ static int ep_insert(struct eventpoll *ep, const struct 
epoll_event *event,
+ 
+       /* We have to call this outside the lock */
+       if (pwake)
+-              ep_poll_safewake(ep, NULL);
++              ep_poll_safewake(ep, NULL, 0);
+ 
+       return 0;
+ }
+@@ -1629,7 +1631,7 @@ static int ep_modify(struct eventpoll *ep, struct epitem 
*epi,
+ 
+       /* We have to call this outside the lock */
+       if (pwake)
+-              ep_poll_safewake(ep, NULL);
++              ep_poll_safewake(ep, NULL, 0);
+ 
+       return 0;
+ }
+diff --git a/fs/f2fs/gc.c b/fs/f2fs/gc.c
+index 22c1f876e8c52..b3184d8b1ce89 100644
+--- a/fs/f2fs/gc.c
++++ b/fs/f2fs/gc.c
+@@ -1109,6 +1109,7 @@ static bool is_alive(struct f2fs_sb_info *sbi, struct 
f2fs_summary *sum,
+       if (ofs_in_node >= max_addrs) {
+               f2fs_err(sbi, "Inconsistent ofs_in_node:%u in summary, ino:%u, 
nid:%u, max:%u",
+                       ofs_in_node, dni->ino, dni->nid, max_addrs);
++              f2fs_put_page(node_page, 1);
+               return false;
+       }
+ 
+diff --git a/fs/f2fs/node.c b/fs/f2fs/node.c
+index 983572f238969..b9ee5a1176a07 100644
+--- a/fs/f2fs/node.c
++++ b/fs/f2fs/node.c
+@@ -1360,8 +1360,7 @@ static int read_node_page(struct page *page, blk_opf_t 
op_flags)
+               return err;
+ 
+       /* NEW_ADDR can be seen, after cp_error drops some dirty node pages */
+-      if (unlikely(ni.blk_addr == NULL_ADDR || ni.blk_addr == NEW_ADDR) ||
+-                      is_sbi_flag_set(sbi, SBI_IS_SHUTDOWN)) {
++      if (unlikely(ni.blk_addr == NULL_ADDR || ni.blk_addr == NEW_ADDR)) {
+               ClearPageUptodate(page);
+               return -ENOENT;
+       }
+diff --git a/fs/hfsplus/hfsplus_fs.h b/fs/hfsplus/hfsplus_fs.h
+index a5db2e3b29801..6aa919e594834 100644
+--- a/fs/hfsplus/hfsplus_fs.h
++++ b/fs/hfsplus/hfsplus_fs.h
+@@ -198,6 +198,8 @@ struct hfsplus_sb_info {
+ #define HFSPLUS_SB_HFSX               3
+ #define HFSPLUS_SB_CASEFOLD   4
+ #define HFSPLUS_SB_NOBARRIER  5
++#define HFSPLUS_SB_UID                6
++#define HFSPLUS_SB_GID                7
+ 
+ static inline struct hfsplus_sb_info *HFSPLUS_SB(struct super_block *sb)
+ {
+diff --git a/fs/hfsplus/inode.c b/fs/hfsplus/inode.c
+index aeab83ed1c9c6..b675581aa9d0f 100644
+--- a/fs/hfsplus/inode.c
++++ b/fs/hfsplus/inode.c
+@@ -192,11 +192,11 @@ static void hfsplus_get_perms(struct inode *inode,
+       mode = be16_to_cpu(perms->mode);
+ 
+       i_uid_write(inode, be32_to_cpu(perms->owner));
+-      if (!i_uid_read(inode) && !mode)
++      if ((test_bit(HFSPLUS_SB_UID, &sbi->flags)) || (!i_uid_read(inode) && 
!mode))
+               inode->i_uid = sbi->uid;
+ 
+       i_gid_write(inode, be32_to_cpu(perms->group));
+-      if (!i_gid_read(inode) && !mode)
++      if ((test_bit(HFSPLUS_SB_GID, &sbi->flags)) || (!i_gid_read(inode) && 
!mode))
+               inode->i_gid = sbi->gid;
+ 
+       if (dir) {
+diff --git a/fs/hfsplus/options.c b/fs/hfsplus/options.c
+index 047e05c575601..c94a58762ad6d 100644
+--- a/fs/hfsplus/options.c
++++ b/fs/hfsplus/options.c
+@@ -140,6 +140,8 @@ int hfsplus_parse_options(char *input, struct 
hfsplus_sb_info *sbi)
+                       if (!uid_valid(sbi->uid)) {
+                               pr_err("invalid uid specified\n");
+                               return 0;
++                      } else {
++                              set_bit(HFSPLUS_SB_UID, &sbi->flags);
+                       }
+                       break;
+               case opt_gid:
+@@ -151,6 +153,8 @@ int hfsplus_parse_options(char *input, struct 
hfsplus_sb_info *sbi)
+                       if (!gid_valid(sbi->gid)) {
+                               pr_err("invalid gid specified\n");
+                               return 0;
++                      } else {
++                              set_bit(HFSPLUS_SB_GID, &sbi->flags);
+                       }
+                       break;
+               case opt_part:
+diff --git a/fs/nfsd/nfs4proc.c b/fs/nfsd/nfs4proc.c
+index 32fe7cbfb28b3..34d1cd5883fbb 100644
+--- a/fs/nfsd/nfs4proc.c
++++ b/fs/nfsd/nfs4proc.c
+@@ -1465,13 +1465,6 @@ out_err:
+       return status;
+ }
+ 
+-static void
+-nfsd4_interssc_disconnect(struct vfsmount *ss_mnt)
+-{
+-      nfs_do_sb_deactive(ss_mnt->mnt_sb);
+-      mntput(ss_mnt);
+-}
+-
+ /*
+  * Verify COPY destination stateid.
