Merge branch 'android13-5.15' into android13-5.15-lts
Sync up with android13-5.15 for the following commits: * 5476e160 Merge "Merge tag 'android13-5.15.94_r00' into android13-5.15" into android13-5.15 |\ | * 51556245 Merge tag 'android13-5.15.94_r00' into android13-5.15 * | e5862f1a UPSTREAM: wifi: nl80211: fix puncturing bitmap policy |/ * f8c9753a UPSTREAM: hwrng: virtio - add an internal buffer * 1dddc199 ANDROID: GKI: Update abi_gki_aarch64_qcom * 092199e9 BACKPORT: wifi: nl80211: Allow authentication frames and set keys on NAN interface * 05164a85 UPSTREAM: wifi: cfg80211: Allow action frames to be transmitted with link BSS in MLD * 6bab8a40 BACKPORT: wifi: cfg80211: include puncturing bitmap in channel switch events * e8a4772f BACKPORT: wifi: nl80211: validate and configure puncturing bitmap * b099f1eb UPSTREAM: regmap: Don't warn about cache only mode for devices with no cache * b3ebd7ca ANDROID: dma-buf: system_heap: kmap_local_page instead of kmap_atomic * 16e9875a ANDROID: GKI: update xiaomi symbol list * cf18e5eb UPSTREAM: ext4: fix another off-by-one fsmap error on 1k block filesystems * 090c1ebf UPSTREAM: dm verity: stop using WQ_UNBOUND for verify_wq * 7f356bba BACKPORT: dm verity: enable WQ_HIGHPRI on verify_wq * 4017ffbb UPSTREAM: dm verity: remove WQ_CPU_INTENSIVE flag since using WQ_UNBOUND * a6c4727f UPSTREAM: loop: Fix use-after-free issues * 24c1fcb7 ANDROID: GKI: Update symbol list for mtk * 6c60fdba UPSTREAM: ext4: block range must be validated before use in ext4_mb_clear_bb() * 53ce0eef UPSTREAM: ext4: add strict range checks while freeing blocks * 20389d86 UPSTREAM: ext4: add ext4_sb_block_valid() refactored out of ext4_inode_block_valid() * 60c24f4d UPSTREAM: ext4: refactor ext4_free_blocks() to pull out ext4_mb_clear_bb() * 7ba7908a ANDROID: mm: handle SPF using a copy of the original vma * 521f3bc7 ANDROID: mm: fix UAF in SPF * e09118b9 ANDROID: GKI: Update symbol list for mtk * 0659efff UPSTREAM: arm64: efi: Make efi_rt_lock a raw_spinlock * 6b908238 UPSTREAM: wifi: cfg80211: Set SSID if it is not already set * 554a9671 Revert "Revert "ANDROID: usb: dwc3: gadget: don't cancel the started requests"" * eef9e129 UPSTREAM: rtmutex: Ensure that the top waiter is always woken up * cc0db0b2 UPSTREAM: cgroup/cpuset: Don't filter offline CPUs in cpuset_cpus_allowed() for top cpuset tasks * 3c4f8843 UPSTREAM: ext4: refuse to create ea block when umounted * 0473082f UPSTREAM: ext4: optimize ea_inode block expansion * bf0b8e81 UPSTREAM: ext4: allocate extended attribute value in vmalloc area * 79bd2581 ANDROID: ABI: Update the GKI symbol list and ABI XML * cfe5bd7f ANDROID: abi_gki_aarch64_qcom: Update symbol list * f3091267 ANDROID: GKI: update xiaomi symbol list * fb1db476 UPSTREAM: Partially revert "perf/arm-cmn: Optimise DTC counter accesses" * 1f12217e UPSTREAM: usb: dwc3: gadget: Ignore End Transfer delay on teardown * fc41b9e1 UPSTREAM: elfcore: Add a cprm parameter to elf_core_extra_{phdrs,data_size} * ee863e21 UPSTREAM: arm64: mte: Fix double-freeing of the temporary tag storage during coredump * 7dc85aba UPSTREAM: wifi: nl80211: Add checks for nla_nest_start() in nl80211_send_iface() * 8b1316dd UPSTREAM: mm/page_exit: fix kernel doc warning in page_ext_put() * 37fbaa23 UPSTREAM: f2fs: fix gc mode when gc_urgent_high_remaining is 1 * ad8cc978 BACKPORT: mm: multi-gen LRU: move lru_gen_add_mm() out of IRQ-off region * 73d24f72 