)]}'
{
  "log": [
    {
      "commit": "514ddfedb89c19c57de82aedec8da2bd8ff3802c",
      "tree": "4a7c2c137effec29e674f73153a82f394612aa21",
      "parents": [
        "09c6cf7f980f1e8dbf58dc9ae0ebf4f6eb93cc0d"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "edumazet@google.com",
        "time": "Sat Sep 22 00:08:29 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:44 2012 +0900"
      },
      "message": "ipv4: raw: fix icmp_filter()\n\n[ Upstream commit ab43ed8b7490cb387782423ecf74aeee7237e591 ]\n\nicmp_filter() should not modify its input, or else its caller\nwould need to recompute ip_hdr() if skb-\u003ehead is reallocated.\n\nUse skb_header_pointer() instead of pskb_may_pull() and\nchange the prototype to make clear both sk and skb are const.\n\nSigned-off-by: Eric Dumazet \u003cedumazet@google.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "09c6cf7f980f1e8dbf58dc9ae0ebf4f6eb93cc0d",
      "tree": "f50557960f49a3f54e4e1df40a0364ce637d08df",
      "parents": [
        "6b8fc5c4eba92b5cd3c9ca0d926e99831604f81e"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "edumazet@google.com",
        "time": "Mon Sep 24 07:00:11 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:44 2012 +0900"
      },
      "message": "net: guard tcp_set_keepalive() to tcp sockets\n\n[ Upstream commit 3e10986d1d698140747fcfc2761ec9cb64c1d582 ]\n\nIts possible to use RAW sockets to get a crash in\ntcp_set_keepalive() / sk_reset_timer()\n\nFix is to make sure socket is a SOCK_STREAM one.\n\nReported-by: Dave Jones \u003cdavej@redhat.com\u003e\nSigned-off-by: Eric Dumazet \u003cedumazet@google.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "6b8fc5c4eba92b5cd3c9ca0d926e99831604f81e",
      "tree": "ff3dafa60edf6c064aefc1003fa41863aa624f3b",
      "parents": [
        "e043257dde697ded17ed99f280cdb7643fdc007a"
      ],
      "author": {
        "name": "Chema Gonzalez",
        "email": "chema@google.com",
        "time": "Fri Sep 07 13:40:50 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:44 2012 +0900"
      },
      "message": "net: small bug on rxhash calculation\n\n[ Upstream commit 6862234238e84648c305526af2edd98badcad1e0 ]\n\nIn the current rxhash calculation function, while the\nsorting of the ports/addrs is coherent (you get the\nsame rxhash for packets sharing the same 4-tuple, in\nboth directions), ports and addrs are sorted\nindependently. This implies packets from a connection\nbetween the same addresses but crossed ports hash to\nthe same rxhash.\n\nFor example, traffic between A\u003dS:l and B\u003dL:s is hashed\n(in both directions) from {L, S, {s, l}}. The same\nrxhash is obtained for packets between C\u003dS:s and D\u003dL:l.\n\nThis patch ensures that you either swap both addrs and ports,\nor you swap none. Traffic between A and B, and traffic\nbetween C and D, get their rxhash from different sources\n({L, S, {l, s}} for A\u003c-\u003eB, and {L, S, {s, l}} for C\u003c-\u003eD)\n\nThe patch is co-written with Eric Dumazet \u003cedumazet@google.com\u003e\n\nSigned-off-by: Chema Gonzalez \u003cchema@google.com\u003e\nSigned-off-by: Eric Dumazet \u003cedumazet@google.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "e043257dde697ded17ed99f280cdb7643fdc007a",
      "tree": "bd0160da8f1998f08ddf12b2f862ae3a6d1d7521",
      "parents": [
        "8d16c6268b7c3af2ce4f58de903588489e037fcf"
      ],
      "author": {
        "name": "Xiaodong Xu",
        "email": "stid.smth@gmail.com",
        "time": "Sat Sep 22 00:09:32 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:44 2012 +0900"
      },
      "message": "pppoe: drop PPPOX_ZOMBIEs in pppoe_release\n\n[ Upstream commit 2b018d57ff18e5405823e5cb59651a5b4d946d7b ]\n\nWhen PPPOE is running over a virtual ethernet interface (e.g., a\nbonding interface) and the user tries to delete the interface in case\nthe PPPOE state is ZOMBIE, the kernel will loop forever while\nunregistering net_device for the reference count is not decreased to\nzero which should have been done with dev_put().\n\nSigned-off-by: Xiaodong Xu \u003cstid.smth@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "8d16c6268b7c3af2ce4f58de903588489e037fcf",
      "tree": "a4d19ab5bf251a234e882db1fb39e79c1fbe6e57",
      "parents": [
        "2033554a2fe3c5e54764f2f1dba0baff3261f8b5"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Mon Sep 03 04:27:42 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:44 2012 +0900"
      },
      "message": "sctp: Don\u0027t charge for data in sndbuf again when transmitting packet\n\n[ Upstream commit 4c3a5bdae293f75cdf729c6c00124e8489af2276 ]\n\nSCTP charges wmem_alloc via sctp_set_owner_w() in sctp_sendmsg() and via\nskb_set_owner_w() in sctp_packet_transmit(). If a sender runs out of\nsndbuf it will sleep in sctp_wait_for_sndbuf() and expects to be waken up\nby __sctp_write_space().\n\nBuffer space charged via sctp_set_owner_w() is released in sctp_wfree()\nwhich calls __sctp_write_space() directly.\n\nBuffer space charged via skb_set_owner_w() is released via sock_wfree()\nwhich calls sk-\u003esk_write_space() _if_ SOCK_USE_WRITE_QUEUE is not set.\nsctp_endpoint_init() sets SOCK_USE_WRITE_QUEUE on all sockets.\n\nTherefore if sctp_packet_transmit() manages to queue up more than sndbuf\nbytes, sctp_wait_for_sndbuf() will never be woken up again unless it is\ninterrupted by a signal.\n\nThis could be fixed by clearing the SOCK_USE_WRITE_QUEUE flag but ...\n\nCharging for the data twice does not make sense in the first place, it\nleads to overcharging sndbuf by a factor 2. Therefore this patch only\ncharges a single byte in wmem_alloc when transmitting an SCTP packet to\nensure that the socket stays alive until the packet has been released.\n\nThis means that control chunks are no longer accounted for in wmem_alloc\nwhich I believe is not a problem as skb-\u003etruesize will typically lead\nto overcharging anyway and thus compensates for any control overhead.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nCC: Vlad Yasevich \u003cvyasevic@redhat.com\u003e\nCC: Neil Horman \u003cnhorman@tuxdriver.com\u003e\nCC: David Miller \u003cdavem@davemloft.net\u003e\nAcked-by: Vlad Yasevich \u003cvyasevich@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "2033554a2fe3c5e54764f2f1dba0baff3261f8b5",
      "tree": "ac3133307617931783ead5088f05e6de216a89c4",
      "parents": [
        "410eafac650a906e990351a01ec70451064df83d"
      ],
      "author": {
        "name": "Michal Kubeček",
        "email": "mkubecek@suse.cz",
        "time": "Fri Sep 14 04:59:52 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:43 2012 +0900"
      },
      "message": "tcp: flush DMA queue before sk_wait_data if rcv_wnd is zero\n\n[ Upstream commit 15c041759bfcd9ab0a4e43f1c16e2644977d0467 ]\n\nIf recv() syscall is called for a TCP socket so that\n  - IOAT DMA is used\n  - MSG_WAITALL flag is used\n  - requested length is bigger than sk_rcvbuf\n  - enough data has already arrived to bring rcv_wnd to zero\nthen when tcp_recvmsg() gets to calling sk_wait_data(), receive\nwindow can be still zero while sk_async_wait_queue exhausts\nenough space to keep it zero. As this queue isn\u0027t cleaned until\nthe tcp_service_net_dma() call, sk_wait_data() cannot receive\nany data and blocks forever.\n\nIf zero receive window and non-empty sk_async_wait_queue is\ndetected before calling sk_wait_data(), process the queue first.\n\nSigned-off-by: Michal Kubecek \u003cmkubecek@suse.cz\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "410eafac650a906e990351a01ec70451064df83d",
      "tree": "9fc349433e6179e90b8234bd32c2ccca274b18ca",
      "parents": [
        "d5e36b089edcc8179d4640e1a8e5bca6fb74409e"
      ],
      "author": {
        "name": "Wei Yongjun",
        "email": "yongjun_wei@trendmicro.com.cn",
        "time": "Thu Sep 20 18:29:56 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:43 2012 +0900"
      },
      "message": "ipv6: fix return value check in fib6_add()\n\n[ Upstream commit f950c0ecc78f745e490d615280e031de4dbb1306 ]\n\nIn case of error, the function fib6_add_1() returns ERR_PTR()\nor NULL pointer. The ERR_PTR() case check is missing in fib6_add().\n\ndpatch engine is used to generated this patch.\n(https://github.com/weiyj/dpatch)\n\nSigned-off-by: Wei Yongjun \u003cyongjun_wei@trendmicro.com.cn\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "d5e36b089edcc8179d4640e1a8e5bca6fb74409e",
      "tree": "8e9cd19cc439a68a260f74f646f1a059f40dada1",
      "parents": [
        "17de307472bf21479e6d7c35211204b6ea186a7c"
      ],
      "author": {
        "name": "Nicolas Dichtel",
        "email": "nicolas.dichtel@6wind.com",
        "time": "Wed Sep 26 00:04:55 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:43 2012 +0900"
      },
      "message": "ipv6: del unreachable route when an addr is deleted on lo\n\n[ Upstream commit 64c6d08e6490fb18cea09bb03686c149946bd818 ]\n\nWhen an address is added on loopback (ip -6 a a 2002::1/128 dev lo), two routes\nare added:\n - one in the local table:\n    local 2002::1 via :: dev lo  proto none  metric 0\n - one the in main table (for the prefix):\n    unreachable 2002::1 dev lo  proto kernel  metric 256  error -101\n\nWhen the address is deleted, the route inserted in the main table remains\nbecause we use rt6_lookup(), which returns NULL when dst-\u003eerror is set, which\nis the case here! Thus, it is better to use ip6_route_lookup() to avoid this\nkind of filter.\n\nSigned-off-by: Nicolas Dichtel \u003cnicolas.dichtel@6wind.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "17de307472bf21479e6d7c35211204b6ea186a7c",
      "tree": "e90915dc70367e2252e35f2af7a9aeea992ceb30",
      "parents": [
        "2ab08687cf48805c5abd0f9a785e09181eda9492"
      ],
      "author": {
        "name": "Gao feng",
        "email": "gaofeng@cn.fujitsu.com",
        "time": "Wed Sep 19 19:25:34 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:43 2012 +0900"
      },
      "message": "ipv6: release reference of ip6_null_entry\u0027s dst entry in __ip6_del_rt\n\n[ Upstream commit 6825a26c2dc21eb4f8df9c06d3786ddec97cf53b ]\n\nas we hold dst_entry before we call __ip6_del_rt,\nso we should alse call dst_release not only return\n-ENOENT when the rt6_info is ip6_null_entry.\n\nand we already hold the dst entry, so I think it\u0027s\nsafe to call dst_release out of the write-read lock.\n\nSigned-off-by: Gao feng \u003cgaofeng@cn.fujitsu.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "2ab08687cf48805c5abd0f9a785e09181eda9492",
      "tree": "0cb7d9dfdd3f2e6c27541151c414fe70896d054b",
      "parents": [
        "97d5d3295198279362552d9b810c088d3410da23"
      ],
      "author": {
        "name": "Antonio Quartulli",
        "email": "ordex@autistici.org",
        "time": "Tue Oct 02 06:14:17 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:43 2012 +0900"
      },
      "message": "8021q: fix mac_len recomputation in vlan_untag()\n\n[ Upstream commit 5316cf9a5197eb80b2800e1acadde287924ca975 ]\n\nskb_reset_mac_len() relies on the value of the skb-\u003enetwork_header pointer,\ntherefore we must wait for such pointer to be recalculated before computing\nthe new mac_len value.\n\nSigned-off-by: Antonio Quartulli \u003cordex@autistici.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "97d5d3295198279362552d9b810c088d3410da23",
      "tree": "0ec8aa26c632c5136937829cc33d337d418e01de",
      "parents": [
        "5ee708f19bd6a1da1d7bab5916382bbbfba4edbb"
      ],
      "author": {
        "name": "Lennart Sorensen",
        "email": "lsorense@csclub.uwaterloo.ca",
        "time": "Fri Sep 07 12:14:02 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:42 2012 +0900"
      },
      "message": "sierra_net: Endianess bug fix.\n\n[ Upstream commit 2120c52da6fe741454a60644018ad2a6abd957ac ]\n\nI discovered I couldn\u0027t get sierra_net to work on a powerpc.  Turns out\nthe firmware attribute check assumes the system is little endian and\nhence fails because the attributes is a 16 bit value.\n\nSigned-off-by: Len Sorensen \u003clsorense@csclub.uwaterloo.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "5ee708f19bd6a1da1d7bab5916382bbbfba4edbb",
      "tree": "323985eff3ef122f5199587bac04a2ca44a5f7dd",
      "parents": [
        "52ee75479f2aea816d8bb6a9d6caf5c1ebb36724"
      ],
      "author": {
        "name": "Paolo Valente",
        "email": "paolo.valente@unimore.it",
        "time": "Sat Sep 15 00:41:35 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:42 2012 +0900"
      },
      "message": "pkt_sched: fix virtual-start-time update in QFQ\n\n[ Upstream commit 71261956973ba9e0637848a5adb4a5819b4bae83 ]\n\nIf the old timestamps of a class, say cl, are stale when the class\nbecomes active, then QFQ may assign to cl a much higher start time\nthan the maximum value allowed. This may happen when QFQ assigns to\nthe start time of cl the finish time of a group whose classes are\ncharacterized by a higher value of the ratio\nmax_class_pkt/weight_of_the_class with respect to that of\ncl. Inserting a class with a too high start time into the bucket list\ncorrupts the data structure and may eventually lead to crashes.\nThis patch limits the maximum start time assigned to a class.\n\nSigned-off-by: Paolo Valente \u003cpaolo.valente@unimore.it\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "52ee75479f2aea816d8bb6a9d6caf5c1ebb36724",
      "tree": "e3f3d348712777a3c47c0376ba2d970e71341dbb",
      "parents": [
        "6720119023f635bd8c285530a7092716c23bdfcc"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "edumazet@google.com",
        "time": "Tue Sep 11 13:11:12 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:42 2012 +0900"
      },
      "message": "net-sched: sch_cbq: avoid infinite loop\n\n[ Upstream commit bdfc87f7d1e253e0a61e2fc6a75ea9d76f7fc03a ]\n\nIts possible to setup a bad cbq configuration leading to\nan infinite loop in cbq_classify()\n\nDEV_OUT\u003deth0\nICMP\u003d\"match ip protocol 1 0xff\"\nU32\u003d\"protocol ip u32\"\nDST\u003d\"match ip dst\"\ntc qdisc add dev $DEV_OUT root handle 1: cbq avpkt 1000 \\\n\tbandwidth 100mbit\ntc class add dev $DEV_OUT parent 1: classid 1:1 cbq \\\n\trate 512kbit allot 1500 prio 5 bounded isolated\ntc filter add dev $DEV_OUT parent 1: prio 3 $U32 \\\n\t$ICMP $DST 192.168.3.234 flowid 1:\n\nReported-by: Denys Fedoryschenko \u003cdenys@visp.net.lb\u003e\nTested-by: Denys Fedoryschenko \u003cdenys@visp.net.lb\u003e\nSigned-off-by: Eric Dumazet \u003cedumazet@google.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "6720119023f635bd8c285530a7092716c23bdfcc",
      "tree": "f973bf5a5dcc2f7d131f8ca322eb6ad473811701",
      "parents": [
        "ec7fd138e2e690efff5eaec279ebc2c4740589e4"
      ],
      "author": {
        "name": "Nikolay Aleksandrov",
        "email": "nikolay@redhat.com",
        "time": "Fri Sep 14 05:50:03 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:42 2012 +0900"
      },
      "message": "netxen: check for root bus in netxen_mask_aer_correctable\n\n[ Upstream commit e4d1aa40e363ed3e0486aeeeb0d173f7f822737e ]\n\nAdd a check if pdev-\u003ebus-\u003eself \u003d\u003d NULL (root bus). When attaching\na netxen NIC to a VM it can be on the root bus and the guest would\ncrash in netxen_mask_aer_correctable() because of a NULL pointer\ndereference if CONFIG_PCIEAER is present.\n\nSigned-off-by: Nikolay Aleksandrov \u003cnikolay@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "ec7fd138e2e690efff5eaec279ebc2c4740589e4",
