Due to walt_get_mvp_task_prio() function still may return mvp prio
after mvp task deactivate via walt_cfs_deactivate_mvp_task() function,
so update the condition of judge one task if it is mvp task.
Change-Id: Iae5d6e420213111acd0b0e71095e0a6caffbe0aa
Signed-off-by: Tengfei Fan <quic_tengfan@quicinc.com>
[ Upstream commit 30e29a9a2bc6a4888335a6ede968b75cd329657a ]
In prealloc_elems_and_freelist(), the multiplication to calculate the
size passed to bpf_map_area_alloc() could lead to an integer overflow.
As a result, out-of-bounds write could occur in pcpu_freelist_populate()
as reported by KASAN:
[...]
[ 16.968613] BUG: KASAN: slab-out-of-bounds in pcpu_freelist_populate+0xd9/0x100
[ 16.969408] Write of size 8 at addr ffff888104fc6ea0 by task crash/78
[ 16.970038]
[ 16.970195] CPU: 0 PID: 78 Comm: crash Not tainted 5.15.0-rc2+ #1
[ 16.970878] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
[ 16.972026] Call Trace:
[ 16.972306] dump_stack_lvl+0x34/0x44
[ 16.972687] print_address_description.constprop.0+0x21/0x140
[ 16.973297] ? pcpu_freelist_populate+0xd9/0x100
[ 16.973777] ? pcpu_freelist_populate+0xd9/0x100
[ 16.974257] kasan_report.cold+0x7f/0x11b
[ 16.974681] ? pcpu_freelist_populate+0xd9/0x100
[ 16.975190] pcpu_freelist_populate+0xd9/0x100
[ 16.975669] stack_map_alloc+0x209/0x2a0
[ 16.976106] __sys_bpf+0xd83/0x2ce0
[...]
The possibility of this overflow was originally discussed in [0], but
was overlooked.
Fix the integer overflow by changing elem_size to u64 from u32.
[0] https://lore.kernel.org/bpf/728b238e-a481-eb50-98e9-b0f430ab01e7@gmail.com/
Bug: 202511260
Fixes: 557c0c6e7d ("bpf: convert stackmap to pre-allocation")
Signed-off-by: Tatsuhiko Yasumatsu <th.yasumatsu@gmail.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Link: https://lore.kernel.org/bpf/20210930135545.173698-1-th.yasumatsu@gmail.com
Signed-off-by: Sasha Levin <sashal@kernel.org>
Signed-off-by: Aaron Ding <aaronding@google.com>
Change-Id: I45de17135336ce329b539d3e9e95fdcddafb2b00
* refs/heads/tmp-698fa19:
ANDROID: vendor_hooks: Add hooks for futex
ANDROID: dma-contiguous: Add tracehook to allow subpage allocations in dma_alloc_contiguous
ANDROID: Update the ABI xml and symbol list
UPSTREAM: ALSA: memalloc: Align buffer allocations in page size
ANDROID: Fix mmu_notifier_trylock definition for !CONFIG_MMU_NOTIFIER config
FROMGIT: USB: gadget: bRequestType is a bitfield, not a enum
ANDROID: qcom: Add flush_delayed_fput to ABI
ANDROID: fix ABI breakage caused by mm_struct->mmu_notifier_lock addition
ANDROID: fix ABI breakage caused by percpu_rw_semaphore changes
ANDROID: fix mmu_notifier race caused by not taking mmap_lock during SPF
ANDROID: percpu-rwsem: enable percpu_sem destruction in atomic context
FROMLIST: virtio_mmio: pm: Add notification handlers for restore and freeze
FROMLIST: virtio: do not reset stateful devices on resume
FROMGIT: f2fs: avoid EINVAL by SBI_NEED_FSCK when pinning a file
UPSTREAM: mm, slub: fix incorrect memcg slab count for bulk free
UPSTREAM: mm, slub: fix potential use-after-free in slab_debugfs_fops
UPSTREAM: mm, slub: fix potential memoryleak in kmem_cache_open()
UPSTREAM: mm, slub: fix mismatch between reconstructed freelist depth and cnt
UPSTREAM: mm, slub: fix two bugs in slab_debug_trace_open()
UPSTREAM: mm, slub: allocate private object map for debugfs listings
FROMGIT: dma-buf: remove restriction of IOCTL:DMA_BUF_SET_NAME
UPSTREAM: usb: dwc3: core: balance phy init and exit
UPSTREAM: xhci: Fix failure to give back some cached cancelled URBs.
