pci-export-pci_pio_to_address-for-module-use.patch
pci-aardvark-fix-checking-for-pio-status.patch
pci-aardvark-fix-masking-and-unmasking-legacy-intx-interrupts.patch
-revert-bluetooth-move-shutdown-callback-before-flush.patch
hid-input-do-not-report-stylus-battery-state-as-full.patch
f2fs-quota-fix-potential-deadlock.patch
pinctrl-remove-empty-lines-in-pinctrl-subsystem.patch
net-hns3-clean-up-a-type-mismatch-warning.patch
fs-io_uring-don-t-use-the-return-value-from-import_i.patch
io_uring-remove-duplicated-io_size-from-rw.patch
-revert-block-nbd-add-sanity-check-for-first_minor.patch
-revert-posix-cpu-timers-force-next-expiration-recalc-after.patch
-revert-time-handle-negative-seconds-correctly-in-timespec64_to_ns.patch
+++ /dev/null
-From edf59055b2b832f4a57f6b1787812c368599ce9d Mon Sep 17 00:00:00 2001
-From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-Date: Thu, 16 Sep 2021 10:17:11 +0200
-Subject: Revert "block: nbd: add sanity check for first_minor"
-
-From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-
-This reverts commit 4b21d4e820bb9a1415ec76dfe565e4c5937337dd which is
-commit b1a811633f7321cf1ae2bb76a66805b7720e44c9 upstream.
-
-The backport of this is reported to be causing some problems, so revert
-this for now until they are worked out.
-
-Link: https://lore.kernel.org/r/CACPK8XfUWoOHr-0RwRoYoskia4fbAbZ7DYf5wWBnv6qUnGq18w@mail.gmail.com
-Reported-by: Joel Stanley <joel@jms.id.au>
-Cc: Christoph Hellwig <hch@lst.de>
-Cc: Pavel Skripkin <paskripkin@gmail.com>
-Cc: Jens Axboe <axboe@kernel.dk>
-Cc: Sasha Levin <sashal@kernel.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
----
- drivers/block/nbd.c | 10 ----------
- 1 file changed, 10 deletions(-)
-
---- a/drivers/block/nbd.c
-+++ b/drivers/block/nbd.c
-@@ -1759,17 +1759,7 @@ static int nbd_dev_add(int index)
- refcount_set(&nbd->refs, 1);
- INIT_LIST_HEAD(&nbd->list);
- disk->major = NBD_MAJOR;
--
-- /* Too big first_minor can cause duplicate creation of
-- * sysfs files/links, since first_minor will be truncated to
-- * byte in __device_add_disk().
-- */
- disk->first_minor = index << part_shift;
-- if (disk->first_minor > 0xff) {
-- err = -EINVAL;
-- goto out_free_idr;
-- }
--
- disk->fops = &nbd_fops;
- disk->private_data = nbd;
- sprintf(disk->disk_name, "nbd%d", index);
+++ /dev/null
-From b2b45e6d144afb5d97edec886539cd29838df54b Mon Sep 17 00:00:00 2001
-From: Sasha Levin <sashal@kernel.org>
-Date: Wed, 15 Sep 2021 21:15:41 -0400
-Subject: Revert "Bluetooth: Move shutdown callback before flushing tx and rx
- queue"
-
-This reverts commit 471128476819777a7b71f2b90bc868ccf74b185f.
-
-Botched backport, dropping to rework for next release.
-
-Reported-by: Pavel Machek <pavel@denx.de>
-Signed-off-by: Sasha Levin <sashal@kernel.org>
----
- net/bluetooth/hci_core.c | 8 --------
- 1 file changed, 8 deletions(-)
-
-diff --git a/net/bluetooth/hci_core.c b/net/bluetooth/hci_core.c
-index a9097fb7eb82..2ad66f64879f 100644
---- a/net/bluetooth/hci_core.c
-+++ b/net/bluetooth/hci_core.c
-@@ -1732,14 +1732,6 @@ int hci_dev_do_close(struct hci_dev *hdev)
- hci_request_cancel_all(hdev);
- hci_req_sync_lock(hdev);
-
-- if (!hci_dev_test_flag(hdev, HCI_UNREGISTER) &&
-- !hci_dev_test_flag(hdev, HCI_USER_CHANNEL) &&
-- test_bit(HCI_UP, &hdev->flags)) {
-- /* Execute vendor specific shutdown routine */
-- if (hdev->shutdown)
-- hdev->shutdown(hdev);
-- }
--
- if (!test_and_clear_bit(HCI_UP, &hdev->flags)) {
- cancel_delayed_work_sync(&hdev->cmd_timer);
- hci_req_sync_unlock(hdev);
---
-2.30.2
-
+++ /dev/null
-From 95cfea521f698ace3591dea4b49ac90dbeed9e86 Mon Sep 17 00:00:00 2001
-From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-Date: Thu, 16 Sep 2021 10:51:42 +0200
-Subject: Revert "posix-cpu-timers: Force next expiration recalc after
- itimer reset"
-
-From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-
-This reverts commit 13ccaef77ee86047033c50bf59cb19e0dda3aa97 which is
-commit 406dd42bd1ba0c01babf9cde169bb319e52f6147 upstream.
