)]}'
{
  "log": [
    {
      "commit": "9bbc052d5e63512b0ce4e201ea97e12fba9fda82",
      "tree": "30433e20961b73e571c081869d1ea52c92c7b15a",
      "parents": [
        "0d4420a90b51abdea71585f571bad6d789ff8eb7",
        "93bbce1ad0cd788190dd7d6c17d289f771fe3d0d"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 10 15:04:35 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 10 15:04:35 2011 -0700"
      },
      "message": "Merge branch \u0027pablo/nf-2.6-updates\u0027 of git://1984.lsi.us.es/net-2.6\n"
    },
    {
      "commit": "6fa5ddcc675b937f94d05628e8997c07a80c6cb9",
      "tree": "22d71ef353fe4e2f94a5c83e9b15e7bfa420e5df",
      "parents": [
        "43a4dea4c9d44baae38ddc14b9b6d86fde4c8b88"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Mon May 09 19:43:05 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 10 15:03:34 2011 -0700"
      },
      "message": "xfrm: Don\u0027t allow esn with disabled anti replay detection\n\nUnlike the standard case, disabled anti replay detection needs some\nnontrivial extra treatment on ESN. RFC 4303 states:\n\nNote: If a receiver chooses to not enable anti-replay for an SA, then\nthe receiver SHOULD NOT negotiate ESN in an SA management protocol.\nUse of ESN creates a need for the receiver to manage the anti-replay\nwindow (in order to determine the correct value for the high-order\nbits of the ESN, which are employed in the ICV computation), which is\ngenerally contrary to the notion of disabling anti-replay for an SA.\n\nSo return an error if an ESN state with disabled anti replay detection\nis inserted for now and add the extra treatment later if we need it.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "43a4dea4c9d44baae38ddc14b9b6d86fde4c8b88",
      "tree": "af7ecb23077cf5b4ae1290f7d1ab5e901e7adb82",
      "parents": [
        "e14a599335427f81bbb0008963e59aa9c6449dce"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Mon May 09 19:36:38 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 10 15:03:34 2011 -0700"
      },
      "message": "xfrm: Assign the inner mode output function to the dst entry\n\nAs it is, we assign the outer modes output function to the dst entry\nwhen we create the xfrm bundle. This leads to two problems on interfamily\nscenarios. We might insert ipv4 packets into ip6_fragment when called\nfrom xfrm6_output. The system crashes if we try to fragment an ipv4\npacket with ip6_fragment. This issue was introduced with git commit\nad0081e4 (ipv6: Fragment locally generated tunnel-mode IPSec6 packets\nas needed). The second issue is, that we might insert ipv4 packets in\nnetfilter6 and vice versa on interfamily scenarios.\n\nWith this patch we assign the inner mode output function to the dst entry\nwhen we create the xfrm bundle. So xfrm4_output/xfrm6_output from the inner\nmode is used and the right fragmentation and netfilter functions are called.\nWe switch then to outer mode with the output_finish functions.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e14a599335427f81bbb0008963e59aa9c6449dce",
      "tree": "a60c2f9924511dec1389f0078144a2d7a045559e",
      "parents": [
        "55aee10dec477254241e4f72968f92e0543b33ad"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Tue May 10 12:26:06 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 10 15:03:33 2011 -0700"
      },
      "message": "net: dev_close() should check IFF_UP\n\nCommit 443457242beb (factorize sync-rcu call in\nunregister_netdevice_many) mistakenly removed one test from dev_close()\n\nFollowing actions trigger a BUG :\n\nmodprobe bonding\nmodprobe dummy\nifconfig bond0 up\nifenslave bond0 dummy0\nrmmod dummy\n\ndev_close() must not close a non IFF_UP device.\n\nWith help from Frank Blaschka and Einar EL Lueck\n\nReported-by: Frank Blaschka \u003cblaschka@linux.vnet.ibm.com\u003e\nReported-by: Einar EL Lueck \u003cELELUECK@de.ibm.com\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "55aee10dec477254241e4f72968f92e0543b33ad",
      "tree": "8ccb8dce8c0e5dd83547747088aa6e8157e136b2",
      "parents": [
        "b0e6baf5619a6fa3eaf43b55fdb4daa362c3c916"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Tue May 10 12:22:54 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 10 15:03:32 2011 -0700"
      },
      "message": "vlan: fix GVRP at dismantle time\n\nip link add link eth2 eth2.103 type vlan id 103 gvrp on loose_binding on\nip link set eth2.103 up\nrmmod tg3    # driver providing eth2\n\n BUG: unable to handle kernel NULL pointer dereference at           (null)\n IP: [\u003cffffffffa0030c9e\u003e] garp_request_leave+0x3e/0xc0 [garp]\n PGD 11d251067 PUD 11b9e0067 PMD 0\n Oops: 0000 [#1] SMP\n last sysfs file: /sys/devices/virtual/net/eth2.104/ifindex\n CPU 0\n Modules linked in: tg3(-) 8021q garp nfsd lockd auth_rpcgss sunrpc libphy sg [last unloaded: x_tables]\n\n Pid: 11494, comm: rmmod Tainted: G        W   2.6.39-rc6-00261-gfd71257-dirty #580 HP ProLiant BL460c G6\n RIP: 0010:[\u003cffffffffa0030c9e\u003e]  [\u003cffffffffa0030c9e\u003e] garp_request_leave+0x3e/0xc0 [garp]\n RSP: 0018:ffff88007a19bae8  EFLAGS: 00010286\n RAX: 0000000000000000 RBX: ffff88011b5e2000 RCX: 0000000000000002\n RDX: 0000000000000000 RSI: 0000000000000175 RDI: ffffffffa0030d5b\n RBP: ffff88007a19bb18 R08: 0000000000000001 R09: ffff88011bd64a00\n R10: ffff88011d34ec00 R11: 0000000000000000 R12: 0000000000000002\n R13: ffff88007a19bc48 R14: ffff88007a19bb88 R15: 0000000000000001\n FS:  0000000000000000(0000) GS:ffff88011fc00000(0063) knlGS:00000000f77d76c0\n CS:  0010 DS: 002b ES: 002b CR0: 000000008005003b\n CR2: 0000000000000000 CR3: 000000011a675000 CR4: 00000000000006f0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400\n Process rmmod (pid: 11494, threadinfo ffff88007a19a000, task ffff8800798595c0)\n Stack:\n  ffff88007a19bb36 ffff88011c84b800 ffff88011b5e2000 ffff88007a19bc48\n  ffff88007a19bb88 0000000000000006 ffff88007a19bb38 ffffffffa003a5f6\n  ffff88007a19bb38 670088007a19bba8 ffff88007a19bb58 ffffffffa00397e7\n Call Trace:\n  [\u003cffffffffa003a5f6\u003e] vlan_gvrp_request_leave+0x46/0x50 [8021q]\n  [\u003cffffffffa00397e7\u003e] vlan_dev_stop+0xb7/0xc0 [8021q]\n  [\u003cffffffff8137e427\u003e] __dev_close_many+0x87/0xe0\n  [\u003cffffffff8137e507\u003e] dev_close_many+0x87/0x110\n  [\u003cffffffff8137e630\u003e] rollback_registered_many+0xa0/0x240\n  [\u003cffffffff8137e7e9\u003e] unregister_netdevice_many+0x19/0x60\n  [\u003cffffffffa00389eb\u003e] vlan_device_event+0x53b/0x550 [8021q]\n  [\u003cffffffff8143f448\u003e] ? ip6mr_device_event+0xa8/0xd0\n  [\u003cffffffff81479d03\u003e] notifier_call_chain+0x53/0x80\n  [\u003cffffffff81062539\u003e] __raw_notifier_call_chain+0x9/0x10\n  [\u003cffffffff81062551\u003e] raw_notifier_call_chain+0x11/0x20\n  [\u003cffffffff8137df82\u003e] call_netdevice_notifiers+0x32/0x60\n  [\u003cffffffff8137e69f\u003e] rollback_registered_many+0x10f/0x240\n  [\u003cffffffff8137e85f\u003e] rollback_registered+0x2f/0x40\n  [\u003cffffffff8137e8c8\u003e] unregister_netdevice_queue+0x58/0x90\n  [\u003cffffffff8137e9eb\u003e] unregister_netdev+0x1b/0x30\n  [\u003cffffffffa005d73f\u003e] tg3_remove_one+0x6f/0x10b [tg3]\n\nWe should call vlan_gvrp_request_leave() from unregister_vlan_dev(),\nnot from vlan_dev_stop(), because vlan_gvrp_uninit_applicant()\nis called right after unregister_netdevice_queue(). In batch mode,\nunregister_netdevice_queue() doesn’t immediately call vlan_dev_stop().\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "93bbce1ad0cd788190dd7d6c17d289f771fe3d0d",
      "tree": "59ccc7b048649ce31ccd4559fad42a1c068f7ad3",
      "parents": [
        "1ed2f73d90fb49bcf5704aee7e9084adb882bfc5"
      ],
      "author": {
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org",
        "time": "Tue May 10 12:13:36 2011 +0200"
      },
      "committer": {
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org",
        "time": "Tue May 10 12:13:36 2011 +0200"
      },
      "message": "netfilter: revert a2361c8735e07322023aedc36e4938b35af31eb0\n\nThis patch reverts a2361c8735e07322023aedc36e4938b35af31eb0:\n\"[PATCH] netfilter: xt_conntrack: warn about use in raw table\"\n\nFlorian Wesphal says:\n\"... when the packet was sent from the local machine the skb\nalready has -\u003enfct attached, and -m conntrack seems to do\nthe right thing.\"\n\nAcked-by: Jan Engelhardt \u003cjengelh@medozas.de\u003e\nReported-by: Florian Wesphal \u003cfw@strlen.de\u003e\nSigned-off-by: Pablo Neira Ayuso \u003cpablo@netfilter.org\u003e\n"
    },
    {
      "commit": "1ed2f73d90fb49bcf5704aee7e9084adb882bfc5",
      "tree": "d1a42f9069ef44c5d84157192ff3b2222ab830ab",
      "parents": [
        "4319cc0cf5bb894b7368008cdf6dd20eb8868018"
      ],
      "author": {
        "name": "Fernando Luis Vazquez Cao",
        "email": "fernando@oss.ntt.co.jp",
        "time": "Tue May 10 10:00:21 2011 +0200"
      },
      "committer": {
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org",
        "time": "Tue May 10 10:00:21 2011 +0200"
      },
      "message": "netfilter: IPv6: fix DSCP mangle code\n\nThe mask indicates the bits one wants to zero out, so it needs to be\ninverted before applying to the original TOS field.\n\nSigned-off-by: Fernando Luis Vazquez Cao \u003cfernando@oss.ntt.co.jp\u003e\nSigned-off-by: Pablo Neira Ayuso \u003cpablo@netfilter.org\u003e\n"
    },
    {
      "commit": "4319cc0cf5bb894b7368008cdf6dd20eb8868018",
      "tree": "5ca875d740316146cda6468fb992cf7ddf8ebf1f",
      "parents": [
        "7a4f0761fce32ff4918a7c23b08db564ad33092d"
      ],
      "author": {
        "name": "Fernando Luis Vazquez Cao",
        "email": "fernando@oss.ntt.co.jp",
        "time": "Tue May 10 09:55:44 2011 +0200"
      },
      "committer": {
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org",
        "time": "Tue May 10 09:55:44 2011 +0200"
      },
      "message": "netfilter: IPv6: initialize TOS field in REJECT target module\n\nThe IPv6 header is not zeroed out in alloc_skb so we must initialize\nit properly unless we want to see IPv6 packets with random TOS fields\nfloating around. The current implementation resets the flow label\nbut this could be changed if deemed necessary.\n\nWe stumbled upon this issue when trying to apply a mangle rule to\nthe RST packet generated by the REJECT target module.\n\nSigned-off-by: Fernando Luis Vazquez Cao \u003cfernando@oss.ntt.co.jp\u003e\nSigned-off-by: Pablo Neira Ayuso \u003cpablo@netfilter.org\u003e\n"
    },
    {
      "commit": "7a4f0761fce32ff4918a7c23b08db564ad33092d",
      "tree": "20a123407182d544a8cbaa4d850e2ac96d3cfb37",
      "parents": [
        "1ae132b0347907ac95b8bc9dba37934f59d2a508"
      ],
      "author": {
        "name": "Hans Schillstrom",
        "email": "hans@schillstrom.com",
        "time": "Tue May 03 22:09:31 2011 +0200"
      },
      "committer": {
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org",
        "time": "Tue May 10 09:52:47 2011 +0200"
      },
      "message": "IPVS: init and cleanup restructuring\n\nDESCRIPTION\nThis patch tries to restore the initial init and cleanup\nsequences that was before namspace patch.\nNetns also requires action when net devices unregister\nwhich has never been implemented. I.e this patch also\ncovers when a device moves into a network namespace,\nand has to be released.\n\nIMPLEMENTATION\nThe number of calls to register_pernet_device have been\nreduced to one for the ip_vs.ko\nSchedulers still have their own calls.\n\nThis patch adds a function __ip_vs_service_cleanup()\nand an enable flag for the netfilter hooks.\n\nThe nf hooks will be enabled when the first service is loaded\nand never disabled again, except when a namespace exit starts.\n\nSigned-off-by: Hans Schillstrom \u003chans@schillstrom.com\u003e\nAcked-by: Julian Anastasov \u003cja@ssi.bg\u003e\n[horms@verge.net.au: minor edit to changelog]\nSigned-off-by: Simon Horman \u003chorms@verge.net.au\u003e\n"
    },
    {
      "commit": "1ae132b0347907ac95b8bc9dba37934f59d2a508",
      "tree": "12d525adcb59dc199c9dd40924499bab03621c59",
      "parents": [
        "103a9778e07bcc0cd34b5c35a87281454eec719e"
      ],
      "author": {
        "name": "Hans Schillstrom",
        "email": "hans@schillstrom.com",
        "time": "Tue May 03 22:09:30 2011 +0200"
      },
      "committer": {
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org",
        "time": "Tue May 10 09:52:33 2011 +0200"
      },
      "message": "IPVS: Change of socket usage to enable name space exit.\n\nIf the sync daemons run in a name space while it crashes\nor get killed, there is no way to stop them except for a reboot.\nWhen all patches are there, ip_vs_core will handle register_pernet_(),\ni.e. ip_vs_sync_init() and ip_vs_sync_cleanup() will be removed.\n\nKernel threads should not increment the use count of a socket.\nBy calling sk_change_net() after creating a socket this is avoided.\nsock_release cant be used intead sk_release_kernel() should be used.\n\nThanks Eric W Biederman for your advices.\n\nSigned-off-by: Hans Schillstrom \u003chans@schillstrom.com\u003e\n[horms@verge.net.au: minor edit to changelog]\nSigned-off-by: Simon Horman \u003chorms@verge.net.au\u003e\n"
