Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package kernel-source for openSUSE:Factory 
checked in at 2022-01-26 21:26:24
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/kernel-source (Old)
 and      /work/SRC/openSUSE:Factory/.kernel-source.new.1938 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "kernel-source"

Wed Jan 26 21:26:24 2022 rev:628 rq:948468 version:5.16.2

Changes:
--------
--- /work/SRC/openSUSE:Factory/kernel-source/dtb-aarch64.changes        
2022-01-20 00:11:47.918553199 +0100
+++ /work/SRC/openSUSE:Factory/.kernel-source.new.1938/dtb-aarch64.changes      
2022-01-26 21:26:25.922220942 +0100
@@ -1,0 +2,129 @@
+Mon Jan 24 19:27:48 CET 2022 - jsl...@suse.cz
+
+- Update
+  
patches.kernel.org/5.16.2-005-vfs-fs_context-fix-up-param-length-parsing-in-.patch
+  (bsc#1012628 CVE-2022-0185 bsc#1194517).
+  Add CVE reference.
+- commit 0d710a8
+
+-------------------------------------------------------------------
+Mon Jan 24 11:55:17 CET 2022 - ti...@suse.de
+
+- s390/mm: fix 2KB pgtable release race (bsc#1188896).
+- commit 6f62d73
+
+-------------------------------------------------------------------
+Fri Jan 21 15:46:35 CET 2022 - ti...@suse.de
+
+- HID: wacom: Avoid using stale array indicies to read contact
+  count (bsc#1194667).
+- HID: wacom: Ignore the confidence flag when a touch is removed
+  (bsc#1194667).
+- HID: wacom: Reset expected and received contact counts at the
+  same time (bsc#1194667).
+- commit 07a970c
+
+-------------------------------------------------------------------
+Fri Jan 21 07:20:43 CET 2022 - jsl...@suse.cz
+
+- Linux 5.16.2 (bsc#1012628).
+- ALSA: hda/realtek: Re-order quirk entries for Lenovo
+  (bsc#1012628).
+- ALSA: hda/realtek: Add quirk for Legion Y9000X 2020
+  (bsc#1012628).
+- ALSA: hda/tegra: Fix Tegra194 HDA reset failure (bsc#1012628).
+- ALSA: hda: ALC287: Add Lenovo IdeaPad Slim 9i 14ITL5 speaker
+  quirk (bsc#1012628).
+- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus
+  Master after reboot from Windows (bsc#1012628).
+- ALSA: hda/realtek: Use ALC285_FIXUP_HP_GPIO_LED on another HP
+  laptop (bsc#1012628).
+- ALSA: hda/realtek: Add speaker fixup for some Yoga 15ITL5
+  devices (bsc#1012628).
+- perf annotate: Avoid TUI crash when navigating in the annotation
+  of recursive functions (bsc#1012628).
+- firmware: qemu_fw_cfg: fix kobject leak in probe error path
+  (bsc#1012628).
+- firmware: qemu_fw_cfg: fix NULL-pointer deref on duplicate
+  entries (bsc#1012628).
+- firmware: qemu_fw_cfg: fix sysfs information leak (bsc#1012628).
+- rtlwifi: rtl8192cu: Fix WARNING when calling local_irq_restore()
+  with interrupts enabled (bsc#1012628).
+- media: uvcvideo: fix division by zero at stream start
+  (bsc#1012628).
+- video: vga16fb: Only probe for EGA and VGA 16 color graphic
+  cards (bsc#1012628).
+- 9p: fix enodata when reading growing file (bsc#1012628).
+- 9p: only copy valid iattrs in 9P2000.L setattr implementation
+  (bsc#1012628).
+- NFSD: Fix zero-length NFSv3 WRITEs (bsc#1012628).
+- remoteproc: qcom: pas: Add missing power-domain "mxc" for CDSP
+  (bsc#1012628).
+- KVM: s390: Clarify SIGP orders versus STOP/RESTART
+  (bsc#1012628).
+- KVM: x86: don't print when fail to read/write pv eoi memory
+  (bsc#1012628).
+- KVM: x86: Register Processor Trace interrupt hook iff PT
+  enabled in guest (bsc#1012628).
+- KVM: x86: Register perf callbacks after calling vendor's
+  hardware_setup() (bsc#1012628).
+- perf: Protect perf_guest_cbs with RCU (bsc#1012628).
+- vfs: fs_context: fix up param length parsing in
+  legacy_parse_param (bsc#1012628).
+- remoteproc: qcom: pil_info: Don't memcpy_toio more than is
+  provided (bsc#1012628).
+- orangefs: Fix the size of a memory allocation in
+  orangefs_bufmap_alloc() (bsc#1012628).
+- drm/amd/display: explicitly set is_dsc_supported to false
+  before use (bsc#1012628).
+- devtmpfs regression fix: reconfigure on each mount
+  (bsc#1012628).
+- commit 6fa29ec
+
+-------------------------------------------------------------------
+Thu Jan 20 13:26:28 CET 2022 - msucha...@suse.de
+
+- kernel-binary.spec: Do not use the default certificate path (bsc#1194943).
+  Using the the default path is broken since Linux 5.17
+- commit 68b36f0
+
+-------------------------------------------------------------------
+Thu Jan 20 07:34:06 CET 2022 - jsl...@suse.cz
+
+- disable the Bluetooth patch again
+  The kernel is currently tested whether the patch is needed at all. As
+  95655456e7ce in upstream might fix the issue too (but differently).
+- commit c3bbaae
+
+-------------------------------------------------------------------
+Wed Jan 19 14:00:26 CET 2022 - mkube...@suse.cz
+
+- series.conf: cleanup
+- move mainline patches into sorted section:
+  - patches.suse/mwifiex-Fix-skb_over_panic-in-mwifiex_usb_recv.patch
+  - patches.suse/0001-usb-Add-Xen-pvUSB-protocol-description.patch
+  - patches.suse/0002-usb-Introduce-Xen-pvUSB-frontend-xen-hcd.patch
+- update upstream references and move into sorted section:
+  - patches.suse/ALSA-usb-audio-Add-minimal-mute-notion-in-dB-mapping.patch
+  - patches.suse/ALSA-usb-audio-Fix-dB-level-of-Bose-Revolve-SoundLin.patch
+  - patches.suse/ALSA-usb-audio-Use-int-for-dB-map-values.patch
+  No effect on expanded tree.
+- commit 607f978
+
+-------------------------------------------------------------------
+Wed Jan 19 13:46:39 CET 2022 - mkube...@suse.cz
+
+- Refresh and reenable
+  patches.suse/Bluetooth-Apply-initial-command-workaround-for-more-.patch.
+- commit a7b7c0d
+
+-------------------------------------------------------------------
+Mon Jan 17 17:00:18 CET 2022 - je...@suse.com
+
+- series.conf: Add sorted section header/footer
+  Even though we don't carry many patches in the stable or master
+  branches, having the sorted section header/footer allows the automated
+  tools to work.
+- commit 05f8150
+
+-------------------------------------------------------------------
@@ -73,0 +203,7 @@
+
+-------------------------------------------------------------------
+Thu Jan 13 11:42:05 CET 2022 - ti...@suse.de
+
+- Refresh patches.suse/iwlwifi-module-firmware-ucode-fix.patch.
+  Adapt the uapi version for the latest kernel-firmware-20220111.
+- commit 2f088f6
dtb-armv6l.changes: same change
dtb-armv7l.changes: same change
dtb-riscv64.changes: same change
kernel-64kb.changes: same change
kernel-debug.changes: same change
kernel-default.changes: same change
kernel-docs.changes: same change
kernel-kvmsmall.changes: same change
kernel-lpae.changes: same change
kernel-obs-build.changes: same change
kernel-obs-qa.changes: same change
kernel-pae.changes: same change
kernel-source.changes: same change
kernel-syms.changes: same change
kernel-vanilla.changes: same change
kernel-zfcpdump.changes: same change

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ dtb-aarch64.spec ++++++
--- /var/tmp/diff_new_pack.bnQyAg/_old  2022-01-26 21:26:30.362190330 +0100
+++ /var/tmp/diff_new_pack.bnQyAg/_new  2022-01-26 21:26:30.366190302 +0100
@@ -17,7 +17,7 @@
 
 
 %define srcversion 5.16
-%define patchversion 5.16.1
+%define patchversion 5.16.2
 %define variant %{nil}
 
