)]}'
{
  "log": [
    {
      "commit": "c1cc168442a943ed3997f6543db87c061987f9d7",
      "tree": "22a2551593a0cd0d884b37c0789a554d0aa06733",
      "parents": [
        "81065e2f415af6c028eac13f481fb9e60a0b487b"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Aug 23 14:55:32 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Aug 23 14:55:32 2005 -0700"
      },
      "message": "[ROSE]: Fix typo in rose_route_frame() locking fix.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "dc16aaf29d64b8c5e0b88f49a4d541edf5b61e42",
      "tree": "0f1dcf6e5f9f57989d0aca1a565fa56701ed7556",
      "parents": [
        "d5d283751ef3c05b6766501a46800cbee84959d6"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Aug 23 10:50:09 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Aug 23 10:50:09 2005 -0700"
      },
      "message": "[ROSE]: Fix missing unlocks in rose_route_frame()\n\nNoticed by Coverity checker.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d5d283751ef3c05b6766501a46800cbee84959d6",
      "tree": "c8de7a2dbd69efb233f1b051bdfceed7eded379a",
      "parents": [
        "89ebd197eb2cd31d6187db344d5117064e19fdde"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Aug 23 10:49:54 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Aug 23 10:49:54 2005 -0700"
      },
      "message": "[TCP]: Document non-trivial locking path in tcp_v{4,6}_get_port().\n\nThis trips up a lot of folks reading this code.\nPut an unlikely() around the port-exhaustion test\nfor good measure.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "89ebd197eb2cd31d6187db344d5117064e19fdde",
      "tree": "d017e5c04afcd33d99a2bf8554332c5754df8c36",
      "parents": [
        "0fbbeb1ba43bd04f0f1d4f161b7f72437a1c8a03"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Aug 23 10:13:06 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Aug 23 10:13:06 2005 -0700"
      },
      "message": "[TCP]: Unconditionally clear TCP_NAGLE_PUSH in skb_entail().\n\nIntention of this bit is to force pushing of the existing\nsend queue when TCP_CORK or TCP_NODELAY state changes via\nsetsockopt().\n\nBut it\u0027s easy to create a situation where the bit never\nclears.  For example, if the send queue starts empty:\n\n1) set TCP_NODELAY\n2) clear TCP_NODELAY\n3) set TCP_CORK\n4) do small write()\n\nThe current code will leave TCP_NAGLE_PUSH set after that\nsequence.  Unconditionally clearing the bit when new data\nis added via skb_entail() solves the problem.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0fbbeb1ba43bd04f0f1d4f161b7f72437a1c8a03",
      "tree": "80aff375f2b1de10a69743d73977df39f356dda5",
      "parents": [
        "d2287f844187158e5eddd0d5de8e95bd607abcb7"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Tue Aug 23 10:12:44 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Aug 23 10:12:44 2005 -0700"
      },
      "message": "[PKT_SCHED]: Fix missing qdisc_destroy() in qdisc_create_dflt()\n\nqdisc_create_dflt() is missing to destroy the newly allocated\ndefault qdisc if the initialization fails resulting in leaks\nof all kinds. The only caller in mainline which may trigger\nthis bug is sch_tbf.c in tbf_create_dflt_qdisc().\n\nNote: qdisc_create_dflt() doesn\u0027t fulfill the official locking\n      requirements of qdisc_destroy() but since the qdisc could\n      never be seen by the outside world this doesn\u0027t matter\n      and it can stay as-is until the locking of pkt_sched\n      is cleaned up.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d2287f844187158e5eddd0d5de8e95bd607abcb7",
      "tree": "da4adf141052f8b9bea1d331e59bb2143832c679",
      "parents": [
        "01d7dd0e9f8c5f1888619d2649c7da389232b408"
      ],
      "author": {
        "name": "Vlad Yasevich",
        "email": "vladislav.yasevich@hp.com",
        "time": "Tue Aug 23 10:12:04 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Aug 23 10:12:04 2005 -0700"
      },
      "message": "[SCTP]: Add SENTINEL to SCTP MIB stats\n\nAdd SNMP_MIB_SENTINEL to the definition of the sctp_snmp_list so that\nthe output routine in proc correctly terminates.  This was causing some\nproblems running on ia64 systems.\n\nSigned-off-by: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "01d7dd0e9f8c5f1888619d2649c7da389232b408",
      "tree": "ee4f22a33557bae4883eb2f4fb1359e97ac74186",
      "parents": [
        "53b924b31fa53ac3007df3fef6870d5074a9adf8"
      ],
      "author": {
        "name": "Ralf Baechle",
        "email": "ralf@linux-mips.org",
        "time": "Tue Aug 23 10:11:45 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Aug 23 10:11:45 2005 -0700"
      },
      "message": "[AX25]: UID fixes\n\n o Brown paperbag bug - ax25_findbyuid() was always returning a NULL pointer\n   as the result.  Breaks ROSE completly and AX.25 if UID policy set to deny.\n\n o While the list structure of AX.25\u0027s UID to callsign mapping table was\n   properly protected by a spinlock, it\u0027s elements were not refcounted\n   resulting in a race between removal and usage of an element.\n\nSigned-off-by: Ralf Baechle DL5RB \u003cralf@linux-mips.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "53b924b31fa53ac3007df3fef6870d5074a9adf8",
      "tree": "117e7f530fa2aa37751cfd22908cd81253fd08f8",
      "parents": [
        "66a79a19a7c582efd99bb143c3a59fbda006eb39"
      ],
      "author": {
        "name": "Ralf Baechle",
        "email": "ralf@linux-mips.org",
        "time": "Tue Aug 23 10:11:30 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Aug 23 10:11:30 2005 -0700"
      },
      "message": "[NET]: Fix socket bitop damage\n\nThe socket flag cleanups that went into 2.6.12-rc1 are basically oring\nthe flags of an old socket into the socket just being created.\nUnfortunately that one was just initialized by sock_init_data(), so already\nhas SOCK_ZAPPED set.  As the result zapped sockets are created and all\nincoming connection will fail due to this bug which again was carefully\nreplicated to at least AX.25, NET/ROM or ROSE.\n\nIn order to keep the abstraction alive I\u0027ve introduced sock_copy_flags()\nto copy the socket flags from one sockets to another and used that\ninstead of the bitwise copy thing.  Anyway, the idea here has probably\nbeen to copy all flags, so sock_copy_flags() should be the right thing.\nWith this the ham radio protocols are usable again, so I hope this will\nmake it into 2.6.13.\n\nSigned-off-by: Ralf Baechle DL5RB \u003cralf@linux-mips.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "66a79a19a7c582efd99bb143c3a59fbda006eb39",
      "tree": "615163e271e256063ede49f73ae01e8abb39ed72",
      "parents": [
        "1344a41637114485fac7afa1505bce2ff862807a"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Tue Aug 23 10:10:35 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Aug 23 10:10:35 2005 -0700"
      },
      "message": "[NETFILTER]: Fix HW checksum handling in ip_queue/ip6_queue\n\nThe checksum needs to be filled in on output, after mangling a packet\nip_summed needs to be reset.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1344a41637114485fac7afa1505bce2ff862807a",
      "tree": "cf8f84bee2b6e23a17e97beef53791a698256f77",
      "parents": [
        "c3a20692ca5c8eb8cf5d0f489d4fc839ce7593d1"
      ],
      "author": {
        "name": "Dave Johnson",
        "email": "djohnson+linux-kernel@sw.starentnetworks.com",
        "time": "Tue Aug 23 10:10:15 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Aug 23 10:10:15 2005 -0700"
      },
      "message": "[IPV4]: Fix negative timer loop with lots of ipv4 peers.\n\nFrom: Dave Johnson \u003cdjohnson+linux-kernel@sw.starentnetworks.com\u003e\n\nFound this bug while doing some scaling testing that created 500K inet\npeers.\n\npeer_check_expire() in net/ipv4/inetpeer.c isn\u0027t using inet_peer_gc_mintime\ncorrectly and will end up creating an expire timer with less than the\nminimum duration, and even zero/negative if enough active peers are\npresent.\n\nIf \u003e65K peers, the timer will be less than inet_peer_gc_mintime, and with\n\u003e70K peers, the timer duration will reach zero and go negative.\n\nThe timer handler will continue to schedule another zero/negative timer in\na loop until peers can be aged.  This can continue for at least a few\nminutes or even longer if the peers remain active due to arriving packets\nwhile the loop is occurring.\n\nBug is present in both 2.4 and 2.6.  Same patch will apply to both just\nfine.\n\nSigned-off-by: Andrew Morton \u003cakpm@osdl.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c3a20692ca5c8eb8cf5d0f489d4fc839ce7593d1",
      "tree": "61c7cde232f4d241489fba3bd5386ceaefd223ac",
      "parents": [
        "14869c388673e8db3348ab3706fa6485d0f0cf95"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Aug 23 10:09:53 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Aug 23 10:09:53 2005 -0700"
      },
      "message": "[RPC]: Kill bogus kmap in krb5\n\nWhile I was going through the crypto users recently, I noticed this\nbogus kmap in sunrpc.  It\u0027s totally unnecessary since the crypto\nlayer will do its own kmap before touching the data.  Besides, the\nkmap is throwing the return value away.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "14869c388673e8db3348ab3706fa6485d0f0cf95",
      "tree": "fa5de8895166ae31371264544027941d469044f9",
      "parents": [
        "f6fdd7d9c273bb2a20ab467cb57067494f932fa3"
      ],
      "author": {
        "name": "Dmitry Yusupov",
        "email": "dima@neterion.com",
        "time": "Tue Aug 23 10:09:27 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Aug 23 10:09:27 2005 -0700"
