]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
remove libceph-force-gfp_noio-for-socket-allocations.patch from all queues
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 30 Mar 2017 07:30:26 +0000 (09:30 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 30 Mar 2017 07:30:26 +0000 (09:30 +0200)
queue-4.10/libceph-force-gfp_noio-for-socket-allocations.patch [deleted file]
queue-4.10/series
queue-4.4/libceph-force-gfp_noio-for-socket-allocations.patch [deleted file]
queue-4.4/series
queue-4.9/libceph-force-gfp_noio-for-socket-allocations.patch [deleted file]
queue-4.9/series

diff --git a/queue-4.10/libceph-force-gfp_noio-for-socket-allocations.patch b/queue-4.10/libceph-force-gfp_noio-for-socket-allocations.patch
deleted file mode 100644 (file)
index 75ce33f..0000000
+++ /dev/null
@@ -1,108 +0,0 @@
-From 633ee407b9d15a75ac9740ba9d3338815e1fcb95 Mon Sep 17 00:00:00 2001
-From: Ilya Dryomov <idryomov@gmail.com>
-Date: Tue, 21 Mar 2017 13:44:28 +0100
-Subject: libceph: force GFP_NOIO for socket allocations
-
-From: Ilya Dryomov <idryomov@gmail.com>
-
-commit 633ee407b9d15a75ac9740ba9d3338815e1fcb95 upstream.
-
-sock_alloc_inode() allocates socket+inode and socket_wq with
-GFP_KERNEL, which is not allowed on the writeback path:
-
-    Workqueue: ceph-msgr con_work [libceph]
-    ffff8810871cb018 0000000000000046 0000000000000000 ffff881085d40000
-    0000000000012b00 ffff881025cad428 ffff8810871cbfd8 0000000000012b00
-    ffff880102fc1000 ffff881085d40000 ffff8810871cb038 ffff8810871cb148
-    Call Trace:
-    [<ffffffff816dd629>] schedule+0x29/0x70
-    [<ffffffff816e066d>] schedule_timeout+0x1bd/0x200
-    [<ffffffff81093ffc>] ? ttwu_do_wakeup+0x2c/0x120
-    [<ffffffff81094266>] ? ttwu_do_activate.constprop.135+0x66/0x70
-    [<ffffffff816deb5f>] wait_for_completion+0xbf/0x180
-    [<ffffffff81097cd0>] ? try_to_wake_up+0x390/0x390
-    [<ffffffff81086335>] flush_work+0x165/0x250
-    [<ffffffff81082940>] ? worker_detach_from_pool+0xd0/0xd0
-    [<ffffffffa03b65b1>] xlog_cil_force_lsn+0x81/0x200 [xfs]
-    [<ffffffff816d6b42>] ? __slab_free+0xee/0x234
-    [<ffffffffa03b4b1d>] _xfs_log_force_lsn+0x4d/0x2c0 [xfs]
-    [<ffffffff811adc1e>] ? lookup_page_cgroup_used+0xe/0x30
-    [<ffffffffa039a723>] ? xfs_reclaim_inode+0xa3/0x330 [xfs]
-    [<ffffffffa03b4dcf>] xfs_log_force_lsn+0x3f/0xf0 [xfs]
-    [<ffffffffa039a723>] ? xfs_reclaim_inode+0xa3/0x330 [xfs]
-    [<ffffffffa03a62c6>] xfs_iunpin_wait+0xc6/0x1a0 [xfs]
-    [<ffffffff810aa250>] ? wake_atomic_t_function+0x40/0x40
-    [<ffffffffa039a723>] xfs_reclaim_inode+0xa3/0x330 [xfs]
-    [<ffffffffa039ac07>] xfs_reclaim_inodes_ag+0x257/0x3d0 [xfs]
-    [<ffffffffa039bb13>] xfs_reclaim_inodes_nr+0x33/0x40 [xfs]
-    [<ffffffffa03ab745>] xfs_fs_free_cached_objects+0x15/0x20 [xfs]
-    [<ffffffff811c0c18>] super_cache_scan+0x178/0x180
-    [<ffffffff8115912e>] shrink_slab_node+0x14e/0x340
-    [<ffffffff811afc3b>] ? mem_cgroup_iter+0x16b/0x450
-    [<ffffffff8115af70>] shrink_slab+0x100/0x140
-    [<ffffffff8115e425>] do_try_to_free_pages+0x335/0x490
-    [<ffffffff8115e7f9>] try_to_free_pages+0xb9/0x1f0
-    [<ffffffff816d56e4>] ? __alloc_pages_direct_compact+0x69/0x1be
-    [<ffffffff81150cba>] __alloc_pages_nodemask+0x69a/0xb40
-    [<ffffffff8119743e>] alloc_pages_current+0x9e/0x110
-    [<ffffffff811a0ac5>] new_slab+0x2c5/0x390
-    [<ffffffff816d71c4>] __slab_alloc+0x33b/0x459
