)]}'
{
  "log": [
    {
      "commit": "d8f46ff11081f03b09efe82245a3257bab6bf60e",
      "tree": "fe47a5fe5ef62920ee3e1ffe5a2fd7a29918c6b0",
      "parents": [
        "405cc2736527bd506fd8f652308b03b2c8a1e8b9",
        "b015dbc0f95eef34819515bd403a62569bca23df"
      ],
      "author": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed Jan 04 11:37:30 2012 -0500"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed Jan 04 11:37:30 2012 -0500"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless into for-davem\n"
    },
    {
      "commit": "f9dc73e541348288b530c62c21d0fb8fdc7bbd0f",
      "tree": "caf6201912169f847c0a2b6ab85c4ac1ca65f0dd",
      "parents": [
        "96f1f05af76b601ab21a7dc603ae0a1cea4efc3d",
        "cad44c2bf6165e46e309d4db0ffd286a9259aa2a"
      ],
      "author": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Jan 03 14:26:56 2012 -0500"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Jan 03 14:26:56 2012 -0500"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/padovan/bluetooth\n"
    },
    {
      "commit": "6bafcac3238758203703bdd4abe9c1f38d259584",
      "tree": "b5413ecd31f0fa3229b04bd415c870041fe30d95",
      "parents": [
        "115e8e705e4be071b9e06ff72578e3b603f2ba65"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Mon Jan 02 05:47:57 2012 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jan 03 12:58:23 2012 -0500"
      },
      "message": "sch_qfq: fix overflow in qfq_update_start()\n\ngrp-\u003eslot_shift is between 22 and 41, so using 32bit wide variables is\nprobably a typo.\n\nThis could explain QFQ hangs Dave reported to me, after 2^23 packets ?\n\n(23 \u003d 64 - 41)\n\nReported-by: Dave Taht \u003cdave.taht@gmail.com\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nCC: Stephen Hemminger \u003cshemminger@vyatta.com\u003e\nCC: Dave Taht \u003cdave.taht@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c121638277a71c1e1fb44c3e654ea353357bbc2c",
      "tree": "eacfd2881aa785c462587ab8173461b96c396771",
      "parents": [
        "52793dbe3d60bd73bbebe28b2bfc9f6b4b920d4c"
      ],
      "author": {
        "name": "Xi Wang",
        "email": "xi.wang@gmail.com",
        "time": "Fri Dec 30 10:40:17 2011 -0500"
      },
      "committer": {
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org",
        "time": "Sat Dec 31 16:59:04 2011 +0100"
      },
      "message": "netfilter: ctnetlink: fix timeout calculation\n\nThe sanity check (timeout \u003c 0) never works; the dividend is unsigned\nand so is the division, which should have been a signed division.\n\n\tlong timeout \u003d (ct-\u003etimeout.expires - jiffies) / HZ;\n\tif (timeout \u003c 0)\n\t\ttimeout \u003d 0;\n\nThis patch converts the time values to signed for the division.\n\nSigned-off-by: Xi Wang \u003cxi.wang@gmail.com\u003e\nSigned-off-by: Pablo Neira Ayuso \u003cpablo@netfilter.org\u003e\n"
    },
    {
      "commit": "52793dbe3d60bd73bbebe28b2bfc9f6b4b920d4c",
      "tree": "845ae88e96de3b28884bab1e868e00ba4687fd02",
      "parents": [
        "fe3c8cc9226c7487c053edad9229dc85e93534d7"
      ],
      "author": {
        "name": "Julian Anastasov",
        "email": "ja@ssi.bg",
        "time": "Fri Dec 30 14:19:02 2011 +0900"
      },
      "committer": {
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org",
        "time": "Sat Dec 31 16:06:29 2011 +0100"
      },
      "message": "ipvs: try also real server with port 0 in backup server\n\n\tWe should not forget to try for real server with port 0\nin the backup server when processing the sync message. We should\ndo it in all cases because the backup server can use different\nforwarding method.\n\nSigned-off-by: Julian Anastasov \u003cja@ssi.bg\u003e\nSigned-off-by: Simon Horman \u003chorms@verge.net.au\u003e\nSigned-off-by: Pablo Neira Ayuso \u003cpablo@netfilter.org\u003e\n"
    },
    {
      "commit": "aef950b4ba3196622a5bd5e21ab1d63f30658285",
      "tree": "f4cb91f4517a041ef95c28ad50039b0b2ae6b137",
      "parents": [
        "c43c5f39584c0f388a7e5372312c2c48221a4415"
      ],
      "author": {
        "name": "Wei Yongjun",
        "email": "yongjun_wei@trendmicro.com.cn",
        "time": "Tue Dec 27 22:32:41 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Dec 27 22:32:41 2011 -0500"
      },
      "message": "packet: fix possible dev refcnt leak when bind fail\n\nIf bind is fail when bind is called after set PACKET_FANOUT\nsock option, the dev refcnt will leak.\n\nSigned-off-by: Wei Yongjun \u003cyongjun_wei@trendmicro.com.cn\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c43c5f39584c0f388a7e5372312c2c48221a4415",
      "tree": "1b3fcf8f3c8503df0ac0879bd268bf232bd00a0d",
      "parents": [
        "bb52c7acf871537a468433775151339f783d2e8c",
        "1a31a4a8388a90e9240fb4e5e5c9c909fcfdfd0e"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Dec 24 16:10:26 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Dec 24 16:10:26 2011 -0500"
      },
      "message": "Merge branch \u0027nf\u0027 of git://1984.lsi.us.es/net\n"
    },
    {
      "commit": "bb52c7acf871537a468433775151339f783d2e8c",
      "tree": "d31943c70571f28ff241234a2bffa765a1d4ef92",
      "parents": [
        "5f0a6e2d503896062f641639dacfe5055c2f593b"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Fri Dec 23 19:28:51 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Dec 24 16:08:50 2011 -0500"
      },
      "message": "netem: dont call vfree() under spinlock and BH disabled\n\ncommit 6373a9a286 (netem: use vmalloc for distribution table) added a\nregression, since vfree() is called while holding a spinlock and BH\nbeing disabled.\n\nFix this by doing the pointers swap in critical section, and freeing\nafter spinlock release.\n\nAlso add __GFP_NOWARN to the kmalloc() try, since we fallback to\nvmalloc().\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nAcked-by: Stephen Hemminger \u003cshemminger@vyatta.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1a31a4a8388a90e9240fb4e5e5c9c909fcfdfd0e",
      "tree": "bff2c3e3e1da9274bd5d33e36e8fd9479f21ba72",
      "parents": [
        "81378f728fe560e175fb2e8fd33206793567e896"
      ],
      "author": {
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org",
        "time": "Sat Dec 24 19:28:47 2011 +0100"
      },
      "committer": {
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org",
        "time": "Sat Dec 24 19:49:04 2011 +0100"
      },
      "message": "netfilter: ctnetlink: fix scheduling while atomic if helper is autoloaded\n\nThis patch fixes one scheduling while atomic error:\n\n[  385.565186] ctnetlink v0.93: registering with nfnetlink.\n[  385.565349] BUG: scheduling while atomic: lt-expect_creat/16163/0x00000200\n\nIt can be triggered with utils/expect_create included in\nlibnetfilter_conntrack if the FTP helper is not loaded.\n\nSigned-off-by: Pablo Neira Ayuso \u003cpablo@netfilter.org\u003e\n"
    },
    {
      "commit": "81378f728fe560e175fb2e8fd33206793567e896",
      "tree": "9b64245afa92a9790c9df00067250ed625c5156e",
      "parents": [
        "3f1e6d3fd37bd4f25e5b19f1c7ca21850426c33f"
      ],
      "author": {
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org",
        "time": "Sat Dec 24 19:03:46 2011 +0100"
      },
      "committer": {
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org",
        "time": "Sat Dec 24 19:49:04 2011 +0100"
      },
      "message": "netfilter: ctnetlink: fix return value of ctnetlink_get_expect()\n\nThis fixes one bogus error that is returned to user-space:\n\nlibnetfilter_conntrack/utils# ./expect_get\nTEST: get expectation (-1)(Unknown error 18446744073709551504)\n\nThis patch includes the correct handling for EAGAIN (nfnetlink\nuses this error value to restart the operation after module\nauto-loading).\n\nSigned-off-by: Pablo Neira Ayuso \u003cpablo@netfilter.org\u003e\n"
    },
    {
      "commit": "cad44c2bf6165e46e309d4db0ffd286a9259aa2a",
      "tree": "6a3ce49dcf21a25526e23f5f965fc85dc01ab494",
      "parents": [
        "d7660918fce210f421cc58c060ca3de71e4ffd37"
      ],
      "author": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Fri Dec 23 18:59:13 2011 -0200"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Fri Dec 23 19:00:02 2011 -0200"
      },
      "message": "Revert \"Bluetooth: Increase HCI reset timeout in hci_dev_do_close\"\n\nThis reverts commit e1b6eb3ccb0c2a34302a9fd87dd15d7b86337f23.\n\nThis was causing a delay of 10 seconds in the resume process of a Thinkpad\nlaptop. I\u0027m afraid this could affect more devices once 3.2 is released.\n\nReported-by: Tomáš Janoušek \u003ctomi@nomi.cz\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "6350323ad8def2ac00d77cdee3b79c9b9fba75c4",
      "tree": "299b12c2335e9bf59b3e35c0eb098c1734ba92e1",
      "parents": [
        "0fd7bac6b6157eed6cf0cb86a1e88ba29e57c033",
        "0354b48f633ae435acbc01b470a1ce8cfeff3e9f"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Dec 23 14:29:20 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Dec 23 14:29:20 2011 -0500"
      },
      "message": "Merge branch \u0027nf\u0027 of git://1984.lsi.us.es/net\n"
    },
    {
      "commit": "0354b48f633ae435acbc01b470a1ce8cfeff3e9f",
      "tree": "48a2b84c4298194cd51a55b89b7c9cb2714c0840",
      "parents": [
        "3f1e6d3fd37bd4f25e5b19f1c7ca21850426c33f"
      ],
      "author": {
        "name": "Florian Westphal",
        "email": "fw@strlen.de",
        "time": "Fri Dec 16 18:35:15 2011 +0100"
      },
      "committer": {
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org",
        "time": "Fri Dec 23 14:50:19 2011 +0100"
      },
      "message": "netfilter: xt_connbytes: handle negation correctly\n\n\"! --connbytes 23:42\" should match if the packet/byte count is not in range.\n\nAs there is no explict \"invert match\" toggle in the match structure,\nuserspace swaps the from and to arguments\n(i.e., as if \"--connbytes 42:23\" were given).\n\nHowever, \"what \u003c\u003d 23 \u0026\u0026 what \u003e\u003d 42\" will always be false.\n\nChange things so we use \"||\" in case \"from\" is larger than \"to\".\n\nThis change may look like it breaks backwards compatibility when \"to\" is 0.\nHowever, older iptables binaries will refuse \"connbytes 42:0\",\nand current releases treat it to mean \"! --connbytes 0:42\",\nso we should be fine.\n\nSigned-off-by: Florian Westphal \u003cfw@strlen.de\u003e\nSigned-off-by: Pablo Neira Ayuso \u003cpablo@netfilter.org\u003e\n"
    },
    {
      "commit": "0fd7bac6b6157eed6cf0cb86a1e88ba29e57c033",
      "tree": "bcc24e9c63587bc1e8e15ad60654de9c6f72883e",
      "parents": [
        "a0a129f8b6cff54ab479324a54aefdab5db4f240"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Wed Dec 21 07:11:44 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Dec 23 02:15:14 2011 -0500"
      },
      "message": "net: relax rcvbuf limits\n\nskb-\u003etruesize might be big even for a small packet.\n\nIts even bigger after commit 87fb4b7b533 (net: more accurate skb\ntruesize) and big MTU.\n\nWe should allow queueing at least one packet per receiver, even with a\nlow RCVBUF setting.\n\nReported-by: Michal Simek \u003cmonstr@monstr.eu\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a0a129f8b6cff54ab479324a54aefdab5db4f240",
      "tree": "d3e74b3a59e0fd9c1173852d200eb8491918a3ff",
      "parents": [
        "e688a604807647c9450f9c12a7cb6d027150a895"
      ],
      "author": {
        "name": "Xi Wang",
        "email": "xi.wang@gmail.com",
        "time": "Thu Dec 22 13:35:22 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Dec 22 22:34:56 2011 -0500"
