summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJosh Boyer <jwboyer@fedoraproject.org>2015-05-07 09:22:36 -0400
committerJosh Boyer <jwboyer@fedoraproject.org>2015-05-07 09:22:47 -0400
commit5f94435ddd350f77bd0e83e69ce047cc4cd9bfdb (patch)
tree0f7eb261706d7cebe3090a4d9cf378ea2daec115
parent45a0b49689abb380af737e255539b56d79bfb444 (diff)
downloadkernel-5f94435ddd350f77bd0e83e69ce047cc4cd9bfdb.tar.gz
kernel-5f94435ddd350f77bd0e83e69ce047cc4cd9bfdb.tar.xz
kernel-5f94435ddd350f77bd0e83e69ce047cc4cd9bfdb.zip
Linux v4.1-rc2-79-g0e1dc4274828
-rw-r--r--ACPI-Limit-access-to-custom_method.patch3
-rw-r--r--ARM-tegra-usb-no-reset.patch3
-rw-r--r--Add-EFI-signature-data-types.patch3
-rw-r--r--Add-an-EFI-signature-blob-parser-and-key-loader.patch3
-rw-r--r--Add-option-to-automatically-enforce-module-signature.patch7
-rw-r--r--Add-secure_modules-call.patch3
-rw-r--r--Add-sysrq-option-to-disable-secure-boot-mode.patch3
-rw-r--r--Input-synaptics-pin-3-touches-when-the-firmware-repo.patch3
-rw-r--r--KEYS-Add-a-system-blacklist-keyring.patch3
-rw-r--r--Kbuild-Add-an-option-to-enable-GCC-VTA.patch5
-rw-r--r--MODSIGN-Import-certificates-from-UEFI-Secure-Boot.patch3
-rw-r--r--MODSIGN-Support-not-importing-certs-from-db.patch3
-rw-r--r--PCI-Lock-down-BAR-access-when-module-security-is-ena.patch3
-rw-r--r--Restrict-dev-mem-and-dev-kmem-when-module-loading-is.patch3
-rw-r--r--Revert-Revert-ACPI-video-change-acpi-video-brightnes.patch3
-rw-r--r--acpi-Ignore-acpi_rsdp-kernel-parameter-when-module-l.patch3
-rw-r--r--amd-xgbe-a0-Add-support-for-XGBE-on-A0.patch3
-rw-r--r--amd-xgbe-phy-a0-Add-support-for-XGBE-PHY-on-A0.patch3
-rw-r--r--arm-dts-am335x-bone-common-add-uart2_pins-uart4_pins.patch3
-rw-r--r--arm-dts-am335x-bone-common-enable-and-use-i2c2.patch3
-rw-r--r--arm-dts-am335x-bone-common-setup-default-pinmux-http.patch3
-rw-r--r--arm-dts-am335x-boneblack-add-cpu0-opp-points.patch3
-rw-r--r--arm-dts-am335x-boneblack-lcdc-add-panel-info.patch3
-rw-r--r--arm-highbank-l2-reverts.patch3
-rw-r--r--arm-i.MX6-Utilite-device-dtb.patch3
-rw-r--r--arm64-avoid-needing-console-to-enable-serial-console.patch3
-rw-r--r--asus-wmi-Restrict-debugfs-interface-when-module-load.patch3
-rw-r--r--ath9k-rx-dma-stop-check.patch3
-rw-r--r--crash-driver.patch3
-rw-r--r--criu-no-expert.patch3
-rw-r--r--die-floppy-die.patch3
-rw-r--r--disable-i8042-check-on-apple-mac.patch3
-rw-r--r--drm-i915-hush-check-crtc-state.patch3
-rw-r--r--efi-Add-EFI_SECURE_BOOT-bit.patch3
-rw-r--r--efi-Add-esrt-support.patch3
-rw-r--r--efi-Disable-secure-boot-if-shim-is-in-insecure-mode.patch5
-rw-r--r--efi-Make-EFI_SECURE_BOOT_SIG_ENFORCE-depend-on-EFI.patch3
-rw-r--r--hibernate-Disable-in-a-signed-modules-environment.patch3
-rw-r--r--input-kill-stupid-messages.patch3
-rw-r--r--input-silence-i8042-noise.patch3
-rw-r--r--kbuild-AFTER_LINK.patch3
-rw-r--r--kernel.spec5
-rw-r--r--kexec-Disable-at-runtime-if-the-kernel-enforces-modu.patch3
-rw-r--r--lib-cpumask-Make-CPUMASK_OFFSTACK-usable-without-deb.patch3
-rw-r--r--libata-Blacklist-queued-TRIM-on-all-Samsung-800-seri.patch3
-rw-r--r--lis3-improve-handling-of-null-rate.patch3
-rw-r--r--no-pcspkr-modalias.patch3
-rw-r--r--pinctrl-pinctrl-single-must-be-initialized-early.patch3
-rw-r--r--scsi-sd_revalidate_disk-prevent-NULL-ptr-deref.patch3
-rw-r--r--silence-fbcon-logo.patch3
-rw-r--r--sources2
-rw-r--r--usb-make-xhci-platform-driver-use-64-bit-or-32-bit-D.patch3
