barbet: update kernel-and-modules prebuilt [ DO NOT MERGE ]

Linux version 4.19.224-g7849426d1067-ab8425180 (build-user@build-host)
    (Android (7284624, based on r416183b) clang version 12.0.5
    (https://android.googlesource.com/toolchain/llvm-project
    c935d99d7cf2016289302412d708641d52d2f7ee), LLD 12.0.5
    (/buildbot/src/android/llvm-toolchain/out/llvm-project/lld
    c935d99d7cf2016289302412d708641d52d2f7ee)) #1 SMP PREEMPT Fri Apr
    8 08:48:38 UTC 2022

build: (1 change)
  cc6c1e7a _setup_env.sh: Prevent Clang sysroot detection for userprogs

kernel/private/tests/patchwork: (1 change)
  17ec27f6 google_battery: Fix patchwork to use the enum (AC clear)

private/msm-google: (82 changes)
  7849426d Merge branch 'android-msm-barbet-4.19-sc-security' into android-msm-barbet-4.19-sc-qpr3
  ebba4712 Revert "ANDROID: dm-bow: Protect Ranges fetched and erased from the RB tree"
  4693171e input: touch_offload: interface updates
  bc7bbce6 arm64: Use the clearbhb instruction in mitigations
  f61e9937 arm64: add ID_AA64ISAR2_EL1 sys register
  603eec72 KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered and migrated
  f7793563 arm64: Mitigate spectre style branch history side channels
  69131229 KVM: arm64: Add templates for BHB mitigation sequences
  b9b9e378 arm64: proton-pack: Report Spectre-BHB vulnerabilities as part of Spectre-v2
  2415247c arm64: Add percpu vectors for EL1
  50de83c1 arm64: entry: Add macro for reading symbol addresses from the trampoline
  b6d36b2c arm64: entry: Add vectors that have the bhb mitigation sequences
  8bcd3ea7 arm64: entry: Add non-kpti __bp_harden_el1_vectors for mitigations
  04e63227 arm64: entry: Allow the trampoline text to occupy multiple pages
  e2ea2c62 arm64: entry: Make the kpti trampoline's kpti sequence optional
  e0029e83 arm64: entry: Move trampoline macros out of ifdef'd section
  3eab7c1c arm64: entry: Don't assume tramp_vectors is the start of the vectors
  45d6b998 arm64: entry: Allow tramp_alias to access symbols after the 4K boundary
  9248a2fd arm64: entry: Move the trampoline data page before the text page
  635a91b9 arm64: entry: Free up another register on kpti's tramp_exit path
  7d157bec arm64: entry: Make the trampoline cleanup optional
  e5f02833 arm64: entry.S: Add ventry overflow sanity checks
  438c30e4 arm64: Add Cortex-X2 CPU part definition
  68171d8e arm64: Add Neoverse-N2, Cortex-A710 CPU part definition
  744bcf40 ARM: fix Thumb2 regression with Spectre BHB
  93477fa7 ARM: Spectre-BHB: provide empty stub for non-config
  ff499fdc ARM: fix build warning in proc-v7-bugs.c
  0cfcad68 ARM: Do not use NOCROSSREFS directive with ld.lld
  c0cd0d82 ARM: fix co-processor register typo
  5b077a12 ARM: fix build error when BPF_SYSCALL is disabled
  bb18996c ARM: include unprivileged BPF status in Spectre V2 reporting
  598a6d7e ARM: Spectre-BHB workaround
  70d48b05 ARM: use LOADADDR() to get load address of sections
  9c3fef9e ARM: early traps initialisation
  cbf79cd8 ARM: report Spectre v2 status through sysfs
  48047e2c x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
  f1155bc7 x86/speculation: Warn about Spectre v2 LFENCE mitigation
  3a5f12a0 x86/speculation: Update link to AMD speculation whitepaper
  4544ac96 x86/speculation: Use generic retpoline by default on AMD
  9880286f x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting
  20a6a045 Documentation/hw-vuln: Update spectre doc
  dadc4ad8 x86/speculation: Add eIBRS + Retpoline options
  50e7070c x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
  e34f3d2e x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
  8110fd92 x86/speculation: Merge one test in spectre_v2_user_select_mitigation()
  53c9932d bpf: Add kconfig knob for disabling unpriv bpf by default
  ce7a2a50 net: qrtr: fix another OOB Read in qrtr_endpoint_post
  b3ca97a9 cgroup-v1: Require capabilities to set release_agent
  08698e1f sr9700: sanity check for packet length
  54dec8d8 vt_kdsetmode: extend console locking
  841cdbdb usb: gadget: clear related members when goto fail
  9d004f1e usb: gadget: don't release an existing dev->buf
  00b271db ovl: fix missing negative dentry check in ovl_rename()
  eea122ab USB: gadget: validate interface OS descriptor requests
  68e63e1c msm: synx: fix synx_release_core race condition
  f10fdb23 msm: synx: acquire ref of synx handle in each function
  a26caefd ANDROID: dm-bow: Protect Ranges fetched and erased from the RB tree
  23b61bb6 BACKPORT: ipv6: Implement draft-ietf-6man-rfc4941bis
  6040df4a UPSTREAM: drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions
  4d39de2a isdn: cpai: check ctr->cnr to avoid array index out of bound
  e67bf81a sctp: use call_rcu to free endpoint
  39f77717 bpf: Fix leakage due to insufficient speculative store bypass mitigation
  9c1ed296 bpf: Introduce BPF nospec instruction for mitigating Spectre v4
  a208e7f3 bpf: track spill/fill of constants
  3912c5b6 bpf/verifier: per-register parent pointers
  5f49b126 usb: dwc3: Set the initial value of usb_data_enabled before use
  7370a5e7 UPSTREAM: USB: gadget: validate interface OS descriptor requests
  83320245 UPSTREAM: usb: gadget: rndis: check size of RNDIS_MSG_SET command
  ce5561e2 Merge android-msm-barbet-4.19-sc-v2 into android-msm-barbet-4.19-sc-qpr3
  0841e4c2 Merge branch 'android-msm-barbet-4.19-sc-security' into android-msm-barbet-4.19-sc-v2
  0b347683 mmc: block: fix read single on recovery logic
  fcff208d ANDROID: xt_qtaguid: fix UAF race
  36e69a21 lib/iov_iter: initialize "flags" in new pipe_buffer
  001257e2 usb: typec: tcpm: Fix wrong handling for Not_Supported in VDM AMS
  7332d3f6 google_battery: Allow Adaptive Charging to be cleared by the UI
  9afe3ab9 fget: check that the fd still exists after getting a ref to it
  bac3d1c2 fs: add fget_many() and fput_many()
  89d3434e usb: hub: Fix detection issue of USB3 device in VIA VL813 USB3.0 hub
  aa4cda1a Merge android-msm-barbet-4.19-sc-v2 into android-msm-barbet-4.19-sc-qpr3
  902a5da0 Merge branch 'android-msm-barbet-4.19-sc-security' into android-msm-barbet-4.19-sc-v2
  582365a4 msm: kgsl: Update the IFPC power up reglist
  232c8c1b usb: pd_engine: Fix use-after-free in blocking_notifier_chain_unregister