      },
      "message": "rps: fix insufficient bounds checking in store_rps_dev_flow_table_cnt()\n\nSetting a large rps_flow_cnt like (1 \u003c\u003c 30) on 32-bit platform will\ncause a kernel oops due to insufficient bounds checking.\n\n\tif (count \u003e 1\u003c\u003c30) {\n\t\t/* Enforce a limit to prevent overflow */\n\t\treturn -EINVAL;\n\t}\n\tcount \u003d roundup_pow_of_two(count);\n\ttable \u003d vmalloc(RPS_DEV_FLOW_TABLE_SIZE(count));\n\nNote that the macro RPS_DEV_FLOW_TABLE_SIZE(count) is defined as:\n\n\t... + (count * sizeof(struct rps_dev_flow))\n\nwhere sizeof(struct rps_dev_flow) is 8.  (1 \u003c\u003c 30) * 8 will overflow\n32 bits.\n\nThis patch replaces the magic number (1 \u003c\u003c 30) with a symbolic bound.\n\nSuggested-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: Xi Wang \u003cxi.wang@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e688a604807647c9450f9c12a7cb6d027150a895",
      "tree": "6b3df826b4a42affdfc9d58d74f5e17c063cc7d6",
      "parents": [
        "7838f2ce36b6ab5c13ef20b1857e3bbd567f1759"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Thu Dec 22 04:15:53 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Dec 22 22:34:56 2011 -0500"
      },
      "message": "net: introduce DST_NOPEER dst flag\n\nChris Boot reported crashes occurring in ipv6_select_ident().\n\n[  461.457562] RIP: 0010:[\u003cffffffff812dde61\u003e]  [\u003cffffffff812dde61\u003e]\nipv6_select_ident+0x31/0xa7\n\n[  461.578229] Call Trace:\n[  461.580742] \u003cIRQ\u003e\n[  461.582870]  [\u003cffffffff812efa7f\u003e] ? udp6_ufo_fragment+0x124/0x1a2\n[  461.589054]  [\u003cffffffff812dbfe0\u003e] ? ipv6_gso_segment+0xc0/0x155\n[  461.595140]  [\u003cffffffff812700c6\u003e] ? skb_gso_segment+0x208/0x28b\n[  461.601198]  [\u003cffffffffa03f236b\u003e] ? ipv6_confirm+0x146/0x15e\n[nf_conntrack_ipv6]\n[  461.608786]  [\u003cffffffff81291c4d\u003e] ? nf_iterate+0x41/0x77\n[  461.614227]  [\u003cffffffff81271d64\u003e] ? dev_hard_start_xmit+0x357/0x543\n[  461.620659]  [\u003cffffffff81291cf6\u003e] ? nf_hook_slow+0x73/0x111\n[  461.626440]  [\u003cffffffffa0379745\u003e] ? br_parse_ip_options+0x19a/0x19a\n[bridge]\n[  461.633581]  [\u003cffffffff812722ff\u003e] ? dev_queue_xmit+0x3af/0x459\n[  461.639577]  [\u003cffffffffa03747d2\u003e] ? br_dev_queue_push_xmit+0x72/0x76\n[bridge]\n[  461.646887]  [\u003cffffffffa03791e3\u003e] ? br_nf_post_routing+0x17d/0x18f\n[bridge]\n[  461.653997]  [\u003cffffffff81291c4d\u003e] ? nf_iterate+0x41/0x77\n[  461.659473]  [\u003cffffffffa0374760\u003e] ? br_flood+0xfa/0xfa [bridge]\n[  461.665485]  [\u003cffffffff81291cf6\u003e] ? nf_hook_slow+0x73/0x111\n[  461.671234]  [\u003cffffffffa0374760\u003e] ? br_flood+0xfa/0xfa [bridge]\n[  461.677299]  [\u003cffffffffa0379215\u003e] ?\nnf_bridge_update_protocol+0x20/0x20 [bridge]\n[  461.684891]  [\u003cffffffffa03bb0e5\u003e] ? nf_ct_zone+0xa/0x17 [nf_conntrack]\n[  461.691520]  [\u003cffffffffa0374760\u003e] ? br_flood+0xfa/0xfa [bridge]\n[  461.697572]  [\u003cffffffffa0374812\u003e] ? NF_HOOK.constprop.8+0x3c/0x56\n[bridge]\n[  461.704616]  [\u003cffffffffa0379031\u003e] ?\nnf_bridge_push_encap_header+0x1c/0x26 [bridge]\n[  461.712329]  [\u003cffffffffa037929f\u003e] ? br_nf_forward_finish+0x8a/0x95\n[bridge]\n[  461.719490]  [\u003cffffffffa037900a\u003e] ?\nnf_bridge_pull_encap_header+0x1c/0x27 [bridge]\n[  461.727223]  [\u003cffffffffa0379974\u003e] ? br_nf_forward_ip+0x1c0/0x1d4 [bridge]\n[  461.734292]  [\u003cffffffff81291c4d\u003e] ? nf_iterate+0x41/0x77\n[  461.739758]  [\u003cffffffffa03748cc\u003e] ? __br_deliver+0xa0/0xa0 [bridge]\n[  461.746203]  [\u003cffffffff81291cf6\u003e] ? nf_hook_slow+0x73/0x111\n[  461.751950]  [\u003cffffffffa03748cc\u003e] ? __br_deliver+0xa0/0xa0 [bridge]\n[  461.758378]  [\u003cffffffffa037533a\u003e] ? NF_HOOK.constprop.4+0x56/0x56\n[bridge]\n\nThis is caused by bridge netfilter special dst_entry (fake_rtable), a\nspecial shared entry, where attaching an inetpeer makes no sense.\n\nProblem is present since commit 87c48fa3b46 (ipv6: make fragment\nidentifications less predictable)\n\nIntroduce DST_NOPEER dst flag and make sure ipv6_select_ident() and\n__ip_select_ident() fallback to the \u0027no peer attached\u0027 handling.\n\nReported-by: Chris Boot \u003cbootc@bootc.net\u003e\nTested-by: Chris Boot \u003cbootc@bootc.net\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7838f2ce36b6ab5c13ef20b1857e3bbd567f1759",
      "tree": "4a84e53445817547adb299b25c54e613f76a8980",
      "parents": [
        "a13861a28b90541aa207532d237e7a940f1b1c7b"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@redhat.com",
        "time": "Thu Dec 22 02:05:07 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Dec 22 22:34:56 2011 -0500"
      },
      "message": "mqprio: Avoid panic if no options are provided\n\nUserspace may not provide TCA_OPTIONS, in fact tc currently does\nso not do so if no arguments are specified on the command line.\nReturn EINVAL instead of panicing.\n\nSigned-off-by: Thomas Graf \u003ctgraf@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a13861a28b90541aa207532d237e7a940f1b1c7b",
      "tree": "5e7b03bdd6774897662dfc4e7a4bff09324fd306",
      "parents": [
        "b3b1b70e62a603f473619dbebc3b3d23f535e6f8"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Wed Dec 21 20:00:32 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Dec 22 22:34:56 2011 -0500"
      },
      "message": "bridge: provide a mtu() method for fake_dst_ops\n\nCommit 618f9bc74a039da76 (net: Move mtu handling down to the protocol\ndepended handlers) forgot the bridge netfilter case, adding a NULL\ndereference in ip_fragment().\n\nReported-by: Chris Boot \u003cbootc@bootc.net\u003e\nCC: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nAcked-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b9eda06f80b0db61a73bd87c6b0eb67d8aca55ad",
      "tree": "9b5efa31d7a551dd86f4a338b9fba618ac83826c",
      "parents": [
        "ecefc36b41ac0fe92d76273a23faf27b2da13411"
      ],
      "author": {
        "name": "Stephen Rothwell",
        "email": "sfr@canb.auug.org.au",
        "time": "Thu Dec 22 17:03:29 2011 +1100"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Dec 22 09:16:09 2011 -0800"
      },
      "message": "ipv4: using prefetch requires including prefetch.h\n\nSigned-off-by: Stephen Rothwell \u003csfr@canb.auug.org.au\u003e\nAcked-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nAcked-by: David Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\n"
    },
    {
      "commit": "ecefc36b41ac0fe92d76273a23faf27b2da13411",
      "tree": "d006141ac8aec23f551b33e405e8759bffa39d73",
      "parents": [
        "d5ed5e48f4a6333cde05c5235b88a8a94e72afe8",
        "c0ed1c14a72ca9ebacd51fb94a8aca488b0d361e"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Dec 21 18:29:26 2011 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Dec 21 18:29:26 2011 -0800"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net:\n  net: Add a flow_cache_flush_deferred function\n  ipv4: reintroduce route cache garbage collector\n  net: have ipconfig not wait if no dev is available\n  sctp: Do not account for sizeof(struct sk_buff) in estimated rwnd\n  asix: new device id\n  davinci-cpdma: fix locking issue in cpdma_chan_stop\n  sctp: fix incorrect overflow check on autoclose\n  r8169: fix Config2 MSIEnable bit setting.\n  llc: llc_cmsg_rcv was getting called after sk_eat_skb.\n  net: bpf_jit: fix an off-one bug in x86_64 cond jump target\n  iwlwifi: update SCD BC table for all SCD queues\n  Revert \"Bluetooth: Revert: Fix L2CAP connection establishment\"\n  Bluetooth: Clear RFCOMM session timer when disconnecting last channel\n  Bluetooth: Prevent uninitialized data access in L2CAP configuration\n  iwlwifi: allow to switch to HT40 if not associated\n  iwlwifi: tx_sync only on PAN context\n  mwifiex: avoid double list_del in command cancel path\n  ath9k: fix max phy rate at rate control init\n  nfc: signedness bug in __nci_request()\n  iwlwifi: do not set the sequence control bit is not needed\n"
    },
    {
      "commit": "c0ed1c14a72ca9ebacd51fb94a8aca488b0d361e",
      "tree": "e689f7fd62e7633b9b254f9a456b65a1150c6e23",
      "parents": [
        "9f28a2fc0bd77511f649c0a788c7bf9a5fd04edb"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Wed Dec 21 16:48:08 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Dec 21 16:48:08 2011 -0500"
      },
      "message": "net: Add a flow_cache_flush_deferred function\n\nflow_cach_flush() might sleep but can be called from\natomic context via the xfrm garbage collector. So add\na flow_cache_flush_deferred() function and use this if\nthe xfrm garbage colector is invoked from within the\npacket path.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nAcked-by: Timo Teräs \u003ctimo.teras@iki.fi\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9f28a2fc0bd77511f649c0a788c7bf9a5fd04edb",
      "tree": "ea154ab2f82d422b1d6ed835c89acdb16b47d4f7",
      "parents": [
        "b4949b84567f3ae1227d076fc95bbd8efea06506"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Wed Dec 21 15:47:16 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Dec 21 15:47:16 2011 -0500"
      },
      "message": "ipv4: reintroduce route cache garbage collector\n\nCommit 2c8cec5c10b (ipv4: Cache learned PMTU information in inetpeer)\nremoved IP route cache garbage collector a bit too soon, as this gc was\nresponsible for expired routes cleanup, releasing their neighbour\nreference.\n\nAs pointed out by Robert Gladewitz, recent kernels can fill and exhaust\ntheir neighbour cache.\n\nReintroduce the garbage collection, since we\u0027ll have to wait our\nneighbour lookups become refcount-less to not depend on this stuff.\n\nReported-by: Robert Gladewitz \u003cgladewitz@gmx.de\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b4949b84567f3ae1227d076fc95bbd8efea06506",
      "tree": "0363dabf1e46f17c755aecbd09fc9f0cd30fd6cb",
      "parents": [
        "cd7816d14953c8af910af5bb92f488b0b277e29d",
        "96f1f05af76b601ab21a7dc603ae0a1cea4efc3d"
      ],
      "author": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed Dec 21 13:18:22 2011 -0500"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed Dec 21 13:18:22 2011 -0500"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless into for-davem\n"
    },
    {
      "commit": "822a5d313197c059924d394e6851be3cb312caa7",
      "tree": "7f93e12fc7f204f3ef6856e4912f2c5d0856ffdd",
      "parents": [
        "929e8d4a888cd15df486e5964c8e2021581a8a0f",
        "6c52961743f38747401b47127b82159ab6d8a7a4"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Dec 20 11:31:56 2011 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Dec 20 11:31:56 2011 -0800"
      },
      "message": "Merge branch \u0027bugfixes\u0027 of git://git.linux-nfs.org/projects/trondmy/linux-nfs\n\n* \u0027bugfixes\u0027 of git://git.linux-nfs.org/projects/trondmy/linux-nfs:\n  NFS: Fix a regression in nfs_file_llseek()\n  NFSv4: Do not accept delegated opens when a delegation recall is in effect\n  NFSv4: Ensure correct locking when accessing the \u0027lock_states\u0027 list\n  NFSv4.1: Ensure that we handle _all_ SEQUENCE status bits.\n  NFSv4: Don\u0027t error if we handled it in nfs4_recovery_handle_error\n  SUNRPC: Ensure we always bump the backlog queue in xprt_free_slot\n  SUNRPC: Fix the execution time statistics in the face of RPC restarts\n"
    },
    {
      "commit": "cd7816d14953c8af910af5bb92f488b0b277e29d",
      "tree": "39cdc61bbdd4110403a050f64b91ce2a64589180",
