)]}'
{
  "log": [
    {
      "commit": "1f1f52073160a2b1856b3904df80d84dc829ecdf",
      "tree": "f6f78c669b2914d5ee325b72613c17eed16bd166",
      "parents": [
        "5cfac143dbcc96119300c5b1793f41d121eda857"
      ],
      "author": {
        "name": "Lorenzo Colitti",
        "email": "lorenzo@google.com",
        "time": "Wed Dec 16 12:30:05 2015 +0900"
      },
      "committer": {
        "name": "Nick Reuter",
        "email": "nreuter85@gmail.com",
        "time": "Wed Aug 10 16:26:33 2016 -0500"
      },
      "message": "net: diag: Support destroying TCP sockets.\n\nThis implements SOCK_DESTROY for TCP sockets. It causes all\nblocking calls on the socket to fail fast with ECONNABORTED and\ncauses a protocol close of the socket. It informs the other end\nof the connection by sending a RST, i.e., initiating a TCP ABORT\nas per RFC 793. ECONNABORTED was chosen for consistency with\nFreeBSD.\n\n[Backport of net-next c1e64e298b8cad309091b95d8436a0255c84f54a]\n\nChange-Id: Ic5410d3a2f39db28a322c30f4b3b2bffd35ec2de\nSigned-off-by: Lorenzo Colitti \u003clorenzo@google.com\u003e\nAcked-by: Eric Dumazet \u003cedumazet@google.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "33a38ccbbdf78696bdcd5be644fddf0fdd5bd81d",
      "tree": "0fe522ed6c7a7776bfa69113f3d3fe28aafd4f4b",
      "parents": [
        "707ab355d2e29f90e2b2f5ec1f593127291dbee7"
      ],
      "author": {
        "name": "Lorenzo Colitti",
        "email": "lorenzo@google.com",
        "time": "Wed Dec 16 12:30:03 2015 +0900"
      },
      "committer": {
        "name": "Nick Reuter",
        "email": "nreuter85@gmail.com",
        "time": "Wed Aug 10 16:26:21 2016 -0500"
      },
      "message": "net: diag: Add the ability to destroy a socket.\n\nThis patch adds a SOCK_DESTROY operation, a destroy function\npointer to sock_diag_handler, and a diag_destroy function\npointer.  It does not include any implementation code.\n\n[Backport of net-next 64be0aed59ad519d6f2160868734f7e278290ac1]\n\nChange-Id: I1d998e1c5f836b2f5638c0f79244c372c8d2d9d9\nSigned-off-by: Lorenzo Colitti \u003clorenzo@google.com\u003e\nAcked-by: Eric Dumazet \u003cedumazet@google.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0cf007169665bc6c8eeca0e9089ef0e805c2ac42",
      "tree": "82a470f9ef259808f9d063d24c860bfab5da3809",
      "parents": [
        "25bec49c55f487637b2f9550b6e04ffb51c5863f"
      ],
      "author": {
        "name": "Ivan Grinko",
        "email": "iivanich@gmail.com",
        "time": "Thu Mar 24 09:39:37 2016 +0200"
      },
      "committer": {
        "name": "William Bellavance",
        "email": "flintman@flintmancomputers.com",
        "time": "Tue May 17 07:52:15 2016 -0400"
      },
      "message": "Linux 3.4.111\n"
    },
    {
      "commit": "9cc712efc708bf2d25b6a6c013c66c42f2cfccd0",
      "tree": "f4b7b9d2354b77f6a63eacded1c5b32282c18abc",
      "parents": [
        "64c363146fe8b4b26285d36fad0fc01b9c8c1285"
      ],
      "author": {
        "name": "José Adolfo Galdámez",
        "email": "josegalre@pac-rom.com",
        "time": "Wed Oct 21 21:52:13 2015 -0600"
      },
      "committer": {
        "name": "William Bellavance",
        "email": "flintman@flintmancomputers.com",
        "time": "Wed Feb 10 20:04:59 2016 -0500"
      },
      "message": "Merge tag \u0027v3.4.110\u0027 into mm-6.0\n\nChange-Id: I0afc69bce474139d1b70e062d72c0b8054529833\nSigned-off-by: José Adolfo Galdámez \u003cjosegalre@pac-rom.com\u003e\n"
    },
    {
      "commit": "7a1d4bacdd49739a31d87410e21a712bf70b5e3e",
      "tree": "6c386dcd4dcdb53ccb4e1119a73ac468f60809ce",
      "parents": [
        "594c5e6bd48af952f339a8e10873a1079074c4d3"
      ],
      "author": {
        "name": "Daniel Borkmann",
        "email": "dborkman@redhat.com",
        "time": "Thu Oct 09 22:55:31 2014 +0200"
      },
      "committer": {
        "name": "William Bellavance",
        "email": "flintman@flintmancomputers.com",
        "time": "Wed Feb 10 20:01:42 2016 -0500"
      },
      "message": "net: sctp: fix skb_over_panic when receiving malformed ASCONF chunks\n\ncommit 9de7922bc709eee2f609cd01d98aaedc4cf5ea74 upstream.\n\nCommit 6f4c618ddb0 (\"SCTP : Add paramters validity check for\nASCONF chunk\") added basic verification of ASCONF chunks, however,\nit is still possible to remotely crash a server by sending a\nspecial crafted ASCONF chunk, even up to pre 2.6.12 kernels:\n\nskb_over_panic: text:ffffffffa01ea1c3 len:31056 put:30768\n head:ffff88011bd81800 data:ffff88011bd81800 tail:0x7950\n end:0x440 dev:\u003cNULL\u003e\n ------------[ cut here ]------------\nkernel BUG at net/core/skbuff.c:129!\n[...]\nCall Trace:\n \u003cIRQ\u003e\n [\u003cffffffff8144fb1c\u003e] skb_put+0x5c/0x70\n [\u003cffffffffa01ea1c3\u003e] sctp_addto_chunk+0x63/0xd0 [sctp]\n [\u003cffffffffa01eadaf\u003e] sctp_process_asconf+0x1af/0x540 [sctp]\n [\u003cffffffff8152d025\u003e] ? _read_unlock_bh+0x15/0x20\n [\u003cffffffffa01e0038\u003e] sctp_sf_do_asconf+0x168/0x240 [sctp]\n [\u003cffffffffa01e3751\u003e] sctp_do_sm+0x71/0x1210 [sctp]\n [\u003cffffffff8147645d\u003e] ? fib_rules_lookup+0xad/0xf0\n [\u003cffffffffa01e6b22\u003e] ? sctp_cmp_addr_exact+0x32/0x40 [sctp]\n [\u003cffffffffa01e8393\u003e] sctp_assoc_bh_rcv+0xd3/0x180 [sctp]\n [\u003cffffffffa01ee986\u003e] sctp_inq_push+0x56/0x80 [sctp]\n [\u003cffffffffa01fcc42\u003e] sctp_rcv+0x982/0xa10 [sctp]\n [\u003cffffffffa01d5123\u003e] ? ipt_local_in_hook+0x23/0x28 [iptable_filter]\n [\u003cffffffff8148bdc9\u003e] ? nf_iterate+0x69/0xb0\n [\u003cffffffff81496d10\u003e] ? ip_local_deliver_finish+0x0/0x2d0\n [\u003cffffffff8148bf86\u003e] ? nf_hook_slow+0x76/0x120\n [\u003cffffffff81496d10\u003e] ? ip_local_deliver_finish+0x0/0x2d0\n [\u003cffffffff81496ded\u003e] ip_local_deliver_finish+0xdd/0x2d0\n [\u003cffffffff81497078\u003e] ip_local_deliver+0x98/0xa0\n [\u003cffffffff8149653d\u003e] ip_rcv_finish+0x12d/0x440\n [\u003cffffffff81496ac5\u003e] ip_rcv+0x275/0x350\n [\u003cffffffff8145c88b\u003e] __netif_receive_skb+0x4ab/0x750\n [\u003cffffffff81460588\u003e] netif_receive_skb+0x58/0x60\n\nThis can be triggered e.g., through a simple scripted nmap\nconnection scan injecting the chunk after the handshake, for\nexample, ...\n\n  -------------- INIT[ASCONF; ASCONF_ACK] -------------\u003e\n  \u003c----------- INIT-ACK[ASCONF; ASCONF_ACK] ------------\n  -------------------- COOKIE-ECHO --------------------\u003e\n  \u003c-------------------- COOKIE-ACK ---------------------\n  ------------------ ASCONF; UNKNOWN ------------------\u003e\n\n... where ASCONF chunk of length 280 contains 2 parameters ...\n\n  1) Add IP address parameter (param length: 16)\n  2) Add/del IP address parameter (param length: 255)\n\n... followed by an UNKNOWN chunk of e.g. 4 bytes. Here, the\nAddress Parameter in the ASCONF chunk is even missing, too.\nThis is just an example and similarly-crafted ASCONF chunks\ncould be used just as well.\n\nThe ASCONF chunk passes through sctp_verify_asconf() as all\nparameters passed sanity checks, and after walking, we ended\nup successfully at the chunk end boundary, and thus may invoke\nsctp_process_asconf(). Parameter walking is done with\nWORD_ROUND() to take padding into account.\n\nIn sctp_process_asconf()\u0027s TLV processing, we may fail in\nsctp_process_asconf_param() e.g., due to removal of the IP\naddress that is also the source address of the packet containing\nthe ASCONF chunk, and thus we need to add all TLVs after the\nfailure to our ASCONF response to remote via helper function\nsctp_add_asconf_response(), which basically invokes a\nsctp_addto_chunk() adding the error parameters to the given\nskb.\n\nWhen walking to the next parameter this time, we proceed\nwith ...\n\n  length \u003d ntohs(asconf_param-\u003eparam_hdr.length);\n  asconf_param \u003d (void *)asconf_param + length;\n\n... instead of the WORD_ROUND()\u0027ed length, thus resulting here\nin an off-by-one that leads to reading the follow-up garbage\nparameter length of 12336, and thus throwing an skb_over_panic\nfor the reply when trying to sctp_addto_chunk() next time,\nwhich implicitly calls the skb_put() with that length.\n\nFix it by using sctp_walk_params() [ which is also used in\nINIT parameter processing ] macro in the verification *and*\nin ASCONF processing: it will make sure we don\u0027t spill over,\nthat we walk parameters WORD_ROUND()\u0027ed. Moreover, we\u0027re being\nmore defensive and guard against unknown parameter types and\nmissized addresses.\n\nJoint work with Vlad Yasevich.\n\nFixes: b896b82be4ae (\"[SCTP] ADDIP: Support for processing incoming ASCONF_ACK chunks.\")\nSigned-off-by: Daniel Borkmann \u003cdborkman@redhat.com\u003e\nSigned-off-by: Vlad Yasevich \u003cvyasevich@gmail.com\u003e\nAcked-by: Neil Horman \u003cnhorman@tuxdriver.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n[lizf: Backported to 3.4: adjust context]\nSigned-off-by: Zefan Li \u003clizefan@huawei.com\u003e\n"
    },
    {
      "commit": "594c5e6bd48af952f339a8e10873a1079074c4d3",
      "tree": "64323d1948f7cf93b0c301375043a4c1b8b11260",
      "parents": [
        "618280557800ea300c61e7b705f182aef3323352"
      ],
      "author": {
        "name": "Daniel Borkmann",
        "email": "dborkman@redhat.com",
        "time": "Thu Oct 09 22:55:32 2014 +0200"
      },
      "committer": {
        "name": "William Bellavance",
        "email": "flintman@flintmancomputers.com",
        "time": "Wed Feb 10 20:01:41 2016 -0500"
      },
      "message": "net: sctp: fix panic on duplicate ASCONF chunks\n\ncommit b69040d8e39f20d5215a03502a8e8b4c6ab78395 upstream.\n\nWhen receiving a e.g. semi-good formed connection scan in the\nform of ...\n\n  -------------- INIT[ASCONF; ASCONF_ACK] -------------\u003e\n  \u003c----------- INIT-ACK[ASCONF; ASCONF_ACK] ------------\n  -------------------- COOKIE-ECHO --------------------\u003e\n  \u003c-------------------- COOKIE-ACK ---------------------\n  ---------------- ASCONF_a; ASCONF_b -----------------\u003e\n\n... where ASCONF_a equals ASCONF_b chunk (at least both serials\nneed to be equal), we panic an SCTP server!\n\nThe problem is that good-formed ASCONF chunks that we reply with\nASCONF_ACK chunks are cached per serial. Thus, when we receive a\nsame ASCONF chunk twice (e.g. through a lost ASCONF_ACK), we do\nnot need to process them again on the server side (that was the\nidea, also proposed in the RFC). Instead, we know it was cached\nand we just resend the cached chunk instead. So far, so good.\n\nWhere things get nasty is in SCTP\u0027s side effect interpreter, that\nis, sctp_cmd_interpreter():\n\nWhile incoming ASCONF_a (chunk \u003d event_arg) is being marked\n!end_of_packet and !singleton, and we have an association context,\nwe do not flush the outqueue the first time after processing the\nASCONF_ACK singleton chunk via SCTP_CMD_REPLY. Instead, we keep it\nqueued up, although we set local_cork to 1. Commit 2e3216cd54b1\nchanged the precedence, so that as long as we get bundled, incoming\nchunks we try possible bundling on outgoing queue as well. Before\nthis commit, we would just flush the output queue.\n\nNow, while ASCONF_a\u0027s ASCONF_ACK sits in the corked outq, we\ncontinue to process the same ASCONF_b chunk from the packet. As\nwe have cached the previous ASCONF_ACK, we find it, grab it and\ndo another SCTP_CMD_REPLY command on it. So, effectively, we rip\nthe chunk-\u003elist pointers and requeue the same ASCONF_ACK chunk\nanother time. Since we process ASCONF_b, it\u0027s correctly marked\nwith end_of_packet and we enforce an uncork, and thus flush, thus\ncrashing the kernel.\n\nFix it by testing if the ASCONF_ACK is currently pending and if\nthat is the case, do not requeue it. When flushing the output\nqueue we may relink the chunk for preparing an outgoing packet,\nbut eventually unlink it when it\u0027s copied into the skb right\nbefore transmission.\n\nJoint work with Vlad Yasevich.\n\nFixes: 2e3216cd54b1 (\"sctp: Follow security requirement of responding with 1 packet\")\nSigned-off-by: Daniel Borkmann \u003cdborkman@redhat.com\u003e\nSigned-off-by: Vlad Yasevich \u003cvyasevich@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Zefan Li \u003clizefan@huawei.com\u003e\n"
    },
    {
      "commit": "551e1913a7e32d24639bd3457cac6b61aec9761a",
      "tree": "8eeb8f4bcf5ee97b6365ec89c812fa330b3eedd5",
      "parents": [
        "1e3d5cf82112a0a78820b603c6a86a38c5ac300f"
      ],
      "author": {
        "name": "Hannes Frederic Sowa",
        "email": "hannes@stressinduktion.org",
        "time": "Mon Dec 14 21:03:39 2015 +0000"
      },
      "committer": {
        "name": "William Bellavance",
        "email": "flintman@flintmancomputers.com",
        "time": "Sat Dec 19 08:41:03 2015 -0500"
      },
      "message": "net: add validation for the socket syscall protocol argument\n\n郭永刚 reported that one could simply crash the kernel as root by\nusing a simple program:\n\n\tint socket_fd;\n\tstruct sockaddr_in addr;\n\taddr.sin_port \u003d 0;\n\taddr.sin_addr.s_addr \u003d INADDR_ANY;\n\taddr.sin_family \u003d 10;\n\n\tsocket_fd \u003d socket(10,3,0x40000000);\n\tconnect(socket_fd , \u0026addr,16);\n\nAF_INET, AF_INET6 sockets actually only support 8-bit protocol\nidentifiers. inet_sock\u0027s skc_protocol field thus is sized accordingly,\nthus larger protocol identifiers simply cut off the higher bits and\nstore a zero in the protocol fields.\n\nThis could lead to e.g. NULL function pointer because as a result of\nthe cut off inet_num is zero and we call down to inet_autobind, which\nis NULL for raw sockets.\n\nkernel: Call Trace:\nkernel:  [\u003cffffffff816db90e\u003e] ? inet_autobind+0x2e/0x70\nkernel:  [\u003cffffffff816db9a4\u003e] inet_dgram_connect+0x54/0x80\nkernel:  [\u003cffffffff81645069\u003e] SYSC_connect+0xd9/0x110\nkernel:  [\u003cffffffff810ac51b\u003e] ? ptrace_notify+0x5b/0x80\nkernel:  [\u003cffffffff810236d8\u003e] ? syscall_trace_enter_phase2+0x108/0x200\nkernel:  [\u003cffffffff81645e0e\u003e] SyS_connect+0xe/0x10\nkernel:  [\u003cffffffff81779515\u003e] tracesys_phase2+0x84/0x89\n\nI found no particular commit which introduced this problem.\n\nChange-Id: I653fad90da54908144cc8916c2dccb1fa6f14eed\nCVE: CVE-2015-8543\nCc: Cong Wang \u003ccwang@twopensource.com\u003e\nReported-by: 郭永刚 \u003cguoyonggang@360.cn\u003e\nSigned-off-by: Hannes Frederic Sowa \u003channes@stressinduktion.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "75d9a22306c18844879cddcbf940e22a03918561",
      "tree": "f1cb1be07f5deee75c1f515b60caac68080b1b68",
      "parents": [
        "ba12817ba1b77ce1d8141b7f0f68419aa1ac42eb"
      ],
      "author": {
        "name": "Eric W. Biederman",
        "email": "ebiederm@xmission.com",
        "time": "Wed Jun 15 10:21:48 2011 -0700"
      },
      "committer": {
        "name": "flintman",
        "email": "flintman@flintmancomputers.com",
        "time": "Wed Oct 14 06:40:30 2015 -0400"
      },
      "message": "proc: Usable inode numbers for the namespace file descriptors.\n\nAssign a unique proc inode to each namespace, and use that\ninode number to ensure we only allocate at most one proc\ninode for every namespace in proc.\n\nA single proc inode per namespace allows userspace to test\nto see if two processes are in the same namespace.\n\nThis has been a long requested feature and only blocked because\na naive implementation would put the id in a global space and\nwould ultimately require having a namespace for the names of\nnamespaces, making migration and certain virtualization tricks\nimpossible.\n\nWe still don\u0027t have per superblock inode numbers for proc, which\nappears necessary for application unaware checkpoint/restart and\nmigrations (if the application is using namespace file descriptors)\nbut that is now allowd by the design if it becomes important.\n\nI have preallocated the ipc and uts initial proc inode numbers so\ntheir structures can be statically initialized.\n\nSigned-off-by: Eric W. Biederman \u003cebiederm@xmission.com\u003e\n(cherry picked from commit 98f842e675f96ffac96e6c50315790912b2812be)\n"
    },
    {
      "commit": "9892c405641b5e2be1054f4964dc31a56678a038",
      "tree": "a639fa6939753e6afd04d3b4eb7231efa885245b",
      "parents": [
        "e0c1cadbab0d0dbfcb776453abdbbb9d9c072548"
      ],
      "author": {
        "name": "flintman",
        "email": "flintman@flintmancomputers.com",
        "time": "Wed Sep 23 06:14:10 2015 -0400"
      },
      "committer": {
        "name": "flintman",
        "email": "flintman@flintmancomputers.com",
        "time": "Fri Oct 02 19:50:07 2015 -0400"
