commit:     3a9d9184e1f0d412574eabf24e5cd3586f69d3e9
Author:     Mike Pagano <mpagano <AT> gentoo <DOT> org>
AuthorDate: Tue Dec 15 11:15:05 2015 +0000
Commit:     Mike Pagano <mpagano <AT> gentoo <DOT> org>
CommitDate: Tue Dec 15 11:15:05 2015 +0000
URL:        https://gitweb.gentoo.org/proj/linux-patches.git/commit/?id=3a9d9184

Linux patch 4.2.8

 0000_README            |    4 +
 1007_linux-4.2.8.patch | 3882 ++++++++++++++++++++++++++++++++++++++++++++++++
 2 files changed, 3886 insertions(+)

diff --git a/0000_README b/0000_README
index 2299001..5645178 100644
--- a/0000_README
+++ b/0000_README
@@ -71,6 +71,10 @@ Patch:  1006_linux-4.2.7.patch
 From:   http://www.kernel.org
 Desc:   Linux 4.2.7
 
+Patch:  1007_linux-4.2.8.patch
+From:   http://www.kernel.org
+Desc:   Linux 4.2.8
+
 Patch:  1500_XATTR_USER_PREFIX.patch
 From:   https://bugs.gentoo.org/show_bug.cgi?id=470644
 Desc:   Support for namespace user.pax.* on tmpfs.

diff --git a/1007_linux-4.2.8.patch b/1007_linux-4.2.8.patch
new file mode 100644
index 0000000..7aca417
--- /dev/null
+++ b/1007_linux-4.2.8.patch
@@ -0,0 +1,3882 @@
+diff --git a/Makefile b/Makefile
+index f5014eaf2532..06b988951ccb 100644
+--- a/Makefile
++++ b/Makefile
+@@ -1,6 +1,6 @@
+ VERSION = 4
+ PATCHLEVEL = 2
+-SUBLEVEL = 7
++SUBLEVEL = 8
+ EXTRAVERSION =
+ NAME = Hurr durr I'ma sheep
+ 
+diff --git a/drivers/block/rbd.c b/drivers/block/rbd.c
+index 017b7d58ae06..55f8a6a706fc 100644
+--- a/drivers/block/rbd.c
++++ b/drivers/block/rbd.c
+@@ -3439,6 +3439,7 @@ static void rbd_queue_workfn(struct work_struct *work)
+               goto err_rq;
+       }
+       img_request->rq = rq;
++      snapc = NULL; /* img_request consumes a ref */
+ 
+       if (op_type == OBJ_OP_DISCARD)
+               result = rbd_img_request_fill(img_request, OBJ_REQUEST_NODATA,
+diff --git a/drivers/firewire/ohci.c b/drivers/firewire/ohci.c
+index f51d376d10ba..c2f5117fd8cb 100644
+--- a/drivers/firewire/ohci.c
++++ b/drivers/firewire/ohci.c
+@@ -3675,6 +3675,11 @@ static int pci_probe(struct pci_dev *dev,
+ 
+       reg_write(ohci, OHCI1394_IsoXmitIntMaskSet, ~0);
+       ohci->it_context_support = reg_read(ohci, OHCI1394_IsoXmitIntMaskSet);
++      /* JMicron JMB38x often shows 0 at first read, just ignore it */
++      if (!ohci->it_context_support) {
++              ohci_notice(ohci, "overriding IsoXmitIntMask\n");
++              ohci->it_context_support = 0xf;
++      }
+       reg_write(ohci, OHCI1394_IsoXmitIntMaskClear, ~0);
+       ohci->it_context_mask = ohci->it_context_support;
+       ohci->n_it = hweight32(ohci->it_context_mask);
+diff --git a/drivers/media/pci/cobalt/Kconfig 
b/drivers/media/pci/cobalt/Kconfig
+index 6a1c0089bb62..4ecf171d14a2 100644
+--- a/drivers/media/pci/cobalt/Kconfig
++++ b/drivers/media/pci/cobalt/Kconfig
+@@ -1,6 +1,6 @@
+ config VIDEO_COBALT
+       tristate "Cisco Cobalt support"
+-      depends on VIDEO_V4L2 && I2C && MEDIA_CONTROLLER
++      depends on VIDEO_V4L2 && I2C && VIDEO_V4L2_SUBDEV_API
+       depends on PCI_MSI && MTD_COMPLEX_MAPPINGS && GPIOLIB
+       depends on SND
+       select I2C_ALGOBIT
+diff --git a/drivers/net/ethernet/cavium/thunder/nicvf_main.c 
b/drivers/net/ethernet/cavium/thunder/nicvf_main.c
+index 3b90afb8c293..6f2a748524f3 100644
+--- a/drivers/net/ethernet/cavium/thunder/nicvf_main.c
++++ b/drivers/net/ethernet/cavium/thunder/nicvf_main.c
+@@ -1325,7 +1325,12 @@ err_disable_device:
+ static void nicvf_remove(struct pci_dev *pdev)
+ {
+       struct net_device *netdev = pci_get_drvdata(pdev);
+-      struct nicvf *nic = netdev_priv(netdev);
++      struct nicvf *nic;
++
++      if (!netdev)
++              return;
++
++      nic = netdev_priv(netdev);
+ 
+       unregister_netdev(netdev);
+       nicvf_unregister_interrupts(nic);
+diff --git a/drivers/net/ethernet/mellanox/mlx4/resource_tracker.c 
b/drivers/net/ethernet/mellanox/mlx4/resource_tracker.c
+index 731423ca575d..8bead97373ab 100644
+--- a/drivers/net/ethernet/mellanox/mlx4/resource_tracker.c
++++ b/drivers/net/ethernet/mellanox/mlx4/resource_tracker.c
+@@ -4934,26 +4934,41 @@ static void rem_slave_counters(struct mlx4_dev *dev, 
int slave)
+       struct res_counter *counter;
+       struct res_counter *tmp;
+       int err;
+-      int index;
++      int *counters_arr = NULL;
++      int i, j;
+ 
+       err = move_all_busy(dev, slave, RES_COUNTER);
+       if (err)
+               mlx4_warn(dev, "rem_slave_counters: Could not move all counters 
- too busy for slave %d\n",
+                         slave);
+ 
+-      spin_lock_irq(mlx4_tlock(dev));
+-      list_for_each_entry_safe(counter, tmp, counter_list, com.list) {
+-              if (counter->com.owner == slave) {
+-                      index = counter->com.res_id;
+-                      rb_erase(&counter->com.node,
+-                               &tracker->res_tree[RES_COUNTER]);
+-                      list_del(&counter->com.list);
+-                      kfree(counter);
+-                      __mlx4_counter_free(dev, index);
++      counters_arr = kmalloc_array(dev->caps.max_counters,
++                                   sizeof(*counters_arr), GFP_KERNEL);
++      if (!counters_arr)
++              return;
++
++      do {
++              i = 0;
++              j = 0;
++              spin_lock_irq(mlx4_tlock(dev));
++              list_for_each_entry_safe(counter, tmp, counter_list, com.list) {
++                      if (counter->com.owner == slave) {
++                              counters_arr[i++] = counter->com.res_id;
++                              rb_erase(&counter->com.node,
++                                       &tracker->res_tree[RES_COUNTER]);
++                              list_del(&counter->com.list);
++                              kfree(counter);
++                      }
++              }
++              spin_unlock_irq(mlx4_tlock(dev));
++
++              while (j < i) {
++                      __mlx4_counter_free(dev, counters_arr[j++]);
+                       mlx4_release_resource(dev, slave, RES_COUNTER, 1, 0);
+               }
+-      }
+-      spin_unlock_irq(mlx4_tlock(dev));
++      } while (i);
++
++      kfree(counters_arr);
+ }
+ 
+ static void rem_slave_xrcdns(struct mlx4_dev *dev, int slave)
+diff --git a/drivers/net/ethernet/via/via-rhine.c 
b/drivers/net/ethernet/via/via-rhine.c
+index a83263743665..2b7550c43f78 100644
+--- a/drivers/net/ethernet/via/via-rhine.c
++++ b/drivers/net/ethernet/via/via-rhine.c
+@@ -2134,10 +2134,11 @@ static int rhine_rx(struct net_device *dev, int limit)
+                       }
+ 
+                       skb_put(skb, pkt_len);
+-                      skb->protocol = eth_type_trans(skb, dev);
+ 
+                       rhine_rx_vlan_tag(skb, desc, data_size);
+ 
++                      skb->protocol = eth_type_trans(skb, dev);
++
+                       netif_receive_skb(skb);
+ 
+                       u64_stats_update_begin(&rp->rx_stats.syncp);
+diff --git a/drivers/net/phy/broadcom.c b/drivers/net/phy/broadcom.c
+index 9c71295f2fef..85e640440bd9 100644
+--- a/drivers/net/phy/broadcom.c
++++ b/drivers/net/phy/broadcom.c
+@@ -675,7 +675,7 @@ static struct mdio_device_id __maybe_unused broadcom_tbl[] 
= {
+       { PHY_ID_BCM5461, 0xfffffff0 },
+       { PHY_ID_BCM54616S, 0xfffffff0 },
+       { PHY_ID_BCM5464, 0xfffffff0 },
+-      { PHY_ID_BCM5482, 0xfffffff0 },
++      { PHY_ID_BCM5481, 0xfffffff0 },
+       { PHY_ID_BCM5482, 0xfffffff0 },
+       { PHY_ID_BCM50610, 0xfffffff0 },
+       { PHY_ID_BCM50610M, 0xfffffff0 },
+diff --git a/drivers/net/usb/qmi_wwan.c b/drivers/net/usb/qmi_wwan.c
+index 8f1738c3b3c5..de27f510c0f3 100644
+--- a/drivers/net/usb/qmi_wwan.c
++++ b/drivers/net/usb/qmi_wwan.c
+@@ -775,6 +775,7 @@ static const struct usb_device_id products[] = {
+       {QMI_FIXED_INTF(0x2357, 0x9000, 4)},    /* TP-LINK MA260 */
+       {QMI_FIXED_INTF(0x1bc7, 0x1200, 5)},    /* Telit LE920 */
+       {QMI_FIXED_INTF(0x1bc7, 0x1201, 2)},    /* Telit LE920 */
++      {QMI_FIXED_INTF(0x1c9e, 0x9b01, 3)},    /* XS Stick W100-2 from 4G 
Systems */
+       {QMI_FIXED_INTF(0x0b3c, 0xc000, 4)},    /* Olivetti Olicard 100 */
+       {QMI_FIXED_INTF(0x0b3c, 0xc001, 4)},    /* Olivetti Olicard 120 */
+       {QMI_FIXED_INTF(0x0b3c, 0xc002, 4)},    /* Olivetti Olicard 140 */
+diff --git a/fs/btrfs/ctree.h b/fs/btrfs/ctree.h
+index aac314e14188..bb25b8d00570 100644
+--- a/fs/btrfs/ctree.h
++++ b/fs/btrfs/ctree.h
+@@ -3404,7 +3404,7 @@ int btrfs_set_disk_extent_flags(struct 
btrfs_trans_handle *trans,
+ int btrfs_free_extent(struct btrfs_trans_handle *trans,
+                     struct btrfs_root *root,
+                     u64 bytenr, u64 num_bytes, u64 parent, u64 root_objectid,
+-                    u64 owner, u64 offset, int no_quota);
++                    u64 owner, u64 offset);
+ 
+ int btrfs_free_reserved_extent(struct btrfs_root *root, u64 start, u64 len,
+                              int delalloc);
+@@ -3417,7 +3417,7 @@ int btrfs_finish_extent_commit(struct btrfs_trans_handle 
*trans,
+ int btrfs_inc_extent_ref(struct btrfs_trans_handle *trans,
+                        struct btrfs_root *root,
+                        u64 bytenr, u64 num_bytes, u64 parent,
+-                       u64 root_objectid, u64 owner, u64 offset, int 
no_quota);
++                       u64 root_objectid, u64 owner, u64 offset);
+ 
+ int btrfs_start_dirty_block_groups(struct btrfs_trans_handle *trans,
+                                  struct btrfs_root *root);
+diff --git a/fs/btrfs/delayed-ref.c b/fs/btrfs/delayed-ref.c
+index ac3e81da6d4e..7832031fef68 100644
+--- a/fs/btrfs/delayed-ref.c
++++ b/fs/btrfs/delayed-ref.c
+@@ -197,6 +197,119 @@ static inline void drop_delayed_ref(struct 
btrfs_trans_handle *trans,
+               trans->delayed_ref_updates--;
+ }
+ 
++static bool merge_ref(struct btrfs_trans_handle *trans,
++                    struct btrfs_delayed_ref_root *delayed_refs,
++                    struct btrfs_delayed_ref_head *head,
++                    struct btrfs_delayed_ref_node *ref,
++                    u64 seq)
++{
++      struct btrfs_delayed_ref_node *next;
++      bool done = false;
++
++      next = list_first_entry(&head->ref_list, struct btrfs_delayed_ref_node,
++                              list);
++      while (!done && &next->list != &head->ref_list) {
++              int mod;
++              struct btrfs_delayed_ref_node *next2;
++
++              next2 = list_next_entry(next, list);
++
++              if (next == ref)
++                      goto next;
++
++              if (seq && next->seq >= seq)
++                      goto next;
++
++              if (next->type != ref->type)
++                      goto next;
++
++              if ((ref->type == BTRFS_TREE_BLOCK_REF_KEY ||
++                   ref->type == BTRFS_SHARED_BLOCK_REF_KEY) &&
++                  comp_tree_refs(btrfs_delayed_node_to_tree_ref(ref),
++                                 btrfs_delayed_node_to_tree_ref(next),
++                                 ref->type))
++                      goto next;
++              if ((ref->type == BTRFS_EXTENT_DATA_REF_KEY ||
++                   ref->type == BTRFS_SHARED_DATA_REF_KEY) &&
++                  comp_data_refs(btrfs_delayed_node_to_data_ref(ref),
++                                 btrfs_delayed_node_to_data_ref(next)))
++                      goto next;
++
++              if (ref->action == next->action) {
++                      mod = next->ref_mod;
++              } else {
++                      if (ref->ref_mod < next->ref_mod) {
++                              swap(ref, next);
++                              done = true;
++                      }
++                      mod = -next->ref_mod;
++              }
++
++              drop_delayed_ref(trans, delayed_refs, head, next);
++              ref->ref_mod += mod;
++              if (ref->ref_mod == 0) {
++                      drop_delayed_ref(trans, delayed_refs, head, ref);
++                      done = true;
++              } else {
++                      /*
++                       * Can't have multiples of the same ref on a tree block.
++                       */
++                      WARN_ON(ref->type == BTRFS_TREE_BLOCK_REF_KEY ||
++                              ref->type == BTRFS_SHARED_BLOCK_REF_KEY);
++              }
++next:
++              next = next2;
++      }
++
++      return done;
++}
++
++void btrfs_merge_delayed_refs(struct btrfs_trans_handle *trans,
++                            struct btrfs_fs_info *fs_info,
++                            struct btrfs_delayed_ref_root *delayed_refs,
++                            struct btrfs_delayed_ref_head *head)
++{
++      struct btrfs_delayed_ref_node *ref;
++      u64 seq = 0;
++
++      assert_spin_locked(&head->lock);
++
++      if (list_empty(&head->ref_list))
++              return;
++
++      /* We don't have too many refs to merge for data. */
++      if (head->is_data)
++              return;
++
++      spin_lock(&fs_info->tree_mod_seq_lock);
++      if (!list_empty(&fs_info->tree_mod_seq_list)) {
++              struct seq_list *elem;
++
++              elem = list_first_entry(&fs_info->tree_mod_seq_list,
++                                      struct seq_list, list);
++              seq = elem->seq;
++      }
++      spin_unlock(&fs_info->tree_mod_seq_lock);
++
++      ref = list_first_entry(&head->ref_list, struct btrfs_delayed_ref_node,
++                             list);
++      while (&ref->list != &head->ref_list) {
++              if (seq && ref->seq >= seq)
++                      goto next;
++
++              if (merge_ref(trans, delayed_refs, head, ref, seq)) {
++                      if (list_empty(&head->ref_list))
++                              break;
++                      ref = list_first_entry(&head->ref_list,
++                                             struct btrfs_delayed_ref_node,
++                                             list);
++                      continue;
++              }
++next:
++              ref = list_next_entry(ref, list);
++      }
++}
++
+ int btrfs_check_delayed_seq(struct btrfs_fs_info *fs_info,
+                           struct btrfs_delayed_ref_root *delayed_refs,
+                           u64 seq)
+@@ -292,8 +405,7 @@ add_delayed_ref_tail_merge(struct btrfs_trans_handle 
*trans,
+       exist = list_entry(href->ref_list.prev, struct btrfs_delayed_ref_node,
+                          list);
+       /* No need to compare bytenr nor is_head */
+-      if (exist->type != ref->type || exist->no_quota != ref->no_quota ||
+-          exist->seq != ref->seq)
++      if (exist->type != ref->type || exist->seq != ref->seq)
+               goto add_tail;
+ 
+       if ((exist->type == BTRFS_TREE_BLOCK_REF_KEY ||
+@@ -524,7 +636,7 @@ add_delayed_tree_ref(struct btrfs_fs_info *fs_info,
+                    struct btrfs_delayed_ref_head *head_ref,
+                    struct btrfs_delayed_ref_node *ref, u64 bytenr,
+                    u64 num_bytes, u64 parent, u64 ref_root, int level,
+-                   int action, int no_quota)
++                   int action)
+ {
+       struct btrfs_delayed_tree_ref *full_ref;
+       struct btrfs_delayed_ref_root *delayed_refs;
+@@ -546,7 +658,6 @@ add_delayed_tree_ref(struct btrfs_fs_info *fs_info,
+       ref->action = action;
+       ref->is_head = 0;
+       ref->in_tree = 1;
+-      ref->no_quota = no_quota;
+       ref->seq = seq;
+ 
+       full_ref = btrfs_delayed_node_to_tree_ref(ref);
+@@ -579,7 +690,7 @@ add_delayed_data_ref(struct btrfs_fs_info *fs_info,
+                    struct btrfs_delayed_ref_head *head_ref,
+                    struct btrfs_delayed_ref_node *ref, u64 bytenr,
+                    u64 num_bytes, u64 parent, u64 ref_root, u64 owner,
+-                   u64 offset, int action, int no_quota)
++                   u64 offset, int action)
+ {
+       struct btrfs_delayed_data_ref *full_ref;
+       struct btrfs_delayed_ref_root *delayed_refs;
+@@ -602,7 +713,6 @@ add_delayed_data_ref(struct btrfs_fs_info *fs_info,
+       ref->action = action;
+       ref->is_head = 0;
+       ref->in_tree = 1;
+-      ref->no_quota = no_quota;
+       ref->seq = seq;
+ 
+       full_ref = btrfs_delayed_node_to_data_ref(ref);
+@@ -633,17 +743,13 @@ int btrfs_add_delayed_tree_ref(struct btrfs_fs_info 
*fs_info,
+                              struct btrfs_trans_handle *trans,
+                              u64 bytenr, u64 num_bytes, u64 parent,
+                              u64 ref_root,  int level, int action,
+-                             struct btrfs_delayed_extent_op *extent_op,
+-                             int no_quota)
++                             struct btrfs_delayed_extent_op *extent_op)
+ {
+       struct btrfs_delayed_tree_ref *ref;
+       struct btrfs_delayed_ref_head *head_ref;
+       struct btrfs_delayed_ref_root *delayed_refs;
+       struct btrfs_qgroup_extent_record *record = NULL;
+ 
+-      if (!is_fstree(ref_root) || !fs_info->quota_enabled)
+-              no_quota = 0;
+-
+       BUG_ON(extent_op && extent_op->is_data);
+       ref = kmem_cache_alloc(btrfs_delayed_tree_ref_cachep, GFP_NOFS);
+       if (!ref)
+@@ -672,8 +778,7 @@ int btrfs_add_delayed_tree_ref(struct btrfs_fs_info 
*fs_info,
+                                       bytenr, num_bytes, action, 0);
+ 
+       add_delayed_tree_ref(fs_info, trans, head_ref, &ref->node, bytenr,
+-                                 num_bytes, parent, ref_root, level, action,
+-                                 no_quota);
++                           num_bytes, parent, ref_root, level, action);
+       spin_unlock(&delayed_refs->lock);
+ 
+       return 0;
+@@ -694,17 +799,13 @@ int btrfs_add_delayed_data_ref(struct btrfs_fs_info 
*fs_info,
+                              u64 bytenr, u64 num_bytes,
+                              u64 parent, u64 ref_root,
+                              u64 owner, u64 offset, int action,
+-                             struct btrfs_delayed_extent_op *extent_op,
+-                             int no_quota)
++                             struct btrfs_delayed_extent_op *extent_op)
+ {
+       struct btrfs_delayed_data_ref *ref;
+       struct btrfs_delayed_ref_head *head_ref;
+       struct btrfs_delayed_ref_root *delayed_refs;
+       struct btrfs_qgroup_extent_record *record = NULL;
+ 
+-      if (!is_fstree(ref_root) || !fs_info->quota_enabled)
+-              no_quota = 0;
+-
+       BUG_ON(extent_op && !extent_op->is_data);
+       ref = kmem_cache_alloc(btrfs_delayed_data_ref_cachep, GFP_NOFS);
+       if (!ref)
+@@ -740,7 +841,7 @@ int btrfs_add_delayed_data_ref(struct btrfs_fs_info 
*fs_info,
+ 
+       add_delayed_data_ref(fs_info, trans, head_ref, &ref->node, bytenr,
+                                  num_bytes, parent, ref_root, owner, offset,
+-                                 action, no_quota);
++                                 action);
+       spin_unlock(&delayed_refs->lock);
+ 
+       return 0;
+diff --git a/fs/btrfs/delayed-ref.h b/fs/btrfs/delayed-ref.h
+index 13fb5e6090fe..930887a4275f 100644
+--- a/fs/btrfs/delayed-ref.h
++++ b/fs/btrfs/delayed-ref.h
+@@ -68,7 +68,6 @@ struct btrfs_delayed_ref_node {
+ 
+       unsigned int action:8;
+       unsigned int type:8;
+-      unsigned int no_quota:1;
+       /* is this node still in the rbtree? */
+       unsigned int is_head:1;
+       unsigned int in_tree:1;
+@@ -233,15 +232,13 @@ int btrfs_add_delayed_tree_ref(struct btrfs_fs_info 
*fs_info,
+                              struct btrfs_trans_handle *trans,
+                              u64 bytenr, u64 num_bytes, u64 parent,
+                              u64 ref_root, int level, int action,
+-                             struct btrfs_delayed_extent_op *extent_op,
+-                             int no_quota);
++                             struct btrfs_delayed_extent_op *extent_op);
+ int btrfs_add_delayed_data_ref(struct btrfs_fs_info *fs_info,
+                              struct btrfs_trans_handle *trans,
+                              u64 bytenr, u64 num_bytes,
+                              u64 parent, u64 ref_root,
+                              u64 owner, u64 offset, int action,
+-                             struct btrfs_delayed_extent_op *extent_op,
+-                             int no_quota);
++                             struct btrfs_delayed_extent_op *extent_op);
+ int btrfs_add_delayed_extent_op(struct btrfs_fs_info *fs_info,
+                               struct btrfs_trans_handle *trans,
+                               u64 bytenr, u64 num_bytes,
+diff --git a/fs/btrfs/extent-tree.c b/fs/btrfs/extent-tree.c
+index 07204bf601ed..5d870c4eac05 100644
+--- a/fs/btrfs/extent-tree.c
++++ b/fs/btrfs/extent-tree.c
+@@ -95,8 +95,7 @@ static int alloc_reserved_tree_block(struct 
btrfs_trans_handle *trans,
+                                    struct btrfs_root *root,
+                                    u64 parent, u64 root_objectid,
+                                    u64 flags, struct btrfs_disk_key *key,
+-                                   int level, struct btrfs_key *ins,
+-                                   int no_quota);
++                                   int level, struct btrfs_key *ins);
+ static int do_chunk_alloc(struct btrfs_trans_handle *trans,
+                         struct btrfs_root *extent_root, u64 flags,
+                         int force);
+@@ -1941,8 +1940,7 @@ int btrfs_discard_extent(struct btrfs_root *root, u64 
bytenr,
+ int btrfs_inc_extent_ref(struct btrfs_trans_handle *trans,
+                        struct btrfs_root *root,
+                        u64 bytenr, u64 num_bytes, u64 parent,
+-                       u64 root_objectid, u64 owner, u64 offset,
+-                       int no_quota)
++                       u64 root_objectid, u64 owner, u64 offset)
+ {
+       int ret;
+       struct btrfs_fs_info *fs_info = root->fs_info;
+@@ -1954,12 +1952,12 @@ int btrfs_inc_extent_ref(struct btrfs_trans_handle 
*trans,
+               ret = btrfs_add_delayed_tree_ref(fs_info, trans, bytenr,
+                                       num_bytes,
+                                       parent, root_objectid, (int)owner,
+-                                      BTRFS_ADD_DELAYED_REF, NULL, no_quota);
++                                      BTRFS_ADD_DELAYED_REF, NULL);
+       } else {
+               ret = btrfs_add_delayed_data_ref(fs_info, trans, bytenr,
+                                       num_bytes,
+                                       parent, root_objectid, owner, offset,
+-                                      BTRFS_ADD_DELAYED_REF, NULL, no_quota);
++                                      BTRFS_ADD_DELAYED_REF, NULL);
+       }
+       return ret;
+ }
+@@ -1980,15 +1978,11 @@ static int __btrfs_inc_extent_ref(struct 
btrfs_trans_handle *trans,
+       u64 num_bytes = node->num_bytes;
+       u64 refs;
+       int ret;
+-      int no_quota = node->no_quota;
+ 
+       path = btrfs_alloc_path();
+       if (!path)
+               return -ENOMEM;
+ 
+-      if (!is_fstree(root_objectid) || !root->fs_info->quota_enabled)
+-              no_quota = 1;
+-
+       path->reada = 1;
+       path->leave_spinning = 1;
+       /* this will setup the path even if it fails to insert the back ref */
+@@ -2223,8 +2217,7 @@ static int run_delayed_tree_ref(struct 
btrfs_trans_handle *trans,
+                                               parent, ref_root,
+                                               extent_op->flags_to_set,
+                                               &extent_op->key,
+-                                              ref->level, &ins,
+-                                              node->no_quota);
++                                              ref->level, &ins);
+       } else if (node->action == BTRFS_ADD_DELAYED_REF) {
+               ret = __btrfs_inc_extent_ref(trans, root, node,
+                                            parent, ref_root,
+@@ -2365,7 +2358,21 @@ static noinline int __btrfs_run_delayed_refs(struct 
btrfs_trans_handle *trans,
+                       }
+               }
+ 
++              /*
++               * We need to try and merge add/drops of the same ref since we
++               * can run into issues with relocate dropping the implicit ref
++               * and then it being added back again before the drop can
++               * finish.  If we merged anything we need to re-loop so we can
++               * get a good ref.