+  *
+@@ -1574,11 +1567,6 @@ nfsd4_cleanup_inter_ssc(struct vfsmount *ss_mnt, struct 
file *filp,
+ {
+ }
+ 
+-static void
+-nfsd4_interssc_disconnect(struct vfsmount *ss_mnt)
+-{
+-}
+-
+ static struct file *nfs42_ssc_open(struct vfsmount *ss_mnt,
+                                  struct nfs_fh *src_fh,
+                                  nfs4_stateid *stateid)
+@@ -1774,7 +1762,7 @@ static int nfsd4_do_async_copy(void *data)
+                       default:
+                               nfserr = nfserr_offload_denied;
+                       }
+-                      nfsd4_interssc_disconnect(copy->ss_mnt);
++                      /* ss_mnt will be unmounted by the laundromat */
+                       goto do_callback;
+               }
+               nfserr = nfsd4_do_copy(copy, filp, copy->nf_dst->nf_file,
+@@ -1855,8 +1843,10 @@ out_err:
+       if (async_copy)
+               cleanup_async_copy(async_copy);
+       status = nfserrno(-ENOMEM);
+-      if (nfsd4_ssc_is_inter(copy))
+-              nfsd4_interssc_disconnect(copy->ss_mnt);
++      /*
++       * source's vfsmount of inter-copy will be unmounted
++       * by the laundromat
++       */
+       goto out;
+ }
+ 
+diff --git a/fs/ntfs3/attrib.c b/fs/ntfs3/attrib.c
+index 71f870d497aed..578c2bcfb1d93 100644
+--- a/fs/ntfs3/attrib.c
++++ b/fs/ntfs3/attrib.c
+@@ -101,6 +101,10 @@ static int attr_load_runs(struct ATTRIB *attr, struct 
ntfs_inode *ni,
+ 
+       asize = le32_to_cpu(attr->size);
+       run_off = le16_to_cpu(attr->nres.run_off);
++
++      if (run_off > asize)
++              return -EINVAL;
++
+       err = run_unpack_ex(run, ni->mi.sbi, ni->mi.rno, svcn, evcn,
+                           vcn ? *vcn : svcn, Add2Ptr(attr, run_off),
+                           asize - run_off);
+@@ -1217,6 +1221,11 @@ int attr_load_runs_vcn(struct ntfs_inode *ni, enum 
ATTR_TYPE type,
+       CLST svcn, evcn;
+       u16 ro;
+ 
++      if (!ni) {
++              /* Is record corrupted? */
++              return -ENOENT;
++      }
++
+       attr = ni_find_attr(ni, NULL, NULL, type, name, name_len, &vcn, NULL);
+       if (!attr) {
+               /* Is record corrupted? */
+@@ -1232,6 +1241,10 @@ int attr_load_runs_vcn(struct ntfs_inode *ni, enum 
ATTR_TYPE type,
+       }
+ 
+       ro = le16_to_cpu(attr->nres.run_off);
++
++      if (ro > le32_to_cpu(attr->size))
++              return -EINVAL;
++
+       err = run_unpack_ex(run, ni->mi.sbi, ni->mi.rno, svcn, evcn, svcn,
+                           Add2Ptr(attr, ro), le32_to_cpu(attr->size) - ro);
+       if (err < 0)
+@@ -1901,6 +1914,11 @@ int attr_collapse_range(struct ntfs_inode *ni, u64 vbo, 
u64 bytes)
+                       u16 le_sz;
+                       u16 roff = le16_to_cpu(attr->nres.run_off);
+ 
++                      if (roff > le32_to_cpu(attr->size)) {
++                              err = -EINVAL;
++                              goto out;
++                      }
++
+                       run_unpack_ex(RUN_DEALLOCATE, sbi, ni->mi.rno, svcn,
+                                     evcn1 - 1, svcn, Add2Ptr(attr, roff),
+                                     le32_to_cpu(attr->size) - roff);
+diff --git a/fs/ntfs3/attrlist.c b/fs/ntfs3/attrlist.c
+index bad6d8a849a24..c0c6bcbc8c05c 100644
+--- a/fs/ntfs3/attrlist.c
++++ b/fs/ntfs3/attrlist.c
+@@ -68,6 +68,11 @@ int ntfs_load_attr_list(struct ntfs_inode *ni, struct 
ATTRIB *attr)
+ 
+               run_init(&ni->attr_list.run);
+ 
++              if (run_off > le32_to_cpu(attr->size)) {
++                      err = -EINVAL;
++                      goto out;
++              }
++
+               err = run_unpack_ex(&ni->attr_list.run, ni->mi.sbi, ni->mi.rno,
+                                   0, le64_to_cpu(attr->nres.evcn), 0,
+                                   Add2Ptr(attr, run_off),
+diff --git a/fs/ntfs3/bitmap.c b/fs/ntfs3/bitmap.c
+index 1930640be31a8..45f95c1cb2584 100644
+--- a/fs/ntfs3/bitmap.c
++++ b/fs/ntfs3/bitmap.c
+@@ -661,7 +661,7 @@ int wnd_init(struct wnd_bitmap *wnd, struct super_block 
*sb, size_t nbits)
+       if (!wnd->bits_last)
+               wnd->bits_last = wbits;
+ 
+-      wnd->free_bits = kcalloc(wnd->nwnd, sizeof(u16), GFP_NOFS);
++      wnd->free_bits = kcalloc(wnd->nwnd, sizeof(u16), GFP_NOFS | 
__GFP_NOWARN);
+       if (!wnd->free_bits)
+               return -ENOMEM;
+ 
+diff --git a/fs/ntfs3/frecord.c b/fs/ntfs3/frecord.c
+index 381a38a06ec22..b1b476fb7229b 100644
+--- a/fs/ntfs3/frecord.c
++++ b/fs/ntfs3/frecord.c
+@@ -568,6 +568,12 @@ static int ni_repack(struct ntfs_inode *ni)
+               }
+ 
+               roff = le16_to_cpu(attr->nres.run_off);
++
++              if (roff > le32_to_cpu(attr->size)) {
++                      err = -EINVAL;
++                      break;
++              }
++
+               err = run_unpack(&run, sbi, ni->mi.rno, svcn, evcn, svcn,
+                                Add2Ptr(attr, roff),
+                                le32_to_cpu(attr->size) - roff);
+@@ -1589,6 +1595,9 @@ int ni_delete_all(struct ntfs_inode *ni)
+               asize = le32_to_cpu(attr->size);
+               roff = le16_to_cpu(attr->nres.run_off);
+ 
++              if (roff > asize)
++                      return -EINVAL;
++
+               /* run==1 means unpack and deallocate. */
+               run_unpack_ex(RUN_DEALLOCATE, sbi, ni->mi.rno, svcn, evcn, svcn,
+                             Add2Ptr(attr, roff), asize - roff);
+@@ -2291,6 +2300,11 @@ remove_wof:
+               asize = le32_to_cpu(attr->size);
+               roff = le16_to_cpu(attr->nres.run_off);
+ 
++              if (roff > asize) {
++                      err = -EINVAL;
++                      goto out;
++              }
++
+               /*run==1  Means unpack and deallocate. */
+               run_unpack_ex(RUN_DEALLOCATE, sbi, ni->mi.rno, svcn, evcn, svcn,
+                             Add2Ptr(attr, roff), asize - roff);
+diff --git a/fs/ntfs3/fslog.c b/fs/ntfs3/fslog.c
+index 0d611a6c5511f..c662d2a519072 100644
+--- a/fs/ntfs3/fslog.c
++++ b/fs/ntfs3/fslog.c
+@@ -1132,7 +1132,7 @@ static int read_log_page(struct ntfs_log *log, u32 vbo,
+               return -EINVAL;
+ 
+       if (!*buffer) {
+-              to_free = kmalloc(bytes, GFP_NOFS);
++              to_free = kmalloc(log->page_size, GFP_NOFS);
+               if (!to_free)
+                       return -ENOMEM;
+               *buffer = to_free;
+@@ -1180,10 +1180,7 @@ static int log_read_rst(struct ntfs_log *log, u32 
l_size, bool first,
+                       struct restart_info *info)
+ {
+       u32 skip, vbo;
+-      struct RESTART_HDR *r_page = kmalloc(DefaultLogPageSize, GFP_NOFS);
+-
+-      if (!r_page)
+-              return -ENOMEM;
++      struct RESTART_HDR *r_page = NULL;
+ 
+       /* Determine which restart area we are looking for. */
+       if (first) {
+@@ -1197,7 +1194,6 @@ static int log_read_rst(struct ntfs_log *log, u32 
l_size, bool first,
+       /* Loop continuously until we succeed. */
+       for (; vbo < l_size; vbo = 2 * vbo + skip, skip = 0) {
+               bool usa_error;
+-              u32 sys_page_size;
+               bool brst, bchk;
+               struct RESTART_AREA *ra;
+ 
+@@ -1251,24 +1247,6 @@ static int log_read_rst(struct ntfs_log *log, u32 
l_size, bool first,
+                       goto check_result;
+               }
+ 
+-              /* Read the entire restart area. */
+-              sys_page_size = le32_to_cpu(r_page->sys_page_size);
+-              if (DefaultLogPageSize != sys_page_size) {
+-                      kfree(r_page);
+-                      r_page = kzalloc(sys_page_size, GFP_NOFS);
+-                      if (!r_page)
+-                              return -ENOMEM;
+-
+-                      if (read_log_page(log, vbo,