      },
      "message": "[TCP]: Do TSO deferral even if tail SKB can go out now.\n\nIf the tail SKB fits into the window, it is still\nbenefitical to defer until the goal percentage of\nthe window is available.  This give the application\ntime to feed more data into the send queue and thus\nresults in larger TSO frames going out.\n\nPatch from Dmitry Yusupov \u003cdima@neterion.com\u003e.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7e71af49d46e4c25f17a2c8f53d62ffd14f01007",
      "tree": "a7724eb37fff88f707ebd3e59cc86b8e2b582f4e",
      "parents": [
        "f93592ff4fa4a55aa7640d435fa93338e190294d"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Sat Aug 20 17:40:41 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Aug 20 17:40:41 2005 -0700"
      },
      "message": "[NETFILTER]: Fix HW checksum handling in TCPMSS target\n\nMost importantly, remove bogus BUG() in receive path.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f93592ff4fa4a55aa7640d435fa93338e190294d",
      "tree": "42ea51265582ba2b38089fd347cf3e16cfea7538",
      "parents": [
        "fd841326d73096ad79be9c3fa348f9ad04541cc2"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Sat Aug 20 17:39:15 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Aug 20 17:39:15 2005 -0700"
      },
      "message": "[NETFILTER]: Fix HW checksum handling in ECN target\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "fd841326d73096ad79be9c3fa348f9ad04541cc2",
      "tree": "59a340d83e8381a249e379b70a26729fb8482825",
      "parents": [
        "a5ea169c9581553662bb79a1c8c98fed1ee84246"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Sat Aug 20 17:38:40 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Aug 20 17:38:40 2005 -0700"
      },
      "message": "[NETFILTER]: Fix ECN target TCP marking\n\nAn incorrect check made it bail out before doing anything.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6fc8b9e7c60d4a3d4d7f1189f74e37651f5610e6",
      "tree": "e0a28a510f7655fa180f48caee683d2532ef7f75",
      "parents": [
        "cb94c62c252796f42bb83fe40960d12f3ea5a82a"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Thu Aug 18 14:36:59 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Aug 18 14:36:59 2005 -0700"
      },
      "message": "[IPCOMP]: Fix false smp_processor_id warning\n\nThis patch fixes a false-positive from debug_smp_processor_id().\n\nThe processor ID is only used to look up crypto_tfm objects.\nAny processor ID is acceptable here as long as it is one that is\niterated on by for_each_cpu().\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "cb94c62c252796f42bb83fe40960d12f3ea5a82a",
      "tree": "926fce041eb9983d37c5322ae5a13619a32087f9",
      "parents": [
        "22783649568a28839c5a362f47da7819ecfcbb9f"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Thu Aug 18 14:05:44 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Aug 18 14:05:44 2005 -0700"
      },
      "message": "[IPV4]: Fix DST leak in icmp_push_reply()\n\nBased upon a bug report and initial patch by\nOllie Wild.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "001dd250c1c68667a5c3b74979fa614e2edc9ceb",
      "tree": "95bafd6d3dbd0f7ca8bc0c41c2046a002e7c7660",
      "parents": [
        "6be382ea0c767a81be0e7980400b9b18167b3261"
      ],
      "author": {
        "name": "Jay Vosburgh",
        "email": "fubar@us.ibm.com",
        "time": "Thu Aug 18 14:04:51 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Aug 18 14:04:51 2005 -0700"
      },
      "message": "[TOKENRING]: Use interrupt-safe locking with rif_lock.\n\nChange operations on rif_lock from spin_{un}lock_bh to\nspin_{un}lock_irq{save,restore} equivalents.  Some of the\nrif_lock critical sections are called from interrupt context via\ntr_type_trans-\u003etr_add_rif_info.  The TR NIC drivers call tr_type_trans\nfrom their packet receive handlers.\n\nSigned-off-by: Jay Vosburgh \u003cfubar@us.ibm.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1f07247de51efd30c88ad8e3e06a8b5382fc7d35",
      "tree": "2d9066246fe198746762a609ac147a42fae0d4a6",
      "parents": [
        "bfd272b1ca1164382eabaa9986aad822adb91eb2"
      ],
      "author": {
        "name": "Paul E. McKenney",
        "email": "paulmck@us.ibm.com",
        "time": "Wed Aug 17 12:05:27 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Aug 17 12:05:27 2005 -0700"
      },
      "message": "[DECNET]: Fix RCU race condition in dn_neigh_construct().\n\nSigned-off-by: Paul E. McKenney \u003cpaulmck@us.ibm.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n\n"
    },
    {
      "commit": "bfd272b1ca1164382eabaa9986aad822adb91eb2",
      "tree": "1977975176717950d6389f41cc92832111e175ae",
      "parents": [
        "35d59efd105b3b7c1b5878dcc9d1749f41f9740f"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Wed Aug 17 12:04:22 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Aug 17 12:04:22 2005 -0700"
      },
      "message": "[IPV6]: Fix SKB leak in ip6_input_finish()\n\nChanging it to how ip_input handles should fix it.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "35d59efd105b3b7c1b5878dcc9d1749f41f9740f",
      "tree": "e96a9edb2df5b06e8ba59f0f8f685b0c1f09f840",
      "parents": [
        "97077c4a9868fce8ac151512cde5d24fc1144f24"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Aug 17 12:03:59 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Aug 17 12:03:59 2005 -0700"
      },
      "message": "[TCP]: Fix bug #5070: kernel BUG at net/ipv4/tcp_output.c:864\n\n1) We send out a normal sized packet with TSO on to start off.\n2) ICMP is received indicating a smaller MTU.\n3) We send the current sk_send_head which needs to be fragmented\nsince it was created before the ICMP event.  The first fragment\nis then sent out.\n\nAt this point the remaining fragment is allocated by tcp_fragment.\nHowever, its size is padded to fit the L1 cache-line size therefore\ncreating tail-room up to 124 bytes long.\n\nThis fragment will also be sitting at sk_send_head.\n\n4) tcp_sendmsg is called again and it stores data in the tail-room of\nof the fragment.\n5) tcp_push_one is called by tcp_sendmsg which then calls tso_fragment\nsince the packet as a whole exceeds the MTU.\n\nAt this point we have a packet that has data in the head area being\nfed to tso_fragment which bombs out.\n\nMy take on this is that we shouldn\u0027t ever call tcp_fragment on a TSO\nsocket for a packet that is yet to be transmitted since this creates\na packet on sk_send_head that cannot be extended.\n\nSo here is a patch to change it so that tso_fragment is always used\nin this case.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "97077c4a9868fce8ac151512cde5d24fc1144f24",
      "tree": "600484f09f59126988fb153287bad7a27a511931",
      "parents": [
        "2ad56496627630ebc99f06af5f81ca23e17e014e"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Wed Aug 17 12:03:32 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Aug 17 12:03:32 2005 -0700"
      },
      "message": "[IPV6]: Fix raw socket hardware checksum failures\n\nWhen packets hit raw sockets the csum update isn\u0027t done yet, do it manually.\nPackets can also reach rawv6_rcv on the output path through\nip6_call_ra_chain, in this case skb-\u003eip_summed is CHECKSUM_NONE and this\ncodepath isn\u0027t executed.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "58fcb8df0bf663bb6b8f46cd3010bfe8d13d97cf",
      "tree": "24edbecfb5875cf6c602b1fd5126c7dfce9ae127",
      "parents": [
        "75cd968ab251ac84dd3a5dc252af7036dc4a64f4"
      ],
      "author": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Wed Aug 10 18:15:12 2005 -0400"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@g5.osdl.org",
        "time": "Tue Aug 16 08:52:11 2005 -0700"
      },
      "message": "[PATCH] NFS: Ensure ACL xdr code doesn\u0027t overflow.\n\nSigned-off-by: Trond Myklebust \u003cTrond.Myklebust@netapp.com\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@osdl.org\u003e\n"
    },
    {
      "commit": "d7b9dfc8ea43936e6e8eec3040dcf4f110563868",
      "tree": "fb2bf6e88cab914fb1f11d4143bb72dd953d35a8",
      "parents": [
        "53fb95d3c14290fd6ee808b221e35493f096246f"
      ],
      "author": {
        "name": "Matt Mackall",
        "email": "mpm@selenic.com",
        "time": "Thu Aug 11 19:28:05 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Aug 11 19:28:05 2005 -0700"
      },
      "message": "[NETPOLL]: remove unused variable\n\nRemove unused variable\n\nSigned-off-by: Matt Mackall \u003cmpm@selenic.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "53fb95d3c14290fd6ee808b221e35493f096246f",
      "tree": "146c31c79bbc66d8fde3afa5ae37a04b63041eba",
      "parents": [
        "2652076507b662fc88ba16c27b59c7bdd9ccd956"
      ],
      "author": {
        "name": "Matt Mackall",
        "email": "mpm@selenic.com",
        "time": "Thu Aug 11 19:27:43 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Aug 11 19:27:43 2005 -0700"
      },
      "message": "[NETPOLL]: fix initialization/NAPI race\n\nThis fixes a race during initialization with the NAPI softirq\nprocessing by using an RCU approach.\n\nThis race was discovered when refill_skbs() was added to\nthe setup code.\n\nSigned-off-by: Matt Mackall \u003cmpm@selenic.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2652076507b662fc88ba16c27b59c7bdd9ccd956",
      "tree": "dff28a2168431921a607062f56faebe9fd1b0fd0",
      "parents": [
        "0db1d6fc1ea051af49ebe03c503d23996a7c5bbb"
      ],
      "author": {
        "name": "Ingo Molnar",
