)]}'
{
  "log": [
    {
      "commit": "2e9ff56efbc005ab2b92b68df65940c7459446c6",
      "tree": "8844a54f2b205bb5dceb6391d05df9a9f8bc62d2",
      "parents": [
        "d378aca6ec708bfb24df5c47801b1f2399efc481",
        "cc8279f68c34c3f32b3a85f3103b0ad755c57846"
      ],
      "author": {
        "name": "Jeff Garzik",
        "email": "jeff@garzik.org",
        "time": "Mon Mar 20 04:38:50 2006 -0500"
      },
      "committer": {
        "name": "Jeff Garzik",
        "email": "jeff@garzik.org",
        "time": "Mon Mar 20 04:38:50 2006 -0500"
      },
      "message": "Merge branch \u0027upstream\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "d378aca6ec708bfb24df5c47801b1f2399efc481",
      "tree": "7535f96bf34314df071698d2e06054b8d5223ebb",
      "parents": [
        "abc71c46dc0a12ab7fddc18cfe4f4aa26808c79b",
        "7705a8792b0fc82fd7d4dd923724606bbfd9fb20"
      ],
      "author": {
        "name": "Jeff Garzik",
        "email": "jeff@garzik.org",
        "time": "Mon Mar 20 04:38:03 2006 -0500"
      },
      "committer": {
        "name": "Jeff Garzik",
        "email": "jeff@garzik.org",
        "time": "Mon Mar 20 04:38:03 2006 -0500"
      },
      "message": "Merge branch \u0027master\u0027\n"
    },
    {
      "commit": "c7c694d196a39af6e644e24279953d04f30362db",
      "tree": "cb78fead47ce86245179fe0a52119c70b30b59cb",
      "parents": [
        "60a6dc55b93b3321afa52f650a149fb7e87fa85a"
      ],
      "author": {
        "name": "Ralf Baechle DL5RB",
        "email": "ralf@linux-mips.org",
        "time": "Sun Mar 19 13:20:06 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Mar 19 13:20:06 2006 -0800"
      },
      "message": "[AX.25]: Fix potencial memory hole.\n\nIf the AX.25 dialect chosen by the sysadmin is set to DAMA master / 3\n(or DAMA slave / 2, if CONFIG_AX25_DAMA_SLAVE\u003dn) ax25_kick() will fall\nthrough the switch statement without calling ax25_send_iframe() or any\nother function that would eventually free skbn thus leaking the packet.\n\nFix by restricting the sysctl inferface to allow only actually supported\nAX.25 dialects.\n\nThe system administration mistake needed for this to happen is rather\nunlikely, so this is an uncritical hole.\n\nCoverity #651.\n\nSigned-off-by: Ralf Baechle DL5RB \u003cralf@linux-mips.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f44349f2217d05e4575f24edc3c0e0022f5d448f",
      "tree": "615c789b22164bf4afef198795b75c701936efd6",
      "parents": [
        "7c567894480daef05bc13abdc4b9414541e245cb"
      ],
      "author": {
        "name": "James Ketrenos",
        "email": "jketreno@linux.intel.com",
        "time": "Wed Mar 08 13:14:45 2006 -0600"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Fri Mar 17 15:38:55 2006 -0500"
      },
      "message": "[PATCH] ieee80211: Don\u0027t update network statistics from off-channel packets.\n\nThis patch fixes a problem in the ieee80211 probe response and beacon\nreception code that would use the packet statistics for a network even\nif they were received on a channel other than that which the network\nexists on.\n\nThis causes a problem in overlapping channels where, for example, a\nstrong AP on channel 2 could have its beacons received on channels 1 and\n3, but at much lower signal levels.  If scanning was done sequentially,\nthis means the beacon received on channel 3 would update the AP\u0027s signal\nlevel as being much lower than it really is, which subsequently could\ncause that AP to be passed over and an alternate AP selected.\n\nSigned-off-by: James Ketrenos \u003cjketreno@linux.intel.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "abc71c46dc0a12ab7fddc18cfe4f4aa26808c79b",
      "tree": "b0c846052b994d57d58713a0cc8da30a22baaf1c",
      "parents": [
        "30dcbf29cc6d92d70fa262e79e84011fe6913bed",
        "232a347a444e687b5f8cf0f6485704db1c6024d3"
      ],
      "author": {
        "name": "Jeff Garzik",
        "email": "jeff@garzik.org",
        "time": "Thu Mar 16 19:27:08 2006 -0500"
      },
      "committer": {
        "name": "Jeff Garzik",
        "email": "jeff@garzik.org",
        "time": "Thu Mar 16 19:27:08 2006 -0500"
      },
      "message": "Merge branch \u0027upstream-fixes\u0027\n"
    },
    {
      "commit": "dd288e7d75b9041f79fecae77d61cfa345da7266",
      "tree": "85ff1d1ea0fe1d6eae0b6819422d5c6c05f862cd",
      "parents": [
        "30dcbf29cc6d92d70fa262e79e84011fe6913bed",
        "72df16f109b73be37977a26d342e9103e8851cb6"
      ],
      "author": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed Mar 15 17:02:08 2006 -0500"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed Mar 15 17:02:08 2006 -0500"
      },
      "message": "Merge branch \u0027upstream-fixes\u0027\n"
    },
    {
      "commit": "72df16f109b73be37977a26d342e9103e8851cb6",
      "tree": "612e08a13421387f7b82a9c89d2f9b38f711630c",
      "parents": [
        "0df7861240b3484dea52d1f5782c69fd95b6cf23"
      ],
      "author": {
        "name": "Hong Liu",
        "email": "hong.liu@intel.com",
        "time": "Wed Mar 08 10:50:20 2006 +0800"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed Mar 15 16:16:07 2006 -0500"
      },
      "message": "[PATCH] ieee80211: Fix QoS is not active problem\n\nFix QoS is not active even the network and the card is QOS enabled.\nThe problem is we pass the wrong ieee80211_network address to\nipw_handle_beacon/ipw_handle_probe_response, thus the\nieee80211_network-\u003eqos_data.active will not be set, causing the driver\nnot sending QoS frames at all.\n\nSigned-off-by: Hong Liu \u003chong.liu@intel.com\u003e\nSigned-off-by: Zhu Yi \u003cyi.zhu@intel.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "0df7861240b3484dea52d1f5782c69fd95b6cf23",
      "tree": "5de4228d09da99a352b125692f4c3aa3402103c9",
      "parents": [
        "f13b83580acef03a36c785dccc534ccdd7e43084"
      ],
      "author": {
        "name": "Zhu Yi",
        "email": "yi.zhu@intel.com",
        "time": "Tue Feb 28 15:10:36 2006 +0800"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed Mar 15 16:11:55 2006 -0500"
      },
      "message": "[PATCH] ieee80211: Fix CCMP decryption problem when QoS is enabled\n\nUse the correct STYPE for Qos data.\n\nSigned-off-by: Zhu Yi \u003cyi.zhu@intel.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "e6d83d55698b73b4d5d55d3d7715a4c26030d577",
      "tree": "b2c0e3a799444d9c25c00cf34975b456e0c9ef9d",
      "parents": [
        "c12e87f4652b1ba3be168b4f63a440399b941928"
      ],
      "author": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Mon Mar 13 21:20:48 2006 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@g5.osdl.org",
        "time": "Tue Mar 14 07:57:18 2006 -0800"
      },
      "message": "[PATCH] SUNRPC: Fix potential deadlock in RPC code\n\nIn rpc_wake_up() and rpc_wake_up_status(), it is possible for the call to\n__rpc_wake_up_task() to fail if another thread happens to be calling\nrpc_wake_up_task() on the same rpc_task.\n\nProblem noticed by Bruno Faccini.\n\nSigned-off-by: Trond Myklebust \u003cTrond.Myklebust@netapp.com\u003e\nSigned-off-by: Andrew Morton \u003cakpm@osdl.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@osdl.org\u003e\n"
    },
    {
      "commit": "712917d1c002f820b177683f4fd491289bde3c32",
      "tree": "059c7a9871803d8d5b4673d92bf21a9ae7738c8b",
      "parents": [
        "143f412eb4c7cc48b9eb4381f9133b7d36c68075"
      ],
      "author": {
        "name": "Adrian Bunk",
        "email": "bunk@stusta.de",
        "time": "Mon Mar 13 21:20:47 2006 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@g5.osdl.org",
        "time": "Tue Mar 14 07:57:17 2006 -0800"
      },
      "message": "[PATCH] SUNRPC: fix a NULL pointer dereference in net/sunrpc/clnt.c\n\nThe Coverity checker spotted this possible NULL pointer dereference in\nrpc_new_client().\n\nSigned-off-by: Adrian Bunk \u003cbunk@stusta.de\u003e\nSigned-off-by: Trond Myklebust \u003cTrond.Myklebust@netapp.com\u003e\nSigned-off-by: Andrew Morton \u003cakpm@osdl.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@osdl.org\u003e\n"
    },
    {
      "commit": "3759fa9c55923f719ae944a3f8fbb029b36f759d",
      "tree": "ca48147798cd6a02edf64290dcf14c7681ab88cc",
      "parents": [
        "c33d4568aca9028a22857f94f5e0850012b6444b"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Mar 13 14:26:12 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 13 14:26:12 2006 -0800"
      },
      "message": "[TCP]: Fix zero port problem in IPv6\n\nWhen we link a socket into the hash table, we need to make sure that we\nset the num/port fields so that it shows us with a non-zero port value\nin proc/netlink and on the wire.  This code and comment is copied over\nfrom the IPv4 stack as is.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "31fe4d331729e9687db84521c3ceb8e43390efcf",
      "tree": "3db1ef1a3daaf10d01ab18dbcc0f107857919eac",
      "parents": [
        "baa829d8926f02ab04be6ec37780810d221c5b4b"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Sun Mar 12 20:40:43 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Mar 12 20:40:43 2006 -0800"
      },
      "message": "[NETFILTER]: arp_tables: fix NULL pointer dereference\n\nThe check is wrong and lets NULL-ptrs slip through since !IS_ERR(NULL)\nis true.\n\nCoverity #190\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "baa829d8926f02ab04be6ec37780810d221c5b4b",
      "tree": "8c2236eba68bb65aa535ab78e58777ff51de6746",
      "parents": [
        "4a1ff6e2bde56cdf176bd54d557b2e15e819f810"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Sun Mar 12 20:35:12 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Sun Mar 12 20:39:40 2006 -0800"
      },
      "message": "[IPV4/6]: Fix UFO error propagation\n\nWhen ufo_append_data fails err is uninitialized, but returned back.\nStrangely gcc doesn\u0027t notice it.\n\nCoverity #901 and #902\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4a1ff6e2bde56cdf176bd54d557b2e15e819f810",
      "tree": "c831cb72a76e69b3e781f070c510a59b06e39cb9",
      "parents": [