    },
    {
      "commit": "103a9778e07bcc0cd34b5c35a87281454eec719e",
      "tree": "0b4f2262a31df17d205a6ace7b1c7992c8ce1147",
      "parents": [
        "5a6351eecf8c87afed9c883bb6341d09406d74ba"
      ],
      "author": {
        "name": "Florian Westphal",
        "email": "fw@strlen.de",
        "time": "Thu Apr 21 10:58:25 2011 +0200"
      },
      "committer": {
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org",
        "time": "Tue May 10 09:52:17 2011 +0200"
      },
      "message": "netfilter: ebtables: only call xt_compat_add_offset once per rule\n\nThe optimizations in commit 255d0dc34068a976\n(netfilter: x_table: speedup compat operations) assume that\nxt_compat_add_offset is called once per rule.\n\nebtables however called it for each match/target found in a rule.\n\nThe match/watcher/target parser already returns the needed delta, so it\nis sufficient to move the xt_compat_add_offset call to a more reasonable\nlocation.\n\nWhile at it, also get rid of the unused COMPAT iterator macros.\n\nSigned-off-by: Florian Westphal \u003cfw@strlen.de\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "5a6351eecf8c87afed9c883bb6341d09406d74ba",
      "tree": "2e7262b7002c8f09abaedb9e4e91ec51fdb01299",
      "parents": [
        "315c34dae0069d0c67abd714bb846cd466289c7f"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Thu Apr 21 10:57:21 2011 +0200"
      },
      "committer": {
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org",
        "time": "Tue May 10 09:48:59 2011 +0200"
      },
      "message": "netfilter: fix ebtables compat support\n\ncommit 255d0dc34068a976 (netfilter: x_table: speedup compat operations)\nmade ebtables not working anymore.\n\n1) xt_compat_calc_jump() is not an exact match lookup\n2) compat_table_info() has a typo in xt_compat_init_offsets() call\n3) compat_do_replace() misses a xt_compat_init_offsets() call\n\nReported-by: dann frazier \u003cdannf@dannf.org\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "315c34dae0069d0c67abd714bb846cd466289c7f",
      "tree": "7b088aed5ecd78944bf90cb3010cd4ecaaa205f2",
      "parents": [
        "87e9af6cc67d842cd92b52b81f3f14e665e7ab05"
      ],
      "author": {
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org",
        "time": "Thu Apr 21 10:55:07 2011 +0200"
      },
      "committer": {
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org",
        "time": "Tue May 10 09:48:06 2011 +0200"
      },
      "message": "netfilter: ctnetlink: fix timestamp support for new conntracks\n\nThis patch fixes the missing initialization of the start time if\nthe timestamp support is enabled.\n\nlibnetfilter_conntrack/utils# conntrack -E \u0026\nlibnetfilter_conntrack/utils# ./conntrack_create\ntcp      6 109 ESTABLISHED src\u003d1.1.1.1 dst\u003d2.2.2.2 sport\u003d1025 dport\u003d21 packets\u003d0 bytes\u003d0 [UNREPLIED] src\u003d2.2.2.2 dst\u003d1.1.1.1 sport\u003d21 dport\u003d1025 packets\u003d0 bytes\u003d0 mark\u003d0 delta-time\u003d1303296401 use\u003d2\n\nSigned-off-by: Pablo Neira Ayuso \u003cpablo@netfilter.org\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "b9f47a3aaeabdce3b42829bbb27765fa340f76ba",
      "tree": "93e4f34b502b8ab2f345d1357ab4ed3dfa5c5911",
      "parents": [
        "9c412942a0bb19ba18f7bd939d42eff1e132a901"
      ],
      "author": {
        "name": "stephen hemminger",
        "email": "shemminger@vyatta.com",
        "time": "Wed May 04 10:04:56 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun May 08 15:51:57 2011 -0700"
      },
      "message": "tcp_cubic: limit delayed_ack ratio to prevent divide error\n\nTCP Cubic keeps a metric that estimates the amount of delayed\nacknowledgements to use in adjusting the window. If an abnormally\nlarge number of packets are acknowledged at once, then the update\ncould wrap and reach zero. This kind of ACK could only\nhappen when there was a large window and huge number of\nACK\u0027s were lost.\n\nThis patch limits the value of delayed ack ratio. The choice of 32\nis just a conservative value since normally it should be range of\n1 to 4 packets.\n\nSigned-off-by: Stephen Hemminger \u003cshemminger@vyatta.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a294865978b701e4d0d90135672749531b9a900d",
      "tree": "4edb7c20db20d81867562fc5cbc0d7c7b5a70df5",
      "parents": [
        "87e9af6cc67d842cd92b52b81f3f14e665e7ab05"
      ],
      "author": {
        "name": "Dan Rosenberg",
        "email": "drosenberg@vsecurity.com",
        "time": "Fri May 06 03:27:18 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri May 06 13:05:50 2011 -0700"
      },
      "message": "dccp: handle invalid feature options length\n\nA length of zero (after subtracting two for the type and len fields) for\nthe DCCPO_{CHANGE,CONFIRM}_{L,R} options will cause an underflow due to\nthe subtraction.  The subsequent code may read past the end of the\noptions value buffer when parsing.  I\u0027m unsure of what the consequences\nof this might be, but it\u0027s probably not good.\n\nSigned-off-by: Dan Rosenberg \u003cdrosenberg@vsecurity.com\u003e\nCc: stable@kernel.org\nAcked-by: Gerrit Renker \u003cgerrit@erg.abdn.ac.uk\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "64f3b9e203bd06855072e295557dca1485a2ecba",
      "tree": "f5aed4dc313db9ce9c98533d56ed9fd6db4bf596",
      "parents": [
        "ff538818f4a82c4cf02d2d6bd6ac5c7360b9d41d"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Wed May 04 10:02:26 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed May 04 14:04:07 2011 -0700"
      },
      "message": "net: ip_expire() must revalidate route\n\nCommit 4a94445c9a5c (net: Use ip_route_input_noref() in input path)\nadded a bug in IP defragmentation handling, in case timeout is fired.\n\nWhen a frame is defragmented, we use last skb dst field when building\nfinal skb. Its dst is valid, since we are in rcu read section.\n\nBut if a timeout occurs, we take first queued fragment to build one ICMP\nTIME EXCEEDED message. Problem is all queued skb have weak dst pointers,\nsince we escaped RCU critical section after their queueing. icmp_send()\nmight dereference a now freed (and possibly reused) part of memory.\n\nCalling skb_dst_drop() and ip_route_input_noref() to revalidate route is\nthe only possible choice.\n\nReported-by: Denys Fedoryshchenko \u003cdenys@visp.net.lb\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ff538818f4a82c4cf02d2d6bd6ac5c7360b9d41d",
      "tree": "e385bfa4e7c3e48c2c6c755987c3ba50d3d5aa98",
      "parents": [
        "6c8c44462ac8ac3f95929328f0c56e9e8b6dd524"
      ],
      "author": {
        "name": "Lucian Adrian Grijincu",
        "email": "lucian.grijincu@gmail.com",
        "time": "Sun May 01 01:44:01 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon May 02 16:12:14 2011 -0700"
      },
      "message": "sysctl: net: call unregister_net_sysctl_table where needed\n\nctl_table_headers registered with register_net_sysctl_table should\nhave been unregistered with the equivalent unregister_net_sysctl_table\n\nSigned-off-by: Lucian Adrian Grijincu \u003clucian.grijincu@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "41c31f318a5209922d051e293c61e4724daad11c",
      "tree": "23e17b3010423fcc721e524bd9a559703063191f",
      "parents": [
        "983960b159a75621855283030d92a80bea92e071"
      ],
      "author": {
        "name": "Lifeng Sun",
        "email": "lifongsun@gmail.com",
        "time": "Wed Apr 27 22:04:51 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon May 02 15:41:29 2011 -0700"
      },
      "message": "networking: inappropriate ioctl operation should return ENOTTY\n\nioctl() calls against a socket with an inappropriate ioctl operation\nare incorrectly returning EINVAL rather than ENOTTY:\n\n  [ENOTTY]\n      Inappropriate I/O control operation.\n\nBugLink: https://bugzilla.kernel.org/show_bug.cgi?id\u003d33992\n\nSigned-off-by: Lifeng Sun \u003clifongsun@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7cfd260910b881250cde76ba92ebe3cbf8493a8f",
      "tree": "4a5eb018c25ccacfd744ba6feb6b367fdd45d7da",
      "parents": [
        "a05d2ad1c1f391c7f514a1d1e09b5417968a7d07"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Sun May 01 02:04:11 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun May 01 23:17:50 2011 -0700"
      },
      "message": "ipv4: don\u0027t spam dmesg with \"Using LC-trie\" messages\n\nfib_trie_table() is called during netns creation and\nChromium uses clone(CLONE_NEWNET) to sandbox renderer process.\n\nDon\u0027t print anything.\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a05d2ad1c1f391c7f514a1d1e09b5417968a7d07",
      "tree": "911e711680c3328de540ec2530cd4bc3df3943b5",
      "parents": [
        "2b5a4ace664cfe05c17bee60c4da66263a05fccf"
      ],
      "author": {
        "name": "Eric W. Biederman",
        "email": "ebiederm@xmission.com",
        "time": "Sun Apr 24 01:54:57 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun May 01 23:16:28 2011 -0700"
      },
      "message": "af_unix: Only allow recv on connected seqpacket sockets.\n\nThis fixes the following oops discovered by Dan Aloni:\n\u003e Anyway, the following is the output of the Oops that I got on the\n\u003e Ubuntu kernel on which I first detected the problem\n\u003e (2.6.37-12-generic). The Oops that followed will be more useful, I\n\u003e guess.\n\n\u003e[ 5594.669852] BUG: unable to handle kernel NULL pointer dereference\n\u003e at           (null)\n\u003e [ 5594.681606] IP: [\u003cffffffff81550b7b\u003e] unix_dgram_recvmsg+0x1fb/0x420\n\u003e [ 5594.687576] PGD 2a05d067 PUD 2b951067 PMD 0\n\u003e [ 5594.693720] Oops: 0002 [#1] SMP\n\u003e [ 5594.699888] last sysfs file:\n\nThe bug was that unix domain sockets use a pseduo packet for\nconnecting and accept uses that psudo packet to get the socket.\nIn the buggy seqpacket case we were allowing unconnected\nsockets to call recvmsg and try to receive the pseudo packet.\n\nThat is always wrong and as of commit 7361c36c5 the pseudo\npacket had become enough different from a normal packet\nthat the kernel started oopsing.\n\nDo for seqpacket_recv what was done for seqpacket_send in 2.5\nand only allow it on connected seqpacket sockets.\n\nCc: stable@kernel.org\nTested-by: Dan Aloni \u003cdan@aloni.org\u003e\nSigned-off-by: Eric W. Biederman \u003cebiederm@xmission.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b3b270054b80e6195b1d2b2ce082239911261839",
      "tree": "abdebb8715a776d8ac9d8093ab84ffd8a2970f50",
      "parents": [
        "68972efa657040f891c7eda07c7da8c8dd576788"
      ],
      "author": {
        "name": "Peter Korsgaard",
        "email": "jacmet@sunsite.dk",
        "time": "Tue Apr 26 01:45:41 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 28 13:35:44 2011 -0700"
      },
      "message": "dsa/mv88e6131: fix unknown multicast/broadcast forwarding on mv88e6085\n\nThe 88e6085 has a few differences from the other devices in the port\ncontrol registers, causing unknown multicast/broadcast packets to get\ndropped when using the standard port setup.\n\nAt the same time update kconfig to clarify that the mv88e6085 is now\nsupported.\n\nSigned-off-by: Peter Korsgaard \u003cjacmet@sunsite.dk\u003e\nAcked-by: Lennert Buytenhek \u003cbuytenh@wantstofly.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7833aa05b8db63484b43b4b4c389cd4533140afb",
      "tree": "7540e5cef5c96e0a0bcef2baf5360511885ce3b2",
      "parents": [
        "c0a56e64aec331f33ead29ba493ee184d9bdc840"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Mon Apr 25 19:41:21 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 26 12:46:04 2011 -0700"
      },
      "message": "xfrm: Check for the new replay implementation if an esn state is inserted\n\nIPsec extended sequence numbers can be used only with the new\nanti-replay window implementation. So check if the new implementation\nis used if an esn state is inserted and return an error if it is not.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c0a56e64aec331f33ead29ba493ee184d9bdc840",
      "tree": "609d6b30b77dd7f129789d93e9d3fbc584791267",
      "parents": [
        "3f602b08dec32c418fc391fc838db357aab84f8a"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Mon Apr 25 19:40:23 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 26 12:46:04 2011 -0700"
      },
      "message": "esp6: Fix scatterlist initialization\n\nWhen we use IPsec extended sequence numbers, we may overwrite\nthe last scatterlist of the associated data by the scatterlist\nfor the skb. This patch fixes this by placing the scatterlist\nfor the skb right behind the last scatterlist of the associated\ndata. esp4 does it already like that.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3f602b08dec32c418fc391fc838db357aab84f8a",