 %include %_sourcedir/kernel-spec-macros
@@ -29,9 +29,9 @@
 %(chmod +x 
%_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build})
 
 Name:           dtb-aarch64
-Version:        5.16.1
+Version:        5.16.2
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g7cbe369
+Release:        <RELEASE>.g0d710a8
 %else
 Release:        0
 %endif

dtb-armv6l.spec: same change
dtb-armv7l.spec: same change
dtb-riscv64.spec: same change
++++++ kernel-64kb.spec ++++++
--- /var/tmp/diff_new_pack.bnQyAg/_old  2022-01-26 21:26:30.458189668 +0100
+++ /var/tmp/diff_new_pack.bnQyAg/_new  2022-01-26 21:26:30.462189640 +0100
@@ -18,7 +18,7 @@
 
 
 %define srcversion 5.16
-%define patchversion 5.16.1
+%define patchversion 5.16.2
 %define variant %{nil}
 %define vanilla_only 0
 %define compress_modules zstd
@@ -107,9 +107,9 @@
 Summary:        Kernel with 64kb PAGE_SIZE
 License:        GPL-2.0-only
 Group:          System/Kernel
-Version:        5.16.1
+Version:        5.16.2
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g7cbe369
+Release:        <RELEASE>.g0d710a8
 %else
 Release:        0
 %endif
@@ -231,10 +231,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7
-Provides:       kernel-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7
+Provides:       
kernel-%build_flavor-base-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5
+Provides:       kernel-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5
 # END COMMON DEPS
-Provides:       %name-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7
+Provides:       %name-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5
 %obsolete_rebuilds %name
 Source0:        
http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
 Source3:        kernel-source.rpmlintrc
@@ -529,7 +529,11 @@
 %endif
 
 if [ %CONFIG_MODULE_SIG = "y" ]; then
-       test -n "%certs" || ../scripts/config --set-str CONFIG_MODULE_SIG_KEY ""
+       if [ -n "%certs" ] ; then
+               ../scripts/config --set-str CONFIG_MODULE_SIG_KEY 
"%_sourcedir/.kernel_signing_key.pem"
+       else
+               ../scripts/config --set-str CONFIG_MODULE_SIG_KEY ""
+       fi
 fi
 
 case %cpu_arch in
@@ -605,16 +609,6 @@
     %_sourcedir/modversions --unpack . < $_
 fi
 
-# copy module signing certificate(s). We use the default path and trick
-# certs/Makefile to not regenerate the certificate. It is done this way so
-# that the kernel-source package can be rebuilt even without the certificate
-echo Signing certificates "%certs"
-if [ -f %_sourcedir/.kernel_signing_key.pem ] ; then
-    mkdir -p certs
-    touch certs/x509.genkey
-    cp "%_sourcedir/.kernel_signing_key.pem" certs/signing_key.pem
-fi
-
 %if "%CONFIG_KMSG_IDS" == "y"
     chmod +x ../scripts/kmsg-doc
     MAKE_ARGS="$MAKE_ARGS D=2"

++++++ kernel-debug.spec ++++++
--- /var/tmp/diff_new_pack.bnQyAg/_old  2022-01-26 21:26:30.490189447 +0100
+++ /var/tmp/diff_new_pack.bnQyAg/_new  2022-01-26 21:26:30.494189420 +0100
@@ -18,7 +18,7 @@
 
 
 %define srcversion 5.16
-%define patchversion 5.16.1
+%define patchversion 5.16.2
 %define variant %{nil}
 %define vanilla_only 0
 %define compress_modules zstd
@@ -107,9 +107,9 @@
 Summary:        A Debug Version of the Kernel
 License:        GPL-2.0-only
 Group:          System/Kernel
-Version:        5.16.1
+Version:        5.16.2
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g7cbe369
+Release:        <RELEASE>.g0d710a8
 %else
 Release:        0
 %endif
@@ -231,10 +231,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7
-Provides:       kernel-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7
+Provides:       
kernel-%build_flavor-base-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5
+Provides:       kernel-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5
 # END COMMON DEPS
-Provides:       %name-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7
+Provides:       %name-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5
 %ifarch ppc64
 Provides:       kernel-kdump = 2.6.28
 Obsoletes:      kernel-kdump <= 2.6.28
@@ -535,7 +535,11 @@
 %endif
 
 if [ %CONFIG_MODULE_SIG = "y" ]; then
-       test -n "%certs" || ../scripts/config --set-str CONFIG_MODULE_SIG_KEY ""
+       if [ -n "%certs" ] ; then
+               ../scripts/config --set-str CONFIG_MODULE_SIG_KEY 
"%_sourcedir/.kernel_signing_key.pem"
+       else
+               ../scripts/config --set-str CONFIG_MODULE_SIG_KEY ""
+       fi
 fi
 
 case %cpu_arch in
@@ -611,16 +615,6 @@
     %_sourcedir/modversions --unpack . < $_
 fi
 
-# copy module signing certificate(s). We use the default path and trick
-# certs/Makefile to not regenerate the certificate. It is done this way so
-# that the kernel-source package can be rebuilt even without the certificate
-echo Signing certificates "%certs"
-if [ -f %_sourcedir/.kernel_signing_key.pem ] ; then
-    mkdir -p certs
-    touch certs/x509.genkey
-    cp "%_sourcedir/.kernel_signing_key.pem" certs/signing_key.pem
-fi
-
 %if "%CONFIG_KMSG_IDS" == "y"
     chmod +x ../scripts/kmsg-doc
     MAKE_ARGS="$MAKE_ARGS D=2"

++++++ kernel-default.spec ++++++
--- /var/tmp/diff_new_pack.bnQyAg/_old  2022-01-26 21:26:30.518189254 +0100
+++ /var/tmp/diff_new_pack.bnQyAg/_new  2022-01-26 21:26:30.522189227 +0100
@@ -18,7 +18,7 @@
 
 
 %define srcversion 5.16
-%define patchversion 5.16.1
+%define patchversion 5.16.2
 %define variant %{nil}
 %define vanilla_only 0
 %define compress_modules zstd
@@ -107,9 +107,9 @@
 Summary:        The Standard Kernel
 License:        GPL-2.0-only
 Group:          System/Kernel
-Version:        5.16.1
+Version:        5.16.2
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g7cbe369
+Release:        <RELEASE>.g0d710a8
 %else
 Release:        0
 %endif
@@ -231,10 +231,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7
-Provides:       kernel-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7
+Provides:       
kernel-%build_flavor-base-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5
+Provides:       kernel-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5
 # END COMMON DEPS
-Provides:       %name-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7
+Provides:       %name-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5
 %ifarch %ix86
 Provides:       kernel-smp = 2.6.17
 Obsoletes:      kernel-smp <= 2.6.17
@@ -578,7 +578,11 @@
 %endif
 
 if [ %CONFIG_MODULE_SIG = "y" ]; then
-       test -n "%certs" || ../scripts/config --set-str CONFIG_MODULE_SIG_KEY ""
+       if [ -n "%certs" ] ; then
+               ../scripts/config --set-str CONFIG_MODULE_SIG_KEY 
"%_sourcedir/.kernel_signing_key.pem"
+       else
+               ../scripts/config --set-str CONFIG_MODULE_SIG_KEY ""
+       fi
 fi
 
 case %cpu_arch in
@@ -654,16 +658,6 @@
     %_sourcedir/modversions --unpack . < $_
 fi
 
-# copy module signing certificate(s). We use the default path and trick
-# certs/Makefile to not regenerate the certificate. It is done this way so
-# that the kernel-source package can be rebuilt even without the certificate
-echo Signing certificates "%certs"
-if [ -f %_sourcedir/.kernel_signing_key.pem ] ; then
-    mkdir -p certs
-    touch certs/x509.genkey
-    cp "%_sourcedir/.kernel_signing_key.pem" certs/signing_key.pem
-fi
-
 %if "%CONFIG_KMSG_IDS" == "y"
     chmod +x ../scripts/kmsg-doc
     MAKE_ARGS="$MAKE_ARGS D=2"

++++++ kernel-docs.spec ++++++
--- /var/tmp/diff_new_pack.bnQyAg/_old  2022-01-26 21:26:30.542189089 +0100
+++ /var/tmp/diff_new_pack.bnQyAg/_new  2022-01-26 21:26:30.546189061 +0100
@@ -17,7 +17,7 @@
 
 
 %define srcversion 5.16
-%define patchversion 5.16.1
+%define patchversion 5.16.2
 %define variant %{nil}
 