      },
      "message": "Bluetooth:   Backport BT manager 1.3\n\nBackported from msm 3.10 kernel\n\nChange-Id: I0c4ba93e9d590388efd562c3dbb3a2d1ac5f3c6a\n"
    },
    {
      "commit": "cd5ade278d49db238f6fa1eb50a2c68ce7962a05",
      "tree": "f4fa0ad139828c19e81babdbc0baf876502d7ea8",
      "parents": [
        "c54ef265bae7cf5f36a81a324615f9554b8b7b98"
      ],
      "author": {
        "name": "Ben Hutchings",
        "email": "ben@decadent.org.uk",
        "time": "Thu Oct 30 18:27:17 2014 +0000"
      },
      "committer": {
        "name": "flintman",
        "email": "flintman@flintmancomputers.com",
        "time": "Mon Apr 27 08:03:27 2015 -0400"
      },
      "message": "drivers/net, ipv6: Select IPv6 fragment idents for virtio UFO packets\n\ncommit 5188cd44c55db3e92cd9e77a40b5baa7ed4340f7 upstream.\n\nUFO is now disabled on all drivers that work with virtio net headers,\nbut userland may try to send UFO/IPv6 packets anyway.  Instead of\nsending with ID\u003d0, we should select identifiers on their behalf (as we\nused to).\n\nSigned-off-by: Ben Hutchings \u003cben@decadent.org.uk\u003e\nFixes: 916e4cf46d02 (\"ipv6: reuse ip6_frag_id from ip6_ufo_append_data\")\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n[bwh: For 3.2, net/ipv6/output_core.c is a completely new file]\nSigned-off-by: Zefan Li \u003clizefan@huawei.com\u003e\n"
    },
    {
      "commit": "ae436e93e3c0f5f90e0cb32a78e684964eabe420",
      "tree": "703dd8f400bd239ead2fe3d3074339e9694e813f",
      "parents": [
        "db13521323cf9f3d03240a031a07c9687269d2cf"
      ],
      "author": {
        "name": "Hannes Frederic Sowa",
        "email": "hannes@stressinduktion.org",
        "time": "Fri Jan 23 12:01:26 2015 +0100"
      },
      "committer": {
        "name": "Brinly Taylor",
        "email": "uberlaggydarwin@gmail.com",
        "time": "Thu Feb 05 08:46:17 2015 +1030"
      },
      "message": "ipv4: try to cache dst_entries which would cause a redirect\n\nNot caching dst_entries which cause redirects could be exploited by hosts\non the same subnet, causing a severe DoS attack. This effect aggravated\nsince commit f88649721268999 (\"ipv4: fix dst race in sk_dst_get()\").\n\nLookups causing redirects will be allocated with DST_NOCACHE set which\nwill force dst_release to free them via RCU.  Unfortunately waiting for\nRCU grace period just takes too long, we can end up with \u003e1M dst_entries\nwaiting to be released and the system will run OOM. rcuos threads cannot\ncatch up under high softirq load.\n\nAttaching the flag to emit a redirect later on to the specific skb allows\nus to cache those dst_entries thus reducing the pressure on allocation\nand deallocation.\n\nThis issue was discovered by Marcelo Leitner.\n\nCc: Julian Anastasov \u003cja@ssi.bg\u003e\nSigned-off-by: Marcelo Leitner \u003cmleitner@redhat.com\u003e\nSigned-off-by: Florian Westphal \u003cfw@strlen.de\u003e\nSigned-off-by: Hannes Frederic Sowa \u003channes@stressinduktion.org\u003e\nSigned-off-by: Julian Anastasov \u003cja@ssi.bg\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n\nConflicts:\n\tinclude/net/ip.h\n\tnet/ipv4/route.c\n\nChange-Id: I53e4b500a4db2f5fece937a42a3bd810b2640c44\n"
    },
    {
      "commit": "1097d78180e1a2916c2bcdb15cb90ba131af9cd8",
      "tree": "5910f8fc0dcb85c71011ccccee18895769699390",
      "parents": [
        "3ded4adc97887ddde3c1855f29f062e015d19425",
        "7fd7a446b1c2b96252e4389746e5419eae04faef"
      ],
      "author": {
        "name": "Paul",
        "email": "javelinanddart@gmail.com",
        "time": "Sun Jan 11 17:15:40 2015 -0800"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Sun Jan 11 17:20:45 2015 -0800"
      },
      "message": "Merge tag \u0027v3.4.105\u0027 into cm-12.0\n\nThis is the 3.4.105 stable release\n\nConflicts:\n\tarch/arm/mm/proc-v7.S\n\tdrivers/bluetooth/hci_ldisc.c\n\tdrivers/media/dvb/dvb-core/dmxdev.c\n\tdrivers/usb/core/driver.c\n\tdrivers/usb/dwc3/core.c\n\tdrivers/usb/host/xhci-hub.c\n\tdrivers/usb/host/xhci.c\n\tdrivers/usb/serial/qcserial.c\n\tdrivers/usb/serial/usb_wwan.c\n\tkernel/events/core.c\n\tkernel/time/tick-sched.ck\n\tkernel/futex.c\n\tmm/memory_hotplug.c\n\tmm/vmscan.c\n\tnet/bluetooth/hci_conn.c\n\tnet/bluetooth/hci_event.c\n\tnet/bluetooth/l2cap_core.c\n\tnet/ipv4/ping.c\n\tnet/wireless/nl80211.c\n\tsound/soc/soc-core.c\n\nChange-Id: Id09da84afb427ba1a32ff26e74f2bb86458d4a2e\n"
    },
    {
      "commit": "74cfe2dcc0f4b17f9abbabf349e33c39a260987e",
      "tree": "206493082f5edc72fdac6c958877090d7d17fb37",
      "parents": [
        "a580da13cb3f1f4984e71befc4f78c5a1f3181d0",
        "6cf93503105dc0cf63fc1384088db92bb71cbe4c"
      ],
      "author": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Tue Dec 16 00:35:23 2014 -0800"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Tue Dec 16 00:35:23 2014 -0800"
      },
      "message": "Merge remote-tracking branch \u0027caf/LA.AF.1.1_rb1.7\u0027 into cm-12.0\n\nConflicts:\n\tdrivers/misc/qseecom.c\n\tfs/proc/task_mmu.c\n\tinclude/net/tcp.h\n\tnet/ipv4/syncookies.c\n\tnet/ipv6/route.c\n\tnet/ipv6/tcp_ipv6.c\n\nChange-Id: I8a953e9f483a24ee45f5e1c570b6a4f92e87c6e9\n"
    },
    {
      "commit": "be93eea739598a5bf2562110323d79d80d0e6a33",
      "tree": "58479ef6306aea7696730678edfe87d6523ed4e5",
      "parents": [
        "a51b4d7710d1a3593c3bdc4592fdecbbb8df4f16"
      ],
      "author": {
        "name": "Eliad Peller",
        "email": "eliad@wizery.com",
        "time": "Wed Jun 11 10:23:35 2014 +0300"
      },
      "committer": {
        "name": "Zefan Li",
        "email": "lizefan@huawei.com",
        "time": "Mon Dec 01 18:02:22 2014 +0800"
      },
      "message": "regulatory: add NUL to alpha2\n\ncommit a5fe8e7695dc3f547e955ad2b662e3e72969e506 upstream.\n\nalpha2 is defined as 2-chars array, but is used in multiple\nplaces as string (e.g. with nla_put_string calls), which\nmight leak kernel data.\n\nSolve it by simply adding an extra char for the NULL\nterminator, making such operations safe.\n\nSigned-off-by: Eliad Peller \u003celiadx.peller@intel.com\u003e\nSigned-off-by: Johannes Berg \u003cjohannes.berg@intel.com\u003e\n[lizf: Backported to 3.4: adjust context]\nSigned-off-by: Zefan Li \u003clizefan@huawei.com\u003e\n"
    },
    {
      "commit": "50db8c0110dbff94dfacc1f4752a927dbe339e9c",
      "tree": "fc604545ec971ab0e224c305f0b948edc08295aa",
      "parents": [
        "25b02b6d180efeec13851162c3319962977c1fb0",
        "2f64c5e6faa76368cd2c70c1d48fc4c2d44acbbf"
      ],
      "author": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Fri Nov 14 01:04:45 2014 -0800"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Fri Nov 14 01:04:45 2014 -0800"
      },
      "message": "Merge remote-tracking branch \u0027caf/caf/LA.AF.1.1_rb1.5\u0027 into cm-12.0\n"
    },
    {
      "commit": "bc2be064bd7394f417326404d641cf9eabb4ac4e",
      "tree": "a03a6f166cf26ed0bc49a84dd754d2e1160e18a3",
      "parents": [
        "52cb8fc12e41c36111d5531c6c8e70d406a85207",
        "8cb56e3467fd98e6f9396553402cf22b08f1e5a5"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Thu Nov 13 13:03:28 2014 -0800"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Thu Nov 13 13:03:27 2014 -0800"
      },
      "message": "Merge \"net: support marking accepting TCP sockets\""
    },
    {
      "commit": "52cb8fc12e41c36111d5531c6c8e70d406a85207",
      "tree": "5b91171e550f77916bd148961615c7ba5be56a1c",
      "parents": [
        "8c1d434b2e49df7a7cefac06e62ab5faa7eb4776",
        "2887dec4438f37edfd8dbf355af23d61cfdd4c27"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Thu Nov 13 13:03:27 2014 -0800"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Thu Nov 13 13:03:27 2014 -0800"
      },
      "message": "Merge \"net: add a sysctl to reflect the fwmark on replies\""
    },
    {
      "commit": "8c1d434b2e49df7a7cefac06e62ab5faa7eb4776",
      "tree": "97f3aa4b233011a156128517bd85fb3e09f8cc38",
      "parents": [
        "bc4bcee71617461ed19a852f9d873f5979820ef1",
        "653be181eef3589b47119cd68c985975119fa61f"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Thu Nov 13 13:03:26 2014 -0800"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Thu Nov 13 13:03:26 2014 -0800"
      },
      "message": "Merge \"net: ipv6: autoconf routes into per-device tables\""
    },
    {
      "commit": "6891c8f90220dfb5d71d83263f0a41b30f9732e2",
      "tree": "48b4c7141a700787180c07ff23e35ffb42d21037",
      "parents": [
        "2eeb25228b825cd3692275f3972c551504cc02ec"
      ],
      "author": {
        "name": "JP Abgrall",
        "email": "jpa@google.com",
        "time": "Fri Feb 07 18:40:10 2014 -0800"
      },
      "committer": {
        "name": "Ian Maund",
        "email": "imaund@codeaurora.org",
        "time": "Fri Nov 07 16:35:05 2014 -0800"
      },
      "message": "tcp: add a sysctl to config the tcp_default_init_rwnd\n\nThe default initial rwnd is hardcoded to 10.\n\nNow we allow it to be controlled via\n  /proc/sys/net/ipv4/tcp_default_init_rwnd\nwhich limits the values from 3 to 100\n\nThis is somewhat needed because ipv6 routes are\nautoconfigured by the kernel.\n\nSee \"An Argument for Increasing TCP\u0027s Initial Congestion Window\"\nin https://developers.google.com/speed/articles/tcp_initcwnd_paper.pdf\n\nChange-Id: I386b2a9d62de0ebe05c1ebe1b4bd91b314af5c54\nSigned-off-by: JP Abgrall \u003cjpa@google.com\u003e\nGit-commit: 969ff3bbb38b6622800a1a4bd38404e3701193de\nGit-Repo: https://android.googlesource.com/kernel/common.git\n[imaund@codeaurora.org: Resolved trivial context conflicts.]\nSigned-off-by: Ian Maund \u003cimaund@codeaurora.org\u003e\n"
    },
    {
      "commit": "414192d0710b30b2dbf5855b684cd0a18a33aebf",
      "tree": "c2a53833018988086d0b94ed58babb08b7ecb443",
      "parents": [
        "462ce7cf70a565d9fd58421bb28a4bdcff9dfa6e"
      ],
      "author": {
        "name": "Sreeram Ramachandran",
        "email": "sreeram@google.com",
        "time": "Tue Jul 08 11:37:03 2014 -0700"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Wed Sep 17 03:33:00 2014 -0700"
      },
      "message": "Handle \u0027sk\u0027 being NULL in UID-based routing.\n\nBug: 15413527\nChange-Id: If33bebb7b52c0ebfa8dac2452607bce0c2b0faa0\nSigned-off-by: Sreeram Ramachandran \u003csreeram@google.com\u003e\nGit-commit: 0836a0c191f580ed69254e0b287cdce58481e978\nGit-repo: https://android.googlesource.com/kernel/common.git\nSigned-off-by: Ian Maund \u003cimaund@codeaurora.org\u003e\n"
    },
    {
      "commit": "462ce7cf70a565d9fd58421bb28a4bdcff9dfa6e",
      "tree": "08073040d1eeaa0b05e95fb9e7a78e162f4aab72",
      "parents": [
        "1af043959e84f3e14fed7c9a965ce649217d2e42"
      ],
      "author": {
        "name": "Lorenzo Colitti",
        "email": "lorenzo@google.com",
        "time": "Mon Mar 31 16:23:51 2014 +0900"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Wed Sep 17 03:26:12 2014 -0700"
      },
      "message": "net: core: Support UID-based routing.\n\nThis contains the following commits:\n\n1. 0149763 net: core: Add a UID range to fib rules.\n2. 1650474 net: core: Use the socket UID in routing lookups.\n3. 0b16771 net: ipv4: Add the UID to the route cache.\n4. ee058f1 net: core: Add a RTA_UID attribute to routes.\n    This is so that userspace can do per-UID route lookups.\n\nBug: 15413527\nChange-Id: I1285474c6734614d3bda6f61d88dfe89a4af7892\nSigned-off-by: Lorenzo Colitti \u003clorenzo@google.com\u003e\nGit-commit: 0b428749ce5969bc06c73855e360141b4e7126e8\nGit-repo: https://android.googlesource.com/kernel/common.git\nSigned-off-by: Ian Maund \u003cimaund@codeaurora.org\u003e\n"
    },
    {
      "commit": "509a15a5d6b0cfd3e4e396844615df6335ff4c62",
      "tree": "a3f92b13246768ed53016216cac459a86ec1f772",
      "parents": [
        "ad52eef552c7896ec6024ee72fc126167fe5c4e2"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "edumazet@google.com",
        "time": "Sat Jul 26 08:58:10 2014 +0200"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Thu Aug 14 08:42:35 2014 +0800"
      },
      "message": "ip: make IP identifiers less predictable\n\n[ Upstream commit 04ca6973f7c1a0d8537f2d9906a0cf8e69886d75 ]\n\nIn \"Counting Packets Sent Between Arbitrary Internet Hosts\", Jeffrey and\nJedidiah describe ways exploiting linux IP identifier generation to\ninfer whether two machines are exchanging packets.\n\nWith commit 73f156a6e8c1 (\"inetpeer: get rid of ip_id_count\"), we\nchanged IP id generation, but this does not really prevent this\nside-channel technique.\n\nThis patch adds a random amount of perturbation so that IP identifiers\nfor a given destination [1] are no longer monotonically increasing after\nan idle period.\n\nNote that prandom_u32_max(1) returns 0, so if generator is used at most\nonce per jiffy, this patch inserts no hole in the ID suite and do not\nincrease collision probability.\n\nThis is jiffies based, so in the worst case (HZ\u003d1000), the id can\nrollover after ~65 seconds of idle time, which should be fine.\n\nWe also change the hash used in __ip_select_ident() to not only hash\non daddr, but also saddr and protocol, so that ICMP probes can not be\nused to infer information for other protocols.\n\nFor IPv6, adds saddr into the hash as well, but not nexthdr.\n\nIf I ping the patched target, we can see ID are now hard to predict.\n\n21:57:11.008086 IP (...)\n    A \u003e target: ICMP echo request, seq 1, length 64\n21:57:11.010752 IP (... id 2081 ...)\n    target \u003e A: ICMP echo reply, seq 1, length 64\n\n21:57:12.013133 IP (...)\n    A \u003e target: ICMP echo request, seq 2, length 64\n21:57:12.015737 IP (... id 3039 ...)\n    target \u003e A: ICMP echo reply, seq 2, length 64\n\n21:57:13.016580 IP (...)\n    A \u003e target: ICMP echo request, seq 3, length 64\n21:57:13.019251 IP (... id 3437 ...)\n    target \u003e A: ICMP echo reply, seq 3, length 64\n\n[1] TCP sessions uses a per flow ID generator not changed by this patch.\n\nSigned-off-by: Eric Dumazet \u003cedumazet@google.com\u003e\nReported-by: Jeffrey Knockel \u003cjeffk@cs.unm.edu\u003e\nReported-by: Jedidiah R. Crandall \u003ccrandall@cs.unm.edu\u003e\nCc: Willy Tarreau \u003cw@1wt.eu\u003e\nCc: Hannes Frederic Sowa \u003channes@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "ad52eef552c7896ec6024ee72fc126167fe5c4e2",
      "tree": "ad82cf940ab103a6b51260f681b22d21f6ecdb2c",
      "parents": [
        "0a9d91dca3b9f797f2fc615486c12afa59f19a3b"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "edumazet@google.com",
        "time": "Mon Jun 02 05:26:03 2014 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Thu Aug 14 08:42:35 2014 +0800"
      },
      "message": "inetpeer: get rid of ip_id_count\n\n[ Upstream commit 73f156a6e8c1074ac6327e0abd1169e95eb66463 ]\n\nIdeally, we would need to generate IP ID using a per destination IP\ngenerator.\n\nlinux kernels used inet_peer cache for this purpose, but this had a huge\ncost on servers disabling MTU discovery.\n\n1) each inet_peer struct consumes 192 bytes\n\n2) inetpeer cache uses a binary tree of inet_peer structs,\n   with a nominal size of ~66000 elements under load.\n\n3) lookups in this tree are hitting a lot of cache lines, as tree depth\n   is about 20.\n\n4) If server deals with many tcp flows, we have a high probability of\n   not finding the inet_peer, allocating a fresh one, inserting it in\n   the tree with same initial ip_id_count, (cf secure_ip_id())\n\n5) We garbage collect inet_peer aggressively.\n\nIP ID generation do not have to be \u0027perfect\u0027\n\nGoal is trying to avoid duplicates in a short period of time,\nso that reassembly units have a chance to complete reassembly of\nfragments belonging to one message before receiving other fragments\nwith a recycled ID.\n\nWe simply use an array of generators, and a Jenkin hash using the dst IP\nas a key.\n\nipv6_select_ident() is put back into net/ipv6/ip6_output.c where it\nbelongs (it is only used from this file)\n\nsecure_ip_id() and secure_ipv6_id() no longer are needed.\n\nRename ip_select_ident_more() to ip_select_ident_segs() to avoid\nunnecessary decrement/increment of the number of segments.\n\nSigned-off-by: Eric Dumazet \u003cedumazet@google.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "8cb56e3467fd98e6f9396553402cf22b08f1e5a5",
      "tree": "55167cefd4f2d970a4723a35f61d7322d256b0ba",
      "parents": [
        "2887dec4438f37edfd8dbf355af23d61cfdd4c27"
      ],
      "author": {
        "name": "Lorenzo Colitti",
        "email": "lorenzo@google.com",