      "tree": "b6f888451525ee5c738bdac70fc8002e0600a147",
      "parents": [
        "f7ee46fb594cf2c3dd3a96457a028336fb34d5a6"
      ],
      "author": {
        "name": "Florian Fainelli",
        "email": "florian@openwrt.org",
        "time": "Mon Sep 10 14:06:58 2012 +0200"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:42 2012 +0900"
      },
      "message": "ixp4xx_hss: fix build failure due to missing linux/module.h inclusion\n\n[ Upstream commit 0b836ddde177bdd5790ade83772860940bd481ea ]\n\nCommit 36a1211970193ce215de50ed1e4e1272bc814df1 (netprio_cgroup.h:\ndont include module.h from other includes) made the following build\nerror on ixp4xx_hss pop up:\n\n  CC [M]  drivers/net/wan/ixp4xx_hss.o\n drivers/net/wan/ixp4xx_hss.c:1412:20: error: expected \u0027;\u0027, \u0027,\u0027 or \u0027)\u0027\n before string constant\n drivers/net/wan/ixp4xx_hss.c:1413:25: error: expected \u0027;\u0027, \u0027,\u0027 or \u0027)\u0027\n before string constant\n drivers/net/wan/ixp4xx_hss.c:1414:21: error: expected \u0027;\u0027, \u0027,\u0027 or \u0027)\u0027\n before string constant\n drivers/net/wan/ixp4xx_hss.c:1415:19: error: expected \u0027;\u0027, \u0027,\u0027 or \u0027)\u0027\n before string constant\n make[8]: *** [drivers/net/wan/ixp4xx_hss.o] Error 1\n\nThis was previously hidden because ixp4xx_hss includes linux/hdlc.h which\nincludes linux/netdevice.h which includes linux/netprio_cgroup.h which\nused to include linux/module.h. The real issue was actually present since\nthe initial commit that added this driver since it uses macros from\nlinux/module.h without including this file.\n\nSigned-off-by: Florian Fainelli \u003cflorian@openwrt.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "f7ee46fb594cf2c3dd3a96457a028336fb34d5a6",
      "tree": "91830faa9d900b7d26d3f71686afb2fe1e829c6f",
      "parents": [
        "53bf1469924e07385b4493d3cbd78551d4afaaa3"
      ],
      "author": {
        "name": "htbegin",
        "email": "hotforest@gmail.com",
        "time": "Mon Oct 01 16:42:43 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:41 2012 +0900"
      },
      "message": "net: ethernet: davinci_cpdma: decrease the desc count when cleaning up the remaining packets\n\n[ Upstream commit ffb5ba90017505a19e238e986e6d33f09e4df765 ]\n\nchan-\u003ecount is used by rx channel. If the desc count is not updated by\nthe clean up loop in cpdma_chan_stop, the value written to the rxfree\nregister in cpdma_chan_start will be incorrect.\n\nSigned-off-by: Tao Hou \u003chotforest@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "53bf1469924e07385b4493d3cbd78551d4afaaa3",
      "tree": "26fd323abf51bc1e9a5362b3ebbd0869425bea6d",
      "parents": [
        "743b911d8b2214bfa9ecd1631edbe6f61f8fdced"
      ],
      "author": {
        "name": "Mathias Krause",
        "email": "minipli@googlemail.com",
        "time": "Thu Sep 20 10:01:49 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:41 2012 +0900"
      },
      "message": "xfrm_user: ensure user supplied esn replay window is valid\n\n[ Upstream commit ecd7918745234e423dd87fcc0c077da557909720 ]\n\nThe current code fails to ensure that the netlink message actually\ncontains as many bytes as the header indicates. If a user creates a new\nstate or updates an existing one but does not supply the bytes for the\nwhole ESN replay window, the kernel copies random heap bytes into the\nreplay bitmap, the ones happen to follow the XFRMA_REPLAY_ESN_VAL\nnetlink attribute. This leads to following issues:\n\n1. The replay window has random bits set confusing the replay handling\n   code later on.\n\n2. A malicious user could use this flaw to leak up to ~3.5kB of heap\n   memory when she has access to the XFRM netlink interface (requires\n   CAP_NET_ADMIN).\n\nKnown users of the ESN replay window are strongSwan and Steffen\u0027s\niproute2 patch (\u003chttp://patchwork.ozlabs.org/patch/85962/\u003e). The latter\nuses the interface with a bitmap supplied while the former does not.\nstrongSwan is therefore prone to run into issue 1.\n\nTo fix both issues without breaking existing userland allow using the\nXFRMA_REPLAY_ESN_VAL netlink attribute with either an empty bitmap or a\nfully specified one. For the former case we initialize the in-kernel\nbitmap with zero, for the latter we copy the user supplied bitmap. For\nstate updates the full bitmap must be supplied.\n\nTo prevent overflows in the bitmap length calculation the maximum size\nof bmp_len is limited to 128 by this patch -- resulting in a maximum\nreplay window of 4096 packets. This should be sufficient for all real\nlife scenarios (RFC 4303 recommends a default replay window size of 64).\n\nSigned-off-by: Mathias Krause \u003cminipli@googlemail.com\u003e\nCc: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nCc: Martin Willi \u003cmartin@revosec.ch\u003e\nCc: Ben Hutchings \u003cbhutchings@solarflare.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "743b911d8b2214bfa9ecd1631edbe6f61f8fdced",
      "tree": "7266729acce0b72e62a1339c67343a152f34e60a",
      "parents": [
        "0c5e37586ef83845acbae1738e693bc97c12d4c3"
      ],
      "author": {
        "name": "Mathias Krause",
        "email": "minipli@googlemail.com",
        "time": "Wed Sep 19 11:33:43 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:41 2012 +0900"
      },
      "message": "xfrm_user: don\u0027t copy esn replay window twice for new states\n\n[ Upstream commit e3ac104d41a97b42316915020ba228c505447d21 ]\n\nThe ESN replay window was already fully initialized in\nxfrm_alloc_replay_state_esn(). No need to copy it again.\n\nSigned-off-by: Mathias Krause \u003cminipli@googlemail.com\u003e\nCc: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nAcked-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "0c5e37586ef83845acbae1738e693bc97c12d4c3",
      "tree": "09336b4613715c597972b251a5dd8b8b8fed7a36",
      "parents": [
        "97f96eab8eb32f3178439f73acca4e286c091435"
      ],
      "author": {
        "name": "Mathias Krause",
        "email": "minipli@googlemail.com",
        "time": "Wed Sep 19 11:33:41 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:41 2012 +0900"
      },
      "message": "xfrm_user: fix info leak in copy_to_user_tmpl()\n\n[ Upstream commit 1f86840f897717f86d523a13e99a447e6a5d2fa5 ]\n\nThe memory used for the template copy is a local stack variable. As\nstruct xfrm_user_tmpl contains multiple holes added by the compiler for\nalignment, not initializing the memory will lead to leaking stack bytes\nto userland. Add an explicit memset(0) to avoid the info leak.\n\nInitial version of the patch by Brad Spengler.\n\nSigned-off-by: Mathias Krause \u003cminipli@googlemail.com\u003e\nCc: Brad Spengler \u003cspender@grsecurity.net\u003e\nAcked-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "97f96eab8eb32f3178439f73acca4e286c091435",
      "tree": "d7f2526d4bd16dadffc4ae2237ddf148d1e767a3",
      "parents": [
        "d5f1f7c230df5f2a198fb231547f1b298594c709"
      ],
      "author": {
        "name": "Mathias Krause",
        "email": "minipli@googlemail.com",
        "time": "Wed Sep 19 11:33:40 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:41 2012 +0900"
      },
      "message": "xfrm_user: fix info leak in copy_to_user_policy()\n\n[ Upstream commit 7b789836f434c87168eab067cfbed1ec4783dffd ]\n\nThe memory reserved to dump the xfrm policy includes multiple padding\nbytes added by the compiler for alignment (padding bytes in struct\nxfrm_selector and struct xfrm_userpolicy_info). Add an explicit\nmemset(0) before filling the buffer to avoid the heap info leak.\n\nSigned-off-by: Mathias Krause \u003cminipli@googlemail.com\u003e\nAcked-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "d5f1f7c230df5f2a198fb231547f1b298594c709",
      "tree": "1295ee4909bacd777b6d9652703efb97ac58ed01",
      "parents": [
        "37d61a27a59671d88279dcc4d331f950d4901d4d"
      ],
      "author": {
        "name": "Mathias Krause",
        "email": "minipli@googlemail.com",
        "time": "Wed Sep 19 11:33:39 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:41 2012 +0900"
      },
      "message": "xfrm_user: fix info leak in copy_to_user_state()\n\n[ Upstream commit f778a636713a435d3a922c60b1622a91136560c1 ]\n\nThe memory reserved to dump the xfrm state includes the padding bytes of\nstruct xfrm_usersa_info added by the compiler for alignment (7 for\namd64, 3 for i386). Add an explicit memset(0) before filling the buffer\nto avoid the info leak.\n\nSigned-off-by: Mathias Krause \u003cminipli@googlemail.com\u003e\nAcked-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "37d61a27a59671d88279dcc4d331f950d4901d4d",
      "tree": "cd9a28ee5484e21e322634d00391658ec8e05259",
      "parents": [
        "a91af73f445cacfb0db4df3eb2e3d0ddeff43893"
      ],
      "author": {
        "name": "Mathias Krause",
        "email": "minipli@googlemail.com",
        "time": "Wed Sep 19 11:33:38 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:40 2012 +0900"
      },
      "message": "xfrm_user: fix info leak in copy_to_user_auth()\n\n[ Upstream commit 4c87308bdea31a7b4828a51f6156e6f721a1fcc9 ]\n\ncopy_to_user_auth() fails to initialize the remainder of alg_name and\ntherefore discloses up to 54 bytes of heap memory via netlink to\nuserland.\n\nUse strncpy() instead of strcpy() to fill the trailing bytes of alg_name\nwith null bytes.\n\nSigned-off-by: Mathias Krause \u003cminipli@googlemail.com\u003e\nAcked-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "a91af73f445cacfb0db4df3eb2e3d0ddeff43893",
      "tree": "a4fb8945340d3ee94f5f427d1a4e61250ede0d0f",
      "parents": [
        "f38b334adca51bbf18ad549a9736c0f86bb4a375"
      ],
      "author": {
        "name": "Li RongQing",
        "email": "roy.qing.li@gmail.com",
        "time": "Mon Sep 17 22:40:10 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:40 2012 +0900"
      },
      "message": "xfrm: fix a read lock imbalance in make_blackhole\n\n[ Upstream commit 433a19548061bb5457b6ab77ed7ea58ca6e43ddb ]\n\nif xfrm_policy_get_afinfo returns 0, it has already released the read\nlock, xfrm_policy_put_afinfo should not be called again.\n\nSigned-off-by: Li RongQing \u003croy.qing.li@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "f38b334adca51bbf18ad549a9736c0f86bb4a375",
      "tree": "827539bccdea31dbaad05dc0db4a738227278a0e",
      "parents": [
        "555144b63d57c0df7a2677868f83957a34135207"
      ],
      "author": {
        "name": "Mathias Krause",
        "email": "minipli@googlemail.com",
        "time": "Fri Sep 14 09:58:32 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:40 2012 +0900"
      },
      "message": "xfrm_user: return error pointer instead of NULL #2\n\n[ Upstream commit c25463722509fef0ed630b271576a8c9a70236f3 ]\n\nWhen dump_one_policy() returns an error, e.g. because of a too small\nbuffer to dump the whole xfrm policy, xfrm_policy_netlink() returns\nNULL instead of an error pointer. But its caller expects an error\npointer and therefore continues to operate on a NULL skbuff.\n\nSigned-off-by: Mathias Krause \u003cminipli@googlemail.com\u003e\nAcked-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "555144b63d57c0df7a2677868f83957a34135207",
      "tree": "f25e99ec2bf0436cc9d6a190ad1498e58bd8f378",
      "parents": [
        "20eb20851385e53d27dff9ed79c4e68e58e3d9da"
      ],
      "author": {
        "name": "Mathias Krause",
        "email": "minipli@googlemail.com",
        "time": "Thu Sep 13 11:41:26 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:40 2012 +0900"
      },
      "message": "xfrm_user: return error pointer instead of NULL\n\n[ Upstream commit 864745d291b5ba80ea0bd0edcbe67273de368836 ]\n\nWhen dump_one_state() returns an error, e.g. because of a too small\nbuffer to dump the whole xfrm state, xfrm_state_netlink() returns NULL\ninstead of an error pointer. But its callers expect an error pointer\nand therefore continue to operate on a NULL skbuff.\n\nThis could lead to a privilege escalation (execution of user code in\nkernel context) if the attacker has CAP_NET_ADMIN and is able to map\naddress 0.\n\nSigned-off-by: Mathias Krause \u003cminipli@googlemail.com\u003e\nAcked-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "20eb20851385e53d27dff9ed79c4e68e58e3d9da",
      "tree": "b3a5a5e16f823d5ca39f44124bf18b5f63fa2a2f",
      "parents": [
        "657197486950474bf30290344339fd0914fe99c9"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Tue Sep 04 00:03:29 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:40 2012 +0900"
      },
      "message": "xfrm: Workaround incompatibility of ESN and async crypto\n\n[ Upstream commit 3b59df46a449ec9975146d71318c4777ad086744 ]\n\nESN for esp is defined in RFC 4303. This RFC assumes that the\nsequence number counters are always up to date. However,\nthis is not true if an async crypto algorithm is employed.\n\nIf the sequence number counters are not up to date on sequence\nnumber check, we may incorrectly update the upper 32 bit of\nthe sequence number. This leads to a DOS.\n\nWe workaround this by comparing the upper sequence number,\n(used for authentication) with the upper sequence number\ncomputed after the async processing. We drop the packet\nif these numbers are different.\n\nTo do this, we introduce a recheck function that does this\ncheck in the ESN case.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "657197486950474bf30290344339fd0914fe99c9",
      "tree": "38cb93775d584be1915d08ab3c044d868ed8c509",
      "parents": [
        "e878ead68937be79e530ea9bf568766ab454e3ee"
      ],
      "author": {
        "name": "Michal Schmidt",
        "email": "mschmidt@redhat.com",
        "time": "Thu Sep 13 12:59:44 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:40 2012 +0900"
      },
      "message": "bnx2x: fix rx checksum validation for IPv6\n\n[ Upstream commit e488921f44765e8ab6c48ca35e3f6b78df9819df ]\n\nCommit d6cb3e41 \"bnx2x: fix checksum validation\" caused a performance\nregression for IPv6. Rx checksum offload does not work. IPv6 packets\nare passed to the stack with CHECKSUM_NONE.\n\nThe hardware obviously cannot perform IP checksum validation for IPv6,\nbecause there is no checksum in the IPv6 header. This should not prevent\nus from setting CHECKSUM_UNNECESSARY.\n\nTested on BCM57711.\n\nSigned-off-by: Michal Schmidt \u003cmschmidt@redhat.com\u003e\nAcked-by: Eric Dumazet \u003cedumazet@google.com\u003e\nAcked-by: Eilon Greenstein \u003ceilong@broadcom.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "e878ead68937be79e530ea9bf568766ab454e3ee",
      "tree": "415bbb903c16357d9679316154875a6a7e4fcd2a",
      "parents": [
        "0699c6dd66e7083f837cfe620837ddcf10649b89"
      ],
      "author": {
        "name": "Yuta Ando",
        "email": "yuta.and@gmail.com",
        "time": "Mon Oct 01 23:24:30 2012 +0900"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:39 2012 +0900"
      },
      "message": "localmodconfig: Fix localyesconfig to set to \u0027y\u0027 not \u0027m\u0027\n\ncommit 4eae518d4b01b0cbf2f0d8edb5a6f3d6245ee8fb upstream.\n\nThe kbuild target \u0027localyesconfig\u0027 has been same as \u0027localmodconfig\u0027\nsince the commit 50bce3e \"kconfig/streamline_config.pl: merge\nlocal{mod,yes}config\". The commit expects this script generates\ndifferent configure depending on target, but it was not yet implemented.\n\nSo I added code that sets to \u0027yes\u0027 when target is \u0027localyesconfig\u0027.\n\nLink: http://lkml.kernel.org/r/1349101470-12243-1-git-send-email-yuta.and@gmail.com\n\nSigned-off-by: Yuta Ando \u003cyuta.and@gmail.com\u003e\nCc: linux-kbuild@vger.kernel.org\nSigned-off-by: Steven Rostedt \u003crostedt@rostedt.homelinux.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "0699c6dd66e7083f837cfe620837ddcf10649b89",
