summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorPaul Gortmaker <paul.gortmaker@windriver.com>2014-02-03 12:44:45 -0500
committerPaul Gortmaker <paul.gortmaker@windriver.com>2014-02-03 12:44:45 -0500
commit3dc83e2654d7c54349120df1e7de194a24447e43 (patch)
tree774dad1d67c680c19192c88d8762d5ce330e6781
parent48743b9f71413e1ef683a32de40d9feb1504280c (diff)
downloadlongterm-queue-2.6.34-3dc83e2654d7c54349120df1e7de194a24447e43.tar.gz
delete invalid/stale stable Cc
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
-rw-r--r--queue/Avoid-dangling-pointer-in-scsi_requeue_command.patch1
-rw-r--r--queue/Btrfs-call-the-ordered-free-operation-without-any-lo.patch1
-rw-r--r--queue/crypto-sha512-Fix-byte-counter-overflow-in-SHA-512.patch1
-rw-r--r--queue/ecryptfs-call-vfs_setxattr-in-ecryptfs_setxattr.patch1
-rw-r--r--queue/fix-Null-pointer-dereference-on-disk-error.patch1
-rw-r--r--queue/fs-cifs-cifs_dfs_ref.c-fix-potential-memory-leakage.patch1
-rw-r--r--queue/inotify-fix-double-free-corruption-of-stuct-user.patch1
-rw-r--r--queue/keys-fix-race-with-concurrent-install_user_keyrings.patch1
-rw-r--r--queue/mm-Fix-PageHead-when-CONFIG_PAGEFLAGS_EXTENDED.patch1
-rw-r--r--queue/vfs-missed-source-of-f_pos-races.patch1
-rw-r--r--queue/x86-msr-Add-capabilities-check.patch1
11 files changed, 0 insertions, 11 deletions
diff --git a/queue/Avoid-dangling-pointer-in-scsi_requeue_command.patch b/queue/Avoid-dangling-pointer-in-scsi_requeue_command.patch
index 3385f44..2bc20ba 100644
--- a/queue/Avoid-dangling-pointer-in-scsi_requeue_command.patch
+++ b/queue/Avoid-dangling-pointer-in-scsi_requeue_command.patch
@@ -14,7 +14,6 @@ Reported-by: Mike Christie <michaelc@cs.wisc.edu>
Signed-off-by: Bart Van Assche <bvanassche@acm.org>
Reviewed-by: Mike Christie <michaelc@cs.wisc.edu>
Reviewed-by: Tejun Heo <tj@kernel.org>
-Cc: <stable@kernel.org>
[jejb: enhance commend and add commit log for stable]
Signed-off-by: James Bottomley <JBottomley@Parallels.com>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/Btrfs-call-the-ordered-free-operation-without-any-lo.patch b/queue/Btrfs-call-the-ordered-free-operation-without-any-lo.patch
index 29a9801..4a02050 100644
--- a/queue/Btrfs-call-the-ordered-free-operation-without-any-lo.patch
+++ b/queue/Btrfs-call-the-ordered-free-operation-without-any-lo.patch
@@ -14,7 +14,6 @@ moving through the rest of the list. We'll circle back around to this
and find a cleaner way that doesn't bounce the lock around so much.
Signed-off-by: Chris Mason <chris.mason@fusionio.com>
-cc: stable@kernel.org
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
fs/btrfs/async-thread.c | 9 ++++++++-
diff --git a/queue/crypto-sha512-Fix-byte-counter-overflow-in-SHA-512.patch b/queue/crypto-sha512-Fix-byte-counter-overflow-in-SHA-512.patch
index eb784da..474edc0 100644
--- a/queue/crypto-sha512-Fix-byte-counter-overflow-in-SHA-512.patch
+++ b/queue/crypto-sha512-Fix-byte-counter-overflow-in-SHA-512.patch
@@ -12,7 +12,6 @@ This patch increments the upper 64 bits whenever the lower 64 bits
overflows.
Signed-off-by: Kent Yoder <key@linux.vnet.ibm.com>
-Cc: stable@kernel.org
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
diff --git a/queue/ecryptfs-call-vfs_setxattr-in-ecryptfs_setxattr.patch b/queue/ecryptfs-call-vfs_setxattr-in-ecryptfs_setxattr.patch
index 93d10b9..85505ea 100644
--- a/queue/ecryptfs-call-vfs_setxattr-in-ecryptfs_setxattr.patch
+++ b/queue/ecryptfs-call-vfs_setxattr-in-ecryptfs_setxattr.patch
@@ -23,7 +23,6 @@ This patch replaces the call of the setxattr() method of the lower inode
in the function ecryptfs_setxattr() with vfs_setxattr().
