)]}'
{
  "log": [
    {
      "commit": "59430c2f437767094298f30dd02ca038da0df755",
      "tree": "3c79740e3580e403df02daafba26fa6e67552c16",
      "parents": [
        "e9ee3a54a164c249a0a576c403eba367a6d97be5",
        "16ebb5e0b36ceadc8186f71d68b0c4fa4b6e781b"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Sat Sep 05 14:52:41 2009 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Sat Sep 05 14:52:41 2009 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6:\n  tc: Fix unitialized kernel memory leak\n  pkt_sched: Revert tasklet_hrtimer changes.\n  net: sk_free() should be allowed right after sk_alloc()\n  gianfar: gfar_remove needs to call unregister_netdev()\n  ipw2200: firmware DMA loading rework\n"
    },
    {
      "commit": "16ebb5e0b36ceadc8186f71d68b0c4fa4b6e781b",
      "tree": "4a89b7591d0f4478d0dda12db649db2d94d16929",
      "parents": [
        "2fbd3da3877ad8d923b055e5996f80b4d4a6daf4"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Wed Sep 02 02:40:09 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Sep 02 22:55:17 2009 -0700"
      },
      "message": "tc: Fix unitialized kernel memory leak\n\nThree bytes of uninitialized kernel memory are currently leaked to user\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nReviewed-by: Jiri Pirko \u003cjpirko@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2fbd3da3877ad8d923b055e5996f80b4d4a6daf4",
      "tree": "7caa4ea3f3517d2f6b38142f64527c82b8e57b2e",
      "parents": [
        "d66ee0587c3927aea5178a822976c7c853d815fe"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Sep 01 17:59:25 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Sep 01 17:59:25 2009 -0700"
      },
      "message": "pkt_sched: Revert tasklet_hrtimer changes.\n\nThese are full of unresolved problems, mainly that conversions don\u0027t\nwork 1-1 from hrtimers to tasklet_hrtimers because unlike hrtimers\ntasklets can\u0027t be killed from softirq context.\n\nAnd when a qdisc gets reset, that\u0027s exactly what we need to do here.\n\nWe\u0027ll work this out in the net-next-2.6 tree and if warranted we\u0027ll\nbackport that work to -stable.\n\nThis reverts the following 3 changesets:\n\na2cb6a4dd470d7a64255a10b843b0d188416b78f\n(\"pkt_sched: Fix bogon in tasklet_hrtimer changes.\")\n\n38acce2d7983632100a9ff3fd20295f6e34074a8\n(\"pkt_sched: Convert CBQ to tasklet_hrtimer.\")\n\nee5f9757ea17759e1ce5503bdae2b07e48e32af9\n(\"pkt_sched: Convert qdisc_watchdog to tasklet_hrtimer\")\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d66ee0587c3927aea5178a822976c7c853d815fe",
      "tree": "3367ebb2757501223ae658b23a96f352aa6ebba8",
      "parents": [
        "38bddf04bcfe661fbdab94888c3b72c32f6873b3"
      ],
      "author": {
        "name": "Jarek Poplawski",
        "email": "jarkao2@gmail.com",
        "time": "Sun Aug 30 23:15:36 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Sep 01 17:49:00 2009 -0700"
      },
      "message": "net: sk_free() should be allowed right after sk_alloc()\n\nAfter commit 2b85a34e911bf483c27cfdd124aeb1605145dc80\n(net: No more expensive sock_hold()/sock_put() on each tx)\nsk_free() frees socks conditionally and depends\non sk_wmem_alloc being set e.g. in sock_init_data(). But in some\ncases sk_free() is called earlier, usually after other alloc errors.\n\nFix is to move sk_wmem_alloc initialization from sock_init_data()\nto sk_alloc() itself.\n\nSigned-off-by: Jarek Poplawski \u003cjarkao2@gmail.com\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2574cc9f4ffc6c681c9177111357efe5b76f0e36",
      "tree": "5e220b5a26e25df9fc03b58c7fa4daeebafce062",
      "parents": [
        "ea6bff368548d79529421a9dc0710fc5330eb504"
      ],
      "author": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Fri Aug 28 11:12:12 2009 -0400"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri Aug 28 19:35:56 2009 -1000"
      },
      "message": "SUNRPC: Fix rpc_task_force_reencode\n\nThis patch fixes the bug that was reported in\n  http://bugzilla.kernel.org/show_bug.cgi?id\u003d14053\n\nIf we\u0027re in the case where we need to force a reencode and then resend of\nthe RPC request, due to xprt_transmit failing with a networking error, then\nwe _must_ retransmit the entire request.\n\nSigned-off-by: Trond Myklebust \u003cTrond.Myklebust@netapp.com\u003e\nCc: stable@kernel.org\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\n"
    },
    {
      "commit": "cf481442f2e086316ed8a1b3046f00ad23632ac4",
      "tree": "2edd0fb64549dfb6388e39d86e8965908dfcb925",
      "parents": [
        "788d908f2879a17e5f80924f3da2e23f1034482d",
        "7815f4be4026b6c5027058102ae67a4b9feffa5f"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Aug 27 12:24:08 2009 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Aug 27 12:24:08 2009 -0700"
      },
      "message": "Merge branch \u0027for-linus\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/ericvh/v9fs\n\n* \u0027for-linus\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/ericvh/v9fs:\n  9p: update documentation pointers\n  9p: remove unnecessary v9fses-\u003eoptions which duplicates the mount string\n  net/9p: insulate the client against an invalid error code sent by a 9p server\n  9p: Add missing cast for the error return value in v9fs_get_inode\n  9p: Remove redundant inode uid/gid assignment\n  9p: Fix possible regressions when -\u003eget_sb fails.\n  9p: Fix v9fs show_options\n  9p: Fix possible memleak in v9fs_inode_from fid.\n  9p: minor comment fixes\n  9p: Fix possible inode leak in v9fs_get_inode.\n  9p: Check for error in return value of v9fs_fid_add\n"
    },
    {
      "commit": "788d908f2879a17e5f80924f3da2e23f1034482d",
      "tree": "890ada4f22e9ce5d64a121efc1ca63390d6b2100",
      "parents": [
        "9886e836a6a5dbd273dc55b17e713f0a188d137f"
      ],
      "author": {
        "name": "Julien TINNES",
        "email": "julien@cr0.org",
        "time": "Thu Aug 27 15:26:58 2009 +0200"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Aug 27 12:23:43 2009 -0700"
      },
      "message": "ipv4: make ip_append_data() handle NULL routing table\n\nAdd a check in ip_append_data() for NULL *rtp to prevent future bugs in\ncallers from being exploitable.\n\nSigned-off-by: Julien Tinnes \u003cjulien@cr0.org\u003e\nSigned-off-by: Tavis Ormandy \u003ctaviso@sdf.lonestar.org\u003e\nAcked-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\n"
    },
    {
      "commit": "f415c413f458837bd0c27086b79aca889f9435e4",
      "tree": "b5c09f326b07637f97ddc2c1795ffbbef62bed23",
      "parents": [
        "4dc627d55edad85e26ae81f17634bd4590993ba0",
        "4484b9c8b4976acee181d377f8ba571109d1a2be"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Aug 25 21:24:49 2009 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Aug 25 21:24:49 2009 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6:\n  irda/sa1100_ir: fix broken netdev_ops conversion\n  irda/au1k_ir: fix broken netdev_ops conversion\n  pkt_sched: Fix bogon in tasklet_hrtimer changes.\n"
    },
    {
      "commit": "a2cb6a4dd470d7a64255a10b843b0d188416b78f",
      "tree": "33596c7aa4b444e96b112d92173e88dc8ea8a8d7",
      "parents": [
        "8ff499e43c537648399fca8ba39d24c0768b3fab"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Aug 24 19:37:05 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Aug 24 19:37:05 2009 -0700"
      },
      "message": "pkt_sched: Fix bogon in tasklet_hrtimer changes.\n\nReported by Stephen Rothwell, luckily it\u0027s harmless:\n\nnet/sched/sch_api.c: In function \u0027qdisc_watchdog\u0027:\nnet/sched/sch_api.c:460: warning: initialization from incompatible pointer type\nnet/sched/sch_cbq.c: In function \u0027cbq_undelay\u0027:\nnet/sched/sch_cbq.c:595: warning: initialization from incompatible pointer type\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1cac6ec9b7f9c48a26309380656f399a0587b860",
      "tree": "dac346c856ce2a41641152c0bf9c13935bd65175",
      "parents": [
        "ce0cfd4ca817dbfd5f8267e7a6a235ed2041bf4a",
        "8ff499e43c537648399fca8ba39d24c0768b3fab"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Mon Aug 24 12:25:03 2009 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Mon Aug 24 12:25:03 2009 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6:\n  smc91x: let smc91x work well under netpoll\n  pxaficp-ir: remove incorrect net_device_ops\n  NET: llc, zero sockaddr_llc struct\n  drivers/net: fixed drivers that support netpoll use ndo_start_xmit()\n  netpoll: warning for ndo_start_xmit returns with interrupts enabled\n  net: Fix Micrel KSZ8842 Kconfig description\n  netfilter: xt_quota: fix wrong return value (error case)\n  ipv6: Fix commit 63d9950b08184e6531adceb65f64b429909cc101 (ipv6: Make v4-mapped bindings consistent with IPv4)\n  E100: fix interaction with swiotlb on X86.\n  pkt_sched: Convert CBQ to tasklet_hrtimer.\n  pkt_sched: Convert qdisc_watchdog to tasklet_hrtimer\n  rtl8187: always set MSR_LINK_ENEDCA flag with RTL8187B\n  ibm_newemac: emac_close() needs to call netif_carrier_off()\n  net: fix ks8851 build errors\n  net: Rename MAC platform driver for w90p910 platform\n  yellowfin: Fix buffer underrun after dev_alloc_skb() failure\n  orinoco: correct key bounds check in orinoco_hw_get_tkip_iv\n  mac80211: fix todo lock\n"
    },
    {
      "commit": "28e9fc592cb8c7a43e4d3147b38be6032a0e81bc",
      "tree": "9eda2839aab74028e773bf7bf35a35e5077ff3fe",
      "parents": [
        "4871953c0ef2cafeb37bbe186d9d13dcb24fc2c5"
      ],
      "author": {
        "name": "Jiri Slaby",
        "email": "jirislaby@gmail.com",
        "time": "Sun Aug 23 22:55:51 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Aug 23 22:55:51 2009 -0700"
      },
      "message": "NET: llc, zero sockaddr_llc struct\n\nsllc_arphrd member of sockaddr_llc might not be changed. Zero sllc\nbefore copying to the above layer\u0027s structure.\n\nSigned-off-by: Jiri Slaby \u003cjirislaby@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "79b1bee888d43b14cf0c08fb8e5aa6cb161e48f8",
      "tree": "0b6f33bf7dcf7f87a6a741d3bf9e98e6a1528bb0",
      "parents": [
        "c189308bd8b6a29b11c3ec29a42a3f0aabad6bc8"
      ],
      "author": {
        "name": "Dongdong Deng",
        "email": "dongdong.deng@windriver.com",
        "time": "Fri Aug 21 03:33:36 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Aug 23 19:50:59 2009 -0700"
      },
      "message": "netpoll: warning for ndo_start_xmit returns with interrupts enabled\n\nWARN_ONCE for ndo_start_xmit() enable interrupts in netpoll_send_skb(),\nbecause the NETPOLL API requires that interrupts remain disabled in\nnetpoll_send_skb().\n\nSigned-off-by: Dongdong Deng \u003cdongdong.deng@windriver.com\u003e\nAcked-by: Matt Mackall \u003cmpm@selenic.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2149f66f49ab07515666127bf5140c5c94677af8",
      "tree": "b013b8f3b4b3aa8e4303df7affac09f6aafe7363",
      "parents": [
        "ca6982b858e1d08010c1d29d8e8255b2ac2ad70a"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Thu Aug 20 02:47:34 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Aug 23 19:09:23 2009 -0700"
      },
      "message": "netfilter: xt_quota: fix wrong return value (error case)\n\nSuccess was indicated on a memory allocation failure, thereby causing\na crash due to a later NULL deref.\n(Affects v2.6.30-rc1 up to here.)\n\nSigned-off-by: Jan Engelhardt \u003cjengelh@medozas.de\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ca6982b858e1d08010c1d29d8e8255b2ac2ad70a",
      "tree": "ccc9ad39b1d1b974fa971cf9f3538415240dfa18",
      "parents": [
        "6ff9c2e7fa8ca63a575792534b63c5092099c286"
      ],
      "author": {
        "name": "Bruno Prémont",
        "email": "bonbons@linux-vserver.org",
        "time": "Sun Aug 23 19:06:28 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Aug 23 19:06:28 2009 -0700"
      },
      "message": "ipv6: Fix commit 63d9950b08184e6531adceb65f64b429909cc101 (ipv6: Make v4-mapped bindings consistent with IPv4)\n\nCommit 63d9950b08184e6531adceb65f64b429909cc101\n  (ipv6: Make v4-mapped bindings consistent with IPv4)\nchanges behavior of inet6_bind() for v4-mapped addresses so it should\nbehave the same way as inet_bind().\n\nDuring this change setting of err to -EADDRNOTAVAIL got lost:\n\naf_inet.c:469 inet_bind()\n\terr \u003d -EADDRNOTAVAIL;\n\tif (!sysctl_ip_nonlocal_bind \u0026\u0026\n\t    !(inet-\u003efreebind || inet-\u003etransparent) \u0026\u0026\n\t    addr-\u003esin_addr.s_addr !\u003d htonl(INADDR_ANY) \u0026\u0026\n\t    chk_addr_ret !\u003d RTN_LOCAL \u0026\u0026\n\t    chk_addr_ret !\u003d RTN_MULTICAST \u0026\u0026\n\t    chk_addr_ret !\u003d RTN_BROADCAST)\n\t\tgoto out;\n\n\naf_inet6.c:463 inet6_bind()\n\tif (addr_type \u003d\u003d IPV6_ADDR_MAPPED) {\n\t\tint chk_addr_ret;\n\n\t\t/* Binding to v4-mapped address on a v6-only socket                         \n\t\t * makes no sense                                                           \n\t\t */\n\t\tif (np-\u003eipv6only) {\n\t\t\terr \u003d -EINVAL;\n\t\t\tgoto out; \n\t\t}\n\n\t\t/* Reproduce AF_INET checks to make the bindings consitant */               \n\t\tv4addr \u003d addr-\u003esin6_addr.s6_addr32[3];                                      \n\t\tchk_addr_ret \u003d inet_addr_type(net, v4addr);                                 \n\t\tif (!sysctl_ip_nonlocal_bind \u0026\u0026                                             \n\t\t    !(inet-\u003efreebind || inet-\u003etransparent) \u0026\u0026                               \n\t\t    v4addr !\u003d htonl(INADDR_ANY) \u0026\u0026\n\t\t    chk_addr_ret !\u003d RTN_LOCAL \u0026\u0026                                            \n\t\t    chk_addr_ret !\u003d RTN_MULTICAST \u0026\u0026                                        \n\t\t    chk_addr_ret !\u003d RTN_BROADCAST)\n\t\t\tgoto out;\n\t} else {\n\n\nSigned-off-by Bruno Prémont \u003cbonbons@linux-vserver.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "38acce2d7983632100a9ff3fd20295f6e34074a8",