-    [<ffffffff815b906d>] ? sock_alloc_inode+0x2d/0xd0
-    [<ffffffff8164bda1>] ? inet_sendmsg+0x71/0xc0
-    [<ffffffff815b906d>] ? sock_alloc_inode+0x2d/0xd0
-    [<ffffffff811a21f2>] kmem_cache_alloc+0x1a2/0x1b0
-    [<ffffffff815b906d>] sock_alloc_inode+0x2d/0xd0
-    [<ffffffff811d8566>] alloc_inode+0x26/0xa0
-    [<ffffffff811da04a>] new_inode_pseudo+0x1a/0x70
-    [<ffffffff815b933e>] sock_alloc+0x1e/0x80
-    [<ffffffff815ba855>] __sock_create+0x95/0x220
-    [<ffffffff815baa04>] sock_create_kern+0x24/0x30
-    [<ffffffffa04794d9>] con_work+0xef9/0x2050 [libceph]
-    [<ffffffffa04aa9ec>] ? rbd_img_request_submit+0x4c/0x60 [rbd]
-    [<ffffffff81084c19>] process_one_work+0x159/0x4f0
-    [<ffffffff8108561b>] worker_thread+0x11b/0x530
-    [<ffffffff81085500>] ? create_worker+0x1d0/0x1d0
-    [<ffffffff8108b6f9>] kthread+0xc9/0xe0
-    [<ffffffff8108b630>] ? flush_kthread_worker+0x90/0x90
-    [<ffffffff816e1b98>] ret_from_fork+0x58/0x90
-    [<ffffffff8108b630>] ? flush_kthread_worker+0x90/0x90
-
-Use memalloc_noio_{save,restore}() to temporarily force GFP_NOIO here.
-
-Link: http://tracker.ceph.com/issues/19309
-Reported-by: Sergey Jerusalimov <wintchester@gmail.com>
-Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
-Reviewed-by: Jeff Layton <jlayton@redhat.com>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-
----
- net/ceph/messenger.c |    6 ++++++
- 1 file changed, 6 insertions(+)
-
---- a/net/ceph/messenger.c
-+++ b/net/ceph/messenger.c
-@@ -7,6 +7,7 @@
- #include <linux/kthread.h>
- #include <linux/net.h>
- #include <linux/nsproxy.h>
-+#include <linux/sched.h>
- #include <linux/slab.h>
- #include <linux/socket.h>
- #include <linux/string.h>
-@@ -469,11 +470,16 @@ static int ceph_tcp_connect(struct ceph_
- {
-       struct sockaddr_storage *paddr = &con->peer_addr.in_addr;
-       struct socket *sock;
-+      unsigned int noio_flag;
-       int ret;
-       BUG_ON(con->sock);
-+
-+      /* sock_create_kern() allocates with GFP_KERNEL */
-+      noio_flag = memalloc_noio_save();
-       ret = sock_create_kern(read_pnet(&con->msgr->net), paddr->ss_family,
-                              SOCK_STREAM, IPPROTO_TCP, &sock);
-+      memalloc_noio_restore(noio_flag);
-       if (ret)
-               return ret;
-       sock->sk->sk_allocation = GFP_NOFS;
index 73d330d6a26f289f3e834bc5a4d9faaa90a1d2e1..bf9c3e1e9fac2fc8af5d45d863e277d04f6fd628 100644 (file)
@@ -91,7 +91,6 @@ arm64-kaslr-fix-up-the-kernel-image-alignment.patch
 cpufreq-restore-policy-min-max-limits-on-cpu-online.patch
 cgroup-net_cls-iterate-the-fds-of-only-the-tasks-which-are-being-migrated.patch
 blk-mq-don-t-complete-un-started-request-in-timeout-handler.patch
-libceph-force-gfp_noio-for-socket-allocations.patch
 cpsw-netcp-cpts-depends-on-posix_timers.patch
 drm-amdgpu-reinstate-oland-workaround-for-sclk.patch
 drm-amd-amdgpu-add-polaris12-pci-id.patch
diff --git a/queue-4.4/libceph-force-gfp_noio-for-socket-allocations.patch b/queue-4.4/libceph-force-gfp_noio-for-socket-allocations.patch
deleted file mode 100644 (file)
index c4b5f34..0000000
+++ /dev/null
@@ -1,108 +0,0 @@
-From 633ee407b9d15a75ac9740ba9d3338815e1fcb95 Mon Sep 17 00:00:00 2001
-From: Ilya Dryomov <idryomov@gmail.com>
-Date: Tue, 21 Mar 2017 13:44:28 +0100
-Subject: libceph: force GFP_NOIO for socket allocations
-
-From: Ilya Dryomov <idryomov@gmail.com>
-
-commit 633ee407b9d15a75ac9740ba9d3338815e1fcb95 upstream.