++               * Or we can get node references of the same type that weren't
++               * merged when created due to bumps in the tree mod seq, and
++               * we need to merge them to prevent adding an inline extent
++               * backref before dropping it (triggering a BUG_ON at
++               * insert_inline_extent_backref()).
++               */
+               spin_lock(&locked_ref->lock);
++              btrfs_merge_delayed_refs(trans, fs_info, delayed_refs,
++                                       locked_ref);
+ 
+               /*
+                * locked_ref is the head node, so we have to go one
+@@ -3038,7 +3045,7 @@ static int __btrfs_mod_ref(struct btrfs_trans_handle 
*trans,
+       int level;
+       int ret = 0;
+       int (*process_func)(struct btrfs_trans_handle *, struct btrfs_root *,
+-                          u64, u64, u64, u64, u64, u64, int);
++                          u64, u64, u64, u64, u64, u64);
+ 
+ 
+       if (btrfs_test_is_dummy_root(root))
+@@ -3079,15 +3086,14 @@ static int __btrfs_mod_ref(struct btrfs_trans_handle 
*trans,
+                       key.offset -= btrfs_file_extent_offset(buf, fi);
+                       ret = process_func(trans, root, bytenr, num_bytes,
+                                          parent, ref_root, key.objectid,
+-                                         key.offset, 1);
++                                         key.offset);
+                       if (ret)
+                               goto fail;
+               } else {
+                       bytenr = btrfs_node_blockptr(buf, i);
+                       num_bytes = root->nodesize;
+                       ret = process_func(trans, root, bytenr, num_bytes,
+-                                         parent, ref_root, level - 1, 0,
+-                                         1);
++                                         parent, ref_root, level - 1, 0);
+                       if (ret)
+                               goto fail;
+               }
+@@ -6137,7 +6143,6 @@ static int __btrfs_free_extent(struct btrfs_trans_handle 
*trans,
+       int extent_slot = 0;
+       int found_extent = 0;
+       int num_to_del = 1;
+-      int no_quota = node->no_quota;
+       u32 item_size;
+       u64 refs;
+       u64 bytenr = node->bytenr;
+@@ -6146,9 +6151,6 @@ static int __btrfs_free_extent(struct btrfs_trans_handle 
*trans,
+       bool skinny_metadata = btrfs_fs_incompat(root->fs_info,
+                                                SKINNY_METADATA);
+ 
+-      if (!info->quota_enabled || !is_fstree(root_objectid))
+-              no_quota = 1;
+-
+       path = btrfs_alloc_path();
+       if (!path)
+               return -ENOMEM;
+@@ -6474,7 +6476,7 @@ void btrfs_free_tree_block(struct btrfs_trans_handle 
*trans,
+                                       buf->start, buf->len,
+                                       parent, root->root_key.objectid,
+                                       btrfs_header_level(buf),
+-                                      BTRFS_DROP_DELAYED_REF, NULL, 0);
++                                      BTRFS_DROP_DELAYED_REF, NULL);
+               BUG_ON(ret); /* -ENOMEM */
+       }
+ 
+@@ -6522,7 +6524,7 @@ out:
+ /* Can return -ENOMEM */
+ int btrfs_free_extent(struct btrfs_trans_handle *trans, struct btrfs_root 
*root,
+                     u64 bytenr, u64 num_bytes, u64 parent, u64 root_objectid,
+-                    u64 owner, u64 offset, int no_quota)
++                    u64 owner, u64 offset)
+ {
+       int ret;
+       struct btrfs_fs_info *fs_info = root->fs_info;
+@@ -6545,13 +6547,13 @@ int btrfs_free_extent(struct btrfs_trans_handle 
*trans, struct btrfs_root *root,
+               ret = btrfs_add_delayed_tree_ref(fs_info, trans, bytenr,
+                                       num_bytes,
+                                       parent, root_objectid, (int)owner,
+-                                      BTRFS_DROP_DELAYED_REF, NULL, no_quota);
++                                      BTRFS_DROP_DELAYED_REF, NULL);
+       } else {
+               ret = btrfs_add_delayed_data_ref(fs_info, trans, bytenr,
+                                               num_bytes,
+                                               parent, root_objectid, owner,
+                                               offset, BTRFS_DROP_DELAYED_REF,
+-                                              NULL, no_quota);
++                                              NULL);
+       }
+       return ret;
+ }
+@@ -7333,8 +7335,7 @@ static int alloc_reserved_tree_block(struct 
btrfs_trans_handle *trans,
+                                    struct btrfs_root *root,
+                                    u64 parent, u64 root_objectid,
+                                    u64 flags, struct btrfs_disk_key *key,
+-                                   int level, struct btrfs_key *ins,
+-                                   int no_quota)
++                                   int level, struct btrfs_key *ins)
+ {
+       int ret;
+       struct btrfs_fs_info *fs_info = root->fs_info;
+@@ -7424,7 +7425,7 @@ int btrfs_alloc_reserved_file_extent(struct 
btrfs_trans_handle *trans,
+       ret = btrfs_add_delayed_data_ref(root->fs_info, trans, ins->objectid,
+                                        ins->offset, 0,
+                                        root_objectid, owner, offset,
+-                                       BTRFS_ADD_DELAYED_EXTENT, NULL, 0);
++                                       BTRFS_ADD_DELAYED_EXTENT, NULL);
+       return ret;
+ }
+ 
+@@ -7641,7 +7642,7 @@ struct extent_buffer *btrfs_alloc_tree_block(struct 
btrfs_trans_handle *trans,
+                                                ins.objectid, ins.offset,
+                                                parent, root_objectid, level,
+                                                BTRFS_ADD_DELAYED_EXTENT,
+-                                               extent_op, 0);
++                                               extent_op);
+               if (ret)
+                       goto out_free_delayed;
+       }
+@@ -8189,7 +8190,7 @@ skip:
+                       }
+               }
+               ret = btrfs_free_extent(trans, root, bytenr, blocksize, parent,
+-                              root->root_key.objectid, level - 1, 0, 0);
++                              root->root_key.objectid, level - 1, 0);
+               BUG_ON(ret); /* -ENOMEM */
+       }
+       btrfs_tree_unlock(next);
+diff --git a/fs/btrfs/file.c b/fs/btrfs/file.c
+index b823fac91c92..5e314856a58c 100644
+--- a/fs/btrfs/file.c
++++ b/fs/btrfs/file.c
+@@ -756,8 +756,16 @@ next_slot:
+               }
+ 
+               btrfs_item_key_to_cpu(leaf, &key, path->slots[0]);
+-              if (key.objectid > ino ||
+-                  key.type > BTRFS_EXTENT_DATA_KEY || key.offset >= end)
++
++              if (key.objectid > ino)
++                      break;
++              if (WARN_ON_ONCE(key.objectid < ino) ||
++                  key.type < BTRFS_EXTENT_DATA_KEY) {
++                      ASSERT(del_nr == 0);
++                      path->slots[0]++;
++                      goto next_slot;
++              }
++              if (key.type > BTRFS_EXTENT_DATA_KEY || key.offset >= end)
+                       break;
+ 
+               fi = btrfs_item_ptr(leaf, path->slots[0],
+@@ -776,8 +784,8 @@ next_slot:
+                               btrfs_file_extent_inline_len(leaf,
+                                                    path->slots[0], fi);
+               } else {
+-                      WARN_ON(1);
+-                      extent_end = search_start;
++                      /* can't happen */
++                      BUG();
+               }
+ 
+               /*
+@@ -847,7 +855,7 @@ next_slot:
+                                               disk_bytenr, num_bytes, 0,
+                                               root->root_key.objectid,
+                                               new_key.objectid,
+-                                              start - extent_offset, 1);
++                                              start - extent_offset);
+                               BUG_ON(ret); /* -ENOMEM */
+                       }
+                       key.offset = start;
+@@ -925,7 +933,7 @@ delete_extent_item:
+                                               disk_bytenr, num_bytes, 0,
+                                               root->root_key.objectid,
+                                               key.objectid, key.offset -
+-                                              extent_offset, 0);
++                                              extent_offset);
+                               BUG_ON(ret); /* -ENOMEM */
+                               inode_sub_bytes(inode,
+                                               extent_end - key.offset);
+@@ -1204,7 +1212,7 @@ again:
+ 
+               ret = btrfs_inc_extent_ref(trans, root, bytenr, num_bytes, 0,
+                                          root->root_key.objectid,
+-                                         ino, orig_offset, 1);
++                                         ino, orig_offset);
+               BUG_ON(ret); /* -ENOMEM */
+ 
+               if (split == start) {
+@@ -1231,7 +1239,7 @@ again:
+               del_nr++;
+               ret = btrfs_free_extent(trans, root, bytenr, num_bytes,
+                                       0, root->root_key.objectid,
+-                                      ino, orig_offset, 0);
++                                      ino, orig_offset);
+               BUG_ON(ret); /* -ENOMEM */
+       }
+       other_start = 0;
+@@ -1248,7 +1256,7 @@ again:
+               del_nr++;
+               ret = btrfs_free_extent(trans, root, bytenr, num_bytes,
+                                       0, root->root_key.objectid,
+-                                      ino, orig_offset, 0);
++                                      ino, orig_offset);
+               BUG_ON(ret); /* -ENOMEM */
+       }
+       if (del_nr == 0) {
+@@ -1868,8 +1876,13 @@ int btrfs_sync_file(struct file *file, loff_t start, 
loff_t end, int datasync)
+       struct btrfs_log_ctx ctx;
+       int ret = 0;
+       bool full_sync = 0;
+-      const u64 len = end - start + 1;
++      u64 len;
+ 
++      /*
++       * The range length can be represented by u64, we have to do the 
typecasts
++       * to avoid signed overflow if it's [0, LLONG_MAX] eg. from fsync()
++       */
++      len = (u64)end - (u64)start + 1;
+       trace_btrfs_sync_file(file, datasync);
+ 
+       /*
+@@ -2057,8 +2070,7 @@ int btrfs_sync_file(struct file *file, loff_t start, 
loff_t end, int datasync)
+                       }
+               }
+               if (!full_sync) {
+-                      ret = btrfs_wait_ordered_range(inode, start,
+-                                                     end - start + 1);
++                      ret = btrfs_wait_ordered_range(inode, start, len);
+                       if (ret) {
+                               btrfs_end_transaction(trans, root);
+                               goto out;
+diff --git a/fs/btrfs/inode.c b/fs/btrfs/inode.c
+index b54e63038b96..9aabff2102f8 100644
+--- a/fs/btrfs/inode.c
++++ b/fs/btrfs/inode.c
+@@ -1294,8 +1294,14 @@ next_slot:
+               num_bytes = 0;
+               btrfs_item_key_to_cpu(leaf, &found_key, path->slots[0]);
+ 
+-              if (found_key.objectid > ino ||
+-                  found_key.type > BTRFS_EXTENT_DATA_KEY ||
++              if (found_key.objectid > ino)
++                      break;
++              if (WARN_ON_ONCE(found_key.objectid < ino) ||
++                  found_key.type < BTRFS_EXTENT_DATA_KEY) {
++                      path->slots[0]++;
++                      goto next_slot;
++              }
++              if (found_key.type > BTRFS_EXTENT_DATA_KEY ||
+                   found_key.offset > end)
+                       break;
+ 
+@@ -2569,7 +2575,7 @@ again:
+       ret = btrfs_inc_extent_ref(trans, root, new->bytenr,
+                       new->disk_len, 0,
+                       backref->root_id, backref->inum,
+-                      new->file_pos, 0);      /* start - extent_offset */
++                      new->file_pos); /* start - extent_offset */
+       if (ret) {
+               btrfs_abort_transaction(trans, root, ret);
+               goto out_free_path;
+@@ -4184,6 +4190,47 @@ static int truncate_space_check(struct 
btrfs_trans_handle *trans,
+ 
+ }
+ 
++static int truncate_inline_extent(struct inode *inode,
++                                struct btrfs_path *path,
++                                struct btrfs_key *found_key,
++                                const u64 item_end,
++                                const u64 new_size)
++{
++      struct extent_buffer *leaf = path->nodes[0];
++      int slot = path->slots[0];
++      struct btrfs_file_extent_item *fi;
++      u32 size = (u32)(new_size - found_key->offset);
++      struct btrfs_root *root = BTRFS_I(inode)->root;
++
++      fi = btrfs_item_ptr(leaf, slot, struct btrfs_file_extent_item);
++
++      if (btrfs_file_extent_compression(leaf, fi) != BTRFS_COMPRESS_NONE) {
++              loff_t offset = new_size;
++              loff_t page_end = ALIGN(offset, PAGE_CACHE_SIZE);
++
++              /*
++               * Zero out the remaining of the last page of our inline extent,
++               * instead of directly truncating our inline extent here - that
++               * would be much more complex (decompressing all the data, then
++               * compressing the truncated data, which might be bigger than
++               * the size of the inline extent, resize the extent, etc).
++               * We release the path because to get the page we might need to
++               * read the extent item from disk (data not in the page cache).
++               */
++              btrfs_release_path(path);
++              return btrfs_truncate_page(inode, offset, page_end - offset, 0);
++      }
++
++      btrfs_set_file_extent_ram_bytes(leaf, fi, size);
++      size = btrfs_file_extent_calc_inline_size(size);
++      btrfs_truncate_item(root, path, size, 1);
++
++      if (test_bit(BTRFS_ROOT_REF_COWS, &root->state))
++              inode_sub_bytes(inode, item_end + 1 - new_size);
++
++      return 0;
++}
++
+ /*
+  * this can truncate away extent items, csum items and directory items.
+  * It starts at a high offset and removes keys until it can't find
+@@ -4378,27 +4425,40 @@ search_again:
+                        * special encodings
+                        */
+                       if (!del_item &&
+-                          btrfs_file_extent_compression(leaf, fi) == 0 &&
+                           btrfs_file_extent_encryption(leaf, fi) == 0 &&
+                           btrfs_file_extent_other_encoding(leaf, fi) == 0) {
+-                              u32 size = new_size - found_key.offset;
+-
+-                              if (test_bit(BTRFS_ROOT_REF_COWS, &root->state))
+-                                      inode_sub_bytes(inode, item_end + 1 -
+-                                                      new_size);
+ 
+                               /*
+-                               * update the ram bytes to properly reflect
+-                               * the new size of our item
++                               * Need to release path in order to truncate a
++                               * compressed extent. So delete any accumulated
++                               * extent items so far.
+                                */
+-                              btrfs_set_file_extent_ram_bytes(leaf, fi, size);
+-                              size =
+-                                  btrfs_file_extent_calc_inline_size(size);
+-                              btrfs_truncate_item(root, path, size, 1);
++                              if (btrfs_file_extent_compression(leaf, fi) !=
++                                  BTRFS_COMPRESS_NONE && pending_del_nr) {
++                                      err = btrfs_del_items(trans, root, path,
++                                                            pending_del_slot,
++                                                            pending_del_nr);
++                                      if (err) {
++                                              btrfs_abort_transaction(trans,
++                                                                      root,
++                                                                      err);
++                                              goto error;
++                                      }
++                                      pending_del_nr = 0;
++                              }
++
++                              err = truncate_inline_extent(inode, path,
++                                                           &found_key,
++                                                           item_end,
++                                                           new_size);
++                              if (err) {
++                                      btrfs_abort_transaction(trans,
++                                                              root, err);
++                                      goto error;
++                              }
+                       } else if (test_bit(BTRFS_ROOT_REF_COWS,
+                                           &root->state)) {
+-                              inode_sub_bytes(inode, item_end + 1 -
+-                                              found_key.offset);
++                              inode_sub_bytes(inode, item_end + 1 - new_size);
+                       }
+               }
+ delete:
+@@ -4428,7 +4488,7 @@ delete:
+                       ret = btrfs_free_extent(trans, root, extent_start,
+                                               extent_num_bytes, 0,
+                                               btrfs_header_owner(leaf),
+-                                              ino, extent_offset, 0);
++                                              ino, extent_offset);
+                       BUG_ON(ret);
+                       if (btrfs_should_throttle_delayed_refs(trans, root))
+                               btrfs_async_run_delayed_refs(root,
+diff --git a/fs/btrfs/ioctl.c b/fs/btrfs/ioctl.c
+index 641d3dc4f31e..be4e53c61dd9 100644
+--- a/fs/btrfs/ioctl.c
++++ b/fs/btrfs/ioctl.c
+@@ -3195,41 +3195,6 @@ out:
+       return ret;
+ }
+ 
+-/* Helper to check and see if this root currently has a ref on the given disk
+- * bytenr.  If it does then we need to update the quota for this root.  This
+- * doesn't do anything if quotas aren't enabled.