      "tree": "9207518005cc12ae5e4642b8220471a0168f8c89",
      "parents": [
        "ee5f9757ea17759e1ce5503bdae2b07e48e32af9"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Aug 21 16:51:38 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Aug 23 18:52:38 2009 -0700"
      },
      "message": "pkt_sched: Convert CBQ to tasklet_hrtimer.\n\nThis code expects to run in softirq context, and bare hrtimers\nrun in hw IRQ context.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nAcked-by: Thomas Gleixner \u003ctglx@linutronix.de\u003e\n"
    },
    {
      "commit": "ee5f9757ea17759e1ce5503bdae2b07e48e32af9",
      "tree": "0625fdaf307890a0875981d28ecb77e7ddd96143",
      "parents": [
        "649bf17829d087f83754e2a8161e094a167ce3d3"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Aug 21 16:33:34 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Aug 22 18:09:17 2009 -0700"
      },
      "message": "pkt_sched: Convert qdisc_watchdog to tasklet_hrtimer\n\nNone of this stuff should execute in hw IRQ context, therefore\nuse a tasklet_hrtimer so that it runs in softirq context.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nAcked-by: Thomas Gleixner \u003ctglx@linutronix.de\u003e\n"
    },
    {
      "commit": "08fdef99342955a62884fb5c49ab43431a1cafbf",
      "tree": "79aa5cdb053ae0b82c6d2b2f61eb5cc81115c8b2",
      "parents": [
        "c1a8f1f1c8e01eab5862c8db39b49ace814e6c66",
        "518ff04fd84290a7ad9042e8a46d78d29cb443d3"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Aug 18 16:29:16 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Aug 18 16:29:16 2009 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "8486a0f95c844b27ecc855cfec89b7e34f831cad",
      "tree": "18c0522bc8e4f33cb45a7ec88c7d207071ae5e6d",
      "parents": [
        "b9d030a123b6b7fbf262c995455197ea5184b497",
        "c1a8f1f1c8e01eab5862c8db39b49ace814e6c66"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Aug 18 13:55:01 2009 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Aug 18 13:55:01 2009 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (60 commits)\n  net: restore gnet_stats_basic to previous definition\n  NETROM: Fix use of static buffer\n  e1000e: fix use of pci_enable_pcie_error_reporting\n  e1000e: WoL does not work on 82577/82578 with manageability enabled\n  cnic: Fix locking in init/exit calls.\n  cnic: Fix locking in start/stop calls.\n  bnx2: Use mutex on slow path cnic calls.\n  cnic: Refine registration with bnx2.\n  cnic: Fix symbol_put_addr() panic on ia64.\n  gre: Fix MTU calculation for bound GRE tunnels\n  pegasus: Add new device ID.\n  drivers/net: fixed drivers that support netpoll use ndo_start_xmit()\n  via-velocity: Fix test of mii_status bit VELOCITY_DUPLEX_FULL\n  rt2x00: fix memory corruption in rf cache, add a sanity check\n  ixgbe: Fix receive on real device when VLANs are configured\n  ixgbe: Do not return 0 in ixgbe_fcoe_ddp() upon FCP_RSP in DDP completion\n  netxen: free napi resources during detach\n  netxen: remove netxen workqueue\n  ixgbe: fix issues setting rx-usecs with legacy interrupts\n  can: fix oops caused by wrong rtnl newlink usage\n  ...\n"
    },
    {
      "commit": "c1a8f1f1c8e01eab5862c8db39b49ace814e6c66",
      "tree": "0679f709f70d9a91850888636a28adb79940c402",
      "parents": [
        "c6ba973b8fa97422aab4204f7d79f1d413cde925"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Sun Aug 16 09:36:49 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Aug 17 21:33:49 2009 -0700"
      },
      "message": "net: restore gnet_stats_basic to previous definition\n\nIn 5e140dfc1fe87eae27846f193086724806b33c7d \"net: reorder struct Qdisc\nfor better SMP performance\" the definition of struct gnet_stats_basic\nchanged incompatibly, as copies of this struct are shipped to\nuserland via netlink.\n\nRestoring old behavior is not welcome, for performance reason.\n\nFix is to use a private structure for kernel, and\nteach gnet_stats_copy_basic() to convert from kernel to user land,\nusing legacy structure (struct gnet_stats_basic)\n\nBased on a report and initial patch from Michael Spang.\n\nReported-by: Michael Spang \u003cmspang@csclub.uwaterloo.ca\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c6ba973b8fa97422aab4204f7d79f1d413cde925",
      "tree": "2fbd38ba11da09f18a6ba922c772b41364b03b20",
      "parents": [
        "68eac4602b9104cdaa6c18b3edd914cececa6a1e"
      ],
      "author": {
        "name": "Ralf Baechle",
        "email": "ralf@linux-mips.org",
        "time": "Mon Aug 17 18:05:32 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Aug 17 18:05:32 2009 -0700"
      },
      "message": "NETROM: Fix use of static buffer\n\nThe static variable used by nr_call_to_digi might result in corruption if\nmultiple threads are trying to usee a node or neighbour via ioctl.  Fixed\nby having the caller pass a structure in.  This is safe because nr_add_node\nrsp. nr_add_neigh will allocate a permanent structure, if needed.\n\nSigned-off-by: Ralf Baechle \u003cralf@linux-mips.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0aad37ef3deed118d3816e1d1a600eb2ec9dcb87",
      "tree": "cbcfe9f449f57cd35d0ce262e5287da4f8476f30",
      "parents": [
        "48559b4c30708ebdc849483da9fb83ee08c6c908"
      ],
      "author": {
        "name": "Abhishek Kulkarni",
        "email": "adkulkar@umail.iu.edu",
        "time": "Mon Aug 17 16:38:45 2009 -0500"
      },
      "committer": {
        "name": "Eric Van Hensbergen",
        "email": "ericvh@gmail.com",
        "time": "Mon Aug 17 16:39:54 2009 -0500"
      },
      "message": "net/9p: insulate the client against an invalid error code sent by a 9p server\n\nA looney tunes server sending an invalid error code (which is !IS_ERR_VALUE)\ncan result in a client oops. So fix it by adding a check and converting unknown\nor invalid error codes to -ESERVERFAULT.\n\nSigned-off-by: Abhishek Kulkarni \u003cadkulkar@umail.iu.edu\u003e\nSigned-off-by: Eric Van Hensbergen \u003cericvh@gmail.com\u003e\n"
    },
    {
      "commit": "0e15597ebfe00e28857185f46aba00f400480ffe",
      "tree": "5a1a057ac15bf598c2eee81c54aeefc49c4cee24",
      "parents": [
        "2bb541157fe2602af7b9952096d0524f6f9c1e73"
      ],
      "author": {
        "name": "Abhishek Kulkarni",
        "email": "adkulkar@umail.iu.edu",
        "time": "Sun Jul 19 13:41:55 2009 -0600"
      },
      "committer": {
        "name": "Eric Van Hensbergen",
        "email": "ericvh@strongmad.austin.ibm.com",
        "time": "Mon Aug 17 16:27:57 2009 -0500"
      },
      "message": "9p: minor comment fixes\n\nFix the comments -- mostly the improper and/or missing descriptions\nof function parameters.\n\nSigned-off-by: Abhishek Kulkarni \u003cadkulkar@umail.iu.edu\u003e\nSigned-off-by: Eric Van Hensbergen \u003cericvh@gmail.com\u003e\n"
    },
    {
      "commit": "523d2f6982136d332c9b7dd00e9e16da1091f060",
      "tree": "b2bd70e0e6c5ffe285a2464003fde157d7bbdc7b",
      "parents": [
        "8cdb045632e5ee22854538619ac6f150eb0a4894"
      ],
      "author": {
        "name": "Johannes Berg",
        "email": "johannes@sipsolutions.net",
        "time": "Wed Jul 01 21:26:43 2009 +0200"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Aug 17 13:38:34 2009 -0400"
      },
      "message": "mac80211: fix todo lock\n\nThe key todo lock can be taken from different locks\nthat require it to be _bh to avoid lock inversion\ndue to (soft)irqs.\n\nThis should fix the two problems reported by Bob and\nGabor:\nhttp://mid.gmane.org/20090619113049.GB18956@hash.localnet\nhttp://mid.gmane.org/4A3FA376.8020307@openwrt.org\n\nSigned-off-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nCc: Bob Copeland \u003cme@bobcopeland.com\u003e\nCc: Gabor Juhos \u003cjuhosg@openwrt.org\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "8cdb045632e5ee22854538619ac6f150eb0a4894",
      "tree": "ece387e77861a103ca6cc5b7d501e4c69a0399dc",
      "parents": [
        "7c1d15d736687057f4dc6e51fbf44b6f6e4320cb"
      ],
      "author": {
        "name": "Tom Goff",
        "email": "thomas.goff@boeing.com",
        "time": "Fri Aug 14 16:33:56 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Aug 14 16:41:18 2009 -0700"
      },
      "message": "gre: Fix MTU calculation for bound GRE tunnels\n\nThe GRE header length should be subtracted when the tunnel MTU is\ncalculated.  This just corrects for the associativity change\nintroduced by commit 42aa916265d740d66ac1f17290366e9494c884c2\n(\"gre: Move MTU setting out of ipgre_tunnel_bind_dev\").\n\nSigned-off-by: Tom Goff \u003cthomas.goff@boeing.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "416fbdff2137e8d8cc8f23f517bee3a26b11526f",
      "tree": "83ad1a5397c100fc9d08fd239b5e1b105b96028b",
      "parents": [
        "839d1624b9dcf31fdc02e47359043bb7bd71d6ca"
      ],
      "author": {
        "name": "Luis R. Rodriguez",
        "email": "lrodriguez@atheros.com",
        "time": "Tue Aug 11 13:10:33 2009 -0700"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Thu Aug 13 14:47:42 2009 -0400"
      },
      "message": "mac80211: fix panic when splicing unprepared TIDs\n\nWe splice skbs from the pending queue for a TID\nonto the local pending queue when tearing down a\nblock ack request. This is not necessary unless we\nactually have received a request to start a block ack\nrequest (rate control, for example). If we never received\nthat request we should not be splicing the tid pending\nqueue as it would be null, causing a panic.\n\nNot sure yet how exactly we allowed through a call when the\ntid state does not have at least HT_ADDBA_REQUESTED_MSK set,\nthat will require some further review as it is not quite\nobvious.\n\nFor more information see the bug report:\n\nhttp://bugzilla.kernel.org/show_bug.cgi?id\u003d13922\n\nThis fixes this oops:\n\nBUG: unable to handle kernel NULL pointer dereference at 00000030\nIP: [\u003cf8806c70\u003e] ieee80211_agg_splice_packets+0x40/0xc0 [mac80211]\n*pdpt \u003d 0000000002d1e001 *pde \u003d 0000000000000000\nThread overran stack, or stack corrupted\nOops: 0000 [#1] SMP\nlast sysfs file: /sys/module/aes_generic/initstate\nModules linked in: \u003cbleh\u003e\n\nPid: 0, comm: swapper Not tainted (2.6.31-rc5-wl #2) Dell DV051\nEIP: 0060:[\u003cf8806c70\u003e] EFLAGS: 00010292 CPU: 0\nEIP is at ieee80211_agg_splice_packets+0x40/0xc0 [mac80211]\nEAX: 00000030 EBX: 0000004c ECX: 00000003 EDX: 00000000\nESI: c1c98000 EDI: f745a1c0 EBP: c076be58 ESP: c076be38\n DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068\nProcess swapper (pid: 0, ti\u003dc076a000 task\u003dc0709160 task.ti\u003dc076a000)\nStack: \u003cbleh2\u003e\nCall Trace:\n [\u003cf8806edb\u003e] ? ieee80211_stop_tx_ba_cb+0xab/0x150 [mac80211]\n [\u003cf8802f1e\u003e] ? ieee80211_tasklet_handler+0xce/0x110 [mac80211]\n [\u003cc04862ff\u003e] ? net_rx_action+0xef/0x1d0\n [\u003cc0149378\u003e] ? tasklet_action+0x58/0xc0\n [\u003cc014a0f2\u003e] ? __do_softirq+0xc2/0x190\n [\u003cc018eb48\u003e] ? handle_IRQ_event+0x58/0x140\n [\u003cc01205fe\u003e] ? ack_apic_level+0x7e/0x270\n [\u003cc014a1fd\u003e] ? do_softirq+0x3d/0x40\n [\u003cc014a345\u003e] ? irq_exit+0x65/0x90\n [\u003cc010a6af\u003e] ? do_IRQ+0x4f/0xc0\n [\u003cc014a35d\u003e] ? irq_exit+0x7d/0x90\n [\u003cc011d547\u003e] ? smp_apic_timer_interrupt+0x57/0x90\n [\u003cc01094a9\u003e] ? common_interrupt+0x29/0x30\n [\u003cc010fd9e\u003e] ? mwait_idle+0xbe/0x100\n [\u003cc0107e42\u003e] ? cpu_idle+0x52/0x90\n [\u003cc054b1a5\u003e] ? rest_init+0x55/0x60\n [\u003cc077492d\u003e] ? start_kernel+0x315/0x37d\n [\u003cc07743ce\u003e] ? unknown_bootoption+0x0/0x1f9\n [\u003cc0774099\u003e] ? i386_start_kernel+0x79/0x81\nCode: \u003cbleh3\u003e\nEIP: [\u003cf8806c70\u003e] ieee80211_agg_splice_packets+0x40/0xc0 [mac80211] SS:ESP 0068:c076be38\nCR2: 0000000000000030\n\nCc: stable@kernel.org\nTestedy-by: Jack Lau \u003cjackelectronics@hotmail.com\u003e\nSigned-off-by: Luis R. Rodriguez \u003clrodriguez@atheros.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "e694958388c50148389b0e9b9e9e8945cf0f1b98",
      "tree": "492a61009732cd0c468d4c0faa41321414ea43a7",
      "parents": [
        "a3620f7545344f932873bf98fbdf416b49409c8e"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Aug 13 08:28:36 2009 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Aug 13 10:57:26 2009 -0700"
      },
      "message": "Make sock_sendpage() use kernel_sendpage()\n\nkernel_sendpage() does the proper default case handling for when the\nsocket doesn\u0027t have a native sendpage implementation.\n\nNow, arguably this might be something that we could instead solve by\njust specifying that all protocols should do it themselves at the\nprotocol level, but we really only care about the common protocols.\nDoes anybody really care about sendpage on something like Appletalk? Not\nlikely.\n\nAcked-by: David S. Miller \u003cdavem@davemloft.net\u003e\nAcked-by: Julien TINNES \u003cjulien@cr0.org\u003e\nAcked-by: Tavis Ormandy \u003ctaviso@sdf.lonestar.org\u003e\nCc: stable@kernel.org\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\n"
    },
    {
      "commit": "418372b0ab7a3bbcc59d71e8e4d322ef18263dab",
      "tree": "5700bbe4630c13277c5112f62f8c0ddf0e4023e2",
      "parents": [
        "018d21ed80736eab21fabf45edbd74600a1f8330"
      ],
      "author": {
        "name": "Rafael Laufer",
        "email": "rlaufer@cisco.com",
        "time": "Fri Aug 07 05:17:17 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Aug 09 21:45:43 2009 -0700"
      },