        "cc9a06cd8d6fbb69b4d3c46760c132cfe312fb85"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Sun Mar 12 20:34:53 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Sun Mar 12 20:39:39 2006 -0800"
      },
      "message": "[TCP]: tcp_highspeed: fix AIMD table out-of-bounds access\n\nCovertiy #547\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "cc9a06cd8d6fbb69b4d3c46760c132cfe312fb85",
      "tree": "c6dce78c5e845d9cd4d5baab7c8b29306fa77541",
      "parents": [
        "f8dc01f543f28253abeef649987249210d8db3cc"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Sun Mar 12 20:34:27 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Sun Mar 12 20:39:38 2006 -0800"
      },
      "message": "[NETLINK]: Fix use-after-free in netlink_recvmsg\n\nThe skb given to netlink_cmsg_recv_pktinfo is already freed, move it up\na few lines.\n\nCoverity #948\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f8dc01f543f28253abeef649987249210d8db3cc",
      "tree": "fc7d4a013cb2e2cc2e12354c29c23e695de69862",
      "parents": [
        "f6e57464df7ba0e91a23b0854adb56852dcd58a7"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Sun Mar 12 20:33:49 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Sun Mar 12 20:39:37 2006 -0800"
      },
      "message": "[XFRM]: Fix leak in ah6_input\n\ntmp_hdr is not freed when ipv6_clear_mutable_options fails.\n\nCoverity #650\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f6e57464df7ba0e91a23b0854adb56852dcd58a7",
      "tree": "9dfee36ee4e5150a3af876b44bca7516554aa5ec",
      "parents": [
        "406dbfc9ae0e6b7eb4da4a52c0a6556a0d7e6a2f"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Sun Mar 12 20:33:22 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Sun Mar 12 20:39:36 2006 -0800"
      },
      "message": "[NET_SCHED]: act_api: fix skb leak in error path\n\nThe skb is allocated by the function, so it needs to be freed instead\nof trimmed on overrun.\n\nCoverity #614\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "406dbfc9ae0e6b7eb4da4a52c0a6556a0d7e6a2f",
      "tree": "208366b1977eca0f2abad59e1c608fbf50fcbb21",
      "parents": [
        "57ddd5c1803859d977c5a31a267d2c805ffe6e11"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Sun Mar 12 20:32:47 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Sun Mar 12 20:39:35 2006 -0800"
      },
      "message": "[NETFILTER]: nfnetlink_queue: fix possible NULL-ptr dereference\n\nFix NULL-ptr dereference when a config message for a non-existant\nqueue containing only an NFQA_CFG_PARAMS attribute is received.\n\nCoverity #433\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ba244fe9005323452428fee4b4b7d0c70a06b627",
      "tree": "a2f64703eeb1cae57ea3d4b5d2dd481614ae82d1",
      "parents": [
        "c12743764129e40dc8461afc1096cf175c7c25f2"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Mar 11 18:51:49 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Mar 11 18:51:49 2006 -0800"
      },
      "message": "[TCP]: Fix tcp_tso_should_defer() when limit\u003e\u003d65536\n\nThat\u0027s \u003e\u003d a full sized TSO frame, so we should always\nreturn 0 in that case.\n\nBased upon a report and initial patch from Lachlan\nAndrew, final patch suggested by Herbert Xu.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c12743764129e40dc8461afc1096cf175c7c25f2",
      "tree": "080df077769b53cfae033849ab87cbd95f39c4b7",
      "parents": [
        "0d27b42739ee432a66104793e51a23807b372928"
      ],
      "author": {
        "name": "Gregor Maier",
        "email": "gregor@net.in.tum.de",
        "time": "Sat Mar 11 18:51:25 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Mar 11 18:51:25 2006 -0800"
      },
      "message": "[NETFILTER]: Fix wrong option spelling in Makefile for CONFIG_BRIDGE_EBT_ULOG\n\nSigned-off-by: Gregor Maier \u003cgregor@net.in.tum.de\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0d27b42739ee432a66104793e51a23807b372928",
      "tree": "d23986eff26122d06f6493029428a8748ff90040",
      "parents": [
        "0ade309be739eceedc4812798da09d698a59867d"
      ],
      "author": {
        "name": "Brian Haley",
        "email": "brian.haley@hp.com",
        "time": "Sat Mar 11 18:50:14 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Mar 11 18:50:14 2006 -0800"
      },
      "message": "[IPV6]: fix ipv6_saddr_score struct element\n\nThe scope element in the ipv6_saddr_score struct used in \nipv6_dev_get_saddr() is an unsigned integer, but __ipv6_addr_src_scope() \nreturns a signed integer (and can return -1).\n\nSigned-off-by: Brian Haley \u003cbrian.haley@hp.com\u003e\nAcked-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "749dfc70554f2c9e6624ac843d66571265ed9338",
      "tree": "bf591255b3f158222f90852d53c4279e6e7e9ced",
      "parents": [
        "74f5ec29ae93aa42c49f4285c20c457afe937881",
        "0992a5d029181421877a716eaf99145828ff7eae"
      ],
      "author": {
        "name": "Jeff Garzik",
        "email": "jeff@garzik.org",
        "time": "Sat Mar 11 13:35:31 2006 -0500"
      },
      "committer": {
        "name": "Jeff Garzik",
        "email": "jeff@garzik.org",
        "time": "Sat Mar 11 13:35:31 2006 -0500"
      },
      "message": "Merge branch \u0027upstream-fixes\u0027\n"
    },
    {
      "commit": "529bf6be5c04f2e869d07bfdb122e9fd98ade714",
      "tree": "38514bb3941c4ac2a79266e4483663b79efa2f22",
      "parents": [
        "21a1ea9eb40411d4ee29448c53b9e4c0654d6ceb"
      ],
      "author": {
        "name": "Dipankar Sarma",
        "email": "dipankar@in.ibm.com",
        "time": "Tue Mar 07 21:55:35 2006 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@g5.osdl.org",
        "time": "Wed Mar 08 14:14:01 2006 -0800"
      },
      "message": "[PATCH] fix file counting\n\nI have benchmarked this on an x86_64 NUMA system and see no significant\nperformance difference on kernbench.  Tested on both x86_64 and powerpc.\n\nThe way we do file struct accounting is not very suitable for batched\nfreeing.  For scalability reasons, file accounting was\nconstructor/destructor based.  This meant that nr_files was decremented\nonly when the object was removed from the slab cache.  This is susceptible\nto slab fragmentation.  With RCU based file structure, consequent batched\nfreeing and a test program like Serge\u0027s, we just speed this up and end up\nwith a very fragmented slab -\n\nllm22:~ # cat /proc/sys/fs/file-nr\n587730  0       758844\n\nAt the same time, I see only a 2000+ objects in filp cache.  The following\npatch I fixes this problem.\n\nThis patch changes the file counting by removing the filp_count_lock.\nInstead we use a separate percpu counter, nr_files, for now and all\naccesses to it are through get_nr_files() api.  In the sysctl handler for\nnr_files, we populate files_stat.nr_files before returning to user.\n\nCounting files as an when they are created and destroyed (as opposed to\ninside slab) allows us to correctly count open files with RCU.\n\nSigned-off-by: Dipankar Sarma \u003cdipankar@in.ibm.com\u003e\nCc: \"Paul E. McKenney\" \u003cpaulmck@us.ibm.com\u003e\nCc: \"David S. Miller\" \u003cdavem@davemloft.net\u003e\nSigned-off-by: Andrew Morton \u003cakpm@osdl.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@osdl.org\u003e\n"
    },
    {
      "commit": "850a9a4e3c019ce67e3bc29c810ac213ec4c169e",
      "tree": "e5ecac1ef9c88cdfabea26de440158b526afbe8a",
      "parents": [
        "d0b004840bd3b5ff2f2a0ad14fa0bd43349f5175"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Tue Mar 07 14:56:12 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Mar 07 14:56:12 2006 -0800"
      },
      "message": "[NETFILTER] ip_queue: Fix wrong skb-\u003elen \u003d\u003d nlmsg_len assumption\n\nThe size of the skb carrying the netlink message is not\nequivalent to the length of the actual netlink message\ndue to padding. ip_queue matches the length of the payload\nagainst the original packet size to determine if packet\nmangling is desired, due to the above wrong assumption\narbitary packets may not be mangled depening on their\noriginal size.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c09966608da7e8cad3468e925ac9062e44fee831",
      "tree": "4e3b04e3aabe5bf5106fe04913ad7b75525d7de4",
      "parents": [
        "c027f5f995d8b6efc934be384085e3e8425638e4"
      ],
      "author": {
        "name": "Ian McDonald",
        "email": "imcdnzl@gmail.com",
        "time": "Fri Mar 03 17:54:46 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Sat Mar 04 21:06:29 2006 -0800"
      },
      "message": "[DCCP] ccid3: Divide by zero fix\n\nIn rare circumstances 0 is returned by dccp_li_hist_calc_i_mean which\nleads to a divide by zero in ccid3_hc_rx_packet_recv. Explicitly check\nfor zero return now. Update copyright notice at same time.\n\nFound by Arnaldo.\n\nSigned-off-by: Ian McDonald \u003cimcdnzl@gmail.com\u003e\nSigned-off-by: Arnaldo Carvalho de Melo \u003cacme@mandriva.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0f8f325b25919619559f0f47aa46cd7dc2dbef92",
      "tree": "cfe07be8eeb62e87e32a4c3510da3f11936daaf3",
      "parents": [
        "125a12ccf3eefebff43e3dbf47225141faa5fbe8"
      ],
      "author": {
        "name": "Chas Williams",
        "email": "chas@cmf.nrl.navy.mil",
        "time": "Fri Mar 03 17:49:58 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Sat Mar 04 21:06:25 2006 -0800"
      },
      "message": "[ATM]: keep atmsvc failure messages quiet\n\nSigned-off-by: Chas Williams \u003cchas@cmf.nrl.navy.mil\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "125a12ccf3eefebff43e3dbf47225141faa5fbe8",
      "tree": "5d181e296bf756c271f3b748c8d3f880eb65f9ff",
      "parents": [
        "d32439c0d4cec5c4101477989ee8c7ee1ebfbb0e"
      ],
      "author": {
        "name": "Stephen Hemminger",
        "email": "shemminger@osdl.org",
        "time": "Fri Mar 03 17:16:15 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Sat Mar 04 21:06:23 2006 -0800"
      },