+- */
+-static int check_ref(struct btrfs_trans_handle *trans, struct btrfs_root 
*root,
+-                   u64 disko)
+-{
+-      struct seq_list tree_mod_seq_elem = SEQ_LIST_INIT(tree_mod_seq_elem);
+-      struct ulist *roots;
+-      struct ulist_iterator uiter;
+-      struct ulist_node *root_node = NULL;
+-      int ret;
+-
+-      if (!root->fs_info->quota_enabled)
+-              return 1;
+-
+-      btrfs_get_tree_mod_seq(root->fs_info, &tree_mod_seq_elem);
+-      ret = btrfs_find_all_roots(trans, root->fs_info, disko,
+-                                 tree_mod_seq_elem.seq, &roots);
+-      if (ret < 0)
+-              goto out;
+-      ret = 0;
+-      ULIST_ITER_INIT(&uiter);
+-      while ((root_node = ulist_next(roots, &uiter))) {
+-              if (root_node->val == root->objectid) {
+-                      ret = 1;
+-                      break;
+-              }
+-      }
+-      ulist_free(roots);
+-out:
+-      btrfs_put_tree_mod_seq(root->fs_info, &tree_mod_seq_elem);
+-      return ret;
+-}
+-
+ static int clone_finish_inode_update(struct btrfs_trans_handle *trans,
+                                    struct inode *inode,
+                                    u64 endoff,
+@@ -3320,6 +3285,150 @@ static void clone_update_extent_map(struct inode 
*inode,
+                       &BTRFS_I(inode)->runtime_flags);
+ }
+ 
++/*
++ * Make sure we do not end up inserting an inline extent into a file that has
++ * already other (non-inline) extents. If a file has an inline extent it can
++ * not have any other extents and the (single) inline extent must start at the
++ * file offset 0. Failing to respect these rules will lead to file corruption,
++ * resulting in EIO errors on read/write operations, hitting BUG_ON's in mm, 
etc
++ *
++ * We can have extents that have been already written to disk or we can have
++ * dirty ranges still in delalloc, in which case the extent maps and items are
++ * created only when we run delalloc, and the delalloc ranges might fall 
outside
++ * the range we are currently locking in the inode's io tree. So we check the
++ * inode's i_size because of that (i_size updates are done while holding the
++ * i_mutex, which we are holding here).
++ * We also check to see if the inode has a size not greater than "datal" but 
has
++ * extents beyond it, due to an fallocate with FALLOC_FL_KEEP_SIZE (and we are
++ * protected against such concurrent fallocate calls by the i_mutex).
++ *
++ * If the file has no extents but a size greater than datal, do not allow the
++ * copy because we would need turn the inline extent into a non-inline one 
(even
++ * with NO_HOLES enabled). If we find our destination inode only has one 
inline
++ * extent, just overwrite it with the source inline extent if its size is less
++ * than the source extent's size, or we could copy the source inline extent's
++ * data into the destination inode's inline extent if the later is greater 
then
++ * the former.
++ */
++static int clone_copy_inline_extent(struct inode *src,
++                                  struct inode *dst,
++                                  struct btrfs_trans_handle *trans,
++                                  struct btrfs_path *path,
++                                  struct btrfs_key *new_key,
++                                  const u64 drop_start,
++                                  const u64 datal,
++                                  const u64 skip,
++                                  const u64 size,
++                                  char *inline_data)
++{
++      struct btrfs_root *root = BTRFS_I(dst)->root;
++      const u64 aligned_end = ALIGN(new_key->offset + datal,
++                                    root->sectorsize);
++      int ret;
++      struct btrfs_key key;
++
++      if (new_key->offset > 0)
++              return -EOPNOTSUPP;
++
++      key.objectid = btrfs_ino(dst);
++      key.type = BTRFS_EXTENT_DATA_KEY;
++      key.offset = 0;
++      ret = btrfs_search_slot(NULL, root, &key, path, 0, 0);
++      if (ret < 0) {
++              return ret;
++      } else if (ret > 0) {
++              if (path->slots[0] >= btrfs_header_nritems(path->nodes[0])) {
++                      ret = btrfs_next_leaf(root, path);
++                      if (ret < 0)
++                              return ret;
++                      else if (ret > 0)
++                              goto copy_inline_extent;
++              }
++              btrfs_item_key_to_cpu(path->nodes[0], &key, path->slots[0]);
++              if (key.objectid == btrfs_ino(dst) &&
++                  key.type == BTRFS_EXTENT_DATA_KEY) {
++                      ASSERT(key.offset > 0);
++                      return -EOPNOTSUPP;
++              }
++      } else if (i_size_read(dst) <= datal) {
++              struct btrfs_file_extent_item *ei;
++              u64 ext_len;
++
++              /*
++               * If the file size is <= datal, make sure there are no other
++               * extents following (can happen do to an fallocate call with
++               * the flag FALLOC_FL_KEEP_SIZE).
++               */
++              ei = btrfs_item_ptr(path->nodes[0], path->slots[0],
++                                  struct btrfs_file_extent_item);
++              /*
++               * If it's an inline extent, it can not have other extents
++               * following it.
++               */
++              if (btrfs_file_extent_type(path->nodes[0], ei) ==
++                  BTRFS_FILE_EXTENT_INLINE)
++                      goto copy_inline_extent;
++
++              ext_len = btrfs_file_extent_num_bytes(path->nodes[0], ei);
++              if (ext_len > aligned_end)
++                      return -EOPNOTSUPP;
++
++              ret = btrfs_next_item(root, path);
++              if (ret < 0) {
++                      return ret;
++              } else if (ret == 0) {
++                      btrfs_item_key_to_cpu(path->nodes[0], &key,
++                                            path->slots[0]);
++                      if (key.objectid == btrfs_ino(dst) &&
++                          key.type == BTRFS_EXTENT_DATA_KEY)
++                              return -EOPNOTSUPP;
++              }
++      }
++
++copy_inline_extent:
++      /*
++       * We have no extent items, or we have an extent at offset 0 which may
++       * or may not be inlined. All these cases are dealt the same way.
++       */
++      if (i_size_read(dst) > datal) {
++              /*
++               * If the destination inode has an inline extent...
++               * This would require copying the data from the source inline
++               * extent into the beginning of the destination's inline extent.
++               * But this is really complex, both extents can be compressed
++               * or just one of them, which would require decompressing and
++               * re-compressing data (which could increase the new compressed
++               * size, not allowing the compressed data to fit anymore in an
++               * inline extent).
++               * So just don't support this case for now (it should be rare,
++               * we are not really saving space when cloning inline extents).
++               */
++              return -EOPNOTSUPP;
++      }
++
++      btrfs_release_path(path);
++      ret = btrfs_drop_extents(trans, root, dst, drop_start, aligned_end, 1);
++      if (ret)
++              return ret;
++      ret = btrfs_insert_empty_item(trans, root, path, new_key, size);
++      if (ret)
++              return ret;
++
++      if (skip) {
++              const u32 start = btrfs_file_extent_calc_inline_size(0);
++
++              memmove(inline_data + start, inline_data + start + skip, datal);
++      }
++
++      write_extent_buffer(path->nodes[0], inline_data,
++                          btrfs_item_ptr_offset(path->nodes[0],
++                                                path->slots[0]),
++                          size);
++      inode_add_bytes(dst, datal);
++
++      return 0;
++}
++
+ /**
+  * btrfs_clone() - clone a range from inode file to another
+  *
+@@ -3344,9 +3453,7 @@ static int btrfs_clone(struct inode *src, struct inode 
*inode,
+       u32 nritems;
+       int slot;
+       int ret;
+-      int no_quota;
+       const u64 len = olen_aligned;
+-      u64 last_disko = 0;
+       u64 last_dest_end = destoff;
+ 
+       ret = -ENOMEM;
+@@ -3392,7 +3499,6 @@ static int btrfs_clone(struct inode *src, struct inode 
*inode,
+ 
+               nritems = btrfs_header_nritems(path->nodes[0]);
+ process_slot:
+-              no_quota = 1;
+               if (path->slots[0] >= nritems) {
+                       ret = btrfs_next_leaf(BTRFS_I(src)->root, path);
+                       if (ret < 0)
+@@ -3544,35 +3650,13 @@ process_slot:
+                               btrfs_set_file_extent_num_bytes(leaf, extent,
+                                                               datal);
+ 
+-                              /*
+-                               * We need to look up the roots that point at
+-                               * this bytenr and see if the new root does.  If
+-                               * it does not we need to make sure we update
+-                               * quotas appropriately.
+-                               */
+-                              if (disko && root != BTRFS_I(src)->root &&
+-                                  disko != last_disko) {
+-                                      no_quota = check_ref(trans, root,
+-                                                           disko);
+-                                      if (no_quota < 0) {
+-                                              btrfs_abort_transaction(trans,
+-                                                                      root,
+-                                                                      ret);
+-                                              btrfs_end_transaction(trans,
+-                                                                    root);
+-                                              ret = no_quota;
+-                                              goto out;
+-                                      }
+-                              }
+-
+                               if (disko) {
+                                       inode_add_bytes(inode, datal);
+                                       ret = btrfs_inc_extent_ref(trans, root,
+                                                       disko, diskl, 0,
+                                                       root->root_key.objectid,
+                                                       btrfs_ino(inode),
+-                                                      new_key.offset - datao,
+-                                                      no_quota);
++                                                      new_key.offset - datao);
+                                       if (ret) {
+                                               btrfs_abort_transaction(trans,
+                                                                       root,
+@@ -3586,21 +3670,6 @@ process_slot:
+                       } else if (type == BTRFS_FILE_EXTENT_INLINE) {
+                               u64 skip = 0;
+                               u64 trim = 0;
+-                              u64 aligned_end = 0;
+-
+-                              /*
+-                               * Don't copy an inline extent into an offset
+-                               * greater than zero. Having an inline extent
+-                               * at such an offset results in chaos as btrfs
+-                               * isn't prepared for such cases. Just skip
+-                               * this case for the same reasons as commented
+-                               * at btrfs_ioctl_clone().
+-                               */
+-                              if (last_dest_end > 0) {
+-                                      ret = -EOPNOTSUPP;
+-                                      btrfs_end_transaction(trans, root);
+-                                      goto out;
+-                              }
+ 
+                               if (off > key.offset) {
+                                       skip = off - key.offset;
+@@ -3618,42 +3687,22 @@ process_slot:
+                               size -= skip + trim;
+                               datal -= skip + trim;
+ 
+-                              aligned_end = ALIGN(new_key.offset + datal,
+-                                                  root->sectorsize);
+-                              ret = btrfs_drop_extents(trans, root, inode,
+-                                                       drop_start,
+-                                                       aligned_end,
+-                                                       1);
++                              ret = clone_copy_inline_extent(src, inode,
++                                                             trans, path,
++                                                             &new_key,
++                                                             drop_start,
++                                                             datal,
++                                                             skip, size, buf);
+                               if (ret) {
+                                       if (ret != -EOPNOTSUPP)
+                                               btrfs_abort_transaction(trans,
+-                                                      root, ret);
+-                                      btrfs_end_transaction(trans, root);
+-                                      goto out;
+-                              }
+-
+-                              ret = btrfs_insert_empty_item(trans, root, path,
+-                                                            &new_key, size);
+-                              if (ret) {
+-                                      btrfs_abort_transaction(trans, root,
+-                                                              ret);
++                                                                      root,
++                                                                      ret);
+                                       btrfs_end_transaction(trans, root);
+                                       goto out;
+                               }
+-
+-                              if (skip) {
+-                                      u32 start =
+-                                        btrfs_file_extent_calc_inline_size(0);
+-                                      memmove(buf+start, buf+start+skip,
+-                                              datal);
+-                              }
+-
+                               leaf = path->nodes[0];
+                               slot = path->slots[0];
+-                              write_extent_buffer(leaf, buf,
+-                                          btrfs_item_ptr_offset(leaf, slot),
+-                                          size);
+-                              inode_add_bytes(inode, datal);
+                       }
+ 
+                       /* If we have an implicit hole (NO_HOLES feature). */
+diff --git a/fs/btrfs/relocation.c b/fs/btrfs/relocation.c
+index 88cbb5995667..3a828a33cd67 100644
+--- a/fs/btrfs/relocation.c
++++ b/fs/btrfs/relocation.c
+@@ -1716,7 +1716,7 @@ int replace_file_extents(struct btrfs_trans_handle 
*trans,
+               ret = btrfs_inc_extent_ref(trans, root, new_bytenr,
+                                          num_bytes, parent,
+                                          btrfs_header_owner(leaf),
+-                                         key.objectid, key.offset, 1);
++                                         key.objectid, key.offset);
+               if (ret) {
+                       btrfs_abort_transaction(trans, root, ret);
+                       break;
+@@ -1724,7 +1724,7 @@ int replace_file_extents(struct btrfs_trans_handle 
*trans,
+ 
+               ret = btrfs_free_extent(trans, root, bytenr, num_bytes,
+                                       parent, btrfs_header_owner(leaf),
+-                                      key.objectid, key.offset, 1);
++                                      key.objectid, key.offset);
+               if (ret) {
+                       btrfs_abort_transaction(trans, root, ret);
+                       break;
+@@ -1900,23 +1900,21 @@ again:
+ 
+               ret = btrfs_inc_extent_ref(trans, src, old_bytenr, blocksize,
+                                       path->nodes[level]->start,
+-                                      src->root_key.objectid, level - 1, 0,
+-                                      1);
++                                      src->root_key.objectid, level - 1, 0);
+               BUG_ON(ret);
+               ret = btrfs_inc_extent_ref(trans, dest, new_bytenr, blocksize,
+                                       0, dest->root_key.objectid, level - 1,
+-                                      0, 1);
++                                      0);
+               BUG_ON(ret);
+ 
+               ret = btrfs_free_extent(trans, src, new_bytenr, blocksize,
+                                       path->nodes[level]->start,
+-                                      src->root_key.objectid, level - 1, 0,
+-                                      1);
++                                      src->root_key.objectid, level - 1, 0);
+               BUG_ON(ret);
+ 
+               ret = btrfs_free_extent(trans, dest, old_bytenr, blocksize,
+                                       0, dest->root_key.objectid, level - 1,
+-                                      0, 1);
++                                      0);
+               BUG_ON(ret);
+ 
+               btrfs_unlock_up_safe(path, 0);
+@@ -2746,7 +2744,7 @@ static int do_relocation(struct btrfs_trans_handle 
*trans,
+                                               node->eb->start, blocksize,
+                                               upper->eb->start,
+                                               btrfs_header_owner(upper->eb),
+-                                              node->level, 0, 1);
++                                              node->level, 0);
+                       BUG_ON(ret);
+ 
+                       ret = btrfs_drop_subtree(trans, root, eb, upper->eb);
+diff --git a/fs/btrfs/send.c b/fs/btrfs/send.c
+index aa72bfd28f7d..890933b61267 100644
+--- a/fs/btrfs/send.c
++++ b/fs/btrfs/send.c
+@@ -2351,8 +2351,14 @@ static int send_subvol_begin(struct send_ctx *sctx)
+       }
+ 
+       TLV_PUT_STRING(sctx, BTRFS_SEND_A_PATH, name, namelen);
+-      TLV_PUT_UUID(sctx, BTRFS_SEND_A_UUID,
+-                      sctx->send_root->root_item.uuid);
++
++      if (!btrfs_is_empty_uuid(sctx->send_root->root_item.received_uuid))
++              TLV_PUT_UUID(sctx, BTRFS_SEND_A_UUID,
++                          sctx->send_root->root_item.received_uuid);
++      else
++              TLV_PUT_UUID(sctx, BTRFS_SEND_A_UUID,
++                          sctx->send_root->root_item.uuid);
++
+       TLV_PUT_U64(sctx, BTRFS_SEND_A_CTRANSID,
+                   le64_to_cpu(sctx->send_root->root_item.ctransid));
+       if (parent_root) {
+diff --git a/fs/btrfs/tree-log.c b/fs/btrfs/tree-log.c
+index 9c45431e69ab..7639695075dd 100644
+--- a/fs/btrfs/tree-log.c
++++ b/fs/btrfs/tree-log.c
+@@ -700,7 +700,7 @@ static noinline int replay_one_extent(struct 
btrfs_trans_handle *trans,
+                               ret = btrfs_inc_extent_ref(trans, root,
+                                               ins.objectid, ins.offset,
+                                               0, root->root_key.objectid,
+-                                              key->objectid, offset, 0);
++                                              key->objectid, offset);
+                               if (ret)
+                                       goto out;
+                       } else {
+diff --git a/fs/btrfs/xattr.c b/fs/btrfs/xattr.c
+index 6f518c90e1c1..1fcd7b6e7564 100644
+--- a/fs/btrfs/xattr.c
++++ b/fs/btrfs/xattr.c
+@@ -313,8 +313,10 @@ ssize_t btrfs_listxattr(struct dentry *dentry, char 
*buffer, size_t size)
+               /* check to make sure this item is what we want */
+               if (found_key.objectid != key.objectid)
+                       break;
+-              if (found_key.type != BTRFS_XATTR_ITEM_KEY)
++              if (found_key.type > BTRFS_XATTR_ITEM_KEY)
+                       break;
++              if (found_key.type < BTRFS_XATTR_ITEM_KEY)
++                      goto next;
+ 
+               di = btrfs_item_ptr(leaf, slot, struct btrfs_dir_item);
+               if (verify_dir_item(root, leaf, di))
+diff --git a/fs/ceph/mds_client.c b/fs/ceph/mds_client.c
+index 6aa07af67603..df45a818c570 100644
+--- a/fs/ceph/mds_client.c
++++ b/fs/ceph/mds_client.c