UPSTREAM: KVM: arm64: Use correct accessor to parse stage-1 PTEs * 2f6641fd UPSTREAM: wifi: fix multi-link element subelement iteration * 0cc04953 UPSTREAM: perf/arm-cmn: Add more bits to child node address offset field * a481cc45 UPSTREAM: perf/arm-cmn: Update watchpoint format * 668c4309 UPSTREAM: perf/arm-cmn: Hide XP PUB events for CMN-600 * 5761541a BACKPORT: wifi: cfg80211: move puncturing bitmap validation from mac80211 * 267de69e UPSTREAM: wifi: nl80211: add MLO_LINK_ID to CMD_STOP_AP event * 83e77c31 BACKPORT: cfg80211: Update Transition Disable policy during port authorization * f4559cb6 ANDROID: ABI: Update db845c symbol list on ufshcd * bef41f50 ANDROID: usb: gadget: f_accessory: update to usb_gstrings_attach * 0fd1c2a7 UPSTREAM: usb: gadget: composite: Draw 100mA current if not configured * a223191e UPSTREAM: usb: dwc3: gadget: Change condition for processing suspend event * 91c67741 UPSTREAM: net/sched: tcindex: update imperfect hash filters respecting rcu * 6ca9fd3a BACKPORT: FROMGIT: scsi: ufs: core: Add hibernation callbacks * 35d26a77 ANDROID: ABI: Update unisoc thermal symbol list * 683fe954 ANDROID: thermal: Add a vendor hook for thermal throttle update * e013dc70 ANDROID: GKI: Add symbol list for Lenovo * 6a7aa090 ANDROID: Enable percpu high priority kthreads for erofs * 40a9ba96 UPSTREAM: erofs: fix an error code in z_erofs_init_zip_subsystem() * 7dc188b2 BACKPORT: erofs: add per-cpu threads for decompression as an option * 4fd62a87 ANDROID: ABI: Update oplus symbol list * 05b5ff11 ANDROID: vendor_hooks: Add hooks for mutex and rwsem optimistic spin * 9eec95bb UPSTREAM: io_uring: ensure that io_init_req() passes in the right issue_flags * c112dc57 ANDROID: Update the GKI symbol list and ABI XML * bdf1c2cc UPSTREAM: io_uring: add missing lock in io_get_file_fixed * 3352886c ANDROID: gki_config: enable CONFIG_IIO_TRIGGERED_BUFFER * e21e3d10 ANDROID: GKI: VIVO: Add a symbol to symbol list * 5239ef3d UPSTREAM: drivers/thermal/cpufreq_cooling: Use private callback ops for each cooling device * 287c9980 UPSTREAM: scsi: scsi_debug: Fix possible UAF in sdebug_add_host_helper() * 6db5181a UPSTREAM: io_uring/rw: remove leftover debug statement * 4390be5c UPSTREAM: io_uring/rw: ensure kiocb_end_write() is always called * 6b3d1f96 UPSTREAM: io_uring: fix double poll leak on repolling * 3749f8d8 UPSTREAM: io_uring: Clean up a false-positive warning from GCC 9.3.0 * 0da7ee3f UPSTREAM: io_uring/net: fix fast_iov assignment in io_setup_async_msg() * 3a4f67f9 UPSTREAM: io_uring: io_kiocb_update_pos() should not touch file for non -1 offset * 3c83e0a9 UPSTREAM: io_uring/rw: defer fsnotify calls to task context * 630c3722 UPSTREAM: io_uring: do not recalculate ppos unnecessarily * 47179f7d UPSTREAM: io_uring: update kiocb->ki_pos at execution time * b0b3d93a UPSTREAM: io_uring: remove duplicated calls to io_kiocb_ppos * 7b865f60 UPSTREAM: io_uring: ensure that cached task references are always put on exit * c72cbb22 UPSTREAM: io_uring: fix async accept on O_NONBLOCK sockets * 88be697d UPSTREAM: io_uring: allow re-poll if we made progress * 393d9945 UPSTREAM: io_uring: support MSG_WAITALL for IORING_OP_SEND(MSG) * 8f3a4070 UPSTREAM: io_uring: add flag for disabling provided buffer recycling * b0b6bfe4 UPSTREAM: io_uring: ensure recv and recvmsg handle MSG_WAITALL correctly * 40520bb9 UPSTREAM: io_uring: improve send/recv error handling * 6c0dd68d UPSTREAM: io_uring: pass in EPOLL_URING_WAKE for eventfd signaling and wakeups * ab6956ac UPSTREAM: eventfd: provide a eventfd_signal_mask() helper * b4ab4ac9 UPSTREAM: eventpoll: add EPOLL_URING_WAKE poll wakeup flag * 2373a0c7 UPSTREAM: io_uring: don't gate task_work run on TIF_NOTIFY_SIGNAL * b579578d UPSTREAM: io_uring/io-wq: only free worker if it was allocated for creation * 19758f54 UPSTREAM: io_uring/io-wq: free worker if task_work creation is canceled * 65e1f2ef UPSTREAM: io_uring: lock overflowing for IOPOLL * 198e5002 UPSTREAM: io_uring: Fix unsigned 'res' comparison with zero in io_fixup_rw_res() * 5af453ff UPSTREAM: io_uring: fix CQ waiting timeout handling * e6f9c1b7 UPSTREAM: io_uring: check for valid register opcode earlier * dcc1ea16 UPSTREAM: io_uring: Fix a null-ptr-deref in io_tctx_exit_cb() * 3a1c153b UPSTREAM: io_uring: move to separate directory * c0dee081 UPSTREAM: io_uring/poll: fix poll_refs race with cancelation * 5a5dcf5c UPSTREAM: io_uring: make poll refs more robust * 30909f86 UPSTREAM: io_uring: cmpxchg for poll arm refs release * 242ed498 UPSTREAM: io_uring: fix tw losing poll events * 7e603b20 UPSTREAM: io_uring: update res mask in io_poll_check_events * fab4d029 UPSTREAM: wifi: cfg80211: Extend cfg80211_update_owe_info_event() for MLD AP * 048ad5d3 UPSTREAM: wifi: cfg80211: Extend cfg80211_new_sta() for MLD AP * 9216110f UPSTREAM: wifi: cfg80211: Authentication offload to user space for MLO connection in STA mode * 272c5a9d UPSTREAM: wifi: cfg80211: trace: remove MAC_PR_{FMT,ARG} * 99da8df3 UPSTREAM: KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS * 16bb33d7 ANDROID: ABI: Update allowed list for QCOM * 3383d21e UPSTREAM: wifi: cfg80211: Support 32 bytes KCK key in GTK rekey offload * 26bac3f0 ANDROID: MGLRU: Don't skip anon reclaim if swap low * 151bc216 ANDROID: incremental fs: Move throttling to outside page lock * 3ab6fda9 ANDROID: incremental fs: Fix race between truncate and write last block * aba5f575 ANDROID: fuse-bpf: Do not change bpf program in lookups * dd72bb25 UPSTREAM: usb: gadget: u_serial: Add null pointer check in gserial_resume * a2ee0d8d UPSTREAM: binder: Gracefully handle BINDER_TYPE_FDA objects with num_fds=0 * 9cdb4e58 UPSTREAM: binder: Address corner cases in deferred copy and fixup * 884fec93 UPSTREAM: binder: fix pointer cast warning * 05025548 UPSTREAM: binder: defer copies of pre-patched txn data * a9afae9a UPSTREAM: binder: read pre-translated fds from sender buffer * 7887b13e UPSTREAM: net_sched: reject TCF_EM_SIMPLE case for complex ematch module * 89eccb84 UPSTREAM: ext4: add inode table check in __ext4_get_inode_loc to aovid possible infinite loop * fda78dab Revert "ANDROID: GKI: Add vendor hook to binder transaction" * c404b74d ANDROID: GKI: Update the ABI xml representation for fuse-bpf * 7a1cca7d ANDROID: fuse-bpf: Add /sys/fs flags for fuse-bpf version * f5f4199c ANDROID: fuse-bpf v1.1 * bff9debe ANDROID: GKI: update xiaomi symbol list * 5a6502af ANDROID: psi: Add vendor hooks for PSI tracing * af8dfb01 FROMLIST: input: Add KEY_CAMERA_FOCUS event in HID * 79b3761c BACKPORT: sched/core: Fix use-after-free bug in dup_user_cpus_ptr() * a838fd5d Revert "FROMGIT: sched: Add __releases annotations to affine_move_task()" * 5767bdca Revert "BACKPORT: FROMGIT: sched: Introduce affinity_context" * 158d54a8 Revert "BACKPORT: FROMGIT: sched: Always preserve the user requested cpumask" * 92bd55bc Revert "FROMLIST: sched: Fix use-after-free bug in dup_user_cpus_ptr()" * bd820384 Revert "BACKPORT: FROMGIT: sched: Enforce user requested affinity" * 0f54a1c9 Revert "FROMGIT: sched: Always clear user_cpus_ptr in do_set_cpus_allowed()" * 97c7d8de Revert "ANDROID: sched: Keep sched_class::set_cpus_allowed stable" * 4ef9aa1b Revert "ANDROID: sched: Move scratch_mask to a percpu variable" * aa272796 BACKPORT: of: reserved_mem: Have kmemleak ignore dynamically allocated reserved mem * 20c1f0a6 Revert "BACKPORT: FROMGIT: mm/cma.c: make kmemleak aware of all CMA regions" * 5862eafd Revert "FROMGIT: mm/cma.c: delete kmemleak objects when freeing CMA areas to buddy at boot" * 5c6418dd Revert "UPSTREAM: mm: kmemleak: alloc gray object for reserved region with direct map" * 45a51d2e ANDROID: GKI: Update symbol list for Amlogic * d41e54ae ANDROID: GKI: Add symbol list for ZEKU * 32d4e80d ANDROID: dm-bow: Add ABI documentation * 88e27b17 ANDROID: dm-bow: Fix 5.15 compatibility issue * 63a1e5f1 Revert "ANDROID: dm-bow: remove dm-bow" * d07a013c ANDROID: vendor_hook: fix the error record of rwsem * 5fcf93b3 ANDROID: ABI: Update allowed list for QCOM * 16e7178e ANDROID: GKI: Update abi_gki_aarch64_qcom symbols * 4ef0a7df ANDROID: crypto: testmgr - add back deleted hctr2 test vectors * 2cde0330 ANDROID: abi_gki_aarch64_qcom: Add rpmsg_rx_done and zap_vma_ptes * 810133cb ANDROID: cpuidle-psci: Fix suspicious RCU usage * 6f810b08 FROMGIT: usb: gadget: configfs: Restrict symlink creation is UDC already binded * 9dff37ba ANDROID: Update symbol list for sunxi * 18eaf717 FROMGIT: scsi: ufs: Try harder to change the power mode * cfc314cd UPSTREAM: scsi: ufs: Reduce the START STOP UNIT timeout * 6a9193a0 UPSTREAM: 9p/fd: fix issue of list_del corruption in p9_fd_cancel() * b4c3ac47 UPSTREAM: fs: do not update freeing inode i_io_list * b607fae9 UPSTREAM: f2fs: fix to invalidate dcc->f2fs_issue_discard in error path * 0b34c91b FROMGIT: wifi: cfg80211: Fix extended KCK key length check in nl80211_set_rekey_data() * f719d33f UPSTREAM: iommu/iova: Fix alloc iova overflows issue * 43c604d3 UPSTREAM: iommu: Avoid races around device probe * 613751d7 ANDROID: GKI: Update abi_gki_aarch64_pasa * 2f7c6eb5 ANDROID: softirq: Refine RT defer softirq * 286300ec UPSTREAM: wifi: wilc1000: validate number of channels * 7594f016 UPSTREAM: wifi: wilc1000: validate pairwise and authentication suite offsets * d9a54ce8 UPSTREAM: wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute * 0be09859 UPSTREAM: media: dvb-core: Fix UAF due to refcount races at releasing * e5905d8a ANDROID: Update the GKI symbol list and ABI XML * 984241bd UPSTREAM: efi: rt-wrapper: Add missing include * ec6fe823 UPSTREAM: arm64: efi: Execute runtime services from a dedicated stack * 003dacfc UPSTREAM: KVM: x86/mmu: Fix race condition in direct_page_fault * 19987d1e UPSTREAM: usb: gadget: uvc: Rename bmInterfaceFlags -> bmInterlaceFlags * 6d2ec81c ANDROID: GKI: KASAN: disable INLINE * ae0a1eb8 ANDROID: GKI: Update symbol list for mtk * 9a8dcea6 ANDROID: usb: f_accessory: Check buffer size when initialised via composite * 2a298e88 UPSTREAM: drm/shmem-helper: Avoid vm_open error paths * 2c76d2b9 UPSTREAM: proc: avoid integer type confusion in get_proc_long * cc6c5c7f UPSTREAM: ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF * 0861407d UPSTREAM: proc: proc_skip_spaces() shouldn't think it is working on C strings * 3cf30601 