      "message": "[BRIDGE]: generate kobject remove event\n\nThe earlier round of kobject/sysfs changes to bridge caused\nit not to generate a uevent on removal. Don\u0027t think any application\ncares (not sure about Xen) but since it generates add uevent\nit should generate remove as well.\n\nSigned-off-by: Stephen Hemminger \u003cshemmigner@osdl.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d32439c0d4cec5c4101477989ee8c7ee1ebfbb0e",
      "tree": "c28284854f8f1aa74f60ed8378c0984fbcae747e",
      "parents": [
        "6e86b89084a60355f0e1fb876ca0cfbca62ee85c"
      ],
      "author": {
        "name": "Stephen Hemminger",
        "email": "shemminger@osdl.org",
        "time": "Fri Mar 03 17:15:34 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Sat Mar 04 21:06:21 2006 -0800"
      },
      "message": "[BRIDGE]: port timer initialization\n\nInitialize the STP timers for a port when it is created,\nrather than when it is enabled. This will prevent future race conditions\nwhere timer gets started before port is enabled.\n\nSigned-off-by: Stephen Hemminger \u003cshemmigner@osdl.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6e86b89084a60355f0e1fb876ca0cfbca62ee85c",
      "tree": "076b621fad864de984661a9a15bd526bc068776b",
      "parents": [
        "501f74f29498543c27f4f9697f5c1e980dd2de0d"
      ],
      "author": {
        "name": "Stephen Hemminger",
        "email": "shemminger@osdl.org",
        "time": "Fri Mar 03 17:14:51 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Sat Mar 04 21:06:19 2006 -0800"
      },
      "message": "[BRIDGE]: fix crash in STP\n\nBridge would crash because of uninitailized timer if STP is used and\ndevice was inserted into a bridge before bridge was up. This got\nintroduced when the delayed port checking was added.  Fix is to not\nenable STP on port unless bridge is up.\n\nBugzilla: http://bugzilla.kernel.org/show_bug.cgi?id\u003d6140\nDup:      http://bugzilla.kernel.org/show_bug.cgi?id\u003d6156\n\nSigned-off-by: Stephen Hemminger \u003cshemminger@osdl.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8f903c708fcc2b579ebf16542bf6109bad593a1d",
      "tree": "8fb890c05d962c2dd63f8dbc960efbd0b09802d2",
      "parents": [
        "ebe19a4ed78d4a11a7e01cdeda25f91b7f2fcb5a"
      ],
      "author": {
        "name": "Jay Vosburgh",
        "email": "fubar@us.ibm.com",
        "time": "Tue Feb 21 16:36:44 2006 -0800"
      },
      "committer": {
        "name": "Jeff Garzik",
        "email": "jeff@garzik.org",
        "time": "Fri Mar 03 20:58:00 2006 -0500"
      },
      "message": "[PATCH] bonding: suppress duplicate packets\n\n\tOriginally submitted by Kenzo Iwami; his original description is:\n\nThe current bonding driver receives duplicate packets when broadcast/\nmulticast packets are sent by other devices or packets are flooded by the\nswitch. In this patch, new flags are added in priv_flags of net_device\nstructure to let the bonding driver discard duplicate packets in\ndev.c:skb_bond().\n\n\tModified by Jay Vosburgh to change a define name, update some\ncomments, rearrange the new skb_bond() for clarity, clear all bonding\npriv_flags on slave release, and update the driver version.\n\nSigned-off-by: Kenzo Iwami \u003ck-iwami@cj.jp.nec.com\u003e\nSigned-off-by: Jay Vosburgh \u003cfubar@us.ibm.com\u003e\nSigned-off-by: Jeff Garzik \u003cjeff@garzik.org\u003e\n"
    },
    {
      "commit": "75e47b36004d136edff68295420424cba3a5ccd0",
      "tree": "363c2bc1f8b5185b37f05106fec4ba2a07134182",
      "parents": [
        "68727fed5469100bec0764207d7efb7a9ecdee29",
        "07981aa43f6aec32b875f360755ed3d14f9d5139"
      ],
      "author": {
        "name": "Jeff Garzik",
        "email": "jeff@garzik.org",
        "time": "Wed Mar 01 01:59:15 2006 -0500"
      },
      "committer": {
        "name": "Jeff Garzik",
        "email": "jeff@garzik.org",
        "time": "Wed Mar 01 01:59:15 2006 -0500"
      },
      "message": "Merge branch \u0027upstream\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "68727fed5469100bec0764207d7efb7a9ecdee29",
      "tree": "7afb58ab7665b90122d3b4505be5c6c9f8bade4b",
      "parents": [
        "dbfedbb98145375106cee7ec7269611d553819dc",
        "b5b9d6647c1cd5eee90b58941c55f874c2a7e707"
      ],
      "author": {
        "name": "Jeff Garzik",
        "email": "jeff@garzik.org",
        "time": "Wed Mar 01 01:58:38 2006 -0500"
      },
      "committer": {
        "name": "Jeff Garzik",
        "email": "jeff@garzik.org",
        "time": "Wed Mar 01 01:58:38 2006 -0500"
      },
      "message": "Merge branch \u0027upstream-fixes\u0027\n"
    },
    {
      "commit": "ce7eeb6b52bf1fc2a219503072732f35741d11de",
      "tree": "313d1d2e7cc1d26ce8ef29087c91f12d1ed4d0ff",
      "parents": [
        "816fd404718fc6064ddb05e6b310b2bc2ae7a187",
        "4832843d773462643cc471ca715382f5e509afb3"
      ],
      "author": {
        "name": "Jeff Garzik",
        "email": "jeff@garzik.org",
        "time": "Tue Feb 28 18:04:30 2006 -0500"
      },
      "committer": {
        "name": "Jeff Garzik",
        "email": "jeff@garzik.org",
        "time": "Tue Feb 28 18:04:30 2006 -0500"
      },
      "message": "Merge branch \u0027upstream-fixes\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "07981aa43f6aec32b875f360755ed3d14f9d5139",
      "tree": "21baf289bc23882f058e7ed90f80c76d01408119",
      "parents": [
        "a23f460dd0c7c9c58b03494c7819e126b2c72383"
      ],
      "author": {
        "name": "Pete Zaitcev",
        "email": "zaitcev@redhat.com",
        "time": "Sun Feb 26 16:29:51 2006 -0800"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Feb 27 20:14:58 2006 -0500"
      },
      "message": "[PATCH] ieee80211_geo.c: remove frivolous BUG_ON\u0027s\n\nI have come to consider BUG_ON generally harmful. The idea of an assert is\nto prevent a program to execute past a point where its state is known\nerroneous, thus preventing it from dealing more damage to the data\n(or hiding the traces of malfunction). The problem is, in kernel this harm\nhas to be balanced against the harm of forced reboot.\n\nThe last straw was our softmac tree, where \"iwlist eth1 scan\" causes\na lockup. It is absolutely frivolus and provides no advantages a normal\nassert has to provide. In fact, doing this impedes debugging.\n\nSigned-off-by: Pete Zaitcev \u003czaitcev@redhat.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "acfaf10be5c19f7dceb9d7372039dc45af66b100",
      "tree": "75dce83cc4495a13056fde1c2166323e07373858",
      "parents": [
        "c45ae87ec9d03c9adfc466a6b560cb38b154813a",
        "4832843d773462643cc471ca715382f5e509afb3"
      ],
      "author": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Feb 27 20:13:10 2006 -0500"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Feb 27 20:13:10 2006 -0500"
      },
      "message": "Merge branch \u0027upstream-fixes\u0027\n"
    },
    {
      "commit": "9f5a405b6843933c1cae5826046a5dd6357f142a",
      "tree": "bcdbb0175d37b780551b71c40abcde964a8905eb",
      "parents": [
        "b7cffb028abbffff3ba0b87268ecb775ed354049",
        "051d3cbd96909b2fe6b5038e7bbe77f41356db05"
      ],
      "author": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Feb 27 20:12:23 2006 -0500"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Feb 27 20:12:23 2006 -0500"
      },
      "message": "Merge branch \u0027from-linus\u0027\n"
    },
    {
      "commit": "4832843d773462643cc471ca715382f5e509afb3",
      "tree": "342ae6d4ea97b83aa123fdaaac392888d9d3189e",
      "parents": [
        "051d3cbd96909b2fe6b5038e7bbe77f41356db05"
      ],
      "author": {
        "name": "Pete Zaitcev",
        "email": "zaitcev@redhat.com",
        "time": "Sun Feb 26 23:43:20 2006 -0800"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Feb 27 20:12:02 2006 -0500"
      },
      "message": "[PATCH] ieee80211_rx.c: is_beacon\n\nFix broken is_beacon().\n\nSigned-off-by: Pete Zaitcev \u003czaitcev@redhat.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "ba13c98405ba44d37d148376c6615e6c8babbfdc",
      "tree": "34bab6d3ae89637192fea5a7e2a59925804840ee",
      "parents": [
        "bafac2a512bf4fd2ce7520f3976ce8aab4435f74"
      ],
      "author": {
        "name": "Arnaldo Carvalho de Melo",
        "email": "acme@mandriva.com",
        "time": "Mon Feb 27 13:30:43 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Feb 27 13:30:43 2006 -0800"
      },
      "message": "[REQSK]: Don\u0027t reset rskq_defer_accept in reqsk_queue_alloc\n\nIn 295f7324ff8d9ea58b4d3ec93b1aaa1d80e048a9 I moved defer_accept from\ntcp_sock to request_queue and mistakingly reset it at reqsl_queue_alloc, causing\ncalls to setsockopt(TCP_DEFER_ACCEPT ) to be lost after bind, the fix is to\nremove the zeroing of rskq_defer_accept from reqsl_queue_alloc.\n\nThanks to Alexandra N. Kossovsky \u003cAlexandra.Kossovsky@oktetlabs.ru\u003e for\nreporting and testing the suggested fix.\n\nSigned-off-by: Arnaldo Carvalho de Melo \u003cacme@mandriva.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "bafac2a512bf4fd2ce7520f3976ce8aab4435f74",
      "tree": "ff5c6538eeebceee2b3b5b137d6c66e8d28e77f1",
      "parents": [
        "45fe4dc08cbf9510074b97a16606366c1d405f4d"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Feb 27 13:04:17 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Feb 27 13:04:17 2006 -0800"
      },
      "message": "[NETFILTER]: Restore {ipt,ip6t,ebt}_LOG compatibility\n\nThe nfnetlink_log infrastructure changes broke compatiblity of the LOG\ntargets. They currently use whatever log backend was registered first,\nwhich means that if ipt_ULOG was loaded first, no messages will be printed\nto the ring buffer anymore.\n\nRestore compatiblity by using the old log functions by default and only use\nthe nf_log backend if the user explicitly said so.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "45fe4dc08cbf9510074b97a16606366c1d405f4d",
      "tree": "2c629e31e03d62e84c375ad809861806a02840e0",
      "parents": [
        "e121e9ecb08c3a9843243f461290869ff08be900"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Feb 27 13:03:55 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Feb 27 13:03:55 2006 -0800"