        "time": "Wed Mar 26 13:03:12 2014 +0900"
      },
      "committer": {
        "name": "Samir Mehta",
        "email": "samirn@codeaurora.org",
        "time": "Tue Aug 05 18:02:48 2014 +0530"
      },
      "message": "net: support marking accepting TCP sockets\n\nWhen using mark-based routing, sockets returned from accept()\nmay need to be marked differently depending on the incoming\nconnection request.\n\nThis is the case, for example, if different socket marks identify\ndifferent networks: a listening socket may want to accept\nconnections from all networks, but each connection should be\nmarked with the network that the request came in on, so that\nsubsequent packets are sent on the correct network.\n\nThis patch adds a sysctl to mark TCP sockets based on the fwmark\nof the incoming SYN packet. If enabled, and an unmarked socket\nreceives a SYN, then the SYN packet\u0027s fwmark is written to the\nconnection\u0027s inet_request_sock, and later written back to the\naccepted socket when the connection is established.  If the\nsocket already has a nonzero mark, then the behaviour is the same\nas it is today, i.e., the listening socket\u0027s fwmark is used.\n\nBlack-box tested using user-mode linux:\n\n- IPv4/IPv6 SYN+ACK, FIN, etc. packets are routed based on the\n  mark of the incoming SYN packet.\n- The socket returned by accept() is marked with the mark of the\n  incoming SYN packet.\n- Tested with syncookies\u003d1 and syncookies\u003d2.\n\nChange-Id: I5e8c9b989762a93f3eb5a0c1b4df44f62d57f3cb\nSigned-off-by: Lorenzo Colitti \u003clorenzo@google.com\u003e\n[imaund@codeaurora.org: Resolve trivial merge conflicts.]\nGit-commit: 4593f09b1f9939ec6ed2f8d7848def26b98c47ac\nGit-repo: https://android.googlesource.com/kernel/common.git\nSigned-off-by: Ian Maund \u003cimaund@codeaurora.org\u003e\nSigned-off-by: Samir Mehta \u003csamirn@codeaurora.org\u003e\n"
    },
    {
      "commit": "2887dec4438f37edfd8dbf355af23d61cfdd4c27",
      "tree": "820f262ff612b449760fbf18a498f74e4f5958eb",
      "parents": [
        "653be181eef3589b47119cd68c985975119fa61f"
      ],
      "author": {
        "name": "Lorenzo Colitti",
        "email": "lorenzo@google.com",
        "time": "Tue Mar 18 20:52:27 2014 +0900"
      },
      "committer": {
        "name": "Samir Mehta",
        "email": "samirn@codeaurora.org",
        "time": "Tue Aug 05 18:01:30 2014 +0530"
      },
      "message": "net: add a sysctl to reflect the fwmark on replies\n\nKernel-originated IP packets that have no user socket associated\nwith them (e.g., ICMP errors and echo replies, TCP RSTs, etc.)\nare emitted with a mark of zero. Add a sysctl to make them have\nthe same mark as the packet they are replying to.\n\nThis allows an administrator that wishes to do so to use\nmark-based routing, firewalling, etc. for these replies by\nmarking the original packets inbound.\n\nTested using user-mode linux:\n - ICMP/ICMPv6 echo replies and errors.\n - TCP RST packets (IPv4 and IPv6).\n\nChange-Id: I95d896647b278d092ef331d1377b959da1deb042\nSigned-off-by: Lorenzo Colitti \u003clorenzo@google.com\u003e\nGit-commit: 3356997e1e1b2aa9959f046203e6d0b193bbd7f7\nGit-repo: https://android.googlesource.com/kernel/common.git\n[imaund@codeaurora.org: Resolve trivial merge conflicts.]\nSigned-off-by: Ian Maund \u003cimaund@codeaurora.org\u003e\nSigned-off-by: Samir Mehta \u003csamirn@codeaurora.org\u003e\n"
    },
    {
      "commit": "653be181eef3589b47119cd68c985975119fa61f",
      "tree": "70622b13f1dd7ec4ce74ada46f489abe582fe2c5",
      "parents": [
        "cfc667e1eac22c3ee27aceaebb18e68102a2c65b"
      ],
      "author": {
        "name": "Lorenzo Colitti",
        "email": "lorenzo@google.com",
        "time": "Wed Mar 26 19:35:41 2014 +0900"
      },
      "committer": {
        "name": "Samir Mehta",
        "email": "samirn@codeaurora.org",
        "time": "Tue Aug 05 17:58:34 2014 +0530"
      },
      "message": "net: ipv6: autoconf routes into per-device tables\n\nCurrently, IPv6 router discovery always puts routes into\nRT6_TABLE_MAIN. This causes problems for connection managers\nthat want to support multiple simultaneous network connections\nand want control over which one is used by default (e.g., wifi\nand wired).\n\nTo work around this connection managers typically take the routes\nthey prefer and copy them to static routes with low metrics in\nthe main table. This puts the burden on the connection manager\nto watch netlink to see if the routes have changed, delete the\nroutes when their lifetime expires, etc.\n\nInstead, this patch adds a per-interface sysctl to have the\nkernel put autoconf routes into different tables. This allows\neach interface to have its own autoconf table, and choosing the\ndefault interface (or using different interfaces at the same\ntime for different types of traffic) can be done using\nappropriate ip rules.\n\nThe sysctl behaves as follows:\n\n- \u003d 0: default. Put routes into RT6_TABLE_MAIN as before.\n- \u003e 0: manual. Put routes into the specified table.\n- \u003c 0: automatic. Add the absolute value of the sysctl to the\n       device\u0027s ifindex, and use that table.\n\nThe automatic mode is most useful in conjunction with\nnet.ipv6.conf.default.accept_ra_rt_table. A connection manager\nor distribution could set it to, say, -100 on boot, and\nthereafter just use IP rules.\n\nChange-Id: I093d39fb06ec413905dc0d0d5792c1bc5d5c73a9\nSigned-off-by: Lorenzo Colitti \u003clorenzo@google.com\u003e\nGit-commit: 5fe5c512af518d0abbbc0d2fafa8e355f518c2a9\nGit-repo: https://android.googlesource.com/kernel/common.git\n[imaund@codeaurora.org: Resolve trivial merge conflicts]\nSigned-off-by: Ian Maund \u003cimaund@codeaurora.org\u003e\n[samirn@codeaurora.org: Resolve trivial merge conflicts]\nSigned-off-by: Samir Mehta \u003csamirn@codeaurora.org\u003e\n"
    },
    {
      "commit": "eb688f6a4b6090dbcdccc935cf074618c0f421c1",
      "tree": "a250da8a12592fdb19ec3cf27e52b8ba6ed11abb",
      "parents": [
        "bc96ff59b2f19e924d9e15e24cee19723d674b92"
      ],
      "author": {
        "name": "Syam Sidhardhan",
        "email": "s.syam@samsung.com",
        "time": "Thu Apr 12 20:33:17 2012 +0530"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Wed Jul 09 10:51:20 2014 -0700"
      },
      "message": "Bluetooth: Remove unused hci_le_ltk_reply()\n\ncommit e10b9969f217c948c5523045f44eba4d3a758ff0 upstream.\n\nIn this API, we were using sizeof operator for an array\ngiven as function argument, which is invalid.\nHowever this API is not used anywhere.\n\nSigned-off-by: Syam Sidhardhan \u003cs.syam@samsung.com\u003e\nSigned-off-by: Gustavo Padovan \u003cgustavo@padovan.org\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "0a4474aaad97472efcd10a3e8d897d5798206f0e",
      "tree": "eedca98333d8d5ec4a09195faadef3fd6e2b52c2",
      "parents": [
        "d0e49724c557974bb109ffee5cd3eb4864b8cc1d"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "edumazet@google.com",
        "time": "Thu May 29 08:45:14 2014 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Thu Jun 26 15:10:28 2014 -0400"
      },
      "message": "net: fix inet_getid() and ipv6_select_ident() bugs\n\n[ Upstream commit 39c36094d78c39e038c1e499b2364e13bce36f54 ]\n\nI noticed we were sending wrong IPv4 ID in TCP flows when MTU discovery\nis disabled.\nNote how GSO/TSO packets do not have monotonically incrementing ID.\n\n06:37:41.575531 IP (id 14227, proto: TCP (6), length: 4396)\n06:37:41.575534 IP (id 14272, proto: TCP (6), length: 65212)\n06:37:41.575544 IP (id 14312, proto: TCP (6), length: 57972)\n06:37:41.575678 IP (id 14317, proto: TCP (6), length: 7292)\n06:37:41.575683 IP (id 14361, proto: TCP (6), length: 63764)\n\nIt appears I introduced this bug in linux-3.1.\n\ninet_getid() must return the old value of peer-\u003eip_id_count,\nnot the new one.\n\nLets revert this part, and remove the prevention of\na null identification field in IPv6 Fragment Extension Header,\nwhich is dubious and not even done properly.\n\nFixes: 87c48fa3b463 (\"ipv6: make fragment identifications less predictable\")\nSigned-off-by: Eric Dumazet \u003cedumazet@google.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "3a2c0d4b76454fe93fa4a5042962cfd76a0a31e2",
      "tree": "3e43723bbb5b85824cbdf84a0730ee562965beb9",
      "parents": [
        "d6f6a6494dbe3be2992ae95baa52f94356d98c81"
      ],
      "author": {
        "name": "Stanislaw Gruszka",
        "email": "sgruszka@redhat.com",
        "time": "Mon Dec 03 12:56:33 2012 +0100"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Jun 07 16:02:07 2014 -0700"
      },
      "message": "mac80211: introduce IEEE80211_HW_TEARDOWN_AGGR_ON_BAR_FAIL\n\ncommit 5b632fe85ec82e5c43740b52e74c66df50a37db3 upstream.\n\nCommit f0425beda4d404a6e751439b562100b902ba9c98 \"mac80211: retry sending\nfailed BAR frames later instead of tearing down aggr\" caused regression\non rt2x00 hardware (connection hangs). This regression was fixed by\ncommit be03d4a45c09ee5100d3aaaedd087f19bc20d01 \"rt2x00: Don\u0027t let\nmac80211 send a BAR when an AMPDU subframe fails\". But the latter\ncommit caused yet another problem reported in\nhttps://bugzilla.kernel.org/show_bug.cgi?id\u003d42828#c22\n\nAfter long discussion in this thread:\nhttp://mid.gmane.org/20121018075615.GA18212@redhat.com\nand testing various alternative solutions, which failed on one or other\nsetup, we have no other good fix for the issues like just revert both\nmentioned earlier commits.\n\nTo do not affect other hardware which benefit from commit\nf0425beda4d404a6e751439b562100b902ba9c98, instead of reverting it,\nintroduce flag that when used will restore mac80211 behaviour before\nthe commit.\n\nSigned-off-by: Stanislaw Gruszka \u003csgruszka@redhat.com\u003e\n[replaced link with mid.gmane.org that has message-id]\nSigned-off-by: Johannes Berg \u003cjohannes.berg@intel.com\u003e\n[bwh: Backported to 3.2: adjust context]\nSigned-off-by: Ben Hutchings \u003cben@decadent.org.uk\u003e\n[hq: Backported to 3.4: adjust context]\nSigned-off-by: Qiang Huang \u003ch.huangqiang@huawei.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "6392b2685b864f0ace1eaae43c998dccb856bd30",
      "tree": "bb292ae3b0ac6311e88201c20d74f81241ec4d1c",
      "parents": [
        "cedc89a20df8cb06e3fee2f3f7b9d90430142e22"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "edumazet@google.com",
        "time": "Thu Apr 10 21:23:36 2014 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Jun 07 16:01:59 2014 -0700"
      },
      "message": "ipv6: Limit mtu to 65575 bytes\n\n[ Upstream commit 30f78d8ebf7f514801e71b88a10c948275168518 ]\n\nFrancois reported that setting big mtu on loopback device could prevent\ntcp sessions making progress.\n\nWe do not support (yet ?) IPv6 Jumbograms and cook corrupted packets.\n\nWe must limit the IPv6 MTU to (65535 + 40) bytes in theory.\n\nTested:\n\nifconfig lo mtu 70000\nnetperf -H ::1\n\nBefore patch : Throughput :   0.05 Mbits\n\nAfter patch : Throughput : 35484 Mbits\n\nReported-by: Francois WELLENREITER \u003cf.wellenreiter@gmail.com\u003e\nSigned-off-by: Eric Dumazet \u003cedumazet@google.com\u003e\nAcked-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nAcked-by: Hannes Frederic Sowa \u003channes@stressinduktion.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "4b87f408045848f42ae574326faf64073f92f2af",
      "tree": "118545ed115af537d5bbb2da8cbc46ff9dd943cb",
      "parents": [
        "14eee5bd065d6aac0acbdc6092a25ba68c55b9c8"
      ],
      "author": {
        "name": "Andrey Vagin",
        "email": "avagin@openvz.org",
        "time": "Fri Mar 28 13:54:32 2014 +0400"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun May 18 05:25:55 2014 -0700"
      },
      "message": "netfilter: nf_conntrack: reserve two bytes for nf_ct_ext-\u003elen\n\ncommit 223b02d923ecd7c84cf9780bb3686f455d279279 upstream.\n\n\"len\" contains sizeof(nf_ct_ext) and size of extensions. In a worst\ncase it can contain all extensions. Bellow you can find sizes for all\ntypes of extensions. Their sum is definitely bigger than 256.\n\nnf_ct_ext_types[0]-\u003elen \u003d 24\nnf_ct_ext_types[1]-\u003elen \u003d 32\nnf_ct_ext_types[2]-\u003elen \u003d 24\nnf_ct_ext_types[3]-\u003elen \u003d 32\nnf_ct_ext_types[4]-\u003elen \u003d 152\nnf_ct_ext_types[5]-\u003elen \u003d 2\nnf_ct_ext_types[6]-\u003elen \u003d 16\nnf_ct_ext_types[7]-\u003elen \u003d 8\n\nI have seen \"len\" up to 280 and my host has crashes w/o this patch.\n\nThe right way to fix this problem is reducing the size of the ecache\nextension (4) and Florian is going to do this, but these changes will\nbe quite large to be appropriate for a stable tree.\n\nFixes: 5b423f6a40a0 (netfilter: nf_conntrack: fix racy timer handling with reliable)\nCc: Pablo Neira Ayuso \u003cpablo@netfilter.org\u003e\nCc: Patrick McHardy \u003ckaber@trash.net\u003e\nCc: Jozsef Kadlecsik \u003ckadlec@blackhole.kfki.hu\u003e\nCc: \"David S. Miller\" \u003cdavem@davemloft.net\u003e\nSigned-off-by: Andrey Vagin \u003cavagin@openvz.org\u003e\nSigned-off-by: Pablo Neira Ayuso \u003cpablo@netfilter.org\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "36a093caf736755c3f42cde0abebbf6937f9f3e6",
      "tree": "c4cb589e1abe457ef20e85771acb787a5ddb9b3e",
      "parents": [
        "5cce5d16d13d6bd5f53b2cab181fefa55ae8efad",
        "00fcc691ed4a13522e01cfc1575cb7b984485b0a"
      ],
      "author": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Fri May 02 22:35:16 2014 -0700"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Fri May 02 22:35:16 2014 -0700"
      },
      "message": "Merge remote-tracking branch \u0027codeaurora/caf/kk_2.7_rb1.37\u0027 into cm-11.0\n\nConflicts:\n\tarch/arm/mm/dma-mapping.c\n\tdrivers/media/video/msm/vfe/msm_vfe32.c\n\tnet/wireless/nl80211.c\n\nChange-Id: I4228f28bc74631aba13e1da969c91aaefc463195\n"
    },
    {
      "commit": "c523abc466c9b7c693e4a528ca2f54c6e931b6a6",
      "tree": "c82c97f255a7e2411d85472ae0abb991599193da",
      "parents": [
        "7f81e91dcddec69dc0124e0753e2ba6c1ae3b6b9",
        "9f48c5a49a9f69c98c3ead6bf820072df3f14732"
      ],
      "author": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Fri Mar 07 11:49:08 2014 -0800"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Fri Mar 07 11:49:08 2014 -0800"
      },
      "message": "Merge remote-tracking branch \u0027codeaurora/kk_2.7_rb1.30\u0027 into cm-11.0\n\nConflicts:\n\tarch/arm/mach-msm/acpuclock-krait.c\n\tdrivers/media/video/msm/actuators/msm_actuator.c\n\tdrivers/media/video/msm/flash.c\n\tdrivers/media/video/msm/msm_camera.c\n\tdrivers/media/video/msm/server/msm_cam_server.c\n\tdrivers/media/video/msm/vfe/msm_vfe32.c\n\tdrivers/uio/uio.c\n\tdrivers/video/au1100fb.c\n\tdrivers/video/au1200fb.c\n\tinclude/media/msm_isp.h\n\tinclude/media/radio-iris.h\n\tnet/ipv4/ping.c\n\nChange-Id: Ic027f55c9667ecccaa35ee4a96ad77dbb1e8708f\n"
    },
    {
      "commit": "f33364e2359ae08121b1981c869e44d4a187f58d",
      "tree": "08a2a2f2bb860ad459d715d9f2a99bf17b30db67",
      "parents": [
        "aa7bdbd9b90a259f8c600cae4fb4f2ef1df6ee45",
        "d950549504d4302846d80b66a000b91a9eae50af"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Fri Mar 07 10:02:54 2014 -0800"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Fri Mar 07 10:02:53 2014 -0800"
      },
      "message": "Merge \"nl80211: support vendor-specific events\""
    },
    {
      "commit": "aa7bdbd9b90a259f8c600cae4fb4f2ef1df6ee45",
      "tree": "dedb789e41cb0b11f26e51405f8a2419a21fc58c",
      "parents": [
        "9ad119819d2c7884c9e1836f08627d0e3280b8df",
        "b784fbe8d030a5204126e56727ee63144e16e50b"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Fri Mar 07 10:02:52 2014 -0800"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Fri Mar 07 10:02:52 2014 -0800"
      },
      "message": "Merge \"nl80211: vendor command support\""
    },
    {
      "commit": "9ad119819d2c7884c9e1836f08627d0e3280b8df",
      "tree": "a77baa15e4248c6ccc2c60b68a82eb2624b93902",
      "parents": [
        "4077fccfa88d3336f7c006bb75bdf8c59bb94ad1",
        "60a48a89ebd20ef285636719a7f0a02dd8175021"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Fri Mar 07 10:02:51 2014 -0800"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Fri Mar 07 10:02:51 2014 -0800"
      },
      "message": "Merge \"cfg80211: pass station supported channel and oper class info\""
    },
    {
      "commit": "d950549504d4302846d80b66a000b91a9eae50af",
      "tree": "cee8c8bff754058965e1951d6d1c620ac89e6094",
      "parents": [
        "b784fbe8d030a5204126e56727ee63144e16e50b"