      "tree": "743671d99f90e3d2ffc2c915c2aa91b20abada43",
      "parents": [
        "0972ddb2373d5e127aabdcabd8305eff0242cd0b"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Mon Apr 25 19:39:24 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 26 12:46:03 2011 -0700"
      },
      "message": "xfrm: Fix replay window size calculation on initialization\n\nOn replay initialization, we compute the size of the replay\nbuffer to see if the replay window fits into the buffer.\nThis computation lacks a mutliplication by 8 because we need\nthe size in bit, not in byte. So we might return an error\neven though the replay window would fit into the buffer.\nThis patch fixes this issue.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0972ddb2373d5e127aabdcabd8305eff0242cd0b",
      "tree": "6040853adf2a2aac1df2551e3e7695e902a03905",
      "parents": [
        "8c61d9d611cb5b290f1b4ac57c4631acfd6e3b5a"
      ],
      "author": {
        "name": "Held Bernhard",
        "email": "berny156@gmx.de",
        "time": "Sun Apr 24 22:07:32 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Apr 25 11:53:08 2011 -0700"
      },
      "message": "net: provide cow_metrics() methods to blackhole dst_ops\n\nSince commit 62fa8a846d7d (net: Implement read-only protection and COW\u0027ing\nof metrics.) the kernel throws an oops.\n\n[  101.620985] BUG: unable to handle kernel NULL pointer dereference at\n           (null)\n[  101.621050] IP: [\u003c          (null)\u003e]           (null)\n[  101.621084] PGD 6e53c067 PUD 3dd6a067 PMD 0\n[  101.621122] Oops: 0010 [#1] SMP\n[  101.621153] last sysfs file: /sys/devices/virtual/ppp/ppp/uevent\n[  101.621192] CPU 2\n[  101.621206] Modules linked in: l2tp_ppp pppox ppp_generic slhc\nl2tp_netlink l2tp_core deflate zlib_deflate twofish_x86_64\ntwofish_common des_generic cbc ecb sha1_generic hmac af_key\niptable_filter snd_pcm_oss snd_mixer_oss snd_seq snd_seq_device loop\nsnd_hda_codec_hdmi snd_hda_codec_realtek snd_hda_intel snd_hda_codec\nsnd_pcm snd_timer snd i2c_i801 iTCO_wdt psmouse soundcore snd_page_alloc\nevdev uhci_hcd ehci_hcd thermal\n[  101.621552]\n[  101.621567] Pid: 5129, comm: openl2tpd Not tainted 2.6.39-rc4-Quad #3\nGigabyte Technology Co., Ltd. G33-DS3R/G33-DS3R\n[  101.621637] RIP: 0010:[\u003c0000000000000000\u003e]  [\u003c          (null)\u003e]   (null)\n[  101.621684] RSP: 0018:ffff88003ddeba60  EFLAGS: 00010202\n[  101.621716] RAX: ffff88003ddb5600 RBX: ffff88003ddb5600 RCX:\n0000000000000020\n[  101.621758] RDX: ffffffff81a69a00 RSI: ffffffff81b7ee61 RDI:\nffff88003ddb5600\n[  101.621800] RBP: ffff8800537cd900 R08: 0000000000000000 R09:\nffff88003ddb5600\n[  101.621840] R10: 0000000000000005 R11: 0000000000014b38 R12:\nffff88003ddb5600\n[  101.621881] R13: ffffffff81b7e480 R14: ffffffff81b7e8b8 R15:\nffff88003ddebad8\n[  101.621924] FS:  00007f06e4182700(0000) GS:ffff88007fd00000(0000)\nknlGS:0000000000000000\n[  101.621971] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  101.622005] CR2: 0000000000000000 CR3: 0000000045274000 CR4:\n00000000000006e0\n[  101.622046] DR0: 0000000000000000 DR1: 0000000000000000 DR2:\n0000000000000000\n[  101.622087] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7:\n0000000000000400\n[  101.622129] Process openl2tpd (pid: 5129, threadinfo\nffff88003ddea000, task ffff88003de9a280)\n[  101.622177] Stack:\n[  101.622191]  ffffffff81447efa ffff88007d3ded80 ffff88003de9a280\nffff88007d3ded80\n[  101.622245]  0000000000000001 ffff88003ddebbb8 ffffffff8148d5a7\n0000000000000212\n[  101.622299]  ffff88003dcea000 ffff88003dcea188 ffffffff00000001\nffffffff81b7e480\n[  101.622353] Call Trace:\n[  101.622374]  [\u003cffffffff81447efa\u003e] ? ipv4_blackhole_route+0x1ba/0x210\n[  101.622415]  [\u003cffffffff8148d5a7\u003e] ? xfrm_lookup+0x417/0x510\n[  101.622450]  [\u003cffffffff8127672a\u003e] ? extract_buf+0x9a/0x140\n[  101.622485]  [\u003cffffffff8144c6a0\u003e] ? __ip_flush_pending_frames+0x70/0x70\n[  101.622526]  [\u003cffffffff8146fbbf\u003e] ? udp_sendmsg+0x62f/0x810\n[  101.622562]  [\u003cffffffff813f98a6\u003e] ? sock_sendmsg+0x116/0x130\n[  101.622599]  [\u003cffffffff8109df58\u003e] ? find_get_page+0x18/0x90\n[  101.622633]  [\u003cffffffff8109fd6a\u003e] ? filemap_fault+0x12a/0x4b0\n[  101.622668]  [\u003cffffffff813fb5c4\u003e] ? move_addr_to_kernel+0x64/0x90\n[  101.622706]  [\u003cffffffff81405d5a\u003e] ? verify_iovec+0x7a/0xf0\n[  101.622739]  [\u003cffffffff813fc772\u003e] ? sys_sendmsg+0x292/0x420\n[  101.622774]  [\u003cffffffff810b994a\u003e] ? handle_pte_fault+0x8a/0x7c0\n[  101.622810]  [\u003cffffffff810b76fe\u003e] ? __pte_alloc+0xae/0x130\n[  101.622844]  [\u003cffffffff810ba2f8\u003e] ? handle_mm_fault+0x138/0x380\n[  101.622880]  [\u003cffffffff81024af9\u003e] ? do_page_fault+0x189/0x410\n[  101.622915]  [\u003cffffffff813fbe03\u003e] ? sys_getsockname+0xf3/0x110\n[  101.622952]  [\u003cffffffff81450c4d\u003e] ? ip_setsockopt+0x4d/0xa0\n[  101.622986]  [\u003cffffffff813f9932\u003e] ? sockfd_lookup_light+0x22/0x90\n[  101.623024]  [\u003cffffffff814b61fb\u003e] ? system_call_fastpath+0x16/0x1b\n[  101.623060] Code:  Bad RIP value.\n[  101.623090] RIP  [\u003c          (null)\u003e]           (null)\n[  101.623125]  RSP \u003cffff88003ddeba60\u003e\n[  101.623146] CR2: 0000000000000000\n[  101.650871] ---[ end trace ca3856a7d8e8dad4 ]---\n[  101.651011] __sk_free: optmem leakage (160 bytes) detected.\n\nThe oops happens in dst_metrics_write_ptr()\ninclude/net/dst.h:124: return dst-\u003eops-\u003ecow_metrics(dst, p);\n\ndst-\u003eops-\u003ecow_metrics is NULL and causes the oops.\n\nProvide cow_metrics() methods, like we did in commit 214f45c91bb\n(net: provide default_advmss() methods to blackhole dst_ops)\n\nSigned-off-by: Held Bernhard \u003cberny156@gmx.de\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1ed3aad141fe595673c20225a9e004730088be52",
      "tree": "dec75e69b602e677ba0e5231f2d3036663fbd66a",
      "parents": [
        "f01cb5fbea1c1613621f9f32f385e12c1a29dde0",
        "069f40fc07f6df3da325e7ea1698a0d6247983d5"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Apr 22 13:21:38 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Apr 22 13:21:38 2011 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "f01cb5fbea1c1613621f9f32f385e12c1a29dde0",
      "tree": "011167bc13e0911a6638abce448098dee952c371",
      "parents": [
        "cb771838715b1c470bc5735bdae709b33b18e0ad"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 21 21:17:25 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 21 21:17:25 2011 -0700"
      },
      "message": "Revert \"bridge: Forward reserved group addresses if !STP\"\n\nThis reverts commit 1e253c3b8a1aeed51eef6fc366812f219b97de65.\n\nIt breaks 802.3ad bonding inside of a bridge.\n\nThe commit was meant to support transport bridging, and specifically\nvirtual machines bridged to an ethernet interface connected to a\nswitch port wiht 802.1x enabled.\n\nBut this isn\u0027t the way to do it, it breaks too many other things.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e965c05dabdabb85af0187952ccd75e43995c4b3",
      "tree": "10923ab7f6e5aaae3e432218d6492e07a7f83981",
      "parents": [
        "e2a85aecebc03d165bc2dcd233deadd5dd97ea9f"
      ],
      "author": {
        "name": "Thomas Egerer",
        "email": "thomas.egerer@secunet.com",
        "time": "Wed Apr 20 22:56:02 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 21 17:24:08 2011 -0700"
      },
      "message": "ipv6: Remove hoplimit initialization to -1\n\nThe changes introduced with git-commit a02e4b7d (\"ipv6: Demark default\nhoplimit as zero.\") missed to remove the hoplimit initialization. As a\nresult, ipv6_get_mtu interprets the return value of dst_metric_raw\n(-1) as 255 and answers ping6 with this hoplimit.  This patche removes\nthe line such that ping6 is answered with the hoplimit value\nconfigured via sysctl.\n\nSigned-off-by: Thomas Egerer \u003cthomas.egerer@secunet.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a9cf73ea7ff78f52662c8658d93c226effbbedde",
      "tree": "07a723cb628f223e4f756f0cb02eeba8b6ee9c62",
      "parents": [
        "10022a6c66e199d8f61d9044543f38785713cbbd"
      ],
      "author": {
        "name": "Shan Wei",
        "email": "shanwei@cn.fujitsu.com",
        "time": "Tue Apr 19 22:52:49 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 21 10:39:10 2011 -0700"
      },
      "message": "ipv6: udp: fix the wrong headroom check\n\nAt this point, skb-\u003edata points to skb_transport_header.\nSo, headroom check is wrong.\n\nFor some case:bridge(UFO is on) + eth device(UFO is off),\nthere is no enough headroom for IPv6 frag head.\nBut headroom check is always false.\n\nThis will bring about data be moved to there prior to skb-\u003ehead,\nwhen adding IPv6 frag header to skb.\n\nSigned-off-by: Shan Wei \u003cshanwei@cn.fujitsu.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "243e6df4ed919880d079d717641ad699c6530a03",
      "tree": "dafe7720e68fcb8e9ce1d5d871386b9e6380f67b",
      "parents": [
        "10e99777e926907e43fa57ec1208c3f7787fd290"
      ],
      "author": {
        "name": "Johannes Berg",
        "email": "johannes.berg@intel.com",
        "time": "Tue Apr 19 20:44:04 2011 +0200"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed Apr 20 16:05:59 2011 -0400"
      },
      "message": "mac80211: fix SMPS debugfs locking\n\nThe locking with SMPS requests means that the\ndebugs file should lock the mgd mutex, not the\niflist mutex. Calls to __ieee80211_request_smps()\nneed to hold that mutex, so add an assertion.\n\nThis has always been wrong, but for some reason\nnever been noticed, probably because the locking\nerror only happens while unassociated.\n\nCc: stable@kernel.org [2.6.34+]\nSigned-off-by: Johannes Berg \u003cjohannes.berg@intel.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "10022a6c66e199d8f61d9044543f38785713cbbd",
      "tree": "8b934ebc8a5a5277a486413c343afc35a55076bd",
      "parents": [
        "2430af8b7fa37ac0be102c77f9dc6ee669d24ba9"
      ],
      "author": {
        "name": "Oliver Hartkopp",
        "email": "socketcan@hartkopp.net",
        "time": "Wed Apr 20 01:57:15 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 20 12:37:59 2011 -0700"
      },
      "message": "can: add missing socket check in can/raw release\n\nv2: added space after \u0027if\u0027 according code style.\n\nWe can get here with a NULL socket argument passed from userspace,\nso we need to handle it accordingly.\n\nThanks to Dave Jones pointing at this issue in net/can/bcm.c\n\nSigned-off-by: Oliver Hartkopp \u003csocketcan@hartkopp.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c6914a6f261aca0c9f715f883a353ae7ff51fe83",
      "tree": "05138f623ae01c13dbfeb5e9b38ae1b5e1bdde73",
      "parents": [
        "0b0dc0f17f98b59772ca6380c7d5ce4cc593a974"
      ],
      "author": {
        "name": "Dave Jones",
        "email": "davej@redhat.com",
        "time": "Tue Apr 19 20:36:59 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 19 20:36:59 2011 -0700"
      },
      "message": "can: Add missing socket check in can/bcm release.\n\nWe can get here with a NULL socket argument passed from userspace,\nso we need to handle it accordingly.\n\nSigned-off-by: Dave Jones \u003cdavej@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0b0dc0f17f98b59772ca6380c7d5ce4cc593a974",
      "tree": "1f1248a3402d519f522efaf91b68c8f85e2436bc",
      "parents": [
        "0553c891fabd287726b41076cfd03fe7e5ab596f",
        "a8a8a0937e22a5fd55aeb22586724ba6bb70aadd"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 19 11:28:35 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 19 11:28:35 2011 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6\n"
    },
    {
      "commit": "a8a8a0937e22a5fd55aeb22586724ba6bb70aadd",
      "tree": "28e610c98f0f71e42e9676fc3e3e6bb9fe112056",
      "parents": [
        "eafbd3fde6fc5ada0d61307367e408813b04928a"
      ],
      "author": {
        "name": "Jozsef Kadlecsik",
        "email": "kadlec@blackhole.kfki.hu",
        "time": "Tue Apr 19 15:59:15 2011 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Tue Apr 19 15:59:15 2011 +0200"
      },
      "message": "netfilter: ipset: Fix the order of listing of sets\n\nA restoreable saving of sets requires that list:set type of sets\ncome last and the code part which should have taken into account\nthe ordering was broken. The patch fixes the listing order.\n\nSigned-off-by: Jozsef Kadlecsik \u003ckadlec@blackhole.kfki.hu\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "a429b51930e64dd355840c37251a563000d7c10b",
      "tree": "24e69908100bf6297cb5c5597f2d1dcd970bfe7f",
      "parents": [
        "f21ca5fff6e548833fa5ee8867239a8378623150"
      ],
      "author": {
        "name": "Ruiyi Zhang",
        "email": "Ruiyi.zhang@atheros.com",
        "time": "Mon Apr 18 11:04:30 2011 +0800"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Mon Apr 18 20:11:47 2011 -0300"