-
-sock_alloc_inode() allocates socket+inode and socket_wq with
-GFP_KERNEL, which is not allowed on the writeback path:
-
-    Workqueue: ceph-msgr con_work [libceph]
-    ffff8810871cb018 0000000000000046 0000000000000000 ffff881085d40000
-    0000000000012b00 ffff881025cad428 ffff8810871cbfd8 0000000000012b00
-    ffff880102fc1000 ffff881085d40000 ffff8810871cb038 ffff8810871cb148
-    Call Trace:
-    [<ffffffff816dd629>] schedule+0x29/0x70
-    [<ffffffff816e066d>] schedule_timeout+0x1bd/0x200
-    [<ffffffff81093ffc>] ? ttwu_do_wakeup+0x2c/0x120
-    [<ffffffff81094266>] ? ttwu_do_activate.constprop.135+0x66/0x70
-    [<ffffffff816deb5f>] wait_for_completion+0xbf/0x180
-    [<ffffffff81097cd0>] ? try_to_wake_up+0x390/0x390
-    [<ffffffff81086335>] flush_work+0x165/0x250
-    [<ffffffff81082940>] ? worker_detach_from_pool+0xd0/0xd0
-    [<ffffffffa03b65b1>] xlog_cil_force_lsn+0x81/0x200 [xfs]
-    [<ffffffff816d6b42>] ? __slab_free+0xee/0x234
-    [<ffffffffa03b4b1d>] _xfs_log_force_lsn+0x4d/0x2c0 [xfs]
-    [<ffffffff811adc1e>] ? lookup_page_cgroup_used+0xe/0x30
-    [<ffffffffa039a723>] ? xfs_reclaim_inode+0xa3/0x330 [xfs]
-    [<ffffffffa03b4dcf>] xfs_log_force_lsn+0x3f/0xf0 [xfs]
-    [<ffffffffa039a723>] ? xfs_reclaim_inode+0xa3/0x330 [xfs]
-    [<ffffffffa03a62c6>] xfs_iunpin_wait+0xc6/0x1a0 [xfs]
-    [<ffffffff810aa250>] ? wake_atomic_t_function+0x40/0x40
-    [<ffffffffa039a723>] xfs_reclaim_inode+0xa3/0x330 [xfs]
-    [<ffffffffa039ac07>] xfs_reclaim_inodes_ag+0x257/0x3d0 [xfs]
-    [<ffffffffa039bb13>] xfs_reclaim_inodes_nr+0x33/0x40 [xfs]
-    [<ffffffffa03ab745>] xfs_fs_free_cached_objects+0x15/0x20 [xfs]
-    [<ffffffff811c0c18>] super_cache_scan+0x178/0x180
-    [<ffffffff8115912e>] shrink_slab_node+0x14e/0x340
-    [<ffffffff811afc3b>] ? mem_cgroup_iter+0x16b/0x450
-    [<ffffffff8115af70>] shrink_slab+0x100/0x140
-    [<ffffffff8115e425>] do_try_to_free_pages+0x335/0x490
-    [<ffffffff8115e7f9>] try_to_free_pages+0xb9/0x1f0
-    [<ffffffff816d56e4>] ? __alloc_pages_direct_compact+0x69/0x1be
-    [<ffffffff81150cba>] __alloc_pages_nodemask+0x69a/0xb40
-    [<ffffffff8119743e>] alloc_pages_current+0x9e/0x110
-    [<ffffffff811a0ac5>] new_slab+0x2c5/0x390
-    [<ffffffff816d71c4>] __slab_alloc+0x33b/0x459
-    [<ffffffff815b906d>] ? sock_alloc_inode+0x2d/0xd0
-    [<ffffffff8164bda1>] ? inet_sendmsg+0x71/0xc0
-    [<ffffffff815b906d>] ? sock_alloc_inode+0x2d/0xd0
-    [<ffffffff811a21f2>] kmem_cache_alloc+0x1a2/0x1b0
-    [<ffffffff815b906d>] sock_alloc_inode+0x2d/0xd0
-    [<ffffffff811d8566>] alloc_inode+0x26/0xa0
-    [<ffffffff811da04a>] new_inode_pseudo+0x1a/0x70
-    [<ffffffff815b933e>] sock_alloc+0x1e/0x80
-    [<ffffffff815ba855>] __sock_create+0x95/0x220
-    [<ffffffff815baa04>] sock_create_kern+0x24/0x30
-    [<ffffffffa04794d9>] con_work+0xef9/0x2050 [libceph]