      ],
      "author": {
        "name": "Leo Chang",
        "email": "leochang@codeaurora.org",
        "time": "Wed Jan 15 19:52:00 2014 -0800"
      },
      "committer": {
        "name": "Mahesh A Saptasagar",
        "email": "msapta@codeaurora.org",
        "time": "Thu Feb 20 21:17:51 2014 +0530"
      },
      "message": "nl80211: support vendor-specific events\n\nIn addition to vendor-specific commands, also support vendor-specific\nevents. These must be registered with cfg80211 before they can be used.\nThey\u0027re also advertised in nl80211 in the wiphy information so that\nuserspace knows can be expected. The events themselves are sent on a\nnew multicast group called \"vendor\".\n\nChange-Id: I184aaa9f9e8461aee572f7d0a35916cd668c2218\nCRs-fixed: 576020\nSigned-off-by: Johannes Berg \u003cjohannes.berg@intel.com\u003e\nGit-commit: 567ffc3509b2d3f965a49a18631d3da7f9a96d4f\nGit-repo: https://git.kernel.org/cgit/linux/kernel/git/linville/wireless-next.git\nSigned-off-by: Leo Chang \u003cleochang@codeaurora.org\u003e\n"
    },
    {
      "commit": "b784fbe8d030a5204126e56727ee63144e16e50b",
      "tree": "bcc9f447b5e1dfb6b220f1c028dd065b4e7ea013",
      "parents": [
        "60a48a89ebd20ef285636719a7f0a02dd8175021"
      ],
      "author": {
        "name": "Leo Chang",
        "email": "leochang@codeaurora.org",
        "time": "Wed Jan 15 19:22:28 2014 -0800"
      },
      "committer": {
        "name": "Mahesh A Saptasagar",
        "email": "msapta@codeaurora.org",
        "time": "Thu Feb 20 20:51:24 2014 +0530"
      },
      "message": "nl80211: vendor command support\n\nAdd support for vendor-specific commands to nl80211. This is\nintended to be used for really vendor-specific functionality\nthat can\u0027t be implemented in a generic fashion for any reason.\nIt\u0027s *NOT* intended to be used for any normal/generic feature\nor any optimisations that could be implemented across drivers.\nCurrently, only vendor commands (with replies) are supported,\nno dump operations or vendor-specific notifications.\nAlso add a function wdev_to_ieee80211_vif() to mac80211 which\nis needed for mac80211-based drivers wanting to implement any\nvendor commands.\n\nChange-Id: If73cf90d152ca0888a563cf4ae685aad9cec6443\nCRs-fixed: 576020\nSigned-off-by: Johannes Berg \u003cjohannes.berg@intel.com\u003e\nGit-commit: ad7e718c9b4f717823fd920a0103f7b0fb06183f\nGit-repo: https://git.kernel.org/cgit/linux/kernel/git/linville/wireless-next.git\nSigned-off-by: Leo Chang \u003cleochang@codeaurora.org\u003e\n"
    },
    {
      "commit": "60a48a89ebd20ef285636719a7f0a02dd8175021",
      "tree": "8fa5e58b0a189001c136ad4a191b11aa2863eae4",
      "parents": [
        "08e79dc6850c649f8d04aa0c039ea2a00ec60297"
      ],
      "author": {
        "name": "Naresh Jayaram",
        "email": "njayar@codeaurora.org",
        "time": "Fri Jan 03 14:46:34 2014 +0530"
      },
      "committer": {
        "name": "Mahesh A Saptasagar",
        "email": "msapta@codeaurora.org",
        "time": "Thu Feb 20 20:42:04 2014 +0530"
      },
      "message": "cfg80211: pass station supported channel and oper class info\n\nThe information of the peer\u0027s supported channels and supported operating\nclasses are required for the driver to perform TDLS off channel\noperations. This commit enhances the function nl80211_(new)set_station\nto pass this information of the peer to the driver.\n\nCRs-fixed: 595620\nChange-Id: I1d630deb4cf435e7f72e3a59276d3771c2b03114\nSigned-off-by: Naresh Jayaram \u003cnjayar@codeaurora.org\u003e\n"
    },
    {
      "commit": "7f285eb6d3ab8aca873632bfc9ff6faf645a246b",
      "tree": "f3d8668126d79b01fb95dc61bbf133a0cfe121db",
      "parents": [
        "63d6049bf5ff893a101bb8c41bd4ba0cd0ee967c"
      ],
      "author": {
        "name": "Mahesh A Saptasagar",
        "email": "msapta@codeaurora.org",
        "time": "Tue Feb 11 13:39:05 2014 +0530"
      },
      "committer": {
        "name": "Mahesh A Saptasagar",
        "email": "msapta@codeaurora.org",
        "time": "Tue Feb 11 13:47:13 2014 +0530"
      },
      "message": "WLAN subsystem: Sysctl support for key TCP/IP parameters\n\nIt has been observed that default values for some of key tcp/ip\nparameters are affecting the tput/performance of the system. Hence\nextending configuration capabilities to TCP/Ip stack through\nsysctl interface.\n\nChange-Id: I0c99d5b50cbe0d6496e40d391eacc12b0c62dbed\nCRs-Fixed: 507581\nSigned-off-by: Mahesh A Saptasagar \u003cmsapta@codeaurora.org\u003e\n"
    },
    {
      "commit": "f704820d27f72bc596d47a1119514a67b91a7b7c",
      "tree": "dca4b1daf6ef90080e637c7956f8871d7ae644cf",
      "parents": [
        "dce956192e60503d992558fea5ea5665fdfc929a"
      ],
      "author": {
        "name": "Lorenzo Colitti",
        "email": "lorenzo@google.com",
        "time": "Wed Jan 16 22:09:49 2013 +0000"
      },
      "committer": {
        "name": "Subash Abhinov Kasiviswanathan",
        "email": "subashab@codeaurora.org",
        "time": "Wed Jan 29 10:02:50 2014 -0700"
      },
      "message": "net: ipv6: Add IPv6 support to the ping socket.\n\n[backport of net-next 6d0bfe22611602f36617bc7aa2ffa1bbb2f54c67]\n\nThis adds the ability to send ICMPv6 echo requests without a\nraw socket. The equivalent ability for ICMPv4 was added in\n2011.\n\nInstead of having separate code paths for IPv4 and IPv6, make\nmost of the code in net/ipv4/ping.c dual-stack and only add a\nfew IPv6-specific bits (like the protocol definition) to a new\nnet/ipv6/ping.c. Hopefully this will reduce divergence and/or\nduplication of bugs in the future.\n\nCaveats:\n\n- Setting options via ancillary data (e.g., using IPV6_PKTINFO\n  to specify the outgoing interface) is not yet supported.\n- There are no separate security settings for IPv4 and IPv6;\n  everything is controlled by /proc/net/ipv4/ping_group_range.\n- The proc interface does not yet display IPv6 ping sockets\n  properly.\n\nTested with a patched copy of ping6 and using raw socket calls.\nCompiles and works with all of CONFIG_IPV6\u003d{n,m,y}.\n\nCRs-Fixed: 573548\nChange-Id: I0081b4654dd54b12c8f233e00e18943582aa2142\nSigned-off-by: Lorenzo Colitti \u003clorenzo@google.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n[lorenzo@google.com: backported to 3.4]\nSigned-off-by: Lorenzo Colitti \u003clorenzo@google.com\u003e\nGit-commit: 1f0675844e3b63a765e5bd32bc5af051ccd951c0\nGit-repo: https://android.googlesource.com/kernel/common\n[subashab@codeaurora.org : resolve trivial merge conflicts]\nSigned-off-by: Subash Abhinov Kasiviswanathan \u003csubashab@codeaurora.org\u003e\nSigned-off-by: Ian Maund \u003cimaund@codeaurora.org\u003e\n"
    },
    {
      "commit": "dce956192e60503d992558fea5ea5665fdfc929a",
      "tree": "eaa55b05bc7628622dacac5de1b6d9dcfc7dda76",
      "parents": [
        "78617601ecb1f3b0a2c1d7cf4eb97a0ebccc8f03"
      ],
      "author": {
        "name": "Hannes Frederic Sowa",
        "email": "hannes@stressinduktion.org",
        "time": "Tue Jan 21 11:26:33 2014 -0700"
      },
      "committer": {
        "name": "Subash Abhinov Kasiviswanathan",
        "email": "subashab@codeaurora.org",
        "time": "Wed Jan 29 09:50:59 2014 -0700"
      },
      "message": "ipv6: introdcue __ipv6_addr_needs_scope_id and ipv6_iface_scope_id helper functions\n\n[net-next commit b7ef213ef65256168df83ddfbb8131ed9adc10f9]\n\n__ipv6_addr_needs_scope_id checks if an ipv6 address needs to supply\na \u0027sin6_scope_id !\u003d 0\u0027. \u0027sin6_scope_id !\u003d 0\u0027 was enforced in case\nof link-local addresses. To support interface-local multicast these\nchecks had to be enhanced and are now consolidated into these new helper\nfunctions.\n\nv2:\na) migrated to struct ipv6_addr_props\n\nv3:\na) reverted changes for ipv6_addr_props\nb) test for address type instead of comparing scope\n\nv4:\na) unchanged\n\nCRs-Fixed: 573548\nChange-Id: Id6fc54cec61f967928e08a9eba4f857157d973a3\nSuggested-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nCc: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nAcked-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: Hannes Frederic Sowa \u003channes@stressinduktion.org\u003e\nAcked-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nGit-commit: 6607cf0ded9a5f456295477bb1215351fce38d23\nGit-repo: https://android.googlesource.com/kernel/common/\nSigned-off-by: Subash Abhinov Kasiviswanathan \u003csubashab@codeaurora.org\u003e\n"
    },
    {
      "commit": "58634ac42e736eea0e8b93cec610174879d36d58",
      "tree": "4179bdb042aa497dd2fb3c7d0cddc88e244e5237",
      "parents": [
        "fda73056f62d84376a3d29926708b4a08155da31",
        "a995dd1c29426a074364170359a026f68e8426db"
      ],
      "author": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Tue Jan 14 21:51:43 2014 -0800"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Tue Jan 14 21:51:43 2014 -0800"
      },
      "message": "Merge remote-tracking branch \u0027codeaurora/kk_2.7_rb1.21\u0027 into cm-11.0\n\nConflicts:\n\tdrivers/media/video/msm/msm_vfe32.h\n\tdrivers/media/video/msm/vfe/msm_vfe32.c\n\tnet/wireless/reg.c\n\nChange-Id: I073c609cfa1c461249bf728b28249bcaa1eaa211\n"
    },
    {
      "commit": "de0f9a5a9d7932086e623560d66655cc8507cfec",
      "tree": "d9e4678d68da38d7670b79c8b5e8782445c5ad7e",
      "parents": [
        "e1a3c5a3706d580390c02c69cb14dcd679d31d91",
        "84dfcb758ba7cce52ef475ac96861a558e1a20ca"
      ],
      "author": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Sat Dec 21 14:22:41 2013 -0800"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Sat Dec 21 14:22:41 2013 -0800"
      },
      "message": "Merge tag \u0027v3.4.75\u0027 into cm-11.0\n\nThis is the 3.4.75 stable release\n\nConflicts:\n\tdrivers/md/dm-crypt.c\n\tdrivers/mmc/card/block.c\n\tdrivers/net/ethernet/smsc/smc91x.h\n\nChange-Id: I39f38ef5530c5fef07583beb9d76b983e71b9ff3\n"
    },
    {
      "commit": "f0c7091c82594bc42bb5af99dae4f18e1dae6d46",
      "tree": "6e20dde649190f77969c15aedf8eb4bc4e40cae2",
      "parents": [
        "09b3d7972025ff9e654b8cce3453b5d9f205cbf8"
      ],
      "author": {
        "name": "Mihir Shete",
        "email": "smihir@codeaurora.org",
        "time": "Mon Oct 14 00:54:40 2013 +0530"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Fri Dec 13 03:57:02 2013 -0800"
      },
      "message": "cfg80211: export regulatory_hint_user() API\n\nThis is to help the hardware configured in world\nroaming mode to save power when not connected to\nany AP.\n\nCRs-Fixed: 542802\nChange-Id: Ia643d0e9848dcd486832973bd6dd186edd7bd4ea\nSigned-off-by: Mihir Shete \u003csmihir@codeaurora.org\u003e\n"
    },
    {
      "commit": "2a38ada0f1ab9f894eea4428731ebc811b51c3f3",
      "tree": "759c765808a23a3a35e4ba10d8306c847c0205b7",
      "parents": [
        "19218e895cefdd389c96af12c93c89e7276bbaad",
        "44d19f5a04ae4e433548ba2f25e4d2ccfcac765e"
      ],
      "author": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Sun Dec 08 12:50:38 2013 -0800"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Sun Dec 08 12:50:38 2013 -0800"
      },
      "message": "Merge tag \u0027v3.4.72\u0027 into tmp\n\nThis is the 3.4.72 stable release\n\nConflicts:\n\tarch/arm/Kconfig\n\tarch/arm/include/asm/mutex.h\n\tarch/arm/kernel/perf_event.c\n\tarch/arm/kernel/traps.c\n\tarch/arm/mm/dma-mapping.c\n\tdrivers/base/power/main.c\n\tdrivers/bluetooth/ath3k.c\n\tdrivers/bluetooth/btusb.c\n\tdrivers/gpu/drm/radeon/radeon_mode.h\n\tdrivers/mmc/card/block.c\n\tdrivers/mmc/host/sdhci.c\n\tdrivers/usb/core/message.c\n\tdrivers/usb/host/xhci-plat.c\n\tdrivers/usb/host/xhci.h\n\tdrivers/virtio/virtio_ring.c\n\tfs/ubifs/dir.c\n\tinclude/linux/freezer.h\n\tinclude/linux/virtio.h\n\tinclude/media/v4l2-ctrls.h\n\tinclude/net/bluetooth/hci_core.h\n\tinclude/net/bluetooth/mgmt.h\n\tkernel/cgroup.c\n\tkernel/futex.c\n\tkernel/signal.c\n\tnet/bluetooth/hci_conn.c\n\tnet/bluetooth/hci_core.c\n\tnet/bluetooth/hci_event.c\n\tnet/bluetooth/l2cap_core.c\n\tnet/bluetooth/mgmt.c\n\tnet/bluetooth/rfcomm/sock.c\n\tnet/bluetooth/smp.c\n\nChange-Id: I4fb0d5de74ca76f933d95d98e1a9c2c859402f34\n"
    },
    {
      "commit": "ad25b5df02bacf27efb56fe12bb8da8dd9273546",
      "tree": "46b4c357415225acf77d155d659a729c307fdee0",
      "parents": [
        "ea9d7dc958579b07bf5cc419c4db932689a1224d"
      ],
      "author": {
        "name": "Hannes Frederic Sowa",
        "email": "hannes@stressinduktion.org",
        "time": "Sat Nov 23 00:46:12 2013 +0100"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Dec 08 07:29:42 2013 -0800"
      },
      "message": "inet: fix addr_len/msg-\u003emsg_namelen assignment in recv_error and rxpmtu functions\n\n[ Upstream commit 85fbaa75037d0b6b786ff18658ddf0b4014ce2a4 ]\n\nCommit bceaa90240b6019ed73b49965eac7d167610be69 (\"inet: prevent leakage\nof uninitialized memory to user in recv syscalls\") conditionally updated\naddr_len if the msg_name is written to. The recv_error and rxpmtu\nfunctions relied on the recvmsg functions to set up addr_len before.\n\nAs this does not happen any more we have to pass addr_len to those\nfunctions as well and set it to the size of the corresponding sockaddr\nlength.\n\nThis broke traceroute and such.\n\nFixes: bceaa90240b6 (\"inet: prevent leakage of uninitialized memory to user in recv syscalls\")\nReported-by: Brad Spengler \u003cspender@grsecurity.net\u003e\nReported-by: Tom Labanowski\nCc: mpb \u003cmpb.mail@gmail.com\u003e\nCc: David S. Miller \u003cdavem@davemloft.net\u003e\nCc: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: Hannes Frederic Sowa \u003channes@stressinduktion.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "c5812972d6d39b23ceb2a74d89c6a2d1cd140c56",
      "tree": "e4195c36259c17ddc4907dcdf97268a44ae7c770",
      "parents": [
        "ca3763f7ebb644e0e179ee2d84cd9402ad1e5d4f",
        "59a719e8389a77b7788b389af302f143dd74c9c7"
      ],
      "author": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Thu Nov 21 17:20:24 2013 -0800"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Thu Nov 21 17:20:24 2013 -0800"
      },
      "message": "Merge remote-tracking branch \u0027codeaurora/kk_2.7_rb1.10\u0027 into HEAD\n\nConflicts:\n\tnet/wireless/reg.c\n\nChange-Id: I7e670492fddabd2218bb65a7e88a870c5e196909\n"
    },
    {
      "commit": "ee5fc1b5789d5bddd8034310d03d3bd1eafdbe3a",
      "tree": "face2e89ec4af36c5a6ba29ce2ac925dc8cd6669",
      "parents": [
        "fa0433af5d71ba85d96f904a173fa3c7e7269bbd"
      ],
      "author": {
        "name": "Mihir Shete",
        "email": "smihir@codeaurora.org",
        "time": "Sun Oct 13 05:25:30 2013 +0530"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Tue Nov 12 07:06:02 2013 -0800"
      },
      "message": "cfg80211: add flags to define country IE processing rules\n\n802.11 cards may have different country IE parsing behavioural\npreferences and vendors may want to support these. These preferences\nwere managed by the WIPHY_FLAG_CUSTOM_REGULATORY and the\nWIPHY_FLAG_STRICT_REGULATORY flags and their combination.\nInstead of using this existing notation, split out the country IE\nbehavioural preferences to a new flag. This will allow us to add more\ncustomizations easily and make the code more maintainable. Also add\na new flag to disable country IE hints issued by the CORE as the\nfirst customization.\n\nChange-Id: I66ba4a92ac0f029a115eea0a274b02db11279787\nCRs-Fixed: 542802\nSigned-off-by: Mihir Shete \u003csmihir@codeaurora.org\u003e\n"
    },
    {
      "commit": "2b5f6d110ee835cba1742c999cabd30a54c10b76",
      "tree": "4e10f90603b71437153e18c38cd356b569fdb98c",
      "parents": [
        "4dde1cb060276e93a2ed22e4a167fc260a9d8c23"
      ],
      "author": {
        "name": "Seif Mazareeb",
        "email": "seif@marvell.com",
        "time": "Thu Oct 17 20:33:21 2013 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Mon Nov 04 04:23:41 2013 -0800"
      },
      "message": "net: fix cipso packet validation when !NETLABEL\n\n[ Upstream commit f2e5ddcc0d12f9c4c7b254358ad245c9dddce13b ]\n\nWhen CONFIG_NETLABEL is disabled, the cipso_v4_validate() function could loop\nforever in the main loop if opt[opt_iter +1] \u003d\u003d 0, this will causing a kernel\ncrash in an SMP system, since the CPU executing this function will\nstall /not respond to IPIs.\n\nThis problem can be reproduced by running the IP Stack Integrity Checker\n(http://isic.sourceforge.net) using the following command on a Linux machine\nconnected to DUT:\n\n\"icmpsic -s rand -d \u003cDUT IP address\u003e -r 123456\"\nwait (1-2 min)\n\nSigned-off-by: Seif Mazareeb \u003cseif@marvell.com\u003e\nAcked-by: Paul Moore \u003cpaul@paul-moore.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "3e5d72cd013a30bbd3a835243b635f0b85c4dd0a",