      },
      "message": "Bluetooth: Only keeping SAR bits when retransmitting one frame.\n\nWhen retrasmitting one frame, only SAR bits in control field should\nbe kept.\n\nSigned-off-by: Ruiyi Zhang \u003cRuiyi.zhang@atheros.com\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "f21ca5fff6e548833fa5ee8867239a8378623150",
      "tree": "995070264806b7cf2dc6d916a8b90f976656c412",
      "parents": [
        "b79f44c16a4e2181b1d6423afe746745d5e949ff"
      ],
      "author": {
        "name": "Luiz Augusto von Dentz",
        "email": "luiz.dentz-von@nokia.com",
        "time": "Fri Apr 08 17:10:41 2011 +0300"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Mon Apr 18 20:11:46 2011 -0300"
      },
      "message": "Bluetooth: fix shutdown on SCO sockets\n\nshutdown should wait for SCO link to be properly disconnected before\ndetroying the socket, otherwise an application using the socket may\nassume link is properly disconnected before it really happens which\ncan be a problem when e.g synchronizing profile switch.\n\nSigned-off-by: Luiz Augusto von Dentz \u003cluiz.dentz-von@nokia.com\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "b79f44c16a4e2181b1d6423afe746745d5e949ff",
      "tree": "e8e90fb0519bd74395adf5205693b5afec920266",
      "parents": [
        "7a74aeb022b34a8fa8ef00545e66cf0568b5ddf6"
      ],
      "author": {
        "name": "Vinicius Costa Gomes",
        "email": "vinicius.gomes@openbossa.org",
        "time": "Mon Apr 11 18:46:55 2011 -0300"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Mon Apr 18 20:11:46 2011 -0300"
      },
      "message": "Bluetooth: Fix keeping the command timer running\n\nIn the teardown path the reset command is sent to the controller,\nthis event causes the command timer to be reactivated.\n\nSo the timer is removed in two situations, when the adapter isn\u0027t\nmarked as UP and when we know that some command has been sent.\n\nReported-by: Keith Packard \u003ckeithp@keithp.com\u003e\nSigned-off-by: Vinicius Costa Gomes \u003cvinicius.gomes@openbossa.org\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "7a74aeb022b34a8fa8ef00545e66cf0568b5ddf6",
      "tree": "82a938a29207cdc7908c450b9a907dad00b316c9",
      "parents": [
        "332704a51498a7e29aa92c19dc03f11f80b71bfe"
      ],
      "author": {
        "name": "Ville Tervo",
        "email": "ville.tervo@nokia.com",
        "time": "Thu Apr 07 14:59:50 2011 +0300"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Mon Apr 18 20:11:45 2011 -0300"
      },
      "message": "Bluetooth: Fix refcount balance for hci connection\n\nhci_io_capa_reply_evt() holds reference for hciconnection. It\u0027s useless since\nhci_io_capa_request_evt()/hci_simple_pair_complete_evt() already protects the\nconnection. In addition it leaves connection open after failed SSP pairing.\n\nSigned-off-by: Ville Tervo \u003cville.tervo@nokia.com\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "c65353daf137dd41f3ede3baf62d561fca076228",
      "tree": "407488cc052fff615d61c889100a76e057c1f203",
      "parents": [
        "49b4947aae404c8c5758ffd1007d0d78c48b3643"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Thu Apr 14 05:55:37 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 14 23:26:02 2011 -0700"
      },
      "message": "ip: ip_options_compile() resilient to NULL skb route\n\nScot Doyle demonstrated ip_options_compile() could be called with an skb\nwithout an attached route, using a setup involving a bridge, netfilter,\nand forged IP packets.\n\nLet\u0027s make ip_options_compile() and ip_options_rcv_srr() a bit more\nrobust, instead of changing bridge/netfilter code.\n\nWith help from Hiroaki SHIMODA.\n\nReported-by: Scot Doyle \u003clkml@scotdoyle.com\u003e\nTested-by: Scot Doyle \u003clkml@scotdoyle.com\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nCc: Stephen Hemminger \u003cshemminger@vyatta.com\u003e\nAcked-by: Hiroaki SHIMODA \u003cshimoda.hiroaki@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3e8c806a08c7beecd972e7ce15c570b9aba64baa",
      "tree": "89b0b7bfc919ec8e7dc0866f16715bb626af0cc6",
      "parents": [
        "91a403caf0f26c71ce4407fd235b2d6fb225fba9"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 13 12:01:14 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 13 12:01:14 2011 -0700"
      },
      "message": "Revert \"tcp: disallow bind() to reuse addr/port\"\n\nThis reverts commit c191a836a908d1dd6b40c503741f91b914de3348.\n\nIt causes known regressions for programs that expect to be able to use\nSO_REUSEADDR to shutdown a socket, then successfully rebind another\nsocket to the same ID.\n\nPrograms such as haproxy and amavisd expect this to work.\n\nThis should fix kernel bugzilla 32832.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "eafbd3fde6fc5ada0d61307367e408813b04928a",
      "tree": "4a8a2f60317d3f50b5633e47023e4fdcb0d0408d",
      "parents": [
        "0e8a835aa59d08d702af0fcfd296e2218b2e344b"
      ],
      "author": {
        "name": "Jozsef Kadlecsik",
        "email": "kadlec@blackhole.kfki.hu",
        "time": "Wed Apr 13 13:45:57 2011 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Wed Apr 13 13:45:57 2011 +0200"
      },
      "message": "netfilter: ipset: set match and SET target fixes\n\nThe SET target with --del-set did not work due to using wrongly\nthe internal dimension of --add-set instead of --del-set.\nAlso, the checkentries did not release the set references when\nreturned an error. Bugs reported by Lennert Buytenhek.\n\nSigned-off-by: Jozsef Kadlecsik \u003ckadlec@blackhole.kfki.hu\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "0e8a835aa59d08d702af0fcfd296e2218b2e344b",
      "tree": "cfc99302895c328a9f394ead9695e8e99ac92de1",
      "parents": [
        "b32e3dc7860d00124fa432dba09667e647cb9bcc"
      ],
      "author": {
        "name": "Jozsef Kadlecsik",
        "email": "kadlec@blackhole.kfki.hu",
        "time": "Wed Apr 13 13:43:23 2011 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Wed Apr 13 13:43:23 2011 +0200"
      },
      "message": "netfilter: ipset: bitmap:ip,mac type requires \"src\" for MAC\n\nEnforce that the second \"src/dst\" parameter of the set match and SET target\nmust be \"src\", because we have access to the source MAC only in the packet.\nThe previous behaviour, that the type required the second parameter\nbut actually ignored the value was counter-intuitive and confusing.\n\nSigned-off-by: Jozsef Kadlecsik \u003ckadlec@blackhole.kfki.hu\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "9494c7c5774d64a84a269aad38c153c4dbff97e6",
      "tree": "03d1eb5fffa30789455f12fb59bbd917e465e8c9",
      "parents": [
        "25f7bf7d0dfb460505cbe42676340e33100aca2e"
      ],
      "author": {
        "name": "Wei Yongjun",
        "email": "yjwei@cn.fujitsu.com",
        "time": "Tue Apr 12 15:22:22 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 12 19:33:51 2011 -0700"
      },
      "message": "sctp: fix oops while removed transport still using as retran path\n\nSince we can not update retran path to unconfirmed transports,\nwhen we remove a peer, the retran path may not be update if the\nother transports are all unconfirmed, and we will still using\nthe removed transport as the retran path. This may cause panic\nif retrasnmit happen.\n\nSigned-off-by: Wei Yongjun \u003cyjwei@cn.fujitsu.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "25f7bf7d0dfb460505cbe42676340e33100aca2e",
      "tree": "76467af7ca483f836f9acc2fc73f000db6223a4e",
      "parents": [
        "31d8b9e099e59f880aa65095951559896d4e20fa"
      ],
      "author": {
        "name": "Vlad Yasevich",
        "email": "vladislav.yasevich@hp.com",
        "time": "Tue Apr 12 15:20:48 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 12 19:33:50 2011 -0700"
      },
      "message": "sctp: fix oops when updating retransmit path with DEBUG on\n\ncommit fbdf501c9374966a56829ecca3a7f25d2b49a305\n  sctp: Do no select unconfirmed transports for retransmissions\n\nIntroduced the initial falt.\n\ncommit d598b166ced20d9b9281ea3527c0e18405ddb803\n  sctp: Make sure we always return valid retransmit path\n\nSolved the problem, but forgot to change the DEBUG statement.\nThus it was still possible to dereference a NULL pointer.\n\nSigned-off-by: Wei Yongjun \u003cyjwei@cn.fujitsu.com\u003e\nSigned-off-by: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "31d8b9e099e59f880aa65095951559896d4e20fa",
      "tree": "e6bd8f1efe81265603bf982e135522c54ed81377",
      "parents": [
        "ea2d36883ca8e6caab23b6d15bfa80b1d1d81d2f"
      ],
      "author": {
        "name": "Ben Hutchings",
        "email": "bhutchings@solarflare.com",
        "time": "Tue Apr 12 14:47:15 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 12 19:29:45 2011 -0700"
      },
      "message": "net: Disable NETIF_F_TSO_ECN when TSO is disabled\n\nNETIF_F_TSO_ECN has no effect when TSO is disabled; this just means\nthat feature state will be accurately reported to user-space.\n\nSigned-off-by: Ben Hutchings \u003cbhutchings@solarflare.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ea2d36883ca8e6caab23b6d15bfa80b1d1d81d2f",
      "tree": "38818d7330814e276b5e651ec4540ac2eb41d774",
      "parents": [
        "c0212fb146bf3e77cd6b28a06b8f503e2974fdc8"
      ],
      "author": {
        "name": "Ben Hutchings",
        "email": "bhutchings@solarflare.com",
        "time": "Tue Apr 12 14:38:37 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 12 19:29:45 2011 -0700"
      },
      "message": "net: Disable all TSO features when SG is disabled\n\nThe feature flags NETIF_F_TSO and NETIF_F_TSO6 independently enable\nTSO for IPv4 and IPv6 respectively.  However, the test in\nnetdev_fix_features() and its predecessor functions was never updated\nto check for NETIF_F_TSO6, possibly because it was originally proposed\nthat TSO for IPv6 would be dependent on both feature flags.\n\nNow that these feature flags can be changed independently from\nuser-space and we depend on netdev_fix_features() to fix invalid\nfeature combinations, it\u0027s important to disable them both if\nscatter-gather is disabled.  Also disable NETIF_F_TSO_ECN so\nuser-space sees all TSO features as disabled.\n\nSigned-off-by: Ben Hutchings \u003cbhutchings@solarflare.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "bfac3693c426d280b026f6a1b77dc2294ea43fea",
      "tree": "25435a6df564c1f0f33f31ab86f5b786bc502817",
      "parents": [
        "020318d0d2af51e0fd59ba654ede9b2171558720"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 12 15:33:23 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 12 15:33:23 2011 -0700"
      },
      "message": "ieee802154: Remove hacked CFLAGS in net/ieee802154/Makefile\n\nIt adds -Wall (which the kernel carefully controls already) and of all\nthings -DDEBUG (which should be set by other means if desired, please\nwe have dynamic-debug these days).\n\nKill this noise.\n\nReported-by: Dave Jones \u003cdavej@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "020318d0d2af51e0fd59ba654ede9b2171558720",
      "tree": "9b1e7094790e5559bb4fe89719e626d7bee851da",
      "parents": [
        "3d894a9c1959acaa6981283619b465f75f7e535e"
      ],
      "author": {
        "name": "Dave Jones",
        "email": "davej@redhat.com",
        "time": "Tue Apr 12 15:29:54 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 12 15:29:54 2011 -0700"
      },
      "message": "irda: fix locking unbalance in irda_sendmsg\n\n5b40964eadea40509d353318d2c82e8b7bf5e8a5 (\"irda: Remove BKL instances\nfrom af_irda.c\") introduced a path where we have a locking unbalance.\nIf we pass invalid flags, we unlock a socket we never locked,\nresulting in this...\n\n\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\n[ BUG: bad unlock balance detected! ]\n-------------------------------------\ntrinity/20101 is trying to release lock (sk_lock-AF_IRDA) at:\n[\u003cffffffffa057f001\u003e] irda_sendmsg+0x207/0x21d [irda]\nbut there are no more locks to release!\n\nother info that might help us debug this:\nno locks held by trinity/20101.\n\nstack backtrace:\nPid: 20101, comm: trinity Not tainted 2.6.39-rc3+ #3\nCall Trace:\n [\u003cffffffffa057f001\u003e] ? irda_sendmsg+0x207/0x21d [irda]\n [\u003cffffffff81085041\u003e] print_unlock_inbalance_bug+0xc7/0xd2\n [\u003cffffffffa057f001\u003e] ? irda_sendmsg+0x207/0x21d [irda]\n [\u003cffffffff81086aca\u003e] lock_release+0xcf/0x18e\n [\u003cffffffff813ed190\u003e] release_sock+0x2d/0x155\n [\u003cffffffffa057f001\u003e] irda_sendmsg+0x207/0x21d [irda]\n [\u003cffffffff813e9f8c\u003e] __sock_sendmsg+0x69/0x75\n [\u003cffffffff813ea105\u003e] sock_sendmsg+0xa1/0xb6\n [\u003cffffffff81100ca3\u003e] ? might_fault+0x5c/0xac\n [\u003cffffffff81086b7c\u003e] ? lock_release+0x181/0x18e\n [\u003cffffffff81100cec\u003e] ? might_fault+0xa5/0xac\n [\u003cffffffff81100ca3\u003e] ? might_fault+0x5c/0xac\n [\u003cffffffff81133b94\u003e] ? fcheck_files+0xb9/0xf0\n [\u003cffffffff813f387a\u003e] ? copy_from_user+0x2f/0x31\n [\u003cffffffff813f3b70\u003e] ? verify_iovec+0x52/0xa6\n [\u003cffffffff813eb4e3\u003e] sys_sendmsg+0x23a/0x2b8\n [\u003cffffffff81086b7c\u003e] ? lock_release+0x181/0x18e\n [\u003cffffffff810773c6\u003e] ? up_read+0x28/0x2c\n [\u003cffffffff814bec3d\u003e] ? do_page_fault+0x360/0x3b4\n [\u003cffffffff81087043\u003e] ? trace_hardirqs_on_caller+0x10b/0x12f\n [\u003cffffffff810458aa\u003e] ? finish_task_switch+0xb2/0xe3\n [\u003cffffffff8104583e\u003e] ? finish_task_switch+0x46/0xe3\n [\u003cffffffff8108364a\u003e] ? trace_hardirqs_off_caller+0x33/0x90\n [\u003cffffffff814bbaf9\u003e] ? retint_swapgs+0x13/0x1b\n [\u003cffffffff81087043\u003e] ? trace_hardirqs_on_caller+0x10b/0x12f\n [\u003cffffffff810a9dd3\u003e] ? audit_syscall_entry+0x11c/0x148\n [\u003cffffffff8125609e\u003e] ? trace_hardirqs_on_thunk+0x3a/0x3f\n [\u003cffffffff814c22c2\u003e] system_call_fastpath+0x16/0x1b\n\nSigned-off-by: Dave Jones \u003cdavej@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "192910a6cca5e50e5bd6cbd1da0e7376c7adfe62",