UPSTREAM: usb: gadget: f_hid: fix f_hidg lifetime vs cdev * 8864b034 UPSTREAM: nfp: fix use-after-free in area_cache_get() * 9563d286 FROMGIT: scsi: ufs: Modify Tactive time setting conditions * afe869b8 ANDROID: gki_defconfig: disable various x86 and hw flags * 4dc28fe9 UPSTREAM: usb: gadget: f_fs: Fix unbalanced spinlock in __ffs_ep0_queue_wait .xml file is updated due to new symbols being now tracked: 76 function symbol(s) added 'u64 __blkg_prfill_rwstat(struct seq_file*, struct blkg_policy_data*, const struct blkg_rwstat_sample*)' 'u64 __blkg_prfill_u64(struct seq_file*, struct blkg_policy_data*, u64)' 'void __free_iova(struct iova_domain*, struct iova*)' 'int __traceiter_android_vh_modify_thermal_throttle_update(void*, struct thermal_zone_device*, bool*)' 'int __traceiter_android_vh_mpam_set(void*, struct task_struct*, struct task_struct*)' 'int __traceiter_android_vh_mutex_can_spin_on_owner(void*, struct mutex*, int*)' 'int __traceiter_android_vh_mutex_opt_spin_finish(void*, struct mutex*, bool)' 'int __traceiter_android_vh_mutex_opt_spin_start(void*, struct mutex*, bool*, int*)' 'int __traceiter_android_vh_psi_group(void*, struct psi_group*)' 'int __traceiter_android_vh_rwsem_can_spin_on_owner(void*, struct rw_semaphore*, bool*)' 'int __traceiter_android_vh_rwsem_opt_spin_finish(void*, struct rw_semaphore*, bool)' 'int __traceiter_android_vh_rwsem_opt_spin_start(void*, struct rw_semaphore*, bool*, int*, bool)' 'int __traceiter_wbc_writepage(void*, struct writeback_control*, struct backing_dev_info*)' 'struct iova* alloc_iova(struct iova_domain*, unsigned long int, unsigned long int, bool)' 'const char* bdi_dev_name(struct backing_dev_info*)' 'void blkcg_print_blkgs(struct seq_file*, struct blkcg*, u64(*)(struct seq_file*, struct blkg_policy_data*, int), const struct blkcg_policy*, int, bool)' 'void blkg_conf_finish(struct blkg_conf_ctx*)' 'int blkg_conf_prep(struct blkcg*, const struct blkcg_policy*, char*, struct blkg_conf_ctx*)' 'u64 blkg_prfill_rwstat(struct seq_file*, struct blkg_policy_data*, int)' 'void blkg_rwstat_exit(struct blkg_rwstat*)' 'int blkg_rwstat_init(struct blkg_rwstat*, gfp_t)' 'void blkg_rwstat_recursive_sum(struct blkcg_gq*, struct blkcg_policy*, int, struct blkg_rwstat_sample*)' 'u64 clockevent_delta2ns(unsigned long int, struct clock_event_device*)' 'void clockevents_register_device(struct clock_event_device*)' 'int crypto_authenc_extractkeys(struct crypto_authenc_keys*, const u8*, unsigned int)' 'struct dentry* d_alloc_name(struct dentry*, const char*)' 'void* devm_pci_remap_cfg_resource(struct device*, struct resource*)' 'void* devm_pci_remap_cfgspace(struct device*, resource_size_t, resource_size_t)' 'void devm_release_resource(struct device*, struct resource*)' 'int divider_determine_rate(struct clk_hw*, struct clk_rate_request*, const struct clk_div_table*, u8, unsigned long int)' 'struct iova* find_iova(struct iova_domain*, unsigned long int)' 'struct file_system_type* get_fs_type(const char*)' 'unsigned int get_next_ino()' 'int get_tree_single(struct fs_context*, int(*)(struct super_block*, struct fs_context*))' 'struct iio_channel* iio_channel_get_all(struct device*)' 'void iio_channel_release_all(struct iio_channel*)' 'struct iio_buffer* iio_kfifo_allocate()' 'ssize_t iio_read_const_attr(struct device*, struct device_attribute*, char*)' 'irqreturn_t iio_trigger_generic_data_rdy_poll(int, void*)' 'void