)]}'
{
  "log": [
    {
      "commit": "5a7d8af396195029b36431bdd6fea82bce52ec4a",
      "tree": "8fcd8cfed5eac12b43b56209340f00eecae6c7d7",
      "parents": [
        "58634ac42e736eea0e8b93cec610174879d36d58"
      ],
      "author": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Tue Jan 14 21:57:10 2014 -0800"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Tue Jan 14 21:57:10 2014 -0800"
      },
      "message": "Revert \"radio: iris: Bound check user space values\"\n\nThis reverts commit 040731d991e1a74af47853a62da4af348e943403.\n"
    },
    {
      "commit": "58634ac42e736eea0e8b93cec610174879d36d58",
      "tree": "4179bdb042aa497dd2fb3c7d0cddc88e244e5237",
      "parents": [
        "fda73056f62d84376a3d29926708b4a08155da31",
        "a995dd1c29426a074364170359a026f68e8426db"
      ],
      "author": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Tue Jan 14 21:51:43 2014 -0800"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Tue Jan 14 21:51:43 2014 -0800"
      },
      "message": "Merge remote-tracking branch \u0027codeaurora/kk_2.7_rb1.21\u0027 into cm-11.0\n\nConflicts:\n\tdrivers/media/video/msm/msm_vfe32.h\n\tdrivers/media/video/msm/vfe/msm_vfe32.c\n\tnet/wireless/reg.c\n\nChange-Id: I073c609cfa1c461249bf728b28249bcaa1eaa211\n"
    },
    {
      "commit": "fda73056f62d84376a3d29926708b4a08155da31",
      "tree": "0080c4eec02c23179f59a50d269f48f7662b61ce",
      "parents": [
        "cf8f2e58d0893f9785b8056b29d9bbcb4758765f",
        "94f578e6aba14bb2aeb00db2e7f6e5f704fee937"
      ],
      "author": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Tue Jan 14 21:50:44 2014 -0800"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Tue Jan 14 21:50:44 2014 -0800"
      },
      "message": "Merge tag \u0027v3.4.76\u0027 into cm-11.0\n\nThis is the 3.4.76 stable release\n\nConflicts:\n\tdrivers/gpio/gpio-msm-v2.c\n\nChange-Id: Ic80b29098bdf656b5e5c9b95d98d2ec64bba1f28\n"
    },
    {
      "commit": "be541ecb66d285c4135c3820113af22ff57d4a0c",
      "tree": "ddef6ed02dc046771156e87aa03e841c8ed63729",
      "parents": [
        "93fb68c0c53ce4660686cf276320e64fe68578a1"
      ],
      "author": {
        "name": "Alex Deucher",
        "email": "alexander.deucher@amd.com",
        "time": "Mon Dec 23 09:31:58 2013 -0500"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Wed Jan 08 09:42:11 2014 -0800"
      },
      "message": "drm/radeon: 0x9649 is SUMO2 not SUMO\n\ncommit d00adcc8ae9e22eca9d8af5f66c59ad9a74c90ec upstream.\n\nFixes rendering corruption due to incorrect\ngfx configuration.\n\nbug:\nhttps://bugs.freedesktop.org/show_bug.cgi?id\u003d63599\n\nSigned-off-by: Alex Deucher \u003calexander.deucher@amd.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "a0d58ba2cc064b61e2993398588f5a7f76702d1a",
      "tree": "49bddf2c51097962a426ff266b2c533906973bee",
      "parents": [
        "bd55444ae9c88e882a3c4eab35cd19fe2c7d6d96",
        "f0c7091c82594bc42bb5af99dae4f18e1dae6d46"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Mon Jan 06 03:12:45 2014 -0800"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Mon Jan 06 03:12:45 2014 -0800"
      },
      "message": "Merge \"cfg80211: export regulatory_hint_user() API\""
    },
    {
      "commit": "528e7a264e45c5bd5a704922cc37d784cbce4243",
      "tree": "bef00806be320bfadd0eeaaa19e671cb03eb7e12",
      "parents": [
        "f1df40d292326f7efe66dd4b4ddfba40d7e2489c",
        "040731d991e1a74af47853a62da4af348e943403"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Tue Dec 31 23:09:54 2013 -0800"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Tue Dec 31 23:09:54 2013 -0800"
      },
      "message": "Merge \"radio: iris: Bound check user space values\""
    },
    {
      "commit": "3737c2c6b90bcb99146f63c9254d758e7b036a98",
      "tree": "7223afec2e5536954da082dc4b65c2c88caff058",
      "parents": [
        "f52c635baa05f9a0b9ce551ded6d0870eb1e48b7",
        "0d26b1eeaf885d0c279477058e9d5a4d3115dd08"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Tue Dec 31 23:09:51 2013 -0800"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Tue Dec 31 23:09:50 2013 -0800"
      },
      "message": "Merge \"radio: iris: Maintain different FM states\""
    },
    {
      "commit": "ce32c7f44318d735a5538a31d8c76526259a2c30",
      "tree": "05397a21f9467804cd90553e3dec7a783872def2",
      "parents": [
        "07ef0d45bfbf820a0270738cca9237e71a9521d2",
        "0a78e978eb03a7f6d5bd6f5ad8a88429ecea55be"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Mon Dec 23 11:58:28 2013 -0800"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Mon Dec 23 11:58:28 2013 -0800"
      },
      "message": "Merge \"msm: ehci-hsic: Add support to disable internal clock gating\""
    },
    {
      "commit": "10cd199e3d54372fee67ffd4c53cc75e52f620b3",
      "tree": "19f41c8d0c6bb10a7d1c89b4f6723a6a8233f390",
      "parents": [
        "de0f9a5a9d7932086e623560d66655cc8507cfec",
        "09b3d7972025ff9e654b8cce3453b5d9f205cbf8"
      ],
      "author": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Sat Dec 21 14:54:19 2013 -0800"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Sat Dec 21 14:54:19 2013 -0800"
      },
      "message": "Merge remote-tracking branch \u0027codeaurora/kk_2.7_rb1.17\u0027 into cm-11.0\n\nConflicts:\n\tarch/arm/kernel/process.c\n\tarch/arm/mach-msm/hotplug.c\n\tarch/arm/mach-msm/pm-8x60.c\n\tarch/arm/mach-msm/timer.c\n\tarch/arm/mm/mmu.c\n\tdrivers/media/video/msm/server/msm_cam_server.c\n\tinclude/linux/kref.h\n\tmm/Kconfig\n\nChange-Id: I283b4728c42363a2d826512c0b1bec281c48e470\n"
    },
    {
      "commit": "de0f9a5a9d7932086e623560d66655cc8507cfec",
      "tree": "d9e4678d68da38d7670b79c8b5e8782445c5ad7e",
      "parents": [
        "e1a3c5a3706d580390c02c69cb14dcd679d31d91",
        "84dfcb758ba7cce52ef475ac96861a558e1a20ca"
      ],
      "author": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Sat Dec 21 14:22:41 2013 -0800"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Sat Dec 21 14:22:41 2013 -0800"
      },
      "message": "Merge tag \u0027v3.4.75\u0027 into cm-11.0\n\nThis is the 3.4.75 stable release\n\nConflicts:\n\tdrivers/md/dm-crypt.c\n\tdrivers/mmc/card/block.c\n\tdrivers/net/ethernet/smsc/smc91x.h\n\nChange-Id: I39f38ef5530c5fef07583beb9d76b983e71b9ff3\n"
    },
    {
      "commit": "50a715f272de5c786e76607a3cd21489388c5a03",
      "tree": "93e45e611c9bde29ef1b6caf7ff7b706782cbb6f",
      "parents": [
        "a6079a371fbd4e9cb4489b8a484b559427b97fe1"
      ],
      "author": {
        "name": "Stefano Panella",
        "email": "stefano.panella@citrix.com",
        "time": "Tue Dec 10 14:20:28 2013 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Fri Dec 20 07:34:19 2013 -0800"
      },
      "message": "ALSA: memalloc.h - fix wrong truncation of dma_addr_t\n\ncommit 932e9dec380c67ec15ac3eb073bb55797d8b4801 upstream.\n\nWhen running a 32bit kernel the hda_intel driver is still reporting\na 64bit dma_mask if the HW supports it.\n\nFrom sound/pci/hda/hda_intel.c:\n\n        /* allow 64bit DMA address if supported by H/W */\n        if ((gcap \u0026 ICH6_GCAP_64OK) \u0026\u0026 !pci_set_dma_mask(pci, DMA_BIT_MASK(64)))\n                pci_set_consistent_dma_mask(pci, DMA_BIT_MASK(64));\n        else {\n                pci_set_dma_mask(pci, DMA_BIT_MASK(32));\n                pci_set_consistent_dma_mask(pci, DMA_BIT_MASK(32));\n        }\n\nwhich means when there is a call to dma_alloc_coherent from\nsnd_malloc_dev_pages a machine address bigger than 32bit can be returned.\nThis can be true in particular if running  the 32bit kernel as a pv dom0\nunder the Xen Hypervisor or PAE on bare metal.\n\nThe problem is that when calling setup_bdle to program the BLE the\ndma_addr_t returned from the dma_alloc_coherent is wrongly truncated\nfrom snd_sgbuf_get_addr if running a 32bit kernel:\n\nstatic inline dma_addr_t snd_sgbuf_get_addr(struct snd_dma_buffer *dmab,\n                                           size_t offset)\n{\n        struct snd_sg_buf *sgbuf \u003d dmab-\u003eprivate_data;\n        dma_addr_t addr \u003d sgbuf-\u003etable[offset \u003e\u003e PAGE_SHIFT].addr;\n        addr \u0026\u003d PAGE_MASK;\n        return addr + offset % PAGE_SIZE;\n}\n\nwhere PAGE_MASK in a 32bit kernel is zeroing the upper 32bit af addr.\n\nWithout this patch the HW will fetch the 32bit truncated address,\nwhich is not the one obtained from dma_alloc_coherent and will result\nto a non working audio but can corrupt host memory at a random location.\n\nThe current patch apply to v3.13-rc3-74-g6c843f5\n\nSigned-off-by: Stefano Panella \u003cstefano.panella@citrix.com\u003e\nReviewed-by: Frediano Ziglio \u003cfrediano.ziglio@citrix.com\u003e\nSigned-off-by: Takashi Iwai \u003ctiwai@suse.de\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "040731d991e1a74af47853a62da4af348e943403",
      "tree": "5f5b849395868c32d40e0d4aa12b3ef5a4ca8727",
      "parents": [
        "494d49ed3e55c2b96206c48c5b4200a2ecf0f287"
      ],
      "author": {
        "name": "Ayaz Ahmad",
        "email": "aahmad@codeaurora.org",
        "time": "Fri Dec 20 15:28:56 2013 +0530"
      },
      "committer": {
        "name": "Ayaz Ahmad",
        "email": "aahmad@codeaurora.org",
        "time": "Fri Dec 20 15:28:56 2013 +0530"
      },
      "message": "radio: iris: Bound check user space values\n\nThere is no bound check for arguments passed\nfrom user space to kernel space. This may cause\nfatal exceptions.\n\nChange-Id: I9fe9376cc953bb57cf15f3a28d4ba2dbd940f4a1\nCRs-Fixed: 546081\nSigned-off-by: Ayaz Ahmad \u003caahmad@codeaurora.org\u003e\n"
    },
    {
      "commit": "0d26b1eeaf885d0c279477058e9d5a4d3115dd08",
      "tree": "bc9a97d9872774bf772e849505291f0d6b7e2b52",
      "parents": [
        "2fa0cff99d0e6ec0946a9e616860fc86a9258e68"
      ],
      "author": {
        "name": "Ayaz Ahmad",
        "email": "aahmad@codeaurora.org",
        "time": "Tue Jun 04 15:19:56 2013 +0530"
      },
      "committer": {
        "name": "Ayaz Ahmad",
        "email": "aahmad@codeaurora.org",
        "time": "Fri Dec 20 14:34:29 2013 +0530"
      },
      "message": "radio: iris: Maintain different FM states\n\nUnexpected disabled event gets queued when FM is turned\non after turning off FM, sending SSR command. Therefore\nFM fails to turn on.Maintain different states FM OFF,\nFM RECV TURNING ON, FM TRANS TURNING ON, FM_OFF,\nFM CALIBRATION and only queue unexpected disabled event\nwhen either Receiver or Transmitter is enabled.\n\nCRs-Fixed: 518378\n\nChange-Id: Iffa55bef3dc5ce605cf270ad41f4c9a8b8d70392\nSigned-off-by: Ayaz Ahmad \u003caahmad@codeaurora.org\u003e\n"
    },
    {
      "commit": "627dc185e00f7e94e1ec243f04d204675175cd73",
      "tree": "5f161a65753f16caf7bcb0dc5a0e282e3b9e0940",
      "parents": [
        "b5043328b852715b21ab0e41a1edddfc7345f051"
      ],
      "author": {
        "name": "Hamad Kadmany",
        "email": "hkadmany@codeaurora.org",
        "time": "Tue Dec 17 21:34:36 2013 +0200"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Tue Dec 17 23:26:46 2013 -0800"
      },
      "message": "csdio: Remove the driver\n\nThe driver is a legacy driver that is not used any longer\nand its implementation is neither correct nor compiles.\n\nChange-Id: I9862c0f93ccad6079a616f6997987d4e187a137c\nSigned-off-by: Hamad Kadmany \u003chkadmany@codeaurora.org\u003e\n"
    },
    {
      "commit": "f0c7091c82594bc42bb5af99dae4f18e1dae6d46",
      "tree": "6e20dde649190f77969c15aedf8eb4bc4e40cae2",
      "parents": [
        "09b3d7972025ff9e654b8cce3453b5d9f205cbf8"
      ],
      "author": {
        "name": "Mihir Shete",
        "email": "smihir@codeaurora.org",
        "time": "Mon Oct 14 00:54:40 2013 +0530"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Fri Dec 13 03:57:02 2013 -0800"
      },
      "message": "cfg80211: export regulatory_hint_user() API\n\nThis is to help the hardware configured in world\nroaming mode to save power when not connected to\nany AP.\n\nCRs-Fixed: 542802\nChange-Id: Ia643d0e9848dcd486832973bd6dd186edd7bd4ea\nSigned-off-by: Mihir Shete \u003csmihir@codeaurora.org\u003e\n"
    },
    {
      "commit": "4062191e84141d4549a38a25de09f886e2e344d8",
      "tree": "ab7cd954e5545aa4585e454c253077248b4cdb77",
      "parents": [
        "3fc9589a42dab00a4c2dd9922dde4d15497bc3f0"
      ],
      "author": {
        "name": "Tom Lendacky",
        "email": "thomas.lendacky@amd.com",
        "time": "Thu Dec 05 13:09:53 2013 -0600"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Wed Dec 11 22:34:12 2013 -0800"
      },
      "message": "crypto: scatterwalk - Use sg_chain_ptr on chain entries\n\ncommit 389a5390583a18e45bc4abd4439291abec5e7a63 upstream.\n\nNow that scatterwalk_sg_chain sets the chain pointer bit the sg_page\ncall in scatterwalk_sg_next hits a BUG_ON when CONFIG_DEBUG_SG is\nenabled. Use sg_chain_ptr instead of sg_page on a chain entry.\n\nSigned-off-by: Tom Lendacky \u003cthomas.lendacky@amd.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "941f77dc3c2b264051fba4726461fec919822041",
      "tree": "1b0a0f5e794dc8d0bec5f600124bba18c3593976",
      "parents": [
        "50b673d2fefba609f4a84e889277c5e12ce6a93d"
      ],
      "author": {
        "name": "Tom Lendacky",
        "email": "thomas.lendacky@amd.com",
        "time": "Tue Nov 12 11:46:10 2013 -0600"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Wed Dec 11 22:34:10 2013 -0800"
      },
      "message": "crypto: scatterwalk - Set the chain pointer indication bit\n\ncommit 41da8b5adba77e22584f8b45f9641504fa885308 upstream.\n\nThe scatterwalk_crypto_chain function invokes the scatterwalk_sg_chain\nfunction to chain two scatterlists, but the chain pointer indication\nbit is not set.  When the resulting scatterlist is used, for example,\nby sg_nents to count the number of scatterlist entries, a segfault occurs\nbecause sg_nents does not follow the chain pointer to the chained scatterlist.\n\nUpdate scatterwalk_sg_chain to set the chain pointer indication bit as is\ndone by the sg_chain function.\n\nSigned-off-by: Tom Lendacky \u003cthomas.lendacky@amd.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "b9f660921e5d5f5071256623efc7c015970a7171",
      "tree": "ca71b87adc5f66c8a60d7a3dc2dd82f44ac74a90",