      "tree": "3b0c012f2bbd2e3cbe5fffb1efee75217face715",
      "parents": [
        "66307aef43a3a51cccf03f4ca8063cfce1bd4ac1"
      ],
      "author": {
        "name": "Eric Sandeen",
        "email": "sandeen@redhat.com",
        "time": "Sat Aug 18 22:29:40 2012 -0400"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:39 2012 +0900"
      },
      "message": "jbd2: don\u0027t write superblock when if its empty\n\ncommit eeecef0af5ea4efd763c9554cf2bd80fc4a0efd3 upstream.\n\nThis sequence:\n\n# truncate --size\u003d1g fsfile\n# mkfs.ext4 -F fsfile\n# mount -o loop,ro fsfile /mnt\n# umount /mnt\n# dmesg | tail\n\nresults in an IO error when unmounting the RO filesystem:\n\n[  318.020828] Buffer I/O error on device loop1, logical block 196608\n[  318.027024] lost page write due to I/O error on loop1\n[  318.032088] JBD2: Error -5 detected when updating journal superblock for loop1-8.\n\nThis was a regression introduced by commit 24bcc89c7e7c: \"jbd2: split\nupdating of journal superblock and marking journal empty\".\n\nSigned-off-by: Eric Sandeen \u003csandeen@redhat.com\u003e\nSigned-off-by: \"Theodore Ts\u0027o\" \u003ctytso@mit.edu\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "66307aef43a3a51cccf03f4ca8063cfce1bd4ac1",
      "tree": "397533702bad69ca0d9e9530879895f188653eb1",
      "parents": [
        "24a0c2063c805e9cf1f3f418bb7f444b5b3f0e4e"
      ],
      "author": {
        "name": "Tejun Heo",
        "email": "tj@kernel.org",
        "time": "Fri Aug 03 10:30:45 2012 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:39 2012 +0900"
      },
      "message": "workqueue: add missing smp_wmb() in process_one_work()\n\ncommit 959d1af8cffc8fd38ed53e8be1cf4ab8782f9c00 upstream.\n\nWORK_STRUCT_PENDING is used to claim ownership of a work item and\nprocess_one_work() releases it before starting execution.  When\nsomeone else grabs PENDING, all pre-release updates to the work item\nshould be visible and all updates made by the new owner should happen\nafterwards.\n\nGrabbing PENDING uses test_and_set_bit() and thus has a full barrier;\nhowever, clearing doesn\u0027t have a matching wmb.  Given the preceding\nspin_unlock and use of clear_bit, I don\u0027t believe this can be a\nproblem on an actual machine and there hasn\u0027t been any related report\nbut it still is theretically possible for clear_pending to permeate\nupwards and happen before work-\u003eentry update.\n\nAdd an explicit smp_wmb() before work_clear_pending().\n\nSigned-off-by: Tejun Heo \u003ctj@kernel.org\u003e\nCc: Oleg Nesterov \u003coleg@redhat.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "24a0c2063c805e9cf1f3f418bb7f444b5b3f0e4e",
      "tree": "10eb417364c6a95b2614c2c4f6d353da70f54c97",
      "parents": [
        "a332509fcd9064cae48d26e09aec46e08247223b"
      ],
      "author": {
        "name": "Feng Hong",
        "email": "hongfeng@marvell.com",
        "time": "Wed Sep 19 14:16:00 2012 +0200"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:39 2012 +0900"
      },
      "message": "PM / Sleep: use resume event when call dpm_resume_early\n\ncommit 997a031107ec962967ce36db9bc500f1fad491c1 upstream.\n\nWhen dpm_suspend_noirq fail, state is PMSG_SUSPEND,\nshould change to PMSG_RESUME when dpm_resume_early is called\n\nSigned-off-by: Feng Hong \u003chongfeng@marvell.com\u003e\nSigned-off-by: Raul Xiong \u003cxjian@marvell.com\u003e\nSigned-off-by: Neil Zhang \u003czhangwm@marvell.com\u003e\nSigned-off-by: Rafael J. Wysocki \u003crjw@sisk.pl\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "a332509fcd9064cae48d26e09aec46e08247223b",
      "tree": "b898a8df004f44ef4c78adb8c78dd4fcc865e9e2",
      "parents": [
        "ed55202fda5c68e44464cd5afdc819a8721b601a"
      ],
      "author": {
        "name": "Alexandre Bounine",
        "email": "alexandre.bounine@idt.com",
        "time": "Thu Oct 04 17:15:48 2012 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:39 2012 +0900"
      },
      "message": "rapidio/rionet: fix multicast packet transmit logic\n\ncommit 7c4a6106d6451fc03c491e61df37c044505d843a upstream.\n\nFix multicast packet transmit logic to account for repetitive transmission\nof single skb:\n- correct check for available buffers (this bug may produce NULL pointer\n  crash dump in case of heavy traffic);\n- update skb user count (incorrect user counter causes a warning dump from\n  net_tx_action routine during multicast transfers in systems with three or\n  more rionet participants).\n\nSigned-off-by: Alexandre Bounine \u003calexandre.bounine@idt.com\u003e\nCc: Matt Porter \u003cmporter@kernel.crashing.org\u003e\nCc: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "ed55202fda5c68e44464cd5afdc819a8721b601a",
      "tree": "60d724803e0e8cccf7795c185820c77b50fa1f40",
      "parents": [
        "9825e3158e302980b71c54b72e90f0624e1cfab3"
      ],
      "author": {
        "name": "Gavin Shan",
        "email": "shangw@linux.vnet.ibm.com",
        "time": "Mon Sep 17 04:34:28 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:39 2012 +0900"
      },
      "message": "powerpc/eeh: Fix crash on converting OF node to edev\n\ncommit 1e38b7140185e384da216aff66a711df09b5afc9 upstream.\n\nThe kernel crash was reported by Alexy. He was testing some feature\nwith private kernel, in which Alexy added some code in pci_pm_reset()\nto read the CSR after writting it. The bug could be reproduced on\nFiber Channel card (Fibre Channel: Emulex Corporation Saturn-X:\nLightPulse Fibre Channel Host Adapter (rev 03)) by the following\ncommands.\n\n\t# echo 1 \u003e /sys/devices/pci0004:01/0004:01:00.0/reset\n\t# rmmod lpfc\n\t# modprobe lpfc\n\nThe history behind the test case is that those additional config\nspace reading operations in pci_pm_reset() would cause EEH error,\nbut we didn\u0027t detect EEH error until \"modprobe lpfc\". For the case,\nall the PCI devices on PCI bus (0004:01) were removed and added after\nPE reset. Then the EEH devices would be figured out again based on\nthe OF nodes. Unfortunately, there were some child OF nodes under\nPCI device (0004:01:00.0), but they didn\u0027t have attached PCI_DN since\nthey\u0027re invisible from PCI domain. However, we were still trying to\nconvert OF node to EEH device without checking on the attached PCI_DN.\nEventually, it caused the kernel crash as follows:\n\nUnable to handle kernel paging request for data at address 0x00000030\nFaulting instruction address: 0xc00000000004d888\ncpu 0x0: Vector: 300 (Data Access) at [c000000fc797b950]\n    pc: c00000000004d888: .eeh_add_device_tree_early+0x78/0x140\n    lr: c00000000004d880: .eeh_add_device_tree_early+0x70/0x140\n    sp: c000000fc797bbd0\n   msr: 8000000000009032\n   dar: 30\n dsisr: 40000000\n  current \u003d 0xc000000fc78d9f70\n  paca    \u003d 0xc00000000edb0000   softe: 0        irq_happened: 0x00\n    pid   \u003d 2951, comm \u003d eehd\nenter ? for help\n[c000000fc797bc50] c00000000004d848 .eeh_add_device_tree_early+0x38/0x140\n[c000000fc797bcd0] c00000000004d848 .eeh_add_device_tree_early+0x38/0x140\n[c000000fc797bd50] c000000000051b54 .pcibios_add_pci_devices+0x34/0x190\n[c000000fc797bde0] c00000000004fb10 .eeh_reset_device+0x100/0x160\n[c000000fc797be70] c0000000000502dc .eeh_handle_event+0x19c/0x300\n[c000000fc797bf00] c000000000050570 .eeh_event_handler+0x130/0x1a0\n[c000000fc797bf90] c000000000020138 .kernel_thread+0x54/0x70\n\nThe patch changes of_node_to_eeh_dev() and just returns NULL if the\npassed OF node doesn\u0027t have attached PCI_DN.\n\nReported-by: Alexey Kardashevskiy \u003caik@ozlabs.ru\u003e\nSigned-off-by: Gavin Shan \u003cshangw@linux.vnet.ibm.com\u003e\nSigned-off-by: Benjamin Herrenschmidt \u003cbenh@kernel.crashing.org\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "9825e3158e302980b71c54b72e90f0624e1cfab3",
      "tree": "ad239e0cab8597119fbe80c666c4dfcddb8cef16",
      "parents": [
        "0c0b534583fb1c02809e0a3978413fe79f7dac8f"
      ],
      "author": {
        "name": "Rusty Russell",
        "email": "rusty@rustcorp.com.au",
        "time": "Thu Oct 04 12:03:25 2012 +0930"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:38 2012 +0900"
      },
      "message": "lguest: fix occasional crash in example launcher.\n\ncommit ca16f580a5db7e60bfafe59a50bb133bd3347491 upstream.\n\nWe usually got away with -\u003enext on the final entry being NULL, but it\nfinally bit me.\n\nSigned-off-by: Rusty Russell \u003crusty@rustcorp.com.au\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "0c0b534583fb1c02809e0a3978413fe79f7dac8f",
      "tree": "0c9354e89ad3529c231472531f3285c9e333e111",
      "parents": [
        "03f0a11553d06002af53f2d399da6c711e7d3b40"
      ],
      "author": {
        "name": "Fabio Estevam",
        "email": "fabio.estevam@freescale.com",
        "time": "Thu Oct 04 17:11:16 2012 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:38 2012 +0900"
      },
      "message": "drivers/dma/dmaengine.c: lower the priority of \u0027failed to get\u0027 dma channel message\n\ncommit 0eb5a35801df3c438ce3fc91310a415ea4452c00 upstream.\n\nDo the same as commit a03a202e95fd (\"dmaengine: failure to get a\nspecific DMA channel is not critical\") to get rid of the following\nmessages during kernel boot:\n\n  dmaengine_get: failed to get dma1chan0: (-22)\n  dmaengine_get: failed to get dma1chan1: (-22)\n  dmaengine_get: failed to get dma1chan2: (-22)\n  dmaengine_get: failed to get dma1chan3: (-22)\n  ..\n\nSigned-off-by: Fabio Estevam \u003cfabio.estevam@freescale.com\u003e\nCc: Vinod Koul \u003cvinod.koul@intel.com\u003e\nCc: Dan Williams \u003cdan.j.williams@intel.com\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "03f0a11553d06002af53f2d399da6c711e7d3b40",
      "tree": "04815f7470318d9f7459fa95e0fded1d2c11731e",
      "parents": [
        "3fc49ce67fefd3de38aa72a215eb1a2b68a7e89b"
      ],
      "author": {
        "name": "Martin Michlmayr",
        "email": "tbm@cyrius.com",
        "time": "Thu Oct 04 17:11:25 2012 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:38 2012 +0900"
      },
      "message": "drivers/scsi/atp870u.c: fix bad use of udelay\n\ncommit 0f6d93aa9d96cc9022b51bd10d462b03296be146 upstream.\n\nThe ACARD driver calls udelay() with a value \u003e 2000, which leads to to\nthe following compilation error on ARM:\n\n  ERROR: \"__bad_udelay\" [drivers/scsi/atp870u.ko] undefined!\n  make[1]: *** [__modpost] Error 1\n\nThis is because udelay is defined on ARM, roughly speaking, as\n\n\t#define udelay(n) ((n) \u003e 2000 ? __bad_udelay() : \\\n\t\t__const_udelay((n) * ((2199023U*HZ)\u003e\u003e11)))\n\nThe argument to __const_udelay is the number of jiffies to wait divided\nby 4, but this does not work unless the multiplication does not\noverflow, and that is what the build error is designed to prevent.  The\nintended behavior can be achieved by using mdelay to call udelay\nmultiple times in a loop.\n\n[jrnieder@gmail.com: adding context]\nSigned-off-by: Martin Michlmayr \u003ctbm@cyrius.com\u003e\nSigned-off-by: Jonathan Nieder \u003cjrnieder@gmail.com\u003e\nCc: James Bottomley \u003cJames.Bottomley@HansenPartnership.com\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "3fc49ce67fefd3de38aa72a215eb1a2b68a7e89b",
      "tree": "2fc96ba798b7a8d014adcbcd7dbcdb2d93ca6d51",
      "parents": [
        "6d36a9dd1dcdd053ab32f303b94cc1bae5a47f22"
      ],
      "author": {
        "name": "Shawn Guo",
        "email": "shawn.guo@linaro.org",
        "time": "Thu Oct 04 17:12:23 2012 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:38 2012 +0900"
      },
      "message": "kernel/sys.c: call disable_nonboot_cpus() in kernel_restart()\n\ncommit f96972f2dc6365421cf2366ebd61ee4cf060c8d5 upstream.\n\nAs kernel_power_off() calls disable_nonboot_cpus(), we may also want to\nhave kernel_restart() call disable_nonboot_cpus().  Doing so can help\nmachines that require boot cpu be the last alive cpu during reboot to\nsurvive with kernel restart.\n\nThis fixes one reboot issue seen on imx6q (Cortex-A9 Quad).  The machine\nrequires that the restart routine be run on the primary cpu rather than\nsecondary ones.  Otherwise, the secondary core running the restart\nroutine will fail to come to online after reboot.\n\nSigned-off-by: Shawn Guo \u003cshawn.guo@linaro.org\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "6d36a9dd1dcdd053ab32f303b94cc1bae5a47f22",
      "tree": "5df55ecc66f90dfbfce2d1da916abdf476dec604",
      "parents": [
        "03c4441b88fd2614580eeda598623e2b21ec5822"
      ],
      "author": {
        "name": "Davidlohr Bueso",
        "email": "dave@gnu.org",
        "time": "Thu Oct 04 17:13:18 2012 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:38 2012 +0900"
      },
      "message": "lib/gcd.c: prevent possible div by 0\n\ncommit e96875677fb2b7cb739c5d7769824dff7260d31d upstream.\n\nAccount for all properties when a and/or b are 0:\ngcd(0, 0) \u003d 0\ngcd(a, 0) \u003d a\ngcd(0, b) \u003d b\n\nFixes no known problems in current kernels.\n\nSigned-off-by: Davidlohr Bueso \u003cdave@gnu.org\u003e\nCc: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "03c4441b88fd2614580eeda598623e2b21ec5822",
      "tree": "1149da2aedf6c1f64eaaa4c23ca70102f59e3088",
      "parents": [
        "95482ba9494658e69aecf0f97b64f3f2ab82af62"
      ],
      "author": {
        "name": "Mark Brown",
        "email": "broonie@opensource.wolfsonmicro.com",
        "time": "Tue Aug 07 19:42:43 2012 +0100"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:38 2012 +0900"
      },
      "message": "mfd: max8925: Move _IO resources out of ioport_ioresource\n\ncommit bee6e1fa617b1fb7f6f91033428410e05f5ab0ed upstream.\n\nThe removal of mach/io.h from most ARM platforms also set the range of\nvalid IO ports to be empty for most platforms when previously any 32\nbit integer had been valid. This makes it impossible to add IO resources\nas the added range is smaller than that of the root resource for IO ports.\n\nSince we\u0027re not really using IO memory at all fix this by defining our\nown root resource outside the normal tree and make that the parent of\nall IO resources. This also ensures we won\u0027t conflict with read IO ports\nif we ever run on a platform which happens to use them.\n\nSigned-off-by: Mark Brown \u003cbroonie@opensource.wolfsonmicro.com\u003e\nAcked-by: Arnd Bergmann \u003carnd@arndb.de\u003e\nAcked-by: Haojian Zhuang \u003chaojian.zhuang@gmail.com\u003e\nTested-by: Haojian Zhuang \u003chaojian.zhuang@gmail.com\u003e\nSigned-off-by: Samuel Ortiz \u003csameo@linux.intel.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "95482ba9494658e69aecf0f97b64f3f2ab82af62",
      "tree": "45c57b2a899abf802b105b3a5a306fc266ef1053",
      "parents": [
        "2006e6f75e7cb88e0508eeff066834c847ce91b3"
      ],
      "author": {
        "name": "Bjorn Helgaas",
        "email": "bhelgaas@google.com",
        "time": "Wed Jun 20 16:18:29 2012 -0600"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:38 2012 +0900"
      },