Signed-off-by: Roberto Sassu <roberto.sassu@polito.it>
-Cc: stable <stable@kernel.org>
Cc: Dustin Kirkland <kirkland@canonical.com>
Acked-by: James Morris <jmorris@namei.org>
Signed-off-by: Tyler Hicks <tyhicks@linux.vnet.ibm.com>
diff --git a/queue/fix-Null-pointer-dereference-on-disk-error.patch b/queue/fix-Null-pointer-dereference-on-disk-error.patch
index ec55709..0f09aa6 100644
--- a/queue/fix-Null-pointer-dereference-on-disk-error.patch
+++ b/queue/fix-Null-pointer-dereference-on-disk-error.patch
@@ -23,7 +23,6 @@ ata_scsi_find_dev could return NULL, so ata_scsi_activity_{show,store} should ch
Signed-off-by: Xiaotian Feng <dannyfeng@tencent.com>
Cc: James Bottomley <JBottomley@Parallels.com>
-Cc: stable@kernel.org
Signed-off-by: Jeff Garzik <jgarzik@redhat.com>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
diff --git a/queue/fs-cifs-cifs_dfs_ref.c-fix-potential-memory-leakage.patch b/queue/fs-cifs-cifs_dfs_ref.c-fix-potential-memory-leakage.patch
index a7bf175..99f5b29 100644
--- a/queue/fs-cifs-cifs_dfs_ref.c-fix-potential-memory-leakage.patch
+++ b/queue/fs-cifs-cifs_dfs_ref.c-fix-potential-memory-leakage.patch
@@ -11,7 +11,6 @@ memroy of *devname in function cifs_compose_mount_options() when it goes to
error.
Signed-off-by: Cong Ding <dinggnu@gmail.com>
-CC: stable <stable@kernel.org>
Reviewed-by: Jeff Layton <jlayton@redhat.com>
Signed-off-by: Steve French <smfrench@gmail.com>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/inotify-fix-double-free-corruption-of-stuct-user.patch b/queue/inotify-fix-double-free-corruption-of-stuct-user.patch
index b2fb942..6fe41e3 100644
--- a/queue/inotify-fix-double-free-corruption-of-stuct-user.patch
+++ b/queue/inotify-fix-double-free-corruption-of-stuct-user.patch
@@ -21,7 +21,6 @@ changed/updated in those two locations. We get rid of all special
casing of struct user or user->inotify_devs.
Signed-off-by: Eric Paris <eparis@redhat.com>
-Cc: stable@kernel.org (2.6.37 and up)
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
diff --git a/queue/keys-fix-race-with-concurrent-install_user_keyrings.patch b/queue/keys-fix-race-with-concurrent-install_user_keyrings.patch
index 763425b..29ddc5c 100644
--- a/queue/keys-fix-race-with-concurrent-install_user_keyrings.patch
+++ b/queue/keys-fix-race-with-concurrent-install_user_keyrings.patch
@@ -49,7 +49,6 @@ way.
Signed-off-by: David Howells <dhowells@redhat.com>
Reported-by: Mateusz Guzik <mguzik@redhat.com>
-Cc: <stable@kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: James Morris <james.l.morris@oracle.com>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/mm-Fix-PageHead-when-CONFIG_PAGEFLAGS_EXTENDED.patch b/queue/mm-Fix-PageHead-when-CONFIG_PAGEFLAGS_EXTENDED.patch
index 1ab3c02..57925c4 100644
--- a/queue/mm-Fix-PageHead-when-CONFIG_PAGEFLAGS_EXTENDED.patch
+++ b/queue/mm-Fix-PageHead-when-CONFIG_PAGEFLAGS_EXTENDED.patch
@@ -26,7 +26,6 @@ Cc: Andrew Morton <akpm@linux-foundation.org>
Cc: Will Deacon <Will.Deacon@arm.com>
Cc: Steve Capper <Steve.Capper@arm.com>
Cc: Christoph Lameter <cl@linux.com>
-Cc: stable@kernel.org # 2.6.26+
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
---
include/linux/page-flags.h | 8 +++++++-
diff --git a/queue/vfs-missed-source-of-f_pos-races.patch b/queue/vfs-missed-source-of-f_pos-races.patch
index e4622c3..031818a 100644
--- a/queue/vfs-missed-source-of-f_pos-races.patch
+++ b/queue/vfs-missed-source-of-f_pos-races.patch
@@ -9,7 +9,6 @@ compat_sys_{read,write}v() need the same "pass a copy of file->f_pos" thing
as sys_{read,write}{,v}().
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
-Cc: stable@kernel.org
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
diff --git a/queue/x86-msr-Add-capabilities-check.patch b/queue/x86-msr-Add-capabilities-check.patch
index f63b612..93900c4 100644
--- a/queue/x86-msr-Add-capabilities-check.patch
+++ b/queue/x86-msr-Add-capabilities-check.patch
@@ -29,7 +29,6 @@ Signed-off-by: Alan Cox <alan@linux.intel.com>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Andrew Morton <akpm@linux-foundation.org>
Cc: Peter Zijlstra <a.p.zijlstra@chello.nl>
-Cc: Horses <stable@kernel.org>
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---