+@@ -1935,7 +1935,7 @@ static struct ceph_msg *create_request_message(struct 
ceph_mds_client *mdsc,
+ 
+       len = sizeof(*head) +
+               pathlen1 + pathlen2 + 2*(1 + sizeof(u32) + sizeof(u64)) +
+-              sizeof(struct timespec);
++              sizeof(struct ceph_timespec);
+ 
+       /* calculate (max) length for cap releases */
+       len += sizeof(struct ceph_mds_request_release) *
+diff --git a/fs/debugfs/inode.c b/fs/debugfs/inode.c
+index c711be8d6a3c..9c8d23316da1 100644
+--- a/fs/debugfs/inode.c
++++ b/fs/debugfs/inode.c
+@@ -271,8 +271,12 @@ static struct dentry *start_creating(const char *name, 
struct dentry *parent)
+               dput(dentry);
+               dentry = ERR_PTR(-EEXIST);
+       }
+-      if (IS_ERR(dentry))
++
++      if (IS_ERR(dentry)) {
+               mutex_unlock(&d_inode(parent)->i_mutex);
++              simple_release_fs(&debugfs_mount, &debugfs_mount_count);
++      }
++
+       return dentry;
+ }
+ 
+diff --git a/fs/ext4/crypto.c b/fs/ext4/crypto.c
+index 45731558138c..54a5169327a3 100644
+--- a/fs/ext4/crypto.c
++++ b/fs/ext4/crypto.c
+@@ -296,7 +296,6 @@ static int ext4_page_crypto(struct ext4_crypto_ctx *ctx,
+       else
+               res = crypto_ablkcipher_encrypt(req);
+       if (res == -EINPROGRESS || res == -EBUSY) {
+-              BUG_ON(req->base.data != &ecr);
+               wait_for_completion(&ecr.completion);
+               res = ecr.res;
+       }
+diff --git a/fs/ext4/crypto_fname.c b/fs/ext4/crypto_fname.c
+index 7dc4eb55913c..f9d53c2bd756 100644
+--- a/fs/ext4/crypto_fname.c
++++ b/fs/ext4/crypto_fname.c
+@@ -121,7 +121,6 @@ static int ext4_fname_encrypt(struct inode *inode,
+       ablkcipher_request_set_crypt(req, &src_sg, &dst_sg, ciphertext_len, iv);
+       res = crypto_ablkcipher_encrypt(req);
+       if (res == -EINPROGRESS || res == -EBUSY) {
+-              BUG_ON(req->base.data != &ecr);
+               wait_for_completion(&ecr.completion);
+               res = ecr.res;
+       }
+@@ -183,7 +182,6 @@ static int ext4_fname_decrypt(struct inode *inode,
+       ablkcipher_request_set_crypt(req, &src_sg, &dst_sg, iname->len, iv);
+       res = crypto_ablkcipher_decrypt(req);
+       if (res == -EINPROGRESS || res == -EBUSY) {
+-              BUG_ON(req->base.data != &ecr);
+               wait_for_completion(&ecr.completion);
+               res = ecr.res;
+       }
+diff --git a/fs/ext4/crypto_key.c b/fs/ext4/crypto_key.c
+index 442d24e8efc0..9bad1132ac8f 100644
+--- a/fs/ext4/crypto_key.c
++++ b/fs/ext4/crypto_key.c
+@@ -71,7 +71,6 @@ static int ext4_derive_key_aes(char 
deriving_key[EXT4_AES_128_ECB_KEY_SIZE],
+                                    EXT4_AES_256_XTS_KEY_SIZE, NULL);
+       res = crypto_ablkcipher_encrypt(req);
+       if (res == -EINPROGRESS || res == -EBUSY) {
+-              BUG_ON(req->base.data != &ecr);
+               wait_for_completion(&ecr.completion);
+               res = ecr.res;
+       }
+@@ -208,7 +207,12 @@ retry:
+               goto out;
+       }
+       crypt_info->ci_keyring_key = keyring_key;
+-      BUG_ON(keyring_key->type != &key_type_logon);
++      if (keyring_key->type != &key_type_logon) {
++              printk_once(KERN_WARNING
++                          "ext4: key type must be logon\n");
++              res = -ENOKEY;
++              goto out;
++      }
+       ukp = ((struct user_key_payload *)keyring_key->payload.data);
+       if (ukp->datalen != sizeof(struct ext4_encryption_key)) {
+               res = -EINVAL;
+@@ -217,7 +221,13 @@ retry:
+       master_key = (struct ext4_encryption_key *)ukp->data;
+       BUILD_BUG_ON(EXT4_AES_128_ECB_KEY_SIZE !=
+                    EXT4_KEY_DERIVATION_NONCE_SIZE);
+-      BUG_ON(master_key->size != EXT4_AES_256_XTS_KEY_SIZE);
++      if (master_key->size != EXT4_AES_256_XTS_KEY_SIZE) {
++              printk_once(KERN_WARNING
++                          "ext4: key size incorrect: %d\n",
++                          master_key->size);
++              res = -ENOKEY;
++              goto out;
++      }
+       res = ext4_derive_key_aes(ctx.nonce, master_key->raw,
+                                 raw_key);
+ got_key:
+diff --git a/fs/ext4/crypto_policy.c b/fs/ext4/crypto_policy.c
+index 02c4e5df7afb..f92fa93e67f1 100644
+--- a/fs/ext4/crypto_policy.c
++++ b/fs/ext4/crypto_policy.c
+@@ -137,7 +137,8 @@ int ext4_is_child_context_consistent_with_parent(struct 
inode *parent,
+ 
+       if ((parent == NULL) || (child == NULL)) {
+               pr_err("parent %p child %p\n", parent, child);
+-              BUG_ON(1);
++              WARN_ON(1);     /* Should never happen */
++              return 0;
+       }
+       /* no restrictions if the parent directory is not encrypted */
+       if (!ext4_encrypted_inode(parent))
+diff --git a/fs/ext4/ext4_jbd2.c b/fs/ext4/ext4_jbd2.c
+index d41843181818..e770c1ee4613 100644
+--- a/fs/ext4/ext4_jbd2.c
++++ b/fs/ext4/ext4_jbd2.c
+@@ -88,13 +88,13 @@ int __ext4_journal_stop(const char *where, unsigned int 
line, handle_t *handle)
+               return 0;
+       }
+ 
++      err = handle->h_err;
+       if (!handle->h_transaction) {
+-              err = jbd2_journal_stop(handle);
+-              return handle->h_err ? handle->h_err : err;
++              rc = jbd2_journal_stop(handle);
++              return err ? err : rc;
+       }
+ 
+       sb = handle->h_transaction->t_journal->j_private;
+-      err = handle->h_err;
+       rc = jbd2_journal_stop(handle);
+ 
+       if (!err)
+diff --git a/fs/ext4/page-io.c b/fs/ext4/page-io.c
+index 5602450f03f6..89e96f99dae7 100644
+--- a/fs/ext4/page-io.c
++++ b/fs/ext4/page-io.c
+@@ -425,6 +425,7 @@ int ext4_bio_write_page(struct ext4_io_submit *io,
+       struct buffer_head *bh, *head;
+       int ret = 0;
+       int nr_submitted = 0;
++      int nr_to_submit = 0;
+ 
+       blocksize = 1 << inode->i_blkbits;
+ 
+@@ -477,11 +478,13 @@ int ext4_bio_write_page(struct ext4_io_submit *io,
+                       unmap_underlying_metadata(bh->b_bdev, bh->b_blocknr);
+               }
+               set_buffer_async_write(bh);
++              nr_to_submit++;
+       } while ((bh = bh->b_this_page) != head);
+ 
+       bh = head = page_buffers(page);
+ 
+-      if (ext4_encrypted_inode(inode) && S_ISREG(inode->i_mode)) {
++      if (ext4_encrypted_inode(inode) && S_ISREG(inode->i_mode) &&
++          nr_to_submit) {
+               data_page = ext4_encrypt(inode, page);
+               if (IS_ERR(data_page)) {
+                       ret = PTR_ERR(data_page);
+diff --git a/fs/ext4/super.c b/fs/ext4/super.c
+index a5e8c744e962..bc24d1b44b8f 100644
+--- a/fs/ext4/super.c
++++ b/fs/ext4/super.c
+@@ -397,9 +397,13 @@ static void ext4_handle_error(struct super_block *sb)
+               smp_wmb();
+               sb->s_flags |= MS_RDONLY;
+       }
+-      if (test_opt(sb, ERRORS_PANIC))
++      if (test_opt(sb, ERRORS_PANIC)) {
++              if (EXT4_SB(sb)->s_journal &&
++                !(EXT4_SB(sb)->s_journal->j_flags & JBD2_REC_ERR))
++                      return;
+               panic("EXT4-fs (device %s): panic forced after error\n",
+                       sb->s_id);
++      }
+ }
+ 
+ #define ext4_error_ratelimit(sb)                                      \
+@@ -588,8 +592,12 @@ void __ext4_abort(struct super_block *sb, const char 
*function,
+                       jbd2_journal_abort(EXT4_SB(sb)->s_journal, -EIO);
+               save_error_info(sb, function, line);
+       }
+-      if (test_opt(sb, ERRORS_PANIC))
++      if (test_opt(sb, ERRORS_PANIC)) {
++              if (EXT4_SB(sb)->s_journal &&
++                !(EXT4_SB(sb)->s_journal->j_flags & JBD2_REC_ERR))
++                      return;
+               panic("EXT4-fs panic from previous error\n");
++      }
+ }
+ 
+ void __ext4_msg(struct super_block *sb,
+diff --git a/fs/jbd2/journal.c b/fs/jbd2/journal.c
+index 2721513adb1f..fd2787a39b87 100644
+--- a/fs/jbd2/journal.c
++++ b/fs/jbd2/journal.c
+@@ -2071,8 +2071,12 @@ static void __journal_abort_soft (journal_t *journal, 
int errno)
+ 
+       __jbd2_journal_abort_hard(journal);
+ 
+-      if (errno)
++      if (errno) {
+               jbd2_journal_update_sb_errno(journal);
++              write_lock(&journal->j_state_lock);
++              journal->j_flags |= JBD2_REC_ERR;
++              write_unlock(&journal->j_state_lock);
++      }
+ }
+ 
+ /**
+diff --git a/fs/nfs/inode.c b/fs/nfs/inode.c
+index 4afbe13321cb..f27cc76ed5e6 100644
+--- a/fs/nfs/inode.c
++++ b/fs/nfs/inode.c
+@@ -1816,7 +1816,11 @@ static int nfs_update_inode(struct inode *inode, struct 
nfs_fattr *fattr)
+               if ((long)fattr->gencount - (long)nfsi->attr_gencount > 0)
+                       nfsi->attr_gencount = fattr->gencount;
+       }
+-      invalid &= ~NFS_INO_INVALID_ATTR;
++
++      /* Don't declare attrcache up to date if there were no attrs! */
++      if (fattr->valid != 0)
++              invalid &= ~NFS_INO_INVALID_ATTR;
++
+       /* Don't invalidate the data if we were to blame */
+       if (!(S_ISREG(inode->i_mode) || S_ISDIR(inode->i_mode)
+                               || S_ISLNK(inode->i_mode)))
+diff --git a/fs/nfs/nfs4client.c b/fs/nfs/nfs4client.c
+index 3aa6a9ba5113..199648d5fcc5 100644
+--- a/fs/nfs/nfs4client.c
++++ b/fs/nfs/nfs4client.c
+@@ -33,7 +33,7 @@ static int nfs_get_cb_ident_idr(struct nfs_client *clp, int 
minorversion)
+               return ret;
+       idr_preload(GFP_KERNEL);
+       spin_lock(&nn->nfs_client_lock);
+-      ret = idr_alloc(&nn->cb_ident_idr, clp, 0, 0, GFP_NOWAIT);
++      ret = idr_alloc(&nn->cb_ident_idr, clp, 1, 0, GFP_NOWAIT);
+       if (ret >= 0)
+               clp->cl_cb_ident = ret;
+       spin_unlock(&nn->nfs_client_lock);
+diff --git a/fs/nfsd/nfs4state.c b/fs/nfsd/nfs4state.c
+index 75189cd34583..5ea13286e2b0 100644
+--- a/fs/nfsd/nfs4state.c
++++ b/fs/nfsd/nfs4state.c
+@@ -765,16 +765,68 @@ void nfs4_unhash_stid(struct nfs4_stid *s)
+       s->sc_type = 0;
+ }
+ 
+-static void
++/**
++ * nfs4_get_existing_delegation - Discover if this delegation already exists
++ * @clp:     a pointer to the nfs4_client we're granting a delegation to
++ * @fp:      a pointer to the nfs4_file we're granting a delegation on
++ *
++ * Return:
++ *      On success: NULL if an existing delegation was not found.
++ *
++ *      On error: -EAGAIN if one was previously granted to this nfs4_client
++ *                 for this nfs4_file.
++ *
++ */
++
++static int
++nfs4_get_existing_delegation(struct nfs4_client *clp, struct nfs4_file *fp)
++{
++      struct nfs4_delegation *searchdp = NULL;
++      struct nfs4_client *searchclp = NULL;
++
++      lockdep_assert_held(&state_lock);
++      lockdep_assert_held(&fp->fi_lock);
++
++      list_for_each_entry(searchdp, &fp->fi_delegations, dl_perfile) {
++              searchclp = searchdp->dl_stid.sc_client;
++              if (clp == searchclp) {
++                      return -EAGAIN;
++              }
++      }
++      return 0;
++}
++
++/**
++ * hash_delegation_locked - Add a delegation to the appropriate lists
++ * @dp:     a pointer to the nfs4_delegation we are adding.
++ * @fp:     a pointer to the nfs4_file we're granting a delegation on
++ *
++ * Return:
++ *      On success: NULL if the delegation was successfully hashed.
++ *
++ *      On error: -EAGAIN if one was previously granted to this
++ *                 nfs4_client for this nfs4_file. Delegation is not hashed.
++ *
++ */
++
++static int
+ hash_delegation_locked(struct nfs4_delegation *dp, struct nfs4_file *fp)
+ {
++      int status;
++      struct nfs4_client *clp = dp->dl_stid.sc_client;
++
+       lockdep_assert_held(&state_lock);
+       lockdep_assert_held(&fp->fi_lock);
+ 
++      status = nfs4_get_existing_delegation(clp, fp);
++      if (status)
++              return status;
++      ++fp->fi_delegees;
+       atomic_inc(&dp->dl_stid.sc_count);
+       dp->dl_stid.sc_type = NFS4_DELEG_STID;
+       list_add(&dp->dl_perfile, &fp->fi_delegations);
+-      list_add(&dp->dl_perclnt, &dp->dl_stid.sc_client->cl_delegations);
++      list_add(&dp->dl_perclnt, &clp->cl_delegations);
++      return 0;
+ }
+ 
+ static bool
+@@ -3351,6 +3403,7 @@ static void init_open_stateid(struct nfs4_ol_stateid 
*stp, struct nfs4_file *fp,
+       stp->st_access_bmap = 0;
+       stp->st_deny_bmap = 0;
+       stp->st_openstp = NULL;
++      init_rwsem(&stp->st_rwsem);
+       spin_lock(&oo->oo_owner.so_client->cl_lock);
+       list_add(&stp->st_perstateowner, &oo->oo_owner.so_stateids);
+       spin_lock(&fp->fi_lock);
+@@ -3939,6 +3992,18 @@ static struct file_lock *nfs4_alloc_init_lease(struct 
nfs4_file *fp, int flag)
+       return fl;
+ }
+ 
++/**
++ * nfs4_setlease - Obtain a delegation by requesting lease from vfs layer
++ * @dp:   a pointer to the nfs4_delegation we're adding.
++ *
++ * Return:
++ *      On success: Return code will be 0 on success.
++ *
++ *      On error: -EAGAIN if there was an existing delegation.
++ *                 nonzero if there is an error in other cases.
++ *
++ */
++
+ static int nfs4_setlease(struct nfs4_delegation *dp)
+ {
+       struct nfs4_file *fp = dp->dl_stid.sc_file;
+@@ -3970,16 +4035,19 @@ static int nfs4_setlease(struct nfs4_delegation *dp)
+               goto out_unlock;
+       /* Race breaker */
+       if (fp->fi_deleg_file) {
+-              status = 0;
+-              ++fp->fi_delegees;
+-              hash_delegation_locked(dp, fp);
++              status = hash_delegation_locked(dp, fp);
+               goto out_unlock;
+       }
+       fp->fi_deleg_file = filp;
+-      fp->fi_delegees = 1;
+-      hash_delegation_locked(dp, fp);
++      fp->fi_delegees = 0;
++      status = hash_delegation_locked(dp, fp);
+       spin_unlock(&fp->fi_lock);
+       spin_unlock(&state_lock);
++      if (status) {
++              /* Should never happen, this is a new fi_deleg_file  */
++              WARN_ON_ONCE(1);
++              goto out_fput;
++      }
+       return 0;
+ out_unlock:
+       spin_unlock(&fp->fi_lock);
+@@ -3999,6 +4067,15 @@ nfs4_set_delegation(struct nfs4_client *clp, struct 
svc_fh *fh,
+       if (fp->fi_had_conflict)
+               return ERR_PTR(-EAGAIN);
+ 
++      spin_lock(&state_lock);
++      spin_lock(&fp->fi_lock);
++      status = nfs4_get_existing_delegation(clp, fp);
++      spin_unlock(&fp->fi_lock);
++      spin_unlock(&state_lock);
++
++      if (status)
++              return ERR_PTR(status);
++
+       dp = alloc_init_deleg(clp, fh, odstate);
+       if (!dp)
+               return ERR_PTR(-ENOMEM);
+@@ -4017,9 +4094,7 @@ nfs4_set_delegation(struct nfs4_client *clp, struct 
svc_fh *fh,
+               status = -EAGAIN;
+               goto out_unlock;
+       }
+-      ++fp->fi_delegees;
+-      hash_delegation_locked(dp, fp);
+-      status = 0;
++      status = hash_delegation_locked(dp, fp);
+ out_unlock:
+       spin_unlock(&fp->fi_lock);
+       spin_unlock(&state_lock);
+@@ -4180,15 +4255,20 @@ nfsd4_process_open2(struct svc_rqst *rqstp, struct 
svc_fh *current_fh, struct nf
+        */
+       if (stp) {
+               /* Stateid was found, this is an OPEN upgrade */
++              down_read(&stp->st_rwsem);
+               status = nfs4_upgrade_open(rqstp, fp, current_fh, stp, open);
+-              if (status)
++              if (status) {
++                      up_read(&stp->st_rwsem);
+                       goto out;
++              }
+       } else {
+               stp = open->op_stp;
+               open->op_stp = NULL;
+               init_open_stateid(stp, fp, open);
++              down_read(&stp->st_rwsem);
+               status = nfs4_get_vfs_file(rqstp, fp, current_fh, stp, open);
+               if (status) {
++                      up_read(&stp->st_rwsem);
+                       release_open_stateid(stp);
+                       goto out;
+               }
+@@ -4200,6 +4280,7 @@ nfsd4_process_open2(struct svc_rqst *rqstp, struct 
svc_fh *current_fh, struct nf
+       }
+       update_stateid(&stp->st_stid.sc_stateid);
+       memcpy(&open->op_stateid, &stp->st_stid.sc_stateid, sizeof(stateid_t));
++      up_read(&stp->st_rwsem);
+ 
+       if (nfsd4_has_session(&resp->cstate)) {
+               if (open->op_deleg_want & NFS4_SHARE_WANT_NO_DELEG) {
+@@ -4814,10 +4895,13 @@ static __be32 nfs4_seqid_op_checks(struct 
nfsd4_compound_state *cstate, stateid_
+                * revoked delegations are kept only for free_stateid.
+                */
+               return nfserr_bad_stateid;
++      down_write(&stp->st_rwsem);
+       status = check_stateid_generation(stateid, &stp->st_stid.sc_stateid, 
nfsd4_has_session(cstate));
+-      if (status)
+-              return status;
+-      return nfs4_check_fh(current_fh, &stp->st_stid);
++      if (status == nfs_ok)
++              status = nfs4_check_fh(current_fh, &stp->st_stid);
++      if (status != nfs_ok)
++              up_write(&stp->st_rwsem);
++      return status;
+ }
+ 
+ /* 
+@@ -4864,6 +4948,7 @@ static __be32 nfs4_preprocess_confirmed_seqid_op(struct 
nfsd4_compound_state *cs
+               return status;
+       oo = openowner(stp->st_stateowner);
+       if (!(oo->oo_flags & NFS4_OO_CONFIRMED)) {
++              up_write(&stp->st_rwsem);
+               nfs4_put_stid(&stp->st_stid);
+               return nfserr_bad_stateid;
+       }
+@@ -4894,11 +4979,14 @@ nfsd4_open_confirm(struct svc_rqst *rqstp, struct 
nfsd4_compound_state *cstate,
+               goto out;
+       oo = openowner(stp->st_stateowner);
+       status = nfserr_bad_stateid;
+-      if (oo->oo_flags & NFS4_OO_CONFIRMED)
++      if (oo->oo_flags & NFS4_OO_CONFIRMED) {
++              up_write(&stp->st_rwsem);
+               goto put_stateid;
++      }
+       oo->oo_flags |= NFS4_OO_CONFIRMED;
+       update_stateid(&stp->st_stid.sc_stateid);
+       memcpy(&oc->oc_resp_stateid, &stp->st_stid.sc_stateid, 
sizeof(stateid_t));
++      up_write(&stp->st_rwsem);
+       dprintk("NFSD: %s: success, seqid=%d stateid=" STATEID_FMT "\n",
+               __func__, oc->oc_seqid, STATEID_VAL(&stp->st_stid.sc_stateid));
+ 
+@@ -4977,6 +5065,7 @@ nfsd4_open_downgrade(struct svc_rqst *rqstp,
+       memcpy(&od->od_stateid, &stp->st_stid.sc_stateid, sizeof(stateid_t));
+       status = nfs_ok;
+ put_stateid:
++      up_write(&stp->st_rwsem);
+       nfs4_put_stid(&stp->st_stid);
+ out:
+       nfsd4_bump_seqid(cstate, status);
+@@ -5030,6 +5119,7 @@ nfsd4_close(struct svc_rqst *rqstp, struct 
nfsd4_compound_state *cstate,
+               goto out; 
+       update_stateid(&stp->st_stid.sc_stateid);
+       memcpy(&close->cl_stateid, &stp->st_stid.sc_stateid, sizeof(stateid_t));
++      up_write(&stp->st_rwsem);
+ 
+       nfsd4_close_open_stateid(stp);
+ 
+@@ -5260,6 +5350,7 @@ init_lock_stateid(struct nfs4_ol_stateid *stp, struct 
nfs4_lockowner *lo,
+       stp->st_access_bmap = 0;
+       stp->st_deny_bmap = open_stp->st_deny_bmap;
+       stp->st_openstp = open_stp;
++      init_rwsem(&stp->st_rwsem);
+       list_add(&stp->st_locks, &open_stp->st_locks);
+       list_add(&stp->st_perstateowner, &lo->lo_owner.so_stateids);
+       spin_lock(&fp->fi_lock);
+@@ -5428,6 +5519,7 @@ nfsd4_lock(struct svc_rqst *rqstp, struct 
nfsd4_compound_state *cstate,
+                                       &open_stp, nn);
+               if (status)
+                       goto out;
++              up_write(&open_stp->st_rwsem);
+               open_sop = openowner(open_stp->st_stateowner);
+               status = nfserr_bad_stateid;
+               if (!same_clid(&open_sop->oo_owner.so_client->cl_clientid,
+@@ -5435,6 +5527,8 @@ nfsd4_lock(struct svc_rqst *rqstp, struct 
nfsd4_compound_state *cstate,
+                       goto out;
+               status = lookup_or_create_lock_state(cstate, open_stp, lock,
+                                                       &lock_stp, &new);
++              if (status == nfs_ok)
++                      down_write(&lock_stp->st_rwsem);
+       } else {
+               status = nfs4_preprocess_seqid_op(cstate,
+                                      lock->lk_old_lock_seqid,
+@@ -5540,6 +5634,8 @@ out:
+                   seqid_mutating_err(ntohl(status)))
+                       lock_sop->lo_owner.so_seqid++;
+ 
++              up_write(&lock_stp->st_rwsem);
++
+               /*
+                * If this is a new, never-before-used stateid, and we are
+                * returning an error, then just go ahead and release it.
+@@ -5710,6 +5806,7 @@ nfsd4_locku(struct svc_rqst *rqstp, struct 
nfsd4_compound_state *cstate,
+ fput:
+       fput(filp);
+ put_stateid:
++      up_write(&stp->st_rwsem);
+       nfs4_put_stid(&stp->st_stid);
+ out:
+       nfsd4_bump_seqid(cstate, status);
+diff --git a/fs/nfsd/state.h b/fs/nfsd/state.h
+index 4874ce515fc1..fada614d6db1 100644
+--- a/fs/nfsd/state.h
++++ b/fs/nfsd/state.h
+@@ -534,15 +534,16 @@ struct nfs4_file {
+  * Better suggestions welcome.