      "tree": "c7638554eb015ac8a1306d6916c047adc164e960",
      "parents": [
        "66944e1c5797562cebe2d1857d46dff60bf9a69e"
      ],
      "author": {
        "name": "Joakim Tjernlund",
        "email": "Joakim.Tjernlund@transmode.se",
        "time": "Tue Apr 12 13:59:33 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 12 13:59:33 2011 -0700"
      },
      "message": "net: Do not wrap sysctl igmp_max_memberships in IP_MULTICAST\n\ncontrolling igmp_max_membership is useful even when IP_MULTICAST\nis off.\nQuagga(an OSPF deamon) uses multicast addresses for all interfaces\nusing a single socket and hits igmp_max_membership limit when\nthere are 20 interfaces or more.\nAlways export sysctl igmp_max_memberships in proc, just like\nigmp_max_msf\n\nSigned-off-by: Joakim Tjernlund \u003cJoakim.Tjernlund@transmode.se\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "66944e1c5797562cebe2d1857d46dff60bf9a69e",
      "tree": "8e7ff0099a1298daa15286788c2bfc7f395e3d74",
      "parents": [
        "f8e9881c2aef1e982e5abc25c046820cd0b7cf64"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Mon Apr 11 22:39:40 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 12 13:58:33 2011 -0700"
      },
      "message": "inetpeer: reduce stack usage\n\nOn 64bit arches, we use 752 bytes of stack when cleanup_once() is called\nfrom inet_getpeer().\n\nLets share the avl stack to save ~376 bytes.\n\nBefore patch :\n\n# objdump -d net/ipv4/inetpeer.o | scripts/checkstack.pl\n\n0x000006c3 unlink_from_pool [inetpeer.o]:\t\t376\n0x00000721 unlink_from_pool [inetpeer.o]:\t\t376\n0x00000cb1 inet_getpeer [inetpeer.o]:\t\t\t376\n0x00000e6d inet_getpeer [inetpeer.o]:\t\t\t376\n0x0004 inet_initpeers [inetpeer.o]:\t\t\t112\n# size net/ipv4/inetpeer.o\n   text\t   data\t    bss\t    dec\t    hex\tfilename\n   5320\t    432\t     21\t   5773\t   168d\tnet/ipv4/inetpeer.o\n\nAfter patch :\n\nobjdump -d net/ipv4/inetpeer.o | scripts/checkstack.pl\n0x00000c11 inet_getpeer [inetpeer.o]:\t\t\t376\n0x00000dcd inet_getpeer [inetpeer.o]:\t\t\t376\n0x00000ab9 peer_check_expire [inetpeer.o]:\t\t328\n0x00000b7f peer_check_expire [inetpeer.o]:\t\t328\n0x0004 inet_initpeers [inetpeer.o]:\t\t\t112\n# size net/ipv4/inetpeer.o\n   text\t   data\t    bss\t    dec\t    hex\tfilename\n   5163\t    432\t     21\t   5616\t   15f0\tnet/ipv4/inetpeer.o\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nCc: Scot Doyle \u003clkml@scotdoyle.com\u003e\nCc: Stephen Hemminger \u003cshemminger@vyatta.com\u003e\nCc: Hiroaki SHIMODA \u003cshimoda.hiroaki@gmail.com\u003e\nReviewed-by: Hiroaki SHIMODA \u003cshimoda.hiroaki@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f8e9881c2aef1e982e5abc25c046820cd0b7cf64",
      "tree": "be6286761107774543025b577e32535bee55504b",
      "parents": [
        "aa8673599f1d269b4e4d9b0c0f61fca57bc02699"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Tue Apr 12 13:39:14 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 12 13:39:14 2011 -0700"
      },
      "message": "bridge: reset IPCB in br_parse_ip_options\n\nCommit 462fb2af9788a82 (bridge : Sanitize skb before it enters the IP\nstack), missed one IPCB init before calling ip_options_compile()\n\nThanks to Scot Doyle for his tests and bug reports.\n\nReported-by: Scot Doyle \u003clkml@scotdoyle.com\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nCc: Hiroaki SHIMODA \u003cshimoda.hiroaki@gmail.com\u003e\nAcked-by: Bandan Das \u003cbandan.das@stratus.com\u003e\nAcked-by: Stephen Hemminger \u003cshemminger@vyatta.com\u003e\nCc: Jan Lübbe \u003cjluebbe@debian.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "aa8673599f1d269b4e4d9b0c0f61fca57bc02699",
      "tree": "7733bac39d382cfcda0459e8973decb300a0c52a",
      "parents": [
        "4a9f65f6304a00f6473e83b19c1e83caa1e42530"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Apr 11 18:59:05 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Apr 11 18:59:05 2011 -0700"
      },
      "message": "llc: Fix length check in llc_fixup_skb().\n\nFixes bugzilla #32872\n\nThe LLC stack pretends to support non-linear skbs but there is a\ndirect use of skb_tail_pointer() in llc_fixup_skb().\n\nUse pskb_may_pull() to see if data_size bytes remain and can be\naccessed linearly in the packet, instead of direct pointer checks.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4a9f65f6304a00f6473e83b19c1e83caa1e42530",
      "tree": "126371158cd2361291027c22690d9761d8e22372",
      "parents": [
        "0c184ed9032c58b21f0d90de28c796874b73d6a1"
      ],
      "author": {
        "name": "Sjur Brændeland",
        "email": "sjur.brandeland@stericsson.com",
        "time": "Mon Apr 11 10:11:30 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Apr 11 13:15:58 2011 -0700"
      },
      "message": "caif: performance bugfix - allow radio stack to prioritize packets.\n\n    In the CAIF Payload message the Packet Type indication must be set to\n    UNCLASSIFIED in order to allow packet prioritization in the modem\u0027s\n    network stack. Otherwise TCP-Ack is not prioritized in the modems\n    transmit queue.\n\nSigned-off-by: Sjur Brændeland \u003csjur.brandeland@stericsson.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0c184ed9032c58b21f0d90de28c796874b73d6a1",
      "tree": "149921e54ad64675e7bcc98bba639093ca752931",
      "parents": [
        "c968bdf6912cad6d0fc63d7037cc1c870604a808"
      ],
      "author": {
        "name": "Sjur Brændeland",
        "email": "sjur.brandeland@stericsson.com",
        "time": "Mon Apr 11 10:11:29 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Apr 11 13:15:57 2011 -0700"
      },
      "message": "caif: Bugfix use for_each_safe when removing list nodes.\n\nSigned-off-by: Sjur Brændeland \u003csjur.brandeland@stericsson.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c44eaf41a5a423993932c9a9ad279ee132779b48",
      "tree": "3554fc0bfdcd97936417d6d001d00710d11e67e5",
      "parents": [
        "4263a2f1dad8c8e7ce2352a0cbc882c2b0c044a9",
        "88edaa415966af965bb7eb7056d8b58145462c8e"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Mon Apr 11 07:27:24 2011 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Mon Apr 11 07:27:24 2011 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (34 commits)\n  net: Add support for SMSC LAN9530, LAN9730 and LAN89530\n  mlx4_en: Restoring RX buffer pointer in case of failure\n  mlx4: Sensing link type at device initialization\n  ipv4: Fix \"Set rt-\u003ert_iif more sanely on output routes.\"\n  MAINTAINERS: add entry for Xen network backend\n  be2net: Fix suspend/resume operation\n  be2net: Rename some struct members for clarity\n  pppoe: drop PPPOX_ZOMBIEs in pppoe_flush_dev\n  dsa/mv88e6131: add support for mv88e6085 switch\n  ipv6: Enable RFS sk_rxhash tracking for ipv6 sockets (v2)\n  be2net: Fix a potential crash during shutdown.\n  bna: Fix for handling firmware heartbeat failure\n  can: mcp251x: Allow pass IRQ flags through platform data.\n  smsc911x: fix mac_lock acquision before calling smsc911x_mac_read\n  iwlwifi: accept EEPROM version 0x423 for iwl6000\n  rt2x00: fix cancelling uninitialized work\n  rtlwifi: Fix some warnings/bugs\n  p54usb: IDs for two new devices\n  wl12xx: fix potential buffer overflow in testmode nvs push\n  zd1211rw: reset rx idle timer from tasklet\n  ...\n"
    },
    {
      "commit": "94c8a984ae2adbd9a9626fb42e0f2faf3e36e86f",
      "tree": "a4beddd64501ef00ad41c8fd5974340bec2fcf73",
      "parents": [
        "f9fa0bc1fabe1d861e46d80ecbe7e85da359195c",
        "37adb89fadd65ce47f7e5cfd564938a76b351948"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri Apr 08 11:47:35 2011 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri Apr 08 11:47:35 2011 -0700"
      },
      "message": "Merge branch \u0027bugfixes\u0027 of git://git.linux-nfs.org/projects/trondmy/nfs-2.6\n\n* \u0027bugfixes\u0027 of git://git.linux-nfs.org/projects/trondmy/nfs-2.6:\n  NFS: Change initial mount authflavor only when server returns NFS4ERR_WRONGSEC\n  NFS: Fix a signed vs. unsigned secinfo bug\n  Revert \"net/sunrpc: Use static const char arrays\"\n"
    },
    {
      "commit": "1b86a58f9d7ce4fe2377687f378fbfb53bdc9b6c",
      "tree": "e931b86166c2a644470e3754e2d3139f97834951",
      "parents": [
        "9b57e1a79e2142df8412ab223c90ba6f47c6b3a3"
      ],
      "author": {
        "name": "OGAWA Hirofumi",
        "email": "hirofumi@mail.parknet.co.jp",
        "time": "Thu Apr 07 14:04:08 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 07 14:04:08 2011 -0700"
      },
      "message": "ipv4: Fix \"Set rt-\u003ert_iif more sanely on output routes.\"\n\nCommit 1018b5c01636c7c6bda31a719bda34fc631db29a (\"Set rt-\u003ert_iif more\nsanely on output routes.\")  breaks rt_is_{output,input}_route.\n\nThis became the cause to return \"IP_PKTINFO\u0027s -\u003eipi_ifindex \u003d\u003d 0\".\n\nTo fix it, this does:\n\n1) Add \"int rt_route_iif;\" to struct rtable\n\n2) For input routes, always set rt_route_iif to same value as rt_iif\n\n3) For output routes, always set rt_route_iif to zero.  Set rt_iif\n   as it is done currently.\n\n4) Change rt_is_{output,input}_route() to test rt_route_iif\n\nSigned-off-by: OGAWA Hirofumi \u003chirofumi@mail.parknet.co.jp\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "42933bac11e811f02200c944d8562a15f8ec4ff0",
      "tree": "fcdd9afe56eb0e746565ddd1f92f22d36678b843",
      "parents": [
        "2b9accbee563f535046ff2cd382d0acaa92e130c",
        "25985edcedea6396277003854657b5f3cb31a628"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Apr 07 11:14:49 2011 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Apr 07 11:14:49 2011 -0700"
      },
      "message": "Merge branch \u0027for-linus2\u0027 of git://git.profusion.mobi/users/lucas/linux-2.6\n\n* \u0027for-linus2\u0027 of git://git.profusion.mobi/users/lucas/linux-2.6:\n  Fix common misspellings\n"
    },
    {
      "commit": "a25a32ab71f822efb3e6025c365caa678aa6ff3b",
      "tree": "fcbc495baddf6d1837034cb83ee837887ea648f6",
      "parents": [
        "ec80bfcb68a0c46443991991d459a0cde773cdea",
        "3d7dc7e8c1566acb0fc55df228b2ed91f5638e9d"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 06 13:34:15 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 06 13:34:15 2011 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "ec80bfcb68a0c46443991991d459a0cde773cdea",
      "tree": "fe4e35db09c18c44b89b55189aa4594218b5fff4",
      "parents": [
        "47482f132a689af168fae3055ff1899dfd032d3a"
      ],
      "author": {
        "name": "Peter Korsgaard",
        "email": "jacmet@sunsite.dk",
        "time": "Tue Apr 05 03:03:56 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 06 13:32:53 2011 -0700"
      },
      "message": "dsa/mv88e6131: add support for mv88e6085 switch\n\nThe mv88e6085 is identical to the mv88e6095, except that all ports are\n10/100 Mb/s, so use the existing setup code except for the cpu/dsa speed\nselection in _setup_port().\n\nSigned-off-by: Peter Korsgaard \u003cjacmet@sunsite.dk\u003e\nAcked-by: Lennert Buytenhek \u003cbuytenh@wantstofly.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "47482f132a689af168fae3055ff1899dfd032d3a",
      "tree": "07f64d971a4783a71b612602da42e7faf8b14dd5",
      "parents": [
        "2d5d4154650459b61a8e7097d186a89d89dab8ed"
      ],
      "author": {
        "name": "Neil Horman",
        "email": "nhorman@tuxdriver.com",
        "time": "Wed Apr 06 13:07:09 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 06 13:07:09 2011 -0700"
      },