+-                                        (struct RECORD_PAGE_HDR **)&r_page,
+-                                        &usa_error)) {
+-                              /* Ignore any errors. */
+-                              kfree(r_page);
+-                              r_page = NULL;
+-                              continue;
+-                      }
+-              }
+-
+               if (is_client_area_valid(r_page, usa_error)) {
+                       info->valid_page = true;
+                       ra = Add2Ptr(r_page, le16_to_cpu(r_page->ra_off));
+@@ -2727,6 +2705,9 @@ static inline bool check_attr(const struct MFT_REC *rec,
+                       return false;
+               }
+ 
++              if (run_off > asize)
++                      return false;
++
+               if (run_unpack(NULL, sbi, 0, svcn, evcn, svcn,
+                              Add2Ptr(attr, run_off), asize - run_off) < 0) {
+                       return false;
+@@ -4771,6 +4752,12 @@ fake_attr:
+               u16 roff = le16_to_cpu(attr->nres.run_off);
+               CLST svcn = le64_to_cpu(attr->nres.svcn);
+ 
++              if (roff > t32) {
++                      kfree(oa->attr);
++                      oa->attr = NULL;
++                      goto fake_attr;
++              }
++
+               err = run_unpack(&oa->run0, sbi, inode->i_ino, svcn,
+                                le64_to_cpu(attr->nres.evcn), svcn,
+                                Add2Ptr(attr, roff), t32 - roff);
+diff --git a/fs/ntfs3/fsntfs.c b/fs/ntfs3/fsntfs.c
+index 4ed15f64b17f6..b6e22bcb929ba 100644
+--- a/fs/ntfs3/fsntfs.c
++++ b/fs/ntfs3/fsntfs.c
+@@ -1849,9 +1849,10 @@ int ntfs_security_init(struct ntfs_sb_info *sbi)
+               goto out;
+       }
+ 
+-      root_sdh = resident_data(attr);
++      root_sdh = resident_data_ex(attr, sizeof(struct INDEX_ROOT));
+       if (root_sdh->type != ATTR_ZERO ||
+-          root_sdh->rule != NTFS_COLLATION_TYPE_SECURITY_HASH) {
++          root_sdh->rule != NTFS_COLLATION_TYPE_SECURITY_HASH ||
++          offsetof(struct INDEX_ROOT, ihdr) + root_sdh->ihdr.used > 
attr->res.data_size) {
+               err = -EINVAL;
+               goto out;
+       }
+@@ -1867,9 +1868,10 @@ int ntfs_security_init(struct ntfs_sb_info *sbi)
+               goto out;
+       }
+ 
+-      root_sii = resident_data(attr);
++      root_sii = resident_data_ex(attr, sizeof(struct INDEX_ROOT));
+       if (root_sii->type != ATTR_ZERO ||
+-          root_sii->rule != NTFS_COLLATION_TYPE_UINT) {
++          root_sii->rule != NTFS_COLLATION_TYPE_UINT ||
++          offsetof(struct INDEX_ROOT, ihdr) + root_sii->ihdr.used > 
attr->res.data_size) {
+               err = -EINVAL;
+               goto out;
+       }
+diff --git a/fs/ntfs3/index.c b/fs/ntfs3/index.c
+index 440328147e7e3..c27b4fe575136 100644
+--- a/fs/ntfs3/index.c
++++ b/fs/ntfs3/index.c
+@@ -1017,6 +1017,12 @@ ok:
+               err = 0;
+       }
+ 
++      /* check for index header length */
++      if (offsetof(struct INDEX_BUFFER, ihdr) + ib->ihdr.used > bytes) {
++              err = -EINVAL;
++              goto out;
++      }
++
+       in->index = ib;
+       *node = in;
+ 
+diff --git a/fs/ntfs3/inode.c b/fs/ntfs3/inode.c
+index d5a3afbbbfd8c..e352aa37330cd 100644
+--- a/fs/ntfs3/inode.c
++++ b/fs/ntfs3/inode.c
+@@ -129,6 +129,9 @@ next_attr:
+       rsize = attr->non_res ? 0 : le32_to_cpu(attr->res.data_size);
+       asize = le32_to_cpu(attr->size);
+ 
++      if (le16_to_cpu(attr->name_off) + attr->name_len > asize)
++              goto out;
++
+       switch (attr->type) {
+       case ATTR_STD:
+               if (attr->non_res ||
+@@ -364,7 +367,13 @@ next_attr:
+ attr_unpack_run:
+       roff = le16_to_cpu(attr->nres.run_off);
+ 
++      if (roff > asize) {
++              err = -EINVAL;
++              goto out;
++      }
++
+       t64 = le64_to_cpu(attr->nres.svcn);
++
+       err = run_unpack_ex(run, sbi, ino, t64, le64_to_cpu(attr->nres.evcn),
+                           t64, Add2Ptr(attr, roff), asize - roff);
+       if (err < 0)
+diff --git a/fs/ntfs3/record.c b/fs/ntfs3/record.c
+index 7d2fac5ee2156..af1e4b364ea8e 100644
+--- a/fs/ntfs3/record.c
++++ b/fs/ntfs3/record.c
+@@ -220,6 +220,11 @@ struct ATTRIB *mi_enum_attr(struct mft_inode *mi, struct 
ATTRIB *attr)
+                       return NULL;
+               }
+ 
++              if (off + asize < off) {
++                      /* overflow check */
++                      return NULL;
++              }
++
+               attr = Add2Ptr(attr, asize);
+               off += asize;
+       }
+@@ -260,6 +265,11 @@ struct ATTRIB *mi_enum_attr(struct mft_inode *mi, struct 
ATTRIB *attr)
+               if (t16 + t32 > asize)
+                       return NULL;
+ 
++              if (attr->name_len &&
++                  le16_to_cpu(attr->name_off) + sizeof(short) * 
attr->name_len > t16) {
++                      return NULL;
++              }
++
+               return attr;
+       }
+ 
+diff --git a/fs/ntfs3/super.c b/fs/ntfs3/super.c
+index adc4f73722b7c..8e2fe0f69203b 100644
+--- a/fs/ntfs3/super.c
++++ b/fs/ntfs3/super.c
+@@ -789,7 +789,7 @@ static int ntfs_init_from_boot(struct super_block *sb, u32 
sector_size,
+                                                : (u32)boot->record_size
+                                                          << sbi->cluster_bits;
+ 
+-      if (record_size > MAXIMUM_BYTES_PER_MFT)
++      if (record_size > MAXIMUM_BYTES_PER_MFT || record_size < SECTOR_SIZE)
+               goto out;
+ 
+       sbi->record_bits = blksize_bits(record_size);
+@@ -1141,7 +1141,7 @@ static int ntfs_fill_super(struct super_block *sb, 
struct fs_context *fc)
+               goto put_inode_out;
+       }
+       bytes = inode->i_size;
+-      sbi->def_table = t = kmalloc(bytes, GFP_NOFS);
++      sbi->def_table = t = kmalloc(bytes, GFP_NOFS | __GFP_NOWARN);
+       if (!t) {
+               err = -ENOMEM;
+               goto put_inode_out;
+@@ -1260,9 +1260,9 @@ load_root:
+       ref.low = cpu_to_le32(MFT_REC_ROOT);
+       ref.seq = cpu_to_le16(MFT_REC_ROOT);
+       inode = ntfs_iget5(sb, &ref, &NAME_ROOT);
+-      if (IS_ERR(inode)) {
++      if (IS_ERR(inode) || !inode->i_op) {
+               ntfs_err(sb, "Failed to load root.");
+-              err = PTR_ERR(inode);
++              err = IS_ERR(inode) ? PTR_ERR(inode) : -EINVAL;
+               goto out;
+       }
+ 
+@@ -1281,6 +1281,7 @@ out:
+        * Free resources here.
+        * ntfs_fs_free will be called with fc->s_fs_info = NULL
+        */
++      put_mount_options(sbi->options);
+       put_ntfs(sbi);
+       sb->s_fs_info = NULL;
+ 
+diff --git a/fs/overlayfs/dir.c b/fs/overlayfs/dir.c
+index 6b03457f72bb1..c3032cef391ef 100644
+--- a/fs/overlayfs/dir.c
++++ b/fs/overlayfs/dir.c
+@@ -592,28 +592,42 @@ static int ovl_create_or_link(struct dentry *dentry, 
struct inode *inode,
+                       goto out_revert_creds;
+       }
+ 
+-      err = -ENOMEM;
+-      override_cred = prepare_creds();
+-      if (override_cred) {
++      if (!attr->hardlink) {
++              err = -ENOMEM;
++              override_cred = prepare_creds();
++              if (!override_cred)
++                      goto out_revert_creds;
++              /*
++               * In the creation cases(create, mkdir, mknod, symlink),
++               * ovl should transfer current's fs{u,g}id to underlying
++               * fs. Because underlying fs want to initialize its new
++               * inode owner using current's fs{u,g}id. And in this
++               * case, the @inode is a new inode that is initialized
++               * in inode_init_owner() to current's fs{u,g}id. So use
++               * the inode's i_{u,g}id to override the cred's fs{u,g}id.