      },
      "message": "[NETFILTER]: nf_queue: fix end-of-list check\n\nThe comparison wants to find out if the last list iteration reached the\nend of the list. It needs to compare the iterator with the list head to\ndo this, not the element it is looking for.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e121e9ecb08c3a9843243f461290869ff08be900",
      "tree": "9574002aa4dfffafe16512460f12ef5c79486537",
      "parents": [
        "7a11b9848ae27e571f219fab5541bd84700f0d68"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Feb 27 13:03:39 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Feb 27 13:03:39 2006 -0800"
      },
      "message": "[NETFILTER]: nf_queue: remove unnecessary check for outfn\n\nThe only point of registering a queue handler is to provide an outfn,\nso there is no need to check for it.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7a11b9848ae27e571f219fab5541bd84700f0d68",
      "tree": "cd108f9df88ac218c8d9dab3fbda389df92f8d44",
      "parents": [
        "f92f871989c97a24d284ac60b0f880222ddf87ac"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Feb 27 13:03:24 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Feb 27 13:03:24 2006 -0800"
      },
      "message": "[NETFILTER]: nf_queue: fix rerouting after packet mangling\n\nPackets should be rerouted when they come back from userspace, not before.\nAlso move the queue_rerouters to RCU to avoid taking the queue_handler_lock\nfor each reinjected packet.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f92f871989c97a24d284ac60b0f880222ddf87ac",
      "tree": "8b9232f0e789dd0769b7025d773e6f2346ff5e95",
      "parents": [
        "e02f7d1603c955126e88cc08149509d00be25cb9"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Feb 27 13:03:10 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Feb 27 13:03:10 2006 -0800"
      },
      "message": "[NETFILTER]: nf_queue: check if rerouter is present before using it\n\nEvery rerouter needs to provide a save and a reroute function, we don\u0027t\nneed to check for them. But we do need to check if a rerouter is registered\nat all for the current family, with bridging for example packets of\nunregistered families can hit nf_queue.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e02f7d1603c955126e88cc08149509d00be25cb9",
      "tree": "ebd48da4b8cc55fb8070af70139e62e77a6f423c",
      "parents": [
        "752c1f4c78fe86d0fd6497387f763306b0d8fc53"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Feb 27 13:02:52 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Feb 27 13:02:52 2006 -0800"
      },
      "message": "[NETFILTER]: nf_queue: don\u0027t copy registered rerouter data\n\nUse the registered data structure instead of copying it.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "752c1f4c78fe86d0fd6497387f763306b0d8fc53",
      "tree": "50d7e52940d1adf0936805645d52e2419e5922cf",
      "parents": [
        "4bf05eceecf2efb4c883e9e9b17825682e7330dd"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Feb 27 13:00:40 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Feb 27 13:00:40 2006 -0800"
      },
      "message": "[IPSEC]: Kill post_input hook and do NAT-T in esp_input directly\n\nThe only reason post_input exists at all is that it gives us the\npotential to adjust the checksums incrementally in future which\nwe ought to do.\n\nHowever, after thinking about it for a bit we can adjust the\nchecksums without using this post_input stuff at all.  The crucial\npoint is that only the inner-most NAT-T SA needs to be considered\nwhen adjusting checksums.  What\u0027s more, the checksum adjustment\ncomes down to a single u32 due to the linearity of IP checksums.\n\nWe just happen to have a spare u32 lying around in our skb structure :)\nWhen ip_summed is set to CHECKSUM_NONE on input, the value of skb-\u003ecsum\nis currently unused.  All we have to do is to make that the checksum\nadjustment and voila, there goes all the post_input and decap structures!\n\nI\u0027ve left in the decap data structures for now since it\u0027s intricately\nwoven into the sec_path stuff.  We can kill them later too.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4bf05eceecf2efb4c883e9e9b17825682e7330dd",
      "tree": "0cbd4b8a8b972220e97c88aadbee0661b0e88747",
      "parents": [
        "de5f503cfbe4f942492269c6bd97a16a4d61e488"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Feb 27 13:00:01 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Feb 27 13:00:01 2006 -0800"
      },
      "message": "[IPSEC] esp: Kill unnecessary block and indentation\n\nWe used to keep sg on the stack which is why the extra block was useful.\nWe\u0027ve long since stopped doing that so let\u0027s kill the block and save\nsome indentation.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "dbfedbb98145375106cee7ec7269611d553819dc",
      "tree": "81d2a6de51b1bb3c704e5385dbc90ca79efa69bc",
      "parents": [
        "7b0386921db20add25afd8678ed34a9253e512fc",
        "e95a9ec1bb66e07b138861c743192f06e7b3e4de"
      ],
      "author": {
        "name": "Jeff Garzik",
        "email": "jeff@garzik.org",
        "time": "Mon Feb 27 11:33:51 2006 -0500"
      },
      "committer": {
        "name": "Jeff Garzik",
        "email": "jeff@garzik.org",
        "time": "Mon Feb 27 11:33:51 2006 -0500"
      },
      "message": "Merge branch \u0027master\u0027\n"
    },
    {
      "commit": "d91675f9c7f5752e8657df1e1d926bd6a624434f",
      "tree": "c0285999dc00ca9c8af84606ee98224c67c71e96",
      "parents": [
        "0c0888908dec145aaaa40d8a49d34913573f5a27"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yosufuji@linux-ipv6.org",
        "time": "Fri Feb 24 13:18:33 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Feb 24 13:18:33 2006 -0800"
      },
      "message": "[IPV6]: Do not ignore IPV6_MTU socket option.\n\nBased on patch by Hoerdt Mickael \u003choerdt@clarinet.u-strasbg.fr\u003e.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyosufuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0c0888908dec145aaaa40d8a49d34913573f5a27",
      "tree": "aec1c2ada56fe338934bad1ca916328beff0a1c3",
      "parents": [
        "f52ee1410d563cd409b08822492273a5bc235821"
      ],
      "author": {
        "name": "Hugo Santos",
        "email": "hsantos@av.it.pt",
        "time": "Fri Feb 24 13:16:25 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Feb 24 13:16:25 2006 -0800"
      },
      "message": "[IPV6] ip6_tunnel: release cached dst on change of tunnel params\n\nThe included patch fixes ip6_tunnel to release the cached dst entry\nwhen the tunnel parameters (such as tunnel endpoints) are changed so\nthey are used immediatly for the next encapsulated packets.\n\nSigned-off-by: Hugo Santos \u003chsantos@av.it.pt\u003e\nAcked-by: Ville Nuorvala \u003cvnuorval@tcs.hut.fi\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7b0386921db20add25afd8678ed34a9253e512fc",
      "tree": "8c6b888b76211e38e6c1c3006553dc4b2b24c75e",
      "parents": [
        "c5580a7ecb859c6821dd761c95fa150ec7695ae1",
        "22fe472cb430ce45c4fb9b6d13060dd724d6dbc8"
      ],
      "author": {
        "name": "Jeff Garzik",
        "email": "jeff@garzik.org",
        "time": "Thu Feb 23 21:16:27 2006 -0500"
      },
      "committer": {
        "name": "Jeff Garzik",
        "email": "jeff@garzik.org",
        "time": "Thu Feb 23 21:16:27 2006 -0500"
      },
      "message": "Merge branch \u0027upstream-fixes\u0027\n"
    },
    {
      "commit": "4da3089f2b582b21e1374ccc6df722d4361eb915",
      "tree": "fe29539a688f524ef58eab1178c1ef1bea2bff66",
      "parents": [
        "f8d0e3f11593928ac3f968c378a44e80b04488c9"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Thu Feb 23 16:19:26 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 23 16:19:26 2006 -0800"
      },
      "message": "[IPSEC]: Use TOS when doing tunnel lookups\n\nWe should use the TOS because it\u0027s one of the routing keys.  It also\nmeans that we update the correct routing cache entry when PMTU occurs.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f8d0e3f11593928ac3f968c378a44e80b04488c9",
      "tree": "53412bcf3c5860acc821e9a7ec210eb69b83a32f",
      "parents": [
        "21380b81ef8699179b535e197a95b891a7badac7"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Thu Feb 23 16:18:01 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 23 16:18:01 2006 -0800"
      },
      "message": "[NET] ethernet: Fix first packet goes out with MAC 00:00:00:00:00:00\n\nWhen you turn off ARP on a netdevice then the first packet always goes\nout with a dstMAC of all zeroes. This is because the first packet is\nused to resolve ARP entries. Even though the ARP entry may be resolved\n(I tried by setting a static ARP entry for a host i was pinging from),\nit gets overwritten by virtue of having the netdevice disabling ARP.\n\nSubsequent packets go out fine with correct dstMAC address (which may\nbe why people have ignored reporting this issue).\n\nTo cut the story short: \n\nthe culprit code is in net/ethernet/eth.c::eth_header()\n\n----\n        /*\n         *      Anyway, the loopback-device should never use this\nfunction...\n         */\n\n        if (dev-\u003eflags \u0026 (IFF_LOOPBACK|IFF_NOARP))\n        {\n                memset(eth-\u003eh_dest, 0, dev-\u003eaddr_len);\n                return ETH_HLEN;\n        }\n\n\tif(daddr)\n        {\n                memcpy(eth-\u003eh_dest,daddr,dev-\u003eaddr_len);\n                return ETH_HLEN;\n        }\n\n----\n\nNote how the h_dest is being reset when device has IFF_NOARP.\n\nAs a note:\nAll devices including loopback pass a daddr. loopback in fact passes\na 0 all the time ;-\u003e \nThis means i can delete the check totaly or i can remove the IFF_NOARP\n\nAlexey says:\n--------------------\nI think, it was me who did this crap. It was so long ago I do not remember\nwhy it was made.\n\nI remember some troubles with dummy device. It tried to resolve\naddresses, apparently, without success and generated errors instead of\nblackholing. I think the problem was eventually solved at neighbour\nlevel.\n\nAfter some thinking I suspect the deletion of this chunk could change\nbehaviour of some parts which do not use neighbour cache f.e. packet\nsocket.\n\nI think safer approach would be to move this chunk after if (daddr).\nAnd the possibility to remove this completely could be analyzed later.\n--------------------\n\nPatch updated with Alexey\u0027s safer suggestions.\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nAcked-by: Alexey Kuznetsov \u003ckuznet@ms2.inr.ac.ru\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "21380b81ef8699179b535e197a95b891a7badac7",
