summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorPaul Gortmaker <paul.gortmaker@windriver.com>2014-02-03 09:58:15 -0500
committerPaul Gortmaker <paul.gortmaker@windriver.com>2014-02-03 09:58:15 -0500
commitc5b8e6212db5251a5df6c05dc4c96defa29c76cc (patch)
tree65cc614a684c4b3dc0693b69653dca0ebd7109f0
parentb0352ac161d0db282d1843b82f5a0a86d61ec342 (diff)
downloadlongterm-queue-2.6.34-c5b8e6212db5251a5df6c05dc4c96defa29c76cc.tar.gz
clobber lingering stable cc lines
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
-rw-r--r--queue/ACPI-cpuidle-Fix-NULL-pointer-issues-when-cpuidle-is.patch1
-rw-r--r--queue/ALSA-seq-Fix-missing-error-handling-in-snd_seq_timer.patch1
-rw-r--r--queue/Bluetooth-Fix-incorrect-strncpy-in-hidp_setup_hid.patch1
-rw-r--r--queue/Bluetooth-hci_ldisc-fix-NULL-pointer-dereference-on-.patch1
-rw-r--r--queue/Driver-core-treat-unregistered-bus_types-as-having-n.patch1
-rw-r--r--queue/HID-zeroplus-validate-output-report-details.patch1
-rw-r--r--queue/IPoIB-Fix-use-after-free-of-multicast-object.patch1
-rw-r--r--queue/NFSv3-Ensure-that-do_proc_get_root-reports-errors-co.patch1
-rw-r--r--queue/USB-CDC-ACM-Fix-NULL-pointer-dereference.patch1
-rw-r--r--queue/USB-echi-dbgp-increase-the-controller-wait-time-to-c.patch1
-rw-r--r--queue/USB-garmin_gps-fix-memory-leak-on-disconnect.patch1
-rw-r--r--queue/USB-io_ti-Fix-NULL-dereference-in-chase_port.patch1
-rw-r--r--queue/USB-mos7840-fix-port-device-leak-in-error-path.patch1
-rw-r--r--queue/USB-mos7840-fix-urb-leak-at-release.patch1
-rw-r--r--queue/USB-serial-Fix-memory-leak-in-sierra_release.patch1
-rw-r--r--queue/USB-serial-fix-race-between-probe-and-open.patch1
-rw-r--r--queue/USB-whiteheat-fix-memory-leak-in-error-path.patch1
-rw-r--r--queue/bnx2i-Fixed-NULL-ptr-deference-for-1G-bnx2-Linux-iSC.patch1
-rw-r--r--queue/btrfs-use-rcu_barrier-to-wait-for-bdev-puts-at-unmou.patch1
-rw-r--r--queue/cgroup-remove-incorrect-dget-dput-pair-in-cgroup_cre.patch1
-rw-r--r--queue/clockevents-Don-t-allow-dummy-broadcast-timers.patch1
-rw-r--r--queue/coredump-prevent-double-free-on-an-error-path-in-cor.patch1
-rw-r--r--queue/crypto-cryptd-disable-softirqs-in-cryptd_queue_worke.patch1
-rw-r--r--queue/dccp-check-ccid-before-dereferencing.patch1
-rw-r--r--queue/drivers-char-ipmi-memcpy-need-additional-2-bytes-to-.patch1
-rw-r--r--queue/eCryptfs-Copy-up-lower-inode-attrs-after-setting-low.patch1
-rw-r--r--queue/exec-do-not-leave-bprm-interp-on-stack.patch1
-rw-r--r--queue/ext3-Fix-fdatasync-for-files-with-only-i_size-change.patch1
-rw-r--r--queue/ext4-always-set-i_op-in-ext4_mknod.patch1
-rw-r--r--queue/ext4-avoid-hang-when-mounting-non-journal-filesystem.patch1
-rw-r--r--queue/ext4-don-t-let-i_reserved_meta_blocks-go-negative.patch1
-rw-r--r--queue/ext4-fix-fdatasync-for-files-with-only-i_size-change.patch1
-rw-r--r--queue/ext4-fix-memory-leak-in-ext4_xattr_set_acl-s-error-p.patch1
-rw-r--r--queue/ext4-fix-race-in-ext4_mb_add_n_trim.patch1
-rw-r--r--queue/ext4-limit-group-search-loop-for-non-extent-files.patch1
-rw-r--r--queue/ext4-lock-i_mutex-when-truncating-orphan-inodes.patch1
-rw-r--r--queue/ext4-online-defrag-is-not-supported-for-journaled-fi.patch1
-rw-r--r--queue/fix-eh-wakeup-scsi_schedule_eh-vs-scsi_restart_opera.patch1
-rw-r--r--queue/fs-compat_ioctl.c-VIDEO_SET_SPU_PALETTE-missing-erro.patch1
-rw-r--r--queue/fs-fscache-stats.c-fix-memory-leak.patch1
-rw-r--r--queue/fuse-verify-all-ioctl-retry-iov-elements.patch1
-rw-r--r--queue/futex-Fix-bug-in-WARN_ON-for-NULL-q.pi_state.patch1
-rw-r--r--queue/futex-Forbid-uaddr-uaddr2-in-futex_wait_requeue_pi.patch1
-rw-r--r--queue/futex-Test-for-pi_mutex-on-fault-in-futex_wait_reque.patch1
-rw-r--r--queue/gen_init_cpio-avoid-stack-overflow-when-expanding.patch1
-rw-r--r--queue/jbd-Fix-lock-ordering-bug-in-journal_unmap_buffer.patch1
-rw-r--r--queue/jbd2-clear-BH_Delay-BH_Unwritten-in-journal_unmap_bu.patch1
-rw-r--r--queue/kernel-signal.c-stop-info-leak-via-the-tkill-and-the.patch1
-rw-r--r--queue/kernel-sys.c-call-disable_nonboot_cpus-in-kernel_res.patch1
-rw-r--r--queue/libsas-continue-revalidation.patch1
-rw-r--r--queue/mm-bugfix-set-current-reclaim_state-to-NULL-while-re.patch1
-rw-r--r--queue/mm-mmu_notifier-fix-freed-page-still-mapped-in-secon.patch1
-rw-r--r--queue/mtd-cafe_nand-fix-an-vs-mistake.patch1
-rw-r--r--queue/pcdp-use-early_ioremap-early_iounmap-to-access-pcdp-.patch1
-rw-r--r--queue/posix-cpu-timers-Fix-nanosleep-task_struct-leak.patch1
-rw-r--r--queue/signal-always-clear-sa_restorer-on-execve.patch1
-rw-r--r--queue/svcrpc-fix-svc_xprt_enqueue-svc_recv-busy-looping.patch1
-rw-r--r--queue/svcrpc-sends-on-closed-socket-should-stop-immediatel.patch1
-rw-r--r--queue/sysfs-sysfs_pathname-sysfs_add_one-Use-strlcat-inste.patch1
-rw-r--r--queue/tcp-do_tcp_sendpages-must-try-to-push-data-out-on-oo.patch1
-rw-r--r--queue/tick-Cleanup-NOHZ-per-cpu-data-on-cpu-down.patch1
-rw-r--r--queue/timer-Don-t-reinitialize-the-cpu-base-lock-during-CP.patch1
-rw-r--r--queue/tmpfs-fix-use-after-free-of-mempolicy-object.patch1
-rw-r--r--queue/tracing-Don-t-call-page_to_pfn-if-page-is-NULL.patch1
-rw-r--r--queue/tracing-Fix-double-free-when-function-profile-init-f.patch1
-rw-r--r--queue/udf-Fix-data-corruption-for-files-in-ICB.patch1
-rw-r--r--queue/usb-serial-mos7840-Fixup-mos7840_chars_in_buffer.patch1
-rw-r--r--queue/video-uvesafb-Fix-oops-that-uvesafb-try-to-execute-N.patch1
-rw-r--r--queue/w1-fix-oops-when-w1_search-is-called-from-netlink-co.patch1
-rw-r--r--queue/x86-mm-Check-if-PUD-is-large-when-validating-a-kerne.patch1
-rw-r--r--queue/x86-mm-paravirt-Fix-vmalloc_fault-oops-during-lazy-M.patch1
-rw-r--r--queue/xen-bootup-allow-read-write-_cr8-pvops-call.patch1
-rw-r--r--queue/xen-bootup-allow-read_tscp-call-for-Xen-PV-guests.patch1
-rw-r--r--queue/xhci-Don-t-write-zeroed-pointers-to-xHC-registers.patch1
-rw-r--r--queue/xhci-Increase-reset-timeout-for-Renesas-720201-host.patch1
-rw-r--r--queue/xhci-Make-handover-code-more-robust.patch1
-rw-r--r--queue/xhci-Reset-reserved-command-ring-TRBs-on-cleanup.patch1
77 files changed, 0 insertions, 77 deletions
diff --git a/queue/ACPI-cpuidle-Fix-NULL-pointer-issues-when-cpuidle-is.patch b/queue/ACPI-cpuidle-Fix-NULL-pointer-issues-when-cpuidle-is.patch
index 0f83b0d..bee33b5 100644
--- a/queue/ACPI-cpuidle-Fix-NULL-pointer-issues-when-cpuidle-is.patch
+++ b/queue/ACPI-cpuidle-Fix-NULL-pointer-issues-when-cpuidle-is.patch
@@ -59,7 +59,6 @@ Call Trace:
This patch fixes it.
Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
-Cc: <stable@vger.kernel.org>
Signed-off-by: Rafael J. Wysocki <rafael.j.wysocki@intel.com>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
diff --git a/queue/ALSA-seq-Fix-missing-error-handling-in-snd_seq_timer.patch b/queue/ALSA-seq-Fix-missing-error-handling-in-snd_seq_timer.patch
index 1d41df3..1b2b3ed 100644
--- a/queue/ALSA-seq-Fix-missing-error-handling-in-snd_seq_timer.patch
+++ b/queue/ALSA-seq-Fix-missing-error-handling-in-snd_seq_timer.patch
@@ -46,7 +46,6 @@ uninitialized pointer.
[<ffffffff81faed69>] system_call_fastpath+0x16/0x1b
Reported-and-tested-by: Tommi Rantala <tt.rantala@gmail.com>
-Cc: <stable@vger.kernel.org>
Signed-off-by: Takashi Iwai <tiwai@suse.de>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
diff --git a/queue/Bluetooth-Fix-incorrect-strncpy-in-hidp_setup_hid.patch b/queue/Bluetooth-Fix-incorrect-strncpy-in-hidp_setup_hid.patch
index 7273284..3807ebf 100644
--- a/queue/Bluetooth-Fix-incorrect-strncpy-in-hidp_setup_hid.patch
+++ b/queue/Bluetooth-Fix-incorrect-strncpy-in-hidp_setup_hid.patch
@@ -19,7 +19,6 @@ AAAAAA[...]AAAAAAAAf0:af:f0:af:f0:af
("f0:af:f0:af:f0:af" is the device bluetooth address, taken from "phys"
field in struct hid_device due to overflow.)
-Cc: stable@vger.kernel.org
Signed-off-by: Anderson Lizardo <anderson.lizardo@openbossa.org>
Acked-by: Marcel Holtmann <marcel@holtmann.org>
Signed-off-by: Gustavo Padovan <gustavo.padovan@collabora.co.uk>
diff --git a/queue/Bluetooth-hci_ldisc-fix-NULL-pointer-dereference-on-.patch b/queue/Bluetooth-hci_ldisc-fix-NULL-pointer-dereference-on-.patch
index 45e0f7d..77137b1 100644
--- a/queue/Bluetooth-hci_ldisc-fix-NULL-pointer-dereference-on-.patch
+++ b/queue/Bluetooth-hci_ldisc-fix-NULL-pointer-dereference-on-.patch
@@ -77,7 +77,6 @@ Bug is 100% reproducible using hciattach and a disconnected serial port:
[ 137.552734] Code: e59f4e5c e5941000 e3510000 0a000031 (e5971000)
[ 137.559234] ---[ end trace 1b75b31a2719ed1e ]---
-Cc: stable <stable@vger.kernel.org>
Signed-off-by: Johan Hovold <jhovold@gmail.com>
Acked-by: Marcel Holtmann <marcel@holtmann.org>
Signed-off-by: Johan Hedberg <johan.hedberg@intel.com>
diff --git a/queue/Driver-core-treat-unregistered-bus_types-as-having-n.patch b/queue/Driver-core-treat-unregistered-bus_types-as-having-n.patch
index 92fa91e..63f4600 100644
--- a/queue/Driver-core-treat-unregistered-bus_types-as-having-n.patch
+++ b/queue/Driver-core-treat-unregistered-bus_types-as-having-n.patch
@@ -28,7 +28,6 @@ reboot_fixups in early boot phase")
Reported-by: Joonsoo Kim <js1304@gmail.com>
Signed-off-by: Bjorn Helgaas <bhelgaas@google.com>
-Cc: stable <stable@vger.kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
diff --git a/queue/HID-zeroplus-validate-output-report-details.patch b/queue/HID-zeroplus-validate-output-report-details.patch
index f663b97..dd1de78 100644
--- a/queue/HID-zeroplus-validate-output-report-details.patch
+++ b/queue/HID-zeroplus-validate-output-report-details.patch
@@ -17,7 +17,6 @@ during initialization, causing a heap overflow:
CVE-2013-2889
Signed-off-by: Kees Cook <keescook@chromium.org>
-Cc: stable@vger.kernel.org
Reviewed-by: Benjamin Tissoires <benjamin.tissoires@redhat.com>
Signed-off-by: Jiri Kosina <jkosina@suse.cz>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/IPoIB-Fix-use-after-free-of-multicast-object.patch b/queue/IPoIB-Fix-use-after-free-of-multicast-object.patch
index d47aad5..474618a 100644
--- a/queue/IPoIB-Fix-use-after-free-of-multicast-object.patch
+++ b/queue/IPoIB-Fix-use-after-free-of-multicast-object.patch
@@ -23,7 +23,6 @@ ipoib_mcast_dev_flush() is called. To make that possible, we move the
RTNL-lock wrapped code to ipoib_mcast_join_finish().
Signed-off-by: Patrick McHardy <kaber@trash.net>
-Cc: <stable@vger.kernel.org>
Signed-off-by: Roland Dreier <roland@purestorage.com>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
diff --git a/queue/NFSv3-Ensure-that-do_proc_get_root-reports-errors-co.patch b/queue/NFSv3-Ensure-that-do_proc_get_root-reports-errors-co.patch
index 5daaf04..916866b 100644
--- a/queue/NFSv3-Ensure-that-do_proc_get_root-reports-errors-co.patch
+++ b/queue/NFSv3-Ensure-that-do_proc_get_root-reports-errors-co.patch
@@ -12,7 +12,6 @@ superblock with completely unusable values for block sizes, maxfilesize,
etc.
Reported-by: Yuanming Chen <hikvision_linux@163.com>
-Cc: stable@vger.kernel.org
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
diff --git a/queue/USB-CDC-ACM-Fix-NULL-pointer-dereference.patch b/queue/USB-CDC-ACM-Fix-NULL-pointer-dereference.patch
index b25eb91..298ef92 100644
--- a/queue/USB-CDC-ACM-Fix-NULL-pointer-dereference.patch
+++ b/queue/USB-CDC-ACM-Fix-NULL-pointer-dereference.patch
@@ -12,7 +12,6 @@ This is especially bad as this oops can be triggered by just
plugging a USB device in.
Signed-off-by: Sven Schnelle <svens@stackframe.org>
-Cc: stable <stable@vger.kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
diff --git a/queue/USB-echi-dbgp-increase-the-controller-wait-time-to-c.patch b/queue/USB-echi-dbgp-increase-the-controller-wait-time-to-c.patch
index 5cf9b63..45d04a1 100644
--- a/queue/USB-echi-dbgp-increase-the-controller-wait-time-to-c.patch
+++ b/queue/USB-echi-dbgp-increase-the-controller-wait-time-to-c.patch
@@ -13,7 +13,6 @@ This is based on emperical testing on various USB debug ports on
modern machines such as a Lenovo X220i and an Ivybridge development
platform that needed to wait ~450-950 microseconds.