      "message": "sctp: fix missing destroy of percpu counter variable in sctp_proc_exit()\n\nCommit 1748376b6626acf59c24e9592ac67b3fe2a0e026,\n\tnet: Use a percpu_counter for sockets_allocated\n\nadded percpu_counter function calls to sctp_proc_init code path, but\nforgot to add them to sctp_proc_exit().  This resulted in a following\nOoops when performing this test\n\t# modprobe sctp\n\t# rmmod -f sctp\n\t# modprobe sctp\n\n[  573.862512] BUG: unable to handle kernel paging request at f8214a24\n[  573.862518] IP: [\u003cc0308b8f\u003e] __percpu_counter_init+0x3f/0x70\n[  573.862530] *pde \u003d 37010067 *pte \u003d 00000000\n[  573.862534] Oops: 0002 [#1] SMP\n[  573.862537] last sysfs file: /sys/module/libcrc32c/initstate\n[  573.862540] Modules linked in: sctp(+) crc32c libcrc32c binfmt_misc bridge\nstp bnep lp snd_hda_codec_analog snd_hda_intel snd_hda_codec snd_hwdep\nsnd_pcm_oss snd_mixer_oss arc4 joydev snd_pcm ecb pcmcia snd_seq_dummy\nsnd_seq_oss iwlagn iwlcore snd_seq_midi snd_rawmidi snd_seq_midi_event\nyenta_socket rsrc_nonstatic thinkpad_acpi snd_seq snd_timer snd_seq_device\nmac80211 psmouse sdhci_pci sdhci nvidia(P) ppdev video snd soundcore serio_raw\npcspkr iTCO_wdt iTCO_vendor_support led_class ricoh_mmc pcmcia_core intel_agp\nnvram agpgart usbhid parport_pc parport output snd_page_alloc cfg80211 btusb\nohci1394 ieee1394 e1000e [last unloaded: sctp]\n[  573.862589]\n[  573.862593] Pid: 5373, comm: modprobe Tainted: P  R        (2.6.31-rc3 #6)\n7663B15\n[  573.862596] EIP: 0060:[\u003cc0308b8f\u003e] EFLAGS: 00010286 CPU: 1\n[  573.862599] EIP is at __percpu_counter_init+0x3f/0x70\n[  573.862602] EAX: f8214a20 EBX: f80faa14 ECX: c48c0000 EDX: f80faa20\n[  573.862604] ESI: f80a7000 EDI: 00000000 EBP: f69d5ef0 ESP: f69d5eec\n[  573.862606]  DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068\n[  573.862610] Process modprobe (pid: 5373, ti\u003df69d4000 task\u003dc2130c70\ntask.ti\u003df69d4000)\n[  573.862612] Stack:\n[  573.862613]  00000000 f69d5f18 f80a70a8 f80fa9fc 00000000 fffffffc f69d5f30\nc018e2d4\n[  573.862619] \u003c0\u003e 00000000 f80a7000 00000000 f69d5f88 c010112b 00000000\nc07029c0 fffffffb\n[  573.862626] \u003c0\u003e 00000000 f69d5f38 c018f83f f69d5f54 c0557cad f80fa860\n00000001 c07010c0\n[  573.862634] Call Trace:\n[  573.862644]  [\u003cf80a70a8\u003e] ? sctp_init+0xa8/0x7d4 [sctp]\n[  573.862650]  [\u003cc018e2d4\u003e] ? marker_update_probe_range+0x184/0x260\n[  573.862659]  [\u003cf80a7000\u003e] ? sctp_init+0x0/0x7d4 [sctp]\n[  573.862662]  [\u003cc010112b\u003e] ? do_one_initcall+0x2b/0x160\n[  573.862666]  [\u003cc018f83f\u003e] ? tracepoint_module_notify+0x2f/0x40\n[  573.862671]  [\u003cc0557cad\u003e] ? notifier_call_chain+0x2d/0x70\n[  573.862678]  [\u003cc01588fd\u003e] ? __blocking_notifier_call_chain+0x4d/0x60\n[  573.862682]  [\u003cc016b2f1\u003e] ? sys_init_module+0xb1/0x1f0\n[  573.862686]  [\u003cc0102ffc\u003e] ? sysenter_do_call+0x12/0x28\n[  573.862688] Code: 89 48 08 b8 04 00 00 00 e8 df aa ec ff ba f4 ff ff ff 85\nc0 89 43 14 74 31 b8 b0 18 71 c0 e8 19 b9 24 00 a1 c4 18 71 c0 8d 53 0c \u003c89\u003e 50\n04 89 43 0c b8 b0 18 71 c0 c7 43 10 c4 18 71 c0 89 15 c4\n[  573.862725] EIP: [\u003cc0308b8f\u003e] __percpu_counter_init+0x3f/0x70 SS:ESP\n0068:f69d5eec\n[  573.862730] CR2: 00000000f8214a24\n[  573.862734] ---[ end trace 39c4e0b55e7cf54d ]---\n\nSigned-off-by: Rafael Laufer \u003crlaufer@cisco.com\u003e\nSigned-off-by: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e84b90ae5eb3c112d1f208964df1d8156a538289",
      "tree": "3f02cd521e1c59292db7d1962e262048760411cf",
      "parents": [
        "b79a79471bd31d737c939a6ddc347417047b4320"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Thu Aug 06 20:27:04 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Aug 09 21:45:32 2009 -0700"
      },
      "message": "can: Fix raw_getname() leak\n\nraw_getname() can leak 10 bytes of kernel memory to user\n\n(two bytes hole between can_family and can_ifindex,\n8 bytes at the end of sockaddr_can structure)\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nAcked-by: Oliver Hartkopp \u003coliver@hartkopp.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b79a79471bd31d737c939a6ddc347417047b4320",
      "tree": "c208fa8937da25184215504c063e032822ea2d3e",
      "parents": [
        "082ba88a5e6b1425abed3fae4ad65e0e985ed081"
      ],
      "author": {
        "name": "Jussi Mäki",
        "email": "joamaki@gmail.com",
        "time": "Thu Aug 06 21:38:14 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Aug 09 21:45:31 2009 -0700"
      },
      "message": "Fix xfrm hash collisions by changing __xfrm4_daddr_saddr_hash to hash addresses with addition\n\nThis patch fixes hash collisions in cases where number\nof entries have incrementing IP source and destination addresses\nfrom single respective subnets (i.e. 192.168.0.1-172.16.0.1,\n192.168.0.2-172.16.0.2, and so on.).\n\nSigned-off-by: Jussi Maki \u003cjoamaki@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f222e8b40f2177b1c4cac015b117744c1d3fa3e9",
      "tree": "7c5fc22c08da900e21b0e7ab2376e8e8e44a63c0",
      "parents": [
        "819ae6a389d4acfab9a7bb874fa1977aa464d14b",
        "f4b9a988685da6386d7f9a72df3098bcc3270526"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Aug 09 21:29:47 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Aug 09 21:29:47 2009 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of /home/davem/src/GIT/linux-2.6/\n"
    },
    {
      "commit": "cba8784ae0a9f7d0f1f87e0607e7ae66fc45666c",
      "tree": "58a53f6b8db0ec64e93ebece1c1f07aa54502544",
      "parents": [
        "9cf9d28e9bf991af21fc4bbf33281b66843b094b",
        "0bf52b981770cbf006323bab5177f2858a196766"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri Aug 07 10:46:27 2009 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri Aug 07 10:46:27 2009 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6:\n  net: Fix spinlock use in alloc_netdev_mq()\n"
    },
    {
      "commit": "0d502d8267ebab9ae4b5b4c065d20196d6069f52",
      "tree": "303f53ec61b4e291a75c9f5617fcef4ed7e55606",
      "parents": [
        "09384dfc76e526c3993c09c42e016372dc9dd22c",
        "a9dfac3353b03432e3d46a0dde6795588c46256d"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Aug 06 13:18:22 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Aug 06 13:18:22 2009 -0700"
      },
      "message": "Merge branch \u0027for-linus\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/lowpan/lowpan\n"
    },
    {
      "commit": "09384dfc76e526c3993c09c42e016372dc9dd22c",
      "tree": "b93d8030e280c357e71c3efe6e5e39e454e3fdcd",
      "parents": [
        "3d392475c873c10c10d6d96b94d092a34ebd4791"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Thu Aug 06 03:55:04 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Aug 06 13:08:46 2009 -0700"
      },
      "message": "irda: Fix irda_getname() leak\n\nirda_getname() can leak kernel memory to user.\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3d392475c873c10c10d6d96b94d092a34ebd4791",
      "tree": "5746cbd3c9d6fe4ca262a77353b7543b2bf36827",
      "parents": [
        "f6b97b29513950bfbf621a83d85b6f86b39ec8db"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Thu Aug 06 02:27:43 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Aug 06 13:08:45 2009 -0700"
      },
      "message": "appletalk: fix atalk_getname() leak\n\natalk_getname() can leak 8 bytes of kernel memory to user\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f6b97b29513950bfbf621a83d85b6f86b39ec8db",
      "tree": "6271c640ac365f409ffff31aa1343fd315c42841",
      "parents": [
        "80922bbb12a105f858a8f0abb879cb4302d0ecaa"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Thu Aug 06 03:31:07 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Aug 06 13:08:43 2009 -0700"
      },
      "message": "netrom: Fix nr_getname() leak\n\nnr_getname() can leak kernel memory to user.\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "80922bbb12a105f858a8f0abb879cb4302d0ecaa",
      "tree": "79037282c1b184d20aaf19c8cbf8a311321926b7",
      "parents": [
        "17ac2e9c58b69a1e25460a568eae1b0dc0188c25"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Thu Aug 06 03:48:36 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Aug 06 13:08:40 2009 -0700"
      },
      "message": "econet: Fix econet_getname() leak\n\neconet_getname() can leak kernel memory to user.\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "17ac2e9c58b69a1e25460a568eae1b0dc0188c25",
      "tree": "99e38906c8e9e4d53aa03aa73a3d34e2d9ebd4df",
      "parents": [
        "b4adbb4ddf63091f48668e7ff1b9b0f6f84d4b40"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Thu Aug 06 03:34:06 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Aug 06 13:08:38 2009 -0700"
      },
      "message": "rose: Fix rose_getname() leak\n\nrose_getname() can leak kernel memory to user.\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a9dfac3353b03432e3d46a0dde6795588c46256d",
      "tree": "0860c08f8b803dc60df6bcb9271c1ab08657eb6c",
      "parents": [
        "45a41d147a3a31bb218201b0dd70cfe4e9ed5105"
      ],
      "author": {
        "name": "Dmitry Eremin-Solenikov",
        "email": "dbaryshkov@gmail.com",
        "time": "Mon Aug 03 17:53:00 2009 +0400"
      },
      "committer": {
        "name": "Dmitry Eremin-Solenikov",
        "email": "dbaryshkov@gmail.com",
        "time": "Thu Aug 06 12:49:19 2009 +0400"
      },
      "message": "af_ieee802154: provide dummy get/setsockopt\n\nProvide dummt get/setsockopt implementations to stop these\nsyscalls from oopsing on our sockets.\n\nSigned-off-by: Dmitry Eremin-Solenikov \u003cdbaryshkov@gmail.com\u003e\n"
    },
    {
      "commit": "45a41d147a3a31bb218201b0dd70cfe4e9ed5105",
      "tree": "3a5938a4c8bb04b5bbe2a80a41356e8008a7503f",
      "parents": [
        "0bf52b981770cbf006323bab5177f2858a196766"
      ],
      "author": {
        "name": "Dmitry Eremin-Solenikov",
        "email": "dbaryshkov@gmail.com",
        "time": "Sun Aug 02 14:12:01 2009 +0400"
      },
      "committer": {
        "name": "Dmitry Eremin-Solenikov",
        "email": "dbaryshkov@gmail.com",
        "time": "Thu Aug 06 12:49:17 2009 +0400"
      },
      "message": "af_ieee802154: fix ioctl processing\n\nfix two errors in ioctl processing:\n1) if the ioctl isn\u0027t supported one should return -ENOIOCTLCMD\n2) don\u0027t call ndo_do_ioctl if the device doesn\u0027t provide it\n\nSigned-off-by: Dmitry Eremin-Solenikov \u003cdbaryshkov@gmail.com\u003e\n"
    },
    {
      "commit": "cf39c4c572dc54adbdf8933d1e6cd87ee94d8fc0",
      "tree": "22bd46065e9a1ab3f7ecc0351c26cb7125d72ba3",
      "parents": [
        "476181cb05c6a3aea3ef42309388e255c934a06f"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Mon Jul 27 08:03:18 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Aug 05 12:14:09 2009 -0700"
      },
      "message": "phonet: phonet_device_get() fix\n\nnet/phonet/pn_dev.c: In function `phonet_device_get\u0027:\nnet/phonet/pn_dev.c:99: warning: \u0027dev\u0027 might be used uninitialized in this function\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nAcked-by: Rémi Denis-Courmont \u003cremi.denis-courmont@nokia.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "476181cb05c6a3aea3ef42309388e255c934a06f",
      "tree": "377c2f9326457dcd7880b1dc962bedea32b2af29",
      "parents": [
        "f60f785679b507cbeeb03d2db080ab649ac86027"
      ],
      "author": {
        "name": "Wei Yongjun",
        "email": "yjwei@cn.fujitsu.com",
        "time": "Tue Aug 04 21:44:39 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Aug 05 10:22:03 2009 -0700"
      },
      "message": "dccp: missing destroy of percpu counter variable while unload module\n\npercpu counter dccp_orphan_count is init in dccp_init() by\npercpu_counter_init() while dccp module is loaded, but the\ndestroy of it is missing while dccp module is unloaded. We\ncan get the kernel WARNING about this. Reproduct by the\nfollowing commands:\n\n  $ modprobe dccp\n  $ rmmod dccp\n  $ modprobe dccp\n\nWARNING: at lib/list_debug.c:26 __list_add+0x27/0x5c()\nHardware name: VMware Virtual Platform\nlist_add corruption. next-\u003eprev should be prev (c080c0c4), but was (null). (next\n\u003dca7188cc).\nModules linked in: dccp(+) nfsd lockd nfs_acl auth_rpcgss exportfs sunrpc\nPid: 1956, comm: modprobe Not tainted 2.6.31-rc5 #55\nCall Trace:\n [\u003cc042f8fa\u003e] warn_slowpath_common+0x6a/0x81\n [\u003cc053a6cb\u003e] ? __list_add+0x27/0x5c\n [\u003cc042f94f\u003e] warn_slowpath_fmt+0x29/0x2c\n [\u003cc053a6cb\u003e] __list_add+0x27/0x5c\n [\u003cc053c9b3\u003e] __percpu_counter_init+0x4d/0x5d\n [\u003cca9c90c7\u003e] dccp_init+0x19/0x2ed [dccp]\n [\u003cc0401141\u003e] do_one_initcall+0x4f/0x111\n [\u003cca9c90ae\u003e] ? dccp_init+0x0/0x2ed [dccp]\n [\u003cc06971b5\u003e] ? notifier_call_chain+0x26/0x48\n [\u003cc0444943\u003e] ? __blocking_notifier_call_chain+0x45/0x51\n [\u003cc04516f7\u003e] sys_init_module+0xac/0x1bd\n [\u003cc04028e4\u003e] sysenter_do_call+0x12/0x22\n\nSigned-off-by: Wei Yongjun \u003cyjwei@cn.fujitsu.com\u003e\nAcked-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0bf52b981770cbf006323bab5177f2858a196766",
      "tree": "cf45ebbd91aacd23d170e8c320d9922c81cc2d0e",
      "parents": [
        "357eb46d8f275b4e8484541234ea3ba06065e258"
      ],
      "author": {
        "name": "Ingo Molnar",
        "email": "mingo@elte.hu",
        "time": "Tue Aug 04 21:16:58 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Aug 05 08:35:11 2009 -0700"
      },