      "tree": "1a6be9864cabbed59db6357b2f0244413acac4c4",
      "parents": [
        "85259878499d6c428cba191bb4e415a250dcd75a"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Feb 22 14:47:13 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu Feb 23 16:10:53 2006 -0800"
      },
      "message": "[XFRM]: Eliminate refcounting confusion by creating __xfrm_state_put().\n\nWe often just do an atomic_dec(\u0026x-\u003erefcnt) on an xfrm_state object\nbecause we know there is more than 1 reference remaining and thus\nwe can elide the heavier xfrm_state_put() call.\n\nDo this behind an inline function called __xfrm_state_put() so that is\nmore obvious and also to allow us to more cleanly add refcount\ndebugging later.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "85259878499d6c428cba191bb4e415a250dcd75a",
      "tree": "6b9c1592f66886917b6ec09dd55f9c52eb850561",
      "parents": [
        "42cf93cd464e0df3c85d298c647411bae6d99e6e"
      ],
      "author": {
        "name": "Suresh Bhogavilli",
        "email": "sbhogavilli@verisign.com",
        "time": "Tue Feb 21 13:42:22 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu Feb 23 16:10:52 2006 -0800"
      },
      "message": "[IPV4]: Fix garbage collection of multipath route entries\n\nWhen garbage collecting route cache entries of multipath routes\nin rt_garbage_collect(), entries were deleted from the hash bucket\n\u0027i\u0027 while holding a spin lock on bucket \u0027k\u0027 resulting in a system\nhang.  Delete entries, if any, from bucket \u0027k\u0027 instead.\n\nSigned-off-by: Suresh Bhogavilli \u003csbhogavilli@verisign.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "42cf93cd464e0df3c85d298c647411bae6d99e6e",
      "tree": "f68f155f6eedbac8ac8c32c8c947d5a2f6cb2033",
      "parents": [
        "a80614d1adba903a1e5cb22bf14ebc640fc2ba4c"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Tue Feb 21 13:37:35 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu Feb 23 16:10:51 2006 -0800"
      },
      "message": "[NETFILTER]: Fix bridge netfilter related in xfrm_lookup\n\nThe bridge-netfilter code attaches a fake dst_entry with dst-\u003eops \u003d\u003d NULL\nto purely bridged packets. When these packets are SNATed and a policy\nlookup is done, xfrm_lookup crashes because it tries to dereference\ndst-\u003eops.\n\nChange xfrm_lookup not to dereference dst-\u003eops before checking for the\nDST_NOXFRM flag and set this flag in the fake dst_entry.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "cf70a6f264f6e1a4c06553699159d94996b2f916",
      "tree": "7a5993585e7e8b80c37cae75468fca45da6519d2",
      "parents": [
        "0b1fc9b86f49e1e73e473e06a16556ca0dce53ae",
        "ad6b97fc929e5844bfd1d708ab1d74d131d7960d"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@g5.osdl.org",
        "time": "Mon Feb 20 20:09:44 2006 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@g5.osdl.org",
        "time": "Mon Feb 20 20:09:44 2006 -0800"
      },
      "message": "Merge branch \u0027fixes.b8\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/viro/bird\n"
    },
    {
      "commit": "a8372f035aa2f6717123eb30679a08b619321dd4",
      "tree": "8f4980a847ba961513340ac4200a1a918773c0a9",
      "parents": [
        "8e249f088131cde5f77fd073bf0b0e8b3e9ea4ac"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Sun Feb 19 22:32:06 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Feb 19 22:32:06 2006 -0800"
      },
      "message": "[NET]: NETFILTER: remove duplicated lines and fix order in skb_clone().\n\nSome of netfilter-related members are initalized / copied twice in\nskb_clone(). Remove one.\n\nPointed out by Olivier MATZ \u003colivier.matz@6wind.com\u003e.\n\nAnd this patch also fixes order of copying / clearing members.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8e249f088131cde5f77fd073bf0b0e8b3e9ea4ac",
      "tree": "e0113097593dd2b805310bf525b0d2a6823f0a06",
      "parents": [
        "669d32a293a348e692c365ddac2b23f3b907fcf1"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Sun Feb 19 22:29:47 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Feb 19 22:29:47 2006 -0800"
      },
      "message": "[NETFILTER]: Fix outgoing redirects to loopback\n\nWhen redirecting an outgoing packet to loopback, it keeps the original\nconntrack reference and information from the outgoing path, which\nfalsely triggers the check for DNAT on input and the dst_entry is\nreleased to trigger rerouting. ip_route_input refuses to route the\npacket because it has a local source address and it is dropped.\n\nLook at the packet itself to dermine if it was NATed. Also fix a\nmissing inversion that causes unneccesary xfrm lookups.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "bc6e14b6f0b06fe93d809d22e257ddd275feeda9",
      "tree": "ca4ef0d384a904c6fd5a4f995a500034a4733fce",
      "parents": [
        "995110143880fd9cb255fa5df05f8950c56fb43a"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Sun Feb 19 22:26:40 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Feb 19 22:26:40 2006 -0800"
      },
      "message": "[NETFILTER]: Fix NAT PMTUD problems\n\nICMP errors are only SNATed when their source matches the source of the\nconnection they are related to, otherwise the source address is not\nchanged. This creates problems with ICMP frag. required messages\noriginating from a router behind the NAT, if private IPs are used the\npacket has a good change of getting dropped on the path to its destination.\n\nAlways NAT ICMP errors similar to the original connection.\n\nBased on report by Al Viro.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "995110143880fd9cb255fa5df05f8950c56fb43a",
      "tree": "06666d72e4a4e06c646cb0ca683ee9ce0f286c82",
      "parents": [
        "bd71c2b17468a2531fb4c81ec1d73520845e97e1"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Sun Feb 19 22:11:50 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Feb 19 22:11:50 2006 -0800"
      },
      "message": "[XFRM]: Fix policy double put\n\nThe policy is put once immediately and once at the error label, which results\nin the following Oops:\n\nkernel BUG at net/xfrm/xfrm_policy.c:250!\ninvalid opcode: 0000 [#2]\nPREEMPT\n[...]\nCPU:    0\nEIP:    0060:[\u003cc028caf7\u003e]    Not tainted VLI\nEFLAGS: 00210246   (2.6.16-rc3 #39)\nEIP is at __xfrm_policy_destroy+0xf/0x46\neax: d49f2000   ebx: d49f2000   ecx: f74bd880   edx: f74bd280\nesi: d49f2000   edi: 00000001   ebp: cd506dcc   esp: cd506dc8\nds: 007b   es: 007b   ss: 0068\nProcess ssh (pid: 31970, threadinfo\u003dcd506000 task\u003dcfb04a70)\nStack: \u003c0\u003ecd506000 cd506e34 c028e92b ebde7280 cd506e58 cd506ec0 f74bd280 00000000\n       00000214 0000000a 0000000a 00000000 00000002 f7ae6000 00000000 cd506e58\n       cd506e14 c0299e36 f74bd280 e873fe00 c02943fd cd506ec0 ebde7280 f271f440\nCall Trace:\n [\u003cc0103a44\u003e] show_stack_log_lvl+0xaa/0xb5\n [\u003cc0103b75\u003e] show_registers+0x126/0x18c\n [\u003cc0103e68\u003e] die+0x14e/0x1db\n [\u003cc02b6809\u003e] do_trap+0x7c/0x96\n [\u003cc0104237\u003e] do_invalid_op+0x89/0x93\n [\u003cc01035af\u003e] error_code+0x4f/0x54\n [\u003cc028e92b\u003e] xfrm_lookup+0x349/0x3c2\n [\u003cc02b0b0d\u003e] ip6_datagram_connect+0x317/0x452\n [\u003cc0281749\u003e] inet_dgram_connect+0x49/0x54\n [\u003cc02404d2\u003e] sys_connect+0x51/0x68\n [\u003cc0240928\u003e] sys_socketcall+0x6f/0x166\n [\u003cc0102aa1\u003e] syscall_call+0x7/0xb\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "cc6cdac0cf11955dc81d6c50b6738d05e1dca12b",
      "tree": "7d5d033ea4f59605ae0d8c21e1284af999ba6fb2",
      "parents": [
        "00fc00df9e7b637cd13fe1f163da0a2957273947"
      ],
      "author": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Sat Feb 18 16:02:18 2006 -0500"
      },
      "committer": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Sat Feb 18 16:02:18 2006 -0500"
      },
      "message": "[PATCH] missing ntohs() in ip6_tunnel\n\n-\u003epayload_len is net-endian\n\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\n"
    },
    {
      "commit": "b04a92e1601eb6df3a3b6599e7fb7ee021eef2cb",
      "tree": "f190980d5bffae81a67c0cea0d913ed2444ceb0c",
      "parents": [
        "70c07e02625ec46d0ffbfce1acef42d660803528",
        "f5e2a7b22e7d7dfda8794906d0fddeaaa09bb944"
      ],
      "author": {
        "name": "Jeff Garzik",
        "email": "jgarzik@pobox.com",
        "time": "Fri Feb 17 16:20:30 2006 -0500"
      },
      "committer": {
        "name": "Jeff Garzik",
        "email": "jgarzik@pobox.com",
        "time": "Fri Feb 17 16:20:30 2006 -0500"
      },
      "message": "Merge branch \u0027upstream-fixes\u0027\n"
    },
    {
      "commit": "b7cffb028abbffff3ba0b87268ecb775ed354049",
      "tree": "e5a4dd1cca31bf38c2a57214ab3d2a9ae1c5e367",
      "parents": [
        "22d8846e5ce329436628da71a4239ccc2745869f"
      ],
      "author": {
        "name": "Johannes Berg",
        "email": "johannes@sipsolutions.net",
        "time": "Wed Jan 04 20:58:10 2006 +0100"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Fri Feb 17 10:41:34 2006 -0500"
      },
      "message": "[PATCH] ieee80211: fix sparse warning about missing \"static\"\n\nThis patch adds a missing \"static\" on a variable (sparse complaint)\n\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "471680828330e6b2aac295cf7ac9d8e5820df2eb",
      "tree": "b205c8371e8be20413ac85c71294a1e1b87e0819",
      "parents": [