-Cc: <stable@vger.kernel.org>
Signed-off-by: Colin Ian King <colin.king@canonical.com>
Signed-off-by: Jason Wessel <jason.wessel@windriver.com>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/USB-garmin_gps-fix-memory-leak-on-disconnect.patch b/queue/USB-garmin_gps-fix-memory-leak-on-disconnect.patch
index a4c525e..86e415a 100644
--- a/queue/USB-garmin_gps-fix-memory-leak-on-disconnect.patch
+++ b/queue/USB-garmin_gps-fix-memory-leak-on-disconnect.patch
@@ -11,7 +11,6 @@ being freed on disconnect.
The possible IO it was supposed to prevent is long gone.
-Cc: stable <stable@vger.kernel.org>
Signed-off-by: Johan Hovold <jhovold@gmail.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/USB-io_ti-Fix-NULL-dereference-in-chase_port.patch b/queue/USB-io_ti-Fix-NULL-dereference-in-chase_port.patch
index ccda4ad..5125238 100644
--- a/queue/USB-io_ti-Fix-NULL-dereference-in-chase_port.patch
+++ b/queue/USB-io_ti-Fix-NULL-dereference-in-chase_port.patch
@@ -80,7 +80,6 @@ Johan Hovold submitted a more elaborate patch for the mainline kernel.
Signed-off-by: Wolfgang Frisch <wfpub@roembden.net>
Cc: Johan Hovold <jhovold@gmail.com>
-Cc: stable <stable@vger.kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
diff --git a/queue/USB-mos7840-fix-port-device-leak-in-error-path.patch b/queue/USB-mos7840-fix-port-device-leak-in-error-path.patch
index a4e3803..d455b8c 100644
--- a/queue/USB-mos7840-fix-port-device-leak-in-error-path.patch
+++ b/queue/USB-mos7840-fix-port-device-leak-in-error-path.patch
@@ -9,7 +9,6 @@ The driver set the usb-serial port pointers to NULL on errors in attach,
effectively preventing usb-serial core from decrementing the port ref
counters and releasing the port devices and associated data.
-Cc: <stable@vger.kernel.org>
Signed-off-by: Johan Hovold <jhovold@gmail.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/USB-mos7840-fix-urb-leak-at-release.patch b/queue/USB-mos7840-fix-urb-leak-at-release.patch
index 8497e4d..04011e2 100644
--- a/queue/USB-mos7840-fix-urb-leak-at-release.patch
+++ b/queue/USB-mos7840-fix-urb-leak-at-release.patch
@@ -7,7 +7,6 @@ commit 65a4cdbb170e4ec1a7fa0e94936d47e24a17b0e8 upstream.
Make sure control urb is freed at release.
-Cc: <stable@vger.kernel.org>
Signed-off-by: Johan Hovold <jhovold@gmail.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/USB-serial-Fix-memory-leak-in-sierra_release.patch b/queue/USB-serial-Fix-memory-leak-in-sierra_release.patch
index efb7f4d..1d99c06 100644
--- a/queue/USB-serial-Fix-memory-leak-in-sierra_release.patch
+++ b/queue/USB-serial-Fix-memory-leak-in-sierra_release.patch
@@ -10,7 +10,6 @@ that looses 8 bytes each time the driver releases a device.
Signed-off-by: Len Sorensen <lsorense@csclub.uwaterloo.ca>
Acked-by: Johan Hovold <jhovold@gmail.com>
-Cc: stable <stable@vger.kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
diff --git a/queue/USB-serial-fix-race-between-probe-and-open.patch b/queue/USB-serial-fix-race-between-probe-and-open.patch
index a026df0..def8c91 100644
--- a/queue/USB-serial-fix-race-between-probe-and-open.patch
+++ b/queue/USB-serial-fix-race-between-probe-and-open.patch
@@ -60,7 +60,6 @@ the private data has not been initialised at open:
[ 199.698925] ---[ end trace 77c43ec023940cff ]---
Reported-and-tested-by: Ken Huang <csuhgw@gmail.com>
-Cc: stable <stable@vger.kernel.org>
Signed-off-by: Johan Hovold <jhovold@gmail.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/USB-whiteheat-fix-memory-leak-in-error-path.patch b/queue/USB-whiteheat-fix-memory-leak-in-error-path.patch
index dc0d4fa..f6c0893 100644
--- a/queue/USB-whiteheat-fix-memory-leak-in-error-path.patch
+++ b/queue/USB-whiteheat-fix-memory-leak-in-error-path.patch
@@ -8,7 +8,6 @@ commit c129197c99550d356cf5f69b046994dd53cd1b9d upstream.
Make sure command buffer is deallocated in case of errors during attach.
Cc: <support@connecttech.com>
-Cc: <stable@vger.kernel.org>
Signed-off-by: Johan Hovold <jhovold@gmail.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/bnx2i-Fixed-NULL-ptr-deference-for-1G-bnx2-Linux-iSC.patch b/queue/bnx2i-Fixed-NULL-ptr-deference-for-1G-bnx2-Linux-iSC.patch
index 3c4d2bb..60021a0 100644
--- a/queue/bnx2i-Fixed-NULL-ptr-deference-for-1G-bnx2-Linux-iSC.patch
+++ b/queue/bnx2i-Fixed-NULL-ptr-deference-for-1G-bnx2-Linux-iSC.patch
@@ -52,7 +52,6 @@ Call Trace:
[<ffffffff80078b1c>] start_secondary+0x479/0x488
Signed-off-by: Eddie Wai <eddie.wai@broadcom.com>
-Cc: stable@vger.kernel.org
Reviewed-by: Mike Christie <michaelc@cs.wisc.edu>
Signed-off-by: James Bottomley <JBottomley@Parallels.com>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/btrfs-use-rcu_barrier-to-wait-for-bdev-puts-at-unmou.patch b/queue/btrfs-use-rcu_barrier-to-wait-for-bdev-puts-at-unmou.patch
index bc7cbad..2ffecd0 100644
--- a/queue/btrfs-use-rcu_barrier-to-wait-for-bdev-puts-at-unmou.patch
+++ b/queue/btrfs-use-rcu_barrier-to-wait-for-bdev-puts-at-unmou.patch
@@ -30,7 +30,6 @@ Adding an rcu_barrier() to btrfs_close_devices() causes unmount to wait
until all blkdev_put()s are done, and the device is truly free once
unmount completes.
-Cc: stable@vger.kernel.org
Signed-off-by: Eric Sandeen <sandeen@redhat.com>
Signed-off-by: Josef Bacik <jbacik@fusionio.com>
Signed-off-by: Chris Mason <chris.mason@fusionio.com>
diff --git a/queue/cgroup-remove-incorrect-dget-dput-pair-in-cgroup_cre.patch b/queue/cgroup-remove-incorrect-dget-dput-pair-in-cgroup_cre.patch
index d90b7a1..1870f31 100644
--- a/queue/cgroup-remove-incorrect-dget-dput-pair-in-cgroup_cre.patch
+++ b/queue/cgroup-remove-incorrect-dget-dput-pair-in-cgroup_cre.patch
@@ -48,7 +48,6 @@ Fix it by dropping the unnecessary dget/dput() pair.
Signed-off-by: Tejun Heo <tj@kernel.org>
Acked-by: Li Zefan <lizefan@huawei.com>
-Cc: stable@vger.kernel.org
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
kernel/cgroup.c | 2 --
diff --git a/queue/clockevents-Don-t-allow-dummy-broadcast-timers.patch b/queue/clockevents-Don-t-allow-dummy-broadcast-timers.patch
index 7dbe26a..255c654 100644
--- a/queue/clockevents-Don-t-allow-dummy-broadcast-timers.patch
+++ b/queue/clockevents-Don-t-allow-dummy-broadcast-timers.patch
@@ -18,7 +18,6 @@ preventing this problem.
Signed-off-by: Mark Rutland <mark.rutland@arm.com>
Cc: linux-arm-kernel@lists.infradead.org
Cc: Jon Medhurst (Tixy) <tixy@linaro.org>
-Cc: stable@vger.kernel.org
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
diff --git a/queue/coredump-prevent-double-free-on-an-error-path-in-cor.patch b/queue/coredump-prevent-double-free-on-an-error-path-in-cor.patch
index 73b9d2c..03835c2 100644
--- a/queue/coredump-prevent-double-free-on-an-error-path-in-cor.patch
+++ b/queue/coredump-prevent-double-free-on-an-error-path-in-cor.patch
@@ -17,7 +17,6 @@ This is the fix.