      "message": "net: Fix spinlock use in alloc_netdev_mq()\n\n-tip testing found this lockdep warning:\n\n[    2.272010] calling  net_dev_init+0x0/0x164 @ 1\n[    2.276033] device class \u0027net\u0027: registering\n[    2.280191] INFO: trying to register non-static key.\n[    2.284005] the code is fine but needs lockdep annotation.\n[    2.284005] turning off the locking correctness validator.\n[    2.284005] Pid: 1, comm: swapper Not tainted 2.6.31-rc5-tip #1145\n[    2.284005] Call Trace:\n[    2.284005]  [\u003c7958eb4e\u003e] ? printk+0xf/0x11\n[    2.284005]  [\u003c7904f83c\u003e] __lock_acquire+0x11b/0x622\n[    2.284005]  [\u003c7908c9b7\u003e] ? alloc_debug_processing+0xf9/0x144\n[    2.284005]  [\u003c7904e2be\u003e] ? mark_held_locks+0x3a/0x52\n[    2.284005]  [\u003c7908dbc4\u003e] ? kmem_cache_alloc+0xa8/0x13f\n[    2.284005]  [\u003c7904e475\u003e] ? trace_hardirqs_on_caller+0xa2/0xc3\n[    2.284005]  [\u003c7904fdf6\u003e] lock_acquire+0xb3/0xd0\n[    2.284005]  [\u003c79489678\u003e] ? alloc_netdev_mq+0xf5/0x1ad\n[    2.284005]  [\u003c79591514\u003e] _spin_lock_bh+0x2d/0x5d\n[    2.284005]  [\u003c79489678\u003e] ? alloc_netdev_mq+0xf5/0x1ad\n[    2.284005]  [\u003c79489678\u003e] alloc_netdev_mq+0xf5/0x1ad\n[    2.284005]  [\u003c793a38f2\u003e] ? loopback_setup+0x0/0x74\n[    2.284005]  [\u003c798eecd0\u003e] loopback_net_init+0x20/0x5d\n[    2.284005]  [\u003c79483efb\u003e] register_pernet_device+0x23/0x4b\n[    2.284005]  [\u003c798f5c9f\u003e] net_dev_init+0x115/0x164\n[    2.284005]  [\u003c7900104f\u003e] do_one_initcall+0x4a/0x11a\n[    2.284005]  [\u003c798f5b8a\u003e] ? net_dev_init+0x0/0x164\n[    2.284005]  [\u003c79066f6d\u003e] ? register_irq_proc+0x8c/0xa8\n[    2.284005]  [\u003c798cc29a\u003e] do_basic_setup+0x42/0x52\n[    2.284005]  [\u003c798cc30a\u003e] kernel_init+0x60/0xa1\n[    2.284005]  [\u003c798cc2aa\u003e] ? kernel_init+0x0/0xa1\n[    2.284005]  [\u003c79003e03\u003e] kernel_thread_helper+0x7/0x10\n[    2.284078] device: \u0027lo\u0027: device_add\n[    2.288248] initcall net_dev_init+0x0/0x164 returned 0 after 11718 usecs\n[    2.292010] calling  neigh_init+0x0/0x66 @ 1\n[    2.296010] initcall neigh_init+0x0/0x66 returned 0 after 0 usecs\n\nit\u0027s using an zero-initialized spinlock. This is a side-effect of:\n\n        dev_unicast_init(dev);\n\nin alloc_netdev_mq() making use of dev-\u003eaddr_list_lock.\n\nThe device has just been allocated freshly, it\u0027s not accessible\nanywhere yet so no locking is needed at all - in fact it\u0027s wrong\nto lock it here (the lock isnt initialized yet).\n\nThis bug was introduced via:\n\n| commit a6ac65db2329e7685299666f5f7b6093c7b0f3a0\n| Date:   Thu Jul 30 01:06:12 2009 +0000\n|\n|     net: restore the original spinlock to protect unicast list\n\nSigned-off-by: Ingo Molnar \u003cmingo@elte.hu\u003e\nAcked-by: Jiri Pirko \u003cjpirko@redhat.com\u003e\nTested-by: Mark Brown \u003cbroonie@opensource.wolfsonmicro.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ae83060026537885fd23737af161fee8afd04f4b",
      "tree": "111773ae905a54c77208770962a2fce537b7bc33",
      "parents": [
        "2edb3898b82a20ec459a67fcf76ceddcbecfe395",
        "357eb46d8f275b4e8484541234ea3ba06065e258"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Aug 04 15:38:34 2009 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Aug 04 15:38:34 2009 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (47 commits)\n  ehea: Fix napi list corruption on ifconfig down\n  igbvf: Allow VF driver to correctly recognize failure to set mac\n  3c59x: Fix build failure with gcc 3.2\n  sky2: Avoid transmits during sky2_down()\n  iwlagn: do not send key clear commands when rfkill enabled\n  libertas: Read buffer overflow\n  drivers/net/wireless: introduce missing kfree\n  drivers/net/wireless/iwlwifi: introduce missing kfree\n  zd1211rw: fix unaligned access in zd_mac_rx\n  cfg80211: fix regression on beacon world roaming feature\n  cfg80211: add two missing NULL pointer checks\n  ixgbe: Patch to modify 82598 PCIe completion timeout values\n  bluetooth: rfcomm_init bug fix\n  mlx4_en: Fix double pci unmapping.\n  mISDN: Fix handling of receive buffer size in L1oIP\n  pcnet32: VLB support fixes\n  pcnet32: remove superfluous NULL pointer check in pcnet32_probe1()\n  net: restore the original spinlock to protect unicast list\n  netxen: fix coherent dma mask setting\n  mISDN: Read buffer overflow\n  ...\n"
    },
    {
      "commit": "eca4c3d2dd66d0230140c9af05dee591df6f0e42",
      "tree": "59167ea2ac39a78f626bb3905e495963af326b77",
      "parents": [
        "f6caa14aa0b126d4a2933907d1519611b2a8524a",
        "99f1b01562b7dcae75b043114f76163fbf84fcab"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Aug 03 19:05:50 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Aug 03 19:05:50 2009 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "371842448c05b42d11a4be1c8e4e81d62ecc7534",
      "tree": "37c6f66d8a34999801cd09abffd7d7b66c0925dd",
      "parents": [
        "cd3468bad96c00b5a512f551674f36776129520e"
      ],
      "author": {
        "name": "Luis R. Rodriguez",
        "email": "lrodriguez@atheros.com",
        "time": "Thu Jul 30 17:43:48 2009 -0700"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Aug 03 16:31:21 2009 -0400"
      },
      "message": "cfg80211: fix regression on beacon world roaming feature\n\nA regression was added through patch a4ed90d6:\n\n\"cfg80211: respect API on orig_flags on channel for beacon hint\"\n\nWe did indeed respect _orig flags but the intention was not clearly\nstated in the commit log. This patch fixes firmware issues picked\nup by iwlwifi when we lift passive scan of beaconing restrictions\non channels its EEPROM has been configured to always enable.\n\nBy doing so though we also disallowed beacon hints on devices\nregistering their wiphy with custom world regulatory domains\nenabled, this happens to be currently ath5k, ath9k and ar9170.\nThe passive scan and beacon restrictions on those devices would\nnever be lifted even if we did find a beacon and the hardware did\nsupport such enhancements when world roaming.\n\nSince Johannes indicates iwlwifi firmware cannot be changed to\nallow beacon hinting we set up a flag now to specifically allow\ndrivers to disable beacon hints for devices which cannot use them.\n\nWe enable the flag on iwlwifi to disable beacon hints and by default\nenable it for all other drivers. It should be noted beacon hints lift\npassive scan flags and beacon restrictions when we receive a beacon from\nan AP on any 5 GHz non-DFS channels, and channels 12-14 on the 2.4 GHz\nband. We don\u0027t bother with channels 1-11 as those channels are allowed\nworld wide.\n\nThis should fix world roaming for ath5k, ath9k and ar9170, thereby\nimproving scan time when we receive the first beacon from any AP,\nand also enabling beaconing operation (AP/IBSS/Mesh) on cards which\nwould otherwise not be allowed to do so. Drivers not using custom\nregulatory stuff (wiphy_apply_custom_regulatory()) were not affected\nby this as the orig_flags for the channels would have been cleared\nupon wiphy registration.\n\nI tested this with a world roaming ath5k card.\n\nCc: Jouni Malinen \u003cjouni.malinen@atheros.com\u003e\nSigned-off-by: Luis R. Rodriguez \u003clrodriguez@atheros.com\u003e\nReviewed-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "cd3468bad96c00b5a512f551674f36776129520e",
      "tree": "b9b705149112b1403d5a23f09ae24a7eac515827",
      "parents": [
        "eb4ad826419ab5b1260bc1625249114767d36bea"
      ],
      "author": {
        "name": "Johannes Berg",
        "email": "johannes@sipsolutions.net",
        "time": "Wed Jul 29 22:07:44 2009 +0200"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Aug 03 16:31:21 2009 -0400"
      },
      "message": "cfg80211: add two missing NULL pointer checks\n\nThese pointers can be NULL, the is_mesh() case isn\u0027t\never hit in the current kernel, but cmp_ies() can be\nhit under certain conditions.\n\nSigned-off-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nCc: stable@kernel.org [2.6.29, 2.6.30]\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "af0d3b103bcfa877343ee338de12002cd50c9ee5",
      "tree": "a06b348fae8d295b17e7620d00df6701f678d449",
      "parents": [
        "eb4ad826419ab5b1260bc1625249114767d36bea"
      ],
      "author": {
        "name": "Dave Young",
        "email": "hidave.darkstar@gmail.com",
        "time": "Mon Aug 03 04:26:16 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Aug 03 13:24:39 2009 -0700"
      },
      "message": "bluetooth: rfcomm_init bug fix\n\nrfcomm tty may be used before rfcomm_tty_driver initilized,\nThe problem is that now socket layer init before tty layer, if userspace\nprogram do socket callback right here then oops will happen.\n\nreporting in:\nhttp://marc.info/?l\u003dlinux-bluetooth\u0026m\u003d124404919324542\u0026w\u003d2\n\nmake 3 changes:\n1. remove #ifdef in rfcomm/core.c,\nmake it blank function when rfcomm tty not selected in rfcomm.h\n\n2. tune the rfcomm_init error patch to ensure\ntty driver initilized before rfcomm socket usage.\n\n3. remove __exit for rfcomm_cleanup_sockets\nbecause above change need call it in a __init function.\n\nReported-by: Oliver Hartkopp \u003coliver@hartkopp.net\u003e\nTested-by: Oliver Hartkopp \u003coliver@hartkopp.net\u003e\nSigned-off-by: Dave Young \u003chidave.darkstar@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a6ac65db2329e7685299666f5f7b6093c7b0f3a0",
      "tree": "02ce50a2a4321cb2872a26196fba6b4d4d41a2ba",
      "parents": [
        "50c643e7652458e649955408685a16e88ea6dbae"
      ],
      "author": {
        "name": "Jiri Pirko",
        "email": "jpirko@redhat.com",
        "time": "Thu Jul 30 01:06:12 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Aug 02 12:20:46 2009 -0700"
      },
      "message": "net: restore the original spinlock to protect unicast list\n\nThere is a path when an assetion in dev_unicast_sync() appears.\n\nigmp6_group_added -\u003e dev_mc_add -\u003e __dev_set_rx_mode -\u003e\n-\u003e vlan_dev_set_rx_mode -\u003e dev_unicast_sync\n\nTherefore we cannot protect this list with rtnl. This patch restores the\noriginal protecting this list with spinlock.\n\nSigned-off-by: Jiri Pirko \u003cjpirko@redhat.com\u003e\nTested-by: Meelis Roos \u003cmroos@linux.ee\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "144586301f6af5ae5943a002f030d8c626fa4fdd",
      "tree": "f3535075b6dc16fed10426c7414dfb928c21791e",
      "parents": [
        "446e72f30eca76d6f9a1a54adf84d2c6ba2831f8"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Tue Jul 28 02:36:15 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Aug 02 12:20:36 2009 -0700"
      },
      "message": "net: net_assign_generic() fix\n\nmemcpy() should take into account size of pointers,\nnot only number of pointers to copy.\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nAcked-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a3e8ee682003685b8b9c98c89340a42e48c3e813",
      "tree": "11d1c94289aa4c4aa668b3df6bd121d9eb76acdc",
      "parents": [
        "3d54015b750e5d5e950a1dcee2735387fd4b6e1a"
      ],
      "author": {
        "name": "roel kluin",
        "email": "roel.kluin@gmail.com",
        "time": "Wed Jul 29 23:46:59 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jul 30 13:27:29 2009 -0700"
      },
      "message": "ipv4: ARP neigh procfs buffer overflow\n\nIf arp_format_neigh_entry() can be called with n-\u003edev-\u003eaddr_len \u003d\u003d 0, then a\nwrite to hbuffer[-1] occurs.\n\nSigned-off-by: Roel Kluin \u003croel.kluin@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ca7daea612b480ecf0fc5bd1630b88447fe73fc5",
      "tree": "4fa3d875d3fdc7a3e33cac4a5e20d78d77948685",
      "parents": [
        "a1b97440eec0ea3e53183cde8fe82ff8c1ffb091"
      ],
      "author": {
        "name": "Julia Lawall",
        "email": "julia@diku.dk",
        "time": "Thu Jul 30 04:38:19 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jul 30 10:58:28 2009 -0700"
      },
      "message": "net/netlabel: Add kmalloc NULL tests\n\nThe test on map4 should be a test on map6.\n\nThe semantic match that finds this problem is as follows:\n(http://www.emn.fr/x-info/coccinelle/)\n\n// \u003csmpl\u003e\n@@\nexpression *x;\nidentifier f;\nconstant char *C;\n@@\n\nx \u003d \\(kmalloc\\|kcalloc\\|kzalloc\\)(...);\n... when !\u003d x \u003d\u003d NULL\n    when !\u003d x !\u003d NULL\n    when !\u003d (x || ...)\n(\nkfree(x)\n|\nf(...,C,...,x,...)\n|\n*f(...,x,...)\n|\n*x-\u003ef\n)\n// \u003c/smpl\u003e\n\nSigned-off-by: Julia Lawall \u003cjulia@diku.dk\u003e\nAcked-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a1b97440eec0ea3e53183cde8fe82ff8c1ffb091",
      "tree": "e634dc66b0094cf26281704cce56d5117b0a15f9",
      "parents": [
        "27fed4175acf81ddd91d9a4ee2fd298981f60295",
        "89c3a8aca28e6d57f2ae945d97858a372d624b81"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jul 30 10:35:45 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jul 30 10:35:45 2009 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "1c29b3ff4f2d847464f7be3a0e179c6dfc69bd02",
      "tree": "0fa9c81cac75f65ef2451baf0cc27ae86c11a0fc",
      "parents": [
        "b62f495dad04fa94b5083aec638ff3072bccaaca"
      ],
      "author": {
        "name": "Mel Gorman",
        "email": "mel@csn.ul.ie",
        "time": "Wed Jul 29 15:04:10 2009 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Jul 29 19:10:36 2009 -0700"
      },
      "message": "net-dccp: suppress warning about large allocations from DCCP\n\nThe DCCP protocol tries to allocate some large hash tables during\ninitialisation using the largest size possible.  This can be larger than\nwhat the page allocator can provide so it prints a warning.  However, the\ncaller is able to handle the situation so this patch suppresses the\nwarning.\n\nSigned-off-by: Mel Gorman \u003cmel@csn.ul.ie\u003e\nAcked-by: Arnaldo Carvalho de Melo \u003cacme@redhat.com\u003e\nCc: \"David S. Miller\" \u003cdavem@davemloft.net\u003e\nCc: \"Rafael J. Wysocki\" \u003crjw@sisk.pl\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\n"
    },
    {