        "email": "mingo@elte.hu",
        "time": "Thu Aug 11 19:26:42 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Aug 11 19:26:42 2005 -0700"
      },
      "message": "[NETPOLL]: pre-fill skb pool\n\nwe could do one thing (see the patch below): i think it would be useful \nto fill up the netlogging skb queue straight at initialization time.  \nEspecially if netpoll is used for dumping alone, the system might not be \nin a situation to fill up the queue at the point of crash, so better be \na bit more prepared and keep the pipeline filled.\n\n[ I\u0027ve modified this to be called earlier - mpm ]\n\nSigned-off-by: Ingo Molnar \u003cmingo@elte.hu\u003e\nSigned-off-by: Matt Mackall \u003cmpm@selenic.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0db1d6fc1ea051af49ebe03c503d23996a7c5bbb",
      "tree": "6afab02002a46b045a3b8769342ad277402f0d95",
      "parents": [
        "f0d3459d0722782c7d9d0e35a1ed0815e75fcde5"
      ],
      "author": {
        "name": "Matt Mackall",
        "email": "mpm@selenic.com",
        "time": "Thu Aug 11 19:25:54 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Aug 11 19:25:54 2005 -0700"
      },
      "message": "[NETPOLL]: add retry timeout\n\nAdd limited retry logic to netpoll_send_skb\n\nEach time we attempt to send, decrement our per-device retry counter.\nOn every successful send, we reset the counter. \n\nWe delay 50us between attempts with up to 20000 retries for a total of\n1 second. After we\u0027ve exhausted our retries, subsequent failed\nattempts will try only once until reset by success.\n\nSigned-off-by: Matt Mackall \u003cmpm@selenic.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f0d3459d0722782c7d9d0e35a1ed0815e75fcde5",
      "tree": "84c07d42090b81705d23103bda29b0c186fffa49",
      "parents": [
        "6b0b31572985c2e64f7216c798766302fb782281"
      ],
      "author": {
        "name": "Matt Mackall",
        "email": "mpm@selenic.com",
        "time": "Thu Aug 11 19:25:11 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Aug 11 19:25:11 2005 -0700"
      },
      "message": "[NETPOLL]: netpoll_send_skb simplify\n\nMinor netpoll_send_skb restructuring\n\nRestructure to avoid confusing goto and move some bits out of the\nretry loop.\n\nSigned-off-by: Matt Mackall \u003cmpm@selenic.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a636e1357911afdea7c8344ee65f78d36caf3c16",
      "tree": "644495567b6a66d29116e0831a96198d82d788e9",
      "parents": [
        "11513128bb66b0b09d5d0df069b58afdb01752a2"
      ],
      "author": {
        "name": "Jeff Moyer",
        "email": "jmoyer@redhat.com",
        "time": "Thu Aug 11 19:23:50 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Aug 11 19:23:50 2005 -0700"
      },
      "message": "[NETPOLL]: deadlock bugfix\n\nThis fixes an obvious deadlock in the netpoll code.  netpoll_rx takes the\nnpinfo-\u003erx_lock.  netpoll_rx is also the only caller of arp_reply (through\n__netpoll_rx).  As such, it is not necessary to take this lock.\n\nSigned-off-by: Jeff Moyer \u003cjmoyer@redhat.com\u003e\nSigned-off-by: Matt Mackall \u003cmpm@selenic.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "11513128bb66b0b09d5d0df069b58afdb01752a2",
      "tree": "2c6cb83eb623e7e0ac997f8cb21c0998fe082b2e",
      "parents": [
        "a0d3bea3cf6c7c1b53a46432bd490b5dc784ca42"
      ],
      "author": {
        "name": "Jeff Moyer",
        "email": "jmoyer@redhat.com",
        "time": "Thu Aug 11 19:23:04 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Aug 11 19:23:04 2005 -0700"
      },
      "message": "[NETPOLL]: rx_flags bugfix\n\nInitialize npinfo-\u003erx_flags.  The way it stands now, this will have random\ngarbage, and so will incur a locking penalty even when an rx_hook isn\u0027t\nregistered and we are not active in the netpoll polling code.\n\nSigned-off-by: Jeff Moyer \u003cjmoyer@redhat.com\u003e\nSigned-off-by: Matt Mackall \u003cmpm@selenic.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b5da623ae9be680ea59f268eeb339f0acb2d88c4",
      "tree": "b41844950a11240000d74fb65ce9c4ea82ef2a17",
      "parents": [
        "bc68552faad0e134eb22281343d5ae5a4873fa80"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Aug 10 18:32:36 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Aug 10 18:32:36 2005 -0700"
      },
      "message": "[TCP]: Adjust {p,f}ackets_out correctly in tcp_retransmit_skb()\n\nWell I\u0027ve only found one potential cause for the assertion\nfailure in tcp_mark_head_lost.  First of all, this can only\noccur if cnt \u003e 1 since tp-\u003epackets_out is never zero here.\nIf it did hit zero we\u0027d have much bigger problems.\n\nSo cnt is equal to fackets_out - reordering.  Normally\nfackets_out is less than packets_out.  The only reason\nI\u0027ve found that might cause fackets_out to exceed packets_out\nis if tcp_fragment is called from tcp_retransmit_skb with a\nTSO skb and the current MSS is greater than the MSS stored\nin the TSO skb.  This might occur as the result of an expiring\ndst entry.\n\nIn that case, packets_out may decrease (line 1380-1381 in\ntcp_output.c).  However, fackets_out is unchanged which means\nthat it may in fact exceed packets_out.\n\nPreviously tcp_retrans_try_collapse was the only place where\npackets_out can go down and it takes care of this by decrementing\nfackets_out.\n\nSo we should make sure that fackets_out is reduced by an appropriate\namount here as well.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "001ab02a8c04f0b4dc773c474da698ad7405ae68",
      "tree": "760d373edc5603ff3e3b05d274236e35bffdebdd",
      "parents": [
        "86b3786078d63242d3194ffc58ae8dae1d1bbef3"
      ],
      "author": {
        "name": "Steven Whitehouse",
        "email": "steve@chygwyn.com",
        "time": "Wed Aug 10 11:32:57 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Aug 10 11:32:57 2005 -0700"
      },
      "message": "[DECNET]: Use sk_stream_error function rather than DECnet\u0027s own\n\nSigned-off-by: Steven Whitehouse \u003csteve@chygwyn.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d64d3873721cfe870d49d73c3744f06260779ce7",
      "tree": "b49a930e65ed4f30b4f8f2aac4ddb08c41bc4b79",
      "parents": [
        "3501466941347f0e1992b2672affb3feb92925fd"
      ],
      "author": {
        "name": "Andrew Morton",
        "email": "akpm@osdl.org",
        "time": "Tue Aug 09 15:29:19 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Aug 09 15:29:19 2005 -0700"
      },
      "message": "[NET]: Fix memory leak in sys_{send,recv}msg() w/compat\n\nFrom: Dave Johnson \u003cdjohnson+linux-kernel@sw.starentnetworks.com\u003e\n\nsendmsg()/recvmsg() syscalls from o32/n32 apps to a 64bit kernel will\ncause a kernel memory leak if iov_len \u003e UIO_FASTIOV for each syscall!\n\nThis is because both sys_sendmsg() and verify_compat_iovec() kmalloc a\nnew iovec structure.  Only the one from sys_sendmsg() is free\u0027ed.\n\nI wrote a simple test program to confirm this after identifying the\nproblem:\n\nhttp://davej.org/programs/testsendmsg.c\n\nNote that the below fix will break solaris_sendmsg()/solaris_recvmsg() as\nit also calls verify_compat_iovec() but expects it to malloc internally.\n\n[ I fixed that. -DaveM ]\n\nSigned-off-by: Andrew Morton \u003cakpm@osdl.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3501466941347f0e1992b2672affb3feb92925fd",
      "tree": "4db1741d4400b704609d495c68728c962ea3982a",
      "parents": [
        "00dd1e433967872f3997a45d5adf35056fdf2f56"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Aug 09 14:57:12 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Aug 09 14:57:12 2005 -0700"
      },
      "message": "[SUNRPC]: Fix nsec --\u003e usec conversion.\n\nWe need to divide, not multiply.  While we\u0027re here,\nuse NSEC_PER_USEC instead of a magic constant.\n\nBased upon a report from Josip Loncaric and a patch\nby Andrew Morton.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "92e52b2e82bec10a70744d4a2b04e0ff2dfe2c98",
      "tree": "74a41755d00b908b6e6e31a69ba77774558bf26f",
      "parents": [
        "03c6b749b364fe7b8e47ed8e1ce26baca167c322",
        "ca9334523c853e407da7b3a0bd02f54d0fa59414"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@g5.osdl.org",
        "time": "Mon Aug 08 16:06:01 2005 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@g5.osdl.org",
        "time": "Mon Aug 08 16:06:01 2005 -0700"
      },
      "message": "Merge master.kernel.org:/pub/scm/linux/kernel/git/davem/net-2.6\n"
    },
    {
      "commit": "ca9334523c853e407da7b3a0bd02f54d0fa59414",
      "tree": "3c4f8050d9bc0e062038c1f7e22722e0e6447bfc",
      "parents": [
        "4d479e40e1748a877a24015fc6727b27b77110cd"
      ],
      "author": {
        "name": "Heikki Orsila",
        "email": "heikki.orsila@iki.fi",
        "time": "Mon Aug 08 14:26:52 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Aug 08 14:26:52 2005 -0700"
      },
      "message": "[IPV4]: Debug cleanup\n\nHere\u0027s a small patch to cleanup NETDEBUG() use in net/ipv4/ for Linux \nkernel 2.6.13-rc5. Also weird use of indentation is changed in some\nplaces.\n\nSigned-off-by: Heikki Orsila \u003cheikki.orsila@iki.fi\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8b83bc77bf77cc8459cb94e52b08e775104c4c48",
      "tree": "89f84bdd6a13763882636913852c6ce2eaea199c",
      "parents": [
        "48de5beeb0ee821859c79ba5b9462654604d8bf3"
      ],
      "author": {
        "name": "Harald Welte",
        "email": "laforge@netfilter.org",
        "time": "Mon Aug 08 11:50:55 2005 +0200"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@g5.osdl.org",