      "message": "ipv6: Enable RFS sk_rxhash tracking for ipv6 sockets (v2)\n\nproperly record sk_rxhash in ipv6 sockets (v2)\n\nNoticed while working on another project that flows to sockets which I had open\non a test systems weren\u0027t getting steered properly when I had RFS enabled.\nLooking more closely I found that:\n\n1) The affected sockets were all ipv6\n2) They weren\u0027t getting steered because sk-\u003esk_rxhash was never set from the\nincomming skbs on that socket.\n\nThis was occuring because there are several points in the IPv4 tcp and udp code\nwhich save the rxhash value when a new connection is established.  Those calls\nto sock_rps_save_rxhash were never added to the corresponding ipv6 code paths.\nThis patch adds those calls.  Tested by myself to properly enable RFS\nfunctionalty on ipv6.\n\nChange notes:\nv2:\n\tFiltered UDP to only arm RFS on bound sockets (Eric Dumazet)\n\nSigned-off-by: Neil Horman \u003cnhorman@tuxdriver.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0867659fa3c245bf203d837a82e0f6ea5079c2c5",
      "tree": "b4055632e89463046fd32ba20d3a691fd798da95",
      "parents": [
        "6221f222c0ebf1acdf7abcf927178f40e1a65e2a"
      ],
      "author": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Wed Apr 06 10:13:32 2011 -0700"
      },
      "committer": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Wed Apr 06 11:18:17 2011 -0700"
      },
      "message": "Revert \"net/sunrpc: Use static const char arrays\"\n\nThis reverts commit 411b5e05617593efebc06241dbc56f42150f2abe.\n\nOlga Kornievskaia reports:\n\nProblem: linux client mounting linux server using rc4-hmac-md5\nenctype. gssd fails with create a context after receiving a reply from\nthe server.\n\nDiagnose: putting printout statements in the server kernel and\nkerberos libraries revealed that client and server derived different\nintegrity keys.\n\nServer kernel code was at fault due the the commit\n\n[aglo@skydive linux-pnfs]$ git show 411b5e05617593efebc06241dbc56f42150f2abe\n\nTrond: The problem is that since it relies on virt_to_page(), you cannot\ncall sg_set_buf() for data in the const section.\n\nReported-by: Olga Kornievskaia \u003caglo@citi.umich.edu\u003e\nSigned-off-by: Trond Myklebust \u003cTrond.Myklebust@netapp.com\u003e\nCc: stable@kernel.org\t[2.6.36+]\n"
    },
    {
      "commit": "9d9305949778c41b92d4394a2f2a6bcdb1c41a9c",
      "tree": "d49d536ae8156ad9989dc7b26e3897f21e549b02",
      "parents": [
        "738faca34335cd1d5d87fa7c58703139c7fa15bd",
        "96120d86fe302c006259baee9061eea9e1b9e486"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 05 14:21:11 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 05 14:21:11 2011 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6\n"
    },
    {
      "commit": "d14f5b810b49c7dbd1a01be1c6d3641d46090080",
      "tree": "b201a1cf14c455b919ecb7d4a6631134d5815703",
      "parents": [
        "b2a8b4b81966094703088a7bc76a313af841924d",
        "738faca34335cd1d5d87fa7c58703139c7fa15bd"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Apr 05 12:26:57 2011 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Apr 05 12:26:57 2011 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (27 commits)\n  ipv6: Don\u0027t pass invalid dst_entry pointer to dst_release().\n  mlx4: fix kfree on error path in new_steering_entry()\n  tcp: len check is unnecessarily devastating, change to WARN_ON\n  sctp: malloc enough room for asconf-ack chunk\n  sctp: fix auth_hmacs field\u0027s length of struct sctp_cookie\n  net: Fix dev dev_ethtool_get_rx_csum() for forced NETIF_F_RXCSUM\n  usbnet: use eth%d name for known ethernet devices\n  starfire: clean up dma_addr_t size test\n  iwlegacy: fix bugs in change_interface\n  carl9170: Fix tx aggregation problems with some clients\n  iwl3945: disable hw scan by default\n  wireless: rt2x00: rt2800usb.c add and identify ids\n  iwl3945: do not deprecate software scan\n  mac80211: fix aggregation frame release during timeout\n  cfg80211: fix BSS double-unlinking (continued)\n  cfg80211:: fix possible NULL pointer dereference\n  mac80211: fix possible NULL pointer dereference\n  mac80211: fix NULL pointer dereference in ieee80211_key_alloc()\n  ath9k: fix a chip wakeup related crash in ath9k_start\n  mac80211: fix a crash in minstrel_ht in HT mode with no supported MCS rates\n  ...\n"
    },
    {
      "commit": "738faca34335cd1d5d87fa7c58703139c7fa15bd",
      "tree": "983fc8212bc5828fe14541119783cff159508b58",
      "parents": [
        "a14b289d4614bb3b25d0455d68f72f3c7b4cc8e8"
      ],
      "author": {
        "name": "Boris Ostrovsky",
        "email": "boris.ostrovsky@amd.com",
        "time": "Mon Apr 04 13:07:26 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Apr 04 13:07:26 2011 -0700"
      },
      "message": "ipv6: Don\u0027t pass invalid dst_entry pointer to dst_release().\n\nMake sure dst_release() is not called with error pointer. This is\nsimilar to commit 4910ac6c526d2868adcb5893e0c428473de862b5 (\"ipv4:\nDon\u0027t ip_rt_put() an error pointer in RAW sockets.\").\n\nSigned-off-by: Boris Ostrovsky \u003cboris.ostrovsky@amd.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "fcf8bd3ba5362682f945a3f838070ac5e10ff871",
      "tree": "8c3c05ff4bb73bf05de06d050e3173b724e005ae",
      "parents": [
        "5312c3f60ba49073081b2dc421f9f3c22dd43d99"
      ],
      "author": {
        "name": "Helmut Schaa",
        "email": "helmut.schaa@googlemail.com",
        "time": "Fri Apr 01 15:46:05 2011 +0200"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Apr 04 15:22:11 2011 -0400"
      },
      "message": "mac80211: Fix duplicate frames on cooked monitor\n\nCleaning the ieee80211_rx_data.flags field here is wrong, instead the\nflags should be valid accross processing the frame on different\ninterfaces. Fix this by removing the incorrect flags\u003d0 assignment.\n\nIntroduced in commit 554891e63a29af35cc6bb403ef34e319518114d0\n(mac80211: move packet flags into packet).\n\nSigned-off-by: Helmut Schaa \u003chelmut.schaa@googlemail.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "96120d86fe302c006259baee9061eea9e1b9e486",
      "tree": "2fa6e56f389431dfb84609d3d7572cad76e88e71",
      "parents": [
        "b7225041e93f81e7e38fcdf27fc82044e7695efd"
      ],
      "author": {
        "name": "Florian Westphal",
        "email": "fw@strlen.de",
        "time": "Mon Apr 04 17:06:21 2011 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Apr 04 17:06:21 2011 +0200"
      },
      "message": "netfilter: xt_conntrack: fix inverted conntrack direction test\n\n--ctdir ORIGINAL matches REPLY packets, and vv:\n\nuserspace sets \"invert_flags \u0026\u003d ~XT_CONNTRACK_DIRECTION\" in ORIGINAL\ncase.\n\nThus: (CTINFO2DIR(ctinfo) \u003d\u003d IP_CT_DIR_ORIGINAL) ^\n      !!(info-\u003einvert_flags \u0026 XT_CONNTRACK_DIRECTION))\n\nyields \"1 ^ 0\", which is true -\u003e returns false.\n\nReproducer:\niptables -I OUTPUT 1 -p tcp --syn -m conntrack --ctdir ORIGINAL\n\nSigned-off-by: Florian Westphal \u003cfwestphal@astaro.com\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "b7225041e93f81e7e38fcdf27fc82044e7695efd",
      "tree": "75291a5f780d4032f6076a628aab6266196bb59b",
      "parents": [
        "0fae2e7740aca7e384c5f337f458897e7e337d58"
      ],
      "author": {
        "name": "Florian Westphal",
        "email": "fw@strlen.de",
        "time": "Mon Apr 04 17:01:43 2011 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Apr 04 17:01:43 2011 +0200"
      },
      "message": "netfilter: xt_addrtype: replace rt6_lookup with nf_afinfo-\u003eroute\n\nThis avoids pulling in the ipv6 module when using (ipv4-only) iptables\n-m addrtype.\n\nSigned-off-by: Florian Westphal \u003cfw@strlen.de\u003e\nAcked-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "0fae2e7740aca7e384c5f337f458897e7e337d58",
      "tree": "ff0767f2dc382ee8a62e324e441b671382f0433c",
      "parents": [
        "31ad3dd64e689bc79dd819f8f134b9b025240eb8"
      ],
      "author": {
        "name": "Florian Westphal",
        "email": "fw@strlen.de",
        "time": "Mon Apr 04 17:00:54 2011 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Apr 04 17:00:54 2011 +0200"
      },
      "message": "netfilter: af_info: add \u0027strict\u0027 parameter to limit lookup to .oif\n\nipv6 fib lookup can set RT6_LOOKUP_F_IFACE flag to restrict search\nto an interface, but this flag cannot be set via struct flowi.\n\nAlso, it cannot be set via ip6_route_output: this function uses the\npassed sock struct to determine if this flag is required\n(by testing for nonzero sk_bound_dev_if).\n\nWork around this by passing in an artificial struct sk in case\n\u0027strict\u0027 argument is true.\n\nThis is required to replace the rt6_lookup call in xt_addrtype.c with\nnf_afinfo-\u003eroute().\n\nSigned-off-by: Florian Westphal \u003cfw@strlen.de\u003e\nAcked-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "31ad3dd64e689bc79dd819f8f134b9b025240eb8",
      "tree": "06d2a9afbea2b1b7973e416f18d4588df30fb91a",
      "parents": [
        "a09d19779f3ffac6e16821accc2c1cc4df1b643a"
      ],
      "author": {
        "name": "Florian Westphal",
        "email": "fw@strlen.de",
        "time": "Mon Apr 04 16:56:29 2011 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Apr 04 16:56:29 2011 +0200"
      },
      "message": "netfilter: af_info: add network namespace parameter to route hook\n\nThis is required to eventually replace the rt6_lookup call in\nxt_addrtype.c with nf_afinfo-\u003eroute().\n\nSigned-off-by: Florian Westphal \u003cfw@strlen.de\u003e\nAcked-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "a09d19779f3ffac6e16821accc2c1cc4df1b643a",
      "tree": "26ae50dcffd19813b21f3cacb9a11a1908dcf3f0",
      "parents": [
        "b4232a22776aa5d063f890d21ca69870dbbe431b"
      ],
      "author": {
        "name": "Hans Schillstrom",
        "email": "hans.schillstrom@ericsson.com",
        "time": "Mon Apr 04 15:25:18 2011 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Apr 04 15:25:18 2011 +0200"
      },
      "message": "IPVS: fix NULL ptr dereference in ip_vs_ctl.c ip_vs_genl_dump_daemons()\n\nipvsadm -ln --daemon will trigger a Null pointer exception because\nip_vs_genl_dump_daemons() uses skb_net() instead of skb_sknet().\n\nTo prevent others from NULL ptr a check is made in ip_vs.h skb_net().\n\nSigned-off-by: Hans Schillstrom \u003chans.schillstrom@ericsson.com\u003e\nSigned-off-by: Simon Horman \u003chorms@verge.net.au\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "b4232a22776aa5d063f890d21ca69870dbbe431b",
      "tree": "81bcb79f87d7a36f37f347ef4c4ad95dc8678156",
      "parents": [
        "2f9f28b212a2bd4948c8ceaaec33ce0123632129"
      ],
      "author": {
        "name": "David Sterba",
        "email": "dsterba@suse.cz",
        "time": "Mon Apr 04 15:21:02 2011 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Apr 04 15:21:02 2011 +0200"
      },
      "message": "netfilter: h323: bug in parsing of ASN1 SEQOF field\n\nStatic analyzer of clang found a dead store which appears to be a bug in\nreading count of items in SEQOF field, only the lower byte of word is\nstored. This may lead to corrupted read and communication shutdown.\n\nThe bug has been in the module since it\u0027s first inclusion into linux\nkernel.\n\n[Patrick: the bug is real, but without practical consequence since the\n largest amount of sequence-of members we parse is 30.]\n\nSigned-off-by: David Sterba \u003cdsterba@suse.cz\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "2f9f28b212a2bd4948c8ceaaec33ce0123632129",
      "tree": "8c9961f59a190ab05a568216d69f4809ab3041e2",
      "parents": [
        "512d06b5b64fb422d90f199b1be188082729edf9"
      ],
      "author": {
        "name": "Jozsef Kadlecsik",
        "email": "kadlec@blackhole.kfki.hu",
        "time": "Mon Apr 04 15:19:25 2011 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Apr 04 15:19:25 2011 +0200"
      },
      "message": "netfilter: ipset: references are protected by rwlock instead of mutex\n\nThe timeout variant of the list:set type must reference the member sets.\nHowever, its garbage collector runs at timer interrupt so the mutex\nprotection of the references is a no go. Therefore the reference protection\nis converted to rwlock.\n\nSigned-off-by: Jozsef Kadlecsik \u003ckadlec@blackhole.kfki.hu\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "512d06b5b64fb422d90f199b1be188082729edf9",
      "tree": "a8faf8b7023094414e3bbcc05b2eb7960af54f42",
      "parents": [
        "4dd5ffe4fc36128dc86568ddeaeae359e6037762"
      ],
      "author": {
        "name": "Jozsef Kadlecsik",
        "email": "kadlec@blackhole.kfki.hu",
        "time": "Mon Apr 04 15:18:45 2011 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Apr 04 15:18:45 2011 +0200"
      },
      "message": "netfilter: ipset: list:set timeout variant fixes\n\n- the timeout value was actually not set\n- the garbage collector was broken\n\nThe variant is fixed, the tests to the ipset testsuite are added.\n\nSigned-off-by: Jozsef Kadlecsik \u003ckadlec@blackhole.kfki.hu\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "2fceec13375e5d98ef033c6b0ee03943fc460950",
      "tree": "34870f61085509c0ff3d8cef819846fc31e94e7c",
      "parents": [
        "2cab86bee8e7f353e6ac8c15b3eb906643497644"
      ],
      "author": {