ANDROID: mm/memory_hotplug: Don't special case memory_block_size_bytes
UPSTREAM: usb: gadget: uvc: fix multiple opens
UPSTREAM: aio: fix use-after-free due to missing POLLFREE handling
UPSTREAM: aio: keep poll requests on waitqueue until completed
UPSTREAM: signalfd: use wake_up_pollfree()
UPSTREAM: binder: use wake_up_pollfree()
UPSTREAM: wait: add wake_up_pollfree()
UPSTREAM: USB: gadget: zero allocate endpoint 0 buffers
BACKPORT: scsi: ufs: Improve SCSI abort handling further
FROMGIT: scsi: ufs: Introduce ufshcd_release_scsi_cmd()
FROMGIT: scsi: ufs: Remove the 'update_scaling' local variable
UPSTREAM: scsi: ufs: core: Fix another task management completion race
BACKPORT: scsi: ufs: core: Fix task management completion timeout race
ANDROID: qcom: Add android_rvh_do_ptrauth_fault to ABI
UPSTREAM: USB: gadget: detect too-big endpoint 0 requests
ANDROID: ABI: Add symbols used by frame buffer driver
UPSTREAM: xhci: Add bus number to some debug messages
UPSTREAM: xhci: Add additional dynamic debug to follow URBs in cancel and error cases.
UPSTREAM: Revert "USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set"
UPSTREAM: xhci: Fix failure to give back some cached cancelled URBs.
UPSTREAM: HID: check for valid USB device for many HID drivers
UPSTREAM: HID: wacom: fix problems when device is not a valid USB device
UPSTREAM: HID: bigbenff: prevent null pointer dereference
UPSTREAM: HID: add USB_HID dependancy on some USB HID drivers
UPSTREAM: HID: add USB_HID dependancy to hid-chicony
UPSTREAM: HID: add USB_HID dependancy to hid-prodikeys
UPSTREAM: HID: add hid_is_usb() function to make it simpler for USB detection
FROMGIT: clk: Don't parent clks until the parent is fully registered
UPSTREAM: mm/gup: remove the vma allocation from gup_longterm_locked()
BACKPORT: usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect
ANDROID: ABI: Add iio_write_channel_raw symbol
ANDROID: GKI: Update symbols to symbol list
Change-Id: Ifed5ad941e4e34594c49336c1a6556c8cb665cba
Signed-off-by: Sivasri Kumar, Vanka <quic_svanka@quicinc.com>
We want to use this hook to record the sleeping time due to Futex
Bug: 210947226
Signed-off-by: Liujie Xie <xieliujie@oppo.com>
Change-Id: I637f889dce42937116d10979e0c40fddf96cd1a2
Add a tracehook to allow callers into dma_alloc_contiguous() to make
use of the built-in CMA area if the caller has addressing limitations;
this provides a means of allocating from memory whose bounds are
restricted to the lower 4 GB of memory, without having to enable DMA32
(assuming the default CMA area has been restricted to the appropriate
address ranges).
Leaf changes summary: 1 artifact changed
Changed leaf types summary: 0 leaf type changed
Removed/Changed/Added functions summary: 0 Removed, 0 Changed, 0 Added function
Removed/Changed/Added variables summary: 0 Removed, 0 Changed, 1 Added variable
1 Added variable:
[A] 'tracepoint __tracepoint_android_vh_subpage_dma_contig_alloc'
Bug: 199917449
Change-Id: Ia86fb416376bca231405b06ab27b0674c8fe3e14
Signed-off-by: Chris Goldsworthy <quic_cgoldswo@quicinc.com>
* keystone/mirror-android12-5.10:
FROMGIT: USB: gadget: bRequestType is a bitfield, not a enum
ANDROID: qcom: Add flush_delayed_fput to ABI
ANDROID: fix ABI breakage caused by mm_struct->mmu_notifier_lock addition
ANDROID: fix ABI breakage caused by percpu_rw_semaphore changes
ANDROID: fix mmu_notifier race caused by not taking mmap_lock during SPF
ANDROID: percpu-rwsem: enable percpu_sem destruction in atomic context
FROMLIST: virtio_mmio: pm: Add notification handlers for restore and freeze
FROMLIST: virtio: do not reset stateful devices on resume
FROMGIT: f2fs: avoid EINVAL by SBI_NEED_FSCK when pinning a file
Signed-off-by: deyaoren@google.com <deyaoren@google.com>
Change-Id: I19107ef2650f3c2cb0622c251d131cff75450e9a
percpu_rw_semaphore changes to allow calling percpu_free_rwsem in atomic
context cause ABI breakage. Introduce percpu_free_rwsem_atomic wrapper
and change percpu_rwsem_destroy to use it in order to keep
percpu_rw_semaphore struct intact and fix ABI breakage.