        "time": "Mon Aug 08 11:48:28 2005 -0700"
      },
      "message": "[PATCH] don\u0027t try to do any NAT on untracked connections\n\nWith the introduction of \u0027rustynat\u0027 in 2.6.11, the old tricks of preventing\nNAT of \u0027untracked\u0027 connections (e.g. NOTRACK target in \u0027raw\u0027 table) are no\nlonger sufficient.\n\nThe ip_conntrack_untracked.status |\u003d IPS_NAT_DONE_MASK effectively\nprevents iteration of the \u0027nat\u0027 table, but doesn\u0027t prevent nat_packet()\nto be executed.  Since nr_manips is gone in \u0027rustynat\u0027, nat_packet() now\nimplicitly thinks that it has to do NAT on the packet.\n\nThis patch fixes that problem by explicitly checking for\nip_conntrack_untracked in ip_nat_fn().\n\nSigned-off-by: Harald Welte \u003claforge@netfilter.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@osdl.org\u003e\n"
    },
    {
      "commit": "6fc0b4a7a73a81e74d0004732df358f4f9975be2",
      "tree": "ac2c68e206efbfe378728a50be30ef0bccd0cdff",
      "parents": [
        "534afb90a9cd0b9643f62d660c164e1d924f39cf"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sat Aug 06 06:33:15 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Aug 06 06:33:15 2005 -0700"
      },
      "message": "[IPSEC]: Restrict socket policy loading to CAP_NET_ADMIN.\n\nThe interface needs much redesigning if we wish to allow\nnormal users to do this in some way.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "576c7d858f36cab6110b29db7b53964d5132cf30",
      "tree": "0a1241104c7a52323425a3f6930163340e2d0829",
      "parents": [
        "66e8b6c31b9254243afaac8af4135e84e11dd38e"
      ],
      "author": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Sat Aug 06 12:36:54 2005 +0200"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Sat Aug 06 12:36:54 2005 +0200"
      },
      "message": "[Bluetooth] Add direction and timestamp to stack internal events\n\nThis patch changes the direction to incoming and adds the timestamp\nto all stack internal events.\n\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "66e8b6c31b9254243afaac8af4135e84e11dd38e",
      "tree": "cf25ee6d3b555a246be9bf8b783d3a92325cf5d9",
      "parents": [
        "e9a3e671c09d419f29710d8620ed916d3bf7d7ab"
      ],
      "author": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Sat Aug 06 12:36:51 2005 +0200"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Sat Aug 06 12:36:51 2005 +0200"
      },
      "message": "[Bluetooth] Remove unused functions and cleanup symbol exports\n\nThis patch removes the unused bt_dump() function and it also removes\nits BT_DMP macro. It also unexports the hci_dev_get(), hci_send_cmd()\nand hci_si_event() functions.\n\nSigned-off-by: Adrian Bunk \u003cbunk@stusta.de\u003e\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "dcc365d8f28d6a2332fa37e64d669858a8d017e8",
      "tree": "45872ffc48be8319a88259cfcef86605a1f94a4e",
      "parents": [
        "cad0f6270c0bae5bcae6af3c7ac7bd3ae5d9b618"
      ],
      "author": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Sat Aug 06 12:36:42 2005 +0200"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Sat Aug 06 12:36:42 2005 +0200"
      },
      "message": "[Bluetooth] Revert session reference counting fix\n\nThe fix for the reference counting problem of the signal DLC introduced\na race condition which leads to an oops. The reason for it is not fully\nunderstood by now and so revert this fix, because the reference counting\nproblem is not crashing the RFCOMM layer and its appearance it rare.\n\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "b7656e7f2944984befa3ab99a5b99f99a23b302b",
      "tree": "bd7281aac296d0d0f7eac7989726f540318236fc",
      "parents": [
        "2f60f8d3573ff90fe5d75a6d11fd2add1248e7d6"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Aug 05 04:12:48 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Aug 05 04:12:48 2005 -0700"
      },
      "message": "[IPV4]: Fix memory leak during fib_info hash expansion.\n\nWhen we grow the tables, we forget to free the olds ones\nup.\n\nNoticed by Yan Zheng.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b68e9f857271189bd7a59b74c99890de9195b0e1",
      "tree": "92ef0899ca9ff07f64458febcb7ab8095e891042",
      "parents": [
        "846998ae87a80b0fd45b4cf5cf001a159d746f27"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Thu Aug 04 19:52:02 2005 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@g5.osdl.org",
        "time": "Thu Aug 04 21:43:14 2005 -0700"
      },
      "message": "[PATCH] tcp: fix TSO cwnd caching bug\n\ntcp_write_xmit caches the cwnd value indirectly in cwnd_quota.  When\ntcp_transmit_skb reduces the cwnd because of tcp_enter_cwr, the cached\nvalue becomes invalid.\n\nThis patch ensures that the cwnd value is always reread after each\ntcp_transmit_skb call.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nCc: \"David S. Miller\" \u003cdavem@davemloft.net\u003e\nSigned-off-by: Andrew Morton \u003cakpm@osdl.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@osdl.org\u003e\n"
    },
    {
      "commit": "846998ae87a80b0fd45b4cf5cf001a159d746f27",
      "tree": "a81d0f6d2b1f1817d557bd5f5611c81ff9026b51",
      "parents": [
        "0c3dba1534569734ba353afdf3f11def497ff2ac"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Aug 04 19:52:01 2005 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@g5.osdl.org",
        "time": "Thu Aug 04 21:43:14 2005 -0700"
      },
      "message": "[PATCH] tcp: fix TSO sizing bugs\n\nMSS changes can be lost since we preemptively initialize the tso_segs count\nfor an SKB before we %100 commit to sending it out.\n\nSo, by the time we send it out, the tso_size information can be stale due\nto PMTU events.  This mucks up all of the logic in our send engine, and can\neven result in the BUG() triggering in tcp_tso_should_defer().\n\nAnother problem we have is that we\u0027re storing the tp-\u003emss_cache, not the\nSACK block normalized MSS, as the tso_size.  That\u0027s wrong too.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nCc: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: Andrew Morton \u003cakpm@osdl.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@osdl.org\u003e\n"
    },
    {
      "commit": "f0098f7863f814a5adc0b9cb271605d063cad7fa",
      "tree": "7477022770edd99422586372147e9b0f48de4c63",
      "parents": [
        "db44575f6fd55df6ff67ddd21f7ad5be5a741136"
      ],
      "author": {
        "name": "Denis Lunev",
        "email": "den@sw.ru",
        "time": "Sat Jul 30 17:47:25 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jul 30 17:47:25 2005 -0700"
      },
      "message": "[NET] Fix too aggressive backoff in dst garbage collection\n\nThe bug is evident when it is seen once. dst gc timer was backed off,\nwhen gc queue is not empty. But this means that timer quickly backs off,\nif at least one destination remains in use. Normally, the bug is invisible,\nbecause adding new dst entry to queue cancels the backoff. But it shots\ndeadly with destination cache overflow when new destinations are not released\nfor long time f.e. after an interface goes down.\n\nThe fix is to cancel backoff when something was released.\n\nSigned-off-by: Denis Lunev \u003cden@sw.ru\u003e\nSigned-off-by: Alexey Kuznetsov \u003ckuznet@ms2.inr.ac.ru\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "db44575f6fd55df6ff67ddd21f7ad5be5a741136",
      "tree": "3282b763dbc363202a328c473c47a8cad954687e",
      "parents": [
        "1f494c0e040b001cf844280910d04ba7ebdc2898"
      ],
      "author": {
        "name": "Alexey Kuznetsov",
        "email": "kuznet@ms2.inr.ac.ru",
        "time": "Sat Jul 30 17:46:44 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jul 30 17:46:44 2005 -0700"
      },
      "message": "[NET]: fix oops after tunnel module unload\n\nTunnel modules used to obtain module refcount each time when\nsome tunnel was created, which meaned that tunnel could be unloaded\nonly after all the tunnels are deleted.\n\nSince killing old MOD_*_USE_COUNT macros this protection has gone.\nIt is possible to return it back as module_get/put, but it looks\nmore natural and practically useful to force destruction of all\nthe child tunnels on module unload.\n\nSigned-off-by: Alexey Kuznetsov \u003ckuznet@ms2.inr.ac.ru\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1f494c0e040b001cf844280910d04ba7ebdc2898",
      "tree": "d7c6a20d5c37fbf90595e81a48688771225f8b0f",
      "parents": [
        "d1b04c081e3fb0a08ac108737e4efa9f4830c916"
      ],
      "author": {
        "name": "Harald Welte",
        "email": "laforge@netfilter.org",
        "time": "Sat Jul 30 17:44:07 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jul 30 17:44:07 2005 -0700"
      },
      "message": "[NETFILTER] Inherit masq_index to slave connections\n\nmasq_index is used for cleanup in case the interface address changes\n(such as a dialup ppp link with dynamic addreses).  Without this patch,\nslave connections are not evicted in such a case, since they don\u0027t inherit\nmasq_index.\n\nSigned-off-by: Harald Welte \u003claforge@netfilter.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d1b04c081e3fb0a08ac108737e4efa9f4830c916",
      "tree": "b45fe692feee1bdd713bf07eec7aeaf648fa80b8",
      "parents": [
        "889371f61fd5bb914d0331268f12432590cf7e85"
      ],
      "author": {
        "name": "Baruch Even",
        "email": "baruch@ev-en.org",
        "time": "Sat Jul 30 17:41:59 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jul 30 17:41:59 2005 -0700"