      "parents": [
        "a76c0adf60f6ca5ff3481992e4ea0383776b24d2"
      ],
      "author": {
        "name": "Gerlando Falauto",
        "email": "gerlando.falauto@keymile.com",
        "time": "Mon Dec 19 22:58:04 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Dec 20 14:09:15 2011 -0500"
      },
      "message": "net: have ipconfig not wait if no dev is available\n\nprevious commit 3fb72f1e6e6165c5f495e8dc11c5bbd14c73385c\nmakes IP-Config wait for carrier on at least one network device.\n\nBefore waiting (predefined value 120s), check that at least one device\nwas successfully brought up. Otherwise (e.g. buggy bootloader\nwhich does not set the MAC address) there is no point in waiting\nfor carrier.\n\nCc: Micha Nelissen \u003cmicha@neli.hopto.org\u003e\nCc: Holger Brunck \u003cholger.brunck@keymile.com\u003e\nSigned-off-by: Gerlando Falauto \u003cgerlando.falauto@keymile.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a76c0adf60f6ca5ff3481992e4ea0383776b24d2",
      "tree": "97d0fa429a11bf6a975778728e10fd44bbfad80f",
      "parents": [
        "e8303a3b2196272c3eb994d0fd1a189a958a2bdd"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@redhat.com",
        "time": "Mon Dec 19 04:11:40 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Dec 20 13:58:37 2011 -0500"
      },
      "message": "sctp: Do not account for sizeof(struct sk_buff) in estimated rwnd\n\nWhen checking whether a DATA chunk fits into the estimated rwnd a\nfull sizeof(struct sk_buff) is added to the needed chunk size. This\nquickly exhausts the available rwnd space and leads to packets being\nsent which are much below the PMTU limit. This can lead to much worse\nperformance.\n\nThe reason for this behaviour was to avoid putting too much memory\npressure on the receiver. The concept is not completely irational\nbecause a Linux receiver does in fact clone an skb for each DATA chunk\ndelivered. However, Linux also reserves half the available socket\nbuffer space for data structures therefore usage of it is already\naccounted for.\n\nWhen proposing to change this the last time it was noted that this\nbehaviour was introduced to solve a performance issue caused by rwnd\noverusage in combination with small DATA chunks.\n\nTrying to reproduce this I found that with the sk_buff overhead removed,\nthe performance would improve significantly unless socket buffer limits\nare increased.\n\nThe following numbers have been gathered using a patched iperf\nsupporting SCTP over a live 1 Gbit ethernet network. The -l option\nwas used to limit DATA chunk sizes. The numbers listed are based on\nthe average of 3 test runs each. Default values have been used for\nsk_(r|w)mem.\n\nChunk\nSize    Unpatched     No Overhead\n-------------------------------------\n   4    15.2 Kbit [!]   12.2 Mbit [!]\n   8    35.8 Kbit [!]   26.0 Mbit [!]\n  16    95.5 Kbit [!]   54.4 Mbit [!]\n  32   106.7 Mbit      102.3 Mbit\n  64   189.2 Mbit      188.3 Mbit\n 128   331.2 Mbit      334.8 Mbit\n 256   537.7 Mbit      536.0 Mbit\n 512   766.9 Mbit      766.6 Mbit\n1024   810.1 Mbit      808.6 Mbit\n\nSigned-off-by: Thomas Graf \u003ctgraf@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2692ba61a82203404abd7dd2a027bda962861f74",
      "tree": "e39f21131faf42ada263c1969cfa200af2f4b0f9",
      "parents": [
        "2ca6cf06d988fea21e812a86be79353352677c9c"
      ],
      "author": {
        "name": "Xi Wang",
        "email": "xi.wang@gmail.com",
        "time": "Fri Dec 16 12:44:15 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Dec 19 16:25:46 2011 -0500"
      },
      "message": "sctp: fix incorrect overflow check on autoclose\n\nCommit 8ffd3208 voids the previous patches f6778aab and 810c0719 for\nlimiting the autoclose value.  If userspace passes in -1 on 32-bit\nplatform, the overflow check didn\u0027t work and autoclose would be set\nto 0xffffffff.\n\nThis patch defines a max_autoclose (in seconds) for limiting the value\nand exposes it through sysctl, with the following intentions.\n\n1) Avoid overflowing autoclose * HZ.\n\n2) Keep the default autoclose bound consistent across 32- and 64-bit\n   platforms (INT_MAX / HZ in this patch).\n\n3) Keep the autoclose value consistent between setsockopt() and\n   getsockopt() calls.\n\nSuggested-by: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\nSigned-off-by: Xi Wang \u003cxi.wang@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9cef310fcdee12b49b8b4c96fd8f611c8873d284",
      "tree": "9822f822a2cdc3bdc1beb70e061fcea006a923f2",
      "parents": [
        "a03ffcf873fe0f2565386ca8ef832144c42e67fa"
      ],
      "author": {
        "name": "Alex Juncu",
        "email": "ajuncu@ixiacom.com",
        "time": "Thu Dec 15 23:01:25 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Dec 19 15:58:52 2011 -0500"
      },
      "message": "llc: llc_cmsg_rcv was getting called after sk_eat_skb.\n\nReceived non stream protocol packets were calling llc_cmsg_rcv that used a\nskb after that skb was released by sk_eat_skb. This caused received STP\npackets to generate kernel panics.\n\nSigned-off-by: Alexandru Juncu \u003cajuncu@ixiacom.com\u003e\nSigned-off-by: Kunjan Naik \u003cknaik@ixiacom.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9763152c94ff7207b3532b4105272a0a6030cd61",
      "tree": "ca5b917143a04cbb5fcd494c2459b0b7e405c64e",
      "parents": [
        "78feb35b8161acd95c33a703ed6ab6f554d29387",
        "d7660918fce210f421cc58c060ca3de71e4ffd37"
      ],
      "author": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Dec 19 14:12:11 2011 -0500"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Dec 19 14:12:11 2011 -0500"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/padovan/bluetooth\n"
    },
    {
      "commit": "d1388dacbbb1d1b2bc208a4ba18de9316dc49ce9",
      "tree": "81dce4f9269bf8948bb2c6faae3635cc28753190",
      "parents": [
        "ed4a51842a9d9e618d4f4c31349b15b974dba5df",
        "42a3b63bb2ca4996a3d1210a004eae2333f1119e"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Dec 19 02:26:39 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Dec 19 02:26:39 2011 -0500"
      },
      "message": "Merge branch \u0027for-davem\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless\n"
    },
    {
      "commit": "d7660918fce210f421cc58c060ca3de71e4ffd37",
      "tree": "ddb4de47fdbc9213cb78cb62354bfb7d6751a659",
      "parents": [
        "79e654787c67f6b05f73366ff8ccac72ba7249e6"
      ],
      "author": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Sun Dec 18 22:33:30 2011 -0200"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Sun Dec 18 22:33:30 2011 -0200"
      },
      "message": "Revert \"Bluetooth: Revert: Fix L2CAP connection establishment\"\n\nThis reverts commit 4dff523a913197e3314c7b0d08734ab037709093.\n\nIt was reported that this patch cause issues when trying to connect to\nlegacy devices so reverting it.\n\nReported-by: David Fries \u003cdavid@fries.net\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "79e654787c67f6b05f73366ff8ccac72ba7249e6",
      "tree": "c1a498c2af15b6df2387898ac260c84f4a4dbbd1",
      "parents": [
        "36e999a83a4a4badd389901eb6d23a30e199b8db"
      ],
      "author": {
        "name": "Mat Martineau",
        "email": "mathewm@codeaurora.org",
        "time": "Tue Dec 06 16:23:26 2011 -0800"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Sun Dec 18 22:29:35 2011 -0200"
      },
      "message": "Bluetooth: Clear RFCOMM session timer when disconnecting last channel\n\nWhen the last RFCOMM data channel is closed, a timer is normally set\nup to disconnect the control channel at a later time.  If the control\nchannel disconnect command is sent with the timer pending, the timer\nneeds to be cancelled.\n\nIf the timer is not cancelled in this situation, the reference\ncounting logic for the RFCOMM session does not work correctly when the\nremote device closes the L2CAP connection.  The session is freed at\nthe wrong time, leading to a kernel panic.\n\nSigned-off-by: Mat Martineau \u003cmathewm@codeaurora.org\u003e\nAcked-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "36e999a83a4a4badd389901eb6d23a30e199b8db",
      "tree": "68de431f908075834d37ac856852e08986585ca0",
      "parents": [
        "33cb722c22f28964a501a56cc76397834c221c7a"
      ],
      "author": {
        "name": "Mat Martineau",
        "email": "mathewm@codeaurora.org",
        "time": "Thu Dec 08 17:23:21 2011 -0800"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Sun Dec 18 22:16:04 2011 -0200"
      },
      "message": "Bluetooth: Prevent uninitialized data access in L2CAP configuration\n\nWhen configuring an ERTM or streaming mode connection, remote devices\nare expected to send an RFC option in a successful config response.  A\nmisbehaving remote device might not send an RFC option, and the L2CAP\ncode should not access uninitialized data in this case.\n\nSigned-off-by: Mat Martineau \u003cmathewm@codeaurora.org\u003e\nAcked-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "24545cf168d1128bd74dfe6ea9e864825e25dd02",
      "tree": "9f3c9dea26f2b318560adb05f0b0ab72b29057ec",
      "parents": [
        "c9a7fe9672612c0b595633d2945f52257ad92b20",
        "bb3c36863e8001fc21a88bebfdead4da4c23e848"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri Dec 16 12:17:32 2011 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri Dec 16 12:17:32 2011 -0800"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net:\n  ipv6: Check dest prefix length on original route not copied one in rt6_alloc_cow().\n  sch_gred: should not use GFP_KERNEL while holding a spinlock\n  ipip, sit: copy parms.name after register_netdevice\n  ipv6: Fix for adding multicast route for loopback device automatically.\n  ssb: fix init regression with SoCs\n  rtl8192{ce,cu,de,se}: avoid problems because of possible ERFOFF -\u003e ERFSLEEP transition\n  mac80211: fix another race in aggregation start\n  fsl_pq_mdio: Clean up tbi address configuration\n  ppp: fix pptp double release_sock in pptp_bind()\n  net/fec: fix the use of pdev-\u003eid\n  ath9k: fix check for antenna diversity support\n  batman-adv: delete global entry in case of roaming\n  batman-adv: in case of roaming mark the client with TT_CLIENT_ROAM\n  Bluetooth: Correct version check in hci_setup\n  btusb: fix a memory leak in btusb_send_frame()\n  Bluetooth: bnep: Fix module reference\n  Bluetooth: cmtp: Fix module reference\n  Bluetooth: btmrvl: support Marvell Bluetooth device SD8797\n"
    },
    {
      "commit": "42a3b63bb2ca4996a3d1210a004eae2333f1119e",
      "tree": "f61c88fb4483bf75f557105a889e256a4f325c0d",
      "parents": [
        "3f1e6d3fd37bd4f25e5b19f1c7ca21850426c33f",
        "78feb35b8161acd95c33a703ed6ab6f554d29387"
      ],
      "author": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Thu Dec 15 13:47:58 2011 -0500"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Thu Dec 15 13:47:58 2011 -0500"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless into for-davem\n"
    },
    {
      "commit": "653f42f6b6348652c02737924abd6a5a6426e7ee",
      "tree": "466d9d722742f8f9c553226ffce200dc62f494ab",
      "parents": [
        "4dde6dedad736b86bcea3722abb7d8031aeeaa16",
        "9d5a09e659f8414dd3713e2acbfaf8a9e9794aa1"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Dec 13 14:59:42 2011 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Dec 13 14:59:42 2011 -0800"
      },