+  */
+ struct nfs4_ol_stateid {
+-      struct nfs4_stid    st_stid; /* must be first field */
+-      struct list_head              st_perfile;
+-      struct list_head              st_perstateowner;
+-      struct list_head              st_locks;
+-      struct nfs4_stateowner      * st_stateowner;
+-      struct nfs4_clnt_odstate    * st_clnt_odstate;
+-      unsigned char                 st_access_bmap;
+-      unsigned char                 st_deny_bmap;
+-      struct nfs4_ol_stateid         * st_openstp;
++      struct nfs4_stid                st_stid;
++      struct list_head                st_perfile;
++      struct list_head                st_perstateowner;
++      struct list_head                st_locks;
++      struct nfs4_stateowner          *st_stateowner;
++      struct nfs4_clnt_odstate        *st_clnt_odstate;
++      unsigned char                   st_access_bmap;
++      unsigned char                   st_deny_bmap;
++      struct nfs4_ol_stateid          *st_openstp;
++      struct rw_semaphore             st_rwsem;
+ };
+ 
+ static inline struct nfs4_ol_stateid *openlockstateid(struct nfs4_stid *s)
+diff --git a/fs/ocfs2/namei.c b/fs/ocfs2/namei.c
+index 6e6abb93fda5..ff040125c190 100644
+--- a/fs/ocfs2/namei.c
++++ b/fs/ocfs2/namei.c
+@@ -365,6 +365,8 @@ static int ocfs2_mknod(struct inode *dir,
+               mlog_errno(status);
+               goto leave;
+       }
++      /* update inode->i_mode after mask with "umask". */
++      inode->i_mode = mode;
+ 
+       handle = ocfs2_start_trans(osb, ocfs2_mknod_credits(osb->sb,
+                                                           S_ISDIR(mode),
+diff --git a/include/linux/ipv6.h b/include/linux/ipv6.h
+index 82806c60aa42..e4b464983322 100644
+--- a/include/linux/ipv6.h
++++ b/include/linux/ipv6.h
+@@ -224,7 +224,7 @@ struct ipv6_pinfo {
+       struct ipv6_ac_socklist *ipv6_ac_list;
+       struct ipv6_fl_socklist __rcu *ipv6_fl_list;
+ 
+-      struct ipv6_txoptions   *opt;
++      struct ipv6_txoptions __rcu     *opt;
+       struct sk_buff          *pktoptions;
+       struct sk_buff          *rxpmtu;
+       struct inet6_cork       cork;
+diff --git a/include/linux/jbd2.h b/include/linux/jbd2.h
+index eb1cebed3f36..c90c9b70e568 100644
+--- a/include/linux/jbd2.h
++++ b/include/linux/jbd2.h
+@@ -1007,6 +1007,7 @@ struct journal_s
+ #define JBD2_ABORT_ON_SYNCDATA_ERR    0x040   /* Abort the journal on file
+                                                * data write error in ordered
+                                                * mode */
++#define JBD2_REC_ERR  0x080   /* The errno in the sb has been recorded */
+ 
+ /*
+  * Function declarations for the journaling transaction and buffer
+diff --git a/include/net/af_unix.h b/include/net/af_unix.h
+index cb1b9bbda332..49c7683e1096 100644
+--- a/include/net/af_unix.h
++++ b/include/net/af_unix.h
+@@ -62,6 +62,7 @@ struct unix_sock {
+ #define UNIX_GC_CANDIDATE     0
+ #define UNIX_GC_MAYBE_CYCLE   1
+       struct socket_wq        peer_wq;
++      wait_queue_t            peer_wake;
+ };
+ 
+ static inline struct unix_sock *unix_sk(struct sock *sk)
+diff --git a/include/net/ip6_fib.h b/include/net/ip6_fib.h
+index 3b76849c190f..75a888c254e4 100644
+--- a/include/net/ip6_fib.h
++++ b/include/net/ip6_fib.h
+@@ -165,7 +165,8 @@ static inline void rt6_update_expires(struct rt6_info 
*rt0, int timeout)
+ 
+ static inline u32 rt6_get_cookie(const struct rt6_info *rt)
+ {
+-      if (rt->rt6i_flags & RTF_PCPU || unlikely(rt->dst.flags & DST_NOCACHE))
++      if (rt->rt6i_flags & RTF_PCPU ||
++          (unlikely(rt->dst.flags & DST_NOCACHE) && rt->dst.from))
+               rt = (struct rt6_info *)(rt->dst.from);
+ 
+       return rt->rt6i_node ? rt->rt6i_node->fn_sernum : 0;
+diff --git a/include/net/ip6_tunnel.h b/include/net/ip6_tunnel.h
+index b8529aa1dae7..b0f7445c0fdc 100644
+--- a/include/net/ip6_tunnel.h
++++ b/include/net/ip6_tunnel.h
+@@ -83,11 +83,12 @@ static inline void ip6tunnel_xmit(struct sock *sk, struct 
sk_buff *skb,
+       err = ip6_local_out_sk(sk, skb);
+ 
+       if (net_xmit_eval(err) == 0) {
+-              struct pcpu_sw_netstats *tstats = this_cpu_ptr(dev->tstats);
++              struct pcpu_sw_netstats *tstats = get_cpu_ptr(dev->tstats);
+               u64_stats_update_begin(&tstats->syncp);
+               tstats->tx_bytes += pkt_len;
+               tstats->tx_packets++;
+               u64_stats_update_end(&tstats->syncp);
++              put_cpu_ptr(tstats);
+       } else {
+               stats->tx_errors++;
+               stats->tx_aborted_errors++;
+diff --git a/include/net/ip_tunnels.h b/include/net/ip_tunnels.h
+index d8214cb88bbc..9c2897e56ee1 100644
+--- a/include/net/ip_tunnels.h
++++ b/include/net/ip_tunnels.h
+@@ -207,12 +207,13 @@ static inline void iptunnel_xmit_stats(int err,
+                                      struct pcpu_sw_netstats __percpu *stats)
+ {
+       if (err > 0) {
+-              struct pcpu_sw_netstats *tstats = this_cpu_ptr(stats);
++              struct pcpu_sw_netstats *tstats = get_cpu_ptr(stats);
+ 
+               u64_stats_update_begin(&tstats->syncp);
+               tstats->tx_bytes += err;
+               tstats->tx_packets++;
+               u64_stats_update_end(&tstats->syncp);
++              put_cpu_ptr(tstats);
+       } else if (err < 0) {
+               err_stats->tx_errors++;
+               err_stats->tx_aborted_errors++;
+diff --git a/include/net/ipv6.h b/include/net/ipv6.h
+index 82dbdb092a5d..177a89689095 100644
+--- a/include/net/ipv6.h
++++ b/include/net/ipv6.h
+@@ -205,6 +205,7 @@ extern rwlock_t ip6_ra_lock;
+  */
+ 
+ struct ipv6_txoptions {
++      atomic_t                refcnt;
+       /* Length of this structure */
+       int                     tot_len;
+ 
+@@ -217,7 +218,7 @@ struct ipv6_txoptions {
+       struct ipv6_opt_hdr     *dst0opt;
+       struct ipv6_rt_hdr      *srcrt; /* Routing Header */
+       struct ipv6_opt_hdr     *dst1opt;
+-
++      struct rcu_head         rcu;
+       /* Option buffer, as read by IPV6_PKTOPTIONS, starts here. */
+ };
+ 
+@@ -252,6 +253,24 @@ struct ipv6_fl_socklist {
+       struct rcu_head                 rcu;
+ };
+ 
++static inline struct ipv6_txoptions *txopt_get(const struct ipv6_pinfo *np)
++{
++      struct ipv6_txoptions *opt;
++
++      rcu_read_lock();
++      opt = rcu_dereference(np->opt);
++      if (opt && !atomic_inc_not_zero(&opt->refcnt))
++              opt = NULL;
++      rcu_read_unlock();
++      return opt;
++}
++
++static inline void txopt_put(struct ipv6_txoptions *opt)
++{
++      if (opt && atomic_dec_and_test(&opt->refcnt))
++              kfree_rcu(opt, rcu);
++}
++
+ struct ip6_flowlabel *fl6_sock_lookup(struct sock *sk, __be32 label);
+ struct ipv6_txoptions *fl6_merge_options(struct ipv6_txoptions *opt_space,
+                                        struct ip6_flowlabel *fl,
+@@ -490,6 +509,7 @@ struct ip6_create_arg {
+       u32 user;
+       const struct in6_addr *src;
+       const struct in6_addr *dst;
++      int iif;
+       u8 ecn;
+ };
+ 
+diff --git a/include/net/sch_generic.h b/include/net/sch_generic.h
+index 2738f6f87908..49dda3835061 100644
+--- a/include/net/sch_generic.h
++++ b/include/net/sch_generic.h
+@@ -61,6 +61,9 @@ struct Qdisc {
+                                     */
+ #define TCQ_F_WARN_NONWC      (1 << 16)
+ #define TCQ_F_CPUSTATS                0x20 /* run using percpu statistics */
++#define TCQ_F_NOPARENT                0x40 /* root of its hierarchy :
++                                    * qdisc_tree_decrease_qlen() should stop.
++                                    */
+       u32                     limit;
+       const struct Qdisc_ops  *ops;
+       struct qdisc_size_table __rcu *stab;
+diff --git a/include/net/switchdev.h b/include/net/switchdev.h
+index d5671f118bfc..0b9197975603 100644
+--- a/include/net/switchdev.h
++++ b/include/net/switchdev.h
+@@ -268,7 +268,7 @@ static inline int switchdev_port_fdb_dump(struct sk_buff 
*skb,
+                                         struct net_device *filter_dev,
+                                         int idx)
+ {
+-      return -EOPNOTSUPP;
++       return idx;
+ }
+ 
+ #endif
+diff --git a/kernel/bpf/arraymap.c b/kernel/bpf/arraymap.c
+index cb31229a6fa4..34265a1ddb51 100644
+--- a/kernel/bpf/arraymap.c
++++ b/kernel/bpf/arraymap.c
+@@ -104,7 +104,7 @@ static int array_map_update_elem(struct bpf_map *map, void 
*key, void *value,
+               /* all elements already exist */
+               return -EEXIST;
+ 
+-      memcpy(array->value + array->elem_size * index, value, 
array->elem_size);
++      memcpy(array->value + array->elem_size * index, value, map->value_size);
+       return 0;
+ }
+ 
+diff --git a/net/core/neighbour.c b/net/core/neighbour.c
+index 84195dacb8b6..ecdb1717ef3a 100644
+--- a/net/core/neighbour.c
++++ b/net/core/neighbour.c
+@@ -2210,7 +2210,7 @@ static int pneigh_fill_info(struct sk_buff *skb, struct 
pneigh_entry *pn,
+       ndm->ndm_pad2    = 0;
+       ndm->ndm_flags   = pn->flags | NTF_PROXY;
+       ndm->ndm_type    = RTN_UNICAST;
+-      ndm->ndm_ifindex = pn->dev->ifindex;
++      ndm->ndm_ifindex = pn->dev ? pn->dev->ifindex : 0;
+       ndm->ndm_state   = NUD_NONE;
+ 
+       if (nla_put(skb, NDA_DST, tbl->key_len, pn->key))
+@@ -2285,7 +2285,7 @@ static int pneigh_dump_table(struct neigh_table *tbl, 
struct sk_buff *skb,
+               if (h > s_h)
+                       s_idx = 0;
+               for (n = tbl->phash_buckets[h], idx = 0; n; n = n->next) {
+-                      if (dev_net(n->dev) != net)
++                      if (pneigh_net(n) != net)
+                               continue;
+                       if (idx < s_idx)
+                               goto next;
+diff --git a/net/core/scm.c b/net/core/scm.c
+index 3b6899b7d810..8a1741b14302 100644
+--- a/net/core/scm.c
++++ b/net/core/scm.c
+@@ -305,6 +305,8 @@ void scm_detach_fds(struct msghdr *msg, struct scm_cookie 
*scm)
+                       err = put_user(cmlen, &cm->cmsg_len);
+               if (!err) {
+                       cmlen = CMSG_SPACE(i*sizeof(int));
++                      if (msg->msg_controllen < cmlen)
++                              cmlen = msg->msg_controllen;
+                       msg->msg_control += cmlen;
+                       msg->msg_controllen -= cmlen;
+               }
+diff --git a/net/dccp/ipv6.c b/net/dccp/ipv6.c
+index 5165571f397a..a0490508d213 100644
+--- a/net/dccp/ipv6.c
++++ b/net/dccp/ipv6.c
+@@ -202,7 +202,9 @@ static int dccp_v6_send_response(struct sock *sk, struct 
request_sock *req)
+       security_req_classify_flow(req, flowi6_to_flowi(&fl6));
+ 
+ 
+-      final_p = fl6_update_dst(&fl6, np->opt, &final);
++      rcu_read_lock();
++      final_p = fl6_update_dst(&fl6, rcu_dereference(np->opt), &final);
++      rcu_read_unlock();
+ 
+       dst = ip6_dst_lookup_flow(sk, &fl6, final_p);
+       if (IS_ERR(dst)) {
+@@ -219,7 +221,10 @@ static int dccp_v6_send_response(struct sock *sk, struct 
request_sock *req)
+                                                        &ireq->ir_v6_loc_addr,
+                                                        &ireq->ir_v6_rmt_addr);
+               fl6.daddr = ireq->ir_v6_rmt_addr;
+-              err = ip6_xmit(sk, skb, &fl6, np->opt, np->tclass);
++              rcu_read_lock();
++              err = ip6_xmit(sk, skb, &fl6, rcu_dereference(np->opt),
++                             np->tclass);
++              rcu_read_unlock();
+               err = net_xmit_eval(err);
+       }
+ 
+@@ -415,6 +420,7 @@ static struct sock *dccp_v6_request_recv_sock(struct sock 
*sk,
+ {
+       struct inet_request_sock *ireq = inet_rsk(req);
+       struct ipv6_pinfo *newnp, *np = inet6_sk(sk);
++      struct ipv6_txoptions *opt;
+       struct inet_sock *newinet;
+       struct dccp6_sock *newdp6;
+       struct sock *newsk;
+@@ -534,13 +540,15 @@ static struct sock *dccp_v6_request_recv_sock(struct 
sock *sk,
+        * Yes, keeping reference count would be much more clever, but we make
+        * one more one thing there: reattach optmem to newsk.
+        */
+-      if (np->opt != NULL)
+-              newnp->opt = ipv6_dup_options(newsk, np->opt);
+-
++      opt = rcu_dereference(np->opt);
++      if (opt) {
++              opt = ipv6_dup_options(newsk, opt);
++              RCU_INIT_POINTER(newnp->opt, opt);
++      }
+       inet_csk(newsk)->icsk_ext_hdr_len = 0;
+-      if (newnp->opt != NULL)
+-              inet_csk(newsk)->icsk_ext_hdr_len = (newnp->opt->opt_nflen +
+-                                                   newnp->opt->opt_flen);
++      if (opt)
++              inet_csk(newsk)->icsk_ext_hdr_len = opt->opt_nflen +
++                                                  opt->opt_flen;
+ 
+       dccp_sync_mss(newsk, dst_mtu(dst));
+ 
+@@ -793,6 +801,7 @@ static int dccp_v6_connect(struct sock *sk, struct 
sockaddr *uaddr,
+       struct ipv6_pinfo *np = inet6_sk(sk);
+       struct dccp_sock *dp = dccp_sk(sk);
+       struct in6_addr *saddr = NULL, *final_p, final;
++      struct ipv6_txoptions *opt;
+       struct flowi6 fl6;
+       struct dst_entry *dst;
+       int addr_type;
+@@ -892,7 +901,8 @@ static int dccp_v6_connect(struct sock *sk, struct 
sockaddr *uaddr,
+       fl6.fl6_sport = inet->inet_sport;
+       security_sk_classify_flow(sk, flowi6_to_flowi(&fl6));
+ 
+-      final_p = fl6_update_dst(&fl6, np->opt, &final);
++      opt = rcu_dereference_protected(np->opt, sock_owned_by_user(sk));
++      final_p = fl6_update_dst(&fl6, opt, &final);
+ 
+       dst = ip6_dst_lookup_flow(sk, &fl6, final_p);
+       if (IS_ERR(dst)) {
+@@ -912,9 +922,8 @@ static int dccp_v6_connect(struct sock *sk, struct 
sockaddr *uaddr,
+       __ip6_dst_store(sk, dst, NULL, NULL);
+ 
+       icsk->icsk_ext_hdr_len = 0;
+-      if (np->opt != NULL)
+-              icsk->icsk_ext_hdr_len = (np->opt->opt_flen +
+-                                        np->opt->opt_nflen);
++      if (opt)
++              icsk->icsk_ext_hdr_len = opt->opt_flen + opt->opt_nflen;
+ 
+       inet->inet_dport = usin->sin6_port;
+ 
+diff --git a/net/ipv4/ipmr.c b/net/ipv4/ipmr.c
+index df28693f32e1..c3bfebd501ed 100644
+--- a/net/ipv4/ipmr.c
++++ b/net/ipv4/ipmr.c
+@@ -134,7 +134,7 @@ static int __ipmr_fill_mroute(struct mr_table *mrt, struct 
sk_buff *skb,
+                             struct mfc_cache *c, struct rtmsg *rtm);
+ static void mroute_netlink_event(struct mr_table *mrt, struct mfc_cache *mfc,
+                                int cmd);
+-static void mroute_clean_tables(struct mr_table *mrt);
++static void mroute_clean_tables(struct mr_table *mrt, bool all);
+ static void ipmr_expire_process(unsigned long arg);
+ 
+ #ifdef CONFIG_IP_MROUTE_MULTIPLE_TABLES
+@@ -351,7 +351,7 @@ static struct mr_table *ipmr_new_table(struct net *net, 
u32 id)
+ static void ipmr_free_table(struct mr_table *mrt)
+ {
+       del_timer_sync(&mrt->ipmr_expire_timer);
+-      mroute_clean_tables(mrt);
++      mroute_clean_tables(mrt, true);
+       kfree(mrt);
+ }
+ 
+@@ -1209,7 +1209,7 @@ static int ipmr_mfc_add(struct net *net, struct mr_table 
*mrt,
+  *    Close the multicast socket, and clear the vif tables etc
+  */
+ 
+-static void mroute_clean_tables(struct mr_table *mrt)
++static void mroute_clean_tables(struct mr_table *mrt, bool all)
+ {
+       int i;
+       LIST_HEAD(list);
+@@ -1218,8 +1218,9 @@ static void mroute_clean_tables(struct mr_table *mrt)
+       /* Shut down all active vif entries */
+ 
+       for (i = 0; i < mrt->maxvif; i++) {
+-              if (!(mrt->vif_table[i].flags & VIFF_STATIC))
+-                      vif_delete(mrt, i, 0, &list);
++              if (!all && (mrt->vif_table[i].flags & VIFF_STATIC))
++                      continue;
++              vif_delete(mrt, i, 0, &list);
+       }
+       unregister_netdevice_many(&list);
+ 
+@@ -1227,7 +1228,7 @@ static void mroute_clean_tables(struct mr_table *mrt)
+ 
+       for (i = 0; i < MFC_LINES; i++) {
+               list_for_each_entry_safe(c, next, &mrt->mfc_cache_array[i], 
list) {
+-                      if (c->mfc_flags & MFC_STATIC)
++                      if (!all && (c->mfc_flags & MFC_STATIC))
+                               continue;
+                       list_del_rcu(&c->list);
+                       mroute_netlink_event(mrt, c, RTM_DELROUTE);
+@@ -1262,7 +1263,7 @@ static void mrtsock_destruct(struct sock *sk)
+                                                   NETCONFA_IFINDEX_ALL,
+                                                   net->ipv4.devconf_all);
+                       RCU_INIT_POINTER(mrt->mroute_sk, NULL);
+-                      mroute_clean_tables(mrt);
++                      mroute_clean_tables(mrt, false);
+               }
+       }
+       rtnl_unlock();
+diff --git a/net/ipv4/tcp_input.c b/net/ipv4/tcp_input.c
+index 728f5b3d3c64..77730b43469d 100644
+--- a/net/ipv4/tcp_input.c
++++ b/net/ipv4/tcp_input.c
+@@ -4434,19 +4434,34 @@ static int __must_check tcp_queue_rcv(struct sock *sk, 
struct sk_buff *skb, int
+ int tcp_send_rcvq(struct sock *sk, struct msghdr *msg, size_t size)
+ {
+       struct sk_buff *skb;
++      int err = -ENOMEM;
++      int data_len = 0;
+       bool fragstolen;
+ 
+       if (size == 0)
+               return 0;
+ 
+-      skb = alloc_skb(size, sk->sk_allocation);
++      if (size > PAGE_SIZE) {
++              int npages = min_t(size_t, size >> PAGE_SHIFT, MAX_SKB_FRAGS);
++
++              data_len = npages << PAGE_SHIFT;
++              size = data_len + (size & ~PAGE_MASK);
++      }
++      skb = alloc_skb_with_frags(size - data_len, data_len,
++                                 PAGE_ALLOC_COSTLY_ORDER,
++                                 &err, sk->sk_allocation);
+       if (!skb)
+               goto err;
+ 
++      skb_put(skb, size - data_len);
++      skb->data_len = data_len;
++      skb->len = size;
++
+       if (tcp_try_rmem_schedule(sk, skb, skb->truesize))
+               goto err_free;
+ 
+-      if (memcpy_from_msg(skb_put(skb, size), msg, size))
++      err = skb_copy_datagram_from_iter(skb, 0, &msg->msg_iter, size);
++      if (err)
+               goto err_free;
+ 
+       TCP_SKB_CB(skb)->seq = tcp_sk(sk)->rcv_nxt;
+@@ -4462,7 +4477,8 @@ int tcp_send_rcvq(struct sock *sk, struct msghdr *msg, 
size_t size)
+ err_free:
+       kfree_skb(skb);
+ err:
+-      return -ENOMEM;
++      return err;
++
+ }
+ 
+ static void tcp_data_queue(struct sock *sk, struct sk_buff *skb)
+@@ -5620,6 +5636,7 @@ discard:
+               }
+ 
+               tp->rcv_nxt = TCP_SKB_CB(skb)->seq + 1;
++              tp->copied_seq = tp->rcv_nxt;
+               tp->rcv_wup = TCP_SKB_CB(skb)->seq + 1;
+ 
+               /* RFC1323: The window in SYN & SYN/ACK segments is
+diff --git a/net/ipv4/tcp_ipv4.c b/net/ipv4/tcp_ipv4.c
+index 0ea2e1c5d395..569c63894472 100644
+--- a/net/ipv4/tcp_ipv4.c
++++ b/net/ipv4/tcp_ipv4.c
+@@ -922,7 +922,8 @@ int tcp_md5_do_add(struct sock *sk, const union 
tcp_md5_addr *addr,
+       }
+ 
+       md5sig = rcu_dereference_protected(tp->md5sig_info,
+-                                         sock_owned_by_user(sk));
++                                         sock_owned_by_user(sk) ||
++                                         lockdep_is_held(&sk->sk_lock.slock));
+       if (!md5sig) {
+               md5sig = kmalloc(sizeof(*md5sig), gfp);
+               if (!md5sig)
+diff --git a/net/ipv4/tcp_timer.c b/net/ipv4/tcp_timer.c
+index 5b752f58a900..1e63c8fe1db8 100644
+--- a/net/ipv4/tcp_timer.c
++++ b/net/ipv4/tcp_timer.c
+@@ -176,6 +176,18 @@ static int tcp_write_timeout(struct sock *sk)
+               syn_set = true;
+       } else {
+               if (retransmits_timed_out(sk, sysctl_tcp_retries1, 0, 0)) {
++                      /* Some middle-boxes may black-hole Fast Open _after_
++                       * the handshake. Therefore we conservatively disable
++                       * Fast Open on this path on recurring timeouts with
++                       * few or zero bytes acked after Fast Open.