 %include %_sourcedir/kernel-spec-macros
@@ -31,9 +31,9 @@
 Summary:        Kernel Documentation
 License:        GPL-2.0-only
 Group:          Documentation/Man
-Version:        5.16.1
+Version:        5.16.2
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g7cbe369
+Release:        <RELEASE>.g0d710a8
 %else
 Release:        0
 %endif
@@ -64,7 +64,7 @@
 %endif
 Url:            http://www.kernel.org/
 Provides:       %name = %version-%source_rel
-Provides:       %name-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7
+Provides:       %name-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5
 BuildArch:      noarch
 BuildRoot:      %{_tmppath}/%{name}-%{version}-build
 Source0:        
http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz

++++++ kernel-kvmsmall.spec ++++++
--- /var/tmp/diff_new_pack.bnQyAg/_old  2022-01-26 21:26:30.566188923 +0100
+++ /var/tmp/diff_new_pack.bnQyAg/_new  2022-01-26 21:26:30.570188896 +0100
@@ -18,7 +18,7 @@
 
 
 %define srcversion 5.16
-%define patchversion 5.16.1
+%define patchversion 5.16.2
 %define variant %{nil}
 %define vanilla_only 0
 %define compress_modules zstd
@@ -107,9 +107,9 @@
 Summary:        The Small Developer Kernel for KVM
 License:        GPL-2.0-only
 Group:          System/Kernel
-Version:        5.16.1
+Version:        5.16.2
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g7cbe369
+Release:        <RELEASE>.g0d710a8
 %else
 Release:        0
 %endif
@@ -231,10 +231,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7
-Provides:       kernel-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7
+Provides:       
kernel-%build_flavor-base-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5
+Provides:       kernel-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5
 # END COMMON DEPS
-Provides:       %name-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7
+Provides:       %name-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5
 %obsolete_rebuilds %name
 Source0:        
http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
 Source3:        kernel-source.rpmlintrc
@@ -533,7 +533,11 @@
 %endif
 
 if [ %CONFIG_MODULE_SIG = "y" ]; then
-       test -n "%certs" || ../scripts/config --set-str CONFIG_MODULE_SIG_KEY ""
+       if [ -n "%certs" ] ; then
+               ../scripts/config --set-str CONFIG_MODULE_SIG_KEY 
"%_sourcedir/.kernel_signing_key.pem"
+       else
+               ../scripts/config --set-str CONFIG_MODULE_SIG_KEY ""
+       fi
 fi
 
 case %cpu_arch in
@@ -609,16 +613,6 @@
     %_sourcedir/modversions --unpack . < $_
 fi
 
-# copy module signing certificate(s). We use the default path and trick
-# certs/Makefile to not regenerate the certificate. It is done this way so
-# that the kernel-source package can be rebuilt even without the certificate
-echo Signing certificates "%certs"
-if [ -f %_sourcedir/.kernel_signing_key.pem ] ; then
-    mkdir -p certs
-    touch certs/x509.genkey
-    cp "%_sourcedir/.kernel_signing_key.pem" certs/signing_key.pem
-fi
-
 %if "%CONFIG_KMSG_IDS" == "y"
     chmod +x ../scripts/kmsg-doc
     MAKE_ARGS="$MAKE_ARGS D=2"

kernel-lpae.spec: same change
++++++ kernel-obs-build.spec ++++++
--- /var/tmp/diff_new_pack.bnQyAg/_old  2022-01-26 21:26:30.630188482 +0100
+++ /var/tmp/diff_new_pack.bnQyAg/_new  2022-01-26 21:26:30.634188454 +0100
@@ -19,7 +19,7 @@
 
 #!BuildIgnore: post-build-checks
 
-%define patchversion 5.16.1
+%define patchversion 5.16.2
 %define variant %{nil}
 %define vanilla_only 0
 
@@ -45,7 +45,7 @@
 %endif
 %endif
 %endif
-BuildRequires:  
kernel%kernel_flavor-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7
+BuildRequires:  
kernel%kernel_flavor-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5
 
 %if 0%{?rhel_version}
 BuildRequires:  kernel
@@ -64,9 +64,9 @@
 Summary:        package kernel and initrd for OBS VM builds
 License:        GPL-2.0-only
 Group:          SLES
-Version:        5.16.1
+Version:        5.16.2
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g7cbe369
+Release:        <RELEASE>.g0d710a8
 %else
 Release:        0
 %endif

++++++ kernel-obs-qa.spec ++++++
--- /var/tmp/diff_new_pack.bnQyAg/_old  2022-01-26 21:26:30.654188316 +0100
+++ /var/tmp/diff_new_pack.bnQyAg/_new  2022-01-26 21:26:30.658188289 +0100
@@ -17,7 +17,7 @@
 # needsrootforbuild
 
 
-%define patchversion 5.16.1
+%define patchversion 5.16.2
 %define variant %{nil}
 
 %include %_sourcedir/kernel-spec-macros
@@ -36,9 +36,9 @@
 Summary:        Basic QA tests for the kernel
 License:        GPL-2.0-only
 Group:          SLES
-Version:        5.16.1
+Version:        5.16.2
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g7cbe369
+Release:        <RELEASE>.g0d710a8
 %else
 Release:        0
 %endif

++++++ kernel-pae.spec ++++++
--- /var/tmp/diff_new_pack.bnQyAg/_old  2022-01-26 21:26:30.682188123 +0100
+++ /var/tmp/diff_new_pack.bnQyAg/_new  2022-01-26 21:26:30.686188095 +0100
@@ -18,7 +18,7 @@
 
 
 %define srcversion 5.16
-%define patchversion 5.16.1
+%define patchversion 5.16.2
 %define variant %{nil}
 %define vanilla_only 0
 %define compress_modules zstd
@@ -107,9 +107,9 @@
 Summary:        Kernel with PAE Support
 License:        GPL-2.0-only
 Group:          System/Kernel
-Version:        5.16.1
+Version:        5.16.2
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g7cbe369
+Release:        <RELEASE>.g0d710a8
 %else
 Release:        0
 %endif
@@ -231,10 +231,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7
-Provides:       kernel-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7
+Provides:       
kernel-%build_flavor-base-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5
+Provides:       kernel-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5
 # END COMMON DEPS
-Provides:       %name-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7
+Provides:       %name-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5
 %ifarch %ix86
 Provides:       kernel-bigsmp = 2.6.17
 Obsoletes:      kernel-bigsmp <= 2.6.17
@@ -555,7 +555,11 @@
 %endif
 
 if [ %CONFIG_MODULE_SIG = "y" ]; then
-       test -n "%certs" || ../scripts/config --set-str CONFIG_MODULE_SIG_KEY ""
+       if [ -n "%certs" ] ; then
+               ../scripts/config --set-str CONFIG_MODULE_SIG_KEY 
"%_sourcedir/.kernel_signing_key.pem"
+       else
+               ../scripts/config --set-str CONFIG_MODULE_SIG_KEY ""
+       fi
 fi
 
 case %cpu_arch in
@@ -631,16 +635,6 @@
     %_sourcedir/modversions --unpack . < $_
 fi
 
-# copy module signing certificate(s). We use the default path and trick
-# certs/Makefile to not regenerate the certificate. It is done this way so
-# that the kernel-source package can be rebuilt even without the certificate
-echo Signing certificates "%certs"
-if [ -f %_sourcedir/.kernel_signing_key.pem ] ; then
-    mkdir -p certs
-    touch certs/x509.genkey
-    cp "%_sourcedir/.kernel_signing_key.pem" certs/signing_key.pem
-fi
-
 %if "%CONFIG_KMSG_IDS" == "y"
     chmod +x ../scripts/kmsg-doc
     MAKE_ARGS="$MAKE_ARGS D=2"

++++++ kernel-source.spec ++++++
--- /var/tmp/diff_new_pack.bnQyAg/_old  2022-01-26 21:26:30.714187903 +0100
+++ /var/tmp/diff_new_pack.bnQyAg/_new  2022-01-26 21:26:30.718187875 +0100
@@ -18,7 +18,7 @@
 
 
 %define srcversion 5.16
-%define patchversion 5.16.1
+%define patchversion 5.16.2
 %define variant %{nil}
 %define vanilla_only 0
 