-rw-r--r--watchdog-Disable-watchdog-on-virtual-machines.patch3
-rw-r--r--x86-Lock-down-IO-port-access-when-module-security-is.patch3
-rw-r--r--x86-Restrict-MSR-access-when-module-loading-is-restr.patch3
-rw-r--r--xen-pciback-Don-t-disable-PCI_COMMAND-on-PCI-device-.patch3
56 files changed, 9 insertions, 168 deletions
diff --git a/ACPI-Limit-access-to-custom_method.patch b/ACPI-Limit-access-to-custom_method.patch
index eeda0f35d..88709a324 100644
--- a/ACPI-Limit-access-to-custom_method.patch
+++ b/ACPI-Limit-access-to-custom_method.patch
@@ -25,6 +25,3 @@ index c68e72414a67..4277938af700 100644
if (!(*ppos)) {
/* parse the table header to get the table length */
if (count <= sizeof(struct acpi_table_header))
---
-2.3.6
-
diff --git a/ARM-tegra-usb-no-reset.patch b/ARM-tegra-usb-no-reset.patch
index dc4ebb98f..75e4a3107 100644
--- a/ARM-tegra-usb-no-reset.patch
+++ b/ARM-tegra-usb-no-reset.patch
@@ -26,6 +26,3 @@ index 3b7151687776..4b19e7e5bc01 100644
/* Lock the device, then check to see if we were
* disconnected while waiting for the lock to succeed. */
usb_lock_device(hdev);
---
-2.3.6
-
diff --git a/Add-EFI-signature-data-types.patch b/Add-EFI-signature-data-types.patch
index 6a64df78a..ba3f85e7f 100644
--- a/Add-EFI-signature-data-types.patch
+++ b/Add-EFI-signature-data-types.patch
@@ -51,6 +51,3 @@ index aa4ee20ec8bb..958d1d9a5af8 100644
/*
* All runtime access to EFI goes through this structure:
*/
---
-2.3.6
-
diff --git a/Add-an-EFI-signature-blob-parser-and-key-loader.patch b/Add-an-EFI-signature-blob-parser-and-key-loader.patch
index bb339a89b..66f99885e 100644
--- a/Add-an-EFI-signature-blob-parser-and-key-loader.patch
+++ b/Add-an-EFI-signature-blob-parser-and-key-loader.patch
@@ -173,6 +173,3 @@ index 958d1d9a5af8..3dd6f4a51b9b 100644
/**
* efi_range_is_wc - check the WC bit on an address range
* @start: starting kvirt address
---
-2.3.6
-
diff --git a/Add-option-to-automatically-enforce-module-signature.patch b/Add-option-to-automatically-enforce-module-signature.patch
index c26bf528a..9116a71e7 100644
--- a/Add-option-to-automatically-enforce-module-signature.patch
+++ b/Add-option-to-automatically-enforce-module-signature.patch
@@ -54,7 +54,7 @@ index 226d5696e1d1..6a8f880e213f 100644
def_bool y
prompt "Enable seccomp to safely compute untrusted bytecode"
diff --git a/arch/x86/boot/compressed/eboot.c b/arch/x86/boot/compressed/eboot.c
-index ef17683484e9..105e7360d747 100644
+index 48304b89b601..2ff19014117a 100644
--- a/arch/x86/boot/compressed/eboot.c
+++ b/arch/x86/boot/compressed/eboot.c
@@ -12,6 +12,7 @@
@@ -103,7 +103,7 @@ index ef17683484e9..105e7360d747 100644
/*
* See if we have Graphics Output Protocol
*/
-@@ -1406,6 +1438,10 @@ struct boot_params *efi_main(struct efi_config *c,
+@@ -1408,6 +1440,10 @@ struct boot_params *efi_main(struct efi_config *c,
else
setup_boot_services32(efi_early);
@@ -180,6 +180,3 @@ index f43cbdd52546..feb6736fec91 100644
bool secure_modules(void)
{
#ifdef CONFIG_MODULE_SIG
---
-2.3.6
-
diff --git a/Add-secure_modules-call.patch b/Add-secure_modules-call.patch
index 20a88b0f0..79ccc5c2a 100644
--- a/Add-secure_modules-call.patch
+++ b/Add-secure_modules-call.patch
@@ -58,6 +58,3 @@ index 42a1d2afb217..f43cbdd52546 100644
+#endif
+}
+EXPORT_SYMBOL(secure_modules);
---
-2.3.6
-
diff --git a/Add-sysrq-option-to-disable-secure-boot-mode.patch b/Add-sysrq-option-to-disable-secure-boot-mode.patch