      "tree": "79b48fb112d98c9631a7e2a1ff1b5428fb1cf1db",
      "parents": [
        "225be57bbaf2c104f339b1a21efc25ff6b6bd9cb"
      ],
      "author": {
        "name": "Vlad Yasevich",
        "email": "vyasevich@gmail.com",
        "time": "Tue Oct 15 22:01:29 2013 -0400"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Mon Nov 04 04:23:41 2013 -0800"
      },
      "message": "net: dst: provide accessor function to dst-\u003exfrm\n\n[ Upstream commit e87b3998d795123b4139bc3f25490dd236f68212 ]\n\ndst-\u003exfrm is conditionally defined.  Provide accessor funtion that\nis always available.\n\nSigned-off-by: Vlad Yasevich \u003cvyasevich@gmail.com\u003e\nAcked-by: Neil Horman \u003cnhorman@tuxdriver.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "4c481c15615a3ff1cd28d2cfd687817704be63ad",
      "tree": "dc15be09c319156ed362f1c349bc1d052cfb7542",
      "parents": [
        "a8cefcec4999befc00b4be17985644b7a092dff1",
        "0841f631e5cecf7fb08f6ae6c89e47b79dca83cd"
      ],
      "author": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Tue Oct 22 15:09:42 2013 -0700"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Tue Oct 22 15:09:42 2013 -0700"
      },
      "message": "Merge tag \u0027AU_LINUX_ANDROID_JB_2.6.04.03.00.109.082\u0027 into revert-linux\n\nAU_LINUX_ANDROID_JB_2.6.04.03.00.109.082 based on quic/aosp/jb_2.6\n\nConflicts:\n\tarch/arm/mach-msm/ipc_router.h\n\tarch/arm/mach-msm/ipc_socket.c\n\tdrivers/media/video/msm/actuators/msm_actuator.c\n\tdrivers/media/video/msm/csi/msm_csid.c\n\tdrivers/media/video/msm/vfe/msm_vfe32.c\n\tdrivers/video/msm/hdmi_msm.c\n\tinclude/media/msm_camera.h\n\nChange-Id: I9285b7519314f034fb8a6a4b7e2d21aa2e3e3739\n"
    },
    {
      "commit": "f72299da3e1a010a3d77fbed0b9ee6abd0a19911",
      "tree": "7ea60bcfbe30a8b48fe9e3a5d2af5c08d2f115a9",
      "parents": [
        "832ae42a43dd7ea2a39d7cc0687363d0039da850"
      ],
      "author": {
        "name": "Ansis Atteka",
        "email": "aatteka@nicira.com",
        "time": "Wed Sep 18 15:29:53 2013 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 13 15:42:48 2013 -0700"
      },
      "message": "ip: generate unique IP identificator if local fragmentation is allowed\n\n[ Upstream commit 703133de331a7a7df47f31fb9de51dc6f68a9de8 ]\n\nIf local fragmentation is allowed, then ip_select_ident() and\nip_select_ident_more() need to generate unique IDs to ensure\ncorrect defragmentation on the peer.\n\nFor example, if IPsec (tunnel mode) has to encrypt large skbs\nthat have local_df bit set, then all IP fragments that belonged\nto different ESP datagrams would have used the same identificator.\nIf one of these IP fragments would get lost or reordered, then\npeer could possibly stitch together wrong IP fragments that did\nnot belong to the same datagram. This would lead to a packet loss\nor data corruption.\n\nSigned-off-by: Ansis Atteka \u003caatteka@nicira.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "50b5f07287564a13d3ae28cfe243cca566407b53",
      "tree": "8c94e43b5da4ff1ecaa85d92d6b52f0bf1da9847",
      "parents": [
        "3b44f9ff1137befb8a907638d6383cf8b20c7413"
      ],
      "author": {
        "name": "Sameer Thalappil",
        "email": "sameert@codeaurora.org",
        "time": "Fri Jul 05 14:58:32 2013 -0700"
      },
      "committer": {
        "name": "Sameer Thalappil",
        "email": "sameert@codeaurora.org",
        "time": "Mon Sep 16 14:26:14 2013 -0700"
      },
      "message": "cfg80211: Add AP stopped interface\n\nAP stopped interface can be used to indicate that the AP mode has\nstopped functioning, WLAN driver may have encountered errors that has\nforced the driver to stop the AP mode.\n\nWhen the driver is in P2P-Go mode, and when it goes thru automatic\nrecovery from firmware crashes, it uses this interface to notify the\nuserspace that the group has been deleted.\n\nCRs-Fixed: 453060\nChange-Id: Ifcd8d4f0c0b26f56a56fb8560aa474297b7521d4\nSigned-off-by: Sameer Thalappil \u003csameert@codeaurora.org\u003e\n"
    },
    {
      "commit": "eeddd9177a67b743868e09742d58f574b2b9a497",
      "tree": "6f78ff2f6a6cc08cf59d4ceeece5e9601f4e135e",
      "parents": [
        "589acc586e0f12e0c46bc98e79ff2a008e8c6c11"
      ],
      "author": {
        "name": "Hannes Frederic Sowa",
        "email": "hannes@stressinduktion.org",
        "time": "Mon Jul 01 20:21:30 2013 +0200"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Jul 28 16:26:02 2013 -0700"
      },
      "message": "ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET pending data\n\n[ Upstream commit 8822b64a0fa64a5dd1dfcf837c5b0be83f8c05d1 ]\n\nWe accidentally call down to ip6_push_pending_frames when uncorking\npending AF_INET data on a ipv6 socket. This results in the following\nsplat (from Dave Jones):\n\nskbuff: skb_under_panic: text:ffffffff816765f6 len:48 put:40 head:ffff88013deb6df0 data:ffff88013deb6dec tail:0x2c end:0xc0 dev:\u003cNULL\u003e\n------------[ cut here ]------------\nkernel BUG at net/core/skbuff.c:126!\ninvalid opcode: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC\nModules linked in: dccp_ipv4 dccp 8021q garp bridge stp dlci mpoa snd_seq_dummy sctp fuse hidp tun bnep nfnetlink scsi_transport_iscsi rfcomm can_raw can_bcm af_802154 appletalk caif_socket can caif ipt_ULOG x25 rose af_key pppoe pppox ipx phonet irda llc2 ppp_generic slhc p8023 psnap p8022 llc crc_ccitt atm bluetooth\n+netrom ax25 nfc rfkill rds af_rxrpc coretemp hwmon kvm_intel kvm crc32c_intel snd_hda_codec_realtek ghash_clmulni_intel microcode pcspkr snd_hda_codec_hdmi snd_hda_intel snd_hda_codec snd_hwdep usb_debug snd_seq snd_seq_device snd_pcm e1000e snd_page_alloc snd_timer ptp snd pps_core soundcore xfs libcrc32c\nCPU: 2 PID: 8095 Comm: trinity-child2 Not tainted 3.10.0-rc7+ #37\ntask: ffff8801f52c2520 ti: ffff8801e6430000 task.ti: ffff8801e6430000\nRIP: 0010:[\u003cffffffff816e759c\u003e]  [\u003cffffffff816e759c\u003e] skb_panic+0x63/0x65\nRSP: 0018:ffff8801e6431de8  EFLAGS: 00010282\nRAX: 0000000000000086 RBX: ffff8802353d3cc0 RCX: 0000000000000006\nRDX: 0000000000003b90 RSI: ffff8801f52c2ca0 RDI: ffff8801f52c2520\nRBP: ffff8801e6431e08 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000001 R11: 0000000000000001 R12: ffff88022ea0c800\nR13: ffff88022ea0cdf8 R14: ffff8802353ecb40 R15: ffffffff81cc7800\nFS:  00007f5720a10740(0000) GS:ffff880244c00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000005862000 CR3: 000000022843c000 CR4: 00000000001407e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600\nStack:\n ffff88013deb6dec 000000000000002c 00000000000000c0 ffffffff81a3f6e4\n ffff8801e6431e18 ffffffff8159a9aa ffff8801e6431e90 ffffffff816765f6\n ffffffff810b756b 0000000700000002 ffff8801e6431e40 0000fea9292aa8c0\nCall Trace:\n [\u003cffffffff8159a9aa\u003e] skb_push+0x3a/0x40\n [\u003cffffffff816765f6\u003e] ip6_push_pending_frames+0x1f6/0x4d0\n [\u003cffffffff810b756b\u003e] ? mark_held_locks+0xbb/0x140\n [\u003cffffffff81694919\u003e] udp_v6_push_pending_frames+0x2b9/0x3d0\n [\u003cffffffff81694660\u003e] ? udplite_getfrag+0x20/0x20\n [\u003cffffffff8162092a\u003e] udp_lib_setsockopt+0x1aa/0x1f0\n [\u003cffffffff811cc5e7\u003e] ? fget_light+0x387/0x4f0\n [\u003cffffffff816958a4\u003e] udpv6_setsockopt+0x34/0x40\n [\u003cffffffff815949f4\u003e] sock_common_setsockopt+0x14/0x20\n [\u003cffffffff81593c31\u003e] SyS_setsockopt+0x71/0xd0\n [\u003cffffffff816f5d54\u003e] tracesys+0xdd/0xe2\nCode: 00 00 48 89 44 24 10 8b 87 d8 00 00 00 48 89 44 24 08 48 8b 87 e8 00 00 00 48 c7 c7 c0 04 aa 81 48 89 04 24 31 c0 e8 e1 7e ff ff \u003c0f\u003e 0b 55 48 89 e5 0f 0b 55 48 89 e5 0f 0b 55 48 89 e5 0f 0b 55\nRIP  [\u003cffffffff816e759c\u003e] skb_panic+0x63/0x65\n RSP \u003cffff8801e6431de8\u003e\n\nThis patch adds a check if the pending data is of address family AF_INET\nand directly calls udp_push_ending_frames from udp_v6_push_pending_frames\nif that is the case.\n\nThis bug was found by Dave Jones with trinity.\n\n(Also move the initialization of fl6 below the AF_INET check, even if\nnot strictly necessary.)\n\nSigned-off-by: Hannes Frederic Sowa \u003channes@stressinduktion.org\u003e\nCc: Dave Jones \u003cdavej@redhat.com\u003e\nCc: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "3ef208a71f18b128e318294af3f7ee8081fe0ac1",
      "tree": "7c6094a3e8003f9532b6e935121bb36a3dc98a2f",
      "parents": [
        "d11ff32e52d86dfc6d3f100653ad88b83b6ead0e"
      ],
      "author": {
        "name": "Amerigo Wang",
        "email": "amwang@redhat.com",
        "time": "Sat Jun 29 21:30:49 2013 +0800"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Jul 28 16:26:02 2013 -0700"
      },
      "message": "ipv6,mcast: always hold idev-\u003elock before mca_lock\n\n[ Upstream commit 8965779d2c0e6ab246c82a405236b1fb2adae6b2, with\n  some bits from commit b7b1bfce0bb68bd8f6e62a28295922785cc63781\n  (\"ipv6: split duplicate address detection and router solicitation timer\")\n  to get the __ipv6_get_lladdr() used by this patch. ]\n\ndingtianhong reported the following deadlock detected by lockdep:\n\n \u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\n [ INFO: possible circular locking dependency detected ]\n 3.4.24.05-0.1-default #1 Not tainted\n -------------------------------------------------------\n ksoftirqd/0/3 is trying to acquire lock:\n  (\u0026ndev-\u003elock){+.+...}, at: [\u003cffffffff8147f804\u003e] ipv6_get_lladdr+0x74/0x120\n\n but task is already holding lock:\n  (\u0026mc-\u003emca_lock){+.+...}, at: [\u003cffffffff8149d130\u003e] mld_send_report+0x40/0x150\n\n which lock already depends on the new lock.\n\n the existing dependency chain (in reverse order) is:\n\n -\u003e #1 (\u0026mc-\u003emca_lock){+.+...}:\n        [\u003cffffffff810a8027\u003e] validate_chain+0x637/0x730\n        [\u003cffffffff810a8417\u003e] __lock_acquire+0x2f7/0x500\n        [\u003cffffffff810a8734\u003e] lock_acquire+0x114/0x150\n        [\u003cffffffff814f691a\u003e] rt_spin_lock+0x4a/0x60\n        [\u003cffffffff8149e4bb\u003e] igmp6_group_added+0x3b/0x120\n        [\u003cffffffff8149e5d8\u003e] ipv6_mc_up+0x38/0x60\n        [\u003cffffffff81480a4d\u003e] ipv6_find_idev+0x3d/0x80\n        [\u003cffffffff81483175\u003e] addrconf_notify+0x3d5/0x4b0\n        [\u003cffffffff814fae3f\u003e] notifier_call_chain+0x3f/0x80\n        [\u003cffffffff81073471\u003e] raw_notifier_call_chain+0x11/0x20\n        [\u003cffffffff813d8722\u003e] call_netdevice_notifiers+0x32/0x60\n        [\u003cffffffff813d92d4\u003e] __dev_notify_flags+0x34/0x80\n        [\u003cffffffff813d9360\u003e] dev_change_flags+0x40/0x70\n        [\u003cffffffff813ea627\u003e] do_setlink+0x237/0x8a0\n        [\u003cffffffff813ebb6c\u003e] rtnl_newlink+0x3ec/0x600\n        [\u003cffffffff813eb4d0\u003e] rtnetlink_rcv_msg+0x160/0x310\n        [\u003cffffffff814040b9\u003e] netlink_rcv_skb+0x89/0xb0\n        [\u003cffffffff813eb357\u003e] rtnetlink_rcv+0x27/0x40\n        [\u003cffffffff81403e20\u003e] netlink_unicast+0x140/0x180\n        [\u003cffffffff81404a9e\u003e] netlink_sendmsg+0x33e/0x380\n        [\u003cffffffff813c4252\u003e] sock_sendmsg+0x112/0x130\n        [\u003cffffffff813c537e\u003e] __sys_sendmsg+0x44e/0x460\n        [\u003cffffffff813c5544\u003e] sys_sendmsg+0x44/0x70\n        [\u003cffffffff814feab9\u003e] system_call_fastpath+0x16/0x1b\n\n -\u003e #0 (\u0026ndev-\u003elock){+.+...}:\n        [\u003cffffffff810a798e\u003e] check_prev_add+0x3de/0x440\n        [\u003cffffffff810a8027\u003e] validate_chain+0x637/0x730\n        [\u003cffffffff810a8417\u003e] __lock_acquire+0x2f7/0x500\n        [\u003cffffffff810a8734\u003e] lock_acquire+0x114/0x150\n        [\u003cffffffff814f6c82\u003e] rt_read_lock+0x42/0x60\n        [\u003cffffffff8147f804\u003e] ipv6_get_lladdr+0x74/0x120\n        [\u003cffffffff8149b036\u003e] mld_newpack+0xb6/0x160\n        [\u003cffffffff8149b18b\u003e] add_grhead+0xab/0xc0\n        [\u003cffffffff8149d03b\u003e] add_grec+0x3ab/0x460\n        [\u003cffffffff8149d14a\u003e] mld_send_report+0x5a/0x150\n        [\u003cffffffff8149f99e\u003e] igmp6_timer_handler+0x4e/0xb0\n        [\u003cffffffff8105705a\u003e] call_timer_fn+0xca/0x1d0\n        [\u003cffffffff81057b9f\u003e] run_timer_softirq+0x1df/0x2e0\n        [\u003cffffffff8104e8c7\u003e] handle_pending_softirqs+0xf7/0x1f0\n        [\u003cffffffff8104ea3b\u003e] __do_softirq_common+0x7b/0xf0\n        [\u003cffffffff8104f07f\u003e] __thread_do_softirq+0x1af/0x210\n        [\u003cffffffff8104f1c1\u003e] run_ksoftirqd+0xe1/0x1f0\n        [\u003cffffffff8106c7de\u003e] kthread+0xae/0xc0\n        [\u003cffffffff814fff74\u003e] kernel_thread_helper+0x4/0x10\n\nactually we can just hold idev-\u003elock before taking pmc-\u003emca_lock,\nand avoid taking idev-\u003elock again when iterating idev-\u003eaddr_list,\nsince the upper callers of mld_newpack() already take\nread_lock_bh(\u0026idev-\u003elock).\n\nReported-by: dingtianhong \u003cdingtianhong@huawei.com\u003e\nCc: dingtianhong \u003cdingtianhong@huawei.com\u003e\nCc: Hideaki YOSHIFUJI \u003cyoshfuji@linux-ipv6.org\u003e\nCc: David S. Miller \u003cdavem@davemloft.net\u003e\nCc: Hannes Frederic Sowa \u003channes@stressinduktion.org\u003e\nTested-by: Ding Tianhong \u003cdingtianhong@huawei.com\u003e\nTested-by: Chen Weilong \u003cchenweilong@huawei.com\u003e\nSigned-off-by: Cong Wang \u003camwang@redhat.com\u003e\nAcked-by: Hannes Frederic Sowa \u003channes@stressinduktion.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "d9795bafda02819105f8e91a0fce6c657ae55779",
      "tree": "cfa6c413100ffb2d5570244053ededcd6f3e47bf",
      "parents": [
        "73a5d309beea98f65799b6c1b4f248ff4e723808",
        "e2b6ece3cddd1da43c67aa17f89bd1e436b2e9f0"
      ],
      "author": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Mon Jul 22 10:56:03 2013 -0700"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Mon Jul 22 10:56:03 2013 -0700"
      },
      "message": "Merge tag \u0027AU_LINUX_ANDROID_JB_2.5.04.02.02.040.432\u0027 into cm-10.1\n\nAU_LINUX_ANDROID_JB_2.5.04.02.02.040.432 based on quic/aosp/jb_2.5\n\nConflicts:\n\tdrivers/media/video/msm/gemini/msm_gemini_hw.c\n\tdrivers/media/video/msm/gemini/msm_gemini_hw.h\n\tdrivers/media/video/msm/gemini/msm_gemini_sync.c\n\tdrivers/media/video/msm/jpeg_10/msm_jpeg_sync.c\n\tdrivers/media/video/msm/mercury/msm_mercury_sync.c\n\tdrivers/media/video/msm/msm.c\n\tdrivers/media/video/msm/msm.h\n\tdrivers/media/video/msm/msm_mctl.c\n\tdrivers/media/video/msm/msm_mctl_buf.c\n\tdrivers/media/video/msm/msm_vpe.c\n\tdrivers/media/video/msm/vfe/msm_vfe32.c\n\tdrivers/video/msm/hdmi_msm.c\n\nChange-Id: I57b6cff57599d10983cd3bff63a6f20e4d62655e\n"
    },
    {
      "commit": "cb4c2165ff339d67d27092615a5f0b961e735ae0",
      "tree": "1e61e3e907af70ab142f6813f14d0f6c35d37782",
      "parents": [
        "b6a01e111f335ab6cdc67ee63f89162eca2ec355"
      ],
      "author": {
        "name": "Hemant Gupta",
        "email": "hemantg@codeaurora.org",
        "time": "Sat Jun 08 19:07:57 2013 +0530"
      },
      "committer": {
        "name": "Sridhar Gujje",
        "email": "sgujje@codeaurora.org",
        "time": "Sun Jul 07 10:30:53 2013 +0530"
      },
      "message": "Bluetooth: hidp: Remove sysfs entry if hid connection is disconnected\n\nThis patch fixes the issue that sysfs entry for hid was not removed when\ndisconnection was initiated from remote end or if BT was reset. Sysfs\nentry prevented reconnection from HID device.\n\nCRs-Fixed: 468516, 473179\nChange-Id: I40bcd27450cd8f87180d33b66969dde4f08a34f3\nSigned-off-by: Hemant Gupta \u003chemantg@codeaurora.org\u003e\nSigned-off-by: Sridhar Gujje \u003csgujje@codeaurora.org\u003e\n"
    },
    {
      "commit": "aa888f493125b21930ba87ad26f0c1ad5be39a51",
      "tree": "89f9f67f2a1b4bfdc133612c04668c4bff914ca3",
      "parents": [
        "35f33d90b228cf1a1abc4aa96036815c9fbdbf39",
        "50ca37a286e73b7a897226b24978d8742c7728da"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Wed Jul 03 21:44:36 2013 -0700"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Wed Jul 03 21:44:35 2013 -0700"
      },
      "message": "Merge \"cfg80211/nl80211: add API for MAC address ACLs\""
    },
    {
      "commit": "50ca37a286e73b7a897226b24978d8742c7728da",
      "tree": "d2f5c123361d77ada295df397dd7e50933b5e993",
      "parents": [
        "c772e69b7f97e15c5cc5c7cd0a798a44ecb3f6af"
      ],
      "author": {