iio_triggered_buffer_cleanup(struct iio_dev*)' 'int iio_triggered_buffer_setup_ext(struct iio_dev*, irqreturn_t(*)(int, void*), irqreturn_t(*)(int, void*), const struct iio_buffer_setup_ops*, const struct attribute**)' 'int iio_update_buffers(struct iio_dev*, struct iio_buffer*, struct iio_buffer*)' 'bool iio_validate_scan_mask_onehot(struct iio_dev*, const unsigned long int*)' 'bool input_device_enabled(struct input_dev*)' 'void input_set_poll_interval(struct input_dev*, unsigned int)' 'int input_setup_polling(struct input_dev*, void(*)(struct input_dev*))' 'struct io_cq* ioc_lookup_icq(struct io_context*, struct request_queue*)' 'int iova_cache_get()' 'void iova_cache_put()' 'void irq_domain_associate_many(struct irq_domain*, unsigned int, irq_hw_number_t, int)' 'void iterate_supers_type(struct file_system_type*, void(*)(struct super_block*, void*), void*)' 'void kill_litter_super(struct super_block*)' 'int mmc_set_blocklen(struct mmc_card*, unsigned int)' 'int netdev_set_num_tc(struct net_device*, u8)' 'int netdev_set_tc_queue(struct net_device*, u8, u16, u16)' 'struct net_device* netdev_upper_get_next_dev_rcu(struct net_device*, struct list_head**)' 'unsigned long int nr_free_buffer_pages()' 'int of_pci_get_max_link_speed(struct device_node*)' 'bool pci_ats_supported(struct pci_dev*)' 'void pci_disable_ats(struct pci_dev*)' 'int pci_enable_ats(struct pci_dev*, int)' 'int rpmsg_rx_done(struct rpmsg_endpoint*, void*)' 'int scsi_register_driver(struct device_driver*)' 'void sdhci_adma_write_desc(struct sdhci_host*, void**, dma_addr_t, int, unsigned int)' 'void sdhci_set_uhs_signaling(struct sdhci_host*, unsigned int)' 'size_t sg_copy_buffer(struct scatterlist*, unsigned int, void*, size_t, off_t, bool)' 'size_t sg_zero_buffer(struct scatterlist*, unsigned int, size_t, off_t)' 'int simple_statfs(struct dentry*, struct kstatfs*)' 'int sysfs_create_mount_point(struct kobject*, const char*)' 'void sysfs_remove_mount_point(struct kobject*, const char*)' 'unsigned char tty_get_char_size(unsigned int)' 'int ufshcd_system_freeze(struct device*)' 'int ufshcd_system_restore(struct device*)' 'int ufshcd_system_thaw(struct device*)' 'int usbnet_get_ethernet_addr(struct usbnet*, int)' 'void zap_vma_ptes(struct vm_area_struct*, unsigned long int, unsigned long int)' 16 variable symbol(s) added 'struct tracepoint __tracepoint_android_vh_modify_thermal_throttle_update' 'struct tracepoint __tracepoint_android_vh_mpam_set' 'struct tracepoint __tracepoint_android_vh_mutex_can_spin_on_owner' 'struct tracepoint __tracepoint_android_vh_mutex_opt_spin_finish' 'struct tracepoint __tracepoint_android_vh_mutex_opt_spin_start' 'struct tracepoint __tracepoint_android_vh_psi_group' 'struct tracepoint __tracepoint_android_vh_rwsem_can_spin_on_owner' 'struct tracepoint __tracepoint_android_vh_rwsem_opt_spin_finish' 'struct tracepoint __tracepoint_android_vh_rwsem_opt_spin_start' 'struct tracepoint __tracepoint_wbc_writepage' 'struct static_key_true io_cgrp_subsys_on_dfl_key' 'const unsigned char pcie_link_speed[16]' 'unsigned long int phy_basic_features[2]' 'unsigned long int phy_gbit_features[2]' 'const struct inode_operations simple_dir_inode_operations' 'const struct file_operations simple_dir_operations' type 'enum bpf_prog_type' changed enumerator 'BPF_PROG_TYPE_FUSE' (32) was added Change-Id: Icab4315e6ba42d246424150be9dbd58a8bd98133 Signed-off-by:Greg Kroah-Hartman <gregkh@google.com>
Loading