      "parents": [
        "83fd9a808c01fdf98c090c55127493aae5d81fe5"
      ],
      "author": {
        "name": "Matt Mower",
        "email": "mowerm@gmail.com",
        "time": "Wed Dec 11 23:03:55 2013 -0600"
      },
      "committer": {
        "name": "Matt Mower",
        "email": "mowerm@gmail.com",
        "time": "Wed Dec 11 23:37:05 2013 -0600"
      },
      "message": "usb: gadget: add support for multiple LUNs\n\nChange-Id: I9790007b65a749af2169f3858ffd32a1d616490f\n"
    },
    {
      "commit": "2a38ada0f1ab9f894eea4428731ebc811b51c3f3",
      "tree": "759c765808a23a3a35e4ba10d8306c847c0205b7",
      "parents": [
        "19218e895cefdd389c96af12c93c89e7276bbaad",
        "44d19f5a04ae4e433548ba2f25e4d2ccfcac765e"
      ],
      "author": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Sun Dec 08 12:50:38 2013 -0800"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Sun Dec 08 12:50:38 2013 -0800"
      },
      "message": "Merge tag \u0027v3.4.72\u0027 into tmp\n\nThis is the 3.4.72 stable release\n\nConflicts:\n\tarch/arm/Kconfig\n\tarch/arm/include/asm/mutex.h\n\tarch/arm/kernel/perf_event.c\n\tarch/arm/kernel/traps.c\n\tarch/arm/mm/dma-mapping.c\n\tdrivers/base/power/main.c\n\tdrivers/bluetooth/ath3k.c\n\tdrivers/bluetooth/btusb.c\n\tdrivers/gpu/drm/radeon/radeon_mode.h\n\tdrivers/mmc/card/block.c\n\tdrivers/mmc/host/sdhci.c\n\tdrivers/usb/core/message.c\n\tdrivers/usb/host/xhci-plat.c\n\tdrivers/usb/host/xhci.h\n\tdrivers/virtio/virtio_ring.c\n\tfs/ubifs/dir.c\n\tinclude/linux/freezer.h\n\tinclude/linux/virtio.h\n\tinclude/media/v4l2-ctrls.h\n\tinclude/net/bluetooth/hci_core.h\n\tinclude/net/bluetooth/mgmt.h\n\tkernel/cgroup.c\n\tkernel/futex.c\n\tkernel/signal.c\n\tnet/bluetooth/hci_conn.c\n\tnet/bluetooth/hci_core.c\n\tnet/bluetooth/hci_event.c\n\tnet/bluetooth/l2cap_core.c\n\tnet/bluetooth/mgmt.c\n\tnet/bluetooth/rfcomm/sock.c\n\tnet/bluetooth/smp.c\n\nChange-Id: I4fb0d5de74ca76f933d95d98e1a9c2c859402f34\n"
    },
    {
      "commit": "d8b8a43e0f3c99bb29f258ef508969793f8e43bd",
      "tree": "275f0d0bfedf91eed51f22c7be6bed227cbf5b77",
      "parents": [
        "9e23d8bd64e49062faf4aa4abcedd3943cf1d09d"
      ],
      "author": {
        "name": "Mikulas Patocka",
        "email": "mpatocka@redhat.com",
        "time": "Fri Mar 01 22:45:44 2013 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Dec 08 07:29:43 2013 -0800"
      },
      "message": "dm: fix truncated status strings\n\ncommit fd7c092e711ebab55b2688d3859d95dfd0301f73 upstream.\n\nAvoid returning a truncated table or status string instead of setting\nthe DM_BUFFER_FULL_FLAG when the last target of a table fills the\nbuffer.\n\nWhen processing a table or status request, the function retrieve_status\ncalls ti-\u003etype-\u003estatus. If ti-\u003etype-\u003estatus returns non-zero,\nretrieve_status assumes that the buffer overflowed and sets\nDM_BUFFER_FULL_FLAG.\n\nHowever, targets don\u0027t return non-zero values from their status method\non overflow. Most targets returns always zero.\n\nIf a buffer overflow happens in a target that is not the last in the\ntable, it gets noticed during the next iteration of the loop in\nretrieve_status; but if a buffer overflow happens in the last target, it\ngoes unnoticed and erroneously truncated data is returned.\n\nIn the current code, the targets behave in the following way:\n* dm-crypt returns -ENOMEM if there is not enough space to store the\n  key, but it returns 0 on all other overflows.\n* dm-thin returns errors from the status method if a disk error happened.\n  This is incorrect because retrieve_status doesn\u0027t check the error\n  code, it assumes that all non-zero values mean buffer overflow.\n* all the other targets always return 0.\n\nThis patch changes the ti-\u003etype-\u003estatus function to return void (because\nmost targets don\u0027t use the return code). Overflow is detected in\nretrieve_status: if the status method fills up the remaining space\ncompletely, it is assumed that buffer overflow happened.\n\nSigned-off-by: Mikulas Patocka \u003cmpatocka@redhat.com\u003e\nSigned-off-by: Alasdair G Kergon \u003cagk@redhat.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "ad25b5df02bacf27efb56fe12bb8da8dd9273546",
      "tree": "46b4c357415225acf77d155d659a729c307fdee0",
      "parents": [
        "ea9d7dc958579b07bf5cc419c4db932689a1224d"
      ],
      "author": {
        "name": "Hannes Frederic Sowa",
        "email": "hannes@stressinduktion.org",
        "time": "Sat Nov 23 00:46:12 2013 +0100"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Dec 08 07:29:42 2013 -0800"
      },
      "message": "inet: fix addr_len/msg-\u003emsg_namelen assignment in recv_error and rxpmtu functions\n\n[ Upstream commit 85fbaa75037d0b6b786ff18658ddf0b4014ce2a4 ]\n\nCommit bceaa90240b6019ed73b49965eac7d167610be69 (\"inet: prevent leakage\nof uninitialized memory to user in recv syscalls\") conditionally updated\naddr_len if the msg_name is written to. The recv_error and rxpmtu\nfunctions relied on the recvmsg functions to set up addr_len before.\n\nAs this does not happen any more we have to pass addr_len to those\nfunctions as well and set it to the size of the corresponding sockaddr\nlength.\n\nThis broke traceroute and such.\n\nFixes: bceaa90240b6 (\"inet: prevent leakage of uninitialized memory to user in recv syscalls\")\nReported-by: Brad Spengler \u003cspender@grsecurity.net\u003e\nReported-by: Tom Labanowski\nCc: mpb \u003cmpb.mail@gmail.com\u003e\nCc: David S. Miller \u003cdavem@davemloft.net\u003e\nCc: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: Hannes Frederic Sowa \u003channes@stressinduktion.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "18719a4c7a90af3de4bb071511dd4a6dcf61a2e0",
      "tree": "8a2a831db542446ee13ec1d9ec8d484ecbb72843",
      "parents": [
        "11afb94fbe0337a06ee7fce36841969b4e538622"
      ],
      "author": {
        "name": "Hannes Frederic Sowa",
        "email": "hannes@stressinduktion.org",
        "time": "Thu Nov 21 03:14:22 2013 +0100"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Dec 08 07:29:41 2013 -0800"
      },
      "message": "net: rework recvmsg handler msg_name and msg_namelen logic\n\n[ Upstream commit f3d3342602f8bcbf37d7c46641cb9bca7618eb1c ]\n\nThis patch now always passes msg-\u003emsg_namelen as 0. recvmsg handlers must\nset msg_namelen to the proper size \u003c\u003d sizeof(struct sockaddr_storage)\nto return msg_name to the user.\n\nThis prevents numerous uninitialized memory leaks we had in the\nrecvmsg handlers and makes it harder for new code to accidentally leak\nuninitialized memory.\n\nOptimize for the case recvfrom is called with NULL as address. We don\u0027t\nneed to copy the address at all, so set it to NULL before invoking the\nrecvmsg handler. We can do so, because all the recvmsg handlers must\ncope with the case a plain read() is called on them. read() also sets\nmsg_name to NULL.\n\nAlso document these changes in include/linux/net.h as suggested by David\nMiller.\n\nChanges since RFC:\n\nSet msg-\u003emsg_name \u003d NULL if user specified a NULL in msg_name but had a\nnon-null msg_namelen in verify_iovec/verify_compat_iovec. This doesn\u0027t\naffect sendto as it would bail out earlier while trying to copy-in the\naddress. It also more naturally reflects the logic by the callers of\nverify_iovec.\n\nWith this change in place I could remove \"\nif (!uaddr || msg_sys-\u003emsg_namelen \u003d\u003d 0)\n\tmsg-\u003emsg_name \u003d NULL\n\".\n\nThis change does not alter the user visible error logic as we ignore\nmsg_namelen as long as msg_name is NULL.\n\nAlso remove two unnecessary curly brackets in ___sys_recvmsg and change\ncomments to netdev style.\n\nCc: David Miller \u003cdavem@davemloft.net\u003e\nSuggested-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: Hannes Frederic Sowa \u003channes@stressinduktion.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "4dd7a52b53ab79e8990bb295a2907d47345d2fa2",
      "tree": "68e671edcbc17a2b0a5df560bd05c1f28b81c1e2",
      "parents": [
        "4bb2cc8ea8b76426dcb60b95d27d599cb426bcf9"
      ],
      "author": {
        "name": "Daniel Borkmann",
        "email": "dborkman@redhat.com",
        "time": "Mon Nov 11 12:20:32 2013 +0100"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Dec 08 07:29:41 2013 -0800"
      },
      "message": "random32: fix off-by-one in seeding requirement\n\n[ Upstream commit 51c37a70aaa3f95773af560e6db3073520513912 ]\n\nFor properly initialising the Tausworthe generator [1], we have\na strict seeding requirement, that is, s1 \u003e 1, s2 \u003e 7, s3 \u003e 15.\n\nCommit 697f8d0348 (\"random32: seeding improvement\") introduced\na __seed() function that imposes boundary checks proposed by the\nerrata paper [2] to properly ensure above conditions.\n\nHowever, we\u0027re off by one, as the function is implemented as:\n\"return (x \u003c m) ? x + m : x;\", and called with __seed(X, 1),\n__seed(X, 7), __seed(X, 15). Thus, an unwanted seed of 1, 7, 15\nwould be possible, whereas the lower boundary should actually\nbe of at least 2, 8, 16, just as GSL does. Fix this, as otherwise\nan initialization with an unwanted seed could have the effect\nthat Tausworthe\u0027s PRNG properties cannot not be ensured.\n\nNote that this PRNG is *not* used for cryptography in the kernel.\n\n [1] http://www.iro.umontreal.ca/~lecuyer/myftp/papers/tausme.ps\n [2] http://www.iro.umontreal.ca/~lecuyer/myftp/papers/tausme2.ps\n\nJoint work with Hannes Frederic Sowa.\n\nFixes: 697f8d0348a6 (\"random32: seeding improvement\")\nCc: Stephen Hemminger \u003cstephen@networkplumber.org\u003e\nCc: Florian Weimer \u003cfweimer@redhat.com\u003e\nCc: Theodore Ts\u0027o \u003ctytso@mit.edu\u003e\nSigned-off-by: Daniel Borkmann \u003cdborkman@redhat.com\u003e\nSigned-off-by: Hannes Frederic Sowa \u003channes@stressinduktion.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "8bfabdd83683743dea60ad3beaad869fbb777baf",
      "tree": "bff0eba04c76d3637762ad1505c347e8c917e16f",
      "parents": [
        "a2c24e623fd6f54c9e825fb29eec0194b2c74ba0",
        "991de6bc312c55bef9edb406452097b3e5975b61"
      ],
      "author": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Fri Dec 06 22:18:19 2013 -0800"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Fri Dec 06 22:18:19 2013 -0800"
      },
      "message": "Merge remote-tracking branch \u0027codeaurora/kk_2.7.1\u0027 into cm-11.0\n"
    },
    {
      "commit": "c5b6ec8601fd8fcb4cedcb36b970b5502e9cf335",
      "tree": "142d319e48d5e5cd0bc50a4817e91d70cd393ca7",
      "parents": [
        "19bc0a836d4f79140dcebdf5b3f585f5dec51761",
        "6dc2101835053bc59dcf8f39745dc5ebabcae855"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Fri Dec 06 07:01:42 2013 -0800"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Fri Dec 06 07:01:41 2013 -0800"
      },
      "message": "Merge \"kref: Implement kref_get_unless_zero v3\""
    },
    {
      "commit": "0a78e978eb03a7f6d5bd6f5ad8a88429ecea55be",
      "tree": "0c471a78da92dd36106af69ca44320254748e188",
      "parents": [
        "c3598ea743d229de6ed1fdd153843aadd66d047c"
      ],
      "author": {
        "name": "ChandanaKishori Chiluveru",
        "email": "cchilu@codeaurora.org",
        "time": "Fri Dec 06 12:35:46 2013 +0530"
      },
      "committer": {
        "name": "ChandanaKishori Chiluveru",
        "email": "cchilu@codeaurora.org",
        "time": "Fri Dec 06 13:14:12 2013 +0530"
      },
      "message": "msm: ehci-hsic: Add support to disable internal clock gating\n\nEHCI cores on latest MSMs have internal clock gating enabled\nby default. Stability issues (random enumeration failures)\nhave been observed with some CORES where clock gating feature\ndoesn\u0027t work as expected. Hence add support to disable clock\ngating in hardware.\n\nChange-Id: I5209a68409ad04cba53c14c0e813aa0b925cf98e\nCRs-Fixed: 538509\nSigned-off-by: ChandanaKishori Chiluveru \u003ccchilu@codeaurora.org\u003e\n"
    },
    {
      "commit": "6dc2101835053bc59dcf8f39745dc5ebabcae855",
      "tree": "311c4efc6c92143ab90969538dc3f088d005ab42",
      "parents": [
        "8725bf6329b3d5a617603c3badb844443b96edcb"
      ],
      "author": {
        "name": "Thomas Hellstrom",
        "email": "thellstrom@vmware.com",
        "time": "Tue Aug 06 16:42:15 2013 -0600"
      },
      "committer": {
        "name": "Anshuman Dani",
        "email": "adani@codeaurora.org",
        "time": "Thu Dec 05 16:09:37 2013 +0530"
      },
      "message": "kref: Implement kref_get_unless_zero v3\n\nThis function is intended to simplify locking around refcounting for\nobjects that can be looked up from a lookup structure, and which are\nremoved from that lookup structure in the object destructor.\nOperations on such objects require at least a read lock around\nlookup + kref_get, and a write lock around kref_put + remove from lookup\nstructure. Furthermore, RCU implementations become extremely tricky.\nWith a lookup followed by a kref_get_unless_zero *with return value check*\nlocking in the kref_put path can be deferred to the actual removal from\nthe lookup structure and RCU lookups become trivial.\n\nv2: Formatting fixes.\nv3: Invert the return value.\n\nChange-Id: I391623ee7458428eab6d7f361630f8646d6790b0\nSigned-off-by: Thomas Hellstrom \u003cthellstrom@vmware.com\u003e\nSigned-off-by: Dave Airlie \u003cairlied@redhat.com\u003e\nGit-commit: 4b20db3de8dab005b07c74161cb041db8c5ff3a7\nGit-repo: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git\n[shrenujb@codeaurora.org: resolve trivial merge conflicts]\nSigned-off-by: Shrenuj Bansal \u003cshrenujb@codeaurora.org\u003e\n"
    },
    {
      "commit": "488c5aaf729db586edbaf49a1767e68df2f77f8c",
      "tree": "b6baada79f7dc29b0a7653b33ef3a67f946b697b",
      "parents": [
        "20f10fe18d73d8786b3091dce217806d62435ce9",
        "8bbba2ab868fa65e24bfb41d026267d56392af23"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Thu Dec 05 01:48:45 2013 -0800"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Thu Dec 05 01:48:44 2013 -0800"
      },
      "message": "Merge \"ASoC: msm: qdsp6v2: Propagate device HW delay to AFE.\""
    },
    {
      "commit": "4d815b62becdae153d9541b49ba323cd58459a97",