        "name": "Vasanthakumar Thiagarajan",
        "email": "vthiagar@qca.qualcomm.com",
        "time": "Wed Jul 03 14:16:36 2013 +0530"
      },
      "committer": {
        "name": "Sunil Dutt",
        "email": "duttus@codeaurora.org",
        "time": "Wed Jul 03 16:21:16 2013 +0530"
      },
      "message": "cfg80211/nl80211: add API for MAC address ACLs\n\nAdd API to enable drivers to implement MAC address based\naccess control in AP/P2P GO mode. Capable drivers advertise\ncfg80211/nl80211: add API for MAC address ACLs\n\nAdd API to enable drivers to implement MAC address based\naccess control in AP/P2P GO mode. Capable drivers advertise\nthis capability by setting the maximum number of MAC\naddresses in such a list in wiphy-\u003emax_acl_mac_addrs.\n\nAn initial ACL may be given to the NL80211_CMD_START_AP\ncommand and/or changed later with NL80211_CMD_SET_MAC_ACL.\n\nBlack- and whitelists are supported, but not simultaneously.\n\nSigned-off-by: Vasanthakumar Thiagarajan \u003cvthiagar@qca.qualcomm.com\u003e\n[rewrite commit log, many cleanups]\nSigned-off-by: Johannes Berg \u003cjohannes.berg@intel.com\u003e\nGit-commit: 77765eaf5cfb6b8dd98ec8b54b411d74ff6095f1\nGit-repo: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git\nCRs-fixed: 487410\nChange-Id: Ib739f5c317e1433827370f24ab04ef798eca0d53\n[duttus@codeaurora.org: resolved 3.4 backport issues]\nSigned-off-by: Sunil Dutt \u003cduttus@codeaurora.org\u003e\n"
    },
    {
      "commit": "0b6ad97dbce851f65ae4359392218d867fe39e3f",
      "tree": "b5cc089dc635243322870bf69b7cc0494f0c4c42",
      "parents": [
        "5bd77dd603c814d015538dbfdbbb3c3b97d4fd01"
      ],
      "author": {
        "name": "Hemant Gupta",
        "email": "hemantg@codeaurora.org",
        "time": "Sat Jun 08 19:07:57 2013 +0530"
      },
      "committer": {
        "name": "Hemant Gupta",
        "email": "hemantg@codeaurora.org",
        "time": "Tue Jul 02 12:55:44 2013 +0530"
      },
      "message": "Bluetooth: hidp: Remove sysfs entry if hid connection is disconnected\n\nThis patch fixes the issue that sysfs entry for hid was not removed when\ndisconnection was initiated from remote end or if BT was reset. Sysfs\nentry prevented reconnection from HID device.\n\nCRs-Fixed: 468516, 473179\nChange-Id: I40bcd27450cd8f87180d33b66969dde4f08a34f3\nSigned-off-by: Hemant Gupta \u003chemantg@codeaurora.org\u003e\n"
    },
    {
      "commit": "b3eb72f13a8f9146914ede4bbf36f7f4d0e58a32",
      "tree": "d8ceae1255c4633714a24f41972cb5358bfb3b4f",
      "parents": [
        "d6d8da3ccb4e20edd1dbdb2f21cd88a9250fe206"
      ],
      "author": {
        "name": "Subramanian Srinivasan",
        "email": "subrsrin@codeaurora.org",
        "time": "Tue May 21 15:42:28 2013 -0700"
      },
      "committer": {
        "name": "Sridhar Gujje",
        "email": "sgujje@codeaurora.org",
        "time": "Mon Jul 01 12:10:57 2013 +0530"
      },
      "message": "Fix disconnect not sent from host when pairing is cancelled\n\nFixes the issue that disconnect command is not sent\nfrom the host when pairing is cancelled.\n\nCRs-fixed: 489957\n\nChange-Id: I600a526aa9b95a3f17d77d5ef16d91e206ce7161\nSigned-off-by: Subramanian Srinivasan \u003csubrsrin@codeaurora.org\u003e\nSigned-off-by: Sridhar Gujje \u003csgujje@codeaurora.org\u003e\n"
    },
    {
      "commit": "2147439889d33148785d20cdff01491f5617965f",
      "tree": "1f2504a3535c3e534b040cc66f002bb43e41c7e3",
      "parents": [
        "b507d034be0418dd2dee4fe3d40f389b1818b37a"
      ],
      "author": {
        "name": "Johan Hedberg",
        "email": "johan.hedberg@intel.com",
        "time": "Wed May 29 09:51:29 2013 +0300"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Thu Jun 20 11:58:44 2013 -0700"
      },
      "message": "Bluetooth: Fix mgmt handling of power on failures\n\ncommit 96570ffcca0b872dc8626e97569d2697f374d868 upstream.\n\nIf hci_dev_open fails we need to ensure that the corresponding\nmgmt_set_powered command gets an appropriate response. This patch fixes\nthe missing response by adding a new mgmt_set_powered_failed function\nthat\u0027s used to indicate a power on failure to mgmt. Since a situation\nwith the device being rfkilled may require special handling in user\nspace the patch uses a new dedicated mgmt status code for this.\n\nSigned-off-by: Johan Hedberg \u003cjohan.hedberg@intel.com\u003e\nAcked-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nSigned-off-by: Gustavo Padovan \u003cgustavo.padovan@collabora.co.uk\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "dde448d95d8698ee4c8373bb48fe08a22f41052f",
      "tree": "7fe87fa93bfa5b81e6f87b147e32512d2e8198e3",
      "parents": [
        "ac4f6190fae02a3dc30133f90488b996f726bf7a",
        "f95b978981a7d154ba40d14c18e8ed5c694e6124"
      ],
      "author": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Thu Jun 20 11:32:42 2013 -0700"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Thu Jun 20 11:32:42 2013 -0700"
      },
      "message": "Merge tag \u0027v3.4.10\u0027 into cm-10.1\n\nThis is the 3.4.10 stable release\n\nConflicts:\n\tarch/arm/mm/tlb-v7.S\n\tarch/arm/vfp/entry.S\n\tdrivers/base/power/main.c\n\tdrivers/mmc/host/sdhci.c\n\tdrivers/net/tun.c\n\tdrivers/usb/core/hub.c\n\tdrivers/usb/host/xhci.h\n\tinclude/linux/sched.h\n\tkernel/power/suspend.c\n\nChange-Id: Ia2477ec93ceb64b13dd1a2d8aa646cb233387d14\n"
    },
    {
      "commit": "5037cd143b48c0a2966ed1bace850084a37ff241",
      "tree": "30e8db55096f80045e8e3c475cb2039d9be33d5f",
      "parents": [
        "bd3bfab99d9e8ab00039b095963843ce53726a17"
      ],
      "author": {
        "name": "Vasanthakumar Thiagarajan",
        "email": "vthiagar@qca.qualcomm.com",
        "time": "Tue May 14 19:04:43 2013 +0530"
      },
      "committer": {
        "name": "Sunil Dutt",
        "email": "duttus@codeaurora.org",
        "time": "Fri May 31 18:46:32 2013 +0530"
      },
      "message": "cfg80211/nl80211: add API for MAC address ACLs\n\nAdd API to enable drivers to implement MAC address based\naccess control in AP/P2P GO mode. Capable drivers advertise\nthis capability by setting the maximum number of MAC\naddresses in such a list in wiphy-\u003emax_acl_mac_addrs.\n\nAn initial ACL may be given to the NL80211_CMD_START_AP\ncommand and/or changed later with NL80211_CMD_SET_MAC_ACL.\n\nBlack- and whitelists are supported, but not simultaneously.\n\nSigned-off-by: Vasanthakumar Thiagarajan \u003cvthiagar@qca.qualcomm.com\u003e\n[rewrite commit log, many cleanups]\nSigned-off-by: Johannes Berg \u003cjohannes.berg@intel.com\u003e\nGit-commit: 77765eaf5cfb6b8dd98ec8b54b411d74ff6095f1\nGit-repo: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git\nCRs-fixed: 487410\nChange-Id: I9593b887941be5efa5e96546ad92cd6c6bf8fb87\n[duttus@codeaurora.org: resolved 3.4 backport issues]\nSigned-off-by: Sunil Dutt \u003cduttus@codeaurora.org\u003e\n"
    },
    {
      "commit": "6e9f2b0dc6daba857ccba9103e95c6c787ada1ba",
      "tree": "fa9950328995997e911ebbbf86a79b79bb754d33",
      "parents": [
        "bb971246f2f829b52e049675a2649bc24e7a50f4"
      ],
      "author": {
        "name": "Subramanian Srinivasan",
        "email": "subrsrin@codeaurora.org",
        "time": "Tue May 21 15:42:28 2013 -0700"
      },
      "committer": {
        "name": "Subramanian Srinivasan",
        "email": "subrsrin@codeaurora.org",
        "time": "Thu May 23 10:37:32 2013 -0700"
      },
      "message": "Fix disconnect not sent from host when pairing is cancelled\n\nFixes the issue that disconnect command is not sent\nfrom the host when pairing is cancelled.\n\nCRs-fixed: 489957\n\nChange-Id: I600a526aa9b95a3f17d77d5ef16d91e206ce7161\nSigned-off-by: Subramanian Srinivasan \u003csubrsrin@codeaurora.org\u003e\n"
    },
    {
      "commit": "7d9577d0b2d7958c821236064d995a995e1c4256",
      "tree": "a69a1229b1f5c8fc15e9ae683ad665ec16e17eb8",
      "parents": [
        "f2f17ef7c7a9ac2a9ed1160c768c67d2cf86b8d5"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "edumazet@google.com",
        "time": "Thu May 09 10:28:16 2013 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun May 19 10:54:47 2013 -0700"
      },
      "message": "ipv6: do not clear pinet6 field\n\n[ Upstream commit f77d602124d865c38705df7fa25c03de9c284ad2 ]\n\nWe have seen multiple NULL dereferences in __inet6_lookup_established()\n\nAfter analysis, I found that inet6_sk() could be NULL while the\ncheck for sk_family \u003d\u003d AF_INET6 was true.\n\nBug was added in linux-2.6.29 when RCU lookups were introduced in UDP\nand TCP stacks.\n\nOnce an IPv6 socket, using SLAB_DESTROY_BY_RCU is inserted in a hash\ntable, we no longer can clear pinet6 field.\n\nThis patch extends logic used in commit fcbdf09d9652c891\n(\"net: fix nulls list corruptions in sk_prot_alloc\")\n\nTCP/UDP/UDPLite IPv6 protocols provide their own .clear_sk() method\nto make sure we do not clear pinet6 field.\n\nAt socket clone phase, we do not really care, as cloning the parent (non\nNULL) pinet6 is not adding a fatal race.\n\nSigned-off-by: Eric Dumazet \u003cedumazet@google.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "8e1546d7e14ef043ff74070cea0aff55ba2f600c",
      "tree": "c595d2a41d374eb4d57366553cd3f628583d6697",
      "parents": [
        "1203d9c66e6b892bd8043eea51c5cd510d097266"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "edumazet@google.com",
        "time": "Wed Apr 24 18:34:55 2013 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun May 19 10:54:43 2013 -0700"
      },
      "message": "tcp: force a dst refcount when prequeue packet\n\n[ Upstream commit 093162553c33e9479283e107b4431378271c735d ]\n\nBefore escaping RCU protected section and adding packet into\nprequeue, make sure the dst is refcounted.\n\nReported-by: Mike Galbraith \u003cbitbucket@online.de\u003e\nSigned-off-by: Eric Dumazet \u003cedumazet@google.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "ca4bf7c6970aee586c4b6b642e011e3847ac5f93",
      "tree": "5a09c1404e30b8647502300f19516bc6720df17a",
      "parents": [
        "4087320fd8d0164c4b53fe5f9c26c0d3eaba7d2d"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri Apr 19 15:32:32 2013 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Wed May 01 09:41:16 2013 -0700"
      },
      "message": "net: fix incorrect credentials passing\n\n[ Upstream commit 83f1b4ba917db5dc5a061a44b3403ddb6e783494 ]\n\nCommit 257b5358b32f (\"scm: Capture the full credentials of the scm\nsender\") changed the credentials passing code to pass in the effective\nuid/gid instead of the real uid/gid.\n\nObviously this doesn\u0027t matter most of the time (since normally they are\nthe same), but it results in differences for suid binaries when the wrong\nuid/gid ends up being used.\n\nThis just undoes that (presumably unintentional) part of the commit.\n\nReported-by: Andy Lutomirski \u003cluto@amacapital.net\u003e\nCc: Eric W. Biederman \u003cebiederm@xmission.com\u003e\nCc: Serge E. Hallyn \u003cserge@hallyn.com\u003e\nCc: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\nAcked-by: \"Eric W. Biederman\" \u003cebiederm@xmission.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "1280938465132080915aef414a1f40f62831bab9",
      "tree": "a2055fce3874fea9ddec94d17658e7d3ec18dc66",
      "parents": [
        "05bec9da3978124bde3b40bfa0404760f45aa399"
      ],
      "author": {
        "name": "Hannes Frederic Sowa",
        "email": "hannes@stressinduktion.org",
        "time": "Fri Mar 15 11:32:30 2013 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Thu Mar 28 12:11:54 2013 -0700"
      },
      "message": "inet: limit length of fragment queue hash table bucket lists\n\n[ Upstream commit 5a3da1fe9561828d0ca7eca664b16ec2b9bf0055 ]\n\nThis patch introduces a constant limit of the fragment queue hash\ntable bucket list lengths. Currently the limit 128 is choosen somewhat\narbitrary and just ensures that we can fill up the fragment cache with\nempty packets up to the default ip_frag_high_thresh limits. It should\njust protect from list iteration eating considerable amounts of cpu.\n\nIf we reach the maximum length in one hash bucket a warning is printed.\nThis is implemented on the caller side of inet_frag_find to distinguish\nbetween the different users of inet_fragment.c.\n\nI dropped the out of memory warning in the ipv4 fragment lookup path,\nbecause we already get a warning by the slab allocator.\n\nCc: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nCc: Jesper Dangaard Brouer \u003cjbrouer@redhat.com\u003e\nSigned-off-by: Hannes Frederic Sowa \u003channes@stressinduktion.org\u003e\nAcked-by: Eric Dumazet \u003cedumazet@google.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "6a2d122cdd939e33279baf351c7cbf12c50eaeb5",
      "tree": "d33d3ae99144bd170bd0453016fa85b2eae75ad6",
      "parents": [
        "ca42fad953eab535f12b04cea9622b253faebb0b"
      ],
      "author": {
        "name": "Denis V. Lunev",
        "email": "den@openvz.org",
        "time": "Wed Mar 13 00:24:15 2013 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Thu Mar 28 12:11:53 2013 -0700"
      },
      "message": "ipv4: fix definition of FIB_TABLE_HASHSZ\n\n[ Upstream commit 5b9e12dbf92b441b37136ea71dac59f05f2673a9 ]\n\na long time ago by the commit\n\n  commit 93456b6d7753def8760b423ac6b986eb9d5a4a95\n  Author: Denis V. Lunev \u003cden@openvz.org\u003e\n  Date:   Thu Jan 10 03:23:38 2008 -0800\n\n    [IPV4]: Unify access to the routing tables.\n\nthe defenition of FIB_HASH_TABLE size has obtained wrong dependency:\nit should depend upon CONFIG_IP_MULTIPLE_TABLES (as was in the original\ncode) but it was depended from CONFIG_IP_ROUTE_MULTIPATH\n\nThis patch returns the situation to the original state.\n\nThe problem was spotted by Tingwei Liu.\n\nSigned-off-by: Denis V. Lunev \u003cden@openvz.org\u003e\nCC: Tingwei Liu \u003ctingw.liu@gmail.com\u003e\nCC: Alexey Kuznetsov \u003ckuznet@ms2.inr.ac.ru\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "9226223b3a45ac38ee04044b60f87d87687ef916",
      "tree": "9a2f4bc65d08ea7cfa70a5937e2103b15b397137",
      "parents": [
        "04a6a868f63a4bef996af7a074b24668ef69b4e0"
      ],
      "author": {
        "name": "Sameer Thalappil",
        "email": "sameert@codeaurora.org",
        "time": "Tue Mar 19 14:28:37 2013 -0700"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Wed Mar 27 18:29:45 2013 -0700"
      },
      "message": "nl80211/cfg80211: add VHT MCS support\n\nAdd support for reporting and calculating VHT MCSes.\n\nNote that I\u0027m not completely sure that the bitrate\ncalculations are correct, nor that they can\u0027t be\nsimplified.\n\nChange-Id: Id4c132850a85ff59f0fc16396763ed717689bec0\nSigned-off-by: Johannes Berg \u003cjohannes.berg@intel.com\u003e\nGit-commit: db9c64cf8d9d3fcbc34b09d037f266d1fc9f928c\nGit-repo:\ngit://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git\nSigned-off-by: Sameer Thalappil \u003csameert@codeaurora.org\u003e\n"
    },
    {
      "commit": "10bd072d4527a809f8653e82340ef3b82042c523",
      "tree": "cff653ad782de60221c2bc7c39abdf844b5ef4f0",
      "parents": [
        "b1cfd327a6c94b353841144fe9e1cb25a9aceed1",
        "a62086da23bb2c292377c128d0a67e83ac8d74e7"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Tue Mar 26 21:15:59 2013 -0700"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Tue Mar 26 21:15:58 2013 -0700"
      },
      "message": "Merge \"cfg80211: Extend support for IEEE 802.11r Fast BSS Transition\""
    },
    {
      "commit": "aebe44fbf547abbecb22ba39da552d5de8938b61",
      "tree": "36f4549ca48d4280731df54224c4f7588b502f73",
      "parents": [
        "8c97b5748c9c726e9a57bc6fdefb391612ea2a81",
        "e38d4810daa8543b6fa88d9f9288135eb68aff23"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Wed Mar 20 04:44:49 2013 -0700"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Wed Mar 20 04:44:48 2013 -0700"
      },
      "message": "Merge \"Bluetooth: GAP: Disconnect ACL immediately after Auth failure.\""
    },
    {
      "commit": "a62086da23bb2c292377c128d0a67e83ac8d74e7",
      "tree": "327be178fc8692f02423e70bf3db7799d38ecf4f",
      "parents": [
        "a348a8c3b1f40c9f31a5f9afe3c73197cd549dd9"
      ],
      "author": {
        "name": "Jouni Malinen",
        "email": "jouni@qca.qualcomm.com",
        "time": "Tue Mar 19 14:30:49 2013 +0530"
      },
      "committer": {
        "name": "Sunil Dutt",
        "email": "duttus@codeaurora.org",
        "time": "Tue Mar 19 19:27:49 2013 +0530"
      },