index d2d9f7716..0ff29e9f9 100644
--- a/Add-sysrq-option-to-disable-secure-boot-mode.patch
+++ b/Add-sysrq-option-to-disable-secure-boot-mode.patch
@@ -243,6 +243,3 @@ index feb6736fec91..5ea645737f23 100644
static int param_set_bool_enable_only(const char *val,
const struct kernel_param *kp)
---
-2.3.6
-
diff --git a/Input-synaptics-pin-3-touches-when-the-firmware-repo.patch b/Input-synaptics-pin-3-touches-when-the-firmware-repo.patch
index d1f70e726..ec0ba702a 100644
--- a/Input-synaptics-pin-3-touches-when-the-firmware-repo.patch
+++ b/Input-synaptics-pin-3-touches-when-the-firmware-repo.patch
@@ -45,6 +45,3 @@ index 630af73e98c4..c69b308beb3f 100644
input_mt_drop_unused(dev);
/* Don't use active slot count to generate BTN_TOOL events. */
---
-2.3.6
-
diff --git a/KEYS-Add-a-system-blacklist-keyring.patch b/KEYS-Add-a-system-blacklist-keyring.patch
index 198ed561c..746913a32 100644
--- a/KEYS-Add-a-system-blacklist-keyring.patch
+++ b/KEYS-Add-a-system-blacklist-keyring.patch
@@ -106,6 +106,3 @@ index 875f64e8935b..c15e93f5a418 100644
return 0;
}
---
-2.3.6
-
diff --git a/Kbuild-Add-an-option-to-enable-GCC-VTA.patch b/Kbuild-Add-an-option-to-enable-GCC-VTA.patch
index 7c1f29ffd..a52d36a0e 100644
--- a/Kbuild-Add-an-option-to-enable-GCC-VTA.patch
+++ b/Kbuild-Add-an-option-to-enable-GCC-VTA.patch
@@ -59,7 +59,7 @@ index 2da553fd7fc3..32f118807d2a 100644
ifdef CONFIG_DEBUG_INFO
ifdef CONFIG_DEBUG_INFO_SPLIT
diff --git a/lib/Kconfig.debug b/lib/Kconfig.debug
-index 17670573dda8..d23b7c975eb5 100644
+index ba2b0c87e65b..390e4089c086 100644
--- a/lib/Kconfig.debug
+++ b/lib/Kconfig.debug
@@ -165,7 +165,23 @@ config DEBUG_INFO_DWARF4
@@ -87,6 +87,3 @@ index 17670573dda8..d23b7c975eb5 100644
config GDB_SCRIPTS
bool "Provide GDB scripts for kernel debugging"
---
-2.3.6
-
diff --git a/MODSIGN-Import-certificates-from-UEFI-Secure-Boot.patch b/MODSIGN-Import-certificates-from-UEFI-Secure-Boot.patch
index 49a9a82ee..fcdc908f1 100644
--- a/MODSIGN-Import-certificates-from-UEFI-Secure-Boot.patch
+++ b/MODSIGN-Import-certificates-from-UEFI-Secure-Boot.patch
@@ -180,6 +180,3 @@ index 000000000000..94b0eb38a284
+ return rc;
+}
+late_initcall(load_uefi_certs);
---
-2.3.6
-
diff --git a/MODSIGN-Support-not-importing-certs-from-db.patch b/MODSIGN-Support-not-importing-certs-from-db.patch
index cda8ad25e..4782e734f 100644
--- a/MODSIGN-Support-not-importing-certs-from-db.patch
+++ b/MODSIGN-Support-not-importing-certs-from-db.patch
@@ -78,6 +78,3 @@ index 94b0eb38a284..ae28b974d49a 100644
}
mok = get_cert_list(L"MokListRT", &mok_var, &moksize);
---
-2.3.6
-
diff --git a/PCI-Lock-down-BAR-access-when-module-security-is-ena.patch b/PCI-Lock-down-BAR-access-when-module-security-is-ena.patch
index 311edaf28..92e028d07 100644
--- a/PCI-Lock-down-BAR-access-when-module-security-is-ena.patch
+++ b/PCI-Lock-down-BAR-access-when-module-security-is-ena.patch
@@ -111,6 +111,3 @@ index b91c4da68365..98f5637304d1 100644
return -EPERM;
dev = pci_get_bus_and_slot(bus, dfn);
---
-2.3.6
-
diff --git a/Restrict-dev-mem-and-dev-kmem-when-module-loading-is.patch b/Restrict-dev-mem-and-dev-kmem-when-module-loading-is.patch
index a531cfa72..27e4b2370 100644
--- a/Restrict-dev-mem-and-dev-kmem-when-module-loading-is.patch
+++ b/Restrict-dev-mem-and-dev-kmem-when-module-loading-is.patch
@@ -36,6 +36,3 @@ index 53fe675f9bd7..b52c88860532 100644
if (p < (unsigned long) high_memory) {