        "name": "Ilpo Järvinen",
        "email": "ilpo.jarvinen@helsinki.fi",
        "time": "Fri Apr 01 21:47:41 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Apr 01 21:47:41 2011 -0700"
      },
      "message": "tcp: len check is unnecessarily devastating, change to WARN_ON\n\nAll callers are prepared for alloc failures anyway, so this error\ncan safely be boomeranged to the callers domain without super\nbad consequences. ...At worst the connection might go into a state\nwhere each RTO tries to (unsuccessfully) re-fragment with such\na mis-sized value and eventually dies.\n\nSigned-off-by: Ilpo Järvinen \u003cilpo.jarvinen@helsinki.fi\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2cab86bee8e7f353e6ac8c15b3eb906643497644",
      "tree": "8b65b48f5b32d3e6a60e97674f4b21be24f840a6",
      "parents": [
        "028dba0ac3fc3c82da06110b011fce22a5ffad00"
      ],
      "author": {
        "name": "Wei Yongjun",
        "email": "yjwei@cn.fujitsu.com",
        "time": "Thu Mar 31 23:42:55 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Apr 01 21:45:51 2011 -0700"
      },
      "message": "sctp: malloc enough room for asconf-ack chunk\n\nSometime the ASCONF_ACK parameters can equal to the fourfold of\nASCONF parameters, this only happend in some special case:\n\n  ASCONF parameter is :\n    Unrecognized Parameter (4 bytes)\n  ASCONF_ACK parameter should be:\n    Error Cause Indication parameter (8 bytes header)\n     + Error Cause (4 bytes header)\n       + Unrecognized Parameter (4bytes)\n\nFour 4bytes Unrecognized Parameters in ASCONF chunk will cause panic.\n\nPid: 0, comm: swapper Not tainted 2.6.38-next+ #22 Bochs Bochs\nEIP: 0060:[\u003cc0717eae\u003e] EFLAGS: 00010246 CPU: 0\nEIP is at skb_put+0x60/0x70\nEAX: 00000077 EBX: c09060e2 ECX: dec1dc30 EDX: c09469c0\nESI: 00000000 EDI: de3c8d40 EBP: dec1dc58 ESP: dec1dc2c\n DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068\nProcess swapper (pid: 0, ti\u003ddec1c000 task\u003dc09aef20 task.ti\u003dc0980000)\nStack:\n c09469c0 e1894fa4 00000044 00000004 de3c8d00 de3c8d00 de3c8d44 de3c8d40\n c09060e2 de25dd80 de3c8d40 dec1dc7c e1894fa4 dec1dcb0 00000040 00000004\n 00000000 00000800 00000004 00000004 dec1dce0 e1895a2b dec1dcb4 de25d960\nCall Trace:\n [\u003ce1894fa4\u003e] ? sctp_addto_chunk+0x4e/0x89 [sctp]\n [\u003ce1894fa4\u003e] sctp_addto_chunk+0x4e/0x89 [sctp]\n [\u003ce1895a2b\u003e] sctp_process_asconf+0x32f/0x3d1 [sctp]\n [\u003ce188d554\u003e] sctp_sf_do_asconf+0xf8/0x173 [sctp]\n [\u003ce1890b02\u003e] sctp_do_sm+0xb8/0x159 [sctp]\n [\u003ce18a2248\u003e] ? sctp_cname+0x0/0x52 [sctp]\n [\u003ce189392d\u003e] sctp_assoc_bh_rcv+0xac/0xe3 [sctp]\n [\u003ce1897d76\u003e] sctp_inq_push+0x2d/0x30 [sctp]\n [\u003ce18a21b2\u003e] sctp_rcv+0x7a7/0x83d [sctp]\n [\u003cc077a95c\u003e] ? ipv4_confirm+0x118/0x125\n [\u003cc073a970\u003e] ? nf_iterate+0x34/0x62\n [\u003cc074789d\u003e] ? ip_local_deliver_finish+0x0/0x194\n [\u003cc074789d\u003e] ? ip_local_deliver_finish+0x0/0x194\n [\u003cc0747992\u003e] ip_local_deliver_finish+0xf5/0x194\n [\u003cc074789d\u003e] ? ip_local_deliver_finish+0x0/0x194\n [\u003cc0747a6e\u003e] NF_HOOK.clone.1+0x3d/0x44\n [\u003cc0747ab3\u003e] ip_local_deliver+0x3e/0x44\n [\u003cc074789d\u003e] ? ip_local_deliver_finish+0x0/0x194\n [\u003cc074775c\u003e] ip_rcv_finish+0x29f/0x2c7\n [\u003cc07474bd\u003e] ? ip_rcv_finish+0x0/0x2c7\n [\u003cc0747a6e\u003e] NF_HOOK.clone.1+0x3d/0x44\n [\u003cc0747cae\u003e] ip_rcv+0x1f5/0x233\n [\u003cc07474bd\u003e] ? ip_rcv_finish+0x0/0x2c7\n [\u003cc071dce3\u003e] __netif_receive_skb+0x310/0x336\n [\u003cc07221f3\u003e] netif_receive_skb+0x4b/0x51\n [\u003ce0a4ed3d\u003e] cp_rx_poll+0x1e7/0x29c [8139cp]\n [\u003cc072275e\u003e] net_rx_action+0x65/0x13a\n [\u003cc0445a54\u003e] __do_softirq+0xa1/0x149\n [\u003cc04459b3\u003e] ? __do_softirq+0x0/0x149\n \u003cIRQ\u003e\n [\u003cc0445891\u003e] ? irq_exit+0x37/0x72\n [\u003cc040a7e9\u003e] ? do_IRQ+0x81/0x95\n [\u003cc07b3670\u003e] ? common_interrupt+0x30/0x38\n [\u003cc0428058\u003e] ? native_safe_halt+0xa/0xc\n [\u003cc040f5d7\u003e] ? default_idle+0x58/0x92\n [\u003cc0408fb0\u003e] ? cpu_idle+0x96/0xb2\n [\u003cc0797989\u003e] ? rest_init+0x5d/0x5f\n [\u003cc09fd90c\u003e] ? start_kernel+0x34b/0x350\n [\u003cc09fd0cb\u003e] ? i386_start_kernel+0xba/0xc1\n\nSigned-off-by: Wei Yongjun \u003cyjwei@cn.fujitsu.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5e58e5283a0a0a99ee970e7e5c80c6541693376e",
      "tree": "40409bad22ddc6c37b23ae8e518bbd6b2f39007c",
      "parents": [
        "c100c8f4c3c6f2a407bdbaaad2c4f1062e6a473a",
        "ffd8c746fbef50cf12df239f9d23c2afe1a2c3cb"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Apr 01 17:15:25 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Apr 01 17:15:25 2011 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "84daeb09ef2b11cb0b29e100766e38e206c8bc47",
      "tree": "c89748e1bb8618aac7ad0d2079fba43543844483",
      "parents": [
        "ecb78ab6f30106ab72a575a25b1cdfd1633b7ca2",
        "c100c8f4c3c6f2a407bdbaaad2c4f1062e6a473a"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri Apr 01 08:53:50 2011 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri Apr 01 08:53:50 2011 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6:\n  appletalk: Fix OOPS in atalk_release().\n  mlx4: Fixing bad size of event queue buffer\n  mlx4: Fixing use after free\n  bonding:typo in comment\n  sctp: Pass __GFP_NOWARN to hash table allocation attempts.\n  connector: convert to synchronous netlink message processing\n  fib: add rtnl locking in ip_fib_net_exit\n  atm/solos-pci: Don\u0027t flap VCs when carrier state changes\n  atm/solos-pci: Don\u0027t include frame pseudo-header on transmit hex-dump\n  atm/solos-pci: Use VPI.VCI notation uniformly.\n  Atheros, atl2: Fix mem leaks in error paths of atl2_set_eeprom\n  netdev: fix mtu check when TSO is enabled\n  net/usb: Ethernet quirks for the LG-VL600 4G modem\n  phylib: phy_attach_direct: phy_init_hw can fail, add cleanup\n  bridge: mcast snooping, fix length check of snooped MLDv1/2\n  via-ircc: Pass PCI device pointer to dma_{alloc, free}_coherent()\n  via-ircc: Use pci_{get, set}_drvdata() instead of static pointer variable\n  net: gre: provide multicast mappings for ipv4 and ipv6\n  bridge: Fix compilation warning in function br_stp_recalculate_bridge_id()\n  net: Fix warnings caused by MAX_SKB_FRAGS change.\n"
    },
    {
      "commit": "c100c8f4c3c6f2a407bdbaaad2c4f1062e6a473a",
      "tree": "bc4075ba65a4187ca46642589f5299cde399ae22",
      "parents": [
        "c37947459172a02691ccd48cb967e8b605d38c56"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Mar 31 18:59:10 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Mar 31 18:59:10 2011 -0700"
      },
      "message": "appletalk: Fix OOPS in atalk_release().\n\nCommit 60d9f461a20ba59219fdcdc30cbf8e3a4ad3f625 (\"appletalk: remove\nthe BKL\") added a dereference of \"sk\" before checking for NULL in\natalk_release().\n\nGuard the code block completely, rather than partially, with the\nNULL check.\n\nReported-by: Dave Jones \u003cdavej@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "25985edcedea6396277003854657b5f3cb31a628",
      "tree": "f026e810210a2ee7290caeb737c23cb6472b7c38",
      "parents": [
        "6aba74f2791287ec407e0f92487a725a25908067"
      ],
      "author": {
        "name": "Lucas De Marchi",
        "email": "lucas.demarchi@profusion.mobi",
        "time": "Wed Mar 30 22:57:33 2011 -0300"
      },
      "committer": {
        "name": "Lucas De Marchi",
        "email": "lucas.demarchi@profusion.mobi",
        "time": "Thu Mar 31 11:26:23 2011 -0300"
      },
      "message": "Fix common misspellings\n\nFixes generated by \u0027codespell\u0027 and manually reviewed.\n\nSigned-off-by: Lucas De Marchi \u003clucas.demarchi@profusion.mobi\u003e\n"
    },
    {
      "commit": "a84b50ceb7d640437d0dc28a2bef0d0de054de89",
      "tree": "e16a02b6be682dd9c3560fe7639331d1f1d62fa1",
      "parents": [
        "04f482faf50535229a5a5c8d629cf963899f857c"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Mar 30 17:51:36 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Mar 30 17:51:36 2011 -0700"
      },
      "message": "sctp: Pass __GFP_NOWARN to hash table allocation attempts.\n\nLike DCCP and other similar pieces of code, there are mechanisms\nhere to try allocating smaller hash tables if the allocation\nfails.  So pass in __GFP_NOWARN like the others do instead of\nemitting a scary message.\n\nReported-by: Dave Jones \u003cdavej@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e2666f84958adb3a034b98e99699b55705117e01",
      "tree": "f8fdca8163bf15d98468c63d4d98932ded0ec96f",
      "parents": [
        "c031235b395433350f25943b7580a5e343c7b7b2"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Wed Mar 30 16:57:46 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Mar 30 16:57:46 2011 -0700"
      },
      "message": "fib: add rtnl locking in ip_fib_net_exit\n\nDaniel J Blueman reported a lockdep splat in trie_firstleaf(), caused by\nRTNL being not locked before a call to fib_table_flush()\n\nReported-by: Daniel J Blueman \u003cdaniel.blueman@gmail.com\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c031235b395433350f25943b7580a5e343c7b7b2",
      "tree": "2b00c05104439e9a8bbf6d521b649f2138945b80",
      "parents": [
        "18b429e74eeafe42e947b1b0f9a760c7153a0b5c"
      ],
      "author": {
        "name": "Philip A. Prindeville",
        "email": "philipp@redfish-solutions.com",
        "time": "Wed Mar 30 13:17:04 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Mar 30 16:53:38 2011 -0700"
      },
      "message": "atm/solos-pci: Don\u0027t flap VCs when carrier state changes\n\nDon\u0027t flap VCs when carrier state changes; higher-level protocols\ncan detect loss of connectivity and act accordingly. This is more\nconsistent with how other network interfaces work.\n\nWe no longer use release_vccs() so we can delete it.\n\nrelease_vccs() was duplicated from net/atm/common.c; make the\ncorresponding function exported, since other code duplicates it\nand could leverage it if it were public.\n\nSigned-off-by: Philip A. Prindeville \u003cphilipp@redfish-solutions.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "50f3515828024582402044bcced6804c070c491c",
      "tree": "f9cf25bee56d0ca54acf4d571536268774dc56ed",
      "parents": [
        "6aba74f2791287ec407e0f92487a725a25908067",
        "4b2a58abd1e17c0ee53c8dded879e015917cca67"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Mar 30 09:46:09 2011 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Mar 30 09:46:09 2011 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/sage/ceph-client\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/sage/ceph-client:\n  libceph: Create a new key type \"ceph\".\n  libceph: Get secret from the kernel keys api when mounting with key\u003dNAME.\n  ceph: Move secret key parsing earlier.\n  libceph: fix null dereference when unregistering linger requests\n  ceph: unlock on error in ceph_osdc_start_request()\n  ceph: fix possible NULL pointer dereference\n  ceph: flush msgr_wq during mds_client shutdown\n"
    },
    {
      "commit": "79b569f0ec53a14c4d71e79d93a8676d9a0fda6d",
      "tree": "7e58567e6d8451ed8981afa687d67b69ae33a52e",
      "parents": [
        "7a635ea989991d7f12d57a12f2ba7cb6d211e083"
      ],
      "author": {
        "name": "Daniel Lezcano",
        "email": "daniel.lezcano@free.fr",
        "time": "Wed Mar 30 02:42:17 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Mar 30 02:42:17 2011 -0700"
      },
      "message": "netdev: fix mtu check when TSO is enabled\n\nIn case the device where is coming from the packet has TSO enabled,\nwe should not check the mtu size value as this one could be bigger\nthan the expected value.\n\nThis is the case for the macvlan driver when the lower device has\nTSO enabled. The macvlan inherit this feature and forward the packets\nwithout fragmenting them. Then the packets go through dev_forward_skb\nand are dropped. This patch fix this by checking TSO is not enabled\nwhen we want to check the mtu size.\n\nSigned-off-by: Daniel Lezcano \u003cdaniel.lezcano@free.fr\u003e\nAcked-by: \"Eric W. Biederman\" \u003cebiederm@xmission.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ff9a57a62afbbe2d0f3a09af321f1fd7645f38a5",
      "tree": "74a3d7cf9a7b10ad042eccf6adacf30aae8c7c15",
      "parents": [
        "fd1d9188f2cb81fe63c789d9f5463dca402ade12"
      ],
      "author": {
        "name": "Linus Lüssing",
        "email": "linus.luessing@web.de",
        "time": "Sat Mar 26 20:27:24 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Mar 30 02:28:20 2011 -0700"
      },