++               *
++               * But in the other hardlink case, ovl_link() does not
++               * create a new inode, so just use the ovl mounter's
++               * fs{u,g}id.
++               */
+               override_cred->fsuid = inode->i_uid;
+               override_cred->fsgid = inode->i_gid;
+-              if (!attr->hardlink) {
+-                      err = security_dentry_create_files_as(dentry,
+-                                      attr->mode, &dentry->d_name, old_cred,
+-                                      override_cred);
+-                      if (err) {
+-                              put_cred(override_cred);
+-                              goto out_revert_creds;
+-                      }
++              err = security_dentry_create_files_as(dentry,
++                              attr->mode, &dentry->d_name, old_cred,
++                              override_cred);
++              if (err) {
++                      put_cred(override_cred);
++                      goto out_revert_creds;
+               }
+               put_cred(override_creds(override_cred));
+               put_cred(override_cred);
+-
+-              if (!ovl_dentry_is_whiteout(dentry))
+-                      err = ovl_create_upper(dentry, inode, attr);
+-              else
+-                      err = ovl_create_over_whiteout(dentry, inode, attr);
+       }
++
++      if (!ovl_dentry_is_whiteout(dentry))
++              err = ovl_create_upper(dentry, inode, attr);
++      else
++              err = ovl_create_over_whiteout(dentry, inode, attr);
++
+ out_revert_creds:
+       revert_creds(old_cred);
+       return err;
+diff --git a/fs/overlayfs/file.c b/fs/overlayfs/file.c
+index d066be3b9226e..6011f955436ba 100644
+--- a/fs/overlayfs/file.c
++++ b/fs/overlayfs/file.c
+@@ -96,6 +96,7 @@ static int ovl_change_flags(struct file *file, unsigned int 
flags)
+ 
+       spin_lock(&file->f_lock);
+       file->f_flags = (file->f_flags & ~OVL_SETFL_MASK) | flags;
++      file->f_iocb_flags = iocb_flags(file);
+       spin_unlock(&file->f_lock);
+ 
+       return 0;
+diff --git a/fs/pnode.c b/fs/pnode.c
+index 1106137c747a3..468e4e65a615d 100644
+--- a/fs/pnode.c
++++ b/fs/pnode.c
+@@ -244,7 +244,7 @@ static int propagate_one(struct mount *m)
+               }
+               do {
+                       struct mount *parent = last_source->mnt_parent;
+-                      if (last_source == first_source)
++                      if (peers(last_source, first_source))
+                               break;
+                       done = parent->mnt_master == p;
+                       if (done && peers(n, parent))
+diff --git a/fs/pstore/ram.c b/fs/pstore/ram.c
+index 74e4d93f3e08d..f3fa3625d772c 100644
+--- a/fs/pstore/ram.c
++++ b/fs/pstore/ram.c
+@@ -670,7 +670,7 @@ static int ramoops_parse_dt(struct platform_device *pdev,
+               field = value;                                          \
+       }
+ 
+-      parse_u32("mem-type", pdata->record_size, pdata->mem_type);
++      parse_u32("mem-type", pdata->mem_type, pdata->mem_type);
+       parse_u32("record-size", pdata->record_size, 0);
+       parse_u32("console-size", pdata->console_size, 0);
+       parse_u32("ftrace-size", pdata->ftrace_size, 0);
+diff --git a/fs/pstore/zone.c b/fs/pstore/zone.c
+index 017d0d4ad3295..2770746bb7aa1 100644
+--- a/fs/pstore/zone.c
++++ b/fs/pstore/zone.c
+@@ -761,7 +761,7 @@ static inline int notrace psz_kmsg_write_record(struct 
psz_context *cxt,
+               /* avoid destroying old data, allocate a new one */
+               len = zone->buffer_size + sizeof(*zone->buffer);
+               zone->oldbuf = zone->buffer;
+-              zone->buffer = kzalloc(len, GFP_KERNEL);
++              zone->buffer = kzalloc(len, GFP_ATOMIC);
+               if (!zone->buffer) {
+                       zone->buffer = zone->oldbuf;
+                       return -ENOMEM;
+diff --git a/include/linux/eventfd.h b/include/linux/eventfd.h
+index 3cd202d3eefb3..36a486505b081 100644
+--- a/include/linux/eventfd.h
++++ b/include/linux/eventfd.h
+@@ -40,6 +40,7 @@ struct file *eventfd_fget(int fd);
+ struct eventfd_ctx *eventfd_ctx_fdget(int fd);
+ struct eventfd_ctx *eventfd_ctx_fileget(struct file *file);
+ __u64 eventfd_signal(struct eventfd_ctx *ctx, __u64 n);
++__u64 eventfd_signal_mask(struct eventfd_ctx *ctx, __u64 n, unsigned mask);
+ int eventfd_ctx_remove_wait_queue(struct eventfd_ctx *ctx, wait_queue_entry_t 
*wait,
+                                 __u64 *cnt);
+ void eventfd_ctx_do_read(struct eventfd_ctx *ctx, __u64 *cnt);
+@@ -66,6 +67,12 @@ static inline int eventfd_signal(struct eventfd_ctx *ctx, 
__u64 n)
+       return -ENOSYS;
+ }
+ 
++static inline int eventfd_signal_mask(struct eventfd_ctx *ctx, __u64 n,
++                                    unsigned mask)
++{
++      return -ENOSYS;
++}
++
+ static inline void eventfd_ctx_put(struct eventfd_ctx *ctx)
+ {
+ 
+diff --git a/include/linux/nvme.h b/include/linux/nvme.h
+index 050d7d0cd81b0..d9fbc5afeaf72 100644
+--- a/include/linux/nvme.h
++++ b/include/linux/nvme.h
+@@ -7,6 +7,7 @@
+ #ifndef _LINUX_NVME_H
+ #define _LINUX_NVME_H
+ 
++#include <linux/bits.h>
+ #include <linux/types.h>
+ #include <linux/uuid.h>
+ 
+@@ -639,7 +640,7 @@ enum {
+       NVME_CMD_EFFECTS_NCC            = 1 << 2,
+       NVME_CMD_EFFECTS_NIC            = 1 << 3,
+       NVME_CMD_EFFECTS_CCC            = 1 << 4,
+-      NVME_CMD_EFFECTS_CSE_MASK       = 3 << 16,
++      NVME_CMD_EFFECTS_CSE_MASK       = GENMASK(18, 16),
+       NVME_CMD_EFFECTS_UUID_SEL       = 1 << 19,
+ };
+ 
+diff --git a/include/uapi/linux/eventpoll.h b/include/uapi/linux/eventpoll.h
+index 8a3432d0f0dcb..e687658843b1c 100644
+--- a/include/uapi/linux/eventpoll.h
++++ b/include/uapi/linux/eventpoll.h
+@@ -41,6 +41,12 @@
+ #define EPOLLMSG      (__force __poll_t)0x00000400
+ #define EPOLLRDHUP    (__force __poll_t)0x00002000
+ 
++/*
++ * Internal flag - wakeup generated by io_uring, used to detect recursion back
++ * into the io_uring poll handler.