-    [<ffffffffa04aa9ec>] ? rbd_img_request_submit+0x4c/0x60 [rbd]
-    [<ffffffff81084c19>] process_one_work+0x159/0x4f0
-    [<ffffffff8108561b>] worker_thread+0x11b/0x530
-    [<ffffffff81085500>] ? create_worker+0x1d0/0x1d0
-    [<ffffffff8108b6f9>] kthread+0xc9/0xe0
-    [<ffffffff8108b630>] ? flush_kthread_worker+0x90/0x90
-    [<ffffffff816e1b98>] ret_from_fork+0x58/0x90
-    [<ffffffff8108b630>] ? flush_kthread_worker+0x90/0x90
-
-Use memalloc_noio_{save,restore}() to temporarily force GFP_NOIO here.
-
-Link: http://tracker.ceph.com/issues/19309
-Reported-by: Sergey Jerusalimov <wintchester@gmail.com>
-Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
-Reviewed-by: Jeff Layton <jlayton@redhat.com>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-
----
- net/ceph/messenger.c |    6 ++++++
- 1 file changed, 6 insertions(+)
-
---- a/net/ceph/messenger.c
-+++ b/net/ceph/messenger.c
-@@ -7,6 +7,7 @@
- #include <linux/kthread.h>
- #include <linux/net.h>
- #include <linux/nsproxy.h>
-+#include <linux/sched.h>
- #include <linux/slab.h>
- #include <linux/socket.h>
- #include <linux/string.h>
-@@ -478,11 +479,16 @@ static int ceph_tcp_connect(struct ceph_
- {
-       struct sockaddr_storage *paddr = &con->peer_addr.in_addr;
-       struct socket *sock;
-+      unsigned int noio_flag;
-       int ret;
-       BUG_ON(con->sock);
-+
-+      /* sock_create_kern() allocates with GFP_KERNEL */
-+      noio_flag = memalloc_noio_save();
-       ret = sock_create_kern(read_pnet(&con->msgr->net), paddr->ss_family,
-                              SOCK_STREAM, IPPROTO_TCP, &sock);
-+      memalloc_noio_restore(noio_flag);
-       if (ret)
-               return ret;
-       sock->sk->sk_allocation = GFP_NOFS;
index c76a8b31f71aab93a12b211bb55299bc5a96656a..4336283d662d57ca9d41e24eff793c0786571151 100644 (file)
@@ -45,7 +45,6 @@ iommu-vt-d-fix-null-pointer-dereference-in-device_to_iommu.patch
 arm-at91-pm-cpu_idle-switch-ddr-to-power-down-mode.patch
 arm-dts-at91-sama5d2-add-dma-properties-to-uart-nodes.patch
 cpufreq-restore-policy-min-max-limits-on-cpu-online.patch
-libceph-force-gfp_noio-for-socket-allocations.patch
 raid10-increment-write-counter-after-bio-is-split.patch
 libceph-don-t-set-weight-to-in-when-osd-is-destroyed.patch
 xfs-don-t-allow-di_size-with-high-bit-set.patch
diff --git a/queue-4.9/libceph-force-gfp_noio-for-socket-allocations.patch b/queue-4.9/libceph-force-gfp_noio-for-socket-allocations.patch
deleted file mode 100644 (file)
index 75ce33f..0000000
+++ /dev/null
@@ -1,108 +0,0 @@
-From 633ee407b9d15a75ac9740ba9d3338815e1fcb95 Mon Sep 17 00:00:00 2001
-From: Ilya Dryomov <idryomov@gmail.com>
-Date: Tue, 21 Mar 2017 13:44:28 +0100
-Subject: libceph: force GFP_NOIO for socket allocations
-
-From: Ilya Dryomov <idryomov@gmail.com>
-
-commit 633ee407b9d15a75ac9740ba9d3338815e1fcb95 upstream.