Bug: 161210518
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Change-Id: I198a6381fb48059f2aaa2ec38b8c1e5e5e936bb0
When pagefaults are handled speculatively,the pair of
mmu_notifier_invalidate_range_start/mmu_notifier_invalidate_range_end
calls happen without mmap_lock being taken. This enables the following
race:
mmu_notifier_invalidate_range_start
mmap_write_lock
mmu_notifier_register
mmap_write_unlock
mmu_notifier_invalidate_range_end
In this case mmu_notifier_invalidate_range_end will see a new
subscriber not seen at the time of mmu_notifier_invalidate_range_start
and will call ops->invalidate_range_end for that subscriber without
the matching ops->invalidate_range_start, creating imbalance.
Fix this by introducing a new mm->mmu_notifier_lock percpu_rw_semaphore
to synchronize mmu_notifier_invalidate_range_start/
mmu_notifier_invalidate_range_end with mmu_notifier_register when
handling pagefaults speculatively without holding mmap_lock.
percpu_rw_semaphore is used instead of rw_semaphore to prevent cache
line bouncing in the pagefault path.
Fixes: 86ee4a531e ("FROMLIST: x86/mm: add speculative pagefault handling")
Bug: 161210518
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Change-Id: I9c363b2348efcad19818f93b010abf956870ab55
commit 42288cb44c4b5fff7653bc392b583a2b8bd6a8c0 upstream.
Several ->poll() implementations are special in that they use a
waitqueue whose lifetime is the current task, rather than the struct
file as is normally the case. This is okay for blocking polls, since a
blocking poll occurs within one task; however, non-blocking polls
require another solution. This solution is for the queue to be cleared
before it is freed, using 'wake_up_poll(wq, EPOLLHUP | POLLFREE);'.
However, that has a bug: wake_up_poll() calls __wake_up() with
nr_exclusive=1. Therefore, if there are multiple "exclusive" waiters,
and the wakeup function for the first one returns a positive value, only
that one will be called. That's *not* what's needed for POLLFREE;
POLLFREE is special in that it really needs to wake up everyone.
Considering the three non-blocking poll systems:
- io_uring poll doesn't handle POLLFREE at all, so it is broken anyway.
- aio poll is unaffected, since it doesn't support exclusive waits.
However, that's fragile, as someone could add this feature later.
- epoll doesn't appear to be broken by this, since its wakeup function
returns 0 when it sees POLLFREE. But this is fragile.
Although there is a workaround (see epoll), it's better to define a
function which always sends POLLFREE to all waiters. Add such a
function. Also make it verify that the queue really becomes empty after
all waiters have been woken up.
Reported-by: Linus Torvalds <torvalds@linux-foundation.org>
Cc: stable@vger.kernel.org
Link: https://lore.kernel.org/r/20211209010455.42744-2-ebiggers@kernel.org
Signed-off-by: Eric Biggers <ebiggers@google.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Bug: 185125206
Signed-off-by: Greg Kroah-Hartman <gregkh@google.com>
Change-Id: I4f69da5bbbad53975024d027fa1bbe22522c6efe
* refs/heads/tmp-40160d2:
UPSTREAM: ASoC: dapm: use component prefix when checking widget names
ANDROID: ABI: Add symbols used by clocksource driver
ANDROID: GKI: Export clocksource_mmio_init
ANDROID: GKI: Export sched_clock_register
FROMGIT: f2fs: show number of pending discard commands
ANDROID: workqueue: export symbol of the function wq_worker_comm()
ANDROID: GKI: Update symbols to symbol list
ANDROID: vendor_hooks: Add hooks for binder proc transaction
Change-Id: Iefc600dfe7e110fa001e7c6c9f88e15008382b2d
Signed-off-by: Sivasri Kumar, Vanka <quic_svanka@quicinc.com>
As a side effect of commit f64fafbec5 ("sched/walt: Fix caching freq
earlier than down rate limit check"), the check to skip frequency update
if the same frequency as the previous frequency is being applied,
got removed.