unsigned long to_write = min_t(unsigned long, count,
(unsigned long)high_memory - p);
---
-2.3.6
-
diff --git a/Revert-Revert-ACPI-video-change-acpi-video-brightnes.patch b/Revert-Revert-ACPI-video-change-acpi-video-brightnes.patch
index bf77b9e7e..f8e7a8fd8 100644
--- a/Revert-Revert-ACPI-video-change-acpi-video-brightnes.patch
+++ b/Revert-Revert-ACPI-video-change-acpi-video-brightnes.patch
@@ -40,6 +40,3 @@ index cc79d3fedfb2..d9bf8ba7d848 100644
module_param(brightness_switch_enabled, bool, 0644);
/*
---
-2.3.6
-
diff --git a/acpi-Ignore-acpi_rsdp-kernel-parameter-when-module-l.patch b/acpi-Ignore-acpi_rsdp-kernel-parameter-when-module-l.patch
index edb12d55d..bb0e0c7e8 100644
--- a/acpi-Ignore-acpi_rsdp-kernel-parameter-when-module-l.patch
+++ b/acpi-Ignore-acpi_rsdp-kernel-parameter-when-module-l.patch
@@ -33,6 +33,3 @@ index 39748bb3a543..72edfeedb326 100644
return acpi_rsdp;
#endif
---
-2.3.6
-
diff --git a/amd-xgbe-a0-Add-support-for-XGBE-on-A0.patch b/amd-xgbe-a0-Add-support-for-XGBE-on-A0.patch
index 8e039a16d..fa39d8675 100644
--- a/amd-xgbe-a0-Add-support-for-XGBE-on-A0.patch
+++ b/amd-xgbe-a0-Add-support-for-XGBE-on-A0.patch
@@ -10409,6 +10409,3 @@ index 000000000000..04c00d236c49
+#endif
+
+#endif
---
-2.3.6
-
diff --git a/amd-xgbe-phy-a0-Add-support-for-XGBE-PHY-on-A0.patch b/amd-xgbe-phy-a0-Add-support-for-XGBE-PHY-on-A0.patch
index 52bb9ace7..2dc32fad5 100644
--- a/amd-xgbe-phy-a0-Add-support-for-XGBE-PHY-on-A0.patch
+++ b/amd-xgbe-phy-a0-Add-support-for-XGBE-PHY-on-A0.patch
@@ -1841,6 +1841,3 @@ index 000000000000..c352d5c2989b
+ { }
+};
+MODULE_DEVICE_TABLE(mdio, amd_xgbe_phy_a0_ids);
---
-2.3.6
-
diff --git a/arm-dts-am335x-bone-common-add-uart2_pins-uart4_pins.patch b/arm-dts-am335x-bone-common-add-uart2_pins-uart4_pins.patch
index c72930769..50d01732a 100644
--- a/arm-dts-am335x-bone-common-add-uart2_pins-uart4_pins.patch
+++ b/arm-dts-am335x-bone-common-add-uart2_pins-uart4_pins.patch
@@ -40,6 +40,3 @@ index 9688dda39e7a..8e3e77f3121f 100644
clkout2_pin: pinmux_clkout2_pin {
pinctrl-single,pins = <
0x1b4 (PIN_OUTPUT_PULLDOWN | MUX_MODE3) /* xdma_event_intr1.clkout2 */
---
-2.3.6
-
diff --git a/arm-dts-am335x-bone-common-enable-and-use-i2c2.patch b/arm-dts-am335x-bone-common-enable-and-use-i2c2.patch
index bdb41922d..3e01f51e8 100644
--- a/arm-dts-am335x-bone-common-enable-and-use-i2c2.patch
+++ b/arm-dts-am335x-bone-common-enable-and-use-i2c2.patch
@@ -64,6 +64,3 @@ index c3255e0c90aa..1fd496fe1a68 100644
};
/include/ "tps65217.dtsi"
---
-2.3.6
-
diff --git a/arm-dts-am335x-bone-common-setup-default-pinmux-http.patch b/arm-dts-am335x-bone-common-setup-default-pinmux-http.patch
index 6c01209ae..2105fcb52 100644
--- a/arm-dts-am335x-bone-common-setup-default-pinmux-http.patch
+++ b/arm-dts-am335x-bone-common-setup-default-pinmux-http.patch
@@ -267,6 +267,3 @@ index 1fd496fe1a68..9688dda39e7a 100644
+ };
+ };
};
---
-2.3.6
-
diff --git a/arm-dts-am335x-boneblack-add-cpu0-opp-points.patch b/arm-dts-am335x-boneblack-add-cpu0-opp-points.patch
index c4d08ad2c..edd9a3c9b 100644
--- a/arm-dts-am335x-boneblack-add-cpu0-opp-points.patch
+++ b/arm-dts-am335x-boneblack-add-cpu0-opp-points.patch
@@ -36,6 +36,3 @@ index 0fd89c38cf02..20660917a06f 100644
hdmi {
compatible = "ti,tilcdc,slave";
i2c = <&i2c0>;
---
-2.3.6
-
diff --git a/arm-dts-am335x-boneblack-lcdc-add-panel-info.patch b/arm-dts-am335x-boneblack-lcdc-add-panel-info.patch