      "tree": "8c24b8043089de504e8c6d6af9c0f6271d112920",
      "parents": [
        "1d78aecdc9eb045e8c6b90050911324d3d0fc51f"
      ],
      "author": {
        "name": "Steven Rostedt (Red Hat)",
        "email": "rostedt@goodmis.org",
        "time": "Tue Nov 26 09:22:54 2013 -0500"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Wed Dec 04 10:50:34 2013 -0800"
      },
      "message": "tracing: Allow events to have NULL strings\n\ncommit 4e58e54754dc1fec21c3a9e824bc108b05fdf46e upstream.\n\nIf an TRACE_EVENT() uses __assign_str() or __get_str on a NULL pointer\nthen the following oops will happen:\n\nBUG: unable to handle kernel NULL pointer dereference at   (null)\nIP: [\u003cc127a17b\u003e] strlen+0x10/0x1a\n*pde \u003d 00000000 ^M\nOops: 0000 [#1] PREEMPT SMP\nModules linked in:\nCPU: 1 PID: 0 Comm: swapper/1 Not tainted 3.13.0-rc1-test+ #2\nHardware name:                  /DG965MQ, BIOS MQ96510J.86A.0372.2006.0605.1717 06/05/2006^M\ntask: f5cde9f0 ti: f5e5e000 task.ti: f5e5e000\nEIP: 0060:[\u003cc127a17b\u003e] EFLAGS: 00210046 CPU: 1\nEIP is at strlen+0x10/0x1a\nEAX: 00000000 EBX: c2472da8 ECX: ffffffff EDX: c2472da8\nESI: c1c5e5fc EDI: 00000000 EBP: f5e5fe84 ESP: f5e5fe80\n DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068\nCR0: 8005003b CR2: 00000000 CR3: 01f32000 CR4: 000007d0\nStack:\n f5f18b90 f5e5feb8 c10687a8 0759004f 00000005 00000005 00000005 00200046\n 00000002 00000000 c1082a93 f56c7e28 c2472da8 c1082a93 f5e5fee4 c106bc61^M\n 00000000 c1082a93 00000000 00000000 00000001 00200046 00200082 00000000\nCall Trace:\n [\u003cc10687a8\u003e] ftrace_raw_event_lock+0x39/0xc0\n [\u003cc1082a93\u003e] ? ktime_get+0x29/0x69\n [\u003cc1082a93\u003e] ? ktime_get+0x29/0x69\n [\u003cc106bc61\u003e] lock_release+0x57/0x1a5\n [\u003cc1082a93\u003e] ? ktime_get+0x29/0x69\n [\u003cc10824dd\u003e] read_seqcount_begin.constprop.7+0x4d/0x75\n [\u003cc1082a93\u003e] ? ktime_get+0x29/0x69^M\n [\u003cc1082a93\u003e] ktime_get+0x29/0x69\n [\u003cc108a46a\u003e] __tick_nohz_idle_enter+0x1e/0x426\n [\u003cc10690e8\u003e] ? lock_release_holdtime.part.19+0x48/0x4d\n [\u003cc10bc184\u003e] ? time_hardirqs_off+0xe/0x28\n [\u003cc1068c82\u003e] ? trace_hardirqs_off_caller+0x3f/0xaf\n [\u003cc108a8cb\u003e] tick_nohz_idle_enter+0x59/0x62\n [\u003cc1079242\u003e] cpu_startup_entry+0x64/0x192\n [\u003cc102299c\u003e] start_secondary+0x277/0x27c\nCode: 90 89 c6 89 d0 88 c4 ac 38 e0 74 09 84 c0 75 f7 be 01 00 00 00 89 f0 48 5e 5d c3 55 89 e5 57 66 66 66 66 90 83 c9 ff 89 c7 31 c0 \u003cf2\u003e ae f7 d1 8d 41 ff 5f 5d c3 55 89 e5 57 66 66 66 66 90 31 ff\nEIP: [\u003cc127a17b\u003e] strlen+0x10/0x1a SS:ESP 0068:f5e5fe80\nCR2: 0000000000000000\n---[ end trace 01bc47bf519ec1b2 ]---\n\nNew tracepoints have been added that have allowed for NULL pointers\nbeing assigned to strings. To fix this, change the TRACE_EVENT() code\nto check for NULL and if it is, it will assign \"(null)\" to it instead\n(similar to what glibc printf does).\n\nReported-by: Shuah Khan \u003cshuah.kh@samsung.com\u003e\nReported-by: Jovi Zhangwei \u003cjovi.zhangwei@gmail.com\u003e\nLink: http://lkml.kernel.org/r/CAGdX0WFeEuy+DtpsJzyzn0343qEEjLX97+o1VREFkUEhndC+5Q@mail.gmail.com\nLink: http://lkml.kernel.org/r/528D6972.9010702@samsung.com\nFixes: 9cbf117662e2 (\"tracing/events: provide string with undefined size support\")\nSigned-off-by: Steven Rostedt \u003crostedt@goodmis.org\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "09f665049d7ecde55c5fbe4bb419b992288c4608",
      "tree": "a2dcc09fe7f79b93406573082baa79fa8d797744",
      "parents": [
        "b22831e6611bec1fdf84e71d80f7917199212ee8"
      ],
      "author": {
        "name": "Wang Haitao",
        "email": "wang.haitao1@zte.com.cn",
        "time": "Thu Aug 22 19:32:38 2013 +0800"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Wed Dec 04 10:50:29 2013 -0800"
      },
      "message": "mtd: map: fixed bug in 64-bit systems\n\ncommit a4d62babf988fe5dfde24437fa135ef147bc7aa0 upstream.\n\nHardware:\n\tCPU: XLP832,the 64-bit OS\n\tNOR Flash:S29GL128S 128M\nSoftware:\n\tKernel:2.6.32.41\n\tFilesystem:JFFS2\nWhen writing files, errors appear:\n\tWrite len 182  but return retlen 180\n\tWrite of 182 bytes at 0x072c815c failed. returned -5, retlen 180\n\tWrite len 186  but return retlen 184\n\tWrite of 186 bytes at 0x072caff4 failed. returned -5, retlen 184\nThese errors exist only in 64-bit systems,not in 32-bit systems. After analysis, we\nfound that the left shift operation is wrong in map_word_load_partial. For instance:\n\tunsigned char buf[3] \u003d{0x9e,0x3a,0xea};\n\tmap_bankwidth(map) is 4;\n\tfor (i\u003d0; i \u003c 3; i++) {\n\t\tint bitpos;\n\t\tbitpos \u003d (map_bankwidth(map)-1-i)*8;\n\t\torig.x[0] \u0026\u003d ~(0xff \u003c\u003c bitpos);\n\t\torig.x[0] |\u003d buf[i] \u003c\u003c bitpos;\n\t}\n\nThe value of orig.x[0] is expected to be 0x9e3aeaff, but in this situation(64-bit\nSystem) we\u0027ll get the wrong value of 0xffffffff9e3aeaff due to the 64-bit sign\nextension:\nbuf[i] is defined as \"unsigned char\" and the left-shift operation will convert it\nto the type of \"signed int\", so when left-shift buf[i] by 24 bits, the final result\nwill get the wrong value: 0xffffffff9e3aeaff.\n\nIf the left-shift bits are less than 24, then sign extension will not occur. Whereas\nthe bankwidth of the nor flash we used is 4, therefore this BUG emerges.\n\nSigned-off-by: Pang Xunlei \u003cpang.xunlei@zte.com.cn\u003e\nSigned-off-by: Zhang Yi \u003czhang.yi20@zte.com.cn\u003e\nSigned-off-by: Lu Zhongjun \u003clu.zhongjun@zte.com.cn\u003e\nSigned-off-by: Brian Norris \u003ccomputersforpeace@gmail.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "8f77c2895be7f4cb22c918c1aab1270fd8885ecd",
      "tree": "c0598ef38714b949d4ffa81ce5bad361c922d64e",
      "parents": [
        "a4710c60a66743df6277ce37ae2f9ed19fcdec09"
      ],
      "author": {
        "name": "Steve Muckle",
        "email": "smuckle@codeaurora.org",
        "time": "Mon Mar 11 16:33:42 2013 -0700"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Tue Dec 03 22:08:22 2013 -0800"
      },
      "message": "sched: provide per cpu-cgroup option to notify on migrations\n\nOn systems where CPUs may run asynchronously, task migrations\nbetween CPUs running at grossly different speeds can cause\nproblems.\n\nThis change provides a mechanism to notify a subsystem\nin the kernel if a task in a particular cgroup migrates to a\ndifferent CPU. Other subsystems (such as cpufreq) may then\nregister for this notifier to take appropriate action when\nsuch a task is migrated.\n\nThe cgroup attribute to set for this behavior is\n\"notify_on_migrate\" .\n\nChange-Id: Ie1868249e53ef901b89c837fdc33b0ad0c0a4590\nSigned-off-by: Steve Muckle \u003csmuckle@codeaurora.org\u003e\n"
    },
    {
      "commit": "ec574f8bb7b68e9b2128228f33964a9ce32d1f4f",
      "tree": "9fb316634b00eb45922401703e6fa73174e94f7a",
      "parents": [
        "86eb0dddb559286c69f6c3fefbfdbbc508e81ef1"
      ],
      "author": {
        "name": "Greg Reid",
        "email": "greid@codeaurora.org",
        "time": "Fri Oct 12 12:07:37 2012 -0400"
      },
      "committer": {
        "name": "Joonwoo Park",
        "email": "joonwoop@codeaurora.org",
        "time": "Tue Dec 03 14:38:54 2013 -0800"
      },
      "message": "kernel: Add hooks for user-accessible timers in the kernel.\n\nHooks for user-accessible timers allow implementation of a\nmore efficient gettimeofday in user-space.\n\nChange-Id: If2f63d010c1cf142eb84f3745617e756913e46f7\nSigned-off-by: Brent DeGraaf \u003cbdegraaf@codeaurora.org\u003e\nSigned-off-by: Joonwoo Park \u003cjoonwoop@codeaurora.org\u003e\n"
    },
    {
      "commit": "2bb6292ecd5c207554c272dcdc26112adccc560b",
      "tree": "967a868ebacf0446d4c98422461646b84111d7b6",
      "parents": [
        "c39dc51f6a2dcbcc8b7ddfc5c5a87f52a6a2e283",
        "b9cabe412e9b0c56b7e7705461c1f715d1a5e8d0"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Tue Dec 03 07:09:05 2013 -0800"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Tue Dec 03 07:09:05 2013 -0800"
      },
      "message": "Merge \"net: rmnet_usb: Add support for aligned QOS header\""
    },
    {
      "commit": "c39dc51f6a2dcbcc8b7ddfc5c5a87f52a6a2e283",
      "tree": "0d55f1ecf1270e25772b681a7033729a9b174919",
      "parents": [
        "762e178c011be473787afa7f98541ea4986e18d3",
        "36abcfd971000b6e589ff65c3456d45b98757f89"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Tue Dec 03 07:09:02 2013 -0800"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Tue Dec 03 07:09:01 2013 -0800"
      },
      "message": "Merge \"mm: vmscan: fix do_try_to_free_pages() livelock\""
    },
    {
      "commit": "762e178c011be473787afa7f98541ea4986e18d3",
      "tree": "674db8d9514a0a70dfed1b981f46f1b12ef32810",
      "parents": [
        "f7d3c2789925ee190dce864d6ea1f7354db01423",
        "d1c2fbe849e5669959be5a1db1b6d65ca43a19e7"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Tue Dec 03 07:09:01 2013 -0800"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Tue Dec 03 07:09:00 2013 -0800"
      },
      "message": "Merge \"swap: add per-partition lock for swapfile\""
    },
    {
      "commit": "8bbba2ab868fa65e24bfb41d026267d56392af23",
      "tree": "bd6dcce153f1c5d638736794a7e0cd8991bc9637",
      "parents": [
        "26fd5cf5e80ea40dc030e50d71123b06b6f2da5c"
      ],
      "author": {
        "name": "Pavan Chikkala",
        "email": "pavanc@codeaurora.org",
        "time": "Mon Dec 02 22:55:37 2013 -0800"
      },
      "committer": {
        "name": "Pavan Chikkala",
        "email": "pavanc@codeaurora.org",
        "time": "Tue Dec 03 12:27:33 2013 +0530"
      },
      "message": "ASoC: msm: qdsp6v2: Propagate device HW delay to AFE.\n\n - HW delay for each supported device is maintained in\n   ACDB. This needs to be propagated to AFE for timestamp\n   calculation in voice path. AFE provides device HW and\n   SW delays to CVD; based on which timestamps are calculated\n   for voice packets.\n\nCherrypick from: I959676c1ee4e0568e661e7666a61c98152344047\n\nChange-Id: I8f9d3438aebb4a9e66100d062453f2ac066748c9\nSigned-off-by: Pavan Chikkala \u003cpavanc@codeaurora.org\u003e\n"
    },
    {
      "commit": "3e2def0481102accbbbc0ae8d0ac22d4f22bb6b3",
      "tree": "627ccc60f300a28ecd6a11d3e66fd9833a30d21d",
      "parents": [
        "f02e02e0a60b58db8263b7e7e7af8af6fa3d6a95"
      ],
      "author": {
        "name": "Sivasri Kumar Vanka",
        "email": "sivasri@codeaurora.org",
        "time": "Mon Dec 02 05:56:12 2013 -0800"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Mon Dec 02 05:56:20 2013 -0800"
      },
      "message": "Revert \"ASoC: msm: qdsp6v2: Propagate device HW delay to AFE.\"\n\nThis reverts commit 88928532db06d3f595b79256616941233fefaaef\n\nChange-Id: I9217571fe42b2834e4b5f2d6e27c7fe2dc8d6c3b\n"
    },
    {
      "commit": "36abcfd971000b6e589ff65c3456d45b98757f89",
      "tree": "2306000f20fd9f8bbedc8b8339a4585e0f57ae24",
      "parents": [
        "d1c2fbe849e5669959be5a1db1b6d65ca43a19e7"
      ],
      "author": {
        "name": "Lisa Du",
        "email": "cldu@marvell.com",
        "time": "Wed Sep 11 14:22:36 2013 -0700"
      },
      "committer": {
        "name": "Swetha Chikkaboraiah",
        "email": "schikk@codeaurora.org",
        "time": "Mon Dec 02 18:32:37 2013 +0530"
      },
      "message": "mm: vmscan: fix do_try_to_free_pages() livelock\n\nThis patch is based on KOSAKI\u0027s work and I add a little more description,\nplease refer https://lkml.org/lkml/2012/6/14/74.\n\nCurrently, I found system can enter a state that there are lots of free\npages in a zone but only order-0 and order-1 pages which means the zone is\nheavily fragmented, then high order allocation could make direct reclaim\npath\u0027s long stall(ex, 60 seconds) especially in no swap and no compaciton\nenviroment.  This problem happened on v3.4, but it seems issue still lives\nin current tree, the reason is do_try_to_free_pages enter live lock:\n\nkswapd will go to sleep if the zones have been fully scanned and are still\nnot balanced.  As kswapd thinks there\u0027s little point trying all over again\nto avoid infinite loop.  Instead it changes order from high-order to\n0-order because kswapd think order-0 is the most important.  Look at\n73ce02e9 in detail.  If watermarks are ok, kswapd will go back to sleep\nand may leave zone-\u003eall_unreclaimable \u003d3D 0.  It assume high-order users\ncan still perform direct reclaim if they wish.\n\nDirect reclaim continue to reclaim for a high order which is not a\nCOSTLY_ORDER without oom-killer until kswapd turn on\nzone-\u003eall_unreclaimble\u003d .  This is because to avoid too early oom-kill.\nSo it means direct_reclaim depends on kswapd to break this loop.\n\nIn worst case, direct-reclaim may continue to page reclaim forever when\nkswapd sleeps forever until someone like watchdog detect and finally kill\nthe process.  As described in:\nhttp://thread.gmane.org/gmane.linux.kernel.mm/103737\n\nWe can\u0027t turn on zone-\u003eall_unreclaimable from direct reclaim path because\ndirect reclaim path don\u0027t take any lock and this way is racy.  Thus this\npatch removes zone-\u003eall_unreclaimable field completely and recalculates\nzone reclaimable state every time.\n\nNote: we can\u0027t take the idea that direct-reclaim see zone-\u003epages_scanned\ndirectly and kswapd continue to use zone-\u003eall_unreclaimable.  Because, it\nis racy.  commit 929bea7c71 (vmscan: all_unreclaimable() use\nzone-\u003eall_unreclaimable as a name) describes the detail.\n\nCRs-fixed: 573027\nChange-Id: I49970a0fa751cf33af293fd1ee784e36422785b1\n[akpm@linux-foundation.org: uninline zone_reclaimable_pages() and zone_reclaimable()]\nCc: Aaditya Kumar \u003caaditya.kumar.30@gmail.com\u003e\nCc: Ying Han \u003cyinghan@google.com\u003e\nCc: Nick Piggin \u003cnpiggin@gmail.com\u003e\nAcked-by: Rik van Riel \u003criel@redhat.com\u003e\nCc: Mel Gorman \u003cmel@csn.ul.ie\u003e\nCc: KAMEZAWA Hiroyuki \u003ckamezawa.hiroyu@jp.fujitsu.com\u003e\nCc: Christoph Lameter \u003ccl@linux.com\u003e\nCc: Bob Liu \u003clliubbo@gmail.com\u003e\nCc: Neil Zhang \u003czhangwm@marvell.com\u003e\nCc: Russell King - ARM Linux \u003clinux@arm.linux.org.uk\u003e\nReviewed-by: Michal Hocko \u003cmhocko@suse.cz\u003e\nAcked-by: Minchan Kim \u003cminchan@kernel.org\u003e\nAcked-by: Johannes Weiner \u003channes@cmpxchg.org\u003e\nSigned-off-by: KOSAKI Motohiro \u003ckosaki.motohiro@jp.fujitsu.com\u003e\nSigned-off-by: Lisa Du \u003ccldu@marvell.com\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\nGit-repo: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git\nGit-commit: 6e543d5780e36ff5ee56c44d7e2e30db3457a7ed\n[lauraa@codeaurora.org: Some context fixups and variable name changes due\nto backporting. Dropped parts that don\u0027t apply to older kernels]\nSigned-off-by: Laura Abbott \u003clauraa@codeaurora.org\u003e\nSigned-off-by: Swetha Chikkaboraiah \u003cschikk@codeaurora.org\u003e\n"