@@ -35,9 +35,9 @@
 Summary:        The Linux Kernel Sources
 License:        GPL-2.0-only
 Group:          Development/Sources
-Version:        5.16.1
+Version:        5.16.2
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g7cbe369
+Release:        <RELEASE>.g0d710a8
 %else
 Release:        0
 %endif
@@ -48,7 +48,7 @@
 BuildRequires:  sed
 Requires(post): coreutils sed
 Provides:       %name = %version-%source_rel
-Provides:       %name-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7
+Provides:       %name-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5
 Provides:       linux
 Provides:       multiversion(kernel)
 Source0:        
http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz

++++++ kernel-syms.spec ++++++
--- /var/tmp/diff_new_pack.bnQyAg/_old  2022-01-26 21:26:30.750187654 +0100
+++ /var/tmp/diff_new_pack.bnQyAg/_new  2022-01-26 21:26:30.754187627 +0100
@@ -24,10 +24,10 @@
 Summary:        Kernel Symbol Versions (modversions)
 License:        GPL-2.0-only
 Group:          Development/Sources
-Version:        5.16.1
+Version:        5.16.2
 %if %using_buildservice
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g7cbe369
+Release:        <RELEASE>.g0d710a8
 %else
 Release:        0
 %endif
@@ -52,7 +52,7 @@
 %endif
 Requires:       pesign-obs-integration
 Provides:       %name = %version-%source_rel
-Provides:       %name-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7
+Provides:       %name-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5
 Provides:       multiversion(kernel)
 Source:         README.KSYMS
 Requires:       kernel-devel%variant = %version-%source_rel

++++++ kernel-vanilla.spec ++++++
--- /var/tmp/diff_new_pack.bnQyAg/_old  2022-01-26 21:26:30.774187489 +0100
+++ /var/tmp/diff_new_pack.bnQyAg/_new  2022-01-26 21:26:30.778187461 +0100
@@ -18,7 +18,7 @@
 
 
 %define srcversion 5.16
-%define patchversion 5.16.1
+%define patchversion 5.16.2
 %define variant %{nil}
 %define vanilla_only 0
 %define compress_modules zstd
@@ -107,9 +107,9 @@
 Summary:        The Standard Kernel - without any SUSE patches
 License:        GPL-2.0-only
 Group:          System/Kernel
-Version:        5.16.1
+Version:        5.16.2
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g7cbe369
+Release:        <RELEASE>.g0d710a8
 %else
 Release:        0
 %endif
@@ -231,10 +231,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7
-Provides:       kernel-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7
+Provides:       
kernel-%build_flavor-base-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5
+Provides:       kernel-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5
 # END COMMON DEPS
-Provides:       %name-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7
+Provides:       %name-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5
 %obsolete_rebuilds %name
 Source0:        
http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
 Source3:        kernel-source.rpmlintrc
@@ -526,7 +526,11 @@
 %endif
 
 if [ %CONFIG_MODULE_SIG = "y" ]; then
-       test -n "%certs" || ../scripts/config --set-str CONFIG_MODULE_SIG_KEY ""
+       if [ -n "%certs" ] ; then
+               ../scripts/config --set-str CONFIG_MODULE_SIG_KEY 
"%_sourcedir/.kernel_signing_key.pem"
+       else
+               ../scripts/config --set-str CONFIG_MODULE_SIG_KEY ""
+       fi
 fi
 
 case %cpu_arch in
@@ -602,16 +606,6 @@
     %_sourcedir/modversions --unpack . < $_
 fi
 
-# copy module signing certificate(s). We use the default path and trick
-# certs/Makefile to not regenerate the certificate. It is done this way so
-# that the kernel-source package can be rebuilt even without the certificate
-echo Signing certificates "%certs"
-if [ -f %_sourcedir/.kernel_signing_key.pem ] ; then
-    mkdir -p certs
-    touch certs/x509.genkey
-    cp "%_sourcedir/.kernel_signing_key.pem" certs/signing_key.pem
-fi
-
 %if "%CONFIG_KMSG_IDS" == "y"
     chmod +x ../scripts/kmsg-doc
     MAKE_ARGS="$MAKE_ARGS D=2"

kernel-zfcpdump.spec: same change
++++++ kernel-binary.spec.in ++++++
--- /var/tmp/diff_new_pack.bnQyAg/_old  2022-01-26 21:26:31.130185034 +0100
+++ /var/tmp/diff_new_pack.bnQyAg/_new  2022-01-26 21:26:31.130185034 +0100
@@ -398,7 +398,11 @@
 %endif
 
 if [ %CONFIG_MODULE_SIG = "y" ]; then
-       test -n "%certs" || ../scripts/config --set-str CONFIG_MODULE_SIG_KEY ""
+       if [ -n "%certs" ] ; then
+               ../scripts/config --set-str CONFIG_MODULE_SIG_KEY 
"%_sourcedir/.kernel_signing_key.pem"
+       else
+               ../scripts/config --set-str CONFIG_MODULE_SIG_KEY ""
+       fi
 fi
 
 case %cpu_arch in
@@ -474,16 +478,6 @@
     %_sourcedir/modversions --unpack . < $_
 fi
 
-# copy module signing certificate(s). We use the default path and trick
-# certs/Makefile to not regenerate the certificate. It is done this way so
-# that the kernel-source package can be rebuilt even without the certificate
-echo Signing certificates "%certs"
-if [ -f %_sourcedir/.kernel_signing_key.pem ] ; then
-    mkdir -p certs
-    touch certs/x509.genkey
-    cp "%_sourcedir/.kernel_signing_key.pem" certs/signing_key.pem
-fi
-
 %if "%CONFIG_KMSG_IDS" == "y"
     chmod +x ../scripts/kmsg-doc
     MAKE_ARGS="$MAKE_ARGS D=2"

++++++ patches.kernel.org.tar.bz2 ++++++
++++ 2527 lines of diff (skipped)

++++++ patches.suse.tar.bz2 ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/ALSA-usb-audio-Add-minimal-mute-notion-in-dB-mapping.patch 
new/patches.suse/ALSA-usb-audio-Add-minimal-mute-notion-in-dB-mapping.patch
--- old/patches.suse/ALSA-usb-audio-Add-minimal-mute-notion-in-dB-mapping.patch 
2022-01-16 12:27:11.000000000 +0100
+++ new/patches.suse/ALSA-usb-audio-Add-minimal-mute-notion-in-dB-mapping.patch 
2022-01-24 11:55:17.000000000 +0100
@@ -2,9 +2,8 @@
 From: Takashi Iwai <ti...@suse.de>
 Date: Tue, 16 Nov 2021 07:54:14 +0100
 Subject: [PATCH] ALSA: usb-audio: Add minimal-mute notion in dB mapping table
+Patch-mainline: v5.17-rc1
 Git-commit: 85b741c1cb6854478fd1aa13ac231e2c1baf4c4b
-Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git
-Patch-mainline: Queued in subsystem maintainer repository
 References: bsc#1192375
 
 Some devices do mute the volume at the minimal volume, and for such
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/ALSA-usb-audio-Fix-dB-level-of-Bose-Revolve-SoundLin.patch 
new/patches.suse/ALSA-usb-audio-Fix-dB-level-of-Bose-Revolve-SoundLin.patch
--- old/patches.suse/ALSA-usb-audio-Fix-dB-level-of-Bose-Revolve-SoundLin.patch 
2022-01-16 12:27:11.000000000 +0100
+++ new/patches.suse/ALSA-usb-audio-Fix-dB-level-of-Bose-Revolve-SoundLin.patch 
2022-01-24 11:55:17.000000000 +0100
@@ -2,9 +2,8 @@
 From: Takashi Iwai <ti...@suse.de>
 Date: Tue, 16 Nov 2021 07:54:15 +0100
 Subject: [PATCH] ALSA: usb-audio: Fix dB level of Bose Revolve+ SoundLink
+Patch-mainline: v5.17-rc1
 Git-commit: 02eb1d098e26f34c8f047b0b1cee6f4433a34bd1
-Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git
-Patch-mainline: Queued in subsystem maintainer repository
 References: bsc#1192375
 
 Bose Revolve+ SoundLink (0a57:40fa) advertises invalid dB level for
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/ALSA-usb-audio-Use-int-for-dB-map-values.patch 
new/patches.suse/ALSA-usb-audio-Use-int-for-dB-map-values.patch
--- old/patches.suse/ALSA-usb-audio-Use-int-for-dB-map-values.patch     
2022-01-16 12:27:11.000000000 +0100
+++ new/patches.suse/ALSA-usb-audio-Use-int-for-dB-map-values.patch     
2022-01-24 11:55:17.000000000 +0100
@@ -2,9 +2,8 @@
 From: Takashi Iwai <ti...@suse.de>
 Date: Tue, 16 Nov 2021 07:54:13 +0100
 Subject: [PATCH] ALSA: usb-audio: Use int for dB map values
+Patch-mainline: v5.17-rc1
 Git-commit: fd23116d7b8dffa05f42a857eee6ee9cce238d24
-Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git
-Patch-mainline: Queued in subsystem maintainer repository
 References: bsc#1192375
 
 The values in usbmix_dB_map should be rather signed while we're using
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/Bluetooth-Apply-initial-command-workaround-for-more-.patch 
new/patches.suse/Bluetooth-Apply-initial-command-workaround-for-more-.patch
--- old/patches.suse/Bluetooth-Apply-initial-command-workaround-for-more-.patch 
2022-01-16 12:27:11.000000000 +0100
+++ new/patches.suse/Bluetooth-Apply-initial-command-workaround-for-more-.patch 
2022-01-24 11:55:17.000000000 +0100
@@ -12,6 +12,9 @@
 Also 8087:0aa7 requires the same workaround, as reported in
 bko#215167, so modified the quirk entry as well.
 