      "message": "Merge branch \u0027for-linus\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/sage/ceph-client\n\n* \u0027for-linus\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/sage/ceph-client:\n  ceph: add missing spin_unlock at ceph_mdsc_build_path()\n  ceph: fix SEEK_CUR, SEEK_SET regression\n  crush: fix mapping calculation when force argument doesn\u0027t exist\n  ceph: use i_ceph_lock instead of i_lock\n  rbd: remove buggy rollback functionality\n  rbd: return an error when an invalid header is read\n  ceph: fix rasize reporting by ceph_show_options\n"
    },
    {
      "commit": "bb3c36863e8001fc21a88bebfdead4da4c23e848",
      "tree": "68d479f11721abaac0713792d096b98aa04b9854",
      "parents": [
        "3f1e6d3fd37bd4f25e5b19f1c7ca21850426c33f"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Dec 13 17:35:06 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Dec 13 17:35:06 2011 -0500"
      },
      "message": "ipv6: Check dest prefix length on original route not copied one in rt6_alloc_cow().\n\nAfter commit 8e2ec639173f325977818c45011ee176ef2b11f6 (\"ipv6: don\u0027t\nuse inetpeer to store metrics for routes.\") the test in rt6_alloc_cow()\nfor setting the ANYCAST flag is now wrong.\n\n\u0027rt\u0027 will always now have a plen of 128, because it is set explicitly\nto 128 by ip6_rt_copy.\n\nSo to restore the semantics of the test, check the destination prefix\nlength of \u0027ort\u0027.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3f1e6d3fd37bd4f25e5b19f1c7ca21850426c33f",
      "tree": "4a4c3e784973d34e3689e3fc6789ae3503db576c",
      "parents": [
        "72b36015ba43a3cca5303f5534d2c3e1899eae29"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Sun Dec 11 23:42:53 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Dec 12 19:08:54 2011 -0500"
      },
      "message": "sch_gred: should not use GFP_KERNEL while holding a spinlock\n\ngred_change_vq() is called under sch_tree_lock(sch).\n\nThis means a spinlock is held, and we are not allowed to sleep in this\ncontext.\n\nWe might pre-allocate memory using GFP_KERNEL before taking spinlock,\nbut this is not suitable for stable material.\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "72b36015ba43a3cca5303f5534d2c3e1899eae29",
      "tree": "f22cdff528a87b5b86bfc285c95dd40d5d55202e",
      "parents": [
        "4af04aba93f47699e7ac33e7cfd4da22550e6114"
      ],
      "author": {
        "name": "Ted Feng",
        "email": "artisdom@gmail.com",
        "time": "Thu Dec 08 00:46:21 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Dec 12 18:50:51 2011 -0500"
      },
      "message": "ipip, sit: copy parms.name after register_netdevice\n\nSame fix as 731abb9cb2 for ipip and sit tunnel.\nCommit 1c5cae815d removed an explicit call to dev_alloc_name in\nipip_tunnel_locate and ipip6_tunnel_locate, because register_netdevice\nwill now create a valid name, however the tunnel keeps a copy of the\nname in the private parms structure. Fix this by copying the name back\nafter register_netdevice has successfully returned.\n\nThis shows up if you do a simple tunnel add, followed by a tunnel show:\n\n$ sudo ip tunnel add mode ipip remote 10.2.20.211\n$ ip tunnel\ntunl0: ip/ip  remote any  local any  ttl inherit  nopmtudisc\ntunl%d: ip/ip  remote 10.2.20.211  local any  ttl inherit\n$ sudo ip tunnel add mode sit remote 10.2.20.212\n$ ip tunnel\nsit0: ipv6/ip  remote any  local any  ttl 64  nopmtudisc 6rd-prefix 2002::/16\nsit%d: ioctl 89f8 failed: No such device\nsit%d: ipv6/ip  remote 10.2.20.212  local any  ttl inherit\n\nCc: stable@vger.kernel.org\nSigned-off-by: Ted Feng \u003cartisdom@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4af04aba93f47699e7ac33e7cfd4da22550e6114",
      "tree": "07bf02f171e03fb66d66e12011e56d459d44be25",
      "parents": [
        "e7ab5f1c323e137120561daeec75e91a1bd9ec8b"
      ],
      "author": {
        "name": "Li Wei",
        "email": "lw@cn.fujitsu.com",
        "time": "Tue Dec 06 21:23:45 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Dec 12 18:48:18 2011 -0500"
      },
      "message": "ipv6: Fix for adding multicast route for loopback device automatically.\n\nThere is no obvious reason to add a default multicast route for loopback\ndevices, otherwise there would be a route entry whose dst.error set to\n-ENETUNREACH that would blocking all multicast packets.\n\n\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\n\n[ more detailed explanation ]\n\nThe problem is that the resulting routing table depends on the sequence\nof interface\u0027s initialization and in some situation, that would block all\nmuticast packets. Suppose there are two interfaces on my computer\n(lo and eth0), if we initailize \u0027lo\u0027 before \u0027eth0\u0027, the resuting routing\ntable(for multicast) would be\n\n# ip -6 route show | grep ff00::\nunreachable ff00::/8 dev lo metric 256 error -101\nff00::/8 dev eth0 metric 256\n\nWhen sending multicasting packets, routing subsystem will return the first\nroute entry which with a error set to -101(ENETUNREACH).\n\nI know the kernel will set the default ipv6 address for \u0027lo\u0027 when it is up\nand won\u0027t set the default multicast route for it, but there is no reason to\nstop \u0027init\u0027 program from setting address for \u0027lo\u0027, and that is exactly what\nsystemd did.\n\nI am sure there is something wrong with kernel or systemd, currently I preferred\nkernel caused this problem.\n\n\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\n\nSigned-off-by: Li Wei \u003clw@cn.fujitsu.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f8c141c3e915e3a040d4c1badde28e23f8cbe255",
      "tree": "d2b8b3f0530f284fb14e636199decbd3f9105c2a",
      "parents": [
        "123877b80ed62c3b897c53357b622574c023b642"
      ],
      "author": {
        "name": "Dan Carpenter",
        "email": "dan.carpenter@oracle.com",
        "time": "Fri Dec 09 09:35:39 2011 +0300"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Dec 12 14:23:27 2011 -0500"
      },
      "message": "nfc: signedness bug in __nci_request()\n\nwait_for_completion_interruptible_timeout() returns -ERESTARTSYS if\ninterrupted so completion_rc needs to be signed.  The current code\nprobably returns -ETIMEDOUT if we hit this situation, but after this\npatch is applied it will return -ERESTARTSYS.\n\nSigned-off-by: Dan Carpenter \u003cdan.carpenter@oracle.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "f1932fc1a6d899c754676b1dd8b17de93b052d43",
      "tree": "97c26910626172e22b8495024f9e0025ba9f2343",
      "parents": [
        "be655596b3de5873f994ddbe205751a5ffb4de39"
      ],
      "author": {
        "name": "Sage Weil",
        "email": "sage@newdream.net",
        "time": "Wed Dec 07 09:10:26 2011 -0800"
      },
      "committer": {
        "name": "Sage Weil",
        "email": "sage@newdream.net",
        "time": "Mon Dec 12 09:09:45 2011 -0800"
      },
      "message": "crush: fix mapping calculation when force argument doesn\u0027t exist\n\nIf the force argument isn\u0027t valid, we should continue calculating a\nmapping as if it weren\u0027t specified.\n\nSigned-off-by: Sage Weil \u003csage@newdream.net\u003e\n"
    },
    {
      "commit": "e7ab5f1c323e137120561daeec75e91a1bd9ec8b",
      "tree": "758be4a11287005187b055ee8f8112a24d7d8ce5",
      "parents": [
        "1af32f0fcf33ddca52c8fd2b5bc84c129dcb1bdd",
        "329456d1ffb416c220813725b7363cda9975c9aa"
      ],
      "author": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Fri Dec 09 14:07:12 2011 -0500"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Fri Dec 09 14:07:12 2011 -0500"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless into for-davem\n"
    },
    {
      "commit": "15062e6a8524f5977f2cbdf6e3eb2f144262f74e",
      "tree": "264d7fec9152ea4ce7cb176be94dc7a5e332093a",
      "parents": [
        "162d12de656bc76786ba5fad6dac7bd238de9657"
      ],
      "author": {
        "name": "Johannes Berg",
        "email": "johannes.berg@intel.com",
        "time": "Wed Dec 07 09:02:21 2011 +0100"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed Dec 07 15:09:53 2011 -0500"
      },
      "message": "mac80211: fix another race in aggregation start\n\nEmmanuel noticed that when mac80211 stops the queues\nfor aggregation that can leave a packet pending. This\npacket will be given to the driver after the AMPDU\ncallback, but as a non-aggregated packet which messes\nup the sequence number etc.\n\nI also noticed by looking at the code that if packets\nare being processed while we clear the WANT_START bit,\nthey might see it cleared already and queue up on\ntid_tx-\u003epending. If the driver then rejects the new\naggregation session we leak the packet.\n\nFix both of these issues by changing this code to not\nstop the queues at all. Instead, let packets queue up\non the tid_tx-\u003epending queue instead of letting them\nget to the driver, and add code to recover properly\nin case the driver rejects the session.\n\n(The patch looks large because it has to move two\nfunctions to before their new use.)\n\nCc: stable@vger.kernel.org\nReported-by: Emmanuel Grumbach \u003cemmanuel.grumbach@intel.com\u003e\nSigned-off-by: Johannes Berg \u003cjohannes.berg@intel.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "1af32f0fcf33ddca52c8fd2b5bc84c129dcb1bdd",
      "tree": "f749fbe49714be639e4c9579178f9ae0adf4a7de",
      "parents": [
        "28d8ea2d568534026ccda3e8936f5ea1e04a86a1",
        "797399b415b78dacdbcaffdb89e46e369ec88b98"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Dec 07 15:06:33 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Dec 07 15:06:33 2011 -0500"
      },
      "message": "Merge branch \u0027batman-adv/maint\u0027 of git://git.open-mesh.org/linux-merge\n"
    },
    {
      "commit": "facda29d75a30a8ff4f1f23a48a368d167563843",
      "tree": "3f0b8e77cb826cd24e9f0b760b27467eda76907a",
      "parents": [
        "9995ffe5f5fdddcc73e4465cc3f8b38714df8108",
        "33cb722c22f28964a501a56cc76397834c221c7a"
      ],
      "author": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Dec 06 14:59:32 2011 -0500"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Dec 06 14:59:32 2011 -0500"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/padovan/bluetooth\n"
    },
    {
      "commit": "797399b415b78dacdbcaffdb89e46e369ec88b98",
      "tree": "1c140c512317ae78ddb3687270c7fee597586e77",
      "parents": [
        "03fc3070457dc0e6a717a2e732af93ef1cb2ae51"
      ],
      "author": {
        "name": "Antonio Quartulli",
        "email": "ordex@autistici.org",
        "time": "Sun Dec 04 22:38:27 2011 +0100"
      },
      "committer": {
        "name": "Marek Lindner",
        "email": "lindner_marek@yahoo.de",
        "time": "Wed Dec 07 03:12:59 2011 +0800"
      },
      "message": "batman-adv: delete global entry in case of roaming\n\nWhen receiving a DEL change for a client due to a roaming event (change is\nmarked with TT_CLIENT_ROAM), each node  has to check if the client roamed\nto itself or somewhere else.\n\nIn the latter case the global entry is kept to avoid having no route at all\notherwise we can safely delete the global entry\n\nSigned-off-by: Antonio Quartulli \u003cordex@autistici.org\u003e\n"
    },
    {
      "commit": "03fc3070457dc0e6a717a2e732af93ef1cb2ae51",
      "tree": "103840f9e06192967bde51604ddf897f47c61ad6",
      "parents": [
        "1ea6b8f48918282bdca0b32a34095504ee65bab5"
      ],
      "author": {
        "name": "Antonio Quartulli",
        "email": "ordex@autistici.org",
        "time": "Sun Dec 04 12:26:50 2011 +0100"
      },
      "committer": {
        "name": "Marek Lindner",