index b61ed4762..97f31f604 100644
--- a/arm-dts-am335x-boneblack-lcdc-add-panel-info.patch
+++ b/arm-dts-am335x-boneblack-lcdc-add-panel-info.patch
@@ -34,6 +34,3 @@ index 5c42d259fa68..0fd89c38cf02 100644
};
};
---
-2.3.6
-
diff --git a/arm-highbank-l2-reverts.patch b/arm-highbank-l2-reverts.patch
index 93c67950c..9f0f89e53 100644
--- a/arm-highbank-l2-reverts.patch
+++ b/arm-highbank-l2-reverts.patch
@@ -55,6 +55,3 @@ index 231fba0d03e5..0de5a6ddd5eb 100644
.init_irq = highbank_init_irq,
.init_machine = highbank_init,
.dt_compat = highbank_match,
---
-2.3.6
-
diff --git a/arm-i.MX6-Utilite-device-dtb.patch b/arm-i.MX6-Utilite-device-dtb.patch
index c2b449e4e..86f9e763d 100644
--- a/arm-i.MX6-Utilite-device-dtb.patch
+++ b/arm-i.MX6-Utilite-device-dtb.patch
@@ -60,6 +60,3 @@ index 99b46f8030ad..8b6ddd16dcc5 100644
+ pinctrl-0 = <&pinctrl_usdhc3>;
+ status = "okay";
+};
---
-2.3.6
-
diff --git a/arm64-avoid-needing-console-to-enable-serial-console.patch b/arm64-avoid-needing-console-to-enable-serial-console.patch
index abf7cf16b..5c4fd194d 100644
--- a/arm64-avoid-needing-console-to-enable-serial-console.patch
+++ b/arm64-avoid-needing-console-to-enable-serial-console.patch
@@ -40,6 +40,3 @@ index 74753132c3ac..3cc99d7c2361 100644
+ return 0;
+}
+early_initcall(arm64_console_setup);
---
-2.3.6
-
diff --git a/asus-wmi-Restrict-debugfs-interface-when-module-load.patch b/asus-wmi-Restrict-debugfs-interface-when-module-load.patch
index 0140bff3b..929853201 100644
--- a/asus-wmi-Restrict-debugfs-interface-when-module-load.patch
+++ b/asus-wmi-Restrict-debugfs-interface-when-module-load.patch
@@ -48,6 +48,3 @@ index 7543a56e0f45..93b5a6998371 100644
status = wmi_evaluate_method(ASUS_WMI_MGMT_GUID,
1, asus->debug.method_id,
&input, &output);
---
-2.3.6
-
diff --git a/ath9k-rx-dma-stop-check.patch b/ath9k-rx-dma-stop-check.patch
index 3c556d082..40cbafc7b 100644
--- a/ath9k-rx-dma-stop-check.patch
+++ b/ath9k-rx-dma-stop-check.patch
@@ -36,6 +36,3 @@ index bba85d1a6cd1..ebbee8f17130 100644
ath_err(common,
"DMA failed to stop in %d ms AR_CR=0x%08x AR_DIAG_SW=0x%08x DMADBG_7=0x%08x\n",
AH_RX_STOP_DMA_TIMEOUT / 1000,
---
-2.3.6
-
diff --git a/crash-driver.patch b/crash-driver.patch
index 198388746..31aff3680 100644
--- a/crash-driver.patch
+++ b/crash-driver.patch
@@ -504,6 +504,3 @@ index 000000000000..25ab9869d566
+#endif /* __KERNEL__ */
+
+#endif /* __CRASH_H__ */
---
-2.3.6
-
diff --git a/criu-no-expert.patch b/criu-no-expert.patch
index 800ff185a..020f73c86 100644
--- a/criu-no-expert.patch
+++ b/criu-no-expert.patch
@@ -30,6 +30,3 @@ index 1c9c8e500a48..6d00970e220e 100644
depends on MULTIUSER
default !EXPERT
help
---
-2.3.6
-
diff --git a/die-floppy-die.patch b/die-floppy-die.patch
index faf77b8a7..caaa2dde5 100644
--- a/die-floppy-die.patch
+++ b/die-floppy-die.patch
@@ -27,6 +27,3 @@ index a08cda955285..e320e1e679cf 100644
#else
---
-2.3.6
-
diff --git a/disable-i8042-check-on-apple-mac.patch b/disable-i8042-check-on-apple-mac.patch
index c2b006d63..970d833d4 100644
--- a/disable-i8042-check-on-apple-mac.patch
+++ b/disable-i8042-check-on-apple-mac.patch
@@ -56,6 +56,3 @@ index 4022b75eaad7..1aaf06aa7b0f 100644
err = i8042_platform_init();
if (err)
return err;
---
-2.3.6
-
diff --git a/drm-i915-hush-check-crtc-state.patch b/drm-i915-hush-check-crtc-state.patch
index 3f1ba0281..f390cd96f 100644
--- a/drm-i915-hush-check-crtc-state.patch