+mkubecek: refreshed after mainline commit 95655456e7ce ("Bluetooth:
+btintel: Fix broken LED quirk for legacy ROM devices")
+
 Fixes: 83f2dafe2a62 ("Bluetooth: btintel: Refactoring setup routine for legacy 
ROM sku")
 Buglink: https://bugzilla.opensuse.org/show_bug.cgi?id=1193124
 BugLink: https://bugzilla.kernel.org/show_bug.cgi?id=215167
@@ -22,22 +25,20 @@
        problem
 v2->v3: add 8087:0aa7 entry, too
 
- drivers/bluetooth/btusb.c |    6 ++++--
- 1 file changed, 4 insertions(+), 2 deletions(-)
+ drivers/bluetooth/btusb.c | 2 ++
+ 1 file changed, 2 insertions(+)
 
 --- a/drivers/bluetooth/btusb.c
 +++ b/drivers/bluetooth/btusb.c
-@@ -366,9 +366,11 @@ static const struct usb_device_id blackl
-       { USB_DEVICE(0x8087, 0x07da), .driver_info = BTUSB_CSR },
-       { USB_DEVICE(0x8087, 0x07dc), .driver_info = BTUSB_INTEL_COMBINED |
-                                                    
BTUSB_INTEL_BROKEN_INITIAL_NCMD },
--      { USB_DEVICE(0x8087, 0x0a2a), .driver_info = BTUSB_INTEL_COMBINED },
-+      { USB_DEVICE(0x8087, 0x0a2a), .driver_info = BTUSB_INTEL_COMBINED |
-+                                                   
BTUSB_INTEL_BROKEN_INITIAL_NCMD },
+@@ -388,9 +388,11 @@ static const struct usb_device_id blacklist_table[] = {
+                                                    
BTUSB_INTEL_BROKEN_INITIAL_NCMD |
+                                                    
BTUSB_INTEL_BROKEN_SHUTDOWN_LED },
+       { USB_DEVICE(0x8087, 0x0a2a), .driver_info = BTUSB_INTEL_COMBINED |
++                                                   
BTUSB_INTEL_BROKEN_INITIAL_NCMD |
+                                                    
BTUSB_INTEL_BROKEN_SHUTDOWN_LED },
        { USB_DEVICE(0x8087, 0x0a2b), .driver_info = BTUSB_INTEL_COMBINED },
--      { USB_DEVICE(0x8087, 0x0aa7), .driver_info = BTUSB_INTEL_COMBINED },
-+      { USB_DEVICE(0x8087, 0x0aa7), .driver_info = BTUSB_INTEL_COMBINED |
-+                                                   
BTUSB_INTEL_BROKEN_INITIAL_NCMD },
+       { USB_DEVICE(0x8087, 0x0aa7), .driver_info = BTUSB_INTEL_COMBINED |
++                                                   
BTUSB_INTEL_BROKEN_INITIAL_NCMD |
+                                                    
BTUSB_INTEL_BROKEN_SHUTDOWN_LED },
        { USB_DEVICE(0x8087, 0x0aaa), .driver_info = BTUSB_INTEL_COMBINED },
  