    },
    {
      "commit": "d1c2fbe849e5669959be5a1db1b6d65ca43a19e7",
      "tree": "8fb7b4e0a552efbfaa21a8de5c41f707734f78e7",
      "parents": [
        "e38e32468d062236395576053b98a088a776c63c"
      ],
      "author": {
        "name": "Shaohua Li",
        "email": "shli@kernel.org",
        "time": "Fri Feb 22 16:34:38 2013 -0800"
      },
      "committer": {
        "name": "Swetha Chikkaboraiah",
        "email": "schikk@codeaurora.org",
        "time": "Mon Dec 02 18:32:00 2013 +0530"
      },
      "message": "swap: add per-partition lock for swapfile\n\nswap_lock is heavily contended when I test swap to 3 fast SSD (even\nslightly slower than swap to 2 such SSD).  The main contention comes\nfrom swap_info_get().  This patch tries to fix the gap with adding a new\nper-partition lock.\n\nGlobal data like nr_swapfiles, total_swap_pages, least_priority and\nswap_list are still protected by swap_lock.\n\nnr_swap_pages is an atomic now, it can be changed without swap_lock.  In\ntheory, it\u0027s possible get_swap_page() finds no swap pages but actually\nthere are free swap pages.  But sounds not a big problem.\n\nAccessing partition specific data (like scan_swap_map and so on) is only\nprotected by swap_info_struct.lock.\n\nChanging swap_info_struct.flags need hold swap_lock and\nswap_info_struct.lock, because scan_scan_map() will check it.  read the\nflags is ok with either the locks hold.\n\nIf both swap_lock and swap_info_struct.lock must be hold, we always hold\nthe former first to avoid deadlock.\n\nswap_entry_free() can change swap_list.  To delete that code, we add a\nnew highest_priority_index.  Whenever get_swap_page() is called, we\ncheck it.  If it\u0027s valid, we use it.\n\nIt\u0027s a pity get_swap_page() still holds swap_lock().  But in practice,\nswap_lock() isn\u0027t heavily contended in my test with this patch (or I can\nsay there are other much more heavier bottlenecks like TLB flush).  And\nBTW, looks get_swap_page() doesn\u0027t really need the lock.  We never free\nswap_info[] and we check SWAP_WRITEOK flag.  The only risk without the\nlock is we could swapout to some low priority swap, but we can quickly\nrecover after several rounds of swap, so sounds not a big deal to me.\nBut I\u0027d prefer to fix this if it\u0027s a real problem.\n\n\"swap: make each swap partition have one address_space\" improved the\nswapout speed from 1.7G/s to 2G/s.  This patch further improves the\nspeed to 2.3G/s, so around 15% improvement.  It\u0027s a multi-process test,\nso TLB flush isn\u0027t the biggest bottleneck before the patches.\n\nCRs-Fixed: 573027\nChange-Id: Ic8d600653479c0e6767f04462c3f057b0fe94332\n[arnd@arndb.de: fix it for nommu]\n[hughd@google.com: add missing unlock]\n[minchan@kernel.org: get rid of lockdep whinge on sys_swapon]\nSigned-off-by: Shaohua Li \u003cshli@fusionio.com\u003e\nCc: Hugh Dickins \u003chughd@google.com\u003e\nCc: Rik van Riel \u003criel@redhat.com\u003e\nCc: Minchan Kim \u003cminchan.kim@gmail.com\u003e\nCc: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\nCc: Seth Jennings \u003csjenning@linux.vnet.ibm.com\u003e\nCc: Konrad Rzeszutek Wilk \u003ckonrad.wilk@oracle.com\u003e\nCc: Xiao Guangrong \u003cxiaoguangrong@linux.vnet.ibm.com\u003e\nCc: Dan Magenheimer \u003cdan.magenheimer@oracle.com\u003e\nCc: Stephen Rothwell \u003csfr@canb.auug.org.au\u003e\nSigned-off-by: Arnd Bergmann \u003carnd@arndb.de\u003e\nSigned-off-by: Hugh Dickins \u003chughd@google.com\u003e\nSigned-off-by: Minchan Kim \u003cminchan@kernel.org\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\nGit-commit: ec8acf20afb8534ed511f6613dd2226b9e301010\nGit-repo: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git\n[lauraa@codeaurora.org: Various context fixups due to backport]\nSigned-off-by: Laura Abbott \u003clauraa@codeaurora.org\u003e\nSigned-off-by: Swetha Chikkaboraiah \u003cschikk@codeaurora.org\u003e\n"
    },
    {
      "commit": "b9cabe412e9b0c56b7e7705461c1f715d1a5e8d0",
      "tree": "e3479748f43519e475a8aea70fa550bda89f836e",
      "parents": [
        "c3598ea743d229de6ed1fdd153843aadd66d047c"
      ],
      "author": {
        "name": "ChandanaKishori Chiluveru",
        "email": "cchilu@codeaurora.org",
        "time": "Thu Nov 21 11:15:21 2013 +0530"
      },
      "committer": {
        "name": "ChandanaKishori Chiluveru",
        "email": "cchilu@codeaurora.org",
        "time": "Mon Dec 02 09:53:15 2013 +0530"
      },
      "message": "net: rmnet_usb: Add support for aligned QOS header\n\nWhen QOS is enabled, QOS header of 6 bytes appended to\nthe network packet.This is making the network packet buffer unaligned.\nUSB hardware has some penalty with dealing the unaligned buffers Due to\nthis Bi-Direction throughput is dropped.\n\nIntroduce a new QOS header of size 8 bytes. Add a new ioctl to know\nwhich QOS header need to be used.\n\nCRs-Fixed: 583165\nChange-Id: I11bb56d2dbbc1262345e091241dcf6f681643e84\nSigned-off-by: ChandanaKishori Chiluveru \u003ccchilu@codeaurora.org\u003e\n"
    },
    {
      "commit": "c0d30628ff1b424f041d83fee37daea5f84eb0a2",
      "tree": "d7bc2b3b5824eeddeb687c3547c21984e1d6c422",
      "parents": [
        "7288f91dd5b55d82e1dee9f0d24e9f4730d57392"
      ],
      "author": {
        "name": "Kees Cook",
        "email": "keescook@chromium.org",
        "time": "Tue Nov 12 15:11:17 2013 -0800"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Fri Nov 29 10:50:34 2013 -0800"
      },
      "message": "exec/ptrace: fix get_dumpable() incorrect tests\n\ncommit d049f74f2dbe71354d43d393ac3a188947811348 upstream.\n\nThe get_dumpable() return value is not boolean.  Most users of the\nfunction actually want to be testing for non-SUID_DUMP_USER(1) rather than\nSUID_DUMP_DISABLE(0).  The SUID_DUMP_ROOT(2) is also considered a\nprotected state.  Almost all places did this correctly, excepting the two\nplaces fixed in this patch.\n\nWrong logic:\n    if (dumpable \u003d\u003d SUID_DUMP_DISABLE) { /* be protective */ }\n        or\n    if (dumpable \u003d\u003d 0) { /* be protective */ }\n        or\n    if (!dumpable) { /* be protective */ }\n\nCorrect logic:\n    if (dumpable !\u003d SUID_DUMP_USER) { /* be protective */ }\n        or\n    if (dumpable !\u003d 1) { /* be protective */ }\n\nWithout this patch, if the system had set the sysctl fs/suid_dumpable\u003d2, a\nuser was able to ptrace attach to processes that had dropped privileges to\nthat user.  (This may have been partially mitigated if Yama was enabled.)\n\nThe macros have been moved into the file that declares get/set_dumpable(),\nwhich means things like the ia64 code can see them too.\n\nCVE-2013-2929\n\nReported-by: Vasily Kulikov \u003csegoon@openwall.com\u003e\nSigned-off-by: Kees Cook \u003ckeescook@chromium.org\u003e\nCc: \"Luck, Tony\" \u003ctony.luck@intel.com\u003e\nCc: Oleg Nesterov \u003coleg@redhat.com\u003e\nCc: \"Eric W. Biederman\" \u003cebiederm@xmission.com\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "f22ff9d05def87a049c5c8c7b86539bd4f8e3172",
      "tree": "ed805b8838b5cf2d7686345c8859eeb1f8d48901",
      "parents": [
        "df4011e050b4e80165a317424e6b3367dfa7697c"
      ],
      "author": {
        "name": "Fan Du",
        "email": "fan.du@windriver.com",
        "time": "Tue Apr 30 15:27:27 2013 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Fri Nov 29 10:50:33 2013 -0800"
      },
      "message": "include/linux/fs.h: disable preempt when acquire i_size_seqcount write lock\n\ncommit 74e3d1e17b2e11d175970b85acd44f5927000ba2 upstream.\n\nTwo rt tasks bind to one CPU core.\n\nThe higher priority rt task A preempts a lower priority rt task B which\nhas already taken the write seq lock, and then the higher priority rt\ntask A try to acquire read seq lock, it\u0027s doomed to lockup.\n\nrt task A with lower priority: call write\ni_size_write                                        rt task B with higher priority: call sync, and preempt task A\n  write_seqcount_begin(\u0026inode-\u003ei_size_seqcount);    i_size_read\n  inode-\u003ei_size \u003d i_size;                             read_seqcount_begin \u003c-- lockup here...\n\nSo disable preempt when acquiring every i_size_seqcount *write* lock will\ncure the problem.\n\nSigned-off-by: Fan Du \u003cfan.du@windriver.com\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\nCc: Zhao Hongjiang \u003czhaohongjiang@huawei.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "df4011e050b4e80165a317424e6b3367dfa7697c",
      "tree": "2aef78ae8ee675b60ec7798beda0b49e73545f51",
      "parents": [
        "1a9a8c2c61437bc8ab745c96af936196f4684495"
      ],
      "author": {
        "name": "Oleg Nesterov",
        "email": "oleg@redhat.com",
        "time": "Tue Apr 30 15:28:20 2013 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Fri Nov 29 10:50:33 2013 -0800"
      },
      "message": "exec: do not abuse -\u003ecred_guard_mutex in threadgroup_lock()\n\ncommit e56fb2874015370e3b7f8d85051f6dce26051df9 upstream.\n\nthreadgroup_lock() takes signal-\u003ecred_guard_mutex to ensure that\nthread_group_leader() is stable.  This doesn\u0027t look nice, the scope of\nthis lock in do_execve() is huge.\n\nAnd as Dave pointed out this can lead to deadlock, we have the\nfollowing dependencies:\n\n\tdo_execve:\t\tcred_guard_mutex -\u003e i_mutex\n\tcgroup_mount:\t\ti_mutex -\u003e cgroup_mutex\n\tattach_task_by_pid:\tcgroup_mutex -\u003e cred_guard_mutex\n\nChange de_thread() to take threadgroup_change_begin() around the\nswitch-the-leader code and change threadgroup_lock() to avoid\n-\u003ecred_guard_mutex.\n\nNote that de_thread() can\u0027t sleep with -\u003egroup_rwsem held, this can\nobviously deadlock with the exiting leader if the writer is active, so it\ndoes threadgroup_change_end() before schedule().\n\nReported-by: Dave Jones \u003cdavej@redhat.com\u003e\nAcked-by: Tejun Heo \u003ctj@kernel.org\u003e\nAcked-by: Li Zefan \u003clizefan@huawei.com\u003e\nSigned-off-by: Oleg Nesterov \u003coleg@redhat.com\u003e\nCc: \u003cstable@vger.kernel.org\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\n[ zhj: adjust context ]\nSigned-off-by: Zhao Hongjiang \u003czhaohongjiang@huawei.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "72d72ed0e398e1af1523f32305e298064146be79",
      "tree": "5093e85b70db74186c3e0c6cbac9000d841da0da",
      "parents": [
        "4b6c93869d9724a9c291637c00d8b09cc9620421",
        "51eec7b2abf2c3496756657bef6157bb56c85ad1"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Wed Nov 27 04:47:13 2013 -0800"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Wed Nov 27 04:47:12 2013 -0800"
      },
      "message": "Merge \"msm: vidc: Initialize kernel space stack variables\""
    },
    {
      "commit": "38c75cb8b1f470cd938cb4065b50e890d04aea85",
      "tree": "160a523531864e798ef33fe10ebc418e176c3293",
      "parents": [
        "52efa26e675f3d322072d20d0a1d5e1c2225ebbd",
        "88928532db06d3f595b79256616941233fefaaef"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Mon Nov 25 07:58:29 2013 -0800"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Mon Nov 25 07:58:29 2013 -0800"
      },
      "message": "Merge \"ASoC: msm: qdsp6v2: Propagate device HW delay to AFE.\""
    },
    {
      "commit": "88928532db06d3f595b79256616941233fefaaef",
      "tree": "5f2298560cf0596d34a36a80c6fadff1dfbcf692",
      "parents": [
        "c3598ea743d229de6ed1fdd153843aadd66d047c"
      ],
      "author": {
        "name": "Srikanth Katta",
        "email": "skatta@codeaurora.org",
        "time": "Fri Nov 15 15:38:14 2013 +0530"
      },
      "committer": {
        "name": "Venkata Narendra Kumar Gutta",
        "email": "vgutta@codeaurora.org",
        "time": "Mon Nov 25 17:28:45 2013 +0530"
      },
      "message": "ASoC: msm: qdsp6v2: Propagate device HW delay to AFE.\n\n - HW delay for each supported device is maintained in\n   ACDB. This needs to be propagated to AFE for timestamp\n   calculation in voice path. AFE provides device HW and\n   SW delays to CVD; based on which timestamps are calculated\n   for voice packets.\n\nCherrypick from: I959676c1ee4e0568e661e7666a61c98152344047\n\nChange-Id: I02c59462560749da3a1cfe2f8f614b939102e527\nSigned-off-by: Srikanth Katta \u003cskatta@codeaurora.org\u003e\nSigned-off-by: Pradnya Chaphekar \u003cpradnyac@codeaurora.org\u003e\n"
    },
    {
      "commit": "c5812972d6d39b23ceb2a74d89c6a2d1cd140c56",
      "tree": "e4195c36259c17ddc4907dcdf97268a44ae7c770",
      "parents": [
        "ca3763f7ebb644e0e179ee2d84cd9402ad1e5d4f",
        "59a719e8389a77b7788b389af302f143dd74c9c7"
      ],
      "author": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Thu Nov 21 17:20:24 2013 -0800"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Thu Nov 21 17:20:24 2013 -0800"
      },
      "message": "Merge remote-tracking branch \u0027codeaurora/kk_2.7_rb1.10\u0027 into HEAD\n\nConflicts:\n\tnet/wireless/reg.c\n\nChange-Id: I7e670492fddabd2218bb65a7e88a870c5e196909\n"
    },
    {
      "commit": "ca3763f7ebb644e0e179ee2d84cd9402ad1e5d4f",
      "tree": "0bc694b6981ca53a294374be5d40e8cf6a7f6381",
      "parents": [
        "983e67d6046efb1c3a941eded18214a716b0d384"
      ],
      "author": {
        "name": "Pachika, Vikas Reddy",
        "email": "vpachi@codeaurora.org",
        "time": "Fri Nov 01 21:06:37 2013 +0530"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Wed Nov 20 12:33:19 2013 -0800"
      },