      "message": "PCI: acpiphp: check whether _ADR evaluation succeeded\n\ncommit dfb117b3e50c52c7b3416db4a4569224b8db80bb upstream.\n\nCheck whether we evaluated _ADR successfully.  Previously we ignored\nfailure, so we would have used garbage data from the stack as the device\nand function number.\n\nWe return AE_OK so that we ignore only this slot and continue looking\nfor other slots.\n\nFound by Coverity (CID 113981).\n\nSigned-off-by: Bjorn Helgaas \u003cbhelgaas@google.com\u003e\nSigned-off-by: Ben Hutchings \u003cben@decadent.org.uk\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "2006e6f75e7cb88e0508eeff066834c847ce91b3",
      "tree": "ee1049f341dd561ab0e0b024e8ee93a15d52e296",
      "parents": [
        "991e71944f30eb7debd2d00abb749657b409b357"
      ],
      "author": {
        "name": "Lin Ming",
        "email": "ming.m.lin@intel.com",
        "time": "Mon Jul 16 16:30:21 2012 +0800"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:37 2012 +0900"
      },
      "message": "ACPI: run _OSC after ACPI_FULL_INITIALIZATION\n\ncommit fc54ab72959edbf229b65ac74b2f122d799ca002 upstream.\n\nThe _OSC method may exist in module level code,\nso it must be called after ACPI_FULL_INITIALIZATION\n\nOn some new platforms with Zero-Power-Optical-Disk-Drive (ZPODD)\nsupport, this fix is necessary to save power.\n\nSigned-off-by: Lin Ming \u003cming.m.lin@intel.com\u003e\nTested-by: Aaron Lu \u003caaron.lu@intel.com\u003e\nSigned-off-by: Len Brown \u003clen.brown@intel.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "991e71944f30eb7debd2d00abb749657b409b357",
      "tree": "2d0861c4fdd5eb7de36afb4f9fcf8b1e959a5fe2",
      "parents": [
        "63c486377c32dcfd5775c04b4d0cc5bc53990787"
      ],
      "author": {
        "name": "Frank Schäfer",
        "email": "fschaefer.oss@googlemail.com",
        "time": "Sun Sep 09 15:02:19 2012 -0300"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:37 2012 +0900"
      },
      "message": "media: gspca_pac7302: add support for device 1ae7:2001 Speedlink Snappy Microphone SL-6825-SBK\n\ncommit 97d2fbf501e3cf105ac957086c7e40e62e15cdf8 upstream.\n\nSigned-off-by: Frank Schäfer \u003cfschaefer.oss@googlemail.com\u003e\nSigned-off-by: Hans de Goede \u003chdegoede@redhat.com\u003e\nSigned-off-by: Mauro Carvalho Chehab \u003cmchehab@redhat.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "63c486377c32dcfd5775c04b4d0cc5bc53990787",
      "tree": "8979640eadb489172e7c6994dbee88c800df1c60",
      "parents": [
        "63b2f08626e0cacaa038c296df52a7cb504ae318"
      ],
      "author": {
        "name": "Ben Hutchings",
        "email": "ben@decadent.org.uk",
        "time": "Sun Aug 19 19:32:27 2012 -0300"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:37 2012 +0900"
      },
      "message": "media: rc: ite-cir: Initialise ite_dev::rdev earlier\n\ncommit 4b961180ef275035b1538317ffd0e21e80e63e77 upstream.\n\nite_dev::rdev is currently initialised in ite_probe() after\nrc_register_device() returns.  If a newly registered device is opened\nquickly enough, we may enable interrupts and try to use ite_dev::rdev\nbefore it has been initialised.  Move it up to the earliest point we\ncan, right after calling rc_allocate_device().\n\nReported-and-tested-by: YunQiang Su \u003cwzssyqa@gmail.com\u003e\n\nSigned-off-by: Ben Hutchings \u003cben@decadent.org.uk\u003e\nSigned-off-by: Mauro Carvalho Chehab \u003cmchehab@redhat.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "63b2f08626e0cacaa038c296df52a7cb504ae318",
      "tree": "5afc8af20dce59b4c4dae76a4530ff3efd0c52e1",
      "parents": [
        "750025ab1950b5e32e308c446de32c399cf2d6f6"
      ],
      "author": {
        "name": "Alex Williamson",
        "email": "alex.williamson@redhat.com",
        "time": "Fri Nov 11 17:26:44 2011 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:37 2012 +0900"
      },
      "message": "intel-iommu: Default to non-coherent for domains unattached to iommus\n\ncommit 2e12bc29fc5a12242d68e11875db3dd58efad9ff upstream.\n\ndomain_update_iommu_coherency() currently defaults to setting domains\nas coherent when the domain is not attached to any iommus.  This\nallows for a window in domain_context_mapping_one() where such a\ndomain can update context entries non-coherently, and only after\nupdate the domain capability to clear iommu_coherency.\n\nThis can be seen using KVM device assignment on VT-d systems that\ndo not support coherency in the ecap register.  When a device is\nadded to a guest, a domain is created (iommu_coherency \u003d 0), the\ndevice is attached, and ranges are mapped.  If we then hot unplug\nthe device, the coherency is updated and set to the default (1)\nsince no iommus are attached to the domain.  A subsequent attach\nof a device makes use of the same dmar domain (now marked coherent)\nupdates context entries with coherency enabled, and only disables\ncoherency as the last step in the process.\n\nTo fix this, switch domain_update_iommu_coherency() to use the\nsafer, non-coherent default for domains not attached to iommus.\n\nSigned-off-by: Alex Williamson \u003calex.williamson@redhat.com\u003e\nTested-by: Donald Dutile \u003cddutile@redhat.com\u003e\nAcked-by: Donald Dutile \u003cddutile@redhat.com\u003e\nAcked-by: Chris Wright \u003cchrisw@sous-sol.org\u003e\nSigned-off-by: Joerg Roedel \u003cjoerg.roedel@amd.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "750025ab1950b5e32e308c446de32c399cf2d6f6",
      "tree": "4c3abc9b042fae866b187b2b69810585d9cd1be8",
      "parents": [
        "4893cf612a68d26cdbe0e16ba9c42772136e2340"
      ],
      "author": {
        "name": "Michael Wang",
        "email": "wangyun@linux.vnet.ibm.com",
        "time": "Wed Sep 05 10:33:18 2012 +0800"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:37 2012 +0900"
      },
      "message": "slab: fix the DEADLOCK issue on l3 alien lock\n\ncommit 947ca1856a7e60aa6d20536785e6a42dff25aa6e upstream.\n\nDEADLOCK will be report while running a kernel with NUMA and LOCKDEP enabled,\nthe process of this fake report is:\n\n\t   kmem_cache_free()\t//free obj in cachep\n\t-\u003e cache_free_alien()\t//acquire cachep\u0027s l3 alien lock\n\t-\u003e __drain_alien_cache()\n\t-\u003e free_block()\n\t-\u003e slab_destroy()\n\t-\u003e kmem_cache_free()\t//free slab in cachep-\u003eslabp_cache\n\t-\u003e cache_free_alien()\t//acquire cachep-\u003eslabp_cache\u0027s l3 alien lock\n\nSince the cachep and cachep-\u003eslabp_cache\u0027s l3 alien are in the same lock class,\nfake report generated.\n\nThis should not happen since we already have init_lock_keys() which will\nreassign the lock class for both l3 list and l3 alien.\n\nHowever, init_lock_keys() was invoked at a wrong position which is before we\ninvoke enable_cpucache() on each cache.\n\nSince until set slab_state to be FULL, we won\u0027t invoke enable_cpucache()\non caches to build their l3 alien while creating them, so although we invoked\ninit_lock_keys(), the l3 alien lock class won\u0027t change since we don\u0027t have\nthem until invoked enable_cpucache() later.\n\nThis patch will invoke init_lock_keys() after we done enable_cpucache()\ninstead of before to avoid the fake DEADLOCK report.\n\nMichael traced the problem back to a commit in release 3.0.0:\n\ncommit 30765b92ada267c5395fc788623cb15233276f5c\nAuthor: Peter Zijlstra \u003cpeterz@infradead.org\u003e\nDate:   Thu Jul 28 23:22:56 2011 +0200\n\n    slab, lockdep: Annotate the locks before using them\n\n    Fernando found we hit the regular OFF_SLAB \u0027recursion\u0027 before we\n    annotate the locks, cure this.\n\n    The relevant portion of the stack-trace:\n\n    \u003e [    0.000000]  [\u003cc085e24f\u003e] rt_spin_lock+0x50/0x56\n    \u003e [    0.000000]  [\u003cc04fb406\u003e] __cache_free+0x43/0xc3\n    \u003e [    0.000000]  [\u003cc04fb23f\u003e] kmem_cache_free+0x6c/0xdc\n    \u003e [    0.000000]  [\u003cc04fb2fe\u003e] slab_destroy+0x4f/0x53\n    \u003e [    0.000000]  [\u003cc04fb396\u003e] free_block+0x94/0xc1\n    \u003e [    0.000000]  [\u003cc04fc551\u003e] do_tune_cpucache+0x10b/0x2bb\n    \u003e [    0.000000]  [\u003cc04fc8dc\u003e] enable_cpucache+0x7b/0xa7\n    \u003e [    0.000000]  [\u003cc0bd9d3c\u003e] kmem_cache_init_late+0x1f/0x61\n    \u003e [    0.000000]  [\u003cc0bba687\u003e] start_kernel+0x24c/0x363\n    \u003e [    0.000000]  [\u003cc0bba0ba\u003e] i386_start_kernel+0xa9/0xaf\n\n    Reported-by: Fernando Lopez-Lezcano \u003cnando@ccrma.Stanford.EDU\u003e\n    Acked-by: Pekka Enberg \u003cpenberg@kernel.org\u003e\n    Signed-off-by: Peter Zijlstra \u003ca.p.zijlstra@chello.nl\u003e\n    Link: http://lkml.kernel.org/r/1311888176.2617.379.camel@laptop\n    Signed-off-by: Ingo Molnar \u003cmingo@elte.hu\u003e\n\nThe commit moved init_lock_keys() before we build up the alien, so we\nfailed to reclass it.\n\nAcked-by: Christoph Lameter \u003ccl@linux.com\u003e\nTested-by: Paul E. McKenney \u003cpaulmck@linux.vnet.ibm.com\u003e\nSigned-off-by: Michael Wang \u003cwangyun@linux.vnet.ibm.com\u003e\nSigned-off-by: Pekka Enberg \u003cpenberg@kernel.org\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "4893cf612a68d26cdbe0e16ba9c42772136e2340",
      "tree": "b057aa6eda3d88d158efcb9fc5389c928d1387be",
      "parents": [
        "f15977883584e7b52832518c3fef115957d3203b"
      ],
      "author": {
        "name": "Jean Delvare",
        "email": "jdelvare@suse.de",
        "time": "Tue Oct 02 16:42:36 2012 +0200"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:37 2012 +0900"
      },
      "message": "kbuild: Fix gcc -x syntax\n\ncommit b1e0d8b70fa31821ebca3965f2ef8619d7c5e316 upstream.\n\nThe correct syntax for gcc -x is \"gcc -x assembler\", not\n\"gcc -xassembler\". Even though the latter happens to work, the former\nis what is documented in the manual page and thus what gcc wrappers\nsuch as icecream do expect.\n\nThis isn\u0027t a cosmetic change. The missing space prevents icecream from\nrecognizing compilation tasks it can\u0027t handle, leading to silent kernel\nmiscompilations.\n\nBesides me, credits go to Michael Matz and Dirk Mueller for\ninvestigating the miscompilation issue and tracking it down to this\nincorrect -x parameter syntax.\n\nSigned-off-by: Jean Delvare \u003cjdelvare@suse.de\u003e\nAcked-by: Ingo Molnar \u003cmingo@kernel.org\u003e\nCc: Bernhard Walle \u003cbernhard@bwalle.de\u003e\nCc: Michal Marek \u003cmmarek@suse.cz\u003e\nCc: Ralf Baechle \u003cralf@linux-mips.org\u003e\nSigned-off-by: Michal Marek \u003cmmarek@suse.cz\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "f15977883584e7b52832518c3fef115957d3203b",
      "tree": "ba1bf3db57ede8d2bb58217e1c5836954adadd1b",
      "parents": [
        "605843502b0573c0c865b13f770d971aadaf0c41"
      ],
      "author": {
        "name": "Sascha Hauer",
        "email": "s.hauer@pengutronix.de",
        "time": "Thu Oct 04 17:11:17 2012 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:36 2012 +0900"
      },
      "message": "kbuild: make: fix if_changed when command contains backslashes\n\ncommit c353acba28fb3fa1fd05fd6b85a9fc7938330f9c upstream.\n\nThe call if_changed mechanism does not work when the command contains\nbackslashes.  This basically is an issue with lzo and bzip2 compressed\nkernels.  The compressed binaries do not contain the uncompressed image\nsize, so these use size_append to append the size.  This results in\nbackslashes in the executed command.  With this if_changed always\ndetects a change in the command and rebuilds the compressed image even\nif nothing has changed.\n\nFix this by escaping backslashes in make-cmd\n\nSigned-off-by: Sascha Hauer \u003cs.hauer@pengutronix.de\u003e\nSigned-off-by: Jan Luebbe \u003cjlu@pengutronix.de\u003e\nCc: Sam Ravnborg \u003csam@ravnborg.org\u003e\nCc: Bernhard Walle \u003cbernhard@bwalle.de\u003e\nCc: Michal Marek \u003cmmarek@suse.cz\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "605843502b0573c0c865b13f770d971aadaf0c41",
      "tree": "3ada2b24affbd75599009aeea4bb7d81beac01b5",
      "parents": [
        "399abb8918aa5cef74a1d5c582bc7c08c8c99757"
      ],
      "author": {
        "name": "Geert Uytterhoeven",
        "email": "geert@linux-m68k.org",
        "time": "Thu Oct 04 17:11:13 2012 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Oct 13 05:38:36 2012 +0900"
      },
      "message": "mn10300: only add -mmem-funcs to KBUILD_CFLAGS if gcc supports it\n\ncommit 9957423f035c2071f6d1c5d2f095cdafbeb25ad7 upstream.\n\nIt seems the current (gcc 4.6.3) no longer provides this so make it\nconditional.\n\nAs reported by Tony before, the mn10300 architecture cross-compiles with\ngcc-4.6.3 if -mmem-funcs is not added to KBUILD_CFLAGS.\n\nReported-by: Tony Breeds \u003ctony@bakeyournoodle.com\u003e\nSigned-off-by: Geert Uytterhoeven \u003cgeert@linux-m68k.org\u003e\nCc: David Howells \u003cdhowells@redhat.com\u003e\nCc: Koichi Yasutake \u003cyasutake.koichi@jp.panasonic.com\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "399abb8918aa5cef74a1d5c582bc7c08c8c99757",
      "tree": "0f99faeabab94aa9011c5b9a947f9c28303ffee9",
      "parents": [
        "ead94148559d54f0aae235dda91dfb98dfb1eae7"
      ],
      "author": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:45 2012 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:45 2012 -0700"
      },
      "message": "Linux 3.4.13\n"
    },
    {
      "commit": "ead94148559d54f0aae235dda91dfb98dfb1eae7",
      "tree": "3cd49ad7f47445479e5202a2d62f2c5aa36ff3b7",
      "parents": [
        "b8d54c01874da4e548a531b77a29c21236ce8a31"
      ],
      "author": {
        "name": "Bart Van Assche",
        "email": "bvanassche@acm.org",
        "time": "Fri Aug 24 09:08:41 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:29 2012 -0700"
      },
      "message": "SCSI: scsi_dh_alua: Enable STPG for unavailable ports\n\ncommit e47f8976d8e573928824a06748f7bc82c58d747f upstream.\n\nA quote from SPC-4: \"While in the unavailable primary target port\nasymmetric access state, the device server shall support those of\nthe following commands that it supports while in the active/optimized\nstate: [ ... ] d) SET TARGET PORT GROUPS; [ ... ]\". Hence enable\nsending STPG to a target port group that is in the unavailable state.\n\nSigned-off-by: Bart Van Assche \u003cbvanassche@acm.org\u003e\nReviewed-by: Mike Christie \u003cmichaelc@cs.wisc.edu\u003e\nAcked-by: Hannes Reinecke \u003chare@suse.de\u003e\nSigned-off-by: James Bottomley \u003cJBottomley@Parallels.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "b8d54c01874da4e548a531b77a29c21236ce8a31",
      "tree": "c511ba3df767df0001d28c1bb8a6b92b1b4f3be4",
      "parents": [
        "4a3bb116ee8ab2f912fdb6d2af40028b15825151"
      ],
      "author": {
        "name": "Dan Williams",
        "email": "djbw@fb.com",
        "time": "Tue Aug 28 22:12:10 2012 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:29 2012 -0700"
      },
