diff options
author | Paul Gortmaker <paul.gortmaker@windriver.com> | 2014-02-03 12:44:45 -0500 |
---|---|---|
committer | Paul Gortmaker <paul.gortmaker@windriver.com> | 2014-02-03 12:44:45 -0500 |
commit | 3dc83e2654d7c54349120df1e7de194a24447e43 (patch) | |
tree | 774dad1d67c680c19192c88d8762d5ce330e6781 | |
parent | 48743b9f71413e1ef683a32de40d9feb1504280c (diff) | |
download | longterm-queue-2.6.34-3dc83e2654d7c54349120df1e7de194a24447e43.tar.gz |
delete invalid/stale stable Cc
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
11 files changed, 0 insertions, 11 deletions
diff --git a/queue/Avoid-dangling-pointer-in-scsi_requeue_command.patch b/queue/Avoid-dangling-pointer-in-scsi_requeue_command.patch index 3385f44..2bc20ba 100644 --- a/queue/Avoid-dangling-pointer-in-scsi_requeue_command.patch +++ b/queue/Avoid-dangling-pointer-in-scsi_requeue_command.patch @@ -14,7 +14,6 @@ Reported-by: Mike Christie <michaelc@cs.wisc.edu> Signed-off-by: Bart Van Assche <bvanassche@acm.org> Reviewed-by: Mike Christie <michaelc@cs.wisc.edu> Reviewed-by: Tejun Heo <tj@kernel.org> -Cc: <stable@kernel.org> [jejb: enhance commend and add commit log for stable] Signed-off-by: James Bottomley <JBottomley@Parallels.com> Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com> diff --git a/queue/Btrfs-call-the-ordered-free-operation-without-any-lo.patch b/queue/Btrfs-call-the-ordered-free-operation-without-any-lo.patch index 29a9801..4a02050 100644 --- a/queue/Btrfs-call-the-ordered-free-operation-without-any-lo.patch +++ b/queue/Btrfs-call-the-ordered-free-operation-without-any-lo.patch @@ -14,7 +14,6 @@ moving through the rest of the list. We'll circle back around to this and find a cleaner way that doesn't bounce the lock around so much. Signed-off-by: Chris Mason <chris.mason@fusionio.com> -cc: stable@kernel.org Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com> --- fs/btrfs/async-thread.c | 9 ++++++++- diff --git a/queue/crypto-sha512-Fix-byte-counter-overflow-in-SHA-512.patch b/queue/crypto-sha512-Fix-byte-counter-overflow-in-SHA-512.patch index eb784da..474edc0 100644 --- a/queue/crypto-sha512-Fix-byte-counter-overflow-in-SHA-512.patch +++ b/queue/crypto-sha512-Fix-byte-counter-overflow-in-SHA-512.patch @@ -12,7 +12,6 @@ This patch increments the upper 64 bits whenever the lower 64 bits overflows. Signed-off-by: Kent Yoder <key@linux.vnet.ibm.com> -Cc: stable@kernel.org Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com> --- diff --git a/queue/ecryptfs-call-vfs_setxattr-in-ecryptfs_setxattr.patch b/queue/ecryptfs-call-vfs_setxattr-in-ecryptfs_setxattr.patch index 93d10b9..85505ea 100644 --- a/queue/ecryptfs-call-vfs_setxattr-in-ecryptfs_setxattr.patch +++ b/queue/ecryptfs-call-vfs_setxattr-in-ecryptfs_setxattr.patch @@ -23,7 +23,6 @@ This patch replaces the call of the setxattr() method of the lower inode in the function ecryptfs_setxattr() with vfs_setxattr(). Signed-off-by: Roberto Sassu <roberto.sassu@polito.it> -Cc: stable <stable@kernel.org> Cc: Dustin Kirkland <kirkland@canonical.com> Acked-by: James Morris <jmorris@namei.org> Signed-off-by: Tyler Hicks <tyhicks@linux.vnet.ibm.com> diff --git a/queue/fix-Null-pointer-dereference-on-disk-error.patch b/queue/fix-Null-pointer-dereference-on-disk-error.patch index ec55709..0f09aa6 100644 --- a/queue/fix-Null-pointer-dereference-on-disk-error.patch +++ b/queue/fix-Null-pointer-dereference-on-disk-error.patch @@ -23,7 +23,6 @@ ata_scsi_find_dev could return NULL, so ata_scsi_activity_{show,store} should ch Signed-off-by: Xiaotian Feng <dannyfeng@tencent.com> Cc: James Bottomley <JBottomley@Parallels.com> -Cc: stable@kernel.org Signed-off-by: Jeff Garzik <jgarzik@redhat.com> Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com> --- diff --git a/queue/fs-cifs-cifs_dfs_ref.c-fix-potential-memory-leakage.patch b/queue/fs-cifs-cifs_dfs_ref.c-fix-potential-memory-leakage.patch index a7bf175..99f5b29 100644 --- a/queue/fs-cifs-cifs_dfs_ref.c-fix-potential-memory-leakage.patch +++ b/queue/fs-cifs-cifs_dfs_ref.c-fix-potential-memory-leakage.patch @@ -11,7 +11,6 @@ memroy of *devname in function cifs_compose_mount_options() when it goes to error. Signed-off-by: Cong Ding <dinggnu@gmail.com> -CC: stable <stable@kernel.org> Reviewed-by: Jeff Layton <jlayton@redhat.com> Signed-off-by: Steve French <smfrench@gmail.com> Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com> diff --git a/queue/inotify-fix-double-free-corruption-of-stuct-user.patch b/queue/inotify-fix-double-free-corruption-of-stuct-user.patch index b2fb942..6fe41e3 100644 --- a/queue/inotify-fix-double-free-corruption-of-stuct-user.patch +++ b/queue/inotify-fix-double-free-corruption-of-stuct-user.patch @@ -21,7 +21,6 @@ changed/updated in those two locations. We get rid of all special casing of struct user or user->inotify_devs. Signed-off-by: Eric Paris <eparis@redhat.com> -Cc: stable@kernel.org (2.6.37 and up) Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org> Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com> --- diff --git a/queue/keys-fix-race-with-concurrent-install_user_keyrings.patch b/queue/keys-fix-race-with-concurrent-install_user_keyrings.patch index 763425b..29ddc5c 100644 --- a/queue/keys-fix-race-with-concurrent-install_user_keyrings.patch +++ b/queue/keys-fix-race-with-concurrent-install_user_keyrings.patch @@ -49,7 +49,6 @@ way. Signed-off-by: David Howells <dhowells@redhat.com> Reported-by: Mateusz Guzik <mguzik@redhat.com> -Cc: <stable@kernel.org> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: James Morris <james.l.morris@oracle.com> Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com> diff --git a/queue/mm-Fix-PageHead-when-CONFIG_PAGEFLAGS_EXTENDED.patch b/queue/mm-Fix-PageHead-when-CONFIG_PAGEFLAGS_EXTENDED.patch index 1ab3c02..57925c4 100644 --- a/queue/mm-Fix-PageHead-when-CONFIG_PAGEFLAGS_EXTENDED.patch +++ b/queue/mm-Fix-PageHead-when-CONFIG_PAGEFLAGS_EXTENDED.patch @@ -26,7 +26,6 @@ Cc: Andrew Morton <akpm@linux-foundation.org> Cc: Will Deacon <Will.Deacon@arm.com> Cc: Steve Capper <Steve.Capper@arm.com> Cc: Christoph Lameter <cl@linux.com> -Cc: stable@kernel.org # 2.6.26+ Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org> --- include/linux/page-flags.h | 8 +++++++- diff --git a/queue/vfs-missed-source-of-f_pos-races.patch b/queue/vfs-missed-source-of-f_pos-races.patch index e4622c3..031818a 100644 --- a/queue/vfs-missed-source-of-f_pos-races.patch +++ b/queue/vfs-missed-source-of-f_pos-races.patch @@ -9,7 +9,6 @@ compat_sys_{read,write}v() need the same "pass a copy of file->f_pos" thing as sys_{read,write}{,v}(). Signed-off-by: Al Viro <viro@zeniv.linux.org.uk> -Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org> Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com> --- diff --git a/queue/x86-msr-Add-capabilities-check.patch b/queue/x86-msr-Add-capabilities-check.patch index f63b612..93900c4 100644 --- a/queue/x86-msr-Add-capabilities-check.patch +++ b/queue/x86-msr-Add-capabilities-check.patch @@ -29,7 +29,6 @@ Signed-off-by: Alan Cox <alan@linux.intel.com> Cc: Linus Torvalds <torvalds@linux-foundation.org> Cc: Andrew Morton <akpm@linux-foundation.org> Cc: Peter Zijlstra <a.p.zijlstra@chello.nl> -Cc: Horses <stable@kernel.org> Signed-off-by: Ingo Molnar <mingo@kernel.org> Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com> --- |