      "message": "msm: vidc: Validate userspace buffer count\n\nMakesure the number of buffers count is less than\nthe maximum limit to avoid structure overflow errors.\n\nChange-Id: Icf3850de36325637ae43ac95f1c8f0f63e201d31\nCRs-fixed: 563694\nSigned-off-by: Pachika, Vikas Reddy \u003cvpachi@codeaurora.org\u003e\n"
    },
    {
      "commit": "197e6c34a5f0cbcc70decd8c7f8b2889c38a02fe",
      "tree": "773ec4f365fbb446c98b58ac7ff2a88f4ea0cbe4",
      "parents": [
        "59531340c88e1ca79e320e2ee113dbc071d312c7"
      ],
      "author": {
        "name": "Hamad Kadmany",
        "email": "hkadmany@codeaurora.org",
        "time": "Sun Nov 17 11:31:01 2013 +0200"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Sun Nov 17 01:57:37 2013 -0800"
      },
      "message": "tspp: Protect against buffer overflow\n\nChange filter-\u003epriority to unsigned int. Since it was defined as integer,\nit may have had negative value and cause accessing an array outside\nof its region\n\nCRs-Fixed: 561802, 561825\nChange-Id: Ie72aa09b07e79b0b67081b74e3b2057de30f03d0\nSigned-off-by: Hamad Kadmany \u003chkadmany@codeaurora.org\u003e\n"
    },
    {
      "commit": "3fb075c207723eafe19c7dd4c71e5b27f8f61c0d",
      "tree": "b14e0bdd96abfcf7114d0114e93219218b5a4419",
      "parents": [
        "b2673eacca15cea634702b2221498060d76e8c39"
      ],
      "author": {
        "name": "Deepak Verma",
        "email": "dverma@codeaurora.org",
        "time": "Fri Oct 18 15:17:33 2013 +0530"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Sat Nov 16 16:52:32 2013 -0800"
      },
      "message": "msm: vidc: Initialize kernel space stack variables\n\nThis change initializes kernel space stack variables\nthat are passed between kernel space and user space\nusing ioctls.\nNon initialization of these variables may lead to\nleakage of memory values from the kernel stack to\nuser space.\n\nChange-Id: Icb195470545ee48b55671ac09798610178e833e1\nCRs-fixed: 556771,563420\nSigned-off-by: Deepak Verma \u003cdverma@codeaurora.org\u003e\n"
    },
    {
      "commit": "b2673eacca15cea634702b2221498060d76e8c39",
      "tree": "da0fe4411973105c42a09014fe01cadf0d382a06",
      "parents": [
        "f8fed45b504cb8c716c8684a1018217e7ac74e9d",
        "a17edf121b04d12d027fbcabbfab052c4b2879f8"
      ],
      "author": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Thu Nov 14 00:58:33 2013 -0800"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Thu Nov 14 00:58:33 2013 -0800"
      },
      "message": "Merge remote-tracking branch \u0027codeaurora/kk_2.7_rb1.9\u0027 into kk-bringup\n\nConflicts:\n\tarch/arm/mach-msm/pm-8x60.c\n\tdrivers/video/msm/external_common.c\n\nChange-Id: Ibcad2be6ab9d83060cb37345295f15f188afcf52\n"
    },
    {
      "commit": "ee5fc1b5789d5bddd8034310d03d3bd1eafdbe3a",
      "tree": "face2e89ec4af36c5a6ba29ce2ac925dc8cd6669",
      "parents": [
        "fa0433af5d71ba85d96f904a173fa3c7e7269bbd"
      ],
      "author": {
        "name": "Mihir Shete",
        "email": "smihir@codeaurora.org",
        "time": "Sun Oct 13 05:25:30 2013 +0530"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Tue Nov 12 07:06:02 2013 -0800"
      },
      "message": "cfg80211: add flags to define country IE processing rules\n\n802.11 cards may have different country IE parsing behavioural\npreferences and vendors may want to support these. These preferences\nwere managed by the WIPHY_FLAG_CUSTOM_REGULATORY and the\nWIPHY_FLAG_STRICT_REGULATORY flags and their combination.\nInstead of using this existing notation, split out the country IE\nbehavioural preferences to a new flag. This will allow us to add more\ncustomizations easily and make the code more maintainable. Also add\na new flag to disable country IE hints issued by the CORE as the\nfirst customization.\n\nChange-Id: I66ba4a92ac0f029a115eea0a274b02db11279787\nCRs-Fixed: 542802\nSigned-off-by: Mihir Shete \u003csmihir@codeaurora.org\u003e\n"
    },
    {
      "commit": "af85054aa6a1bcd38be2354921f2f80aef1440e5",
      "tree": "5eab18c10d6e612b343e00d61636b7c40f532285",
      "parents": [
        "fde491a70c8a3ac44074040a7a348c75ee1787a8"
      ],
      "author": {
        "name": "Pachika, Vikas Reddy",
        "email": "vpachi@codeaurora.org",
        "time": "Fri Nov 01 21:06:37 2013 +0530"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Fri Nov 08 02:32:52 2013 -0800"
      },
      "message": "msm: vidc: Validate userspace buffer count\n\nMakesure the number of buffers count is less than\nthe maximum limit to avoid structure overflow errors.\n\nChange-Id: Icf3850de36325637ae43ac95f1c8f0f63e201d31\nCRs-fixed: 563694\nSigned-off-by: Pachika, Vikas Reddy \u003cvpachi@codeaurora.org\u003e\n"
    },
    {
      "commit": "51eec7b2abf2c3496756657bef6157bb56c85ad1",
      "tree": "34cde1018a09a8cf338c55eaf56c8705c7d1a952",
      "parents": [
        "fde491a70c8a3ac44074040a7a348c75ee1787a8"
      ],
      "author": {
        "name": "Deepak Verma",
        "email": "dverma@codeaurora.org",
        "time": "Fri Oct 18 15:17:33 2013 +0530"
      },
      "committer": {
        "name": "srikarri",
        "email": "sridur@codeaurora.org",
        "time": "Fri Nov 08 14:44:52 2013 +0530"
      },
      "message": "msm: vidc: Initialize kernel space stack variables\n\nThis change initializes kernel space stack variables\nthat are passed between kernel space and user space\nusing ioctls.\nNon initialization of these variables may lead to\nleakage of memory values from the kernel stack to\nuser space.\n\nChange-Id: Icb195470545ee48b55671ac09798610178e833e1\nCRs-fixed: 556771,563420\nSigned-off-by: Deepak Verma \u003cdverma@codeaurora.org\u003e\nSigned-off-by: srikarri \u003csridur@codeaurora.org\u003e.\n"
    },
    {
      "commit": "478e9a72b5e0cc9ecd8b787db90dec01d283123c",
      "tree": "f64155ef7f2967e06a105074cb668da0294d62ae",
      "parents": [
        "2b5f6d110ee835cba1742c999cabd30a54c10b76"
      ],
      "author": {
        "name": "Hannes Frederic Sowa",
        "email": "hannes@stressinduktion.org",
        "time": "Tue Oct 22 00:07:47 2013 +0200"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Mon Nov 04 04:23:41 2013 -0800"
      },
      "message": "inet: fix possible memory corruption with UDP_CORK and UFO\n\n[ This is a simplified -stable version of a set of upstream commits. ]\n\nThis is a replacement patch only for stable which does fix the problems\nhandled by the following two commits in -net:\n\n\"ip_output: do skb ufo init for peeked non ufo skb as well\" (e93b7d748be887cd7639b113ba7d7ef792a7efb9)\n\"ip6_output: do skb ufo init for peeked non ufo skb as well\" (c547dbf55d5f8cf615ccc0e7265e98db27d3fb8b)\n\nThree frames are written on a corked udp socket for which the output\nnetdevice has UFO enabled.  If the first and third frame are smaller than\nthe mtu and the second one is bigger, we enqueue the second frame with\nskb_append_datato_frags without initializing the gso fields. This leads\nto the third frame appended regulary and thus constructing an invalid skb.\n\nThis fixes the problem by always using skb_append_datato_frags as soon\nas the first frag got enqueued to the skb without marking the packet\nas SKB_GSO_UDP.\n\nThe problem with only two frames for ipv6 was fixed by \"ipv6: udp\npackets following an UFO enqueued packet need also be handled by UFO\"\n(2811ebac2521ceac84f2bdae402455baa6a7fb47).\n\nCc: Jiri Pirko \u003cjiri@resnulli.us\u003e\nCc: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nCc: David Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Hannes Frederic Sowa \u003channes@stressinduktion.org\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "2b5f6d110ee835cba1742c999cabd30a54c10b76",
      "tree": "4e10f90603b71437153e18c38cd356b569fdb98c",
      "parents": [
        "4dde1cb060276e93a2ed22e4a167fc260a9d8c23"
      ],
      "author": {
        "name": "Seif Mazareeb",
        "email": "seif@marvell.com",
        "time": "Thu Oct 17 20:33:21 2013 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Mon Nov 04 04:23:41 2013 -0800"
      },
      "message": "net: fix cipso packet validation when !NETLABEL\n\n[ Upstream commit f2e5ddcc0d12f9c4c7b254358ad245c9dddce13b ]\n\nWhen CONFIG_NETLABEL is disabled, the cipso_v4_validate() function could loop\nforever in the main loop if opt[opt_iter +1] \u003d\u003d 0, this will causing a kernel\ncrash in an SMP system, since the CPU executing this function will\nstall /not respond to IPIs.\n\nThis problem can be reproduced by running the IP Stack Integrity Checker\n(http://isic.sourceforge.net) using the following command on a Linux machine\nconnected to DUT:\n\n\"icmpsic -s rand -d \u003cDUT IP address\u003e -r 123456\"\nwait (1-2 min)\n\nSigned-off-by: Seif Mazareeb \u003cseif@marvell.com\u003e\nAcked-by: Paul Moore \u003cpaul@paul-moore.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "3e5d72cd013a30bbd3a835243b635f0b85c4dd0a",
      "tree": "79b48fb112d98c9631a7e2a1ff1b5428fb1cf1db",
      "parents": [
        "225be57bbaf2c104f339b1a21efc25ff6b6bd9cb"
      ],
      "author": {
        "name": "Vlad Yasevich",
        "email": "vyasevich@gmail.com",
        "time": "Tue Oct 15 22:01:29 2013 -0400"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Mon Nov 04 04:23:41 2013 -0800"
      },
      "message": "net: dst: provide accessor function to dst-\u003exfrm\n\n[ Upstream commit e87b3998d795123b4139bc3f25490dd236f68212 ]\n\ndst-\u003exfrm is conditionally defined.  Provide accessor funtion that\nis always available.\n\nSigned-off-by: Vlad Yasevich \u003cvyasevich@gmail.com\u003e\nAcked-by: Neil Horman \u003cnhorman@tuxdriver.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "11db1e4cee071defc371d0fc7f1740024fbe5b06",
      "tree": "3f31e7f8abf5be8eee3c2bd2de3306d1b41c233a",
      "parents": [
        "3cebd7931a6f3007c3eb53942934772cc3b6ee08"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "edumazet@google.com",
        "time": "Tue Oct 15 11:54:30 2013 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Mon Nov 04 04:23:40 2013 -0800"
      },
      "message": "tcp: must unclone packets before mangling them\n\n[ Upstream commit c52e2421f7368fd36cbe330d2cf41b10452e39a9 ]\n\nTCP stack should make sure it owns skbs before mangling them.\n\nWe had various crashes using bnx2x, and it turned out gso_size\nwas cleared right before bnx2x driver was populating TC descriptor\nof the _previous_ packet send. TCP stack can sometime retransmit\npackets that are still in Qdisc.\n\nOf course we could make bnx2x driver more robust (using\nACCESS_ONCE(shinfo-\u003egso_size) for example), but the bug is TCP stack.\n\nWe have identified two points where skb_unclone() was needed.\n\nThis patch adds a WARN_ON_ONCE() to warn us if we missed another\nfix of this kind.\n\nKudos to Neal for finding the root cause of this bug. Its visible\nusing small MSS.\n\nSigned-off-by: Eric Dumazet \u003cedumazet@google.com\u003e\nSigned-off-by: Neal Cardwell \u003cncardwell@google.com\u003e\nCc: Yuchung Cheng \u003cycheng@google.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "f8fed45b504cb8c716c8684a1018217e7ac74e9d",
      "tree": "b298d9750fd5bee70c1ece4a777d7484bb7d39de",
      "parents": [
        "4f158a61fd1de13f4a77c48c40e4f13bf35a7703"
      ],
      "author": {
        "name": "Anil kumar mamidala",
        "email": "amami@codeaurora.org",
        "time": "Fri Oct 25 14:04:34 2013 +0530"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Fri Nov 01 11:42:29 2013 -0700"
      },
      "message": "msm:pm: Fix for race condition of starting cpu1 when cpu0 in PC.\n\nThere is a window where core sends ipi to secondary core and\nwait for it to come online for 1 second. This would allow\ncore0 to go power collapse in a rare condition where core1\nstarted booting and doesn\u0027t become online yet.\n\nFix this by not allowing power collapse on core0\nif hot plug operation is in progress.\n\nCRs-fixed: 545714.\nChange-Id: I1ca503a2f09cd9a65c2fdcd41eb54466a1e486c5\nSigned-off-by: Anil kumar mamidala \u003camami@codeaurora.org\u003e\n"
    },
    {
      "commit": "a17edf121b04d12d027fbcabbfab052c4b2879f8",
      "tree": "4eb102c8f5597a2d47414c9db10c4bc6c23952a9",
      "parents": [
        "67013742cb476e4b0ba5f28ef19f08206abbda4b",
        "af8b202e750cc4acd0de4a7855a48903fbabcb7a"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Tue Oct 29 08:38:18 2013 -0700"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Tue Oct 29 08:38:18 2013 -0700"
      },
      "message": "Merge \"KBuild: Export msm_rmnet.h to user space\""
    },
    {
      "commit": "3deb9fa1b539063c61d28c6939cfd000858f80ac",
      "tree": "973f05e01d35bd6a4c3af3fa14560833169a7989",
      "parents": [
        "9584f632fb2dac1d1ef5bc5e7ebe904f7b9aab71"
      ],
      "author": {
        "name": "Greg Reid",
        "email": "greid@codeaurora.org",
        "time": "Fri Oct 12 12:07:37 2012 -0400"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Mon Oct 28 15:12:31 2013 -0700"
      },
      "message": "kernel: Add hooks for user-accessible timers in the kernel.\n\nHooks for user-accessible timers allow implementation of a\nmore efficient gettimeofday in user-space.\n\nChange-Id: If2f63d010c1cf142eb84f3745617e756913e46f7\nSigned-off-by: Brent DeGraaf \u003cbdegraaf@codeaurora.org\u003e\n"
    },
    {
      "commit": "af8b202e750cc4acd0de4a7855a48903fbabcb7a",
      "tree": "57a34667543516addedcf2f5fc86df15817958f3",
      "parents": [
        "f776c8c87b53bca86fd34cbc9947ba27a5b9ff79"
      ],
      "author": {
        "name": "Harout Hedeshian",
        "email": "harouth@codeaurora.org",
        "time": "Tue Sep 10 15:40:10 2013 -0600"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Mon Oct 28 15:02:57 2013 -0700"
      },
      "message": "KBuild: Export msm_rmnet.h to user space\n\nExposing msm_rmnet.h to user space using standard mechanism such that\nuser space applications do not have to use relative paths in include\nlist.\n\nCRs-Fixed: 548664\nChange-Id: I807f9854de1d0bf9961607c9ed54dd5ecef782dc\nSigned-off-by: Harout Hedeshian \u003charouth@codeaurora.org\u003e\n"
    },
    {
      "commit": "9b487e9df99e0c139561579e144a017c8487e3d0",
      "tree": "1610194219f5b0124772696b29feb4e33714d652",
      "parents": [
        "8e041b4ec175dd209c303e81cd28b993536b0ab8"
      ],
      "author": {