      },
      "message": "[NET]: Spelling mistakes threshoulds -\u003e thresholds\n\nJust simple spelling mistake fixes.\n\nSigned-Off-By: Baruch Even \u003cbaruch@ev-en.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6192b54b845ed05cb838f86ca588cc625c703a09",
      "tree": "b78a56cb70fe36f145821ac3c699abf3dc627256",
      "parents": [
        "2ac6608c41f8c45371ea9dddae7f99bc2c15d5cf"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jul 28 12:12:58 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jul 28 12:12:58 2005 -0700"
      },
      "message": "[NET]: Fix busy waiting in dev_close().\n\nIf the current task has signal_pending(), the loop we have\nto wait for the __LINK_STATE_RX_SCHED bit to clear becomes\na pure busy-loop.\n\nFixed by using msleep() instead of the hand-crafted version.\n\nNoticed by Andrew Morton.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "839c5d2511fadc35cc4e8a8ffa833d76668700b2",
      "tree": "8c5150c50dba619ec88818e1610263582d476217",
      "parents": [
        "96fad28a781069eb40156f78b8f50c349805b652",
        "5e43db7730e7cef7d37968ea789c41392519a864"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@g5.osdl.org",
        "time": "Wed Jul 27 16:37:59 2005 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@g5.osdl.org",
        "time": "Wed Jul 27 16:37:59 2005 -0700"
      },
      "message": "Merge master.kernel.org:/pub/scm/linux/kernel/git/davem/net-2.6\n"
    },
    {
      "commit": "77933d7276ee8fa0e2947641941a6f7a100a327b",
      "tree": "e3a42724642410f5257c794a71b34642092eedd5",
      "parents": [
        "03e259a9cdbd0583e71468293aaa1ccadbdaeff1"
      ],
      "author": {
        "name": "Jesper Juhl",
        "email": "juhl@dif.dk",
        "time": "Wed Jul 27 11:46:09 2005 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@g5.osdl.org",
        "time": "Wed Jul 27 16:26:20 2005 -0700"
      },
      "message": "[PATCH] clean up inline static vs static inline\n\n`gcc -W\u0027 likes to complain if the static keyword is not at the beginning of\nthe declaration.  This patch fixes all remaining occurrences of \"inline\nstatic\" up with \"static inline\" in the entire kernel tree (140 occurrences in\n47 files).\n\nWhile making this change I came across a few lines with trailing whitespace\nthat I also fixed up, I have also added or removed a blank line or two here\nand there, but there are no functional changes in the patch.\n\nSigned-off-by: Jesper Juhl \u003cjuhl-lkml@dif.dk\u003e\nSigned-off-by: Andrew Morton \u003cakpm@osdl.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@osdl.org\u003e\n"
    },
    {
      "commit": "44456d37b59d8e541936ed26d8b6e08d27e88ac1",
      "tree": "11ca6fa29b8cfb56ecef2d1f4f9dc2d9d71d2a2f",
      "parents": [
        "02b775696fee75a04041d8d94db26a9462216d24"
      ],
      "author": {
        "name": "Olaf Hering",
        "email": "olh@suse.de",
        "time": "Wed Jul 27 11:45:17 2005 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@g5.osdl.org",
        "time": "Wed Jul 27 16:26:08 2005 -0700"
      },
      "message": "[PATCH] turn many #if $undefined_string into #ifdef $undefined_string\n\nturn many #if $undefined_string into #ifdef $undefined_string to fix some\nwarnings after -Wno-def was added to global CFLAGS\n\nSigned-off-by: Olaf Hering \u003colh@suse.de\u003e\nSigned-off-by: Andrew Morton \u003cakpm@osdl.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@osdl.org\u003e\n"
    },
    {
      "commit": "5e43db7730e7cef7d37968ea789c41392519a864",
      "tree": "fc62684947bba192c649af7701ba85e2eedaabe5",
      "parents": [
        "7cee432a22bb328ea7a4012dacc5a3471fabeb07"
      ],
      "author": {
        "name": "Matt Mackall",
        "email": "mpm@selenic.com",
        "time": "Wed Jul 27 15:24:42 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jul 27 15:24:42 2005 -0700"
      },
      "message": "[NET]: Move in_aton from net/ipv4/utils.c to net/core/utils.c\n\nMove in_aton to allow netpoll and pktgen to work without the rest of\nthe IPv4 stack. Fix whitespace and add comment for the odd placement.\n\nDelete now-empty net/ipv4/utils.c\n\nRe-enable netpoll/netconsole without CONFIG_INET\n\nSigned-off-by: Matt Mackall \u003cmpm@selenic.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7cee432a22bb328ea7a4012dacc5a3471fabeb07",
      "tree": "afa3905fe3a110b5baf8e47e3aabdb0faaadb8be",
      "parents": [
        "a77be819f94fc55627ee257f496198ad703aaad4"
      ],
      "author": {
        "name": "Nick Sillik",
        "email": "n.sillik@temple.edu",
        "time": "Wed Jul 27 14:46:03 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jul 27 14:46:03 2005 -0700"
      },
      "message": "[NETFILTER]: Fix -Wunder error in ip_conntrack_core.c\n\nSigned-off-by: Nick Sillik \u003cn.sillik@temple.edu\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a77be819f94fc55627ee257f496198ad703aaad4",
      "tree": "1b6d1a29f39ce0541e1248639adc496986261a13",
      "parents": [
        "cbcd2a4cca1a6223e4f98661ef524919d322675e"
      ],
      "author": {
        "name": "Kyle Moffett",
        "email": "mrmacman_g4@mac.com",
        "time": "Wed Jul 27 14:22:30 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jul 27 14:22:30 2005 -0700"
      },
      "message": "[NET]: Fix setsockopt locking bug\n\nOn Sparc, SO_DONTLINGER support resulted in sock_reset_flag being \ncalled without lock_sock().\n\nSigned-off-by: Kyle Moffett \u003cmrmacman_g4@mac.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "eaa1c5d05947819643b2e72cbfc51ae2ddcf1991",
      "tree": "202746f0afc2eed818b14334a328c47b07db755b",
      "parents": [
        "9e566d8bd61f939b7f5d7d969f5b178571471cf9"
      ],
      "author": {
        "name": "Hans-Juergen Tappe (SYSGO AG)",
        "email": "hjt@sysgo.com",
        "time": "Wed Jul 27 13:00:04 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jul 27 13:00:04 2005 -0700"
      },
      "message": "[IPV4]: Fix Kconfig syntax error\n\nFrom: \"Hans-Juergen Tappe (SYSGO AG)\" \u003chjt@sysgo.com\u003e\n\nSigned-off-by: Andrew Morton \u003cakpm@osdl.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a4f1bac62564049ea4718c4624b0fadc9f597c84",
      "tree": "294ef690f2b8978ee83b9e4e7dadbfb391ea1f94",
      "parents": [
        "cadf01c2fc0cd66dfef4956ef1a6482ed01c3150"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Jul 26 15:43:17 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jul 26 15:43:17 2005 -0700"
      },
      "message": "[XFRM]: Fix possible overflow of sock-\u003esk_policy\n\nSpotted by, and original patch by, Balazs Scheidler.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7686ee1ad976efeddf10583f013462c66408ae51",
      "tree": "68e8cd513ab047d4e71fcd232fdca4e5b0a69366",
      "parents": [
        "48647feed9f7a2d839c6ada12147b341833646e8"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Sun Jul 24 19:44:23 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Jul 24 19:44:23 2005 -0700"
      },
      "message": "[EMATCH]: Remove feature ifdefs in meta ematch.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nAcked-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "227510c7f175c44b12cdff6eab316e53dbf71f92",
      "tree": "157836fd8d477ad3287c29e8235a41f0ed5cad42",
      "parents": [
        "2c2a68b84752cb1090fd2456e8b83e5bcc0e73c4"
      ],
      "author": {
        "name": "Cal Peake",
        "email": "cp@absolutedigital.net",
        "time": "Sun Jul 24 19:30:06 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Jul 24 19:30:06 2005 -0700"
      },
      "message": "[IPV6]: fix implicit declaration of function `xfrm6_tunnel_unregister\u0027\n\nSigned-off-by: Cal Peake \u003ccp@absolutedigital.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "261688d01ec07d3a265b8ace6ec68310fbd96a96",
      "tree": "c068cd8f4a1cf545ea4bfb68d3becc051b964d56",
      "parents": [
        "d3984a6b6abac6203868f0e9095c0ed9e33ece03"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jul 22 14:43:52 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jul 22 14:43:52 2005 -0700"
      },
      "message": "[PKT_SCHED]: em_meta: Kill TCF_META_ID_{INDEV,SECURITY,TCVERDICT}\n\nMore unusable TCF_META_* match types that need to get eliminated\nbefore 2.6.13 goes out the door.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nAcked-by: Thomas Graf \u003ctgraf@suug.ch\u003e\n"
    },
    {
      "commit": "d3984a6b6abac6203868f0e9095c0ed9e33ece03",
      "tree": "a46aa663c646cfc93067c837407ead4357f0b955",
      "parents": [
        "74bb421da7f39e70ab636ad46ef85ea1178786c5"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Fri Jul 22 12:52:47 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jul 22 12:52:47 2005 -0700"
      },
      "message": "[NETFILTER]: Fix ip6t_LOG MAC format\n\nI broke this in the patch that consolidated MAC logging.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "74bb421da7f39e70ab636ad46ef85ea1178786c5",
      "tree": "11f2eba01e01f8094f57a1c16c6d454ce7b2430a",
      "parents": [
        "21f930e4abdcb9649f26e5b959c14dddee4e600b"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Fri Jul 22 12:51:38 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jul 22 12:51:38 2005 -0700"
      },
      "message": "[NETFILTER]: Use correct byteorder in ICMP NAT\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "21f930e4abdcb9649f26e5b959c14dddee4e600b",
      "tree": "524b3bfee593f20a52fab80c7bb4da3ac0ad3ad8",
      "parents": [
        "d04b4f8c1c9766e49fad6a141fc61cb30db69a5c"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Fri Jul 22 12:51:03 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jul 22 12:51:03 2005 -0700"