      "commit": "89c3a8aca28e6d57f2ae945d97858a372d624b81",
      "tree": "e6ab04353cfc202bc7ecbd58d57c2d1790381a7c",
      "parents": [
        "57921c312e8cef72ba35a4cfe870b376da0b1b87"
      ],
      "author": {
        "name": "Johannes Berg",
        "email": "johannes@sipsolutions.net",
        "time": "Tue Jul 28 18:10:17 2009 +0200"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed Jul 29 14:52:01 2009 -0400"
      },
      "message": "mac80211: fix suspend\n\nJan reported that his b43-based laptop hangs during suspend.\nThe problem turned out to be mac80211 asking the driver to\nstop the hardware before removing interfaces, and interface\nremoval caused b43 to touch the hardware (while down, which\ncauses the hang).\n\nThis patch fixes mac80211 to do reorder these operations to\nhave them in the correct order -- first remove interfaces\nand then stop the hardware. Some more code is necessary to\nbe able to do so in a race-free manner, in particular it is\nnecessary to not process frames received during quiescing.\n\nFixes http://bugzilla.kernel.org/show_bug.cgi?id\u003d13337.\n\nReported-by: Jan Scholz \u003cscholz@fias.uni-frankfurt.de\u003e\nSigned-off-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "f1462147f15a954a1a0553390846c6fa3ca742b1",
      "tree": "c57ad5f209bd6bc735580172057153d60f0a4442",
      "parents": [
        "e00b95debb9a0f023b61abcd4b1e74f687276b47",
        "6d7760a88c25057c2c2243e5dfe2d731064bd31d"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Mon Jul 27 13:42:47 2009 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Mon Jul 27 13:42:47 2009 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (45 commits)\n  cnic: Fix ISCSI_KEVENT_IF_DOWN message handling.\n  net: irda: init spinlock after memcpy\n  ixgbe: fix for 82599 errata marking UDP checksum errors\n  r8169: WakeOnLan fix for the 8168\n  netxen: reset ring consumer during cleanup\n  net/bridge: use kobject_put to release kobject in br_add_if error path\n  smc91x.h: add config for Nomadik evaluation kit\n  NET: ROSE: Don\u0027t use static buffer.\n  eepro: Read buffer overflow\n  tokenring: Read buffer overflow\n  at1700: Read buffer overflow\n  fealnx: Write outside array bounds\n  ixgbe: remove unnecessary call to device_init_wakeup\n  ixgbe: Don\u0027t priority tag control frames in DCB mode\n  ixgbe: Enable FCoE offload when DCB is enabled for 82599\n  net: Rework mdio-ofgpio driver to use of_mdio infrastructure\n  register at91_ether using platform_driver_probe\n  skge: Enable WoL by default if supported\n  net: KS8851 needs to depend on MII\n  be2net: Bug fix in the non-lro path. Size of received packet was not updated in statistics properly.\n  ...\n"
    },
    {
      "commit": "78f1a8b758d57c2d2c9f3db7199cd30803854c82",
      "tree": "53b53e50257c002004465789be1799fb9ab881e4",
      "parents": [
        "082e708acc50a5b625b9bde0bb1af90dfdbd1942"
      ],
      "author": {
        "name": "Luis R. Rodriguez",
        "email": "lrodriguez@atheros.com",
        "time": "Mon Jul 27 08:38:25 2009 -0700"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Jul 27 15:19:38 2009 -0400"
      },
      "message": "mac80211: do not queue work after suspend in the dynamic ps timer\n\nSigned-off-by: Luis R. Rodriguez \u003clrodriguez@atheros.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "0cbb0a781a42f131e9c6836554f402cb85f8f38b",
      "tree": "026518c552a42bafb33c8657de28753b666a9175",
      "parents": [
        "8bae1b2b13beb4cf4c0f119f97640503c2b74b0f"
      ],
      "author": {
        "name": "Deepak Saxena",
        "email": "dsaxena@mvista.com",
        "time": "Mon Jul 27 10:49:44 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jul 27 10:49:44 2009 -0700"
      },
      "message": "net: irda: init spinlock after memcpy\n\nirttp_dup() copies a tsap_cb struct, but does not initialize the\nspinlock in the new structure, which confuses lockdep.\n\nSigned-off-by: Deepak Saxena \u003cdsaxena@mvista.com\u003e\nSigned-off-by: Ingo Molnar \u003cmingo@elte.hu\u003e\nSigned-off-by: Thomas Gleixner \u003ctglx@linutronix.de\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c587aea951a56d29741a3cef4ea3e142c93b3207",
      "tree": "39045309a2d2ce8fe51bca6d08588cf97e0ee27c",
      "parents": [
        "4a29f396429132dc59f1856ea6cfc860a1955fa1"
      ],
      "author": {
        "name": "Xiaotian Feng",
        "email": "dfeng@redhat.com",
        "time": "Thu Jul 23 23:06:32 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Jul 26 19:20:51 2009 -0700"
      },
      "message": "net/bridge: use kobject_put to release kobject in br_add_if error path\n\nkobject_init_and_add will alloc memory for kobj-\u003ename, so in br_add_if\nerror path, simply use kobject_del will not free memory for kobj-\u003ename.\nFix by using kobject_put instead, kobject_put will internally calls\nkobject_del and frees memory for kobj-\u003ename.\n\nSigned-off-by: Xiaotian Feng \u003cdfeng@redhat.com\u003e\nAcked-by: Stephen Hemminger \u003cshemminger@vyatta.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "dcf777f6ed9799c5ac90ac17a5c369e6b73ca92e",
      "tree": "dc15b2d5800241d124528d627f8b039ac29d32d4",
      "parents": [
        "d513d018e2236930b6163241bbdce64d2c0de49e"
      ],
      "author": {
        "name": "Ralf Baechle",
        "email": "ralf@linux-mips.org",
        "time": "Sun Jul 26 19:11:14 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Jul 26 19:11:14 2009 -0700"
      },
      "message": "NET: ROSE: Don\u0027t use static buffer.\n\nThe use of a static buffer in rose2asc() to return its result is not\nthreadproof and can result in corruption if multiple threads are trying\nto use one of the procfs files based on rose2asc().\n\nSigned-off-by: Ralf Baechle \u003cralf@linux-mips.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "402168cee1a0b791c54c54a68ae21bb26880f40b",
      "tree": "127b1bd8f2d06b18449998022eaab1c20baab950",
      "parents": [
        "12e8ffe35eaca1411afc1f3124478f8e2b65eedc",
        "a947a39d52f5b647a2fd5eca55d39e722a2fa90f"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Jul 22 09:49:58 2009 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Jul 22 09:49:58 2009 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (37 commits)\n  sky2: Avoid races in sky2_down\n  drivers/net/mlx4: Adjust constant\n  drivers/net: Move a dereference below a NULL test\n  drivers/net: Move a dereference below a NULL test\n  connector: maintainer/mail update.\n  USB host CDC Phonet network interface driver\n  macsonic, jazzsonic: fix oops on module unload\n  macsonic: move probe function to .devinit.text\n  can: switch carrier on if device was stopped while in bus-off state\n  can: restart device even if dev_alloc_skb() fails\n  can: sja1000: remove duplicated includes\n  New device ID for sc92031 [1088:2031]\n  3c589_cs: re-initialize the multicast in the tc589_reset\n  Fix error return for setsockopt(SO_TIMESTAMPING)\n  netxen: fix thermal check and shutdown\n  netxen: fix deadlock on dev close\n  netxen: fix context deletion sequence\n  net: Micrel KS8851 SPI network driver\n  tcp: Use correct peer adr when copying MD5 keys\n  tcp: Fix MD5 signature checking on IPv4 mapped sockets\n  ...\n"
    },
    {
      "commit": "9e81eccf199d910e5ea8db377a43478e4eccd033",
      "tree": "c425a97da799df89255b13314e4dd96ec40419db",
      "parents": [
        "e56f0975360369347725c49654ecfe3792710429"
      ],
      "author": {
        "name": "Christian Lamparter",
        "email": "chunkeey@web.de",
        "time": "Sun Jul 19 05:05:37 2009 +0200"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Jul 21 12:07:44 2009 -0400"
      },
      "message": "cfg80211: double free in __cfg80211_scan_done\n\nThis patch fixes a double free corruption in __cfg80211_scan_done:\n\n \u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\n BUG kmalloc-512: Object already free\n ------------------------------------------------\n\n INFO: Allocated in load_elf_binary+0x18b/0x19af age\u003d6\n INFO: Freed in load_elf_binary+0x104e/0x19af age\u003d5\n INFO: Slab 0xffffea0001bae4c0 objects\u003d14 used\u003d7\n INFO: Object 0xffff88007e8a9918 @offset\u003d6424 fp\u003d0xffff88007e8a9488\n\n Bytes b4 0xffff88007e8a9908:  00 00 00 00 00 00 00 00 5a 5a\n [...]\n Pid: 28705, comm: rmmod Tainted: P         C 2.6.31-rc2-wl #1\n Call Trace:\n  [\u003cffffffff810da9f4\u003e] print_trailer+0x14e/0x16e\n  [\u003cffffffff810daa56\u003e] object_err+0x42/0x61\n  [\u003cffffffff810dbcd9\u003e] __slab_free+0x2af/0x396\n  [\u003cffffffffa0ec9694\u003e] ? wiphy_unregister+0x92/0x142 [cfg80211]\n  [\u003cffffffff810dd5e3\u003e] kfree+0x13c/0x17a\n  [\u003cffffffffa0ec9694\u003e] ? wiphy_unregister+0x92/0x142 [cfg80211]\n  [\u003cffffffffa0ec9694\u003e] wiphy_unregister+0x92/0x142 [cfg80211]\n  [\u003cffffffffa0eed163\u003e] ieee80211_unregister_hw+0xc8/0xff [mac80211]\n  [\u003cffffffffa0f3fbc8\u003e] p54_unregister_common+0x31/0x66 [p54common]\n  [...]\n FIX kmalloc-512: Object at 0xffff88007e8a9918 not freed\n\nThe code path which leads to the *funny* double free:\n\n       request \u003d rdev-\u003escan_req;\n       dev \u003d dev_get_by_index(\u0026init_net, request-\u003eifidx);\n\t/*\n\t * the driver was unloaded recently and\n\t * therefore dev_get_by_index will return NULL!\n\t */\n        if (!dev)\n                goto out;\n\t[...]\n\trdev-\u003escan_req \u003d NULL; /* not executed... */\n\t[...]\n out:\n        kfree(request);\n\nSigned-off-by: Christian Lamparter \u003cchunkeey@web.de\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "6c95e2a2f0f0bf4c8880d5b74b2f7f359d352d03",
      "tree": "9758902b92cbde1890339f4747678b0511ee7ac4",
      "parents": [
        "3da7429ce92abd79b14e2275a28be144ce2c3013"
      ],
      "author": {
        "name": "Niko Jokinen",
        "email": "ext-niko.k.jokinen@nokia.com",
        "time": "Wed Jul 15 11:00:53 2009 +0300"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Jul 21 12:07:42 2009 -0400"
      },
      "message": "nl80211: Memory leak fixed\n\nPotential memory leak via msg pointer in nl80211_get_key() function.\n\nSigned-off-by: Niko Jokinen \u003cext-niko.k.jokinen@nokia.com\u003e\nSigned-off-by: Luciano Coelho \u003cluciano.coelho@nokia.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "35946a571099a50d2595c8866f07617d29558f53",
      "tree": "6ebcff064919ba40cef1fab8b42c17efc4c37e2d",
      "parents": [
        "e603d9d824ff0eda98a65708a7e82112becf2dca"
      ],
      "author": {
        "name": "Javier Cardona",
        "email": "javier@cozybit.com",
        "time": "Mon Jul 13 17:00:10 2009 -0700"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Jul 21 12:07:40 2009 -0400"
      },
      "message": "mac80211: use correct address for mesh Path Error\n\nFor forwarded frames, we save the precursor address in addr1 in case it\nneeds to be used to send a Path Error.  mesh_path_discard_frame,\nhowever, was using addr2 instead of addr1 to send Path Error frames, so\ncorrect that and also make the comment regarding this more clear.\n\nSigned-off-by: Andrey Yurovsky \u003candrey@cozybit.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "48ab3578a65c5168ecaaa3b21292b643b7bcc2d5",
      "tree": "ab99e6ee3e1f27b7457809cafba3b9fb38c35cdb",
      "parents": [
        "8ef86c7bfac5b44529b73b84bc50d3cf574bfb4b"
      ],
      "author": {
        "name": "Alan Jenkins",
        "email": "alan-jenkins@tuffmail.co.uk",
        "time": "Sun Jul 12 17:03:13 2009 +0100"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Jul 21 12:07:38 2009 -0400"
      },
      "message": "rfkill: fix rfkill_set_states() to set the hw state\n\nThe point of this function is to set the software and hardware state at\nthe same time.  When I tried to use it, I found it was only setting the\nsoftware state.\n\nSigned-off-by: Alan Jenkins \u003calan-jenkins@tuffmail.co.uk\u003e\nReviewed-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "8ef86c7bfac5b44529b73b84bc50d3cf574bfb4b",
      "tree": "56e4b14e60fac4f53e81fc21abed0f2556604501",
      "parents": [
        "f54c142725ad2ba33c3ee627873cb6966bf05447"
      ],
      "author": {
        "name": "Pavel Roskin",
        "email": "proski@gnu.org",
        "time": "Fri Jul 10 16:42:29 2009 -0400"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Jul 21 12:07:38 2009 -0400"
      },
      "message": "mac80211: fix injection in monitor mode\n\nThe location of the 802.11 header is calculated incorrectly due to a\nwrong placement of parentheses.  Found by kmemcheck.\n\nSigned-off-by: Pavel Roskin \u003cproski@gnu.org\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "f54c142725ad2ba33c3ee627873cb6966bf05447",
      "tree": "4bd86d879222e94c5ee175355242b8a04990334b",
      "parents": [
        "e2e414d92397c366396d13f627a98a20be92e509"
      ],
      "author": {
        "name": "Johannes Berg",
        "email": "johannes@sipsolutions.net",
        "time": "Fri Jul 10 21:41:39 2009 +0200"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Jul 21 12:07:37 2009 -0400"
      },
      "message": "rfkill: allow toggling soft state in sysfs again\n\nApparently there actually _are_ tools that try to set\nthis in sysfs even though it wasn\u0027t supposed to be used\nthis way without claiming first. Guess what: now that\nI\u0027ve cleaned it all up it doesn\u0027t matter and we can\nsimply allow setting the soft-block state in sysfs.\n\nSigned-off-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nTested-By: Darren Salt \u003clinux@youmustbejoking.demon.co.uk\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "e2e414d92397c366396d13f627a98a20be92e509",
      "tree": "0e30315aaf3c17b0f94187342733d2bace733c24",
      "parents": [
        "7b80ece41aea0b73283c6df5a8f25d40aa13135d"
      ],
      "author": {
        "name": "Johannes Berg",