Signed-off-by: Oleg Nesterov <oleg@redhat.com>
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
Cc: Venu Byravarasu <vbyravarasu@nvidia.com>
-Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
diff --git a/queue/crypto-cryptd-disable-softirqs-in-cryptd_queue_worke.patch b/queue/crypto-cryptd-disable-softirqs-in-cryptd_queue_worke.patch
index 06b06c9..2add5e5 100644
--- a/queue/crypto-cryptd-disable-softirqs-in-cryptd_queue_worke.patch
+++ b/queue/crypto-cryptd-disable-softirqs-in-cryptd_queue_worke.patch
@@ -17,7 +17,6 @@ Bug report at http://marc.info/?l=linux-crypto-vger&m=134858649616319&w=2
v2:
- Disable software interrupts instead of hardware interrupts
-Cc: stable@vger.kernel.org
Reported-by: Gurucharan Shetty <gurucharan.shetty@gmail.com>
Signed-off-by: Jussi Kivilinna <jussi.kivilinna@mbnet.fi>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
diff --git a/queue/dccp-check-ccid-before-dereferencing.patch b/queue/dccp-check-ccid-before-dereferencing.patch
index 8b6e3c2..a4171cc 100644
--- a/queue/dccp-check-ccid-before-dereferencing.patch
+++ b/queue/dccp-check-ccid-before-dereferencing.patch
@@ -12,7 +12,6 @@ prepare it with a fake ccid_ops pointer.
Signed-off-by: Mathias Krause <minipli@googlemail.com>
Cc: Gerrit Renker <gerrit@erg.abdn.ac.uk>
-Cc: stable@vger.kernel.org
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
diff --git a/queue/drivers-char-ipmi-memcpy-need-additional-2-bytes-to-.patch b/queue/drivers-char-ipmi-memcpy-need-additional-2-bytes-to-.patch
index 96218b5..2e5c6b6 100644
--- a/queue/drivers-char-ipmi-memcpy-need-additional-2-bytes-to-.patch
+++ b/queue/drivers-char-ipmi-memcpy-need-additional-2-bytes-to-.patch
@@ -18,7 +18,6 @@ When calling memcpy, read_data and write_data need additional 2 bytes.
Signed-off-by: Chen Gang <gang.chen@asianux.com>
Signed-off-by: Corey Minyard <cminyard@mvista.com>
-Cc: stable@vger.kernel.org
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
diff --git a/queue/eCryptfs-Copy-up-lower-inode-attrs-after-setting-low.patch b/queue/eCryptfs-Copy-up-lower-inode-attrs-after-setting-low.patch
index ebef054..79c0aa0 100644
--- a/queue/eCryptfs-Copy-up-lower-inode-attrs-after-setting-low.patch
+++ b/queue/eCryptfs-Copy-up-lower-inode-attrs-after-setting-low.patch
@@ -19,7 +19,6 @@ https://launchpad.net/bugs/926292
Signed-off-by: Tyler Hicks <tyhicks@canonical.com>
Reported-by: Sebastien Bacher <seb128@ubuntu.com>
Cc: John Johansen <john.johansen@canonical.com>
-Cc: <stable@vger.kernel.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
fs/ecryptfs/inode.c | 2 ++
diff --git a/queue/exec-do-not-leave-bprm-interp-on-stack.patch b/queue/exec-do-not-leave-bprm-interp-on-stack.patch
index 976877c..041969a 100644
--- a/queue/exec-do-not-leave-bprm-interp-on-stack.patch
+++ b/queue/exec-do-not-leave-bprm-interp-on-stack.patch
@@ -35,7 +35,6 @@ Signed-off-by: Kees Cook <keescook@chromium.org>
Cc: halfdog <me@halfdog.net>
Cc: P J P <ppandit@redhat.com>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
-Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/ext3-Fix-fdatasync-for-files-with-only-i_size-change.patch b/queue/ext3-Fix-fdatasync-for-files-with-only-i_size-change.patch
index 24a1d8a..cc5df1a 100644
--- a/queue/ext3-Fix-fdatasync-for-files-with-only-i_size-change.patch
+++ b/queue/ext3-Fix-fdatasync-for-files-with-only-i_size-change.patch
@@ -13,7 +13,6 @@ and that can result in wrong i_size after a crash.
Fix the issue by updating inode's i_datasync_tid whenever its size is
updated.
-CC: <stable@vger.kernel.org> # >= 2.6.32
Reported-by: Kristian Nielsen <knielsen@knielsen-hq.org>
Signed-off-by: Jan Kara <jack@suse.cz>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/ext4-always-set-i_op-in-ext4_mknod.patch b/queue/ext4-always-set-i_op-in-ext4_mknod.patch
index 609e212..e7c0321 100644
--- a/queue/ext4-always-set-i_op-in-ext4_mknod.patch
+++ b/queue/ext4-always-set-i_op-in-ext4_mknod.patch
@@ -11,7 +11,6 @@ an inconsistency.
Signed-off-by: Bernd Schubert <bernd.schubert@itwm.fraunhofer.de>
Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>
-Cc: stable@vger.kernel.org
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
fs/ext4/namei.c | 2 --
diff --git a/queue/ext4-avoid-hang-when-mounting-non-journal-filesystem.patch b/queue/ext4-avoid-hang-when-mounting-non-journal-filesystem.patch
index 2e8142f..19f31cb 100644
--- a/queue/ext4-avoid-hang-when-mounting-non-journal-filesystem.patch
+++ b/queue/ext4-avoid-hang-when-mounting-non-journal-filesystem.patch
@@ -24,7 +24,6 @@ and have even been known to allocate CVE numbers for such problems.)
Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>
Reviewed-by: Zheng Liu <wenqing.lz@taobao.com>
-Cc: stable@vger.kernel.org
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
fs/ext4/namei.c | 3 ++-
diff --git a/queue/ext4-don-t-let-i_reserved_meta_blocks-go-negative.patch b/queue/ext4-don-t-let-i_reserved_meta_blocks-go-negative.patch
index 506aaed..faea8eb 100644
--- a/queue/ext4-don-t-let-i_reserved_meta_blocks-go-negative.patch
+++ b/queue/ext4-don-t-let-i_reserved_meta_blocks-go-negative.patch
@@ -25,7 +25,6 @@ allocation.
Signed-off-by: Brian Foster <bfoster@redhat.com>
Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>
-Cc: stable@vger.kernel.org
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
fs/ext4/inode.c | 9 +++++++++
diff --git a/queue/ext4-fix-fdatasync-for-files-with-only-i_size-change.patch b/queue/ext4-fix-fdatasync-for-files-with-only-i_size-change.patch
index c62dbc7..1cf6c1f 100644
--- a/queue/ext4-fix-fdatasync-for-files-with-only-i_size-change.patch
+++ b/queue/ext4-fix-fdatasync-for-files-with-only-i_size-change.patch
@@ -13,7 +13,6 @@ and that can result in wrong i_size after a crash.
Fix the issue by updating inode's i_datasync_tid whenever its size is
updated.
-CC: <stable@vger.kernel.org> # >= 2.6.32
Reported-by: Kristian Nielsen <knielsen@knielsen-hq.org>
Signed-off-by: Jan Kara <jack@suse.cz>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/ext4-fix-memory-leak-in-ext4_xattr_set_acl-s-error-p.patch b/queue/ext4-fix-memory-leak-in-ext4_xattr_set_acl-s-error-p.patch
index 3d745ee..4411b50 100644
--- a/queue/ext4-fix-memory-leak-in-ext4_xattr_set_acl-s-error-p.patch
+++ b/queue/ext4-fix-memory-leak-in-ext4_xattr_set_acl-s-error-p.patch
@@ -14,7 +14,6 @@ This patch fixes that.