      },
      "message": "[NETFILTER]: Wait until all references to ip_conntrack_untracked are dropped on unload\n\nFixes a crash when unloading ip_conntrack.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d04b4f8c1c9766e49fad6a141fc61cb30db69a5c",
      "tree": "4355aafff80fc9a09597d4990a45b51b30359cf3",
      "parents": [
        "4c1217deeb148ff8ab838ba4f1875d0f52dea343"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Fri Jul 22 12:50:29 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jul 22 12:50:29 2005 -0700"
      },
      "message": "[NETFILTER]: Fix potential memory corruption in NAT code (aka memory NAT)\n\nThe portptr pointing to the port in the conntrack tuple is declared static,\nwhich could result in memory corruption when two packets of the same\nprotocol are NATed at the same time and one conntrack goes away.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4c1217deeb148ff8ab838ba4f1875d0f52dea343",
      "tree": "9219e874ef71ac18b31e1028a5cde6d579c6fc23",
      "parents": [
        "28e212fb360ce2568edd60b93d60683d5ad24146"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Fri Jul 22 12:49:30 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jul 22 12:49:30 2005 -0700"
      },
      "message": "[NETFILTER]: Fix deadlock in ip6_queue\n\nAlready fixed in ip_queue, ip6_queue was missed.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "28e212fb360ce2568edd60b93d60683d5ad24146",
      "tree": "cde99771e1cd026648c7a80e44ae66b710920e78",
      "parents": [
        "14a59e1829cd5782ad1a8979e594578f49f3e2c1"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jul 22 11:47:25 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jul 22 11:47:25 2005 -0700"
      },
      "message": "[PKT_SCHED]: Kill TCF_META_ID_REALDEV from meta ematch.\n\nIt won\u0027t exist any longer when we shrink the SKB in 2.6.14,\nand we should kill this off before anyone in userspace starts\nusing it.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nAcked-by: Thomas Graf \u003ctgraf@suug.ch\u003e\n"
    },
    {
      "commit": "4acdbdbe5089c06d5e0c7e96783fcc4414ded00a",
      "tree": "77629aef70bd92983518b6f5dd13c70a222c4cbb",
      "parents": [
        "4aa49d130df9209707a97786a55a3f584b7345e9"
      ],
      "author": {
        "name": "Rusty Russell",
        "email": "rusty@rustcorp.com.au",
        "time": "Thu Jul 21 13:14:46 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jul 21 13:14:46 2005 -0700"
      },
      "message": "[NETFILTER]: ip_conntrack_expect_related must not free expectation\n\nIf a connection tracking helper tells us to expect a connection, and\nwe\u0027re already expecting that connection, we simply free the one they\ngave us and return success.\n\nThe problem is that NAT helpers (eg. FTP) have to allocate the\nexpectation first (to see what port is available) then rewrite the\npacket.  If that rewrite fails, they try to remove the expectation,\nbut it was freed in ip_conntrack_expect_related.\n\nThis is one example of a larger problem: having registered the\nexpectation, the pointer is no longer ours to use.  Reference counting\nis needed for ctnetlink anyway, so introduce it now.\n\nTo have a single \"put\" path, we need to grab the reference to the\nconnection on creation, rather than open-coding it in the caller.\n\nSigned-off-by: Rusty Russell \u003crusty@rustcorp.com.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b72f6eccb0fc516070f2de469f73870cb6cb1149",
      "tree": "47adfd4764346387af894dd3a25e2b2266187a67",
      "parents": [
        "0303770deb834c15ca664a9d741d40f893c92f4e"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jul 19 14:13:54 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jul 19 14:13:54 2005 -0700"
      },
      "message": "[NET]: Fix tc_verd thinko in skb_clone()\n\nIt was overwriting the computer n-\u003etc_verd value over\nand over with skb-\u003etc_verd, by mistake.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0303770deb834c15ca664a9d741d40f893c92f4e",
      "tree": "d48e2df54d3545052aaffeeeec1c34c214055056",
      "parents": [
        "c877efb207bf4629cfa97ac13412f7392a873485"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Tue Jul 19 14:03:34 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jul 19 14:03:34 2005 -0700"
      },
      "message": "[NET]: Make ipip/ip6_tunnel independant of XFRM\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c877efb207bf4629cfa97ac13412f7392a873485",
      "tree": "2521cdfc0943c916d2322d2183f0c4194cb29827",
      "parents": [
        "23a534e7b1ad2650002bbc236493791ac23440ee"
      ],
      "author": {
        "name": "Stephen Hemminger",
        "email": "shemminger@osdl.org",
        "time": "Tue Jul 19 14:01:51 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jul 19 14:01:51 2005 -0700"
      },
      "message": "[IPV4]: Fix up lots of little whitespace indentation stuff in fib_trie.\n\nSigned-off-by: Stephen Hemminger \u003cshemminger@osdl.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "eb3f8f5e22cdee8138e654963e371ad337830efb",
      "tree": "7f9f62017c24125d7a50bee4088d1240cb5bc6fe",
      "parents": [
        "abaacad9bcb3f118cc802f527ab5d7c41b63f83a"
      ],
      "author": {
        "name": "Adrian Bunk",
        "email": "bunk@stusta.de",
        "time": "Tue Jul 19 14:00:13 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jul 19 14:00:13 2005 -0700"
      },
      "message": "[NET]: BRIDGE_EBT_ARPREPLY must depend on INET\n\nBRIDGE_EBT_ARPREPLY\u003dy and INET\u003dn results in the following compile error:\n\nnet/built-in.o: In function `ebt_target_reply\u0027:\nebt_arpreply.c:(.text+0x68fb9): undefined reference to `arp_send\u0027\nmake: *** [.tmp_vmlinux1] Error 1\n\nSigned-off-by: Adrian Bunk \u003cbunk@stusta.de\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "abaacad9bcb3f118cc802f527ab5d7c41b63f83a",
      "tree": "00feb47b1bc9f2b1c3eced293fce47a54faf711c",
      "parents": [
        "6aef4fdfeaec5f2c66415f2cafa98a3ff927501f"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Tue Jul 19 13:59:17 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jul 19 13:59:17 2005 -0700"
      },
      "message": "[IPV4]: Don\u0027t select XFRM for ip_gre\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6aef4fdfeaec5f2c66415f2cafa98a3ff927501f",
      "tree": "fc8fa275747dfeea29642e37103614dc1754440d",
      "parents": [
        "86cf42e4e029b83110cf98692420239103363dbf"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Tue Jul 19 13:58:40 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jul 19 13:58:40 2005 -0700"
      },
      "message": "[NET]: Only build flow.o if CONFIG_XFRM\u003dy\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "88e9fa8a54cf4d66ee8fc1d855e82de827233d74",
      "tree": "fc869a492d674a302ddbaf2fd352ee970d0518a2",
      "parents": [
        "5938a7b580bb7a738ee349048565ac76e6f3f5d7"
      ],
      "author": {
        "name": "Jesper Juhl",
        "email": "juhl-lkml@dif.dk",
        "time": "Tue Jul 19 13:56:53 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jul 19 13:56:53 2005 -0700"
      },
      "message": "[ATM]: Trivial spelling fix patch for net/Kconfig\n\nSigned-off-by: Jesper Juhl \u003cjuhl-lkml@dif.dk\u003e\nSigned-off-by: Adrian Bunk \u003cbunk@stusta.de\u003e\nSigned-off-by: Chas Williams \u003cchas@cmf.nrl.navy.mil\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "322361b3712af97c19ab730b410f9ae5d9aad4c3",
      "tree": "f78cc2a5017cffbccdabefa11bf76c0ec34d3908",
      "parents": [
        "43f51fce0a637e6cdf1285b0fa09b8398ff14834"
      ],
      "author": {
        "name": "Chas Williams",
        "email": "chas@cmf.nrl.navy.mil",
        "time": "Tue Jul 19 13:54:44 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jul 19 13:54:44 2005 -0700"
      },
      "message": "[ATM]: allow bind() on point-to-multpoint svcs (from Martin Whitaker \u003cmartin_whitaker@ntlworld.com\u003e)\n\nSigned-off-by: Chas Williams \u003cchas@cmf.nrl.navy.mil\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3f1c81ff10187396e6d0fd01df82ab0cec256c96",
      "tree": "a94aa26eee1a29dcc0f909a504915efafeb79d05",
      "parents": [
        "6876f95f201ce2d62367d85dd793c1fee351d7a6"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jul 18 17:10:55 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jul 18 17:10:55 2005 -0700"
      },
      "message": "[EMATCH]: Kill TCF_META_ID_TCCLASSID reference from meta ematch as well.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6876f95f201ce2d62367d85dd793c1fee351d7a6",
      "tree": "44031f94643969ebaa7ee2379efc2babaef17c4a",
      "parents": [
        "54208991e15fa00e37a9d172ac0d87191a832165"
      ],
      "author": {
        "name": "Adrian Bunk",
        "email": "bunk@stusta.de",
        "time": "Mon Jul 18 13:55:19 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jul 18 13:55:19 2005 -0700"
      },
      "message": "[IPV4]: fix IP_FIB_HASH kconfig warning\n\nThis patch fixes the following kconfig warning:\n  net/ipv4/Kconfig:92:warning: defaults for choice values not supported\n\nSigned-off-by: Adrian Bunk \u003cbunk@stusta.de\u003e\nSigned-off-by: Andrew Morton \u003cakpm@osdl.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "54208991e15fa00e37a9d172ac0d87191a832165",
      "tree": "9344b79fd780f2a840b3d4f4e6d4dd048ab9cd23",
      "parents": [
        "d1ad1ff299dd908d07c5e5f27f88bbdb235eb7a5"
      ],
      "author": {
        "name": "Randy Dunlap",