++                       */
++                      if (tp->syn_data_acked &&
++                          tp->bytes_acked <= tp->rx_opt.mss_clamp) {
++                              tcp_fastopen_cache_set(sk, 0, NULL, true, 0);
++                              if (icsk->icsk_retransmits == 
sysctl_tcp_retries1)
++                                      NET_INC_STATS_BH(sock_net(sk),
++                                                       
LINUX_MIB_TCPFASTOPENACTIVEFAIL);
++                      }
+                       /* Black hole detection */
+                       tcp_mtu_probing(icsk, sk);
+ 
+diff --git a/net/ipv6/af_inet6.c b/net/ipv6/af_inet6.c
+index 7de52b65173f..d87519efc3bd 100644
+--- a/net/ipv6/af_inet6.c
++++ b/net/ipv6/af_inet6.c
+@@ -426,9 +426,11 @@ void inet6_destroy_sock(struct sock *sk)
+ 
+       /* Free tx options */
+ 
+-      opt = xchg(&np->opt, NULL);
+-      if (opt)
+-              sock_kfree_s(sk, opt, opt->tot_len);
++      opt = xchg((__force struct ipv6_txoptions **)&np->opt, NULL);
++      if (opt) {
++              atomic_sub(opt->tot_len, &sk->sk_omem_alloc);
++              txopt_put(opt);
++      }
+ }
+ EXPORT_SYMBOL_GPL(inet6_destroy_sock);
+ 
+@@ -657,7 +659,10 @@ int inet6_sk_rebuild_header(struct sock *sk)
+               fl6.fl6_sport = inet->inet_sport;
+               security_sk_classify_flow(sk, flowi6_to_flowi(&fl6));
+ 
+-              final_p = fl6_update_dst(&fl6, np->opt, &final);
++              rcu_read_lock();
++              final_p = fl6_update_dst(&fl6, rcu_dereference(np->opt),
++                                       &final);
++              rcu_read_unlock();
+ 
+               dst = ip6_dst_lookup_flow(sk, &fl6, final_p);
+               if (IS_ERR(dst)) {
+diff --git a/net/ipv6/datagram.c b/net/ipv6/datagram.c
+index b10a88986a98..13ca4cf5616f 100644
+--- a/net/ipv6/datagram.c
++++ b/net/ipv6/datagram.c
+@@ -167,8 +167,10 @@ ipv4_connected:
+ 
+       security_sk_classify_flow(sk, flowi6_to_flowi(&fl6));
+ 
+-      opt = flowlabel ? flowlabel->opt : np->opt;
++      rcu_read_lock();
++      opt = flowlabel ? flowlabel->opt : rcu_dereference(np->opt);
+       final_p = fl6_update_dst(&fl6, opt, &final);
++      rcu_read_unlock();
+ 
+       dst = ip6_dst_lookup_flow(sk, &fl6, final_p);
+       err = 0;
+diff --git a/net/ipv6/exthdrs.c b/net/ipv6/exthdrs.c
+index a7bbbe45570b..adbd6958c398 100644
+--- a/net/ipv6/exthdrs.c
++++ b/net/ipv6/exthdrs.c
+@@ -727,6 +727,7 @@ ipv6_dup_options(struct sock *sk, struct ipv6_txoptions 
*opt)
+                       *((char **)&opt2->dst1opt) += dif;
+               if (opt2->srcrt)
+                       *((char **)&opt2->srcrt) += dif;
++              atomic_set(&opt2->refcnt, 1);
+       }
+       return opt2;
+ }
+@@ -790,7 +791,7 @@ ipv6_renew_options(struct sock *sk, struct ipv6_txoptions 
*opt,
+               return ERR_PTR(-ENOBUFS);
+ 
+       memset(opt2, 0, tot_len);
+-
++      atomic_set(&opt2->refcnt, 1);
+       opt2->tot_len = tot_len;
+       p = (char *)(opt2 + 1);
+ 
+diff --git a/net/ipv6/inet6_connection_sock.c 
b/net/ipv6/inet6_connection_sock.c
+index 6927f3fb5597..9beed302eb36 100644
+--- a/net/ipv6/inet6_connection_sock.c
++++ b/net/ipv6/inet6_connection_sock.c
+@@ -77,7 +77,9 @@ struct dst_entry *inet6_csk_route_req(struct sock *sk,
+       memset(fl6, 0, sizeof(*fl6));
+       fl6->flowi6_proto = IPPROTO_TCP;
+       fl6->daddr = ireq->ir_v6_rmt_addr;
+-      final_p = fl6_update_dst(fl6, np->opt, &final);
++      rcu_read_lock();
++      final_p = fl6_update_dst(fl6, rcu_dereference(np->opt), &final);
++      rcu_read_unlock();
+       fl6->saddr = ireq->ir_v6_loc_addr;
+       fl6->flowi6_oif = ireq->ir_iif;
+       fl6->flowi6_mark = ireq->ir_mark;
+@@ -207,7 +209,9 @@ static struct dst_entry *inet6_csk_route_socket(struct 
sock *sk,
+       fl6->fl6_dport = inet->inet_dport;
+       security_sk_classify_flow(sk, flowi6_to_flowi(fl6));
+ 
+-      final_p = fl6_update_dst(fl6, np->opt, &final);
++      rcu_read_lock();
++      final_p = fl6_update_dst(fl6, rcu_dereference(np->opt), &final);
++      rcu_read_unlock();
+ 
+       dst = __inet6_csk_dst_check(sk, np->dst_cookie);
+       if (!dst) {
+@@ -240,7 +244,8 @@ int inet6_csk_xmit(struct sock *sk, struct sk_buff *skb, 
struct flowi *fl_unused
+       /* Restore final destination back after routing done */
+       fl6.daddr = sk->sk_v6_daddr;
+ 
+-      res = ip6_xmit(sk, skb, &fl6, np->opt, np->tclass);
++      res = ip6_xmit(sk, skb, &fl6, rcu_dereference(np->opt),
++                     np->tclass);
+       rcu_read_unlock();
+       return res;
+ }
+diff --git a/net/ipv6/ip6mr.c b/net/ipv6/ip6mr.c
+index 5f36266b1f5e..a7aef4b52d65 100644
+--- a/net/ipv6/ip6mr.c
++++ b/net/ipv6/ip6mr.c
+@@ -118,7 +118,7 @@ static void mr6_netlink_event(struct mr6_table *mrt, 
struct mfc6_cache *mfc,
+                             int cmd);
+ static int ip6mr_rtm_dumproute(struct sk_buff *skb,
+                              struct netlink_callback *cb);
+-static void mroute_clean_tables(struct mr6_table *mrt);
++static void mroute_clean_tables(struct mr6_table *mrt, bool all);
+ static void ipmr_expire_process(unsigned long arg);
+ 
+ #ifdef CONFIG_IPV6_MROUTE_MULTIPLE_TABLES
+@@ -335,7 +335,7 @@ static struct mr6_table *ip6mr_new_table(struct net *net, 
u32 id)
+ static void ip6mr_free_table(struct mr6_table *mrt)
+ {
+       del_timer_sync(&mrt->ipmr_expire_timer);
+-      mroute_clean_tables(mrt);
++      mroute_clean_tables(mrt, true);
+       kfree(mrt);
+ }
+ 
+@@ -1543,7 +1543,7 @@ static int ip6mr_mfc_add(struct net *net, struct 
mr6_table *mrt,
+  *    Close the multicast socket, and clear the vif tables etc
+  */
+ 
+-static void mroute_clean_tables(struct mr6_table *mrt)
++static void mroute_clean_tables(struct mr6_table *mrt, bool all)
+ {
+       int i;
+       LIST_HEAD(list);
+@@ -1553,8 +1553,9 @@ static void mroute_clean_tables(struct mr6_table *mrt)
+        *      Shut down all active vif entries
+        */
+       for (i = 0; i < mrt->maxvif; i++) {
+-              if (!(mrt->vif6_table[i].flags & VIFF_STATIC))
+-                      mif6_delete(mrt, i, &list);
++              if (!all && (mrt->vif6_table[i].flags & VIFF_STATIC))
++                      continue;
++              mif6_delete(mrt, i, &list);
+       }
+       unregister_netdevice_many(&list);
+ 
+@@ -1563,7 +1564,7 @@ static void mroute_clean_tables(struct mr6_table *mrt)
+        */
+       for (i = 0; i < MFC6_LINES; i++) {
+               list_for_each_entry_safe(c, next, &mrt->mfc6_cache_array[i], 
list) {
+-                      if (c->mfc_flags & MFC_STATIC)
++                      if (!all && (c->mfc_flags & MFC_STATIC))
+                               continue;
+                       write_lock_bh(&mrt_lock);
+                       list_del(&c->list);
+@@ -1626,7 +1627,7 @@ int ip6mr_sk_done(struct sock *sk)
+                                                    net->ipv6.devconf_all);
+                       write_unlock_bh(&mrt_lock);
+ 
+-                      mroute_clean_tables(mrt);
++                      mroute_clean_tables(mrt, false);
+                       err = 0;
+                       break;
+               }
+diff --git a/net/ipv6/ipv6_sockglue.c b/net/ipv6/ipv6_sockglue.c
+index 63e6956917c9..4449ad1f8114 100644
+--- a/net/ipv6/ipv6_sockglue.c
++++ b/net/ipv6/ipv6_sockglue.c
+@@ -111,7 +111,8 @@ struct ipv6_txoptions *ipv6_update_options(struct sock *sk,
+                       icsk->icsk_sync_mss(sk, icsk->icsk_pmtu_cookie);
+               }
+       }
+-      opt = xchg(&inet6_sk(sk)->opt, opt);
++      opt = xchg((__force struct ipv6_txoptions **)&inet6_sk(sk)->opt,
++                 opt);
+       sk_dst_reset(sk);
+ 
+       return opt;
+@@ -231,9 +232,12 @@ static int do_ipv6_setsockopt(struct sock *sk, int level, 
int optname,
+                               sk->sk_socket->ops = &inet_dgram_ops;
+                               sk->sk_family = PF_INET;
+                       }
+-                      opt = xchg(&np->opt, NULL);
+-                      if (opt)
+-                              sock_kfree_s(sk, opt, opt->tot_len);
++                      opt = xchg((__force struct ipv6_txoptions **)&np->opt,
++                                 NULL);
++                      if (opt) {
++                              atomic_sub(opt->tot_len, &sk->sk_omem_alloc);
++                              txopt_put(opt);
++                      }
+                       pktopt = xchg(&np->pktoptions, NULL);
+                       kfree_skb(pktopt);
+ 
+@@ -403,7 +407,8 @@ static int do_ipv6_setsockopt(struct sock *sk, int level, 
int optname,
+               if (optname != IPV6_RTHDR && !ns_capable(net->user_ns, 
CAP_NET_RAW))
+                       break;
+ 
+-              opt = ipv6_renew_options(sk, np->opt, optname,
++              opt = rcu_dereference_protected(np->opt, 
sock_owned_by_user(sk));
++              opt = ipv6_renew_options(sk, opt, optname,
+                                        (struct ipv6_opt_hdr __user *)optval,
+                                        optlen);
+               if (IS_ERR(opt)) {
+@@ -432,8 +437,10 @@ static int do_ipv6_setsockopt(struct sock *sk, int level, 
int optname,
+               retv = 0;
+               opt = ipv6_update_options(sk, opt);
+ sticky_done:
+-              if (opt)
+-                      sock_kfree_s(sk, opt, opt->tot_len);
++              if (opt) {
++                      atomic_sub(opt->tot_len, &sk->sk_omem_alloc);
++                      txopt_put(opt);
++              }
+               break;
+       }
+ 
+@@ -486,6 +493,7 @@ sticky_done:
+                       break;
+ 
+               memset(opt, 0, sizeof(*opt));
++              atomic_set(&opt->refcnt, 1);
+               opt->tot_len = sizeof(*opt) + optlen;
+               retv = -EFAULT;
+               if (copy_from_user(opt+1, optval, optlen))
+@@ -502,8 +510,10 @@ update:
+               retv = 0;
+               opt = ipv6_update_options(sk, opt);
+ done:
+-              if (opt)
+-                      sock_kfree_s(sk, opt, opt->tot_len);
++              if (opt) {
++                      atomic_sub(opt->tot_len, &sk->sk_omem_alloc);
++                      txopt_put(opt);
++              }
+               break;
+       }
+       case IPV6_UNICAST_HOPS:
+@@ -1110,10 +1120,11 @@ static int do_ipv6_getsockopt(struct sock *sk, int 
level, int optname,
+       case IPV6_RTHDR:
+       case IPV6_DSTOPTS:
+       {
++              struct ipv6_txoptions *opt;
+ 
+               lock_sock(sk);
+-              len = ipv6_getsockopt_sticky(sk, np->opt,
+-                                           optname, optval, len);
++              opt = rcu_dereference_protected(np->opt, 
sock_owned_by_user(sk));
++              len = ipv6_getsockopt_sticky(sk, opt, optname, optval, len);
+               release_sock(sk);
+               /* check if ipv6_getsockopt_sticky() returns err code */
+               if (len < 0)
+diff --git a/net/ipv6/mcast.c b/net/ipv6/mcast.c
+index 083b2927fc67..41e3b5ee8d0b 100644
+--- a/net/ipv6/mcast.c
++++ b/net/ipv6/mcast.c
+@@ -1651,7 +1651,6 @@ out:
+       if (!err) {
+               ICMP6MSGOUT_INC_STATS(net, idev, ICMPV6_MLD2_REPORT);
+               ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS);
+-              IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUTMCAST, payload_len);
+       } else {
+               IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS);
+       }
+@@ -2014,7 +2013,6 @@ out:
+       if (!err) {
+               ICMP6MSGOUT_INC_STATS(net, idev, type);
+               ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS);
+-              IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUTMCAST, full_len);
+       } else
+               IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS);
+ 
+diff --git a/net/ipv6/netfilter/nf_conntrack_reasm.c 
b/net/ipv6/netfilter/nf_conntrack_reasm.c
+index 6d02498172c1..2a4682c847b0 100644
+--- a/net/ipv6/netfilter/nf_conntrack_reasm.c
++++ b/net/ipv6/netfilter/nf_conntrack_reasm.c
+@@ -190,7 +190,7 @@ static void nf_ct_frag6_expire(unsigned long data)
+ /* Creation primitives. */
+ static inline struct frag_queue *fq_find(struct net *net, __be32 id,
+                                        u32 user, struct in6_addr *src,
+-                                       struct in6_addr *dst, u8 ecn)
++                                       struct in6_addr *dst, int iif, u8 ecn)
+ {
+       struct inet_frag_queue *q;
+       struct ip6_create_arg arg;
+@@ -200,6 +200,7 @@ static inline struct frag_queue *fq_find(struct net *net, 
__be32 id,
+       arg.user = user;
+       arg.src = src;
+       arg.dst = dst;
++      arg.iif = iif;
+       arg.ecn = ecn;
+ 
+       local_bh_disable();
+@@ -603,7 +604,7 @@ struct sk_buff *nf_ct_frag6_gather(struct sk_buff *skb, 
u32 user)
+       fhdr = (struct frag_hdr *)skb_transport_header(clone);
+ 
+       fq = fq_find(net, fhdr->identification, user, &hdr->saddr, &hdr->daddr,
+-                   ip6_frag_ecn(hdr));
++                   skb->dev ? skb->dev->ifindex : 0, ip6_frag_ecn(hdr));
+       if (fq == NULL) {
+               pr_debug("Can't find and can't create new queue\n");
+               goto ret_orig;
+diff --git a/net/ipv6/raw.c b/net/ipv6/raw.c
+index ca4700cb26c4..92d532967c90 100644
+--- a/net/ipv6/raw.c
++++ b/net/ipv6/raw.c
+@@ -731,6 +731,7 @@ static int raw6_getfrag(void *from, char *to, int offset, 
int len, int odd,
+ 
+ static int rawv6_sendmsg(struct sock *sk, struct msghdr *msg, size_t len)
+ {
++      struct ipv6_txoptions *opt_to_free = NULL;
+       struct ipv6_txoptions opt_space;
+       DECLARE_SOCKADDR(struct sockaddr_in6 *, sin6, msg->msg_name);
+       struct in6_addr *daddr, *final_p, final;
+@@ -837,8 +838,10 @@ static int rawv6_sendmsg(struct sock *sk, struct msghdr 
*msg, size_t len)
+               if (!(opt->opt_nflen|opt->opt_flen))
+                       opt = NULL;
+       }
+-      if (!opt)
+-              opt = np->opt;
++      if (!opt) {
++              opt = txopt_get(np);
++              opt_to_free = opt;
++              }
+       if (flowlabel)
+               opt = fl6_merge_options(&opt_space, flowlabel, opt);
+       opt = ipv6_fixup_options(&opt_space, opt);
+@@ -904,6 +907,7 @@ done:
+       dst_release(dst);
+ out:
+       fl6_sock_release(flowlabel);
++      txopt_put(opt_to_free);
+       return err < 0 ? err : len;
+ do_confirm:
+       dst_confirm(dst);
+diff --git a/net/ipv6/reassembly.c b/net/ipv6/reassembly.c
+index f1159bb76e0a..04013a910ce5 100644
+--- a/net/ipv6/reassembly.c
++++ b/net/ipv6/reassembly.c
+@@ -108,7 +108,10 @@ bool ip6_frag_match(const struct inet_frag_queue *q, 
const void *a)
+       return  fq->id == arg->id &&
+               fq->user == arg->user &&
+               ipv6_addr_equal(&fq->saddr, arg->src) &&
+-              ipv6_addr_equal(&fq->daddr, arg->dst);
++              ipv6_addr_equal(&fq->daddr, arg->dst) &&
++              (arg->iif == fq->iif ||
++               !(ipv6_addr_type(arg->dst) & (IPV6_ADDR_MULTICAST |
++                                             IPV6_ADDR_LINKLOCAL)));
+ }
+ EXPORT_SYMBOL(ip6_frag_match);
+ 
+@@ -180,7 +183,7 @@ static void ip6_frag_expire(unsigned long data)
+ 
+ static struct frag_queue *
+ fq_find(struct net *net, __be32 id, const struct in6_addr *src,
+-      const struct in6_addr *dst, u8 ecn)
++      const struct in6_addr *dst, int iif, u8 ecn)
+ {
+       struct inet_frag_queue *q;
+       struct ip6_create_arg arg;
+@@ -190,6 +193,7 @@ fq_find(struct net *net, __be32 id, const struct in6_addr 
*src,
+       arg.user = IP6_DEFRAG_LOCAL_DELIVER;
+       arg.src = src;
+       arg.dst = dst;
++      arg.iif = iif;
+       arg.ecn = ecn;
+ 
+       hash = inet6_hash_frag(id, src, dst);
+@@ -551,7 +555,7 @@ static int ipv6_frag_rcv(struct sk_buff *skb)
+       }
+ 
+       fq = fq_find(net, fhdr->identification, &hdr->saddr, &hdr->daddr,
+-                   ip6_frag_ecn(hdr));
++                   skb->dev ? skb->dev->ifindex : 0, ip6_frag_ecn(hdr));
+       if (fq) {
+               int ret;
+ 
+diff --git a/net/ipv6/route.c b/net/ipv6/route.c
+index dd6ebba5846c..8478719ef500 100644
+--- a/net/ipv6/route.c
++++ b/net/ipv6/route.c
+@@ -401,6 +401,14 @@ static void ip6_dst_ifdown(struct dst_entry *dst, struct 
net_device *dev,
+       }
+ }
+ 
++static bool __rt6_check_expired(const struct rt6_info *rt)
++{
++      if (rt->rt6i_flags & RTF_EXPIRES)
++              return time_after(jiffies, rt->dst.expires);
++      else
++              return false;
++}
++
+ static bool rt6_check_expired(const struct rt6_info *rt)
+ {
+       if (rt->rt6i_flags & RTF_EXPIRES) {
+@@ -1255,7 +1263,8 @@ static struct dst_entry *rt6_check(struct rt6_info *rt, 
u32 cookie)
+ 
+ static struct dst_entry *rt6_dst_from_check(struct rt6_info *rt, u32 cookie)
+ {
+-      if (rt->dst.obsolete == DST_OBSOLETE_FORCE_CHK &&
++      if (!__rt6_check_expired(rt) &&
++          rt->dst.obsolete == DST_OBSOLETE_FORCE_CHK &&
+           rt6_check((struct rt6_info *)(rt->dst.from), cookie))
+               return &rt->dst;
+       else
+@@ -1275,7 +1284,8 @@ static struct dst_entry *ip6_dst_check(struct dst_entry 
*dst, u32 cookie)
+ 
+       rt6_dst_from_metrics_check(rt);
+ 
+-      if ((rt->rt6i_flags & RTF_PCPU) || unlikely(dst->flags & DST_NOCACHE))
++      if (rt->rt6i_flags & RTF_PCPU ||
++          (unlikely(dst->flags & DST_NOCACHE) && rt->dst.from))
+               return rt6_dst_from_check(rt, cookie);
+       else
+               return rt6_check(rt, cookie);
+@@ -1326,6 +1336,12 @@ static void rt6_do_update_pmtu(struct rt6_info *rt, u32 
mtu)
+       rt6_update_expires(rt, net->ipv6.sysctl.ip6_rt_mtu_expires);
+ }
+ 
++static bool rt6_cache_allowed_for_pmtu(const struct rt6_info *rt)
++{
++      return !(rt->rt6i_flags & RTF_CACHE) &&
++              (rt->rt6i_flags & RTF_PCPU || rt->rt6i_node);
++}
++
+ static void __ip6_rt_update_pmtu(struct dst_entry *dst, const struct sock *sk,
+                                const struct ipv6hdr *iph, u32 mtu)
+ {
+@@ -1339,7 +1355,7 @@ static void __ip6_rt_update_pmtu(struct dst_entry *dst, 
const struct sock *sk,
+       if (mtu >= dst_mtu(dst))
+               return;
+ 
+-      if (rt6->rt6i_flags & RTF_CACHE) {
++      if (!rt6_cache_allowed_for_pmtu(rt6)) {
+               rt6_do_update_pmtu(rt6, mtu);
+       } else {
+               const struct in6_addr *daddr, *saddr;
+diff --git a/net/ipv6/syncookies.c b/net/ipv6/syncookies.c
+index 0909f4e0d53c..f30bfdcdea54 100644
+--- a/net/ipv6/syncookies.c
++++ b/net/ipv6/syncookies.c
+@@ -225,7 +225,7 @@ struct sock *cookie_v6_check(struct sock *sk, struct 
sk_buff *skb)
+               memset(&fl6, 0, sizeof(fl6));
+               fl6.flowi6_proto = IPPROTO_TCP;
+               fl6.daddr = ireq->ir_v6_rmt_addr;
+-              final_p = fl6_update_dst(&fl6, np->opt, &final);
++              final_p = fl6_update_dst(&fl6, rcu_dereference(np->opt), 
&final);
+               fl6.saddr = ireq->ir_v6_loc_addr;
+               fl6.flowi6_oif = sk->sk_bound_dev_if;
+               fl6.flowi6_mark = ireq->ir_mark;
+diff --git a/net/ipv6/tcp_ipv6.c b/net/ipv6/tcp_ipv6.c
+index 7a6cea5e4274..45e473ee340b 100644
+--- a/net/ipv6/tcp_ipv6.c
++++ b/net/ipv6/tcp_ipv6.c
+@@ -120,6 +120,7 @@ static int tcp_v6_connect(struct sock *sk, struct sockaddr 
*uaddr,
+       struct ipv6_pinfo *np = inet6_sk(sk);
+       struct tcp_sock *tp = tcp_sk(sk);
+       struct in6_addr *saddr = NULL, *final_p, final;
++      struct ipv6_txoptions *opt;
+       struct flowi6 fl6;
+       struct dst_entry *dst;
+       int addr_type;
+@@ -235,7 +236,8 @@ static int tcp_v6_connect(struct sock *sk, struct sockaddr 
*uaddr,
+       fl6.fl6_dport = usin->sin6_port;
+       fl6.fl6_sport = inet->inet_sport;
+ 
+-      final_p = fl6_update_dst(&fl6, np->opt, &final);
++      opt = rcu_dereference_protected(np->opt, sock_owned_by_user(sk));
++      final_p = fl6_update_dst(&fl6, opt, &final);
+ 
+       security_sk_classify_flow(sk, flowi6_to_flowi(&fl6));
+ 
+@@ -263,9 +265,9 @@ static int tcp_v6_connect(struct sock *sk, struct sockaddr 
*uaddr,
+               tcp_fetch_timewait_stamp(sk, dst);
+ 
+       icsk->icsk_ext_hdr_len = 0;
+-      if (np->opt)
+-              icsk->icsk_ext_hdr_len = (np->opt->opt_flen +
+-                                        np->opt->opt_nflen);
++      if (opt)
++              icsk->icsk_ext_hdr_len = opt->opt_flen +
++                                       opt->opt_nflen;
+ 
+       tp->rx_opt.mss_clamp = IPV6_MIN_MTU - sizeof(struct tcphdr) - 
sizeof(struct ipv6hdr);
+ 
+@@ -461,7 +463,8 @@ static int tcp_v6_send_synack(struct sock *sk, struct 
dst_entry *dst,
+                       fl6->flowlabel = ip6_flowlabel(ipv6_hdr(ireq->pktopts));
+ 
+               skb_set_queue_mapping(skb, queue_mapping);
+-              err = ip6_xmit(sk, skb, fl6, np->opt, np->tclass);
++              err = ip6_xmit(sk, skb, fl6, rcu_dereference(np->opt),
++                             np->tclass);
+               err = net_xmit_eval(err);
+       }
+ 
+@@ -991,6 +994,7 @@ static struct sock *tcp_v6_syn_recv_sock(struct sock *sk, 
struct sk_buff *skb,
+       struct inet_request_sock *ireq;
+       struct ipv6_pinfo *newnp, *np = inet6_sk(sk);
+       struct tcp6_sock *newtcp6sk;
++      struct ipv6_txoptions *opt;
+       struct inet_sock *newinet;
+       struct tcp_sock *newtp;
+       struct sock *newsk;
+@@ -1126,13 +1130,15 @@ static struct sock *tcp_v6_syn_recv_sock(struct sock 
*sk, struct sk_buff *skb,
+          but we make one more one thing there: reattach optmem
+          to newsk.