      "message": "SCSI: scsi_remove_target: fix softlockup regression on hot remove\n\ncommit bc3f02a795d3b4faa99d37390174be2a75d091bd upstream.\n\nJohn reports:\n BUG: soft lockup - CPU#2 stuck for 23s! [kworker/u:8:2202]\n [..]\n Call Trace:\n  [\u003cffffffff8141782a\u003e] scsi_remove_target+0xda/0x1f0\n  [\u003cffffffff81421de5\u003e] sas_rphy_remove+0x55/0x60\n  [\u003cffffffff81421e01\u003e] sas_rphy_delete+0x11/0x20\n  [\u003cffffffff81421e35\u003e] sas_port_delete+0x25/0x160\n  [\u003cffffffff814549a3\u003e] mptsas_del_end_device+0x183/0x270\n\n...introduced by commit 3b661a9 \"[SCSI] fix hot unplug vs async scan race\".\n\nDon\u0027t restart lookup of more stargets in the multi-target case, just\narrange to traverse the list once, on the assumption that new targets\nare always added at the end.  There is no guarantee that the target will\nchange state in scsi_target_reap() so we can end up spinning if we\nrestart.\n\nAcked-by: Jack Wang \u003cjack_wang@usish.com\u003e\nLKML-Reference: \u003cCAEhu1-6wq1YsNiscGMwP4ud0Q+MrViRzv\u003dkcWCQSBNc8c68N5Q@mail.gmail.com\u003e\nReported-by: John Drescher \u003cdrescherjm@gmail.com\u003e\nTested-by: John Drescher \u003cdrescherjm@gmail.com\u003e\nSigned-off-by: Dan Williams \u003cdjbw@fb.com\u003e\nSigned-off-by: James Bottomley \u003cJBottomley@Parallels.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "4a3bb116ee8ab2f912fdb6d2af40028b15825151",
      "tree": "d83784241a15dd195a8d15c9c14241a645c60fca",
      "parents": [
        "b4d4dc33a372aaee2205d4506b4c7ead6275067d"
      ],
      "author": {
        "name": "Avi Kivity",
        "email": "avi@redhat.com",
        "time": "Wed Aug 22 13:03:48 2012 +0300"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:29 2012 -0700"
      },
      "message": "x86/alternatives: Fix p6 nops on non-modular kernels\n\ncommit cb09cad44f07044d9810f18f6f9a6a6f3771f979 upstream.\n\nProbably a leftover from the early days of self-patching, p6nops\nare marked __initconst_or_module, which causes them to be\ndiscarded in a non-modular kernel.  If something later triggers\npatching, it will overwrite kernel code with garbage.\n\nReported-by: Tomas Racek \u003ctracek@redhat.com\u003e\nSigned-off-by: Avi Kivity \u003cavi@redhat.com\u003e\nCc: Michael Tokarev \u003cmjt@tls.msk.ru\u003e\nCc: Borislav Petkov \u003cborislav.petkov@amd.com\u003e\nCc: Marcelo Tosatti \u003cmtosatti@redhat.com\u003e\nCc: qemu-devel@nongnu.org\nCc: Anthony Liguori \u003canthony@codemonkey.ws\u003e\nCc: H. Peter Anvin \u003chpa@linux.intel.com\u003e\nCc: Alan Cox \u003calan@lxorguk.ukuu.org.uk\u003e\nCc: Alan Cox \u003calan@linux.intel.com\u003e\nLink: http://lkml.kernel.org/r/5034AE84.90708@redhat.com\nSigned-off-by: Ingo Molnar \u003cmingo@kernel.org\u003e\nCc: Ben Jencks \u003cben@bjencks.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "b4d4dc33a372aaee2205d4506b4c7ead6275067d",
      "tree": "7344920381bae14a99dafcc5e0c42b77c04e3044",
      "parents": [
        "22fb582405002812d8fb89d0ed1264e97d3d25ad"
      ],
      "author": {
        "name": "Dan Williams",
        "email": "dan.j.williams@intel.com",
        "time": "Fri Jun 22 11:31:14 2012 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:29 2012 -0700"
      },
      "message": "isci: fix isci_pci_probe() generates warning on efi failure path\n\ncommit 6d70a74ffd616073a68ae0974d98819bfa8e6da6 upstream.\n\nThe oem parameter image embedded in the efi variable is at an offset\nfrom the start of the variable.  However, in the failure path we try to\nfree the \u0027orom\u0027 pointer which is only valid when the paramaters are\nbeing read from the legacy option-rom space.\n\nSince failure to load the oem parameters is unlikely and we keep the\nmemory around in the success case just defer all de-allocation to devm.\n\nReported-by: Don Morris \u003cdon.morris@hp.com\u003e\nSigned-off-by: Dan Williams \u003cdan.j.williams@intel.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "22fb582405002812d8fb89d0ed1264e97d3d25ad",
      "tree": "ce6df075b0dcc1f1636272e68b77b55b11585af5",
      "parents": [
        "0e4765fd9c0f8df577e0b8cbea927c2051710f27"
      ],
      "author": {
        "name": "Bart Van Assche",
        "email": "bvanassche@acm.org",
        "time": "Fri Aug 24 10:29:11 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:29 2012 -0700"
      },
      "message": "IB/srp: Avoid having aborted requests hang\n\ncommit d8536670916a685df116b5c2cb256573fd25e4e3 upstream.\n\nWe need to call scsi_done() for commands after we abort them.\n\nSigned-off-by: Bart Van Assche \u003cbvanassche@acm.org\u003e\nAcked-by: David Dillow \u003cdillowda@ornl.gov\u003e\nSigned-off-by: Roland Dreier \u003croland@purestorage.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "0e4765fd9c0f8df577e0b8cbea927c2051710f27",
      "tree": "865fee5c7fbeaa9dd8c2967ccea91076dfc7b4a6",
      "parents": [
        "350f3edb0a05c340853c75f4c5007a72ebd9e32f"
      ],
      "author": {
        "name": "Bart Van Assche",
        "email": "bvanassche@acm.org",
        "time": "Fri Aug 24 10:27:54 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:29 2012 -0700"
      },
      "message": "IB/srp: Fix use-after-free in srp_reset_req()\n\ncommit 9b796d06d5d1b1e85ae2316a283ea11dd739ef96 upstream.\n\nsrp_free_req() uses the scsi_cmnd structure contents to unmap\nbuffers, so we must invoke srp_free_req() before we release\nownership of that structure.\n\nSigned-off-by: Bart Van Assche \u003cbvanassche@acm.org\u003e\nAcked-by: David Dillow \u003cdillowda@ornl.gov\u003e\nSigned-off-by: Roland Dreier \u003croland@purestorage.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "350f3edb0a05c340853c75f4c5007a72ebd9e32f",
      "tree": "c64fd69578e9424c95b103af0ad306d70aea8c34",
      "parents": [
        "cbc7a8263c6e2d8f7354b4c06e21607d6dffd6bd"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Thu Aug 30 07:01:30 2012 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:28 2012 -0700"
      },
      "message": "IPoIB: Fix use-after-free of multicast object\n\ncommit bea1e22df494a729978e7f2c54f7bda328f74bc3 upstream.\n\nFix a crash in ipoib_mcast_join_task().  (with help from Or Gerlitz)\n\nCommit c8c2afe360b7 (\"IPoIB: Use rtnl lock/unlock when changing device\nflags\") added a call to rtnl_lock() in ipoib_mcast_join_task(), which\nis run from the ipoib_workqueue, and hence the workqueue can\u0027t be\nflushed from the context of ipoib_stop().\n\nIn the current code, ipoib_stop() (which doesn\u0027t flush the workqueue)\ncalls ipoib_mcast_dev_flush(), which goes and deletes all the\nmulticast entries.  This takes place without any synchronization with\na possible running instance of ipoib_mcast_join_task() for the same\nipoib device, leading to a crash due to NULL pointer dereference.\n\nFix this by making sure that the workqueue is flushed before\nipoib_mcast_dev_flush() is called.  To make that possible, we move the\nRTNL-lock wrapped code to ipoib_mcast_join_finish().\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: Roland Dreier \u003croland@purestorage.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "cbc7a8263c6e2d8f7354b4c06e21607d6dffd6bd",
      "tree": "dc47260c488d72f41f15356e157a67dbacd3aeb9",
      "parents": [
        "abe988511dc075dab47ba9283c791299f7285aaa"
      ],
      "author": {
        "name": "Dan Carpenter",
        "email": "dan.carpenter@oracle.com",
        "time": "Tue Sep 25 10:01:56 2012 +0300"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:28 2012 -0700"
      },
      "message": "remoteproc: fix a potential NULL-dereference on cleanup\n\ncommit 7168d914a782086e217214c57ddfc7cc4b738c0c upstream.\n\nWe only need to allocate mapping if there is an IOMMU domain.\n\nOtherwise, when the mappings are released, the assumption that\nan IOMMU domain is there will crash and burn.\n\nSigned-off-by: Dan Carpenter \u003cdan.carpenter@oracle.com\u003e\n[ohad: revise commit log]\nSigned-off-by: Ohad Ben-Cohen \u003cohad@wizery.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "abe988511dc075dab47ba9283c791299f7285aaa",
      "tree": "4e4b02e97a0b4540409f71ab726ece8c4b0d6c77",
      "parents": [
        "0f0c5909d4cf6016c536fceddd5ca7bded0e5219"
      ],
      "author": {
        "name": "Ohad Ben-Cohen",
        "email": "ohad@wizery.com",
        "time": "Sun Sep 30 10:25:34 2012 +0200"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:28 2012 -0700"
      },
      "message": "remoteproc: select VIRTIO to avoid build breakage\n\ncommit 2ed6d29c725c4aead510b5c23f563795b265acf5 upstream.\n\ndrivers/built-in.o: In function `rproc_virtio_finalize_features\u0027:\nremoteproc_virtio.c:(.text+0x2f9a02): undefined reference to `vring_transport_features\u0027\ndrivers/built-in.o: In function `rproc_virtio_del_vqs\u0027:\nremoteproc_virtio.c:(.text+0x2f9a74): undefined reference to `vring_del_virtqueue\u0027\ndrivers/built-in.o: In function `rproc_virtio_find_vqs\u0027:\nremoteproc_virtio.c:(.text+0x2f9c44): undefined reference to `vring_new_virtqueue\u0027\ndrivers/built-in.o: In function `rproc_add_virtio_dev\u0027:\n(.text+0x2f9e2c): undefined reference to `register_virtio_device\u0027\ndrivers/built-in.o: In function `rproc_vq_interrupt\u0027:\n(.text+0x2f9db7): undefined reference to `vring_interrupt\u0027\ndrivers/built-in.o: In function `rproc_remove_virtio_dev\u0027:\n(.text+0x2f9e9f): undefined reference to `unregister_virtio_device\u0027\n\nReported-by: Randy Dunlap \u003crdunlap@xenotime.net\u003e\nSigned-off-by: Ohad Ben-Cohen \u003cohad@wizery.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "0f0c5909d4cf6016c536fceddd5ca7bded0e5219",
      "tree": "26965c798c1c13e3e15f63f2be04b9e0bf0d05e1",
      "parents": [
        "7b5c87e0163ad33aabb1a725b0b5444a7e0b5c73"
      ],
      "author": {
        "name": "Wei Yongjun",
        "email": "yongjun_wei@trendmicro.com.cn",
        "time": "Fri Sep 21 15:09:47 2012 +0800"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:28 2012 -0700"
      },
      "message": "can: mscan-mpc5xxx: fix return value check in mpc512x_can_get_clock()\n\ncommit f61bd0585dfc7d99db4936d7467de4ca8e2f7ea0 upstream.\n\nIn case of error, the function clk_get() returns ERR_PTR()\nand never returns NULL pointer. The NULL test in the error\nhandling should be replaced with IS_ERR().\n\ndpatch engine is used to auto generated this patch.\n(https://github.com/weiyj/dpatch)\n\nSigned-off-by: Wei Yongjun \u003cyongjun_wei@trendmicro.com.cn\u003e\nAcked-by: Wolfgang Grandegger \u003cwg@grandegger.com\u003e\nSigned-off-by: Marc Kleine-Budde \u003cmkl@pengutronix.de\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "7b5c87e0163ad33aabb1a725b0b5444a7e0b5c73",
      "tree": "279929bb5f2b99519dcff6c9104973fb0e0ea5db",
      "parents": [
        "54ce2fb86f0b78808c7fcc1d581ebbf15ca36e91"
      ],
      "author": {
        "name": "Stephen M. Cameron",
        "email": "scameron@beardog.cce.hp.com",
        "time": "Thu Jul 26 11:34:10 2012 -0500"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:28 2012 -0700"
      },
      "message": "SCSI: hpsa: Use LUN reset instead of target reset\n\ncommit 21e89afd325849eb38adccf382df16cc895911f9 upstream.\n\nIt turns out Smart Array logical drives do not support target\nreset and when the target reset fails, the logical drive will\nbe taken off line.  Symptoms look like this:\n\nhpsa 0000:03:00.0: Abort request on C1:B0:T0:L0\nhpsa 0000:03:00.0: resetting device 1:0:0:0\nhpsa 0000:03:00.0: cp ffff880037c56000 is reported invalid (probably means target device no longer present)\nhpsa 0000:03:00.0: resetting device failed.\nsd 1:0:0:0: Device offlined - not ready after error recovery\nsd 1:0:0:0: rejecting I/O to offline device\nEXT3-fs error (device sdb1): read_block_bitmap:\n\nLUN reset is supported though, and is what we should be using.\nTarget reset is also disruptive in shared SAS situations,\nfor example, an external MSA1210m which does support target\nreset attached to Smart Arrays in multiple hosts -- a target\nreset from one host is disruptive to other hosts as all LUNs\non the target will be reset and will abort all outstanding i/os\nback to all the attached hosts.  So we should use LUN reset,\nnot target reset.\n\nTested this with Smart Array logical drives and with tape drives.\nNot sure how this bug survived since 2009, except it must be very\nrare for a Smart Array to require more than 30s to complete a request.\n\nSigned-off-by: Stephen M. Cameron \u003cscameron@beardog.cce.hp.com\u003e\nSigned-off-by: James Bottomley \u003cJBottomley@Parallels.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "54ce2fb86f0b78808c7fcc1d581ebbf15ca36e91",
      "tree": "6e979c7933a334c89279a11bc4ec2b60e74b7c20",
      "parents": [
        "7d0fcfec4c491eb3c815929be5512ae8d1886553"
      ],
      "author": {
        "name": "Benjamin Herrenschmidt",
        "email": "benh@kernel.crashing.org",
        "time": "Mon Jul 30 11:33:05 2012 +1000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:28 2012 -0700"
      },
      "message": "SCSI: ibmvscsi: Fix host config length field overflow\n\ncommit 225c56960fcafeccc2b6304f96cd3f0dbf42a16a upstream.\n\nThe length field in the host config packet is only 16-bit long, so\npassing it 0x10000 (64K which is our standard PAGE_SIZE) doesn\u0027t\nwork and result in an empty config from the server.\n\nSigned-off-by: Benjamin Herrenschmidt \u003cbenh@kernel.crashing.org\u003e\nAcked-by: Robert Jennings \u003crcj@linux.vnet.ibm.com\u003e\nSigned-off-by: James Bottomley \u003cJBottomley@Parallels.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "7d0fcfec4c491eb3c815929be5512ae8d1886553",
      "tree": "0312f1815213f82535b26c5141f5f7b00f87a8f5",
      "parents": [
        "56a631f3bf36641133afeb3db7c1ec5721c8dd04"
      ],
      "author": {
        "name": "Kees Cook",
        "email": "keescook@chromium.org",
        "time": "Mon Aug 27 11:38:13 2012 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:28 2012 -0700"
      },
      "message": "Yama: handle 32-bit userspace prctl\n\ncommit 2e4930eb7c8fb20a39dfb5f8a8f80402710dcea8 upstream.\n\nWhen running a 64-bit kernel and receiving prctls from a 32-bit\nuserspace, the \"-1\" used as an unsigned long will end up being\nmisdetected. The kernel is looking for 0xffffffffffffffff instead of\n0xffffffff. Since prctl lacks a distinct compat interface, Yama needs\nto handle this translation itself. As such, support either value as\nmeaning PR_SET_PTRACER_ANY, to avoid breaking the ABI for 64-bit.\n\nSigned-off-by: Kees Cook \u003ckeescook@chromium.org\u003e\nAcked-by: John Johansen \u003cjohn.johansen@canonical.com\u003e\nSigned-off-by: James Morris \u003cjames.l.morris@oracle.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "56a631f3bf36641133afeb3db7c1ec5721c8dd04",
      "tree": "90145bdbd5abab240b6a06794a7a80676055d6b8",
      "parents": [
        "1168fb4bf41d55b04c07d82cb5c1e0fde9be3cf9"
      ],
      "author": {
        "name": "Artem Bityutskiy",
        "email": "artem.bityutskiy@linux.intel.com",
        "time": "Sat Aug 18 14:11:42 2012 +0200"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:28 2012 -0700"
      },
      "message": "UBI: fix autoresize handling in R/O mode\n\ncommit abb3e01103eb4e2ea5c15e6fedbc74e08bd4cc2b upstream.\n\nCurrently UBI fails in autoresize when it is in R/O mode (e.g., because the\nunderlying MTD device is R/O). This patch fixes the issue - we just skip\nautoresize and print a warning.\n\nReported-by: Pali Rohár \u003cpali.rohar@gmail.com\u003e\nSigned-off-by: Artem Bityutskiy \u003cartem.bityutskiy@linux.intel.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "1168fb4bf41d55b04c07d82cb5c1e0fde9be3cf9",
      "tree": "78fe3837e57bdef54a6f68aa99bdc369fc96589c",
      "parents": [
        "119bd47785006d185e8247f63f44c43eaf345ed9"
      ],
      "author": {
        "name": "Russ Gorby",
        "email": "russ.gorby@intel.com",
        "time": "Mon Aug 13 13:45:30 2012 +0100"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:27 2012 -0700"
      },