        "email": "rdunlap@xenotime.net",
        "time": "Mon Jul 18 13:45:12 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jul 18 13:45:12 2005 -0700"
      },
      "message": "[NET]: Kconfig: NETCONSOLE and NETPOLL together\n\nPut NETCONSOLE and NETPOLL options together since they are related.\nThis cuts down on the hassle of flipping back and forth between\nthe Networking menu and the Network drivers menu to change their\nconfig settings.\n\nTested with menuconfig, gconfig, and xconfig.\ngconfig has a small problem with this.  I think that it\u0027s\na bug in gconfig and I will take it up with Romain Lievin.\n\nSigned-off-by: Randy Dunlap \u003crdunlap@xenotime.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d1ad1ff299dd908d07c5e5f27f88bbdb235eb7a5",
      "tree": "03f66679f4a153ec06fde913907f392503f4b5e5",
      "parents": [
        "ee71a29eb5e341fe977c5ad7a43782c29bd9cb9e"
      ],
      "author": {
        "name": "Sridhar Samudrala",
        "email": "sri@us.ibm.com",
        "time": "Mon Jul 18 13:44:10 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jul 18 13:44:10 2005 -0700"
      },
      "message": "[SCTP]: Fix potential null pointer dereference while handling an icmp error\n\nSigned-off-by: Sridhar Samudrala \u003csri@us.ibm.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ee71a29eb5e341fe977c5ad7a43782c29bd9cb9e",
      "tree": "cbbfc9d2155a939c1735986d056e0dff131c4afe",
      "parents": [
        "e2bf521d9728bfae9b6c3d484614e5962d0b5afd"
      ],
      "author": {
        "name": "Christophe Lucas",
        "email": "clucas@rotomalug.org",
        "time": "Mon Jul 18 13:38:07 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jul 18 13:38:07 2005 -0700"
      },
      "message": "[SCTP]: Audit return code of create_proc_*\n\nFrom: Christophe Lucas \u003cclucas@rotomalug.org\u003e\n\nAudit return of create_proc_* functions.\n\nSigned-off-by: Christophe Lucas \u003cclucas@rotomalug.org\u003e\nSigned-off-by: Domen Puncer \u003cdomen@coderock.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "37da647d994cdac7e0bc8d2a365fbda403939a2b",
      "tree": "914de5c0c11403014db2a202ce1338a19edc6d48",
      "parents": [
        "23af27eb8fa9ea8614138c4cded7a16cb4197a55"
      ],
      "author": {
        "name": "Victor Fusco",
        "email": "victor@cetuc.puc-rio.br",
        "time": "Mon Jul 18 13:35:43 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jul 18 13:35:43 2005 -0700"
      },
      "message": "[NETLINK]: Fix \"nocast type\" warnings\n\nFrom: Victor Fusco \u003cvictor@cetuc.puc-rio.br\u003e\n\nFix the sparse warning \"implicit cast to nocast type\"\n\nSigned-off-by: Victor Fusco \u003cvictor@cetuc.puc-rio.br\u003e\nSigned-off-by: Domen Puncer \u003cdomen@coderock.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "452f299da3253f65020143f743c2e207b752547b",
      "tree": "56f02114d9e65d60c0f3a0658602e7e193f226bd",
      "parents": [
        "d7c7ed4dbc66c5f4dfa5615cdfc5009af3b3b137"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Mon Jul 18 13:30:53 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jul 18 13:30:53 2005 -0700"
      },
      "message": "[PKT_SCHED]: Reduce branch mispredictions in pfifo_fast_dequeue\n\nThe current call to __qdisc_dequeue_head leads to a branch\nmisprediction for every loop iteration, the fact that the\nmost common priority is 2 makes this even worse.  This issue\nhas been brought up by Eric Dumazet \u003cdada1@cosmosbay.com\u003e\nbut unlike his solution which was to manually unroll the loop,\nthis approach preserves the possibility to increase the number\nof bands at compile time. \n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d7c7ed4dbc66c5f4dfa5615cdfc5009af3b3b137",
      "tree": "1a328a1cbfb59fb4392df6b6ed2b1fd0b74c4983",
      "parents": [
        "4851d3aaa550b7b62553dd19fcadc7b586da4f17"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Mon Jul 18 13:29:49 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jul 18 13:29:49 2005 -0700"
      },
      "message": "[PKT_SCHED]: Remove debugging leftover from textsearch ematch\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f4637b55ba960d9987a836617271659e9b7b0de8",
      "tree": "3fa0763a55ce21fa4a26feae2866773439c7e620",
      "parents": [
        "ab611487d8ada506e511d2b8f22fb8e7be9939b9"
      ],
      "author": {
        "name": "Tommy Christensen",
        "email": "tommy.christensen@tpack.net",
        "time": "Tue Jul 12 12:13:49 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jul 12 12:13:49 2005 -0700"
      },
      "message": "[VLAN]: Fix early vlan adding leads to not functional device\n\nOK, I can see what\u0027s happening here. eth0 doesn\u0027t detect link-up until\nafter a few seconds, so when the vlan interface is opened immediately\nafter eth0 has been opened, it inherits the link-down state. Subsequently\nthe vlan interface is never properly activated and are thus unable to\ntransmit any packets.\n\ndev-\u003estate bits are not supposed to be manipulated directly. Something\nsimilar is probably needed for the netif_device_present() bit, although\nI don\u0027t know how this is meant to work for a virtual device.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ab611487d8ada506e511d2b8f22fb8e7be9939b9",
      "tree": "caa87031e209e8845f84209b69c6c8225def945f",
      "parents": [
        "84531c24f27b02daa8e54e2bb6dc74a730fdf0a5"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Tue Jul 12 12:08:43 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jul 12 12:08:43 2005 -0700"
      },
      "message": "[NET]: __be\u0027ify *_type_trans()\n\ntr_type_trans(), hippi_type_trans() left as-is.\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "84531c24f27b02daa8e54e2bb6dc74a730fdf0a5",
      "tree": "756825122b40af8ea2db132e8c9033d9ab3785e5",
      "parents": [
        "6a2e9b738cb5c929df73b6acabdd8f9a4e9a0416"
      ],
      "author": {
        "name": "Phil Oester",
        "email": "kernel@linuxace.com",
        "time": "Tue Jul 12 11:57:52 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jul 12 11:57:52 2005 -0700"
      },
      "message": "[NETFILTER]: Revert nf_reset change\n\nRevert the nf_reset change that caused so much trouble, drop conntrack\nreferences manually before packets are queued to packet sockets.\n\nSigned-off-by: Phil Oester \u003ckernel@linuxace.com\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6a2e9b738cb5c929df73b6acabdd8f9a4e9a0416",
      "tree": "c7cdf9033093b52e360ad04dc29739ca36a617a4",
      "parents": [
        "d5950b4355049092739bea97d1bdc14433126cc5"
      ],
      "author": {
        "name": "Sam Ravnborg",
        "email": "sam@ravnborg.org",
        "time": "Mon Jul 11 21:13:56 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jul 11 21:13:56 2005 -0700"
      },
      "message": "[NET]: move config options out to individual protocols\n\nMove the protocol specific config options out to the specific protocols.\nWith this change net/Kconfig now starts to become readable and serve as a\ngood basis for further re-structuring.\n\nThe menu structure is left almost intact, except that indention is\nfixed in most cases. Most visible are the INET changes where several\n\"depends on INET\" are replaced with a single ifdef INET / endif pair.\n\nSeveral new files were created to accomplish this change - they are\nsmall but serve the purpose that config options are now distributed\nout where they belongs.\n\nSigned-off-by: Sam Ravnborg \u003csam@ravnborg.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d5950b4355049092739bea97d1bdc14433126cc5",
      "tree": "a76e11dfb7209e3ab49352ee4f8776b4a59249d9",
      "parents": [
        "0b7f22aab4e960c75e82ad696ef852f9b0015e7d"
      ],
      "author": {
        "name": "Sam Ravnborg",
        "email": "sam@ravnborg.org",
        "time": "Mon Jul 11 21:03:49 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jul 11 21:03:49 2005 -0700"
      },
      "message": "[NET]: add a top-level Networking menu to *config\n\nCreate a new top-level menu named \"Networking\" thus moving\nnet related options and protocol selection way from the drivers\nmenu and up on the top-level where they belong.\n\nTo implement this all architectures has to source \"net/Kconfig\" before\ndrivers/*/Kconfig in their Kconfig file. This change has been\nimplemented for all architectures.\n\nDevice drivers for ordinary NIC\u0027s are still to be found\nin the Device Drivers section, but Bluetooth, IrDA and ax25\nare located with their corresponding menu entries under the new\nnetworking menu item.\n\nSigned-off-by: Sam Ravnborg \u003csam@ravnborg.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0b7f22aab4e960c75e82ad696ef852f9b0015e7d",
      "tree": "4c689dd688fbe7cbb4c3c61e2b246d5f48805aa6",
      "parents": [
        "af9debd461d10fe582c9c0e80eafa69f698331ed"
      ],
      "author": {
        "name": "Olaf Kirch",
        "email": "okir@suse.de",
        "time": "Mon Jul 11 21:01:42 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jul 11 21:01:42 2005 -0700"
      },
      "message": "[IPV4]: Prevent oops when printing martian source\n\nIn some cases, we may be generating packets with a source address that\nqualifies as martian. This can happen when we\u0027re in the middle of setting\nup the network, and netfilter decides to reject a packet with an RST.\nThe IPv4 routing code would try to print a warning and oops, because\nlocally generated packets do not have a valid skb-\u003emac.raw pointer\nat this point.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "af9debd461d10fe582c9c0e80eafa69f698331ed",