++ */
++#define EPOLL_URING_WAKE      ((__force __poll_t)(1U << 27))
++
+ /* Set exclusive wakeup mode for the target file descriptor */
+ #define EPOLLEXCLUSIVE        ((__force __poll_t)(1U << 28))
+ 
+diff --git a/io_uring/io_uring.c b/io_uring/io_uring.c
+index 17771cb3c3330..71f1cabb9f3d4 100644
+--- a/io_uring/io_uring.c
++++ b/io_uring/io_uring.c
+@@ -495,7 +495,7 @@ static void io_eventfd_ops(struct rcu_head *rcu)
+       int ops = atomic_xchg(&ev_fd->ops, 0);
+ 
+       if (ops & BIT(IO_EVENTFD_OP_SIGNAL_BIT))
+-              eventfd_signal(ev_fd->cq_ev_fd, 1);
++              eventfd_signal_mask(ev_fd->cq_ev_fd, 1, EPOLL_URING_WAKE);
+ 
+       /* IO_EVENTFD_OP_FREE_BIT may not be set here depending on callback
+        * ordering in a race but if references are 0 we know we have to free
+@@ -531,7 +531,7 @@ static void io_eventfd_signal(struct io_ring_ctx *ctx)
+               goto out;
+ 
+       if (likely(eventfd_signal_allowed())) {
+-              eventfd_signal(ev_fd->cq_ev_fd, 1);
++              eventfd_signal_mask(ev_fd->cq_ev_fd, 1, EPOLL_URING_WAKE);
+       } else {
+               atomic_inc(&ev_fd->refs);
+               if (!atomic_fetch_or(BIT(IO_EVENTFD_OP_SIGNAL_BIT), 
&ev_fd->ops))
+diff --git a/io_uring/io_uring.h b/io_uring/io_uring.h
+index 50bc3af449534..4334cd30c423d 100644
+--- a/io_uring/io_uring.h
++++ b/io_uring/io_uring.h
+@@ -4,6 +4,7 @@
+ #include <linux/errno.h>
+ #include <linux/lockdep.h>
+ #include <linux/io_uring_types.h>
++#include <uapi/linux/eventpoll.h>
+ #include "io-wq.h"
+ #include "slist.h"
+ #include "filetable.h"
+@@ -207,12 +208,18 @@ static inline void io_commit_cqring(struct io_ring_ctx 
*ctx)
+ static inline void __io_cqring_wake(struct io_ring_ctx *ctx)
+ {
+       /*
+-       * wake_up_all() may seem excessive, but io_wake_function() and
+-       * io_should_wake() handle the termination of the loop and only
+-       * wake as many waiters as we need to.
++       * Trigger waitqueue handler on all waiters on our waitqueue. This
++       * won't necessarily wake up all the tasks, io_should_wake() will make
++       * that decision.
++       *
++       * Pass in EPOLLIN|EPOLL_URING_WAKE as the poll wakeup key. The latter
++       * set in the mask so that if we recurse back into our own poll
++       * waitqueue handlers, we know we have a dependency between eventfd or
++       * epoll and should terminate multishot poll at that point.
+        */
+       if (waitqueue_active(&ctx->cq_wait))
+-              wake_up_all(&ctx->cq_wait);
++              __wake_up(&ctx->cq_wait, TASK_NORMAL, 0,
++                              poll_to_key(EPOLL_URING_WAKE | EPOLLIN));
+ }
+ 
+ static inline void io_cqring_wake(struct io_ring_ctx *ctx)
+diff --git a/io_uring/poll.c b/io_uring/poll.c
+index d9bf1767867e6..fded1445a803b 100644
+--- a/io_uring/poll.c
++++ b/io_uring/poll.c
+@@ -429,6 +429,14 @@ static int io_poll_wake(struct wait_queue_entry *wait, 
unsigned mode, int sync,
+               return 0;
+ 
+       if (io_poll_get_ownership(req)) {
++              /*
++               * If we trigger a multishot poll off our own wakeup path,
++               * disable multishot as there is a circular dependency between
++               * CQ posting and triggering the event.
++               */
++              if (mask & EPOLL_URING_WAKE)
++                      poll->events |= EPOLLONESHOT;
++
+               /* optional, saves extra locking for removal in tw handler */
+               if (mask && poll->events & EPOLLONESHOT) {
+                       list_del_init(&poll->wait.entry);
+diff --git a/kernel/futex/syscalls.c b/kernel/futex/syscalls.c
+index 086a22d1adb78..a8074079b09e8 100644
+--- a/kernel/futex/syscalls.c
++++ b/kernel/futex/syscalls.c
+@@ -286,19 +286,22 @@ SYSCALL_DEFINE5(futex_waitv, struct futex_waitv __user 
*, waiters,
+       }
+ 
+       futexv = kcalloc(nr_futexes, sizeof(*futexv), GFP_KERNEL);
+-      if (!futexv)
+-              return -ENOMEM;
++      if (!futexv) {
++              ret = -ENOMEM;
++              goto destroy_timer;
++      }
+ 
+       ret = futex_parse_waitv(futexv, waiters, nr_futexes);
+       if (!ret)
+               ret = futex_wait_multiple(futexv, nr_futexes, timeout ? &to : 
NULL);
+ 
++      kfree(futexv);
++
++destroy_timer:
+       if (timeout) {
+               hrtimer_cancel(&to.timer);
+               destroy_hrtimer_on_stack(&to.timer);
+       }
+-
+-      kfree(futexv);
+       return ret;
+ }
+ 
+diff --git a/kernel/kcsan/core.c b/kernel/kcsan/core.c
+index fe12dfe254ecf..54d077e1a2dc7 100644
+--- a/kernel/kcsan/core.c
++++ b/kernel/kcsan/core.c
+@@ -14,10 +14,12 @@
+ #include <linux/init.h>
+ #include <linux/kernel.h>
+ #include <linux/list.h>
++#include <linux/minmax.h>
+ #include <linux/moduleparam.h>
+ #include <linux/percpu.h>
+ #include <linux/preempt.h>
+ #include <linux/sched.h>
++#include <linux/string.h>
+ #include <linux/uaccess.h>
+ 
+ #include "encoding.h"
+@@ -1308,3 +1310,51 @@ noinline void __tsan_atomic_signal_fence(int memorder)
+       }
+ }
+ EXPORT_SYMBOL(__tsan_atomic_signal_fence);
++
++#ifdef __HAVE_ARCH_MEMSET
++void *__tsan_memset(void *s, int c, size_t count);
++noinline void *__tsan_memset(void *s, int c, size_t count)
++{
++      /*
++       * Instead of not setting up watchpoints where accessed size is greater
++       * than MAX_ENCODABLE_SIZE, truncate checked size to MAX_ENCODABLE_SIZE.
++       */
++      size_t check_len = min_t(size_t, count, MAX_ENCODABLE_SIZE);
++
++      check_access(s, check_len, KCSAN_ACCESS_WRITE, _RET_IP_);
++      return memset(s, c, count);
++}
++#else
++void *__tsan_memset(void *s, int c, size_t count) __alias(memset);
++#endif
++EXPORT_SYMBOL(__tsan_memset);
++
++#ifdef __HAVE_ARCH_MEMMOVE
++void *__tsan_memmove(void *dst, const void *src, size_t len);
++noinline void *__tsan_memmove(void *dst, const void *src, size_t len)
++{
++      size_t check_len = min_t(size_t, len, MAX_ENCODABLE_SIZE);
++
++      check_access(dst, check_len, KCSAN_ACCESS_WRITE, _RET_IP_);
++      check_access(src, check_len, 0, _RET_IP_);
++      return memmove(dst, src, len);
++}
++#else
++void *__tsan_memmove(void *dst, const void *src, size_t len) __alias(memmove);
++#endif
++EXPORT_SYMBOL(__tsan_memmove);
++
++#ifdef __HAVE_ARCH_MEMCPY
++void *__tsan_memcpy(void *dst, const void *src, size_t len);
++noinline void *__tsan_memcpy(void *dst, const void *src, size_t len)
++{
++      size_t check_len = min_t(size_t, len, MAX_ENCODABLE_SIZE);
++
++      check_access(dst, check_len, KCSAN_ACCESS_WRITE, _RET_IP_);
++      check_access(src, check_len, 0, _RET_IP_);
++      return memcpy(dst, src, len);
++}
++#else
++void *__tsan_memcpy(void *dst, const void *src, size_t len) __alias(memcpy);
++#endif
++EXPORT_SYMBOL(__tsan_memcpy);
+diff --git a/kernel/kprobes.c b/kernel/kprobes.c
+index a35074f0daa1a..1c18ecf9f98b1 100644
+--- a/kernel/kprobes.c
++++ b/kernel/kprobes.c
+@@ -2213,13 +2213,9 @@ int register_kretprobe(struct kretprobe *rp)
+       rp->kp.post_handler = NULL;
+ 
+       /* Pre-allocate memory for max kretprobe instances */
+-      if (rp->maxactive <= 0) {
+-#ifdef CONFIG_PREEMPTION
++      if (rp->maxactive <= 0)
+               rp->maxactive = max_t(unsigned int, 10, 2*num_possible_cpus());
+-#else
+-              rp->maxactive = num_possible_cpus();
+-#endif
+-      }
++
+ #ifdef CONFIG_KRETPROBE_ON_RETHOOK
+       rp->rh = rethook_alloc((void *)rp, kretprobe_rethook_handler);
+       if (!rp->rh)
+diff --git a/kernel/locking/rtmutex.c b/kernel/locking/rtmutex.c
+index 7779ee8abc2a0..010cf4e6d0b8f 100644
+--- a/kernel/locking/rtmutex.c
++++ b/kernel/locking/rtmutex.c
+@@ -89,15 +89,31 @@ static inline int __ww_mutex_check_kill(struct rt_mutex 
*lock,
+  * set this bit before looking at the lock.
