diff --git a/.kernel.metadata b/.kernel.metadata
index a600b24..cd94f9f 100644
--- a/.kernel.metadata
+++ b/.kernel.metadata
@@ -1,2 +1,2 @@
 d1113deb77327ff8526613fce852277935d70100  SOURCES/linux-5.10.tar.xz
-67879cf1baa71c67ff927620dbd3ff7504968602  SOURCES/patch-5.10.75.xz
+c8fe26a015d1f4715f41813bbdd41d2d2ee1e34f  SOURCES/patch-5.10.78.xz
diff --git a/SOURCES/0001-ARM-fix-__get_user_check-in-case-uaccess_-calls-are-.patch b/SOURCES/0001-ARM-fix-__get_user_check-in-case-uaccess_-calls-are-.patch
deleted file mode 100644
index 283ac06..0000000
--- a/SOURCES/0001-ARM-fix-__get_user_check-in-case-uaccess_-calls-are-.patch
+++ /dev/null
@@ -1,86 +0,0 @@
-From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
-From: Masahiro Yamada <yamada.masahiro@socionext.com>
-Date: Mon, 30 Sep 2019 14:59:25 +0900
-Subject: [PATCH] ARM: fix __get_user_check() in case uaccess_* calls are not
- inlined
-
-KernelCI reports that bcm2835_defconfig is no longer booting since
-commit ac7c3e4ff401 ("compiler: enable CONFIG_OPTIMIZE_INLINING
-forcibly"):
-
-  https://lkml.org/lkml/2019/9/26/825
-
-I also received a regression report from Nicolas Saenz Julienne:
-
-  https://lkml.org/lkml/2019/9/27/263
-
-This problem has cropped up on arch/arm/config/bcm2835_defconfig
-because it enables CONFIG_CC_OPTIMIZE_FOR_SIZE. The compiler tends
-to prefer not inlining functions with -Os. I was able to reproduce
-it with other boards and defconfig files by manually enabling
-CONFIG_CC_OPTIMIZE_FOR_SIZE.
-
-The __get_user_check() specifically uses r0, r1, r2 registers.
-So, uaccess_save_and_enable() and uaccess_restore() must be inlined
-in order to avoid those registers being overwritten in the callees.
-
-Prior to commit 9012d011660e ("compiler: allow all arches to enable
-CONFIG_OPTIMIZE_INLINING"), the 'inline' marker was always enough for
-inlining functions, except on x86.
-
-Since that commit, all architectures can enable CONFIG_OPTIMIZE_INLINING.
-So, __always_inline is now the only guaranteed way of forcible inlining.
-
-I want to keep as much compiler's freedom as possible about the inlining
-decision. So, I changed the function call order instead of adding
-__always_inline around.
-
-Call uaccess_save_and_enable() before assigning the __p ("r0"), and
-uaccess_restore() after evacuating the __e ("r0").
-
-Fixes: 9012d011660e ("compiler: allow all arches to enable CONFIG_OPTIMIZE_INLINING")
-Reported-by: "kernelci.org bot" <bot@kernelci.org>
-Reported-by: Nicolas Saenz Julienne <nsaenzjulienne@suse.de>
-Signed-off-by: Masahiro Yamada <yamada.masahiro@socionext.com>
-Acked-by: Arnd Bergmann <arnd@arndb.de>
-Tested-by: Nicolas Saenz Julienne <nsaenzjulienne@suse.de>
-Tested-by: Fabrizio Castro <fabrizio.castro@bp.renesas.com>
-Tested-by: Geert Uytterhoeven <geert+renesas@glider.be>
----
- arch/arm/include/asm/uaccess.h | 8 +++++---
- 1 file changed, 5 insertions(+), 3 deletions(-)
-
-diff --git a/arch/arm/include/asm/uaccess.h b/arch/arm/include/asm/uaccess.h
-index b5fdd30252f8..d43ceaa78269 100644
---- a/arch/arm/include/asm/uaccess.h
-+++ b/arch/arm/include/asm/uaccess.h
-@@ -195,11 +195,12 @@ extern int __get_user_64t_4(void *);
- #define __get_user_check(x, p)						\
- 	({								\
- 		unsigned long __limit = current_thread_info()->addr_limit - 1; \
-+		unsigned int __ua_flags = uaccess_save_and_enable();	\
- 		register typeof(*(p)) __user *__p asm("r0") = (p);	\
- 		register __inttype(x) __r2 asm("r2");			\
- 		register unsigned long __l asm("r1") = __limit;		\
- 		register int __e asm("r0");				\
--		unsigned int __ua_flags = uaccess_save_and_enable();	\
-+		unsigned int __err;					\
- 		switch (sizeof(*(__p))) {				\
- 		case 1:							\
- 			if (sizeof((x)) >= 8)				\
-@@ -227,9 +228,10 @@ extern int __get_user_64t_4(void *);
- 			break;						\
- 		default: __e = __get_user_bad(); break;			\
- 		}							\
--		uaccess_restore(__ua_flags);				\
-+		__err = __e;						\
- 		x = (typeof(*(p))) __r2;				\
--		__e;							\
-+		uaccess_restore(__ua_flags);				\
-+		__err;							\
- 	})
-
- #define get_user(x, p)							\
--- 
-2.28.0
-
diff --git a/SPECS/kernel.spec b/SPECS/kernel.spec
index 5295831..31adf4e 100644
--- a/SPECS/kernel.spec
+++ b/SPECS/kernel.spec
@@ -94,7 +94,7 @@ Summary: The Linux kernel
 %if 0%{?released_kernel}
 
 # Do we have a -stable update to apply?
-%define stable_update 75
+%define stable_update 78
 # Set rpm version accordingly
 %if 0%{?stable_update}
 %define stablerev %{stable_update}
@@ -851,7 +851,6 @@ Patch61: 0001-Input-rmi4-remove-the-need-for-artificial-IRQ-in-cas.patch
 Patch62: 0001-Drop-that-for-now.patch
 Patch63: 0001-KEYS-Make-use-of-platform-keyring-for-module-signatu.patch
 Patch64: 0001-mm-kmemleak-skip-late_init-if-not-skip-disable.patch
-Patch65: 0001-ARM-fix-__get_user_check-in-case-uaccess_-calls-are-.patch
 Patch66: 0001-dt-bindings-panel-add-binding-for-Xingbangda-XBD599-.patch
 Patch67: 0001-drm-panel-add-Xingbangda-XBD599-panel.patch
 Patch68: 0001-drm-sun4i-sun6i_mipi_dsi-fix-horizontal-timing-calcu.patch
@@ -3015,6 +3014,9 @@ fi
 #
 #
 %changelog
+* Sat Nov  6 2021 Pablo Greco <pgreco@centosproject.org> - 5.10.78-200
+- Linux v5.10.78
+
 * Sat Oct 23 2021 Pablo Greco <pgreco@centosproject.org> - 5.10.75-200
 - Linux v5.10.75
 - Add patches for azure