        "email": "lindner_marek@yahoo.de",
        "time": "Wed Dec 07 03:12:55 2011 +0800"
      },
      "message": "batman-adv: in case of roaming mark the client with TT_CLIENT_ROAM\n\nIn case of a client roaming from node A to node B, the latter have to mark the\ncorresponding global entry with TT_CLIENT_ROAM (instead of TT_CLIENT_PENDING).\n\nMarking a global entry with TT_CLIENT_PENDING will end up in keeping such entry\nforever (because this flag is only meant to be used with local entries and it is\nnever checked on global ones).\n\nIn the worst case (all the clients roaming to the same node A) the local and the\nglobal table will contain exactly the same clients. Batman-adv will continue to\nwork, but the memory usage is duplicated.\n\nSigned-off-by: Antonio Quartulli \u003cordex@autistici.org\u003e\n"
    },
    {
      "commit": "681090902eeb459a829f6f93d378a82011af3c89",
      "tree": "a5f7ec2c95114d344ee2f3b4a920eda80a6e38a5",
      "parents": [
        "99b53bdd810611cc178e1a86bc112d8f4f56a1e9"
      ],
      "author": {
        "name": "Stephen Boyd",
        "email": "sboyd@codeaurora.org",
        "time": "Tue Dec 06 08:04:40 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Dec 06 13:59:16 2011 -0500"
      },
      "message": "net: Silence seq_scale() unused warning\n\nOn a CONFIG_NET\u003dy build\n\nnet/core/secure_seq.c:22: warning: \u0027seq_scale\u0027 defined but not\nused\n\nSigned-off-by: Stephen Boyd \u003csboyd@codeaurora.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "99b53bdd810611cc178e1a86bc112d8f4f56a1e9",
      "tree": "0d663b68aaa3c5e1e7290809183a3031be6c9072",
      "parents": [
        "65e9d805e96c7e6a15c1e3b0c00a842d2249bab8"
      ],
      "author": {
        "name": "Peter Pan(潘卫平)",
        "email": "panweiping3@gmail.com",
        "time": "Mon Dec 05 21:39:41 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Dec 06 13:02:28 2011 -0500"
      },
      "message": "ipv4:correct description for tcp_max_syn_backlog\n\nSince commit c5ed63d66f24(tcp: fix three tcp sysctls tuning),\nsysctl_max_syn_backlog is determined by tcp_hashinfo-\u003eehash_mask,\nand the minimal value is 128, and it will increase in proportion to the\nmemory of machine.\nThe original description for tcp_max_syn_backlog and sysctl_max_syn_backlog\nare out of date.\n\nChangelog:\nV2: update description for sysctl_max_syn_backlog\n\nSigned-off-by: Weiping Pan \u003cpanweiping3@gmail.com\u003e\nReviewed-by: Shan Wei \u003cshanwei88@gmail.com\u003e\nAcked-by: Neil Horman \u003cnhorman@tuxdriver.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "321f3b8708e853695a4ff4a1a95b6fa0965b06e5",
      "tree": "0fd46721f5620710b079109b31a458573c1b3902",
      "parents": [
        "de398fb8b92eba3447298053a483727bdd5fe37e",
        "cbec0627ef1adf7afa448e8bbae3146ce910212a"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Dec 05 13:23:14 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Dec 05 13:23:14 2011 -0500"
      },
      "message": "Merge branch \u0027for-davem\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless\n"
    },
    {
      "commit": "de398fb8b92eba3447298053a483727bdd5fe37e",
      "tree": "2b13b1a58a9cdbdbea44bc4095bf8a2893a38ee5",
      "parents": [
        "f61759e6b831a55b89e584b198c3da325e2bc379"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Dec 05 13:21:42 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Dec 05 13:21:42 2011 -0500"
      },
      "message": "ipv4: Fix peer validation on cached lookup.\n\nIf ipv4_valdiate_peer() fails during a cached entry lookup,\nwe\u0027ll NULL derer since the loop iterator assumes rth is not\nNULL.\n\nLetting this be handled as a failure is just bogus, so just make it\nnot fail.  If we have trouble getting a non-NULL neighbour for the\nredirected gateway, just restore the original gateway and continue.\n\nThe very next use of this cached route will try again.\n\nReported-by: Dan Carpenter \u003cdan.carpenter@oracle.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "cbec0627ef1adf7afa448e8bbae3146ce910212a",
      "tree": "0a0956e19fb28c6eace2d445b1603afc2fd260ca",
      "parents": [
        "f61759e6b831a55b89e584b198c3da325e2bc379",
        "9995ffe5f5fdddcc73e4465cc3f8b38714df8108"
      ],
      "author": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Dec 05 11:05:44 2011 -0500"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Dec 05 11:05:44 2011 -0500"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless into for-davem\n"
    },
    {
      "commit": "f61759e6b831a55b89e584b198c3da325e2bc379",
      "tree": "5fe945faa11f90ea10ec54bf4cbf76044945de13",
      "parents": [
        "5983fe2b29df5885880d7fa3b91aca306c7564ef"
      ],
      "author": {
        "name": "Julian Anastasov",
        "email": "ja@ssi.bg",
        "time": "Fri Dec 02 11:39:42 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Dec 03 01:32:23 2011 -0500"
      },
      "message": "ipv4: make sure RTO_ONLINK is saved in routing cache\n\n__mkroute_output fails to work with the original tos\nand uses value with stripped RTO_ONLINK bit. Make sure we put\nthe original TOS bits into rt_key_tos because it used to match\ncached route.\n\nSigned-off-by: Julian Anastasov \u003cja@ssi.bg\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "33cb722c22f28964a501a56cc76397834c221c7a",
      "tree": "ee8cf8e2955b4e610efa89e3d2c1d43b83720fa3",
      "parents": [
        "54a8a79c55ce283c94ce4c67a98d28c21830405a"
      ],
      "author": {
        "name": "Andrei Emeltchenko",
        "email": "andrei.emeltchenko@intel.com",
        "time": "Wed Nov 23 11:23:34 2011 +0200"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Sat Dec 03 08:20:00 2011 +0900"
      },
      "message": "Bluetooth: Correct version check in hci_setup\n\nCheck for hci_ver instead of lmp_ver\n\nSigned-off-by: Andrei Emeltchenko \u003candrei.emeltchenko@intel.com\u003e\nAcked-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "5983fe2b29df5885880d7fa3b91aca306c7564ef",
      "tree": "c9d968a776b7d1f8dc446d2857f6cefddec6edb0",
      "parents": [
        "5611cc4572e889b62a7b4c72a413536bf6a9c416",
        "3ced1be5490f5c415d51a1e5918beeb9239d546b"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Dec 01 20:09:08 2011 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Dec 01 20:09:08 2011 -0800"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net: (73 commits)\n  netfilter: Remove ADVANCED dependency from NF_CONNTRACK_NETBIOS_NS\n  ipv4: flush route cache after change accept_local\n  sch_red: fix red_change\n  Revert \"udp: remove redundant variable\"\n  bridge: master device stuck in no-carrier state forever when in user-stp mode\n  ipv4: Perform peer validation on cached route lookup.\n  net/core: fix rollback handler in register_netdevice_notifier\n  sch_red: fix red_calc_qavg_from_idle_time\n  bonding: only use primary address for ARP\n  ipv4: fix lockdep splat in rt_cache_seq_show\n  sch_teql: fix lockdep splat\n  net: fec: Select the FEC driver by default for i.MX SoCs\n  isdn: avoid copying too long drvid\n  isdn: make sure strings are null terminated\n  netlabel: Fix build problems when IPv6 is not enabled\n  sctp: better integer overflow check in sctp_auth_create_key()\n  sctp: integer overflow in sctp_auth_create_key()\n  ipv6: Set mcast_hops to IPV6_DEFAULT_MCASTHOPS when -1 was given.\n  net: Fix corruption in /proc/*/net/dev_mcast\n  mac80211: fix race between the AGG SM and the Tx data path\n  ...\n"
    },
    {
      "commit": "3ced1be5490f5c415d51a1e5918beeb9239d546b",
      "tree": "cb0ef6d7c2a3ed0f97f6bd51791061ff2c5c3a46",
      "parents": [
        "d01ff0a049f749e0bf10a35bb23edd012718c8c2"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Dec 01 22:19:01 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Dec 01 22:19:01 2011 -0500"
      },
      "message": "netfilter: Remove ADVANCED dependency from NF_CONNTRACK_NETBIOS_NS\n\nfirewalld in Fedora 16 needs this.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d01ff0a049f749e0bf10a35bb23edd012718c8c2",
      "tree": "84525ced20b7a48c17d26d73cd79dc86ee045738",
      "parents": [
        "1ee5fa1e9970a16036e37c7b9d5ce81c778252fc"
      ],
      "author": {
        "name": "Peter Pan(潘卫平)",
        "email": "panweiping3@gmail.com",
        "time": "Thu Dec 01 15:47:06 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Dec 01 21:46:12 2011 -0500"
      },
      "message": "ipv4: flush route cache after change accept_local\n\nAfter reset ipv4_devconf-\u003edata[IPV4_DEVCONF_ACCEPT_LOCAL] to 0,\nwe should flush route cache, or it will continue receive packets with local\nsource address, which should be dropped.\n\nSigned-off-by: Weiping Pan \u003cpanweiping3@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1ee5fa1e9970a16036e37c7b9d5ce81c778252fc",
      "tree": "8f8b414130339eb15d398ace18c7e061d477329d",
      "parents": [
        "59c2cdae2791c0b2ee13d148edc6b771e7e7953f"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Thu Dec 01 11:06:34 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Dec 01 19:24:38 2011 -0500"
      },
      "message": "sch_red: fix red_change\n\nLe mercredi 30 novembre 2011 à 14:36 -0800, Stephen Hemminger a écrit :\n\n\u003e (Almost) nobody uses RED because they can\u0027t figure it out.\n\u003e According to Wikipedia, VJ says that:\n\u003e  \"there are not one, but two bugs in classic RED.\"\n\nRED is useful for high throughput routers, I doubt many linux machines\nact as such devices.\n\nI was considering adding Adaptative RED (Sally Floyd, Ramakrishna\nGummadi, Scott Shender), August 2001\n\nIn this version, maxp is dynamic (from 1% to 50%), and user only have to\nsetup min_th (target average queue size)\n(max_th and wq (burst in linux RED) are automatically setup)\n\nBy the way it seems we have a small bug in red_change()\n\nif (skb_queue_empty(\u0026sch-\u003eq))\n\tred_end_of_idle_period(\u0026q-\u003eparms);\n\nFirst, if queue is empty, we should call\nred_start_of_idle_period(\u0026q-\u003eparms);\n\nSecond, since we dont use anymore sch-\u003eq, but q-\u003eqdisc, the test is\nmeaningless.\n\nOh well...\n\n[PATCH] sch_red: fix red_change()\n\nNow RED is classful, we must check q-\u003eqdisc-\u003eq.qlen, and if queue is empty,\nwe start an idle period, not end it.\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c25573b5134294c0be82bfaecc6d08136835b271",
      "tree": "e3ac5119ad559cc32d391e8384d83a6ac2c06371",
      "parents": [
        "7fdcf13b292e8b2e38e42de24be2503e37b2cf97"
      ],
      "author": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Thu Dec 01 14:16:17 2011 -0500"
      },
      "committer": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Thu Dec 01 14:16:17 2011 -0500"
      },
      "message": "SUNRPC: Ensure we always bump the backlog queue in xprt_free_slot\n\nWhenever we free a slot, we know that the resulting xprt-\u003enum_reqs will\nbe less than xprt-\u003emax_reqs, so we know that we can release at least one\nbacklogged rpc_task.\n\nSigned-off-by: Trond Myklebust \u003cTrond.Myklebust@netapp.com\u003e\nCc: stable@vger.kernel.org [\u003e\u003d3.1]\n"
    },
    {
      "commit": "59c2cdae2791c0b2ee13d148edc6b771e7e7953f",
      "tree": "1e1a9d09a881a0283d991e91f39a36d6de045d54",
      "parents": [
        "b03b6dd58cef7d15b7c46a6729b83dd535ef08ab"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Dec 01 14:12:55 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Dec 01 14:12:55 2011 -0500"
      },