        "2c0f63166a5998102ddc7697706af83cbff49317"
      ],
      "author": {
        "name": "Zhu Yi",
        "email": "yi.zhu@intel.com",
        "time": "Mon Feb 13 13:37:03 2006 +0800"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Fri Feb 17 08:16:59 2006 -0500"
      },
      "message": "[PATCH] ieee80211: Use IWEVGENIE to set WPA IE\n\nIt replaces returning WPA/RSN IEs as custom events with returning them\nas IWEVGENIE events. I have tested that it returns proper information\nwith both Xsupplicant, and the latest development version of the Linux\nwireless tools.\n\nSigned-off-by: Chris Hessing \u003cChris.Hessing@utah.edu\u003e\nSigned-off-by: Zhu Yi \u003cyi.zhu@intel.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "750b50ab5687125d8a1dc946d931b00acf016e2c",
      "tree": "eacec989ec38e67da84fcc6842b364670d7a1e34",
      "parents": [
        "ab479995b191b4256183956c13caabb86331af8e",
        "70c07e02625ec46d0ffbfce1acef42d660803528"
      ],
      "author": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Fri Feb 17 08:15:41 2006 -0500"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Fri Feb 17 08:15:41 2006 -0500"
      },
      "message": "Merge branch \u0027upstream\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/jgarzik/netdev-2.6\n"
    },
    {
      "commit": "7c6de05884b9fcc7ef621e2ab198ba93d85f46aa",
      "tree": "0ed6f6709aa703691be1292d2cb1a60ab338bdec",
      "parents": [
        "763ecff1879b3877f57f20fc9e79599aef59359f"
      ],
      "author": {
        "name": "Yasuyuki Kozakai",
        "email": "yasuyuki.kozakai@toshiba.co.jp",
        "time": "Wed Feb 15 15:25:18 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Feb 15 15:25:18 2006 -0800"
      },
      "message": "[NETFILTER]: nf_conntrack: Fix TCP/UDP HW checksum handling for IPv6 packet\n\nIf skb-\u003eip_summed is CHECKSUM_HW here, skb-\u003ecsum includes checksum\nof actual IPv6 header and extension headers. Then such excess\nchecksum must be subtruct when nf_conntrack calculates TCP/UDP checksum\nwith pseudo IPv6 header. Spotted by Ben Skeggs.\n\nSigned-off-by: Yasuyuki Kozakai \u003cyasuyuki.kozakai@toshiba.co.jp\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "763ecff1879b3877f57f20fc9e79599aef59359f",
      "tree": "ac347004ebbc1778ffb3dae786d13ada023ecb98",
      "parents": [
        "08857fa745ab6ce46601960d2774490e1cef2cff"
      ],
      "author": {
        "name": "Yasuyuki Kozakai",
        "email": "yasuyuki.kozakai@toshiba.co.jp",
        "time": "Wed Feb 15 15:24:15 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Feb 15 15:24:15 2006 -0800"
      },
      "message": "[NETFILTER]: nf_conntrack: attach conntrack to locally generated ICMPv6 error\n\nLocally generated ICMPv6 errors should be associated with the conntrack\nof the original packet. Since the conntrack entry may not be in the hash\ntables (for the first packet), it must be manually attached.\n\nSigned-off-by: Yasuyuki Kozakai \u003cyasuyuki.kozakai@toshiba.co.jp\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "08857fa745ab6ce46601960d2774490e1cef2cff",
      "tree": "8a7c4e341441bc5acc76f9fcf8b75de0086ff060",
      "parents": [
        "7d3cdc6b554137a7a0534ce38b155a63a3117f27"
      ],
      "author": {
        "name": "Yasuyuki Kozakai",
        "email": "yasuyuki.kozakai@toshiba.co.jp",
        "time": "Wed Feb 15 15:23:28 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Feb 15 15:23:28 2006 -0800"
      },
      "message": "[NETFILTER]: nf_conntrack: attach conntrack to TCP RST generated by ip6t_REJECT\n\nTCP RSTs generated by the REJECT target should be associated with the\nconntrack of the original TCP packet. Since the conntrack entry is\nusually not is the hash tables, it must be manually attached.\n\nSigned-off-by: Yasuyuki Kozakai \u003cyasuyuki.kozakai@toshiba.co.jp\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7d3cdc6b554137a7a0534ce38b155a63a3117f27",
      "tree": "af96ac02ab7884384e2a4e5ac62f8343ee0b463d",
      "parents": [
        "deac0ccdb4da16b68539d75edecf26162de05150"
      ],
      "author": {
        "name": "Yasuyuki Kozakai",
        "email": "yasuyuki.kozakai@toshiba.co.jp",
        "time": "Wed Feb 15 15:22:21 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Feb 15 15:22:21 2006 -0800"
      },
      "message": "[NETFILTER]: nf_conntrack: move registration of __nf_ct_attach\n\nMove registration of __nf_ct_attach to nf_conntrack_core to make it usable\nfor IPv6 connection tracking as well.\n\nSigned-off-by: Yasuyuki Kozakai \u003cyasuyuki.kozakai@toshiba.co.jp\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "deac0ccdb4da16b68539d75edecf26162de05150",
      "tree": "ec79f4d4fa6f26b7a00fb5346c4d48f97867e246",
      "parents": [
        "9c92d3486434e7310cb288587953e2dae4a79701"
      ],
      "author": {
        "name": "Yasuyuki Kozakai",
        "email": "yasuyuki.kozakai@toshiba.co.jp",
        "time": "Wed Feb 15 15:21:31 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Feb 15 15:21:31 2006 -0800"
      },
      "message": "[NETFILTER]: x_tables: fix dependencies of conntrack related modules\n\nNF_CONNTRACK_MARK is bool and depends on NF_CONNTRACK which is\ntristate.  If a variable depends on NF_CONNTRACK_MARK and doesn\u0027t take\ncare about NF_CONNTRACK, it can be y even if NF_CONNTRACK isn\u0027t y.\nNF_CT_ACCT have same issue, too.\n\nSigned-off-by: Yasuyuki Kozakai \u003cyasuyuki.kozakai@toshiba.co.jp\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "48d5cad87c3a4998d0bda16ccfb5c60dfe4de5fb",
      "tree": "bfad91af72f4c522a44bab6133b540cda365d8c1",
      "parents": [
        "5ecfbae093f0c37311e89b29bfc0c9d586eace87"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Wed Feb 15 15:10:22 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Feb 15 15:10:22 2006 -0800"
      },
      "message": "[XFRM]: Fix SNAT-related crash in xfrm4_output_finish\n\nWhen a packet matching an IPsec policy is SNATed so it doesn\u0027t match any\npolicy anymore it looses its xfrm bundle, which makes xfrm4_output_finish\ncrash because of a NULL pointer dereference.\n\nThis patch directs these packets to the original output path instead. Since\nthe packets have already passed the POST_ROUTING hook, but need to start at\nthe beginning of the original output path which includes another\nPOST_ROUTING invocation, a flag is added to the IPCB to indicate that the\npacket was rerouted and doesn\u0027t need to pass the POST_ROUTING hook again.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "78872ccb68335b14f0d1ac7338ecfcbf1cba1df4",
      "tree": "20f39c4cddd8f4d461977dc0ed334e61b6c1d431",
      "parents": [
        "ee68cea2c26b7a8222f9020f54d22c6067011e8b"
      ],
      "author": {
        "name": "Adrian Drzewiecki",
        "email": "z@drze.net",
        "time": "Wed Feb 15 01:47:48 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Feb 15 01:47:48 2006 -0800"
      },
      "message": "[BRIDGE]: Fix deadlock in br_stp_disable_bridge\n\nLooks like somebody forgot to use the _bh spin_lock variant. We ran into a \ndeadlock where br-\u003ehello_timer expired while br_stp_disable_br() walked \nbr-\u003eport_list. \n\nSigned-off-by: Adrian Drzewiecki \u003cz@drze.net\u003e\nSigned-off-by: Stephen Hemminger \u003cshemminger@osdl.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ee68cea2c26b7a8222f9020f54d22c6067011e8b",
      "tree": "e99b13be0392532d17a133fe6b9e7edb0a7a4de9",
      "parents": [
        "10ee39fe3ff618d274e1cd0f6abbc2917b736bfd"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Wed Feb 15 01:34:23 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Feb 15 01:34:23 2006 -0800"
      },
      "message": "[NETFILTER]: Fix xfrm lookup after SNAT\n\nTo find out if a packet needs to be handled by IPsec after SNAT, packets\nare currently rerouted in POST_ROUTING and a new xfrm lookup is done. This\nbreaks SNAT of non-unicast packets to non-local addresses because the\npacket is routed as incoming packet and no neighbour entry is bound to the\ndst_entry. In general, it seems to be a bad idea to replace the dst_entry\nafter the packet was already sent to the output routine because its state\nmight not match what\u0027s expected.\n\nThis patch changes the xfrm lookup in POST_ROUTING to re-use the original\ndst_entry without routing the packet again. This means no policy routing\ncan be used for transport mode transforms (which keep the original route)\nwhen packets are SNATed to match the policy, but it looks like the best\nwe can do for now.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b4d9eda028e8becbb5057b554e63eea12e496a88",
      "tree": "f3dfa4aa380fe89a4aeff049c2f5b13b72404a1b",
      "parents": [
        "00de651d14baabc5c1d2f32c49d9a984d8891c8e"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Mon Feb 13 16:06:10 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Mon Feb 13 16:06:10 2006 -0800"
      },
      "message": "[NET]: Revert skb_copy_datagram_iovec() recursion elimination.\n\nRevert the following changeset:\n\nbc8dfcb93970ad7139c976356bfc99d7e251deaf\n\nRecursive SKB frag lists are really possible and disallowing\nthem breaks things.\n\nNoticed by: Jesse Brandeburg \u003cjesse.brandeburg@intel.com\u003e\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "00de651d14baabc5c1d2f32c49d9a984d8891c8e",
      "tree": "dee86291586baf00e9c34dd8f4545088a36877ef",
      "parents": [
        "6d3e85ecf22a5e3610df47b9c3fb2fc32cfd35bf"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Feb 13 16:01:27 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Feb 13 16:01:27 2006 -0800"
      },