Restore this check at the appropriate place.
Change-Id: I7aee7f84f0a64747b01ac31c2fdcbb4440908deb
Signed-off-by: Sai Harshini Nimmala <quic_snimmala@quicinc.com>
This change is for general scheduler improvement.
Change-Id: I6235ca8fce3d0c2ab3bcab1ecee0d97c6d0a9942
Signed-off-by: Abhijeet Dharmapurikar <adharmap@codeaurora.org>
Signed-off-by: Shaleen Agrawal <shalagra@codeaurora.org>
This change is for general scheduler improvement.
Change-Id: I997827d143a370e49e43ecba8494ee8e69652b57
Signed-off-by: Abhijeet Dharmapurikar <adharmap@codeaurora.org>
Signed-off-by: Shaleen Agrawal <shalagra@codeaurora.org>
* keystone/mirror-android12-5.10:
ANDROID: ABI: Add symbols used by clocksource driver
ANDROID: GKI: Export clocksource_mmio_init
ANDROID: GKI: Export sched_clock_register
FROMGIT: f2fs: show number of pending discard commands
ANDROID: workqueue: export symbol of the function wq_worker_comm()
Signed-off-by: deyaoren@google.com <deyaoren@google.com>
Change-Id: I3dbd0461e35bf842cc714a4c997e4996383ed3a8
clocksource driver may use sched_clock_register
to resigter itself as a sched_clock source.
Export it to support building such driver
as module, like timer-imx-tpm.c
Bug: 194108974
Signed-off-by: Jindong Yue <jindong.yue@nxp.com>
Change-Id: Id23f3da624a1e70fc1a44daf6f827c03dc1d053d
To determine why a particular long preemption or long irqs off
period has happened, without crashing the device, the tracepoints
need improvement. The callers should be included.
Change-Id: If147969717517563e56cd20d3c036f51835a5c73
Signed-off-by: Stephen Dickey <quic_dickey@quicinc.com>
Export symbol of the function wq_worker_comm() in kernel/workqueue.c for dlkm to get the description of the kworker process.
Bug: 208394207
Signed-off-by: zhengding chen <chenzhengding@oppo.com>
Change-Id: I2e7ddd52a15e22e99e6596f16be08243af1bb473
* refs/heads/tmp-ca0e930:
ANDROID: GKI: Add symbols abi for USB IP kernel modules.
ANDROID: GKI: Fix file mode on mtk abi file
UPSTREAM: erofs: fix deadlock when shrink erofs slab
ANDROID: init_task: Init android vendor and oem data
Change-Id: I7a5fc8cf9ab70e60cd693a12a1e19cf8fa6ba535
Signed-off-by: Sivasri Kumar, Vanka <quic_svanka@quicinc.com>
* keystone/mirror-android12-5.10:
ANDROID: GKI: Fix file mode on mtk abi file
UPSTREAM: erofs: fix deadlock when shrink erofs slab
ANDROID: init_task: Init android vendor and oem data
Signed-off-by: Daniel Norman <danielnorman@google.com>
Change-Id: I6dd077bbaccc784efb63caa8ec4cf005ea696b77
Without initialization, it will be random data and hard for
vendor hook to decide.
Bug: 207739506
Change-Id: I278772d87eea38c03a40d4f0bef20ac8644e2ecd
Signed-off-by: Maria Yu <quic_aiquny@quicinc.com>
Nothing protects the access to the per_cpu variable sd_llc_id. When testing
the same CPU (i.e. this_cpu == that_cpu), a race condition exists with
update_top_cache_domain(). One scenario being:
CPU1 CPU2
==================================================================
per_cpu(sd_llc_id, CPUX) => 0
partition_sched_domains_locked()
detach_destroy_domains()
cpus_share_cache(CPUX, CPUX) update_top_cache_domain(CPUX)
per_cpu(sd_llc_id, CPUX) => 0
per_cpu(sd_llc_id, CPUX) = CPUX
per_cpu(sd_llc_id, CPUX) => CPUX
return false
ttwu_queue_cond() wouldn't catch smp_processor_id() == cpu and the result
is a warning triggered from ttwu_queue_wakelist().