Reviewed-by: Lukas Czerner <lczerner@redhat.com>
Signed-off-by: Eugene Shatokhin <eugene.shatokhin@rosalab.ru>
Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>
-Cc: stable@vger.kernel.org
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
fs/ext4/acl.c | 6 ++++--
diff --git a/queue/ext4-fix-race-in-ext4_mb_add_n_trim.patch b/queue/ext4-fix-race-in-ext4_mb_add_n_trim.patch
index b8a0143..b93b952 100644
--- a/queue/ext4-fix-race-in-ext4_mb_add_n_trim.patch
+++ b/queue/ext4-fix-race-in-ext4_mb_add_n_trim.patch
@@ -10,7 +10,6 @@ changing the lg_prealloc_list.
Signed-off-by: Niu Yawei <yawei.niu@intel.com>
Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>
-Cc: stable@vger.kernel.org
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
fs/ext4/mballoc.c | 6 +++---
diff --git a/queue/ext4-limit-group-search-loop-for-non-extent-files.patch b/queue/ext4-limit-group-search-loop-for-non-extent-files.patch
index aadb333..9fde6f2 100644
--- a/queue/ext4-limit-group-search-loop-for-non-extent-files.patch
+++ b/queue/ext4-limit-group-search-loop-for-non-extent-files.patch
@@ -30,7 +30,6 @@ start at group 0.
Signed-off-by: Lachlan McIlroy <lmcilroy@redhat.com>
Signed-off-by: Eric Sandeen <sandeen@redhat.com>
Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>
-Cc: stable@vger.kernel.org
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
fs/ext4/mballoc.c | 6 +++++-
diff --git a/queue/ext4-lock-i_mutex-when-truncating-orphan-inodes.patch b/queue/ext4-lock-i_mutex-when-truncating-orphan-inodes.patch
index c49475e..1f2fd16 100644
--- a/queue/ext4-lock-i_mutex-when-truncating-orphan-inodes.patch
+++ b/queue/ext4-lock-i_mutex-when-truncating-orphan-inodes.patch
@@ -15,7 +15,6 @@ ext4_orphan_cleanup() to suppress this warning.
Reported-by: Alexander Beregalov <a.beregalov@gmail.com>
Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>
Reviewed-by: Zheng Liu <wenqing.lz@taobao.com>
-Cc: stable@vger.kernel.org
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
fs/ext4/super.c | 2 ++
diff --git a/queue/ext4-online-defrag-is-not-supported-for-journaled-fi.patch b/queue/ext4-online-defrag-is-not-supported-for-journaled-fi.patch
index dddf5e7..554afd0 100644
--- a/queue/ext4-online-defrag-is-not-supported-for-journaled-fi.patch
+++ b/queue/ext4-online-defrag-is-not-supported-for-journaled-fi.patch
@@ -11,7 +11,6 @@ explicitly disable it for now.
Signed-off-by: Dmitry Monakhov <dmonakhov@openvz.org>
Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>
-Cc: stable@vger.kernel.org
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
fs/ext4/move_extent.c | 7 ++++++-
diff --git a/queue/fix-eh-wakeup-scsi_schedule_eh-vs-scsi_restart_opera.patch b/queue/fix-eh-wakeup-scsi_schedule_eh-vs-scsi_restart_opera.patch
index 1685656..1cbf3e1 100644
--- a/queue/fix-eh-wakeup-scsi_schedule_eh-vs-scsi_restart_opera.patch
+++ b/queue/fix-eh-wakeup-scsi_schedule_eh-vs-scsi_restart_opera.patch
@@ -22,7 +22,6 @@ blocked for at least one eh cycle, this implementation allows those
i/o's to run before another eh cycle starts to discourage hung task
timeouts.
-Cc: <stable@vger.kernel.org>
Reported-by: Tom Jackson <thomas.p.jackson@intel.com>
Tested-by: Tom Jackson <thomas.p.jackson@intel.com>
Signed-off-by: Dan Williams <dan.j.williams@intel.com>
diff --git a/queue/fs-compat_ioctl.c-VIDEO_SET_SPU_PALETTE-missing-erro.patch b/queue/fs-compat_ioctl.c-VIDEO_SET_SPU_PALETTE-missing-erro.patch
index 8b93d2b..97bf3e8 100644
--- a/queue/fs-compat_ioctl.c-VIDEO_SET_SPU_PALETTE-missing-erro.patch
+++ b/queue/fs-compat_ioctl.c-VIDEO_SET_SPU_PALETTE-missing-erro.patch
@@ -15,7 +15,6 @@ Signed-off-by: Kees Cook <keescook@chromium.org>
Cc: David Miller <davem@davemloft.net>
Cc: Brad Spengler <spender@grsecurity.net>
Cc: PaX Team <pageexec@freemail.hu>
-Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/fs-fscache-stats.c-fix-memory-leak.patch b/queue/fs-fscache-stats.c-fix-memory-leak.patch
index b2b4824..0da9807 100644
--- a/queue/fs-fscache-stats.c-fix-memory-leak.patch
+++ b/queue/fs-fscache-stats.c-fix-memory-leak.patch
@@ -20,7 +20,6 @@ Cc: Sanil kumar <sanil.kumar@huawei.com>
Cc: Nataraj m <nataraj.m@huawei.com>
Cc: Li Zefan <lizefan@huawei.com>
Cc: David Howells <dhowells@redhat.com>
-Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/fuse-verify-all-ioctl-retry-iov-elements.patch b/queue/fuse-verify-all-ioctl-retry-iov-elements.patch
index bd24722..feea86d 100644
--- a/queue/fuse-verify-all-ioctl-retry-iov-elements.patch
+++ b/queue/fuse-verify-all-ioctl-retry-iov-elements.patch
@@ -21,7 +21,6 @@ I'm cc:ing stable because the initial commit did as well.
Signed-off-by: Zach Brown <zab@redhat.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
-CC: <stable@vger.kernel.org> [2.6.37+]
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
fs/fuse/file.c | 2 +-
diff --git a/queue/futex-Fix-bug-in-WARN_ON-for-NULL-q.pi_state.patch b/queue/futex-Fix-bug-in-WARN_ON-for-NULL-q.pi_state.patch
index 32602d7..2ffcd87 100644
--- a/queue/futex-Fix-bug-in-WARN_ON-for-NULL-q.pi_state.patch
+++ b/queue/futex-Fix-bug-in-WARN_ON-for-NULL-q.pi_state.patch
@@ -11,7 +11,6 @@ the address (&q.pi_state) of the pointer instead of the value
Signed-off-by: Darren Hart <dvhart@linux.intel.com>
Cc: Dave Jones <davej@redhat.com>
-Cc: stable@vger.kernel.org
Link: http://lkml.kernel.org/r/1c85d97f6e5f79ec389a4ead3e367363c74bd09a.1342809673.git.dvhart@linux.intel.com
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/futex-Forbid-uaddr-uaddr2-in-futex_wait_requeue_pi.patch b/queue/futex-Forbid-uaddr-uaddr2-in-futex_wait_requeue_pi.patch
index 11d5613..06d5eda 100644
--- a/queue/futex-Forbid-uaddr-uaddr2-in-futex_wait_requeue_pi.patch
+++ b/queue/futex-Forbid-uaddr-uaddr2-in-futex_wait_requeue_pi.patch
@@ -15,7 +15,6 @@ dereference.
Signed-off-by: Darren Hart <dvhart@linux.intel.com>
Cc: Dave Jones <davej@redhat.com>
-Cc: stable@vger.kernel.org
Link: http://lkml.kernel.org/r/ad82bfe7f7d130247fbe2b5b4275654807774227.1342809673.git.dvhart@linux.intel.com
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/futex-Test-for-pi_mutex-on-fault-in-futex_wait_reque.patch b/queue/futex-Test-for-pi_mutex-on-fault-in-futex_wait_reque.patch
index cd6be9c..c304b5e 100644
--- a/queue/futex-Test-for-pi_mutex-on-fault-in-futex_wait_reque.patch
+++ b/queue/futex-Test-for-pi_mutex-on-fault-in-futex_wait_reque.patch
@@ -12,7 +12,6 @@ and possibly unlocking it.