      "message": "[IPSEC]: Fix strange IPsec freeze.\n\nProblem discovered and initial patch by Olaf Kirch:\n\n\tthere\u0027s a problem with IPsec that has been bugging some of our users\n\tfor the last couple of kernel revs. Every now and then, IPsec will\n\tfreeze the machine completely. This is with openswan user land,\n\tand with kernels up to and including 2.6.16-rc2.\n\n\tI managed to debug this a little, and what happens is that we end\n\tup looping in xfrm_lookup, and never get out. With a bit of debug\n\tprintks added, I can this happening:\n\n\t\tip_route_output_flow calls xfrm_lookup\n\n\t\txfrm_find_bundle returns NULL (apparently we\u0027re in the\n\t\t\tmiddle of negotiating a new SA or something)\n\n\t\tWe therefore call xfrm_tmpl_resolve. This returns EAGAIN\n\t\t\tWe go to sleep, waiting for a policy update.\n\t\t\tThen we loop back to the top\n\n\t\tApparently, the dst_orig that was passed into xfrm_lookup\n\t\t\thas been dropped from the routing table (obsolete\u003d2)\n\t\t\tThis leads to the endless loop, because we now create\n\t\t\ta new bundle, check the new bundle and find it\u0027s stale\n\t\t\t(stale_bundle -\u003e xfrm_bundle_ok -\u003e dst_check() return 0)\n\n\tPeople have been testing with the patch below, which seems to fix the\n\tproblem partially. They still see connection hangs however (things\n\tonly clear up when they start a new ping or new ssh). So the patch\n\tis obvsiouly not sufficient, and something else seems to go wrong.\n\n\tI\u0027m grateful for any hints you may have...\n\nI suggest that we simply bail out always.  If the dst decides to die\non us later on, the packet will be dropped anyway.  So there is no\ngreat urgency to retry here.  Once we have the proper resolution\nqueueing, we can then do the retry again.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nAcked-by: Olaf Kirch \u003cokir@suse.de\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6d3e85ecf22a5e3610df47b9c3fb2fc32cfd35bf",
      "tree": "d82d346f7b4c03f1e323cec0df8ee74052f0a31c",
      "parents": [
        "72fb630dad170084026bda6728b8d8f21ed48ff1"
      ],
      "author": {
        "name": "Nicolas DICHTEL",
        "email": "nicolas.dichtel@6wind.com",
        "time": "Mon Feb 13 15:56:13 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Feb 13 15:56:13 2006 -0800"
      },
      "message": "[IPV6] Don\u0027t store dst_entry for RAW socket\n\nSigned-off-by: Nicolas DICHTEL \u003cnicolas.dichtel@6wind.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e200bd8065e4db6297cd8db071a9188cf9aa6b56",
      "tree": "80c9ced19aa5a0fa0cc9be69d34ca45cf92394ad",
      "parents": [
        "178a3259f2508e786fb1bd6538365a167cee35c1"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Mon Feb 13 15:51:24 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Feb 13 15:51:24 2006 -0800"
      },
      "message": "[NETLINK] genetlink: Fix bugs spotted by Andrew Morton.\n\n- panic() doesn\u0027t return.\n\n- Don\u0027t forget to unlock on genl_register_family() error path\n\n- genl_rcv_msg() is called via pointer so there\u0027s no point in declaring it\n  `inline\u0027.\n\nNotes:\n\ngenl_ctrl_event() ignores the genlmsg_multicast() return value.\n\nlots of things ignore the genl_ctrl_event() return value.\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: Andrew Morton \u003cakpm@osdl.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "178a3259f2508e786fb1bd6538365a167cee35c1",
      "tree": "3736fd620ecdec6193b52505982e8fa12698c695",
      "parents": [
        "a6c1cd572642478528165ac44db4d2daae125a21"
      ],
      "author": {
        "name": "Stephen Hemminger",
        "email": "shemminger@osdl.org",
        "time": "Mon Feb 13 15:43:58 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Feb 13 15:43:58 2006 -0800"
      },
      "message": "[BRIDGE]: Better fix for netfilter missing symbol has_bridge_parent\n\nHorms patch was the best of the three fixes. Dave, already applied\nHarald\u0027s version, so this patch converts that to the better one.\n\nSigned-off-by: Stephen Hemminger \u003cshemminger@osdl.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a6c1cd572642478528165ac44db4d2daae125a21",
      "tree": "c622476fd8a0092710dd325d5154c2b49fc7a898",
      "parents": [
        "15c38c6ecd772ae4cc497955f916f40e803e7528"
      ],
      "author": {
        "name": "Harald Welte",
        "email": "laforge@netfilter.org",
        "time": "Mon Feb 13 15:42:48 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Feb 13 15:42:48 2006 -0800"
      },
      "message": "[NETFILTER] Fix Kconfig menu level for x_tables\n\nThe new x_tables related Kconfig options appear at the wrong menu level\nwithout this patch.\n\nSigned-off-by: Harald Welte \u003claforge@netfilter.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "15c38c6ecd772ae4cc497955f916f40e803e7528",
      "tree": "f3a967377a58a2e6aae2cfd7f72400deee6a2433",
      "parents": [
        "99e382afd297d91ab150ae46c28c4585f925818c",
        "9225806386e398eeba46958a7befa017bda73f58"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Mon Feb 13 15:40:55 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Mon Feb 13 15:40:55 2006 -0800"
      },
      "message": "Merge master.kernel.org:/pub/scm/linux/kernel/git/holtmann/bluetooth-2.6\n"
    },
    {
      "commit": "99e382afd297d91ab150ae46c28c4585f925818c",
      "tree": "8a2ab5c8437bff91919588976294f7b38b7e57e8",
      "parents": [
        "77decfc716d460b3f7037bb19bd4eb12cd0dc996"
      ],
      "author": {
        "name": "Dave Jones",
        "email": "davej@redhat.com",
        "time": "Mon Feb 13 15:38:42 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Feb 13 15:38:42 2006 -0800"
      },
      "message": "[P8023]: Fix tainting of kernel.\n\nMissing license tag.\nI\u0027ve assumed this is GPL.  (It could also use a MODULE_AUTHOR)\n\nSigned-off-by: Dave Jones \u003cdavej@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "77decfc716d460b3f7037bb19bd4eb12cd0dc996",
      "tree": "e6fca07597e12c07af4bd90cfffc80a3f694387e",
      "parents": [
        "bf3883c12fece9189ab4f7bb6e2690451db1366e"
      ],
      "author": {
        "name": "Dave Jones",
        "email": "davej@redhat.com",
        "time": "Mon Feb 13 15:36:21 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Feb 13 15:36:21 2006 -0800"
      },
      "message": "[IPV4] ICMP: Invert default for invalid icmp msgs sysctl\n\nisic can trigger these msgs to be spewed at a very high rate.\nThere\u0027s already a sysctl to turn them off. Given these messages\naren\u0027t useful for most people, this patch disables them by\ndefault.\n\nSigned-off-by: Dave Jones \u003cdavej@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "bf3883c12fece9189ab4f7bb6e2690451db1366e",
      "tree": "044a6678fff7b3325169794d2a06f2d25ef95616",
      "parents": [
        "7a11c4d0635d9f6995736390b8c3346fe6f63d57"
      ],
      "author": {
        "name": "Dave Jones",
        "email": "davej@redhat.com",
        "time": "Mon Feb 13 15:34:58 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Feb 13 15:34:58 2006 -0800"
      },
      "message": "[ATM]: Ratelimit atmsvc failure messages\n\nThis seems to be trivial to trigger.\n\nSigned-off-by: Dave Jones \u003cdavej@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7b005bd34c895ebeefd1c62f90a329730b88946b",
      "tree": "7a7143c1b29b902122fe5e17a10ad4cb2ec66291",
      "parents": [
        "56f3a40a5e7586043260669cc794e56fa58339e1"
      ],
      "author": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Mon Feb 13 11:40:03 2006 +0100"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Mon Feb 13 11:40:03 2006 +0100"
      },
      "message": "[Bluetooth] Fix NULL pointer dereferences of the HCI socket\n\nThis patch fixes the two NULL pointer dereferences found by the sfuzz\ntool from Ilja van Sprundel. The first one was a call of getsockname()\nfor an unbound socket and the second was calling accept() while this\noperation isn\u0027t implemented for the HCI socket interface.\n\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "56f3a40a5e7586043260669cc794e56fa58339e1",
      "tree": "a2a756d86f8ff9da8d5668d2dfbf51f5107c53ce",
      "parents": [
        "e9bb4c9929a63b23dcc637fae312b36b038bdc61"
      ],
      "author": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Mon Feb 13 11:39:57 2006 +0100"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Mon Feb 13 11:39:57 2006 +0100"
      },
      "message": "[Bluetooth] Reduce L2CAP MTU for RFCOMM connections\n\nThis patch reduces the default L2CAP MTU for all RFCOMM connections\nfrom 1024 to 1013 to improve the interoperability with some broken\nRFCOMM implementations. To make this more flexible the L2CAP MTU\nbecomes also a module parameter and so it can changed at runtime.\n\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "3c791925da0e6108cda15e3c2c7bfaebcd9ab9cf",
      "tree": "cc931cbbe81b15687d28f774e916dd917ae0bf88",
      "parents": [
        "d524c5e200486d55942fcd25b0b6e181f843f837"
      ],
      "author": {
        "name": "Jesper Juhl",
        "email": "jesper.juhl@gmail.com",
        "time": "Sun Feb 12 14:34:53 2006 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@g5.osdl.org",
        "time": "Sun Feb 12 16:10:47 2006 -0800"
      },
      "message": "[PATCH] netfilter: fix build error due to missing has_bridge_parent macro\n\nnet/bridge/br_netfilter.c: In function `br_nf_post_routing\u0027:\nnet/bridge/br_netfilter.c:808: warning: implicit declaration of function `has_bridge_parent\u0027\n\nSigned-off-by: Jesper Juhl \u003cjesper.juhl@gmail.com\u003e\nCc: Harald Welte \u003claforge@netfilter.org\u003e\nCc: \"David S. Miller\" \u003cdavem@davemloft.net\u003e\nSigned-off-by: Andrew Morton \u003cakpm@osdl.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@osdl.org\u003e\n"
    },
    {
      "commit": "bab1deea308afcf9200837d6ac20aefe92972efb",
      "tree": "bcf3d6ecb431b7b94cdd2a68e12b97abe3c2ebba",
      "parents": [
        "5dce971acf2ae20c80d5e9d1f6bbf17376870911"
      ],
      "author": {
        "name": "Stephen Hemminger",
        "email": "shemminger@osdl.org",
        "time": "Thu Feb 09 17:10:12 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 09 17:10:12 2006 -0800"
      },
      "message": "[BRIDGE]: fix error handling for add interface to bridge\n\nRefactor how the bridge code interacts with kobject system.\nIt should still use kobjects even if not using sysfs.\nFix the error unwind handling in br_add_if.\n\nSigned-off-by: Stephen Hemminger \u003cshemminger@osdl.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5dce971acf2ae20c80d5e9d1f6bbf17376870911",