+  */
+ 
+-static __always_inline void
+-rt_mutex_set_owner(struct rt_mutex_base *lock, struct task_struct *owner)
++static __always_inline struct task_struct *
++rt_mutex_owner_encode(struct rt_mutex_base *lock, struct task_struct *owner)
+ {
+       unsigned long val = (unsigned long)owner;
+ 
+       if (rt_mutex_has_waiters(lock))
+               val |= RT_MUTEX_HAS_WAITERS;
+ 
+-      WRITE_ONCE(lock->owner, (struct task_struct *)val);
++      return (struct task_struct *)val;
++}
++
++static __always_inline void
++rt_mutex_set_owner(struct rt_mutex_base *lock, struct task_struct *owner)
++{
++      /*
++       * lock->wait_lock is held but explicit acquire semantics are needed
++       * for a new lock owner so WRITE_ONCE is insufficient.
++       */
++      xchg_acquire(&lock->owner, rt_mutex_owner_encode(lock, owner));
++}
++
++static __always_inline void rt_mutex_clear_owner(struct rt_mutex_base *lock)
++{
++      /* lock->wait_lock is held so the unlock provides release semantics. */
++      WRITE_ONCE(lock->owner, rt_mutex_owner_encode(lock, NULL));
+ }
+ 
+ static __always_inline void clear_rt_mutex_waiters(struct rt_mutex_base *lock)
+@@ -106,7 +122,8 @@ static __always_inline void clear_rt_mutex_waiters(struct 
rt_mutex_base *lock)
+                       ((unsigned long)lock->owner & ~RT_MUTEX_HAS_WAITERS);
+ }
+ 
+-static __always_inline void fixup_rt_mutex_waiters(struct rt_mutex_base *lock)
++static __always_inline void
++fixup_rt_mutex_waiters(struct rt_mutex_base *lock, bool acquire_lock)
+ {
+       unsigned long owner, *p = (unsigned long *) &lock->owner;
+ 
+@@ -172,8 +189,21 @@ static __always_inline void fixup_rt_mutex_waiters(struct 
rt_mutex_base *lock)
+        * still set.
+        */
+       owner = READ_ONCE(*p);
+-      if (owner & RT_MUTEX_HAS_WAITERS)
+-              WRITE_ONCE(*p, owner & ~RT_MUTEX_HAS_WAITERS);
++      if (owner & RT_MUTEX_HAS_WAITERS) {
++              /*
++               * See rt_mutex_set_owner() and rt_mutex_clear_owner() on
++               * why xchg_acquire() is used for updating owner for
++               * locking and WRITE_ONCE() for unlocking.
++               *
++               * WRITE_ONCE() would work for the acquire case too, but
++               * in case that the lock acquisition failed it might
++               * force other lockers into the slow path unnecessarily.
++               */
++              if (acquire_lock)
++                      xchg_acquire(p, owner & ~RT_MUTEX_HAS_WAITERS);
++              else
++                      WRITE_ONCE(*p, owner & ~RT_MUTEX_HAS_WAITERS);
++      }
+ }
+ 
+ /*
+@@ -208,6 +238,13 @@ static __always_inline void mark_rt_mutex_waiters(struct 
rt_mutex_base *lock)
+               owner = *p;
+       } while (cmpxchg_relaxed(p, owner,
+                                owner | RT_MUTEX_HAS_WAITERS) != owner);
++
++      /*
++       * The cmpxchg loop above is relaxed to avoid back-to-back ACQUIRE
++       * operations in the event of contention. Ensure the successful
++       * cmpxchg is visible.
++       */
++      smp_mb__after_atomic();
+ }
+ 
+ /*
+@@ -1243,7 +1280,7 @@ static int __sched __rt_mutex_slowtrylock(struct 
rt_mutex_base *lock)
+        * try_to_take_rt_mutex() sets the lock waiters bit
+        * unconditionally. Clean this up.
+        */
+-      fixup_rt_mutex_waiters(lock);
++      fixup_rt_mutex_waiters(lock, true);
+ 
+       return ret;
+ }
+@@ -1604,7 +1641,7 @@ static int __sched __rt_mutex_slowlock(struct 
rt_mutex_base *lock,
+        * try_to_take_rt_mutex() sets the waiter bit
+        * unconditionally. We might have to fix that up.
+        */
+-      fixup_rt_mutex_waiters(lock);
++      fixup_rt_mutex_waiters(lock, true);
+ 
+       trace_contention_end(lock, ret);
+ 
+@@ -1719,7 +1756,7 @@ static void __sched rtlock_slowlock_locked(struct 
rt_mutex_base *lock)
+        * try_to_take_rt_mutex() sets the waiter bit unconditionally.
+        * We might have to fix that up:
+        */
+-      fixup_rt_mutex_waiters(lock);
++      fixup_rt_mutex_waiters(lock, true);
+       debug_rt_mutex_free_waiter(&waiter);
+ 
+       trace_contention_end(lock, 0);
+diff --git a/kernel/locking/rtmutex_api.c b/kernel/locking/rtmutex_api.c
+index 900220941caac..cb9fdff76a8a3 100644
+--- a/kernel/locking/rtmutex_api.c
++++ b/kernel/locking/rtmutex_api.c
+@@ -267,7 +267,7 @@ void __sched rt_mutex_init_proxy_locked(struct 
rt_mutex_base *lock,
+ void __sched rt_mutex_proxy_unlock(struct rt_mutex_base *lock)
+ {
+       debug_rt_mutex_proxy_unlock(lock);
+-      rt_mutex_set_owner(lock, NULL);
++      rt_mutex_clear_owner(lock);
+ }
+ 
+ /**
+@@ -382,7 +382,7 @@ int __sched rt_mutex_wait_proxy_lock(struct rt_mutex_base 
*lock,
+        * try_to_take_rt_mutex() sets the waiter bit unconditionally. We might
+        * have to fix that up.
+        */
+-      fixup_rt_mutex_waiters(lock);
++      fixup_rt_mutex_waiters(lock, true);
+       raw_spin_unlock_irq(&lock->wait_lock);
+ 
+       return ret;
+@@ -438,7 +438,7 @@ bool __sched rt_mutex_cleanup_proxy_lock(struct 
rt_mutex_base *lock,
+        * try_to_take_rt_mutex() sets the waiter bit unconditionally. We might
+        * have to fix that up.