-
-sock_alloc_inode() allocates socket+inode and socket_wq with
-GFP_KERNEL, which is not allowed on the writeback path:
-
-    Workqueue: ceph-msgr con_work [libceph]
-    ffff8810871cb018 0000000000000046 0000000000000000 ffff881085d40000
-    0000000000012b00 ffff881025cad428 ffff8810871cbfd8 0000000000012b00
-    ffff880102fc1000 ffff881085d40000 ffff8810871cb038 ffff8810871cb148
-    Call Trace:
-    [<ffffffff816dd629>] schedule+0x29/0x70
-    [<ffffffff816e066d>] schedule_timeout+0x1bd/0x200
-    [<ffffffff81093ffc>] ? ttwu_do_wakeup+0x2c/0x120
-    [<ffffffff81094266>] ? ttwu_do_activate.constprop.135+0x66/0x70
-    [<ffffffff816deb5f>] wait_for_completion+0xbf/0x180
-    [<ffffffff81097cd0>] ? try_to_wake_up+0x390/0x390
-    [<ffffffff81086335>] flush_work+0x165/0x250
-    [<ffffffff81082940>] ? worker_detach_from_pool+0xd0/0xd0
-    [<ffffffffa03b65b1>] xlog_cil_force_lsn+0x81/0x200 [xfs]
-    [<ffffffff816d6b42>] ? __slab_free+0xee/0x234
-    [<ffffffffa03b4b1d>] _xfs_log_force_lsn+0x4d/0x2c0 [xfs]
-    [<ffffffff811adc1e>] ? lookup_page_cgroup_used+0xe/0x30
-    [<ffffffffa039a723>] ? xfs_reclaim_inode+0xa3/0x330 [xfs]
-    [<ffffffffa03b4dcf>] xfs_log_force_lsn+0x3f/0xf0 [xfs]
-    [<ffffffffa039a723>] ? xfs_reclaim_inode+0xa3/0x330 [xfs]
-    [<ffffffffa03a62c6>] xfs_iunpin_wait+0xc6/0x1a0 [xfs]
-    [<ffffffff810aa250>] ? wake_atomic_t_function+0x40/0x40
-    [<ffffffffa039a723>] xfs_reclaim_inode+0xa3/0x330 [xfs]
-    [<ffffffffa039ac07>] xfs_reclaim_inodes_ag+0x257/0x3d0 [xfs]
-    [<ffffffffa039bb13>] xfs_reclaim_inodes_nr+0x33/0x40 [xfs]
-    [<ffffffffa03ab745>] xfs_fs_free_cached_objects+0x15/0x20 [xfs]
-    [<ffffffff811c0c18>] super_cache_scan+0x178/0x180
-    [<ffffffff8115912e>] shrink_slab_node+0x14e/0x340
-    [<ffffffff811afc3b>] ? mem_cgroup_iter+0x16b/0x450
-    [<ffffffff8115af70>] shrink_slab+0x100/0x140
-    [<ffffffff8115e425>] do_try_to_free_pages+0x335/0x490
-    [<ffffffff8115e7f9>] try_to_free_pages+0xb9/0x1f0
-    [<ffffffff816d56e4>] ? __alloc_pages_direct_compact+0x69/0x1be
-    [<ffffffff81150cba>] __alloc_pages_nodemask+0x69a/0xb40
-    [<ffffffff8119743e>] alloc_pages_current+0x9e/0x110
-    [<ffffffff811a0ac5>] new_slab+0x2c5/0x390
-    [<ffffffff816d71c4>] __slab_alloc+0x33b/0x459
-    [<ffffffff815b906d>] ? sock_alloc_inode+0x2d/0xd0
-    [<ffffffff8164bda1>] ? inet_sendmsg+0x71/0xc0
-    [<ffffffff815b906d>] ? sock_alloc_inode+0x2d/0xd0
-    [<ffffffff811a21f2>] kmem_cache_alloc+0x1a2/0x1b0
-    [<ffffffff815b906d>] sock_alloc_inode+0x2d/0xd0
-    [<ffffffff811d8566>] alloc_inode+0x26/0xa0