      "tree": "9d5e6809e839f18a2dfe51d2a1d0ff43a17c26bf",
      "parents": [
        "b3f1be4b5412e34647764457bec901e06b03e624"
      ],
      "author": {
        "name": "Stephen Hemminger",
        "email": "shemminger@osdl.org",
        "time": "Thu Feb 09 17:09:38 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 09 17:09:38 2006 -0800"
      },
      "message": "[BRIDGE]: netfilter handle RCU during removal\n\nBridge netfilter code needs to handle the case where device is\nremoved from bridge while packet in process. In these cases the\nbridge_parent can become null while processing.\n\nThis should fix: http://bugzilla.kernel.org/show_bug.cgi?id\u003d5803\n\nSigned-off-by: Stephen Hemminger \u003cshemminger@osdl.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b3f1be4b5412e34647764457bec901e06b03e624",
      "tree": "b3f1529ff0882ebb5aed190d8a61b52f703503ce",
      "parents": [
        "6fcf9412de64056238a6295f21db7aa9c37a532e"
      ],
      "author": {
        "name": "Stephen Hemminger",
        "email": "shemminger@osdl.org",
        "time": "Thu Feb 09 17:08:52 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 09 17:08:52 2006 -0800"
      },
      "message": "[BRIDGE]: fix for RCU and deadlock on device removal\n\nChange Bridge receive path to correctly handle RCU removal of device\nfrom bridge.  Also fixes deadlock between carrier_check and del_nbp.\nThis replaces the previous deleted flag fix.\n\nSigned-off-by: Stephen Hemminger \u003cshemminger@osdl.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6fcf9412de64056238a6295f21db7aa9c37a532e",
      "tree": "06cd8f20551ce8173e8cccb8ecd628f955f7db6e",
      "parents": [
        "80ba250e59ced808a8c9b79560938bbe4509c0a7"
      ],
      "author": {
        "name": "John Heffner",
        "email": "jheffner@psc.edu",
        "time": "Thu Feb 09 17:06:57 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 09 17:06:57 2006 -0800"
      },
      "message": "[TCP]: rcvbuf lock when tcp_moderate_rcvbuf enabled\n\nThe rcvbuf lock should probably be honored here.\n\nSigned-off-by: John Heffner \u003cjheffner@psc.edu\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "80ba250e59ced808a8c9b79560938bbe4509c0a7",
      "tree": "017c64acb3a5d5a43a495ea1e58b2dc270e2441e",
      "parents": [
        "d93077fb0e7cb9d4f4094a649501d840c55fdc8b"
      ],
      "author": {
        "name": "David Binderman",
        "email": "dcb314@hotmail.com",
        "time": "Thu Feb 09 16:59:48 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 09 16:59:48 2006 -0800"
      },
      "message": "[IRDA]: out of range array access \n\nThis patch fixes an out of range array access in irnet_irda.c.\n\nAuthor: David Binderman \u003cdcb314@hotmail.com\u003e\nSigned-off-by: Samuel Ortiz \u003csamuel.ortiz@nokia.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d93077fb0e7cb9d4f4094a649501d840c55fdc8b",
      "tree": "4786704b28bdddd2696e2791ea1dc641bf134cb3",
      "parents": [
        "28633514afd68afa77ed2fa34fa53626837bf2d5"
      ],
      "author": {
        "name": "Samuel Ortiz",
        "email": "samuel.ortiz@nokia.com",
        "time": "Thu Feb 09 16:58:46 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 09 16:58:46 2006 -0800"
      },
      "message": "[IRDA]: Set proper IrLAP device address length\n\nThis patch set IrDA\u0027s addr_len properly, i.e to 4 bytes, the size of the\nIrLAP device address.\n\nSigned-off-by: Samuel Ortiz \u003csamuel.ortiz@nokia.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "28633514afd68afa77ed2fa34fa53626837bf2d5",
      "tree": "5f816a81d5aad85521b0c092885bd2b735bafd1d",
      "parents": [
        "a70ea994a0d83fd0151a070be72b87d014ef0a7e"
      ],
      "author": {
        "name": "Alexey Kuznetsov",
        "email": "kuznet@ms2.inr.ac.ru",
        "time": "Thu Feb 09 16:40:58 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu Feb 09 16:43:41 2006 -0800"
      },
      "message": "[NETLINK]: illegal use of pid in rtnetlink\n\nWhen a netlink message is not related to a netlink socket,\nit is issued by kernel socket with pid 0. Netlink \"pid\" has nothing\nto do with current-\u003epid. I called it incorrectly, if it was named \"port\",\nthe confusion would be avoided.\n\nSigned-off-by: Alexey Kuznetsov \u003ckuznet@ms2.inr.ac.ru\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a70ea994a0d83fd0151a070be72b87d014ef0a7e",
      "tree": "40e3bf28a3fa36f20b4625c241ca14abb0c1a00d",
      "parents": [
        "ad91e6fa0d331e419e4692d146cdc04e594a5bea"
      ],
      "author": {
        "name": "Alexey Kuznetsov",
        "email": "kuznet@ms2.inr.ac.ru",
        "time": "Thu Feb 09 16:40:11 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu Feb 09 16:43:38 2006 -0800"
      },
      "message": "[NETLINK]: Fix a severe bug\n\nnetlink overrun was broken while improvement of netlink.\nDestination socket is used in the place where it was meant to be source socket,\nso that now overrun is never sent to user netlink sockets, when it should be,\nand it even can be set on kernel socket, which results in complete deadlock\nof rtnetlink.\n\nSuggested fix is to restore status quo passing source socket as additional\nargument to netlink_attachskb().\n\nA little explanation: overrun is set on a socket, when it failed\nto receive some message and sender of this messages does not or even\nhave no way to handle this error. This happens in two cases:\n1. when kernel sends something. Kernel never retransmits and cannot\n   wait for buffer space.\n2. when user sends a broadcast and the message was not delivered\n   to some recipients.\n\nSigned-off-by: Alexey Kuznetsov \u003ckuznet@ms2.inr.ac.ru\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "70c07e02625ec46d0ffbfce1acef42d660803528",
      "tree": "f500f1a4f93e72747fb08b0eefabb167dcdc5db9",
      "parents": [
        "5d1769ac3d0ea5ff3a286b097c21faaf6a9e6859",
        "2746b8623abce815aaae7afc946b1b39f8436f5a"
      ],
      "author": {
        "name": "Jeff Garzik",
        "email": "jgarzik@pobox.com",
        "time": "Thu Feb 09 14:17:05 2006 -0500"
      },
      "committer": {
        "name": "Jeff Garzik",
        "email": "jgarzik@pobox.com",
        "time": "Thu Feb 09 14:17:05 2006 -0500"
      },
      "message": "Merge branch \u0027viro\u0027\n"
    },
    {
      "commit": "9908104935325bd6beba67d637b6f5396d47075c",
      "tree": "ec3bf2213993e21598403e4aeb68ba1e92d536b5",
      "parents": [
        "4b88f09364e94b05b66fb1441131e8460495a2f8"
      ],
      "author": {
        "name": "Kristian Slavov",
        "email": "kristian.slavov@nomadiclab.com",
        "time": "Wed Feb 08 16:10:53 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Feb 08 16:13:28 2006 -0800"
      },
      "message": "[IPV6]: Address autoconfiguration does not work after device down/up cycle\n\nIf you set network interface down and up again, the IPv6 address\nautoconfiguration does not work. \u0027ip addr\u0027 shows that the link-local\naddress is in tentative state. We don\u0027t even react to periodical router\nadvertisements.\n\nDuring NETDEV_DOWN we clear IF_READY, and we don\u0027t set it back in\nNETDEV_UP. While starting to perform DAD on the link-local address, we\nnotice that the device is not in IF_READY, and we abort autoconfiguration\nprocess (which would eventually send router solicitations).\n\nAcked-by: Juha-Matti Tapio \u003cjmtapio@verkkotelakka.net\u003e\nAcked-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e80e28b6b67ecc25fa89c9129a5f70de6389b2a6",
      "tree": "69f66c7089a57baec38d2275ba6757d15582c1ba",
      "parents": [
        "bee14e1f8ae2d5fd3f324e0c8562f791537160b2"
      ],
      "author": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Fri Feb 03 20:10:03 2006 -0500"
      },
      "committer": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Tue Feb 07 20:58:56 2006 -0500"
      },
      "message": "[PATCH] net/ipv6/mcast.c NULL noise removal\n\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\n"
    },
    {
      "commit": "76edc6051e02186fe664ab880447e2d1f96fd884",
      "tree": "988170b801f03e7701eb0ceaa856891934539101",
      "parents": [
        "e110ab94ebc714de57f75f0c7c576dde8cf80944"
      ],
      "author": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Wed Feb 01 05:54:35 2006 -0500"
      },
      "committer": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Tue Feb 07 20:57:37 2006 -0500"
      },
      "message": "[PATCH] ipv4 NULL noise removal\n\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\n"
    },
    {
      "commit": "1b8623545b42c03eb92e51b28c84acf4b8ba00a3",
      "tree": "071045ad9c60d2697292c523c77322a70a248fb9",
      "parents": [
        "92118c739df879497b8cc5a2eb3a9dc255f01b20"
      ],
      "author": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Thu Dec 15 01:07:03 2005 -0500"
      },
      "committer": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Tue Feb 07 20:56:35 2006 -0500"
      },
      "message": "[PATCH] remove bogus asm/bug.h includes.\n\nA bunch of asm/bug.h includes are both not needed (since it will get\npulled anyway) and bogus (since they are done too early).  Removed.\n\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\n"
    },
    {
      "commit": "3c9b3a8575b4f2551e3b5b74ffa1c3559c6338eb",
      "tree": "7f8d84353852401ec74e005f6f0b1eb958b9a70d",
      "parents": [
        "c0d3c0c0ce94d3db893577ae98e64414d92e49d8",
        "c03296a868ae7c91aa2d8b372184763b18f16d7a"
      ],
      "author": {
        "name": "Jeff Garzik",
        "email": "jgarzik@pobox.com",
        "time": "Tue Feb 07 01:47:12 2006 -0500"
      },
      "committer": {
        "name": "Jeff Garzik",
        "email": "jgarzik@pobox.com",
        "time": "Tue Feb 07 01:47:12 2006 -0500"
      },
      "message": "Merge branch \u0027master\u0027\n"
    }
  ],
  "next": "98bd0c07b60e029cf53eb76c027c27548dd66e9b"
}