-       /* Other Intel Bluetooth devices */
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/HID-wacom-Avoid-using-stale-array-indicies-to-read-c.patch 
new/patches.suse/HID-wacom-Avoid-using-stale-array-indicies-to-read-c.patch
--- old/patches.suse/HID-wacom-Avoid-using-stale-array-indicies-to-read-c.patch 
1970-01-01 01:00:00.000000000 +0100
+++ new/patches.suse/HID-wacom-Avoid-using-stale-array-indicies-to-read-c.patch 
2022-01-24 11:55:17.000000000 +0100
@@ -0,0 +1,49 @@
+From 20f3cf5f860f9f267a6a6e5642d3d0525edb1814 Mon Sep 17 00:00:00 2001
+From: Jason Gerecke <killert...@gmail.com>
+Date: Tue, 18 Jan 2022 14:38:41 -0800
+Subject: [PATCH] HID: wacom: Avoid using stale array indicies to read contact 
count
+Git-commit: 20f3cf5f860f9f267a6a6e5642d3d0525edb1814
+Patch-mainline: v5.17-rc1
+References: bsc#1194667
+
+If we ever see a touch report with contact count data we initialize
+several variables used to read the contact count in the pre-report
+phase. These variables are never reset if we process a report which
+doesn't contain a contact count, however. This can cause the pre-
+report function to trigger a read of arbitrary memory (e.g. NULL
+if we're lucky) and potentially crash the driver.
+
+This commit restores resetting of the variables back to default
+"none" values that were used prior to the commit mentioned
+below.
+
+Link: https://github.com/linuxwacom/input-wacom/issues/276
+Fixes: 003f50ab673c (HID: wacom: Update last_slot_field during pre_report 
phase)
+Cc: sta...@vger.kernel.org
+Signed-off-by: Jason Gerecke <jason.gere...@wacom.com>
+Reviewed-by: Ping Cheng <ping.ch...@wacom.com>
+Signed-off-by: Jiri Kosina <jkos...@suse.cz>
+Acked-by: Takashi Iwai <ti...@suse.de>
+
+---
+ drivers/hid/wacom_wac.c | 4 ++++
+ 1 file changed, 4 insertions(+)
+
+diff --git a/drivers/hid/wacom_wac.c b/drivers/hid/wacom_wac.c
+index 92b52b1de526..a7176fc0635d 100644
+--- a/drivers/hid/wacom_wac.c
++++ b/drivers/hid/wacom_wac.c
+@@ -2682,6 +2682,10 @@ static void wacom_wac_finger_pre_report(struct 
hid_device *hdev,
+ 
+       hid_data->confidence = true;
+ 
++      hid_data->cc_report = 0;
++      hid_data->cc_index = -1;
++      hid_data->cc_value_index = -1;
++
+       for (i = 0; i < report->maxfield; i++) {
+               struct hid_field *field = report->field[i];
+               int j;
+-- 
+2.31.1
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/HID-wacom-Ignore-the-confidence-flag-when-a-touch-is.patch 
new/patches.suse/HID-wacom-Ignore-the-confidence-flag-when-a-touch-is.patch
--- old/patches.suse/HID-wacom-Ignore-the-confidence-flag-when-a-touch-is.patch 
1970-01-01 01:00:00.000000000 +0100
+++ new/patches.suse/HID-wacom-Ignore-the-confidence-flag-when-a-touch-is.patch 
2022-01-24 11:55:17.000000000 +0100
@@ -0,0 +1,85 @@
+From df03e9bd6d4806619b4cdc91a3d7695818a8e2b7 Mon Sep 17 00:00:00 2001
+From: Jason Gerecke <killert...@gmail.com>
+Date: Tue, 18 Jan 2022 14:37:56 -0800
+Subject: [PATCH] HID: wacom: Ignore the confidence flag when a touch is removed
+Git-commit: df03e9bd6d4806619b4cdc91a3d7695818a8e2b7
+Patch-mainline: v5.17-rc1
+References: bsc#1194667
+
+AES hardware may internally re-classify a contact that it thought was
+intentional as a palm. Intentional contacts are reported as "down" with
+the confidence bit set. When this re-classification occurs, however, the
+state transitions to "up" with the confidence bit cleared. This kind of
+transition appears to be legal according to Microsoft docs, but we do
+not handle it correctly. Because the confidence bit is clear, we don't
+call `wacom_wac_finger_slot` and update userspace. This causes hung
+touches that confuse userspace and interfere with pen arbitration.
+
+This commit adds a special case to ignore the confidence flag if a contact
+is reported as removed. This ensures we do not leave a hung touch if one
+of these re-classification events occured. Ideally we'd have some way to
+also let userspace know that the touch has been re-classified as a palm
+and needs to be canceled, but that's not possible right now :)
+
+Link: https://github.com/linuxwacom/input-wacom/issues/288
+Fixes: 7fb0413baa7f (HID: wacom: Use "Confidence" flag to prevent reporting 
invalid contacts)
+Cc: sta...@vger.kernel.org
+Signed-off-by: Jason Gerecke <jason.gere...@wacom.com>
+Reviewed-by: Ping Cheng <ping.ch...@wacom.com>
+Signed-off-by: Jiri Kosina <jkos...@suse.cz>
+Acked-by: Takashi Iwai <ti...@suse.de>
+
+---
+ drivers/hid/wacom_wac.c | 29 ++++++++++++++++++++++++++---
+ 1 file changed, 26 insertions(+), 3 deletions(-)
+
+diff --git a/drivers/hid/wacom_wac.c b/drivers/hid/wacom_wac.c
+index 5978399ae7d2..92b52b1de526 100644
+--- a/drivers/hid/wacom_wac.c
++++ b/drivers/hid/wacom_wac.c
+@@ -2588,6 +2588,24 @@ static void wacom_wac_finger_slot(struct wacom_wac 
*wacom_wac,
+       }
+ }
+ 
++static bool wacom_wac_slot_is_active(struct input_dev *dev, int key)
++{
++      struct input_mt *mt = dev->mt;
++      struct input_mt_slot *s;
++
++      if (!mt)
++              return false;
++
++      for (s = mt->slots; s != mt->slots + mt->num_slots; s++) {
++              if (s->key == key &&
++                      input_mt_get_value(s, ABS_MT_TRACKING_ID) >= 0) {
++                      return true;
++              }
++      }
++
++      return false;
++}
++
+ static void wacom_wac_finger_event(struct hid_device *hdev,
+               struct hid_field *field, struct hid_usage *usage, __s32 value)
+ {
+@@ -2638,9 +2656,14 @@ static void wacom_wac_finger_event(struct hid_device 
*hdev,
+       }
+ 
+       if (usage->usage_index + 1 == field->report_count) {
+-              if (equivalent_usage == wacom_wac->hid_data.last_slot_field &&
+-                  wacom_wac->hid_data.confidence)
+-                      wacom_wac_finger_slot(wacom_wac, 
wacom_wac->touch_input);
++              if (equivalent_usage == wacom_wac->hid_data.last_slot_field) {
++                      bool touch_removed = 
wacom_wac_slot_is_active(wacom_wac->touch_input,
++                              wacom_wac->hid_data.id) && 
!wacom_wac->hid_data.tipswitch;
++
++                      if (wacom_wac->hid_data.confidence || touch_removed) {
++                              wacom_wac_finger_slot(wacom_wac, 
wacom_wac->touch_input);
++                      }
++              }
+       }
+ }
+ 
+-- 
+2.31.1
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/HID-wacom-Reset-expected-and-received-contact-counts.patch 
new/patches.suse/HID-wacom-Reset-expected-and-received-contact-counts.patch
--- old/patches.suse/HID-wacom-Reset-expected-and-received-contact-counts.patch 
1970-01-01 01:00:00.000000000 +0100
+++ new/patches.suse/HID-wacom-Reset-expected-and-received-contact-counts.patch 
2022-01-24 11:55:17.000000000 +0100
@@ -0,0 +1,75 @@
+From 546e41ac994cc185ef3de610ca849a294b5df3ba Mon Sep 17 00:00:00 2001
+From: Jason Gerecke <killert...@gmail.com>
+Date: Tue, 18 Jan 2022 14:37:55 -0800
+Subject: [PATCH] HID: wacom: Reset expected and received contact counts at the 
same time
+Git-commit: 546e41ac994cc185ef3de610ca849a294b5df3ba
+Patch-mainline: v5.17-rc1
+References: bsc#1194667
+
+These two values go hand-in-hand and must be valid for the driver to
+behave correctly. We are currently lazy about updating the values and
+rely on the "expected" code flow to take care of making sure they're
+valid at the point they're needed. The "expected" flow changed somewhat
+with commit f8b6a74719b5 ("HID: wacom: generic: Support multiple tools
+per report"), however. This led to problems with the DTH-2452 due (in
+part) to *all* contacts being fully processed -- even those past the
+expected contact count. Specifically, the received count gets reset to
+0 once all expected fingers are processed, but not the expected count.
+The rest of the contacts in the report are then *also* processed since
+now the driver thinks we've only processed 0 of N expected contacts.
+
+Later commits such as 7fb0413baa7f (HID: wacom: Use "Confidence" flag to
+prevent reporting invalid contacts) worked around the DTH-2452 issue by
+skipping the invalid contacts at the end of the report, but this is not
+a complete fix. The confidence flag cannot be relied on when a contact
+is removed (see the following patch), and dealing with that condition
+re-introduces the DTH-2452 issue unless we also address this contact
+count laziness. By resetting expected and received counts at the same
+time we ensure the driver understands that there are 0 more contacts
+expected in the report. Similarly, we also make sure to reset the
+received count if for some reason we're out of sync in the pre-report
+phase.
+
+Link: https://github.com/linuxwacom/input-wacom/issues/288
+Fixes: f8b6a74719b5 ("HID: wacom: generic: Support multiple tools per report")
+Cc: sta...@vger.kernel.org
+Signed-off-by: Jason Gerecke <jason.gere...@wacom.com>
+Reviewed-by: Ping Cheng <ping.ch...@wacom.com>
+Signed-off-by: Jiri Kosina <jkos...@suse.cz>
+Acked-by: Takashi Iwai <ti...@suse.de>
+
+---
+ drivers/hid/wacom_wac.c | 6 +++++-
+ 1 file changed, 5 insertions(+), 1 deletion(-)
+
+diff --git a/drivers/hid/wacom_wac.c b/drivers/hid/wacom_wac.c
+index 2a4cc39962e7..5978399ae7d2 100644
+--- a/drivers/hid/wacom_wac.c
++++ b/drivers/hid/wacom_wac.c
+@@ -2692,11 +2692,14 @@ static void wacom_wac_finger_pre_report(struct 
hid_device *hdev,
+           hid_data->cc_index >= 0) {
+               struct hid_field *field = report->field[hid_data->cc_index];
+               int value = field->value[hid_data->cc_value_index];
+-              if (value)
++              if (value) {
+                       hid_data->num_expected = value;
++                      hid_data->num_received = 0;
++              }
+       }
+       else {
+               hid_data->num_expected = wacom_wac->features.touch_max;
++              hid_data->num_received = 0;
+       }
+ }
+ 
+@@ -2724,6 +2727,7 @@ static void wacom_wac_finger_report(struct hid_device 
*hdev,
+ 
+       input_sync(input);
+       wacom_wac->hid_data.num_received = 0;
++      wacom_wac->hid_data.num_expected = 0;
+ 
+       /* keep touch state for pen event */
+       wacom_wac->shared->touch_down = 
wacom_wac_finger_count_touches(wacom_wac);
+-- 
+2.31.1
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/patches.suse/iwlwifi-module-firmware-ucode-fix.patch 
new/patches.suse/iwlwifi-module-firmware-ucode-fix.patch
--- old/patches.suse/iwlwifi-module-firmware-ucode-fix.patch    2022-01-16 
12:27:11.000000000 +0100
+++ new/patches.suse/iwlwifi-module-firmware-ucode-fix.patch    2022-01-24 
11:55:17.000000000 +0100
@@ -10,33 +10,38 @@
 
 As a temporary fix, correct the ucode version in MODULE_FIRMWARE().
 