        "email": "johannes@sipsolutions.net",
        "time": "Fri Jul 10 11:38:14 2009 +0200"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Jul 21 12:07:35 2009 -0400"
      },
      "message": "mac80211: disable mesh\n\nMy kvm instance was complaining a lot about sleeping\nin atomic contexts in the mesh code, and it turns out\nthat both mesh_path_add() and mpp_path_add() need to\nbe able to sleep (they even use synchronize_rcu()!).\nI put in a might_sleep() to annotate that, but I see\nno way, at least right now, of actually making sure\nthose functions are only called from process context\nsince they are both called during TX and RX and the\nmesh code itself even calls them with rcu_read_lock()\n\"held\".\n\nTherefore, let\u0027s disable it completely for now.\n\nIt\u0027s possible that I\u0027m only seeing this because the\nhwsim\u0027s beaconing is broken and thus the peers aren\u0027t\ndiscovered right away, but it is possible that this\nhappens even if beaconing is working, for a peer that\ndoesn\u0027t exist or so.\n\nIt should be possible to solve this by deferring the\nfreeing of the tables to call_rcu() instead of using\nsynchronize_rcu(), and also using atomic allocations,\nbut maybe it makes more sense to rework the code to\nnot call these from atomic contexts and defer more of\nthe work to the workqueue. Right now, I can\u0027t work on\neither of those solutions though.\n\nSigned-off-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "f249fb783092471a4808e5fc5bda071d2724810d",
      "tree": "12cd535e2ab69bd561124d5e0213fdc7fa0ea98c",
      "parents": [
        "e4135c2da11c337e3759f98727c4819ba2a849fa"
      ],
      "author": {
        "name": "Rémi Denis-Courmont",
        "email": "remi.denis-courmont@nokia.com",
        "time": "Mon Jul 20 00:47:04 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jul 20 08:23:36 2009 -0700"
      },
      "message": "Fix error return for setsockopt(SO_TIMESTAMPING)\n\nI guess it should be -EINVAL rather than EINVAL. I have not checked\nwhen the bug came in. Perhaps a candidate for -stable?\n\nSigned-off-by: Rémi Denis-Courmont \u003cremi.denis-courmont@nokia.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e547bc1eccf539b7403138d8ded913ffd2b7fd0d",
      "tree": "a5d776438864387bdc305ef3ce186ba527f5b5d4",
      "parents": [
        "e3afe7b75ed8f809c1473ea9b39267487c187ccb"
      ],
      "author": {
        "name": "John Dykstra",
        "email": "john.dykstra1@gmail.com",
        "time": "Fri Jul 17 09:23:22 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jul 20 07:49:08 2009 -0700"
      },
      "message": "tcp: Use correct peer adr when copying MD5 keys\n\nWhen the TCP connection handshake completes on the passive\nside, a variety of state must be set up in the \"child\" sock,\nincluding the key if MD5 authentication is being used.  Fix TCP\nfor both address families to label the key with the peer\u0027s\ndestination address, rather than the address from the listening\nsock, which is usually the wildcard.\n\nReported-by:   Stephen Hemminger \u003cshemminger@vyatta.com\u003e\nSigned-off-by: John Dykstra \u003cjohn.dykstra1@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e3afe7b75ed8f809c1473ea9b39267487c187ccb",
      "tree": "715aa813d57ffbc6b1a179e2f7f2957b88b415dc",
      "parents": [
        "a50a97d415d839e6db9df288ff0205528e52c03e"
      ],
      "author": {
        "name": "John Dykstra",
        "email": "john.dykstra1@gmail.com",
        "time": "Thu Jul 16 05:04:51 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jul 20 07:49:07 2009 -0700"
      },
      "message": "tcp: Fix MD5 signature checking on IPv4 mapped sockets\n\nFix MD5 signature checking so that an IPv4 active open\nto an IPv6 socket can succeed.  In particular, use the\ncorrect address family\u0027s signature generation function\nfor the SYN/ACK.\n\nReported-by:   Stephen Hemminger \u003cshemminger@vyatta.com\u003e\nSigned-off-by: John Dykstra \u003cjohn.dykstra1@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4dc6dc7162c08b9965163c9ab3f9375d4adff2c7",
      "tree": "f4b9959e9ca5e5b8bdb6301663a15e0f67d4c68c",
      "parents": [
        "303d67c288319768b19ed8dbed429fef7eb7c275"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Wed Jul 15 23:13:10 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jul 16 18:05:26 2009 -0700"
      },
      "message": "net: sock_copy() fixes\n\nCommit e912b1142be8f1e2c71c71001dc992c6e5eb2ec1\n(net: sk_prot_alloc() should not blindly overwrite memory)\ntook care of not zeroing whole new socket at allocation time.\n\nsock_copy() is another spot where we should be very careful.\nWe should not set refcnt to a non null value, until\nwe are sure other fields are correctly setup, or\na lockless reader could catch this socket by mistake,\nwhile not fully (re)initialized.\n\nThis patch puts sk_node \u0026 sk_refcnt to the very beginning\nof struct sock to ease sock_copy() \u0026 sk_prot_alloc() job.\n\nWe add appropriate smp_wmb() before sk_refcnt initializations\nto match our RCU requirements (changes to sock keys should\nbe committed to memory before sk_refcnt setting)\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "95aa1fe4abfc8d75dcd110bb285b09740214d053",
      "tree": "668998047f77fe5d7f76ecbceec73a4f4c8311a6",
      "parents": [
        "b13bb2e9933b9dfa25c81d959d847c843481111e",
        "941297f443f871b8c3372feccf27a8733f6ce9e9"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jul 16 17:34:50 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jul 16 17:34:50 2009 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6\n"
    },
    {
      "commit": "941297f443f871b8c3372feccf27a8733f6ce9e9",
      "tree": "c98b7e30bf14255cfd87a3d8d929f26f35764d21",
      "parents": [
        "aa6a03eb0ae859c1371555ef381de4c96ca1e4e6"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Thu Jul 16 14:03:40 2009 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Thu Jul 16 14:03:40 2009 +0200"
      },
      "message": "netfilter: nf_conntrack: nf_conntrack_alloc() fixes\n\nWhen a slab cache uses SLAB_DESTROY_BY_RCU, we must be careful when allocating\nobjects, since slab allocator could give a freed object still used by lockless\nreaders.\n\nIn particular, nf_conntrack RCU lookups rely on ct-\u003etuplehash[xxx].hnnode.next\nbeing always valid (ie containing a valid \u0027nulls\u0027 value, or a valid pointer to next\nobject in hash chain.)\n\nkmem_cache_zalloc() setups object with NULL values, but a NULL value is not valid\nfor ct-\u003etuplehash[xxx].hnnode.next.\n\nFix is to call kmem_cache_alloc() and do the zeroing ourself.\n\nAs spotted by Patrick, we also need to make sure lookup keys are committed to\nmemory before setting refcount to 1, or a lockless reader could get a reference\non the old version of the object. Its key re-check could then pass the barrier.\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "aa6a03eb0ae859c1371555ef381de4c96ca1e4e6",
      "tree": "347bd303420a1dc1c59b3204220713e724b331af",
      "parents": [
        "3f1f7cf08ddf10ef7fbf06d881582c95b9747f4e"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Thu Jul 16 14:01:54 2009 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Thu Jul 16 14:01:54 2009 +0200"
      },
      "message": "netfilter: xt_osf: fix nf_log_packet() arguments\n\nThe first argument is the address family, the second one the hook\nnumber.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "b13bb2e9933b9dfa25c81d959d847c843481111e",
      "tree": "8bd4234477ae0c697e575d4fa44ad66fb6c472ab",
      "parents": [
        "f7e5cc0c40dff92bad2894153f675c6c542ba2f0"
      ],
      "author": {
        "name": "Lothar Waßmann",
        "email": "LW@KARO-electronics.de",
        "time": "Tue Jul 14 23:12:25 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jul 15 11:20:38 2009 -0700"
      },
      "message": "net/can: add module alias to can protocol drivers\n\nAdd appropriate MODULE_ALIAS() to facilitate autoloading of can protocol drivers\n\nSigned-off-by: Lothar Wassmann \u003cLW@KARO-electronics.de\u003e\nAcked-by: Oliver Hartkopp \u003coliver@hartkopp.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f7e5cc0c40dff92bad2894153f675c6c542ba2f0",
      "tree": "bd7e85854edeb3271f9a29f021392d7fdcc08bed",
      "parents": [
        "252aa9d94a04252046f3a382e6aca1b5c95921d8"
      ],
      "author": {
        "name": "Lothar Waßmann",
        "email": "LW@KARO-electronics.de",
        "time": "Tue Jul 14 23:10:21 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jul 15 11:20:37 2009 -0700"
      },
      "message": "net/can bugfix: use after free bug in can protocol drivers\n\nFix a use after free bug in can protocol drivers\n\nThe release functions of the can protocol drivers lack a call to\nsock_orphan() which leads to referencing freed memory under certain\ncircumstances.\n\nThis patch fixes a bug reported here:\nhttps://lists.berlios.de/pipermail/socketcan-users/2009-July/000985.html\n\nSigned-off-by: Lothar Wassmann \u003cLW@KARO-electronics.de\u003e\nAcked-by: Oliver Hartkopp \u003coliver@hartkopp.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "eedfe1c4289216af5a0a7f38e6b2c4d3f07c087f",
      "tree": "5e08b79c88c36ef0607f830523f253305abf8dff",
      "parents": [
        "a17d1720aa35623a9bef3707b36242706714bca5"
      ],
      "author": {
        "name": "Abhishek Kulkarni",
        "email": "adkulkar@umail.iu.edu",
        "time": "Tue Jul 14 13:25:41 2009 -0500"
      },
      "committer": {
        "name": "Eric Van Hensbergen",
        "email": "ericvh@vTrogdor.(none)",
        "time": "Tue Jul 14 15:54:41 2009 -0500"
      },
      "message": "9p: Possible regression in p9_client_stat\n\nFix a possible regression with p9_client_stat where it can try to kfree \nan ERR_PTR after an erroneous p9pdu_readf. Also remove an unnecessary data \nbuffer increment in p9_client_read.\n\nSigned-off-by: Abhishek Kulkarni \u003cadkulkar@umail.iu.edu\u003e\nSigned-off-by: Eric Van Hensbergen \u003cericvh@gmail.com\u003e\n"
    },
    {
      "commit": "a17d1720aa35623a9bef3707b36242706714bca5",
      "tree": "476f9a29c6b8274227e5adab3c08a48317e8eca7",
      "parents": [
        "4b0a84043e0c14088958fddb62f416d050368011"
      ],
      "author": {
        "name": "Abhishek Kulkarni",
        "email": "adkulkar@umail.iu.edu",
        "time": "Tue Jul 14 13:24:10 2009 -0500"
      },
      "committer": {
        "name": "Eric Van Hensbergen",
        "email": "ericvh@vTrogdor.(none)",
        "time": "Tue Jul 14 15:54:41 2009 -0500"
      },
      "message": "9p: default 9p transport module fix\n\nThe default 9p transport module is not chosen unless an option parameter (any)\nis passed to mount, which thus returns a ENOPROTOSUPPORT. This fix moves the\ncheck out of parse_opts into p9_client_create.\n\nSigned-off-by: Abhishek Kulkarni \u003cadkulkar@umail.iu.edu\u003e\nSigned-off-by: Eric Van Hensbergen \u003cericvh@gmail.com\u003e\n"
    },
    {
      "commit": "a376d446771710790f5f3425172b467bf8578e22",
      "tree": "64dd36bcb3df9a4d76d31900f1967b0cc302254e",
      "parents": [
        "6847e154e3cd74fca6084124c097980a7634285a",
        "252aa9d94a04252046f3a382e6aca1b5c95921d8"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Jul 14 18:33:54 2009 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Jul 14 18:33:54 2009 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6:\n  Revert \"NET: Fix locking issues in PPP, 6pack, mkiss and strip line disciplines.\"\n  skbuff.h: Fix comment for NET_IP_ALIGN\n  drivers/net: using spin_lock_irqsave() in net_send_packet()\n  NET: phy_device, fix lock imbalance\n  gre: fix ToS/DiffServ inherit bug\n  igb: gcc-3.4.6 fix\n  atlx: duplicate testing of MCAST flag\n  NET: Fix locking issues in PPP, 6pack, mkiss and strip line disciplines.\n  netdev: restore MTU change operation\n  netdev: restore MAC address set and validate operations\n  sit: fix regression: do not release skb-\u003edst before xmit\n  net: ip_push_pending_frames() fix\n  net: sk_prot_alloc() should not blindly overwrite memory\n"
    },
    {
      "commit": "ee686ca919193d7c1f87f907e732df5e2f942523",
      "tree": "2a1f528de455ffc952ab9bc795dd38a863604aaa",
      "parents": [
        "c8159b2db1b49f6bda4429008c85108e2da60712"
      ],
      "author": {
        "name": "Andreas Jaggi",
        "email": "aj@open.ch",
        "time": "Tue Jul 14 09:35:59 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jul 14 09:35:59 2009 -0700"
      },
      "message": "gre: fix ToS/DiffServ inherit bug\n\nFixes two bugs:\n- ToS/DiffServ inheritance was unintentionally activated when using impair fixed ToS values\n- ECN bit was lost during ToS/DiffServ inheritance\n\nSigned-off-by: Andreas Jaggi \u003caj@open.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "405f55712dfe464b3240d7816cc4fe4174831be2",
      "tree": "96c425ea7fa8b31058b8f83a433c5e5265c8ebc7",
      "parents": [
        "f9fabcb58a6d26d6efde842d1703ac7cfa9427b6"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Sat Jul 11 22:08:37 2009 +0400"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Sun Jul 12 12:22:34 2009 -0700"
      },
      "message": "headers: smp_lock.h redux\n\n* Remove smp_lock.h from files which don\u0027t need it (including some headers!)\n* Add smp_lock.h to files which do need it\n* Make smp_lock.h include conditional in hardirq.h\n  It\u0027s needed only for one kernel_locked() usage which is under CONFIG_PREEMPT\n\n  This will make hardirq.h inclusion cheaper for every PREEMPT\u003dn config\n  (which includes allmodconfig/allyesconfig, BTW)\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\n"
    },
    {
      "commit": "f2ba025b2036e52a176cddcf91b15ac2b10c644a",
      "tree": "5af959232c95ec4b931b2ac6f9f2063c93345e6f",
      "parents": [