+++ b/drm-i915-hush-check-crtc-state.patch
@@ -26,6 +26,3 @@ index d547d9c8dda2..f523ee679987 100644
intel_dump_pipe_config(crtc, &pipe_config,
"[hw state]");
intel_dump_pipe_config(crtc, crtc->config,
---
-2.3.6
-
diff --git a/efi-Add-EFI_SECURE_BOOT-bit.patch b/efi-Add-EFI_SECURE_BOOT-bit.patch
index b7e98b6d7..c6bc86018 100644
--- a/efi-Add-EFI_SECURE_BOOT-bit.patch
+++ b/efi-Add-EFI_SECURE_BOOT-bit.patch
@@ -37,6 +37,3 @@ index af5be0368dec..aa4ee20ec8bb 100644
#ifdef CONFIG_EFI
/*
---
-2.3.6
-
diff --git a/efi-Add-esrt-support.patch b/efi-Add-esrt-support.patch
index b1af87647..78126f2ef 100644
--- a/efi-Add-esrt-support.patch
+++ b/efi-Add-esrt-support.patch
@@ -778,6 +778,3 @@ index 9cc069579351..fa3546989ab0 100644
extern int efi_reboot_quirk_mode;
extern bool efi_poweroff_required(void);
---
-2.3.6
-
diff --git a/efi-Disable-secure-boot-if-shim-is-in-insecure-mode.patch b/efi-Disable-secure-boot-if-shim-is-in-insecure-mode.patch
index 99f316c00..6465cab3f 100644
--- a/efi-Disable-secure-boot-if-shim-is-in-insecure-mode.patch
+++ b/efi-Disable-secure-boot-if-shim-is-in-insecure-mode.patch
@@ -14,7 +14,7 @@ Signed-off-by: Josh Boyer <jwboyer@fedoraproject.org>
1 file changed, 19 insertions(+), 1 deletion(-)
diff --git a/arch/x86/boot/compressed/eboot.c b/arch/x86/boot/compressed/eboot.c
-index 105e7360d747..83fc4e9888ee 100644
+index 2ff19014117a..35268abaca99 100644
--- a/arch/x86/boot/compressed/eboot.c
+++ b/arch/x86/boot/compressed/eboot.c
@@ -830,8 +830,9 @@ out:
@@ -52,6 +52,3 @@ index 105e7360d747..83fc4e9888ee 100644
return 1;
}
---
-2.3.6
-
diff --git a/efi-Make-EFI_SECURE_BOOT_SIG_ENFORCE-depend-on-EFI.patch b/efi-Make-EFI_SECURE_BOOT_SIG_ENFORCE-depend-on-EFI.patch
index d74583326..862bb05f8 100644
--- a/efi-Make-EFI_SECURE_BOOT_SIG_ENFORCE-depend-on-EFI.patch
+++ b/efi-Make-EFI_SECURE_BOOT_SIG_ENFORCE-depend-on-EFI.patch
@@ -24,6 +24,3 @@ index 6a8f880e213f..d3c21e9d267c 100644
prompt "Force module signing when UEFI Secure Boot is enabled"
---help---
UEFI Secure Boot provides a mechanism for ensuring that the
---
-2.3.6
-
diff --git a/hibernate-Disable-in-a-signed-modules-environment.patch b/hibernate-Disable-in-a-signed-modules-environment.patch
index 2fc92120d..77e1e7036 100644
--- a/hibernate-Disable-in-a-signed-modules-environment.patch
+++ b/hibernate-Disable-in-a-signed-modules-environment.patch
@@ -33,6 +33,3 @@ index 2329daae5255..48a8e82c7e2e 100644
}
/**
---
-2.3.6
-
diff --git a/input-kill-stupid-messages.patch b/input-kill-stupid-messages.patch
index a3e864e92..04205f857 100644
--- a/input-kill-stupid-messages.patch
+++ b/input-kill-stupid-messages.patch
@@ -28,6 +28,3 @@ index ec876b5b1382..9d5216e23a09 100644
goto out;
case ATKBD_RET_ERR:
atkbd->err_count++;
---
-2.3.6
-
diff --git a/input-silence-i8042-noise.patch b/input-silence-i8042-noise.patch
index b0793f2db..572dfb80c 100644
--- a/input-silence-i8042-noise.patch
+++ b/input-silence-i8042-noise.patch
@@ -60,6 +60,3 @@ index 32d710eaf1fc..af4a20b86ee7 100644
cp = can_get_proto(protocol);
}
---
-2.3.6
-
diff --git a/kbuild-AFTER_LINK.patch b/kbuild-AFTER_LINK.patch
index 75f55e20d..2ff2d2626 100644
--- a/kbuild-AFTER_LINK.patch
+++ b/kbuild-AFTER_LINK.patch
@@ -120,6 +120,3 @@ index 86a4fe75f453..161637ed5611 100755
}
---
-2.3.6
-
diff --git a/kernel.spec b/kernel.spec
index 4f728dc07..ff38c9c6b 100644
--- a/kernel.spec
+++ b/kernel.spec