-
-It is reported to cause regressions. A proposed fix has been posted,
-but it is not in a released kernel yet. So just revert this from the
-stable release so that the bug is fixed. If it's really needed we can
-add it back in in a future release.
-
-Link: https://lore.kernel.org/r/87ilz1pwaq.fsf@wylie.me.uk
-Reported-by: "Alan J. Wylie" <alan@wylie.me.uk>
-Cc: Linus Torvalds <torvalds@linux-foundation.org>
-Cc: Frederic Weisbecker <frederic@kernel.org>
-Cc: Thomas Gleixner <tglx@linutronix.de>
-Cc: Peter Zijlstra (Intel) <peterz@infradead.org>
-Cc: Sasha Levin <sashal@kernel.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
----
- kernel/time/posix-cpu-timers.c | 2 ++
- 1 file changed, 2 insertions(+)
-
---- a/kernel/time/posix-cpu-timers.c
-+++ b/kernel/time/posix-cpu-timers.c
-@@ -1346,6 +1346,8 @@ void set_process_cpu_timer(struct task_s
- }
- }
-
-+ if (!*newval)
-+ return;
- *newval += now;
- }
-
+++ /dev/null
-From 4e0a1b5e98529a8dad30d7c5d9229eef54fd50a1 Mon Sep 17 00:00:00 2001
-From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-Date: Thu, 16 Sep 2021 11:12:30 +0200
-Subject: Revert "time: Handle negative seconds correctly in timespec64_to_ns()"
-
-From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-
-This reverts commit 656f343d724b45295f73000eb6e7bd3d212af116 which is
-commit 39ff83f2f6cc5cc1458dfcea9697f96338210beb upstream.
-
-Arnd reports that this needs more review before being merged into all of
-the trees.
-
-Link: https://lore.kernel.org/r/CAK8P3a0z5jE=Z3Ps5bFTCFT7CHZR1JQ8VhdntDJAfsUxSPCcEw@mail.gmail.com
-Reported-by: Arnd Bergmann <arnd@kernel.org>
-Cc: Lukas Hannen <lukas.hannen@opensource.tttech-industrial.com>
-Cc: Thomas Gleixner <tglx@linutronix.de>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
----
- include/linux/time64.h | 9 ++-------
- 1 file changed, 2 insertions(+), 7 deletions(-)
-
---- a/include/linux/time64.h
-+++ b/include/linux/time64.h
-@@ -25,9 +25,7 @@ struct itimerspec64 {
- #define TIME64_MIN (-TIME64_MAX - 1)
-
- #define KTIME_MAX ((s64)~((u64)1 << 63))
--#define KTIME_MIN (-KTIME_MAX - 1)
- #define KTIME_SEC_MAX (KTIME_MAX / NSEC_PER_SEC)
--#define KTIME_SEC_MIN (KTIME_MIN / NSEC_PER_SEC)
-
- /*
- * Limits for settimeofday():
-@@ -126,13 +124,10 @@ static inline bool timespec64_valid_sett
- */
- static inline s64 timespec64_to_ns(const struct timespec64 *ts)
- {
-- /* Prevent multiplication overflow / underflow */
-- if (ts->tv_sec >= KTIME_SEC_MAX)
-+ /* Prevent multiplication overflow */
-+ if ((unsigned long long)ts->tv_sec >= KTIME_SEC_MAX)
- return KTIME_MAX;
-
-- if (ts->tv_sec <= KTIME_SEC_MIN)
-- return KTIME_MIN;
--
- return ((s64) ts->tv_sec * NSEC_PER_SEC) + ts->tv_nsec;
- }
-