      "message": "n_gsm: memory leak in uplink error path\n\ncommit 88ed2a60610974443335c924d7cb8e5dcf9dbdc1 upstream.\n\nUplink (TX) network data will go through gsm_dlci_data_output_framed\nthere is a bug where if memory allocation fails, the skb which\nhas already been pulled off the list will be lost.\n\nIn addition TX skbs were being processed in LIFO order\n\nFixed the memory leak, and changed to FIFO order processing\n\nSigned-off-by: Russ Gorby \u003cruss.gorby@intel.com\u003e\nTested-by: Kappel, LaurentX \u003claurentx.kappel@intel.com\u003e\nSigned-off-by: Alan Cox \u003calan@linux.intel.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "119bd47785006d185e8247f63f44c43eaf345ed9",
      "tree": "4e8ce4c73bc59e1441a97f06bb340d558618003d",
      "parents": [
        "b0a3c588df225ee719bd82ab303d02f7cc0d5805"
      ],
      "author": {
        "name": "Russ Gorby",
        "email": "russ.gorby@intel.com",
        "time": "Mon Aug 13 13:44:40 2012 +0100"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:27 2012 -0700"
      },
      "message": "n_gsm: added interlocking for gsm_data_lock for certain code paths\n\ncommit 5e44708f75b0f8712da715d6babb0c21089b2317 upstream.\n\nThere were some locking holes in the management of the MUX\u0027s\nmessage queue for 2 code paths:\n1) gsmld_write_wakeup\n2) receipt of CMD_FCON flow-control message\nIn both cases gsm_data_kick is called w/o locking so it can collide\nwith other other instances of gsm_data_kick (pulling messages tx_tail)\nor potentially other instances of __gsm_data_queu (adding messages to tx_head)\n\nChanged to take the tx_lock in these 2 cases\n\nSigned-off-by: Russ Gorby \u003cruss.gorby@intel.com\u003e\nTested-by: Yin, Fengwei \u003cfengwei.yin@intel.com\u003e\nSigned-off-by: Alan Cox \u003calan@linux.intel.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "b0a3c588df225ee719bd82ab303d02f7cc0d5805",
      "tree": "023e3bb1f945703a14621ebe67faba682189599c",
      "parents": [
        "3e6ef23fbf8c22163602cd52729de2fe370fba8f"
      ],
      "author": {
        "name": "Russ Gorby",
        "email": "russ.gorby@intel.com",
        "time": "Mon Aug 13 13:43:36 2012 +0100"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:27 2012 -0700"
      },
      "message": "n_gsm: uplink SKBs accumulate on list\n\ncommit 192b6041e75bb4a2aae73834037038cea139a92d upstream.\n\ngsm_dlci_data_kick will not call any output function if tx_bytes \u003e THRESH_LO\nfurthermore it will call the output function only once if tx_bytes \u003d\u003d 0\nIf the size of the IP writes are on the order of THRESH_LO\nwe can get into a situation where skbs accumulate on the outbound list\nbeing starved for events to call the output function.\n\ngsm_dlci_data_kick now calls the sweep function when tx_bytes\u003d\u003d0\n\nSigned-off-by: Russ Gorby \u003cruss.gorby@intel.com\u003e\nTested-by: Kappel, LaurentX \u003claurentx.kappel@intel.com\u003e\nSigned-off-by: Alan Cox \u003calan@linux.intel.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "3e6ef23fbf8c22163602cd52729de2fe370fba8f",
      "tree": "6f8d6741e51dab5c5bebdc2df198ddae2faeffbf",
      "parents": [
        "aa821c51dc6167556a3dc39fc518754f8650265c"
      ],
      "author": {
        "name": "xiaojin",
        "email": "jin.xiao@intel.com",
        "time": "Mon Aug 13 13:43:15 2012 +0100"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:27 2012 -0700"
      },
      "message": "n_gsm.c: Implement 3GPP27.010 DLC start-up procedure in MUX\n\ncommit 7e8ac7b23b67416700dfb8b4136a4e81ce675b48 upstream.\n\nIn 3GPP27.010 5.8.1, it defined:\nThe TE multiplexer initiates the establishment of the multiplexer control channel by sending a SABM frame on DLCI 0 using the procedures of clause 5.4.1.\nOnce the multiplexer channel is established other DLCs may be established using the procedures of clause 5.4.1.\nThis patch implement 5.8.1 in MUX level, it make sure DLC0 is the first channel to be setup.\n\n[or for those not familiar with the specification: it was possible to try\n and open a data connection while the control channel was not yet fully\n open, which is a spec violation and confuses some modems]\n\nSigned-off-by: xiaojin \u003cjin.xiao@intel.com\u003e\nTested-by: Yin, Fengwei \u003cfengwei.yin@intel.com\u003e\n[tweaked the order we check things and error code]\nSigned-off-by: Alan Cox \u003calan@linux.intel.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "aa821c51dc6167556a3dc39fc518754f8650265c",
      "tree": "23a6ee9ae1890005d64c4c4313213fa2275c4ff0",
      "parents": [
        "92d9a683c431081038d715585e7da9d953cb09f2"
      ],
      "author": {
        "name": "Denys Vlasenko",
        "email": "vda.linux@googlemail.com",
        "time": "Wed Sep 26 11:34:50 2012 +1000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:27 2012 -0700"
      },
      "message": "coredump: prevent double-free on an error path in core dumper\n\ncommit f34f9d186df35e5c39163444c43b4fc6255e39c5 upstream.\n\nIn !CORE_DUMP_USE_REGSET case, if elf_note_info_init fails to allocate\nmemory for info-\u003efields, it frees already allocated stuff and returns\nerror to its caller, fill_note_info.  Which in turn returns error to its\ncaller, elf_core_dump.  Which jumps to cleanup label and calls\nfree_note_info, which will happily try to free all info-\u003efields again.\nBOOM.\n\nThis is the fix.\n\nSigned-off-by: Oleg Nesterov \u003coleg@redhat.com\u003e\nSigned-off-by: Denys Vlasenko \u003cvda.linux@googlemail.com\u003e\nCc: Venu Byravarasu \u003cvbyravarasu@nvidia.com\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "92d9a683c431081038d715585e7da9d953cb09f2",
      "tree": "d12a58fe85dfb800ef1882afb02c8310231f4fbe",
      "parents": [
        "e3a63e8c061c486ce46d8d825b3fdd45c14140de"
      ],
      "author": {
        "name": "Sujith Manoharan",
        "email": "c_manoha@qualcomm.com",
        "time": "Sat Sep 22 00:14:28 2012 +0530"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:27 2012 -0700"
      },
      "message": "ath9k: Disable ASPM only for AR9285\n\ncommit 046b6802c8d3c8a57448485513bf7291633e0fa3 upstream.\n\nCurrently, ASPM is disabled for all WLAN+BT combo chipsets\nwhen BTCOEX is enabled. This is incorrect since the workaround\nis required only for WB195, which is a AR9285+AR3011 combo\nsolution. Fix this by checking for the HW version when enabling\nthe workaround.\n\nSigned-off-by: Sujith Manoharan \u003cc_manoha@qca.qualcomm.com\u003e\nTested-by: Paul Stewart \u003cpstew@chromium.org\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "e3a63e8c061c486ce46d8d825b3fdd45c14140de",
      "tree": "3b66e2c6c924b5ba661e27abbdaeecfd35df0302",
      "parents": [
        "c4f132c4c23d6b822242c98def8be15182c24ff4"
      ],
      "author": {
        "name": "Michael Spang",
        "email": "spang@chromium.org",
        "time": "Fri Sep 14 13:05:49 2012 -0400"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:27 2012 -0700"
      },
      "message": "Increase XHCI suspend timeout to 16ms\n\ncommit a6e097dfdfd189b6929af6efa1d289af61858386 upstream.\n\nThe Intel XHCI specification says that after clearing the run/stop bit\nthe controller may take up to 16ms to halt. We\u0027ve seen a device take\n14ms, which with the current timeout of 10ms causes the kernel to\nabort the suspend. Increasing the timeout to the recommended value\nfixes the problem.\n\nThis patch should be backported to kernels as old as 2.6.37, that\ncontain the commit 5535b1d5f8885695c6ded783c692e3c0d0eda8ca \"USB: xHCI:\nPCI power management implementation\".\n\nSigned-off-by: Michael Spang \u003cspang@chromium.org\u003e\nSigned-off-by: Sarah Sharp \u003csarah.a.sharp@linux.intel.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "c4f132c4c23d6b822242c98def8be15182c24ff4",
      "tree": "ed195125468ca198ace40d1215aa03ff549e3890",
      "parents": [
        "75382341d888ba0132c5eeb94711840acf972034"
      ],
      "author": {
        "name": "Elric Fu",
        "email": "elricfu1@gmail.com",
        "time": "Wed Jun 27 16:55:43 2012 +0800"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:26 2012 -0700"
      },
      "message": "xHCI: handle command after aborting the command ring\n\ncommit b63f4053cc8aa22a98e3f9a97845afe6c15d0a0d upstream.\n\nAccording to xHCI spec section 4.6.1.1 and section 4.6.1.2,\nafter aborting a command on the command ring, xHC will\ngenerate a command completion event with its completion\ncode set to Command Ring Stopped at least. If a command is\ncurrently executing at the time of aborting a command, xHC\nalso generate a command completion event with its completion\ncode set to Command Abort. When the command ring is stopped,\nsoftware may remove, add, or rearrage Command Descriptors.\n\nTo cancel a command, software will initialize a command\ndescriptor for the cancel command, and add it into a\ncancel_cmd_list of xhci. When the command ring is stopped,\nsoftware will find the command trbs described by command\ndescriptors in cancel_cmd_list and modify it to No Op\ncommand. If software can\u0027t find the matched trbs, we can\nthink it had been finished.\n\nThis patch should be backported to kernels as old as 3.0, that contain\nthe commit 7ed603ecf8b68ab81f4c83097d3063d43ec73bb8 \"xhci: Add an\nassertion to check for virt_dev\u003d0 bug.\" That commit papers over a NULL\npointer dereference, and this patch fixes the underlying issue that\ncaused the NULL pointer dereference.\n\nSigned-off-by: Elric Fu \u003celricfu1@gmail.com\u003e\nSigned-off-by: Sarah Sharp \u003csarah.a.sharp@linux.intel.com\u003e\nTested-by: Miroslav Sabljic \u003cmiroslav.sabljic@avl.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "75382341d888ba0132c5eeb94711840acf972034",
      "tree": "38036eb3a74d6b0805e34315df8537774751a5a7",
      "parents": [
        "2818247b6565b7adfbcd53b74509448a8e1fad84"
      ],
      "author": {
        "name": "Elric Fu",
        "email": "elricfu1@gmail.com",
        "time": "Wed Jun 27 16:31:52 2012 +0800"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:26 2012 -0700"
      },
      "message": "xHCI: cancel command after command timeout\n\ncommit 6e4468b9a0793dfb53eb80d9fe52c739b13b27fd upstream.\n\nThe patch is used to cancel command when the command isn\u0027t\nacknowledged and a timeout occurs.\n\nThis patch should be backported to kernels as old as 3.0, that contain\nthe commit 7ed603ecf8b68ab81f4c83097d3063d43ec73bb8 \"xhci: Add an\nassertion to check for virt_dev\u003d0 bug.\" That commit papers over a NULL\npointer dereference, and this patch fixes the underlying issue that\ncaused the NULL pointer dereference.\n\nSigned-off-by: Elric Fu \u003celricfu1@gmail.com\u003e\nSigned-off-by: Sarah Sharp \u003csarah.a.sharp@linux.intel.com\u003e\nTested-by: Miroslav Sabljic \u003cmiroslav.sabljic@avl.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "2818247b6565b7adfbcd53b74509448a8e1fad84",
      "tree": "606c886cf719aac07beea71f1e1f95a7f5b41e75",
      "parents": [
        "1976fffe9dc839e9d25c903a65723600f7641a50"
      ],
      "author": {
        "name": "Elric Fu",
        "email": "elricfu1@gmail.com",
        "time": "Wed Jun 27 16:31:12 2012 +0800"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:26 2012 -0700"
      },
      "message": "xHCI: add aborting command ring function\n\ncommit b92cc66c047ff7cf587b318fe377061a353c120f upstream.\n\nSoftware have to abort command ring and cancel command\nwhen a command is failed or hang. Otherwise, the command\nring will hang up and can\u0027t handle the others. An example\nof a command that may hang is the Address Device Command,\nbecause waiting for a SET_ADDRESS request to be acknowledged\nby a USB device is outside of the xHC\u0027s ability to control.\n\nTo cancel a command, software will initialize a command\ndescriptor for the cancel command, and add it into a\ncancel_cmd_list of xhci.\n\nSarah: Fixed missing newline on \"Have the command ring been stopped?\"\ndebugging statement.\n\nThis patch should be backported to kernels as old as 3.0, that contain\nthe commit 7ed603ecf8b68ab81f4c83097d3063d43ec73bb8 \"xhci: Add an\nassertion to check for virt_dev\u003d0 bug.\" That commit papers over a NULL\npointer dereference, and this patch fixes the underlying issue that\ncaused the NULL pointer dereference.\n\nSigned-off-by: Elric Fu \u003celricfu1@gmail.com\u003e\nSigned-off-by: Sarah Sharp \u003csarah.a.sharp@linux.intel.com\u003e\nTested-by: Miroslav Sabljic \u003cmiroslav.sabljic@avl.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "1976fffe9dc839e9d25c903a65723600f7641a50",
      "tree": "b173c3cf6f353d8baf09019dd2fd2e82aac0b7da",
      "parents": [
        "59b91d284b24d4ec17f917421b169fcb40805544"
      ],
      "author": {
        "name": "Elric Fu",
        "email": "elricfu1@gmail.com",
        "time": "Wed Jun 27 16:30:57 2012 +0800"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:26 2012 -0700"
      },
      "message": "xHCI: add cmd_ring_state\n\ncommit c181bc5b5d5c79b71203cd10cef97f802fb6f9c1 upstream.\n\nAdding cmd_ring_state for command ring. It helps to verify\nthe current command ring state for controlling the command\nring operations.\n\nThis patch should be backported to kernels as old as 3.0.  The commit\n7ed603ecf8b68ab81f4c83097d3063d43ec73bb8 \"xhci: Add an assertion to\ncheck for virt_dev\u003d0 bug.\" papers over the NULL pointer dereference that\nI now believe is related to a timed out Set Address command.  This (and\nthe four patches that follow it) contain the real fix that also allows\nVIA USB 3.0 hubs to consistently re-enumerate during the plug/unplug\nstress tests.\n\nSigned-off-by: Elric Fu \u003celricfu1@gmail.com\u003e\nSigned-off-by: Sarah Sharp \u003csarah.a.sharp@linux.intel.com\u003e\nTested-by: Miroslav Sabljic \u003cmiroslav.sabljic@avl.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "59b91d284b24d4ec17f917421b169fcb40805544",
      "tree": "5cc5d22f4cb5d6ff04dc68e0e32dd23039d9146c",
      "parents": [
        "ed02004f896be60f6d5dc3af403999f56a3e6d37"
      ],
      "author": {
        "name": "Sarah Sharp",
        "email": "sarah.a.sharp@linux.intel.com",
        "time": "Wed Sep 19 16:27:26 2012 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:26 2012 -0700"
      },
      "message": "xhci: Intel Panther Point BEI quirk.\n\ncommit 80fab3b244a22e0ca539d2439bdda50e81e5666f upstream.\n\nWhen a device with an isochronous endpoint is behind a hub plugged into\nthe Intel Panther Point xHCI host controller, and the driver submits\nmultiple frames per URB, the xHCI driver will set the Block Event\nInterrupt (BEI) flag on all but the last TD for the URB.  This causes\nthe host controller to place an event on the event ring, but not send an\ninterrupt.  When the last TD for the URB completes, BEI is cleared, and\nwe get an interrupt for the whole URB.\n\nHowever, under a Panther Point xHCI host controller, if the parent hub\nis unplugged when one or more events from transfers with BEI set are on\nthe event ring, a port status change event is placed on the event ring,\nbut no interrupt is generated.  This means URBs stop completing, and the\nUSB device disconnect is not noticed.  Something like a USB headset will\ncause mplayer to hang when the device is disconnected.\n\nIf another transfer is sent (such as running `sudo lsusb -v`), the next\ntransfer event seems to \"unstick\" the event ring, the xHCI driver gets\nan interrupt, and the disconnect is reported to the USB core.\n\nThe fix is not to use the BEI flag under the Panther Point xHCI host.\nThis will impact power consumption and system responsiveness, because\nthe xHCI driver will receive an interrupt for every frame in all\nisochronous URBs instead of once per URB.\n\nIntel chipset developers confirm that this bug will be hit if the BEI\nflag is used on any endpoint, not just ones that are behind a hub.\n\nThis patch should be backported to kernels as old as 3.0, that contain\nthe commit 69e848c2090aebba5698a1620604c7dccb448684 \"Intel xhci: Support\nEHCI/xHCI port switching.\"\n\nSigned-off-by: Sarah Sharp \u003csarah.a.sharp@linux.intel.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "ed02004f896be60f6d5dc3af403999f56a3e6d37",