        "name": "Anil kumar mamidala",
        "email": "amami@codeaurora.org",
        "time": "Fri Oct 25 14:04:34 2013 +0530"
      },
      "committer": {
        "name": "Anil kumar mamidala",
        "email": "amami@codeaurora.org",
        "time": "Mon Oct 28 13:17:47 2013 +0530"
      },
      "message": "msm:pm: Fix for race condition of starting cpu1 when cpu0 in PC.\n\nThere is a window where core sends ipi to secondary core and\nwait for it to come online for 1 second. This would allow\ncore0 to go power collapse in a rare condition where core1\nstarted booting and doesn\u0027t become online yet.\n\nFix this by not allowing power collapse on core0\nif hot plug operation is in progress.\n\nCRs-fixed: 545714.\nChange-Id: I1ca503a2f09cd9a65c2fdcd41eb54466a1e486c5\nSigned-off-by: Anil kumar mamidala \u003camami@codeaurora.org\u003e\n"
    },
    {
      "commit": "4c481c15615a3ff1cd28d2cfd687817704be63ad",
      "tree": "dc15be09c319156ed362f1c349bc1d052cfb7542",
      "parents": [
        "a8cefcec4999befc00b4be17985644b7a092dff1",
        "0841f631e5cecf7fb08f6ae6c89e47b79dca83cd"
      ],
      "author": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Tue Oct 22 15:09:42 2013 -0700"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Tue Oct 22 15:09:42 2013 -0700"
      },
      "message": "Merge tag \u0027AU_LINUX_ANDROID_JB_2.6.04.03.00.109.082\u0027 into revert-linux\n\nAU_LINUX_ANDROID_JB_2.6.04.03.00.109.082 based on quic/aosp/jb_2.6\n\nConflicts:\n\tarch/arm/mach-msm/ipc_router.h\n\tarch/arm/mach-msm/ipc_socket.c\n\tdrivers/media/video/msm/actuators/msm_actuator.c\n\tdrivers/media/video/msm/csi/msm_csid.c\n\tdrivers/media/video/msm/vfe/msm_vfe32.c\n\tdrivers/video/msm/hdmi_msm.c\n\tinclude/media/msm_camera.h\n\nChange-Id: I9285b7519314f034fb8a6a4b7e2d21aa2e3e3739\n"
    },
    {
      "commit": "ae4f032be29295f7a7df8bfbffab5b442e88b11e",
      "tree": "1fdebb69ad0e6a4c67d5d7aec856b3f679fbca16",
      "parents": [
        "bcdf0a14454fed2aad5fd3a10a63a8411ec484e8"
      ],
      "author": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Tue Sep 03 12:13:46 2013 -0700"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Tue Oct 22 14:40:35 2013 -0700"
      },
      "message": "leds: leds-pm8xxx: update from evita TMO DE MR1 release\n\nHTC kernel version: evitaul-jb-crc-3.4.10-08ef01e\n\nChange-Id: I89d5ed0f62171e5fa1095cf3223acf787c678886\n"
    },
    {
      "commit": "c2f271001295e9d4b1cca3a01502795e4f0d1639",
      "tree": "d977bfe72c4f54eaa65ac1a315bc6f4ce820eaea",
      "parents": [
        "dad61bad4267b922a9386d9772f80fbac496c05e"
      ],
      "author": {
        "name": "Theodore Ts\u0027o",
        "email": "tytso@mit.edu",
        "time": "Tue Sep 10 10:52:35 2013 -0400"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Tue Oct 22 09:02:25 2013 +0100"
      },
      "message": "random: run random_int_secret_init() run after all late_initcalls\n\ncommit 47d06e532e95b71c0db3839ebdef3fe8812fca2c upstream.\n\nThe some platforms (e.g., ARM) initializes their clocks as\nlate_initcalls for some unknown reason.  So make sure\nrandom_int_secret_init() is run after all of the late_initcalls are\nrun.\n\nSigned-off-by: \"Theodore Ts\u0027o\" \u003ctytso@mit.edu\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "022a41db8aa1bc0b4ff4c013f889292324a1c465",
      "tree": "11f00ef8d0aa584b956a194de5ee4c3be5fc5120",
      "parents": [
        "9712612a91e92824349ce9fece31dba6d2fbde70"
      ],
      "author": {
        "name": "David Rientjes",
        "email": "rientjes@google.com",
        "time": "Mon Apr 29 15:06:11 2013 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 13 15:42:49 2013 -0700"
      },
      "message": "mm, show_mem: suppress page counts in non-blockable contexts\n\ncommit 4b59e6c4730978679b414a8da61514a2518da512 upstream.\n\nOn large systems with a lot of memory, walking all RAM to determine page\ntypes may take a half second or even more.\n\nIn non-blockable contexts, the page allocator will emit a page allocation\nfailure warning unless __GFP_NOWARN is specified.  In such contexts, irqs\nare typically disabled and such a lengthy delay may even result in NMI\nwatchdog timeouts.\n\nTo fix this, suppress the page walk in such contexts when printing the\npage allocation failure warning.\n\nSigned-off-by: David Rientjes \u003crientjes@google.com\u003e\nCc: Mel Gorman \u003cmgorman@suse.de\u003e\nAcked-by: Michal Hocko \u003cmhocko@suse.cz\u003e\nCc: Dave Hansen \u003cdave@linux.vnet.ibm.com\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\nCc: Xishi Qiu \u003cqiuxishi@huawei.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "f72299da3e1a010a3d77fbed0b9ee6abd0a19911",
      "tree": "7ea60bcfbe30a8b48fe9e3a5d2af5c08d2f115a9",
      "parents": [
        "832ae42a43dd7ea2a39d7cc0687363d0039da850"
      ],
      "author": {
        "name": "Ansis Atteka",
        "email": "aatteka@nicira.com",
        "time": "Wed Sep 18 15:29:53 2013 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Oct 13 15:42:48 2013 -0700"
      },
      "message": "ip: generate unique IP identificator if local fragmentation is allowed\n\n[ Upstream commit 703133de331a7a7df47f31fb9de51dc6f68a9de8 ]\n\nIf local fragmentation is allowed, then ip_select_ident() and\nip_select_ident_more() need to generate unique IDs to ensure\ncorrect defragmentation on the peer.\n\nFor example, if IPsec (tunnel mode) has to encrypt large skbs\nthat have local_df bit set, then all IP fragments that belonged\nto different ESP datagrams would have used the same identificator.\nIf one of these IP fragments would get lost or reordered, then\npeer could possibly stitch together wrong IP fragments that did\nnot belong to the same datagram. This would lead to a packet loss\nor data corruption.\n\nSigned-off-by: Ansis Atteka \u003caatteka@nicira.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "2cd21fa1b54efaf6b5912ef2833fa474fdcf92b7",
      "tree": "17a056e20c3937a5af97acd45ac7792a420d78ab",
      "parents": [
        "2927937899b958de968119856ba659d8a4eff037"
      ],
      "author": {
        "name": "Peter Zijlstra",
        "email": "a.p.zijlstra@chello.nl",
        "time": "Tue Oct 02 15:38:52 2012 +0200"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Tue Oct 01 09:10:52 2013 -0700"
      },
      "message": "perf: Clarify perf_cpu_context::active_pmu usage by renaming it to ::unique_pmu\n\ncommit 3f1f33206c16c7b3839d71372bc2ac3f305aa802 upstream.\n\nStephane thought the perf_cpu_context::active_pmu name confusing and\nsuggested using \u0027unique_pmu\u0027 instead.\n\nThis pointer is a pointer to a \u0027random\u0027 pmu sharing the cpuctx\ninstance, therefore limiting a for_each_pmu loop to those where\ncpuctx-\u003eunique_pmu matches the pmu we get a loop over unique cpuctx\ninstances.\n\nSuggested-by: Stephane Eranian \u003ceranian@google.com\u003e\nSigned-off-by: Peter Zijlstra \u003ca.p.zijlstra@chello.nl\u003e\nLink: http://lkml.kernel.org/n/tip-kxyjqpfj2fn9gt7kwu5ag9ks@git.kernel.org\nSigned-off-by: Ingo Molnar \u003cmingo@kernel.org\u003e\nCc: Li Zefan \u003clizefan@huawei.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "0049b62c9efc4ef23492976512d4722b3e63de45",
      "tree": "a098aec5808beb0937fdf3964e23742dd30066b2",
      "parents": [
        "62875332eafea9ee150a6037c0a1a20669e02aa1"
      ],
      "author": {
        "name": "Kees Cook",
        "email": "keescook@chromium.org",
        "time": "Wed Sep 11 21:56:50 2013 +0200"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Tue Oct 01 09:10:51 2013 -0700"
      },
      "message": "HID: provide a helper for validating hid reports\n\ncommit 331415ff16a12147d57d5c953f3a961b7ede348b upstream.\n\nMany drivers need to validate the characteristics of their HID report\nduring initialization to avoid misusing the reports. This adds a common\nhelper to perform validation of the report exisitng, the field existing,\nand the expected number of values within the field.\n\nSigned-off-by: Kees Cook \u003ckeescook@chromium.org\u003e\nReviewed-by: Benjamin Tissoires \u003cbenjamin.tissoires@redhat.com\u003e\nSigned-off-by: Jiri Kosina \u003cjkosina@suse.cz\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "e5fab20341e0b311e88e12e3d6817565a1261505",
      "tree": "42db2db63e6594751a5af408f1f787cbec393fdc",
      "parents": [
        "0841f631e5cecf7fb08f6ae6c89e47b79dca83cd"
      ],
      "author": {
        "name": "Stephen Smalley",
        "email": "sds@tycho.nsa.gov",
        "time": "Mon Nov 05 08:15:34 2012 -0500"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Fri Sep 27 17:28:20 2013 -0700"
      },
      "message": "Add security hooks to binder and implement the hooks for SELinux.\n\nAdd security hooks to the binder and implement the hooks for SELinux.\nThe security hooks enable security modules such as SELinux to implement\ncontrols over binder IPC.  The security hooks include support for\ncontrolling what process can become the binder context manager\n(binder_set_context_mgr), controlling the ability of a process\nto invoke a binder transaction/IPC to another process (binder_transaction),\ncontrolling the ability a process to transfer a binder reference to\nanother process (binder_transfer_binder), and controlling the ability\nof a process to transfer an open file to another process (binder_transfer_file).\n\nThis support is used by SE Android, http://selinuxproject.org/page/SEAndroid.\n\nChange-Id: I9a64a87825df2e60b9c51400377af4a9cd1c4049\nSigned-off-by: Stephen Smalley \u003csds@tycho.nsa.gov\u003e\nSigned-off-by: Satya Durga Srinivasu Prabhala \u003csatyap@codeaurora.org\u003e\n"
    },
    {
      "commit": "28f9d084175a2e0df088f5d1d9159819762e8534",
      "tree": "c48da7a3766d04e91832b8cf9ec820f019a019d9",
      "parents": [
        "3fb6304439680cd10ae221f5ddfc531147f6a6cd"
      ],
      "author": {
        "name": "Andrzej Hajda",
        "email": "a.hajda@samsung.com",
        "time": "Fri Jun 28 05:44:22 2013 -0300"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Thu Sep 26 17:15:49 2013 -0700"
      },
      "message": "media: v4l2: added missing mutex.h include to v4l2-ctrls.h\n\ncommit a19dec6ea94c036af68c31930c1c92681f55af41 upstream.\n\nThis patch fixes following error:\ninclude/media/v4l2-ctrls.h:193:15: error: field ‘_lock’ has incomplete type\ninclude/media/v4l2-ctrls.h: In function ‘v4l2_ctrl_lock’:\ninclude/media/v4l2-ctrls.h:570:2: error: implicit declaration of\n\tfunction ‘mutex_lock’ [-Werror\u003dimplicit-function-declaration]\ninclude/media/v4l2-ctrls.h: In function ‘v4l2_ctrl_unlock’:\ninclude/media/v4l2-ctrls.h:579:2: error: implicit declaration of\n\tfunction ‘mutex_unlock’ [-Werror\u003dimplicit-function-declaration]\n\nSigned-off-by: Andrzej Hajda \u003ca.hajda@samsung.com\u003e\nSigned-off-by: Kyungmin Park \u003ckyungmin.park@samsung.com\u003e\nSigned-off-by: Hans Verkuil \u003chans.verkuil@cisco.com\u003e\nSigned-off-by: Mauro Carvalho Chehab \u003cm.chehab@samsung.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "676bb9a417ceec66576daeb24aed2184a82ef544",
      "tree": "0fe1e2fc2906db54dd98ffd118a4dd94be056a2e",
      "parents": [
        "355c557b3e0164eaf75aded30e92da5a3a818c5f"
      ],
      "author": {
        "name": "Kees Cook",
        "email": "keescook@chromium.org",
        "time": "Wed Aug 28 22:29:55 2013 +0200"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Thu Sep 26 17:15:34 2013 -0700"
      },
      "message": "HID: validate HID report id size\n\ncommit 43622021d2e2b82ea03d883926605bdd0525e1d1 upstream.\n\nThe \"Report ID\" field of a HID report is used to build indexes of\nreports. The kernel\u0027s index of these is limited to 256 entries, so any\nmalicious device that sets a Report ID greater than 255 will trigger\nmemory corruption on the host:\n\n[ 1347.156239] BUG: unable to handle kernel paging request at ffff88094958a878\n[ 1347.156261] IP: [\u003cffffffff813e4da0\u003e] hid_register_report+0x2a/0x8b\n\nCVE-2013-2888\n\nSigned-off-by: Kees Cook \u003ckeescook@chromium.org\u003e\nSigned-off-by: Jiri Kosina \u003cjkosina@suse.cz\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "a7179b89a68c7cb6f8623cedcce02b98d9e072a1",
      "tree": "7518b03360ce858e94f7bf57dbe855ca54847d65",
      "parents": [
        "38a0864499c5a2b092e3ef065d9333acf2600e82"
      ],
      "author": {
        "name": "Tejun Heo",
        "email": "tj@kernel.org",
        "time": "Fri Jun 28 10:34:48 2013 -0700"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Thu Sep 26 17:15:32 2013 -0700"
      },
      "message": "rculist: list_first_or_null_rcu() should use list_entry_rcu()\n\ncommit c34ac00caefbe49d40058ae7200bd58725cebb45 upstream.\n\nlist_first_or_null() should test whether the list is empty and return\npointer to the first entry if not in a RCU safe manner.  It\u0027s broken\nin several ways.\n\n* It compares __kernel @__ptr with __rcu @__next triggering the\n  following sparse warning.\n\n  net/core/dev.c:4331:17: error: incompatible types in comparison expression (different address spaces)\n\n* It doesn\u0027t perform rcu_dereference*() and computes the entry address\n  using container_of() directly from the __rcu pointer which is\n  inconsitent with other rculist interface.  As a result, all three\n  in-kernel users - net/core/dev.c, macvlan, cgroup - are buggy.  They\n  dereference the pointer w/o going through read barrier.\n\n* While -\u003enext dereference passes through list_next_rcu(), the\n  compiler is still free to fetch -\u003enext more than once and thus\n  nullify the \"__ptr !\u003d __next\" condition check.\n\nFix it by making list_first_or_null_rcu() dereference -\u003enext directly\nusing ACCESS_ONCE() and then use list_entry_rcu() on it like other\nrculist accessors.\n\nv2: Paul pointed out that the compiler may fetch the pointer more than\n    once nullifying the condition check.  ACCESS_ONCE() added on\n    -\u003enext dereference.\n\nv3: Restored () around macro param which was accidentally removed.\n    Spotted by Paul.\n\nSigned-off-by: Tejun Heo \u003ctj@kernel.org\u003e\nReported-by: Fengguang Wu \u003cfengguang.wu@intel.com\u003e\nCc: Dipankar Sarma \u003cdipankar@in.ibm.com\u003e\nCc: \"Paul E. McKenney\" \u003cpaulmck@linux.vnet.ibm.com\u003e\nCc: \"David S. Miller\" \u003cdavem@davemloft.net\u003e\nCc: Li Zefan \u003clizefan@huawei.com\u003e\nCc: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: Paul E. McKenney \u003cpaulmck@linux.vnet.ibm.com\u003e\nReviewed-by: Josh Triplett \u003cjosh@joshtriplett.org\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "f5159193b7dd8154f2c46756d03aec3693553664",
