]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
queue-3.4: fix up some email addresses
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 11 Oct 2012 01:05:07 +0000 (10:05 +0900)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 11 Oct 2012 01:05:07 +0000 (10:05 +0900)
queue-3.4/mempolicy-remove-mempolicy-sharing.patch
queue-3.4/rcu-fix-day-one-dyntick-idle-stall-warning-bug.patch
queue-3.4/xfrm_user-don-t-copy-esn-replay-window-twice-for-new-states.patch
queue-3.4/xfrm_user-ensure-user-supplied-esn-replay-window-is-valid.patch
queue-3.4/xfrm_user-fix-info-leak-in-copy_to_user_tmpl.patch

index 864129f0dc0d497e2cd7155620e676745759fec0..d37a769446b5dfcc6f069b4482253581ac21c434 100644 (file)
@@ -82,8 +82,8 @@ new_policy passed to it.  However, it is more straight-forward and the
 change should be invisible to the user.
 
 [mgorman@suse.de: Edited changelog]
-Reported-by: Dave Jones <davej@redhat.com>,
-Cc: Christoph Lameter <cl@linux.com>,
+Reported-by: Dave Jones <davej@redhat.com>
+Cc: Christoph Lameter <cl@linux.com>
 Reviewed-by: Christoph Lameter <cl@linux.com>
 Signed-off-by: KOSAKI Motohiro <kosaki.motohiro@jp.fujitsu.com>
 Signed-off-by: Mel Gorman <mgorman@suse.de>
index 5016fdd59e2aab5b53f04fd07077f12eab903324..6ce5d7c419732c8b15ee9bf7702a362c81cf3f04 100644 (file)
@@ -62,7 +62,7 @@ Reported-by: Subodh Nijsure <snijsure@grid-net.com>
 Reported-by: Paul Walmsley <paul@pwsan.com>
 Signed-off-by: Paul E. McKenney <paul.mckenney@linaro.org>
 Signed-off-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
-Tested-by: Paul Walmsley <paul@pwsan.com>  # OMAP3730, OMAP4430
+Tested-by: Paul Walmsley <paul@pwsan.com>
 Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
 
 ---
index bd6a8b738633849ad9b2cc8d8eef8d3d2ebc8534..e0aa7e6d60af3cbe57e3d7f8f2df1f591a1a7742 100644 (file)
@@ -11,8 +11,8 @@ From: Mathias Krause <minipli@googlemail.com>
 The ESN replay window was already fully initialized in
 xfrm_alloc_replay_state_esn(). No need to copy it again.
 
-Cc: Steffen Klassert <steffen.klassert@secunet.com>
 Signed-off-by: Mathias Krause <minipli@googlemail.com>
+Cc: Steffen Klassert <steffen.klassert@secunet.com>
 Acked-by: Steffen Klassert <steffen.klassert@secunet.com>
 Signed-off-by: David S. Miller <davem@davemloft.net>
 Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
index c08908d6e66a806c70aa99b923b55e320af77f2e..2f697f67b3cef3be1e60df5a40489af8e48484a3 100644 (file)
@@ -38,10 +38,10 @@ of bmp_len is limited to 128 by this patch -- resulting in a maximum
 replay window of 4096 packets. This should be sufficient for all real
 life scenarios (RFC 4303 recommends a default replay window size of 64).
 
+Signed-off-by: Mathias Krause <minipli@googlemail.com>
 Cc: Steffen Klassert <steffen.klassert@secunet.com>
 Cc: Martin Willi <martin@revosec.ch>
 Cc: Ben Hutchings <bhutchings@solarflare.com>
-Signed-off-by: Mathias Krause <minipli@googlemail.com>
 Signed-off-by: David S. Miller <davem@davemloft.net>
 Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
 ---
index 672dd60de50641214ad599feb2c79502ab38ab83..fc03074579f975fd574178b9492807fea357c41a 100644 (file)
@@ -15,8 +15,8 @@ to userland. Add an explicit memset(0) to avoid the info leak.
 
 Initial version of the patch by Brad Spengler.
 
-Cc: Brad Spengler <spender@grsecurity.net>
 Signed-off-by: Mathias Krause <minipli@googlemail.com>
+Cc: Brad Spengler <spender@grsecurity.net>
 Acked-by: Steffen Klassert <steffen.klassert@secunet.com>
 Signed-off-by: David S. Miller <davem@davemloft.net>
 Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>