private/msm-google-modules/wlan/qcacld-3.0: (4 changes)
  64e41485 Merge android-msm-barbet-4.19-sc-v2 into android-msm-barbet-4.19-sc-qpr3
  55a70c95 Merge branch 'android-msm-barbet-4.19-sc-security' into android-msm-barbet-4.19-sc-v2
  602c6382 qcacld-3.0: Avoid OOB read in dot11f_unpack_assoc_response
  b61d26d7 qcacld-3.0: Avoid OOB read in dot11f_unpack_assoc_response

private/msm-google/techpack/display: (4 changes)
  a1f50f8a Merge android-msm-barbet-4.19-sc-v2 into android-msm-barbet-4.19-sc-qpr3
  8c139697 Merge branch 'android-msm-barbet-4.19-sc-security' into android-msm-barbet-4.19-sc-v2
  bbb6c3fc disp: msm: sde: protect file private structure with mutex lock
  3609ed88 disp: msm: sde: add null check for drm file in msm_release

Bug: 162326603
Bug: 174846563
Bug: 174860685
Bug: 175340972
Bug: 182388481
Bug: 184018316
Bug: 192140701
Bug: 195565510
Bug: 196011539
Bug: 201574693
Bug: 203361388
Bug: 205800160
Bug: 208558576
Bug: 209480901
Bug: 209481085
Bug: 213172319
Bug: 213239835
Bug: 213600138
Bug: 214127735
Bug: 214268076
Bug: 215313369
Bug: 215557547
Bug: 216408350
Bug: 216481035
Bug: 218337597
Bug: 218985673
Bug: 220261709
Bug: 220741611
Bug: 220790970
Bug: 221413783
Bug: 222023189
Bug: 222023207
Bug: 222644279
Bug: 224080927
Bug: 224859358
Bug: 225469258
Pick-Prebuilt: 440319220
Build-Id: 8425180
Processing-Config: kernel_headers
Change-Id: I546da285d6627ecd8ca597504861875bed7c15dc
Signed-off-by: Eva Huang <evahuang@google.com>
(cherry picked from commit c36db03eddc790749cddb4fb89085ed20b82b2fc)
Merged-In: I546da285d6627ecd8ca597504861875bed7c15dc