      "message": "bridge: mcast snooping, fix length check of snooped MLDv1/2\n\n\"len \u003d ntohs(ip6h-\u003epayload_len)\" does not include the length of the ipv6\nheader itself, which the rest of this function assumes, though.\n\nThis leads to a length check less restrictive as it should be in the\nfollowing line for one thing. For another, it very likely leads to an\ninteger underrun when substracting the offset and therefore to a very\nhigh new value of \u0027len\u0027 due to its unsignedness. This will ultimately\nlead to the pskb_trim_rcsum() practically never being called, even in\nthe cases where it should.\n\nSigned-off-by: Linus Lüssing \u003clinus.luessing@web.de\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "93ca3bb5df9bc8b2c60485e1cc6507c3d7c8e1fa",
      "tree": "6ccf21f8d1e4431c6be79c265fb1f9a722308f63",
      "parents": [
        "1459a3cc51d90d78027c7b5c1790e5d22751c8eb"
      ],
      "author": {
        "name": "Timo Teräs",
        "email": "timo.teras@iki.fi",
        "time": "Mon Mar 28 22:40:53 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Mar 30 00:10:47 2011 -0700"
      },
      "message": "net: gre: provide multicast mappings for ipv4 and ipv6\n\nMy commit 6d55cb91a0020ac0 (gre: fix hard header destination\naddress checking) broke multicast.\n\nThe reason is that ip_gre used to get ipgre_header() calls with\nzero destination if we have NOARP or multicast destination. Instead\nthe actual target was decided at ipgre_tunnel_xmit() time based on\nper-protocol dissection.\n\nInstead of allowing the \"abuse\" of -\u003eheader() calls with invalid\ndestination, this creates multicast mappings for ip_gre. This also\nfixes \"ip neigh show nud noarp\" to display the proper multicast\nmappings used by the gre device.\n\nReported-by: Doug Kehn \u003crdkehn@yahoo.com\u003e\nSigned-off-by: Timo Teräs \u003ctimo.teras@iki.fi\u003e\nAcked-by: Doug Kehn \u003crdkehn@yahoo.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1459a3cc51d90d78027c7b5c1790e5d22751c8eb",
      "tree": "c8c1f1a12c0001e55ed27f904dcef490040bd4ab",
      "parents": [
        "eec009548e98f6b6d514ff5bb8a8627b8dd17a49"
      ],
      "author": {
        "name": "Balaji G",
        "email": "balajig81@gmail.com",
        "time": "Tue Mar 29 06:20:04 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Mar 29 23:37:23 2011 -0700"
      },
      "message": "bridge: Fix compilation warning in function br_stp_recalculate_bridge_id()\n\nnet/bridge/br_stp_if.c: In function ‘br_stp_recalculate_bridge_id’:\nnet/bridge/br_stp_if.c:216:3: warning: ‘return’ with no value, in function returning non-void\n\nSigned-off-by: G.Balaji \u003cbalajig81@gmail.com\u003e\nAcked-by: Stephen Hemminger \u003cshemminger@vyatta.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4b2a58abd1e17c0ee53c8dded879e015917cca67",
      "tree": "585a02b8e3e36f7e6069d43000355e75aba097d3",
      "parents": [
        "e2c3d29b4295c3eec18294bc34f0c99a7b9ae413"
      ],
      "author": {
        "name": "Tommi Virtanen",
        "email": "tommi.virtanen@dreamhost.com",
        "time": "Mon Mar 28 14:59:38 2011 -0700"
      },
      "committer": {
        "name": "Sage Weil",
        "email": "sage@newdream.net",
        "time": "Tue Mar 29 12:11:24 2011 -0700"
      },
      "message": "libceph: Create a new key type \"ceph\".\n\nThis allows us to use existence of the key type as a feature test,\nfrom userspace.\n\nSigned-off-by: Tommi Virtanen \u003ctommi.virtanen@dreamhost.com\u003e\nSigned-off-by: Sage Weil \u003csage@newdream.net\u003e\n"
    },
    {
      "commit": "e2c3d29b4295c3eec18294bc34f0c99a7b9ae413",
      "tree": "29fbffeeed7e2774a4f87883ae01798079d85ed2",
      "parents": [
        "8323c3aa74cd92465350294567142d12ffdcc963"
      ],
      "author": {
        "name": "Tommi Virtanen",
        "email": "tommi.virtanen@dreamhost.com",
        "time": "Fri Mar 25 16:40:48 2011 -0700"
      },
      "committer": {
        "name": "Sage Weil",
        "email": "sage@newdream.net",
        "time": "Tue Mar 29 12:11:19 2011 -0700"
      },
      "message": "libceph: Get secret from the kernel keys api when mounting with key\u003dNAME.\n\nSigned-off-by: Tommi Virtanen \u003ctommi.virtanen@dreamhost.com\u003e\nSigned-off-by: Sage Weil \u003csage@newdream.net\u003e\n"
    },
    {
      "commit": "8323c3aa74cd92465350294567142d12ffdcc963",
      "tree": "052e7374393994eea8d534f98ee1bc7acea4c2d9",
      "parents": [
        "fbdb9190482fd83a3eb20cdeb0da454759f479d7"
      ],
      "author": {
        "name": "Tommi Virtanen",
        "email": "tommi.virtanen@dreamhost.com",
        "time": "Fri Mar 25 16:32:57 2011 -0700"
      },
      "committer": {
        "name": "Sage Weil",
        "email": "sage@newdream.net",
        "time": "Tue Mar 29 12:11:16 2011 -0700"
      },
      "message": "ceph: Move secret key parsing earlier.\n\nThis makes the base64 logic be contained in mount option parsing,\nand prepares us for replacing the homebew key management with the\nkernel key retention service.\n\nSigned-off-by: Tommi Virtanen \u003ctommi.virtanen@dreamhost.com\u003e\nSigned-off-by: Sage Weil \u003csage@newdream.net\u003e\n"
    },
    {
      "commit": "fbdb9190482fd83a3eb20cdeb0da454759f479d7",
      "tree": "bf83dcd6ea13c9a1feedb2a8f79744de93f9fecd",
      "parents": [
        "234af26ff123dfb2aa48772124721b1354c8e0a5"
      ],
      "author": {
        "name": "Sage Weil",
        "email": "sage@newdream.net",
        "time": "Tue Mar 29 12:11:06 2011 -0700"
      },
      "committer": {
        "name": "Sage Weil",
        "email": "sage@newdream.net",
        "time": "Tue Mar 29 12:11:06 2011 -0700"
      },
      "message": "libceph: fix null dereference when unregistering linger requests\n\nWe should only clear r_osd if we are neither registered as a linger or a\nregular request.  We may unregister as a linger while still registered as\na regular request (e.g., in reset_osd).  Incorrectly clearing r_osd there\nleads to a null pointer dereference in __send_request.\n\nAlso simplify the parallel check in __unregister_request() where we just\nremoved r_osd_item and know it\u0027s empty.\n\nSigned-off-by: Sage Weil \u003csage@newdream.net\u003e\n"
    },
    {
      "commit": "234af26ff123dfb2aa48772124721b1354c8e0a5",
      "tree": "9dfaaeb25a5b1265269796ebc48cab93d64fc1f2",
      "parents": [
        "6b0ae4097c1ebad98c7b33f83b4ca7e93890ed12"
      ],
      "author": {
        "name": "Dan Carpenter",
        "email": "error27@gmail.com",
        "time": "Tue Mar 29 06:25:59 2011 +0300"
      },
      "committer": {
        "name": "Sage Weil",
        "email": "sage@newdream.net",
        "time": "Tue Mar 29 08:59:54 2011 -0700"
      },
      "message": "ceph: unlock on error in ceph_osdc_start_request()\n\nThere was a missing unlock on the error path if __map_request() failed.\n\nSigned-off-by: Dan Carpenter \u003cerror27@gmail.com\u003e\nSigned-off-by: Sage Weil \u003csage@newdream.net\u003e\n"
    },
    {
      "commit": "cb1817b37313b4b6c7f8f93c730553dd3cb6ac57",
      "tree": "30c9b246c77ad338f177a5a32a45eb92e5994652",
      "parents": [
        "89078d572eb9ce8d4c04264b8b0ba86de0d74c8f",
        "02aadf72fe2c83f145e3437734e66be53abae481"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Mar 29 07:41:33 2011 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Mar 29 07:41:33 2011 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (30 commits)\n  xfrm: Restrict extended sequence numbers to esp\n  xfrm: Check for esn buffer len in xfrm_new_ae\n  xfrm: Assign esn pointers when cloning a state\n  xfrm: Move the test on replay window size into the replay check functions\n  netdev: bfin_mac: document TE setting in RMII modes\n  drivers net: Fix declaration ordering in inline functions.\n  cxgb3: Apply interrupt coalescing settings to all queues\n  net: Always allocate at least 16 skb frags regardless of page size\n  ipv4: Don\u0027t ip_rt_put() an error pointer in RAW sockets.\n  net: fix ethtool-\u003eset_flags not intended -EINVAL return value\n  mlx4_en: Fix loss of promiscuity\n  tg3: Fix inline keyword usage\n  tg3: use \u003clinux/io.h\u003e and \u003clinux/uaccess.h\u003e instead \u003casm/io.h\u003e and \u003casm/uaccess.h\u003e\n  net: use CHECKSUM_NONE instead of magic number\n  Net / jme: Do not use legacy PCI power management\n  myri10ge: small rx_done refactoring\n  bridge: notify applications if address of bridge device changes\n  ipv4: Fix IP timestamp option (IPOPT_TS_PRESPEC) handling in ip_options_echo()\n  can: c_can: Fix tx_bytes accounting\n  can: c_can_platform: fix irq check in probe\n  ...\n"
    },
    {
      "commit": "02aadf72fe2c83f145e3437734e66be53abae481",
      "tree": "889b435105ed020eb4b821b2ffcd2fa878dfd84f",
      "parents": [
        "e2b19125e94124daaeda1ddcf9b85b04575ad86f"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Mon Mar 28 19:48:09 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 28 23:34:53 2011 -0700"
      },
      "message": "xfrm: Restrict extended sequence numbers to esp\n\nThe IPsec extended sequence numbers are fully implemented just for\nesp. So restrict the usage to esp until other protocols have\nsupport too.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e2b19125e94124daaeda1ddcf9b85b04575ad86f",
      "tree": "ee670f037ea5b3826731ea5169f1afe94b925f16",
      "parents": [
        "af2f464e326ebad57284cfdecb03f1606e89bbc7"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Mon Mar 28 19:47:30 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 28 23:34:52 2011 -0700"
      },
      "message": "xfrm: Check for esn buffer len in xfrm_new_ae\n\nIn xfrm_new_ae() we may overwrite the allocated esn replay state\nbuffer with a wrong size. So check that the new size matches the\noriginal allocated size and return an error if this is not the case.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "af2f464e326ebad57284cfdecb03f1606e89bbc7",
      "tree": "0b9f1e9918a47f49e1454a0df5e045a0d627050d",
      "parents": [
        "36ae0148dbb6b9e15d8f067bb7523fd2b765a6af"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Mon Mar 28 19:46:39 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 28 23:34:52 2011 -0700"
      },
      "message": "xfrm: Assign esn pointers when cloning a state\n\nWhen we clone a xfrm state we have to assign the replay_esn\nand the preplay_esn pointers to the state if we use the\nnew replay detection method. To this end, we add a\nxfrm_replay_clone() function that allocates memory for\nthe replay detection and takes over the necessary values\nfrom the original state.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "36ae0148dbb6b9e15d8f067bb7523fd2b765a6af",
      "tree": "3ce6c552fc83d83beb5a0a35fb85e4f38f3dd251",
      "parents": [
        "72f49050ba18959472aac723cd9d094bc3547e89"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Mon Mar 28 19:45:52 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 28 23:34:51 2011 -0700"
      },
      "message": "xfrm: Move the test on replay window size into the replay check functions\n\nAs it is, the replay check is just performed if the replay window of the\nlegacy implementation is nonzero. So we move the test on a nonzero replay\nwindow inside the replay check functions to be sure we are testing for the\nright implementation.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4910ac6c526d2868adcb5893e0c428473de862b5",
      "tree": "f5fcd4425ee8ae7bd88f3a1fc4e9bb58592aff1b",
      "parents": [
        "673e63c688f43104c73aad8ea4237f7ad41fa14d"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 28 16:51:15 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 28 16:51:15 2011 -0700"
      },
      "message": "ipv4: Don\u0027t ip_rt_put() an error pointer in RAW sockets.\n\nReported-by: Marc Kleine-Budde \u003cmkl@pengutronix.de\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "499fe9a419d43410be576bcc825658997b6ce822",
      "tree": "6a47ff6d40fd98f1cb373565a620beec921451e0",
      "parents": [
        "2b78ac9bfc7483ba4bda9ad3d10dd4afcf88337c"
      ],
      "author": {
        "name": "Daniel Halperin",
        "email": "dhalperi@cs.washington.edu",
        "time": "Thu Mar 24 16:01:48 2011 -0700"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Mar 28 15:42:02 2011 -0400"
      },
      "message": "mac80211: fix aggregation frame release during timeout\n\nSuppose the aggregation reorder buffer looks like this:\n\nx-T-R1-y-R2,\n\nwhere x and y are frames that have not been received, T is a received\nframe that has timed out, and R1,R2 are received frames that have not\nyet timed out. The proper behavior in this scenario is to move the\nwindow past x (skipping it), release T and R1, and leave the window at y\nuntil y is received or R2 times out.\n\nAs written, this code will instead leave the window at R1, because it\nhas not yet timed out. Fix this by exiting the reorder loop only when\nthe frame that has not timed out AND there are skipped frames earlier in\nthe current valid window.\n\nSigned-off-by: Daniel Halperin \u003cdhalperi@cs.washington.edu\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    }
  ],
  "next": "2b78ac9bfc7483ba4bda9ad3d10dd4afcf88337c"
}