+        */
+-      fixup_rt_mutex_waiters(lock);
++      fixup_rt_mutex_waiters(lock, false);
+ 
+       raw_spin_unlock_irq(&lock->wait_lock);
+ 
+diff --git a/mm/compaction.c b/mm/compaction.c
+index 1f6da31dd9a50..ca1603524bbe0 100644
+--- a/mm/compaction.c
++++ b/mm/compaction.c
+@@ -1344,7 +1344,7 @@ move_freelist_tail(struct list_head *freelist, struct 
page *freepage)
+ }
+ 
+ static void
+-fast_isolate_around(struct compact_control *cc, unsigned long pfn, unsigned 
long nr_isolated)
++fast_isolate_around(struct compact_control *cc, unsigned long pfn)
+ {
+       unsigned long start_pfn, end_pfn;
+       struct page *page;
+@@ -1365,21 +1365,13 @@ fast_isolate_around(struct compact_control *cc, 
unsigned long pfn, unsigned long
+       if (!page)
+               return;
+ 
+-      /* Scan before */
+-      if (start_pfn != pfn) {
+-              isolate_freepages_block(cc, &start_pfn, pfn, &cc->freepages, 1, 
false);
+-              if (cc->nr_freepages >= cc->nr_migratepages)
+-                      return;
+-      }
+-
+-      /* Scan after */
+-      start_pfn = pfn + nr_isolated;
+-      if (start_pfn < end_pfn)
+-              isolate_freepages_block(cc, &start_pfn, end_pfn, 
&cc->freepages, 1, false);
++      isolate_freepages_block(cc, &start_pfn, end_pfn, &cc->freepages, 1, 
false);
+ 
+       /* Skip this pageblock in the future as it's full or nearly full */
+       if (cc->nr_freepages < cc->nr_migratepages)
+               set_pageblock_skip(page);
++
++      return;
+ }
+ 
+ /* Search orders in round-robin fashion */
+@@ -1556,7 +1548,7 @@ fast_isolate_freepages(struct compact_control *cc)
+               return cc->free_pfn;
+ 
+       low_pfn = page_to_pfn(page);
+-      fast_isolate_around(cc, low_pfn, nr_isolated);
++      fast_isolate_around(cc, low_pfn);
+       return low_pfn;
+ }
+ 
+diff --git a/mm/kmsan/hooks.c b/mm/kmsan/hooks.c
+index 35f6b6e6a908c..3807502766a3e 100644
+--- a/mm/kmsan/hooks.c
++++ b/mm/kmsan/hooks.c
+@@ -260,6 +260,7 @@ void kmsan_handle_urb(const struct urb *urb, bool is_out)
+                                              urb->transfer_buffer_length,
+                                              /*checked*/ false);
+ }
++EXPORT_SYMBOL_GPL(kmsan_handle_urb);
+ 
+ static void kmsan_handle_dma_page(const void *addr, size_t size,
+                                 enum dma_data_direction dir)
+diff --git a/mm/kmsan/kmsan_test.c b/mm/kmsan/kmsan_test.c
+index 9a29ea2dbfb9b..1328636cbd6cd 100644
+--- a/mm/kmsan/kmsan_test.c
++++ b/mm/kmsan/kmsan_test.c
+@@ -22,6 +22,7 @@
+ #include <linux/spinlock.h>
+ #include <linux/string.h>
+ #include <linux/tracepoint.h>
++#include <linux/vmalloc.h>
+ #include <trace/events/printk.h>
+ 
+ static DEFINE_PER_CPU(int, per_cpu_var);
+diff --git a/mm/mempolicy.c b/mm/mempolicy.c
+index 61aa9aedb7289..02c8a712282f1 100644
+--- a/mm/mempolicy.c
++++ b/mm/mempolicy.c
+@@ -1540,6 +1540,7 @@ SYSCALL_DEFINE4(set_mempolicy_home_node, unsigned long, 
start, unsigned long, le
+                * the home node for vmas we already updated before.
+                */
+               if (new->mode != MPOL_BIND && new->mode != MPOL_PREFERRED_MANY) 
{
++                      mpol_put(new);
+                       err = -EOPNOTSUPP;
+                       break;
+               }
+diff --git a/mm/mremap.c b/mm/mremap.c
+index e465ffe279bb0..fe587c5d65913 100644
+--- a/mm/mremap.c
++++ b/mm/mremap.c
+@@ -1016,7 +1016,8 @@ SYSCALL_DEFINE5(mremap, unsigned long, addr, unsigned 
long, old_len,
+                       long pages = (new_len - old_len) >> PAGE_SHIFT;
+                       unsigned long extension_start = addr + old_len;
+                       unsigned long extension_end = addr + new_len;
+-                      pgoff_t extension_pgoff = vma->vm_pgoff + (old_len >> 
PAGE_SHIFT);
++                      pgoff_t extension_pgoff = vma->vm_pgoff +
++                              ((extension_start - vma->vm_start) >> 
PAGE_SHIFT);
+ 
+                       if (vma->vm_flags & VM_ACCOUNT) {
+                               if (security_vm_enough_memory_mm(mm, pages)) {
+diff --git a/net/sunrpc/auth_gss/svcauth_gss.c 
b/net/sunrpc/auth_gss/svcauth_gss.c
+index bcd74dddbe2db..9a5db285d4ae5 100644
+--- a/net/sunrpc/auth_gss/svcauth_gss.c
++++ b/net/sunrpc/auth_gss/svcauth_gss.c
+@@ -1162,18 +1162,23 @@ static int gss_read_proxy_verf(struct svc_rqst *rqstp,
+               return res;
+ 
+       inlen = svc_getnl(argv);
+-      if (inlen > (argv->iov_len + rqstp->rq_arg.page_len))
++      if (inlen > (argv->iov_len + rqstp->rq_arg.page_len)) {
++              kfree(in_handle->data);
+               return SVC_DENIED;
++      }
+ 
+       pages = DIV_ROUND_UP(inlen, PAGE_SIZE);
+       in_token->pages = kcalloc(pages, sizeof(struct page *), GFP_KERNEL);
+-      if (!in_token->pages)
++      if (!in_token->pages) {
++              kfree(in_handle->data);
+               return SVC_DENIED;
++      }
+       in_token->page_base = 0;
+       in_token->page_len = inlen;
+       for (i = 0; i < pages; i++) {
+               in_token->pages[i] = alloc_page(GFP_KERNEL);
+               if (!in_token->pages[i]) {
++                      kfree(in_handle->data);
+                       gss_free_in_token_pages(in_token);
+                       return SVC_DENIED;
+               }
+diff --git a/sound/pci/hda/patch_hdmi.c b/sound/pci/hda/patch_hdmi.c
+index 8015e44712678..386dd9d9143f9 100644
+--- a/sound/pci/hda/patch_hdmi.c
++++ b/sound/pci/hda/patch_hdmi.c
+@@ -167,6 +167,7 @@ struct hdmi_spec {
+       struct hdmi_ops ops;
+ 
+       bool dyn_pin_out;
++      bool static_pcm_mapping;
+       /* hdmi interrupt trigger control flag for Nvidia codec */
+       bool hdmi_intr_trig_ctrl;
+       bool nv_dp_workaround; /* workaround DP audio infoframe for Nvidia */
+@@ -1525,13 +1526,16 @@ static void update_eld(struct hda_codec *codec,
+        */
+       pcm_jack = pin_idx_to_pcm_jack(codec, per_pin);
+ 
+-      if (eld->eld_valid) {
+-              hdmi_attach_hda_pcm(spec, per_pin);
+-              hdmi_pcm_setup_pin(spec, per_pin);
+-      } else {
+-              hdmi_pcm_reset_pin(spec, per_pin);
+-              hdmi_detach_hda_pcm(spec, per_pin);
++      if (!spec->static_pcm_mapping) {
++              if (eld->eld_valid) {
++                      hdmi_attach_hda_pcm(spec, per_pin);
++                      hdmi_pcm_setup_pin(spec, per_pin);
++              } else {
++                      hdmi_pcm_reset_pin(spec, per_pin);
++                      hdmi_detach_hda_pcm(spec, per_pin);
++              }
+       }
++
+       /* if pcm_idx == -1, it means this is in monitor connection event
+        * we can get the correct pcm_idx now.