-    [<ffffffff811da04a>] new_inode_pseudo+0x1a/0x70
-    [<ffffffff815b933e>] sock_alloc+0x1e/0x80
-    [<ffffffff815ba855>] __sock_create+0x95/0x220
-    [<ffffffff815baa04>] sock_create_kern+0x24/0x30
-    [<ffffffffa04794d9>] con_work+0xef9/0x2050 [libceph]
-    [<ffffffffa04aa9ec>] ? rbd_img_request_submit+0x4c/0x60 [rbd]
-    [<ffffffff81084c19>] process_one_work+0x159/0x4f0
-    [<ffffffff8108561b>] worker_thread+0x11b/0x530
-    [<ffffffff81085500>] ? create_worker+0x1d0/0x1d0
-    [<ffffffff8108b6f9>] kthread+0xc9/0xe0
-    [<ffffffff8108b630>] ? flush_kthread_worker+0x90/0x90
-    [<ffffffff816e1b98>] ret_from_fork+0x58/0x90
-    [<ffffffff8108b630>] ? flush_kthread_worker+0x90/0x90
-
-Use memalloc_noio_{save,restore}() to temporarily force GFP_NOIO here.
-
-Link: http://tracker.ceph.com/issues/19309
-Reported-by: Sergey Jerusalimov <wintchester@gmail.com>
-Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
-Reviewed-by: Jeff Layton <jlayton@redhat.com>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-
----
- net/ceph/messenger.c |    6 ++++++
- 1 file changed, 6 insertions(+)
-
---- a/net/ceph/messenger.c
-+++ b/net/ceph/messenger.c
-@@ -7,6 +7,7 @@
- #include <linux/kthread.h>
- #include <linux/net.h>
- #include <linux/nsproxy.h>
-+#include <linux/sched.h>
- #include <linux/slab.h>
- #include <linux/socket.h>
- #include <linux/string.h>
-@@ -469,11 +470,16 @@ static int ceph_tcp_connect(struct ceph_
- {
-       struct sockaddr_storage *paddr = &con->peer_addr.in_addr;
-       struct socket *sock;
-+      unsigned int noio_flag;
-       int ret;
-       BUG_ON(con->sock);
-+
-+      /* sock_create_kern() allocates with GFP_KERNEL */
-+      noio_flag = memalloc_noio_save();
-       ret = sock_create_kern(read_pnet(&con->msgr->net), paddr->ss_family,
-                              SOCK_STREAM, IPPROTO_TCP, &sock);
-+      memalloc_noio_restore(noio_flag);
-       if (ret)
-               return ret;
-       sock->sk->sk_allocation = GFP_NOFS;
index f6007a0b6804ab9818b8ccad7a073086c061cca5..e3d70274fe05856dac68c92d120b958a50775feb 100644 (file)
@@ -72,7 +72,6 @@ arm64-kaslr-fix-up-the-kernel-image-alignment.patch
 cpufreq-restore-policy-min-max-limits-on-cpu-online.patch
 cgroup-net_cls-iterate-the-fds-of-only-the-tasks-which-are-being-migrated.patch
 blk-mq-don-t-complete-un-started-request-in-timeout-handler.patch
-libceph-force-gfp_noio-for-socket-allocations.patch
 drm-amdgpu-reinstate-oland-workaround-for-sclk.patch
 auxdisplay-img-ascii-lcd-add-missing-sentinel-entry-in-img_ascii_lcd_matches.patch
 jbd2-don-t-leak-memory-if-setting-up-journal-fails.patch