+        */
+-      if (np->opt)
+-              newnp->opt = ipv6_dup_options(newsk, np->opt);
+-
++      opt = rcu_dereference(np->opt);
++      if (opt) {
++              opt = ipv6_dup_options(newsk, opt);
++              RCU_INIT_POINTER(newnp->opt, opt);
++      }
+       inet_csk(newsk)->icsk_ext_hdr_len = 0;
+-      if (newnp->opt)
+-              inet_csk(newsk)->icsk_ext_hdr_len = (newnp->opt->opt_nflen +
+-                                                   newnp->opt->opt_flen);
++      if (opt)
++              inet_csk(newsk)->icsk_ext_hdr_len = opt->opt_nflen +
++                                                  opt->opt_flen;
+ 
+       tcp_ca_openreq_child(newsk, dst);
+ 
+diff --git a/net/ipv6/udp.c b/net/ipv6/udp.c
+index e51fc3eee6db..7333f3575fc5 100644
+--- a/net/ipv6/udp.c
++++ b/net/ipv6/udp.c
+@@ -1107,6 +1107,7 @@ int udpv6_sendmsg(struct sock *sk, struct msghdr *msg, 
size_t len)
+       DECLARE_SOCKADDR(struct sockaddr_in6 *, sin6, msg->msg_name);
+       struct in6_addr *daddr, *final_p, final;
+       struct ipv6_txoptions *opt = NULL;
++      struct ipv6_txoptions *opt_to_free = NULL;
+       struct ip6_flowlabel *flowlabel = NULL;
+       struct flowi6 fl6;
+       struct dst_entry *dst;
+@@ -1260,8 +1261,10 @@ do_udp_sendmsg:
+                       opt = NULL;
+               connected = 0;
+       }
+-      if (!opt)
+-              opt = np->opt;
++      if (!opt) {
++              opt = txopt_get(np);
++              opt_to_free = opt;
++      }
+       if (flowlabel)
+               opt = fl6_merge_options(&opt_space, flowlabel, opt);
+       opt = ipv6_fixup_options(&opt_space, opt);
+@@ -1370,6 +1373,7 @@ release_dst:
+ out:
+       dst_release(dst);
+       fl6_sock_release(flowlabel);
++      txopt_put(opt_to_free);
+       if (!err)
+               return len;
+       /*
+diff --git a/net/l2tp/l2tp_ip6.c b/net/l2tp/l2tp_ip6.c
+index d1ded3777815..0ce9da948ad7 100644
+--- a/net/l2tp/l2tp_ip6.c
++++ b/net/l2tp/l2tp_ip6.c
+@@ -486,6 +486,7 @@ static int l2tp_ip6_sendmsg(struct sock *sk, struct msghdr 
*msg, size_t len)
+       DECLARE_SOCKADDR(struct sockaddr_l2tpip6 *, lsa, msg->msg_name);
+       struct in6_addr *daddr, *final_p, final;
+       struct ipv6_pinfo *np = inet6_sk(sk);
++      struct ipv6_txoptions *opt_to_free = NULL;
+       struct ipv6_txoptions *opt = NULL;
+       struct ip6_flowlabel *flowlabel = NULL;
+       struct dst_entry *dst = NULL;
+@@ -575,8 +576,10 @@ static int l2tp_ip6_sendmsg(struct sock *sk, struct 
msghdr *msg, size_t len)
+                       opt = NULL;
+       }
+ 
+-      if (opt == NULL)
+-              opt = np->opt;
++      if (!opt) {
++              opt = txopt_get(np);
++              opt_to_free = opt;
++      }
+       if (flowlabel)
+               opt = fl6_merge_options(&opt_space, flowlabel, opt);
+       opt = ipv6_fixup_options(&opt_space, opt);
+@@ -631,6 +634,7 @@ done:
+       dst_release(dst);
+ out:
+       fl6_sock_release(flowlabel);
++      txopt_put(opt_to_free);
+ 
+       return err < 0 ? err : len;
+ 
+diff --git a/net/packet/af_packet.c b/net/packet/af_packet.c
+index 71cb085e16fd..71d671c06952 100644
+--- a/net/packet/af_packet.c
++++ b/net/packet/af_packet.c
+@@ -1622,6 +1622,20 @@ static void fanout_release(struct sock *sk)
+               kfree_rcu(po->rollover, rcu);
+ }
+ 
++static bool packet_extra_vlan_len_allowed(const struct net_device *dev,
++                                        struct sk_buff *skb)
++{
++      /* Earlier code assumed this would be a VLAN pkt, double-check
++       * this now that we have the actual packet in hand. We can only
++       * do this check on Ethernet devices.
++       */
++      if (unlikely(dev->type != ARPHRD_ETHER))
++              return false;
++
++      skb_reset_mac_header(skb);
++      return likely(eth_hdr(skb)->h_proto == htons(ETH_P_8021Q));
++}
++
+ static const struct proto_ops packet_ops;
+ 
+ static const struct proto_ops packet_ops_spkt;
+@@ -1783,18 +1797,10 @@ retry:
+               goto retry;
+       }
+ 
+-      if (len > (dev->mtu + dev->hard_header_len + extra_len)) {
+-              /* Earlier code assumed this would be a VLAN pkt,
+-               * double-check this now that we have the actual
+-               * packet in hand.
+-               */
+-              struct ethhdr *ehdr;
+-              skb_reset_mac_header(skb);
+-              ehdr = eth_hdr(skb);
+-              if (ehdr->h_proto != htons(ETH_P_8021Q)) {
+-                      err = -EMSGSIZE;
+-                      goto out_unlock;
+-              }
++      if (len > (dev->mtu + dev->hard_header_len + extra_len) &&
++          !packet_extra_vlan_len_allowed(dev, skb)) {
++              err = -EMSGSIZE;
++              goto out_unlock;
+       }
+ 
+       skb->protocol = proto;
+@@ -2213,6 +2219,15 @@ static bool ll_header_truncated(const struct net_device 
*dev, int len)
+       return false;
+ }
+ 
++static void tpacket_set_protocol(const struct net_device *dev,
++                               struct sk_buff *skb)
++{
++      if (dev->type == ARPHRD_ETHER) {
++              skb_reset_mac_header(skb);
++              skb->protocol = eth_hdr(skb)->h_proto;
++      }
++}
++
+ static int tpacket_fill_skb(struct packet_sock *po, struct sk_buff *skb,
+               void *frame, struct net_device *dev, int size_max,
+               __be16 proto, unsigned char *addr, int hlen)
+@@ -2249,8 +2264,6 @@ static int tpacket_fill_skb(struct packet_sock *po, 
struct sk_buff *skb,
+       skb_reserve(skb, hlen);
+       skb_reset_network_header(skb);
+ 
+-      if (!packet_use_direct_xmit(po))
+-              skb_probe_transport_header(skb, 0);
+       if (unlikely(po->tp_tx_has_off)) {
+               int off_min, off_max, off;
+               off_min = po->tp_hdrlen - sizeof(struct sockaddr_ll);
+@@ -2296,6 +2309,8 @@ static int tpacket_fill_skb(struct packet_sock *po, 
struct sk_buff *skb,
+                               dev->hard_header_len);
+               if (unlikely(err))
+                       return err;
++              if (!skb->protocol)
++                      tpacket_set_protocol(dev, skb);
+ 
+               data += dev->hard_header_len;
+               to_write -= dev->hard_header_len;
+@@ -2330,6 +2345,8 @@ static int tpacket_fill_skb(struct packet_sock *po, 
struct sk_buff *skb,
+               len = ((to_write > len_max) ? len_max : to_write);
+       }
+ 
++      skb_probe_transport_header(skb, 0);
++
+       return tp_len;
+ }
+ 
+@@ -2374,12 +2391,13 @@ static int tpacket_snd(struct packet_sock *po, struct 
msghdr *msg)
+       if (unlikely(!(dev->flags & IFF_UP)))
+               goto out_put;
+ 
+-      reserve = dev->hard_header_len + VLAN_HLEN;
++      if (po->sk.sk_socket->type == SOCK_RAW)
++              reserve = dev->hard_header_len;
+       size_max = po->tx_ring.frame_size
+               - (po->tp_hdrlen - sizeof(struct sockaddr_ll));
+ 
+-      if (size_max > dev->mtu + reserve)
+-              size_max = dev->mtu + reserve;
++      if (size_max > dev->mtu + reserve + VLAN_HLEN)
++              size_max = dev->mtu + reserve + VLAN_HLEN;
+ 
+       do {
+               ph = packet_current_frame(po, &po->tx_ring,
+@@ -2406,18 +2424,10 @@ static int tpacket_snd(struct packet_sock *po, struct 
msghdr *msg)
+               tp_len = tpacket_fill_skb(po, skb, ph, dev, size_max, proto,
+                                         addr, hlen);
+               if (likely(tp_len >= 0) &&
+-                  tp_len > dev->mtu + dev->hard_header_len) {
+-                      struct ethhdr *ehdr;
+-                      /* Earlier code assumed this would be a VLAN pkt,
+-                       * double-check this now that we have the actual
+-                       * packet in hand.
+-                       */
++                  tp_len > dev->mtu + reserve &&
++                  !packet_extra_vlan_len_allowed(dev, skb))
++                      tp_len = -EMSGSIZE;
+ 
+-                      skb_reset_mac_header(skb);
+-                      ehdr = eth_hdr(skb);
+-                      if (ehdr->h_proto != htons(ETH_P_8021Q))
+-                              tp_len = -EMSGSIZE;
+-              }
+               if (unlikely(tp_len < 0)) {
+                       if (po->tp_loss) {
+                               __packet_set_status(po, ph,
+@@ -2638,18 +2648,10 @@ static int packet_snd(struct socket *sock, struct 
msghdr *msg, size_t len)
+ 
+       sock_tx_timestamp(sk, &skb_shinfo(skb)->tx_flags);
+ 
+-      if (!gso_type && (len > dev->mtu + reserve + extra_len)) {
+-              /* Earlier code assumed this would be a VLAN pkt,
+-               * double-check this now that we have the actual
+-               * packet in hand.
+-               */
+-              struct ethhdr *ehdr;
+-              skb_reset_mac_header(skb);
+-              ehdr = eth_hdr(skb);
+-              if (ehdr->h_proto != htons(ETH_P_8021Q)) {
+-                      err = -EMSGSIZE;
+-                      goto out_free;
+-              }
++      if (!gso_type && (len > dev->mtu + reserve + extra_len) &&
++          !packet_extra_vlan_len_allowed(dev, skb)) {
++              err = -EMSGSIZE;
++              goto out_free;
+       }
+ 
+       skb->protocol = proto;
+@@ -2680,8 +2682,8 @@ static int packet_snd(struct socket *sock, struct msghdr 
*msg, size_t len)
+               len += vnet_hdr_len;
+       }
+ 
+-      if (!packet_use_direct_xmit(po))
+-              skb_probe_transport_header(skb, reserve);
++      skb_probe_transport_header(skb, reserve);
++
+       if (unlikely(extra_len == 4))
+               skb->no_fcs = 1;
+ 
+diff --git a/net/rds/connection.c b/net/rds/connection.c
+index 9d66705f9d41..da6da57e5f36 100644
+--- a/net/rds/connection.c
++++ b/net/rds/connection.c
+@@ -187,12 +187,6 @@ new_conn:
+               }
+       }
+ 
+-      if (trans == NULL) {
+-              kmem_cache_free(rds_conn_slab, conn);
+-              conn = ERR_PTR(-ENODEV);
+-              goto out;
+-      }
+-
+       conn->c_trans = trans;
+ 
+       ret = trans->conn_alloc(conn, gfp);
+diff --git a/net/rds/send.c b/net/rds/send.c
+index e9430f537f9c..7b30c0f3180d 100644
+--- a/net/rds/send.c
++++ b/net/rds/send.c
+@@ -986,11 +986,13 @@ int rds_sendmsg(struct socket *sock, struct msghdr *msg, 
size_t payload_len)
+               release_sock(sk);
+       }
+ 
+-      /* racing with another thread binding seems ok here */
++      lock_sock(sk);
+       if (daddr == 0 || rs->rs_bound_addr == 0) {
++              release_sock(sk);
+               ret = -ENOTCONN; /* XXX not a great errno */
+               goto out;
+       }
++      release_sock(sk);
+ 
+       /* size of rm including all sgs */
+       ret = rds_rm_size(msg, payload_len);
+diff --git a/net/sched/sch_api.c b/net/sched/sch_api.c
+index f06aa01d60fd..1a0aa2a7cfeb 100644
+--- a/net/sched/sch_api.c
++++ b/net/sched/sch_api.c
+@@ -253,7 +253,8 @@ int qdisc_set_default(const char *name)
+ }
+ 
+ /* We know handle. Find qdisc among all qdisc's attached to device
+-   (root qdisc, all its children, children of children etc.)
++ * (root qdisc, all its children, children of children etc.)
++ * Note: caller either uses rtnl or rcu_read_lock()
+  */
+ 
+ static struct Qdisc *qdisc_match_from_root(struct Qdisc *root, u32 handle)
+@@ -264,7 +265,7 @@ static struct Qdisc *qdisc_match_from_root(struct Qdisc 
*root, u32 handle)
+           root->handle == handle)
+               return root;
+ 
+-      list_for_each_entry(q, &root->list, list) {
++      list_for_each_entry_rcu(q, &root->list, list) {
+               if (q->handle == handle)
+                       return q;
+       }
+@@ -277,15 +278,18 @@ void qdisc_list_add(struct Qdisc *q)
+               struct Qdisc *root = qdisc_dev(q)->qdisc;
+ 
+               WARN_ON_ONCE(root == &noop_qdisc);
+-              list_add_tail(&q->list, &root->list);
++              ASSERT_RTNL();
++              list_add_tail_rcu(&q->list, &root->list);
+       }
+ }
+ EXPORT_SYMBOL(qdisc_list_add);
+ 
+ void qdisc_list_del(struct Qdisc *q)
+ {
+-      if ((q->parent != TC_H_ROOT) && !(q->flags & TCQ_F_INGRESS))
+-              list_del(&q->list);
++      if ((q->parent != TC_H_ROOT) && !(q->flags & TCQ_F_INGRESS)) {
++              ASSERT_RTNL();
++              list_del_rcu(&q->list);
++      }
+ }
+ EXPORT_SYMBOL(qdisc_list_del);
+ 
+@@ -750,14 +754,18 @@ void qdisc_tree_decrease_qlen(struct Qdisc *sch, 
unsigned int n)
+       if (n == 0)
+               return;
+       drops = max_t(int, n, 0);
++      rcu_read_lock();
+       while ((parentid = sch->parent)) {
+               if (TC_H_MAJ(parentid) == TC_H_MAJ(TC_H_INGRESS))
+-                      return;
++                      break;
+ 
++              if (sch->flags & TCQ_F_NOPARENT)
++                      break;
++              /* TODO: perform the search on a per txq basis */
+               sch = qdisc_lookup(qdisc_dev(sch), TC_H_MAJ(parentid));
+               if (sch == NULL) {
+-                      WARN_ON(parentid != TC_H_ROOT);
+-                      return;
++                      WARN_ON_ONCE(parentid != TC_H_ROOT);
++                      break;
+               }
+               cops = sch->ops->cl_ops;
+               if (cops->qlen_notify) {
+@@ -768,6 +776,7 @@ void qdisc_tree_decrease_qlen(struct Qdisc *sch, unsigned 
int n)
+               sch->q.qlen -= n;
+               __qdisc_qstats_drop(sch, drops);
+       }
++      rcu_read_unlock();
+ }
+ EXPORT_SYMBOL(qdisc_tree_decrease_qlen);
+ 
+@@ -941,7 +950,7 @@ qdisc_create(struct net_device *dev, struct netdev_queue 
*dev_queue,
+               }
+               lockdep_set_class(qdisc_lock(sch), &qdisc_tx_lock);
+               if (!netif_is_multiqueue(dev))
+-                      sch->flags |= TCQ_F_ONETXQUEUE;
++                      sch->flags |= TCQ_F_ONETXQUEUE | TCQ_F_NOPARENT;
+       }
+ 
+       sch->handle = handle;
+diff --git a/net/sched/sch_generic.c b/net/sched/sch_generic.c
+index 6efca30894aa..b453270be3fd 100644
+--- a/net/sched/sch_generic.c
++++ b/net/sched/sch_generic.c
+@@ -743,7 +743,7 @@ static void attach_one_default_qdisc(struct net_device 
*dev,
+                       return;
+               }
+               if (!netif_is_multiqueue(dev))
+-                      qdisc->flags |= TCQ_F_ONETXQUEUE;
++                      qdisc->flags |= TCQ_F_ONETXQUEUE | TCQ_F_NOPARENT;
+       }
+       dev_queue->qdisc_sleeping = qdisc;
+ }
+diff --git a/net/sched/sch_mq.c b/net/sched/sch_mq.c
+index f3cbaecd283a..3e82f047caaf 100644
+--- a/net/sched/sch_mq.c
++++ b/net/sched/sch_mq.c
+@@ -63,7 +63,7 @@ static int mq_init(struct Qdisc *sch, struct nlattr *opt)
+               if (qdisc == NULL)
+                       goto err;
+               priv->qdiscs[ntx] = qdisc;
+-              qdisc->flags |= TCQ_F_ONETXQUEUE;
++              qdisc->flags |= TCQ_F_ONETXQUEUE | TCQ_F_NOPARENT;
+       }
+ 
+       sch->flags |= TCQ_F_MQROOT;
+@@ -156,7 +156,7 @@ static int mq_graft(struct Qdisc *sch, unsigned long cl, 
struct Qdisc *new,
+ 
+       *old = dev_graft_qdisc(dev_queue, new);
+       if (new)
+-              new->flags |= TCQ_F_ONETXQUEUE;
++              new->flags |= TCQ_F_ONETXQUEUE | TCQ_F_NOPARENT;
+       if (dev->flags & IFF_UP)
+               dev_activate(dev);
+       return 0;
+diff --git a/net/sched/sch_mqprio.c b/net/sched/sch_mqprio.c
+index 3811a745452c..ad70ecf57ce7 100644
+--- a/net/sched/sch_mqprio.c
++++ b/net/sched/sch_mqprio.c
+@@ -132,7 +132,7 @@ static int mqprio_init(struct Qdisc *sch, struct nlattr 
*opt)
+                       goto err;
+               }
+               priv->qdiscs[i] = qdisc;
+-              qdisc->flags |= TCQ_F_ONETXQUEUE;
++              qdisc->flags |= TCQ_F_ONETXQUEUE | TCQ_F_NOPARENT;
+       }
+ 
+       /* If the mqprio options indicate that hardware should own
+@@ -209,7 +209,7 @@ static int mqprio_graft(struct Qdisc *sch, unsigned long 
cl, struct Qdisc *new,
+       *old = dev_graft_qdisc(dev_queue, new);
+ 
+       if (new)
+-              new->flags |= TCQ_F_ONETXQUEUE;
++              new->flags |= TCQ_F_ONETXQUEUE | TCQ_F_NOPARENT;
+ 
+       if (dev->flags & IFF_UP)
+               dev_activate(dev);
+diff --git a/net/sctp/auth.c b/net/sctp/auth.c
+index 4f15b7d730e1..1543e39f47c3 100644
+--- a/net/sctp/auth.c
++++ b/net/sctp/auth.c
+@@ -809,8 +809,8 @@ int sctp_auth_ep_set_hmacs(struct sctp_endpoint *ep,
+       if (!has_sha1)
+               return -EINVAL;
+ 
+-      memcpy(ep->auth_hmacs_list->hmac_ids, &hmacs->shmac_idents[0],
+-              hmacs->shmac_num_idents * sizeof(__u16));
++      for (i = 0; i < hmacs->shmac_num_idents; i++)
++              ep->auth_hmacs_list->hmac_ids[i] = 
htons(hmacs->shmac_idents[i]);
+       ep->auth_hmacs_list->param_hdr.length = htons(sizeof(sctp_paramhdr_t) +
+                               hmacs->shmac_num_idents * sizeof(__u16));
+       return 0;
+diff --git a/net/sctp/socket.c b/net/sctp/socket.c
+index 17bef01b9aa3..3ec88be0faec 100644
+--- a/net/sctp/socket.c
++++ b/net/sctp/socket.c
+@@ -7375,6 +7375,13 @@ struct proto sctp_prot = {
+ 
+ #if IS_ENABLED(CONFIG_IPV6)
+ 
++#include <net/transp_v6.h>
++static void sctp_v6_destroy_sock(struct sock *sk)
++{
++      sctp_destroy_sock(sk);
++      inet6_destroy_sock(sk);
++}
++
+ struct proto sctpv6_prot = {
+       .name           = "SCTPv6",
+       .owner          = THIS_MODULE,
+@@ -7384,7 +7391,7 @@ struct proto sctpv6_prot = {
+       .accept         = sctp_accept,
+       .ioctl          = sctp_ioctl,
+       .init           = sctp_init_sock,
+-      .destroy        = sctp_destroy_sock,
++      .destroy        = sctp_v6_destroy_sock,
+       .shutdown       = sctp_shutdown,
+       .setsockopt     = sctp_setsockopt,
+       .getsockopt     = sctp_getsockopt,
+diff --git a/net/unix/af_unix.c b/net/unix/af_unix.c
+index 94f658235fb4..128b0982c96b 100644
+--- a/net/unix/af_unix.c
++++ b/net/unix/af_unix.c
+@@ -326,6 +326,118 @@ found:
+       return s;
+ }
+ 
++/* Support code for asymmetrically connected dgram sockets
++ *
++ * If a datagram socket is connected to a socket not itself connected
++ * to the first socket (eg, /dev/log), clients may only enqueue more
++ * messages if the present receive queue of the server socket is not
++ * "too large". This means there's a second writeability condition
++ * poll and sendmsg need to test. The dgram recv code will do a wake
++ * up on the peer_wait wait queue of a socket upon reception of a
++ * datagram which needs to be propagated to sleeping would-be writers
++ * since these might not have sent anything so far. This can't be
++ * accomplished via poll_wait because the lifetime of the server
++ * socket might be less than that of its clients if these break their
++ * association with it or if the server socket is closed while clients
++ * are still connected to it and there's no way to inform "a polling
++ * implementation" that it should let go of a certain wait queue
++ *
++ * In order to propagate a wake up, a wait_queue_t of the client
++ * socket is enqueued on the peer_wait queue of the server socket
++ * whose wake function does a wake_up on the ordinary client socket
++ * wait queue. This connection is established whenever a write (or
++ * poll for write) hit the flow control condition and broken when the
++ * association to the server socket is dissolved or after a wake up
++ * was relayed.