Signed-off-by: Darren Hart <dvhart@linux.intel.com>
Cc: Dave Jones <davej@redhat.com>
Cc: Dan Carpenter <dan.carpenter@oracle.com>
-Cc: stable@vger.kernel.org
Link: http://lkml.kernel.org/r/dc59890338fc413606f04e5c5b131530734dae3d.1342809673.git.dvhart@linux.intel.com
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/gen_init_cpio-avoid-stack-overflow-when-expanding.patch b/queue/gen_init_cpio-avoid-stack-overflow-when-expanding.patch
index ac80e2e..f51b53c 100644
--- a/queue/gen_init_cpio-avoid-stack-overflow-when-expanding.patch
+++ b/queue/gen_init_cpio-avoid-stack-overflow-when-expanding.patch
@@ -27,7 +27,6 @@ Signed-off-by: Kees Cook <keescook@chromium.org>
Cc: Michal Marek <mmarek@suse.cz>
Cc: Brad Spengler <spender@grsecurity.net>
Cc: PaX Team <pageexec@freemail.hu>
-Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/jbd-Fix-lock-ordering-bug-in-journal_unmap_buffer.patch b/queue/jbd-Fix-lock-ordering-bug-in-journal_unmap_buffer.patch
index 146035d..73f358d 100644
--- a/queue/jbd-Fix-lock-ordering-bug-in-journal_unmap_buffer.patch
+++ b/queue/jbd-Fix-lock-ordering-bug-in-journal_unmap_buffer.patch
@@ -15,7 +15,6 @@ Fix the problem by dropping the buffer lock before waiting for transaction
commit. Since we are still holding page lock (and that is OK), buffer cannot
disappear under us.
-CC: stable@vger.kernel.org # Wherever commit 09e05d48 was taken
Signed-off-by: Jan Kara <jack@suse.cz>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
diff --git a/queue/jbd2-clear-BH_Delay-BH_Unwritten-in-journal_unmap_bu.patch b/queue/jbd2-clear-BH_Delay-BH_Unwritten-in-journal_unmap_bu.patch
index 163a6ac..c8460d6 100644
--- a/queue/jbd2-clear-BH_Delay-BH_Unwritten-in-journal_unmap_bu.patch
+++ b/queue/jbd2-clear-BH_Delay-BH_Unwritten-in-journal_unmap_bu.patch
@@ -25,7 +25,6 @@ to clear away these flags.
Signed-off-by: Eric Sandeen <sandeen@redhat.com>
Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>
-Cc: stable@vger.kernel.org
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
fs/jbd2/transaction.c | 2 ++
diff --git a/queue/kernel-signal.c-stop-info-leak-via-the-tkill-and-the.patch b/queue/kernel-signal.c-stop-info-leak-via-the-tkill-and-the.patch
index bbf1ffa..3d58c9d 100644
--- a/queue/kernel-signal.c-stop-info-leak-via-the-tkill-and-the.patch
+++ b/queue/kernel-signal.c-stop-info-leak-via-the-tkill-and-the.patch
@@ -28,7 +28,6 @@ Cc: Al Viro <viro@zeniv.linux.org.uk>
Cc: Oleg Nesterov <oleg@redhat.com>
Cc: "Eric W. Biederman" <ebiederm@xmission.com>
Cc: Serge Hallyn <serge.hallyn@canonical.com>
-Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/kernel-sys.c-call-disable_nonboot_cpus-in-kernel_res.patch b/queue/kernel-sys.c-call-disable_nonboot_cpus-in-kernel_res.patch
index 7298892..aab6460 100644
--- a/queue/kernel-sys.c-call-disable_nonboot_cpus-in-kernel_res.patch
+++ b/queue/kernel-sys.c-call-disable_nonboot_cpus-in-kernel_res.patch
@@ -16,7 +16,6 @@ secondary ones. Otherwise, the secondary core running the restart
routine will fail to come to online after reboot.
Signed-off-by: Shawn Guo <shawn.guo@linaro.org>
-Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/libsas-continue-revalidation.patch b/queue/libsas-continue-revalidation.patch
index 71395ab..36d8aa5 100644
--- a/queue/libsas-continue-revalidation.patch
+++ b/queue/libsas-continue-revalidation.patch
@@ -10,7 +10,6 @@ discovered. Fixes cases where re-discovery completes too early in a
domain with multiple expanders with pending re-discovery events.
Servicing BCNs can get backed up behind error recovery.
-Cc: <stable@vger.kernel.org>
Signed-off-by: Dan Williams <dan.j.williams@intel.com>
Signed-off-by: James Bottomley <JBottomley@Parallels.com>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/mm-bugfix-set-current-reclaim_state-to-NULL-while-re.patch b/queue/mm-bugfix-set-current-reclaim_state-to-NULL-while-re.patch
index 27c600d..38fd192 100644
--- a/queue/mm-bugfix-set-current-reclaim_state-to-NULL-while-re.patch
+++ b/queue/mm-bugfix-set-current-reclaim_state-to-NULL-while-re.patch
@@ -16,7 +16,6 @@ current->reclaim_state.
Signed-off-by: Takamori Yamaguchi <takamori.yamaguchi@jp.sony.com>
Signed-off-by: Aaditya Kumar <aaditya.kumar@ap.sony.com>
Acked-by: David Rientjes <rientjes@google.com>
-Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/mm-mmu_notifier-fix-freed-page-still-mapped-in-secon.patch b/queue/mm-mmu_notifier-fix-freed-page-still-mapped-in-secon.patch
index 2ecca0c..a6f710a 100644
--- a/queue/mm-mmu_notifier-fix-freed-page-still-mapped-in-secon.patch
+++ b/queue/mm-mmu_notifier-fix-freed-page-still-mapped-in-secon.patch
@@ -41,7 +41,6 @@ Cc: Avi Kivity <avi@redhat.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Paul Gortmaker <paul.gortmaker@windriver.com>
Cc: Andrea Arcangeli <aarcange@redhat.com>
-Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/mtd-cafe_nand-fix-an-vs-mistake.patch b/queue/mtd-cafe_nand-fix-an-vs-mistake.patch
index c06ec18..c032e48 100644
--- a/queue/mtd-cafe_nand-fix-an-vs-mistake.patch
+++ b/queue/mtd-cafe_nand-fix-an-vs-mistake.patch
@@ -14,7 +14,6 @@ wiki.laptop.org/images/5/5c/88ALP01_Datasheet_July_2007.pdf
and this fix looks correct.
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
-Cc: stable@vger.kernel.org
Signed-off-by: Artem Bityutskiy <artem.bityutskiy@linux.intel.com>
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/pcdp-use-early_ioremap-early_iounmap-to-access-pcdp-.patch b/queue/pcdp-use-early_ioremap-early_iounmap-to-access-pcdp-.patch
index 04f62aa..023cd12 100644
--- a/queue/pcdp-use-early_ioremap-early_iounmap-to-access-pcdp-.patch
+++ b/queue/pcdp-use-early_ioremap-early_iounmap-to-access-pcdp-.patch
@@ -39,7 +39,6 @@ HCDP/PCDP table for early console setup.
Signed-off-by: Greg Pearson <greg.pearson@hp.com>
Acked-by: Khalid Aziz <khalid.aziz@hp.com>
-Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/posix-cpu-timers-Fix-nanosleep-task_struct-leak.patch b/queue/posix-cpu-timers-Fix-nanosleep-task_struct-leak.patch
index 31e5638..96fee8a 100644
--- a/queue/posix-cpu-timers-Fix-nanosleep-task_struct-leak.patch
+++ b/queue/posix-cpu-timers-Fix-nanosleep-task_struct-leak.patch
@@ -15,7 +15,6 @@ Signed-off-by: Stanislaw Gruszka <sgruszka@redhat.com>
Cc: Dave Jones <davej@redhat.com>
Cc: John Stultz <john.stultz@linaro.org>
Cc: Oleg Nesterov <oleg@redhat.com>
-Cc: stable@vger.kernel.org
Link: http://lkml.kernel.org/r/20130215100810.GF4392@redhat.com
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/signal-always-clear-sa_restorer-on-execve.patch b/queue/signal-always-clear-sa_restorer-on-execve.patch
index f6c6194..69ca68a 100644
--- a/queue/signal-always-clear-sa_restorer-on-execve.patch
+++ b/queue/signal-always-clear-sa_restorer-on-execve.patch
@@ -45,7 +45,6 @@ Cc: Oleg Nesterov <oleg@redhat.com>
Cc: "Eric W. Biederman" <ebiederm@xmission.com>
Cc: Serge Hallyn <serge.hallyn@canonical.com>
Cc: Julien Tinnes <jln@google.com>
-Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/svcrpc-fix-svc_xprt_enqueue-svc_recv-busy-looping.patch b/queue/svcrpc-fix-svc_xprt_enqueue-svc_recv-busy-looping.patch
index 189dcb9..2cebcc4 100644
--- a/queue/svcrpc-fix-svc_xprt_enqueue-svc_recv-busy-looping.patch
+++ b/queue/svcrpc-fix-svc_xprt_enqueue-svc_recv-busy-looping.patch
@@ -21,7 +21,6 @@ space after all.