+[ update for 5.16: some firmwares are *-66 and some with *-67 with the
+  latest kernel-firmware package as of 20220111 -- tiwai ]
+
 Signed-off-by: Takashi Iwai <ti...@suse.de>
 
 ---
- drivers/net/wireless/intel/iwlwifi/cfg/22000.c |    8 +++++++-
- 1 file changed, 7 insertions(+), 1 deletion(-)
+ drivers/net/wireless/intel/iwlwifi/cfg/22000.c |   14 +++++++-------
+ 1 file changed, 7 insertions(+), 7 deletions(-)
 
 --- a/drivers/net/wireless/intel/iwlwifi/cfg/22000.c
 +++ b/drivers/net/wireless/intel/iwlwifi/cfg/22000.c
-@@ -850,6 +850,10 @@ const struct iwl_cfg iwl_cfg_bz_a0_mr_a0
+@@ -879,16 +879,16 @@ const struct iwl_cfg iwl_cfg_gl_a0_fm_a0
        .num_rbds = IWL_NUM_RBDS_AX210_HE,
  };
  
-+/* Re-define API_MAX as *-64.ucode doesn't exist (boo#1191417) */
-+#undef IWL_22000_UCODE_API_MAX
-+#define IWL_22000_UCODE_API_MAX       63
-+
- MODULE_FIRMWARE(IWL_QU_B_HR_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX));
+-MODULE_FIRMWARE(IWL_QU_B_HR_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX));
++MODULE_FIRMWARE(IWL_QU_B_HR_B_MODULE_FIRMWARE(66));
  MODULE_FIRMWARE(IWL_QNJ_B_HR_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX));
- MODULE_FIRMWARE(IWL_QU_C_HR_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX));
-@@ -861,7 +865,9 @@ MODULE_FIRMWARE(IWL_CC_A_MODULE_FIRMWARE
- MODULE_FIRMWARE(IWL_SO_A_JF_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX));
- MODULE_FIRMWARE(IWL_SO_A_HR_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX));
+-MODULE_FIRMWARE(IWL_QU_C_HR_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX));
+-MODULE_FIRMWARE(IWL_QU_B_JF_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX));
++MODULE_FIRMWARE(IWL_QU_C_HR_B_MODULE_FIRMWARE(66));
++MODULE_FIRMWARE(IWL_QU_B_JF_B_MODULE_FIRMWARE(66));
+ MODULE_FIRMWARE(IWL_QUZ_A_HR_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX));
+-MODULE_FIRMWARE(IWL_QUZ_A_JF_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX));
+-MODULE_FIRMWARE(IWL_QNJ_B_JF_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX));
++MODULE_FIRMWARE(IWL_QUZ_A_JF_B_MODULE_FIRMWARE(66));
++MODULE_FIRMWARE(IWL_QNJ_B_JF_B_MODULE_FIRMWARE(66));
+ MODULE_FIRMWARE(IWL_CC_A_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX));
+-MODULE_FIRMWARE(IWL_SO_A_JF_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX));
+-MODULE_FIRMWARE(IWL_SO_A_HR_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX));
++MODULE_FIRMWARE(IWL_SO_A_JF_B_MODULE_FIRMWARE(64));
++MODULE_FIRMWARE(IWL_SO_A_HR_B_MODULE_FIRMWARE(64));
  MODULE_FIRMWARE(IWL_SO_A_GF_A_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX));
--MODULE_FIRMWARE(IWL_TY_A_GF_A_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX));
-+/* FIXME: only iwlwifi-ty-a0-gf-a0-* has *-66.ucode as of now while others 
are with *-63.ucode */
-+/* MODULE_FIRMWARE(IWL_TY_A_GF_A_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX)); */
-+MODULE_FIRMWARE(IWL_TY_A_GF_A_MODULE_FIRMWARE(66));
+ MODULE_FIRMWARE(IWL_TY_A_GF_A_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX));
  MODULE_FIRMWARE(IWL_SNJ_A_GF4_A_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX));
- MODULE_FIRMWARE(IWL_SNJ_A_GF_A_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX));
- MODULE_FIRMWARE(IWL_SNJ_A_HR_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX));
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/s390-mm-fix-2KB-pgtable-release-race.patch 
new/patches.suse/s390-mm-fix-2KB-pgtable-release-race.patch
--- old/patches.suse/s390-mm-fix-2KB-pgtable-release-race.patch 1970-01-01 
01:00:00.000000000 +0100
+++ new/patches.suse/s390-mm-fix-2KB-pgtable-release-race.patch 2022-01-24 
11:55:17.000000000 +0100
@@ -0,0 +1,114 @@
+From c2c224932fd0ee6854d6ebfc8d059c2bcad86606 Mon Sep 17 00:00:00 2001
+From: Alexander Gordeev <agord...@linux.ibm.com>
+Date: Thu, 4 Nov 2021 07:14:44 +0100
+Subject: [PATCH] s390/mm: fix 2KB pgtable release race
+Git-commit: c2c224932fd0ee6854d6ebfc8d059c2bcad86606
+Patch-mainline: v5.17-rc1
+References: bsc#1188896
+
+There is a race on concurrent 2KB-pgtables release paths when
+both upper and lower halves of the containing parent page are
+freed, one via page_table_free_rcu() + __tlb_remove_table(),
+and the other via page_table_free(). The race might lead to a
+corruption as result of remove of list item in page_table_free()
+concurrently with __free_page() in __tlb_remove_table().
+
+Let's assume first the lower and next the upper 2KB-pgtables are
+freed from a page. Since both halves of the page are allocated
+the tracking byte (bits 24-31 of the page _refcount) has value
+of 0x03 initially:
+
+CPU0                           CPU1
+----                           ----
+
+page_table_free_rcu() // lower half
+{
+       // _refcount[31..24] == 0x03
+       ...
+       atomic_xor_bits(&page->_refcount,
+                       0x11U << (0 + 24));
+       // _refcount[31..24] <= 0x12
+       ...
+       table = table | (1U << 0);
+       tlb_remove_table(tlb, table);
+}
+...
+__tlb_remove_table()
+{
+       // _refcount[31..24] == 0x12
+       mask = _table & 3;
+       // mask <= 0x01
+       ...
+
+                               page_table_free() // upper half
+                               {
+                                       // _refcount[31..24] == 0x12
+                                       ...
+                                       atomic_xor_bits(
+                                               &page->_refcount,
+                                               1U << (1 + 24));
+                                       // _refcount[31..24] <= 0x10
+                                       // mask <= 0x10
+                                       ...
+       atomic_xor_bits(&page->_refcount,
+                       mask << (4 + 24));
+       // _refcount[31..24] <= 0x00
+       // mask <= 0x00
+       ...
+       if (mask != 0) // == false
+               break;
+       fallthrough;
+       ...
+                                       if (mask & 3) // == false
+                                               ...
+                                       else
+       __free_page(page);                      list_del(&page->lru);
+       ^^^^^^^^^^^^^^^^^^      RACE!           ^^^^^^^^^^^^^^^^^^^^^
+}                                      ...
+                               }
+
+The problem is page_table_free() releases the page as result of
+lower nibble unset and __tlb_remove_table() observing zero too
+early. With this update page_table_free() will use the similar
+logic as page_table_free_rcu() + __tlb_remove_table(), and mark
+the fragment as pending for removal in the upper nibble until
+after the list_del().
+
+In other words, the parent page is considered as unreferenced and
+safe to release only when the lower nibble is cleared already and
+unsetting a bit in upper nibble results in that nibble turned zero.
+
+Cc: sta...@vger.kernel.org
+Suggested-by: Vlastimil Babka <vba...@suse.com>
+Reviewed-by: Gerald Schaefer <gerald.schae...@linux.ibm.com>
+Signed-off-by: Alexander Gordeev <agord...@linux.ibm.com>
+Signed-off-by: Heiko Carstens <h...@linux.ibm.com>
+Acked-by: Takashi Iwai <ti...@suse.de>
+---
+ arch/s390/mm/pgalloc.c | 4 +++-
+ 1 file changed, 3 insertions(+), 1 deletion(-)
+
+diff --git a/arch/s390/mm/pgalloc.c b/arch/s390/mm/pgalloc.c
+index 82a2617362d5..457c80924542 100644
+--- a/arch/s390/mm/pgalloc.c
++++ b/arch/s390/mm/pgalloc.c
+@@ -244,13 +244,15 @@ void page_table_free(struct mm_struct *mm, unsigned long 
*table)
+               /* Free 2K page table fragment of a 4K page */
+               bit = ((unsigned long) table & 
~PAGE_MASK)/(PTRS_PER_PTE*sizeof(pte_t));
+               spin_lock_bh(&mm->context.lock);
+-              mask = atomic_xor_bits(&page->_refcount, 1U << (bit + 24));
++              mask = atomic_xor_bits(&page->_refcount, 0x11U << (bit + 24));
+               mask >>= 24;
+               if (mask & 3)
+                       list_add(&page->lru, &mm->context.pgtable_list);
+               else
+                       list_del(&page->lru);
+               spin_unlock_bh(&mm->context.lock);
++              mask = atomic_xor_bits(&page->_refcount, 0x10U << (bit + 24));
++              mask >>= 24;
+               if (mask != 0)
+                       return;
+       } else {
+-- 
+2.31.1
+