      "message": "cfg80211: Extend support for IEEE 802.11r Fast BSS Transition\n\nAdd NL80211_CMD_UPDATE_FT_IES to support update of FT IEs to the\nWLAN driver and NL80211_CMD_FT_EVENT to send FT events from the\nWLAN driver. This will carry the target AP\u0027s MAC address along\ncfg80211: Extend support for IEEE 802.11r Fast BSS Transition\n\nAdd NL80211_CMD_UPDATE_FT_IES to support update of FT IEs to the\nWLAN driver and NL80211_CMD_FT_EVENT to send FT events from the\nWLAN driver. This will carry the target AP\u0027s MAC address along\nwith the relevant Information Elements. This event is used to\nreport received FT IEs (MDIE, FTIE, RSN IE, TIE, RICIE). These\nchanges allow FT to be supported with drivers that use an internal\nSME instead of user space option (like FT implementation in\nwpa_supplicant with mac80211-based drivers).\n\nSigned-off-by: Jouni Malinen \u003cjouni@qca.qualcomm.com\u003e\nSigned-off-by: Johannes Berg \u003cjohannes.berg@intel.com\u003e\nGit-commit: 355199e02b831fd4f652c34d6c7673d973da1369\nGit-repo: http://git.kernel.org/cgit/linux/kernel/git/linville/\nwireless-testing.git/\nChange-Id: I439155b3d7bf4df9c45087a4deb6ec0cd7577225\nCRs-fixed: 434525\n[duttus@codeaurora.org: backport to 3.4-This commit includes the\nchanges from following commits to compile for jb_2.5.\n5314526b1743e8e8614293db7d86e480b4fe9824 : cfg80211: add channel\nswitch notify event\n98104fdeda63d57631c9f89e90a7b83b58fcee40 : cfg80211: add P2P\nDevice abstraction\nf4e583c8935c6f52f9385ee7cfbea8f65c66a737 : nl/cfg80211: add the\nNL80211_CMD_SET_MCAST_RATE command\ned44a951c72ab409f932b1c15914488308e86da2 : cfg80211/nl80211: Notify\nconnection request failure in AP mode\n77765eaf5cfb6b8dd98ec8b54b411d74ff6095f1 : cfg80211/nl80211: add\nAPI for MAC address ACLs.\n04f39047af2a6df64b763ea5a271db24879d0391 : nl80211/cfg80211: add\nradar detection command/event.\n3713b4e364effef4b170c97d54528b1cdb16aa6b : nl80211: allow splitting\nwiphy information in dumps.\nee2aca343c9aa64d277a75a5df043299dc84cfd9 : cfg80211: add ability\nto override VHT capabilities.\n355199e02b831fd4f652c34d6c7673d973da1369 : cfg80211: Extend\nsupport for IEEE 802.11r Fast BSS Transition.]\nSigned-off-by: Sunil Dutt \u003cduttus@codeaurora.org\u003e\n"
    },
    {
      "commit": "ab8ef91c44e166f31247fb91dbd1fd706ea3a231",
      "tree": "6ea5b097aa73be0d481f0646dec24a6cb34d78a4",
      "parents": [
        "84400dffffca9542a353bdca3dc42b925225e9c0",
        "9f6d091653c80ea56bb2ca9417bac3c4c36c65e7"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Mon Mar 18 07:45:04 2013 -0700"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Mon Mar 18 07:45:04 2013 -0700"
      },
      "message": "Merge \"cfg80211: Pass station (extended) capability info to kernel\""
    },
    {
      "commit": "84400dffffca9542a353bdca3dc42b925225e9c0",
      "tree": "275d144063250784cab72221964a894cdd5daa9e",
      "parents": [
        "5cf988c6bd1c827dc41125117b50262abca77975",
        "5fed1a7a78e57a4e268482c111cbda536d67a050"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Mon Mar 18 07:45:03 2013 -0700"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Mon Mar 18 07:45:03 2013 -0700"
      },
      "message": "Merge \"{nl,cfg}80211: Peer STA VHT caps\""
    },
    {
      "commit": "a4cdefb88167c87bc84f440a9df2051f0ace4725",
      "tree": "42c1c69cfd360e60e37089d139054e61ade8768c",
      "parents": [
        "b09a84341b929fbd5f409de59a2c0d847b15ad2d",
        "1cb41169af9e869ce9722c7f98de557264f80e2b"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Mon Mar 11 15:17:12 2013 -0700"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Mon Mar 11 15:17:11 2013 -0700"
      },
      "message": "Merge \"Fix not able to disconnect from the Host after SMP requests\""
    },
    {
      "commit": "e38d4810daa8543b6fa88d9f9288135eb68aff23",
      "tree": "5bccf0fa2081664664a73f594a2923a3d7af6b1c",
      "parents": [
        "3c19edb69051c42e9c1068c13d7d2acefd2e8a7c"
      ],
      "author": {
        "name": "Mallikarjuna GB",
        "email": "gbmalli@codeaurora.org",
        "time": "Thu Jan 10 23:54:29 2013 +0530"
      },
      "committer": {
        "name": "Sumit Bajpai",
        "email": "sbajpai@codeaurora.org",
        "time": "Mon Mar 04 11:50:01 2013 +0530"
      },
      "message": "Bluetooth: GAP: Disconnect ACL immediately after Auth failure.\n\nThe patch fixes issue of ACL lingering for 2 seconds after\nAuthentication failure. Another Auth request during this\ntime results in improper connection reference and hence\nresulting in ACL to persist forever if remote doesn\u0027t\ndisconnect.\n\nChange-Id: Ief920af97d8f27e93460130dc86113b40dc5f6a5\nSigned-off-by: Mallikarjuna GB \u003cgbmalli@codeaurora.org\u003e\n"
    },
    {
      "commit": "e5a096aa0aeb1fc8ad8b3d6bd70d322a0d65edc4",
      "tree": "d5055028b4ac0b56b49b6d65237038c5c7f46778",
      "parents": [
        "785e5dce256ea5bdf4871af13f9908b74264b515"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "edumazet@google.com",
        "time": "Thu Feb 21 12:18:52 2013 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Thu Feb 28 06:59:06 2013 -0800"
      },
      "message": "ipv6: use a stronger hash for tcp\n\n[ Upstream commit 08dcdbf6a7b9d14c2302c5bd0c5390ddf122f664 ]\n\nIt looks like its possible to open thousands of TCP IPv6\nsessions on a server, all landing in a single slot of TCP hash\ntable. Incoming packets have to lookup sockets in a very\nlong list.\n\nWe should hash all bits from foreign IPv6 addresses, using\na salt and hash mix, not a simple XOR.\n\ninet6_ehashfn() can also separately use the ports, instead\nof xoring them.\n\nReported-by: Neal Cardwell \u003cncardwell@google.com\u003e\nSigned-off-by: Eric Dumazet \u003cedumazet@google.com\u003e\nCc: Yuchung Cheng \u003cycheng@google.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "1e6b5fb5ce92028f6c87864712ed7290446a4c11",
      "tree": "0426fe2c4e1f79732c2957659a0adc6e4476cdcb",
      "parents": [
        "29b3bb0be43fea0a49e5235894e1dcbc0ac299dc"
      ],
      "author": {
        "name": "Ying Xue",
        "email": "ying.xue@windriver.com",
        "time": "Fri Feb 15 22:28:25 2013 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Thu Feb 28 06:59:06 2013 -0800"
      },
      "message": "net: fix a compile error when SOCK_REFCNT_DEBUG is enabled\n\n[ Upstream commit dec34fb0f5b7873de45132a84a3af29e61084a6b ]\n\nWhen SOCK_REFCNT_DEBUG is enabled, below build error is met:\n\nkernel/sysctl_binary.o: In function `sk_refcnt_debug_release\u0027:\ninclude/net/sock.h:1025: multiple definition of `sk_refcnt_debug_release\u0027\nkernel/sysctl.o:include/net/sock.h:1025: first defined here\nkernel/audit.o: In function `sk_refcnt_debug_release\u0027:\ninclude/net/sock.h:1025: multiple definition of `sk_refcnt_debug_release\u0027\nkernel/sysctl.o:include/net/sock.h:1025: first defined here\nmake[1]: *** [kernel/built-in.o] Error 1\nmake: *** [kernel] Error 2\n\nSo we decide to make sk_refcnt_debug_release static to eliminate\nthe error.\n\nSigned-off-by: Ying Xue \u003cying.xue@windriver.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "1cb41169af9e869ce9722c7f98de557264f80e2b",
      "tree": "d2c15131671900546b153305d530caf88419fff1",
      "parents": [
        "8aafe60a93dae84acaa82bf0fd9f63059c32ed43"
      ],
      "author": {
        "name": "Archana Ramachandran",
        "email": "archanar@codeaurora.org",
        "time": "Tue Jan 29 16:20:19 2013 -0800"
      },
      "committer": {
        "name": "Archana Ramachandran",
        "email": "archanar@codeaurora.org",
        "time": "Thu Feb 21 17:37:23 2013 -0800"
      },
      "message": "Fix not able to disconnect from the Host after SMP requests\n\nThe following fixes were added:\n1. While using whitelist API for connection, if SMP requests are received\nbefore the L2CAP channel is correctly setup, queue the SMP requets\nand execute them once the channel state is bounded and connected and\ntherefore maintaining the correct connection reference count.\n2. If the status LE start encryption command is not successful,\nthen call hci_conn put which would decrement the HCI connection\nreference count.\n\nCRs-fixed: 447092\nChange-Id: Ibb11ecf94f28e0b0aff5eacc86d1660e7ec2e25d\nSigned-off-by: Archana Ramachandran \u003carchanar@codeaurora.org\u003e\n"
    },
    {
      "commit": "9f6d091653c80ea56bb2ca9417bac3c4c36c65e7",
      "tree": "a157d2b5870922f10825af528e2a1f00ad4d9471",
      "parents": [
        "5fed1a7a78e57a4e268482c111cbda536d67a050"
      ],
      "author": {
        "name": "Jouni Malinen",
        "email": "jouni@qca.qualcomm.com",
        "time": "Thu Feb 21 13:06:54 2013 +0530"
      },
      "committer": {
        "name": "Sunil Dutt",
        "email": "duttus@codeaurora.org",
        "time": "Thu Feb 21 13:10:04 2013 +0530"
      },
      "message": "cfg80211: Pass station (extended) capability info to kernel\n\nThe information of the peer\u0027s capabilities and extended capabilities are\nrequired for the driver to perform TDLS Peer UAPSD operations and off\nchannel operations. This information of the peer is passed from user space\nusing NL80211_CMD_SET_STATION command. This commit enhances\nthe function nl80211_set_station to pass the capability information of\nthe peer to the driver.\n\nSimilarly, there may be need for capability information for other modes,\nso allow this to be provided with both add_station and change_station.\n\nChange-Id: I1e626512a0f849ae05bbbd24c4e262d303b8f8ea\nCRs-fixed: 452921\n\nSigned-off-by: Jouni Malinen \u003cjouni@qca.qualcomm.com\u003e\nSigned-off-by: Johannes Berg \u003cjohannes.berg@intel.com\u003e\n"
    },
    {
      "commit": "5fed1a7a78e57a4e268482c111cbda536d67a050",
      "tree": "364da6a2c8f2d75d14567c5eb56505d8bfea38a2",
      "parents": [
        "dd29395ed77577c5a69c09c8472f8ea4351c78a4"
      ],
      "author": {
        "name": "Mahesh Palivela",
        "email": "maheshp@posedge.com",
        "time": "Thu Feb 21 08:36:42 2013 +0530"
      },
      "committer": {
        "name": "Sunil Dutt",
        "email": "duttus@codeaurora.org",
        "time": "Thu Feb 21 08:37:31 2013 +0530"
      },
      "message": "{nl,cfg}80211: Peer STA VHT caps\n\nTo save STAs VHT caps in AP mode\n\nChange-Id: I1930ec05a3e079733c00837c93bda615289fceda\nCRs-fixed: 452921\n\nSigned-off-by: Mahesh Palivela \u003cmaheshp@posedge.com\u003e\nSigned-off-by: Johannes Berg \u003cjohannes.berg@intel.com\u003e\n"
    },
    {
      "commit": "3254baddc0c398ccadb2d0e638b9b7e7819c848a",
      "tree": "720f3296415ebd520deb2288e89806d430763799",
      "parents": [
        "8ff19d42a104535a8a67a3fa8df39f72f23b2743"
      ],
      "author": {
        "name": "Mahesh Palivela",
        "email": "maheshp@posedge.com",
        "time": "Thu Feb 21 05:28:31 2013 +0530"
      },
      "committer": {
        "name": "Sunil Dutt",
        "email": "duttus@codeaurora.org",
        "time": "Thu Feb 21 05:31:16 2013 +0530"
      },
      "message": "cfg80211: allow advertising VHT capabilities\n\nAllow drivers to advertise their VHT capabilities\nand export them to userspace via nl80211.\n\nChange-Id: I2d2825a09dfddccca1bd3edacd7fc382d765bea5\nCRs-fixed: 452921\n\nSigned-off-by: Mahesh Palivela \u003cmaheshp@posedge.com\u003e\nSigned-off-by: Johannes Berg \u003cjohannes.berg@intel.com\u003e\n"
    },
    {
      "commit": "2738eeccbc44aaed38fef732ad27060457956310",
      "tree": "84a988325535e2e1d1bc0b7dce0e339e630a2398",
      "parents": [
        "af51b7be27d6c27426c8b068f22b5f15508b28ee"
      ],
      "author": {
        "name": "Bhakthavatsala Raghavendra",
        "email": "braghave@codeaurora.org",
        "time": "Tue Feb 12 19:44:47 2013 +0530"
      },
      "committer": {
        "name": "Bhakthavatsala Raghavendra",
        "email": "braghave@codeaurora.org",
        "time": "Fri Feb 15 14:05:07 2013 +0530"
      },
      "message": "Bluetooth: Introduce new security level\n\nDefine new security level BT_SECURITY_VERY_HIGH\nfor BT-SAP secuirty requirements\n\nChange-Id: Iee1f60def34d64174c71934ecf55319cee087c13\nSigned-off-by: Bhakthavatsala Raghavendra \u003cbraghave@codeaurora.org\u003e\n"
    },
    {
      "commit": "e833acaf2b5cfac0fb53692652a8c39667f1e559",
      "tree": "f530c2ea75a3d7e52045e1f543ced58757895b9d",
      "parents": [
        "7dfc4b284ca395a035e7da058f86dfb4275dd509"
      ],
      "author": {
        "name": "Duy Truong",
        "email": "dtruong@codeaurora.org",
        "time": "Tue Feb 12 13:35:08 2013 -0800"
      },
      "committer": {
        "name": "Duy Truong",
        "email": "dtruong@codeaurora.org",
        "time": "Tue Feb 12 13:35:08 2013 -0800"
      },
      "message": "Update copyright to The Linux Foundation\n\nChange-Id: Ibead64ce2e901dede2ddd1b86088b88f2350ce92\nSigned-off-by: Duy Truong \u003cdtruong@codeaurora.org\u003e\n"
    },
    {
      "commit": "8e71da17f73bf9d856751ecc2038a73c2e363c74",
      "tree": "77768598ac65b7e73efda8ac0de92c31ad69b637",
      "parents": [
        "c5ac78a9d75f4c5c87a289f50a48d6d78a618ca1"
      ],
      "author": {
        "name": "Mallikarjuna GB",
        "email": "gbmalli@codeaurora.org",
        "time": "Wed Nov 21 17:01:05 2012 +0530"
      },
      "committer": {
        "name": "Mallikarjuna GB",
        "email": "gbmalli@codeaurora.org",
        "time": "Mon Feb 04 11:26:48 2013 +0530"
      },
      "message": "Bluetooth: GAP: Read the clock offset on ACL connection complete\n\nKeep the Clock offset valid for one Hour and read it again after\nconnection complete so that we have most recent value. This helps\nfor faster ACL connections.\n\nCRs-fixed: 430132\nChange-Id: I1526878a7365f9cc0c654e0af6c4dd214fac4cd8\nSigned-off-by: Mallikarjuna GB \u003cgbmalli@codeaurora.org\u003e\n"
    },
    {
      "commit": "c5ac78a9d75f4c5c87a289f50a48d6d78a618ca1",
      "tree": "1fe4f2ae85c92166edc1fe62fefa2335e0dd4cd9",
      "parents": [
        "45c9e8141e54a691180c55ed9e242302a74224a8"
      ],
      "author": {
        "name": "Archana Ramachandran",
        "email": "archanar@codeaurora.org",
        "time": "Tue Oct 02 17:55:55 2012 -0700"
      },
      "committer": {
        "name": "Mallikarjuna GB",
        "email": "gbmalli@codeaurora.org",
        "time": "Mon Feb 04 11:25:57 2013 +0530"
      },
      "message": "Bluetooth: Fix for LE cancel Create Connection not working\n\nAdded management method to send LE cancel create connection\nHCI command\n\nCRs-fixed: 366284\nChange-Id: I17a75ecf4ecaa32cab7e3a4cb8beb8cc4b4580c4\nSigned-off-by: Archana Ramachandran \u003carchanar@codeaurora.org\u003e\nSigned-off-by: Mallikarjuna GB \u003cgbmalli@codeaurora.org\u003e\n"
    },
    {
      "commit": "a36ad995c0aa971da8d65425c41f1fd54e25bac5",
      "tree": "369b579e7e33180cb1ab79275772387f6582c6f6",
      "parents": [
        "dc3b5db4258682308237c3c99a4fbf36e89c1495",
        "6d41bdff2b23c40c0e0c9b3a1280ea3428b8a527"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Thu Jan 31 19:56:10 2013 -0800"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Thu Jan 31 19:56:10 2013 -0800"
      },
      "message": "Merge \"Bluetooth: Support for Remote name request cancel command\""
    },
    {
      "commit": "6d41bdff2b23c40c0e0c9b3a1280ea3428b8a527",
      "tree": "050c62dd3a3d43edfb88f5bfc2bdef8b31f05f33",
      "parents": [
        "d96001b302033d137e60e03308e87bbfeb363fca"
      ],
      "author": {
        "name": "Ram Mohan Korukonda",
        "email": "rkorukon@codeaurora.org",
        "time": "Tue Nov 27 16:13:54 2012 +0530"
      },
      "committer": {
        "name": "Mallikarjuna GB",
        "email": "gbmalli@codeaurora.org",
        "time": "Tue Jan 29 19:13:59 2013 +0530"
      },
      "message": "Bluetooth: Support for Remote name request cancel command\n\nAdd support for remote name request cancel command in mgmtops\nplugin.\n\nChange-Id: If8bec8b457461f7bca90af940d2473b810677322\nCRs-fixed: 414884\nSigned-off-by: Ram Mohan Korukonda \u003crkorukon@codeaurora.org\u003e\nSigned-off-by: Mallikarjuna GB \u003cgbmalli@codeaurora.org\u003e\n"
    },
    {
      "commit": "4918bd31c24124843d768061fce0f079db24ecad",
      "tree": "fd06abb6e182ed33350d4c1dcb5e620ff401403f",
      "parents": [
        "d1066785a41c2e8b689d95bf5edaf7684d5e1823"
      ],
      "author": {
        "name": "Jouni Malinen",
        "email": "jouni@qca.qualcomm.com",
        "time": "Tue Jan 15 13:36:11 2013 -0800"
      },
      "committer": {
        "name": "Madan Mohan Koyyalamudi",
        "email": "mkoyya@codeaurora.org",
        "time": "Mon Jan 28 17:34:29 2013 -0800"
      },