        "e51a67a9c8a2ea5c563f8c2ba6613fe2100ffe67"
      ],
      "author": {
        "name": "Sascha Hlusiak",
        "email": "contact@saschahlusiak.de",
        "time": "Sat Jul 11 20:30:52 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jul 11 20:30:52 2009 -0700"
      },
      "message": "sit: fix regression: do not release skb-\u003edst before xmit\n\nThe sit module makes use of skb-\u003edst in it\u0027s xmit function, so since\n93f154b594fe47 (\"net: release dst entry in dev_hard_start_xmit()\") sit\ntunnels are broken, because the flag IFF_XMIT_DST_RELEASE is not\nunset.\n\nThis patch unsets that flag for sit devices to fix this\nregression.\n\nSigned-off-by: Sascha Hlusiak \u003ccontact@saschahlusiak.de\u003e\nAcked-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e51a67a9c8a2ea5c563f8c2ba6613fe2100ffe67",
      "tree": "d9741a14cc9134e592c37b1c235f2f13a20c261f",
      "parents": [
        "e912b1142be8f1e2c71c71001dc992c6e5eb2ec1"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Wed Jul 08 14:20:42 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jul 11 20:26:21 2009 -0700"
      },
      "message": "net: ip_push_pending_frames() fix\n\nAfter commit 2b85a34e911bf483c27cfdd124aeb1605145dc80\n(net: No more expensive sock_hold()/sock_put() on each tx)\nwe do not take any more references on sk-\u003esk_refcnt on outgoing packets.\n\nI forgot to delete two __sock_put() from ip_push_pending_frames()\nand ip6_push_pending_frames().\n\nReported-by: Emil S Tantilov \u003cemils.tantilov@gmail.com\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nTested-by: Emil S Tantilov \u003cemils.tantilov@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e912b1142be8f1e2c71c71001dc992c6e5eb2ec1",
      "tree": "9812c7d3e5431852d25bc15860830413ff15dc51",
      "parents": [
        "e594e96e8a14101a6decabf6746bd5186287debc"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Wed Jul 08 19:36:05 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jul 11 20:26:19 2009 -0700"
      },
      "message": "net: sk_prot_alloc() should not blindly overwrite memory\n\nSome sockets use SLAB_DESTROY_BY_RCU, and our RCU code correctness\ndepends on sk-\u003esk_nulls_node.next being always valid. A NULL\nvalue is not allowed as it might fault a lockless reader.\n\nCurrent sk_prot_alloc() implementation doesnt respect this hypothesis,\ncalling kmem_cache_alloc() with __GFP_ZERO. Just call memset() around\nthe forbidden field.\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a57de0b4336e48db2811a2030bb68dba8dd09d88",
      "tree": "a01c189d5fd55c69c9e2e842241e84b46728bc60",
      "parents": [
        "1b614fb9a00e97b1eab54d4e442d405229c059dd"
      ],
      "author": {
        "name": "Jiri Olsa",
        "email": "jolsa@redhat.com",
        "time": "Wed Jul 08 12:09:13 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jul 09 17:06:57 2009 -0700"
      },
      "message": "net: adding memory barrier to the poll and receive callbacks\n\nAdding memory barrier after the poll_wait function, paired with\nreceive callbacks. Adding fuctions sock_poll_wait and sk_has_sleeper\nto wrap the memory barrier.\n\nWithout the memory barrier, following race can happen.\nThe race fires, when following code paths meet, and the tp-\u003ercv_nxt\nand __add_wait_queue updates stay in CPU caches.\n\nCPU1                         CPU2\n\nsys_select                   receive packet\n  ...                        ...\n  __add_wait_queue           update tp-\u003ercv_nxt\n  ...                        ...\n  tp-\u003ercv_nxt check          sock_def_readable\n  ...                        {\n  schedule                      ...\n                                if (sk-\u003esk_sleep \u0026\u0026 waitqueue_active(sk-\u003esk_sleep))\n                                        wake_up_interruptible(sk-\u003esk_sleep)\n                                ...\n                             }\n\nIf there was no cache the code would work ok, since the wait_queue and\nrcv_nxt are opposit to each other.\n\nMeaning that once tp-\u003ercv_nxt is updated by CPU2, the CPU1 either already\npassed the tp-\u003ercv_nxt check and sleeps, or will get the new value for\ntp-\u003ercv_nxt and will return with new data mask.\nIn both cases the process (CPU1) is being added to the wait queue, so the\nwaitqueue_active (CPU2) call cannot miss and will wake up CPU1.\n\nThe bad case is when the __add_wait_queue changes done by CPU1 stay in its\ncache, and so does the tp-\u003ercv_nxt update on CPU2 side.  The CPU1 will then\nendup calling schedule and sleep forever if there are no more data on the\nsocket.\n\nCalls to poll_wait in following modules were ommited:\n\tnet/bluetooth/af_bluetooth.c\n\tnet/irda/af_irda.c\n\tnet/irda/irnet/irnet_ppp.c\n\tnet/mac80211/rc80211_pid_debugfs.c\n\tnet/phonet/socket.c\n\tnet/rds/af_rds.c\n\tnet/rfkill/core.c\n\tnet/sunrpc/cache.c\n\tnet/sunrpc/rpc_pipe.c\n\tnet/tipc/socket.c\n\nSigned-off-by: Jiri Olsa \u003cjolsa@redhat.com\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1b614fb9a00e97b1eab54d4e442d405229c059dd",
      "tree": "3260cee5b11a106e7f4e630171627c6e3e528a0f",
      "parents": [
        "d2daeabf62a5fb205d413c35cf604021db17536b"
      ],
      "author": {
        "name": "Anton Vorontsov",
        "email": "avorontsov@ru.mvista.com",
        "time": "Wed Jul 08 20:09:44 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jul 08 20:09:44 2009 -0700"
      },
      "message": "netpoll: Fix carrier detection for drivers that are using phylib\n\nUsing early netconsole and gianfar driver this error pops up:\n\n  netconsole: timeout waiting for carrier\n\nIt appears that net/core/netpoll.c:netpoll_setup() is using\ncond_resched() in a loop waiting for a carrier.\n\nThe thing is that cond_resched() is a no-op when system_state !\u003d\nSYSTEM_RUNNING, and so drivers/net/phy/phy.c\u0027s state_queue is never\nscheduled, therefore link detection doesn\u0027t work.\n\nI belive that the main problem is in cond_resched()[1], but despite\nhow the cond_resched() story ends, it might be a good idea to call\nmsleep(1) instead of cond_resched(), as suggested by Andrew Morton.\n\n[1] http://lkml.org/lkml/2009/7/7/463\n\nSigned-off-by: Anton Vorontsov \u003cavorontsov@ru.mvista.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d2daeabf62a5fb205d413c35cf604021db17536b",
      "tree": "844ced1a54745c14ea45d33ccad4eae6e7253322",
      "parents": [
        "c3b85423072c0739d76b7c54080d3f3ccc5dad4d",
        "1ce822fa04fd6878f079461a4b8affe4bb5ec27b"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jul 08 18:13:13 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jul 08 18:13:13 2009 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "345aa031207d02d7438c1aa96ed9315911ecd745",
      "tree": "e9003cc0010b081eb975e209baa2753e8996582a",
      "parents": [
        "64c8165b44a91c09b19afb4110610ed242286639"
      ],
      "author": {
        "name": "Jarek Poplawski",
        "email": "jarkao2@gmail.com",
        "time": "Tue Jul 07 19:39:16 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jul 08 10:46:45 2009 -0700"
      },
      "message": "ipv4: Fix fib_trie rebalancing, part 4 (root thresholds)\n\nPawel Staszewski wrote:\n\u003cblockquote\u003e\nSome time ago i report this:\nhttp://bugzilla.kernel.org/show_bug.cgi?id\u003d6648\n\nand now with 2.6.29 / 2.6.29.1 / 2.6.29.3 and 2.6.30 it back\ndmesg output:\noprofile: using NMI interrupt.\nFix inflate_threshold_root. Now\u003d15 size\u003d11 bits\n...\nFix inflate_threshold_root. Now\u003d15 size\u003d11 bits\n\ncat /proc/net/fib_triestat\nBasic info: size of leaf: 40 bytes, size of tnode: 56 bytes.\nMain:\n        Aver depth:     2.28\n        Max depth:      6\n        Leaves:         276539\n        Prefixes:       289922\n        Internal nodes: 66762\n          1: 35046  2: 13824  3: 9508  4: 4897  5: 2331  6: 1149  7: 5\n9: 1  18: 1\n        Pointers: 691228\nNull ptrs: 347928\nTotal size: 35709  kB\n\u003c/blockquote\u003e\n\nIt seems, the current threshold for root resizing is too aggressive,\nand it causes misleading warnings during big updates, but it might be\nalso responsible for memory problems, especially with non-preempt\nconfigs, when RCU freeing is delayed long after call_rcu.\n\nIt should be also mentioned that because of non-atomic changes during\nresizing/rebalancing the current lookup algorithm can miss valid leaves\nso it\u0027s additional argument to shorten these activities even at a cost\nof a minimally longer searching.\n\nThis patch restores values before the patch \"[IPV4]: fib_trie root\nnode settings\", commit: 965ffea43d4ebe8cd7b9fee78d651268dd7d23c5 from\nv2.6.22.\n\nPawel\u0027s report:\n\u003cblockquote\u003e\nI dont see any big change of (cpu load or faster/slower\nrouting/propagating routes from bgpd or something else) - in avg there\nis from 2% to 3% more of CPU load i dont know why but it is - i change\nfrom \"preempt\" to \"no preempt\" 3 times and check this my \"mpstat -P ALL\n1 30\"\nalways avg cpu load was from 2 to 3% more compared to \"no preempt\"\n[...]\ncat /proc/net/fib_triestat\nBasic info: size of leaf: 20 bytes, size of tnode: 36 bytes.\nMain:\n        Aver depth:     2.44\n        Max depth:      6\n        Leaves:         277814\n        Prefixes:       291306\n        Internal nodes: 66420\n          1: 32737  2: 14850  3: 10332  4: 4871  5: 2313  6: 942  7: 371  8: 3  17: 1\n        Pointers: 599098\nNull ptrs: 254865\nTotal size: 18067  kB\n\u003c/blockquote\u003e\n\nAccording to this and other similar reports average depth is slightly\nincreased (~0.2), and root nodes are shorter (log 17 vs. 18), but\nthere is no visible performance decrease. So, until memory handling is\nimproved or added parameters for changing this individually, this\npatch resets to safer defaults.\n\nReported-by: Pawel Staszewski \u003cpstaszewski@itcare.pl\u003e\nReported-by: Jorge Boncompte [DTI2] \u003cjorge@dti2.net\u003e\nSigned-off-by: Jarek Poplawski \u003cjarkao2@gmail.com\u003e\nTested-by: Pawel Staszewski \u003cpstaszewski@itcare.pl\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3938b45c1c75e53d45eb65ac253f12e86239c9ba",
      "tree": "9653bd914d6e117c4057f75d65ba61e30e6afa99",
      "parents": [
        "2dce4c2b5f0b43bd25bf9ea6ded06b7f8a54c91f"
      ],
      "author": {
        "name": "Luciano Coelho",
        "email": "luciano.coelho@nokia.com",
        "time": "Fri Jul 03 08:25:08 2009 +0300"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Jul 07 12:55:28 2009 -0400"
      },
      "message": "mac80211: minstrel: avoid accessing negative indices in rix_to_ndx()\n\nIf rix is not found in mi-\u003er[], i will become -1 after the loop.  This value\nis eventually used to access arrays, so we were accessing arrays with a\nnegative index, which is obviously not what we want to do.  This patch fixes\nthis potential problem.\n\nSigned-off-by: Luciano Coelho \u003cluciano.coelho@nokia.com\u003e\nAcked-by: Felix Fietkau \u003cnbd@openwrt.org\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "2dce4c2b5f0b43bd25bf9ea6ded06b7f8a54c91f",
      "tree": "f9ded076fd61f5bd4ce93c995a4c9ab0dbf60742",
      "parents": [
        "76d8b64e536362e16e38ee1c279c965ebfe094cc"
      ],
      "author": {
        "name": "Johannes Berg",
        "email": "johannes@sipsolutions.net",
        "time": "Thu Jul 02 15:46:41 2009 +0200"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Jul 07 12:55:28 2009 -0400"
      },
      "message": "cfg80211: fix refcount leak\n\nThe code in cfg80211\u0027s cfg80211_bss_update erroneously\ngrabs a reference to the BSS, which means that it will\nnever be freed.\n\nSigned-off-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nCc: stable@kernel.org [2.6.29, 2.6.30]\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "59615b5f9d1323898ca94e88e595b5b04115076a",
      "tree": "ca3a1eadbd09e51e77e749d8d4edc7f05c48108a",
      "parents": [
        "a7a4e41ed62a6a1fce6eb503c920f615eca27f02"
      ],
      "author": {
        "name": "Andrey Yurovsky",
        "email": "andrey@cozybit.com",
        "time": "Thu Jun 25 16:07:42 2009 -0700"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Jul 07 12:55:27 2009 -0400"
      },