      "tree": "5c1391fd788169a2da630362632b9c1b1c67f4c0",
      "parents": [
        "c3df827e3b21efb28f9dde68d7a7d97b864778fd",
        "0b65ae0fc762979bc4e5a6c350d9936de75b4cd3"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Mon Sep 23 21:53:25 2013 -0700"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Mon Sep 23 21:53:25 2013 -0700"
      },
      "message": "Merge \"msm-camera: Fix various small issues in Actuator driver\""
    },
    {
      "commit": "717de11d7eafd4633edc2e07248d2156eee10496",
      "tree": "22b9d3d244818970fcc7bde82c9f0a43395f8bd6",
      "parents": [
        "ab3e8e69878edbcceb3a08f965c4899c499e3403"
      ],
      "author": {
        "name": "Deepak Verma",
        "email": "dverma@codeaurora.org",
        "time": "Fri Sep 20 17:02:53 2013 +0530"
      },
      "committer": {
        "name": "Deepak Verma",
        "email": "dverma@codeaurora.org",
        "time": "Mon Sep 23 19:25:34 2013 +0530"
      },
      "message": "msm: vidc: Validate input data before processing\n\nUser controlled data needs to be validated before\nprocessing, otherwise it may corrupt existing data\nand other programming variables which may further\nlead to crash in kernel space.\nThis change validates user specified buffer\u0027s data,\nsuch as offset and data length, before performing\nany operations in kernel.\n\nChange-Id: Idb2a5c4c270cdbb55adfc0c22b9296b7dd359de9\nCRs-fixed: 547695\nSigned-off-by: Deepak Verma \u003cdverma@codeaurora.org\u003e\n"
    },
    {
      "commit": "5660cbdf45393274061268e79adadb45a51aa328",
      "tree": "e9b9c0789a975635ba0b130a143dd2171f059fa7",
      "parents": [
        "9504db7ca7fe5a4b7960c6d8512b99d20971b865",
        "311138346b2f66017aea4be93dbff876939187ae"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Fri Sep 20 11:32:08 2013 -0700"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Fri Sep 20 11:32:07 2013 -0700"
      },
      "message": "Merge \"msm_fb: display: Add support to YCBYCR MDP format\""
    },
    {
      "commit": "50b5f07287564a13d3ae28cfe243cca566407b53",
      "tree": "8c94e43b5da4ff1ecaa85d92d6b52f0bf1da9847",
      "parents": [
        "3b44f9ff1137befb8a907638d6383cf8b20c7413"
      ],
      "author": {
        "name": "Sameer Thalappil",
        "email": "sameert@codeaurora.org",
        "time": "Fri Jul 05 14:58:32 2013 -0700"
      },
      "committer": {
        "name": "Sameer Thalappil",
        "email": "sameert@codeaurora.org",
        "time": "Mon Sep 16 14:26:14 2013 -0700"
      },
      "message": "cfg80211: Add AP stopped interface\n\nAP stopped interface can be used to indicate that the AP mode has\nstopped functioning, WLAN driver may have encountered errors that has\nforced the driver to stop the AP mode.\n\nWhen the driver is in P2P-Go mode, and when it goes thru automatic\nrecovery from firmware crashes, it uses this interface to notify the\nuserspace that the group has been deleted.\n\nCRs-Fixed: 453060\nChange-Id: Ifcd8d4f0c0b26f56a56fb8560aa474297b7521d4\nSigned-off-by: Sameer Thalappil \u003csameert@codeaurora.org\u003e\n"
    },
    {
      "commit": "0b65ae0fc762979bc4e5a6c350d9936de75b4cd3",
      "tree": "4b2528e974efb8276a01bf40a0be3288125bdae0",
      "parents": [
        "d1a98f00bcc17040c36e3b92af3c16f688fc2662"
      ],
      "author": {
        "name": "Katta Santhisindhu",
        "email": "kattas@codeaurora.org",
        "time": "Mon Sep 16 14:45:39 2013 +0530"
      },
      "committer": {
        "name": "Katta Santhisindhu",
        "email": "kattas@codeaurora.org",
        "time": "Mon Sep 16 14:47:56 2013 +0530"
      },
      "message": "msm-camera: Fix various small issues in Actuator driver\n\nBound check and validate userspace parameters direction,\nnumber of steps and direction sign. Also fix possible\nmemory leak in certain error cases.\n\nChange-Id: I05a3f63583845851df36b122f2079d345657cb99\nCRs-Fixed: 511349\nSigned-off-by: Katta Santhisindhu \u003ckattas@codeaurora.org\u003e\n"
    },
    {
      "commit": "8708ea2b682963ce30dfd638771e7e4022094a90",
      "tree": "7b9614ba8229bf836c376efb599ee9d7dc5af233",
      "parents": [
        "98fadc18d23f40203ff154d0220692834e0de8f1"
      ],
      "author": {
        "name": "Jiri Bohac",
        "email": "jbohac@suse.cz",
        "time": "Fri Aug 30 11:18:45 2013 +0200"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Sep 14 06:02:10 2013 -0700"
      },
      "message": "ICMPv6: treat dest unreachable codes 5 and 6 as EACCES, not EPROTO\n\n[ Upstream commit 61e76b178dbe7145e8d6afa84bb4ccea71918994 ]\n\nRFC 4443 has defined two additional codes for ICMPv6 type 1 (destination\nunreachable) messages:\n        5 - Source address failed ingress/egress policy\n\t6 - Reject route to destination\n\nNow they are treated as protocol error and icmpv6_err_convert() converts them\nto EPROTO.\n\nRFC 4443 says:\n\t\"Codes 5 and 6 are more informative subsets of code 1.\"\n\nTreat codes 5 and 6 as code 1 (EACCES)\n\nBtw, connect() returning -EPROTO confuses firefox, so that fallback to\nother/IPv4 addresses does not work:\nhttps://bugzilla.mozilla.org/show_bug.cgi?id\u003d910773\n\nSigned-off-by: Jiri Bohac \u003cjbohac@suse.cz\u003e\nAcked-by: Hannes Frederic Sowa \u003channes@stressinduktion.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "055c396300ee15d990777841278ba94d2bc7868a",
      "tree": "7160fdb3700a540dd58fa7c01d1930df13749a02",
      "parents": [
        "f4cb837d1bdb6e1592523ce76c3f45188d120b4e"
      ],
      "author": {
        "name": "Hannes Frederic Sowa",
        "email": "hannes@stressinduktion.org",
        "time": "Fri Aug 16 13:30:07 2013 +0200"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sat Sep 14 06:02:10 2013 -0700"
      },
      "message": "ipv6: drop packets with multiple fragmentation headers\n\n[ Upstream commit f46078cfcd77fa5165bf849f5e568a7ac5fa569c ]\n\nIt is not allowed for an ipv6 packet to contain multiple fragmentation\nheaders. So discard packets which were already reassembled by\nfragmentation logic and send back a parameter problem icmp.\n\nThe updates for RFC 6980 will come in later, I have to do a bit more\nresearch here.\n\nCc: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: Hannes Frederic Sowa \u003channes@stressinduktion.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "311138346b2f66017aea4be93dbff876939187ae",
      "tree": "42afd24b05b4896da8677b9250b7c9c0e1b13816",
      "parents": [
        "2d4d6dfb5b043145d26e50f4820c1fd8ac38cff6"
      ],
      "author": {
        "name": "Mayank Chopra",
        "email": "makchopra@codeaurora.org",
        "time": "Fri Sep 06 16:07:59 2013 +0530"
      },
      "committer": {
        "name": "Mayank Chopra",
        "email": "makchopra@codeaurora.org",
        "time": "Fri Sep 06 16:07:59 2013 +0530"
      },
      "message": "msm_fb: display: Add support to YCBYCR MDP format\n\nAdd support of MDP_YCBYCR_H2V1 interleaved YUV format to MDP\nfor a-family targets.\n\nChange-Id: I5afb84a95693d1ced114152364782a10c4d56bc2\nSigned-off-by: Mayank Chopra \u003cmakchopra@codeaurora.org\u003e\n"
    },
    {
      "commit": "ead13f9c10155c96a5d5f2d39e5efbdbad107d15",
      "tree": "f9061059d2952f7ff18d287508b8fef57196676c",
      "parents": [
        "e7dd7a69d3d3c646285469510ae48db6ee1a074b"
      ],
      "author": {
        "name": "Jonathan Corbet",
        "email": "corbet@lwn.net",
        "time": "Mon Sep 02 02:30:26 2013 -0700"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Tue Sep 03 03:17:56 2013 -0700"
      },
      "message": "Use hrtimers so that msleep() sleeps for the requested time\n\nCurrent msleep() snoozes for at least two jiffies, causing msleep(1) to\nsleep for at least 20ms on HZ\u003d100 systems.  Using hrtimers allows\nmsleep() to sleep for something much closer to the requested time.\n\nChange-Id: If06b4fa3f489eed073213c763755ec3b387129e1\nSigned-off-by: Jonathan Corbet \u003ccorbet@lwn.net\u003e\n"
    },
    {
      "commit": "4eb43ec68dafb6d5b3910746447b7a4720801027",
      "tree": "2a2f4cd13acdc2eaa82a45d05d20750938f628f3",
      "parents": [
        "09a818b021b0f6cadf602b85ff8c5e5ceada8b47"
      ],
      "author": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Sat Aug 31 15:09:56 2013 -0700"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Sun Sep 01 00:04:46 2013 -0700"
      },
      "message": "misc: update HTC camera code from evita MR1 release\n\nHTC kernel version: evitaul-jb-crc-3.4.10-08ef01e\n\nChange-Id: Id6493dbefef21d9b6fec46e44501232cb9780d10\n"
    },
    {
      "commit": "714ee0cf24f5cf92419dbd0f3a27ae41bc018208",
      "tree": "3bbd1a34ad09c56e75bf191f5af1517a64d78c21",
      "parents": [
        "6a234a865b90a4cea4e91fb65a7bb55f0a7566d2"
      ],
      "author": {
        "name": "Subhash Jadavani",
        "email": "subhashj@codeaurora.org",
        "time": "Thu Jun 27 18:10:31 2013 +0530"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Fri Aug 30 02:12:29 2013 -0700"
      },
      "message": "mmc: core: remove bkops_busy flag from the mmc_command structure\n\nAs \"bkops_busy\" flag is no longer used, remove it from the mmc_command\nstructure.\n\nChange-Id: Icd405ba4879c5dfc915eba9bf821633fdd87fbb6\nSigned-off-by: Subhash Jadavani \u003csubhashj@codeaurora.org\u003e\n"
    },
    {
      "commit": "09c756513ab486569683c6496e3285892a4e5ea0",
      "tree": "12d8f2da129db2ed1c2994c73a11f0557c58ae08",
      "parents": [
        "41f2be6744087bbcf8444499ac2bb36af1ae8316"
      ],
      "author": {
        "name": "Martin Peschke",
        "email": "mpeschke@linux.vnet.ibm.com",
        "time": "Thu Aug 22 17:45:36 2013 +0200"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Thu Aug 29 09:50:13 2013 -0700"
      },
      "message": "SCSI: zfcp: fix lock imbalance by reworking request queue locking\n\ncommit d79ff142624e1be080ad8d09101f7004d79c36e1 upstream.\n\nThis patch adds wait_event_interruptible_lock_irq_timeout(), which is a\nstraight-forward descendant of wait_event_interruptible_timeout() and\nwait_event_interruptible_lock_irq().\n\nThe zfcp driver used to call wait_event_interruptible_timeout()\nin combination with some intricate and error-prone locking. Using\nwait_event_interruptible_lock_irq_timeout() as a replacement\nnicely cleans up that locking.\n\nThis rework removes a situation that resulted in a locking imbalance\nin zfcp_qdio_sbal_get():\n\nBUG: workqueue leaked lock or atomic: events/1/0xffffff00/10\n    last function: zfcp_fc_wka_port_offline+0x0/0xa0 [zfcp]\n\nIt was introduced by commit c2af7545aaff3495d9bf9a7608c52f0af86fb194\n\"[SCSI] zfcp: Do not wait for SBALs on stopped queue\", which had a new\ncode path related to ZFCP_STATUS_ADAPTER_QDIOUP that took an early exit\nwithout a required lock being held. The problem occured when a\nspecial, non-SCSI I/O request was being submitted in process context,\nwhen the adapter\u0027s queues had been torn down. In this case the bug\nsurfaced when the Fibre Channel port connection for a well-known address\nwas closed during a concurrent adapter shut-down procedure, which is a\nrare constellation.\n\nThis patch also fixes these warnings from the sparse tool (make C\u003d1):\n\ndrivers/s390/scsi/zfcp_qdio.c:224:12: warning: context imbalance in\n \u0027zfcp_qdio_sbal_check\u0027 - wrong count at exit\ndrivers/s390/scsi/zfcp_qdio.c:244:5: warning: context imbalance in\n \u0027zfcp_qdio_sbal_get\u0027 - unexpected unlock\n\nLast but not least, we get rid of that crappy lock-unlock-lock\nsequence at the beginning of the critical section.\n\nIt is okay to call zfcp_erp_adapter_reopen() with req_q_lock held.\n\nReported-by: Mikulas Patocka \u003cmpatocka@redhat.com\u003e\nReported-by: Heiko Carstens \u003cheiko.carstens@de.ibm.com\u003e\nSigned-off-by: Martin Peschke \u003cmpeschke@linux.vnet.ibm.com\u003e\nSigned-off-by: Steffen Maier \u003cmaier@linux.vnet.ibm.com\u003e\nSigned-off-by: James Bottomley \u003cJBottomley@Parallels.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "09a818b021b0f6cadf602b85ff8c5e5ceada8b47",
      "tree": "37206885f07695d207dee0f174fbc72d74941ba5",
      "parents": [
        "51cc7b551add9c0be5982539f236f9145cd7f141",
        "747b79875b3e85084869c6b51d35387f10419bbe"
      ],
      "author": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Wed Aug 28 16:40:27 2013 -0700"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Wed Aug 28 16:40:27 2013 -0700"
      },
      "message": "Merge tag \u0027AU_LINUX_ANDROID_JB_2.6.04.03.00.109.025\u0027 into cm-10.2\n\nAU_LINUX_ANDROID_JB_2.6.04.03.00.109.025 based on quic/aosp/jb_2.6\n\nConflicts:\n\tdrivers/media/video/msm/msm_mctl.c\n\tdrivers/media/video/msm/msm_v4l2_video.c\n\nChange-Id: Ib467ade6f770034967d1904ac11beace0053cea7\n"
    },
    {
      "commit": "1d821b2eda8c8d7fc09f6c150b82247602f6939d",
      "tree": "2389aa5ed298908d63790de28d4dcbe70d9bf5b8",
      "parents": [
        "4b298b691b067fea09161af8476f21da21b6abc4"
      ],
      "author": {
        "name": "Subhash Jadavani",
        "email": "subhashj@codeaurora.org",
        "time": "Tue Jun 25 13:13:24 2013 +0530"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Thu Aug 22 23:11:59 2013 -0700"
      },
      "message": "mmc: core: expose HPI capability to SWITCH commands\n\nSome of the time consuming operations such as BKOPS, SANITIZE, CACHE\nflush/off use the SWITCH command (CMD6) but as these operations don\u0027t\nhave card specification defined timeout for completion, we may see\ntimeout errors if card doesn\u0027t complete the operation within the SW\ndefined timeout. If SW defined timeout is hit, above operations are\nconsidered to be failed and no real recovery mechanism is implemented\nafter timeout.\n\nMost of the above operations (BKOPS/SANITIZE/CACHE flush/off) can be\ninterrupted by sending the HPI (High Priority Interrupt) command to card\nif they taking longer than expected. This change adds the base support\nwhich will these operations to be HPIed after timeout.\n\nChange-Id: Ibd9061525756aaae656b1ceeeaed62e04fb80cce\nSigned-off-by: Subhash Jadavani \u003csubhashj@codeaurora.org\u003e\n"