      "message": "Revert \"udp: remove redundant variable\"\n\nThis reverts commit 81d54ec8479a2c695760da81f05b5a9fb2dbe40a.\n\nIf we take the \"try_again\" goto, due to a checksum error,\nthe \u0027len\u0027 has already been truncated.  So we won\u0027t compute\nthe same values as the original code did.\n\nReported-by: paul bilke \u003cfsmail@conspiracy.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b03b6dd58cef7d15b7c46a6729b83dd535ef08ab",
      "tree": "a193461397942346f330b782a200849feafa1991",
      "parents": [
        "efbc368dcc6426d5430b9b8eeda944cf2cb74b8c"
      ],
      "author": {
        "name": "Vitalii Demianets",
        "email": "vitas@nppfactor.kiev.ua",
        "time": "Fri Nov 25 00:16:37 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Dec 01 14:05:17 2011 -0500"
      },
      "message": "bridge: master device stuck in no-carrier state forever when in user-stp mode\n\nWhen in user-stp mode, bridge master do not follow state of its slaves, so\nafter the following sequence of events it can stuck forever in no-carrier\nstate:\n1) turn stp off\n2) put all slaves down - master device will follow their state and also go in\nno-carrier state\n3) turn stp on with bridge-stp script returning 0 (go to the user-stp mode)\nNow bridge master won\u0027t follow slaves\u0027 state and will never reach running\nstate.\n\nThis patch solves the problem by making user-stp and kernel-stp behavior\nsimilar regarding master following slaves\u0027 states.\n\nSigned-off-by: Vitalii Demianets \u003cvitas@nppfactor.kiev.ua\u003e\nAcked-by: Stephen Hemminger \u003cshemminger@vyatta.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7fdcf13b292e8b2e38e42de24be2503e37b2cf97",
      "tree": "bd043aea4267abd947a0c3768964533d0d118e85",
      "parents": [
        "b930c26416c4ea6855726fd977145ccea9afbdda"
      ],
      "author": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Thu Dec 01 14:00:15 2011 -0500"
      },
      "committer": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Thu Dec 01 14:00:15 2011 -0500"
      },
      "message": "SUNRPC: Fix the execution time statistics in the face of RPC restarts\n\nIf the rpc_task gets restarted, then we want to ensure that we don\u0027t\ndouble-count the execution time statistics, timeout data, etc.\n\nSigned-off-by: Trond Myklebust \u003cTrond.Myklebust@netapp.com\u003e\n"
    },
    {
      "commit": "efbc368dcc6426d5430b9b8eeda944cf2cb74b8c",
      "tree": "b5b27a1d0df7fd5808b2c58c605bf9c563cc9056",
      "parents": [
        "8f891489866ec62a87494eff3ed17c88152c32d4"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Dec 01 13:38:59 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Dec 01 13:38:59 2011 -0500"
      },
      "message": "ipv4: Perform peer validation on cached route lookup.\n\nOtherwise we won\u0027t notice the peer GENID change.\n\nReported-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "03360c5a405999d605ffc7373a7b90f3388db92e",
      "tree": "540707c796bd83ee1ef52cc37843c522f1bc4808",
      "parents": [
        "c72e8d335e2c6a309b6281f2abcf491f37b8b92b"
      ],
      "author": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Thu Dec 01 10:44:17 2011 -0500"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Thu Dec 01 10:44:17 2011 -0500"
      },
      "message": "Revert \"mac80211: clear sta.drv_priv on reconfiguration\"\n\nThis reverts commit f785d83a19bca326f79d127a413e35769afc0105.\n\nThis was provoking WARNINGs from the iwlegacy drivers.\n\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "8f891489866ec62a87494eff3ed17c88152c32d4",
      "tree": "a3baca724faed04898f72e3e512f76892a1b05ce",
      "parents": [
        "ea6a5d3b97b768561db6358f15e4c84ced0f4f7e"
      ],
      "author": {
        "name": "RongQing.Li",
        "email": "roy.qing.li@gmail.com",
        "time": "Wed Nov 30 23:43:07 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 30 23:43:07 2011 -0500"
      },
      "message": "net/core: fix rollback handler in register_netdevice_notifier\n\nWithin nested statements, the break statement terminates only the\ndo, for, switch, or while statement that immediately encloses it,\nSo replace the break with goto.\n\nSigned-off-by: RongQing.Li \u003croy.qing.li@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "218fa90f072e4aeff9003d57e390857f4f35513e",
      "tree": "09563123179d16ab4ba74812c741b72636268ca1",
      "parents": [
        "f7e57044eeb1841847c24aa06766c8290c202583"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Tue Nov 29 20:05:55 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 30 17:24:14 2011 -0500"
      },
      "message": "ipv4: fix lockdep splat in rt_cache_seq_show\n\nAfter commit f2c31e32b378 (fix NULL dereferences in check_peer_redir()),\ndst_get_neighbour() should be guarded by rcu_read_lock() /\nrcu_read_unlock() section.\n\nReported-by: Miles Lane \u003cmiles.lane@gmail.com\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f7e57044eeb1841847c24aa06766c8290c202583",
      "tree": "86167b7760363d85731d05a802aa8da1b29b7e29",
      "parents": [
        "15fc1f3617edea50fa58703d59f73e726377bc63"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Wed Nov 30 04:08:58 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 30 17:10:49 2011 -0500"
      },
      "message": "sch_teql: fix lockdep splat\n\nWe need rcu_read_lock() protection before using dst_get_neighbour(), and\nwe must cache its value (pass it to __teql_resolve())\n\nteql_master_xmit() is called under rcu_read_lock_bh() protection, its\nnot enough.\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c72e8d335e2c6a309b6281f2abcf491f37b8b92b",
      "tree": "fa943d265701266f3c44020072747fb67a84e83c",
      "parents": [
        "0bac71af6e66dc798bf07d0c0dd14ee5503362f9"
      ],
      "author": {
        "name": "Simon Wunderlich",
        "email": "simon.wunderlich@s2003.tu-chemnitz.de",
        "time": "Wed Nov 30 16:56:30 2011 +0100"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed Nov 30 14:20:19 2011 -0500"
      },
      "message": "mac80211: fill rate filter for internal scan requests\n\nThe rates bitmap for internal scan requests shoud be filled,\notherwise there will be probe requests with zero rates supported.\n\nSigned-off-by: Simon Wunderlich \u003csiwu@hrz.tu-chemnitz.de\u003e\nSigned-off-by: Mathias Kretschmer \u003cmathias.kretschmer@fokus.fraunhofer.de\u003e\nCc: stable@vger.kernel.org\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "0bac71af6e66dc798bf07d0c0dd14ee5503362f9",
      "tree": "3a30fb610fd45c531acf4c5e955656787f9016e0",
      "parents": [
        "a042994dd377d86bff9446ee76151ceb6267c9ba"
      ],
      "author": {
        "name": "Luis R. Rodriguez",
        "email": "mcgrof@qca.qualcomm.com",
        "time": "Mon Nov 28 16:47:16 2011 -0500"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed Nov 30 14:16:33 2011 -0500"
      },
      "message": "cfg80211: amend regulatory NULL dereference fix\n\nJohannes\u0027 patch for \"cfg80211: fix regulatory NULL dereference\"\nbroke user regulaotry hints and it did not address the fact that\nlast_request was left populated even if the previous regulatory\nhint was stale due to the wiphy disappearing.\n\nFix user reguluatory hints by only bailing out if for those\nregulatory hints where a request_wiphy is expected. The stale last_request\nconsiderations are addressed through the previous fixes on last_request\nwhere we reset the last_request to a static world regdom request upon\nreset_regdomains(). In this case though we further enhance the effect\nby simply restoring reguluatory settings completely.\n\nCc: stable@vger.kernel.org\nCc: Johannes Berg \u003cjohannes.berg@intel.com\u003e\nSigned-off-by: Luis R. Rodriguez \u003cmcgrof@qca.qualcomm.com\u003e\nReviewed-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "a042994dd377d86bff9446ee76151ceb6267c9ba",
      "tree": "2e7a30ca3f6ce9ecb06179abce92bc9520981506",
      "parents": [
        "2a1e0fd175dcfd72096ba9291d31e3b1b5342e60"
      ],
      "author": {
        "name": "Luis R. Rodriguez",
        "email": "mcgrof@qca.qualcomm.com",
        "time": "Mon Nov 28 16:47:15 2011 -0500"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed Nov 30 14:16:31 2011 -0500"
      },
      "message": "cfg80211: fix race on init and driver registration\n\nThere is a theoretical race that if hit will trigger\na crash. The race is between when we issue the first\nregulatory hint, regulatory_hint_core(), gets processed\nby the workqueue and between when the first device\ngets registered to the wireless core. This is not easy\nto reproduce but it was easy to do so through the\nregulatory simulator I have been working on. This\nis a port of the fix I implemented there [1].\n\n[1] https://github.com/mcgrof/regsim/commit/a246ccf81f059cb662eee288aa13100f631e4cc8\n\nCc: stable@vger.kernel.org\nCc: Johannes Berg \u003cjohannes.berg@intel.com\u003e\nSigned-off-by: Luis R. Rodriguez \u003cmcgrof@qca.qualcomm.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "3b95e9c089d932c11f9ec03f7493f02cceff04ba",
      "tree": "b4b5fac6f2f1908aebf49f63805f07f4ec58abb9",
      "parents": [
        "5dc5503f5a400be5a7dc611745a034f04b0679b8",
        "2a1e0fd175dcfd72096ba9291d31e3b1b5342e60"
      ],
      "author": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed Nov 30 14:14:42 2011 -0500"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed Nov 30 14:14:42 2011 -0500"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless into for-davem\n"
    },
    {
      "commit": "1281bc256543eb610b14fa95ce1967397931a120",
      "tree": "51a1fceba7c3bc7f6e8db24ddc9bef3ca052fe87",
      "parents": [
        "c89304b8ea34ab48ba6ae10e06a8b1b8c8212307"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "pmoore@redhat.com",
        "time": "Tue Nov 29 10:10:54 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 29 16:48:52 2011 -0500"
      },
      "message": "netlabel: Fix build problems when IPv6 is not enabled\n\nA recent fix to the the NetLabel code caused build problem with\nconfigurations that did not have IPv6 enabled; see below:\n\n netlabel_kapi.c: In function \u0027netlbl_cfg_unlbl_map_add\u0027:\n netlabel_kapi.c:165:4:\n  error: implicit declaration of function \u0027netlbl_af6list_add\u0027\n\nThis patch fixes this problem by making the IPv6 specific code conditional\non the IPv6 configuration flags as we done in the rest of NetLabel and the\nnetwork stack as a whole.  We have to move some variable declarations\naround as a result so things may not be quite as pretty, but at least it\nbuilds cleanly now.\n\nSome additional IPv6 conditionals were added to the NetLabel code as well\nfor the sake of consistency.\n\nReported-by: Randy Dunlap \u003crdunlap@xenotime.net\u003e\nSigned-off-by: Paul Moore \u003cpmoore@redhat.com\u003e\nAcked-by: Randy Dunlap \u003crdunlap@xenotime.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c89304b8ea34ab48ba6ae10e06a8b1b8c8212307",
      "tree": "ef464824214e0e82b488664df25d1e9ebb9128b7",
      "parents": [
        "c1baa88431fe0fe4fad492dece4177a7735f89cf"
      ],
      "author": {
        "name": "Xi Wang",
        "email": "xi.wang@gmail.com",
        "time": "Tue Nov 29 09:26:30 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 29 15:51:03 2011 -0500"
      },