++ */
++
++static int unix_dgram_peer_wake_relay(wait_queue_t *q, unsigned mode, int 
flags,
++                                    void *key)
++{
++      struct unix_sock *u;
++      wait_queue_head_t *u_sleep;
++
++      u = container_of(q, struct unix_sock, peer_wake);
++
++      __remove_wait_queue(&unix_sk(u->peer_wake.private)->peer_wait,
++                          q);
++      u->peer_wake.private = NULL;
++
++      /* relaying can only happen while the wq still exists */
++      u_sleep = sk_sleep(&u->sk);
++      if (u_sleep)
++              wake_up_interruptible_poll(u_sleep, key);
++
++      return 0;
++}
++
++static int unix_dgram_peer_wake_connect(struct sock *sk, struct sock *other)
++{
++      struct unix_sock *u, *u_other;
++      int rc;
++
++      u = unix_sk(sk);
++      u_other = unix_sk(other);
++      rc = 0;
++      spin_lock(&u_other->peer_wait.lock);
++
++      if (!u->peer_wake.private) {
++              u->peer_wake.private = other;
++              __add_wait_queue(&u_other->peer_wait, &u->peer_wake);
++
++              rc = 1;
++      }
++
++      spin_unlock(&u_other->peer_wait.lock);
++      return rc;
++}
++
++static void unix_dgram_peer_wake_disconnect(struct sock *sk,
++                                          struct sock *other)
++{
++      struct unix_sock *u, *u_other;
++
++      u = unix_sk(sk);
++      u_other = unix_sk(other);
++      spin_lock(&u_other->peer_wait.lock);
++
++      if (u->peer_wake.private == other) {
++              __remove_wait_queue(&u_other->peer_wait, &u->peer_wake);
++              u->peer_wake.private = NULL;
++      }
++
++      spin_unlock(&u_other->peer_wait.lock);
++}
++
++static void unix_dgram_peer_wake_disconnect_wakeup(struct sock *sk,
++                                                 struct sock *other)
++{
++      unix_dgram_peer_wake_disconnect(sk, other);
++      wake_up_interruptible_poll(sk_sleep(sk),
++                                 POLLOUT |
++                                 POLLWRNORM |
++                                 POLLWRBAND);
++}
++
++/* preconditions:
++ *    - unix_peer(sk) == other
++ *    - association is stable
++ */
++static int unix_dgram_peer_wake_me(struct sock *sk, struct sock *other)
++{
++      int connected;
++
++      connected = unix_dgram_peer_wake_connect(sk, other);
++
++      if (unix_recvq_full(other))
++              return 1;
++
++      if (connected)
++              unix_dgram_peer_wake_disconnect(sk, other);
++
++      return 0;
++}
++
+ static inline int unix_writable(struct sock *sk)
+ {
+       return (atomic_read(&sk->sk_wmem_alloc) << 2) <= sk->sk_sndbuf;
+@@ -430,6 +542,8 @@ static void unix_release_sock(struct sock *sk, int embrion)
+                       skpair->sk_state_change(skpair);
+                       sk_wake_async(skpair, SOCK_WAKE_WAITD, POLL_HUP);
+               }
++
++              unix_dgram_peer_wake_disconnect(sk, skpair);
+               sock_put(skpair); /* It may now die */
+               unix_peer(sk) = NULL;
+       }
+@@ -440,6 +554,7 @@ static void unix_release_sock(struct sock *sk, int embrion)
+               if (state == TCP_LISTEN)
+                       unix_release_sock(skb->sk, 1);
+               /* passed fds are erased in the kfree_skb hook        */
++              UNIXCB(skb).consumed = skb->len;
+               kfree_skb(skb);
+       }
+ 
+@@ -664,6 +779,7 @@ static struct sock *unix_create1(struct net *net, struct 
socket *sock, int kern)
+       INIT_LIST_HEAD(&u->link);
+       mutex_init(&u->readlock); /* single task reading lock */
+       init_waitqueue_head(&u->peer_wait);
++      init_waitqueue_func_entry(&u->peer_wake, unix_dgram_peer_wake_relay);
+       unix_insert_socket(unix_sockets_unbound(sk), sk);
+ out:
+       if (sk == NULL)
+@@ -1031,6 +1147,8 @@ restart:
+       if (unix_peer(sk)) {
+               struct sock *old_peer = unix_peer(sk);
+               unix_peer(sk) = other;
++              unix_dgram_peer_wake_disconnect_wakeup(sk, old_peer);
++
+               unix_state_double_unlock(sk, other);
+ 
+               if (other != old_peer)
+@@ -1432,6 +1550,14 @@ static int unix_scm_to_skb(struct scm_cookie *scm, 
struct sk_buff *skb, bool sen
+       return err;
+ }
+ 
++static bool unix_passcred_enabled(const struct socket *sock,
++                                const struct sock *other)
++{
++      return test_bit(SOCK_PASSCRED, &sock->flags) ||
++             !other->sk_socket ||
++             test_bit(SOCK_PASSCRED, &other->sk_socket->flags);
++}
++
+ /*
+  * Some apps rely on write() giving SCM_CREDENTIALS
+  * We include credentials if source or destination socket
+@@ -1442,14 +1568,41 @@ static void maybe_add_creds(struct sk_buff *skb, const 
struct socket *sock,
+ {
+       if (UNIXCB(skb).pid)
+               return;
+-      if (test_bit(SOCK_PASSCRED, &sock->flags) ||
+-          !other->sk_socket ||
+-          test_bit(SOCK_PASSCRED, &other->sk_socket->flags)) {
++      if (unix_passcred_enabled(sock, other)) {
+               UNIXCB(skb).pid  = get_pid(task_tgid(current));
+               current_uid_gid(&UNIXCB(skb).uid, &UNIXCB(skb).gid);
+       }
+ }
+ 
++static int maybe_init_creds(struct scm_cookie *scm,
++                          struct socket *socket,
++                          const struct sock *other)
++{
++      int err;
++      struct msghdr msg = { .msg_controllen = 0 };
++
++      err = scm_send(socket, &msg, scm, false);
++      if (err)
++              return err;
++
++      if (unix_passcred_enabled(socket, other)) {
++              scm->pid = get_pid(task_tgid(current));
++              current_uid_gid(&scm->creds.uid, &scm->creds.gid);
++      }
++      return err;
++}
++
++static bool unix_skb_scm_eq(struct sk_buff *skb,
++                          struct scm_cookie *scm)
++{
++      const struct unix_skb_parms *u = &UNIXCB(skb);
++
++      return u->pid == scm->pid &&
++             uid_eq(u->uid, scm->creds.uid) &&
++             gid_eq(u->gid, scm->creds.gid) &&
++             unix_secdata_eq(scm, skb);
++}
++
+ /*
+  *    Send AF_UNIX data.
+  */
+@@ -1470,6 +1623,7 @@ static int unix_dgram_sendmsg(struct socket *sock, 
struct msghdr *msg,
+       struct scm_cookie scm;
+       int max_level;
+       int data_len = 0;
++      int sk_locked;
+ 
+       wait_for_unix_gc();
+       err = scm_send(sock, msg, &scm, false);
+@@ -1548,12 +1702,14 @@ restart:
+               goto out_free;
+       }
+ 
++      sk_locked = 0;
+       unix_state_lock(other);
++restart_locked:
+       err = -EPERM;
+       if (!unix_may_send(sk, other))
+               goto out_unlock;
+ 
+-      if (sock_flag(other, SOCK_DEAD)) {
++      if (unlikely(sock_flag(other, SOCK_DEAD))) {
+               /*
+                *      Check with 1003.1g - what should
+                *      datagram error
+@@ -1561,10 +1717,14 @@ restart:
+               unix_state_unlock(other);
+               sock_put(other);
+ 
++              if (!sk_locked)
++                      unix_state_lock(sk);
++
+               err = 0;
+-              unix_state_lock(sk);
+               if (unix_peer(sk) == other) {
+                       unix_peer(sk) = NULL;
++                      unix_dgram_peer_wake_disconnect_wakeup(sk, other);
++
+                       unix_state_unlock(sk);
+ 
+                       unix_dgram_disconnected(sk, other);
+@@ -1590,21 +1750,38 @@ restart:
+                       goto out_unlock;
+       }
+ 
+-      if (unix_peer(other) != sk && unix_recvq_full(other)) {
+-              if (!timeo) {
+-                      err = -EAGAIN;
+-                      goto out_unlock;
++      if (unlikely(unix_peer(other) != sk && unix_recvq_full(other))) {
++              if (timeo) {
++                      timeo = unix_wait_for_peer(other, timeo);
++
++                      err = sock_intr_errno(timeo);
++                      if (signal_pending(current))
++                              goto out_free;
++
++                      goto restart;
+               }
+ 
+-              timeo = unix_wait_for_peer(other, timeo);
++              if (!sk_locked) {
++                      unix_state_unlock(other);
++                      unix_state_double_lock(sk, other);
++              }
+ 
+-              err = sock_intr_errno(timeo);
+-              if (signal_pending(current))
+-                      goto out_free;
++              if (unix_peer(sk) != other ||
++                  unix_dgram_peer_wake_me(sk, other)) {
++                      err = -EAGAIN;
++                      sk_locked = 1;
++                      goto out_unlock;
++              }
+ 
+-              goto restart;
++              if (!sk_locked) {
++                      sk_locked = 1;
++                      goto restart_locked;
++              }
+       }
+ 
++      if (unlikely(sk_locked))
++              unix_state_unlock(sk);
++
+       if (sock_flag(other, SOCK_RCVTSTAMP))
+               __net_timestamp(skb);
+       maybe_add_creds(skb, sock, other);
+@@ -1618,6 +1795,8 @@ restart:
+       return len;
+ 
+ out_unlock:
++      if (sk_locked)
++              unix_state_unlock(sk);
+       unix_state_unlock(other);
+ out_free:
+       kfree_skb(skb);
+@@ -1739,8 +1918,10 @@ out_err:
+ static ssize_t unix_stream_sendpage(struct socket *socket, struct page *page,
+                                   int offset, size_t size, int flags)
+ {
+-      int err = 0;
+-      bool send_sigpipe = true;
++      int err;
++      bool send_sigpipe = false;
++      bool init_scm = true;
++      struct scm_cookie scm;
+       struct sock *other, *sk = socket->sk;
+       struct sk_buff *skb, *newskb = NULL, *tail = NULL;
+ 
+@@ -1758,7 +1939,7 @@ alloc_skb:
+               newskb = sock_alloc_send_pskb(sk, 0, 0, flags & MSG_DONTWAIT,
+                                             &err, 0);
+               if (!newskb)
+-                      return err;
++                      goto err;
+       }
+ 
+       /* we must acquire readlock as we modify already present
+@@ -1767,12 +1948,12 @@ alloc_skb:
+       err = mutex_lock_interruptible(&unix_sk(other)->readlock);
+       if (err) {
+               err = flags & MSG_DONTWAIT ? -EAGAIN : -ERESTARTSYS;
+-              send_sigpipe = false;
+               goto err;
+       }
+ 
+       if (sk->sk_shutdown & SEND_SHUTDOWN) {
+               err = -EPIPE;
++              send_sigpipe = true;
+               goto err_unlock;
+       }
+ 
+@@ -1781,23 +1962,34 @@ alloc_skb:
+       if (sock_flag(other, SOCK_DEAD) ||
+           other->sk_shutdown & RCV_SHUTDOWN) {
+               err = -EPIPE;
++              send_sigpipe = true;
+               goto err_state_unlock;
+       }
+ 
++      if (init_scm) {
++              err = maybe_init_creds(&scm, socket, other);
++              if (err)
++                      goto err_state_unlock;
++              init_scm = false;
++      }
++
+       skb = skb_peek_tail(&other->sk_receive_queue);
+       if (tail && tail == skb) {
+               skb = newskb;
+-      } else if (!skb) {
+-              if (newskb)
++      } else if (!skb || !unix_skb_scm_eq(skb, &scm)) {
++              if (newskb) {
+                       skb = newskb;
+-              else
++              } else {
++                      tail = skb;
+                       goto alloc_skb;
++              }
+       } else if (newskb) {
+               /* this is fast path, we don't necessarily need to
+                * call to kfree_skb even though with newskb == NULL
+                * this - does no harm
+                */
+               consume_skb(newskb);
++              newskb = NULL;
+       }
+ 
+       if (skb_append_pagefrags(skb, page, offset, size)) {
+@@ -1810,14 +2002,20 @@ alloc_skb:
+       skb->truesize += size;
+       atomic_add(size, &sk->sk_wmem_alloc);
+ 
+-      if (newskb)
++      if (newskb) {
++              err = unix_scm_to_skb(&scm, skb, false);
++              if (err)
++                      goto err_state_unlock;
++              spin_lock(&other->sk_receive_queue.lock);
+               __skb_queue_tail(&other->sk_receive_queue, newskb);
++              spin_unlock(&other->sk_receive_queue.lock);
++      }
+ 
+       unix_state_unlock(other);
+       mutex_unlock(&unix_sk(other)->readlock);
+ 
+       other->sk_data_ready(other);
+-
++      scm_destroy(&scm);
+       return size;
+ 
+ err_state_unlock:
+@@ -1828,6 +2026,8 @@ err:
+       kfree_skb(newskb);
+       if (send_sigpipe && !(flags & MSG_NOSIGNAL))
+               send_sig(SIGPIPE, current, 0);
++      if (!init_scm)
++              scm_destroy(&scm);
+       return err;
+ }
+ 
+@@ -2071,6 +2271,7 @@ static int unix_stream_read_generic(struct 
unix_stream_read_state *state)
+ 
+       do {
+               int chunk;
++              bool drop_skb;
+               struct sk_buff *skb, *last;
+ 
+               unix_state_lock(sk);
+@@ -2130,10 +2331,7 @@ unlock:
+ 
+               if (check_creds) {
+                       /* Never glue messages from different writers */
+-                      if ((UNIXCB(skb).pid  != scm.pid) ||
+-                          !uid_eq(UNIXCB(skb).uid, scm.creds.uid) ||
+-                          !gid_eq(UNIXCB(skb).gid, scm.creds.gid) ||
+-                          !unix_secdata_eq(&scm, skb))
++                      if (!unix_skb_scm_eq(skb, &scm))
+                               break;
+               } else if (test_bit(SOCK_PASSCRED, &sock->flags)) {
+                       /* Copy credentials */
+@@ -2151,7 +2349,11 @@ unlock:
+               }
+ 
+               chunk = min_t(unsigned int, unix_skb_len(skb) - skip, size);
++              skb_get(skb);
+               chunk = state->recv_actor(skb, skip, chunk, state);
++              drop_skb = !unix_skb_len(skb);
++              /* skb is only safe to use if !drop_skb */
++              consume_skb(skb);
+               if (chunk < 0) {
+                       if (copied == 0)
+                               copied = -EFAULT;
+@@ -2160,6 +2362,18 @@ unlock:
+               copied += chunk;
+               size -= chunk;
+ 
++              if (drop_skb) {
++                      /* the skb was touched by a concurrent reader;
++                       * we should not expect anything from this skb
++                       * anymore and assume it invalid - we can be
++                       * sure it was dropped from the socket queue
++                       *
++                       * let's report a short read
++                       */
++                      err = 0;
++                      break;
++              }
++
+               /* Mark read part of skb as used */
+               if (!(flags & MSG_PEEK)) {
+                       UNIXCB(skb).consumed += chunk;
+@@ -2453,14 +2667,16 @@ static unsigned int unix_dgram_poll(struct file *file, 
struct socket *sock,
+               return mask;
+ 
+       writable = unix_writable(sk);
+-      other = unix_peer_get(sk);
+-      if (other) {
+-              if (unix_peer(other) != sk) {
+-                      sock_poll_wait(file, &unix_sk(other)->peer_wait, wait);
+-                      if (unix_recvq_full(other))
+-                              writable = 0;
+-              }
+-              sock_put(other);
++      if (writable) {
++              unix_state_lock(sk);
++
++              other = unix_peer(sk);
++              if (other && unix_peer(other) != sk &&
++                  unix_recvq_full(other) &&
++                  unix_dgram_peer_wake_me(sk, other))
++                      writable = 0;
++
++              unix_state_unlock(sk);
+       }
+ 
+       if (writable)
+diff --git a/sound/pci/hda/patch_hdmi.c b/sound/pci/hda/patch_hdmi.c
+index a97db5fc8a15..9d1f91db57e6 100644
+--- a/sound/pci/hda/patch_hdmi.c
++++ b/sound/pci/hda/patch_hdmi.c
+@@ -48,8 +48,9 @@ MODULE_PARM_DESC(static_hdmi_pcm, "Don't restrict PCM 
parameters per ELD info");
+ #define is_haswell(codec)  ((codec)->core.vendor_id == 0x80862807)
+ #define is_broadwell(codec)    ((codec)->core.vendor_id == 0x80862808)
+ #define is_skylake(codec) ((codec)->core.vendor_id == 0x80862809)
++#define is_broxton(codec) ((codec)->core.vendor_id == 0x8086280a)
+ #define is_haswell_plus(codec) (is_haswell(codec) || is_broadwell(codec) \
+-                                      || is_skylake(codec))
++                              || is_skylake(codec) || is_broxton(codec))
+ 
+ #define is_valleyview(codec) ((codec)->core.vendor_id == 0x80862882)
+ #define is_cherryview(codec) ((codec)->core.vendor_id == 0x80862883)
+diff --git a/tools/net/Makefile b/tools/net/Makefile
+index ee577ea03ba5..ddf888010652 100644
+--- a/tools/net/Makefile
++++ b/tools/net/Makefile
+@@ -4,6 +4,9 @@ CC = gcc
+ LEX = flex
+ YACC = bison
+ 
++CFLAGS += -Wall -O2
++CFLAGS += -D__EXPORTED_HEADERS__ -I../../include/uapi -I../../include
++
+ %.yacc.c: %.y
+       $(YACC) -o $@ -d $<
+ 
+@@ -12,15 +15,13 @@ YACC = bison
+ 
+ all : bpf_jit_disasm bpf_dbg bpf_asm
+ 
+-bpf_jit_disasm : CFLAGS = -Wall -O2 -DPACKAGE='bpf_jit_disasm'
++bpf_jit_disasm : CFLAGS += -DPACKAGE='bpf_jit_disasm'
+ bpf_jit_disasm : LDLIBS = -lopcodes -lbfd -ldl
+ bpf_jit_disasm : bpf_jit_disasm.o
+ 
+-bpf_dbg : CFLAGS = -Wall -O2
+ bpf_dbg : LDLIBS = -lreadline
+ bpf_dbg : bpf_dbg.o
+ 
+-bpf_asm : CFLAGS = -Wall -O2 -I.
+ bpf_asm : LDLIBS =
+ bpf_asm : bpf_asm.o bpf_exp.yacc.o bpf_exp.lex.o
+ bpf_exp.lex.o : bpf_exp.yacc.c

Reply via email to