Avoid a such race in cpus_share_cache() by always returning true when
this_cpu == that_cpu.
Fixes: 518cd62341 ("sched: Only queue remote wakeups when crossing cache boundaries")
Reported-by: Jing-Ting Wu <jing-ting.wu@mediatek.com>
Signed-off-by: Vincent Donnefort <vincent.donnefort@arm.com>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Reviewed-by: Valentin Schneider <valentin.schneider@arm.com>
Reviewed-by: Vincent Guittot <vincent.guittot@linaro.org>
Link: https://lore.kernel.org/r/20211104175120.857087-1-vincent.donnefort@arm.com
Bug: 204726704
Change-Id: Ib6e59187b6d7d7dcabae84e3541d5fbe0dfc400a
(cherry picked from commit 42dc938a590c96eeb429e1830123fef2366d9c80)
Signed-off-by: Jing-Ting Wu <Jing-Ting.Wu@mediatek.com>
When a task yields, it relinquishes the cpu and scheduler
is tasked to find another task.
However he MVP implementation could return the same task
leading to a loop where the yielded task gets to run back.
To fix this, drop the MVP status of tasks that yield
themselves. The MVP status is restored the next time they
actually get enqueued - -likely because of a wakeup from
sleep or task migration.
Change-Id: Ia2a2074f18c4de56e0695ee2c5f1daf8a4eb5980
Signed-off-by: Tengfei Fan <tengfeif@codeaurora.org>
* keystone/mirror-android12-5.10:
FROMGIT: sched/scs: Reset task stack state in bringup_cpu()
ANDROID: dma-buf: heaps: fix dma-buf heap pool pages stat
Signed-off-by: Daniel Norman <danielnorman@google.com>
Change-Id: I2bd9542c4921467168df8999cb0e475b9e62ff15
* refs/heads/tmp-ecb09e2:
ANDROID: ABI: Add several spi_mem related symbols
UPSTREAM: spi: spi-mem: add spi_mem_dtr_supports_op()
ANDROID: gki_defconfig: enable CONFIG_SPI_MEM
ANDROID: ABI: Add several iio related symbols
ANDROID: ABI: Update symbol list for IMX
ANDROID: usb: gadget: f_accessory: Mitgate handling of non-existent USB request
ANDROID: GKI: fix up abi break in ehci code
UPSTREAM: usb: ehci: handshake CMD_RUN instead of STS_HALT
ANDROID: arm64/mm: Add command line option to make ZONE_DMA32 empty
ANDROID: GKI: Add newly added vendor hook to abi symbol list
Change-Id: I14d6bed709ccbb00f72ca722a7fd0cf4bcf32d79
Signed-off-by: Sivasri Kumar, Vanka <quic_svanka@quicinc.com>
To hot unplug a CPU, the idle task on that CPU calls a few layers of C
code before finally leaving the kernel. When KASAN is in use, poisoned
shadow is left around for each of the active stack frames, and when
shadow call stacks are in use. When shadow call stacks (SCS) are in use
the task's saved SCS SP is left pointing at an arbitrary point within
the task's shadow call stack.
When a CPU is offlined than onlined back into the kernel, this stale
state can adversely affect execution. Stale KASAN shadow can alias new
stackframes and result in bogus KASAN warnings. A stale SCS SP is
effectively a memory leak, and prevents a portion of the shadow call
stack being used. Across a number of hotplug cycles the idle task's
entire shadow call stack can become unusable.
We previously fixed the KASAN issue in commit:
e1b77c9298 ("sched/kasan: remove stale KASAN poison after hotplug")
... by removing any stale KASAN stack poison immediately prior to
onlining a CPU.
Subsequently in commit:
f1a0a376ca0c4ef1 ("sched/core: Initialize the idle task with preemption disabled")
... the refactoring left the KASAN and SCS cleanup in one-time idle
thread initialization code rather than something invoked prior to each
CPU being onlined, breaking both as above.