      "message": "sctp: better integer overflow check in sctp_auth_create_key()\n\nThe check from commit 30c2235c is incomplete and cannot prevent\ncases like key_len \u003d 0x80000000 (INT_MAX + 1).  In that case, the\nleft-hand side of the check (INT_MAX - key_len), which is unsigned,\nbecomes 0xffffffff (UINT_MAX) and bypasses the check.\n\nHowever this shouldn\u0027t be a security issue.  The function is called\nfrom the following two code paths:\n\n 1) setsockopt()\n\n 2) sctp_auth_asoc_set_secret()\n\nIn case (1), sca_keylength is never going to exceed 65535 since it\u0027s\nbounded by a u16 from the user API.  As such, the key length will\nnever overflow.\n\nIn case (2), sca_keylength is computed based on the user key (1 short)\nand 2 * key_vector (3 shorts) for a total of 7 * USHRT_MAX, which still\nwill not overflow.\n\nIn other words, this overflow check is not really necessary.  Just\nmake it more correct.\n\nSigned-off-by: Xi Wang \u003cxi.wang@gmail.com\u003e\nCc: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c1baa88431fe0fe4fad492dece4177a7735f89cf",
      "tree": "3513c0018bd149625aa999b82c0ed6097a55a267",
      "parents": [
        "a5e5c37434eb182cf50cec90d9736d9a9a390116",
        "70e9942f17a6193e9172a804e6569a8806633d6b"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 29 01:20:55 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 29 01:20:55 2011 -0500"
      },
      "message": "Merge branch \u0027nf\u0027 of git://1984.lsi.us.es/net\n"
    },
    {
      "commit": "2a38e6d5aed24bb7f0211e0819fac8c32c2b5791",
      "tree": "8b31067a05b221efa900bb333aa58c7fbaffc854",
      "parents": [
        "5cac98dd06bc43a7baab3523184f70fd359e9f35"
      ],
      "author": {
        "name": "Li Wei",
        "email": "lw@cn.fujitsu.com",
        "time": "Sun Nov 27 21:33:34 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Nov 28 18:09:13 2011 -0500"
      },
      "message": "ipv6: Set mcast_hops to IPV6_DEFAULT_MCASTHOPS when -1 was given.\n\nWe need to set np-\u003emcast_hops to it\u0027s default value at this moment\notherwise when we use it and found it\u0027s value is -1, the logic to\nget default hop limit doesn\u0027t take multicast into account and will\nreturn wrong hop limit(IPV6_DEFAULT_HOPLIMIT) which is for unicast.\n\nSigned-off-by: Li Wei \u003clw@cn.fujitsu.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5cac98dd06bc43a7baab3523184f70fd359e9f35",
      "tree": "454623a8d7ba16e94b97d9e3107f0ac4c43164d9",
      "parents": [
        "c4860ba2e11261a541632ceee8267ca490d9eb98"
      ],
      "author": {
        "name": "Anton Blanchard",
        "email": "anton@samba.org",
        "time": "Sun Nov 27 21:14:46 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Nov 28 18:07:29 2011 -0500"
      },
      "message": "net: Fix corruption in /proc/*/net/dev_mcast\n\nI just hit this during my testing. Isn\u0027t there another bug lurking?\n\nBUG kmalloc-8: Redzone overwritten\n\nINFO: 0xc0000000de9dec48-0xc0000000de9dec4b. First byte 0x0 instead of 0xcc\nINFO: Allocated in .__seq_open_private+0x30/0xa0 age\u003d0 cpu\u003d5 pid\u003d3896\n\t.__kmalloc+0x1e0/0x2d0\n\t.__seq_open_private+0x30/0xa0\n\t.seq_open_net+0x60/0xe0\n\t.dev_mc_seq_open+0x4c/0x70\n\t.proc_reg_open+0xd8/0x260\n\t.__dentry_open.clone.11+0x2b8/0x400\n\t.do_last+0xf4/0x950\n\t.path_openat+0xf8/0x480\n\t.do_filp_open+0x48/0xc0\n\t.do_sys_open+0x140/0x250\n\tsyscall_exit+0x0/0x40\n\ndev_mc_seq_ops uses dev_seq_start/next/stop but only allocates\nsizeof(struct seq_net_private) of private data, whereas it expects\nsizeof(struct dev_iter_state):\n\nstruct dev_iter_state {\n\tstruct seq_net_private p;\n\tunsigned int pos; /* bucket \u003c\u003c BUCKET_SPACE + offset */\n};\n\nCreate dev_seq_open_ops and use it so we don\u0027t have to expose\nstruct dev_iter_state.\n\n[ Problem added by commit f04565ddf52e4 (dev: use name hash for\n  dev_seq_ops) -Eric ]\n\nSigned-off-by: Anton Blanchard \u003canton@samba.org\u003e\nAcked-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2a1e0fd175dcfd72096ba9291d31e3b1b5342e60",
      "tree": "75d1125cffd90d1af3213aa089049139a04b5536",
      "parents": [
        "d305a6557b2c4dca0110f05ffe745b1ef94adb80"
      ],
      "author": {
        "name": "Emmanuel Grumbach",
        "email": "emmanuel.grumbach@intel.com",
        "time": "Sun Nov 27 15:29:44 2011 +0200"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Nov 28 13:46:41 2011 -0500"
      },
      "message": "mac80211: fix race between the AGG SM and the Tx data path\n\nWhen a packet is supposed to sent be as an a-MPDU, mac80211 sets\nIEEE80211_TX_CTL_AMPDU to let the driver know. On the other\nhand, mac80211 configures the driver for aggregration with the\nampdu_action callback.\nThere is race between these two mechanisms since the following\nscenario can occur when the BA agreement is torn down:\n\nTx softIRQ\t \t\t\tdrv configuration\n\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\t\t\t\t\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\n\ncheck OPERATIONAL bit\nSet the TX_CTL_AMPDU bit in the packet\n\n\t\t\t\t\tclear OPERATIONAL bit\n\t\t\t\t\tstop Tx AGG\nPass Tx packet to the driver.\n\nIn that case the driver would get a packet with TX_CTL_AMPDU set\nalthough it has already been notified that the BA session has been\ntorn down.\n\nTo fix this, we need to synchronize all the Qdisc activity after we\ncleared the OPERATIONAL bit. After that step, all the following\npackets will be buffered until the driver reports it is ready to get\nnew packets for this RA / TID. This buffering allows not to run into\nanother race that would send packets with TX_CTL_AMPDU unset while\nthe driver hasn\u0027t been requested to tear down the BA session yet.\n\nThis race occurs in practice and iwlwifi complains with a WARN_ON\nwhen it happens.\n\nCc: stable@kernel.org\nSigned-off-by: Emmanuel Grumbach \u003cemmanuel.grumbach@intel.com\u003e\nReviewed-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "d305a6557b2c4dca0110f05ffe745b1ef94adb80",
      "tree": "5b4f95d4c8f2535d5971aaff0cde15a96695a1f1",
      "parents": [
        "a73228124bed4022d4d4c5663d9679ba2fb99c6c"
      ],
      "author": {
        "name": "Nikolay Martynov",
        "email": "mar.kolya@gmail.com",
        "time": "Mon Nov 28 09:18:00 2011 +0100"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Nov 28 13:46:41 2011 -0500"
      },
      "message": "mac80211: fix race condition caused by late addBA response\n\nIf addBA responses comes in just after addba_resp_timer has\nexpired mac80211 will still accept it and try to open the\naggregation session. This causes drivers to be confused and\nin some cases even crash.\n\nThis patch fixes the race condition and makes sure that if\naddba_resp_timer has expired addBA response is not longer\naccepted and we do not try to open half-closed session.\n\nCc: stable@vger.kernel.org\nSigned-off-by: Nikolay Martynov \u003cmar.kolya@gmail.com\u003e\n[some adjustments]\nSigned-off-by: Johannes Berg \u003cjohannes.berg@intel.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "24f50a9d165745fd0701c6e089d35f58a229ea69",
      "tree": "f43007765e54da07e5da5a5801d77fea168baa92",
      "parents": [
        "e007b857e88097c96c45620bf3b04a4e309053d1"
      ],
      "author": {
        "name": "Johannes Berg",
        "email": "johannes.berg@intel.com",
        "time": "Thu Nov 24 20:06:14 2011 +0100"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Nov 28 13:46:41 2011 -0500"
      },
      "message": "mac80211: don\u0027t stop a single aggregation session twice\n\nNikolay noticed (by code review) that mac80211 can\nattempt to stop an aggregation session while it is\nalready being stopped. So to fix it, check whether\nstop is already being done and bail out if so.\n\nAlso move setting the STOPPING state into the lock\nso things are properly atomic.\n\nCc: stable@vger.kernel.org\nReported-by: Nikolay Martynov \u003cmar.kolya@gmail.com\u003e\nSigned-off-by: Johannes Berg \u003cjohannes.berg@intel.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "e007b857e88097c96c45620bf3b04a4e309053d1",
      "tree": "3ebc3353b33539c33e50335c9391f8727e826614",
      "parents": [
        "82e5fc2a34fa9ffea38f00c4066b7e600a0ca5e6"
      ],
      "author": {
        "name": "Eliad Peller",
        "email": "eliad@wizery.com",
        "time": "Thu Nov 24 18:13:56 2011 +0200"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Nov 28 13:46:40 2011 -0500"
      },
      "message": "nl80211: fix MAC address validation\n\nMAC addresses have a fixed length. The current\npolicy allows passing \u003c ETH_ALEN bytes, which\nmight result in reading beyond the buffer.\n\nCc: stable@vger.kernel.org\nSigned-off-by: Eliad Peller \u003celiad@wizery.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "de68dca1816660b0d3ac89fa59ffb410007a143f",
      "tree": "9a31e87c6e0504627df25d3a1d39ca7825dcd779",
      "parents": [
        "0884d7aa24e15e72b3c07f7da910a13bb7df3592"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Sat Nov 26 12:13:44 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Nov 26 19:16:37 2011 -0500"
      },
      "message": "inet: add a redirect generation id in inetpeer\n\nNow inetpeer is the place where we cache redirect information for ipv4\ndestinations, we must be able to invalidate informations when a route is\nadded/removed on host.\n\nAs inetpeer is not yet namespace aware, this patch adds a shared\nredirect_genid, and a per inetpeer redirect_genid. This might be changed\nlater if inetpeer becomes ns aware.\n\nCache information for one inerpeer is valid as long as its\nredirect_genid has the same value than global redirect_genid.\n\nReported-by: Arkadiusz Miśkiewicz \u003ca.miskiewicz@gmail.com\u003e\nTested-by: Arkadiusz Miśkiewicz \u003ca.miskiewicz@gmail.com\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0884d7aa24e15e72b3c07f7da910a13bb7df3592",
      "tree": "0b7257890d1e5a960f3205f94ab0a4d628ce7c3a",
      "parents": [
        "83b98fb46ff136945f9d06a9bf6e6aae2ffc37b3"
      ],
      "author": {
        "name": "Alexey Moiseytsev",
        "email": "himeraster@gmail.com",
        "time": "Mon Nov 21 13:35:25 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Nov 26 16:34:22 2011 -0500"
      },
      "message": "AF_UNIX: Fix poll blocking problem when reading from a stream socket\n\npoll() call may be blocked by concurrent reading from the same stream\nsocket.\n\nSigned-off-by: Alexey Moiseytsev \u003chimeraster@gmail.com\u003e\nAcked-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "71b1391a41289735676be02e35239e5aa9fe6ba6",
      "tree": "2651b2efbbdc39beb00bcf3e9cd45f949952c240",
      "parents": [
        "8a6e77d5209e459a9ec5c268c39800c06cd1dc86"
      ],
      "author": {
        "name": "Florian Westphal",
        "email": "fw@strlen.de",
        "time": "Fri Nov 25 06:47:16 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Nov 26 15:57:36 2011 -0500"
      },
      "message": "l2tp: ensure sk-\u003edst is still valid\n\nWhen using l2tp over ipsec, the tunnel will hang when rekeying\noccurs. Reason is that the transformer bundle attached to the dst entry\nis now in STATE_DEAD and thus xfrm_output_one() drops all packets\n(XfrmOutStateExpired increases).\n\nFix this by calling __sk_dst_check (which drops the stale dst\nif xfrm dst-\u003echeck callback finds that the bundle is no longer valid).\n\nCc: James Chapman \u003cjchapman@katalix.com\u003e\nSigned-off-by: Florian Westphal \u003cfw@strlen.de\u003e\nAcked-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8a6e77d5209e459a9ec5c268c39800c06cd1dc86",
      "tree": "141421761c5ac9b398cab84b3674d30ec2fd4e00",
      "parents": [
        "fc0b927d9a5024e138c4318fe19a590f23e3eeec"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Mon Nov 21 00:21:55 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Nov 26 15:49:07 2011 -0500"