    },
    {
      "commit": "a42efb79d54d9a13c8f68df122c832bca08b74ae",
      "tree": "b49010c84b42ccc5407766471bc94c95efe63d83",
      "parents": [
        "4d5b24dd453b4ff44f69756106b029e8961dcb55"
      ],
      "author": {
        "name": "Zhang Yi",
        "email": "wetpzy@gmail.com",
        "time": "Tue Jun 25 21:19:31 2013 +0800"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Tue Aug 20 08:26:28 2013 -0700"
      },
      "message": "futex: Take hugepages into account when generating futex_key\n\ncommit 13d60f4b6ab5b702dc8d2ee20999f98a93728aec upstream.\n\nThe futex_keys of process shared futexes are generated from the page\noffset, the mapping host and the mapping index of the futex user space\naddress. This should result in an unique identifier for each futex.\n\nThough this is not true when futexes are located in different subpages\nof an hugepage. The reason is, that the mapping index for all those\nfutexes evaluates to the index of the base page of the hugetlbfs\nmapping. So a futex at offset 0 of the hugepage mapping and another\none at offset PAGE_SIZE of the same hugepage mapping have identical\nfutex_keys. This happens because the futex code blindly uses\npage-\u003eindex.\n\nSteps to reproduce the bug:\n\n1. Map a file from hugetlbfs. Initialize pthread_mutex1 at offset 0\n   and pthread_mutex2 at offset PAGE_SIZE of the hugetlbfs\n   mapping.\n\n   The mutexes must be initialized as PTHREAD_PROCESS_SHARED because\n   PTHREAD_PROCESS_PRIVATE mutexes are not affected by this issue as\n   their keys solely depend on the user space address.\n\n2. Lock mutex1 and mutex2\n\n3. Create thread1 and in the thread function lock mutex1, which\n   results in thread1 blocking on the locked mutex1.\n\n4. Create thread2 and in the thread function lock mutex2, which\n   results in thread2 blocking on the locked mutex2.\n\n5. Unlock mutex2. Despite the fact that mutex2 got unlocked, thread2\n   still blocks on mutex2 because the futex_key points to mutex1.\n\nTo solve this issue we need to take the normal page index of the page\nwhich contains the futex into account, if the futex is in an hugetlbfs\nmapping. In other words, we calculate the normal page mapping index of\nthe subpage in the hugetlbfs mapping.\n\nMappings which are not based on hugetlbfs are not affected and still\nuse page-\u003eindex.\n\nThanks to Mel Gorman who provided a patch for adding proper evaluation\nfunctions to the hugetlbfs code to avoid exposing hugetlbfs specific\ndetails to the futex code.\n\n[ tglx: Massaged changelog ]\n\nSigned-off-by: Zhang Yi \u003czhang.yi20@zte.com.cn\u003e\nReviewed-by: Jiang Biao \u003cjiang.biao2@zte.com.cn\u003e\nTested-by: Ma Chenggong \u003cma.chenggong@zte.com.cn\u003e\nReviewed-by: \u0027Mel Gorman\u0027 \u003cmgorman@suse.de\u003e\nAcked-by: \u0027Darren Hart\u0027 \u003cdvhart@linux.intel.com\u003e\nCc: \u0027Peter Zijlstra\u0027 \u003cpeterz@infradead.org\u003e\nLink: http://lkml.kernel.org/r/000101ce71a6%24a83c5880%24f8b50980%24@com\nSigned-off-by: Thomas Gleixner \u003ctglx@linutronix.de\u003e\nCc: Mike Galbraith \u003cmgalbraith@suse.de\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n\n"
    },
    {
      "commit": "99593eb7ca1dd9bfaa431d96e009eda23f001ace",
      "tree": "b1412f07fda67143bc2454bbb6f81e124cae3617",
      "parents": [
        "65280b8ed1cca78ff7fe63ecfdb0fff87fe184a3"
      ],
      "author": {
        "name": "Andrew Vagin",
        "email": "avagin@openvz.org",
        "time": "Fri Aug 02 21:16:43 2013 +0400"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Wed Aug 14 22:57:08 2013 -0700"
      },
      "message": "tracing: Fix fields of struct trace_iterator that are zeroed by mistake\n\ncommit ed5467da0e369e65b247b99eb6403cb79172bcda upstream.\n\ntracing_read_pipe zeros all fields bellow \"seq\". The declaration contains\na comment about that, but it doesn\u0027t help.\n\nThe first field is \"snapshot\", it\u0027s true when current open file is\nsnapshot. Looks obvious, that it should not be zeroed.\n\nThe second field is \"started\". It was converted from cpumask_t to\ncpumask_var_t (v2.6.28-4983-g4462344), in other words it was\nconverted from cpumask to pointer on cpumask.\n\nCurrently the reference on \"started\" memory is lost after the first read\nfrom tracing_read_pipe and a proper object will never be freed.\n\nThe \"started\" is never dereferenced for trace_pipe, because trace_pipe\ncan\u0027t have the TRACE_FILE_ANNOTATE options.\n\nLink: http://lkml.kernel.org/r/1375463803-3085183-1-git-send-email-avagin@openvz.org\n\nSigned-off-by: Andrew Vagin \u003cavagin@openvz.org\u003e\nSigned-off-by: Steven Rostedt \u003crostedt@goodmis.org\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "48261448832c3ccf68a8a43e0112c89d36ccb884",
      "tree": "05b2617bfda822c80bdcdf5df40c0cbf533a92aa",
      "parents": [
        "54a96cba0b01ca6b3b1481d3c41b9d012a35b8fb"
      ],
      "author": {
        "name": "Ian Chen",
        "email": "ian.cy.chen@samsung.com",
        "time": "Wed Aug 29 15:05:36 2012 +0900"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Fri Aug 09 13:10:41 2013 -0700"
      },
      "message": "mmc: card: Skip secure erase on MoviNAND; causes unrecoverable corruption.\n\ncommit 3550ccdb9d8d350e526b809bf3dd92b550a74fe1 upstream.\n\nFor several MoviNAND eMMC parts, there are known issues with secure\nerase and secure trim.  For these specific MoviNAND devices, we skip\nthese operations.\n\nSpecifically, there is a bug in the eMMC firmware that causes\nunrecoverable corruption when the MMC is erased with MMC_CAP_ERASE\nenabled.\n\nReferences:\n\nhttp://forum.xda-developers.com/showthread.php?t\u003d1644364\nhttps://plus.google.com/111398485184813224730/posts/21pTYfTsCkB#111398485184813224730/posts/21pTYfTsCkB\n\nChange-Id: I0ddef16048c82b5cf320104702239065c039805a\nSigned-off-by: Ian Chen \u003cian.cy.chen@samsung.com\u003e\nReviewed-by: Namjae Jeon \u003clinkinjeon@gmail.com\u003e\nAcked-by: Jaehoon Chung \u003cjh80.chung@samsung.com\u003e\nReviewed-by: Linus Walleij \u003clinus.walleij@linaro.org\u003e\nSigned-off-by: Chris Ball \u003ccjb@laptop.org\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "f5484ed0b52de3008fa843d82e901654ddfe6346",
      "tree": "fbe2049f6a1ffda0a09d4a34da643e2d31532ed0",
      "parents": [
        "7044419e477677c692d9057f61e81a54da3f5f5b"
      ],
      "author": {
        "name": "Karthikeyan Ramasubramanian",
        "email": "kramasub@codeaurora.org",
        "time": "Wed Jul 18 19:25:37 2012 -0600"
      },
      "committer": {
        "name": "Karthikeyan Ramasubramanian",
        "email": "kramasub@codeaurora.org",
        "time": "Fri Aug 09 09:44:48 2013 -0600"
      },
      "message": "lib: qmi: Introduce QMI Encode/Decode library\n\nIntroduce Encode/Decode Library to perform QMI message marshaling.\nThe QMI Encode/Decode Library encodes the kernel C data structures into\nQMI wire format and decodes the messages in QMI wire format into kernel\nC structures.\n\nChange-Id: Ib443e697dafedeac8a790de9a3a8ed4a8444082f\nSigned-off-by: Karthikeyan Ramasubramanian \u003ckramasub@codeaurora.org\u003e\n"
    },
    {
      "commit": "54a96cba0b01ca6b3b1481d3c41b9d012a35b8fb",
      "tree": "526a006720965dc432fde7cc9fc48b9759ec5dad",
      "parents": [
        "713d76af1ec1e848d7ebdafc1791d7f04f17d29e"
      ],
      "author": {
        "name": "Naseer Ahmed",
        "email": "naseer@codeaurora.org",
        "time": "Tue Jun 25 16:54:01 2013 -0400"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Thu Aug 08 13:48:40 2013 -0700"
      },
      "message": "msm: mdp: Update sync pt. behaviour\n\nAdd a retire fence and clean up the existing release fence\nimplementation\n\nSigned-off-by: Naseer Ahmed \u003cnaseer@codeaurora.org\u003e\nChange-Id: Iecf7e95d0786ac43aa6a12d70442936600c0249a\n"
    },
    {
      "commit": "5a138e2dff12f9af624709bdf6367f5335e6b624",
      "tree": "5221b6a8a5ae0403f2dead871db4231e4ef87bed",
      "parents": [
        "e5419ae2ea9359116a1ea40a8d1a68398fbe465b",
        "7f56162f41bf7b893a8dd79594b1f2823e4b302b"
      ],
      "author": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Thu Aug 08 12:10:14 2013 -0700"
      },
      "committer": {
        "name": "Ethan Chen",
        "email": "intervigil@gmail.com",
        "time": "Thu Aug 08 12:10:14 2013 -0700"
      },
      "message": "Merge remote-tracking branch \u0027codeaurora/jb_2.6\u0027 into cm-10.2\n\nConflicts:\n\tarch/arm/mach-msm/devices-8960.c\n\tdrivers/media/video/msm/msm_mctl.c\n\tdrivers/tty/n_smux.c\n\tnet/netfilter/xt_qtaguid.c\n\nChange-Id: Ieeb6fb85d0ac5728ebad3aa3b13a3f1ee08aa3e9\n"
    },
    {
      "commit": "5fb2f980e0beefafe336dbfbccad7d251784b18d",
      "tree": "14a9d7339b631630422eca345ab56c3f86897cf5",
      "parents": [
        "8a949aa23bfab7ab3487b700cf7d1c7795197594"
      ],
      "author": {
        "name": "Anirudh Ghayal",
        "email": "aghayal@codeaurora.org",
        "time": "Mon Aug 05 19:07:32 2013 +0530"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Wed Aug 07 05:56:56 2013 -0700"
      },
      "message": "power: pm8921-charger: Add delay after turning on D0 (TCXO) clock\n\nOn APQ8064, TCXO cannot be turned off before its warm-up period (4ms).\nThis is not required on the platform which have a CXO. Add a warm-up\ndelay after turning on D0 (which turns on the TCXO).\n\nChange-Id: I252372c35a9fdfaf4a9fade1594936b05c1b5745\nSigned-off-by: Anirudh Ghayal \u003caghayal@codeaurora.org\u003e\n"
    },
    {
      "commit": "2010fa31f8f5c5fa8385459dff03cb844cf79dd1",
      "tree": "f43541e0f5a5169293e2094c5a722f289a96a33d",
      "parents": [
        "c733e1a2c459c09fe2510bfa49e2571b532be97c"
      ],
      "author": {
        "name": "Michael S. Tsirkin",
        "email": "mst@redhat.com",
        "time": "Tue Jul 09 13:19:18 2013 +0300"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Aug 04 16:26:03 2013 +0800"
      },
      "message": "virtio: support unlocked queue poll\n\ncommit cc229884d3f77ec3b1240e467e0236c3e0647c0c upstream.\n\nThis adds a way to check ring empty state after enable_cb outside any\nlocks. Will be used by virtio_net.\n\nNote: there\u0027s room for more optimization: caller is likely to have a\nmemory barrier already, which means we might be able to get rid of a\nbarrier here.  Deferring this optimization until we do some\nbenchmarking.\n\nSigned-off-by: Michael S. Tsirkin \u003cmst@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n[wg: Backported to 3.2]\nSigned-off-by: Wolfram Gloger \u003cwmglo@dent.med.uni-muenchen.de\u003e\n[bwh: Backported to 3.4: adjust context]\nSigned-off-by: Ben Hutchings \u003cben@decadent.org.uk\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "a90a3adeda28c4b701b11770817cf86d92db3228",
      "tree": "4443439c0d4ea52b0cb411b4069286afeea3f170",
      "parents": [
        "8924588cf02036c239cfec4302f8b44ca6e2c6bb"
      ],
      "author": {
        "name": "Clemens Ladisch",
        "email": "clemens@ladisch.de",
        "time": "Mon Jul 22 21:32:09 2013 +0200"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Sun Aug 04 16:26:02 2013 +0800"
      },
      "message": "firewire: fix libdc1394/FlyCap2 iso event regression\n\ncommit 0699a73af3811b66b1ab5650575acee5eea841ab upstream.\n\nCommit 18d627113b83 (firewire: prevent dropping of completed iso packet\nheader data) was intended to be an obvious bug fix, but libdc1394 and\nFlyCap2 depend on the old behaviour by ignoring all returned information\nand thus not noticing that not all packets have been received yet.  The\nresult was that the video frame buffers would be saved before they\ncontained the correct data.\n\nReintroduce the old behaviour for old clients.\n\nTested-by: Stepan Salenikovich \u003cstepan.salenikovich@gmail.com\u003e\nTested-by: Josep Bosch \u003cjep250@gmail.com\u003e\nCc: \u003cstable@vger.kernel.org\u003e # 3.4+\nSigned-off-by: Clemens Ladisch \u003cclemens@ladisch.de\u003e\nSigned-off-by: Stefan Richter \u003cstefanr@s5r6.in-berlin.de\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\n"
    },
    {
      "commit": "027285a3c5783e7d9c36de422aa89f6d0a046d70",
      "tree": "1fec8c0d532c649a53df61b1b699589d3cd53621",
      "parents": [
        "6c966b2a0f49b61c6756c8f0f3eca89f1442b5ba"
      ],
      "author": {
        "name": "Venkateshwarlu Domakonda",
        "email": "Venkateshwarlu@codeaurora.org",
        "time": "Tue Jun 04 15:19:56 2013 +0530"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Wed Jul 31 23:42:00 2013 -0700"
      },
      "message": "radio: iris: Handle force close gracefully\n\nDo not queue the FM disabled event while in OFF state.\n\nChange-Id: I8f8cd31198f8bb1a7521920844e0f0c5c3190b08\nCRs-Fixed: 492216\nSigned-off-by: Venkateshwarlu Domakonda \u003cVenkateshwarlu@codeaurora.org\u003e\n"
    },
    {
      "commit": "6c966b2a0f49b61c6756c8f0f3eca89f1442b5ba",
      "tree": "96452e0874b6ad70f3cb16c4bdb79277a00e90b3",
      "parents": [
        "520fe2bf8f22541eba7634e91537c1b27aff96d8",
        "0c28939d0c05965455ec65e436be2770dc2ed920"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Wed Jul 31 01:02:18 2013 -0700"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Wed Jul 31 01:02:17 2013 -0700"
      },
      "message": "Merge \"msm: vidc: Add LTR feature for H264 encoder\""
    },
    {
      "commit": "9cfbf1061b496dea1a4027c7ba3d34391784d35e",
      "tree": "0b8ac7366a94daabf16d3a65e72cf22c1a2d1169",
      "parents": [
        "b940f0459a2cba0acf4d4bc393bd288980a8b858",
        "bbd4529e313fe4a924b148552722b172e5cb440a"
      ],
      "author": {
        "name": "Linux Build Service Account",
        "email": "lnxbuild@localhost",
        "time": "Mon Jul 29 02:47:56 2013 -0700"
      },
      "committer": {
        "name": "Gerrit - the friendly Code Review server",
        "email": "code-review@localhost",
        "time": "Mon Jul 29 02:47:56 2013 -0700"
      },
      "message": "Merge \"avtimer: kernel driver to expose avtimer to userspace\""
    }
  ],
  "next": "eeddd9177a67b743868e09742d58f574b2b9a497"
}