The results is a svc_recv() that will repeatedly return -EAGAIN, causing
server threads to loop without doing any actual work.
-Cc: stable@vger.kernel.org
Reported-by: Michael Tokarev <mjt@tls.msk.ru>
Tested-by: Michael Tokarev <mjt@tls.msk.ru>
Signed-off-by: J. Bruce Fields <bfields@redhat.com>
diff --git a/queue/svcrpc-sends-on-closed-socket-should-stop-immediatel.patch b/queue/svcrpc-sends-on-closed-socket-should-stop-immediatel.patch
index 4c67a12..3324e76 100644
--- a/queue/svcrpc-sends-on-closed-socket-should-stop-immediatel.patch
+++ b/queue/svcrpc-sends-on-closed-socket-should-stop-immediatel.patch
@@ -17,7 +17,6 @@ something like
kernel: rpc-srv/tcp: nfsd: sent only 963696 when sending 1048708 bytes - shutting down socket
-Cc: stable@vger.kernel.org
Reported-by: Malahal Naineni <malahal@us.ibm.com>
Tested-by: Malahal Naineni <malahal@us.ibm.com>
Signed-off-by: J. Bruce Fields <bfields@redhat.com>
diff --git a/queue/sysfs-sysfs_pathname-sysfs_add_one-Use-strlcat-inste.patch b/queue/sysfs-sysfs_pathname-sysfs_add_one-Use-strlcat-inste.patch
index 2faad65..fc3ca98 100644
--- a/queue/sysfs-sysfs_pathname-sysfs_add_one-Use-strlcat-inste.patch
+++ b/queue/sysfs-sysfs_pathname-sysfs_add_one-Use-strlcat-inste.patch
@@ -16,7 +16,6 @@ an admittedly more obscure comma operator construct, to avoid emitting code
for the concatenation if CONFIG_BUG is disabled.
Signed-off-by: Geert Uytterhoeven <geert@linux-m68k.org>
-Cc: stable@vger.kernel.org
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
diff --git a/queue/tcp-do_tcp_sendpages-must-try-to-push-data-out-on-oo.patch b/queue/tcp-do_tcp_sendpages-must-try-to-push-data-out-on-oo.patch
index 255fda1..1346033 100644
--- a/queue/tcp-do_tcp_sendpages-must-try-to-push-data-out-on-oo.patch
+++ b/queue/tcp-do_tcp_sendpages-must-try-to-push-data-out-on-oo.patch
@@ -33,7 +33,6 @@ to -stable.
Signed-off-by: Willy Tarreau <w@1wt.eu>
Acked-by: Eric Dumazet <edumazet@google.com>
-Cc: <stable@vger.kernel.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
net/ipv4/tcp.c | 3 +--
diff --git a/queue/tick-Cleanup-NOHZ-per-cpu-data-on-cpu-down.patch b/queue/tick-Cleanup-NOHZ-per-cpu-data-on-cpu-down.patch
index 6999d33..bab105b 100644
--- a/queue/tick-Cleanup-NOHZ-per-cpu-data-on-cpu-down.patch
+++ b/queue/tick-Cleanup-NOHZ-per-cpu-data-on-cpu-down.patch
@@ -14,7 +14,6 @@ and dereferences a NULL pointer.
Cleanup the data after the cpu is dead.
Reported-by: Prarit Bhargava <prarit@redhat.com>
-Cc: stable@vger.kernel.org
Cc: Mike Galbraith <bitbucket@online.de>
Link: http://lkml.kernel.org/r/alpine.LFD.2.02.1305031451561.2886@ionos
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
diff --git a/queue/timer-Don-t-reinitialize-the-cpu-base-lock-during-CP.patch b/queue/timer-Don-t-reinitialize-the-cpu-base-lock-during-CP.patch
index 054851d..9058f65 100644
--- a/queue/timer-Don-t-reinitialize-the-cpu-base-lock-during-CP.patch
+++ b/queue/timer-Don-t-reinitialize-the-cpu-base-lock-during-CP.patch
@@ -58,7 +58,6 @@ base lock is reinitialized. Move base spinlock initialization under
the check.
Signed-off-by: Tirupathi Reddy <tirupath@codeaurora.org>
-Cc: stable@vger.kernel.org
Link: http://lkml.kernel.org/r/1368520142-4136-1-git-send-email-tirupath@codeaurora.org
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/tmpfs-fix-use-after-free-of-mempolicy-object.patch b/queue/tmpfs-fix-use-after-free-of-mempolicy-object.patch
index 27b2c3e..e1accb8 100644
--- a/queue/tmpfs-fix-use-after-free-of-mempolicy-object.patch
+++ b/queue/tmpfs-fix-use-after-free-of-mempolicy-object.patch
@@ -69,7 +69,6 @@ not look back further.
Signed-off-by: Greg Thelen <gthelen@google.com>
Acked-by: Hugh Dickins <hughd@google.com>
-Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/tracing-Don-t-call-page_to_pfn-if-page-is-NULL.patch b/queue/tracing-Don-t-call-page_to_pfn-if-page-is-NULL.patch
index f4f6f4a..e91981d 100644
--- a/queue/tracing-Don-t-call-page_to_pfn-if-page-is-NULL.patch
+++ b/queue/tracing-Don-t-call-page_to_pfn-if-page-is-NULL.patch
@@ -13,7 +13,6 @@ Link: http://lkml.kernel.org/r/505AB1FF.8020104@cn.fujitsu.com
Cc: Frederic Weisbecker <fweisbec@gmail.com>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Andrew Morton <akpm@linux-foundation.org>
-Cc: stable <stable@vger.kernel.org>
Acked-by: Mel Gorman <mel@csn.ul.ie>
Reviewed-by: Minchan Kim <minchan@kernel.org>
Signed-off-by: Wen Congyang <wency@cn.fujitsu.com>
diff --git a/queue/tracing-Fix-double-free-when-function-profile-init-f.patch b/queue/tracing-Fix-double-free-when-function-profile-init-f.patch
index 8d4a2db..c2ae5f4 100644
--- a/queue/tracing-Fix-double-free-when-function-profile-init-f.patch
+++ b/queue/tracing-Fix-double-free-when-function-profile-init-f.patch
@@ -12,7 +12,6 @@ Link: http://lkml.kernel.org/r/1364820385-32027-1-git-send-email-namhyung@kernel
Cc: Frederic Weisbecker <fweisbec@gmail.com>
Cc: Namhyung Kim <namhyung.kim@lge.com>
-Cc: stable@vger.kernel.org
Signed-off-by: Namhyung Kim <namhyung@kernel.org>
Signed-off-by: Steven Rostedt <rostedt@goodmis.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/udf-Fix-data-corruption-for-files-in-ICB.patch b/queue/udf-Fix-data-corruption-for-files-in-ICB.patch
index 24f31e3..c052704 100644
--- a/queue/udf-Fix-data-corruption-for-files-in-ICB.patch
+++ b/queue/udf-Fix-data-corruption-for-files-in-ICB.patch
@@ -15,7 +15,6 @@ new aops).
Fix the problem by providing a ->write_begin function which makes the page
properly uptodate.
-CC: <stable@vger.kernel.org> # >= 2.6.24
Reported-by: Ian Abbott <abbotti@mev.co.uk>
Signed-off-by: Jan Kara <jack@suse.cz>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/queue/usb-serial-mos7840-Fixup-mos7840_chars_in_buffer.patch b/queue/usb-serial-mos7840-Fixup-mos7840_chars_in_buffer.patch
index d3b1a2b..42a231c 100644
--- a/queue/usb-serial-mos7840-Fixup-mos7840_chars_in_buffer.patch
+++ b/queue/usb-serial-mos7840-Fixup-mos7840_chars_in_buffer.patch
@@ -10,7 +10,6 @@ commit 5c263b92f828af6a8cf54041db45ceae5af8f2ab upstream.
kernel output is truncated during boot.