      "tree": "c3ba30508cad2541b91c16e0804eda2e3dfd5053",
      "parents": [
        "dc8276b241ad415b2602c4a7309e5b518bb09c32"
      ],
      "author": {
        "name": "Khalid Aziz",
        "email": "khalid.aziz@hp.com",
        "time": "Mon Sep 10 12:52:42 2012 -0600"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:26 2012 -0700"
      },
      "message": "firmware: Add missing attributes to EFI variable attribute print out from sysfs\n\ncommit 7083909023bbe29b3176e92d2d089def1aa7aa1e upstream.\n\nSome of the EFI variable attributes are missing from print out from\n/sys/firmware/efi/vars/*/attributes. This patch adds those in. It also\nupdates code to use pre-defined constants for masking current value\nof attributes.\n\nSigned-off-by: Khalid Aziz \u003ckhalid.aziz@hp.com\u003e\nReviewed-by: Kees Cook \u003ckeescook@chromium.org\u003e\nAcked-by: Matthew Garrett \u003cmjg@redhat.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "dc8276b241ad415b2602c4a7309e5b518bb09c32",
      "tree": "032a6a77104bb604b2ec36872ccdadd688718cdb",
      "parents": [
        "1eafb0280d1275629da54c350c7d9842f7785577"
      ],
      "author": {
        "name": "Larry Finger",
        "email": "Larry.Finger@lwfinger.net",
        "time": "Wed Sep 26 12:32:02 2012 -0500"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:26 2012 -0700"
      },
      "message": "b43legacy: Fix crash on unload when firmware not available\n\ncommit 2d838bb608e2d1f6cb4280e76748cb812dc822e7 upstream.\n\nWhen b43legacy is loaded without the firmware being available, a following\nunload generates a kernel NULL pointer dereference BUG as follows:\n\n[  214.330789] BUG: unable to handle kernel NULL pointer dereference at 0000004c\n[  214.330997] IP: [\u003cc104c395\u003e] drain_workqueue+0x15/0x170\n[  214.331179] *pde \u003d 00000000\n[  214.331311] Oops: 0000 [#1] SMP\n[  214.331471] Modules linked in: b43legacy(-) ssb pcmcia mac80211 cfg80211 af_packet mperf arc4 ppdev sr_mod cdrom sg shpchp yenta_socket pcmcia_rsrc pci_hotplug pcmcia_core battery parport_pc parport floppy container ac button edd autofs4 ohci_hcd ehci_hcd usbcore usb_common thermal processor scsi_dh_rdac scsi_dh_hp_sw scsi_dh_emc scsi_dh_alua scsi_dh fan thermal_sys hwmon ata_generic pata_ali libata [last unloaded: cfg80211]\n[  214.333421] Pid: 3639, comm: modprobe Not tainted 3.6.0-rc6-wl+ #163 Source Technology VIC 9921/ALI Based Notebook\n[  214.333580] EIP: 0060:[\u003cc104c395\u003e] EFLAGS: 00010246 CPU: 0\n[  214.333687] EIP is at drain_workqueue+0x15/0x170\n[  214.333788] EAX: c162ac40 EBX: cdfb8360 ECX: 0000002a EDX: 00002a2a\n[  214.333890] ESI: 00000000 EDI: 00000000 EBP: cd767e7c ESP: cd767e5c\n[  214.333957]  DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068\n[  214.333957] CR0: 8005003b CR2: 0000004c CR3: 0c96a000 CR4: 00000090\n[  214.333957] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000\n[  214.333957] DR6: ffff0ff0 DR7: 00000400\n[  214.333957] Process modprobe (pid: 3639, ti\u003dcd766000 task\u003dcf802e90 task.ti\u003dcd766000)\n[  214.333957] Stack:\n[  214.333957]  00000292 cd767e74 c12c5e09 00000296 00000296 cdfb8360 cdfb9220 00000000\n[  214.333957]  cd767e90 c104c4fd cdfb8360 cdfb9220 cd682800 cd767ea4 d0c10184 cd682800\n[  214.333957]  cd767ea4 cba31064 cd767eb8 d0867908 cba31064 d087e09c cd96f034 cd767ec4\n[  214.333957] Call Trace:\n[  214.333957]  [\u003cc12c5e09\u003e] ? skb_dequeue+0x49/0x60\n[  214.333957]  [\u003cc104c4fd\u003e] destroy_workqueue+0xd/0x150\n[  214.333957]  [\u003cd0c10184\u003e] ieee80211_unregister_hw+0xc4/0x100 [mac80211]\n[  214.333957]  [\u003cd0867908\u003e] b43legacy_remove+0x78/0x80 [b43legacy]\n[  214.333957]  [\u003cd083654d\u003e] ssb_device_remove+0x1d/0x30 [ssb]\n[  214.333957]  [\u003cc126f15a\u003e] __device_release_driver+0x5a/0xb0\n[  214.333957]  [\u003cc126fb07\u003e] driver_detach+0x87/0x90\n[  214.333957]  [\u003cc126ef4c\u003e] bus_remove_driver+0x6c/0xe0\n[  214.333957]  [\u003cc1270120\u003e] driver_unregister+0x40/0x70\n[  214.333957]  [\u003cd083686b\u003e] ssb_driver_unregister+0xb/0x10 [ssb]\n[  214.333957]  [\u003cd087c488\u003e] b43legacy_exit+0xd/0xf [b43legacy]\n[  214.333957]  [\u003cc1089dde\u003e] sys_delete_module+0x14e/0x2b0\n[  214.333957]  [\u003cc110a4a7\u003e] ? vfs_write+0xf7/0x150\n[  214.333957]  [\u003cc1240050\u003e] ? tty_write_lock+0x50/0x50\n[  214.333957]  [\u003cc110a6f8\u003e] ? sys_write+0x38/0x70\n[  214.333957]  [\u003cc1397c55\u003e] syscall_call+0x7/0xb\n[  214.333957] Code: bc 27 00 00 00 00 a1 74 61 56 c1 55 89 e5 e8 a3 fc ff ff 5d c3 90 55 89 e5 57 56 89 c6 53 b8 40 ac 62 c1 83 ec 14 e8 bb b7 34 00 \u003c8b\u003e 46 4c 8d 50 01 85 c0 89 56 4c 75 03 83 0e 40 80 05 40 ac 62\n[  214.333957] EIP: [\u003cc104c395\u003e] drain_workqueue+0x15/0x170 SS:ESP 0068:cd767e5c\n[  214.333957] CR2: 000000000000004c\n[  214.341110] ---[ end trace c7e90ec026d875a6 ]---Index: wireless-testing/drivers/net/wireless/b43legacy/main.c\n\nThe problem is fixed by making certain that the ucode pointer is not NULL\nbefore deregistering the driver in mac80211.\n\nSigned-off-by: Larry Finger \u003cLarry.Finger@lwfinger.net\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "1eafb0280d1275629da54c350c7d9842f7785577",
      "tree": "107e662b82a4f0b6f5f910811d99bf1e4b6e70c0",
      "parents": [
        "de5d66e635460e27d678df99f9cb97e263d3bbe7"
      ],
      "author": {
        "name": "Ben Hutchings",
        "email": "ben@decadent.org.uk",
        "time": "Wed Sep 05 14:37:37 2012 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:25 2012 -0700"
      },
      "message": "tools/hv: Check for read/write errors\n\ncommit 436473bc2173499ae274d0f50111d1e355006caf upstream.\n\nhv_kvp_daemon currently does not check whether fread() or fwrite()\nsucceed.  Add the necessary checks.  Also, remove the incorrect use of\nfeof() before fread().\n\nSigned-off-by: Ben Hutchings \u003cben@decadent.org.uk\u003e\nSigned-off-by: K. Y. Srinivasan \u003ckys@microsoft.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "de5d66e635460e27d678df99f9cb97e263d3bbe7",
      "tree": "734cc5bfc94431454dc01d72cfac3c041e1ca93c",
      "parents": [
        "37b6d804b3b5e2a255d2182ce00e1f25c568d7e9"
      ],
      "author": {
        "name": "Ben Hutchings",
        "email": "ben@decadent.org.uk",
        "time": "Wed Sep 05 14:37:36 2012 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:25 2012 -0700"
      },
      "message": "tools/hv: Fix exit() error code\n\ncommit 6bb22fea25624ab593eee376fa5fb82d1b13f45a upstream.\n\nLinux native exit codes are 8-bit unsigned values.  exit(-1) results\nin an exit code of 255, which is usually reserved for shells reporting\n\u0027command not found\u0027.  Use the portable value EXIT_FAILURE.  (Not that\nthis matters much for a daemon.)\n\nSigned-off-by: Ben Hutchings \u003cben@decadent.org.uk\u003e\nSigned-off-by: K. Y. Srinivasan \u003ckys@microsoft.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "37b6d804b3b5e2a255d2182ce00e1f25c568d7e9",
      "tree": "6040d52800a23618a978915d5d71624c482f4620",
      "parents": [
        "268b7d491c88845b410b2dfc84af54075db35c4d"
      ],
      "author": {
        "name": "Ben Hutchings",
        "email": "ben@decadent.org.uk",
        "time": "Wed Sep 05 14:37:35 2012 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:25 2012 -0700"
      },
      "message": "tools/hv: Fix file handle leak\n\ncommit d5ab482799e7c4c4b7c0aa67e8710dce28115d03 upstream.\n\nMatch up each fopen() with an fclose().\n\nSigned-off-by: Ben Hutchings \u003cben@decadent.org.uk\u003e\nSigned-off-by: K. Y. Srinivasan \u003ckys@microsoft.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "268b7d491c88845b410b2dfc84af54075db35c4d",
      "tree": "b3cbc271f68d91146ba0557a01c96c3073f5e162",
      "parents": [
        "c5500c74ff1414578161b796557b382d5cbaf024"
      ],
      "author": {
        "name": "Flavio Leitner",
        "email": "fbl@redhat.com",
        "time": "Fri Sep 21 21:04:34 2012 -0300"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:25 2012 -0700"
      },
      "message": "serial: set correct baud_base for EXSYS EX-41092 Dual 16950\n\ncommit 26e8220adb0aec43b7acafa0f1431760eee28522 upstream.\n\nApparently the same card model has two IDs, so this patch\ncomplements the commit 39aced68d664291db3324d0fcf0985ab5626aac2\nadding the missing one.\n\nSigned-off-by: Flavio Leitner \u003cfbl@redhat.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "c5500c74ff1414578161b796557b382d5cbaf024",
      "tree": "39502c205b72977acb439844e119e9910d82cb65",
      "parents": [
        "bba5a67bba4c56ab0ce632d7a3e1a651d9162b9e"
      ],
      "author": {
        "name": "Linus Walleij",
        "email": "linus.walleij@linaro.org",
        "time": "Wed Sep 26 17:21:36 2012 +0200"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:25 2012 -0700"
      },
      "message": "serial: pl011: handle corruption at high clock speeds\n\ncommit c5dd553b9fd069892c9e2de734f4f604e280fa7a upstream.\n\nThis works around a few glitches in the ST version of the PL011\nserial driver when using very high baud rates, as we do in the\nUx500: 3, 3.25, 4 and 4.05 Mbps.\n\nProblem Observed/rootcause:\n\nWhen using high baud-rates, and the baudrate*8 is getting close to\nthe provided clock frequency (so a division factor close to 1), when\nusing bursts of characters (so they are abutted), then it seems as if\nthere is not enough time to detect the beginning of the start-bit which\nis a timing reference for the entire character, and thus the sampling\nmoment of character bits is moving towards the end of each bit, instead\nof the middle.\n\nFix:\nIncrease slightly the RX baud rate of the UART above the theoretical\nbaudrate by 5%. This will definitely give more margin time to the\nUART_RX to correctly sample the data at the middle of the bit period.\n\nAlso fix the ages old copy-paste error in the very stressed comment,\nit\u0027s referencing the registers used in the PL010 driver rather than\nthe PL011 ones.\n\nSigned-off-by: Guillaume Jaunet \u003cguillaume.jaunet@stericsson.com\u003e\nSigned-off-by: Christophe Arnal \u003cchristophe.arnal@stericsson.com\u003e\nSigned-off-by: Matthias Locher \u003cmatthias.locher@stericsson.com\u003e\nSigned-off-by: Rajanikanth HV \u003crajanikanth.hv@stericsson.com\u003e\nCc: Bibek Basu \u003cbibek.basu@stericsson.com\u003e\nCc: Par-Gunnar Hjalmdahl \u003cpar-gunnar.hjalmdahl@stericsson.com\u003e\nSigned-off-by: Linus Walleij \u003clinus.walleij@linaro.org\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "bba5a67bba4c56ab0ce632d7a3e1a651d9162b9e",
      "tree": "a5f6c2031dbe52ba45118c2265c9f3c23c7ef3a0",
      "parents": [
        "804f6a4a4745ce54f3afa76b3d2270b385f565f8"
      ],
      "author": {
        "name": "Vikram Pandita",
        "email": "vikram.pandita@ti.com",
        "time": "Thu Sep 06 15:45:37 2012 +0300"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:25 2012 -0700"
      },
      "message": "serial: omap: fix software flow control\n\ncommit 957ee7270d632245b43f6feb0e70d9a5e9ea6cf6 upstream.\n\nSoftware flow control register bits were not defined correctly.\n\nAlso clarify the IXON and IXOFF logic to reflect what userspace wants.\n\nTested-by: Shubhrajyoti D \u003cshubhrajyoti@ti.com\u003e\nSigned-off-by: Vikram Pandita \u003cvikram.pandita@ti.com\u003e\nSigned-off-by: Shubhrajyoti D \u003cshubhrajyoti@ti.com\u003e\nAcked-by: Tony Lindgren \u003ctony@atomide.com\u003e\nSigned-off-by: Felipe Balbi \u003cbalbi@ti.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "804f6a4a4745ce54f3afa76b3d2270b385f565f8",
      "tree": "8e49169e36ef57e0a96d7ae131d0dba8d7711c94",
      "parents": [
        "e2a43abf3d9c6a3828d9a02c3de0d8bf16bd4b90"
      ],
      "author": {
        "name": "Jiri Slaby",
        "email": "jslaby@suse.cz",
        "time": "Tue Aug 07 21:47:39 2012 +0200"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:24 2012 -0700"
      },
      "message": "TTY: ttyprintk, don\u0027t touch behind tty-\u003ewrite_buf\n\ncommit ee8b593affdf893012e57f4c54a21984d1b0d92e upstream.\n\nIf a user provides a buffer larger than a tty-\u003ewrite_buf chunk and\npasses \u0027\\r\u0027 at the end of the buffer, we touch an out-of-bound memory.\n\nAdd a check there to prevent this.\n\nSigned-off-by: Jiri Slaby \u003cjslaby@suse.cz\u003e\nCc: Samo Pogacnik \u003csamo_pogacnik@t-2.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "e2a43abf3d9c6a3828d9a02c3de0d8bf16bd4b90",
      "tree": "96ed423a829f0d1a0d0e072dd72eedac9334571e",
      "parents": [
        "f810716cd61810278caee8eefed22e8706e49125"
      ],
      "author": {
        "name": "Stanislav Kozina",
        "email": "skozina@redhat.com",
        "time": "Thu Aug 16 12:01:47 2012 +0100"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:24 2012 -0700"
      },
      "message": "Remove BUG_ON from n_tty_read()\n\ncommit e9490e93c1978b6669f3e993caa3189be13ce459 upstream.\n\nChange the BUG_ON to WARN_ON and return in case of tty-\u003eread_buf\u003d\u003dNULL. We want to track a\ncouple of long standing reports of this but at the same time we can avoid killing the box.\n\nSigned-off-by: Stanislav Kozina \u003cskozina@redhat.com\u003e\nSigned-off-by: Alan Cox \u003calan@linux.intel.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "f810716cd61810278caee8eefed22e8706e49125",
      "tree": "5535a057fe66259a7cdfbafad1757bc92650a47f",
      "parents": [
        "19dcf415184e1ef6d9641d76e3248d3b2677b3df"
      ],
      "author": {
        "name": "Ian Abbott",
        "email": "abbotti@mev.co.uk",
        "time": "Wed Sep 19 19:37:39 2012 +0100"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:24 2012 -0700"
      },
      "message": "staging: comedi: fix memory leak for saved channel list\n\ncommit c8cad4c89ee3b15935c532210ae6ebb5c0a2734d upstream.\n\nWhen `do_cmd_ioctl()` allocates memory for the kernel copy of a channel\nlist, it frees any previously allocated channel list in\n`async-\u003ecmd.chanlist` and replaces it with the new one.  However, if the\ndevice is ever removed (or \"detached\") the cleanup code in\n`cleanup_device()` in \"drivers.c\" does not free this memory so it is\nlost.\n\nA sensible place to free the kernel copy of the channel list is in\n`do_become_nonbusy()` as at that point the comedi asynchronous command\nassociated with the channel list is no longer valid.  Free the channel\nlist in `do_become_nonbusy()` instead of `do_cmd_ioctl()` and clear the\npointer to prevent it being freed more than once.\n\nNote that `cleanup_device()` could be called at an inappropriate time\nwhile the comedi device is open, but that\u0027s a separate bug not related\nto this this patch.\n\nSigned-off-by: Ian Abbott \u003cabbotti@mev.co.uk\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "19dcf415184e1ef6d9641d76e3248d3b2677b3df",