@@ -67,7 +67,7 @@ Summary: The Linux kernel
# The rc snapshot level
%define rcrev 2
# The git snapshot level
-%define gitrev 2
+%define gitrev 3
# Set rpm version accordingly
%define rpmversion 4.%{upstream_sublevel}.0
%endif
@@ -2201,6 +2201,9 @@ fi
#
#
%changelog
+* Thu May 07 2015 Josh Boyer <jwboyer@fedoraproject.org> - 4.1.0-0.rc2.git3.1
+- Linux v4.1-rc2-79-g0e1dc4274828
+
* Wed May 06 2015 Josh Boyer <jwboyer@fedoraproject.org> - 4.1.0-0.rc2.git2.1
- Linux v4.1-rc2-37-g5198b44374ad
diff --git a/kexec-Disable-at-runtime-if-the-kernel-enforces-modu.patch b/kexec-Disable-at-runtime-if-the-kernel-enforces-modu.patch
index d1eb8ebb1..085d0b0be 100644
--- a/kexec-Disable-at-runtime-if-the-kernel-enforces-modu.patch
+++ b/kexec-Disable-at-runtime-if-the-kernel-enforces-modu.patch
@@ -38,6 +38,3 @@ index 7a36fdcca5bf..22d30d7a12b8 100644
* Verify we have a legal set of flags
* This leaves us room for future extensions.
*/
---
-2.3.6
-
diff --git a/lib-cpumask-Make-CPUMASK_OFFSTACK-usable-without-deb.patch b/lib-cpumask-Make-CPUMASK_OFFSTACK-usable-without-deb.patch
index 2d204eb66..738264f0f 100644
--- a/lib-cpumask-Make-CPUMASK_OFFSTACK-usable-without-deb.patch
+++ b/lib-cpumask-Make-CPUMASK_OFFSTACK-usable-without-deb.patch
@@ -32,6 +32,3 @@ index 601965a948e8..028213cf0e4d 100644
help
Use dynamic allocation for cpumask_var_t, instead of putting
them on the stack. This is a bit more expensive, but avoids
---
-2.3.6
-
diff --git a/libata-Blacklist-queued-TRIM-on-all-Samsung-800-seri.patch b/libata-Blacklist-queued-TRIM-on-all-Samsung-800-seri.patch
index 4123f23e0..4a3ce52ae 100644
--- a/libata-Blacklist-queued-TRIM-on-all-Samsung-800-seri.patch
+++ b/libata-Blacklist-queued-TRIM-on-all-Samsung-800-seri.patch
@@ -34,6 +34,3 @@ index f6cb1f1b30b7..4476fb590733 100644
ATA_HORKAGE_ZERO_AFTER_TRIM, },
/*
---
-2.3.6
-
diff --git a/lis3-improve-handling-of-null-rate.patch b/lis3-improve-handling-of-null-rate.patch
index 73bb12bae..e8dd94683 100644
--- a/lis3-improve-handling-of-null-rate.patch
+++ b/lis3-improve-handling-of-null-rate.patch
@@ -73,6 +73,3 @@ index 4739689d23ad..d713074200f3 100644
if (err)
return err;
---
-2.3.6
-
diff --git a/no-pcspkr-modalias.patch b/no-pcspkr-modalias.patch
index 0b4258674..e43cd97eb 100644
--- a/no-pcspkr-modalias.patch
+++ b/no-pcspkr-modalias.patch
@@ -20,6 +20,3 @@ index 72b1fc3ab910..86907eaa4883 100644
static int pcspkr_event(struct input_dev *dev, unsigned int type, unsigned int code, int value)
{
---
-2.3.6
-
diff --git a/pinctrl-pinctrl-single-must-be-initialized-early.patch b/pinctrl-pinctrl-single-must-be-initialized-early.patch
index cdecc0e95..c7e86baef 100644
--- a/pinctrl-pinctrl-single-must-be-initialized-early.patch
+++ b/pinctrl-pinctrl-single-must-be-initialized-early.patch
@@ -32,6 +32,3 @@ index 13b45f297727..f84ce0135c38 100644
MODULE_AUTHOR("Tony Lindgren <tony@atomide.com>");
MODULE_DESCRIPTION("One-register-per-pin type device tree based pinctrl driver");
---
-2.3.6
-
diff --git a/scsi-sd_revalidate_disk-prevent-NULL-ptr-deref.patch b/scsi-sd_revalidate_disk-prevent-NULL-ptr-deref.patch
index 79ecc02e2..b8543ca2e 100644
--- a/scsi-sd_revalidate_disk-prevent-NULL-ptr-deref.patch
+++ b/scsi-sd_revalidate_disk-prevent-NULL-ptr-deref.patch
@@ -32,6 +32,3 @@ index 79beebf53302..eca0b7e0944f 100644
/*
* If the device is offline, don't try and read capacity or any
* of the other niceties.