We fixed SCS (but not KASAN) in commit:
63acd42c0d4942f7 ("sched/scs: Reset the shadow stack when idle_task_exit")
... but as this runs in the context of the idle task being offlined it's
potentially fragile.
To fix these consistently and more robustly, reset the SCS SP and KASAN
shadow of a CPU's idle task immediately before we online that CPU in
bringup_cpu(). This ensures the idle task always has a consistent state
when it is running, and removes the need to so so when exiting an idle
task.
Whenever any thread is created, dup_task_struct() will give the task a
stack which is free of KASAN shadow, and initialize the task's SCS SP,
so there's no need to specially initialize either for idle thread within
init_idle(), as this was only necessary to handle hotplug cycles.
I've tested this on arm64 with:
* gcc 11.1.0, defconfig +KASAN_INLINE, KASAN_STACK
* clang 12.0.0, defconfig +KASAN_INLINE, KASAN_STACK, SHADOW_CALL_STACK
... offlining and onlining CPUS with:
| while true; do
| for C in /sys/devices/system/cpu/cpu*/online; do
| echo 0 > $C;
| echo 1 > $C;
| done
| done
Fixes: f1a0a376ca0c4ef1 ("sched/core: Initialize the idle task with preemption disabled")
Reported-by: Qian Cai <quic_qiancai@quicinc.com>
Signed-off-by: Mark Rutland <mark.rutland@arm.com>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Reviewed-by: Valentin Schneider <valentin.schneider@arm.com>
Tested-by: Qian Cai <quic_qiancai@quicinc.com>
Link: https://lore.kernel.org/lkml/20211115113310.35693-1-mark.rutland@arm.com/
Bug: 207346964
(cherry picked from commit dce1ca0525bfdc8a69a9343bc714fbc19a2f04b3
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git sched/urgent)
Signed-off-by: Yee Lee <yee.lee@mediatek.com>
Change-Id: Ia2db6477afddcc01fae00c6eb925fb3ec2791130
* keystone/mirror-android12-5.10:
ANDROID: ABI: Add several spi_mem related symbols
UPSTREAM: spi: spi-mem: add spi_mem_dtr_supports_op()
ANDROID: gki_defconfig: enable CONFIG_SPI_MEM
ANDROID: ABI: Add several iio related symbols
ANDROID: ABI: Update symbol list for IMX
ANDROID: usb: gadget: f_accessory: Mitgate handling of non-existent USB request
ANDROID: GKI: fix up abi break in ehci code
UPSTREAM: usb: ehci: handshake CMD_RUN instead of STS_HALT
ANDROID: arm64/mm: Add command line option to make ZONE_DMA32 empty
ANDROID: GKI: Add newly added vendor hook to abi symbol list
Signed-off-by: Daniel Norman <danielnorman@google.com>
Change-Id: I1bc7e06b56227f133defef1a2c5d7304747ec037
* refs/heads/tmp-4a750ed:
ANDROID: fips140: add userspace interface for evaluation testing
ANDROID: fips140: add support for injecting integrity error
ANDROID: fips140: refactor evaluation testing support
ANDROID: sched: add hook point in do_sched_yield()
ANDROID: GKI: Update symbols to symbol list
FROMGIT: usb: gadget: f_fs: Use stream_open() for endpoint files
ANDROID: GKI: Update symbol list for VIVO
ANDROID: block: export tracepoints
ANDROID: setlocalversion: make KMI_GENERATION optional
BACKPORT: uapi: virtio_ids: add a sound device type ID from OASIS spec
ANDROID: GKI: Add vendor hook to binder transaction
ANDROID: qcom: Add smp_call_function_single_async to ABI
Revert "sched/fair: Keep load_avg and load_sum synced"
Revert "sched/pelt: Ensure that *_sum is always synced with *_avg"
Revert "sched/fair: Ensure _sum and _avg values stay consistent"
ANDROID: consolidate.fragment: Enable usbmon
ANDROID: locking/rwsem: only clean RWSEM_FLAG_HANDOFF when already set
UPSTREAM: f2fs: change fiemap way in printing compression chunk
Change-Id: I353c0570b448328ab4c1a151d4ec095a61ca1679
Signed-off-by: Sivasri Kumar, Vanka <quic_svanka@quicinc.com>