+        */
+@@ -2281,8 +2285,8 @@ static int generic_hdmi_build_pcms(struct hda_codec 
*codec)
+       struct hdmi_spec *spec = codec->spec;
+       int idx, pcm_num;
+ 
+-      /* limit the PCM devices to the codec converters */
+-      pcm_num = spec->num_cvts;
++      /* limit the PCM devices to the codec converters or available PINs */
++      pcm_num = min(spec->num_cvts, spec->num_pins);
+       codec_dbg(codec, "hdmi: pcm_num set to %d\n", pcm_num);
+ 
+       for (idx = 0; idx < pcm_num; idx++) {
+@@ -2379,6 +2383,11 @@ static int generic_hdmi_build_controls(struct hda_codec 
*codec)
+               struct hdmi_spec_per_pin *per_pin = get_pin(spec, pin_idx);
+               struct hdmi_eld *pin_eld = &per_pin->sink_eld;
+ 
++              if (spec->static_pcm_mapping) {
++                      hdmi_attach_hda_pcm(spec, per_pin);
++                      hdmi_pcm_setup_pin(spec, per_pin);
++              }
++
+               pin_eld->eld_valid = false;
+               hdmi_present_sense(per_pin, 0);
+       }
+@@ -4419,6 +4428,8 @@ static int patch_atihdmi(struct hda_codec *codec)
+ 
+       spec = codec->spec;
+ 
++      spec->static_pcm_mapping = true;
++
+       spec->ops.pin_get_eld = atihdmi_pin_get_eld;
+       spec->ops.pin_setup_infoframe = atihdmi_pin_setup_infoframe;
+       spec->ops.pin_hbr_setup = atihdmi_pin_hbr_setup;
+diff --git a/sound/usb/line6/driver.c b/sound/usb/line6/driver.c
+index 59faa5a9a7141..b67617b68e509 100644
+--- a/sound/usb/line6/driver.c
++++ b/sound/usb/line6/driver.c
+@@ -304,7 +304,8 @@ static void line6_data_received(struct urb *urb)
+               for (;;) {
+                       done =
+                               line6_midibuf_read(mb, line6->buffer_message,
+-                                              LINE6_MIDI_MESSAGE_MAXLEN);
++                                                 LINE6_MIDI_MESSAGE_MAXLEN,
++                                                 LINE6_MIDIBUF_READ_RX);
+ 
+                       if (done <= 0)
+                               break;
+diff --git a/sound/usb/line6/midi.c b/sound/usb/line6/midi.c
+index ba0e2b7e8fe19..0838632c788e4 100644
+--- a/sound/usb/line6/midi.c
++++ b/sound/usb/line6/midi.c
+@@ -44,7 +44,8 @@ static void line6_midi_transmit(struct snd_rawmidi_substream 
*substream)
+       int req, done;
+ 
+       for (;;) {
+-              req = min(line6_midibuf_bytes_free(mb), line6->max_packet_size);
++              req = min3(line6_midibuf_bytes_free(mb), line6->max_packet_size,
++                         LINE6_FALLBACK_MAXPACKETSIZE);
+               done = snd_rawmidi_transmit_peek(substream, chunk, req);
+ 
+               if (done == 0)
+@@ -56,7 +57,8 @@ static void line6_midi_transmit(struct snd_rawmidi_substream 
*substream)
+ 
+       for (;;) {
+               done = line6_midibuf_read(mb, chunk,
+-                                        LINE6_FALLBACK_MAXPACKETSIZE);
++                                        LINE6_FALLBACK_MAXPACKETSIZE,
++                                        LINE6_MIDIBUF_READ_TX);
+ 
+               if (done == 0)
+                       break;
+diff --git a/sound/usb/line6/midibuf.c b/sound/usb/line6/midibuf.c
+index 6a70463f82c4e..e7f830f7526c9 100644
+--- a/sound/usb/line6/midibuf.c
++++ b/sound/usb/line6/midibuf.c
+@@ -9,6 +9,7 @@
+ 
+ #include "midibuf.h"
+ 
++
+ static int midibuf_message_length(unsigned char code)
+ {
+       int message_length;
+@@ -20,12 +21,7 @@ static int midibuf_message_length(unsigned char code)
+ 
+               message_length = length[(code >> 4) - 8];
+       } else {
+-              /*
+-                 Note that according to the MIDI specification 0xf2 is
+-                 the "Song Position Pointer", but this is used by Line 6
+-                 to send sysex messages to the host.
+-               */
+-              static const int length[] = { -1, 2, -1, 2, -1, -1, 1, 1, 1, 1,
++              static const int length[] = { -1, 2, 2, 2, -1, -1, 1, 1, 1, -1,
+                       1, 1, 1, -1, 1, 1
+               };
+               message_length = length[code & 0x0f];
+@@ -125,7 +121,7 @@ int line6_midibuf_write(struct midi_buffer *this, unsigned 
char *data,
+ }
+ 
+ int line6_midibuf_read(struct midi_buffer *this, unsigned char *data,
+-                     int length)
++                     int length, int read_type)
+ {
+       int bytes_used;
+       int length1, length2;
+@@ -148,9 +144,22 @@ int line6_midibuf_read(struct midi_buffer *this, unsigned 
char *data,
+ 
+       length1 = this->size - this->pos_read;
+ 
+-      /* check MIDI command length */
+       command = this->buf[this->pos_read];
++      /*
++         PODxt always has status byte lower nibble set to 0010,
++         when it means to send 0000, so we correct if here so
++         that control/program changes come on channel 1 and
++         sysex message status byte is correct
++       */
++      if (read_type == LINE6_MIDIBUF_READ_RX) {
++              if (command == 0xb2 || command == 0xc2 || command == 0xf2) {
++                      unsigned char fixed = command & 0xf0;
++                      this->buf[this->pos_read] = fixed;
++                      command = fixed;
++              }
++      }
+ 
++      /* check MIDI command length */
+       if (command & 0x80) {
+               midi_length = midibuf_message_length(command);
+               this->command_prev = command;
+diff --git a/sound/usb/line6/midibuf.h b/sound/usb/line6/midibuf.h
+index 124a8f9f7e96c..542e8d836f87d 100644
+--- a/sound/usb/line6/midibuf.h
++++ b/sound/usb/line6/midibuf.h
+@@ -8,6 +8,9 @@
+ #ifndef MIDIBUF_H
+ #define MIDIBUF_H
+ 
++#define LINE6_MIDIBUF_READ_TX 0
++#define LINE6_MIDIBUF_READ_RX 1
++
+ struct midi_buffer {
+       unsigned char *buf;
+       int size;
+@@ -23,7 +26,7 @@ extern void line6_midibuf_destroy(struct midi_buffer *mb);
+ extern int line6_midibuf_ignore(struct midi_buffer *mb, int length);
+ extern int line6_midibuf_init(struct midi_buffer *mb, int size, int split);
+ extern int line6_midibuf_read(struct midi_buffer *mb, unsigned char *data,
+-                            int length);
++                            int length, int read_type);
+ extern void line6_midibuf_reset(struct midi_buffer *mb);
+ extern int line6_midibuf_write(struct midi_buffer *mb, unsigned char *data,
+                              int length);
+diff --git a/sound/usb/line6/pod.c b/sound/usb/line6/pod.c
+index cd41aa7f03851..d173971e5f029 100644
+--- a/sound/usb/line6/pod.c
++++ b/sound/usb/line6/pod.c
+@@ -159,8 +159,9 @@ static struct line6_pcm_properties pod_pcm_properties = {
+       .bytes_per_channel = 3 /* SNDRV_PCM_FMTBIT_S24_3LE */
+ };
+ 
++
+ static const char pod_version_header[] = {
+-      0xf2, 0x7e, 0x7f, 0x06, 0x02
++      0xf0, 0x7e, 0x7f, 0x06, 0x02
+ };
+ 
+ static char *pod_alloc_sysex_buffer(struct usb_line6_pod *pod, int code,
+diff --git a/tools/objtool/check.c b/tools/objtool/check.c
+index a7f1e6c8bb0a7..51494c3002d91 100644
+--- a/tools/objtool/check.c
++++ b/tools/objtool/check.c
+@@ -207,7 +207,7 @@ static bool __dead_end_function(struct objtool_file *file, 
struct symbol *func,
+               return false;
+ 
+       insn = find_insn(file, func->sec, func->offset);
+-      if (!insn->func)
++      if (!insn || !insn->func)
+               return false;
+ 
+       func_for_each_insn(file, func, insn) {


Reply via email to