---
-2.3.6
-
diff --git a/silence-fbcon-logo.patch b/silence-fbcon-logo.patch
index 38e395689..e5549546d 100644
--- a/silence-fbcon-logo.patch
+++ b/silence-fbcon-logo.patch
@@ -50,6 +50,3 @@ index b97210671a81..2d12ad82fe75 100644
fs_initcall(fb_console_init);
#ifdef MODULE
---
-2.3.6
-
diff --git a/sources b/sources
index 4766fca94..491d18b86 100644
--- a/sources
+++ b/sources
@@ -1,4 +1,4 @@
a86916bd12798220da9eb4a1eec3616d linux-4.0.tar.xz
d125eecce68ab6fb5f1f23523c2c04b8 perf-man-4.0.tar.gz
1af1ca2f20db7ebc2a94a786fb6f8e86 patch-4.1-rc2.xz
-4a3c022b0d1df600e9d4a31ebe0d0828 patch-4.1-rc2-git2.xz
+433b3ba53461a9116cf77b23a8877986 patch-4.1-rc2-git3.xz
diff --git a/usb-make-xhci-platform-driver-use-64-bit-or-32-bit-D.patch b/usb-make-xhci-platform-driver-use-64-bit-or-32-bit-D.patch
index c2b1f678c..f02e9b744 100644
--- a/usb-make-xhci-platform-driver-use-64-bit-or-32-bit-D.patch
+++ b/usb-make-xhci-platform-driver-use-64-bit-or-32-bit-D.patch
@@ -38,6 +38,3 @@ index 783e819139a7..4f93ef6942d8 100644
hcd = usb_create_hcd(driver, &pdev->dev, dev_name(&pdev->dev));
if (!hcd)
---
-2.3.6
-
diff --git a/watchdog-Disable-watchdog-on-virtual-machines.patch b/watchdog-Disable-watchdog-on-virtual-machines.patch
index ee57ed6b0..b43454c31 100644
--- a/watchdog-Disable-watchdog-on-virtual-machines.patch
+++ b/watchdog-Disable-watchdog-on-virtual-machines.patch
@@ -73,6 +73,3 @@ index 2316f50b07a4..da39c565a03e 100644
set_sample_period();
if (watchdog_enabled)
---
-2.3.6
-
diff --git a/x86-Lock-down-IO-port-access-when-module-security-is.patch b/x86-Lock-down-IO-port-access-when-module-security-is.patch
index 7f94a7c11..4c1211d43 100644
--- a/x86-Lock-down-IO-port-access-when-module-security-is.patch
+++ b/x86-Lock-down-IO-port-access-when-module-security-is.patch
@@ -65,6 +65,3 @@ index 6b1721f978c2..53fe675f9bd7 100644
if (!access_ok(VERIFY_READ, buf, count))
return -EFAULT;
while (count-- > 0 && i < 65536) {
---
-2.3.6
-
diff --git a/x86-Restrict-MSR-access-when-module-loading-is-restr.patch b/x86-Restrict-MSR-access-when-module-loading-is-restr.patch
index fbeafadad..9053f2aea 100644
--- a/x86-Restrict-MSR-access-when-module-loading-is-restr.patch
+++ b/x86-Restrict-MSR-access-when-module-loading-is-restr.patch
@@ -37,6 +37,3 @@ index 113e70784854..26c2f83fc470 100644
if (copy_from_user(&regs, uregs, sizeof regs)) {
err = -EFAULT;
break;
---
-2.3.6
-
diff --git a/xen-pciback-Don-t-disable-PCI_COMMAND-on-PCI-device-.patch b/xen-pciback-Don-t-disable-PCI_COMMAND-on-PCI-device-.patch
index fd3d7be56..4c55bf2da 100644
--- a/xen-pciback-Don-t-disable-PCI_COMMAND-on-PCI-device-.patch
+++ b/xen-pciback-Don-t-disable-PCI_COMMAND-on-PCI-device-.patch
@@ -46,6 +46,3 @@ index c4a0666de6f5..26e651336787 100644
dev->is_busmaster = 0;
} else {
pci_read_config_word(dev, PCI_COMMAND, &cmd);
---
-2.3.6
-