      "tree": "f9473e1ec1c1ec18bf90ff8049fe63f5abd35ef7",
      "parents": [
        "f5b8adb4f5767415b7b00e32e4766a052e2ed4cc"
      ],
      "author": {
        "name": "Julian Anastasov",
        "email": "ja@ssi.bg",
        "time": "Mon Jul 11 20:59:57 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jul 11 20:59:57 2005 -0700"
      },
      "message": "[IPVS]: Add and reorder bh locks after moving to keventd.\n\nAn addition to the last ipvs changes that move\nupdate_defense_level/si_meminfo to keventd:\n\n- ip_vs_random_dropentry now runs in process context and should use _bh\n  locks to protect from softirqs\n\n- update_defense_level still needs _bh locks after si_meminfo is called,\n  for the same purpose\n\nSigned-off-by: Julian Anastasov \u003cja@ssi.bg\u003e\nSigned-off-by: Andrew Morton \u003cakpm@osdl.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f5b8adb4f5767415b7b00e32e4766a052e2ed4cc",
      "tree": "e50f583c2c2a619884d50960831150e9dd00db9c",
      "parents": [
        "3182cd84f0e132558bbe106c070405ae49f1f0e3"
      ],
      "author": {
        "name": "Jesper Juhl",
        "email": "juhl-lkml@dif.dk",
        "time": "Mon Jul 11 20:59:03 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jul 11 20:59:03 2005 -0700"
      },
      "message": "[NET]: Trivial spelling fix patch for net/Kconfig\n\nSigned-off-by: Jesper Juhl \u003cjuhl-lkml@dif.dk\u003e\nSigned-off-by: Adrian Bunk \u003cbunk@stusta.de\u003e\nSigned-off-by: Andrew Morton \u003cakpm@osdl.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3182cd84f0e132558bbe106c070405ae49f1f0e3",
      "tree": "1015a20d3adb2c000c42fbaf74cecf9cff52bb50",
      "parents": [
        "63522f7fdb624adef20cb9d90c7effcd5b6301b2"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Mon Jul 11 20:57:47 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jul 11 20:57:47 2005 -0700"
      },
      "message": "[SCTP]: __nocast annotations\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "79af02c2538d54ff0dcd3f43646f506207f2ee62",
      "tree": "0e77872e7ac3da31dd5d77f260a9ae391896869d",
      "parents": [
        "9c05989bb2264f0fa4fc95f81d2c4e6aa2eaa24d"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jul 08 21:47:49 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jul 08 21:47:49 2005 -0700"
      },
      "message": "[SCTP]: Use struct list_head for chunk lists, not sk_buff_head.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9c05989bb2264f0fa4fc95f81d2c4e6aa2eaa24d",
      "tree": "d0da2c6e210b47727097a77eefddfc7c3e2ea13e",
      "parents": [
        "84b42baef775b0e3415ccece17cf694f50326d01"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jul 08 21:44:39 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jul 08 21:44:39 2005 -0700"
      },
      "message": "[IPV6]: Fix warning in ip6_mc_msfilter.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "84b42baef775b0e3415ccece17cf694f50326d01",
      "tree": "6a810c38fcd8f02db57482019264089e99db2d31",
      "parents": [
        "9951f036fe8a4e6b21962559c64ff13b290ff01a"
      ],
      "author": {
        "name": "David L Stevens",
        "email": "dlstevens@us.ibm.com",
        "time": "Fri Jul 08 17:48:38 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jul 08 17:48:38 2005 -0700"
      },
      "message": "[IPV4]: fix IPv4 leave-group group matching\n\n        This patch fixes the multicast group matching for \nIP_DROP_MEMBERSHIP, similar to the IP_ADD_MEMBERSHIP fix in a prior\npatch. Groups are identifiedby \u003cgroup address,interface\u003e and including\nthe interface address in the match will fail if a leave-group is done\nby address when the join was done by index, or if different addresses\non the same interface are used in the join and leave.\n\nSigned-off-by: David L Stevens \u003cdlstevens@us.ibm.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9951f036fe8a4e6b21962559c64ff13b290ff01a",
      "tree": "3d4d557102bf8d8a96d5276de7183b57c9808711",
      "parents": [
        "917f2f105ea4bbba8604e3ed55233eebda7afe6a"
      ],
      "author": {
        "name": "David L Stevens",
        "email": "dlstevens@us.ibm.com",
        "time": "Fri Jul 08 17:47:28 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jul 08 17:47:28 2005 -0700"
      },
      "message": "[IPV4]: (INCLUDE,empty)/leave-group equivalence for full-state MSF APIs \u0026 errno fix\n\n1) Adds (INCLUDE, empty)/leave-group equivalence to the full-state \n   multicast source filter APIs (IPv4 and IPv6)\n\n2) Fixes an incorrect errno in the IPv6 leave-group (ENOENT should be\n   EADDRNOTAVAIL)\n\nSigned-off-by: David L Stevens \u003cdlstevens@us.ibm.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "917f2f105ea4bbba8604e3ed55233eebda7afe6a",
      "tree": "bbab5de7093cec897f617649dd123946b579c4b7",
      "parents": [
        "8cdaaa15da58806ac3c75d96c40aef9e31445a25"
      ],
      "author": {
        "name": "David L Stevens",
        "email": "dlstevens@us.ibm.com",
        "time": "Fri Jul 08 17:45:16 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jul 08 17:45:16 2005 -0700"
      },
      "message": "[IPV4]: multicast API \"join\" issues\n\n1) In the full-state API when imsf_numsrc \u003d\u003d 0\n   errno should be \"0\", but returns EADDRNOTAVAIL\n\n2) An illegal filter mode change\n   errno should be EINVAL, but returns EADDRNOTAVAIL\n\n3) Trying to do an any-source option without IP_ADD_MEMBERSHIP\n   errno should be EINVAL, but returns EADDRNOTAVAIL\n\n4) Adds comments for the less obvious error return values\n\nSigned-off-by: David L Stevens \u003cdlstevens@us.ibm.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8cdaaa15da58806ac3c75d96c40aef9e31445a25",
      "tree": "bdeee63b026525963143d3ffe07d93110c25297c",
      "parents": [
        "ca9b907d140a5f249250d19f956129dbbbf84f73"
      ],
      "author": {
        "name": "David L Stevens",
        "email": "dlstevens@us.ibm.com",
        "time": "Fri Jul 08 17:39:23 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jul 08 17:39:23 2005 -0700"
      },
      "message": "[IPV4]: multicast API \"join\" issues\n\n1) Changes IP_ADD_SOURCE_MEMBERSHIP and MCAST_JOIN_SOURCE_GROUP to ignore\n   EADDRINUSE errors on a \"courtesy join\" -- prior membership or not\n   is ok for these.\n\n2) Adds \"leave group\" equivalence of (INCLUDE, empty) filters in the \n   delta-based API. Without this, mixing delta-based API calls that\n   end in an (INCLUDE, empty) filter would not allow a subsequent\n   regular IP_ADD_MEMBERSHIP. It also frees socket buffer memory that\n   isn\u0027t needed for both the multicast group record and source filter.\n\nSigned-off-by: David L Stevens \u003cdlstevens@us.ibm.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ca9b907d140a5f249250d19f956129dbbbf84f73",
      "tree": "48f26110e23634f17d9c73e7a5a7b4239ffcd589",
      "parents": [
        "4c866aa798bc6de0a1d45495229e9f13c35b55c2"
      ],
      "author": {
        "name": "David L Stevens",
        "email": "dlstevens@us.ibm.com",
        "time": "Fri Jul 08 17:38:07 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jul 08 17:38:07 2005 -0700"
      },
      "message": "[IPV4]: multicast API \"join\" issues\n\n        This patch corrects a few problems with the IP_ADD_MEMBERSHIP\nsocket option:\n\n1) The existing code makes an attempt at reference counting joins when\n   using the ip_mreqn/imr_ifindex interface. Joining the same group\n   on the same socket is an error, whatever the API. This leads to\n   unexpected results when mixing ip_mreqn by index with ip_mreqn by\n   address, ip_mreq, or other API\u0027s. For example, ip_mreq followed by\n   ip_mreqn of the same group will \"work\" while the same two reversed\n   will not.\n           Fixed to always return EADDRINUSE on a duplicate join and\n   removed the (now unused) reference count in ip_mc_socklist.\n\n2) The group-search list in ip_mc_join_group() is comparing a full \n   ip_mreqn structure and all of it must match for it to find the\n   group. This doesn\u0027t correctly match a group that was joined with\n   ip_mreq or ip_mreqn with an address (with or without an index). It\n   also doesn\u0027t match groups that are joined by different addresses on\n   the same interface. All of these are the same multicast group,\n   which is identified by group address and interface index.\n           Fixed the check to correctly match groups so we don\u0027t get\n   duplicate group entries on the ip_mc_socklist.\n\n3) The old code allocates a multicast address before searching for\n   duplicates requiring it to free in various error cases. This\n   patch moves the allocate until after the search and\n   igmp_max_memberships check, so never a need to allocate, then free\n   an entry.\n\nSigned-off-by: David L Stevens \u003cdlstevens@us.ibm.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4c866aa798bc6de0a1d45495229e9f13c35b55c2",
      "tree": "d648ccbe485a71d37a80b08b4bf09d911d9ec2d3",
      "parents": [
        "86a76caf8705e3524e15f343f3c4806939a06dc8"
      ],
      "author": {
        "name": "Alexey Kuznetsov",
        "email": "kuznet@ms2.inr.ac.ru",
        "time": "Fri Jul 08 17:34:46 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jul 08 17:34:46 2005 -0700"
      },
      "message": "[IPV4]: Apply sysctl_icmp_echo_ignore_broadcasts to ICMP_TIMESTAMP as well.\n\nThis was the full intention of the original code.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    }
  ],
  "next": "86a76caf8705e3524e15f343f3c4806939a06dc8"
}