      },
      "message": "decnet: proper socket refcounting\n\nBetter use sk_reset_timer() / sk_stop_timer() helpers to make sure we\ndont access already freed/reused memory later.\n\nReported-by: Sasha Levin \u003clevinsasha928@gmail.com\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nTested-by: Sasha Levin \u003clevinsasha928@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "261663b0ee2ee8e3947f4c11c1a08be18cd2cea1",
      "tree": "12cf5a46c7c5ec2f615826b975fa85473e054bd7",
      "parents": [
        "b8400f3718a11c9b0ca400705cddf94f3132c1c3"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Wed Nov 23 02:14:50 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Nov 26 14:29:52 2011 -0500"
      },
      "message": "ipv4: Don\u0027t use the cached pmtu informations for input routes\n\nThe pmtu informations on the inetpeer are visible for output and\ninput routes. On packet forwarding, we might propagate a learned\npmtu to the sender. As we update the pmtu informations of the\ninetpeer on demand, the original sender of the forwarded packets\nmight never notice when the pmtu to that inetpeer increases.\nSo use the mtu of the outgoing device on packet forwarding instead\nof the pmtu to the final destination.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "618f9bc74a039da76fa027ac2600c5b785b964c5",
      "tree": "ff69bc14b711c9c9d4c691d2a8c262401d62c8c9",
      "parents": [
        "ebb762f27fed083cb993a0816393aba4615f6544"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Wed Nov 23 02:13:31 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Nov 26 14:29:51 2011 -0500"
      },
      "message": "net: Move mtu handling down to the protocol depended handlers\n\nWe move all mtu handling from dst_mtu() down to the protocol\nlayer. So each protocol can implement the mtu handling in\na different manner.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ebb762f27fed083cb993a0816393aba4615f6544",
      "tree": "c065070f78d4a272d99183606d103519426bb344",
      "parents": [
        "6b600b26c0215bf9ed04062ecfacf0bc20e2588c"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Wed Nov 23 02:12:51 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Nov 26 14:29:50 2011 -0500"
      },
      "message": "net: Rename the dst_opt default_mtu method to mtu\n\nWe plan to invoke the dst_opt-\u003edefault_mtu() method unconditioally\nfrom dst_mtu(). So rename the method to dst_opt-\u003emtu() to match\nthe name with the new meaning.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6b600b26c0215bf9ed04062ecfacf0bc20e2588c",
      "tree": "a3dbd36f83c8c3d813b1422e472af6a31ace40d2",
      "parents": [
        "df07a94cf50eb73d09bf2350c3fe2598e4cbeee1"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Wed Nov 23 02:12:13 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Nov 26 14:29:50 2011 -0500"
      },
      "message": "route: Use the device mtu as the default for blackhole routes\n\nAs it is, we return null as the default mtu of blackhole routes.\nThis may lead to a propagation of a bogus pmtu if the default_mtu\nmethod of a blackhole route is invoked. So return dst-\u003edev-\u003emtu\nas the default mtu instead.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "df07a94cf50eb73d09bf2350c3fe2598e4cbeee1",
      "tree": "d6d53ef2e0c4b7e1a9ae02ae6f14207963d4f134",
      "parents": [
        "42ca0203fd59aa9be7b241be1fbc3bef1f903f9c"
      ],
      "author": {
        "name": "Jorge Boncompte [DTI2]",
        "email": "jorge@dti2.net",
        "time": "Fri Nov 25 13:24:49 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Nov 25 13:24:49 2011 -0500"
      },
      "message": "netns: fix proxy ARP entries listing on a netns\n\nSkip entries from foreign network namespaces.\n\nSigned-off-by: Jorge Boncompte [DTI2] \u003cjorge@dti2.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "42ca0203fd59aa9be7b241be1fbc3bef1f903f9c",
      "tree": "987d5a95858b05b6ffb857f27e8ffefeed6b9fdf",
      "parents": [
        "ac8a48106be49c422575ddc7531b776f8eb49610"
      ],
      "author": {
        "name": "Dan Carpenter",
        "email": "dan.carpenter@oracle.com",
        "time": "Wed Nov 23 21:18:20 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Nov 25 01:41:29 2011 -0500"
      },
      "message": "net/netlabel: copy and paste bug in netlbl_cfg_unlbl_map_add()\n\nThis was copy and pasted from the IPv4 code.  We\u0027re calling the\nip4 version of that function and map4 is NULL.\n\nSigned-off-by: Dan Carpenter \u003cdan.carpenter@oracle.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ac8a48106be49c422575ddc7531b776f8eb49610",
      "tree": "d770975ffc9cebfcbb2d3ad40b0601a8d1e77c32",
      "parents": [
        "67c170a24fc6669f8f7c0864d75caadef0a8e5e6"
      ],
      "author": {
        "name": "Li Wei",
        "email": "lw@cn.fujitsu.com",
        "time": "Tue Nov 22 23:33:10 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 23 19:19:32 2011 -0500"
      },
      "message": "ipv4: Save nexthop address of LSRR/SSRR option to IPCB.\n\nWe can not update iph-\u003edaddr in ip_options_rcv_srr(), It is too early.\nWhen some exception ocurred later (eg. in ip_forward() when goto\nsr_failed) we need the ip header be identical to the original one as\nICMP need it.\n\nAdd a field \u0027nexthop\u0027 in struct ip_options to save nexthop of LSRR\nor SSRR option.\n\nSigned-off-by: Li Wei \u003clw@cn.fujitsu.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "685f94e6db8496399c881218018166515445a914",
      "tree": "1eb51c364b0f8231d182500c63dbbe2ecf97dcec",
      "parents": [
        "4d0fe50c75a547088e4304e5eb5f521514dfae46"
      ],
      "author": {
        "name": "Jun Zhao",
        "email": "mypopydev@gmail.com",
        "time": "Tue Nov 22 17:19:03 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 23 17:31:39 2011 -0500"
      },
      "message": "ipv4 : igmp : fix error handle in ip_mc_add_src()\n\nWhen add sources to interface failure, need to roll back the sfcount[MODE]\nto before state. We need to match it corresponding.\n\nAcked-by: David L Stevens \u003cdlstevens@us.ibm.com\u003e\nAcked-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: Jun Zhao \u003cmypopydev@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4d0fe50c75a547088e4304e5eb5f521514dfae46",
      "tree": "e1415bc9f01700ee8e0182de1a5550b8d0bf345c",
      "parents": [
        "15ac2b08a2fd0f4aacbe8ae39788252fea6fbe63"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Wed Nov 23 17:29:23 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 23 17:29:23 2011 -0500"
      },
      "message": "ipv6: tcp: fix tcp_v6_conn_request()\n\nSince linux 2.6.26 (commit c6aefafb7ec6 : Add IPv6 support to TCP SYN\ncookies), we can drop a SYN packet reusing a TIME_WAIT socket.\n\n(As a matter of fact we fail to send the SYNACK answer)\n\nAs the client resends its SYN packet after a one second timeout, we\naccept it, because first packet removed the TIME_WAIT socket before\nbeing dropped.\n\nThis probably explains why nobody ever noticed or complained.\n\nReported-by: Jesse Young \u003cjlyo@jlyo.org\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "46a246c4dff9f248913e791b69f2336cd8d4ec41",
      "tree": "2f8d10fc0d3afdc82a1fa3295a456507c99d549b",
      "parents": [
        "c16a98ed91597b40b22b540c6517103497ef8e74"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 23 16:07:00 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 23 16:07:00 2011 -0500"
      },
      "message": "netfilter: Remove NOTRACK/RAW dependency on NETFILTER_ADVANCED.\n\nDistributions are using this in their default scripts, so don\u0027t hide\nthem behind the advanced setting.\n\nReported-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c16a98ed91597b40b22b540c6517103497ef8e74",
      "tree": "55e607b5facf5f29f58484b7c6662c1c8e1cb7ba",
      "parents": [
        "4d65a2465f6f2694de67777a8aedb1272f473979"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Wed Nov 23 15:49:31 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 23 15:49:31 2011 -0500"
      },
      "message": "ipv6: tcp: fix panic in SYN processing\n\ncommit 72a3effaf633bc ([NET]: Size listen hash tables using backlog\nhint) added a bug allowing inet6_synq_hash() to return an out of bound\narray index, because of u16 overflow.\n\nBug can happen if system admins set net.core.somaxconn \u0026\nnet.ipv4.tcp_max_syn_backlog sysctls to values greater than 65536\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4d65a2465f6f2694de67777a8aedb1272f473979",
      "tree": "ca1460a1acf10aa733f1aaa6ec8b83ad42385c1d",
      "parents": [
        "02f1ce35bed3ceb56868ec534591e15ffdcef879"
      ],
      "author": {
        "name": "Li Wei",
        "email": "lw@cn.fujitsu.com",
        "time": "Wed Nov 23 03:51:54 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 23 03:51:54 2011 -0500"
      },
      "message": "ipv6: fix a bug in ndisc_send_redirect\n\nRelease skb when transmit rate limit _not_ allow\n\nSigned-off-by: Li Wei \u003clw@cn.fujitsu.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "24ca9a847791fd53d9b217330b15f3c285827a18",
      "tree": "a65b8af87ddc7b48911dd04c4644d2d2aaf0127d",
      "parents": [
        "866d43c9ea88daa3751b58aba16a2a9b7f7aa067"
      ],
      "author": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Tue Nov 22 14:44:28 2011 +0200"
      },
      "committer": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Tue Nov 22 23:55:27 2011 +0200"
      },
      "message": "SUNRPC: Ensure we return EAGAIN in xs_nospace if congestion is cleared\n\nBy returning \u00270\u0027 instead of \u0027EAGAIN\u0027 when the tests in xs_nospace() fail\nto find evidence of socket congestion, we are making the RPC engine believe\nthat the message was incorrectly sent and so it disconnects the socket\ninstead of just retrying.\n\nThe bug appears to have been introduced by commit\n5e3771ce2d6a69e10fcc870cdf226d121d868491 (SUNRPC: Ensure that xs_nospace\nreturn values are propagated).\n\nReported-by: Andrew Cooper \u003candrew.cooper3@citrix.com\u003e\nSigned-off-by: Trond Myklebust \u003cTrond.Myklebust@netapp.com\u003e\nCc: stable@vger.kernel.org [\u003e\u003d 2.6.30]\nTested-by: Andrew Cooper \u003candrew.cooper3@citrix.com\u003e\n"
    },
    {
      "commit": "02f1ce35bed3ceb56868ec534591e15ffdcef879",
      "tree": "49b72078598abe3542fb606a3af10dcb7f2d4f3f",
      "parents": [
        "5eccdf5e06eb67779716ae26142402a1ae9b012c",
        "82e5fc2a34fa9ffea38f00c4066b7e600a0ca5e6"
      ],
      "author": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Nov 22 16:46:55 2011 -0500"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Nov 22 16:46:55 2011 -0500"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless into for-davem\n"
    },
    {
      "commit": "20e994a05b33b186a22a3b9e922df4cce644daac",
      "tree": "74f3d7bc5e1aa92a7c98d6a232dc3107bda8fe8e",
      "parents": [
        "717b6d83664646963c71d014c71babaa802333b9"
      ],
      "author": {
        "name": "Feng King",
        "email": "kinwin2008@gmail.com",
        "time": "Mon Nov 21 01:47:11 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 22 16:18:43 2011 -0500"
      },
      "message": "net: correct comments of skb_shift\n\nwhen skb_shift, we want to shift paged data from skb to tgt frag area.\nOriginal comments revert the shift order\n\nSigned-off-by: Feng King \u003ckinwin2008@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    }
  ],
  "next": "717b6d83664646963c71d014c71babaa802333b9"
}