Signed-off-by: Mark Ferrell <mferrell@uplogix.com>
-Cc: stable <stable@vger.kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
diff --git a/queue/video-uvesafb-Fix-oops-that-uvesafb-try-to-execute-N.patch b/queue/video-uvesafb-Fix-oops-that-uvesafb-try-to-execute-N.patch
index 0a23472..2f2bd17 100644
--- a/queue/video-uvesafb-Fix-oops-that-uvesafb-try-to-execute-N.patch
+++ b/queue/video-uvesafb-Fix-oops-that-uvesafb-try-to-execute-N.patch
@@ -86,7 +86,6 @@ Signed-off-by: Wang YanQing <udknight@gmail.com>
Cc: Michal Januszewski <spock@gentoo.org>
Cc: Alan Cox <alan@lxorguk.ukuu.org.uk>
Signed-off-by: Florian Tobias Schandinat <FlorianSchandinat@gmx.de>
-Cc: stable@vger.kernel.org
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
drivers/video/uvesafb.c | 11 +++++++++--
diff --git a/queue/w1-fix-oops-when-w1_search-is-called-from-netlink-co.patch b/queue/w1-fix-oops-when-w1_search-is-called-from-netlink-co.patch
index 16e06ea..ea6a5e4 100644
--- a/queue/w1-fix-oops-when-w1_search-is-called-from-netlink-co.patch
+++ b/queue/w1-fix-oops-when-w1_search-is-called-from-netlink-co.patch
@@ -32,7 +32,6 @@ Acked-by: Evgeniy Polyakov <zbr@ioremap.net>
Cc: Josh Boyer <jwboyer@gmail.com>
Tested-by: Sven Geggus <lists@fuchsschwanzdomain.de>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-Cc: stable <stable@vger.kernel.org> # 3.0+
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
drivers/w1/w1.c | 3 ++-
diff --git a/queue/x86-mm-Check-if-PUD-is-large-when-validating-a-kerne.patch b/queue/x86-mm-Check-if-PUD-is-large-when-validating-a-kerne.patch
index a159a8a..436bf32 100644
--- a/queue/x86-mm-Check-if-PUD-is-large-when-validating-a-kerne.patch
+++ b/queue/x86-mm-Check-if-PUD-is-large-when-validating-a-kerne.patch
@@ -43,7 +43,6 @@ Signed-off-by: Mel Gorman <mgorman@suse.de>
Reviewed-by: Rik van Riel <riel@redhat.coM>
Reviewed-by: Michal Hocko <mhocko@suse.cz>
Acked-by: Johannes Weiner <hannes@cmpxchg.org>
-Cc: stable@vger.kernel.org
Cc: linux-mm@kvack.org
Link: http://lkml.kernel.org/r/20130211145236.GX21389@suse.de
Signed-off-by: Ingo Molnar <mingo@kernel.org>
diff --git a/queue/x86-mm-paravirt-Fix-vmalloc_fault-oops-during-lazy-M.patch b/queue/x86-mm-paravirt-Fix-vmalloc_fault-oops-during-lazy-M.patch
index 2a47666..ed7ad42 100644
--- a/queue/x86-mm-paravirt-Fix-vmalloc_fault-oops-during-lazy-M.patch
+++ b/queue/x86-mm-paravirt-Fix-vmalloc_fault-oops-during-lazy-M.patch
@@ -54,7 +54,6 @@ Call Trace:
Calling arch_flush_lazy_mmu_mode immediately after set_pgd makes the
changes visible to the consistency checks.
-Cc: <stable@vger.kernel.org>
RedHat-Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=914737
Tested-by: Josh Boyer <jwboyer@redhat.com>
Reported-and-Tested-by: Krishna Raman <kraman@redhat.com>
diff --git a/queue/xen-bootup-allow-read-write-_cr8-pvops-call.patch b/queue/xen-bootup-allow-read-write-_cr8-pvops-call.patch
index 4b0c8e3..46097f2 100644
--- a/queue/xen-bootup-allow-read-write-_cr8-pvops-call.patch
+++ b/queue/xen-bootup-allow-read-write-_cr8-pvops-call.patch
@@ -24,7 +24,6 @@ Call Trace:
[<ffffffff8107330c>] ? x86_acpi_suspend_lowlevel+0x10c/0x150
[<ffffffff81342ee2>] acpi_suspend_enter+0x57/0xd5
-CC: stable@vger.kernel.org
Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
diff --git a/queue/xen-bootup-allow-read_tscp-call-for-Xen-PV-guests.patch b/queue/xen-bootup-allow-read_tscp-call-for-Xen-PV-guests.patch
index 2ce21f8..314406a 100644
--- a/queue/xen-bootup-allow-read_tscp-call-for-Xen-PV-guests.patch
+++ b/queue/xen-bootup-allow-read_tscp-call-for-Xen-PV-guests.patch
@@ -9,7 +9,6 @@ The hypervisor will trap it. However without this patch,
we would crash as the .read_tscp is set to NULL. This patch
fixes it and sets it to the native_read_tscp call.
-CC: stable@vger.kernel.org
Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
diff --git a/queue/xhci-Don-t-write-zeroed-pointers-to-xHC-registers.patch b/queue/xhci-Don-t-write-zeroed-pointers-to-xHC-registers.patch
index fa7c5ac..73abf0c 100644
--- a/queue/xhci-Don-t-write-zeroed-pointers-to-xHC-registers.patch
+++ b/queue/xhci-Don-t-write-zeroed-pointers-to-xHC-registers.patch
@@ -27,7 +27,6 @@ This should be backported to kernels as old as 2.6.32.
Signed-off-by: Sarah Sharp <sarah.a.sharp@linux.intel.com>
Tested-by: Elric Fu <elricfu1@gmail.com>
-Cc: stable@vger.kernel.org
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
drivers/usb/host/xhci-mem.c | 9 ++-------
diff --git a/queue/xhci-Increase-reset-timeout-for-Renesas-720201-host.patch b/queue/xhci-Increase-reset-timeout-for-Renesas-720201-host.patch
index e7e8c8c..8c7fcf1 100644
--- a/queue/xhci-Increase-reset-timeout-for-Renesas-720201-host.patch
+++ b/queue/xhci-Increase-reset-timeout-for-Renesas-720201-host.patch
@@ -16,7 +16,6 @@ BIOS handoff and HW initialization."
Signed-off-by: Sarah Sharp <sarah.a.sharp@linux.intel.com>
Reported-by: Edwin Klein Mentink <e.kleinmentink@zonnet.nl>
-Cc: stable@vger.kernel.org
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
drivers/usb/host/xhci.c | 5 +++--
diff --git a/queue/xhci-Make-handover-code-more-robust.patch b/queue/xhci-Make-handover-code-more-robust.patch
index f613cb6..2d57bc1 100644
--- a/queue/xhci-Make-handover-code-more-robust.patch
+++ b/queue/xhci-Make-handover-code-more-robust.patch
@@ -22,7 +22,6 @@ and HW initialization."
Signed-off-by: Matthew Garrett <mjg@redhat.com>
Signed-off-by: Sarah Sharp <sarah.a.sharp@linux.intel.com>
-Cc: stable@vger.kernel.org
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
drivers/usb/host/pci-quirks.c | 12 ++++++++++--
diff --git a/queue/xhci-Reset-reserved-command-ring-TRBs-on-cleanup.patch b/queue/xhci-Reset-reserved-command-ring-TRBs-on-cleanup.patch
index e4f73e8..b9cd822 100644
--- a/queue/xhci-Reset-reserved-command-ring-TRBs-on-cleanup.patch
+++ b/queue/xhci-Reset-reserved-command-ring-TRBs-on-cleanup.patch
@@ -17,7 +17,6 @@ that contain the commit 913a8a344ffcaf0b4a586d6662a2c66a7106557d
"USB: xhci: Change how xHCI commands are handled."
Signed-off-by: Sarah Sharp <sarah.a.sharp@linux.intel.com>
-Cc: stable@vger.kernel.org
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
---
drivers/usb/host/xhci-mem.c | 1 +