      "message": "cfg80211: Add TDLS event to allow drivers to request operations\n\nThe NL80211_CMD_TDLS_OPER command was previously used only for userspace\nrequest for the kernel code to perform TDLS operations. However, there\nare also cases where the driver may need to request operations from\nuserspace, e.g., when using security on the AP path. Add a new cfg80211\nfunction for generating a TDLS operation event for drivers to request a\nnew link to be set up (NL80211_TDLS_SETUP) or an existing link to be\ntorn down (NL80211_TDLS_TEARDOWN). Drivers can optionally use these\nevents, e.g., based on noticing data traffic being sent to a peer\nstation that is seen with good signal strength.\n\nChange-Id: I778f5136fc4518bedcaed14a5412de4be6c85cf3\nSigned-off-by: Jouni Malinen \u003cjouni@qca.qualcomm.com\u003e\nSigned-off-by: Johannes Berg \u003cjohannes.berg@intel.com\u003e\nAcked-by: Ng Chilam \u003cchilamng@qca.qualcomm.com\u003e\n[Madan Mohan Koyyalamudi \u003cmkoyya@codeaurora.org\u003e: move changes from\ninclude/uapi/linux/nl80211.h to include/linux/nl80211.h, remove trace.h,\nremove trace_cfg80211_tdls_oper_request() in nl80211.c ]\nSigned-off-by: Madan Mohan Koyyalamudi \u003cmkoyya@codeaurora.org\u003e\n"
    },
    {
      "commit": "34fb350281ced2a72707a5c0064f69992d440edb",
      "tree": "91f806c64e65601adf09564a83b4c44f4db080be",
      "parents": [
        "c87b45599a4e0d8741abeb85d1d8d5f0c1fb13be"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "edumazet@google.com",
        "time": "Tue Jul 17 10:13:05 2012 +0200"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Fri Jan 11 09:07:14 2013 -0800"
      },
      "message": "tcp: implement RFC 5961 3.2\n\n[ Upstream commit 282f23c6ee343126156dd41218b22ece96d747e3 ]\n\nImplement the RFC 5691 mitigation against Blind\nReset attack using RST bit.\n\nIdea is to validate incoming RST sequence,\nto match RCV.NXT value, instead of previouly accepted\nwindow : (RCV.NXT \u003c\u003d SEG.SEQ \u003c RCV.NXT+RCV.WND)\n\nIf sequence is in window but not an exact match, send\na \"challenge ACK\", so that the other part can resend an\nRST with the appropriate sequence.\n\nAdd a new sysctl, tcp_challenge_ack_limit, to limit\nnumber of challenge ACK sent per second.\n\nAdd a new SNMP counter to count number of challenge acks sent.\n(netstat -s | grep TCPChallengeACK)\n\nSigned-off-by: Eric Dumazet \u003cedumazet@google.com\u003e\nCc: Kiran Kumar Kella \u003ckkiran@broadcom.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "d46699a94ddf2dd4d83e986a759b64981b37fc5b",
      "tree": "c2de686ba7429ce5ac341c97ccdf673374c3f1be",
      "parents": [
        "6eec2413cb320bdd0139ba0db3888d27f746ea2b"
      ],
      "author": {
        "name": "Christoph Paasch",
        "email": "christoph.paasch@uclouvain.be",
        "time": "Fri Dec 14 04:07:58 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Fri Jan 11 09:07:14 2013 -0800"
      },
      "message": "inet: Fix kmemleak in tcp_v4/6_syn_recv_sock and dccp_v4/6_request_recv_sock\n\n[ Upstream commit e337e24d6624e74a558aa69071e112a65f7b5758 ]\n\nIf in either of the above functions inet_csk_route_child_sock() or\n__inet_inherit_port() fails, the newsk will not be freed:\n\nunreferenced object 0xffff88022e8a92c0 (size 1592):\n  comm \"softirq\", pid 0, jiffies 4294946244 (age 726.160s)\n  hex dump (first 32 bytes):\n    0a 01 01 01 0a 01 01 02 00 00 00 00 a7 cc 16 00  ................\n    02 00 03 01 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  backtrace:\n    [\u003cffffffff8153d190\u003e] kmemleak_alloc+0x21/0x3e\n    [\u003cffffffff810ab3e7\u003e] kmem_cache_alloc+0xb5/0xc5\n    [\u003cffffffff8149b65b\u003e] sk_prot_alloc.isra.53+0x2b/0xcd\n    [\u003cffffffff8149b784\u003e] sk_clone_lock+0x16/0x21e\n    [\u003cffffffff814d711a\u003e] inet_csk_clone_lock+0x10/0x7b\n    [\u003cffffffff814ebbc3\u003e] tcp_create_openreq_child+0x21/0x481\n    [\u003cffffffff814e8fa5\u003e] tcp_v4_syn_recv_sock+0x3a/0x23b\n    [\u003cffffffff814ec5ba\u003e] tcp_check_req+0x29f/0x416\n    [\u003cffffffff814e8e10\u003e] tcp_v4_do_rcv+0x161/0x2bc\n    [\u003cffffffff814eb917\u003e] tcp_v4_rcv+0x6c9/0x701\n    [\u003cffffffff814cea9f\u003e] ip_local_deliver_finish+0x70/0xc4\n    [\u003cffffffff814cec20\u003e] ip_local_deliver+0x4e/0x7f\n    [\u003cffffffff814ce9f8\u003e] ip_rcv_finish+0x1fc/0x233\n    [\u003cffffffff814cee68\u003e] ip_rcv+0x217/0x267\n    [\u003cffffffff814a7bbe\u003e] __netif_receive_skb+0x49e/0x553\n    [\u003cffffffff814a7cc3\u003e] netif_receive_skb+0x50/0x82\n\nThis happens, because sk_clone_lock initializes sk_refcnt to 2, and thus\na single sock_put() is not enough to free the memory. Additionally, things\nlike xfrm, memcg, cookie_values,... may have been initialized.\nWe have to free them properly.\n\nThis is fixed by forcing a call to tcp_done(), ending up in\ninet_csk_destroy_sock, doing the final sock_put(). tcp_done() is necessary,\nbecause it ends up doing all the cleanup on xfrm, memcg, cookie_values,\nxfrm,...\n\nBefore calling tcp_done, we have to set the socket to SOCK_DEAD, to\nforce it entering inet_csk_destroy_sock. To avoid the warning in\ninet_csk_destroy_sock, inet_num has to be set to 0.\nAs inet_csk_destroy_sock does a dec on orphan_count, we first have to\nincrease it.\n\nCalling tcp_done() allows us to remove the calls to\ntcp_clear_xmit_timer() and tcp_cleanup_congestion_control().\n\nA similar approach is taken for dccp by calling dccp_done().\n\nThis is in the kernel since 093d282321 (tproxy: fix hash locking issue\nwhen using port redirection in __inet_inherit_port()), thus since\nversion \u003e\u003d 2.6.37.\n\nSigned-off-by: Christoph Paasch \u003cchristoph.paasch@uclouvain.be\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "4435990b6d456a8c5cac203c025d1f10e0b48a93",
      "tree": "69364585dbc2eca1b9d073544416e515417c16f4",
      "parents": [
        "537d86c490a03bcb56dfa24c0327c18e61b1ced5"
      ],
      "author": {
        "name": "Johannes Berg",
        "email": "johannes.berg@intel.com",
        "time": "Fri Oct 26 00:36:40 2012 +0200"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Nov 17 13:16:11 2012 -0800"
      },
      "message": "mac80211: verify that skb data is present\n\ncommit 9b395bc3be1cebf0144a127c7e67d56dbdac0930 upstream.\n\nA number of places in the mesh code don\u0027t check that\nthe frame data is present and in the skb header when\ntrying to access. Add those checks and the necessary\npskb_may_pull() calls. This prevents accessing data\nthat doesn\u0027t actually exist.\n\nTo do this, export ieee80211_get_mesh_hdrlen() to be\nable to use it in mac80211.\n\nSigned-off-by: Johannes Berg \u003cjohannes.berg@intel.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "4c64d2d0be3c839cd94f53209b6e48c50ab44c8d",
      "tree": "3a1e8d4ac767890452490a2060aa873b539ba63e",
      "parents": [
        "4e28773483fa22115f8a0e84729f1260e28fe30c"
      ],
      "author": {
        "name": "Tianyi Gou",
        "email": "tgou@codeaurora.org",
        "time": "Mon Aug 06 17:23:26 2012 -0700"
      },
      "committer": {
        "name": "Sudhir Sharma",
        "email": "sudsha@codeaurora.org",
        "time": "Mon Nov 12 02:25:01 2012 -0800"
      },
      "message": "net: sched: export an api to enable/disable flow on sch\n\nExport a function from sch_api.c that will look up\ndesired qdisc and call it\u0027s registered change function\nto enable/disable flow.\n\nChange-Id: I5b6dc7a6fd2b09b796c92b3770ba83423d19c864\nCRs-Fixed: 355156\nAcked-by: Jimi Shah \u003cjimis@qualcomm.com\u003e\nSigned-off-by: Tianyi Gou \u003ctgou@codeaurora.org\u003e\n(cherry picked from commit b8419fe690053b76658d49565c57ac654faf2eaa)\n(cherry picked from commit 3a30e7aa4487f56a74f12c12f11cece6ce1f2100)\n"
    },
    {
      "commit": "320598f5aa231b6b26e69724ebd6a98179104f6d",
      "tree": "d00301537a8d322604d082fb3c0311a714a217cf",
      "parents": [
        "1e8c073eb44476d16557bd30e902592f77f17400"
      ],
      "author": {
        "name": "Sunny Kapdi",
        "email": "sunnyk@codeaurora.org",
        "time": "Mon Jul 30 14:52:56 2012 -0700"
      },
      "committer": {
        "name": "Sudhir Sharma",
        "email": "sudsha@codeaurora.org",
        "time": "Mon Nov 12 00:09:56 2012 -0800"
      },
      "message": "bluetooth: LE conn whitelist implementation\n\nAdd support to create connection to LE devices using\nwhitelist. With this, the Controller can try to connect\nto multiple devices at the same time. The following\ninterfaces are added.\n1. Add/Remove device from whitelist\n2. Clear all the devices from whitelist\n3. Create Connection to devices from whitelist\n4. Cancel create connection to whitelist devices\n\nCRs-fixed: 388980\nChange-Id: I3900c71255e754f80bb2873ae19a41b94cca76c3\nSigned-off-by: Sunny Kapdi \u003csunnyk@codeaurora.org\u003e\n(cherry picked from commit 93bef895b01b79f49af60ba1394c9c3f6e563212)\n(cherry picked from commit 377ee2bf1fc37bcbeae872661646bdd6a5f8da31)\n"
    },
    {
      "commit": "b2f194ddc27489c5f704c959e08c9a4ff4bf6aa0",
      "tree": "036d29edee2395e5ce5353234f47816463c932d8",
      "parents": [
        "ce73c377e414fca2812e53374ee363120ba2b0fa"
      ],
      "author": {
        "name": "Archana Ramachandran",
        "email": "archanar@codeaurora.org",
        "time": "Tue Aug 14 12:03:01 2012 -0700"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Tue Nov 06 14:27:24 2012 -0800"
      },
      "message": "Bluetooth: Send Disconnection reason to Bluez\n\nSend device disconnection reason to bluez on receiving the\ndiconnection complete event so that low energy profiles\nsuch as proximity can decide to reconnect if the reason\nis link loss.\n\nCRs-Fixed: 378240\nSigned-off-by: Archana Ramachandran \u003carchanar@codeaurora.org\u003e\n(cherry picked from commit da09d26a75ee1c7c1911dcfbe0128fd09f6631f4)\n\nChange-Id: Iab1fede47f44342d87be6c3c5aa7590754fd950c\nSigned-off-by: Sudhir Sharma \u003csudsha@codeaurora.org\u003e\n"
    },
    {
      "commit": "231689b3f454b0e6747928f25b144fae5c62999b",
      "tree": "209d8f42af85c9c1da261285017f8bb099a2a7d9",
      "parents": [
        "df2d84d692a80d43462f3c6d57e484f61860f8ab"
      ],
      "author": {
        "name": "Srinivas Krovvidi",
        "email": "skrovvid@codeaurora.org",
        "time": "Mon Sep 03 18:47:50 2012 +0530"
      },
      "committer": {
        "name": "Sudhir Sharma",
        "email": "sudsha@codeaurora.org",
        "time": "Wed Oct 31 12:14:26 2012 -0700"
      },
      "message": "Bluetooth: Validate hci conn validity before refering wakelock.\n\nFound in a rare case there is possibility that remote device\nsent disconnect on a connection and DUT is trying send data\non the same. In that case accessing some released wakelock\nis causing issue. The current changes are to use locking\nmechanism to validate the connection before acting on the\nwake lock.\n\nCRs-Fixed: 394651\nChange-Id: I6a4188a7d0d05a8cfbe66d3680473d549157917a\nSigned-off-by: Srinivas Krovvidi \u003cskrovvid@codeaurora.org\u003e\n(cherry picked from commit 6aadc41fcbd28dc3899a4b5d098e5f316588a029)\n\nSigned-off-by: Sudhir Sharma \u003csudsha@codeaurora.org\u003e\n"
    },
    {
      "commit": "0b0ea6a363eb3f5802adcb07c8c23e052a10d6bb",
      "tree": "5da08e9b81132440bba37497163a4b23e4366d17",
      "parents": [
        "285ff6c4a762f556275182bcef767b61174c0424"
      ],
      "author": {
        "name": "Lin Ming",
        "email": "mlin@ss.pku.edu.cn",
        "time": "Sat Jul 07 18:26:10 2012 +0800"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 21 09:28:00 2012 -0700"
      },
      "message": "ipvs: fix oops on NAT reply in br_nf context\n\ncommit 9e33ce453f8ac8452649802bee1f410319408f4b upstream.\n\nIPVS should not reset skb-\u003enf_bridge in FORWARD hook\nby calling nf_reset for NAT replies. It triggers oops in\nbr_nf_forward_finish.\n\n[  579.781508] BUG: unable to handle kernel NULL pointer dereference at 0000000000000004\n[  579.781669] IP: [\u003cffffffff817b1ca5\u003e] br_nf_forward_finish+0x58/0x112\n[  579.781792] PGD 218f9067 PUD 0\n[  579.781865] Oops: 0000 [#1] SMP\n[  579.781945] CPU 0\n[  579.781983] Modules linked in:\n[  579.782047]\n[  579.782080]\n[  579.782114] Pid: 4644, comm: qemu Tainted: G        W    3.5.0-rc5-00006-g95e69f9 #282 Hewlett-Packard  /30E8\n[  579.782300] RIP: 0010:[\u003cffffffff817b1ca5\u003e]  [\u003cffffffff817b1ca5\u003e] br_nf_forward_finish+0x58/0x112\n[  579.782455] RSP: 0018:ffff88007b003a98  EFLAGS: 00010287\n[  579.782541] RAX: 0000000000000008 RBX: ffff8800762ead00 RCX: 000000000001670a\n[  579.782653] RDX: 0000000000000000 RSI: 000000000000000a RDI: ffff8800762ead00\n[  579.782845] RBP: ffff88007b003ac8 R08: 0000000000016630 R09: ffff88007b003a90\n[  579.782957] R10: ffff88007b0038e8 R11: ffff88002da37540 R12: ffff88002da01a02\n[  579.783066] R13: ffff88002da01a80 R14: ffff88002d83c000 R15: ffff88002d82a000\n[  579.783177] FS:  0000000000000000(0000) GS:ffff88007b000000(0063) knlGS:00000000f62d1b70\n[  579.783306] CS:  0010 DS: 002b ES: 002b CR0: 000000008005003b\n[  579.783395] CR2: 0000000000000004 CR3: 00000000218fe000 CR4: 00000000000027f0\n[  579.783505] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[  579.783684] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400\n[  579.783795] Process qemu (pid: 4644, threadinfo ffff880021b20000, task ffff880021aba760)\n[  579.783919] Stack:\n[  579.783959]  ffff88007693cedc ffff8800762ead00 ffff88002da01a02 ffff8800762ead00\n[  579.784110]  ffff88002da01a02 ffff88002da01a80 ffff88007b003b18 ffffffff817b26c7\n[  579.784260]  ffff880080000000 ffffffff81ef59f0 ffff8800762ead00 ffffffff81ef58b0\n[  579.784477] Call Trace:\n[  579.784523]  \u003cIRQ\u003e\n[  579.784562]\n[  579.784603]  [\u003cffffffff817b26c7\u003e] br_nf_forward_ip+0x275/0x2c8\n[  579.784707]  [\u003cffffffff81704b58\u003e] nf_iterate+0x47/0x7d\n[  579.784797]  [\u003cffffffff817ac32e\u003e] ? br_dev_queue_push_xmit+0xae/0xae\n[  579.784906]  [\u003cffffffff81704bfb\u003e] nf_hook_slow+0x6d/0x102\n[  579.784995]  [\u003cffffffff817ac32e\u003e] ? br_dev_queue_push_xmit+0xae/0xae\n[  579.785175]  [\u003cffffffff8187fa95\u003e] ? _raw_write_unlock_bh+0x19/0x1b\n[  579.785179]  [\u003cffffffff817ac417\u003e] __br_forward+0x97/0xa2\n[  579.785179]  [\u003cffffffff817ad366\u003e] br_handle_frame_finish+0x1a6/0x257\n[  579.785179]  [\u003cffffffff817b2386\u003e] br_nf_pre_routing_finish+0x26d/0x2cb\n[  579.785179]  [\u003cffffffff817b2cf0\u003e] br_nf_pre_routing+0x55d/0x5c1\n[  579.785179]  [\u003cffffffff81704b58\u003e] nf_iterate+0x47/0x7d\n[  579.785179]  [\u003cffffffff817ad1c0\u003e] ? br_handle_local_finish+0x44/0x44\n[  579.785179]  [\u003cffffffff81704bfb\u003e] nf_hook_slow+0x6d/0x102\n[  579.785179]  [\u003cffffffff817ad1c0\u003e] ? br_handle_local_finish+0x44/0x44\n[  579.785179]  [\u003cffffffff81551525\u003e] ? sky2_poll+0xb35/0xb54\n[  579.785179]  [\u003cffffffff817ad62a\u003e] br_handle_frame+0x213/0x229\n[  579.785179]  [\u003cffffffff817ad417\u003e] ? br_handle_frame_finish+0x257/0x257\n[  579.785179]  [\u003cffffffff816e3b47\u003e] __netif_receive_skb+0x2b4/0x3f1\n[  579.785179]  [\u003cffffffff816e69fc\u003e] process_backlog+0x99/0x1e2\n[  579.785179]  [\u003cffffffff816e6800\u003e] net_rx_action+0xdf/0x242\n[  579.785179]  [\u003cffffffff8107e8a8\u003e] __do_softirq+0xc1/0x1e0\n[  579.785179]  [\u003cffffffff8135a5ba\u003e] ? trace_hardirqs_off_thunk+0x3a/0x6c\n[  579.785179]  [\u003cffffffff8188812c\u003e] call_softirq+0x1c/0x30\n\nThe steps to reproduce as follow,\n\n1. On Host1, setup brige br0(192.168.1.106)\n2. Boot a kvm guest(192.168.1.105) on Host1 and start httpd\n3. Start IPVS service on Host1\n   ipvsadm -A -t 192.168.1.106:80 -s rr\n   ipvsadm -a -t 192.168.1.106:80 -r 192.168.1.105:80 -m\n4. Run apache benchmark on Host2(192.168.1.101)\n   ab -n 1000 http://192.168.1.106/\n\nip_vs_reply4\n  ip_vs_out\n    handle_response\n      ip_vs_notrack\n        nf_reset()\n        {\n          skb-\u003enf_bridge \u003d NULL;\n        }\n\nActually, IPVS wants in this case just to replace nfct\nwith untracked version. So replace the nf_reset(skb) call\nin ip_vs_notrack() with a nf_conntrack_put(skb-\u003enfct) call.\n\nSigned-off-by: Lin Ming \u003cmlin@ss.pku.edu.cn\u003e\nSigned-off-by: Julian Anastasov \u003cja@ssi.bg\u003e\nSigned-off-by: Simon Horman \u003chorms@verge.net.au\u003e\nSigned-off-by: Pablo Neira Ayuso \u003cpablo@netfilter.org\u003e\nAcked-by: David Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    }
  ],
  "next": "7fcbcdc96302e9d3e3b36df4fbc86a4c82761092"
}