      "message": "mac80211: fix allocation in mesh_queue_preq\n\nWe allocate a PREQ queue node in mesh_queue_preq, however the allocation\nmay cause us to sleep.  Use GFP_ATOMIC to prevent this.\n\n[ 1869.126498] BUG: scheduling while atomic: ping/1859/0x10000100\n[ 1869.127164] Modules linked in: ath5k mac80211 ath\n[ 1869.128310] Pid: 1859, comm: ping Not tainted 2.6.30-wl #1\n[ 1869.128754] Call Trace:\n[ 1869.129293]  [\u003cc1023a2b\u003e] __schedule_bug+0x48/0x4d\n[ 1869.129866]  [\u003cc13b5533\u003e] __schedule+0x77/0x67a\n[ 1869.130544]  [\u003cc1026f2e\u003e] ? release_console_sem+0x17d/0x185\n[ 1869.131568]  [\u003cc807cf47\u003e] ? mesh_queue_preq+0x2b/0x165 [mac80211]\n[ 1869.132318]  [\u003cc13b5b3e\u003e] schedule+0x8/0x1f\n[ 1869.132807]  [\u003cc1023c12\u003e] __cond_resched+0x16/0x2f\n[ 1869.133478]  [\u003cc13b5bf0\u003e] _cond_resched+0x27/0x32\n[ 1869.134191]  [\u003cc108a370\u003e] kmem_cache_alloc+0x1c/0xcf\n[ 1869.134714]  [\u003cc10273ae\u003e] ? printk+0x15/0x17\n[ 1869.135670]  [\u003cc807cf47\u003e] mesh_queue_preq+0x2b/0x165 [mac80211]\n[ 1869.136731]  [\u003cc807d1f8\u003e] mesh_nexthop_lookup+0xee/0x12d [mac80211]\n[ 1869.138130]  [\u003cc807417e\u003e] ieee80211_xmit+0xe6/0x2b2 [mac80211]\n[ 1869.138935]  [\u003cc80be46d\u003e] ? ath5k_hw_setup_rx_desc+0x0/0x66 [ath5k]\n[ 1869.139831]  [\u003cc80c97bc\u003e] ? ath5k_tasklet_rx+0xba/0x506 [ath5k]\n[ 1869.140863]  [\u003cc8075191\u003e] ieee80211_subif_start_xmit+0x6c9/0x6e4\n[mac80211]\n[ 1869.141665]  [\u003cc105cf1c\u003e] ? handle_level_irq+0x78/0x9d\n[ 1869.142390]  [\u003cc12e3f93\u003e] dev_hard_start_xmit+0x168/0x1c7\n[ 1869.143092]  [\u003cc12f1f17\u003e] __qdisc_run+0xe1/0x1b7\n[ 1869.143612]  [\u003cc12e25ff\u003e] qdisc_run+0x18/0x1a\n[ 1869.144248]  [\u003cc12e62f4\u003e] dev_queue_xmit+0x16a/0x25a\n[ 1869.144785]  [\u003cc13b6dcc\u003e] ? _read_unlock_bh+0xe/0x10\n[ 1869.145465]  [\u003cc12eacdb\u003e] neigh_resolve_output+0x19c/0x1c7\n[ 1869.146182]  [\u003cc130e2da\u003e] ? ip_finish_output+0x0/0x51\n[ 1869.146697]  [\u003cc130e2a0\u003e] ip_finish_output2+0x182/0x1bc\n[ 1869.147358]  [\u003cc130e327\u003e] ip_finish_output+0x4d/0x51\n[ 1869.147863]  [\u003cc130e9d5\u003e] ip_output+0x80/0x85\n[ 1869.148515]  [\u003cc130cc49\u003e] dst_output+0x9/0xb\n[ 1869.149141]  [\u003cc130dec6\u003e] ip_local_out+0x17/0x1a\n[ 1869.149632]  [\u003cc130e0bc\u003e] ip_push_pending_frames+0x1f3/0x255\n[ 1869.150343]  [\u003cc13247ff\u003e] raw_sendmsg+0x5e6/0x667\n[ 1869.150883]  [\u003cc1033c55\u003e] ? insert_work+0x6a/0x73\n[ 1869.151834]  [\u003cc8071e00\u003e] ?\nieee80211_invoke_rx_handlers+0x17da/0x1ae8 [mac80211]\n[ 1869.152630]  [\u003cc132bd68\u003e] inet_sendmsg+0x3b/0x48\n[ 1869.153232]  [\u003cc12d7deb\u003e] __sock_sendmsg+0x45/0x4e\n[ 1869.153740]  [\u003cc12d8537\u003e] sock_sendmsg+0xb8/0xce\n[ 1869.154519]  [\u003cc80be46d\u003e] ? ath5k_hw_setup_rx_desc+0x0/0x66 [ath5k]\n[ 1869.155289]  [\u003cc1036b25\u003e] ? autoremove_wake_function+0x0/0x30\n[ 1869.155859]  [\u003cc115992b\u003e] ? __copy_from_user_ll+0x11/0xce\n[ 1869.156573]  [\u003cc1159d99\u003e] ? copy_from_user+0x31/0x54\n[ 1869.157235]  [\u003cc12df646\u003e] ? verify_iovec+0x40/0x6e\n[ 1869.157778]  [\u003cc12d869a\u003e] sys_sendmsg+0x14d/0x1a5\n[ 1869.158714]  [\u003cc8072c40\u003e] ? __ieee80211_rx+0x49e/0x4ee [mac80211]\n[ 1869.159641]  [\u003cc80c83fe\u003e] ? ath5k_rxbuf_setup+0x6d/0x8d [ath5k]\n[ 1869.160543]  [\u003cc80be46d\u003e] ? ath5k_hw_setup_rx_desc+0x0/0x66 [ath5k]\n[ 1869.161434]  [\u003cc80beba4\u003e] ? ath5k_hw_get_rxdp+0xe/0x10 [ath5k]\n[ 1869.162319]  [\u003cc80c97bc\u003e] ? ath5k_tasklet_rx+0xba/0x506 [ath5k]\n[ 1869.163063]  [\u003cc1005627\u003e] ? enable_8259A_irq+0x40/0x43\n[ 1869.163594]  [\u003cc101edb8\u003e] ? __dequeue_entity+0x23/0x27\n[ 1869.164793]  [\u003cc100187a\u003e] ? __switch_to+0x2b/0x105\n[ 1869.165442]  [\u003cc1021d5f\u003e] ? finish_task_switch+0x5b/0x74\n[ 1869.166129]  [\u003cc12d963a\u003e] sys_socketcall+0x14b/0x17b\n[ 1869.166612]  [\u003cc1002b95\u003e] syscall_call+0x7/0xb\n\nSigned-off-by: Andrey Yurovsky \u003candrey@cozybit.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "1f5fc70a250cc18f066072119e9fbbc20dad865f",
      "tree": "d661f714f9ae03235c57981ba5edaf0b6b686440",
      "parents": [
        "0ca1b08eba627b4245efd0f71b55a062bf163777"
      ],
      "author": {
        "name": "Jiri Slaby",
        "email": "jirislaby@gmail.com",
        "time": "Sat Jun 20 12:31:11 2009 +0200"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Jul 07 12:55:25 2009 -0400"
      },
      "message": "Wireless: nl80211, fix lock imbalance\n\nDon\u0027t forget to unlock cfg80211_mutex in one fail path of\nnl80211_set_wiphy.\n\nSigned-off-by: Jiri Slaby \u003cjirislaby@gmail.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "1bc4ee4088c9a502db0e9c87f675e61e57fa1734",
      "tree": "a166f4b7e7aa78fa31431ae6cb060bf4e5d088be",
      "parents": [
        "3c8a9c63d5fd738c261bd0ceece04d9c8357ca13"
      ],
      "author": {
        "name": "Wei Yongjun",
        "email": "yjwei@cn.fujitsu.com",
        "time": "Sun Jul 05 19:45:48 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jul 06 12:47:08 2009 -0700"
      },
      "message": "sctp: fix warning at inet_sock_destruct() while release sctp socket\n\nCommit \u0027net: Move rx skb_orphan call to where needed\u0027 broken sctp protocol\nwith warning at inet_sock_destruct(). Actually, sctp can do this right with\nsctp_sock_rfree_frag() and sctp_skb_set_owner_r_frag() pair.\n\n    sctp_sock_rfree_frag(skb);\n    sctp_skb_set_owner_r_frag(skb, newsk);\n\nThis patch not revert the commit d55d87fdff8252d0e2f7c28c2d443aee17e9d70f,\ninstead remove the sctp_sock_rfree_frag() function.\n\n------------[ cut here ]------------\nWARNING: at net/ipv4/af_inet.c:151 inet_sock_destruct+0xe0/0x142()\nModules linked in: sctp ipv6 dm_mirror dm_region_hash dm_log dm_multipath\nscsi_mod ext3 jbd uhci_hcd ohci_hcd ehci_hcd [last unloaded: scsi_wait_scan]\nPid: 1808, comm: sctp_test Not tainted 2.6.31-rc2 #40\nCall Trace:\n [\u003cc042dd06\u003e] warn_slowpath_common+0x6a/0x81\n [\u003cc064a39a\u003e] ? inet_sock_destruct+0xe0/0x142\n [\u003cc042dd2f\u003e] warn_slowpath_null+0x12/0x15\n [\u003cc064a39a\u003e] inet_sock_destruct+0xe0/0x142\n [\u003cc05fde44\u003e] __sk_free+0x19/0xcc\n [\u003cc05fdf50\u003e] sk_free+0x18/0x1a\n [\u003cca0d14ad\u003e] sctp_close+0x192/0x1a1 [sctp]\n [\u003cc0649f7f\u003e] inet_release+0x47/0x4d\n [\u003cc05fba4d\u003e] sock_release+0x19/0x5e\n [\u003cc05fbab3\u003e] sock_close+0x21/0x25\n [\u003cc049c31b\u003e] __fput+0xde/0x189\n [\u003cc049c3de\u003e] fput+0x18/0x1a\n [\u003cc049988f\u003e] filp_close+0x56/0x60\n [\u003cc042f422\u003e] put_files_struct+0x5d/0xa1\n [\u003cc042f49f\u003e] exit_files+0x39/0x3d\n [\u003cc043086a\u003e] do_exit+0x1a5/0x5dd\n [\u003cc04a86c2\u003e] ? d_kill+0x35/0x3b\n [\u003cc0438fa4\u003e] ? dequeue_signal+0xa6/0x115\n [\u003cc0430d05\u003e] do_group_exit+0x63/0x8a\n [\u003cc0439504\u003e] get_signal_to_deliver+0x2e1/0x2f9\n [\u003cc0401d9e\u003e] do_notify_resume+0x7c/0x6b5\n [\u003cc043f601\u003e] ? autoremove_wake_function+0x0/0x34\n [\u003cc04a864e\u003e] ? __d_free+0x3d/0x40\n [\u003cc04a867b\u003e] ? d_free+0x2a/0x3c\n [\u003cc049ba7e\u003e] ? vfs_write+0x103/0x117\n [\u003cc05fc8fa\u003e] ? sys_socketcall+0x178/0x182\n [\u003cc0402a56\u003e] work_notifysig+0x13/0x19\n---[ end trace 9db92c463e789fba ]---\n\nSigned-off-by: Wei Yongjun \u003cyjwei@cn.fujitsu.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nAcked-by: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1ded3f59f35a2642852b3e2a1c0fa8a97777e9af",
      "tree": "8740ddef72d2a51849cf87fc30744dcda04864f0",
      "parents": [
        "78c29bd95bd8d2c3bcf7932cb3ab8ae01cd8f58f"
      ],
      "author": {
        "name": "Stephane Contri",
        "email": "Stephane.Contri@grassvalley.com",
        "time": "Thu Jul 02 23:26:48 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Jul 05 18:03:35 2009 -0700"
      },
      "message": "dsa: fix 88e6xxx statistics counter snapshotting\n\nThe bit that tells us whether a statistics counter snapshot operation\nhas completed is located in the GLOBAL register block, not in the\nGLOBAL2 register block, so fix up mv88e6xxx_stats_wait() to poll the\nright register address.\n\nSigned-off-by: Stephane Contri \u003cStephane.Contri@grassvalley.com\u003e\nSigned-off-by: Lennert Buytenhek \u003cbuytenh@marvell.com\u003e\nCc: stable@kernel.org\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a1ed05263b74921742b454ef52c30b609ec6940f",
      "tree": "36fcbc8e1907f6f75241c405da22b311e5cad4f8",
      "parents": [
        "59cae0092e4da753b5a2adb32933e0d1b223bcc5"
      ],
      "author": {
        "name": "Brian Haley",
        "email": "brian.haley@hp.com",
        "time": "Thu Jul 02 07:10:52 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jul 03 19:10:13 2009 -0700"
      },
      "message": "IPv6: preferred lifetime of address not getting updated\n\nThere\u0027s a bug in addrconf_prefix_rcv() where it won\u0027t update the\npreferred lifetime of an IPv6 address if the current valid lifetime\nof the address is less than 2 hours (the minimum value in the RA).\n\nFor example, If I send a router advertisement with a prefix that\nhas valid lifetime \u003d preferred lifetime \u003d 2 hours we\u0027ll build\nthis address:\n\n3: eth0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qlen 1000\n    inet6 2001:1890:1109:a20:217:8ff:fe7d:4718/64 scope global dynamic\n       valid_lft 7175sec preferred_lft 7175sec\n\nIf I then send the same prefix with valid lifetime \u003d preferred\nlifetime \u003d 0 it will be ignored since the minimum valid lifetime\nis 2 hours:\n\n3: eth0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qlen 1000\n    inet6 2001:1890:1109:a20:217:8ff:fe7d:4718/64 scope global dynamic\n       valid_lft 7161sec preferred_lft 7161sec\n\nBut according to RFC 4862 we should always reset the preferred lifetime\neven if the valid lifetime is invalid, which would cause the address\nto immediately get deprecated.  So with this patch we\u0027d see this:\n\n5: eth0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qlen 1000\n    inet6 2001:1890:1109:a20:21f:29ff:fe5a:ef04/64 scope global deprecated dynamic\n       valid_lft 7163sec preferred_lft 0sec\n\nThe comment winds-up being 5x the size of the code to fix the problem.\n\nUpdate the preferred lifetime of IPv6 addresses derived from a prefix\ninfo option in a router advertisement even if the valid lifetime in\nthe option is invalid, as specified in RFC 4862 Section 5.5.3e.  Fixes\nan issue where an address will not immediately become deprecated.\nReported by Jens Rosenboom.\n\nSigned-off-by: Brian Haley \u003cbrian.haley@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "59cae0092e4da753b5a2adb32933e0d1b223bcc5",
      "tree": "b2578c0452504d63de9aeaf5029daae5cefef165",
      "parents": [
        "c615c9f3f3cea60279b1bb38e8ef27bd575ecd0c"
      ],
      "author": {
        "name": "Wei Yongjun",
        "email": "yjwei@cn.fujitsu.com",
        "time": "Thu Jul 02 16:59:49 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jul 03 19:10:10 2009 -0700"
      },
      "message": "xfrm6: fix the proto and ports decode of sctp protocol\n\nThe SCTP pushed the skb above the sctp chunk header, so the\ncheck of pskb_may_pull(skb, nh + offset + 1 - skb-\u003edata) in\n_decode_session6() will never return 0 and the ports decode\nof sctp will always fail. (nh + offset + 1 - skb-\u003edata \u003c 0)\n\nSigned-off-by: Wei Yongjun \u003cyjwei@cn.fujitsu.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c615c9f3f3cea60279b1bb38e8ef27bd575ecd0c",
      "tree": "2bf343e769106a87e3cda9801e3b8cb942d722c9",
      "parents": [
        "15da4b1612d608a47e095439b3dd1d77ffe20e0c"
      ],
      "author": {
        "name": "Wei Yongjun",
        "email": "yjwei@cn.fujitsu.com",
        "time": "Thu Jul 02 16:57:23 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jul 03 19:10:06 2009 -0700"
      },
      "message": "xfrm4: fix the ports decode of sctp protocol\n\nThe SCTP pushed the skb data above the sctp chunk header, so the check\nof pskb_may_pull(skb, xprth + 4 - skb-\u003edata) in _decode_session4() will\nnever return 0 because xprth + 4 - skb-\u003edata \u003c 0, the ports decode of\nsctp will always fail.\n\nSigned-off-by: Wei Yongjun \u003cyjwei@cn.fujitsu.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "15da4b1612d608a47e095439b3dd1d77ffe20e0c",
      "tree": "bc698a7851c73e86e2ac8ef8bfe32c14aff6c71c",
      "parents": [
        "887b5ea3683ce04966e35fa2e5fe215bedcde73c"
      ],
      "author": {
        "name": "Abhishek Kulkarni",
        "email": "adkulkar@umail.iu.edu",
        "time": "Wed Jul 01 08:50:54 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jul 02 13:17:01 2009 -0700"
      },
      "message": "net/9p: Fix crash due to bad mount parameters.\n\nIt is not safe to use match_int without checking the token type returned\nby match_token (especially when the token type returned is Opt_err and\nargs is empty). Fix it.\n\nSigned-off-by: Abhishek Kulkarni \u003cadkulkar@umail.iu.edu\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f8a68e752bc4e39644843403168137663c984524",
      "tree": "3fb17f72a02319f92bd3ed4d73456bbc7e8ac633",
      "parents": [
        "59ed6eecff4aa00c5c5d18ffd180acac108d596e"
      ],
      "author": {
        "name": "Eric W. Biederman",
        "email": "ebiederm@xmission.com",
        "time": "Tue Jun 30 16:27:17 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jun 30 19:47:08 2009 -0700"
      },
      "message": "Revert \"ipv4: arp announce, arp_proxy and windows ip conflict verification\"\n\nThis reverts commit 73ce7b01b4496a5fbf9caf63033c874be692333f.\n\nAfter discovering that we don\u0027t listen to gratuitious arps in 2.6.30\nI tracked the failure down to this commit.\n\nThe patch makes absolutely no sense.  RFC2131 RFC3927 and RFC5227.\nare all in agreement that an arp request with sip \u003d\u003d 0 should be used\nfor the probe (to prevent learning) and an arp request with sip \u003d\u003d tip\nshould be used for the gratitous announcement that people can learn\nfrom.\n\nIt appears the author of the broken patch got those two cases confused\nand modified the code to drop all gratuitous arp traffic.  Ouch!\n\nCc: stable@kernel.org\nSigned-off-by: Eric W. Biederman \u003cebiederm@aristanetworks.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "008440e3ad4b72f5048d1b1f6f5ed894fdc5ad08",
      "tree": "bcf7771cd07562b258aaa032f85c29eaa00b9b6c",
      "parents": [
        "01e532981460594fffbf9b992ecfc96a78369924"
      ],
      "author": {
        "name": "Jarek Poplawski",
        "email": "jarkao2@gmail.com",
        "time": "Tue Jun 30 12:47:19 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jun 30 12:48:38 2009 -0700"
      },
      "message": "ipv4: Fix fib_trie rebalancing, part 3\n\nAlas current delaying of freeing old tnodes by RCU in trie_rebalance\nis still not enough because we can free a top tnode before updating a\nt-\u003etrie pointer.\n\nReported-by: Pawel Staszewski \u003cpstaszewski@itcare.pl\u003e\nTested-by: Pawel Staszewski \u003cpstaszewski@itcare.pl\u003e\nSigned-off-by: Jarek Poplawski \u003cjarkao2@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    }
  ],
  "next": "ff0ac74afb5b9916641723a78796d4ee7937c2ea"
}