++++++ series.conf ++++++
--- /var/tmp/diff_new_pack.bnQyAg/_old  2022-01-26 21:26:31.678181256 +0100
+++ /var/tmp/diff_new_pack.bnQyAg/_new  2022-01-26 21:26:31.682181229 +0100
@@ -65,6 +65,35 @@
        
patches.kernel.org/5.16.1-036-staging-greybus-fix-stack-size-warning-with-UB.patch
        
patches.kernel.org/5.16.1-037-parisc-Fix-pdc_toc_pim_11-and-pdc_toc_pim_20-d.patch
        patches.kernel.org/5.16.1-038-Linux-5.16.1.patch
+       
patches.kernel.org/5.16.2-001-devtmpfs-regression-fix-reconfigure-on-each-mo.patch
+       
patches.kernel.org/5.16.2-002-drm-amd-display-explicitly-set-is_dsc_supporte.patch
+       
patches.kernel.org/5.16.2-003-orangefs-Fix-the-size-of-a-memory-allocation-i.patch
+       
patches.kernel.org/5.16.2-004-remoteproc-qcom-pil_info-Don-t-memcpy_toio-mor.patch
+       
patches.kernel.org/5.16.2-005-vfs-fs_context-fix-up-param-length-parsing-in-.patch
+       patches.kernel.org/5.16.2-006-perf-Protect-perf_guest_cbs-with-RCU.patch
+       
patches.kernel.org/5.16.2-007-KVM-x86-Register-perf-callbacks-after-calling-.patch
+       
patches.kernel.org/5.16.2-008-KVM-x86-Register-Processor-Trace-interrupt-hoo.patch
+       
patches.kernel.org/5.16.2-009-KVM-x86-don-t-print-when-fail-to-read-write-pv.patch
+       
patches.kernel.org/5.16.2-010-KVM-s390-Clarify-SIGP-orders-versus-STOP-RESTA.patch
+       
patches.kernel.org/5.16.2-011-remoteproc-qcom-pas-Add-missing-power-domain-m.patch
+       patches.kernel.org/5.16.2-012-NFSD-Fix-zero-length-NFSv3-WRITEs.patch
+       
patches.kernel.org/5.16.2-013-9p-only-copy-valid-iattrs-in-9P2000.L-setattr-.patch
+       
patches.kernel.org/5.16.2-014-9p-fix-enodata-when-reading-growing-file.patch
+       
patches.kernel.org/5.16.2-015-video-vga16fb-Only-probe-for-EGA-and-VGA-16-co.patch
+       
patches.kernel.org/5.16.2-016-media-uvcvideo-fix-division-by-zero-at-stream-.patch
+       
patches.kernel.org/5.16.2-017-rtlwifi-rtl8192cu-Fix-WARNING-when-calling-loc.patch
+       
patches.kernel.org/5.16.2-018-firmware-qemu_fw_cfg-fix-sysfs-information-lea.patch
+       
patches.kernel.org/5.16.2-019-firmware-qemu_fw_cfg-fix-NULL-pointer-deref-on.patch
+       
patches.kernel.org/5.16.2-020-firmware-qemu_fw_cfg-fix-kobject-leak-in-probe.patch
+       
patches.kernel.org/5.16.2-021-perf-annotate-Avoid-TUI-crash-when-navigating-.patch
+       
patches.kernel.org/5.16.2-022-ALSA-hda-realtek-Add-speaker-fixup-for-some-Yo.patch
+       
patches.kernel.org/5.16.2-023-ALSA-hda-realtek-Use-ALC285_FIXUP_HP_GPIO_LED-.patch
+       
patches.kernel.org/5.16.2-024-ALSA-hda-realtek-Fix-silent-output-on-Gigabyte.patch
+       
patches.kernel.org/5.16.2-025-ALSA-hda-ALC287-Add-Lenovo-IdeaPad-Slim-9i-14I.patch
+       
patches.kernel.org/5.16.2-026-ALSA-hda-tegra-Fix-Tegra194-HDA-reset-failure.patch
+       
patches.kernel.org/5.16.2-027-ALSA-hda-realtek-Add-quirk-for-Legion-Y9000X-2.patch
+       
patches.kernel.org/5.16.2-028-ALSA-hda-realtek-Re-order-quirk-entries-for-Le.patch
+       patches.kernel.org/5.16.2-029-Linux-5.16.2.patch
 
        ########################################################
        # Build fixes that apply to the vanilla kernel too.
@@ -76,6 +105,36 @@
        
patches.rpmify/powerpc-64-BE-option-to-use-ELFv2-ABI-for-big-endian.patch
 
        ########################################################
+       # The sorted section should contain all patches that are
+       # either mainline backports or are already in a known
+       # subystem maintainer repository so that they can be
+       # sorted by git-sort scripts. Out-of-tree patches (which
+       # includes any patch without Git-commit tag) belong
+       # either into the "on the way to mainline" section below
+       # or into one of the subsystem sections.
+       #
+       # The sorted section should be small or empty on the
+       # stable or master branches.
+       ########################################################
+
+       ########################################################
+       # sorted patches
+       ########################################################
+       patches.suse/s390-mm-fix-2KB-pgtable-release-race.patch
+       patches.suse/mwifiex-Fix-skb_over_panic-in-mwifiex_usb_recv.patch
+       patches.suse/0001-usb-Add-Xen-pvUSB-protocol-description.patch
+       patches.suse/0002-usb-Introduce-Xen-pvUSB-frontend-xen-hcd.patch
+       patches.suse/ALSA-usb-audio-Use-int-for-dB-map-values.patch
+       patches.suse/ALSA-usb-audio-Add-minimal-mute-notion-in-dB-mapping.patch
+       patches.suse/ALSA-usb-audio-Fix-dB-level-of-Bose-Revolve-SoundLin.patch
+       patches.suse/HID-wacom-Reset-expected-and-received-contact-counts.patch
+       patches.suse/HID-wacom-Ignore-the-confidence-flag-when-a-touch-is.patch
+       patches.suse/HID-wacom-Avoid-using-stale-array-indicies-to-read-c.patch
+       ########################################################
+       # end of sorted patches
+       ########################################################
+
+       ########################################################
        # Unsorted patches on their way to mainline
        #
        # (SLE/Leap: this section is only for patches which
@@ -87,10 +146,6 @@
        # to get into mainline any time soon (or ever) belong
        # to area specific sections below.
        ########################################################
-       patches.suse/ALSA-usb-audio-Use-int-for-dB-map-values.patch
-       patches.suse/ALSA-usb-audio-Add-minimal-mute-notion-in-dB-mapping.patch
-       patches.suse/ALSA-usb-audio-Fix-dB-level-of-Bose-Revolve-SoundLin.patch
-       patches.suse/mwifiex-Fix-skb_over_panic-in-mwifiex_usb_recv.patch
 +tiwai patches.suse/Bluetooth-Apply-initial-command-workaround-for-more-.patch
 
        ########################################################
@@ -172,8 +227,6 @@
        # Virtualization
        ########################################################
        patches.suse/suse-hv-guest-os-id.patch
-       patches.suse/0001-usb-Add-Xen-pvUSB-protocol-description.patch
-       patches.suse/0002-usb-Introduce-Xen-pvUSB-frontend-xen-hcd.patch
 
        ########################################################
        # Other core patches

++++++ source-timestamp ++++++
--- /var/tmp/diff_new_pack.bnQyAg/_old  2022-01-26 21:26:31.698181118 +0100
+++ /var/tmp/diff_new_pack.bnQyAg/_new  2022-01-26 21:26:31.702181091 +0100
@@ -1,4 +1,4 @@
-2022-01-16 11:29:22 +0000
-GIT Revision: 7cbe369418ce4fc6ed2822b6987b2838804522c7
+2022-01-24 18:27:48 +0000
+GIT Revision: 0d710a8d2a5b8208b23d7e03120dfa2837f640a5
 GIT Branch: stable
 

Reply via email to