      "tree": "288b3c87cb1d940642988fe5d6c491f0ddb4383a",
      "parents": [
        "4483c56613f9ca0cff15d231975b240d3f3e8a10"
      ],
      "author": {
        "name": "Ian Abbott",
        "email": "abbotti@mev.co.uk",
        "time": "Tue Sep 18 19:46:58 2012 +0100"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:24 2012 -0700"
      },
      "message": "staging: comedi: don\u0027t dereference user memory for INSN_INTTRIG\n\ncommit 5d06e3df280bd230e2eadc16372e62818c63e894 upstream.\n\n`parse_insn()` is dereferencing the user-space pointer `insn-\u003edata`\ndirectly when handling the `INSN_INTTRIG` comedi instruction.  It\nshouldn\u0027t be using `insn-\u003edata` at all; it should be using the separate\n`data` pointer passed to the function.  Fix it.\n\nSigned-off-by: Ian Abbott \u003cabbotti@mev.co.uk\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "4483c56613f9ca0cff15d231975b240d3f3e8a10",
      "tree": "d981269d592d99a65e3a5c7f75baf7539137936e",
      "parents": [
        "b5697de62b79060f59a5d7780aa4c16fdcfaa929"
      ],
      "author": {
        "name": "Ian Abbott",
        "email": "abbotti@mev.co.uk",
        "time": "Thu Sep 27 17:45:27 2012 +0100"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:24 2012 -0700"
      },
      "message": "staging: comedi: jr3_pci: fix iomem dereference\n\ncommit e1878957b4676a17cf398f7f5723b365e9a2ca48 upstream.\n\nCorrect a direct dereference of I/O memory to use an appropriate I/O\nmemory access function.  Note that the pointer being dereferenced is not\ncurrently tagged with `__iomem` but I plan to correct that for 3.7.\n\nSigned-off-by: Ian Abbott \u003cabbotti@mev.co.uk\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "b5697de62b79060f59a5d7780aa4c16fdcfaa929",
      "tree": "722c7f11ac858994bdd241b1f08f9761239e669d",
      "parents": [
        "28675586f391fc14960de13c63359b25542ddec4"
      ],
      "author": {
        "name": "Ian Abbott",
        "email": "abbotti@mev.co.uk",
        "time": "Mon Sep 24 17:20:52 2012 +0100"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:24 2012 -0700"
      },
      "message": "staging: comedi: s626: don\u0027t dereference insn-\u003edata\n\ncommit b655c2c4782ed3e2e71d2608154e295a3e860311 upstream.\n\n`s626_enc_insn_config()` is incorrectly dereferencing `insn-\u003edata` which\nis a pointer to user memory.  It should be dereferencing the separate\n`data` parameter that points to a copy of the data in kernel memory.\n\nSigned-off-by: Ian Abbott \u003cabbotti@mev.co.uk\u003e\nReviewed-by: H Hartley Sweeten \u003chsweeten@visionengravers.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "28675586f391fc14960de13c63359b25542ddec4",
      "tree": "0f3eed780b14e99851c117aba9525ecdef8c5f87",
      "parents": [
        "0f2c427a4f4a994526bea7ce3855284fc5a7940a"
      ],
      "author": {
        "name": "Larry Finger",
        "email": "Larry.Finger@lwfinger.net",
        "time": "Wed Sep 26 14:01:31 2012 -0500"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:24 2012 -0700"
      },
      "message": "staging: r8712u: Do not queue cloned skb\n\ncommit fa16e5ea25d7dd83f663f333e70713aa2fa5dffe upstream.\n\nSome post-3.4 kernels have a problem when a cloned skb is used in the\nRX path. This patch handles one such case for r8712u.\n\nThe patch was suggested by Eric Dumazet.\n\nSigned-off-by: Larry Finger \u003cLarry.Finger@lwfinger.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "0f2c427a4f4a994526bea7ce3855284fc5a7940a",
      "tree": "8393569061525156d18bf2ce565fbc087dcf8a5c",
      "parents": [
        "f7d978ef5d1cdbbb7bd7dba5fb995d56b7640b37"
      ],
      "author": {
        "name": "Christopher Brannon",
        "email": "chris@the-brannons.com",
        "time": "Fri Jun 22 08:16:34 2012 -0500"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:23 2012 -0700"
      },
      "message": "tty: keyboard.c: Remove locking from vt_get_leds.\n\ncommit 157a4b311c45c9aba75a990464d9680867dc8805 upstream.\n\nThere are three call sites for this function, and all three\nare called within a keyboard handler.\nkbd_event_lock is already held within keyboard handlers,\nso attempting to lock it in vt_get_leds causes deadlock.\n\nSigned-off-by: Christopher Brannon \u003cchris@the-brannons.com\u003e\nAcked-by: Alan Cox \u003calan@linux.intel.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "f7d978ef5d1cdbbb7bd7dba5fb995d56b7640b37",
      "tree": "3b04a482ccab1441a2dd0ecc18429d8db053ce15",
      "parents": [
        "1d64560a29d149803a119527ad6b3d80b83a85a8"
      ],
      "author": {
        "name": "Ben Hutchings",
        "email": "ben@decadent.org.uk",
        "time": "Sun Sep 16 04:18:50 2012 +0100"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:23 2012 -0700"
      },
      "message": "staging: speakup_soft: Fix reading of init string\n\ncommit 40fe4f89671fb3c7ded94190fb267402a38b0261 upstream.\n\nsoftsynth_read() reads a character at a time from the init string;\nwhen it finds the null terminator it sets the initialized flag but\nthen repeats the last character.\n\nAdditionally, if the read() buffer is not big enough for the init\nstring, the next read() will start reading from the beginning again.\nSo the caller may never progress to reading anything else.\n\nReplace the simple initialized flag with the current position in\nthe init string, carried over between calls.  Switch to reading\nreal data once this reaches the null terminator.\n\n(This assumes that the length of the init string can\u0027t change, which\nseems to be the case.  Really, the string and position belong together\nin a per-file private struct.)\n\nTested-by: Samuel Thibault \u003csthibault@debian.org\u003e\nSigned-off-by: Ben Hutchings \u003cben@decadent.org.uk\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "1d64560a29d149803a119527ad6b3d80b83a85a8",
      "tree": "847712bafec91211f8e9827b1798f50092773520",
      "parents": [
        "28939e9a0972df8eff635a92c0c0a62efe97d9a2"
      ],
      "author": {
        "name": "Vivek Gautam",
        "email": "gautam.vivek@samsung.com",
        "time": "Sat Sep 22 18:11:19 2012 +0530"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:23 2012 -0700"
      },
      "message": "usb: host: xhci: Fix Null pointer dereferencing with 71c731a for non-x86 systems\n\ncommit 457a73d346187c2cc5d599072f38676f18f130e0 upstream.\n\nIn 71c731a: usb: host: xhci: Fix Compliance Mode on SN65LVPE502CP Hardware\nwhen extracting DMI strings (vendor or product_name) to mark them as quirk\nwe may get NULL pointer in case of non-x86 systems which won\u0027t define\nCONFIG_DMI. Hence susbsequent strstr() calls crash while driver probing.\n\nSo, returning \u0027false\u0027 here in case we get a NULL vendor or product_name.\n\nThis is tested with ARM (exynos) system.\n\nThis patch should be backported to stable kernels as old as 3.6, that\ncontain the commit 71c731a296f1b08a3724bd1b514b64f1bda87a23 \"usb: host:\nxhci: Fix Compliance Mode on SN65LVPE502CP Hardware\"\n\nSigned-off-by: Vivek Gautam \u003cgautam.vivek@samsung.com\u003e\nSigned-off-by: Sarah Sharp \u003csarah.a.sharp@linux.intel.com\u003e\nReported-by: Sebastian Gottschall (DD-WRT) \u003cs.gottschall@dd-wrt.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "28939e9a0972df8eff635a92c0c0a62efe97d9a2",
      "tree": "921fca1db9cfd93583e4218e0145688ba7d40dd6",
      "parents": [
        "e59f498dc3f7679f236b2aec4a6c23173de78a65"
      ],
      "author": {
        "name": "Bjørn Mork",
        "email": "bjorn@mork.no",
        "time": "Wed Sep 19 22:02:03 2012 +0200"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:23 2012 -0700"
      },
      "message": "USB: qcaux: add Pantech vendor class match\n\ncommit c638eb2872b3af079501e7ee44cbb8a5cce9b4b5 upstream.\n\nThe three Pantech devices UML190 (106c:3716), UML290 (106c:3718) and\nP4200 (106c:3721) all use the same subclasses to identify vendor\nspecific functions.  Replace the existing device specific entries\nwith generic vendor matching, adding support for the P4200.\n\nSigned-off-by: Bjørn Mork \u003cbjorn@mork.no\u003e\nCc: Thomas Schäfer \u003ctschaefer@t-online.de\u003e\nAcked-by: Dan Williams \u003cdcbw@redhat.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "e59f498dc3f7679f236b2aec4a6c23173de78a65",
      "tree": "db01980c214418a3f132fe6c875f6e68a690fcc0",
      "parents": [
        "58bd65bfa47cf7dec02c8a1e2201dad0003acfb6"
      ],
      "author": {
        "name": "Antonio Ospite",
        "email": "ospite@studenti.unina.it",
        "time": "Sun Sep 23 09:57:25 2012 +0200"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:23 2012 -0700"
      },
      "message": "USB: ftdi_sio: add TIAO USB Multi-Protocol Adapter (TUMPA) support\n\ncommit 54575b05af36959dfb6a49a3e9ca0c2b456b7126 upstream.\n\nTIAO/DIYGADGET USB Multi-Protocol Adapter (TUMPA) is an FTDI FT2232H\nbased device which provides an easily accessible JTAG, SPI, I2C, serial\nbreakout.\n\nhttp://www.diygadget.com/tiao-usb-multi-protocol-adapter-jtag-spi-i2c-serial.html\nhttp://www.tiaowiki.com/w/TIAO_USB_Multi_Protocol_Adapter_User%27s_Manual\n\nFTDI FT2232H provides two serial channels (A and B), but on the TUMPA\nchannel A is dedicated to JTAG/SPI while channel B can be used for\nUART/RS-232: use the ftdi_jtag_quirk to expose only channel B as\na usb-serial interface to userspace.\n\nSigned-off-by: Antonio Ospite \u003cospite@studenti.unina.it\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "58bd65bfa47cf7dec02c8a1e2201dad0003acfb6",
      "tree": "55a8b69e55f97176383ad5f4ff38dd77b56fee71",
      "parents": [
        "47c8e86e3869d7b7d159b069ad80cc621c2b1199"
      ],
      "author": {
        "name": "Bjørn Mork",
        "email": "bjorn@mork.no",
        "time": "Wed Sep 19 22:02:12 2012 +0200"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:23 2012 -0700"
      },
      "message": "USB: option: blacklist QMI interface on ZTE MF683\n\ncommit 160c9425ac52cb30502be2d9c5e848cec91bb115 upstream.\n\nInterface #5 on ZTE MF683 is a QMI/wwan interface.\n\nSigned-off-by: Bjørn Mork \u003cbjorn@mork.no\u003e\nCc: Shawn J. Goff \u003cshawn7400@gmail.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "47c8e86e3869d7b7d159b069ad80cc621c2b1199",
      "tree": "4c67408aa53c4f5e6f69f77117f0ffe34a436717",
      "parents": [
        "c0b50b292c41e0a1c6a1ef6df665fe7fb8eac2e1"
      ],
      "author": {
        "name": "Sebastian Andrzej Siewior",
        "email": "sebastian@breakpoint.cc",
        "time": "Sun Aug 19 21:54:58 2012 +0200"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:23 2012 -0700"
      },
      "message": "usb: gadget: dummy_hcd: fixup error probe path\n\ncommit 1b68a4ca2d038addb7314211d122fb6d7002b38b upstream.\n\nIf USB2 host controller probes fine but USB3 does not then we don\u0027t\nremove the USB controller properly and lock up the system while the HUB\ncode will try to enumerate the USB2 controller and access memory which\nis no longer available in case the dummy_hcd was compiled as a module.\n\nThis is a problem since 448b6eb1 (\"USB: Make sure to fetch the BOS desc\nfor roothubs.) if used in USB3 mode because dummy does not provide this\ndescriptor and explodes later.\n\nSigned-off-by: Sebastian Andrzej Siewior \u003csebastian@breakpoint.cc\u003e\nSigned-off-by: Felipe Balbi \u003cbalbi@ti.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "c0b50b292c41e0a1c6a1ef6df665fe7fb8eac2e1",
      "tree": "00bdc183dd5bd765f27d24bb99aee7ec024c48b1",
      "parents": [
        "7d77f4776e3fc8770f90244f1f5d1c9181b834c7"
      ],
      "author": {
        "name": "Mikulas Patocka",
        "email": "mpatocka@redhat.com",
        "time": "Wed Sep 26 23:45:48 2012 +0100"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:22 2012 -0700"
      },
      "message": "dm verity: fix overflow check\n\ncommit 1d55f6bcc0331d744cd5b56c4ee79e3809438161 upstream.\n\nThis patch fixes sector_t overflow checking in dm-verity.\n\nWithout this patch, the code checks for overflow only if sector_t is\nsmaller than long long, not if sector_t and long long have the same size.\n\nSigned-off-by: Mikulas Patocka \u003cmpatocka@redhat.com\u003e\nSigned-off-by: Alasdair G Kergon \u003cagk@redhat.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "7d77f4776e3fc8770f90244f1f5d1c9181b834c7",
      "tree": "531d3b3a3fb26aa78608fa92817b0ef0ccaae162",
      "parents": [
        "f9954ca80cc595852db6e913e65808819b9dc413"
      ],
      "author": {
        "name": "Milan Broz",
        "email": "mbroz@redhat.com",
        "time": "Wed Sep 26 23:45:43 2012 +0100"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:22 2012 -0700"
      },
      "message": "dm table: clear add_random unless all devices have it set\n\ncommit c3c4555edd10dbc0b388a0125b9c50de5e79af05 upstream.\n\nAlways clear QUEUE_FLAG_ADD_RANDOM if any underlying device does not\nhave it set. Otherwise devices with predictable characteristics may\ncontribute entropy.\n\nQUEUE_FLAG_ADD_RANDOM specifies whether or not queue IO timings\ncontribute to the random pool.\n\nFor bio-based targets this flag is always 0 because such devices have no\nreal queue.\n\nFor request-based devices this flag was always set to 1 by default.\n\nNow set it according to the flags on underlying devices. If there is at\nleast one device which should not contribute, set the flag to zero: If a\ndevice, such as fast SSD storage, is not suitable for supplying entropy,\na request-based queue stacked over it will not be either.\n\nBecause the checking logic is exactly same as for the rotational flag,\nshare the iteration function with device_is_nonrot().\n\nSigned-off-by: Milan Broz \u003cmbroz@redhat.com\u003e\nSigned-off-by: Alasdair G Kergon \u003cagk@redhat.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "f9954ca80cc595852db6e913e65808819b9dc413",
      "tree": "44d16ae268264563895327b5d100f837d5e8dc41",
      "parents": [
        "9316bed3701438b79644e80cc4dd4903a40c756b"
      ],
      "author": {
        "name": "Mike Snitzer",
        "email": "snitzer@redhat.com",
        "time": "Wed Sep 26 23:45:42 2012 +0100"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 07 08:32:22 2012 -0700"
      },
      "message": "dm: handle requests beyond end of device instead of using BUG_ON\n\ncommit ba1cbad93dd47223b1f3b8edd50dd9ef2abcb2ed upstream.\n\nThe access beyond the end of device BUG_ON that was introduced to\ndm_request_fn via commit 29e4013de7ad950280e4b2208 (\"dm: implement\nREQ_FLUSH/FUA support for request-based dm\") was an overly\ndrastic (but simple) response to this situation.\n\nI have received a report that this BUG_ON was hit and now think\nit would be better to use dm_kill_unmapped_request() to fail the clone\nand original request with -EIO.\n\nmap_request() will assign the valid target returned by\ndm_table_find_target to tio-\u003eti.  But when the target\nisn\u0027t valid tio-\u003eti is never assigned (because map_request isn\u0027t\ncalled); so add a check for tio-\u003eti !\u003d NULL to dm_done().\n\nReported-by: Mike Christie \u003cmichaelc@cs.wisc.edu\u003e\nSigned-off-by: Mike Snitzer \u003csnitzer@redhat.com\u003e\nSigned-off-by: Jun\u0027ichi Nomura \u003cj-nomura@ce.jp.nec.com\u003e\nSigned-off-by: Alasdair G Kergon \u003cagk@redhat.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    }
  ],
  "next": "9316bed3701438b79644e80cc4dd4903a40c756b"
}
